ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Intel

  • Intelligence that Adapts to Your Needs

    The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.

  • Getting Ahead of Malware

    To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.

  • Evaluating Thin-Client Security in a Changing Threat Landscape

    Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper.

  • The Intel PC Total Cost of Ownership Estimator

    Calculate the optimal refresh rates for your firm based on equivalent annual cost (EAC) analysis. The tool also provides an assessment of further TCO reduction opportunities offered by Intel® vPro ™ technology.

  • Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer

    For every 100 laptop PCs companies issue, 15 will never be seen again, according to this research report sponsored partly by Intel. Five will be lost or stolen (one recovered) and 11 will simply vanish, leaving companies stuck for millions of dollars in compromised data alone.

  • Increasing Data Center Efficiency with Server Power Measurements

    Learn how Intel IT defined methods for analyzing computing energy efficiency within our design computing environment, using measurements of actual server power consumption and utilization.

  • Data Center Energy Efficiency with Intel® Power Management Technologies

    Results of Intel IT's evaluation of Intel Intelligent Power Node Manager and Intel DCM that showed up to a 20% reduction in server power use with no impact on runtime, and potential for increased compute capacity, power savings and business continuity.

  • Increasing EDA Throughput with Intel Xeon Processor 5600 Series

    Read about Intel IT's testing of the Intel Xeon processor 5600 series that delivered up to 17.3X throughput improvements compared with single-core Intel Xeon processors and up to a 15:1 consolidation ratio by replacing servers based on single-core Intel Xeon processors.

  • An Introductory Breakdown of Trusted Computing

    This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level.

  • Dynamic Virtual Clients

    In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.

  • Enhanced Detection of Malware

    We present a cloud-computing-based architecture that improves the resiliency of the existing solutions anti-malware solutions, and we describe our prototype that is based on existing Intel platforms.

  • Developing WS-Management Solutions for Intel® Active Management Technology

    This article describes how to develop flexible WS Management-based solutions for Intel® Active Management Technology using the .NET development environment. The basic ingredients and building blocks of a WSMan-based solution will be presented. We've included some coding samples (written using Windows 2008) to help illustrate this information.

  • Remote Encryption Management SDK

    Remote Encryption Management Software Development Kit (SDK) provides the tools to allow FDE or software based encrypted hard drives to be unlocked remotely out of band using vPro. This allows computers with vPro and encrypted hard drives to be managed out-of-band. Learn more about this SDK and download your free copy today.

  • What the $#@! is Parallelism, Anyhow?

    It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.

  • Is Parallel Programming Hard?

    This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.

  • Enabling High-Performance Video Encoding, Decoding, and Preprocessing

    The version 1.0 release of the Intel® Media Software Development Kit (SDK) equips developers with a standard application programming interface (API) for creating video solutions that target consumer and professional uses. Read this article to learn more about this product as well as the benefits for developers.

  • Designing Artificial Intelligence for Games - Part 3

    In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.

  • Streaming and Virtual Hosted Desktop Study

    Read this paper to learn what Intel IT found when they compared the impact on servers and the network for both streaming software and virtually hosted computing models.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.