Dashboard

Inhoud zoeken

Verfijnd zoeken
Gerelateerde inhoud

Actieve tags

  • 250 Resultaten
  • Items per pagina

Intel Trusted Execution Technology Evolves Integrity

White Paper: Intel® Trusted Execution Technology conducts periodic hypervisor integrity checks across a server cluster with positive results.

Preview | Download

McAfee ePO Deep Command* Data Sheet

Security administrators use McAfee ePolicy Orchestrator Deep Command* to deploy, manage, and update security on powered-off and disabled PCs.

Preview | Download

Parallels*, ODCA Trusted Computing Proof of Concept Solutions

Parallels partners with Intel to provide security monitoring and service catalogs to effectively deploy trusted virtual machines.

Enabling Business Growth and Productivity with Online Solutions

White Paper: Web-based solutions created by Intel help facilitate business growth and build links with customers, partners, and employees.

Preview | Download

Zakelijke desktops

Ontwikkeld voor bedrijven. Ontworpen voor beveiliging. Innovatie in zakelijke desktop computing.

Intel® Setup and Configuration Software: Release Notes

Describes new features and changes made in version 8.2 of the Intel® SCS to configure computers to use Intel® Active Management Technology.

Preview | Download

Intel® Setup and Configuration Software: System Discovery Utility

Guide: Describes how to use System Discovery utility to configure, use, and get data about Intel® Active Management Technology from systems.

Preview | Download

University of Santiago Hospital: Meeting Demand with IT Efficiency

University of Santiago Hospital Complex provides physicians with anywhere, anytime access with Intel® Core™ i5 processors for greater IT efficiency.

Preview | Download

Executive Insights Intel IT: Information Security should Protect and Enable

The world is no longer flat. At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role of enterprise security is to both protect and enable Intel’s business, including supporting new usage models like cloud computing, IT consumerization, and social computing.

Preview | Download

Intel IT Executive Insights: Moving to Client-aware Cloud

August 2011 edition discusses a private cloud that determines device attributes and user preferences and delivers accordingly.

Preview | Download