Intel Corporation

Displaying 1-40 of 101 results

  • White Papers // Jun 2014

    Single-Cycle Collective Communication Over a Shared Network Fabric

    In the multicore era, on-chip network latency and throughput have a direct impact on system performance. A highly important class of communication flows traversing the network is collective, i.e., one-to-many and many-to-one. Scalable coherence protocols often leverage imprecise tracking to lower the overhead of directory storage, in turn leading to...

    Provided By Intel Corporation

  • White Papers // May 2014

    Requirements and Risk Management

    First and foremost one needs to learn what is meant by “requirements” in a security and engineering context, why requirements are useful for managing risk and what IOT requirements may look like. Risks will manifest themselves in relation to “requirements” or project goals: what do you need to get from...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Anatomy of the Internet of Things

    This article describes composition of the IOT. In order to manage risk you need to understand not only the applications, devices, or services under assessment, but also the other types of devices that will at some point certainly share parts of the underlying infrastructure of the IOT.

    Provided By Intel Corporation

  • White Papers // May 2014

    The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

    The proliferation of botnets reveal a worrisome trend in the spread and sophistication of computer viruses and worms in the Internet today. (A botnet is essentially a collection of compromised distributed computers or systems, known as bots because of their zombie-like nature, under the control of a bot-herder, by virtue...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Economic of Service Orientation

    The goal of service orientation is to attain a structural cost reduction in the delivery of IT services through reuse and standardization. However, the transition from a traditional system to one based on services requires breaking monolithic applications into standard services, often with Web front ends to facilitate reuse not...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Emergence of Virtual Service Oriented Grids

    In the ever changing world of development and IT, understanding the possibilities new paradigms present and their capacity to change the way business is done is imperative. In much the same way the Internet changed business forever, virtual service oriented grid computing has the potential to force change once again....

    Provided By Intel Corporation

  • White Papers // May 2014

    Recent Contributions to Cryptographic Hash Functions

    Hash functions are cryptography’s most widely used primitives, in that they are a fundamental building block used for a wide variety of constructions. The recent attacks of Joux, Wang, and others against the current generation of hash functions has stimulated a resurgence of research into these primitives as well as...

    Provided By Intel Corporation

  • White Papers // May 2014

    Cloud Computing Basics

    In this article we go through some basic concepts with the purpose of providing context for the discussions in the chapters that follow. Here, we review briefly the concept of the cloud as defined by the U.S. National Institute of Standards and Technology, and the familiar terms of IaaS, PaaS,...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENCRYPTING THE INTERNET

    The evolution of the Internet has resulted in large quantities of information being exchanged by businesses or private individuals. The nature of this information is typically both public and private, and much of it is transmitted over the hyper text transfer protocol (HTTP) in an insecure manner. A small amount...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENHANCED DETECTION OF MALWARE

    A signifi cant development in the malware landscape in recent years is the ability of hackers to monetize compromised platforms by (1) gathering valuable information that can be sold, (2) using the platform’s resources to aid in an illicit or unwanted activity, or (3) holding information contained on the platform...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES

    Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authentication of a hardware device while preserving the privacy of the device owner. A hardware device with an EPID private key embedded can prove to a remote party that it is a valid device, certified by the hardware...

    Provided By Intel Corporation

  • White Papers // May 2014

    Introduction — The Internet of Things

    The Internet of Things (IOT) is about small machines in remote locations speaking to big centralized machines, often making decisions and taking action without people in the loop. It represents billions of devices speaking to each other, often managing outcomes in the physical environment. The IOT presents business opportunities in...

    Provided By Intel Corporation

  • White Papers // May 2014

    1 Platform Boot Integrity: Foundation for Trusted Compute Pools

    This article provides an introduction to the concept of roots of trust in a trusted computing platform, the measured boot process, and the attestation that are critical steps for ensuring boot integrity. It also provides an overview of Intel’s Trusted Executed Technology (TXT), an example of root of trust technology...

    Provided By Intel Corporation

  • White Papers // Apr 2013

    Lattice QCD on Intel Xeon Phi Coprocessors

    Lattice Quantum ChromoDynamics (LQCD) is currently the only known model independent, non perturbative computational method for calculations in the theory of the strong interactions, and is of importance in studies of nuclear and high energy physics. LQCD codes use large fractions of supercomputing cycles worldwide and are often amongst the...

    Provided By Intel Corporation

  • Webcasts // Apr 2013

    Webinar: PC Refresh in the Consumerized IT Environment

    Intel IT experts discuss the positive impact of PC refresh on security and manageability, user productivity, and TCO.

    Provided By Intel Corporation

  • Podcasts // Apr 2013

    Video: PC Refresh ROI

    PC Fleet Manager John Mahvi talks financial, security and manageability benefits behind a PC refresh cadence.

    Provided By Intel Corporation

  • Podcasts // Apr 2013

    Inside IT: Deploying Ultrabooks™ in the Enterprise

    Podcast: Intel IT’s John Mahvi talks about the advantages to IT and employees as Intel offers Ultrabook devices widely to its employees for the first time.

    Provided By Intel Corporation

  • White Papers // Mar 2013

    Practical Implications of Real Time Business Intelligence

    The primary purpose of business intelligence is to improve the quality of decisions while decreasing the time it takes to make them. Because focus is required on internal as well as external factors, it is critical to decrease data latency, improve report performance and decrease systems resource consumption. This paper...

    Provided By Intel Corporation

  • White Papers // Mar 2013

    Read The Latest Extreme Low Power, Windows Tablets Now Ready for the Enterprise

    The introduction of Apple’s iPad sent shock waves through the industry as it redefined end user’s expectations on design, battery life, simplicity, content and applications. Like PC purchases driven by end users and departments in the late 1980’s, iPads first entered the enterprise through executives, departments and end users. Apple...

    Provided By Intel Corporation

  • White Papers // Mar 2013

    A Taxonomy of Performance Assurance Methodologies and Its Application in High Performance Computer Architectures

    In this paper, the authors present a systematic approach to the complex problem of high confidence performance assurance of high performance architectures based on methods used over several generations of industrial microprocessors. A taxonomy is presented for performance assurance through three key stages of a product life cycle-high level performance,...

    Provided By Intel Corporation

  • White Papers // Jan 2013

    Deploying Business Ultrabook™ Devices in the Enterprise

    Recognizing the productivity and flexibility benefits that business Ultrabook™ devices deliver to mobile employees, Intel IT has established a fast-track strategy for offering business Ultrabook devices as an option in our regular corporate- supplied PC refresh cycle, making them available to all employees who currently use a mobile business PC....

    Provided By Intel Corporation

  • Product Specs // Jan 2013

    Consumerization of IT: Find the Right Device for the Job

    Consumerization is driving increased technology choice, and users are in the driver’s seat. IT organizations must find a way to provide the mobility and flexibility that users want with the security that business requires. As a strategic partner in the business, you can offer innovative technology choices to your employees...

    Provided By Intel Corporation

  • White Papers // Jan 2013

    Tablets in the Enterprise: Comparing the Total Cost of Ownership

    Windows 8 tablets provide a PC experience, which for many workers is essential to maintaining productivity. With Windows 8, users can run familiar desktop applications, maintaining productivity without having to find new ways to carry out their tasks. They can read, edit, and print their emails and Office documents- tasks...

    Provided By Intel Corporation

  • Videos // Aug 2012

    McAfee ePO Deep Command animation

    McAfee® ePolicy Orchestrator™ Deep Command™ employs Intel® vPro® Active Management Technology for automated, beyond the operating system management. This animation will show how this offers benefits IT to help reduce operational costs, enhancing security and compliance and enabling "green'" practices for idle PCs.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    Crimeware Protection: 3rd Generation Intel® Core™ vPro™ Processors

    White Paper: Embedded technology in 3rd gen Intel® Core™ vPro™ processors enable greater protection against crimeware for stronger threat management.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    3rd Generation Intel® Core™ vPro™ Processor Overview

    White Paper: Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® Core™ vPro™ processor overview.

    Provided By Intel Corporation

  • Podcasts // Aug 2012

    3rd Generation Intel® Coreâ„¢ vProâ„¢ Processor Overview Animation

    See how world-class performance meets built-in security for today's business PC in the 3rd generation Intel® Core™ vPro™ processor overview animation.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Remote Computer Repair with Intel® Core™ vPro™

    Remote computer repair is easier with Intel® Core™ vPro™ technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast, even if OS is unresponsive.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Core vPro Usage Model animation: Easy Reimaging

    Learn how Intel Core vPro processors enables you to identify issues and, if necessary, reimage client PCs right from IT desk.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Easy Configuration with Intel® Core™ vPro™ Setup and Configuration Software 8.0

    Intel® Setup and Configuration software helps set up remote management capabilities quickly and easily.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Remote Power Management with Intel® Core™ vPro™

    Core™ vPro™ processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.

    Provided By Intel Corporation

  • Videos // Aug 2012

    3rd Gen Intel Core vPro Processor Crimeware Protection

    Learn how embedded crimeware protection features built-in to 3rd generation Intel Core vPro processors safeguard data and thwart malware attacks.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Windows 7* Security with Intel® Core™ vPro™ Processors

    Adapt to the speed of business and enhance Windows 7* security with the Intel® Core™ vPro™ processor.

    Provided By Intel Corporation

  • Videos // Aug 2012

    What is Intel® Core™ vPro™ Technology Animation

    What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Managed PKI Solution from Symantec Enabled by Intel® vPro™ Technology Video

    Symantec Product Manager Dave Corcoran discussing the value Intel vPro Technology's Identity Protection Technology (IPT) with public key infrastructure (PKI) capabilities bring to enterprise security. Symantec is offering a managed PKI solution that works with third generation Intel Core vPro processors, which has the same high level of security as...

    Provided By Intel Corporation

  • White Papers // Aug 2012

    Citrix Xenclient local virtual desktop technology for laptops

    Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users. Client virtualization solutions based on local virtual desktop technology, such as Citrix® XenClient™, enable organizations to extend the security benefits of desktop virtualization to mobile users by maintaining full security and control over...

    Provided By Intel Corporation

  • Podcasts // Aug 2012

    McAfee Deep Defender video

    An in-depth look of how McAfee Deep Defender and DeepSAFE works with the Intel hardware features to run beyond the operating system to detect covert stealth attacks in real-time.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Intel Identity Protection Technology Animation

    Animation highlighting the business value of Intel Identity Protection with Public Key Infrastructure (Intel IPT with PKI). You could see IPT with protected transaction display as well as One Time Password (OTP) for enterprise usage.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    3rd Generation Intel® Core™ Processor: Comparison Guide

    Comparison Guide: Find the best Intel® Core™ processor for your business, whether you need better security, higher performance or lower cost.

    Provided By Intel Corporation

  • White Papers // Aug 2012

    Endpoint Protection, Multilayer Security from Intel and McAfee

    McAfee and Intel create a multilayer endpoint protection against malware, helping protect business PCs against intrusions from security breaches.

    Provided By Intel Corporation

  • White Papers // Oct 2010

    Intel® Atom™ Developer Program Celebrates One Year with New Name and More

    With its one-year anniversary, the Intel Atom? Developer? Program has unveiled a new name:?the Intel AppUpSM developer program. In addition, app developers can now download the new gold-release SDK with improved GUI and new debugger tool, and promote their apps to customers with the new "On AppUp" identifier. Find out...

    Provided By Intel Corporation

  • White Papers // Nov 2010

    Try the ultimate all-in-one performance toolkit

    Intel? Parallel Studio XE combines Intel's industry-leading C/C++ and Fortran compilers; performance and parallel libraries; error checking, code robustness, and performance profiling tools into a single suite offering. This helps boost application performance and increase the code quality, security, and reliability needed by high-performance computing and enterprise applications. At the...

    Provided By Intel Corporation

  • White Papers // Nov 2010

    Build high-performance apps for multicore

    Intel? Composer XE 2011 and Intel? C++ Composer XE 2011 combine optimized compilers with high-performance libraries, advanced vectorization, and Intel? Parallel Building Blocks, speeding and simplifying threading and performance on Linux* and Windows* with the same code base. The performance-oriented features offered by Intel Composer XE equip developers to use...

    Provided By Intel Corporation

  • White Papers // Nov 2010

    Prevent critical coding defects early

    Intel? Inspector XE 2011 is a powerful and easy-to-use memory and threading error checking tool for C, C++, C# .NET, and Fortran developers designing serial and parallel applications on Windows*- and Linux*-based platforms. Intel? Inspector XE enhances developer productivity and facilitates application reliability by effectively finding crucial memory and threading...

    Provided By Intel Corporation

  • White Papers // Nov 2010

    Optimize performance and scalability

    Is your software sluggish? Are you not seeing the performance scaling you expected on multicore processors? How do you diagnose the cause of poor performance and find a solution? Intel? VTune? Amplifier XE is the newest Intel performance profiler that builds on the success of Intel? VTune? Performance Analyzer. It...

    Provided By Intel Corporation

  • Downloads // Apr 2010

    Intel® Parallel Studio: Try it for 30 days—free.

    Intel? Parallel Studio brings simplified parallelism to Microsoft Visual Studio* C/C++ developers, equipping you to optimize for multicore and scale for manycore. The powerful suite also provides all the tools necessary to dramatically benefit legacy serial efforts. Quickly advance your development requirements, optimizing key facets like memory checking and hotspot...

    Provided By Intel Corporation

  • White Papers // Apr 2010

    Managing a Global Wireless LAN

    Intel IT developed a new management and support structure for wireless LANs (WLANs). Authors consolidated first-level support and centralized the WLAN engineer workgroup as well as device management. Authors manage the WLAN as an integrated service that enables centralized control of the WLAN, using global tools for centralized monitoring, reporting,...

    Provided By Intel Corporation

  • White Papers // Feb 2009

    Enhanced Privacy ID From Bilinear Pairing

    Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authentication of a hardware device while preserving the privacy of the device. EPID can be seen as a direct anonymous attestation scheme with enhanced revocation capabilities. In EPID, a device can be revoked if the private key embedded...

    Provided By Intel Corporation

  • White Papers // Jun 2011

    The Benefits of Virtualization for Embedded Systems

    Well established in the enterprise space, virtualization is now receiving attention for a wide range of embedded solutions. By enabling multiple Operating Systems (OSs) to run simultaneously on a single hardware platform, virtualization empowers embedded developers and Original Equipment Manufacturers (OEMs) to: consolidate previously separate functions to reduce system size,...

    Provided By Intel Corporation

  • White Papers // Apr 2012

    USB 3.0 Radio Frequency Interference Impact on 2.4 GHz Wireless Devices

    The 2.4 GHz ISM band is a widely used unlicensed radio frequency band for devices such as wireless routers, as well as wireless PC peripherals such as a mouse or keyboard. These devices may use standard protocols such as the IEEE 802.11b/g/n or Bluetooth, or they may use proprietary protocols....

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms: Data Center Energy Management with Dell, Intel, and JouleX

    The evolution of cloud computing has resulted in highly efficient and carefully optimized data centers with increased server density and capacity. It means there must be serious considerations made on energy consumption and other factors not as significant in the days of small data centers. To support this evolution, Intel...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Accelerating Innovation and Savings with R&D Cloud

    DuPont is one of the world's premier science companies. Its Central Research & Development (CR&D) IT leaders wanted to provide the company's scientists with the power and flexibility of cloud-enhanced computing for its scientific application portfolio. DuPont CR&D chose the Intel? Xeon? processor 7500 series as the foundation of its...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Expanding the Cloud

    Leading cloud computing provider Savvis needed to build an infrastructure for a new cloud computing offering while expanding existing environments to support continued customer growth. By selecting new servers based on the Intel® Xeon® processor 5600 series, Savvis is providing customers with improved application performance for all cloud offerings while...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Let's Talk IT: Intel and Forrester Talk Open Cloud

    Intel? IT Center Talk to an Expert series: Taking Advantage of Open Cloud Computing. James Staten, vice president and principal analyst at Forrester Research, and Jason Waxman, general manager, Cloud Infrastructure Group at Intel, discuss the benefits of openness in cloud computing and how this open approach can help you...

    Provided By Intel Corporation

  • Videos // Jun 2011

    McAfee Cloud Security Platform with New Security Capabilities from Intel

    Scott Chasin, McAfee CTO, Content & Cloud, talks about the availability of Intel? Expressway Cloud Access 360 and Intel? Expressway Service Gateway as modules in the McAfee Cloud Security Platform. The unified platform provides identity and access control and protects the content during transit to and from the cloud -...

    Provided By Intel Corporation

  • Videos // Jun 2011

    What is Intel Trusted Execution Technology?

    When it comes to data on-premise or in the cloud...security is the number one concern for IT. Who better to address the benefits of hardware root of trust than Intel's own Senior Security Engineer. James Greene discusses why hardware integrity checking is an important component of security in the cloud...

    Provided By Intel Corporation

  • Videos // Jun 2011

    Securing the Cloud with Intel Trusted Execution Technology Usage Models

    Intel's Sr. Security Engineer, James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security posture in your cloud environment that are enabled with a hardware root of trust and Intel Trusted Execution Technology. Watch this...

    Provided By Intel Corporation

  • White Papers // Sep 2011

    Seven Steps for Building Security in the Cloud from the Ground Up

    The cloud seems to be on everyone's mind these days. If you've been considering how to make the leap to cloud computing, you've also had to start thinking about how to extend security to this new technology environment. Despite potential savings in infrastructure costs and improved business flexibility, security is...

    Provided By Intel Corporation

  • White Papers // Jul 2010

    Get the "Find Hotspots" guide today

    Recompile a single file and boost performance with Intel Parallel Studio Intel? Parallel Studio delivers everything you need to build more reliable, higher performing serial applications today, while easily bringing parallelism to existing and new software projects when needed. A value-added tool for Microsoft* Visual Studio*, Intel Parallel Studio enables...

    Provided By Intel Corporation

  • White Papers // Aug 2010

    Earn App Revenue Faster with Dollars for Downloads 2010

    In addition to the opportunity to easily create applications and sell them directly to customers, the Intel&#174 Atom™ Developer Program offers developers additional ways to speed time to revenue. Enter your completed apps by 9/30 and you may receive an extra $2 per app download?free apps included?through Dollars for Downloads!...

    Provided By Intel Corporation

  • Resource Center // Mar 2011

    Cloud Computing and Security...thoughts from Intel CISO Malcolm Harkins

    With the fast pace of the changing technology landscape and new usage models such as Cloud Computing, IT Consumerization, and social computing security remains one of the highest priorities for IT. Ilene Aginsky (IT@Intel) decided to sit down with Intel's CISO, Malcolm Harkins and ask his perspective on these various...

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Intel IT: Cloud Storage for Efficiency and Capacity Management

    Moving to a highly-virtualized, shared SAN environment has forced us to develop new storage metrics and management approaches to boost efficiency and reduce costs.

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Policy-Based Power Management with Dell & VMware

    This reference architecture is intended for those who seek power management solutions to achieve better power efficiency within new or existing datacenters, to understand policy based power management solutions implements with the use of hardware and software components.

    Provided By Intel Corporation

  • White Papers // Dec 2011

    Intel brings new experiences to life via Cloud Computing

    It seems that today's cloud technology is constantly pushing the envelope of what is or isn't possible in computing. Something as simple as putting a few letters into a search engine and getting thousands of results in seconds is normal today, but just a few years ago, the notion was...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Inside Intel IT on Cloud Computing and Security

    Certainly no one expects that a company like Intel doesn't have issues when it comes to computing in the cloud, they do by the way. The real question is, how do they handle them, what are Intel IT's best practices? There is no real secret, but just like your organization...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Inside Intel IT on Technology for Tomorrow's Cloud

    If cloud is at the top of your agenda, you're probably looking at it as a way to improve server utilization, build efficiencies in the data center, provide elastic scaling, support self-service, and provision applications faster - as well as respond better to the business. The virtualized data center is...

    Provided By Intel Corporation

  • White Papers // Dec 2011

    IT Managers Speak Out about Cloud Security

    Imagine being able to tap into the knowledge of 200 IT managers all in some stage of cloud development. Imagine being able to get a better understanding of how they are handling the biggest questions of cloud deployment, security. Imagine if their experiences could be boiled down to 5 common...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    What makes Jason Waxman Curious?

    First of all, who is this Jason Waxman and why do we care what makes him curious? It's a good question, but he's someone you definitely want to get to know, and what makes him curious will likely change the way you access the cloud over the next 5 years....

    Provided By Intel Corporation

  • White Papers // Oct 2011

    Vendor Round Table: Cloud Security

    IT departments are paying close attention to developments in cloud computing technology. The cloud offers the promise of large potential savings in infrastructure costs and improved business agility, but all of that doesn't come without its concerns. Number one on that list is security, which frankly, has become a major...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Securing Virtualized Web Apps

    To realize benefits such as increased agility and efficiency, Intel IT is undertaking a major transition to an enterprise private cloud for our Office and Enterprise applications. To create the infrastructure for this cloud, they set a lofty goal of virtualizing 75 percent of their Office and Enterprise computing environment....

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Intel IT Executive Insights: Intel IT's Cloud Computing Strategy

    Cloud computing is only growing and innovating and at Intel, it's one of their top 3 IT objectives for 2012. The idea of a virtualized data center is changing the way Intel looks at its architecture: from the client technology employees use for business services to the data center infrastructure...

    Provided By Intel Corporation

  • White Papers // Sep 2011

    Cloud Security Insights for IT Strategic Planning

    Cloud security has become one of the biggest reasons many IT managers aren't willing to fully embrace the cloud, even with the large potential savings in infrastructure costs and improved flexibility. So with predictions pointing to an acceleration of enterprise cloud computing, how are IT professionals addressing the challenges, especially...

    Provided By Intel Corporation

  • White Papers // Jun 2010

    An Enterprise Private Cloud Architecture and Implementation Roadmap

    The private cloud is a shared multi-tenant environment built on a highly efficient, automated, and virtualized infrastructure. Few organizations understand the road to building a private cloud quite like Intel. Certainly knowing how Intel IT got there and how your organization can leverage that knowledge can be a critical component...

    Provided By Intel Corporation

  • White Papers // Sep 2011

    The Future of Cloud Computing Planning Guide

    If the question hasn't come up yet in your organization, it probably will. How do you build a private cloud for your organization? Cloud computing is one of the top three priorities this year for Intel IT. Their experience stands as an example for IT organizations looking at the business...

    Provided By Intel Corporation

  • Podcasts // Jan 2012

    Unified Networking Benefits with Intel Ethernet 10 Gigabit

    With the increasing demands on data center growth, many IT managers are moving to 10 Gigabit Ethernet connections. The benefits run from power costs, lower infrastructure costs to significantly increased network bandwidth. Watch this video, Unified Networking Benefits with Intel Ethernet 10 Gigabit, to get a better understanding of...

    Provided By Intel Corporation

  • White Papers // Jan 2010

    Implementing and Expanding a Virtualized Environment

    In 2005, Intel IT began planning, engineering, and implementing a virtualized business computing production environment as part of an overall data center strategy. They are currently accelerating virtualization adoption for general purpose applications, with a goal of virtualizing 70 to 80 percent of office and enterprise environments within two years....

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Improve Power Management with Intel Intelligent Power Node Manager

    When it comes to managing the data center, it's all about improving efficiency and optimizing the volume of data a growing organization can expect. A huge part of that management is both power and cooling the resources that keep the data center moving. Intel is making it all quite easy,...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Meeting Intense Performance Demands in Cloud Environments

    Organizations increasingly place demanding performance requirements on cloud networks. Many find that using an external cloud service provider lets them take advantage of established expertise to meet emerging technical requirements. Other customers building their own cloud environments likewise stand to gain from the innovation of a vendor experienced in building...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

    There is a good chance by now, your organization is either building its own cloud computing infrastructure or in the process of figuring out how to start to build one. Enterprise IT organizations sometimes struggle with facilitating the move to the cloud or certainly how to use the cloud to...

    Provided By Intel Corporation

  • White Papers // Jan 2012

    Telefonica Moves Into the Cloud

    Telefonica is one of the world's leading integrated operators in the telecommunication sector, providing communication, information and entertainment solutions, with a presence in Europe, Latin America and Asia. To make sure they stay on top in the marketplace they are launching cloud-based services for helping small and medium enterprises...

    Provided By Intel Corporation