Technical Article

Оптимизировали, оптимизировали, да не выоптимизировали!

Оптимизация? Конечно, каждый сталкивался с данной задачей при разработке своих, сколь-нибудь значительных, требующих определённых вычислений, приложений. При этом способов оптимизировать код существует огромное множество, и, как следствие, различных путей сделать это в автоматическом режиме с помощью опций компилятора. Вот здесь и возникает проблема – как выбрать то, что нужно нам и не запутаться?

Different Approaches in Intel(R) IPP Resize

 

Intel® Integrated Performance Primitive (Intel® IPP) library exists more than 20 years. Together with this long history Resize functionality also continuously changes from release to release: - API became more convenient, scaling approach was changes.

Difference between Resize APIs

Historically there were 3 base Resize API in Intel® IPP library: ippiResizeSqrPixel, ippiResize, ippiResizeLinear (and for other interpolation types similarly).

  • Professional
  • Intel® Integrated Performance Primitives
  • Development Tools
  • Using Intel® Optane™ Technology with Ceph* to Build High-Performance Cloud Storage Solutions on Intel® Xeon® Scalable Processors

    This article describes current Ceph reference architectures and performance results with the RADOS Block Device (RBD) interface using Intel Optane technology and the Intel Xeon Scalable processors family. It includes a downloadable file containing several Ceph software tunings used for a random workload to gain significant performance improvements.
  • Storage
  • 增强用户体验:Krita 应用充分利用英特尔® 架构平台的多个内核

    多个内核和英特尔超线程(英特尔 HT)技术可显著提高处理器密集型计算的性能。相比在一个内核上渲染动画,使用六核系统(启用英特尔 HT 技术)中的全部内核渲染动画,可将性能提升 4.37 倍。这种可衡量的性能显著提升意味着可大大缩短 Krita 应用用户的等待时间,进而提高总体效率。
  • Game Development
  • Intel® VTune™ Amplifier
  • Game Development
  • Merged Reality
  • Virtual Reality
  • SCONE: Secure Linux* Containers with Intel® SGX

    We describe SCONE, a secure container mechanism for Docker* that uses the Intel® Software Guard Extensions (Intel® SGX) trusted execution support of Intel® processors to protect container processes from outside attacks. The design of SCONE leads to (i) a small trusted computing base (TCB) and (ii) a low performance overhead: SCONE offers a secure C standard library interface that transparently encrypts/decrypts I/O data; to reduce the performance impact of thread synchronization and system calls within Intel SGX enclaves, SCONE supports user-level threading and asynchronous system calls. Our evaluation shows that it protects unmodified applications with Intel SGX, achieving 0.6x–1.2x of native throughput.

    Authors: Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, and Andre Martin, Technische Universität Dresden; Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O’Keeffe, and Mark L Stillwell, Imperial College London; David Goltzsche, Technische Universität Braunschweig; Dave Eyers, University of Otago; Rüdiger Kapitza, Technische Universität Braunschweig; Peter Pietzuch, Imperial College London; Christof Fetzer, Technische Universität Dresden

    Presented at the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16), November 2-4, 2016, Savannah, GA, USA

  • Academic
  • Security
  • Linux*
  • Intel® Software Guard Extensions SDK
  • C/C++
  • Off (no entitlement required)
  • Technical Article
  • Intel® Software Guard Extensions (Intel® SGX)
  • Icon Image: 

    Shielding Applications from an Untrusted Cloud with Haven

    Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider's staff and its globally-distributed software/hardware platform not to expose any of their private data. We introduce the notion of shielded execution, which protects the confidentiality and integrity of a program and its data from the platform on which it runs (i.e., the cloud operator's OS, VM and firmware). Our prototype, Haven, is the first system to achieve shielded execution of unmodified legacy applications, including SQL Server* and Apache*, on a commodity OS (Windows*) and commodity hardware. Haven leverages the hardware protection of Intel® Software Guard Extensions (Intel® SGX) to defend against privileged code and physical attacks such as memory probes, but also addresses the dual challenges of executing unmodified legacy binaries and protecting them from a malicious host.

    Authors: Andrew Baumann, Marcus Peinado, and Galen Hunt, Microsoft Research

    Presented at the 11th USENIX Symposium on Operating Systems Design and Implementation, October 6-8, 2014, Broomfield, CO, USA

  • Academic
  • Cloud Computing
  • Security
  • Microsoft Windows* 8.x
  • Intel® Software Guard Extensions SDK
  • Off (no entitlement required)
  • Technical Article
  • Intel® Software Guard Extensions (Intel® SGX)
  • Icon Image: 

    Graphene-SGX: A Practical Library OS for Unmodified Applications on Intel® SGX

    This paper demonstrates that a fully-featured library OS can rapidly deploy unmodified applications on Intel® Software Guard Extensions (Intel® SGX) with overheads comparable to applications modified to use “shim” layers. We present a port of Graphene to SGX, as well as a number of improvements to make the security benefits of SGX more usable, such as integrity support for dynamically-loaded libraries, and secure multi-process support. Graphene-SGX supports a wide range of unmodified applications, including Apache, GCC, and the R interpreter. Graphene-SGX is open-source and has been used concurrently by other groups for SGX research.

    Authors: Chia-Che Tsai, Stony Brook University; Donald E. Porter, University of North Carolina at Chapel Hill and Fortanix; Mona Vij, Intel Corporation

    Presented at the 2017 USENIX Annual Technical Conference, July 12–14, 2017, Santa Clara, CA

  • Academic
  • Open Source
  • Porting
  • Security
  • Linux*
  • Intel® Software Guard Extensions SDK
  • R
  • Off (no entitlement required)
  • Technical Article
  • Intel® Software Guard Extensions (Intel® SGX)
  • Icon Image: 

    Subscribe to Technical Article