• Breaking the Cycle of Technology Security

    Security is not relevant, until it fails.  This is the basis for many of the recurring cycles we have seen in cybersecurity.  New technology rushed to market is easily compromised by attackers, resulting in ...
  • Change Your Desktops, Change Your Business

    Do you ever think about how much your business could accomplish if your employees were even more productive? If you’re like most people, the answer is “yes.” Then again, it’s quite likely your ...
    CHAD CONSTANT
    last modified by CHAD CONSTANT
  • Insights from NRF: Top Trends from Retail's BIG Show 2015

    Once the dust settles from Black Friday doorbusters and end-of-year clearance sales, retailers — and the tech vendors that work with them — gather in New York City for the BIG Show, the National Retail Fed...
    paul.butcher
    last modified by paul.butcher
  • Desktop Tutorial: How to Optimize Clinician Workflow with All-In-One Devices

    Technology is making huge advances in all spheres of life, especially in healthcare. Clinicians have a wider range of devices at their disposal and can choose the best device based on their needs. With increased conne...
    mnblatt
    last modified by mnblatt
  • The Behavioral Shift Driving Change in the World of Retail

    Ready or Not, Cross-Channel Shopping Is Here to Stay   Of all the marketplace transitions that have swept through the developed world's retail industry over the last five to seven years, the most important is th...
    jcstine
    last modified by jcstine
  • Brands Win Customers by Noting Their Online Behaviors

    In recent weeks we’ve entered a number of customer conversations about the future of the store.   However, we’ve yet to discuss the future of the brand and how a retail brand might redefine itself to...
    jcstine
    last modified by jcstine
  • Moving from Maintenance to Growth in Retail Technology

    Ready, set, welcome to the new retail year.   It's time to start fresh, and for those of us in retail technology, it’s time to get the final word on budgets and do the final editing on the 2015 plan. &nbs...
    jcstine
    last modified by jcstine
  • Improving Air and Water Quality in Smart Cities

    This is the fourth and final installment (#4 of 4) of the - Smart Cities Tech Innovation Series To view more posts within the series click here: Smart Cities Series In this blog series, we've been looking at t...
    DAWN OLSEN
    last modified by DAWN OLSEN
  • Safeguarding the Smart City of the Future

    This is the second installment (#2 of 4) of the - Smart Cities Tech Innovation Series Click here to view: blog #3 To view more posts within the series click here: Smart Cities Series   In the age of smart citi...
    DAWN OLSEN
    last modified by DAWN OLSEN
  • Urban Growth and Sustainability: Building Smart Cities with the Internet of Things

    This is the first installment (#1 of 4) of the - Smart Cities Tech Innovation Series. Click here to view: blog #2 To view more posts within the series click here: Smart Cities Series Not long ago, the human rac...
    DAWN OLSEN
    last modified by DAWN OLSEN
  • Cutting Congestion in Our Smart Cities

    This is the third installment (#3 of 4) of the - Smart Cities Tech Innovation Series Click here to view: blog #4 To view more posts within the series click here: Smart Cities Series One of the most visible resul...
    DAWN OLSEN
    last modified by DAWN OLSEN
  • Meet Your New Business Partner – the IT Department

    Over the last several years, Intel IT has been implementing the Information Technology Infrastructure Library (ITIL) framework to transform our service delivery and enable us to align more effectively with the strateg...
    azmikephillips
    last modified by azmikephillips
  • Where in the World Is… My Mobile-Device Design Information?

    OEMs and other customers use Intel’s system-on-a-chip (SoC) products in their mobile devices. Intel makes a variety of SoCs, and any one SoC includes many components, with processor, memory controller, graphics,...
    mjohnsen
    last modified by mjohnsen
  • Connected Data and Advanced Analytics Lead to Significant Revenue Uplift at Intel

    Business analytics and data insights empower today’s business leaders for faster decision making. A recent data consolidation and analytics project uplifted Intel’s revenue by $264 million in 2014, as high...
    Ashok.Agarwal
    last modified by Ashok.Agarwal
  • Top 3 Healthcare Security Takeaways from HIMSS 2015

    Security was a major area of focus at HIMSS 2015 in Chicago. From my observations, here are a few of the key takeaways from the many meetings, sessions, exhibits, and discussions in which I participated:   Top-o...
    David Houlding
    last modified by David Houlding
  • CMS Weighs in With Meaningful Use Stage 3 Rules

    As promised, the Centers for Medicare and Medicaid Services have offered up plans for Meaningful Use Stage Three just in time for discussion at the HIMSS Annual Conference. Based on conversations I’ve had with C...
    GuestPost
    last modified by GuestPost
  • The Promise – and Demands – of Precision Medicine

    The idea of precision medicine is simple: When it comes to medical treatment, one size does not necessarily fit all, so it's important to consider each individual's inherent variability when determining the most appro...
    GuestPost
    last modified by GuestPost
  • Maximizing Technology While Minimizing Costs in Your Small Business or Home Office

    SOHO isn’t just a neighborhood in lower Manhattan — it’s a movement that’s becoming crucial for a lot of small, independent business owners everywhere. Thanks to recent developments in technolo...
    VISHAL SANGHVI
    last modified by VISHAL SANGHVI
  • Dawn Moore blogs: The Intel® Ethernet 10GbE revolution that was 12 years in the making

    From Dawn Moore, General Manager of the Networking Division, read her latest blog on 10GbE in the Intel® Xeon® processor D product family: The Intel® Ethernet 10GbE revolution that was 12 years in the making
    Helen.V.Phan
    last modified by Helen.V.Phan
  • Attackers Expand to Hack Hardware

    Cyber attackers and researchers continually evolve, explore, and push the boundaries of finding vulnerabilities.  Hacking hardware is the next step on that journey.  It is important for computing device make...
    MatthewRosenquist
    last modified by MatthewRosenquist