Welkom bij de Intel content locator. Gebruik de filters aan de linkerzijde om Intel's volledige content bibliotheek te zien zodat u de informatie kunt vinden waar u naar zoekt. Gebruik meerdere filters om uw zoekopdracht te verfijnen.
White Paper: Intel® Trusted Execution Technology conducts periodic hypervisor integrity checks across a server cluster with positive results.
Cloud promises gains in agility, but a barrier to adoption is security. Intel® Trusted Execution Technology helps accelerate cloud adoption.
Inside IT Podcast: Das Kamhout and Ajay Chandramouly from Intel IT examine the enterprise cloud computing initiative at Intel.
Report: successful cloud opportunities, strategies, and best practices; insights from Intel’s IT group and others on enterprise clouds.
Intel partners discuss the Intel Customer Reference Program, a marketing collaboration promoting companies’ work using Intel marketing expertise.
In this video, Intel CISO Malcolm Harkins gives his unique point of view on security and social computing, suggesting we embrace it to reduce risk.
Aligning IT with business goals, Intel IT has developed and implemented a new approach to strategic planning.
Intel IT made a strategic decision three years ago to standardize our computing platform on PCs using Intel® vPro™ Technology.
Welcome to the home of Intel® IT Center events. Register for upcoming events or check out the archive.
IT@Intel teams deploy next-generation IT capabilities to lead the improvement of efficiency starting with of our own IT operations
IT@Intel looks at the best way to run the IT department like a business, enabling the entire organization to take advantage of the latest technologies
Intel IT implements an IT sustainability project, adding business value through strategy, data center innovation, and mobility.
White paper: Client-aware technologies take advantage of end-point device capabilities and apply to desktop virtualization and Web services.
Intel IT uses technology to drive workplace transformation and deliver business value to the enterprise.
Intel IT’s proof of concept demonstrates improved operations by facility technicians using Intel® architecture-based tablets.
Intel IT has a new information security investment model which allows IT managers to prioritize investments, based on risk mitigation against threats.
Intel IT is piloting three location-based applications—FriendFinder, WayFinder, and You Are Here mapping—that use location-based services.
Intel IT’s Roy Ubry talks about their security evaluation of Microsoft Windows* 8 on two Intel® architecture-based tablets for use in the enterprise.
Intel IT’s Malcolm Harkins and Stacy Purcell discuss Intel’s security business intelligence strategy and the increased capability offered.
Intel IT streamlined PC lifecycle management processes to boost productivity and IT efficiency, delivering increasing business value.