Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 722 Results
  • Items Per Page

Intel® SSD Data Center Family

Maximize performance delivery, reduce power use, and lower operating costs with Intel® SSD Data Center Family, designed for intense storage workloads.

TransWiseWay: Data Center Architecture for Internet of Vehicles

Beijing TransWiseWay Information Technology Co., Ltd. chooses Intel® architecture for its Internet of Vehicles.

Preview | Download

Telkomsigma: Intel® Architecture Enhances Data Center Services

Telkomsigma migrates to an Intel® architecture-based data center to enhance performance of the Always On project for over 300 companies in Indonesia.

Infographic: Enhance the Supply Chain with Intel® Architecture

See how Huawei Technologies Co., Ltd. doubles system performance and cuts operating costs by migrating from RISC to Intel® architecture.

Preview | Download

e-GEOS: Taking One Giant Leap with Intel

Intel® Xeon® processor E5-2680 v2 product family reduces data processing time up to 10x for Italian geospatial intelligence specialists e-GEOS.

Preview | Download

University of Coimbra: Understanding the Universe with Supercomputing

University of Coimbra bases its new high-performance computing system on the Intel® Xeon® processor E5 family to run simulations faster.

Preview | Download

Big Data Research: Ben-Gurion University Delivers Big Data

Case Study: Ben-Gurion University runs Intel® Distribution on the Intel® Xeon® processor family, allowing students to mine larger security datasets.

Preview | Download

Create Advanced Cloud Computing Platforms

Learn how Intel’s hybrid cloud discoveries and best practices help build an advanced cloud computing platform for highly parallel workloads.

Why Build a Private Cloud? Virtualization vs. Cloud Computing

A virtualized DC is not a private cloud. Why should IT build a private cloud, and how does he get there? This video provides the answers.

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.