Intel IT tagged posts:

Subscribe to Intel IT:
RSS Logo
RSS

Securely Connecting Smartphones and Tablets to the Enterprise

Securely Connecting Smartphones and Tablets to the Enterprise

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices [See the full post…]

Download PDFRead/Download PDF  

Inside IT: User-Centered IT

March 19th, 2013 |
Inside IT: User-Centered IT

IT Best Practices: Episode 46 – IT has developed a new partnership with its users over the past few years. Changes in technology, and the needs and demands of employees, have created new flexibility and greater choice for workers. Intel [See the full post…]

Download Audio FileListen/download audio  

Integrating Apache Hadoop into Intel’s Big Data Environment

Integrating Apache Hadoop into Intel’s Big Data Environment

IT Best Practices: Intel IT compared the Intel Distribution for Apache Hadoop software (Intel Distribution) to two other Apache Hadoop distributions using a well-defined set of evaluation criteria. The evaluation criteria included aspects of platform architecture; administration, operations, and support; [See the full post…]

Download PDFRead/Download PDF  

Making Better Business Decisions with Advanced Predictive Analytics

Making Better Business Decisions with Advanced Predictive Analytics

IT Best Practices: As velocity and complexity of Intel’s business accelerates, Intel IT has identified explosive opportunities for business intelligence — especially advanced analytics — to become a significant competitive differentiator for Intel. Intel IT, working with internal business groups, [See the full post…]

Download Video FileWatch/download video  

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big component [See the full post…]

Download Audio FileListen/download audio  

2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

February 5th, 2013 |
2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

IT Business Value: Learn about Intel IT’s strategies and initiatives that are accelerating Intel’s business growth in the 2012-13 Intel IT Annual Performance Report. Learn how Intel IT is delivering business value through big data, cloud computing, consumerization of IT, [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

February 5th, 2013 |
Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the enterprise. [See the full post…]

Download Audio FileListen/download audio  

Getting a Headstart on Location-based Services in the Enterprise

January 31st, 2013 |
Getting a Headstart on Location-based Services in the Enterprise

IT Best Practices: Intel IT recognizes a great opportunity for the use of location-based services in the enterprise, and we are already piloting three location-based applications: FriendFinder, WayFinder, and You Are Here mapping that use location-based services. Employees can choose [See the full post…]

Download PDFRead/Download PDF  

IT Whitepaper: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

January 30th, 2013 |
IT Whitepaper: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Intel IT is currently evaluating the information security and privacy protection features of Intel architecture-based tablets running Windows 8 Enterprise. Our initial evaluations indicate that, together, Windows 8 and Intel architecture provide a compelling platform for mobile [See the full post…]

Download PDFRead/Download PDF  

IT Whitepaper: Deploying Microsoft Windows 8 in the Enterprise

January 27th, 2013 |
IT Whitepaper: Deploying Microsoft Windows 8 in the Enterprise

IT Best Practices: Intel IT is standardizing on Windows 8 as the primary operating system for business Ultrabook devices and Intel architecture-based tablets. We are accelerating the deployment readiness for business Ultrabook devices and tablets, and intend to make the [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Using Cloud with BYOD

January 23rd, 2013 |
IT Best Practices: Using Cloud with BYOD

IT Best Practices: As Intel IT builds cloud infrastructure and enables cloud services, one of the goals is to make those services available to as broad a range of devices as possible. To do so, we are integrating our cloud [See the full post…]

Download PDFRead/Download PDF  

eDiscovery in BYOD Environments

January 22nd, 2013 |
eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Deploying Microsoft Windows 8 in the Enterprise

January 22nd, 2013 |
Inside IT: Deploying Microsoft Windows 8 in the Enterprise

IT Best Practices: Episode 42 – Big changes are coming to the Intel workplace this year. In our last podcast we talked about the company’s Ultrabook rollout that’s taking place in 2013, expected to bring thousands of new devices to [See the full post…]

Download Audio FileListen/download audio  

Using Data Anonymization To Enhance Cloud Security

January 21st, 2013 |
Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our [See the full post…]

Download PDFRead/Download PDF  

Private Cloud PaaS – Accelerating Application Deployment

January 20th, 2013 |
Private Cloud PaaS – Accelerating Application Deployment

IT Best Practices: Intel IT is implementing platform as a service (PaaS) to accelerate custom application deployment and promote cloud-aware application design. Our traditional application deployment process is less-than-ideal, taking as much as 140 days to deploy a new application. [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Deploying Ultrabooks in the Enterprise

January 8th, 2013 |
Inside IT: Deploying Ultrabooks in the Enterprise

IT Best Practices: Episode 41 – The look of the modern workplace is changing all the time. The way people worked five years ago is significantly different from the way they work now, which in turn will be substantially different [See the full post…]

Download Audio FileListen/download audio  

If Your Information Could Talk… Cyber-Safety in Social Media

December 20th, 2012 |
If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at mcafee.com/advice.

Download Video FileWatch/download video  

Inside IT: Re-imagining Intel.com

December 18th, 2012 |
Inside IT: Re-imagining Intel.com

IT Best Practices: Episode 40 – The role of a corporate web site has evolved. It’s no longer just a static source of information. It’s the place where a company creates and maintains a relationship with the world of customers, [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Self-Service Business Intelligence

December 4th, 2012 |
Inside IT: Self-Service Business Intelligence

IT Best Practices: Episode 39 – You could say that Business Intelligence is the collective knowledge of an enterprise. How intelligent a particular business is depends on a lot of factors, but the ability to make sense of a vast [See the full post…]

Download Audio FileListen/download audio  

Granular Trust Model – Improving Enterprise Security

November 30th, 2012 |
Granular Trust Model – Improving Enterprise Security

IT Best Practices: Intel IT has completed a pilot of its granular trust model, designed to support key initiatives such as IT consumerization and cloud computing. This trust model provides dynamic security controls and user access to reduce enterprise risk [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Developing a Hybrid Cloud Environment

November 20th, 2012 |
Inside IT: Developing a Hybrid Cloud Environment

IT Best Practices: Episode 38 – More and more, Intel is offering consumer-facing web services, like the AppUp store. That creates new challenges – consumers expect web services to be always available, and demand for services can spike or drop [See the full post…]

Download Audio FileListen/download audio  

Big Data Drives Innovation for Automotive Manufacturer

November 16th, 2012 |
Big Data Drives Innovation for Automotive Manufacturer

Intelligent Storage: How Jaguar Land Rover made the best use of big data and HPC to design the award-winning Evoque. Manufacturing customers are turning to Intel technologies to make more efficient use of big data for high-performance computing, analysis, and [See the full post…]

Download Video FileWatch/download video  

Inside IT: Exploring a Bring-Your-Own-Device Stipend at Intel

November 6th, 2012 |
Inside IT: Exploring a Bring-Your-Own-Device Stipend at Intel

IT Best Practices: Episode 37 – Consumerization is a big trend in the enterprise. Intel is at the forefront of this trend, with an extensive BYO program. Tens of thousands of employee-owned smart phones and tablets are now in use [See the full post…]

Download Audio FileListen/download audio  

Inside IT: The Evolving Role of IT

October 23rd, 2012 |
Inside IT: The Evolving Role of IT

IT Best Practices: Episode 36 – It’s the essence of this podcast series – the change of IT’s place in the organization, and the role IT plays in relation to all the business units in the company. In this episode [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Evaluating Ultrabook Devices for the Enterprise

October 9th, 2012 |
Inside IT: Evaluating Ultrabook Devices for the Enterprise

IT Best Practices: Episode 35 – The variety of ways we connect and compute is very different from even a few years ago. And it’s changing all the time. More devices are making their way into the enterprise, allowing employees [See the full post…]

Download Audio FileListen/download audio