Intel E8870IO Server I/O Hub: Datasheet
VideoVisualizza più video
Plum Tree Mortgage passa a processori Intel® Xeon®: caso...
Testimonianza video del vincitore del concorso Intel IT Tune Up che illustra il passaggio a un server basato su processori Intel®... (2:47)
Intel® RAID: The Perfect Fit
Video: importance of matching Intel® RAID embedded, integrated, and add-in products to the correct server. (3:54)
Intel® RAID: World Class Performance
Video: Intel® 6Gb/s RAID controllers features, benefits, and technical specs outlined. (2:56)
NAB 2010: Intel and Active Storage
Showcases Intel technology in broadcast equipment and servers at the National Association of Broadcasters. (2:01)
Ethernet Power Management Technology
DMA coalescing and built-in intelligence enables increased performance per watt and consolidation.
Cisco, Intel: Leading Server Innovation
Leading server innovation with the Intel® Xeon® processor E7 family for higher speed and capacity. (8:30)
Trusted Computing Platform: Security to the Cloud
Create a cloud-based platform on Intel® processors with end-to-end software and hardware security.
Framestore Visual Effects Soar with Flexible IT
Framestore enhances film and integrated advertising on servers powered by Intel® Xeon® processors.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing productivity.
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Big Data: Intel & Oracle
Complementary big data solutions for enterprises
Automaker GM Speeds IT for Success
GM leaders discuss rapid data sharing to bring vehicles to market faster and increase sales.
Intel Security Keeps Enterprise Resilient
Hardware-enhanced features find, freeze, and fix vulnerabilities to enterprise infrastructure.