Intel IT channel:

Subscribe to Intel IT:
RSS Logo
RSS

Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

February 5th, 2013 |
Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the enterprise. [See the full post…]

Download Audio FileListen/download audio  

Getting a Headstart on Location-based Services in the Enterprise

January 31st, 2013 |
Getting a Headstart on Location-based Services in the Enterprise

IT Best Practices: Intel IT recognizes a great opportunity for the use of location-based services in the enterprise, and we are already piloting three location-based applications: FriendFinder, WayFinder, and You Are Here mapping that use location-based services. Employees can choose [See the full post…]

Download PDFRead/Download PDF  

IT Whitepaper: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

January 30th, 2013 |
IT Whitepaper: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Intel IT is currently evaluating the information security and privacy protection features of Intel architecture-based tablets running Windows 8 Enterprise. Our initial evaluations indicate that, together, Windows 8 and Intel architecture provide a compelling platform for mobile [See the full post…]

Download PDFRead/Download PDF  

IT Whitepaper: Deploying Microsoft Windows 8 in the Enterprise

January 27th, 2013 |
IT Whitepaper: Deploying Microsoft Windows 8 in the Enterprise

IT Best Practices: Intel IT is standardizing on Windows 8 as the primary operating system for business Ultrabook devices and Intel architecture-based tablets. We are accelerating the deployment readiness for business Ultrabook devices and tablets, and intend to make the [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Using Cloud with BYOD

January 23rd, 2013 |
IT Best Practices: Using Cloud with BYOD

IT Best Practices: As Intel IT builds cloud infrastructure and enables cloud services, one of the goals is to make those services available to as broad a range of devices as possible. To do so, we are integrating our cloud [See the full post…]

Download PDFRead/Download PDF  

eDiscovery in BYOD Environments

January 22nd, 2013 |
eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Deploying Microsoft Windows 8 in the Enterprise

January 22nd, 2013 |
Inside IT: Deploying Microsoft Windows 8 in the Enterprise

IT Best Practices: Episode 42 – Big changes are coming to the Intel workplace this year. In our last podcast we talked about the company’s Ultrabook rollout that’s taking place in 2013, expected to bring thousands of new devices to [See the full post…]

Download Audio FileListen/download audio  

Using Data Anonymization To Enhance Cloud Security

January 21st, 2013 |
Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our [See the full post…]

Download PDFRead/Download PDF  

Private Cloud PaaS – Accelerating Application Deployment

January 20th, 2013 |
Private Cloud PaaS – Accelerating Application Deployment

IT Best Practices: Intel IT is implementing platform as a service (PaaS) to accelerate custom application deployment and promote cloud-aware application design. Our traditional application deployment process is less-than-ideal, taking as much as 140 days to deploy a new application. [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |
IT Best Practices: Protecting the Perimeter

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Deploying Ultrabooks in the Enterprise

January 8th, 2013 |
Inside IT: Deploying Ultrabooks in the Enterprise

IT Best Practices: Episode 41 – The look of the modern workplace is changing all the time. The way people worked five years ago is significantly different from the way they work now, which in turn will be substantially different [See the full post…]

Download Audio FileListen/download audio  

If Your Information Could Talk… Cyber-Safety in Social Media

December 20th, 2012 |
If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at mcafee.com/advice.

Download Video FileWatch/download video  

Inside IT: Re-imagining Intel.com

December 18th, 2012 |
Inside IT: Re-imagining Intel.com

IT Best Practices: Episode 40 – The role of a corporate web site has evolved. It’s no longer just a static source of information. It’s the place where a company creates and maintains a relationship with the world of customers, [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Self-Service Business Intelligence

December 4th, 2012 |
Inside IT: Self-Service Business Intelligence

IT Best Practices: Episode 39 – You could say that Business Intelligence is the collective knowledge of an enterprise. How intelligent a particular business is depends on a lot of factors, but the ability to make sense of a vast [See the full post…]

Download Audio FileListen/download audio  

Granular Trust Model – Improving Enterprise Security

November 30th, 2012 |
Granular Trust Model – Improving Enterprise Security

IT Best Practices: Intel IT has completed a pilot of its granular trust model, designed to support key initiatives such as IT consumerization and cloud computing. This trust model provides dynamic security controls and user access to reduce enterprise risk [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Developing a Hybrid Cloud Environment

November 20th, 2012 |
Inside IT: Developing a Hybrid Cloud Environment

IT Best Practices: Episode 38 – More and more, Intel is offering consumer-facing web services, like the AppUp store. That creates new challenges – consumers expect web services to be always available, and demand for services can spike or drop [See the full post…]

Download Audio FileListen/download audio  

Big Data Drives Innovation for Automotive Manufacturer

November 16th, 2012 |
Big Data Drives Innovation for Automotive Manufacturer

Intelligent Storage: How Jaguar Land Rover made the best use of big data and HPC to design the award-winning Evoque. Manufacturing customers are turning to Intel technologies to make more efficient use of big data for high-performance computing, analysis, and [See the full post…]

Download Video FileWatch/download video  

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Download Video FileWatch/download video  

Inside IT: Exploring a Bring-Your-Own-Device Stipend at Intel

November 6th, 2012 |
Inside IT: Exploring a Bring-Your-Own-Device Stipend at Intel

IT Best Practices: Episode 37 – Consumerization is a big trend in the enterprise. Intel is at the forefront of this trend, with an extensive BYO program. Tens of thousands of employee-owned smart phones and tablets are now in use [See the full post…]

Download Audio FileListen/download audio  

Inside IT: The Evolving Role of IT

October 23rd, 2012 |
Inside IT: The Evolving Role of IT

IT Best Practices: Episode 36 – It’s the essence of this podcast series – the change of IT’s place in the organization, and the role IT plays in relation to all the business units in the company. In this episode [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Evaluating Ultrabook Devices for the Enterprise

October 9th, 2012 |
Inside IT: Evaluating Ultrabook Devices for the Enterprise

IT Best Practices: Episode 35 – The variety of ways we connect and compute is very different from even a few years ago. And it’s changing all the time. More devices are making their way into the enterprise, allowing employees [See the full post…]

Download Audio FileListen/download audio  

Intel IT Annual Report: 2012 Mid-Year Update

September 17th, 2012 |
Intel IT Annual Report: 2012 Mid-Year Update

Intel IT Annual Report: 2012 mid-year update that shares progress on key strategic initiatives that delivered business value to Intel — cloud computing, IT consumerization, business intelligence, social computing and enterprise security.

Download PDFRead/Download PDF  

Inside IT: Migrating to an Intel Architecture Platform in Silicon Design

September 11th, 2012 |
Inside IT: Migrating to an Intel Architecture Platform in Silicon Design

IT Best Practices: Episode 33 – In a previous podcast we discussed migrating mission-critical systems to Intel architecture. We outlined the process Intel has undergone to move from a RISC-based platform in the 90s to a complete Intel architecture-based platform [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Service Transformation to Increase Business Velocity

August 28th, 2012 |
Inside IT: Service Transformation to Increase Business Velocity

IT Best Practices: Episode 32 – Information Technology is no longer just a technology provider. It has become a key partner in every aspect of the business. To reflect that change, Intel IT is in the midst of a transformation [See the full post…]

Download Audio FileListen/download audio  

Building a Mobile Application Development Framework

Building a Mobile Application Development Framework

IT Best Practices: Intel IT created a framework that enables the successful planning, development and production of mobile applications. Project teams can use the framework to evaluate the suitability of applications for mobile use cases, follow governance standards, and identify [See the full post…]

Download PDFRead/Download PDF