Dashboard

Find Content

Related Content

Active Tags

  • 20 Results
  • Items Per Page

Best Practices for Operating System Deployment

As the industry evolves toward OS as a service, we are modifying our OS deployment best practices, to improve our flexibility and agility.

Preview | Download

Intel and SAP IoT Bring Actionable Insights to the Edge

Intel® IoT Gateway and sensors with SAP software provide real-time, actionable data at the edge, even without a WAN connection.

Preview | Download

Gartner says tablets will lead the way for BYOD

By 2018, Gartner predicts there will be twice as many employee-owned devices used for work than enterprise-owned devices.

Madrid Community Health Department: Managing Mobile

A study shows managing Microsoft Windows*-based tablets as a PC offers the greatest security benefit for the scenarios tested for BYOD.

Preview | Download

Ultrabooks™ for the Enterprise White Paper

Examines Ultrabooks™ for the enterprise as a workforce compute solution, including business and IT benefits, specifications, and usage models.

Preview | Download

Enable Native Android* Apps, Enterprise Security

White Paper: Intel IT’s solution for enabling employee access to native Android* e-mail, calendar, and contacts while providing enterprise security.

Preview | Download

Consumerization—Tablets and Touch Enabled Devices in Business

Enterprise Strategist Jim Henrys discusses the enterprise concerns of employee-owned tools like tablets and touch enabled devices in business.

Intel® Quick Sync Video and FFmpeg Installation and Validation

This paper is a detailed step-by-step guide to enabling h264_qsv, mpeg2_qsv, and hevc_qsv hardware accelerated codecs in the FFmpeg framework.

Preview | Download

How to make your BYOD workers secure

BYOD enables workers to be more productive and flexible, giving employees access to resources wherever they are but also brings security concerns

BYOD Consumerization Security for the Mobile Enterprise: Guide

Planning Guide: Information on hardware-enhanced solutions to improve BYOD consumerization security in the new mobile enterprise.

Preview | Download