IT@Intel tagged posts:

If Your Information Could Talk… Cyber-Safety in Social Media

December 20th, 2012 |
If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at mcafee.com/advice.

Download Video FileWatch/download video  

Inside IT: Re-imagining Intel.com

December 18th, 2012 |
Inside IT: Re-imagining Intel.com

IT Best Practices: Episode 40 – The role of a corporate web site has evolved. It’s no longer just a static source of information. It’s the place where a company creates and maintains a relationship with the world of customers, [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Self-Service Business Intelligence

December 4th, 2012 |
Inside IT: Self-Service Business Intelligence

IT Best Practices: Episode 39 – You could say that Business Intelligence is the collective knowledge of an enterprise. How intelligent a particular business is depends on a lot of factors, but the ability to make sense of a vast [See the full post…]

Download Audio FileListen/download audio  

Granular Trust Model – Improving Enterprise Security

November 30th, 2012 |
Granular Trust Model – Improving Enterprise Security

IT Best Practices: Intel IT has completed a pilot of its granular trust model, designed to support key initiatives such as IT consumerization and cloud computing. This trust model provides dynamic security controls and user access to reduce enterprise risk [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Developing a Hybrid Cloud Environment

November 20th, 2012 |
Inside IT: Developing a Hybrid Cloud Environment

IT Best Practices: Episode 38 – More and more, Intel is offering consumer-facing web services, like the AppUp store. That creates new challenges – consumers expect web services to be always available, and demand for services can spike or drop [See the full post…]

Download Audio FileListen/download audio  

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Download Video FileWatch/download video  

Inside IT: Exploring a Bring-Your-Own-Device Stipend at Intel

November 6th, 2012 |
Inside IT: Exploring a Bring-Your-Own-Device Stipend at Intel

IT Best Practices: Episode 37 – Consumerization is a big trend in the enterprise. Intel is at the forefront of this trend, with an extensive BYO program. Tens of thousands of employee-owned smart phones and tablets are now in use [See the full post…]

Download Audio FileListen/download audio  

Inside IT: The Evolving Role of IT

October 23rd, 2012 |
Inside IT: The Evolving Role of IT

IT Best Practices: Episode 36 – It’s the essence of this podcast series – the change of IT’s place in the organization, and the role IT plays in relation to all the business units in the company. In this episode [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Evaluating Ultrabook Devices for the Enterprise

October 9th, 2012 |
Inside IT: Evaluating Ultrabook Devices for the Enterprise

IT Best Practices: Episode 35 – The variety of ways we connect and compute is very different from even a few years ago. And it’s changing all the time. More devices are making their way into the enterprise, allowing employees [See the full post…]

Download Audio FileListen/download audio  

Intel IT Annual Report: 2012 Mid-Year Update

September 17th, 2012 |
Intel IT Annual Report: 2012 Mid-Year Update

Intel IT Annual Report: 2012 mid-year update that shares progress on key strategic initiatives that delivered business value to Intel — cloud computing, IT consumerization, business intelligence, social computing and enterprise security.

Download PDFRead/Download PDF  

Inside IT: Migrating to an Intel Architecture Platform in Silicon Design

September 11th, 2012 |
Inside IT: Migrating to an Intel Architecture Platform in Silicon Design

IT Best Practices: Episode 33 – In a previous podcast we discussed migrating mission-critical systems to Intel architecture. We outlined the process Intel has undergone to move from a RISC-based platform in the 90s to a complete Intel architecture-based platform [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Service Transformation to Increase Business Velocity

August 28th, 2012 |
Inside IT: Service Transformation to Increase Business Velocity

IT Best Practices: Episode 32 – Information Technology is no longer just a technology provider. It has become a key partner in every aspect of the business. To reflect that change, Intel IT is in the midst of a transformation [See the full post…]

Download Audio FileListen/download audio  

Building a Mobile Application Development Framework

Building a Mobile Application Development Framework

IT Best Practices: Intel IT created a framework that enables the successful planning, development and production of mobile applications. Project teams can use the framework to evaluate the suitability of applications for mobile use cases, follow governance standards, and identify [See the full post…]

Download PDFRead/Download PDF  

Improving Facility Operations with Intel Architecture-based Tablets

Improving Facility Operations with Intel Architecture-based Tablets

IT Best Practices: Intel IT conducted a proof of concept demonstrating improved operations by providing facility technicians with Intel architecture-based tablets. Technicians in the study group reported an increase in productivity of 3 to 17 percent. Management also gained greater [See the full post…]

Download PDFRead/Download PDF  

Inside IT: CFO Priorities for the IT Department

August 14th, 2012 |
Inside IT: CFO Priorities for the IT Department

IT Best Practices: Episode 31 – The line between the IT department and the organization itself has blurred. IT is no longer just the number you call when your computer doesn’t work. As the role of IT has changed, so [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Intel Architecture-Based Phones in the Enterprise

July 31st, 2012 |
Inside IT: Intel Architecture-Based Phones in the Enterprise

IT Best Practices: Episode 30 – More and more, users want their own personal small form-factor device, such as a smart phone or tablet, as their work device. As Intel has developed it’s consumerization program, the number of mobile devices [See the full post…]

Download Audio FileListen/download audio  

Managing Data for Intel’s Enterprise Private Cloud Infrastructure

Managing Data for Intel’s Enterprise Private Cloud Infrastructure

IT Best Practices: Intel IT has developed a business intelligence system for infrastructure management to support Intel’s enterprise private cloud. This system collects, consolidates, and integrates infrastructure capacity and performance data about our IT environment, which includes virtual machines, physical [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Mining Big Data in the Enterprise for Better Business Intelligence

IT Best Practices: Mining Big Data in the Enterprise for Better Business Intelligence

IT Best Practices: To improve Intel’s business intelligence (BI), Intel IT is developing the systems and skills for analyzing big data. A major portion of this data consists of the large, unstructured data sets that constitute up to 90 percent [See the full post…]

Download PDFRead/Download PDF  

Extending Intel’s Enterprise Private Cloud with Platform as a Service

Extending Intel’s Enterprise Private Cloud with Platform as a Service

IT Best Practices: Intel IT is implementing platform as a service (PaaS) to accelerate custom application deployment and promote cloud-aware application design. Our traditional application deployment process is less-than-ideal, taking as much as 140 days to deploy a new application. [See the full post…]

Download PDFRead/Download PDF  

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our [See the full post…]

Download PDFRead/Download PDF  

Successful eDiscovery in a Bring-Your-Own-Device Environment

Successful eDiscovery in a Bring-Your-Own-Device Environment

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity [See the full post…]

Download PDFRead/Download PDF  

Delivering Cloud-based Services in a Bring-Your-Own Environment

Delivering Cloud-based Services in a Bring-Your-Own Environment

IT Best Practices: As Intel IT builds cloud infrastructure and enables cloud services, one of the goals is to make those services available to as broad a range of devices as possible. To do so, we are integrating our cloud [See the full post…]

Download PDFRead/Download PDF  

Extending Intel’s Enterprise Private Cloud with Platform as a Service

Extending Intel’s Enterprise Private Cloud with Platform as a Service

IT Best Practices: Intel IT is implementing platform as a service (PaaS) to accelerate custom application deployment and promote cloud-aware application design. Our traditional application deployment process is less-than-ideal, taking as much as 140 days to deploy a new application. [See the full post…]

Download PDFRead/Download PDF  

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Successful eDiscovery in a Bring-Your-Own-Device Environment

IT Best Practices: Successful eDiscovery in a Bring-Your-Own-Device Environment

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity [See the full post…]

Download PDFRead/Download PDF