Featured channel:

University Campus Suffolk: Empowering Next-Gen Game Designers

January 12th, 2015 |
University Campus Suffolk: Empowering Next-Gen Game Designers

Business Solutions for IT Managers: The Intel Xeon processor E5 family and Fujitsu CELSIUS M730 workstations bring professional-standard hardware to the Computer Games Design degree course at University Campus Suffolk.

Download Video FileWatch/download video  

Storage Tiering & Cold Storage Animation

December 12th, 2014 |
Storage Tiering & Cold Storage Animation

Intelligent Storage: Automate and monitor storage tiering for the best access to your data and to balance retrieval speeds versus costs with automated software powered by Intel processors.

Download Video FileWatch/download video  

Ludwik Rydygier Regional Hospital: Efficient Management for Better Patient Care

December 12th, 2014 |
Ludwik Rydygier Regional Hospital: Efficient Management for Better Patient Care

Business Solutions for IT Managers: Introducing a complete system and Windows 8.1 tablets with Intel processors has helped convert the Regional Hospital in Suwalki, Poland, into a modern, competitive and well managed medical facility.

Download Video FileWatch/download video  

California Visiting Nurses Association: Boosting Mobile Productivity

October 16th, 2014 |
California Visiting Nurses Association: Boosting Mobile Productivity

Business Solutions for IT Managers: California Visiting Nurses Association makes patient care easier and more efficient with help from Dell laptopswith Intel Core i5 vPro processors.

Download Video FileWatch/download video  

Big Data: Rethink Privacy

Big Data: Rethink Privacy

IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting traditional principles of fair information practices in a [See the full post…]

Download Video FileWatch/download video  

Bankinter: Innovating Contract Signing with Intel Technology

Bankinter: Innovating Contract Signing with Intel Technology

Business Solutions for IT Managers: Intel Atom processor-based tablets run digital contract software to make closing deals easier for BankInter, one of the top five listed banks in Spain.

Download Video FileWatch/download video  

Payleven and Intel Enable Mobile Payments

September 29th, 2014 |
Payleven and Intel Enable Mobile Payments

Business Solutions for IT Managers: Payleven offers a secure solution to let businesses to accept card payments anytime and anywhere by connecting card readers on Intel processor-based tablets.

Download Video FileWatch/download video  

How to Improve Patient Engagement

How to Improve Patient Engagement

Business Solutions for IT Managers: In this video, see how software from Meditech and Dell devices with Intel technology inside are helping healthcare facilities improve patient outcomes and engagement while reducing costs.

Download Video FileWatch/download video  

Nestle – mobility in the field

Nestle – mobility in the field

Business Solutions for IT Managers: Nestle provides mobility to its Czech Republic sales team with 2 in 1 devices powered by the Intel Atom processor enabling the sales force to access information on the go, process customer orders away from [See the full post…]

Download Video FileWatch/download video  

Intel and Dell Keep Caterham F1 on Track

Intel and Dell Keep Caterham F1 on Track

Business Solutions for IT Managers: Intel, Dell, and Caterham work together to ensure the Caterham Formula 1 racing team can perform 100 percent of the time, both on and off the track.

Download Video FileWatch/download video  

Northern Michigan University: Anytime, Anywhere Learning

Northern Michigan University: Anytime, Anywhere Learning

Business Solutions for IT Managers: Northern Michigan University invigorates learning and collaboration by equipping students and faculty with Ultrabook 2 in 1 devices powered by Intel Core i5 processors.

Download Video FileWatch/download video  

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this line. [See the full post…]

Download Video FileWatch/download video  

The Habit Restaurants: Revolutionizing Operations with Intel Atom Processors and Windows 8 Tablets

January 31st, 2014 |
The Habit Restaurants: Revolutionizing Operations with Intel Atom Processors and Windows 8 Tablets

Business Solutions for IT Managers: The Habit Restaurants reduces customer wait times, increases employee productivity, and supports 40 percent growth using Dell tablets with Intel Atom processors and Windows 8.

Download Video FileWatch/download video  

IT Business Value: My Connected Life

January 29th, 2014 |
IT Business Value: My Connected Life

IT Business Value: In this video, IT Labs explains our vision for what the future could look like by weaving together the data from multiple sources such as wearables, enterprise apps and other sources to make something wonderful. We see [See the full post…]

Download Video FileWatch/download video  

Deploying Windows 8 on Intel Architecture-based Tablets: Intel’s Approach

January 15th, 2014 |
Deploying Windows 8 on Intel Architecture-based Tablets: Intel’s Approach

IT Best Practices: Intel IT believes that the combination of powerful Intel architecture-based tablets and Microsoft Windows 8 provides significant productivity benefits to employees, as well as improved manageability and information security capabilities. This paper describes our process and best [See the full post…]

Download Video FileWatch/download video  

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At [See the full post…]

Download Video FileWatch/download video  

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social [See the full post…]

Download Video FileWatch/download video  

BMW: Revving Up the Power with Ultrabook 2 in 1 Devices

November 13th, 2013 |
BMW: Revving Up the Power with Ultrabook 2 in 1 Devices

Business Solutions for IT Managers: BMW Group gets speed, power, and energy efficiency to meet its key business challenges by providing Intel Core vPro processor-based Ultrabook 2 in 1 devices to its employees around the world.

Download Video FileWatch/download video  

Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

November 6th, 2013 |
Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

Business Solutions for IT Managers: In Ultrabooks and Windows 8 Professional, Ceiba Solutions sees opportunities to enhance productivity, security, and innovation for lab scientists.

Download Video FileWatch/download video  

Video: Hackensack University Medical Center: Bringing IT to the Next Level

November 4th, 2013 |
Video: Hackensack University Medical Center:  Bringing IT to the Next Level

Business Solutions for IT Managers: New Jersey’s Hackensack University Medical Center handles its ever-growing data volume and stays on budget with help from the Intel Xeon processor E5 family.

Download Video FileWatch/download video  

Erasure Code and Intel Intelligent Storage Acceleration Library

October 29th, 2013 |
Erasure Code and Intel Intelligent Storage Acceleration Library

Intelligent Storage: Erasure Code and Intel Intelligent Storage Acceleration Library.

Download Video FileWatch/download video  

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief [See the full post…]

Download Video FileWatch/download video