Intel® 10-Gigabit-AT2-Server-Adapter – Produktbeschreibung
VideosWeitere Videos anzeigen
Intel® RAID: World Class Performance
Video: Intel® 6Gb/s RAID controllers features, benefits, and technical specs outlined. (2:56)
Intel® RAID: The Perfect Fit
Video: importance of matching Intel® RAID embedded, integrated, and add-in products to the correct server. (3:54)
Plum Tree Mortgage – Intel® Xeon® Prozessor: Testimonial
Video-Testimonial des Gewinners des „Intel IT Tune Up“-Wettbewerbs über das Upgrade auf einen Server mit Intel® Xeon® Prozessor. (2:47)
Altix UV* Technology Overview
Dr. Eng Lim Goh, CTO, SGI, describes features of SGI Altix UV* compared to standard rack mounted and clustered solutions. (6:59)
Intel® Intelligent Power Node Manager
Intel® Intelligent Power Node Manager enables server power capping to increase rack density, and facilitate load balancing. (2:27)
Cisco, Intel: Leading Server Innovation
Leading server innovation with the Intel® Xeon® processor E7 family for higher speed and capacity. (8:30)
Red Hat & Intel: Mission-Critical Computing
Pauline Nist (Intel) and Jim Totton (Red Hat) discuss their collaborative value to enterprise computing. (1:50)
Big Data: Intel & Oracle
Complementary big data solutions for enterprises
Trusted Computing Platform: Security to the Cloud
Create a cloud-based platform on Intel® processors with end-to-end software and hardware security.
Framestore Visual Effects Soar with Flexible IT
Framestore enhances film and integrated advertising on servers powered by Intel® Xeon® processors.
UOL Utility Computing with Intel® TXT
UOL discusses the security and migration benefits of Intel® Trusted Execution Technology.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing productivity.
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.