Intel® E8501 Chipset North Bridge: Specification Update
VideoVisualizza più video
UC Irvine: Shouldering the Load
University of California, Irvine runs ATLAS* project with thousands of Intel® Xeon® processors 7400 series. (1:34)
COSMOS: Exploring the Origins of the Universe
Video: The COSMOS Consortium at the University of Cambridge studies how the world began using a supercomputer powered by the... (10:39)
Indiana University Virtualizes with Intel, VMware
Intel® Xeon® processor 7500 series and VMware vSphere* enable VM capacity and performance increase, footprint reduction. (2:05)
Telefonica Video: Realizing Virtualization
Telefonica markets new virtual hosting service first with the Intel® Xeon® processor 7100 series. (3:20)
Plum Tree Mortgage passa a processori Intel® Xeon®: caso...
Testimonianza video del vincitore del concorso Intel IT Tune Up che illustra il passaggio a un server basato su processori Intel®... (2:47)
Intel® RAID: The Perfect Fit
Video: importance of matching Intel® RAID embedded, integrated, and add-in products to the correct server. (3:54)
Intel® RAID: World Class Performance
Video: Intel® 6Gb/s RAID controllers features, benefits, and technical specs outlined. (2:56)
NAB 2010: Intel and Active Storage
Showcases Intel technology in broadcast equipment and servers at the National Association of Broadcasters. (2:01)
Ethernet Power Management Technology
DMA coalescing and built-in intelligence enables increased performance per watt and consolidation.
Cisco, Intel: Leading Server Innovation
Leading server innovation with the Intel® Xeon® processor E7 family for higher speed and capacity. (8:30)
Trusted Computing Platform: Security to the Cloud
Create a cloud-based platform on Intel® processors with end-to-end software and hardware security.
Framestore Visual Effects Soar with Flexible IT
Framestore enhances film and integrated advertising on servers powered by Intel® Xeon® processors.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing productivity.