Panel de control

Buscar contenido

Afinar resultados
Contenido relacionado

Activar etiquetas

  • 9275 Resultados
  • Elementos por página

Air-Cooled High-Performance Data Centers: Case Studies and Best Methods

White Paper: Intel has achieved breakthrough power and heat densities at a lower cost than other data center designs.

Vista previa | Descargar

12 Tips to Keep Your PC Cool – IT Best Practices Technology Tip

Keeping your PC cool is important to prevent potentially permanent damage. In this IT@Intel Technology Tip, we offer 12 ways to keep your PC cool.

Vista previa | Descargar

Boosting Smartphone Battery Life – IT Best Practices Technology Tip

In this IT@Intel Technology Tip, we offer several simple ways to get the most out of your smartphone’s battery life.

Vista previa | Descargar

Using Cloud with BYOD - Obtaining Maximum Business Value from Both

Intel IT integrates our cloud computing efforts with our bring-your-own device initiatives, helping Intel obtain the maximum business value from both.

Vista previa | Descargar

Hybrid Cloud – Key Design Strategies

Intel IT is exploring hybrid clouds—a mix of public and private clouds—for consumer-facing web services.

Vista previa | Descargar

eDiscovery with BYOD: Best Practices in the Enterprise

Intel’s BYOD program was built to facilitate eDiscovery –legal requests for data– stored on personally owned devices such as smartphones and tablets.

Vista previa | Descargar

Private Cloud PaaS – Accelerating Application Deployment

Intel IT’s private cloud PaaS accelerates custom application deployment and promotes cloud-aware application design.

Vista previa | Descargar

Granular Trust Model – Improving Enterprise Security

Intel IT’s new granular trust model provides dynamic security controls and user access to reduce enterprise risk while improving the user experience.

Vista previa | Descargar

Mobile Device Security: Intel IT Best Practices

To improve device security, we use a security model that calculates which devices can be trusted and moves users to the appropriate security level.

Vista previa | Descargar

Inside IT: Exploring a BYO Stipend

How Intel IT developed a methodology to assess the viability of a bring-your-own stipend program and the results they found.