Technical Article

OpenStack* Enhanced Platform Awareness: Feature Breakdown and Analysis

OpenStack* Enhanced Platform Awareness (EPA) features enable OpenStack to accurately assign the workload to the best HW resource. Learn about each feature, its benefits, and how to configure.
  • Linux*
  • Networking
  • Network Functions Virtualization (NFV)
  • Software Defined Networking (SDN)
  • Intel® Math Kernel Library LAPACK Function Finding Advisor

    Introduction

    The Intel® Math Kernel Library (Intel® MKL) LAPACK domain provides a huge variety of routines. To see what routines are recommended for a particular use case, specify the parameters in the drop down lists below. For detailed description of a routine in the Intel MKL Developer Reference, click the routine name in the resulting list.

  • Intel® Math Kernel Library
  • CPUs are set to dominate high end visualization

     Carson Brownlee, Intel.  It is certainly provocative to say that CPUs will dominate any part of visualization - but I say it with confidence that the data supports why this is happening.  The primary drivers are (1) data sizes, (2) minimizing data movement, and (3) ability to change to O(n log n) algorithms.

  • Partners
  • Professional
  • Professors
  • Students
  • C/C++
  • Fortran
  • Python*
  • Advanced
  • Beginner
  • Intermediate
  • SDVis
  • In Situ
  • Software Defined Visualization
  • visualization
  • OpenGL*
  • Big Data
  • Computer Vision
  • Development Tools
  • Intel® Many Integrated Core Architecture
  • Media Processing
  • Parallel Computing
  • Threading
  • User Experience and Design
  • Vectorization
  • Virtual Reality
  • Use Intel® Optane™ Technology and Intel® 3D NAND SSDs to Build High-Performance Cloud Storage Solutions

    Describes three Ceph all-flash storage system reference designs, and shares performance test results on the first Intel® Optane™ and P4500 TLC NAND based all-flash cluster. Includes a downloadable Ceph configuration file.
  • Linux*
  • Server
  • Storage
  • Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

    Finding BIOS Vulnerabilities With Excite

    Finding vulnerabilities in code is part of the constant security game between attackers and defenders. An attacker only needs to find one opening to be successful, while a defender needs to search for and plug all or at least most of the holes in a system. Thus, a defender needs more effective tools than the attacker to come out ahead.

    Subscribe to Technical Article