Podcast: Stuart Tyler discusses historic privacy principles and how a company can create an effective approach that enhances business.
Podcast: Stuart Tyler, senior Intel privacy analyst, discusses historic privacy principles, how they can guide the enterprise when devising a privacy program, and how a company can create an effective approach that enhances business.Full View >
Intel’s Diane Bryant discusses how the Intel® Xeon® processor E5 family will help with data center re-architecting for IT-based services at IDF 2013.
Intel’s Datacenter and Connected Systems Group Senior Vice President Diane Bryant discusses how the new Intel® Xeon® processor E5 family will assist IT departments with re-architecting the data center for cloud computing at IDF 2013.Full View >
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.Full View >
Intel Datacenter Marketing Group’s Shannon Poulin discusses re-architecting the data center for a services-oriented world at IDF 2013.
Intel’s Datacenter Marketing Group General Manager Shannon Poulin discusses re-architecting the data center for a services-oriented world at IDF 2013, with an overview of his group, what they are working on, and guest speakers.Full View >
Four IT managers discuss virtual desktop management models for four industries: financial services, education, healthcare, and general office.
Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.
Big Data holds potential benefits for almost every business as structured data sets bring efficiencies through analysis
Big Data and Databases is discussed as structured and unstructured data sets. Big Data examples are given by two leading professionals with analytics and on how they are finding efficiencies for their own business and how it can apply to othersFull View >
Big Data is about applying proper business analytics, business tools and then business intelligence against the analytics
Automated patching solutions are an IT best practice for security with benefits for resources, performance and reporting
: Implementing automated patching solutions lead to numerous benefits with resources, performance and reporting. It’s an IT best practice, improves your resistance to attack, and increases efficiencies through a reduction of manual interventionFull View >
Deploying encryption is foundational to protect any business. Full Disk Encryption, data loss prevention and enterprise rights management capabilities
With the increase in mobile working and highly sensitive data being on various devices, encryption is foundational to protecting any business. It is a mature technology, and virtually transparent to the user, with Full Disk Encryption top of the listFull View >