to learn more about janet.l.gluck, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
Intel IT understands that IT departments everywhere are being asked to do more with less. One area where we’ve made significant improvements in efficiencies and cost reductions is with our PC lifecycle man... How Intel IT does PC Lifecycle ManagementBack Intel IT is transforming our application delivery model to enable the back-end cloud and the front-end client to work together to support an increasing number of combinations of operating systems, devices, and computi... Client-aware Services in the CloudBack Intel IT has conducted a successfuly pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to sof... Managing Intel Solid-State Drives Using Intel vProTechnologyBack As services and data move to the cloud, Intel IT has found that the end–point device is not only retaining its relevancy, but is also becoming even more important. This belief runs contrary to the industry assumption ... Why the Device Matters in a Cloud-centric WorldBack By integrating the use of Intel® Setup and Configuration Software with our client management console solution, with Intel® Active Management Technology we are now able to successfully perform a number of critical mai... Configuration Tips for Managing Mobile PCs with Intel vPro TechnologyBack Intel IT’s modular IT Client Build (ITCB) process enables us to efficiently manage the thousands of laptops and desktop PCs, as well as more than 2,000 software applications – used by Intel’s 100,000-plus employees. ... Creating a Dynamic Client Build Using Driver ManagementBack The number and variety of connected devices in the marketplace is increasing every year. To support the growing demand for use of small devices in our environment, we've created a pre-evaluation screening process. H... Pre-Evaluating Small Devices for Use in the EnterpriseBack As the pace of business and technology transformation continues to accelerate, Intel IT's strategic importance within Intel grows. Intel IT tightly aligns its strategic planning with the Intel corporate planning proce... Achieving Intel Strategic Goals with ITBack Many of us use a variety of devices both in our work life and personal life. Wouldn't it be great if you could access the information you needed anywhere, anytime, and on whatever device you happened to be using at th... Enabling Emerging Enterprise Usages with Client–Aware TechnologiesBack Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment. To support this initiative, we h... Improving Security and Mobility for Personally Owned DevicesBack Acquisitions are a critical component of Intel's corporate growth strategy. Intel IT plays a key role in the smooth integration of new Intel acquisitions and in helping to achieve the unique business objectives for ea... Adding Value to Intel Acquisitions with ITBack Intel's large and complex wide area network (WAN) interconnects 200 sites around the globe, and we experience an approximate WAN capacity growth of 10% per year. To best support this growth, Intel IT has developed a ... Intelligent WAN Capacity Management at IntelBack Many of us spend all day working on some type of a keyboard. After a while, some people can experience discomfort from the repetitive nature of this behavior. To address this situation, Intel IT launched a unified,... Improving Workplace Ergonomics through ITBack What can an IT department do when employees say they want to use their own smart phones to help them do their jobs? Intel IT recognized that IT consumerization is not a passing trend. We took a proactive approach t... Best Practices for Enabling Employee-owned Smart Phones in the EnterpriseBack Tis the season to be..........careful! Okay, you can also be jolly, but also please be careful. During the holiday season, cybercriminals try to use sneaky ways to separate us from our money, personal information a... Twelve ways to keep cybercriminals from ruining your holiday seasonBack How can a parent help their child from sharing too much personal information when they are on a social networking sites? In this IT@Intel Technology Tip, we share 10 steps to help your teenager or tween be safe when ... IT@Intel: How to Protect your Tweens and Teens on Social NetworksBack As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. In this IT@Intel Te... IT@Intel: The 12 Scams of X-masBack We all love how fast instant messaging allows us to ask questions and get answers. But did you know that instant messaging has its own etiquette and guidelines? In this IT@Intel Technology Tip, we share several Do's a... IT@Intel: Minding your Manners on Instant MessagingBack In this Intel IT Executive Insight, we discuss how we use technology to drive workplace transformation and deliver business value to the enterprise. By empowering our employees with a variety of resources, we've been... Intel IT Executive Insights: Using Technology to Drive TransformationBack How can an IT support team continue to provide the needed level of service with limited staff and increasing demands? Intel IT conducted a successful proof of concept using Intel vPro technology to remotely manage P... Managing a Factory IT Environment with Intel® vPro™ TechnologyBack