Please Configure the Header on the Homepage /content/www/xr/en/homepage/_jcr_content/header.html

Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 205 Results
  • Items Per Page

Telefonica Video: Realizing Virtualization

Telefonica markets new virtual hosting service first with the Intel® Xeon® processor 7100 series.

The Cloud Improves Performance of Sugar Refiner

Florida Crystals has its entire data center on the cloud from Virtustream running on Intel® Xeon® processors with Intel® Trusted Execution Technology

3rd Generation Intel® Core™ vPro™ Processor Overview Animation

See how world-class performance meets built-in security for today’s business PC in the 3rd generation Intel® Core™ vPro™ processor overview animation.

Taking Control of Security: Key Log and Pin Pad Screen Scraping

Manage vulnerability with Intel® vPro™ technology built-in security features and McAfee software for multilayered protection against stealth attacks.

NetApp* Unified Networking & Storage Reference Architecture

Video: NetApp discusses how to move to a unified networking & storage environment with Intel Ethernet 10g, lowering costs with increased bandwidth.

How to Build a Cloud Animation

Video animation: Intel Cloud Builders Reference Architecture: technical tips, live configuration samples to build a cloud configuration with VMware.

Using Data Center Instrumentation to Improve Energy Efficiency

Learn how instrumentation delivered on Intel® Xeon® processors can improve data center efficiency.

Experience a Better Cloud with Intelligent Clients

Video shows how to optimize cloud security, management, and user experience by leveraging each intelligent client device's power and capabilities.

Intel® Cloud Builders: Build and Optimize Cloud Infrastructure

Video: highlights Intel® Cloud Builders, a program designed to ease the deployment of cloud infrastructure.

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.