Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 1102 Results
  • Items Per Page

Optimize Performance of Virtualized SAP HANA* on VMware vSphere*

Solution Brief: Manufacturing company used the Intel® Xeon® processor E7 v2 family and VMware vSphere* to optimize virtualized SAP HANA* performance.

Preview | Download

Energy Efficient Servers with Intel® Xeon® Processors

Strengthen your IT solutions with energy efficient servers with Intel® Xeon® processors.

Improving Performance of Communication Infrastructure Systems

Platform Brief: Consolidate and run diverse workloads at a high throughput with built-in Intel® QuickAssist Technology acceleration. (v.1, Nov. 2013)

Preview | Download

Healthcare Breaches and Solutions

Protect against healthcare breaches and other cyber attacks with innovative security solutions that secure data across clients, networks, and servers.

Critical Security and the U.S. Cybersecurity Framework: Paper

White Paper: Critical security capabilities are defined in the U.S. Cybersecurity Framework, and Intel provides solutions. (v.3.0, March 2014)

Preview | Download

Dell and Intel Help Accelerate Results for Healthcare at ASU

Joining Dell and Intel, Arizona State University creates a Next Generation Cyber Capability to advance big data and accelerate results in healthcare.

Modernizing Servers and Software with Intel® Xeon® Processor E3

Planning Guide: Offers insight to small businesses on modernizing with Intel® Xeon® processor E3 v3 family-based servers and Windows Server* 2012 R2.

Preview | Download

Intel® Cloud Builders Secure and Efficient Cloud Infrastructure

Intel® Cloud Builders is a cross-industry initiative aimed at making it easier to build, enhance, and operate cloud infrastructures.

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.

Cloud Computing Security Planning Guide for IT Managers

Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.

Preview | Download