Podcast: Stuart Tyler discusses historic privacy principles and how a company can create an effective approach that enhances business.
Podcast: Stuart Tyler, senior Intel privacy analyst, discusses historic privacy principles, how they can guide the enterprise when devising a privacy program, and how a company can create an effective approach that enhances business.Full View >
Intel IT’s David Schaefer discusses the value of data visualization tools for users and for IT and the future of visualization in the enterprise.
Discusses driving IT transformation with focus on the role consumerization and cloud computing play in shaping the modern enterprise IT organization.
Intel IT’s Operations and Services GM David Aires tells us about the factors driving IT transformation, focusing on the role that consumerization and cloud computing have played in shaping the modern enterprise IT organization.Full View >
In the IT performance report, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013 and looks at the year ahead.
Businesses view IT more and more as a strategic partner, a key differentiator that can help drive IT business value and innovation. In this podcast, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013, and looks at the year ahead.Full View >
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.Full View >
Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.
Automated patching solutions are an IT best practice for security with benefits for resources, performance and reporting
: Implementing automated patching solutions lead to numerous benefits with resources, performance and reporting. It’s an IT best practice, improves your resistance to attack, and increases efficiencies through a reduction of manual interventionFull View >
Deploying encryption is foundational to protect any business. Full Disk Encryption, data loss prevention and enterprise rights management capabilities
With the increase in mobile working and highly sensitive data being on various devices, encryption is foundational to protecting any business. It is a mature technology, and virtually transparent to the user, with Full Disk Encryption top of the listFull View >
Drive innovation to make your business flourish by using agile techniques that allow for mobility, mobile devices, cloud, big data and consumerization
Consumerization, Big Data and Cloud highlight capabilities of bringing technology to market quicker than ever before. Supporting users and customers in innovation comes from mobility and multiple devices as it stimulates different thought processesFull View >
Podcast: Inside IT and Jon McDermott discuss Intel IT’s approach to development and deployment of context-aware computing services for the enterprise.