很抱歉，此 PDF 仅供下载
For Citrix, it’s all about mobility. The number of corporate employees using laptops is growing, and more importantly, these employees are constantly on the move—taking sensitive business data with them. More than ever, companies must make sure that their data is backed up and protected.
This vendor spotlight features Peter Blum, director of product management and marketing for Citrix* XenClient*, discussing how the XenClient solution addresses these challenges by providing greater flexibility for mobile users working both online and offline, and maximum security control for IT managers. XenClient extends the performance, flexibility, and security of desktop virtualization to mobile laptop users by leveraging Intel® vPro™ technology1 to help improve security and simplify IT management. The solution protects corporate data and applications using Intel Advanced Encryption Standard New Instructions2 (Intel AES-NI), which encrypts data up to four times faster;3 enforces robust policy controls to block unauthorized movement of data from the laptop, such as copying data to a USB flash or optical drive; and backs up user data unobtrusively and securely from any location. XenClient leverages Intel Virtualization Technology4 for CPU (Intel VT-x) to virtualize workloads based on Microsoft* Windows*using hardware-based support, and uses Intel Virtualization Technology for Directed I/O (Intel VT-d) to create a virtual experience that feels like a regular Windows-based laptop experience. In addition, XenClient allows for image management, which is part of Intel’s vision of Intelligent Desktop Virtualization. IT managers are able to use a single image of their corporate desktop to deploy, update, and roll back their distributed computing environments.
1. Intel vPro™ technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more, visit intel.com/technology/vpro/.
2. Intel AES-NI requires a computer system with an AES-NI–enabled processor, as well as non-Intel software, to execute the instructions in the correct sequence. AES-NI is available on select Intel Core™ processors. For availability, consult your system manufacturer. For more information, visit http:///software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
3. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
4. Intel Virtualization Technology requires a computer system with an enabled Intel processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit intel.com/go/virtualization.
下载 PDF 文档
英特尔市场推广事业部关键任务服务器领域市场经理 Michael Demshki 介绍了英特尔® 至强™ 处理器 7500 系列一个新增的可靠特性——机器校验架构恢复（MCA Recovery）。
英特尔® 博锐™ 技术，可以帮助IT经理通过远程管理平台对外设与拨号进行策略配置，从而有效防止外设泄密。
英特尔® 酷睿™ 博锐™ 处理器家族、 Accenture ARROW*： 智能性能、 可管理性和安全性。
Symantec Altiris 客户端管理套件* 和英特尔® 博锐™ 技术带来出色的远程桌面支持。
本视频快速、深入地介绍了第二代英特尔® 酷睿™ 处理器家族的功能。