Pulpit nawigacyjny

Znajdź zawartość

Zawęź wyniki
Zawartość powiązana

Znaczniki aktywne

  • 6543 Wyniki
  • Liczba elementów na stronie

Evolutionary Cloud-Based Solutions from Yanzi Networks

Yanzi Networks deliver robust and evolutionary IoT solutions with easy-to-install networking platforms that offer cost-efficient local analytics.

Next Media: Engaging Readers with Customized News Content

Intel helps Next Media Ltd. develop a big data article recommendation engine to bring relevant content to readers.

Podgląd | Pliki do pobrania

Sugon: Improving News Quality and Editing Efficiency with Big Data

Sugon’s XData* big data solution provides unified management and real-time analysis.

Podgląd | Pliki do pobrania

TGAC: Understanding Life on Earth

TGAC uses high-performance computing solutions to assemble complex genome.

Podgląd | Pliki do pobrania

Big Data Constructs Intelligent Healthcare

Solution Brief: Wonders Group helps Shanghai’s health bureau build an intelligent healthcare information system with Intel® Xeon® processor E5 family.

Podgląd | Pliki do pobrania

Intel® Cloud Builders: HyTrust and Cloud Computing Security

HyTrust builds a cloud computing solution that ensures security from the lowest layers of the stack utilizing Trusted Compute Pools with VMware.

Intel® CoFluent™ Studio: Notations

Intel® CoFluent™ Studio models combine MCSE graphical notations and C code, providing embedded system descriptions for hardware or software co-design.

System-level Modeling and Simulation: Product Brief

Visual system modeling and simulation on Intel® CoFluent™ Studio offers real-time behavioral and performance analysis for multicore embedded systems.

Podgląd | Pliki do pobrania

Intel® CoFluent™ Studio: Abstraction Levels

Virtual architecture model details for defining communications abstraction levels and corresponding communications model characteristics.

Development Considerations for Smart Cells

Article: Evolving wireless networks drive smart cell development to simplify deployment, adapt to changes, and protect against security threats.

Podgląd | Pliki do pobrania