Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >
Chico’s updates their data center with Intel® Xeon® processor 5600 series-based servers and achieves more computing capacity in less space.
Chico’s updates their data center with Intel® Xeon® processor 5600 series-based servers and achieves more computing capacity in less space.Full View >
Sample Digital eliminates DVDs and transportation costs by digital distributing HD using Intel® Xeon® processors.
Intel’s BYOD program was built to facilitate eDiscovery – legal requests for data –stored on personally owned devices such as smartphones and tablets.
Smart phone security is an issue when employees use them in secure environments. Intel IT has enabled use and maintained security in secure areas.
25 year Intel veteran discusses how Information Technology became such an essential part of the enterprise, and how IT’s role continues to change.
Hear how Intel IT is developing desktop virtualization to give IT more control and give users greater flexibility.
Podcast talks with Ed Jimison about Intel desktop virtualization technology: moving toward a "user-centric" model and away from a "device-centric" model, managing applications and services at the end points, and its associated challenges.Full View >
Video: Intel IT members discuss folding user-owned devices into the IT infrastructure safely and efficiently IT.
Cisco Senior Manager Brian Gracely talks about what drives cloud computing trends and how a unified computing environment enables innovation faster.
Intel IT’s Arun Sagiraju talks about the challenges in restructuring intel.com, the approach taken, and the results of the new Web experience.