Video: intelligent PCs based on Intel® Core™ vPro™ processors provide performance and mobility, while delivering IT with control and manageability.
Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.
Can Information Security survive? Intel IT is tackling this challenge with a new information security strategy called “Protect to Enable.” Its security architecture is designed to increase productivity and innovation, while actually decreasing risk!Visualizzazione completa >
Use Wi-Fi to create Location-Based Services with AeroScout’s MobileView* to find rooms, printers, or locate Intel® vPro™ technology-based devices.
Get faster and easier; use Wi-Fi to create Location Based Services Applications for tagged devices and assets with AeroScout’s MobileView* software to quickly find conference rooms or printers, or locate other Intel® vPro™ technology-based devices.Visualizzazione completa >
Anytime, anywhere learning with personal Ultrabook™ 2 in 1 systems featuring Intel® WiMAX empowers Northern Michigan University students and faculty.
By partnering with Intel, Northern Michigan University empowers students and faculty with Tablets in the Classroom by providing personal Ultrabook™ 2 in 1 systems featuring Intel® Core™ i5 processors and Intel® WiMAX technologyVisualizzazione completa >
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.Visualizzazione completa >
Video: Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.Visualizzazione completa >
Discover how Intel® technology and products are driving transformation in the energy industry.
Imaging technology and mobile application providers Scalado uses Intel to meet mobile device demand and improve user experience.
What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.