Intel and CPRM
VideoVisualizza più video
Intel® Technology Optimizes Pattern Match Algorithm
Optimized pattern matching detects malware and helps achieve maximum computing performance.
Security Measures Improve Hadoop*
Security measures include data encryption/decryption, access controllers, and user management.
Intelligent Network Platform Blocks Intrusion
Off-the-shelf components provide a high-quality solution without using custom hardware.
Firewall Analytics Improve Computing Speed
Firewall monitors user traffic, analyzes applications, and searches for malware.
Network Services Transformation
Transform software-defined infrastructures and platforms to enable fast deployment, new revenue.
New Business for Perceptual Computing
Mark Yahiro discusses developing devices that interpret cues for intuitive perceptual computing.
Intel Solutions—Small Cells World Summit 2014
Touring 3G and 4G small cells, smart cell on a base station, and a virtualized small cell gateway.
EdgeCloud* Small Cell Technology Overview
Distributing data to Intel® architecture-based intelligent small base stations speeds data delivery.
4G Networks Improved through Technology from Tieto and Intel
Tieto, Intel team up to create flexible and scalable technologies used in 4G integration networks.
Intel® Architecture-based Cloud-RAN Overview
Enabling dynamic on-demand response, combining collaborative radio and cloud infrastructure.
Intel® Technology Powers Microcell Devices
Microcell maker Ubiquisys uses Intel® technology’s compute power for mobile application performance.
EPC Wireless Communications Cloud Overview
Evolved packet core networks on a single Intel® architecture enable flexible, faster, wireless clouds.
Ericsson Uses Intel® Atom™ Processor C2000
See how the Intel® Atom™ System-on-Chip powers cloud infrastructure with scalability and more.
Yanzi Networks* Real-Time Machine-to-Machine Solution
Illustrates Yanzi Networks* real-time machine-to-machine communication solution.
RSA 2012 Intel Keynote: Client to Cloud Security
RSA 2012 Intel keynote speech provides architectural insights to tomorrow’s security infrastructure.