Bienvenue dans l'Outil de recherche de contenu d'Intel. Utilisez les filtres situés à gauche pour explorer l'ensemble de la bibliothèque de contenus et trouver des informations. Vous pouvez appliquer plusieurs filtres pour affiner votre recherche.
Intel IT has transformed Intel’s enterprise resource planning (ERP) system into an agile, cost-effective tool that provides increased business value.
Learn how Intel IT successfully integrates acquisitions to help Intel achieve value and maintain productivity.
Intel IT enhanced the Intel® Setup and Configuration Software tool, creating an agile configuration & maintenance environment for our mobile systems.
Intel IT is trying to accommodate the workforce’s need for mobility. Hear about our new criteria to evaluate small devices as they come to market.
Intel CIO Kim Stevenson discusses the impact of Big Data on IT, leveraging predictive analytics, and how its creating new opportunities.
Intel® believes cyber information sharing should be viewed as a mechanism to achieve specific security objectives, instead of a goal in itself.
Intel CISO Malcolm Harkins shares his data protection, access, and security in the cloud.
Intel CISO discusses the ever-changing security landscape and Intel’s approach to stopping new and changing security threats.
Intel IT’s information security best practices include a radical redesign of its information security architecture to improve business agility.
Intel IT evaluated thin client security, and found that equivalent security controls can be implemented on PCs—without giving up functionality.
Smart phone security is an issue when employees use them in secure environments. Intel IT has enabled use and maintained security in secure areas.
Learn about thinking differently with Diane Bryant, Intel CIO strategic initiatives – Cloud, IT Consumerization, Security, and Business Intelligence.
Intel IT uses a pre-screening process to evaluate new devices for enterprise use, which also improves our ability to respond to employee demand.
To protect Intel and customers, Intel IT developed a program that enforces the security, privacy, and regulatory compliance of our external presence.
How can a company protect its IP in a restricted environment, yet continue to allow its employees to use their smart phones while working onsite?
Intel IT integrates our cloud computing efforts with our bring-your-own device initiatives, helping Intel obtain the maximum business value from both.
Dans IT@Intel, des experts travaillant chez Intel partagent leur expérience, des bonnes pratiques et des conseils.
Intel IT uses technology to drive workplace transformation and deliver business value to the enterprise.