information technology tagged posts:

IT Business Review: Striking a balance between protection and enablement

February 10th, 2014 |
IT Business Review: Striking a balance between protection and enablement

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more capable [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this line. [See the full post…]

Download Video FileWatch/download video  

Inside IT: Engineering Business Intelligence with the Cloud at Intel

February 4th, 2014 |
Inside IT: Engineering Business Intelligence with the Cloud at Intel

IT Best Practices: Episode 68 – The evolution of the cloud has had a profound impact on business. Cloud capabilities have opened up new opportunities, and have created new possibilities in the area of Business Intelligence. But this rapid evolution [See the full post…]

Download Audio FileListen/download audio  

IT Business Value: My Connected Life

January 29th, 2014 |
IT Business Value: My Connected Life

IT Business Value: In this video, IT Labs explains our vision for what the future could look like by weaving together the data from multiple sources such as wearables, enterprise apps and other sources to make something wonderful. We see [See the full post…]

Download Video FileWatch/download video  

Learnings from Early Native Apps Improve HTML5 and Hybrid Apps

January 28th, 2014 |
Learnings from Early Native Apps Improve HTML5 and Hybrid Apps

IT Best Practices: Over the past two years, Intel IT has validated and improved its mobile application development framework, Focusing first on native development, we identified best-known methods (BKMs) that we used to refine our framework and applied these methods [See the full post…]

Download PDFRead/Download PDF  

Innovatrics: Enhancing Biometrics Systems with a Faster, More Accurate Solution

January 17th, 2014 |
Innovatrics: Enhancing Biometrics Systems with a Faster, More Accurate Solution

Business Solutions for IT Managers: Innovatrics improves the performance of its fingerprint matching software with a solution based on the Intel Xeon processor E5-2600 v2 product family, enabling high-speed fingerprint matching with a worldwide reach.

Download PDFRead/Download PDF  

Deploying Windows 8 on Intel Architecture-based Tablets: Intel’s Approach

January 15th, 2014 |
Deploying Windows 8 on Intel Architecture-based Tablets: Intel’s Approach

IT Best Practices: Intel IT believes that the combination of powerful Intel architecture-based tablets and Microsoft Windows 8 provides significant productivity benefits to employees, as well as improved manageability and information security capabilities. This paper describes our process and best [See the full post…]

Download Video FileWatch/download video  

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy office. [See the full post…]

Download Audio FileListen/download audio  

Inside IT: An Update on Intel’s Data Center Strategy

December 24th, 2013 |
Inside IT: An Update on Intel’s Data Center Strategy

IT Best Practices: Episode 65 – Intel is a couple of years into an overhaul of its data center strategy. We’ve talked about that overhaul previously in this podcast series, but it’s a good time to catch up on the [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At [See the full post…]

Download Video FileWatch/download video  

Intel IT: Blazing the Trail to Multi-Platform Apps

December 16th, 2013 |
Intel IT: Blazing the Trail to Multi-Platform Apps

IT Best Practices: In IT, the technical strategy and architecture group is responsible for driving the enterprise capabilities to support our efforts. This year, we are concentrating much of our energy towards the implementation of what we call five-star applications. [See the full post…]

Download PDFRead/Download PDF  

Transforming IT (and Intel): A pyramid of change for IT leaders

December 13th, 2013 |
Transforming IT (and Intel): A pyramid of change for IT leaders

IT Best Practices: While Intel IT has routinely received high marks for performance, I believe we can do more. I believe we can help transform the business in significant and impactful ways. This requires new thinking, new strategies, and a [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Data Visualization

December 10th, 2013 |
Inside IT: Data Visualization

IT Best Practices: Episode 64 – We live in the era of big data. And big data comes with big challenges. One way business intelligence strategy is helping to turn those challenges into opportunities is data visualization. In this podcast [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social [See the full post…]

Download Video FileWatch/download video  

Inside IT: On the Leading Edge of Change at Intel IT

November 26th, 2013 |
Inside IT: On the Leading Edge of Change at Intel IT

IT Best Practices: Episode 63 – The story of IT in the last few years is a story of change. The IT organization has undergone a transformation, as technology has affected the way people in the enterprise engage in their [See the full post…]

Download Audio FileListen/download audio  

Delivering Self-Service BI, Data Visualization, and Big Data Analytics

November 25th, 2013 |
Delivering Self-Service BI, Data Visualization, and Big Data Analytics

IT Best Practices: Over the last five years, Intel IT has evolved its approach to BI solutions for Intel’s worldwide sales organization to enable rapid delivery of advanced self-service business intelligence (BI) and data visualization capabilities. By moving to a [See the full post…]

Download PDFRead/Download PDF  

Intel IT Labs and Big Data

November 25th, 2013 |
Intel IT Labs and Big Data

IT Best Practices: Over the past few years, we have investigated the concept behind the big data technologies and now have much of the capabilities running in our production environment. The IT Labs continue their work to explore new and [See the full post…]

Download PDFRead/Download PDF  

One big data strategy, three Massively Parallel Processing platforms (MPP)

November 25th, 2013 |
One big data strategy, three Massively Parallel Processing platforms (MPP)

IT Best Practices: Let’s face it: big data is still very new. And that means the infrastructure platforms on which big data analytics are performed are also relatively immature. What it doesn’t mean, however, is that organizations can’t or shouldn’t [See the full post…]

Download PDFRead/Download PDF  

Intel IT’s big data journey (so far)

November 25th, 2013 |
Intel IT’s big data journey (so far)

IT Best Practices: Businesses are often guilty of operating at a pace that is measured and process driven, in reactive fashion. These businesses observe a problem or development in the marketplace and then collect data to understand and act upon [See the full post…]

Download PDFRead/Download PDF  

Big data analytics: Pursuing multi-million dollar opportunities

November 22nd, 2013 |
Big data analytics: Pursuing multi-million dollar opportunities

IT Best Practices: Five people. Six months. $10 million in ROI. Those were the parameters and goals of Intel IT’s initial big data projects, which started in earnest three years ago. “We wanted to prove that big data analytics are [See the full post…]

Download PDFRead/Download PDF  

Intel IT Best Practices for Implementing Apache Hadoop Software

November 20th, 2013 |
Intel IT Best Practices for Implementing Apache Hadoop Software

IT Best Practices: In an age when organizations such as Intel are rich in data, the true value of this data lies in the ability to collect, sort, and analyze it to derive actionable business intelligence (BI). Recognizing the need [See the full post…]

Download PDFRead/Download PDF  

Configuring an In-Memory BI Platform for Extreme Performance

November 19th, 2013 |
Configuring an In-Memory BI Platform for Extreme Performance

IT Best Practices: To deliver the extreme query responsiveness required for real-time analysis of high-volume data sets, Intel IT conducted tests to find the optimal platform for a cost-effective, high-performance in-memory business intelligence (BI) solution. Performing server-sizing and stress tests [See the full post…]

Download PDFRead/Download PDF  

Inside IT: McAfee Drive Encryption at Intel

November 12th, 2013 |
Inside IT: McAfee Drive Encryption at Intel

IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In the [See the full post…]

Download Audio FileListen/download audio  

IT Business Value: Efficiently Assessing the IT Business Value of Diverse Investments

November 11th, 2013 |
IT Business Value: Efficiently Assessing the IT Business Value of Diverse Investments

IT Best Practices: As part of an evolution in how we assess IT business value for investments, Intel IT and Intel Finance have developed a framework that is faster and more scalable than our previous processes. This new Business Value [See the full post…]

Download PDFRead/Download PDF  

Android Devices in a BYOD Environment

November 7th, 2013 |
Android Devices in a BYOD Environment

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google [See the full post…]

Download PDFRead/Download PDF