Intel IT channel:

Mobile App Development: Optimizing for Cross-Platform Applications

Mobile App Development: Optimizing for Cross-Platform Applications

IT Best Practices: Intel IT has implemented a new type of software architecture that enables us to develop large-scale, UI-optimized, cross-platform applications using a single code base with maximum code reuse between supported platforms.

With the consumerization of IT [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Inside IT: Implementing Apache Hadoop Software at Intel

April 1st, 2014 |
Inside IT: Implementing Apache Hadoop Software at Intel

IT Best Practices: Episode 72 – Intel recognizes the value a big data platform can bring to Business Intelligence. Organizations like Intel are rich in data, but that value can’t be realized until there’s a way to collect, sort, [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , ,

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Inside IT: Implementing Software Defined Networking in the Enterprise

March 4th, 2014 |
Inside IT: Implementing Software Defined Networking in the Enterprise

IT Best Practices: Episode 70 – Over the last decade, Intel IT has been employing virtualization technology in the data center for the office, enterprise, and service environments. Servers have been virtualized, and server and storage provisioning have become [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, data centers, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Transforming Sales Productivity with Social Collaboration

February 26th, 2014 |
Transforming Sales Productivity with Social Collaboration

IT Business Value: We use three key metrics to measure data center transformation success: meet growing customer demand (service-level agreements and quality of service) within constrained spending targets (cost-competitiveness) while optimally increasing the utilization of infrastructure assets (operational efficiency). [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , ,

Enabling Native Email, Calendar, and Contacts on Android Devices

February 25th, 2014 |
Enabling Native Email, Calendar, and Contacts on Android Devices

IT Best Practices: As Intel’s bring-your-own-device (BYOD) program grows and Android devices become more popular, Intel IT wants to help employees using these devices while also keeping the enterprise secure. We are delivering a native email solution that enables [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , ,

IT Best Practices: Data Center Site Selection

February 20th, 2014 |
IT Best Practices: Data Center Site Selection

IT Best Practices: Intel IT and Corporate Services, working as a team, have identified a range of factors to consider when choosing a data center site. When Intel experiences growth that requires investment in data center facilities, the project [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, data centers, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , ,

Inside IT: Intel’s Data Center Server Refresh Program

February 18th, 2014 |
Inside IT: Intel’s Data Center Server Refresh Program

IT Best Practices: Episode 69 – In previous podcasts we’ve examined Intel’s overhaul of its data center strategy, and how Intel IT looks to run its data center service like a factory. One key aspect of that strategy is [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, data centers, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , ,

Intel IT Business Review: Building stronger bridges between users and IT

February 14th, 2014 |
Intel IT Business Review: Building stronger bridges between users and IT

IT Best Practices: Teamwork starts with listening. Listening leads to understanding. Understanding fosters alignment and informed activity.

What sounds so simple and so fundamental isn’t always the norm. Often overwhelmed with new service requests, systems administration, infrastructure optimization, and [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel Tags: , , , , , , , , , ,

Intel IT Business Review: Accelerating and transforming product design

February 12th, 2014 |
Intel IT Business Review: Accelerating and transforming product design

IT Best Practices: Creating new products. Accelerating time to market. Expanding and evolving a world-wide design organization.

Supporting these efforts is hard enough. Driving them forward is even harder.

Some 20 years ago, the product design team at Intel [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel Tags: , , , , , , , , , ,

IT Business Review: Striking a balance between protection and enablement

February 10th, 2014 |
IT Business Review: Striking a balance between protection and enablement

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel Tags: , , , , , , , , , , ,

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , ,

Inside IT: Engineering Business Intelligence with the Cloud at Intel

February 4th, 2014 |
Inside IT: Engineering Business Intelligence with the Cloud at Intel

IT Best Practices: Episode 68 – The evolution of the cloud has had a profound impact on business. Cloud capabilities have opened up new opportunities, and have created new possibilities in the area of Business Intelligence. But this rapid [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , , , , ,

IT Business Value: My Connected Life

January 29th, 2014 |
IT Business Value: My Connected Life

IT Business Value: In this video, IT Labs explains our vision for what the future could look like by weaving together the data from multiple sources such as wearables, enterprise apps and other sources to make something wonderful. We [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , , , , , , , , , ,

Learnings from Early Native Apps Improve HTML5 and Hybrid Apps

January 28th, 2014 |
Learnings from Early Native Apps Improve HTML5 and Hybrid Apps

IT Best Practices: Over the past two years, Intel IT has validated and improved its mobile application development framework, Focusing first on native development, we identified best-known methods (BKMs) that we used to refine our framework and applied these [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,

Deploying Windows 8 on Intel Architecture-based Tablets: Intel’s Approach

January 15th, 2014 |
Deploying Windows 8 on Intel Architecture-based Tablets: Intel’s Approach

IT Best Practices: Intel IT believes that the combination of powerful Intel architecture-based tablets and Microsoft Windows 8 provides significant productivity benefits to employees, as well as improved manageability and information security capabilities. This paper describes our process and [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Technology, Video Podcast Tags: , , , , , , , , , , , , ,

Reducing Client Incidents through Big Data Predictive Analytics

January 13th, 2014 |
Reducing Client Incidents through Big Data Predictive Analytics

In 2013 Intel IT set a target to reduce all reported IT incidents requiring our attention by 40 percent by the end of the year. We devised a client incident prediction Proof of Concept (PoC) using Intel Distribution for Apache [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , ,

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Inside IT: An Update on Intel’s Data Center Strategy

December 24th, 2013 |
Inside IT: An Update on Intel’s Data Center Strategy

IT Best Practices: Episode 65 – Intel is a couple of years into an overhaul of its data center strategy. We’ve talked about that overhaul previously in this podcast series, but it’s a good time to catch up on [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , ,

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Intel IT: Blazing the Trail to Multi-Platform Apps

December 16th, 2013 |
Intel IT: Blazing the Trail to Multi-Platform Apps

IT Best Practices: In IT, the technical strategy and architecture group is responsible for driving the enterprise capabilities to support our efforts. This year, we are concentrating much of our energy towards the implementation of what we call five-star [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , ,

Transforming IT (and Intel): A pyramid of change for IT leaders

December 13th, 2013 |
Transforming IT (and Intel): A pyramid of change for IT leaders

IT Best Practices: While Intel IT has routinely received high marks for performance, I believe we can do more. I believe we can help transform the business in significant and impactful ways. This requires new thinking, new strategies, and [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , ,

Inside IT: Data Visualization

December 10th, 2013 |
Inside IT: Data Visualization

IT Best Practices: Episode 64 – We live in the era of big data. And big data comes with big challenges. One way business intelligence strategy is helping to turn those challenges into opportunities is data visualization. In this [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices:
Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,