id="info"

Intel Corporation

Displaying 1 - 10 of 94 results

  • Single-Cycle Collective Communication Over a Shared Network Fabric

    White Papers // Jun 2014 // provided by Intel Corporation

    In the multicore era, on-chip network latency and throughput have a direct impact on system performance. A highly important class of communication flows traversing the network is collective, i.e., one-to-many and many-to-one. Scalable coherence protocols often leverage imprecise tracking to lower the overhead of directory storage, in turn leading to ...

    Download Now
  • Recent Contributions to Cryptographic Hash Functions

    White Papers // May 2014 // provided by Intel Corporation

    Hash functions are cryptography’s most widely used primitives, in that they are a fundamental building block used for a wide variety of constructions. The recent attacks of Joux, Wang, and others against the current generation of hash functions has stimulated a resurgence of research into these primitives as well as ...

    Download Now
  • Requirements and Risk Management

    White Papers // May 2014 // provided by Intel Corporation

    First and foremost one needs to learn what is meant by “requirements” in a security and engineering context, why requirements are useful for managing risk and what IOT requirements may look like. Risks will manifest themselves in relation to “requirements” or project goals: what do you need to get from ...

    Download Now
  • The Anatomy of the Internet of Things

    White Papers // May 2014 // provided by Intel Corporation

    This article describes composition of the IOT. In order to manage risk you need to understand not only the applications, devices, or services under assessment, but also the other types of devices that will at some point certainly share parts of the underlying infrastructure of the IOT.

    Download Now
  • The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

    White Papers // May 2014 // provided by Intel Corporation

    The proliferation of botnets reveal a worrisome trend in the spread and sophistication of computer viruses and worms in the Internet today. (A botnet is essentially a collection of compromised distributed computers or systems, known as bots because of their zombie-like nature, under the control of a bot-herder, by virtue ...

    Download Now
  • The Economic of Service Orientation

    White Papers // May 2014 // provided by Intel Corporation

    The goal of service orientation is to attain a structural cost reduction in the delivery of IT services through reuse and standardization. However, the transition from a traditional system to one based on services requires breaking monolithic applications into standard services, often with Web front ends to facilitate reuse not ...

    Download Now
  • The Emergence of Virtual Service Oriented Grids

    White Papers // May 2014 // provided by Intel Corporation

    In the ever changing world of development and IT, understanding the possibilities new paradigms present and their capacity to change the way business is done is imperative. In much the same way the Internet changed business forever, virtual service oriented grid computing has the potential to force change once again. ...

    Download Now
  • Cloud Computing Basics

    White Papers // May 2014 // provided by Intel Corporation

    In this article we go through some basic concepts with the purpose of providing context for the discussions in the chapters that follow. Here, we review briefly the concept of the cloud as defined by the U.S. National Institute of Standards and Technology, and the familiar terms of IaaS, PaaS, ...

    Download Now
  • ENCRYPTING THE INTERNET

    White Papers // May 2014 // provided by Intel Corporation

    The evolution of the Internet has resulted in large quantities of information being exchanged by businesses or private individuals. The nature of this information is typically both public and private, and much of it is transmitted over the hyper text transfer protocol (HTTP) in an insecure manner. A small amount ...

    Download Now
  • ENHANCED DETECTION OF MALWARE

    White Papers // May 2014 // provided by Intel Corporation

    A signifi cant development in the malware landscape in recent years is the ability of hackers to monetize compromised platforms by (1) gathering valuable information that can be sold, (2) using the platform’s resources to aid in an illicit or unwanted activity, or (3) holding information contained on the platform ...

    Download Now