Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 1500 Results
  • Items Per Page

Gneis Tackles Rising Maintenance Costs with RISC Migration

Case Study: Gneis improves server performance and lowers costs with Intel® Xeon® processor E5 RISC migration for Bankinter’s business applications.

Preview | Download

Accelerate IT Modernization with Server Upgrades Infographic

Boost IT modernization to maximize efficiency and minimize costs with server upgrades like Windows Server* 2012 and Intel® Xeon® processor E5-2697 v2.

Preview | Download

Migrate Mission-Critical Workloads to x86 Architecture Guide

Planning Guide: Provides guidance and steps to migrate mission-critical workloads from RISC/UNIX* to Intel® processor-based x86 architecture.

Preview | Download

IT Consumerization Best Practices

Access resources for implementing IT consumerization in the enterprise, including information on fundamentals, planning, and recommended products. Learn how to implement a consumerization strategy that enables employees to bring their own devices to the workplace without sacrificing IT security.

ISE Reduces Trading Latency for Options Exchange

Case Study: ISE reduces trade latency using Intel® Xeon® processor E5 family-based HP ProLiant* servers for an environment with better performance.

Preview | Download

A Better Way to Work: 5th Generation Intel® Core™ vPro™ Processors

5th generation Intel® Core™ vPro™ processor family creates a better way to work.

Intel® SSD DC S3500 Series

Combining performance, protection, and efficiency for data centers, the Intel® SSD DC S3500 Series delivers consistently low application latency.

Intelligent Vending Machines for Increasing Profitability: Brief

Product Brief: Intelligent vending machines enabled by this reference design let operators profit from cloud services and analytics. (v.1, Apr. 2014)

Preview | Download

Cloud Computing Solutions from Intel

Explore cloud computing solutions built on Intel®-based technology. Learn the fundamentals, plan your solution, and decide on the technology you need.

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Preview | Download