White Paper: Intel IT, Intel Architecture Group, conduct tests and analysis to compare the user experience with different client cloud devices.
Intel's IT group, in partnership with the Intel Architecture Group , conducted testing and analysis to compare the user experience with different client cloud devices when accessing a range of applications hosted in the cloud.
Security issues in cloud computing at Intel, such as data security, application security, compliance, and privacy, discussed by an Intel IT expert.
Security issues in cloud computing at Intel—data security, application security, compliance, and privacy—are discussed by Intel IT expert Alan Ross. Intel’s best practices involve a mix of different types of controls based on level-of-trust zones.
Cornerstone Integration Inc. uses Intel® vPro™ to develop a healthcare communication solution, enabling organizations to focus on patient care.
Cornerstone Integration Inc. uses the Intel® vPro™ platform to develop a healthcare solution that improves workflow communication between ambulances and hospitals, cutting costs and enabling organizations to stay focused on patient care.
Intel CISO Malcolm Harkins shares his data protection, access, and security in the cloud.
Intel IT’s insight into accommodating the influx of mobile devices in the workplace we see now, and preparing for the devices we’ll see in the future.
Service and convenience expectations in mobile devices for the workplace are changing rapidly. Hear Intel IT’s insight into accommodating the influx of these mobile devices, and how to prepare for the devices in the future.Full View >
Learn how Intel IT solved security challenges from internet facing applications by securely virtualizing the underlying host architecture.
The purpose of this paper is to describe how Intel IT neutralized security risks that have allowed us to enable virtualization for the DMZ and SIZ thereby allowing Intel IT to expand the benefits of virtualization.
Intel® IT Center Webcast: Security Management Beyond the Operating System. Experts from McAfee and Intel discussed hardware-based IT security.
Intel® IT Center Webcast: Security Management Beyond the Operating System. Learn about innovations in hardware-based IT security from Ed Metcalf, director of Product Marketing at McAfee, and Terry Cutler, Enterprise Solution Architect from Intel.Full View >
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.Full View >
Solution Brief: Redapt Cloud* with Intel® Xeon® processors distributes workload for SHFL entertainment’s online games, reducing costs by 35 percent.
Solution Brief: SHFL entertainment turns to private cloud-based infrastructure from Redapt Cloud* featuring Intel® Xeon® processor E5-2650-based servers to distribute workload for online casino games and reduce total costs by 35 percent.