Intel Appoints UDT Executive to Its Solution Provider Advisory Council

Share on facebook
Share on google
Share on twitter
Share on linkedin

Miami, FL – May 19, 2010 – UDT today announced that Daniel Rodriguez, Director of Technology Solutions has been appointed to the Intel Solution Provider Advisory Council. During his 2-year term he will advise Intel on its development of new products, channel program benefits and other concerns of Intel Technology Provider program members.

“Joining the Intel Solution Provider Advisory Council will allow me to join other thought leaders in driving the kinds of innovative new technology solutions our clients need.”

said Rodriguez The Intel Solution Provider Advisory Council consists of 17 tier one members of the Intel Technology Provider program.

As a council member, Rodriguez will play a key advisory role in helping Intel develop products that are relevant to resellers’ customer needs, and will guide channel program benefits that keep members competitive in the marketplace. The council also provides Intel’s channel membership with a consolidated voice heard by Intel senior management. “Daniel’s extensive experience in the computer industry makes him a valued member of the Intel Solution Provider Advisory Council,” said Darrell Black, Director, North American Branded Partner Sales Enterprise Solution Sales (ESS) Intel Americas, Inc.

“Intel feels we create better products and programs based on feedback from industry experts such as Daniel Rodriguez. We are honored to have him on the council and look forward to the many great ideas he will bring to product planning and program development at Intel.” With over fifteen years of experience working with some of the best known IT firms in the world, Daniel Rodriguez is one of the foremost thought leaders in the IT industry today. As Director of Technology Solutions at UDT, he helps clients leverage critical IT assets and solutions to move beyond a static and closed IT infrastructure environment to help answer some of their most critical pain points in an ever-shifting environment.

“This is another indicator that UDT far outpaces the competition,” said Henry Fleches, President/CEO of UDT. “While UDT is honored to serve on several OEM advisory councils, having Intel reach out to UDT allows us to contribute at the architecture level.”

Daniel’s selection to Intel’s advisory council clearly demonstrates UDT’s capacity to move beyond the OEM and operate and lead at the platform vendor level.    We are proud to serve on Intel’s SPAC and look forward to contributing to the industry’s overall strategy for the future.” To learn more about UDT’s unique value proposition, please visit them online at or please contact them at 305-882-0435. For all media inquiries, please contact Marvin Dejean, Director of Marketing at 305-882-0435 ext. 5916 or e-mail at .

About UDT:

UDT Inc. (UDT)  named one of the 50 fastest growing IT firms in the U.S. by Everything Channel is a leading provider of high-performance technology solutions in the Southeast and Mid-West United States. The company is dedicated to helping our customers maximize their investments in IT by providing the best and latest technology solutions. UDT partners with top tier leaders in the industry to provide the latest products, from personal computing, audio visual infrastructure to customized solutions to our clients. At UDT, we believe that your IT experience should always help you “accomplish more”.  Learn more by visiting

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

SOC Solutions

The 9 Main Benefits of SOC Solutions

The Security and Operations Center (SOC) is where the cybersecurity strategy of a business is coordinated and implemented. It is composed of the three building blocks of people, processes and technology that go hand in hand to manage and enhance the organization’s security posture.

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,