Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 111 Results
  • Items Per Page

Mine Gold from Sentiment Analysis

Sentiment analysis on Big Data can be costly, but now that cost can be lowered from thousands to hundreds of dollars per terabyte.

Intel IT’s New Information Security Strategy - Protect to Enable

Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.

Mobile Science Apps Enhance Lab Productivity

Ceiba’s touch-based mobile science apps use Ultrabooks™ and Windows* 8 Professional to enhance pharmaceutical productivity and IT compatibility.

Apache Hadoop* Webinar: Guide to Building Cost-effective 10GBASE-T

Arista’s Mark Berly and Intel’s Matt Eszenyi discuss Apache Hadoop* advantages, emphasizing compute-network-storage balance in big data deployments.

Cloud Podcast: Enomaly on Cloud Service and Security

Enomaly Co-Founder and CTO Reuven Cohen talks about Enomaly’s Elastic Computing Platform*, its service provider value, economic model, and security.

Intel in the Grid

Discover how Intel® technology and products are driving transformation in the energy industry.

Security Preparation: BIOS Based Root Kit Attack

McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.

McAfee ePO Deep Command*—How it Works Animation

McAfee ePO Deep Command* animation shows security management beyond the operating system.

Remote Power Management with Intel® Core™ vPro™ Technology

See how IT remotely manages and schedules PC power using Intel® Core™ vPro™ technology for greener energy usage, less costs, and improved efficiency.

McAfee Deep Defender*: Hidden Malware Protection

An in-depth look at how McAfee Deep Defender*, DeepSAFE* work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.