Dashboard

Inhoud zoeken

Verfijnd zoeken
Gerelateerde inhoud

Actieve tags

  • 257 Resultaten
  • Items per pagina

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Intel® Trusted Execution Technology Server Platform Matrix

Vendor matrix lists server platform components and operating environments that support Intel® Trusted Execution Technology.

Preview | Download

Zakelijke notebooks: Ultrabooks™ en 2 in 1 modellen

Ontdek de Ultrabook™ met een Intel® Core™ vPro™ processor voor zakelijke veelzijdigheid, gebouwd en ontwikkeld voor betere beveiliging.

Office Productivity for Business: Intel® Core™ vPro™ Processors

Software industry leaders describe the mobility and office productivity advantages for business of 5th generation Intel® Core™ vPro™ processors.

Intel IT Performance Report 2014-2015

IT Performance Report: Shares how IT delivers value to Intel through innovations in social, mobile, analytics, cloud, and the Internet of Things.

Preview | Download

Volgens Gartner zullen tablets de basis vormen voor BYOD

Gartner voorspelt dat er tegen 2018 twee keer zoveel persoonlijke devices dan zakelijke devices worden gebruikt op de werkvloer.

Zakelijke desktops

Ontwikkeld voor bedrijven. Ontworpen voor beveiliging. Innovatie in zakelijke desktop computing.

Data Center Consolidation Reduces Energy Consumption and Costs

Case Study: DHCS virtualizes on Intel® Xeon® processor E7-4800 product family, achieving 100-to-1 data center consolidation for reduced energy, TCO.

Preview | Download

Crimeware Protection PDF: 4th Gen Intel® Core™ vPro™ Processors

White Paper: Describes Intel® embedded technologies and McAfee software providing productivity, security, and manageability for enterprise business.

Preview | Download

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Preview | Download