Intel and ADP talk security by design—the idea of incorporating security measures throughout the entire development and manufacturing process.
Intel IT gives some history behind the software defined network change in the data center and how it can add real value to the enterprise.
Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.
Intel® Node Manager dynamically monitors power management, enabling limiting at every data center level for increased density and load balancing.
Enabling server power limiting across racks, aisles, and individual servers at the data center level, Intel® Node Manager dynamically monitors power management for increased density, load balancing, and optimized throughput during power spikes.Full View >
Learn about thinking differently with Diane Bryant, Intel CIO strategic initiatives – Cloud, IT Consumerization, Security, and Business Intelligence.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use that meets regulatory compliance with end-to-end hardware and software security technologies.Full View >
Intel Datacenter Marketing Group’s Shannon Poulin discusses re-architecting the data center for a services-oriented world at IDF 2013.
Intel’s Datacenter Marketing Group General Manager Shannon Poulin discusses re-architecting the data center for a services-oriented world at IDF 2013, with an overview of his group, what they are working on, and guest speakers.Full View >
Intel’s Diane Bryant discusses how the Intel® Xeon® processor E5 family will help with data center re-architecting for IT-based services at IDF 2013.
Intel’s Datacenter and Connected Systems Group Senior Vice President Diane Bryant discusses how the new Intel® Xeon® processor E5 family will assist IT departments with re-architecting the data center for cloud computing at IDF 2013.Full View >
Crimeware protection video shows how built-in technologies offer multi-layered protection in threat mitigation, identity, access, data, and monitoring
See how technologies built in 4th generation Intel® Core™ vPro™ processors offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and security and monitoring.Full View >
In this podcast, Yatish Goel, technical integrator, tells us how Intel IT focuses resources while expanding into the cloud BI space.
Cloud capabilities have opened up new opportunities and have created new possibilities in the area of Business Intelligence. In this podcast, hear how Intel IT focuses resources while expanding into this space.Full View >