Case Study: China Mobile Shanghai boosts billing efficiency, capacity, and performance with Intel® Xeon® processor E7-based cloud computing platform.
Case Study: China Mobile Shanghai improves billing efficiency, capacity, and overall system performance and reliability while reducing operating costs by migrating to an Intel® Xeon® processor E7-based cloud computing platform.
Help for government IT leaders navigating through the complexity of adopting cloud computing platforms.
To help government IT leaders navigate through the complexity of adopting cloud computing platforms Intel and the Innovation Value Institute (IVI) developed a Cloud Technology–Capability Maturity Framework (CT–CMF).
White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.
White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and protect your business from threats like malware and data theft from the moment platforms are powered on.
This video includes highlights from a conversation with Boyd Davis, Intel General Manager, Datacenter Software Division.
Boyd Davis, vice president and general manager of Intel’s Datacenter Software Division, discusses Intel’s vision for the data center and its unique approach to software.Full View >
Learn how Intel’s hybrid cloud discoveries and best practices help build an advanced cloud computing platform for highly parallel workloads.
Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.Full View >
Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.
The cloud computing security guide PDF provides practical steps to help IT managers plan cloud computing security, with recommendations for strengthening endpoint, platform, and data center infrastructure protections in cloud implementations.
A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models: cryptography for data protection, identity and access management, service gateways, trusted compute pools.