IT@Intel channel:

Inside IT: Blazing Trails of Innovation

May 28th, 2013 |
Inside IT: Blazing Trails of Innovation

IT Best Practices: Episode 51 – Edward Goldman is Chief Technology Officer at Intel IT. He has another job title as well–General Manager of Strategy, Architecture, & Innovation, or the SAI group. It exists to blaze the trail for IT. [See the full post…]

Download Audio FileListen/download audio  

HPC Storage Systems Target Scalable Modular Designs to Boost Productivity

HPC Storage Systems Target Scalable Modular Designs to Boost Productivity

Intelligent Storage: This paper examines the size and status of the worldwide market for high-performance computing (HPC) storage systems, along with evolutionary trends affecting this market. The paper also looks at Intel and Xyratex as examples of vendors at the [See the full post…]

Download PDFRead/Download PDF  

New PC Delivery Process Cuts Employee Downtime

New PC Delivery Process Cuts Employee Downtime

IT Best Practices: As part of our focus on a user-centered model of delivering IT services, in 2012 Intel IT optimized its PC delivery process, resulting in improved Intel employee productivity, a better employee experience, and reduced operational costs. We [See the full post…]

Download PDFRead/Download PDF  

Inside IT: RSA 2013

May 14th, 2013 |
Inside IT: RSA 2013

IT Best Practices: Episode 50 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this podcast we hear [See the full post…]

Download Audio FileListen/download audio  

Rite Aid Manages Data Retention and Disaster Recovery with Intel-based Storage

Rite Aid Manages Data Retention and Disaster Recovery with Intel-based Storage

Intelligent Storage: Rite Aid deployed two Hitachi Data Systems HUS 130 storage arrays to provide a highly automated and flexible technology solution. Powered by Intel Xeon processor LC3528, these devices provide a reliable foundation for data archiving and disaster recovery [See the full post…]

Download PDFRead/Download PDF  

China’s Anhui Province Uses Intel-based Storage to Support Digital Hospitals

China’s Anhui Province Uses Intel-based Storage to Support Digital Hospitals

Intelligent Storage: To create patient-oriented “digital hospitals,” China seeks to implement a unified national hospital information system (HIS) platform, applying advanced network and digital technologies to hospitals and relevant medical fields.

Download PDFRead/Download PDF  

Scale-Out Storage for Today’s Demanding Workloads

Scale-Out Storage for Today’s Demanding Workloads

Intelligent Storage: NetApp scale-out storage solutions built with Intel Xeon processors enable companies to successfully handle the massive data growth and infrastructure complexities required for today’s demanding workloads. By optimizing data management at this tremendous scale, organizations can easily adapt [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Cloud Aware Code-a-Thon

April 30th, 2013 |
Inside IT: Cloud Aware Code-a-Thon

IT Best Practices: Episode 49 – Earlier this year, Intel conducted its second Cloud Aware Code-a-Thon. It’s an inventive way to get developers to think in new ways. In this podcast we talk to Cathy Spence, an Enterprise Architect in [See the full post…]

Download Audio FileListen/download audio  

Let’s Talk IT: KVM, Keyboard, Video, Mouse

April 26th, 2013 |
Let’s Talk IT: KVM, Keyboard, Video, Mouse

Let’s Talk IT: When an organization issues a laptop to an employee it usually marks the beginning of a relationship between the employee and the company’s IT folks. In a large company that could means tens of thousands of clients. [See the full post…]

Download Video FileWatch/download video  

Let’s Talk IT: What is vPro

Let’s Talk IT: What is vPro

Let’s Talk IT: In this episode host Michele Gartner chats with Richard Foote about vPro, and she gets a demo from Minh Pham who does a remote search and destroy of a virus on a client PC.

Download Video FileWatch/download video  

Inside IT: Balancing Security and a Great User Experience

April 2nd, 2013 |
Inside IT: Balancing Security and a Great User Experience

IT Best Practices: Episode 47 – Intel has implemented a new granular trust model to improve security throughout the enterprise. It’s designed to support key initiatives like IT consumerization and cloud computing. At the same time Intel wants to keep [See the full post…]

Download Audio FileListen/download audio  

Securely Connecting Smartphones and Tablets to the Enterprise

Securely Connecting Smartphones and Tablets to the Enterprise

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices [See the full post…]

Download PDFRead/Download PDF  

Inside IT: User-Centered IT

March 19th, 2013 |
Inside IT: User-Centered IT

IT Best Practices: Episode 46 – IT has developed a new partnership with its users over the past few years. Changes in technology, and the needs and demands of employees, have created new flexibility and greater choice for workers. Intel [See the full post…]

Download Audio FileListen/download audio  

Integrating Apache Hadoop into Intel’s Big Data Environment

Integrating Apache Hadoop into Intel’s Big Data Environment

IT Best Practices: Intel IT compared the Intel Distribution for Apache Hadoop software (Intel Distribution) to two other Apache Hadoop distributions using a well-defined set of evaluation criteria. The evaluation criteria included aspects of platform architecture; administration, operations, and support; [See the full post…]

Download PDFRead/Download PDF  

Making Better Business Decisions with Advanced Predictive Analytics

Making Better Business Decisions with Advanced Predictive Analytics

IT Best Practices: As velocity and complexity of Intel’s business accelerates, Intel IT has identified explosive opportunities for business intelligence — especially advanced analytics — to become a significant competitive differentiator for Intel. Intel IT, working with internal business groups, [See the full post…]

Download Video FileWatch/download video  

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big component [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |
IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery [See the full post…]

Download PDFRead/Download PDF  

2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

February 5th, 2013 |
2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

IT Business Value: Learn about Intel IT’s strategies and initiatives that are accelerating Intel’s business growth in the 2012-13 Intel IT Annual Performance Report. Learn how Intel IT is delivering business value through big data, cloud computing, consumerization of IT, [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

February 5th, 2013 |
Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the enterprise. [See the full post…]

Download Audio FileListen/download audio  

Getting a Headstart on Location-based Services in the Enterprise

January 31st, 2013 |
Getting a Headstart on Location-based Services in the Enterprise

IT Best Practices: Intel IT recognizes a great opportunity for the use of location-based services in the enterprise, and we are already piloting three location-based applications: FriendFinder, WayFinder, and You Are Here mapping that use location-based services. Employees can choose [See the full post…]

Download PDFRead/Download PDF  

IT Whitepaper: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

January 30th, 2013 |
IT Whitepaper: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Intel IT is currently evaluating the information security and privacy protection features of Intel architecture-based tablets running Windows 8 Enterprise. Our initial evaluations indicate that, together, Windows 8 and Intel architecture provide a compelling platform for mobile [See the full post…]

Download PDFRead/Download PDF  

IT Whitepaper: Deploying Microsoft Windows 8 in the Enterprise

January 27th, 2013 |
IT Whitepaper: Deploying Microsoft Windows 8 in the Enterprise

IT Best Practices: Intel IT is standardizing on Windows 8 as the primary operating system for business Ultrabook devices and Intel architecture-based tablets. We are accelerating the deployment readiness for business Ultrabook devices and tablets, and intend to make the [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Using Cloud with BYOD

January 23rd, 2013 |
IT Best Practices: Using Cloud with BYOD

IT Best Practices: As Intel IT builds cloud infrastructure and enables cloud services, one of the goals is to make those services available to as broad a range of devices as possible. To do so, we are integrating our cloud [See the full post…]

Download PDFRead/Download PDF  

eDiscovery in BYOD Environments

January 22nd, 2013 |
eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Deploying Microsoft Windows 8 in the Enterprise

January 22nd, 2013 |
Inside IT: Deploying Microsoft Windows 8 in the Enterprise

IT Best Practices: Episode 42 – Big changes are coming to the Intel workplace this year. In our last podcast we talked about the company’s Ultrabook rollout that’s taking place in 2013, expected to bring thousands of new devices to [See the full post…]

Download Audio FileListen/download audio