IT@Intel tagged posts:

Inside IT: eDiscovery in a Bring-Your-Own-Device Environment

July 17th, 2012 |
Inside IT: eDiscovery in a Bring-Your-Own-Device Environment

IT Best Practices: Episode 29 – IT@Intel is at the forefront of IT evolution in a number of ways. One big change in the past few years at IT@Intel is the company’s bring-your-own-device (BYOD) program. Since implementing the program several [See the full post…]

Download Audio FileListen/download audio  

Delivering Cloud-based Services in a Bring-Your-Own Environment

Delivering Cloud-based Services in a Bring-Your-Own Environment

IT Best Practices: As Intel IT builds cloud infrastructure and enables cloud services, one of the goals is to make those services available to as broad a range of devices as possible. To do so, we are integrating our cloud [See the full post…]

Download PDFRead/Download PDF  

Enabling Multilingual Collaboration through Machine Translation

Enabling Multilingual Collaboration through Machine Translation

IT Best Practices: To better serve Intel’s global customer base in their native languages and reduce support costs, Intel IT conducted two proof-of-concepts and designed prototypes that integrate machine translation into existing collaboration environments to deliver real-time multilingual chat and [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Why The Device Matters in a Cloud-Centric World

July 3rd, 2012 |
Inside IT: Why The Device Matters in a Cloud-Centric World

IT Best Practices: Episode 28 – It’s been amazing to watch technology converge to make the cloud possible. Connection speeds, processing power, and the explosion of connected devices all contribute to this transformation in the compute experience. It might seem [See the full post…]

Download Audio FileListen/download audio  

The Full Mobile Deployment Benefits of Intel Solid-State Drives

The Full Mobile Deployment Benefits of Intel Solid-State Drives

IT Best Practices: Intel IT has reached its goal of deploying virtually 100 percent of our approximately 91,000 mobile business PCs with Intel Solid-State Drives (Intel SSDs). Intel SSDs deliver benefits related to employee productivity, reliability, security, lifecycle, and total [See the full post…]

Download PDFRead/Download PDF  

Client-aware Services in the Cloud

Client-aware Services in the Cloud

IT Best Practices: Intel IT is transforming our application delivery model to enable the back-end cloud and the front-end client to work together to support an increasing number of combinations of operating systems, devices, and computing models. Our goal is [See the full post…]

Download PDFRead/Download PDF  

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution improves [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Transforming Intel’s Supply Chain

June 19th, 2012 |
Inside IT: Transforming Intel’s Supply Chain

IT Best Practices: Episode 27 – The Gartner Group just released its eighth annual Supply Chain Top 25, identifying global supply chain leaders and highlighting their best practices. It’s an elite group of companies, and coming at number 7 this [See the full post…]

Download Audio FileListen/download audio  

Enabling Multilingual Collaboration through Machine Translation

Enabling Multilingual Collaboration through Machine Translation

IT Best Practices: To better serve Intel’s global customer base in their native languages and reduce support costs, Intel IT conducted two proof-of-concepts and designed prototypes that integrate machine translation into existing collaboration environments to deliver real-time multilingual chat and [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Migrating Mission-Critical Systems to Intel Architecture

June 5th, 2012 |
Inside IT: Migrating Mission-Critical Systems to Intel Architecture

IT Best Practices: Episode 26 – There was a time when Intel Corporation didn’t run on an Intel platform. Until the early 90s, Intel ran on a proprietary RISC-based platform for its silicon design and manufacturing environments. At the time, [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Virtualizing High-Security Servers

May 22nd, 2012 |
Inside IT: Virtualizing High-Security Servers

IT Best Practices: Episode 25 – Intel is a large operation, with ninety thousand employees and an equal number of servers. Like a lot of organizations, Intel has been virtualizing servers over time to increase utilization and efficiency, and to [See the full post…]

Download Audio FileListen/download audio  

Creating Business Value through ERP Transformation

Creating Business Value through ERP Transformation

IT Best Practices: Intel IT has transformed Intel’s ERP system into an agile, cost-effective tool that supports high-velocity business growth and ever-changing business needs. The transformation of our ERP system greatly reduced its complexity, providing increased business value through improved [See the full post…]

Download PDFRead/Download PDF  

Why the Device Matters in a Cloud-centric World

Why the Device Matters in a Cloud-centric World

As services and data move to the cloud, Intel IT has found that the end–point device is not only retaining its relevancy, but is also becoming even more important. This belief runs contrary to the industry assumption that the abstraction [See the full post…]

Download PDFRead/Download PDF  

Configuration Tips for Managing Mobile PCs with Intel vPro Technology

Configuration Tips for Managing Mobile PCs with Intel vPro Technology

IT Best Practices: To improve our ability to use certain remote management features of Intel Active Management Technology (Intel AMT) a component of Intel vPro technology, Intel IT worked with Intel’s software development team to develop ways to enhance Intel [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness as [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Big Data

April 10th, 2012 |
Inside IT: Big Data

IT Best Practices: Episode 22 – We are awash in data today. That presents a challenge for the IT organization. But if real meaning can be extracted from all that data – structured and unstructured, human-generated and machine-generated – it [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Improving Client Stability

March 27th, 2012 |
Inside IT: Improving Client Stability

IT Best Practices: Episode 21 – Blue screens have been around for about as long as there have been PCs. They’re a major challenge for an organization, and they can significantly reduce productivity.. In spite of that, not enough has [See the full post…]

Download Audio FileListen/download audio  

Improving Healthcare Risk Assessments to Maximize Security Budgets

Improving Healthcare Risk Assessments to Maximize Security Budgets

IT Best Practices: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated through [See the full post…]

Download PDFRead/Download PDF  

Intel IT: Keeping the Business Running in a Crisis

Intel IT: Keeping the Business Running in a Crisis

IT Best Practices: Intel IT’s Response and Recovery Management (ITRRM) program keeps the Intel core business processes running when a disaster occurs and helps with recovery after the disaster subsides. A recent example of exercising our business continuity (BC) plans [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Cell Phones In The Fab

March 13th, 2012 |
Inside IT: Cell Phones In The Fab

IT Best Practices: Episode 20 – There’s a trend in the enterprise that challenges IT: how can we secure productivity gains by allowing employees to use smart phones for work, without compromising security or creating a huge management problem? Now [See the full post…]

Download Audio FileListen/download audio  

Enabling Emerging Enterprise Usages with Client–Aware Technologies

Enabling Emerging Enterprise Usages with Client–Aware Technologies

IT Best Practices: Many of us use a variety of devices both in our work life and personal life. Wouldn’t it be great if you could access the information you needed anywhere, anytime, and on whatever device you happened to [See the full post…]

Download PDFRead/Download PDF  

Achieving Intel’s Strategic Goals with IT

February 28th, 2012 |
Achieving Intel’s Strategic Goals with IT

IT Best Practices: As the pace of business and technology transformation continues to accelerate, Intel IT’s strategic importance within Intel grows. Intel IT tightly aligns its strategic planning with the Intel corporate planning process, working with business leaders around the [See the full post…]

Download PDFRead/Download PDF  

Pre-Evaluating Small Devices for Use in the Enterprise

February 27th, 2012 |
Pre-Evaluating Small Devices for Use in the Enterprise

IT Best Practices: The number and variety of connected devices in the marketplace is increasing every year. To support the growing demand for use of small devices in our environment, we’ve created a pre-evaluation screening process. Having a formal and [See the full post…]

Download PDFRead/Download PDF  

Improving Security and Mobility for Personally Owned Devices

February 24th, 2012 |
Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment. To support this initiative, we have developed [See the full post…]

Download PDFRead/Download PDF  

Intel IT – Protect to Enable

February 8th, 2012 |
Intel IT – Protect to Enable

Learn about Intel’s IT best practices and our new information security strategy…. a new architecture that is designed to increase productivity, agility and innovation, while actually decreasing risk.

Download Video FileWatch/download video