Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 12285 Results
  • Items Per Page

Intel Talk to an Expert Webinar: The Impact of Cloud Growth on IT

Intel and Cisco experts discuss findings from a global survey of more than 4,200 IT leaders regarding cloud implementations.

Configuring an In-Memory BI Platform for Extreme Performance

Intel IT conducted tests to find the optimal platform for a cost-effective, high-performance in-memory business intelligence (BI) solution.

Preview | Download

Building a Private Cloud Intel IT Best Practices

Learn about the business case for developing a private cloud and the basics of building a cloud for the organization.

Adapting to mobility in the enterprise Intel IT Best Practices

How to enable the modern workforce; the challenges and opportunities of creating a truly mobile enterprise in the new world of devices.

Inside IT: Strategic Planning Intel IT Best Practices

It is critical for IT to engage in strategic planning with the company’s business groups for alignment to maximize IT business value.

Using Cloud with BYOD - Obtaining Maximum Business Value from Both

Intel IT integrates our cloud computing efforts with our bring-your-own device initiatives, helping Intel obtain the maximum business value from both.

Preview | Download

BYO PC Stipend: Investigating a Stipend-funded BYO PC Supply Model

Intel IT investigated whether a stipend-funded BYO program could optimize the annual IT PC refresh budgets, encourage BYO PC program participation.

Preview | Download

Private Cloud PaaS – Accelerating Application Deployment

Intel IT’s private cloud PaaS accelerates custom application deployment and promotes cloud-aware application design.

Preview | Download

Granular Trust Model – Improving Enterprise Security

Intel IT’s new granular trust model provides dynamic security controls and user access to reduce enterprise risk while improving the user experience.

Preview | Download

Mobile Device Security: Intel IT Best Practices

To improve device security, we use a security model that calculates which devices can be trusted and moves users to the appropriate security level.

Preview | Download