لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 787 النتائج
  • العناصر في كل صفحة

Wiltshire Police: Policing from within the Community

Wiltshire Police are improving their presence in the community using wireless laptops and tablets with Intel® Core™ i5 processors.

SMIC: Shortening the Semiconductor Manufacturing Cycle

Semiconductor Manufacturing International Corporation (SMIC) cuts costs and manufacturing time with a high-performance computing solution.

مراجعة | تنزيل

TransWiseWay: Data Center Architecture for Internet of Vehicles

Beijing TransWiseWay Information Technology Co., Ltd. chooses Intel® architecture for its Internet of Vehicles.

مراجعة | تنزيل

Eolas: Keeping Hosting Competitive

Eolas offers a snappier online experience for Web visitors and cuts energy use in its data center using Intel® Xeon® processor E5 family.

مراجعة | تنزيل

e-GEOS: Taking One Giant Leap with Intel

Intel® Xeon® processor E5-2680 v2 product family reduces data processing time up to 10x for Italian geospatial intelligence specialists e-GEOS.

مراجعة | تنزيل

Big Data Research: Ben-Gurion University Delivers Big Data

Case Study: Ben-Gurion University runs Intel® Distribution on the Intel® Xeon® processor family, allowing students to mine larger security datasets.

مراجعة | تنزيل

Intel® Technology for Next Generation Sports Medicine

See how Intel® technology is helping change the next generation of sports medicine, with improved data and insights for doctors and trainers.

2 in 1 Devices Give Sales Professionals Freedom, Flexibility

5th generation Intel® Core™ vPro™ processor-based 2 in 1 devices give sales professionals the freedom, flexibility, and security they need.

Create Advanced Cloud Computing Platforms

Learn how Intel’s hybrid cloud discoveries and best practices help build an advanced cloud computing platform for highly parallel workloads.

Secure Cloud with High-Performing Intel Data Protection

Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.