Evaluating Microsoft Windows* 8 Security
on Intel® Architecture-based Tablets
Intel Corporation
January 2013
Legal Notices
    This Legal Notices slide should not be separated from the presentation, nor should individual slides be extracted from this presentation.

    Intel ® Identity Protection Technology (Intel® IPT): No system can provide absolute security under all conditions. Requires an Intel® Identity
    Protection Technology-enabled system, including a 2nd Generation Intel® Core™ processor enabled chipset, firmware and software, and
    participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting
    damages. For more information, visit http://ipt.intel.com.

    Intel® Anti-Theft Technology (Intel® AT): No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS,
    firmware and software, and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for
    availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For
    more information, visit http://www.intel.com/go/anti-theft.

    Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup
    and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro.

    Security features enabled by Intel® AMT require an enabled chipset, network hardware and software and a corporate network
    connection. Intel® AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly,
    on battery power, sleeping, hibernating or powered off. Setup requires configuration and may require scripting with the management console
    or further integration into existing security frameworks, and modifications or implementation of new business processes. For more info, see
    www.intel.com/technology/manage/iamt

    Intel may make changes to specifications and product descriptions at any time, without notice.

    This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER,
    INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY
    WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability
    for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estopel or
    otherwise, to any intellectual property rights is granted herein.

    Intel, the Intel logo, Intel Atom, Intel Core, and Intel Core vPro are trademarks of Intel Corporation in the U.S. and other countries.

    * Other names and brands may be claimed as the property of others.



2     Copyright © 2013, Intel Corporation. All rights reserved.
Agenda

• Background

• Security and Manageability
  Evaluation

• Next steps

• Summary
Why Microsoft Windows* 8 Now?




         Intel IT continually evaluates                               We learned from our migration to
         new devices that can increase                                Windows* 7 that the combination
         employee productivity and be                                of new software and new hardware
          managed as needed in the                                   can bring significant benefits to the
            corporate environment.                                   enterprise—both employees and IT.



          Intel IT continually searches for products and technologies that
          balance employee productivity, cost control, and enterprise risk.



* Other names and brands may be claimed as the property of others.
4    Copyright © 2013, Intel Corporation. All rights reserved.
Platforms Tested

                                                                                                                                    Intel® vPro
                                                                                                                                    Technology
    Processor                       RAM                           Chipset       Graphics                     SATA                   Support
                                   Tablet designed with an Intel® Atom™ processor running
                                              Microsoft Windows* 8 Enterprise1
    Intel® Atom™                    2-GB LPDDR2                   System on     Imagination                  eMMC                   Not applicable
    processor                       800 MHz                       chip          Technologies*                64 GB
    Z2760 system                                                                PowerVR*
    on chip                                                                     SGX545
    1.8 GHz

                    Tablet designed with a 3rd generation Intel® Core™ vPro™ processor
                                 running Microsoft Windows* 8 Enterprise
    Intel® Core™                    4-GB DDR3                     Intel® QM77   Intel® HD                    mSATA                  Intel® Active
    i5-3427U                        1600 MHz                      Express       Graphics 4000                128 GB                 Management
    processor                                                     Chipset                                                           Technology 8.0
    2.3 GHz




1     We tested Windows* 8 Enterprise. Other versions of Windows 8, such as Windows 8 Professional, will be made available to certain segments of Intel employees. For a
      discussion of Windows 8 Enterprise, refer to: http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8/enterprise-edition.aspx
      For the rest of this presentation, we will refer to Windows 8 Enterprise as Windows 8.

* Other names and brands may be claimed as the property of others.

5     Copyright © 2013, Intel Corporation. All rights reserved.
Four Categories of Exploration




          Device                                                 Improvements in         Support        Protection for
        management                                                authentication   for desktop/legacy   lost or stolen
                                                                                       applications        devices




          Intel® architecture-based tablets running Windows* 8 matched
          or exceeded the security capabilities of those currently deployed.


* Other names and brands may be claimed as the property of others.
6    Copyright © 2013, Intel Corporation. All rights reserved.
Summary of Results
                                             Windows* 8 and          Windows* 8 and
                                             Intel® Atom™            Intel® Core™ vPro™   Benefit of Windows* 8 Enterprise
    Capability                               Processor               Processor            and Intel® Architecture


    Domain join and                                                                       Enhanced authentication and control;
    group policy                                                                          more policies available



                                                                                          Windows 8 Enterprise and Intel
                                                                                          architecture offers simplified
    Manageability                                                       In-band and       deployments, reduced infrastructure,
                                                 In-band remote      out-of-band remote   and recovery in all power states
                                                  management            management

    Support for
                                                                                          Enhanced security via plug-ins using
    third-party
                                                                                          desktop mode
    browser add-ons

    Support for
    multiple/strong
                                                                                          Simplified user experience with
    authentication
                                                                                          enhanced enterprise security
    methods
    (e.g. biometrics)




* Other names and brands may be claimed as the property of others.
7     Copyright © 2013, Intel Corporation. All rights reserved.
Summary of Results (cont.)
                                          Windows* 8 and             Windows* 8 and
                                          Intel® Atom™               Intel® Core™ vPro™           Benefit of Windows* 8 Enterprise
    Capability                            Processor                  Processor                    and Intel® Architecture


    One-time                                                                                      Intel Core vPro processor-based tablets
    password (OTP)                           Not embedded in                                      have embedded tokens
                                            HW, but available in      OTP is embedded in HW
                                                   SW

    Authentication
    using certificates                                                                            Strong authentication using hardware
    to tie device to                                                    Using Intel® Identity     encryption
    the OS                                                           Protection Technology with
                                                                      public key infrastructure


    Support for
                                                                                                  Ability to continue to benefit from previous
    desktop/traditional
                                                                                                  investment
    applications



    Device theft                                                                                  Higher confidence protection of corporate
    recovery and                            Remote wipe upon                                      assets; remote lock and remote unlock if
    remediation                             user request using        Using Intel® Anti-Theft     the device is found/returned
                                            Microsoft Exchange             Technology
                                               ActiveSync*




* Other names and brands may be claimed as the property of others.
8     Copyright © 2013, Intel Corporation. All rights reserved.
Device Management
• Intel® Core™ vPro™ processor-based
  tablets have Intel® Active Management
  Technology, which provides power state
  agnostic remote management
• Both Intel® Atom™ and Core vPro
  processor-based tablets can integrate
  with centralized management
  capabilities, including domain join and
  group policy enforcement
• Simplified deployment for IT and
  reduced infrastructure for lower TCO

               Intel® architecture-based tablets running Windows* 8
               provide enhanced security via device management capabilities.



* Other names and brands may be claimed as the property of others.
9    Copyright © 2013, Intel Corporation. All rights reserved.
Authentication
• Intel® Core™ vPro™ processor-based
  tablets use Intel® Identity Protection
  Technology with public key
  infrastructure to tie device to the OS
  for strong authentication using
  hardware encryption
• Both Intel® Atom™ and Intel® Core
  vPro processor-based tablets support
  multiple/strong authentication
  options for a better user experience
  and enhanced enterprise security

       Intel® architecture-based tablets running Windows* 8 enable IT
       to increase security while maintaining a great user experience.



* Other names and brands may be claimed as the property of others.
10   Copyright © 2013, Intel Corporation. All rights reserved.
Desktop/Legacy Applications
       Supports execution of
       desktop/traditional applications
       • Enterprise can continue to benefit
         from previous investment

       Easy-to-add third-party security
       plug-ins using desktop mode for
       enhanced security
       • Examples include anti-malware or
         Host Intrusion Prevention (HIPs)



               Intel® architecture-based tablets running Windows* 8 support
               desktop/traditional applications and add-on security controls.



* Other names and brands may be claimed as the property of others.
11   Copyright © 2013, Intel Corporation. All rights reserved.
Protection for Lost or Stolen Devices
     Intel® Core™ vPro™ processor-based
     tablets support Intel® Anti-Theft
     Technology (Intel® AT):
     • Remote disable or “lock” with “check-in
       time-out” from the network or through a
       web console
     • Device can be offline and disable/lock still
       functions
     • Remote restore or “unlock” if the device is
       found/returned


          Addition of Intel AT to Intel® Core™ vPro™ processor-based
          tablets can help protect information and support device recovery.


Intel AT is provided by Intel but there is a charge of $29.99 per year for an individual copy. It can be purchased here:
 http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=3673716&CatId=7499

12   Copyright © 2013, Intel Corporation. All rights reserved.
Next Steps
     • Investigate capabilities of
       biometrics in Intel environment

     • IT proofs-of-concept have started
       – Bring-your-own device Windows* 8 Pro
       – Corporate-owned tablets

     • IT Windows* 8 Deployment
       – Accelerated deployment, leveraging
         Windows 7 migration learning
       – Phased approach: Windows 8 will be
         the default OS by end of Q2’2013




* Other names and brands may be claimed as the property of others.
13   Copyright © 2013, Intel Corporation. All rights reserved.
Summary

     • Tablets running on Intel® architecture with Microsoft
       Windows* 8 are enterprise-ready and consumer-friendly
     • Intel IT benefits from enhanced device management and
       information security capabilities
     • Employees benefit from improved user experience




* Other names and brands may be claimed as the property of others.
14   Copyright © 2013, Intel Corporation. All rights reserved.
Additional Resources

      • Deploying Microsoft Windows 8
        in the Enterprise paper



      • Evaluating Microsoft Windows 8
        Security on Intel Architecture
        Tablets brief



      • Inside IT Radio Show series



      Learn more about Intel IT’s initiatives at www.intel.com/IT

* Other names and brands may be claimed as the property of others.
15   Copyright © 2013, Intel Corporation. All rights reserved.
IT Annual Performance Report
2012 Initiatives and 2013 Priorities


              In-depth look at
             Intel IT operations
                and priorities



       Shares the impact and
       value Intel IT creates
              for Intel



           Read the Performance Report at:
           www.intel.com/go/ITAnnualReport


16   Copyright © 2013, Intel Corporation. All rights reserved.
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

  • 1.
    Evaluating Microsoft Windows*8 Security on Intel® Architecture-based Tablets Intel Corporation January 2013
  • 2.
    Legal Notices This Legal Notices slide should not be separated from the presentation, nor should individual slides be extracted from this presentation. Intel ® Identity Protection Technology (Intel® IPT): No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd Generation Intel® Core™ processor enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com. Intel® Anti-Theft Technology (Intel® AT): No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software, and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro. Security features enabled by Intel® AMT require an enabled chipset, network hardware and software and a corporate network connection. Intel® AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more info, see www.intel.com/technology/manage/iamt Intel may make changes to specifications and product descriptions at any time, without notice. This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estopel or otherwise, to any intellectual property rights is granted herein. Intel, the Intel logo, Intel Atom, Intel Core, and Intel Core vPro are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others. 2 Copyright © 2013, Intel Corporation. All rights reserved.
  • 3.
    Agenda • Background • Securityand Manageability Evaluation • Next steps • Summary
  • 4.
    Why Microsoft Windows*8 Now? Intel IT continually evaluates We learned from our migration to new devices that can increase Windows* 7 that the combination employee productivity and be of new software and new hardware managed as needed in the can bring significant benefits to the corporate environment. enterprise—both employees and IT. Intel IT continually searches for products and technologies that balance employee productivity, cost control, and enterprise risk. * Other names and brands may be claimed as the property of others. 4 Copyright © 2013, Intel Corporation. All rights reserved.
  • 5.
    Platforms Tested Intel® vPro Technology Processor RAM Chipset Graphics SATA Support Tablet designed with an Intel® Atom™ processor running Microsoft Windows* 8 Enterprise1 Intel® Atom™ 2-GB LPDDR2 System on Imagination eMMC Not applicable processor 800 MHz chip Technologies* 64 GB Z2760 system PowerVR* on chip SGX545 1.8 GHz Tablet designed with a 3rd generation Intel® Core™ vPro™ processor running Microsoft Windows* 8 Enterprise Intel® Core™ 4-GB DDR3 Intel® QM77 Intel® HD mSATA Intel® Active i5-3427U 1600 MHz Express Graphics 4000 128 GB Management processor Chipset Technology 8.0 2.3 GHz 1 We tested Windows* 8 Enterprise. Other versions of Windows 8, such as Windows 8 Professional, will be made available to certain segments of Intel employees. For a discussion of Windows 8 Enterprise, refer to: http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8/enterprise-edition.aspx For the rest of this presentation, we will refer to Windows 8 Enterprise as Windows 8. * Other names and brands may be claimed as the property of others. 5 Copyright © 2013, Intel Corporation. All rights reserved.
  • 6.
    Four Categories ofExploration Device Improvements in Support Protection for management authentication for desktop/legacy lost or stolen applications devices Intel® architecture-based tablets running Windows* 8 matched or exceeded the security capabilities of those currently deployed. * Other names and brands may be claimed as the property of others. 6 Copyright © 2013, Intel Corporation. All rights reserved.
  • 7.
    Summary of Results Windows* 8 and Windows* 8 and Intel® Atom™ Intel® Core™ vPro™ Benefit of Windows* 8 Enterprise Capability Processor Processor and Intel® Architecture Domain join and Enhanced authentication and control; group policy more policies available Windows 8 Enterprise and Intel architecture offers simplified Manageability In-band and deployments, reduced infrastructure, In-band remote out-of-band remote and recovery in all power states management management Support for Enhanced security via plug-ins using third-party desktop mode browser add-ons Support for multiple/strong Simplified user experience with authentication enhanced enterprise security methods (e.g. biometrics) * Other names and brands may be claimed as the property of others. 7 Copyright © 2013, Intel Corporation. All rights reserved.
  • 8.
    Summary of Results(cont.) Windows* 8 and Windows* 8 and Intel® Atom™ Intel® Core™ vPro™ Benefit of Windows* 8 Enterprise Capability Processor Processor and Intel® Architecture One-time Intel Core vPro processor-based tablets password (OTP) Not embedded in have embedded tokens HW, but available in OTP is embedded in HW SW Authentication using certificates Strong authentication using hardware to tie device to Using Intel® Identity encryption the OS Protection Technology with public key infrastructure Support for Ability to continue to benefit from previous desktop/traditional investment applications Device theft Higher confidence protection of corporate recovery and Remote wipe upon assets; remote lock and remote unlock if remediation user request using Using Intel® Anti-Theft the device is found/returned Microsoft Exchange Technology ActiveSync* * Other names and brands may be claimed as the property of others. 8 Copyright © 2013, Intel Corporation. All rights reserved.
  • 9.
    Device Management • Intel®Core™ vPro™ processor-based tablets have Intel® Active Management Technology, which provides power state agnostic remote management • Both Intel® Atom™ and Core vPro processor-based tablets can integrate with centralized management capabilities, including domain join and group policy enforcement • Simplified deployment for IT and reduced infrastructure for lower TCO Intel® architecture-based tablets running Windows* 8 provide enhanced security via device management capabilities. * Other names and brands may be claimed as the property of others. 9 Copyright © 2013, Intel Corporation. All rights reserved.
  • 10.
    Authentication • Intel® Core™vPro™ processor-based tablets use Intel® Identity Protection Technology with public key infrastructure to tie device to the OS for strong authentication using hardware encryption • Both Intel® Atom™ and Intel® Core vPro processor-based tablets support multiple/strong authentication options for a better user experience and enhanced enterprise security Intel® architecture-based tablets running Windows* 8 enable IT to increase security while maintaining a great user experience. * Other names and brands may be claimed as the property of others. 10 Copyright © 2013, Intel Corporation. All rights reserved.
  • 11.
    Desktop/Legacy Applications Supports execution of desktop/traditional applications • Enterprise can continue to benefit from previous investment Easy-to-add third-party security plug-ins using desktop mode for enhanced security • Examples include anti-malware or Host Intrusion Prevention (HIPs) Intel® architecture-based tablets running Windows* 8 support desktop/traditional applications and add-on security controls. * Other names and brands may be claimed as the property of others. 11 Copyright © 2013, Intel Corporation. All rights reserved.
  • 12.
    Protection for Lostor Stolen Devices Intel® Core™ vPro™ processor-based tablets support Intel® Anti-Theft Technology (Intel® AT): • Remote disable or “lock” with “check-in time-out” from the network or through a web console • Device can be offline and disable/lock still functions • Remote restore or “unlock” if the device is found/returned Addition of Intel AT to Intel® Core™ vPro™ processor-based tablets can help protect information and support device recovery. Intel AT is provided by Intel but there is a charge of $29.99 per year for an individual copy. It can be purchased here: http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=3673716&CatId=7499 12 Copyright © 2013, Intel Corporation. All rights reserved.
  • 13.
    Next Steps • Investigate capabilities of biometrics in Intel environment • IT proofs-of-concept have started – Bring-your-own device Windows* 8 Pro – Corporate-owned tablets • IT Windows* 8 Deployment – Accelerated deployment, leveraging Windows 7 migration learning – Phased approach: Windows 8 will be the default OS by end of Q2’2013 * Other names and brands may be claimed as the property of others. 13 Copyright © 2013, Intel Corporation. All rights reserved.
  • 14.
    Summary • Tablets running on Intel® architecture with Microsoft Windows* 8 are enterprise-ready and consumer-friendly • Intel IT benefits from enhanced device management and information security capabilities • Employees benefit from improved user experience * Other names and brands may be claimed as the property of others. 14 Copyright © 2013, Intel Corporation. All rights reserved.
  • 15.
    Additional Resources • Deploying Microsoft Windows 8 in the Enterprise paper • Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets brief • Inside IT Radio Show series Learn more about Intel IT’s initiatives at www.intel.com/IT * Other names and brands may be claimed as the property of others. 15 Copyright © 2013, Intel Corporation. All rights reserved.
  • 16.
    IT Annual PerformanceReport 2012 Initiatives and 2013 Priorities In-depth look at Intel IT operations and priorities Shares the impact and value Intel IT creates for Intel Read the Performance Report at: www.intel.com/go/ITAnnualReport 16 Copyright © 2013, Intel Corporation. All rights reserved.

Editor's Notes

  • #2 Intel IT is currently evaluating the information security and privacy protection features of Intel® architecture-based tablets running Windows* 8 Enterprise.1 Our initial evaluations indicate that, together, Windows 8 and Intel® architecture provide a compelling platform for mobile devices in the enterprise, balancing enhanced information security capabilities with consumer-friendliness. We evaluated both an Intel® Atom™ processor-based tablet and an Intel® Core™ vPro™ processor-based tablet.This slide deck presents our findings.Take-aways:Tablets running on Intel® architecture with Microsoft Windows 8 Enterprise are both enterprise-ready and consumer-friendly.Intel IT benefits from enhanced device management and information security capabilities.Employees benefit from improved user experience.1 We tested Windows* 8 Enterprise. Other versions of Windows 8, such as Windows 8 Professional, will be made available to certain segments of Intel employees. For a discussion of Windows 8 Enterprise, refer to microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8/enterprise-edition.aspx.
  • #4 This section: Provide background/motivation
  • #5 Slide purpose: Set the stage for the evaluation.Since 2009, Intel IT has supported consumerization through our bring-your-own-device (BYOD) programs. To further these programs, we continually look for devices that increase employee productivity and can be managed as needed in the corporate environment. In preparation for the expansion of our support for consumerization, we evaluated two tablets for the enterprise, focusing on information security and manageability features and the benefits of these features within the enterprise environment.Our evaluation of Intel® architecture-based tablets running Windows* 8 is part of Intel IT’s ongoing research into new combinations of technology that balance employee productivity and job satisfaction, IT cost control, and manage risk to enterprise security.
  • #6 Slide purpose: Describe what we testedWe tested Windows 8 running on two tablets with Intel® processors.A tablet with an Intel® Atom™ processorA tablet with a 3rd generation Intel® Core® vPro™ processorSpecifically, we investigated capabilities that would enhance information security associated with small form factor (SFF) devices. We also performed a baseline comparison to existing SFF solutions in the areas of device hardware security, OS-level security features, and application ecosystem security.Our approach involved an ecosystem review and a hands-on product evaluation. The ecosystem review gave us information about available products and solutions, while the hands-on testing allowed us to validate that the solutions provided the capabilities we need and improvements over existing solutions that have been implemented.
  • #14 Slide purpose: Briefly discuss what we will do with the results of our evaluation.Based on the positive results of our evaluation, we intend to conduct several proofs of concept of both bring-your-own device and corporate-purchased Intel® architecture-based tablets running Windows* 8. We also plan to continue to investigate the capabilities of biometrics, and their corresponding privacy implications, in our security environment.
  • #15 This slide represents the summary of the presentation.Based on an ecosystem review and a hands-on product evaluation, we determined that Intel® architecture-based tablets running Windows* 8 can enhance information security associated with devices with small form factors.We tested Windows 8 on Intel® architecture-based tablets and found security enhancements in four categories: flexible device management, hardware-assisted security through Intel® Identity Protection Technology, support for desktop/legacy enterprise applications, and the availability of Intel® Anti-Theft Technology. Overall, the tablets we tested balanced enterprise readiness with consumer-friendliness, with the Intel® Core™ vPro™ processor-based tablets offering the most security and manageability benefits to both the enterprise and users.
  • #17 Slide purpose: promote the Annual Performance Report (APR)Talking Points:Every year over the past 10 years, our organization has taken the time to document our operations, strategies, and business value in an annual performance report for our organization.Over the past decade this document has helped communicate those priorities widely to many audiences.Inside our own IT organization and our IT employees showing them their impact to the business Inside our own business to our business stakeholders showing them the value of what we have done and how we have helped improved business value for IntelFinally, with the world and our peer IT organizations. We have found that by openly sharing what we are doing, we establish a dialogue that is mutually beneficial for our own organization , informally benchmarking and sharing key lessons, best practices and strategies while also helping to better understand and shape the direction of the industry through these partnershipsWe publish this document yearly, in January. You can find the 2010-2011 version on www.intel.com/IT.