Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 70 Results
  • Items Per Page

BMW Revs Up its Technology with Ultrabook™ 2 in 1 Devices

BMW meets business and technology challenges in speed, power, and efficiency, providing Intel® Core™ vPro™ processor-based Ultrabook™ 2 in 1 devices.

Intel IT’s New Information Security Strategy - Protect to Enable

Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.

Intel Talk to an Expert Series: Converged Cloud with Gartner

Andy Butler from Gartner and Boyd Davis from Intel discussed servers, storage, and networking in the cloud in this virtual event.

First American Video: Reducing Server Sprawl

Video: The First American Corporation builds energy-efficient data center with Intel® Xeon® processors, lowering utility costs and server sprawl.

Lightdog Films: Movie Studio in a Box

Lightdog Films specializes in creating customized special visual effects using the Intel® Core™ i7 processors, making creation easier and faster.

CIO Strategic Initiatives

Learn about thinking differently with Diane Bryant, Intel CIO strategic initiatives – Cloud, IT Consumerization, Security, and Business Intelligence.

Embracing Social Computing: Can it Reduce Security Risks?

In this video, Intel CISO Malcolm Harkins gives his unique point of view on security and social computing, suggesting we embrace it to reduce risk.

Information Security: Is Compromise Inevitable?

Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.

Misperceiving Risk can be the Greatest Vulnerability We Face Today

Video: Malcolm Harkins, Intel CISO, talks about how misperceiving risk may be the greatest vulnerability we face today, whether at home or on the job.

Red Hat and Intel: Rock-Solid Mission-Critical Computing

Video: Red Hat Linux 6* running on Intel® Xeon® processor E7 family is an alternative to UNIX/RISC-based platforms for mission-critical computing.