Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 494 Results
  • Items Per Page

Collaborative Analytics for Personalized Cancer Care

Intel and the OHSU Knight Cancer Institute use collaborative analytics and genomic analysis via the cloud to develop personalized treatment plans.

SAP HANA*, Intel® Xeon® Processor E7 v3 Family Real-Time Analytics

Learn how the new Intel® Xeon® processor E7 v3 family running SAP HANA* turns real-time analytics into a real business advantage.

Preview | Download

Intel IT Annual Performance Report Companion Tool

Intel IT's annual performance report tool shares the IT initiatives that created business value for Intel in 2011, as well as focus areas for 2012

Desktop Virtualization Implementation for Georgia Tech

Georgia Tech students gain speed, flexibility with virtual desktop implementation.

Preview | Download

Editor’s Pick: Multiple Cloud Formations, New Security Approaches

Editor’s Pick: Four-part article describes the importance of user authentication in the cloud and across different types of clouds.

Editor’s Pick: Understanding Cloud Security Standards

Editor’s Pick: Gunnar Peterson blogs about cloud security standards. In part 3 of a series, he talks about security cloud authorization and access.

Editor’s Pick: Smarter Hypervisor Use, Big Change in Security

Editor’s Pick: Simon Crosby, former CTO at Citrix, talks about trustworthy, reliable cloud infrastructure with trust built in from the ground up.

Intel Intros E5 Xeon Processors Designed for Cloud Connectivity

The Intel® Xeon® processor E5-2600 product family designed for an increasingly connected world provides more options for compelling user experiences.

Editor’s Pick: Intel Plugs Both Your Sockets

Intel® Xeon® processor E5-2600 packs a lot of power with 2,263,000,000 transistors on a silicon wafer that has 416 square millimeters of area.

Editor’s Pick: Intel Unleashes Xeon E5 Family of Server Chips

The newly released Intel® Xeon® processor E5 family delivers unparalleled performance across compute, store, and network as well as built-in security.