Intel Corporation

Displaying 1-40 of 100 results

  • White Papers // May 2014

    The Anatomy of the Internet of Things

    This article describes composition of the IOT. In order to manage risk you need to understand not only the applications, devices, or services under assessment, but also the other types of devices that will at some point certainly share parts of the underlying infrastructure of the IOT.

    Provided By Intel Corporation

  • White Papers // May 2014

    The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

    The proliferation of botnets reveal a worrisome trend in the spread and sophistication of computer viruses and worms in the Internet today. (A botnet is essentially a collection of compromised distributed computers or systems, known as bots because of their zombie-like nature, under the control of a bot-herder, by virtue...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Economic of Service Orientation

    The goal of service orientation is to attain a structural cost reduction in the delivery of IT services through reuse and standardization. However, the transition from a traditional system to one based on services requires breaking monolithic applications into standard services, often with Web front ends to facilitate reuse not...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Emergence of Virtual Service Oriented Grids

    In the ever changing world of development and IT, understanding the possibilities new paradigms present and their capacity to change the way business is done is imperative. In much the same way the Internet changed business forever, virtual service oriented grid computing has the potential to force change once again....

    Provided By Intel Corporation

  • White Papers // May 2014

    Recent Contributions to Cryptographic Hash Functions

    Hash functions are cryptography’s most widely used primitives, in that they are a fundamental building block used for a wide variety of constructions. The recent attacks of Joux, Wang, and others against the current generation of hash functions has stimulated a resurgence of research into these primitives as well as...

    Provided By Intel Corporation

  • White Papers // May 2014

    Requirements and Risk Management

    First and foremost one needs to learn what is meant by “requirements” in a security and engineering context, why requirements are useful for managing risk and what IOT requirements may look like. Risks will manifest themselves in relation to “requirements” or project goals: what do you need to get from...

    Provided By Intel Corporation

  • White Papers // May 2014

    Cloud Computing Basics

    In this article we go through some basic concepts with the purpose of providing context for the discussions in the chapters that follow. Here, we review briefly the concept of the cloud as defined by the U.S. National Institute of Standards and Technology, and the familiar terms of IaaS, PaaS,...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENCRYPTING THE INTERNET

    The evolution of the Internet has resulted in large quantities of information being exchanged by businesses or private individuals. The nature of this information is typically both public and private, and much of it is transmitted over the hyper text transfer protocol (HTTP) in an insecure manner. A small amount...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENHANCED DETECTION OF MALWARE

    A signifi cant development in the malware landscape in recent years is the ability of hackers to monetize compromised platforms by (1) gathering valuable information that can be sold, (2) using the platform’s resources to aid in an illicit or unwanted activity, or (3) holding information contained on the platform...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES

    Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authentication of a hardware device while preserving the privacy of the device owner. A hardware device with an EPID private key embedded can prove to a remote party that it is a valid device, certified by the hardware...

    Provided By Intel Corporation

  • White Papers // May 2014

    Introduction — The Internet of Things

    The Internet of Things (IOT) is about small machines in remote locations speaking to big centralized machines, often making decisions and taking action without people in the loop. It represents billions of devices speaking to each other, often managing outcomes in the physical environment. The IOT presents business opportunities in...

    Provided By Intel Corporation

  • White Papers // May 2014

    1 Platform Boot Integrity: Foundation for Trusted Compute Pools

    This article provides an introduction to the concept of roots of trust in a trusted computing platform, the measured boot process, and the attestation that are critical steps for ensuring boot integrity. It also provides an overview of Intel’s Trusted Executed Technology (TXT), an example of root of trust technology...

    Provided By Intel Corporation

  • White Papers // Apr 2013

    Lattice QCD on Intel Xeon Phi Coprocessors

    Lattice Quantum ChromoDynamics (LQCD) is currently the only known model independent, non perturbative computational method for calculations in the theory of the strong interactions, and is of importance in studies of nuclear and high energy physics. LQCD codes use large fractions of supercomputing cycles worldwide and are often amongst the...

    Provided By Intel Corporation

  • Webcasts // Apr 2013

    Webinar: PC Refresh in the Consumerized IT Environment

    Intel IT experts discuss the positive impact of PC refresh on security and manageability, user productivity, and TCO.

    Provided By Intel Corporation

  • Podcasts // Apr 2013

    Video: PC Refresh ROI

    PC Fleet Manager John Mahvi talks financial, security and manageability benefits behind a PC refresh cadence.

    Provided By Intel Corporation

  • Podcasts // Apr 2013

    Inside IT: Deploying Ultrabooksâ„¢ in the Enterprise

    Podcast: Intel IT’s John Mahvi talks about the advantages to IT and employees as Intel offers Ultrabook devices widely to its employees for the first time.

    Provided By Intel Corporation

  • White Papers // Mar 2013

    Practical Implications of Real Time Business Intelligence

    The primary purpose of business intelligence is to improve the quality of decisions while decreasing the time it takes to make them. Because focus is required on internal as well as external factors, it is critical to decrease data latency, improve report performance and decrease systems resource consumption. This paper...

    Provided By Intel Corporation

  • White Papers // Mar 2013

    Read The Latest Extreme Low Power, Windows Tablets Now Ready for the Enterprise

    The introduction of Apple’s iPad sent shock waves through the industry as it redefined end user’s expectations on design, battery life, simplicity, content and applications. Like PC purchases driven by end users and departments in the late 1980’s, iPads first entered the enterprise through executives, departments and end users. Apple...

    Provided By Intel Corporation

  • White Papers // Mar 2013

    A Taxonomy of Performance Assurance Methodologies and Its Application in High Performance Computer Architectures

    In this paper, the authors present a systematic approach to the complex problem of high confidence performance assurance of high performance architectures based on methods used over several generations of industrial microprocessors. A taxonomy is presented for performance assurance through three key stages of a product life cycle-high level performance,...

    Provided By Intel Corporation

  • White Papers // Jan 2013

    Deploying Business Ultrabookâ„¢ Devices in the Enterprise

    Recognizing the productivity and flexibility benefits that business Ultrabookâ„¢ devices deliver to mobile employees, Intel IT has established a fast-track strategy for offering business Ultrabook devices as an option in our regular corporate- supplied PC refresh cycle, making them available to all employees who currently use a mobile business PC....

    Provided By Intel Corporation

  • Product Specs // Jan 2013

    Consumerization of IT: Find the Right Device for the Job

    Consumerization is driving increased technology choice, and users are in the driver’s seat. IT organizations must find a way to provide the mobility and flexibility that users want with the security that business requires. As a strategic partner in the business, you can offer innovative technology choices to your employees...

    Provided By Intel Corporation

  • White Papers // Jan 2013

    Tablets in the Enterprise: Comparing the Total Cost of Ownership

    Windows 8 tablets provide a PC experience, which for many workers is essential to maintaining productivity. With Windows 8, users can run familiar desktop applications, maintaining productivity without having to find new ways to carry out their tasks. They can read, edit, and print their emails and Office documents- tasks...

    Provided By Intel Corporation

  • White Papers // Aug 2012

    3rd Generation Intel® Core™ vPro™ Processor Overview

    White Paper: Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® Core™ vPro™ processor overview.

    Provided By Intel Corporation

  • Podcasts // Aug 2012

    3rd Generation Intel® Coreâ„¢ vProâ„¢ Processor Overview Animation

    See how world-class performance meets built-in security for today's business PC in the 3rd generation Intel® Core™ vPro™ processor overview animation.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Remote Computer Repair with Intel® Core™ vPro™

    Remote computer repair is easier with Intel® Coreâ„¢ vPro™ technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast, even if OS is unresponsive.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Core vPro Usage Model animation: Easy Reimaging

    Learn how Intel Core vPro processors enables you to identify issues and, if necessary, reimage client PCs right from IT desk.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Easy Configuration with Intel® Core™ vPro™ Setup and Configuration Software 8.0

    Intel® Setup and Configuration software helps set up remote management capabilities quickly and easily.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Remote Power Management with Intel® Core™ vPro™

    Core™ vPro™ processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.

    Provided By Intel Corporation

  • Videos // Aug 2012

    3rd Gen Intel Core vPro Processor Crimeware Protection

    Learn how embedded crimeware protection features built-in to 3rd generation Intel Core vPro processors safeguard data and thwart malware attacks.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Windows 7* Security with Intel® Core™ vPro™ Processors

    Adapt to the speed of business and enhance Windows 7* security with the Intel® Core™ vPro™ processor.

    Provided By Intel Corporation

  • Videos // Aug 2012

    What is Intel® Core™ vPro™ Technology Animation

    What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Managed PKI Solution from Symantec Enabled by Intel® vPro™ Technology Video

    Symantec Product Manager Dave Corcoran discussing the value Intel vPro Technology's Identity Protection Technology (IPT) with public key infrastructure (PKI) capabilities bring to enterprise security. Symantec is offering a managed PKI solution that works with third generation Intel Core vPro processors, which has the same high level of security as...

    Provided By Intel Corporation

  • White Papers // Aug 2012

    Citrix Xenclient local virtual desktop technology for laptops

    Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users. Client virtualization solutions based on local virtual desktop technology, such as Citrix® XenClient™, enable organizations to extend the security benefits of desktop virtualization to mobile users by maintaining full security and control over...

    Provided By Intel Corporation

  • Podcasts // Aug 2012

    McAfee Deep Defender video

    An in-depth look of how McAfee Deep Defender and DeepSAFE works with the Intel hardware features to run beyond the operating system to detect covert stealth attacks in real-time.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Intel Identity Protection Technology Animation

    Animation highlighting the business value of Intel Identity Protection with Public Key Infrastructure (Intel IPT with PKI). You could see IPT with protected transaction display as well as One Time Password (OTP) for enterprise usage.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    3rd Generation Intel® Core™ Processor: Comparison Guide

    Comparison Guide: Find the best Intel® Core™ processor for your business, whether you need better security, higher performance or lower cost.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    Endpoint Protection, Multilayer Security from Intel and McAfee

    McAfee and Intel create a multilayer endpoint protection against malware, helping protect business PCs against intrusions from security breaches.

    Provided By Intel Corporation

  • Presentations // Aug 2012

    Intel® Desktop Processor Comparison Tool

    Use this desktop processor benefits and specifications comparison tool to find the right Intel® Core™ processor for your business needs.

    Provided By Intel Corporation

  • Tools & Templates // Aug 2012

    Intel® Laptop Processor Comparison Tool

    Use this laptop processor benefits and specifications comparison tool to find the right Intel® Core™ processor for your business needs.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    Evaluating Ultrabookâ„¢ Devices for the Enterprise

    Intel IT is proactively gathering data about Ultrabookâ„¢ devices and how they fit into the enterprise, in anticipation of a wave of new devices and form factors, and the associated expectations from employees who want to buy and use these devices at work.

    Provided By Intel Corporation

  • White Papers // Jan 2012

    What makes Jason Waxman Curious?

    First of all, who is this Jason Waxman and why do we care what makes him curious? It's a good question, but he's someone you definitely want to get to know, and what makes him curious will likely change the way you access the cloud over the next 5 years....

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Vendor Round Table: Cloud Security

    IT departments are paying close attention to developments in cloud computing technology. The cloud offers the promise of large potential savings in infrastructure costs and improved business agility, but all of that doesn't come without its concerns. Number one on that list is security, which frankly, has become a major...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Securing Virtualized Web Apps

    To realize benefits such as increased agility and efficiency, Intel IT is undertaking a major transition to an enterprise private cloud for our Office and Enterprise applications. To create the infrastructure for this cloud, they set a lofty goal of virtualizing 75 percent of their Office and Enterprise computing environment....

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Intel IT Executive Insights: Intel IT's Cloud Computing Strategy

    Cloud computing is only growing and innovating and at Intel, it's one of their top 3 IT objectives for 2012. The idea of a virtualized data center is changing the way Intel looks at its architecture: from the client technology employees use for business services to the data center infrastructure...

    Provided By Intel Corporation

  • White Papers // Sep 2011

    Cloud Security Insights for IT Strategic Planning

    Cloud security has become one of the biggest reasons many IT managers aren't willing to fully embrace the cloud, even with the large potential savings in infrastructure costs and improved flexibility. So with predictions pointing to an acceleration of enterprise cloud computing, how are IT professionals addressing the challenges, especially...

    Provided By Intel Corporation

  • White Papers // Jun 2010

    An Enterprise Private Cloud Architecture and Implementation Roadmap

    The private cloud is a shared multi-tenant environment built on a highly efficient, automated, and virtualized infrastructure. Few organizations understand the road to building a private cloud quite like Intel. Certainly knowing how Intel IT got there and how your organization can leverage that knowledge can be a critical component...

    Provided By Intel Corporation

  • White Papers // Sep 2011

    The Future of Cloud Computing Planning Guide

    If the question hasn't come up yet in your organization, it probably will. How do you build a private cloud for your organization? Cloud computing is one of the top three priorities this year for Intel IT. Their experience stands as an example for IT organizations looking at the business...

    Provided By Intel Corporation

  • Podcasts // Jan 2012

    Unified Networking Benefits with Intel Ethernet 10 Gigabit

    With the increasing demands on data center growth, many IT managers are moving to 10 Gigabit Ethernet connections. The benefits run from power costs, lower infrastructure costs to significantly increased network bandwidth. Watch this video, Unified Networking Benefits with Intel Ethernet 10 Gigabit, to get a better understanding of...

    Provided By Intel Corporation

  • White Papers // Jan 2010

    Implementing and Expanding a Virtualized Environment

    In 2005, Intel IT began planning, engineering, and implementing a virtualized business computing production environment as part of an overall data center strategy. They are currently accelerating virtualization adoption for general purpose applications, with a goal of virtualizing 70 to 80 percent of office and enterprise environments within two years....

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Improve Power Management with Intel Intelligent Power Node Manager

    When it comes to managing the data center, it's all about improving efficiency and optimizing the volume of data a growing organization can expect. A huge part of that management is both power and cooling the resources that keep the data center moving. Intel is making it all quite easy,...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Meeting Intense Performance Demands in Cloud Environments

    Organizations increasingly place demanding performance requirements on cloud networks. Many find that using an external cloud service provider lets them take advantage of established expertise to meet emerging technical requirements. Other customers building their own cloud environments likewise stand to gain from the innovation of a vendor experienced in building...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

    There is a good chance by now, your organization is either building its own cloud computing infrastructure or in the process of figuring out how to start to build one. Enterprise IT organizations sometimes struggle with facilitating the move to the cloud or certainly how to use the cloud to...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Telefonica Moves Into the Cloud

    Telefonica is one of the world's leading integrated operators in the telecommunication sector, providing communication, information and entertainment solutions, with a presence in Europe, Latin America and Asia. To make sure they stay on top in the marketplace they are launching cloud-based services for helping small and medium enterprises...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms: Data Center Energy Management with Dell, Intel, and JouleX

    The evolution of cloud computing has resulted in highly efficient and carefully optimized data centers with increased server density and capacity. It means there must be serious considerations made on energy consumption and other factors not as significant in the days of small data centers. To support this evolution, Intel...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Accelerating Innovation and Savings with R&D Cloud

    DuPont is one of the world's premier science companies. Its Central Research & Development (CR&D) IT leaders wanted to provide the company's scientists with the power and flexibility of cloud-enhanced computing for its scientific application portfolio. DuPont CR&D chose the Intel? Xeon? processor 7500 series as the foundation of its...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Expanding the Cloud

    Leading cloud computing provider Savvis needed to build an infrastructure for a new cloud computing offering while expanding existing environments to support continued customer growth. By selecting new servers based on the Intel® Xeon® processor 5600 series, Savvis is providing customers with improved application performance for all cloud offerings while...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Let's Talk IT: Intel and Forrester Talk Open Cloud

    Intel? IT Center Talk to an Expert series: Taking Advantage of Open Cloud Computing. James Staten, vice president and principal analyst at Forrester Research, and Jason Waxman, general manager, Cloud Infrastructure Group at Intel, discuss the benefits of openness in cloud computing and how this open approach can help you...

    Provided By Intel Corporation

  • Videos // Jun 2011

    McAfee Cloud Security Platform with New Security Capabilities from Intel

    Scott Chasin, McAfee CTO, Content & Cloud, talks about the availability of Intel? Expressway Cloud Access 360 and Intel? Expressway Service Gateway as modules in the McAfee Cloud Security Platform. The unified platform provides identity and access control and protects the content during transit to and from the cloud -...

    Provided By Intel Corporation

  • Videos // Jun 2011

    What is Intel Trusted Execution Technology?

    When it comes to data on-premise or in the cloud...security is the number one concern for IT. Who better to address the benefits of hardware root of trust than Intel's own Senior Security Engineer. James Greene discusses why hardware integrity checking is an important component of security in the cloud...

    Provided By Intel Corporation

  • Videos // Jun 2011

    Securing the Cloud with Intel Trusted Execution Technology Usage Models

    Intel's Sr. Security Engineer, James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security posture in your cloud environment that are enabled with a hardware root of trust and Intel Trusted Execution Technology. Watch this...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Anatomy of the Internet of Things

    This article describes composition of the IOT. In order to manage risk you need to understand not only the applications, devices, or services under assessment, but also the other types of devices that will at some point certainly share parts of the underlying infrastructure of the IOT.

    Provided By Intel Corporation

  • White Papers // May 2014

    The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

    The proliferation of botnets reveal a worrisome trend in the spread and sophistication of computer viruses and worms in the Internet today. (A botnet is essentially a collection of compromised distributed computers or systems, known as bots because of their zombie-like nature, under the control of a bot-herder, by virtue...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Economic of Service Orientation

    The goal of service orientation is to attain a structural cost reduction in the delivery of IT services through reuse and standardization. However, the transition from a traditional system to one based on services requires breaking monolithic applications into standard services, often with Web front ends to facilitate reuse not...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Emergence of Virtual Service Oriented Grids

    In the ever changing world of development and IT, understanding the possibilities new paradigms present and their capacity to change the way business is done is imperative. In much the same way the Internet changed business forever, virtual service oriented grid computing has the potential to force change once again....

    Provided By Intel Corporation

  • White Papers // Sep 2011

    Data Center Design for Cloud Computing: Technology for Tomorrow's Cloud

    A practical guide about preparing virtualized data centers to support cloud computing, including 10 Gigabit Ethernet networking, trusted server pools, scale-out storage, and power management.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    The New CIO Agenda: Intel Cloud Computing Insights 2011

    This report identifies successful cloud opportunities, strategies, and best practices, and include insights from Intel's own IT group and others that have deep experience with enterprise clouds, such as NYSE Technologies and consulting firm Bain & Company.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Intel Cloud Technologies: Powering Tomorrow's Cloud

    Intel cloud technologies can help you build a simpler, more secure and energy efficient cloud that's ready to scale on demand.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Open Data Center Alliance: Usage Model Requirements

    This video highlights the Open Data Center Alliance's initial publication delivery of eight usage model requirements for cloud as well as tracks the Alliance's growth since its inception in October 2010.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Security in Cloud Computing

    Learn about how leading cloud solution providers are taking advantage of the advanced security technologies built into the latest generation of Intel® Xeon® processor-based servers to meet these challenges.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Intel Trusted Compute Pools Video

    Intel takes you on a light-hearted journey through a serious topic: security and compliance in the cloud.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Gain a Business Advantage with Scale-Out Storage

    Learn why Intel® architecture-based storage solutions provide energy-efficient performance, data protection, and scalability for tomorrow's data centers.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Data Center Efficiency and Optimization

    Learn about strategies to optimize compute performance in data center facing power and cooling constraints to improve data center efficiency.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Intelligent Power Management Improves Rack Density

    Intel® Intelligent Power Node Manager is a smart way to optimize and manage power and cooling resources in the data center.

    Provided By Intel Corporation

  • Resource Center // Mar 2011

    Cloud Computing and Security...thoughts from Intel CISO Malcolm Harkins

    With the fast pace of the changing technology landscape and new usage models such as Cloud Computing, IT Consumerization, and social computing security remains one of the highest priorities for IT. Ilene Aginsky (IT@Intel) decided to sit down with Intel's CISO, Malcolm Harkins and ask his perspective on these various...

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Intel IT: Cloud Storage for Efficiency and Capacity Management

    Moving to a highly-virtualized, shared SAN environment has forced us to develop new storage metrics and management approaches to boost efficiency and reduce costs.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Policy-Based Power Management with Dell & VMware

    This reference architecture is intended for those who seek power management solutions to achieve better power efficiency within new or existing datacenters, to understand policy based power management solutions implements with the use of hardware and software components.

    Provided By Intel Corporation

  • White Papers // Dec 2011

    Intel brings new experiences to life via Cloud Computing

    It seems that today's cloud technology is constantly pushing the envelope of what is or isn't possible in computing. Something as simple as putting a few letters into a search engine and getting thousands of results in seconds is normal today, but just a few years ago, the notion was...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Inside Intel IT on Cloud Computing and Security

    Certainly no one expects that a company like Intel doesn't have issues when it comes to computing in the cloud, they do by the way. The real question is, how do they handle them, what are Intel IT's best practices? There is no real secret, but just like your organization...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Inside Intel IT on Technology for Tomorrow's Cloud

    If cloud is at the top of your agenda, you're probably looking at it as a way to improve server utilization, build efficiencies in the data center, provide elastic scaling, support self-service, and provision applications faster - as well as respond better to the business. The virtualized data center is...

    Provided By Intel Corporation

  • White Papers // Dec 2011

    IT Managers Speak Out about Cloud Security

    Imagine being able to tap into the knowledge of 200 IT managers all in some stage of cloud development. Imagine being able to get a better understanding of how they are handling the biggest questions of cloud deployment, security. Imagine if their experiences could be boiled down to 5 common...

    Provided By Intel Corporation