لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 48 النتائج
  • العناصر في كل صفحة

Entertainment Marketing with Intel® Xeon® Processors

Caesars Entertainment uses Intel® technology to reach a new demographic group and process more than 3 million records per hour.

Entertainment marketing with Intel® Xeon® processors

Intel® Xeon® processor performance and memory capacity help Caesars Entertainment enhance the customer experience.

InterSystems Caché 2015.1 Soars on Intel® Xeon® Processors

InterSystems Caché 2015.1 triples the database accesses/sec on Epic EMR workloads with the Intel® Xeon® processor E7 v2 family

مراجعة | تنزيل

Entertainment Marketing with Intel® Xeon® Processors

Case Study: Caesars Entertainment uses Cloudera's Distribution including Apache Hadoop* and Intel® Xeon® processors to expand entertainment marketing.

مراجعة | تنزيل

Make Every Customer Count with Dynamics CRM* 2013: Solution Brief

Brief: Microsoft Dynamics CRM* 2013 and the Intel® Xeon® processor E7 v2 family help enterprise businesses navigate the customer-centric marketplace.

مراجعة | تنزيل

Client in the Cloud: An Intel IT Radio Show

Intel IT experts discuss how the client will continue to play a key role in Intel’s cloud computing strategy.

Intel Helps with PC Lifecycle Management

Computer upgrades and device upgrades can increase efficiency, security, and cost savings, while providing enriched customer service experiences.

Aligning Social Computing with Business Objectives

Our new social platform embodies the principles of crowdsourcing and knowledge sharing in business-friendly ways, improving employee collaboration

مراجعة | تنزيل

Intel IT Performance Report 2014-2015

IT Performance Report: Shares how IT delivers value to Intel through innovations in social, mobile, analytics, cloud, and the Internet of Things.

مراجعة | تنزيل

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

مراجعة | تنزيل