IT@Intel tagged posts:

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy office. [See the full post…]

Download Audio FileListen/download audio  

Inside IT: An Update on Intel’s Data Center Strategy

December 24th, 2013 |
Inside IT: An Update on Intel’s Data Center Strategy

IT Best Practices: Episode 65 – Intel is a couple of years into an overhaul of its data center strategy. We’ve talked about that overhaul previously in this podcast series, but it’s a good time to catch up on the [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At [See the full post…]

Download Video FileWatch/download video  

Intel IT: Blazing the Trail to Multi-Platform Apps

December 16th, 2013 |
Intel IT: Blazing the Trail to Multi-Platform Apps

IT Best Practices: In IT, the technical strategy and architecture group is responsible for driving the enterprise capabilities to support our efforts. This year, we are concentrating much of our energy towards the implementation of what we call five-star applications. [See the full post…]

Download PDFRead/Download PDF  

Transforming IT (and Intel): A pyramid of change for IT leaders

December 13th, 2013 |
Transforming IT (and Intel): A pyramid of change for IT leaders

IT Best Practices: While Intel IT has routinely received high marks for performance, I believe we can do more. I believe we can help transform the business in significant and impactful ways. This requires new thinking, new strategies, and a [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Data Visualization

December 10th, 2013 |
Inside IT: Data Visualization

IT Best Practices: Episode 64 – We live in the era of big data. And big data comes with big challenges. One way business intelligence strategy is helping to turn those challenges into opportunities is data visualization. In this podcast [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social [See the full post…]

Download Video FileWatch/download video  

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices: Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated manageability, [See the full post…]

Download PDFRead/Download PDF  

Inside IT: On the Leading Edge of Change at Intel IT

November 26th, 2013 |
Inside IT: On the Leading Edge of Change at Intel IT

IT Best Practices: Episode 63 – The story of IT in the last few years is a story of change. The IT organization has undergone a transformation, as technology has affected the way people in the enterprise engage in their [See the full post…]

Download Audio FileListen/download audio  

Delivering Self-Service BI, Data Visualization, and Big Data Analytics

November 25th, 2013 |
Delivering Self-Service BI, Data Visualization, and Big Data Analytics

IT Best Practices: Over the last five years, Intel IT has evolved its approach to BI solutions for Intel’s worldwide sales organization to enable rapid delivery of advanced self-service business intelligence (BI) and data visualization capabilities. By moving to a [See the full post…]

Download PDFRead/Download PDF  

Intel IT Labs and Big Data

November 25th, 2013 |
Intel IT Labs and Big Data

IT Best Practices: Over the past few years, we have investigated the concept behind the big data technologies and now have much of the capabilities running in our production environment. The IT Labs continue their work to explore new and [See the full post…]

Download PDFRead/Download PDF  

One big data strategy, three Massively Parallel Processing platforms (MPP)

November 25th, 2013 |
One big data strategy, three Massively Parallel Processing platforms (MPP)

IT Best Practices: Let’s face it: big data is still very new. And that means the infrastructure platforms on which big data analytics are performed are also relatively immature. What it doesn’t mean, however, is that organizations can’t or shouldn’t [See the full post…]

Download PDFRead/Download PDF  

Intel IT’s big data journey (so far)

November 25th, 2013 |
Intel IT’s big data journey (so far)

IT Best Practices: Businesses are often guilty of operating at a pace that is measured and process driven, in reactive fashion. These businesses observe a problem or development in the marketplace and then collect data to understand and act upon [See the full post…]

Download PDFRead/Download PDF  

Big data analytics: Pursuing multi-million dollar opportunities

November 22nd, 2013 |
Big data analytics: Pursuing multi-million dollar opportunities

IT Best Practices: Five people. Six months. $10 million in ROI. Those were the parameters and goals of Intel IT’s initial big data projects, which started in earnest three years ago. “We wanted to prove that big data analytics are [See the full post…]

Download PDFRead/Download PDF  

Intel IT Best Practices for Implementing Apache Hadoop Software

November 20th, 2013 |
Intel IT Best Practices for Implementing Apache Hadoop Software

IT Best Practices: In an age when organizations such as Intel are rich in data, the true value of this data lies in the ability to collect, sort, and analyze it to derive actionable business intelligence (BI). Recognizing the need [See the full post…]

Download PDFRead/Download PDF  

Configuring an In-Memory BI Platform for Extreme Performance

November 19th, 2013 |
Configuring an In-Memory BI Platform for Extreme Performance

IT Best Practices: To deliver the extreme query responsiveness required for real-time analysis of high-volume data sets, Intel IT conducted tests to find the optimal platform for a cost-effective, high-performance in-memory business intelligence (BI) solution. Performing server-sizing and stress tests [See the full post…]

Download PDFRead/Download PDF  

Inside IT: McAfee Drive Encryption at Intel

November 12th, 2013 |
Inside IT: McAfee Drive Encryption at Intel

IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In the [See the full post…]

Download Audio FileListen/download audio  

IT Business Value: Efficiently Assessing the IT Business Value of Diverse Investments

November 11th, 2013 |
IT Business Value: Efficiently Assessing the IT Business Value of Diverse Investments

IT Best Practices: As part of an evolution in how we assess IT business value for investments, Intel IT and Intel Finance have developed a framework that is faster and more scalable than our previous processes. This new Business Value [See the full post…]

Download PDFRead/Download PDF  

Android Devices in a BYOD Environment

November 7th, 2013 |
Android Devices in a BYOD Environment

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google [See the full post…]

Download PDFRead/Download PDF  

Advantages of Solid-State Drives for Design Computing

October 29th, 2013 |
Advantages of Solid-State Drives for Design Computing

IT Best Practices: Silicon chip design engineers at Intel face the challenges of integrating more features into ever-shrinking silicon chips, resulting in more complex designs. The increasing design complexity creates large design workloads that have considerable memory and compute requirements. [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer [See the full post…]

Download Audio FileListen/download audio  

High-performance Workstations Increase Design Throughput

October 28th, 2013 |
High-performance Workstations Increase Design Throughput

IT Best Practices: Design engineers at Intel face the challenges of integrating more features into ever-shrinking silicon chips, bringing products to market faster, and keeping design engineering and manufacturing costs low. A new category of workstations has emerged, based on [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief [See the full post…]

Download Video FileWatch/download video  

IT Best Practices: Managing Privacy Risk with a Standalone Subsidiary

October 15th, 2013 |
IT Best Practices: Managing Privacy Risk with a Standalone Subsidiary

IT Best Practices: Intel practices responsible privacy and data protection. Respect for privacy is fundamental to our culture and helps us to maintain an environment where individuals can trust Intel and its technologies. Acquisitions are a critical component of Intel’s [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Android Devices in the BYOD Environment

October 15th, 2013 |
Inside IT: Android Devices in the BYOD Environment

IT Best Practices: Episode 60 – We’ve talked about Intel’s Bring Your Own Device program in previous podcasts. Intel enables employees to use their own smart phones, tablets, and other devices for work. Of those, about half – 20,000 in [See the full post…]

Download Audio FileListen/download audio