Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.
Can Information Security survive? Intel IT is tackling this challenge with a new information security strategy called “Protect to Enable.” Its security architecture is designed to increase productivity and innovation, while actually decreasing risk!Full View >
Video: intelligent PCs based on Intel® Core™ vPro™ processors provide performance and mobility, while delivering IT with control and manageability.
Podcast: Inside IT and Jon McDermott discuss Intel IT’s approach to development and deployment of pervasive computing services for the enterprise.
Anytime, anywhere learning with personal Ultrabook™ 2 in 1 systems featuring Intel® WiMAX empowers Northern Michigan University students and faculty.
By partnering with Intel, Northern Michigan University empowers students and faculty with Tablets in the Classroom by providing personal Ultrabook™ 2 in 1 systems featuring Intel® Core™ i5 processors and Intel® WiMAX technologyFull View >
Bring Location-Based Service indoors; Intel, AeroScout make it easy with Wi-Fi-based tagging equipment for time- and money-saving location services.
Transform the workplace by using Indoor Location Based Services; Intel and AeroScout make it easy to find resources by applying Wi-Fi-based tags to equipment and assets for time- and money-saving location services.Full View >
Intel conducted an investigation of air economizers to optimize power and cooling in their data centers.
Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >
Video: Intel CISO Malcolm Harkins talks benefits and challenges of IT Consumerization in the corporate environment.
Intel CISO Malcolm Harkins talks benefits and challenges of IT Consumerization. Hear what he has to say about security challenges a company faces when employees want to start using their own devices within the corporate environment.Full View >
Podcast talks with Intel security architecture and technology development lead Alan Ross about Intel's IT cloud security strategy.
Podcast talks with Intel security architecture and technology development lead Alan Ross about Intel's IT cloud security strategy: segregate virtual environments, employ balance controls, monitor applications while maintaining privacy compliance.Full View >
Hear how Intel IT is developing desktop virtualization to give IT more control and give users greater flexibility.
Podcast talks with Ed Jimison about Intel desktop virtualization technology: moving toward a "user-centric" model and away from a "device-centric" model, managing applications and services at the end points, and its associated challenges.Full View >