Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 780 Results
  • Items Per Page

Intel and Daikin Applied Offer Intelligent Equipment* Solutions

See how Daikin's Intelligent Equipment* control solutions provide real-time data streams and benchmarking performance for commercial HVAC equipment.

Preview | Download

Collaborative Analytics for Personalized Cancer Care

Intel and the OHSU Knight Cancer Institute use collaborative analytics and genomic analysis via the cloud to develop personalized treatment plans.

Real-Time Analytics Examples

Watch two real-time analytics examples: FarmLogs helps improve crop yields, and Pacific Northwest Seismic Network monitors earthquakes.

SAP HANA*, Intel® Xeon® Processor E7 v3 Family Real-Time Analytics

Learn how the new Intel® Xeon® processor E7 v3 family running SAP HANA* turns real-time analytics into a real business advantage.

Preview | Download

Make Every Customer Count with Dynamics CRM* 2013: Solution Brief

Brief: Microsoft Dynamics CRM* 2013 and the Intel® Xeon® processor E7 v2 family help enterprise businesses navigate the customer-centric marketplace.

Preview | Download

Factory Mobile Computing Proves Enterprise Value of 2-in-1 Devices

Intel IT is deploying 2-in-1 combination laptop and tablet mobile computing devices to improve productivity and produce time and cost savings.

Preview | Download

Intel IT Annual Performance Report Companion Tool

Intel IT's annual performance report tool shares the IT initiatives that created business value for Intel in 2011, as well as focus areas for 2012

Desktop Virtualization Implementation for Georgia Tech

Georgia Tech students gain speed, flexibility with virtual desktop implementation.

Preview | Download

Editor’s Pick: Multiple Cloud Formations, New Security Approaches

Editor’s Pick: Four-part article describes the importance of user authentication in the cloud and across different types of clouds.

Editor’s Pick: Understanding Cloud Security Standards

Editor’s Pick: Gunnar Peterson blogs about cloud security standards. In part 3 of a series, he talks about security cloud authorization and access.