Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 436 Results
  • Items Per Page

Optimize Performance of Virtualized SAP HANA* on VMware vSphere*

Solution Brief: Manufacturing company used the Intel® Xeon® processor E7 v2 family and VMware vSphere* to optimize virtualized SAP HANA* performance.

Preview | Download

Intel® Cloud Builders Secure and Efficient Cloud Infrastructure

Intel® Cloud Builders is a cross-industry initiative aimed at making it easier to build, enhance, and operate cloud infrastructures.

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.

Cloud Computing Security Planning Guide for IT Managers

Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.

Preview | Download

10 Things to Know about Cloud: Cloud Computing Models

Provides a concise look at the core elements of a cloud strategy that meets both IT and business requirements.

Preview | Download

Security Technology Real-World Guide from Intel

A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models.

Preview | Download

Cloud Security Survey from Intel

Cloud security survey from Intel captures key findings from 800 IT managers in the U.S., the UK, China, and Germany on security concerns.

Preview | Download

Cloud Computing Cost: Saving with a Hybrid Model

Our hybrid model for reducing cloud computing cost should bring high levels of agility, scalability, and efficiency as well as increased savings.

Preview | Download

Private Cloud Security: Virtualizing Highly Secure Cloud Servers

Intel IT created secure cloud servers, with highly sensitive data and applications, using a High Trust Zone (HTZ) architecture.

Preview | Download

Federal Employee Mobility and Security—It Can Be Done

White Paper: Get federal mobility and security with personally owned devices and info on evaluating solutions, ensuring connectivity, and deployment.

Preview | Download