A question I often get from partners is, “How do we get more resources and support from Intel Security?” Some simply want more attention from us and other vendors to help address their markets, understand products, and win new customers. Intel Security and other vendors are tremendous sources of resources and support. We supply partners […]

This post is the fourth in a series exploring Phase II of the new Partner Program. Intel Security and our partners are stronger together. That’s why we’ve overhauled our Teaming Plan to reward partners who can provide business or technical expertise to an Intel Security-found deal. In addition to providing deal protection, we’ve tripled the […]

Last Tuesday, Google introduced Your Timeline for its Google Map website and Android devices. Your Timeline acts as a documentarian of your location history, dutifully recording where you’ve been, when and for how long. For many, this will probably be a convenient feature to draw upon when you can’t remember where you were when you […]

In life, there are a handful of people that each of us truly trust – and can confide in fully. And, it’s safe to say, you’ve probably taken into consideration the trustworthiness of each one of your confidants. Maybe you’ve evaluated them on their ability to keep secrets in the past or perhaps they each […]

The way parents use Twitter and the way teens use Twitter couldn’t be more different. While many parents turn to the popular social channel for business networking, teens use Twitter to simply hang out—to see and be seen. They chat, joke, banter, and of course, they love to subtweet. Subtweeting is indirectly tweeting something about […]