Dashboard

Inhoud zoeken

Verfijnd zoeken
Gerelateerde inhoud

Actieve tags

  • 569 Resultaten
  • Items per pagina

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Preview | Download

Benchmark Chart: TPC Benchmark* E

Compares TPC Benchmark* E performance between the Intel® Xeon® processor E5-2600 product family and the Intel® Xeon® processor E5-2600 v2 platform.

SGCC Uses Integrated Intel® Architecture in Power Grid Simulation

Case Study: SGCC’s power grid simulation capacity, scalability, and performance improve with an integrated Intel® architecture-based solution.

Preview | Download

Data Center Management | Intel® Datacenter Software

Intel® software for data center management enables new IT capability, storage, and optimization, with open source solutions for next-gen applications.

Big Data Analytics: Intelligence Begins with Intel

Intel helps you learn about big data analytics, get help planning for it, and decide on the technology and solutions you need to make it happen.

Data Center Management | Intel® Datacenter Software

Intel® software for data center management enables new IT capability, storage, and optimization, with open source solutions for next-gen applications.

Intel® Distribution for Apache Hadoop & Oracle Big Data Connectors

Advance Enterprise Insight with the Intel® Distribution for Apache Hadoop* and Oracle Big Data Connectors*

Preview | Download

Intel® Hadoop* Certified for Oracle Big Data Connectors*

Advance Enterprise Insight with the Intel® Distribution for Apache Hadoop* and Oracle Big Data Connectors*

Automotive Maker GM Speeds IT for Success

GM leaders cover the IT benefit of rapid data sharing in design, engineering, and manufacturing to bring vehicles to market faster and increase sales.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.