Intel® Xeon™ Processor, Intel® E7500/E7501 Chipset Compatible Platform: Design Guide Addendum
VideosWeitere Videos anzeigen
COSMOS: Exploring the Origins of the Universe
Video: The COSMOS Consortium at the University of Cambridge studies how the world began using a supercomputer powered by the... (10:39)
Intel® Intelligent Power Node Manager
Intel® Intelligent Power Node Manager enables server power capping to increase rack density, and facilitate load balancing. (2:27)
Plum Tree Mortgage – Intel® Xeon® Prozessor: Testimonial
Video-Testimonial des Gewinners des „Intel IT Tune Up“-Wettbewerbs über das Upgrade auf einen Server mit Intel® Xeon® Prozessor. (2:47)
Altix UV* Technology Overview
Dr. Eng Lim Goh, CTO, SGI, describes features of SGI Altix UV* compared to standard rack mounted and clustered solutions. (6:59)
Red Hat & Intel: Mission-Critical Computing
Pauline Nist (Intel) and Jim Totton (Red Hat) discuss their collaborative value to enterprise computing. (1:50)
Intel® RAID: The Perfect Fit
Video: importance of matching Intel® RAID embedded, integrated, and add-in products to the correct server. (3:54)
Intel® RAID: World Class Performance
Video: Intel® 6Gb/s RAID controllers features, benefits, and technical specs outlined. (2:56)
Ethernet Power Management Technology
DMA coalescing and built-in intelligence enables increased performance per watt and consolidation.
Cisco, Intel: Leading Server Innovation
Leading server innovation with the Intel® Xeon® processor E7 family for higher speed and capacity. (8:30)
Trusted Computing Platform: Security to the Cloud
Create a cloud-based platform on Intel® processors with end-to-end software and hardware security.
Framestore Visual Effects Soar with Flexible IT
Framestore enhances film and integrated advertising on servers powered by Intel® Xeon® processors.
UOL Utility Computing with Intel® TXT
UOL discusses the security and migration benefits of Intel® Trusted Execution Technology.
Big Data: Intel & Oracle
Complementary big data solutions for enterprises
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.