Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 18103 Results
  • Items Per Page

What Will Personal Computers Be Like in 2020?

Intel’s Genevieve Bell discusses personal computers in 2020, from today’s mobile internet to future technology that will anticipate our needs.

Perceptual Computing Expands Platform Capabilities

Intel’s Rob Deline discusses the computing innovation spiral, including how perceptual computing will introduce voice, touch, and gesture commands.

Building a Private Cloud Intel IT Best Practices

Learn about the business case for developing a private cloud and the basics of building a cloud for the organization.

Boosting Smartphone Battery Life – IT Best Practices Technology Tip

In this IT@Intel Technology Tip, we offer several simple ways to get the most out of your smartphone’s battery life.

Preview | Download

Using Cloud with BYOD - Obtaining Maximum Business Value from Both

Intel IT integrates our cloud computing efforts with our bring-your-own device initiatives, helping Intel obtain the maximum business value from both.

Preview | Download

BYO PC Stipend: Investigating a Stipend-funded BYO PC Supply Model

Intel IT investigated whether a stipend-funded BYO program could optimize the annual IT PC refresh budgets, encourage BYO PC program participation.

Preview | Download

Granular Trust Model – Improving Enterprise Security

Intel IT’s new granular trust model provides dynamic security controls and user access to reduce enterprise risk while improving the user experience.

Preview | Download

Mobile Device Security: Intel IT Best Practices

To improve device security, we use a security model that calculates which devices can be trusted and moves users to the appropriate security level.

Preview | Download

Inside IT: Developing a Hybrid Cloud

Intel IT’s Das Kamhout discussed the choosing a hybrid approach, the challenges it presents, and how it will lead Intel to the future

Smart Phone Security

Smart phone security is an issue when employees use them in secure environments. Intel IT has enabled use and maintained security in secure areas.