Intel

Displaying 1-40 of 560 results

  • White Papers // Mar 2014

    Platform Boot Integrity Platform Foundation for Foundation Trusted Compute Pools

    In this article we will take a deep look into ensuring boot integrity of the platform which in turn boils down to ensuring the integrity of a number of platform components: the integrity of prelaunch and launch components covering firmware, BIOS and hypervisor. Boot integrity is foundational in embodying the...

    Provided By Intel

  • White Papers // Mar 2014

    The Rise of Virtual Service Grids

    The concept of virtualization and sharing of resources is not a new one. In fact, the idea of standardization has been around since the industrial revolution made it possible to mass produce identical parts. Because of this, manufacturing and production costs declined steeply, as businesses no longer needed to specialize...

    Provided By Intel

  • White Papers // Mar 2014

    An Introduction to Virtual Service Oriented Grids

    While the idea of virtual service-oriented grids may be a new business concept, the technologies that build the groundwork for this idea go back many decades to the early days of computing research. That being said, the combination of these technologies brings non-functional, yet significant capabilities to a system. Virtual...

    Provided By Intel

  • White Papers // Mar 2014

    Technology Evolution, People, and Privacy

    This article takes a look at the history of information, technology, beneficiaries of that technology and their relationship to data governance development over time. Innovation in business models, technology capabilities, and the changing relationships in the ownership and accessibility to data has resulted in a fundamental shift in size and...

    Provided By Intel

  • White Papers // Mar 2014

    Moving To Office 365 On The Cloud

    We plan and design for change. After the change happens, we begin to plan for the next change. What drives change? Many factors drive change in technology--lower cost of equipment, better compute power, greater bandwidth, new software, and so on. In this article, we look at how Office 365, a...

    Provided By Intel

  • White Papers // Mar 2014

    The Trusted Cloud: Addressing Security and Compliance

    This article will address one of the biggest barriers impeding broader adoption of cloud computing is security--the real and perceived risks of providing, accessing and control services in multitenant cloud environments. IT managers would like to see higher levels of assurance before they can declare their cloud-based services and data...

    Provided By Intel

  • White Papers // Mar 2014

    Digital Asset Management: Describing and Searching Mass Assets

    Processes are constantly being developed and improved to allow digital asset management (DAM) leaders to upload large sets of assets to their networks. Once uploaded and accessible, certain searching tools can help users to find information that is pertinent to their needs and prevent users from being overwhelmed with unhelpful...

    Provided By Intel

  • White Papers // Mar 2014

    Digital Asset Management: Digital Archaeology and Migration

    Digital preservation protects data to ensure continuing access in the future; digital archaeology and migration are two preservation strategies used to create and maintain access to obsolete information resources. "Emulation" and "refreshing" are two tools used in digital archaeology to retrieve information from obsolete media. Migration, or moving older data...

    Provided By Intel

  • White Papers // Mar 2014

    Cloud Computing

    Many users of computer technology—and for that matter, many technology creators and administrators—complain about the rapid pace of change in information technology. The most recent example of a new technology trend bursting upon the scene is cloud computing. Setting a record for going from "what is it?" to "I've got...

    Provided By Intel

  • White Papers // Mar 2014

    Grid Computing: Operations Research Methods for Resource Management and Scheduling

    The grid computing paradigm is replacing localized computer clusters or the traditional "supercomputer" model for research and industry enterprises requiring increasingly large amounts of processing power and storage. Computational grids are distributed systems integrating geographically-separate resources into a single, massively parallel network well-suited to complex processing tasks. This article introduces...

    Provided By Intel

  • White Papers // Mar 2014

    Grid Computing: Optimization Techniques for Skeletons on Grids

    Skeletons are common patterns of parallelism in distributed computing systems. These often-used components, such as farm, map, and pipeline, can be abstracted and offered to application programmers as programming primitives. This article introduces the motivation for implementing algorithmic skeletons and demonstrates use of Lithium, a programming environment based on Java...

    Provided By Intel

  • White Papers // Mar 2014

    Client Virtualization in a Cloud Environment

    Arguably computation models seen in client space are much more diverse than those in the server space proper. For servers, there are essentially two, the earlier model of static consolidation and the more recent dynamic model where virtual machines lightly bound to their physical hosts and can be moved around...

    Provided By Intel

  • White Papers // Nov 2013

    An Introduction to Building Intelligent Systems

    Consumers are now demanding and expecting more from technology. Building intelligence into our devices is a promising way to satisfy this demand by providing more personalized experiences. In Building Intelligent Systems, the authors investigate how computer vision, machine learning, and data mining can be used together to build smarter devices...

    Provided By Intel

  • White Papers // Apr 2013

    Implementing Self-Service BI to Improve Business Decision Making

    Self-service Business Intelligence (BI) represents a paradigm shift in the way businesses use their data. By enabling end users to combine and analyze large amounts of data, self-service BI provides a pathway to better decision making across the enterprise. Yet effective decision making for core business processes often requires trusted...

    Provided By Intel

  • Case Studies // Mar 2013

    Securities Transactions Get Speed With Cloud

    Need to build a solid IT system foundation. Ensure a stable IT environment to carry out any securities transaction activities and launch new services efficiently, ensure fast flow of securities transactions and meet other complex commercial applications. The solutions provided for these challenges were carry out comprehensive architectural planning, ensure...

    Provided By Intel

  • White Papers // Dec 2012

    Energy-Efficient Interconnect Via Router Parking

    The increase in on-chip core counts in Chip MultiProcessors (CMPs) has led to the adoption of interconnects such as Mesh and Torus, which consume an increasing fraction of the chip power. Moreover, as technology and voltage continue to scale down, static power consumes a larger fraction of the total power;...

    Provided By Intel

  • White Papers // Nov 2012

    Correlation-Based Cell Search and Measurement for LTE and LTE-A

    Quick detection and accurate measurement of multiple cells surrounding the User Equipment (UE) are essential to ensure the mobility and QoS of end users. In LTE and LTE-A, multiple cells are often time synchronized or quasi-synchronized so that weak cells "Eclipsed" by strong interfering cells are difficult to detect. In...

    Provided By Intel

  • White Papers // Nov 2012

    A Mutual-Information Based Power Allocation Algorithm for Multi-Layer Rate Splitting Scheme in Tri-sectored Wireless Networks

    Cell-edge users inevitably suffer from strong interference from adjacent cells, and consequently their throughput will decrease. Recent investigations show that the Han-Kobayashi (HK) rate splitting scheme is the best known strategy to mitigate the interference for a two-user interference channel. However, its receiver is too complicated to implement in practical...

    Provided By Intel

  • White Papers // Sep 2012

    A Systematic Methodology to Architecting High Performance Storage Systems

    A good storage system is a well-balanced system in which each individual component is suited for its purpose and all the components fit together to achieve optimal performance. Designing a large scale, high performance storage system presents significant challenges. This paper describes a systematic approach to designing a storage system,...

    Provided By Intel

  • Case Studies // Aug 2012

    Strengthen Cloud Security With Intel Advanced Encryption Standard New Instructions

    Tier 3 knows the value of protecting data. As a leading provider of enterprise-class cloud software and federated cloud services, Tier 3 helps organizations securely expand their infrastructure into the cloud without incurring large capital expenses or additional administrative overhead. If the users encrypt data using software-only AES, they run...

    Provided By Intel

  • White Papers // Aug 2012

    Intel Xeon Processor E7 Family: Reliability, Availability, and Serviceability

    Today's businesses increasingly depend on Intel Xeon-based servers to run data-intensive and mission-critical applications. Server Reliability, Availability, and Serviceability (RAS) are crucial issues for modern enterprise IT shops that deliver mission critical applications and services, as application delivery failures can be extremely costly per hour of system downtime. Furthermore, the...

    Provided By Intel

  • White Papers // Aug 2012

    New Instructions Supporting Large Integer Arithmetic on Intel Architecture Processors

    New instructions mulx, adcx and adox are being introduced on Intel Architecture Processors. The adcx and adox instructions are being introduced one generation later than mulx. These new instructions will enable users to develop high-performance implementations of large integer arithmetic on Intel Architecture. To maximize performance of code using these...

    Provided By Intel

  • White Papers // Jul 2012

    Incorporate touch & sensor capabilities of Ultrabook™ into your software

    This guide provides developers with an overview of the Microsoft Windows 8 sensors application programming interfaces (APIs) for Desktop and Metro style applications, with a specific focus on the various sensor capabilities available in Windows 8 Desktop mode. This white paper summarizes the APIs that enable creating interactive applications by...

    Provided By Intel

  • White Papers // Jul 2012

    Learn to detect the sensors in Intel® Ultrabook™ devices

    The new generation of Ultrabook™, equipped with the 3rd Generation Intel® Core Processors, is a game changer. With a touch sensitive screen and a variety of sensors on-board, each Ultrabook is capable of much more than your standard laptop. This white paper outlines how you can detect each of the...

    Provided By Intel

  • White Papers // May 2012

    Multi-Layer Rate Splitting Scheme for Interference Mitigation in Tri-Sectored Wireless Networks

    In a multi-cell wireless network, cell-edge User Equipments (UEs) inevitably suffer from strong interference from adjacent cells which leads to the UE throughput decrease. Contrary to conventional interference mitigation techniques which treat the interference as noise, the authors propose to use a rate splitting based interference exploitation technique. A novel...

    Provided By Intel

  • White Papers // May 2012

    Pricing-Based Distributed Mobile Association for Heterogeneous Networks With Cooperative Relays

    Heterogeneous networks improve the spectrum efficiency and coverage of wireless communication networks by deploying low-power nodes on top of the conventional network nodes. In this paper, the authors consider a heterogeneous cellular network with multiple low-power Relay Nodes (RN) deployed in each cell using in-band wireless backhaul between the RN...

    Provided By Intel

  • White Papers // May 2012

    Fast SHA-256 Implementations on Intel Architecture Processors

    The paper describes a family of highly-optimized implementations of the Fast SHA-256 cryptographic hash algorithm, which provide industry leading performance on a range of Intel Processors for a single data buffer consisting of an arbitrary number of data blocks. The paper describes the overall design of the Fast SHA-256 software,...

    Provided By Intel

  • White Papers // Apr 2012

    Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications?

    Current processor trends of integrating more cores with wider SIMD units, along with a deeper and complex memory hierarchy, have made it increasingly more challenging to extract performance from applications. It is believed by some that traditional approaches to programming do not apply to these modern processors and hence radical...

    Provided By Intel

  • White Papers // Mar 2012

    Design and Implementation of a Consolidated Middlebox Architecture

    Network deployments handle changing application, workload, and policy requirements via the deployment of specialized network appliances or \"Middleboxes\". Today, however, middlebox platforms are expensive and closed systems, with little or no hooks for extensibility. Furthermore, they are acquired from independent vendors and deployed as standalone devices with little cohesiveness in...

    Provided By Intel

  • White Papers // Mar 2012

    Application of Rate Splitting Transmission Scheme for LTE-Advanced Systems

    In a multi-cell wireless network, an efficient interference mitigation technique is an inevitable part of the current state-of-the-art wireless system. As opposed to conventional interference mitigation techniques which treat the interference as noise, a multi-layer rate splitting scheme can be considered to improve the performance by decoding part of the...

    Provided By Intel

  • White Papers // Mar 2012

    Implementing PXE Boot Using Intel BLDK for Intel Atom Processor Based Boards

    Intel provides an EFI-standard based Boot Loader Development Kit (BLDK) for various Intel Atom processors. This paper discusses how to modify the Intel BLDK code base to support network booting (PXE boot). The resulting BLDK image is programmed onto an Intel Atom Processor E6xx series with Intel platform controller hub...

    Provided By Intel

  • White Papers // Mar 2012

    Designing Intel VPro Technology Capable OPS Display Panels

    An Intel vPro technology capable Open Pluggable Specification (OPS) module offers a collection of Intel technologies which comprise remote manageability, security and virtualization technology with the aim of enhancing robustness, usability and user experience of the system. Evolution of communication technology and innovation in computing technology has paved the path...

    Provided By Intel

  • White Papers // Mar 2012

    Intel HD Graphics with Dynamic Frequency Technology

    This paper is to explain what Intel HD Graphics Dynamic Frequency Technology is and how it complements Intel Turbo Boost Technology. The paper will also explain how the user can interact with the technology to further enhance the computing experience. This integration of Central Processor Unit (CPU), memory controller and...

    Provided By Intel

  • White Papers // Feb 2012

    Quantifying DNS Namespace Influence

    Name resolution using the Domain Name System (DNS) is integral to today's Internet. The resolution of a domain name is often dependent on namespace outside the control of the domain's owner. In this paper, the authors review the DNS protocol and several DNS server implementations. Based on their examination, they...

    Provided By Intel

  • White Papers // Feb 2012

    Technology: Your Roadmap to Small-Business Success

    In the past two decades, computers and the Internet have changed the world. People now communicate faster, more often, and in different ways. Likewise, businesses operate differently - processing and storing more information, reaching out to new markets, and managing operations more efficiently. The advent of technology has ensured that...

    Provided By Intel

  • White Papers // Feb 2012

    Intel QuickPath Architecture

    Through its rapid "Tick-tock" cadence for microprocessor innovation, Intel introduces a new micro architecture or a new process technology (that includes enhanced micro architecture features) nearly every year. The result is a cycle of industry-leading microprocessor performance. At the same time, the company also continuously looks for other ways to...

    Provided By Intel

  • White Papers // Feb 2012

    2nd Generation Intel Core VPro Processor Family

    The 2nd generation Intel Core vPro processor family delivers visible benefits in intelligent security, greater manageability, and adaptable performance. Intelligent security is built in, with hardware-based features that can prevent malicious attacks, automatically isolate infected systems, and respond faster when a problem occurs. Authorized IT administrators can now remotely access,...

    Provided By Intel

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • White Papers // Jan 2012

    Solving Intel IT's Data Storage Growth Challenges

    Intel IT is using a variety of techniques to accommodate growing demand for storage capabilities, without increasing costs. In 2011 Intel faced a 53 percent increase in storage capacity from 2010, and the continued build out of the authors' private cloud could increase this demand even further. They are managing...

    Provided By Intel

  • White Papers // Dec 2011

    Best Practices for Building an Enterprise Private Cloud

    Intel IT has achieved significant progress on the authors' multi-year initiative to build an enterprise private cloud. By implementing a cloud strategy, they have saved USD 9 million to date - and they anticipate approximately USD 14 million Net Present Value (NPV) over the next four years. Intel IT has...

    Provided By Intel

  • Case Studies // Apr 2011

    Enhancing Academic Mobility

    Grove City College faces the challenge to Minimize hard drive failures that can interrupt student and faculty productivity and strain IT support resources. Accelerate system imaging for IT staff while reducing boot time and increasing application performance for students and professors. Prevent unauthorized access to sensitive information when laptops are...

    Provided By Intel

  • Case Studies // Nov 2009

    An A-Grade Environment

    Haberdashers' Aske's Boys' School faces the challenge to revitalise its IT infrastructure - from the datacenter to desktops and laptops - giving staff and pupils a more reliable and powerful learning environment. The school deployed to with Dell at every stage, creating a virtualized datacenter with Dell PowerEdge servers and...

    Provided By Intel

  • Case Studies // Dec 2010

    SAP in the Cloud: Sweet Spot for Domino

    The Domino Sugar as a vertically integrated company, faces the challenge to optimize its cane field-to-store business operations. Domino's IT leaders wanted the flexibility and cost savings of cloud computing. They deployed to Virtustream which is a cloud services and infrastructure solutions firm that offers a robust, consumption-based cloud platform...

    Provided By Intel

  • Case Studies // Nov 2009

    Remote Client Management

    Din Bil faces the challenges to Managing and maintaining a disparate client infrastructure made up of both desktops and laptops and spread across 27 different locations. The organization wanted to centralise and streamline management of its client infrastructure, thereby improving IT helpdesk productivity and reducing associated costs. They deployed to...

    Provided By Intel

  • Case Studies // Dec 2010

    Design Automation Takes to the Cloud

    The QLogic was an innovator face the challenge in virtualizing its mission-critical engineering environment ahead of less strategic applications. But as its engineering grid aged, performance began to lag, and a single job (or simulation) could vary by an average of 28 percent from one run to the next. The...

    Provided By Intel

  • Case Studies // Aug 2009

    Maintaining Optimum Production Uptime

    The Predictive Enterprise faces the challenge to its business expands, PSC predicts that it needs to explore desktop management system options for an overall faster and more accurate enterprise asset management. PSC also senses that it needs to boost its ability to prevent as well as respond to malicious software...

    Provided By Intel

  • Case Studies // Mar 2010

    Animation Gets an Energy-Efficient Upgrade

    Maya Entertainment faces the challenge to fulfill the demands to deliver larger, more complex film formats such as High Definition (HD) and stereoscopy, while utilizing the same space. Solution must effectively balance load and manage power and heat dissipation, especially on idle computing cycles. The organization wanted to understand the...

    Provided By Intel

  • White Papers // Sep 2010

    Key Exchange With Anonymous Authentication Using DAA-SIGMA Protocol

    Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, the authors show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared...

    Provided By Intel

  • White Papers // Jan 2011

    Finally, a Use for Componentized Transport Protocols

    This paper argues a new relevance for an old idea: Decomposing transport protocols into a set of resuable building blocks that can be recomposed in different ways depending on application requirements. The authors conjecture that point-to-point applications may well be adequately served by the existing suite of monolithic protocol implementations,...

    Provided By Intel

  • White Papers // Jan 2011

    Proof Sketches: Verifiable In-Network Aggregation

    Recent work on distributed, in-network aggregation assumes a benign population of participants. Unfortunately, modern distributed systems are plagued by malicious participants. In this paper the authors present a first step towards verifiable yet efficient distributed, in-network aggregation in adversarial settings. They describe a general framework and threat model for the...

    Provided By Intel

  • White Papers // Jan 2011

    Rethinking Database Algorithms for Phase Change Memory

    Phase Change Memory (PCM) is an emerging memory technology with many attractive features: it is non-volatile, byte-addressable, 2 - 4X denser than DRAM, and orders of magnitude better than NAND Flash in read latency, write latency, and write endurance. In the near future, PCM is expected to become a common...

    Provided By Intel

  • White Papers // Apr 2009

    Many-Core vs. Many-Thread Machines: Stay Away From the Valley

    The authors study the tradeoffs between Many-Core machines like Intel's Larrabee and Many-Thread machines like Nvidia and AMD GPGPUs. They define a unified model describing a superposition of the two architectures, and use it to identify operation zones for which each machine is more suitable. Moreover, they identify an intermediate...

    Provided By Intel

  • White Papers // Mar 2010

    Power-Aware I/O Virtualization

    Power consumption is one of the key concerns in modern computers within which I/O consumes a significant portion of power, from portable devices to servers. This concern has led to the development of various hardware and software techniques to improve the energy efficiency of I/O subsystems in the native platform....

    Provided By Intel

  • White Papers // Aug 2011

    The Intel Science and Technology Center for Cloud Computing Foundations for Future Clouds

    The Intel Science and Technology Center for Cloud Computing (ISTC-CC) is an open community of leading researchers devising critical new underlying technologies for future clouds and cloud applications. Headquartered at Carnegie Mellon University, ISTC-CC includes researchers from Carnegie Mellon, Georgia Tech, Intel, Princeton, and UC-Berkeley. ISTC-CC research explores system architectures,...

    Provided By Intel

  • White Papers // Oct 2008

    Link-Alike: Using Wireless to Share Network Resources in a Neighborhood

    Asymmetric broadband connections in the home provide a limited upstream pipe to the Internet. This limitation makes various applications, such as remote backup and sharing high definition video, impractical. However, homes in a neighborhood often have high bandwidth wireless networks, whose bandwidth exceeds that of a single wired uplink. Moreover,...

    Provided By Intel

  • White Papers // Dec 2010

    Multi-State Power Management of Communication Links

    The continuing speed increases of communication links at all levels from intra-server interconnects all the way to WAN results an increasing amount of network power consumption. Thus an effective, multi-level and multi-scale power management of communication links is increasingly important. In this paper the authors propose algorithms that can reduce...

    Provided By Intel

  • Case Studies // Aug 2011

    Designing Quiet Products Faster

    ESI is a world-leading software vendor for the numerical simulation of prototype and manufacturing-process engineering in applied mechanics. ESI's products provide a unique collaborative and open environment for end-to-end virtual prototyping, thus eliminating the need for physical prototypes during product development. Their challenge is to provide VA One users with...

    Provided By Intel

  • Case Studies // Dec 2010

    Extending Capabilities to Better Utilize the Windows-Based Cluster

    RWTH Aachen University, one of Germany's foremost technical universities, operates some of the largest High Performance Computing (HPC) clusters in Europe. A priority for Aachen's clients is increasing performance on nodes - which increases the likelihood of creating data races and other common parallelization errors. Having the tools to quickly...

    Provided By Intel

  • Case Studies // Dec 2010

    Accelerating IP Telecom Profitability

    RADVISION is the industry's leading provider of products and technologies for unified visual communications over IP and 3G networks. RADVISION is committed to providing products and services that reduce time and costs for Telecom Equipment Manufacturers (TEMs) and Systems Integrators (SI) developing, deploying, and marketing multimedia communications solutions. RADVISION needed...

    Provided By Intel

  • Case Studies // Jun 2011

    Reaching for the Clouds

    SITA has been providing communications and IT solutions that keep the air transport industry moving. Their challenge is to build a cloud computing infrastructure that has the scalability to meet growing demand and flexibility to accommodate rapid change in the air transport industry. Define a reference architecture for running mission-critical...

    Provided By Intel

  • Case Studies // Jun 2011

    Extreme Performance in the Cloud

    NetSuite Inc., a leading vendor of cloud computing business management software suites, uses the latest cloud computing technology to meet the growing demands of its global customers by offering the most highly integrated online business applications platform available in the marketplace. NetSuite's cloud applications demand world-class performance and high levels...

    Provided By Intel

  • White Papers // Dec 2009

    Hardware Assisted Resource Sharing Platform for Personal Cloud

    More and more novel usage models require the capability of resource sharing among different platforms. To achieve a satisfactory efficiency, the authors introduce a specific resource sharing technology under which IO peripherals can be shared among different platforms. In particular, in a personal working environment that is built up by...

    Provided By Intel

  • White Papers // Feb 2009

    Effective Static Deadlock Detection

    The authors present an effective static deadlock detection algorithm for Java. Their algorithm uses a novel combination of static analyses each of which approximates a different necessary condition for a deadlock. They have implemented the algorithm and report upon their experience applying it to a suite of multi-threaded Java programs....

    Provided By Intel

  • White Papers // Jun 2010

    Capturing and Composing Parallel Patterns With Intel CnC

    The most accessible and successful parallel tools today are those that ask programmers to write only isolated serial kernels, hiding parallelism behind a library interface. Examples include Google's Map-Reduce, CUDA, and STAPL. This encapsulation approach applies to a wide range of structured, well-understood algorithms, which the authors call parallel patterns....

    Provided By Intel

  • White Papers // Aug 2011

    PALM: Parallel ArchitectureFriendly LatchFree Modifications to B+ Trees on ManyCore Processors

    Concurrency control on B+ trees is primarily achieved with latches, but serialization and contention can hinder scalability. As core counts on current processors increase, it is imperative to develop scalable latch-free techniques for concurrency control. The authors present PALM, a novel technique for performing multiple concurrent queries on in-memory B+...

    Provided By Intel

  • White Papers // Feb 2010

    Perspectives on Tracing End-Hosts: A Survey Summary

    There is an amazing paucity of data that is collected directly on users' personal computers. One key reason for this is the perception among researchers that users are unwilling to participate in such a data collection effort. To understand the range of opinions on matters that occur with end-host data...

    Provided By Intel

  • White Papers // Feb 2012

    Quantifying DNS Namespace Influence

    Name resolution using the Domain Name System (DNS) is integral to today's Internet. The resolution of a domain name is often dependent on namespace outside the control of the domain's owner. In this paper, the authors review the DNS protocol and several DNS server implementations. Based on their examination, they...

    Provided By Intel

  • White Papers // May 2011

    Quantifying and Improving DNSSEC Availability

    The Domain Name System (DNS) is a foundational component of today's Internet for mapping Internet names to addresses. With the DNS Security Extensions (DNSSEC) DNS responses can be cryptographically verified to prevent malicious tampering. The protocol complexity and administrative overhead associated with DNSSEC can significantly impact the potential for name...

    Provided By Intel

  • White Papers // Jan 2010

    Measuring Availability in the Domain Name System

    The Domain Name System (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. The authors develop a model for server dependencies that is used as a basis for measuring availability. They introduce the Minimum number of Servers Queried (MSQ)...

    Provided By Intel

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • White Papers // Sep 2010

    Securing the Enterprise with Intel AES-NI

    The authors' world today has insatiable demand for technology that can find, process, and communicate information and data in business environments, as well as in their personal lives. Protection of intellectual property, personal identities, and other sensitive information is more important than ever for data on the move and at...

    Provided By Intel

  • White Papers // May 2010

    Remote Management: SNMP Sub-Agent for Intel Server Hardware

    Simple Network Management Protocol (SNMP) is used ubiquitously to monitor and control any device over the network by exchanging SNMP messages. The SNMP, defined by IETF, has gained significant popularity among the software, hardware, telecom, and network industries. SNMP was derived from its predecessor SGMP (Simple Gateway Management Protocol). This...

    Provided By Intel

  • White Papers // Mar 2012

    Intel HD Graphics with Dynamic Frequency Technology

    This paper is to explain what Intel HD Graphics Dynamic Frequency Technology is and how it complements Intel Turbo Boost Technology. The paper will also explain how the user can interact with the technology to further enhance the computing experience. This integration of Central Processor Unit (CPU), memory controller and...

    Provided By Intel

  • Case Studies // Jan 2009

    Thomson Reuters Chooses New Servers With Multi-Core Intel Xeon Processors to Cost-Effectively Meet Growing Demand for Its Westlaw Database Services

    With customer usage of its online research services growing rapidly, Thomson Reuters faced the challenge of expanding its IT infrastructure to support an increased demand while also containing costs to maintain profitability. The company had two data centers at its Minnesota headquarters and was already building a third. The Thomson...

    Provided By Intel

  • Case Studies // Apr 2009

    Teaching Children Science, One LEGO at a Time

    ORTOP is affiliated with First LEGO League (FLL), an international organization dedicated to sports for the mind. As part of its sponsorship, Intel funds scholarships for teams who cannot pay the materials fees. At tournament time, Intel opens the doors of its Jonesw Farm Conference Center for ORTOP's qualifying tournaments....

    Provided By Intel

  • Case Studies // Dec 2008

    Union Investment Migrates Desktop Systems to Microsoft Windows Vista and Office 2007 Using Intel vPro Technology

    Together with its subsidiaries, one of which is Union Investment, the DZ BANK Group decided to create the necessary conditions for a corporation-wide, scalable infrastructure in its desktop service environment. In the interests of more efficient use of synergy effects and reducing costs, the aim was to standardise IT within...

    Provided By Intel

  • Case Studies // Sep 2009

    Oracle Uses Intel Xeon Processor 5500 Series-Based Systems With Intel Intelligent Power Node Manager to Increase Rack Density and Propel Business Growth

    Oracle was intent on increasing the computing density of its data centers so it could serve more customers at a lower cost and be in a strong competitive position when the economy improves. The gating factor: power consumption. The only way to reduce the amount of power each server used...

    Provided By Intel

  • Case Studies // Aug 2009

    Emerson Reshapes Its IT Infrastructure for Future Growth, Consolidating Approximately 135 Data Centers Down to Four Using Intel Technology - Based Servers

    Emerson's long-term business growth strategy called for a unified global IT infrastructure with fast, flexible computing and communications across all of its businesses. To meet those needs, Emerson used servers with the Intel Xeon processor 5500 series to create a virtualized core of computing resources that employees can tap into...

    Provided By Intel

  • Case Studies // Jun 2009

    Erie Insurance Cuts Power Costs and Helps Employees Work More Productively With Intel vPro Technology

    Erie Insurance is a multiline insurance company offering auto, home, commercial, and life policies. Erie's corporate office is located in Erie, PA, and with 22 branch offices in 11 states, managing the desktop environment is a challenge. A top priority for the IT team is avoiding user downtime that could...

    Provided By Intel

  • Case Studies // May 2009

    From Bedside to Data Center, OhioHealth Enhances Productivity and Patient Care With Intel Technologies

    As digital information becomes essential to patient care, OhioHealth wants to empower its clinicians with information at the bedside and on the go. To keep pace with the rapid growth of digital applications, OhioHealth needs to create a highly available, scalable environment despite a crowded data center and recession-driven budget...

    Provided By Intel