Dashboard

Inhoud zoeken

Verfijnd zoeken
Gerelateerde inhoud

Actieve tags

  • 110 Resultaten
  • Items per pagina

Adopting Software-Defined Networking in the Enterprise

Software-defined networking (SDN) enables on-demand provisioning of networks and network services.

Preview | Download

Cloud Insights

Intel IT’s cloud journey has uncovered new pathways and opportunities, leading to self-service, software-defined infrastructure.

Preview | Download

Using Intel® vPro™ Technology with a Centralized IT Support Portal

White Paper: Intel’s web-based IT support portal integrates data and tools like Intel® vPro™ technology to boost agent productivity and lower costs.

Preview | Download

Exploring DCIM for Intel’s Data Center

White Paper: Proof of concept best-known methods for exploring potential benefits of data center infrastructure management (DCIM) solutions.

Preview | Download

Evolving the Mobile Employee Hotspot for IT Consumerization

The mobile Employee Hotspot service that Intel IT enabled in 2010 has increased security, scalability, usability, and productivity—and lowered costs.

Preview | Download

Starting with the End in Mind—IT Leadership with Kim Stevenson

Intel CIO Kim Stevenson discusses the three dimensions of IT leadership and the importance of innovation in today's changing business landscape.

Elitegroup: Paving the Way for an Energy-Smart Business

Elitegroup Computer Systems, Intel, and Tatung pioneer an intelligent gateway solution that promotes energy conservation among businesses in Taiwan.

Preview | Download

Intel IT Performance Report 2014-2015

IT Performance Report: Shares how IT delivers value to Intel through innovations in social, mobile, analytics, cloud, and the Internet of Things.

Preview | Download

Big data best practices infographic

Ontdek de vijf stappen naar succesvol big data beleid met deze best practices.

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Preview | Download