Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 487 Results
  • Items Per Page

Scaling Apache* Web Server Performance on Intel®-Based Platforms

White Paper: Examines the scalable Apache* Web Server performance from the SO_REUSEPORT option in Linux* kernel 3.9 on large Intel®-based platforms.

Preview | Download

The Hotel of the Future

CitizenM hotels offer guests an innovative stay with technology from IReckon software solutions, powered by an Intel® Xeon® processor-based server.

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Preview | Download

Migrating to Modernization

World Wide Technology combines the best technologies from Microsoft, Cisco, and Intel for successful Windows Server* 2003 migrations—and more.

Preview | Download

Intel® SSD Data Center Family

Maximize performance delivery, reduce power use, and lower operating costs with Intel® SSD Data Center Family, designed for intense storage workloads.

Zhoushan SAT: Enhancing Tax Services with Tablets

Zhoushan SAT builds a mobile platform and uses Intel Atom processor-based tablets to make tax service more convenient.

Preview | Download

Intel® Ethernet Converged Network Adapter X520-QDA1 Product Brief

Brief: Low-profile Intel® Ethernet Converged Network Adapter X520-QDA1 offers flexibility, scalability in virtual and network appliance environments.

Preview | Download

Step Up Your Server Game with Upgrades from Intel and Dell

See results from a Principled Technologies test which shows Dell PowerEdge* R720 servers upgraded with Intel® Xeon® processors boost performance.

Preview | Download

Best Practices for Implementing Apache Hadoop* Software

In five weeks, Intel IT implemented an Intel® Distribution for Apache Hadoop* software-based big data platform for business intelligence value.

Preview | Download

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.