GET INSPIRED

 
Spark your own innovation and build your competitive edge.

Connect and Learn

 
Read the latest blogs from our Intel® Software Evangelists, follow them on Twitter, and engage with them at industry events throughout the year.

Explore our Team

154 Search Results

Breaking Firmware for Fun and Profit… and Security

Attacks operating at the firmware level can be difficult to discover. There are methods for detecting and defending against attacks, which Intel shares through open source and training.

Shifting Left—Building Systems & Software before Hardware Lands

Chip-making at Intel used to involve a lot of work in sequence, but processors, systems-on-a-chip (SoCs) and other silicon products require more steps than before. They take more time to design, develop, test and manufacture, and they need more...

Intel’s Day Zero Google I/O Event: Developer Engagement, New Technologies and Fun with Android

Google’s 10th annual developer festival, Google I/O, was held May 8‒10, 2018, at the Shoreline Amphitheatre in Mountain View, California. This premier event attracts thousands of software creators, strategists and innovators from around the world...

Broadening the Reach of Cybersecurity Education

Cybersecurity education is of prime importance in today’s world. Increasing threats from attackers are motivated by financial and other gains, and these bad actors have access to advanced tools, resources and services from the hacker...

Prototyping is an Art (and a Science)


Image credit:  Leonardo DaVinci sketch, Wikimedia Commons

"It is one thing to have an idea for an enterprise; making it happen is a very difficult thing. It demands...

How to Securely Move Mission Critical Workloads to the Cloud

As organizations increasingly move their business-critical workloads to the public cloud, encryption is an effective and popular control for data protection. With encryption protecting the data, the risk then transfers to the encryption keys....

Pages