إصدار المستعرض الذي تستخدمه لا يوصى به لهذا الموقع.يُرجى التفكير في الترقية إلى أحدث إصدار للمستعرض لديك بالنقر فوق أحد الروابط التالية.
عذراً، ملف PDF هذا متوفر فقط بتنسيق قابل للتنزيل
Case Study: Kingdom Stock and Intel: Meeting Stock Market NeedsCustomers and regulators place high demands and scrutiny on the systems that support stock transactions. Kingdom Stock Transaction System targets servers based on the Intel® Xeon® processor E7 family because they are very dependable and secure. They can also stand up to more general requirements for large-scale systems to deliver exemplary scalable performance while protecting budgets.ChallengeEnable a stock market solution that inspires confidence among customers and regulators for its reliability, availability, and serviceability (RAS) capabilities as well as for system security. Deliver scalable performance that takes advantage of system resources and can scale to support very large implementations.SolutionThe Intel Xeon processor E7 family helps Kingdom Stock Transaction System meet performance and energy-efficiency demands and the requirements of the highly regulated securities trading environment. Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) accelerates encryption operations, enhancing security without compromising performance.Customer BenefitProviding stock market customers with a solution that targets standards-based platforms helps them meet business needs under strict budget requirements. In addition to savings in terms of capital expense, the Intel Xeon processor E7 family’s energy efficiency helps save on ongoing operational costs.Read the full Kingdom Stock and Intel Case Study.
تنزيل ملف PDF
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Intel IT security specialists discuss deploying PCs with Intel® vPro™ technology.
A new approach to mitigating insider threats.
Intel® IT Center webinar: Can information security survive?
Hardware-based verification and authentication helps guard identities without slowing productivity.