Dashboard

Trova contenuto

Contenuti correlati

Tag attivi

  • 33 Risultati
  • Elementi per pagina

Inside IT: Deploying Microsoft Windows 8* in the Enterprise

Intel IT’s Tiffany Pany talks about preparation leading up to our Microsoft Windows 8* deployment and plans for ramping the distribution throughout.

Deploying Microsoft Windows* 8 in the Enterprise

Intel® architecture-based devices with Windows* 8 allow touch and traditional input and are optimized for mobility and security.

Anteprima | Download

Microsoft Windows 8 Security on Intel Architecture-based tablets

Intel IT’s evaluation of Microsoft Windows* 8 on Intel® architecture-based tablets revealed new security and manageability benefits for IT and users.

Anteprima | Download

Meeting the Demands of Consumerization

Solution Brief: Corporate-issued devices based on Intel® and Windows 8* technology deliver business capabilities to address consumerization.

Anteprima | Download

Retailers Engage Consumers with Streamlined Operations

Solution Brief: Intel® and Windows 8* technology let retailers engage consumers through seamless device integration, providing superior performance.

Anteprima | Download

ACSA Focuses on Physicians for Promoting Quality Care

Case Study: Andalusia Agency for Healthcare Quality accesses data on Intel®-based tablets, boosting performance, patient experience, and care quality.

Anteprima | Download

Duplicate, Extend, Multitask Windows* 8.1 Screens with Intel® WiDi

Demos duplicating or extending screens from a Windows* 8.1-based device to a touch-enabled TV screen using Intel® Wireless Display (Intel® WiDi).

Intel® Wireless Display Software Setup

Learn how to set up your Intel® Wireless Display software on Microsoft Windows* 7 and 8.

Intel® Wireless Display Hardware Setup

Learn how to set up your Intel® Wireless Display hardware.

La sicurezza integrata contribuisce a protegge dall'interno da minacce nascoste

Infografica: i dispositivi basati su processori Intel® Core™ e su Windows* 8.1 offrono sicurezza integrata e sicurezza ottimizzata tramite hardware, per una risposta completa alle minacce.