Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 1770 Results
  • Items Per Page

Intel® Active Management Technology Configuration Utility: Guide

User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.

Preview | Download

2012 Health IT Twitter Sweepstakes Terms and Conditions

Read rules, instructions, terms, and conditions of the 2012 Health IT Twitter Sweepstakes.

Preview | Download

Intel IT Annual Performance Report Companion Tool

Intel IT's annual performance report tool shares the IT initiatives that created business value for Intel in 2011, as well as focus areas for 2012

Desktop Virtualization Implementation for Georgia Tech

Georgia Tech students gain speed, flexibility with virtual desktop implementation.

Preview | Download

Editor’s Pick: Multiple Cloud Formations, New Security Approaches

Editor’s Pick: Four-part article describes the importance of user authentication in the cloud and across different types of clouds.

Editor’s Pick: Understanding Cloud Security Standards

Editor’s Pick: Gunnar Peterson blogs about cloud security standards. In part 3 of a series, he talks about security cloud authorization and access.

Editor’s Pick: Smarter Hypervisor Use, Big Change in Security

Editor’s Pick: Simon Crosby, former CTO at Citrix, talks about trustworthy, reliable cloud infrastructure with trust built in from the ground up.

Intel Intros E5 Xeon Processors Designed for Cloud Connectivity

The Intel® Xeon® processor E5-2600 product family designed for an increasingly connected world provides more options for compelling user experiences.

Editor’s Pick: Intel Plugs Both Your Sockets

Intel® Xeon® processor E5-2600 packs a lot of power with 2,263,000,000 transistors on a silicon wafer that has 416 square millimeters of area.

Editor’s Pick: Intel Unleashes Xeon E5 Family of Server Chips

The newly released Intel® Xeon® processor E5 family delivers unparalleled performance across compute, store, and network as well as built-in security.