Panel de control

Encontrar contenido

Refinar resultados
Contenido relacionado

Etiquetas activas

  • 130 Resultados
  • Elementos por página

Citrix Flexcast* and Intelligent Desktop Virtualization

Citrix* Flexcast* for Intelligent Desktop Virtualization in this technical animation.

BYOD Trends: An IT Managers Survey

Get insight into BYOD trends in the enterprise from a survey of 3,000 IT managers and 1,300 end users across four countries.

Mercados de capitales: Soluciones bancarias multicanal de Intel

Intel ofrece soluciones que permiten proporcionar servicios bancarios multicanal en cualquier momento y lugar, con lo cual las entidades bancarias pueden mantenerse comunicadas con sus clientes a través de diversos canales.

La actualización a Windows 7* es fácil con la tecnología Intel

Las tecnologías y las mejores prácticas de Intel ayudan a migrar el sistema operativo de sus PC empresariales a la actualización a Microsoft Windows 7*.

Intel® vPro™ Technology Module for Microsoft Windows PowerShell*

Provides IT Professionals an easy, scriptable mechanism to interact with Intel AMT.

Workload Management Solutions Meet Hotel’s Demanding Needs

Case Study: Gold Star Technology uses Intel® architecture to create workload management solutions that meet the needs of a resort hotel in Vietnam.

Vista previa | Descargar

Allscripts Windows* Solution: Transforming Healthcare

Find out how the Allscripts Windows* solution running on Intel® architecture-based tablets is transforming the physician experience.

Vista previa | Descargar

Business Investment Strategy for Device Refresh

Build a business case for and plan a device upgrade and refresh strategy based on decisions that help manage costs and maximize user productivity.

Vista previa | Descargar

What is McAfee ePO Deep Command*

What is McAfee ePO Deep Command*? Learn how McAfee ePO Deep Command helps IT enhance security and lower costs.

Taking Control of Security: Key Log and Pin Pad Screen Scraping

Manage vulnerability with Intel® vPro™ technology built-in security features and McAfee software for multilayered protection against stealth attacks.