Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 687 Results
  • Items Per Page

Security Software for Intel® QuickAssist Technology: Guide

Guide: Instructions for the Intel® EP80579 Software for Security Applications on Intel® QuickAssist Technology release package. (v.3, Sept. 2009)

Preview | Download

Collaborative Analytics for Personalized Cancer Care

Intel and the OHSU Knight Cancer Institute use collaborative analytics and genomic analysis via the cloud to develop personalized treatment plans.

Intel and Daikin Applied Offer Intelligent Equipment* Solutions

See how Daikin's Intelligent Equipment* control solutions provide real-time data streams and benchmarking performance for commercial HVAC equipment.

Preview | Download

Intel® AES New Instructions: White Paper

White Paper: Intel® AES New Instructions set, guidelines and demonstrations.

Preview | Download

SAP HANA*, Intel® Xeon® Processor E7 v3 Family Real-Time Analytics

Learn how the new Intel® Xeon® processor E7 v3 family running SAP HANA* turns real-time analytics into a real business advantage.

Preview | Download

Make Every Customer Count with Dynamics CRM* 2013: Solution Brief

Brief: Microsoft Dynamics CRM* 2013 and the Intel® Xeon® processor E7 v2 family help enterprise businesses navigate the customer-centric marketplace.

Preview | Download

Intel® Active Management Technology Configuration Utility: Guide

User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.

Preview | Download

Intel IT Annual Performance Report Companion Tool

Intel IT's annual performance report tool shares the IT initiatives that created business value for Intel in 2011, as well as focus areas for 2012

Editor’s Pick: Multiple Cloud Formations, New Security Approaches

Editor’s Pick: Four-part article describes the importance of user authentication in the cloud and across different types of clouds.

Editor’s Pick: Understanding Cloud Security Standards

Editor’s Pick: Gunnar Peterson blogs about cloud security standards. In part 3 of a series, he talks about security cloud authorization and access.