Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 551 Results
  • Items Per Page

Cloud Analytics Solutions Using Amazon Web Services* and Intel

See how the Amazon Web Services* platform, using Intel® Xeon® processors, helps ingest data, scale quicker, and deploy cloud analytics in real time.

Preview | Download

Telkomsigma: Intel® Architecture Enhances Data Center Services

Telkomsigma migrates to an Intel® architecture-based data center to enhance performance of the Always On project for over 300 companies in Indonesia.

Intel IT Center

Intel IT Center

Qing Niu Technology: Content Delivery Network Throughput

Solution Brief: Qing Niu Technology increases content delivery network throughput with Intel® Ethernet Converged Network Adapter X520-based solution.

Preview | Download

SGCC Uses Integrated Intel® Architecture in Power Grid Simulation

Case Study: SGCC’s power grid simulation capacity, scalability, and performance improve with an integrated Intel® architecture-based solution.

Preview | Download

Big Data Research: Ben-Gurion University Delivers Big Data

Case Study: Ben-Gurion University runs Intel® Distribution on the Intel® Xeon® processor family, allowing students to mine larger security datasets.

Preview | Download

Information and Communication Technologies in Education Lessons

Case Study: Intel and Charles University collaborate on Education21* initiative to evaluate use cases for information and communication technologies.

Preview | Download

Intel Anchors Identity Protection in the Chipset

By building security into the hardware foundation, Intel develops a new approach to identity protection.

Preview | Download

Intel® Hardware-Enhanced Protections for Resiliency

Intel’s hardware-enhanced protections for resiliency provide stronger, more proactive solutions to help compromised infrastructure recover quickly.

Preview | Download

Intel® Hardware-Enhanced Security Strengthens Anti-Malware Defense

Intel and McAfee help strengthen enterprise security for anti-malware defense by building security features into the hardware foundation.

Preview | Download