Intel PRO Server Adapters: Multiple Gigabit Ethernet Connections
Üzgünüz, bu PDF yalnız indirme formatında kullanılabilir
VideolarDaha Fazla Video Göster
Ethernet Power Management Technology
DMA coalescing and built-in intelligence enables increased performance per watt and consolidation.
Intel® Intelligent Power Node Manager
Intel® Intelligent Power Node Manager enables server power capping to increase rack density, and facilitate load balancing. (2:27)
Jasper Forest From Intel Animation
Introducing Jasper Forest: the newest addition to the Intel® Xeon® processor family. (1:23)
NAB 2010: Intel and Active Storage
Showcases Intel technology in broadcast equipment and servers at the National Association of Broadcasters. (2:01)
Intel® RAID: World Class Performance
Video: Intel® 6Gb/s RAID controllers features, benefits, and technical specs outlined. (2:56)
Intel® RAID: The Perfect Fit
Video: importance of matching Intel® RAID embedded, integrated, and add-in products to the correct server. (3:54)
Plum Tree Mortgage Intel® Xeon® İşlemcilere Geçiyor:...
Video: Intel IT Tune Up contest winner discusses their upgrade to an Intel® Xeon® processor-based server. (2:47)
Intel® Technology Provider Membership Benefits
The Intel® Technology Provider supports the sales and marketing efforts of all Channel Partners through a single unified...
Big Data: Intel & Oracle
Complementary big data solutions for enterprises
Unified Networking with Open FCoE Technology
Discusses how 10 GbE unified networking and Intel® Open FCoE simplify the data center. (2:44)
EMC* Talks About Intel Open FCoE Technology
EMC's Paul Brown discusses the seamless integration of Intel® Ethernet X520 Server Adapters with EMC solutions. (1:19)
Ethernet Controllers Assist Virtualization
Single-root I/O virtualization bypasses CPU when moving data to and from a virtual machine.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing productivity.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.