Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 978 Results
  • Items Per Page

Intel® Xeon® Processor E7 v2 Family In-Memory Analytics

In-memory analytics on Intel® Xeon® processor E7 v2 family-based servers overcomes the storage I/O bottleneck for real-time intelligence.

Intel® Xeon® Processor E7 v2 Family-based Servers Overview

Servers based on the Intel® Xeon® processor E7 v2 family provide superior performance, world-class reliability and uptime, and scalability.

Intel® Xeon® Processor E7 v2 Family and Intel® Run Sure Technology

See how Intel® Run Sure Technology and Intel® Xeon® processor E7 v2-based servers increase server uptime and data integrity while reducing costs.

Flexible, User-Managed Network Implementation

White Paper: NTT DATA uses Intel® ONP and OpenFlow* to simplify user-managed network equipment implementation for flexible software-based management.

Preview | Download

ERGO Italia Penetrates New Market Segment with Tablet Device

Case Study: Italy’s ERGO makes an Intel® Atom™ processor-based tablet for the transportation market, improving booking, communication, and security.

Preview | Download

Plan Your Enterprise Mobility Strategy

Plan your enterprise mobility strategy to help increase security and improve productivity on mobile devices.

Intel® Atom™ Processor

The Intel® Atom™ processor powers a variety of devices such as tablets, smartphones, netbooks, hybrids, and consumer electronics.

Atea Builds a New Private Cloud Hosting Service: Case Study

Atea's private cloud hosting service uses Intel® Xeon® processor E5 family to provide better responsiveness and performance and minimize server costs.

Preview | Download

Big Data Constructs Intelligent Healthcare

Solution Brief: Wonders Group helps Shanghai’s health bureau build an intelligent healthcare information system with Intel® Xeon® processor E5 family.

Preview | Download

Learn How Enterprise Mobility Management Increases Productivity

Learn how enterprise mobility management is transforming business productivity, yet simultaneously creating security challenges for IT.