Dashboard

İçerik Bul

Sonuçları Filtrele
İlgili İçerik

Etkin Etiketler

  • 47 Sonuçlar
  • Öğe/Sayfa

Benchmark Chart: SAP Server Power, 2-Tier

Compares SAP Server Power, 2-Tier performance between the Intel® Xeon® processor E5-2600 and the Intel® Xeon® processor E5-2600 v2 platforms.

Benchmark Chart: SPECpower_ssj2008*

Compares energy efficiency between the Intel® Xeon® processor E5-2600 and the Intel® Xeon® processor E5-2600 v2 platforms using SPECpower_ssj2008*.

Big Data and Security in the Smart Grid

Laurent Schmitt of Alstom explains why big data and security are paramount to smart grid systems and the benefits of building on Intel® architecture.

Energy Analytics: Delivering a Better Future

Intel works with Austin-based energy consortium Pecan Street Inc. to real-time monitor and analyze usage for uncovering insights into the future.

SAS Analytics: SAS CEO on the Technology Powering Analytics

SAS CEO Jim Goodnight speaks at Analytics 2013 about SAS’s commodity hardware, such as servers, racks, blades, and their Intel® Xeon® processors.

Landmark Enhances 3-D Modeling for Oil Production Decision Making

Case Study: Landmark improves performance of 3-D earth modeling software for oil production decision making using Dell Precision* workstations.

Ön izleme | İndir

GAZ-SYSTEM Utility Mainlines IT Efficiency, Remote Management

Polish gas transmission operator GAZ-SYSTEM S.A. boosts IT efficiency and productivity while gaining remote management with Intel® vPro™ platforms.

Ön izleme | İndir

MeshCentral on Intel® Gateways Simplifies IoT Management: Brief

Brief: MeshCentral on Intel® IoT Gateways simplifies the connection and management of all types of legacy devices. (v.1, Jun. 2014)

Ön izleme | İndir

Architecting Tomorrow's Electrical Grid

With Intel® technologies, utility companies can provide increased scalability, performance, energy-efficiency and serviceability.

Ön izleme | İndir

Five SIEM Requirements to Solve Bigger Business Issues

Case Study: Describes the five SIEM requirements that must be addressed to create more effective security and risk management strategies.

Ön izleme | İndir