Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 359 Results
  • Items Per Page

Intelligent Network Platform Delivers Intrusion Protection

An intelligent network platform consisting of off-the-shelf components gives users an easy solution for applications, such as intrusion protection.

Intel® Technology Optimizes Pattern Match Algorithm

Intel® architecture optimizes the pattern match algorithm, which searches for malware and viruses, and helps achieve maximum computing performance.

Intel Across Healthcare: Eric Dishman

Video: Eric Dishman discusses megatrends driving the healthcare system and Intel's computing technologies and solutions to support care.

Inside IT: Intel’s Data Center Server Refresh Program

Intel IT’s Shesha Krishnapura discusses how a well-executed server refresh program can increase compute power and free space while maintaining costs.

Industrial System Consolidation: Virtualization Meets Multicore

Reduce cost, complexity, and footprint; run many OSs, apps by consolidating industrial systems on real-time embedded virtualization. (v.1, Sept. 2013)

Tech Today: Real-Time Decision Making for Rural First Response

Tech Today discusses how rural first response and treatment of heart attacks victims improves with affordable Intel® technology-based solutions.

Composing the Construction of “Shelly”

Discusses the construction of “Shelly,” the technical issues involved, and how the demo robot handles real-time performance. (v.1, Nov. 2013)

Composing the Motion Control of “Shelly”

Discusses how the complex motion control of “Shelly” works through virtualization of the four Intel® Core™ processors in one system. (v.1, Nov. 2013)

Ultrabook™ for Business

Overview presents the business benefits of the 3rd gen Intel® Core™ vPro™ processor-based Ultrabook™, ideal for marketing, sales, and IT.

Trusted Computing Platform: Intel Brings Security to the Cloud

Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.