Intel

Displaying 81 - 90 of 139 results

  • Quantifying and Improving DNSSEC Availability

    White Papers // May 2011 // provided by Intel

    The Domain Name System (DNS) is a foundational component of today's Internet for mapping Internet names to addresses. With the DNS Security Extensions (DNSSEC) DNS responses can be cryptographically verified to prevent malicious tampering. The protocol complexity and administrative overhead associated with DNSSEC can significantly impact the potential for name ...

    Download Now
  • Migrating Mission-Critical Environments to Intel Architecture

    White Papers // May 2011 // provided by Intel

    Intel's business results rely on these environments, so the authors approached the migrations with caution. Ultimately, however, the migrations were less difficult - and the benefits greater - than they originally anticipated. By using a phased approach and implementing best practices derived from their experiences, they minimized or eliminated most ...

    Download Now
  • Improving Healthcare Risk Assessments to Maximize Security Budgets

    White Papers // Mar 2011 // provided by Intel

    Healthcare is undergoing major changes that are being driven by medical, consumer, IT, and security trends. While these trends. While these trends deliver compelling benefits to healthcare organizations, workers, and patients, they also carry significant privacy and security risks. Healthcare organizations are seeing an escalation in the frequency and impact ...

    Download Now
  • Rethinking Database Algorithms for Phase Change Memory

    White Papers // Jan 2011 // provided by Intel

    Phase Change Memory (PCM) is an emerging memory technology with many attractive features: it is non-volatile, byte-addressable, 2 - 4X denser than DRAM, and orders of magnitude better than NAND Flash in read latency, write latency, and write endurance. In the near future, PCM is expected to become a common ...

    Download Now
  • Small Trusted Primitives for Dependable Systems

    White Papers // Jan 2011 // provided by Intel

    Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault tolerance depend on a very small number of assumptions taken on faith; such assumptions are typically called the "Trusted Computing Base" (TCB) of a system. However, ...

    Download Now
  • Bootstrapping a Distributed Computational Economy With Peer-to-Peer Bartering

    White Papers // Jan 2011 // provided by Intel

    This paper presents an architecture for distributed computational economies based on peer-to-peer bartering. The architecture is based on the position that computational economies ought to be bootstrapped based on a layer of simple and robust resource exchange. The architecture is comprised of three pieces: Resource discovery, secure resource peering, and ...

    Download Now
  • Finally, a Use for Componentized Transport Protocols

    White Papers // Jan 2011 // provided by Intel

    This paper argues a new relevance for an old idea: Decomposing transport protocols into a set of resuable building blocks that can be recomposed in different ways depending on application requirements. The authors conjecture that point-to-point applications may well be adequately served by the existing suite of monolithic protocol implementations, ...

    Download Now
  • Proof Sketches: Verifiable In-Network Aggregation

    White Papers // Jan 2011 // provided by Intel

    Recent work on distributed, in-network aggregation assumes a benign population of participants. Unfortunately, modern distributed systems are plagued by malicious participants. In this paper the authors present a first step towards verifiable yet efficient distributed, in-network aggregation in adversarial settings. They describe a general framework and threat model for the ...

    Download Now
  • Safeguarding Critical Enterprise Assets and Data

    White Papers // Jan 2011 // provided by Intel

    Each year, an estimated two million laptops are stolen, and 97 percent of those are never recovered. In addition, one in 10 people have lost a laptop, Smartphone, or USB drive that contains corporate information. In almost every case, these stolen hardware assets contain sensitive, valuable data that is proprietary ...

    Download Now
  • Linux as a Hypervisor

    White Papers // Dec 2010 // provided by Intel

    Virtual machines are a relatively new workload for Linux. As with other new types of applications, Linux support was somewhat lacking at first and improved over time. This paper describes the evolution of hypervisor support within the Linux kernel, the specific capabilities which make a difference to virtual machines, and ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?