Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 406 Results
  • Items Per Page

Testing Evolved Packet Core for NFV Mobile Carrier Networks

This paper describes testing an Evolved Packet Core (EPC) running on Intel® Xeon® processors for mobile carrier networks based on NFV.

Preview | Download

Enhancing Customer Service with Upgraded Intel®-Based PCs

Upgrading PCs with Intel® Core™ vPro™ processors helps Princess Cruises enhance customer engagement and cut costs.

Preview | Download

Tech Paper: Intel and Citrix Simplify Server-Hosted Workstations

Discover how Intel® Xeon® processor E3 v3 product family along with Citrix technologies deliver simplified server-hosted workstation solutions.

Preview | Download

Hosted Workstations Powered by Intel® Xeon® Processor E3 V4 Family

Discover how Intel® Xeon® processor E3-1200 v4-based hosted workstation solutions help evolving workforces stay innovative, agile, and competitive.

Preview | Download

Big Data Analytics: Intelligence Begins with Intel

Intel helps you learn about big data analytics, get help planning for it, and decide on the technology and solutions you need to make it happen.

Cloud Computing Solutions from Intel

Explore cloud computing solutions built on Intel®-based technology. Learn the fundamentals, plan your solution, and decide on the technology you need.

MSC Nastran* 2016 Alpha and Intel Reduce Simulation Runtimes

Solution Brief: See how Intel® Xeon Phi™ coprocessors offer a simple option to double the performance of complex simulations running on MSC Nastran*.

Preview | Download

Inside IT: Exploring a BYOD Stipend

How Intel IT developed a methodology to assess the viability of a bring-your-own stipend program and the results they found.

Inside IT: Data Center Strategy podcast

Intel IT’s Shesha Krishnapura discuss their DC strategy, decision to run the DC service like a factory, and the key metrics for measuring its success.

Intel IT’s New Information Security Strategy - Protect to Enable

Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.