Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 131 Results
  • Items Per Page

Mobile Computing Collaboration on 4th Gen Intel® Core™ Processor

Business moves at the speed of life with mobile computing collaboration, with all-in-one portability, multitasking performance, security, and more.

Desktop Virtualization Planning Guide

Based on the experience of Intel’s IT department, this guide covers the four steps in planning a desktop virtualization implementation.

Preview | Download

BMW Revs Up its Technology with Ultrabook™ 2 in 1 Devices

BMW meets business and technology challenges in speed, power, and efficiency, providing Intel® Core™ vPro™ processor-based Ultrabook™ 2 in 1 devices.

Business Investment Strategy for Device Refresh

Build a business case for and plan a device upgrade and refresh strategy based on decisions that help manage costs and maximize user productivity.

Preview | Download

Mobile Science Apps Enhance Lab Productivity

Ceiba’s touch-based mobile science apps use Ultrabooks™ and Windows* 8 Professional to enhance pharmaceutical productivity and IT compatibility.

Saving Work and Money with Intel® Architecture-Based Tablet PCs

Case Study: With Intel® architecture-based tablet PCs and touch-enabled applications, Sinopec improves enterprise productivity and work efficiency.

Preview | Download

Take Control with the 2nd Gen Intel® Core™ vPro™ Processor: Study

Case Study: UK college upgrades to 2nd generation Intel® Core™ vPro™ processor-based PCs with remote management and streamlines IT service.

Preview | Download

Take Control with the 2nd Gen Intel® Core™ vPro™ Processor: Study

Case Study: UK college upgrades to 2nd generation Intel® Core™ vPro™ processor-based PCs with remote management and streamlines IT service.

Preview | Download

Intel in the Grid

Discover how Intel® technology and products are driving transformation in the energy industry.

Security Preparation: BIOS Based Root Kit Attack

McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.