TRENDING TOPICS


See what's popular among developers in this month's Top Ten Intel® Software Developer Stories.

Take a Look

3307 Search Results

The Best of Modern Code | December

Read the best Modern Code articles and blogs for the month of December.

VTune Amplifier - Collection failed due to SCP failing to copy files from the host to the target

VTune Amplifier uses SCP as a mechanism to copy files to and from the host and the target system, while performing a remote collection.  Often, you may encounter an issue where VTune Amplifier will stop with the "Collection failed" error with a sub...

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 3

This is the third post in a series of blogs about how to configure and deploy a bare metal controller using Ironic.

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 2

This is the second post in a series of blogs about how to configure and deploy a bare metal controller using Ironic

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 1

OpenStack is a virtualization environment supported by several operating systems. Over the years, Linux* distributions have become easier to install and configure, however, despite these improvements, installing an OS on a server is still time consuming. This series of blogs shows the steps to...

Metal Minds

Intel hosted AI Day last month. Read about the latest in AI, Machine Learning and Deep Learning including new student and educational programs.

Smart Hospitals Need to be Secured

I want my hospital to be smart, but I demand it be secure and safe!  A new report from the European Union Agency for Network and Information Security (ENISA) outlines strong recommendations for hospitals to protect themselves from cyber risks as...

Intel® Software Innovators Summit Collaboration Challenge

The second annual Intel® Software Innovator Summit was held in Seattle, Washington in November 2016. 50 Innovators from North America, South America, and Europe attended the event and this year we included a team collaboration mini-hackathon...

Intel® Software Innovator Summit 2016

The second annual Intel® Software Innovator Summit was hosted at the Edgewater Hotel in Seattle, beautifully located right on the bay. 50 innovators from North America, South America, and Europe arrived throughout the day with free time to explore...

How to plot OpenMP* scaling results

TL;DR Version When plotting scaling graphs for Intel processors which support multiple hardware threads/core, NEVER use an X-axis labelled “Threads”, but always use “Cores”, and plot separate data for 1thread/core, 2threads/core and, on Intel® Xeon...

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet...

Presence, Reality, and the Art of Astonishment in Arizona Sunshine

What is presence, why does it matter to VR, and how did Intel and Vertigo Games improve it in Arizona Sunshine?

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Where Cybercriminals Will Go Knowing what cybercriminals are targeting today is easy.  Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop.  The tougher challenge is figuring out where...

Interview with Well Told Entertainment about their Virtual Reality Escape Room Game

You light a few candles, turn off the lights, and say Bloody Mary’s name 3 times in to the mirror… can you get past your terror and solve a series of puzzles to escape the room before Mary can get through? Just in time for Halloween, Well Told...

Farewell SHA-1 Hash Algorithm

Rest-in-Peace SHA-1.  Like all security controls, they are only valuable for a certain period of time. SHA-1, a legacy hashing algorithm once used heavily in secure web browsing, has outlived its usefulness, therefore it is time to be...

What is the Intel® Software Innovator Program? A Quick Look

Intel® Software Innovator Program Did you know that Intel® offers a program specifically designed to support independent developers in using the latest technology and open source software to bring their ideas to life? Intel created this program in...

SVG Images are a New Ransomware Threat

Creative cyber criminals are taking advantage of Facebook's compatibility with SVG images to infect victims with ransomware. SVG (Scalable Vector Graphics) files are dangerous on social media sites, in email, and even instant messaging tools, as...

November IoT

Trending on IoT: Our Most Popular Intel® IoT Developer Stories for November

Read about IoT security issues, create a color match game, and learn more about the Intel® Joule™ Compute Module.

How Simics found a Xen Bug – Why Target Variation Matters

A few months ago, Intel® simulation engineers working on Wind River* Simics* reported a bug in the Xen* hypervisor to the public email list. The bug was that Xen did not do the right thing when enabling Intel® Memory Protection Extensions (Intel®...

Code Modernization: Powering Scientific Discovery and Fostering Innovation Globally at CERN (Part 2)

An Interview with Maria Girone, CTO, CERN openlab  Intel recently talked to CERN openlab CTO Maria Girone to discuss how CERN and Intel work together to deliver improvements in processing speed, sometimes by factors, and how that impacts CERN’s...

SHEPHERD: Just when I thought I was out... they pull me back in

Don't get me wrong, I was a quite willing participant with all of this.  I am sitting at a table with some amazing folk at the second day of the Intel Innovator Summit. I've been asked what I do, a quite typical question in a group setting with...

"Upstreaming" Artificial Intelligence: Making AI Available for All

Artificial intelligence (AI) - machines that can learn from their results to improve their programming for better results. This is how humans operate. We try something, we judge the result and modify our behavior. What some considered to be science...

Modern Code November

The Best of Modern Code | November

Learn about best practices for vector programming, scaling your application, and how Intel and CERN are moving Modern Code ahead.

Maximizing performance in the cloud

Getting an instant boost on common web apps hosted in the cloud

Intel Unite FAQ

FAQ for Intel Unite Technologies Developers looking at developing plugins for the Intel Unite hub software

Innovation Summit 2016, Part 3: A Solution

This is not the solution that the team will use. In fact, I have the impression that people think it is a little out there. Do I think it is a little out there? Personally, no, but then I am very interested in using cloud services. So what exactly...

Where hackers take their money – Casinos, Cryptocurrency, and Virtual Worlds

Cybercrime is reaching epidemic levels. Some estimates predict global annual cybercrime costs will reach $6 trillion by 2021.  This includes the costs of security as well as the losses from thefts and fraud from successful attacks.  Criminals are...

MeshCommander v0.3.8 released

A few days back I released MeshCommander v0.3.8 with quite a bit of improvements to how MeshCommander deals with Intel® AMT TLS. Anyone that works with Intel® AMT knows that certificates are a big part of the process. Often times, administrators...

IoT Worms Could Spread Like Zombies

Security researchers recently created a proof-of-concept attack against Internet connected lightbulbs, causing breached devices to reach out and infect their neighbors.  Propagation continues and spreads itself across the community.  This hack...

CyberSeek is the Cybersecurity Career Site Needed by Job Seekers

U.S Department of Commerce National Institute of Standards and Technology(NIST) has created a free interactive online website, CyberSeek, to help cybersecurity job seekers understand opportunities, find openings, and develop a plan for career...

Pages