VideosWeitere Videos anzeigen
Plum Tree Mortgage – Intel® Xeon® Prozessor: Testimonial
Video-Testimonial des Gewinners des „Intel IT Tune Up“-Wettbewerbs über das Upgrade auf einen Server mit Intel® Xeon® Prozessor. (2:47)
Altix UV* Technology Overview
Dr. Eng Lim Goh, CTO, SGI, describes features of SGI Altix UV* compared to standard rack mounted and clustered solutions. (6:59)
Red Hat & Intel: Mission-Critical Computing
Pauline Nist (Intel) and Jim Totton (Red Hat) discuss their collaborative value to enterprise computing. (1:50)
Intel® Intelligent Power Node Manager
Intel® Intelligent Power Node Manager enables server power capping to increase rack density, and facilitate load balancing. (2:27)
Intel® RAID: The Perfect Fit
Video: importance of matching Intel® RAID embedded, integrated, and add-in products to the correct server. (3:54)
Intel® RAID: World Class Performance
Video: Intel® 6Gb/s RAID controllers features, benefits, and technical specs outlined. (2:56)
Ethernet Power Management Technology
DMA coalescing and built-in intelligence enables increased performance per watt and consolidation.
Cisco, Intel: Leading Server Innovation
Leading server innovation with the Intel® Xeon® processor E7 family for higher speed and capacity. (8:30)
Big Data: Intel & Oracle
Complementary big data solutions for enterprises
Trusted Computing Platform: Security to the Cloud
Create a cloud-based platform on Intel® processors with end-to-end software and hardware security.
Framestore Visual Effects Soar with Flexible IT
Framestore enhances film and integrated advertising on servers powered by Intel® Xeon® processors.
Automaker GM Speeds IT for Success
GM leaders discuss rapid data sharing to bring vehicles to market faster and increase sales.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing productivity.
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.