BEST OF 2016


Read our twelve most popular stories from the Intel® Developer Zone.

Take a Look

916 Search Results

Neutron Quality of Service in OpenStack

Quality of Service (QoS) refers to the overall performance of a network and is used in telephony and computer networks to describe the customer’s experience with the network. The most straightforward way of guaranteeing a good quality of service to...

The Schiaparelli Lesson – Unusual and Faulty Conditions

I am really sad that the European Space Agency (ESA) lost their Schiaparelli lander, as we will miss out on a lot of Mars science – even though it was mostly a test for how to land on Mars. From a software engineering and testing perspective, the...

Resetting the lowest n set bits

Already a couple of years ago, the Bit Manipulation Instruction Set 1 (BMI1) introduced the instruction BLSR, which resets the lowest bit that is set. (The corresponding intrinsic _blsr_u32/64 wraps this instruction with some nice C/C++ function...

A glimpse about c-states and SoC Watch on Intel® Quark MCU D2000

To better understand this article and example, you are recommended to have an experience to use Intel® System Studio for Microcontroller to build the example code before. Here is the tutorial link you may take a look at first. You can visit Mouser...

Interview with Lee Bamber about his latest project: MyWorld

Intel® Software Innovator and Intel® Black Belt Lee Bamber talks to us about his latest project, MyWorld, currently on Kickstarter. Before we talk about your game, tell us a bit about your background. I could be described as an old-school 8-bit...

Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day

Methbot is a state-of-the-art ad fraud infrastructure, capable of hosting legitimate videos and serving them to 300 million fake viewers a day. Each view earns the criminals about $13, translating to around four million dollars a day. Over the...

Top Trending on IoT: Our Most Popular Intel® IoT Developer Stories for December

Read about the new version of the Intel® IoT Developer Kit. And don't miss out on the Intel® Joule™ Developer Innovation Challenge....entries close at the end of this year.

Announcing Ubuntu* and Wind River Pulsar* support with Intel® IoT Developer Kit 5.0

We are very excited to announce the release of Intel® IoT Developer Kit 5.0!  This release brings Ubuntu* support for the Intel® Joule™ development platform and Intel® IoT Gateway, providing developers with additional OS options for their IoT...

Intel® XDK Update for December 2016

Happy Holidays Intel® XDK customers and Happy New Year in advance!   In the spirit of the holiday season, we are bringing you some new IoT features.   We have added support for additional IoT platforms. In this release, Intel® XDK now supports...

VTune Amplifier - Collection failed due to SCP failing to copy files from the host to the target

VTune Amplifier uses SCP as a mechanism to copy files to and from the host and the target system, while performing a remote collection.  Often, you may encounter an issue where VTune Amplifier will stop with the "Collection failed" error with a sub...

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 3

This is the third post in a series of blogs about how to configure and deploy a bare metal controller using Ironic.

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 1

OpenStack is a virtualization environment supported by several operating systems. Over the years, Linux* distributions have become easier to install and configure, however, despite these improvements, installing an OS on a server is still time consuming. This series of blogs shows the steps to...

How to Plot OpenMP* Scaling Results

Short Version When plotting scaling graphs for Intel processors which support multiple hardware threads/core, NEVER use an X-axis labelled “Threads”, but always use “Cores”, and plot separate data for 1thread/core, 2threads/core and, on Intel® Xeon...

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet...

SVG Images are a New Ransomware Threat

Creative cyber criminals are taking advantage of Facebook's compatibility with SVG images to infect victims with ransomware. SVG (Scalable Vector Graphics) files are dangerous on social media sites, in email, and even instant messaging tools, as...

How Simics found a Xen Bug – Why Target Variation Matters

A few months ago, Intel® simulation engineers working on Wind River* Simics* reported a bug in the Xen* hypervisor to the public email list. The bug was that Xen did not do the right thing when enabling Intel® Memory Protection Extensions (Intel®...

"Upstreaming" Artificial Intelligence: Making AI Available for All

Artificial intelligence (AI) - machines that can learn from their results to improve their programming for better results. This is how humans operate. We try something, we judge the result and modify our behavior. What some considered to be science...

Intel Unite FAQ

FAQ for Intel Unite Technologies Developers looking at developing plugins for the Intel Unite hub software

Innovation Summit 2016, Part 3: A Solution

This is not the solution that the team will use. In fact, I have the impression that people think it is a little out there. Do I think it is a little out there? Personally, no, but then I am very interested in using cloud services. So what exactly...

Code Modernization: Powering Scientific Discovery and Fostering Innovation Globally at CERN (Part 1)

An Interview with Maria Girone, CTO, CERN openlab  Intel recently talked to CERN openlab CTO Maria Girone to discuss how CERN and Intel work together to deliver improvements in processing speed, sometimes by factors, and how that impacts CERN’s...

Intel® Ultimate Coder Challenge for IoT: What Is Team Whirlwind Up to Now?

By Joe W., Added November 8, 2016

Team Whirlwind Takes Autonomous Cars to the Next Level Now that the eight-week Intel® Ultimate Coder Challenge for IoT is complete, teams continue developing and expanding their projects into the commercial sector. Key to this progress is the Intel...

Intel® Ultimate Coder Challenge for IoT: What Is Team Proximarket Up to Now?

By Joe W., Added November 4, 2016

Team Proximarket Improves Shopping Experience with SmartCart Now that the eight-week Intel® Ultimate Coder Challenge for IoT is complete, teams continue developing and expanding their projects into the commercial sector. Key to this progress is the...

Offloading Graphics Processing from CPU to GPU

Find out why you should offload video processing from the CPU to the GPU.

Intel® Ultimate Coder Challenge for IoT: What is Team Agro Hackers Up to Now?

By Joe W., Added November 1, 2016

Team Agro Hackers Takes Farming to the Next Level Now that the eight-week Intel® Ultimate Coder Challenge for IoT is complete, teams continue developing and expanding their projects into the commercial sector. Key to this progress is the Intel® IoT...

How to Secure the Future of IoT

The world of IoT security just became more complex.  IoT devices are no longer a potential threat to their owners, now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the...

The Visualization Toolkit, Enhanced by Software Defined Visualization

Greetings, developers. My name is David DeMarle and I am a developer at Kitware. I’d like to discuss some of the work we’ve been doing recently with Intel and the Texas Advanced Computing Center (TACC). Kitware is a software consulting company that...

Top Ten October

The Fab Five: Game Dev Content | October

Read about GameStream* and the challenge of Cloud Gaming, OpenGL* performance tips and 7 Wonders of the Ancient World.

Cybersecurity Bounty for iOS Zero-Day Exploits Rise to $1.5 Million

Zerodium is offering a $1.5 million bounty for Apple iOS*10 zero-day exploits.  This is the latest in escalating vulnerability bounties to cybersecurity researchers. It may seem excessive, but this is a market driven by demand. Crowd-sourcing to...

The New Reality for IoT Security

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet of Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices and conscripting them into their botnet...

Intel® Level Up Game Dev Contest – 2016 Runners Up

Each year we celebrate the winners of the Intel® Level Up Game Dev Contest. This year’s field had both a large of number of submissions and was very deep with wonderful games that our internal screeners enjoyed play testing.  The strength of the...

Pages