Dashboard

Inhalte suchen

Suche verfeinern
Inhalte zu diesem Thema

Aktive Tags

  • 522 Ergebnisse
  • Einträge pro Seite

Enterprise System Discovery Using Hardware-Based Two Factor Authentication

Implementing online authentication with Intel® Identity Protection Technology.

Vorschau | Herunterladen

Evaluating in-memory computing performance in big data analytics

NTT Data demonstrates superior performance of Intel® Xeon® processor E7 family in heavy load evaluation

Vorschau | Herunterladen

Data Center Efficiency and Retrofit Best Practices

Intel IT data center retrofits aim to increase efficiency, optimize capacity and ROI, decrease operating costs, and minimize the impact to customers.

Vorschau | Herunterladen

Delivering an Enterprise App Store

Our enterprise app store—the Intel® Software Market—simplifies employee’s ability to find, download, and launch apps from PCs and mobile devices.

Vorschau | Herunterladen

Mobile Workflow Enhances Productivity and Privacy in Healthcare

Intel® tablets and Allscripts* EHR app powered by Windows*8 save time for health professionals and patients at Georgia’s largest orthopedics practice.

Vorschau | Herunterladen

Auditing IT Operations with Intel® Active Management Technology

White Paper: Explores options for auditing IT out-of-band management and remote remediation operations with Intel® Active Management Technology.

Vorschau | Herunterladen

„Mobile Employee Hotspot“ für die Konsumerisierung der IT

Der „Mobile Employee Hotspot“-Dienst, den Intel IT 2010 in Betrieb nahm, sorgte für höhere Sicherheit, bessere Skalierbarkeit, Benutzerfreundlichkeit und Produktivität – und niedrigere Kosten.

Vorschau | Herunterladen

Enabling Business Growth and Productivity with Online Solutions

White Paper: web-based solutions created by Intel help facilitate business growth and build links with customers, partners, and employees.

Vorschau | Herunterladen

Increasing EDA Throughput with Intel® Xeon® Processor 5600 Series

IT Brief discusses dual-socket server based test on the Intel® Xeon® processor X5670 running EDA applications, increasing throughput over 17 times.

Vorschau | Herunterladen

Intel IT’s New Information Security Strategy - Protect to Enable

Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.