Connect and Learn

 
Read the latest articles and blogs from our Intel® Software Evangelists.

116 Search Results

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Fuzzing is a common technique used by hackers to find vulnerabilities, where random inputs are sent to expose mistakes in code. However, with the source code and information about the software under attack, crashes and...

Ecosystem Partners Shift Left with Intel for Faster Time-to-Market

Intel’s Pre-Silicon Customer Acceleration (PCA) program scales innovation across all operating environments using the Simics® virtual platform  as a primary technology.  The program helps customers develop, test, tune, and optimize mission-...

Cloud, Containers, and Your Simulator

The Design Automation Conference (DAC) 2019 takes place in Las Vegas, Nevada, on June 2 to 6, 2019. In addition to demonstrating Simics® and other Intel® simulation solutions on the show floor, I have a presentation about how to use cloud...

Develop Data Center Solutions with a Hardware Foundation of Trust

With the exponential growth of data and data-centric business processes, developers face enormous challenges to make information more secure at scale.  With Intel® Security Libraries for Data Centers (Intel® SecL-DC), developers can take...

Simics® Software Automates “Cyber Grand Challenge” Validation

The US Defense Advanced Projects Agency (DARPA) ran a “Cyber Grand Challenge” in 2016, where automated cyber-attack and cyber-defense systems were pitted against each other to drive progress in autonomous cyber-security....

Ecosystem Support for EEA Trusted Compute Specification v1.0 Improves Blockchain Privacy and Scalability

The Enterprise Ethereum Alliance announced the EEA Trusted Compute Specification v1.0 at Consensus 2019, the annual gathering of the blockchain technology world. Software developers can use the Trusted Compute Spec to...

Pages