Panel de control

Buscar contenido

Afinar resultados
Contenido relacionado

Activar etiquetas

  • 100 Resultados
  • Elementos por página

Misperceiving Risk can be the Greatest Vulnerability We Face Today

Video: Malcolm Harkins, Intel CISO, talks about how misperceiving risk may be the greatest vulnerability we face today, whether at home or on the job.

Security and Consumerization with Intel CSO, Malcolm Harkins

Video: Intel CISO Malcolm Harkins talks benefits and challenges of IT Consumerization in the corporate environment.

Accenture, Intel Remote Management Solutions

Video: Intel® Core™ vPro™ processor family gives Accenture ARROW* intelligent performance, cost-saving manageability, and smart security.

Intel® Core™ vPro™ Processor Family: Desktop Virtualization

Discover the benefits of PCs with Intel® Core™ vPro™ technology delivering hardware-assisted virtualization technology built in.

Four IT Managers Talk Virtual Desktop Management

Four IT managers discuss virtual desktop management models for four industries: financial services, education, healthcare, and general office.

Altiris Client Management Suite* with Intel vPro Technology

Video: Corporate users of Symantec Altiris Client Management Suite* with Intel® vPro™ technology discuss benefits of remote desktop support.

Enterprise Mobility Trends Research Video: Today’s Workforce

Watch this video for insights on enterprise mobility trends based on a survey from Intel Market Research that included over 1,700 business users

Virtual Desktop Software at New York City iSchool

New York City Department of Education uses virtual desktop software to improve the quality of its instructional videos.

Intel IT’s New Information Security Strategy - Protect to Enable

Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.

2nd Generation Intel® Core™ Processors

Video: Rick Echevarria covers the launch of the 2nd Generation Intel® Core™ vPro™ processor family and reshaping business computing.