Infographic: eHarmony builds a robust cloud environment with Cloudera* software and Intel® Xeon® processors to make more, happier matches.
Infographic: eHarmony builds a robust cloud environment with Cloudera* software and Intel® Xeon® processors to make more, happier matches and gain a competitive edge for the future.
Explore Intel Fellow Mark Bohr's presentation from the Intel Developer Forum 2014, which covers some of the benefits of the new 14 nm transistor process, like improved area scaling, and microarchitecture optimizations for active power reduction.
Validate when a user logs in with Intel® Identity Protection Technology with public key infrastructure, a second factor authentication for business.
Verify Internet transactions using Intel® Identity Protection Technology with Public Key Infrastructure certificates, authenticating the user and server to each other to encrypt and digitally sign documents.
Intel's Eric Hooper goes under the hood of Intel® Rack Scale Architecture to show how it can restructure data center and cloud infrastructure.
Intel Cloud Service Provider Optimization Director Eric Hooper takes you under the hood of Intel® Rack Scale Architecture, showing how it disaggregates compute storage and networking resources to restructure cloud and data center infrastructure.Full View >
Follow the stages of scalability from modular pod manager to configurable network fabric using Intel® Rack Scale Architecture.
Follow the challenging stages of increasing utilization, simplifying interoperability, and decreasing capital costs with Intel® Rack Scale Architecture using hardware resource pools, open hardware APIs and software, and modular multi-node systems.Full View >
A systems engineer from the Intel Rack-Scale Architecture group shares a brief overview and demonstration of the features and benefits of Intel® RSA.
Brief: HyTrust and Intel developed an end-to-end security solution to address the risks associated with server virtualization and cloud technology.
Brief: HyTrust and Intel developed an end-to-end security solution to address the challenges of maintaining a security system for server virtualization and cloud technology and to help accelerate adoption.