Panel de control

Buscar contenido

Afinar resultados
Contenido relacionado

Activar etiquetas

  • 1927 Resultados
  • Elementos por página

Enabling Employee Owned Phones

Learn how Intel IT is enabling employee-owned phones in the enterprise, allowing employees to use their own smart phones to access corporate data.

Vista previa | Descargar

Converged Network Adapters

Switching to FCoE using converged network adapters yielded more than 50% reduction in network costs per server rack.

Vista previa | Descargar

What is Intel® Core™ vPro™ Technology Animation

What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

Storage Vendor Solutions: Cloud Storage Vendor Round Table

Storage vendor solutions round table provides answers about six cloud storage technology offerings from four different vendors.

Vista previa | Descargar

Client PC Virtualization

Intel IT found that client virtualization could reduce total cost of ownership (TCO) by streamlining PC client builds.

Vista previa | Descargar

Diagrama de introducción a la Tecnología de virtualización Intel®

El diagrama destaca una lista de funciones asistidas por hardware integradas en los procesadores Intel® Xeon®, con chipset, conectividad y procesador.

Accelerate Enterprise Virtualization with Factory Principles

Intel IT created a standardized, high-volume process—a Virtualization Factory—to accelerate the implementation of our enterprise private cloud.

Vista previa | Descargar

Improving Workplace Ergonomic Safety: Intel IT Best Practices

Learn how Intel IT created a safety program focusing on improving employee safety and reducing ergonomic issues.

Vista previa | Descargar

Smarter Approach to Desktop Virtualization

The Virtualization Practice discusses Intelligent Desktop Virtualization from Intel, featuring Virtual Computer as a market leader.

Vista previa | Descargar

Improve Device Security: Intel IT Best Practices

To improve device security, we use a security model that calculates which devices can be trusted and moves users to the appropriate security level.

Vista previa | Descargar