Find Content

Refine Results
Related Content

Selected Filters

  • 349 Results
  • Items Per Page

Intel® Graph Builder

Introducing Intel® Graph Builder software, an automation tool for preparing data for analysis so scientists can speed mining.

Big Data Meets High Performance Computing

Intel® Enterprise Edition for Lustre* software and Hadoop combine to bring big data analytics to high performance computing configurations.

Preview | Download

Intel® Service Assurance Administrator—Product Page

Intel® SAA monitoring, remediation, reporting, and management capabilities bring trust, performance, availability, and portability.

Realizing Value from Big Data with Graph Analytics

How businesses can use the versatility and scalability of big data with graph analytics to answer important questions through object relationships.

Hadoop* Server Clusters with 10 Gigabit Intel® Ethernet

Shows Hadoop* clusters provide big data analysis on commercial servers, which are most effective operating on a Intel® 10Gb Ethernet.

Big Data Hardware to Drive Big Business with Big Data

Discover how Intel and Cloudera are joining efforts to create an ideal big data hardware platform that delivers new insights faster.

Enterprise Hadoop* and NoSQL Big Data Management Solution

Get better insight for your big data with MarkLogic's enterprise-grade NoSQL database and Intel® Analytics Toolkit for Apache Hadoop* software.

IT Collaboration with Users: Building a User-Centered IT

Intel IT shares their methods for taking the pulse of a user community and using the feedback to shape IT strategies, activities, and investments.

Preview | Download

Embracing Social Media in the Workplace and Reduce Security Risks?

In this video, Intel CISO Malcolm Harkins gives his unique point of view on security and social computing, suggesting we embrace it to reduce risk.

Information Security Management: Is Compromise Inevitable?

Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.