Panel de control

Buscar contenido

Afinar resultados
Contenido relacionado

Activar etiquetas

  • 192 Resultados
  • Elementos por página

Intel® Virtualization Technology Transforms IT

Intel simplifies and accelerates core virtualization processes for greater performance, scalability, and flexibility.

EMC Improves Efficiency with Development and Testing in the Cloud

Case Study: Development and testing in the cloud with Intel® Xeon® processor E5 v2 family helps EMC improve efficiency of storage solutions.

Vista previa | Descargar

Optimización del centro de datos

Descubra cómo y por qué debería invertir en la optimización del centro de datos con directrices y herramientas creadas a partir de la completa experiencia de Intel con los centros de datos.

Nanyang Technological University: Maximizing Computing Resources

Nanyang Technological University enables maximum scalability and high performance for its computing resources.

Vista previa | Descargar

Ericsson Managed Cloud Enablement Services* Accelerates Deployment

Solution Brief: Ericsson Managed Cloud Enablement Services* accelerates deployment of private and public clouds with IaaS, PaaS, and SaaS solutions.

Vista previa | Descargar

How Software-Defined Infrastructure Is Evolving at Intel

Intel IT is working to transform our data centers into consolidated facilities with open-standards-based, agile, cost-effective systems.

Vista previa | Descargar

Workload and System Consolidation with Virtualization, Part 2

Discusses how Intel and Wind River use virtualization and the Intel® Industrial Solutions System Consolidation Series to simplify consolidation.

Software Defined Infrastructure 101

Discover how Software Defined Infrastructure (SDI) can transform your data center into an optimized cloud platform.

How Intel Security Defends Against Malware

Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.