Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.
Can Information Security survive? Intel IT is tackling this challenge with a new information security strategy called “Protect to Enable.” Its security architecture is designed to increase productivity and innovation, while actually decreasing risk!Full View >
Video: Intel and VMware discuss the virtualization business benefits.
Podcast: Inside IT and Jon McDermott discuss Intel IT’s approach to development and deployment of pervasive computing services for the enterprise.
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.Full View >
Video: enhancing server and cloud security with Intel® Trusted Execution Technology.
Video: enhancing server and cloud security with Intel® trusted execution technology.Full View >
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Animation: Intel® Intelligent Power Node Manager is a smart way to optimize and manage power and cooling resources in the data center.
Enabling server power limiting across racks, aisles, and individual servers at the data center level, Intel® Node Manager dynamically monitors power management for increased density, load balancing, and optimized throughput during power spikes.Full View >
Counter-Strike*and PlanetSide 2* makers discuss game development on Intel® Xeon® processor-based servers and Ultrabook™ devices.
Video: The First American Corporation builds energy-efficient data center with Intel® Xeon® processors, lowering utility costs and server sprawl.
Intel conducted an investigation of air economizers to optimize power and cooling in their data centers.