لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 236 النتائج
  • العناصر في كل صفحة

Powered by Intel® Cloud Technology

Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.

Intel® Cloud Builders Guide: M2Mi Software Defined Networking*

This Cloud Builders guide leverages Intel® Xeon® processors and M2Mi Software Defined Networking* to create a multi-hypervisor cloud environment.

مراجعة | تنزيل

Guide: Cloud Design, Deployment, and Enhanced Security

Guide: Utilizing Intel® Trusted Execution Technology, VMware vCenter*, and VMware vSphere* creates cloud server security.

مراجعة | تنزيل

Intel® Trusted Execution Technology

تعلّم كيف تقوم مجموعات حوسبية موثوق بها مزودة بتقنية مستندة إلى الأجهزة بتحسين أمان النظام الأساسي للخادم.

Create Trusted Compute Pools in the Cloud

White Paper: Learn how to build trusted compute pools using Ubuntu Server*, OpenStack*, and Intel® Xeon® processors, ensuring security in the cloud.

مراجعة | تنزيل

Healthcare Information Privacy and Security

Intel®-based technologies can support the need for compliance with the HIPAA privacy and security rule and other local regulations.

HP Servers* and Intel® TXT Activation Guide

How to activate Intel® TXT on Intel® Xeon® processor-based HP servers* for security against hypervisor and other pre-launch attacks.

مراجعة | تنزيل

Webinar: Talk to an Intel Expert about Built-in Client Security

Intel® IT Center webinar: Client security. Discover the built-in security capabilities of the Intel Core™ vPro™ processor.

Webinar: Mitigate Insider Threats with Intelligent Security

Intel® IT Center webinar: Mitigate Insider Threats with Open-Source Intelligent Security. Learn about our new approach to preempting insider threats.

Preventing Stealthy Threats

Intel® IT Center webinar—Preventing Stealthy Threats: A Proactive Approach from Intel and McAfee.

مراجعة | تنزيل