Disrupt ’13 presenters discuss new, immersive intelligent vending that enhances customer engagement, with touch, interactive gaming, and analytics.
With flexibility, performance, security, and more, 2 in 1 devices for the enterprise business provide the benefits of a tablet and PC in one.
Experience the versatility of Intel® processor-based 2 in 1 devices for the enterprise business, with the adaptability and flexibility of a tablet, the performance and productivity of a full PC, and enterprise-level security and IT manageability.Full View >
Intel is working with companies to make security software that is enhanced with hardware, expanding enterprise protection from boot time to run time.
Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.
Automate and monitor storage tiering and balance data retrieval speeds versus costs with automated software powered by Intel® processors.
The Mobile Enterprise Accelerator* offers superior cloud performance with data download speeds of up to 100 times faster than a traditional system.
Rickard Damm of Ericsson demonstrates the Mobile Enterprise Accelerator*, which offers superior performance for cloud services, including data download speeds of up to 100 times faster than a traditional system.Full View >
An intelligent network platform consisting of off-the-shelf components gives users an easy solution for applications, such as intrusion protection.
Wind River’s Dave Dickey describes an intelligent network platform consisting of off-the-shelf components that allows customers to reconfigure their systems without using custom hardware for applications, such as intrusion detection and prevention.Full View >
A firewall designed for computing speed provides analytics to monitor user traffic and applications, and content inspection to search for malware.
Intel’s Chris Clark describes a firewall with analytics designed for computing speed, including SSL decryption for monitoring user traffic, flow analysis that identifies application use, and content inspection to search for malware.Full View >
Liquid Applications* is base station technology that stores applications and content close to mobile subscribers for an enhanced user experience.
Robert McManus of Nokia Siemens Networks demonstrates Liquid Applications*, base station technology that stores applications, content, and services close to mobile subscribers, which enhances user experience with greater speed and response.Full View >
Intel® architecture optimizes the pattern match algorithm, which searches for malware and viruses, and helps achieve maximum computing performance.
Intel’s Charlie Laswell describes Intel® architecture that optimizes the pattern match algorithm, which searches user traffic for malware and viruses, and helps achieve maximum memory bandwidth and computing performance.Full View >