Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 884 Results
  • Items Per Page

Intel® Trusted Execution Technology: White Paper

White Paper: Intel® Trusted Execution Technology provides highly scalable platform security in physical and virtual infrastructures.

Preview | Download

Big Data Analytics: Intelligence Begins with Intel

Intel helps you learn about big data analytics, get help planning for it, and decide on the technology and solutions you need to make it happen.

Collaborative Analytics for Personalized Cancer Care

Intel and the OHSU Knight Cancer Institute use collaborative analytics and genomic analysis via the cloud to develop personalized treatment plans.

Intel and Daikin Applied Offer Intelligent Equipment* Solutions

See how Daikin's Intelligent Equipment* control solutions provide real-time data streams and benchmarking performance for commercial HVAC equipment.

Preview | Download

SAP HANA*, Intel® Xeon® Processor E7 v3 Family Real-Time Analytics

Learn how the new Intel® Xeon® processor E7 v3 family running SAP HANA* turns real-time analytics into a real business advantage.

Preview | Download

Make Every Customer Count with Dynamics CRM* 2013: Solution Brief

Brief: Microsoft Dynamics CRM* 2013 and the Intel® Xeon® processor E7 v2 family help enterprise businesses navigate the customer-centric marketplace.

Preview | Download

Intel® Active Management Technology Configuration Utility: Guide

User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.

Preview | Download

Intel IT Annual Performance Report Companion Tool

Intel IT's annual performance report tool shares the IT initiatives that created business value for Intel in 2011, as well as focus areas for 2012

Desktop Virtualization Implementation for Georgia Tech

Georgia Tech students gain speed, flexibility with virtual desktop implementation.

Preview | Download

Editor’s Pick: Multiple Cloud Formations, New Security Approaches

Editor’s Pick: Four-part article describes the importance of user authentication in the cloud and across different types of clouds.