Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 322 Results
  • Items Per Page

Editor’s Pick: Multiple Cloud Formations, New Security Approaches

Editor’s Pick: Four-part article describes the importance of user authentication in the cloud and across different types of clouds.

Editor’s Pick: Understanding Cloud Security Standards

Editor’s Pick: Gunnar Peterson blogs about cloud security standards. In part 3 of a series, he talks about security cloud authorization and access.

Editor’s Pick: Smarter Hypervisor Use, Big Change in Security

Editor’s Pick: Simon Crosby, former CTO at Citrix, talks about trustworthy, reliable cloud infrastructure with trust built in from the ground up.

Intel Intros E5 Xeon Processors Designed for Cloud Connectivity

The Intel® Xeon® processor E5-2600 product family designed for an increasingly connected world provides more options for compelling user experiences.

Editor’s Pick: Intel Plugs Both Your Sockets

Intel® Xeon® processor E5-2600 packs a lot of power with 2,263,000,000 transistors on a silicon wafer that has 416 square millimeters of area.

Editor’s Pick: Intel Unleashes Xeon E5 Family of Server Chips

The newly released Intel® Xeon® processor E5 family delivers unparalleled performance across compute, store, and network as well as built-in security.

Editor’s Pick: Converged Infrastructure for Branch Offices

Editor’s Pick: Strategy guide to converged infrastructure sponsored by HP and Intel explains the importance of unified networking in branch offices.

Editor’s Pick: Intel Acquires Fulcrum Microsystems

Editor’s Pick: Intel invests in cloud technology, acquires Fulcrum Microsystems, maker of standards-based 10- and 40-gigabit Ethernet switch silicon.

Editor’s Pick: Questions for Private Cloud Projects

Editor’s Pick: Cloud Technology Partners execs describe the pitfalls and decision points in your private cloud projects.

Editor’s Pick: McAfee, Intel Strategy

Editor’s Pick: McAfee-Intel strategy includes McAfee DeepSAFE*, hybrid hardware, software technology that detects rootkit attacks on PCs, servers.