Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 332 Results
  • Items Per Page

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Preview | Download

ITaaS Infographic: IT as a Service

ITaaS infographic: Find out how to make the shift to IT as a Service by realigning IT staff around services to bring speed and agility to users.

Best Practices for Implementing Apache Hadoop* Software

In five weeks, Intel IT implemented an Intel® Distribution for Apache Hadoop* software-based big data platform for business intelligence value.

Preview | Download

Applying Privacy Principles in a Rapidly Changing World

White Paper: Explores how to apply current privacy principles to provide effective protection and innovation in today’s complex data environment.

Preview | Download

Deploying Tablets with Intel® Architecture and Windows* 8 at Intel

Intel IT proof of concept presentation provides details on the deployment of Intel® Atom™ processor-based tablets with Windows* 8 at Intel.

Preview | Download

Inside IT: Security by Design - RSA 2014

Intel and ADP talk security by design—the idea of incorporating security measures throughout the entire development and manufacturing process.

Inside IT: Intel’s Software Defined Network

Intel IT gives some history behind the software defined network change in the data center and how it can add real value to the enterprise.

Balancing Enterprise Security and Employee Productivity

Chris Sellers, general manager of Intel IT Information Security, discusses its “protect to enable” security strategy.

Preview | Download

Intel IT Environment

A look at Intel IT’s vital statistics.

Preview | Download

Accelerating and Transforming Product Design

Intel IT’s Dan McKeon explains how IT helps accelerate and transform the design process by creating an always-on environment.

Preview | Download