Panel de control

Encontrar contenido

Refinar resultados
Contenido relacionado

Etiquetas activas

  • 22 Resultados
  • Elementos por página

Automotive Maker GM Speeds IT for Success

GM leaders cover the IT benefit of rapid data sharing in design, engineering, and manufacturing to bring vehicles to market faster and increase sales.

Intel Talk to an Expert Series: Converged Cloud with Gartner

Andy Butler from Gartner and Boyd Davis from Intel discussed servers, storage, and networking in the cloud in this virtual event.

Red Hat and Intel: Rock-Solid Mission-Critical Computing

Video: Red Hat Linux 6* running on Intel® Xeon® processor E7 family is an alternative to UNIX/RISC-based platforms for mission-critical computing.

Why Greater Performance Per Core Matters for Server Virtualization

Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.

RAID Intel®: Desempeño de primera clase

Video: Características y beneficios de los controladores RAID Intel® de 6Gb/s, incluidas más transacciones de base de datos y respaldos más rápidos. Se detallan las especificaciones técnicas

Unified Networking with 10 Gigabit Converged Network Adapters

Intel® 10 Gigabit Server Adapters support SAN, LAN, and FCoE networks, reducing server interfaces for performance and simplified infrastructure.

Jasper Forest From Intel Animation

Video introduces Jasper Forest: the newest addition to the Intel® Xeon® processor family.

HP Moonshot* and Intel® Atom™ Processor C2000 Family

HP’s John Gromala discusses how the Moonshot System* can focus on broader web tiers and big-data applications with the Intel® Atom™ processor C2000.

How Intel Security Defends Against Malware

Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.