Intel IT discuss developing the necessary skills and finding the right platform to deal with Big Data for Business Intelligence.
Intel IT discusses their data center strategy and the complexity of providing service to a wide array of needs in multiple geographies.
Hear Intel CIO Kim Stevenson share her IT organization’s priorities, how she is addressing changing business needs, and her view on leadership.
Intel IT is trying to accommodate the workforce’s need for mobility. Hear about our new criteria to evaluate small devices as they come to market.
Learn how Intel IT developed an open-source software and best practices to mitigate insider threats
Learn how Intel IT developed an open-source software and best practices to mitigate insider threatsFull View >
Meet the new Intel CIO Kim Stevenson. Find out what attracted her to an IT career, her top IT priorities and how she plans to keep Intel successful.
Meet the new Intel CIO Kim Stevenson. Find out what first attracted her to an IT career, the major trends she sees currently topping every CIOs priority list, and how she plans to keep Intel successful in the marketplaceFull View >
HyTrust builds a cloud computing solution that ensures security from the lowest layers of the stack utilizing Trusted Compute Pools with VMware.
HyTrust, VMware, and Intel discuss how to enhance security from the bottom of the stack up utilizing Trusted Compute Pools, Intel® Trusted Execution Technology and the HyTrust Appliance*.Full View >
New IT Challenges -- Trends in attackers, IT landscapes, changes in regulatory environment. Intel provides solutions with Intel® TXT and Intel® VT.
Jim Greene, Intel Senior Security Engineer, explores the information security challenges facing IT managers grappling with an evolving landscape where IT is abstracted across virtualization and in the cloud. Intel® TXT and Intel® VT are solutions.Full View >
Video highlighting key findings of cloud infrastructure research, focusing on networking and storage from a survey of IT managers.
Intel CISO discusses the ever-changing security landscape and Intel’s approach to stopping new and changing security threats.