Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 552 Results
  • Items Per Page

Cloud Analytics Solutions Using Amazon Web Services* and Intel

See how the Amazon Web Services* platform, using Intel® Xeon® processors, helps ingest data, scale quicker, and deploy cloud analytics in real time.

Preview | Download

Telkomsigma: Intel® Architecture Enhances Data Center Services

Telkomsigma migrates to an Intel® architecture-based data center to enhance performance of the Always On project for over 300 companies in Indonesia.

Intel IT Center

Intel IT Center

Mobile Management with Windows* 8.1 How-To Guide

Windows Server 2012 R2* and Windows* 8.1 how-to helps configure new productivity and manageability features for mobile Windows devices.

Preview | Download

Qing Niu Technology: Content Delivery Network Throughput

Solution Brief: Qing Niu Technology increases content delivery network throughput with Intel® Ethernet Converged Network Adapter X520-based solution.

Preview | Download

SGCC Uses Integrated Intel® Architecture in Power Grid Simulation

Case Study: SGCC’s power grid simulation capacity, scalability, and performance improve with an integrated Intel® architecture-based solution.

Preview | Download

Exploring DCIM for Intel’s Data Center

White Paper: Proof of concept best-known methods for exploring potential benefits of data center infrastructure management (DCIM) solutions.

Preview | Download

Big Data Research: Ben-Gurion University Delivers Big Data

Case Study: Ben-Gurion University runs Intel® Distribution on the Intel® Xeon® processor family, allowing students to mine larger security datasets.

Preview | Download

Thesys Technologies Creates a Microsecond Matching Engine

Case Study: Thesys delivers cost-effective matching engine platform with microsecond fast responses on Intel® Xeon® processor E5 family-based servers.

Preview | Download

Intel Anchors Identity Protection in the Chipset

By building security into the hardware foundation, Intel develops a new approach to identity protection.

Preview | Download