Dashboard

Inhoud zoeken

Verfijnd zoeken
Gerelateerde inhoud

Actieve tags

  • 694 Resultaten
  • Items per pagina

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Preview | Download

Benchmark Chart: TPC Benchmark* E

Compares TPC Benchmark* E performance between the Intel® Xeon® processor E5-2600 product family and the Intel® Xeon® processor E5-2600 v2 platform.

Intel® Xeon® Processor E7 v2 Family Launch Keynote

Diane Bryant, Data Center Group, presents the Intel® Xeon® processor E7 v2 family launch keynote, discussing real time analytics for business.

SGCC Uses Integrated Intel® Architecture in Power Grid Simulation

Case Study: SGCC’s power grid simulation capacity, scalability, and performance improve with an integrated Intel® architecture-based solution.

Preview | Download

Data Center Management | Intel® Datacenter Software

Intel® software for data center management enables new IT capability, storage, and optimization, with open source solutions for next-gen applications.

Big Data Analytics: Intelligence Begins with Intel

Intel helps you learn about big data analytics, get help planning for it, and decide on the technology and solutions you need to make it happen.

Data Center Management | Intel® Datacenter Software

Intel® software for data center management enables new IT capability, storage, and optimization, with open source solutions for next-gen applications.

Inside IT: Intel’s Data Center Server Refresh Program

Intel IT’s Shesha Krishnapura discusses how a well-executed server refresh program can increase compute power and free space while maintaining costs.

Automotive Maker GM Speeds IT for Success

GM leaders cover the IT benefit of rapid data sharing in design, engineering, and manufacturing to bring vehicles to market faster and increase sales.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.