Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 146 Results
  • Items Per Page

ECU IT Increases Education Flexibility on Virtualization

Case Study: East Carolina University IT uses Intel® Xeon® processors for desktop and server virtualization while boosting storage performance.

Preview | Download

Intel® Virtualization Transforms IT

Intel simplifies and accelerates core virtualization processes for greater performance, scalability, flexibility, and reliability.

Intelligent Clients Improve Laptop and Desktop Virtualization

Desktop virtualization resources for IT managers from Intel, featuring case studies, planning guides, and peer research.

Engaging Students with Anytime, Anywhere Learning

Case Study: Northern Michigan University enables anytime, anywhere learning with Ultrabook™ 2 in 1 systems for enhanced student-teacher collaboration.

Preview | Download

Enterprise-Class Security for Server Virtualization Solution Brief

Brief: HyTrust and Intel developed an end-to-end security solution to address the risks associated with server virtualization and cloud technology.

Preview | Download

Intel® Xeon® Processor 5500 Series Specification Update

Specification Update, 2011: Intel® Xeon® processor 5500 series, errata, specification clarifications, and changes.

Preview | Download

Intel® Xeon® Processor 5600 Series Specification Update

Specification Update, 2011: Intel® Xeon® processor 5600 series, errata, specification clarifications, and changes.

Preview | Download

InfoSphere Information Server* 8.7 Performance Characteristics

White Paper: Describes IBM InfoSphere Information Server* performance characteristics for a virtual machine on an Intel® Xeon® processor-based server.

Preview | Download

Intel IT Center - IT Helping IT Get Projects Done - Join Now

Join the Intel® IT Center for access to straightforward, down-to-earth info designed to help you plan and implement your big projects faster.

Cloud Security Architecture and Virtualization Security

Learn how Intel IT solved security challenges from internet facing applications by securely virtualizing the underlying host architecture.

Preview | Download