Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 43 Results
  • Items Per Page

Intel® Atom™ Processor C2000 Memcached* Benchmark Performance

Provides the Memcached* v1.4.15 benchmark performance results on a single node of an Intel® Atom™ processor C2750-based server platform.

Intel® Atom™ Processor C2000 Dynamic Web Benchmark Performance

Provides the benchmark results for dynamic Web performance on a single node for an Intel® Atom™ processor C2750–based server platform.

Intel® Atom™ Processor C2000 Server Side Java* Benchmark

Provides the benchmark results for server side Java* performance on a single node for an Intel® Atom™ processor C2750-based server platform.

Intel® Atom™ Processor C2000 SPEC* CPU2006 Benchmark Performance

Provides the benchmark results for SPEC* CPU2006 single-threaded performance for an Intel® Atom™ processor C2750-based server platform.

Intel® SM35 Express Chipset Datasheet

Intel® SM35 Express Chipset architecture, buffers, register definition, power management, operating parameters, and specifications.

Preview | Download

ACSA Focuses on Physicians for Promoting Quality Care

Case Study: Andalusia Agency for Healthcare Quality accesses data on Intel®-based tablets, boosting performance, patient experience, and care quality.

Preview | Download

Saving Work and Money with Intel® Architecture-Based Tablet PCs

Case Study: With Intel® architecture-based tablet PCs and touch-enabled applications, Sinopec improves enterprise productivity and work efficiency.

Preview | Download

Intel® Processor–based Tablets Enhancing Educational Experience

Case Study: The District School Board of Niagara’s math pilot program enhances skills and personalized education with Intel® processor-based tablets.

Preview | Download

Plan Your Enterprise Mobility Strategy

Plan your enterprise mobility strategy to help increase security and improve productivity on mobile devices.

Intel Hardware-Enhanced Data Protection

By building security into the hardware foundation, Intel is transforming endpoint encryption for data protection.

Preview | Download