Intel

Displaying 1-40 of 296 results

  • White Papers // Mar 2015

    Your powerful cross-architecture, cross-OS productivity suite.

    Choose your preferred IDE and develop apps with ease for mobile and client devices. Intel® Integrated Native Developer Experience (Intel® INDE) is a comprehensive set of tools and libraries to build, analyze, and debug Android and Windows apps. Now, you can quickly and easily create applications with native performance and...

    Provided By Intel

  • White Papers // Mar 2014

    Platform Boot Integrity Platform Foundation for Foundation Trusted Compute Pools

    In this article we will take a deep look into ensuring boot integrity of the platform which in turn boils down to ensuring the integrity of a number of platform components: the integrity of prelaunch and launch components covering firmware, BIOS and hypervisor. Boot integrity is foundational in embodying the...

    Provided By Intel

  • White Papers // Mar 2014

    The Rise of Virtual Service Grids

    The concept of virtualization and sharing of resources is not a new one. In fact, the idea of standardization has been around since the industrial revolution made it possible to mass produce identical parts. Because of this, manufacturing and production costs declined steeply, as businesses no longer needed to specialize...

    Provided By Intel

  • White Papers // Mar 2014

    An Introduction to Virtual Service Oriented Grids

    While the idea of virtual service-oriented grids may be a new business concept, the technologies that build the groundwork for this idea go back many decades to the early days of computing research. That being said, the combination of these technologies brings non-functional, yet significant capabilities to a system. Virtual...

    Provided By Intel

  • White Papers // Mar 2014

    Technology Evolution, People, and Privacy

    This article takes a look at the history of information, technology, beneficiaries of that technology and their relationship to data governance development over time. Innovation in business models, technology capabilities, and the changing relationships in the ownership and accessibility to data has resulted in a fundamental shift in size and...

    Provided By Intel

  • White Papers // Mar 2014

    Moving To Office 365 On The Cloud

    We plan and design for change. After the change happens, we begin to plan for the next change. What drives change? Many factors drive change in technology--lower cost of equipment, better compute power, greater bandwidth, new software, and so on. In this article, we look at how Office 365, a...

    Provided By Intel

  • White Papers // Mar 2014

    The Trusted Cloud: Addressing Security and Compliance

    This article will address one of the biggest barriers impeding broader adoption of cloud computing is security--the real and perceived risks of providing, accessing and control services in multitenant cloud environments. IT managers would like to see higher levels of assurance before they can declare their cloud-based services and data...

    Provided By Intel

  • White Papers // Mar 2014

    Digital Asset Management: Describing and Searching Mass Assets

    Processes are constantly being developed and improved to allow digital asset management (DAM) leaders to upload large sets of assets to their networks. Once uploaded and accessible, certain searching tools can help users to find information that is pertinent to their needs and prevent users from being overwhelmed with unhelpful...

    Provided By Intel

  • White Papers // Mar 2014

    Digital Asset Management: Digital Archaeology and Migration

    Digital preservation protects data to ensure continuing access in the future; digital archaeology and migration are two preservation strategies used to create and maintain access to obsolete information resources. "Emulation" and "refreshing" are two tools used in digital archaeology to retrieve information from obsolete media. Migration, or moving older data...

    Provided By Intel

  • White Papers // Mar 2014

    Cloud Computing

    Many users of computer technology—and for that matter, many technology creators and administrators—complain about the rapid pace of change in information technology. The most recent example of a new technology trend bursting upon the scene is cloud computing. Setting a record for going from "what is it?" to "I've got...

    Provided By Intel

  • White Papers // Mar 2014

    Grid Computing: Operations Research Methods for Resource Management and Scheduling

    The grid computing paradigm is replacing localized computer clusters or the traditional "supercomputer" model for research and industry enterprises requiring increasingly large amounts of processing power and storage. Computational grids are distributed systems integrating geographically-separate resources into a single, massively parallel network well-suited to complex processing tasks. This article introduces...

    Provided By Intel

  • White Papers // Mar 2014

    Grid Computing: Optimization Techniques for Skeletons on Grids

    Skeletons are common patterns of parallelism in distributed computing systems. These often-used components, such as farm, map, and pipeline, can be abstracted and offered to application programmers as programming primitives. This article introduces the motivation for implementing algorithmic skeletons and demonstrates use of Lithium, a programming environment based on Java...

    Provided By Intel

  • White Papers // Mar 2014

    Client Virtualization in a Cloud Environment

    Arguably computation models seen in client space are much more diverse than those in the server space proper. For servers, there are essentially two, the earlier model of static consolidation and the more recent dynamic model where virtual machines lightly bound to their physical hosts and can be moved around...

    Provided By Intel

  • White Papers // Nov 2013

    An Introduction to Building Intelligent Systems

    Consumers are now demanding and expecting more from technology. Building intelligence into our devices is a promising way to satisfy this demand by providing more personalized experiences. In Building Intelligent Systems, the authors investigate how computer vision, machine learning, and data mining can be used together to build smarter devices...

    Provided By Intel

  • White Papers // Apr 2013

    Implementing Self-Service BI to Improve Business Decision Making

    Self-service Business Intelligence (BI) represents a paradigm shift in the way businesses use their data. By enabling end users to combine and analyze large amounts of data, self-service BI provides a pathway to better decision making across the enterprise. Yet effective decision making for core business processes often requires trusted...

    Provided By Intel

  • Case Studies // Mar 2013

    Securities Transactions Get Speed With Cloud

    Need to build a solid IT system foundation. Ensure a stable IT environment to carry out any securities transaction activities and launch new services efficiently, ensure fast flow of securities transactions and meet other complex commercial applications. The solutions provided for these challenges were carry out comprehensive architectural planning, ensure...

    Provided By Intel

  • White Papers // Dec 2012

    Energy-Efficient Interconnect Via Router Parking

    The increase in on-chip core counts in Chip MultiProcessors (CMPs) has led to the adoption of interconnects such as Mesh and Torus, which consume an increasing fraction of the chip power. Moreover, as technology and voltage continue to scale down, static power consumes a larger fraction of the total power;...

    Provided By Intel

  • White Papers // Nov 2012

    Correlation-Based Cell Search and Measurement for LTE and LTE-A

    Quick detection and accurate measurement of multiple cells surrounding the User Equipment (UE) are essential to ensure the mobility and QoS of end users. In LTE and LTE-A, multiple cells are often time synchronized or quasi-synchronized so that weak cells "Eclipsed" by strong interfering cells are difficult to detect. In...

    Provided By Intel

  • White Papers // Nov 2012

    A Mutual-Information Based Power Allocation Algorithm for Multi-Layer Rate Splitting Scheme in Tri-sectored Wireless Networks

    Cell-edge users inevitably suffer from strong interference from adjacent cells, and consequently their throughput will decrease. Recent investigations show that the Han-Kobayashi (HK) rate splitting scheme is the best known strategy to mitigate the interference for a two-user interference channel. However, its receiver is too complicated to implement in practical...

    Provided By Intel

  • White Papers // Sep 2012

    A Systematic Methodology to Architecting High Performance Storage Systems

    A good storage system is a well-balanced system in which each individual component is suited for its purpose and all the components fit together to achieve optimal performance. Designing a large scale, high performance storage system presents significant challenges. This paper describes a systematic approach to designing a storage system,...

    Provided By Intel

  • Case Studies // Aug 2012

    Strengthen Cloud Security With Intel Advanced Encryption Standard New Instructions

    Tier 3 knows the value of protecting data. As a leading provider of enterprise-class cloud software and federated cloud services, Tier 3 helps organizations securely expand their infrastructure into the cloud without incurring large capital expenses or additional administrative overhead. If the users encrypt data using software-only AES, they run...

    Provided By Intel

  • White Papers // Aug 2012

    Intel Xeon Processor E7 Family: Reliability, Availability, and Serviceability

    Today's businesses increasingly depend on Intel Xeon-based servers to run data-intensive and mission-critical applications. Server Reliability, Availability, and Serviceability (RAS) are crucial issues for modern enterprise IT shops that deliver mission critical applications and services, as application delivery failures can be extremely costly per hour of system downtime. Furthermore, the...

    Provided By Intel

  • White Papers // Aug 2012

    New Instructions Supporting Large Integer Arithmetic on Intel Architecture Processors

    New instructions mulx, adcx and adox are being introduced on Intel Architecture Processors. The adcx and adox instructions are being introduced one generation later than mulx. These new instructions will enable users to develop high-performance implementations of large integer arithmetic on Intel Architecture. To maximize performance of code using these...

    Provided By Intel

  • White Papers // Jul 2012

    Incorporate touch & sensor capabilities of Ultrabook™ into your software

    This guide provides developers with an overview of the Microsoft Windows 8 sensors application programming interfaces (APIs) for Desktop and Metro style applications, with a specific focus on the various sensor capabilities available in Windows 8 Desktop mode. This white paper summarizes the APIs that enable creating interactive applications by...

    Provided By Intel

  • White Papers // Jul 2012

    Learn to detect the sensors in Intel® Ultrabook™ devices

    The new generation of Ultrabook™, equipped with the 3rd Generation Intel® Core Processors, is a game changer. With a touch sensitive screen and a variety of sensors on-board, each Ultrabook is capable of much more than your standard laptop. This white paper outlines how you can detect each of the...

    Provided By Intel

  • White Papers // May 2012

    Multi-Layer Rate Splitting Scheme for Interference Mitigation in Tri-Sectored Wireless Networks

    In a multi-cell wireless network, cell-edge User Equipments (UEs) inevitably suffer from strong interference from adjacent cells which leads to the UE throughput decrease. Contrary to conventional interference mitigation techniques which treat the interference as noise, the authors propose to use a rate splitting based interference exploitation technique. A novel...

    Provided By Intel

  • White Papers // May 2012

    Pricing-Based Distributed Mobile Association for Heterogeneous Networks With Cooperative Relays

    Heterogeneous networks improve the spectrum efficiency and coverage of wireless communication networks by deploying low-power nodes on top of the conventional network nodes. In this paper, the authors consider a heterogeneous cellular network with multiple low-power Relay Nodes (RN) deployed in each cell using in-band wireless backhaul between the RN...

    Provided By Intel

  • White Papers // May 2012

    Fast SHA-256 Implementations on Intel Architecture Processors

    The paper describes a family of highly-optimized implementations of the Fast SHA-256 cryptographic hash algorithm, which provide industry leading performance on a range of Intel Processors for a single data buffer consisting of an arbitrary number of data blocks. The paper describes the overall design of the Fast SHA-256 software,...

    Provided By Intel

  • White Papers // Apr 2012

    Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications?

    Current processor trends of integrating more cores with wider SIMD units, along with a deeper and complex memory hierarchy, have made it increasingly more challenging to extract performance from applications. It is believed by some that traditional approaches to programming do not apply to these modern processors and hence radical...

    Provided By Intel

  • White Papers // Mar 2012

    Design and Implementation of a Consolidated Middlebox Architecture

    Network deployments handle changing application, workload, and policy requirements via the deployment of specialized network appliances or \"Middleboxes\". Today, however, middlebox platforms are expensive and closed systems, with little or no hooks for extensibility. Furthermore, they are acquired from independent vendors and deployed as standalone devices with little cohesiveness in...

    Provided By Intel

  • White Papers // Mar 2012

    Application of Rate Splitting Transmission Scheme for LTE-Advanced Systems

    In a multi-cell wireless network, an efficient interference mitigation technique is an inevitable part of the current state-of-the-art wireless system. As opposed to conventional interference mitigation techniques which treat the interference as noise, a multi-layer rate splitting scheme can be considered to improve the performance by decoding part of the...

    Provided By Intel

  • White Papers // Mar 2012

    Intel HD Graphics with Dynamic Frequency Technology

    This paper is to explain what Intel HD Graphics Dynamic Frequency Technology is and how it complements Intel Turbo Boost Technology. The paper will also explain how the user can interact with the technology to further enhance the computing experience. This integration of Central Processor Unit (CPU), memory controller and...

    Provided By Intel

  • White Papers // Mar 2012

    Implementing PXE Boot Using Intel BLDK for Intel Atom Processor Based Boards

    Intel provides an EFI-standard based Boot Loader Development Kit (BLDK) for various Intel Atom processors. This paper discusses how to modify the Intel BLDK code base to support network booting (PXE boot). The resulting BLDK image is programmed onto an Intel Atom Processor E6xx series with Intel platform controller hub...

    Provided By Intel

  • White Papers // Mar 2012

    Designing Intel VPro Technology Capable OPS Display Panels

    An Intel vPro technology capable Open Pluggable Specification (OPS) module offers a collection of Intel technologies which comprise remote manageability, security and virtualization technology with the aim of enhancing robustness, usability and user experience of the system. Evolution of communication technology and innovation in computing technology has paved the path...

    Provided By Intel

  • White Papers // Feb 2012

    Quantifying DNS Namespace Influence

    Name resolution using the Domain Name System (DNS) is integral to today's Internet. The resolution of a domain name is often dependent on namespace outside the control of the domain's owner. In this paper, the authors review the DNS protocol and several DNS server implementations. Based on their examination, they...

    Provided By Intel

  • White Papers // Feb 2012

    2nd Generation Intel Core VPro Processor Family

    The 2nd generation Intel Core vPro processor family delivers visible benefits in intelligent security, greater manageability, and adaptable performance. Intelligent security is built in, with hardware-based features that can prevent malicious attacks, automatically isolate infected systems, and respond faster when a problem occurs. Authorized IT administrators can now remotely access,...

    Provided By Intel

  • White Papers // Feb 2012

    Intel QuickPath Architecture

    Through its rapid "Tick-tock" cadence for microprocessor innovation, Intel introduces a new micro architecture or a new process technology (that includes enhanced micro architecture features) nearly every year. The result is a cycle of industry-leading microprocessor performance. At the same time, the company also continuously looks for other ways to...

    Provided By Intel

  • White Papers // Feb 2012

    Technology: Your Roadmap to Small-Business Success

    In the past two decades, computers and the Internet have changed the world. People now communicate faster, more often, and in different ways. Likewise, businesses operate differently - processing and storing more information, reaching out to new markets, and managing operations more efficiently. The advent of technology has ensured that...

    Provided By Intel

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • White Papers // Jan 2012

    Solving Intel IT's Data Storage Growth Challenges

    Intel IT is using a variety of techniques to accommodate growing demand for storage capabilities, without increasing costs. In 2011 Intel faced a 53 percent increase in storage capacity from 2010, and the continued build out of the authors' private cloud could increase this demand even further. They are managing...

    Provided By Intel

  • White Papers // Nov 2009

    Explaining Cache SER Anomaly Using DUE AVF Measurement

    The authors have discovered that processors can experience a super-linear increase in Detected Unrecoverable Errors (DUE) when the write-back L2 cache is doubled in size. This paper explains how an increase in the cache tag's Architectural Vulnerability Factor or AVF caused such a super-linear increase in the DUE rate. AVF...

    Provided By Intel

  • Case Studies // Mar 2013

    Securities Transactions Get Speed With Cloud

    Need to build a solid IT system foundation. Ensure a stable IT environment to carry out any securities transaction activities and launch new services efficiently, ensure fast flow of securities transactions and meet other complex commercial applications. The solutions provided for these challenges were carry out comprehensive architectural planning, ensure...

    Provided By Intel

  • Case Studies // Aug 2012

    Strengthen Cloud Security With Intel Advanced Encryption Standard New Instructions

    Tier 3 knows the value of protecting data. As a leading provider of enterprise-class cloud software and federated cloud services, Tier 3 helps organizations securely expand their infrastructure into the cloud without incurring large capital expenses or additional administrative overhead. If the users encrypt data using software-only AES, they run...

    Provided By Intel

  • White Papers // Apr 2012

    Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications?

    Current processor trends of integrating more cores with wider SIMD units, along with a deeper and complex memory hierarchy, have made it increasingly more challenging to extract performance from applications. It is believed by some that traditional approaches to programming do not apply to these modern processors and hence radical...

    Provided By Intel

  • White Papers // Sep 2012

    A Systematic Methodology to Architecting High Performance Storage Systems

    A good storage system is a well-balanced system in which each individual component is suited for its purpose and all the components fit together to achieve optimal performance. Designing a large scale, high performance storage system presents significant challenges. This paper describes a systematic approach to designing a storage system,...

    Provided By Intel

  • White Papers // Mar 2009

    Energy Star Version 5.0 System Implementation

    Modern computers have a growing all-pervasive presence in offices and homes as they help increase productivity and improve entertainment and utility value. This fast-paced growth, albeit progressive, has concerns of energy consumption and ecological impact associated with it. Companies such as Intel have delivered innovations that enable delivery of technologies...

    Provided By Intel

  • White Papers // Apr 2009

    DIY Storage System Guidance Using Intel Server RAID Controllers

    RAID (Redundant Array of Independent Disks) technology is commonly implemented in server usage models as an option to provide additional data protection. RAID solutions are now also found in other computer environments such as desktops, workstations, and external storage devices that support a large number of hard drives. This guide...

    Provided By Intel

  • White Papers // Jan 2011

    Rethinking Database Algorithms for Phase Change Memory

    Phase Change Memory (PCM) is an emerging memory technology with many attractive features: it is non-volatile, byte-addressable, 2 - 4X denser than DRAM, and orders of magnitude better than NAND Flash in read latency, write latency, and write endurance. In the near future, PCM is expected to become a common...

    Provided By Intel

  • White Papers // Apr 2009

    Many-Core vs. Many-Thread Machines: Stay Away From the Valley

    The authors study the tradeoffs between Many-Core machines like Intel's Larrabee and Many-Thread machines like Nvidia and AMD GPGPUs. They define a unified model describing a superposition of the two architectures, and use it to identify operation zones for which each machine is more suitable. Moreover, they identify an intermediate...

    Provided By Intel

  • White Papers // Mar 2010

    Power-Aware I/O Virtualization

    Power consumption is one of the key concerns in modern computers within which I/O consumes a significant portion of power, from portable devices to servers. This concern has led to the development of various hardware and software techniques to improve the energy efficiency of I/O subsystems in the native platform....

    Provided By Intel

  • White Papers // Aug 2011

    The Intel Science and Technology Center for Cloud Computing Foundations for Future Clouds

    The Intel Science and Technology Center for Cloud Computing (ISTC-CC) is an open community of leading researchers devising critical new underlying technologies for future clouds and cloud applications. Headquartered at Carnegie Mellon University, ISTC-CC includes researchers from Carnegie Mellon, Georgia Tech, Intel, Princeton, and UC-Berkeley. ISTC-CC research explores system architectures,...

    Provided By Intel

  • White Papers // Dec 2010

    Multi-State Power Management of Communication Links

    The continuing speed increases of communication links at all levels from intra-server interconnects all the way to WAN results an increasing amount of network power consumption. Thus an effective, multi-level and multi-scale power management of communication links is increasingly important. In this paper the authors propose algorithms that can reduce...

    Provided By Intel

  • White Papers // Dec 2009

    Hardware Assisted Resource Sharing Platform for Personal Cloud

    More and more novel usage models require the capability of resource sharing among different platforms. To achieve a satisfactory efficiency, the authors introduce a specific resource sharing technology under which IO peripherals can be shared among different platforms. In particular, in a personal working environment that is built up by...

    Provided By Intel

  • White Papers // Jun 2010

    Capturing and Composing Parallel Patterns With Intel CnC

    The most accessible and successful parallel tools today are those that ask programmers to write only isolated serial kernels, hiding parallelism behind a library interface. Examples include Google's Map-Reduce, CUDA, and STAPL. This encapsulation approach applies to a wide range of structured, well-understood algorithms, which the authors call parallel patterns....

    Provided By Intel

  • White Papers // Aug 2011

    PALM: Parallel ArchitectureFriendly LatchFree Modifications to B+ Trees on ManyCore Processors

    Concurrency control on B+ trees is primarily achieved with latches, but serialization and contention can hinder scalability. As core counts on current processors increase, it is imperative to develop scalable latch-free techniques for concurrency control. The authors present PALM, a novel technique for performing multiple concurrent queries on in-memory B+...

    Provided By Intel

  • White Papers // Feb 2010

    Perspectives on Tracing End-Hosts: A Survey Summary

    There is an amazing paucity of data that is collected directly on users' personal computers. One key reason for this is the perception among researchers that users are unwilling to participate in such a data collection effort. To understand the range of opinions on matters that occur with end-host data...

    Provided By Intel

  • White Papers // Feb 2012

    Quantifying DNS Namespace Influence

    Name resolution using the Domain Name System (DNS) is integral to today's Internet. The resolution of a domain name is often dependent on namespace outside the control of the domain's owner. In this paper, the authors review the DNS protocol and several DNS server implementations. Based on their examination, they...

    Provided By Intel

  • White Papers // May 2011

    Quantifying and Improving DNSSEC Availability

    The Domain Name System (DNS) is a foundational component of today's Internet for mapping Internet names to addresses. With the DNS Security Extensions (DNSSEC) DNS responses can be cryptographically verified to prevent malicious tampering. The protocol complexity and administrative overhead associated with DNSSEC can significantly impact the potential for name...

    Provided By Intel

  • White Papers // Jan 2010

    Measuring Availability in the Domain Name System

    The Domain Name System (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. The authors develop a model for server dependencies that is used as a basis for measuring availability. They introduce the Minimum number of Servers Queried (MSQ)...

    Provided By Intel

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • White Papers // Mar 2010

    Optimizing Non-Sequential Data Processing Applications

    Data processing applications that manage large numbers of data flows, either by indexing or pointer chasing, may be subject to frequent instruction pipeline stalls due to data cache misses. This paper outlines techniques for use on Intel Architecture processors to lessen the effect of instruction pipeline stalls in certain application...

    Provided By Intel

  • White Papers // Aug 2011

    Display Characterizations on Intel Atom Processor E6xx Series (B1-Stepping)

    This paper characterizes the latest Intel Atom Processor E6xx Series B1 stepping System-on-Chip platform. In this paper, necessary details on hardware capability are presented along with information on display resolution characterizations (or limitations) for maximum display resolutions allowed on each of the display outputs using the Intel Embedded Media and...

    Provided By Intel

  • White Papers // May 2012

    Fast SHA-256 Implementations on Intel Architecture Processors

    The paper describes a family of highly-optimized implementations of the Fast SHA-256 cryptographic hash algorithm, which provide industry leading performance on a range of Intel Processors for a single data buffer consisting of an arbitrary number of data blocks. The paper describes the overall design of the Fast SHA-256 software,...

    Provided By Intel

  • White Papers // Aug 2012

    New Instructions Supporting Large Integer Arithmetic on Intel Architecture Processors

    New instructions mulx, adcx and adox are being introduced on Intel Architecture Processors. The adcx and adox instructions are being introduced one generation later than mulx. These new instructions will enable users to develop high-performance implementations of large integer arithmetic on Intel Architecture. To maximize performance of code using these...

    Provided By Intel

  • White Papers // Feb 2012

    2nd Generation Intel Core VPro Processor Family

    The 2nd generation Intel Core vPro processor family delivers visible benefits in intelligent security, greater manageability, and adaptable performance. Intelligent security is built in, with hardware-based features that can prevent malicious attacks, automatically isolate infected systems, and respond faster when a problem occurs. Authorized IT administrators can now remotely access,...

    Provided By Intel

  • White Papers // Sep 2010

    Securing the Enterprise with Intel AES-NI

    The authors' world today has insatiable demand for technology that can find, process, and communicate information and data in business environments, as well as in their personal lives. Protection of intellectual property, personal identities, and other sensitive information is more important than ever for data on the move and at...

    Provided By Intel

  • White Papers // May 2010

    Remote Management: SNMP Sub-Agent for Intel Server Hardware

    Simple Network Management Protocol (SNMP) is used ubiquitously to monitor and control any device over the network by exchanging SNMP messages. The SNMP, defined by IETF, has gained significant popularity among the software, hardware, telecom, and network industries. SNMP was derived from its predecessor SGMP (Simple Gateway Management Protocol). This...

    Provided By Intel

  • White Papers // Mar 2012

    Intel HD Graphics with Dynamic Frequency Technology

    This paper is to explain what Intel HD Graphics Dynamic Frequency Technology is and how it complements Intel Turbo Boost Technology. The paper will also explain how the user can interact with the technology to further enhance the computing experience. This integration of Central Processor Unit (CPU), memory controller and...

    Provided By Intel

  • White Papers // Dec 2011

    Best Practices for Building an Enterprise Private Cloud

    Intel IT has achieved significant progress on the authors' multi-year initiative to build an enterprise private cloud. By implementing a cloud strategy, they have saved USD 9 million to date - and they anticipate approximately USD 14 million Net Present Value (NPV) over the next four years. Intel IT has...

    Provided By Intel

  • White Papers // Apr 2013

    Implementing Self-Service BI to Improve Business Decision Making

    Self-service Business Intelligence (BI) represents a paradigm shift in the way businesses use their data. By enabling end users to combine and analyze large amounts of data, self-service BI provides a pathway to better decision making across the enterprise. Yet effective decision making for core business processes often requires trusted...

    Provided By Intel

  • White Papers // Mar 2012

    Design and Implementation of a Consolidated Middlebox Architecture

    Network deployments handle changing application, workload, and policy requirements via the deployment of specialized network appliances or \"Middleboxes\". Today, however, middlebox platforms are expensive and closed systems, with little or no hooks for extensibility. Furthermore, they are acquired from independent vendors and deployed as standalone devices with little cohesiveness in...

    Provided By Intel

  • White Papers // Jun 2007

    An FPGA Approach to Quantifying Coherence Traffic Efficiency on Multiprocessor Systems

    Recently, there is a surge of interests in using FPGAs for computer architecture research including applications from emulating and analyzing a new platform to accelerating micro-architectural simulation speed for design space exploration. This paper proposes and demonstrates a novel usage of FPGAs for measuring the efficiency of coherent traffic of...

    Provided By Intel

  • White Papers // Sep 2010

    Key Exchange With Anonymous Authentication Using DAA-SIGMA Protocol

    Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, the authors show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared...

    Provided By Intel

  • White Papers // Jan 2011

    Finally, a Use for Componentized Transport Protocols

    This paper argues a new relevance for an old idea: Decomposing transport protocols into a set of resuable building blocks that can be recomposed in different ways depending on application requirements. The authors conjecture that point-to-point applications may well be adequately served by the existing suite of monolithic protocol implementations,...

    Provided By Intel

  • White Papers // Jan 2011

    Proof Sketches: Verifiable In-Network Aggregation

    Recent work on distributed, in-network aggregation assumes a benign population of participants. Unfortunately, modern distributed systems are plagued by malicious participants. In this paper the authors present a first step towards verifiable yet efficient distributed, in-network aggregation in adversarial settings. They describe a general framework and threat model for the...

    Provided By Intel

  • White Papers // Mar 2011

    Improving Healthcare Risk Assessments to Maximize Security Budgets

    Healthcare is undergoing major changes that are being driven by medical, consumer, IT, and security trends. While these trends. While these trends deliver compelling benefits to healthcare organizations, workers, and patients, they also carry significant privacy and security risks. Healthcare organizations are seeing an escalation in the frequency and impact...

    Provided By Intel

  • White Papers // May 2009

    Security Enhancement of the Vortex Family of Hash Functions

    Vortex is a new family of one-way hash functions which has been submitted to the NIST SHA-3 competition. Its design is based on using the Rijndael block cipher round as a building block, and using a multiplication-based merging function to support fast mixing in a small number of steps. Vortex...

    Provided By Intel

  • White Papers // Dec 2009

    Path Stitching: Internet-Wide Path and Delay Estimation From Existing Measurements

    Many measurement systems have been proposed in recent years to shed light on the internal performance of the Internet. Their common goal is to allow distributed applications to improve end-user experience. A common hurdle they face is the need to deploy yet another measurement infrastructure. In this paper, the authors...

    Provided By Intel

  • White Papers // Jan 2011

    Small Trusted Primitives for Dependable Systems

    Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault tolerance depend on a very small number of assumptions taken on faith; such assumptions are typically called the "Trusted Computing Base" (TCB) of a system. However,...

    Provided By Intel

  • White Papers // May 2012

    Multi-Layer Rate Splitting Scheme for Interference Mitigation in Tri-Sectored Wireless Networks

    In a multi-cell wireless network, cell-edge User Equipments (UEs) inevitably suffer from strong interference from adjacent cells which leads to the UE throughput decrease. Contrary to conventional interference mitigation techniques which treat the interference as noise, the authors propose to use a rate splitting based interference exploitation technique. A novel...

    Provided By Intel