Intel

Displaying 1-40 of 359 results

  • White Papers // Mar 2014

    Platform Boot Integrity Platform Foundation for Foundation Trusted Compute Pools

    In this article we will take a deep look into ensuring boot integrity of the platform which in turn boils down to ensuring the integrity of a number of platform components: the integrity of prelaunch and launch components covering firmware, BIOS and hypervisor. Boot integrity is foundational in embodying the...

    Provided By Intel

  • White Papers // Mar 2014

    The Rise of Virtual Service Grids

    The concept of virtualization and sharing of resources is not a new one. In fact, the idea of standardization has been around since the industrial revolution made it possible to mass produce identical parts. Because of this, manufacturing and production costs declined steeply, as businesses no longer needed to specialize...

    Provided By Intel

  • White Papers // Mar 2014

    An Introduction to Virtual Service Oriented Grids

    While the idea of virtual service-oriented grids may be a new business concept, the technologies that build the groundwork for this idea go back many decades to the early days of computing research. That being said, the combination of these technologies brings non-functional, yet significant capabilities to a system. Virtual...

    Provided By Intel

  • White Papers // Mar 2014

    Technology Evolution, People, and Privacy

    This article takes a look at the history of information, technology, beneficiaries of that technology and their relationship to data governance development over time. Innovation in business models, technology capabilities, and the changing relationships in the ownership and accessibility to data has resulted in a fundamental shift in size and...

    Provided By Intel

  • White Papers // Mar 2014

    Moving To Office 365 On The Cloud

    We plan and design for change. After the change happens, we begin to plan for the next change. What drives change? Many factors drive change in technology--lower cost of equipment, better compute power, greater bandwidth, new software, and so on. In this article, we look at how Office 365, a...

    Provided By Intel

  • White Papers // Mar 2014

    The Trusted Cloud: Addressing Security and Compliance

    This article will address one of the biggest barriers impeding broader adoption of cloud computing is security--the real and perceived risks of providing, accessing and control services in multitenant cloud environments. IT managers would like to see higher levels of assurance before they can declare their cloud-based services and data...

    Provided By Intel

  • White Papers // Mar 2014

    Digital Asset Management: Describing and Searching Mass Assets

    Processes are constantly being developed and improved to allow digital asset management (DAM) leaders to upload large sets of assets to their networks. Once uploaded and accessible, certain searching tools can help users to find information that is pertinent to their needs and prevent users from being overwhelmed with unhelpful...

    Provided By Intel

  • White Papers // Mar 2014

    Digital Asset Management: Digital Archaeology and Migration

    Digital preservation protects data to ensure continuing access in the future; digital archaeology and migration are two preservation strategies used to create and maintain access to obsolete information resources. "Emulation" and "refreshing" are two tools used in digital archaeology to retrieve information from obsolete media. Migration, or moving older data...

    Provided By Intel

  • White Papers // Mar 2014

    Cloud Computing

    Many users of computer technology—and for that matter, many technology creators and administrators—complain about the rapid pace of change in information technology. The most recent example of a new technology trend bursting upon the scene is cloud computing. Setting a record for going from "what is it?" to "I've got...

    Provided By Intel

  • White Papers // Mar 2014

    Grid Computing: Operations Research Methods for Resource Management and Scheduling

    The grid computing paradigm is replacing localized computer clusters or the traditional "supercomputer" model for research and industry enterprises requiring increasingly large amounts of processing power and storage. Computational grids are distributed systems integrating geographically-separate resources into a single, massively parallel network well-suited to complex processing tasks. This article introduces...

    Provided By Intel

  • White Papers // Mar 2014

    Grid Computing: Optimization Techniques for Skeletons on Grids

    Skeletons are common patterns of parallelism in distributed computing systems. These often-used components, such as farm, map, and pipeline, can be abstracted and offered to application programmers as programming primitives. This article introduces the motivation for implementing algorithmic skeletons and demonstrates use of Lithium, a programming environment based on Java...

    Provided By Intel

  • White Papers // Mar 2014

    Client Virtualization in a Cloud Environment

    Arguably computation models seen in client space are much more diverse than those in the server space proper. For servers, there are essentially two, the earlier model of static consolidation and the more recent dynamic model where virtual machines lightly bound to their physical hosts and can be moved around...

    Provided By Intel

  • White Papers // Nov 2013

    An Introduction to Building Intelligent Systems

    Consumers are now demanding and expecting more from technology. Building intelligence into our devices is a promising way to satisfy this demand by providing more personalized experiences. In Building Intelligent Systems, the authors investigate how computer vision, machine learning, and data mining can be used together to build smarter devices...

    Provided By Intel

  • White Papers // Apr 2013

    Implementing Self-Service BI to Improve Business Decision Making

    Self-service Business Intelligence (BI) represents a paradigm shift in the way businesses use their data. By enabling end users to combine and analyze large amounts of data, self-service BI provides a pathway to better decision making across the enterprise. Yet effective decision making for core business processes often requires trusted...

    Provided By Intel

  • Case Studies // Mar 2013

    Securities Transactions Get Speed With Cloud

    Need to build a solid IT system foundation. Ensure a stable IT environment to carry out any securities transaction activities and launch new services efficiently, ensure fast flow of securities transactions and meet other complex commercial applications. The solutions provided for these challenges were carry out comprehensive architectural planning, ensure...

    Provided By Intel

  • White Papers // Dec 2012

    Energy-Efficient Interconnect Via Router Parking

    The increase in on-chip core counts in Chip MultiProcessors (CMPs) has led to the adoption of interconnects such as Mesh and Torus, which consume an increasing fraction of the chip power. Moreover, as technology and voltage continue to scale down, static power consumes a larger fraction of the total power;...

    Provided By Intel

  • White Papers // Nov 2012

    Correlation-Based Cell Search and Measurement for LTE and LTE-A

    Quick detection and accurate measurement of multiple cells surrounding the User Equipment (UE) are essential to ensure the mobility and QoS of end users. In LTE and LTE-A, multiple cells are often time synchronized or quasi-synchronized so that weak cells "Eclipsed" by strong interfering cells are difficult to detect. In...

    Provided By Intel

  • White Papers // Nov 2012

    A Mutual-Information Based Power Allocation Algorithm for Multi-Layer Rate Splitting Scheme in Tri-sectored Wireless Networks

    Cell-edge users inevitably suffer from strong interference from adjacent cells, and consequently their throughput will decrease. Recent investigations show that the Han-Kobayashi (HK) rate splitting scheme is the best known strategy to mitigate the interference for a two-user interference channel. However, its receiver is too complicated to implement in practical...

    Provided By Intel

  • White Papers // Sep 2012

    A Systematic Methodology to Architecting High Performance Storage Systems

    A good storage system is a well-balanced system in which each individual component is suited for its purpose and all the components fit together to achieve optimal performance. Designing a large scale, high performance storage system presents significant challenges. This paper describes a systematic approach to designing a storage system,...

    Provided By Intel

  • Case Studies // Aug 2012

    Strengthen Cloud Security With Intel Advanced Encryption Standard New Instructions

    Tier 3 knows the value of protecting data. As a leading provider of enterprise-class cloud software and federated cloud services, Tier 3 helps organizations securely expand their infrastructure into the cloud without incurring large capital expenses or additional administrative overhead. If the users encrypt data using software-only AES, they run...

    Provided By Intel

  • White Papers // Aug 2012

    Intel Xeon Processor E7 Family: Reliability, Availability, and Serviceability

    Today's businesses increasingly depend on Intel Xeon-based servers to run data-intensive and mission-critical applications. Server Reliability, Availability, and Serviceability (RAS) are crucial issues for modern enterprise IT shops that deliver mission critical applications and services, as application delivery failures can be extremely costly per hour of system downtime. Furthermore, the...

    Provided By Intel

  • White Papers // Aug 2012

    New Instructions Supporting Large Integer Arithmetic on Intel Architecture Processors

    New instructions mulx, adcx and adox are being introduced on Intel Architecture Processors. The adcx and adox instructions are being introduced one generation later than mulx. These new instructions will enable users to develop high-performance implementations of large integer arithmetic on Intel Architecture. To maximize performance of code using these...

    Provided By Intel

  • White Papers // Jul 2012

    Incorporate touch & sensor capabilities of Ultrabook™ into your software

    This guide provides developers with an overview of the Microsoft Windows 8 sensors application programming interfaces (APIs) for Desktop and Metro style applications, with a specific focus on the various sensor capabilities available in Windows 8 Desktop mode. This white paper summarizes the APIs that enable creating interactive applications by...

    Provided By Intel

  • White Papers // Jul 2012

    Learn to detect the sensors in Intel® Ultrabook™ devices

    The new generation of Ultrabook™, equipped with the 3rd Generation Intel® Core Processors, is a game changer. With a touch sensitive screen and a variety of sensors on-board, each Ultrabook is capable of much more than your standard laptop. This white paper outlines how you can detect each of the...

    Provided By Intel

  • White Papers // May 2012

    Multi-Layer Rate Splitting Scheme for Interference Mitigation in Tri-Sectored Wireless Networks

    In a multi-cell wireless network, cell-edge User Equipments (UEs) inevitably suffer from strong interference from adjacent cells which leads to the UE throughput decrease. Contrary to conventional interference mitigation techniques which treat the interference as noise, the authors propose to use a rate splitting based interference exploitation technique. A novel...

    Provided By Intel

  • White Papers // May 2012

    Pricing-Based Distributed Mobile Association for Heterogeneous Networks With Cooperative Relays

    Heterogeneous networks improve the spectrum efficiency and coverage of wireless communication networks by deploying low-power nodes on top of the conventional network nodes. In this paper, the authors consider a heterogeneous cellular network with multiple low-power Relay Nodes (RN) deployed in each cell using in-band wireless backhaul between the RN...

    Provided By Intel

  • White Papers // May 2012

    Fast SHA-256 Implementations on Intel Architecture Processors

    The paper describes a family of highly-optimized implementations of the Fast SHA-256 cryptographic hash algorithm, which provide industry leading performance on a range of Intel Processors for a single data buffer consisting of an arbitrary number of data blocks. The paper describes the overall design of the Fast SHA-256 software,...

    Provided By Intel

  • White Papers // Apr 2012

    Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications?

    Current processor trends of integrating more cores with wider SIMD units, along with a deeper and complex memory hierarchy, have made it increasingly more challenging to extract performance from applications. It is believed by some that traditional approaches to programming do not apply to these modern processors and hence radical...

    Provided By Intel

  • White Papers // Mar 2012

    Design and Implementation of a Consolidated Middlebox Architecture

    Network deployments handle changing application, workload, and policy requirements via the deployment of specialized network appliances or \"Middleboxes\". Today, however, middlebox platforms are expensive and closed systems, with little or no hooks for extensibility. Furthermore, they are acquired from independent vendors and deployed as standalone devices with little cohesiveness in...

    Provided By Intel

  • White Papers // Mar 2012

    Application of Rate Splitting Transmission Scheme for LTE-Advanced Systems

    In a multi-cell wireless network, an efficient interference mitigation technique is an inevitable part of the current state-of-the-art wireless system. As opposed to conventional interference mitigation techniques which treat the interference as noise, a multi-layer rate splitting scheme can be considered to improve the performance by decoding part of the...

    Provided By Intel

  • White Papers // Mar 2012

    Implementing PXE Boot Using Intel BLDK for Intel Atom Processor Based Boards

    Intel provides an EFI-standard based Boot Loader Development Kit (BLDK) for various Intel Atom processors. This paper discusses how to modify the Intel BLDK code base to support network booting (PXE boot). The resulting BLDK image is programmed onto an Intel Atom Processor E6xx series with Intel platform controller hub...

    Provided By Intel

  • White Papers // Mar 2012

    Designing Intel VPro Technology Capable OPS Display Panels

    An Intel vPro technology capable Open Pluggable Specification (OPS) module offers a collection of Intel technologies which comprise remote manageability, security and virtualization technology with the aim of enhancing robustness, usability and user experience of the system. Evolution of communication technology and innovation in computing technology has paved the path...

    Provided By Intel

  • White Papers // Mar 2012

    Intel HD Graphics with Dynamic Frequency Technology

    This paper is to explain what Intel HD Graphics Dynamic Frequency Technology is and how it complements Intel Turbo Boost Technology. The paper will also explain how the user can interact with the technology to further enhance the computing experience. This integration of Central Processor Unit (CPU), memory controller and...

    Provided By Intel

  • White Papers // Feb 2012

    Quantifying DNS Namespace Influence

    Name resolution using the Domain Name System (DNS) is integral to today's Internet. The resolution of a domain name is often dependent on namespace outside the control of the domain's owner. In this paper, the authors review the DNS protocol and several DNS server implementations. Based on their examination, they...

    Provided By Intel

  • White Papers // Feb 2012

    Technology: Your Roadmap to Small-Business Success

    In the past two decades, computers and the Internet have changed the world. People now communicate faster, more often, and in different ways. Likewise, businesses operate differently - processing and storing more information, reaching out to new markets, and managing operations more efficiently. The advent of technology has ensured that...

    Provided By Intel

  • White Papers // Feb 2012

    Intel QuickPath Architecture

    Through its rapid "Tick-tock" cadence for microprocessor innovation, Intel introduces a new micro architecture or a new process technology (that includes enhanced micro architecture features) nearly every year. The result is a cycle of industry-leading microprocessor performance. At the same time, the company also continuously looks for other ways to...

    Provided By Intel

  • White Papers // Feb 2012

    2nd Generation Intel Core VPro Processor Family

    The 2nd generation Intel Core vPro processor family delivers visible benefits in intelligent security, greater manageability, and adaptable performance. Intelligent security is built in, with hardware-based features that can prevent malicious attacks, automatically isolate infected systems, and respond faster when a problem occurs. Authorized IT administrators can now remotely access,...

    Provided By Intel

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • White Papers // Jan 2012

    Solving Intel IT's Data Storage Growth Challenges

    Intel IT is using a variety of techniques to accommodate growing demand for storage capabilities, without increasing costs. In 2011 Intel faced a 53 percent increase in storage capacity from 2010, and the continued build out of the authors' private cloud could increase this demand even further. They are managing...

    Provided By Intel

  • White Papers // Dec 2011

    Best Practices for Building an Enterprise Private Cloud

    Intel IT has achieved significant progress on the authors' multi-year initiative to build an enterprise private cloud. By implementing a cloud strategy, they have saved USD 9 million to date - and they anticipate approximately USD 14 million Net Present Value (NPV) over the next four years. Intel IT has...

    Provided By Intel