IT White Papers channel:

IT Best Practices for Operating System Deployment

December 2nd, 2015 |
IT Best Practices for Operating System Deployment

IT Best Practices: As part of managing the more than 100,000 PCs in use at Intel, Intel IT spends a significant amount of time and effort managing operating system deployment. Historically, new OS versions have been released every few years. [See the full post…]

Download PDFRead/Download PDF  

Delivering Strategic Business Value with Automated In-House Testing

November 5th, 2015 |
Delivering Strategic Business Value with Automated In-House Testing

IT Best Practices: Intel IT is transforming our in-house testing environment to deliver better feedback more quickly to Intel’s product development groups. Intel employees use Intel’s products to do their jobs every day. Intel IT deploys and monitors the performance [See the full post…]

Download PDFRead/Download PDF  

Intel’s Integrated Analytics Platform Helps Sales and Marketing

October 26th, 2015 |
Intel’s Integrated Analytics Platform Helps Sales and Marketing

IT Best Practices: Intel IT is building an analytics platform that integrates and connects business intelligence (BI) data using a data lake model to reduce insight latency from months to days. Eventually, we aim to reduce data insight latency to [See the full post…]

Download PDFRead/Download PDF  

IoT Plus Advanced Data Analytics Improve Manufacturing Results

October 23rd, 2015 |
IoT Plus Advanced Data Analytics Improve Manufacturing Results

IT Best Practices: The factories’ IT engineers realize the potential value of IoT and large-scale data analytics in three ways: analyzing volumes of data, identifying what is useful, and reporting that data in a way that meets the needs of [See the full post…]

Download PDFRead/Download PDF  

Insider Threat Field Guide

October 21st, 2015 |
Insider Threat Field Guide

IT Best Practices: One of the most serious security challenges facing enterprises today is that of insider threat. However, many enterprises do not fully understand the scope of the problem and until recently, there has been a lack of tools [See the full post…]

Download PDFRead/Download PDF  

Taking enterprise security beyond the edge

October 20th, 2015 |
Taking enterprise security beyond the edge

IT Best Practices: Intel IT is developing a beyond-the-edge security strategy that will enhance security in our environment. This new strategy addresses several drawbacks with today’s approach to security.

Download PDFRead/Download PDF  

Hyperscan Pattern Matching Across Intel Processors

October 20th, 2015 |
Hyperscan Pattern Matching Across Intel Processors

Software Defined Infrastructure: This paper reviews the content inspection performance data and demonstrates Hyperscan’s ability to deliver scalable pattern matching throughput performance when running on entry-level Intel Atom to high-end Intel Xeon processors.

Download PDFRead/Download PDF  

SaaS Security: Best Practices for Minimizing Risk

October 13th, 2015 |
SaaS Security: Best Practices for Minimizing Risk

IT Best Practices: To support Intel business groups’ increasing demand for software-as-a-service (SaaS) applications, Intel IT has developed several best practices that can help enhance SaaS security and protect Intel’s intellectual property. SaaS applications can provide efficiency and agility, cost [See the full post…]

Download PDFRead/Download PDF  

Intel Xeon Processor E3 v4 Series Processors for Media Processing in the Network

October 13th, 2015 |
Intel Xeon Processor E3 v4 Series Processors for Media Processing in the Network

Intelligent Compute: Platform Brief: Provides a software overview, features, and benefits of the Intel Xeon processor E3-1200 v4 series, which is designed to deliver large numbers of video transcoding channels per watt for demanding media processing applications.

Download PDFRead/Download PDF  

Virtualizing Suricata IPS using Hyperscan DPI Technology

September 29th, 2015 |
Virtualizing Suricata IPS using Hyperscan DPI Technology

Software Defined Infrastructure: This paper examines the pattern matching performance Hyperscan delivers in virtualized environments when combined with Suricata, a fast-growing, open-source Intrusion Prevention and Detection (IPS/IDS) security application supported by OISF.

Download PDFRead/Download PDF  

Cisco Systems and Intel Corporation: NFV Partnership

Cisco Systems and Intel Corporation: NFV Partnership

Intelligent Networking: This document details the first steps in the strategic partnership between Intel Corporation and Cisco Systems Inc. to make Network Function Virtualization (NFV) part of a flexible, open and successful transformation in service creation for their Service Provider [See the full post…]

Download PDFRead/Download PDF  

Going Virtual: Intel and Red Hat Demonstrate SDN Service-Chaining Solution

Going Virtual: Intel and Red Hat Demonstrate SDN Service-Chaining Solution

Intelligent Networking: The new foundation being established for dynamic service chaining builds on the technologies that underlie SDN and NFV. The blueprint offered by the Intel Open Network Platform Server reference architecture provides a commercially viable way—based on SDN—to create [See the full post…]

Download PDFRead/Download PDF  

Going Virtual: Intel and Red Hat Demonstrate SDN Service-Chaining Solution

Going Virtual: Intel and Red Hat Demonstrate SDN Service-Chaining Solution

Intelligent Networking: The new foundation being established for dynamic service chaining builds on the technologies that underlie SDN and NFV. The blueprint offered by the Intel Open Network Platform Server reference architecture provides a commercially viable way—based on SDN—to create [See the full post…]

Download PDFRead/Download PDF  

Why Service Assurance Is Needed in an NFV Environment

Why Service Assurance Is Needed in an NFV Environment

Intelligent Networking: This paper outlines an approach for Service Assurance in an SDN/NFV world that enables more open and deterministic service deployment and resource usage.

Download PDFRead/Download PDF  

Virtual Video Transcoding in the Cloud

Virtual Video Transcoding in the Cloud

Software Defined Infrastructure: This paper presents the market drivers behind the need for an accelerated video cloud and discusses the implications of technologies such as OpenStack* and other open source platforms in the context of a move towards SDN/NFV network [See the full post…]

Download PDFRead/Download PDF  

Fairfield-Suisun Unified School District: Chromebooks with Intel Technology Boost Wireless Reliability

Fairfield-Suisun Unified School District: Chromebooks with Intel Technology Boost Wireless Reliability

Business Solutions for IT Managers: Chromebooks with Intel processors and wireless technologies deliver reliable access for teaching and learning at California’s Fairfield-Suisun Unified School District.

Download PDFRead/Download PDF  

Scaling Storage Solutions with Intel and VMware

Scaling Storage Solutions with Intel and VMware

Intelligent Storage: Intel and VMware are working together to provide foundational technologies for intelligent, software-defined storage solutions.  These solutions utilize Intel Xeon processors, 10 Gigabit Intel Ethernet Converged Network Adapters, Intel Solid-State Drive (SSD) Data Center Family and VMware Virtual [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: The Relevance of Desktop Computing in a Mobile Enterprise

IT Best Practices: The Relevance of Desktop Computing in a Mobile Enterprise

IT Best Practices: While Intel’s PC fleet consists primarily of Intel architecture-based mobile devices, such as business Ultrabook devices, tablets, and a growing number of 2-in-1 devices, familiar desktop-class PCs continue to fill an important role. In fact these PCs [See the full post…]

Download PDFRead/Download PDF  

eHarmony: Enhancing Cloud Analytics with Intel Xeon Processors

eHarmony: Enhancing Cloud Analytics with Intel Xeon Processors

Business Solutions for IT Managers: eHarmony enhances its matchmaking prowess with cloud-based data analytics using Cloudera software and servers based on Intel Xeon processors.

Download PDFRead/Download PDF  

Magyar Telekom: Digital Future Today

Magyar Telekom: Digital Future Today

Intelligent Compute: Magyar Telekom is the first company to offer its customers Intel processor-based digital signage solutions provided by T-Systems Hungary at its points of sale.

Download PDFRead/Download PDF  

iWARP Update: RDMA Over 40Gb for Data Center & Cloud Applications

iWARP Update: RDMA Over 40Gb for Data Center & Cloud Applications

Intelligent Networking: The demand for low-latency network throughput for big data applications has spread to clouds and data centers. iWARP performance has improved, and ease of deployment—a significant concern for enterprise applications—has been dramatically simplified. The result is that iWARP [See the full post…]

Download PDFRead/Download PDF  

Wiltshire Police: Community-Centric Policing

Wiltshire Police: Community-Centric Policing

Business Solutions for IT Managers: Wiltshire Police officers use Intel technology-powered devices to escape their desks and work among the community.

Download PDFRead/Download PDF  

Digitopia: In the Market for Innovation

Digitopia: In the Market for Innovation

Business Solutions for IT Managers: Belgian shopping district sets the standard for digital retail with Digitopia and Intel NUC and Intel Atom processor.

Download PDFRead/Download PDF  

Yoga Systems: Securing the Smart Home

Yoga Systems: Securing the Smart Home

Business Solutions for IT Managers: Yoga Systems harnesses the Intel IoT Gateway to deliver its secure, end-to-end Yoga Smart Home cloud-based platform to service providers.

Download PDFRead/Download PDF  

Intel Software Defined Infrastructure (Intel SDI) Enables Internet of Things (IoT) Intelligence

Intel Software Defined Infrastructure (Intel SDI) Enables Internet of Things (IoT) Intelligence

Intelligent Compute: Intel’s concept of software-defined infrastructure (SDI) extends the definition of the software-defined data center (SDDC). SDI is a re-evaluation of system architecture driven by the requirements of business flow, workloads, and specific applications.

Download PDFRead/Download PDF