Develop Software unlocking the detect, repair and protect capabilities of Intel® vPro™ Technology. Gain access to the tools, technical information and industry expert support to help you develop software for Intel's premier business platform.
Intel® Active Management Technology (Intel® AMT) is a capability embedded in Intel-based platforms that enhances the ability of IT organizations to manage enterprise computing facilities. Intel AMT operates independently of the platform processor and operating system. Remote platform management applications can access Intel AMT securely, even when the platform is turned off, as long as the platform is connected to line power and to a network. Independent software vendors (ISVs) can build applications that take advantage of the features of Intel AMT using the application programming interface (API)
- Start Here Guide
This document helps you get started with your AMT implementation
- Overview and Introduction
New to AMT? This page has all the stuff you need to get you on your way
- SDK Documentation
A complete HTML-based version of the Intel® AMT 8.1 Documentation included with the SDK is available in a standalone version.
- AMT Quick Reference
This summary page provides all the latest information on the current release of AMT
- AMT Uses Cases
Easy to follow descriptions of how to logically implement AMT features into your application.
- Use Case Reference Designs
See how real problems are being solved and how you might fit the solution into your product.
- Start Here Guide
vPro platforms are loaded with features and technologies to deliver best in class security protection. Whether it's applying advanced encryption or remotely disabling a stolen/lost PC, systems equipped with vPro technology are designed to keep your data safe. Explore the many options below to see which features/technologies might fit best into your products.
AES (Advanced Encryption Standard), an encryption standard adopted by the U.S. government is widely used across the software ecosystem to protect network traffic, personal data, and corporate IT infrastructure. Intel® Advanced Encryption Standard (AES) New Instructions (AES-NI) were designed to implement some of the complex and performance intensive steps of the AES algorithm using hardware and thus accelerating the execution of the AES algorithms..
- Learn AES basics
- AES White Paper
- White Paper: "Breakthrough AES Performance with Intel® AES New Instructions"
- White Paper - "Securing the Enterprise with Intel® AES-NI"
- Download the AES-NI Sample Library
- Intel® IPP support for AES-NI
Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS, virtual machine monitor, and operating system.
DIGITAL RANDOM NUMBER GENERATOR
Intel® Secure Key is Intel's name for its new Intel® 64 Architecture instruction RdRand and its underlying Digital Random Number Generator (DRNG) hardware implementation (old code name, Bull Mountain). Intel® Secure Key provides a processor-based RNG solution that is of high quality and performance, highly available, and secure.
Intel®) Anti-Theft (AT)
Laptops with the 2nd generation Intel® Core™ and 2nd generation Intel® Core™ vPro™ processor families with Intel® Anti-Theft Technology (Intel® AT) provide intelligent protection of lost or stolen assets. Intel AT provides the ability to disable a PC with a local or remote "poison pill" if the system is lost or stolen. This poison pill can delete essential cryptographic material from system hardware in order to disable access to encrypted data stored on the hard drive.
Intel® Identity Protection Technology (Intel® IPT). Intel has built two-factor authentication directly into the processors of select 2nd generation Intel® Core™ processor-based PCs, helping to prevent unauthorized access to important personal accounts. Intel IPT allows vendors to store their OTP algorithms inside the processor itself, in a secure chipset called the Manageability Engine (ME). Intel's hardware solution eliminates the complexity and unstable nature of OTP software solutions, as well as the user-dependent problems of tokens.Download Intel® IPT Installer
If you have a strong authentication solution or component to your application, take the next step in incorporating Intel® IPT by contacting us at firstname.lastname@example.org
- POWER EFFICIENT PERFORMANCE
At the heart of the many features and capabilities of vPro systems are the latest Intel® Core™ vPro™ processors. These processors provide outstanding performance while still delivering power efficiency. Review the features below and visit the Parallel Programming Community for additional threading support.
INTEL® HYPER-THREADING TECHNOLOGY
Intel® Hyper-Threading Technology (Intel® HT Technology)¹ uses processor resources more efficiently, enabling multiple threads to run on each core. Intel® HT Technology increases processor throughput, improving overall performance on threaded software. Intel HT Technology is available on Previous Generation Intel® Core™ processors, 2nd generation Intel® Core™ processor family, and Intel® Xeon® processor family.
An Intel® processor and chipset combined with an OS and BIOS supporting Intel HT Technology allows you to:
- Run demanding applications simultaneously while maintaining system responsiveness
- Keep systems more secure, efficient, and manageable while minimizing impact on productivity
- Provide headroom for future business growth and new solution capabilities
- Introduction to Hyper-threading
Intel has optimized Intel® Turbo Boost Technology¹ to provide even more performance when needed on 2nd Generation Intel® Core™ processor based systems. Intel® Turbo Boost Technology 2.0 automatically allows processor cores to run faster than the base operating frequency if it's operating below power, current, and temperature specification limits. Intel Turbo Boost Technology 2.0 is activated when the Operating System (OS) requests the highest processor performance state (P0).
The maximum frequency of Intel Turbo Boost Technology 2.0 is dependent on the number of active cores. The amount of time the processor spends in the Intel Turbo Boost Technology 2.0 state depends on the workload and operating environment.
Any of the following can set the upper limit of Intel Turbo Boost Technology 2.0 on a given workload:
- Number of active cores
- Estimated current consumption
- Estimated power consumption
- Processor temperature
When the processor is operating below these limits and the user's workload demands additional performance, the processor frequency will dynamically increase until the upper limit of frequency is reached. Intel Turbo Boost Technology 2.0 has multiple algorithms operating in parallel to manage current, power, and temperature to maximize performance and energy efficiency. Note: Intel Turbo Boost Technology 2.0 allows the processor to operate at a power level that is higher than its rated upper power limit (TDP)for short durations to maximize performance.
10:22 AM PDT
12:27 PM PDT
2:54 PM PDT
11:17 AM PDT