Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 30 Results
  • Items Per Page

Modernizing the Virtual Desktop at Apollo Group—Video

Apollo Group modernizes the virtual desktop through a virtualization initiative that is modernizing PCs for 20,000 employees.

Enterprise System Discovery Using Hardware-Based Two Factor Authentication

Implementing online authentication with Intel® Identity Protection Technology.

Preview | Download

Desktop Virtualization Planning Guide

Based on the experience of Intel’s IT department, this guide covers the four steps in planning a desktop virtualization implementation.

Preview | Download

VAMED: Remotely Controlled, Hugely Beneficial

VAMED sees dramatic improvement in remote client management and enhanced productivity thanks to Intel® vPro™ technology.

Preview | Download

Landmark Enhances 3-D Modeling for Oil Production Decision Making

Case Study: Landmark improves performance of 3-D earth modeling software for oil production decision making using Dell Precision* workstations.

Preview | Download

Intel® Processors Deliver the Right Touch for Windows 8* Tablets

Powerful, portable tablet PCs based on Intel® architecture and Microsoft Windows* 8 unleash a bold new experience.

Preview | Download

The Relevance of Desktop Computing in a Mobile Enterprise

Desktop computing in the enterprise is evolving beyond the desk with new enterprise use cases for mini PCs, all-in-one devices, and compute sticks.

Preview | Download

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Preview | Download

The Relevance of Desktop Computing in a Mobile Enterprise

Desktop computing in the enterprise is evolving beyond the desk with new enterprise use cases for mini PCs, all-in-one devices, and compute sticks.

Preview | Download

Intel® Hardware-Enhanced Protections for Resiliency

Intel’s hardware-enhanced protections for resiliency provide stronger, more proactive solutions to help compromised infrastructure recover quickly.

Preview | Download