Have you ever been working and had a patch come down from your IT department that you had to install now. Or how about a virus scan that brought your machine to a crawl in the middle of your work. If so, you may wish your IT department would use AMT Alarm Clock, a feature released in the 5.1 version of Intel Active Management Technology (AMT).
If you have extended Active Directory (AD) for use with your AMT clients and Kerberos authentication, you may have issues connecting to the AMT WebUI for those machines when using Internet Explorer (IE). This is related to authentication settings.
If you experience this problem, you can first try another browser (e.g. Firefox) to see if you can connect to the WebUI. If successful, then you can try the following configurations in your IE settings.
Working with Intel AMT and Linux is not as easy as working with AMT and Windows. It is mainly due to fewer resources being available for Linux.
But before I go any further with this topic I must state that AMT itself is operating system (OS) agnostic. It runs in the chipset and doesn't really care too much about the type of host OS or if there is even an OS present. That is why we are able to have the great out-of-band features that make AMT so attractive for client system management.
I was recently asked to provide a list of the PCI device IDs for the AMT virtual Serial-over-LAN (SOL) devices.
This seemed like a relatively easy task.
Then I realized that there were different IDs for each version of AMT.
And there are more than one possible ID for each version.
And they are not all documented in one place.
This case study examines the architectural improvements made to the Intel® Xeon® E5 v3 processor family in order to improve the performance of the Galois/Counter Mode of AES block encryption. It looks at the impact of these improvements on the nginx* web server when backed by the OpenSSL* SSL/TLS library. With this new generation of Xeon processors, web servers can obtain significant increases in maximum throughput by switching from AES in CBC mode with HMAC+SHA1 digests to AES-GCM.