3138 Search Results

Interview with Lee Bamber about his latest project: MyWorld

Intel® Software Innovator and Intel® Black Belt Lee Bamber talks to us about his latest project, MyWorld, currently on Kickstarter. Before we talk about your game, tell us a bit about your background. I could be described as an old-school 8-bit...

Innovator Interview: Paul Langdon

Paul Langdon, based in Connecticut, is a very active member of the Intel® Software Innovator Program and also very involved in his local developer community. His background in education plays a big role in his life as he not only uses his skills to...

Doctor Fortran in "To Be Continued"

Last updated: December 30, 2016

This is my last blog post as an Intel employee (see Doctor Fortran in "Thirty-Eight") but I intend to keep active in the Fortran (and Intel Developer Zone) community. First, though, I'll take a short break. Future Doctor Fortran posts will be found...

Previous Doctor Fortran blog posts

Previous "Doctor Fortran" blog posts can be found here. You may also find of interest Visual Fortran Newsletter Archive (for DVF/CVF)

Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day

Methbot is a state-of-the-art ad fraud infrastructure, capable of hosting legitimate videos and serving them to 300 million fake viewers a day. Each view earns the criminals about $13, translating to around four million dollars a day. Over the...

Accountability for Security

Recently I attended one of the largest innovation events in the finance industry, Money 20/20. As expected in a conference of this magnitude, the size and social experience felt overwhelming. Although it is marketed as a “financial innovation...

Achieve More With Intel® Xeon® E5 Optimized Software

Bestselling author James C. Collins is well known for the oft-used axiom: “Good is the enemy of great.” In short, settling for what works is always going to keep you from doing your best. It’s a mentality that makes a lot of sense when considering...


Overview of an Intel Software Guard Extensions Enclave Life Cycle

Life Cycle of an SGX Enclave SGX Enclave: Intel SGX provides hardware features that creates a form of user level TEE. The enclave is an isolated region of code and data within applications address space. Data within an enclave can be accessed by...

Avalanche Cybercriminal Infrastructure Takedown

Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure!  The U.S. Attorney’s Office, FBI, Europol, German Police, and others from over 40 countries were involved in...


DWX17 – Call for Papers for the Cross-Platform- and Web-Backend-Day

#### See English version below #### Die Developer-Week ist eine der größten Entwickler-Konferenzen in Deutschland. Dieses Jahr war ich als Programmverantwortlicher für den Cross-Platform Day zuständig. Ich habe während der Konferenz und sogar noch...

Democratizing 3D Content Creation: Tilt Brush to Adobe’s Project Felix

For the 2D artist and designer, creating 3D concept art, 3D product photography, or 3D UIs has been challenging. Typically, this work is only in reach to those skilled with and trained in 3D tools.  This post will expose new possibilities for...

Did You Forget to Patch Your IP Camera?

IP cameras are usually a purchase, install, and don’t-touch type of device.  But in the current climate of cyber-attacks, they now require regular updates and patches.  Otherwise your security tool may be hacked, leak video, or join a...

This Ransomware Turns Victims Against Their Associates

Popcorn Time ransomware, a newcomer to the malware scene, has an incentive program for victims.  If they successfully infect others who pay, they will get their files unlocked for free.  Sacrificing others to save your own files.  This is a new...

Cyberhack Steals $31 Million in Assets

Hackers stole 2 billion rubles, about $31 million in U.S. dollars, from the Russian Central Bank last week.  They fell short of their targeted goal of about 5 billion rubles ($78 million dollars), but still enough for a good haul.  Such big heists...

Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality.  It is currently being used by a number of...

How to Reduce Your Data Center Footprint

Learn about innovative ways to address the rapidly increasing growth of Video streaming demands while reducing your data center footprint and costs.

December Top Ten

Top Ten Intel® Software Developer Stories | December

A little Shakespeare, more from CERN and some fun from SC16 in this month's Top Ten.

Why Intel® CoFluent™ Technology for Big Data

Intel CoFluent Studio is a product from Intel that lets you build models of pretty much any system to evaluate performance and behavior using an abstract model instead of concrete code.

The Fab Five: Game Dev Content | December

Arizona Sunshine*, a dog named Waffles, and the Escape Room*. Read all about it in this month's best of Game Dev Blog.

The Best of Modern Code | December

Read the best Modern Code articles and blogs for the month of December.

VTune Amplifier - Collection failed due to SCP failing to copy files from the host to the target

VTune Amplifier uses SCP as a mechanism to copy files to and from the host and the target system, while performing a remote collection.  Often, you may encounter an issue where VTune Amplifier will stop with the "Collection failed" error with a sub...

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 3

This is the third post in a series of blogs about how to configure and deploy a bare metal controller using Ironic.

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 2

This is the second post in a series of blogs about how to configure and deploy a bare metal controller using Ironic

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 1

OpenStack is a virtualization environment supported by several operating systems. Over the years, Linux* distributions have become easier to install and configure, however, despite these improvements, installing an OS on a server is still time consuming. This series of blogs shows the steps to...

Intel GameDev at VRDC 2016

Last updated: December 6, 2016

As a Diamond Sponsor of the Virtual Reality Developer’s Conference, Intel showcased a number of new VR technologies live in San Francisco.  Featured VR Games included Arizona Sunshine and The Unspoken, see below for more. The Intel GameDev program...

Metal Minds

Intel hosted AI Day last month. Read about the latest in AI, Machine Learning and Deep Learning including new student and educational programs.

Smart Hospitals Need to be Secured

I want my hospital to be smart, but I demand it be secure and safe!  A new report from the European Union Agency for Network and Information Security (ENISA) outlines strong recommendations for hospitals to protect themselves from cyber risks as...

How to Plot OpenMP* Scaling Results

Short Version When plotting scaling graphs for Intel processors which support multiple hardware threads/core, NEVER use an X-axis labelled “Threads”, but always use “Cores”, and plot separate data for 1thread/core, 2threads/core and, on Intel® Xeon...

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet...

Presence, Reality, and the Art of Astonishment in Arizona Sunshine

What is presence, why does it matter to VR, and how did Intel and Vertigo Games improve it in Arizona Sunshine?