3166 Search Results
cursor mode

What could you do with Intel RealSense Cursor Mode?

Information on the new, highly responsive Cursor Mode option for the Intel RealSense SR300 user facing camera.

My Journey to learn Modern Code

When I first saw a session at IDF where masters of the Modern Code were discussing it got me intrigued to think more. Fellow Black Belt Gaston Hillar gave me good insight into it. I had a quick chat also with our Black Belt Program Manager Kathy(Always filled with Energy) she also explained about...

Create your own application with Intel® System Studio for Microcontrollers (ISSM) 2015 update 3 on D1000

*Before follow steps, I assume you could successfully build sample and launch sample on the D1000 1. Open your command window and go the place you installed ISSM. Use launch_expert.bat to set up environment variables easily and a new windows will...

What is Thread Parallelism, and How Do I Put It to Use?

Last updated: February 17, 2016By Clay B.

An Intro to Multi-Level Parallelism for High-Performance Computing by Clay Breshears | Life Sciences Software Architect, Intel

UEFI Tools…They’re Not Just for Hackers Anymore

There are some great tools available for unpacking UEFI images. This is wonderful if you want to learn more about firmware… but it might be bad news if you’re developing firmware without security in mind. My Twitter feed is full of firmware...

Python brings us the LIGO gravity wave sound

 Rarely does a huge science project get the notice of the broader world like the announcement last week that gravitational waves have been discovered by LIGO. It has been likened to Galileo first looking through a telescope to the heavens. What I...

How to Develop a Hybrid Mobile Application Part 1: Get Started

Hi friends, in this tutorial I am going to show you step by step procedure for how to create a hybrid mobile app. Targeted Learners: This tutorial is for those people who are beginners towards developing mobile apps, and also for those web app...

-NEW- Intel® BETA 15.40.18.4380 Graphics Driver for Windows® 7/8.1/10 [15.40]

DRIVER VERSION: 15.40.18.64.4380 & 15.40.18.32.4380 DATE: February 5, 2016 This driver is in zip format intended for developers and IT professionals. 32bit - win32_154018.4380.zip 64bit - win64_154018.4380.zip SUMMARY: This beta version...

Upcoming IXPUG meeting in Ostrav, Czech Republic - March 15-18

Please join IXPUG (Intel® Xeon Phi™ Users Group) for a meeting at the Clarion Congress Hotel, hosted by IT4Innovations, VŠB - Technical University of Ostrava in Ostrava, Czech Republic. The meeting will combine Intel PCC members-only meeting (March 14-15) with IXPUG Workshops and Tutorials, which...

What's New - Intel RealSense SDK (Windows) v8 (2016 R1) release

As the first release of the Intel® RealSense™ SDK (Windows) in 2016, R1 (aka version 8.0.24.6528)  focuses on improvements for the Intel® RealSense™ SR300 camera, introduction of Platform Camera support, and major changes in Scene Perception (SP)...

Securing Firmware is Crucial for IoT

I recently did an interview with Motherboard about IoT device security, and what role firmware plays in the overall software picture. As computers grow more ubiquitous (linking household appliances to phones to cars in a vast, nebulous “Internet...

What Node.js means for WordPress

(Cross-posted from my blog on http://evangelists.intel.com) If you are a fan of PHP for developing web applications (as I am), you could feel the world shift a bit as it was announced that WordPress was switching from PHP to Node.js.  Don't...

Undefined behavior is closer than you think

Some people think that undefined behavior is caused only by gross errors (accessing outside the bounds of the array, for instance) or inadequate constructions (i = i++ + ++i, for example). That's why it is quite surprising when a programmer sees...

What Does Node.js Mean for WordPress?

If you are a fan of PHP for developing web applications (as I am), you could feel the world shift a bit as it was announced that WordPress was switching from PHP to Node.js*.  Don’t think of WordPress as a blog engine. Think of it as an open...

Top Ten Intel® Software Developer Stories | February

1. An eCryptfs-Based Solution for Securing Your Data on Android*   The threat to data on mobile devices is a serious issue. Not only have Android* developers worked on security, but many application developers work to ensure the security of the...

How did Multi-OS Engine Technology Preview help Auriga* build its new Wireless Patient Monitoring App?

Here is another success story of how the Multi-OS Engine Technology Preview helped one of our customer firms, Auriga which has been developing innovative solutions for its clients for 25 years in the field of embedded software for medical devices,...

Progress Report: Bringing Erasure Coding to Apache Hadoop*

Check out this joint Intel & Cloudera blog to get an update on the progress of the effort to bring erasure coding to HDFS, including a report about fresh performance benchmark testing results.

Getting Started with Tachyon by Use Cases

In-memory computing has become an irreversible trend in big data technology, for which the wide popularity of Spark provides a good evidence. Meanwhile, memory storage and management for large data sets are still posing challenges. Out of numerous solutions, Tachyon, a memory-centric distributed...

Advice to a Network Admin Seeking a Career in Cybersecurity

Even after nearly 25 years, I continue to be excited and passionate about security. I enjoy discussing my experiences, opinions, and crazy ideas with the community. I often respond to questions and comments on my blogs and in LinkedIn, as it is a...

Explore Intel® AVX-512 Code Paths with Intel® Advisor XE while not Having Compatible Hardware

Many factors that can make programs difficult for automatic vectorization. We will examine some of the factors that can make vectorizing code problematic without providing the compiler with some additional hints. Vectorizing loops is critical for increasing your applications’ performance, and Intel...

Intel’s Secret Cybersecurity Advantage

Intel Corporation has a secret advantage to protect itself from cyber threats; a world class Information Technology (IT) shop. The 2015-2016 Intel IT Annual Performance Report showcases the depth of security, operational efficiency, and innovation...

Mesh Commander v0.1.4 Released

Quick note to mention that over the holiday break and into January, we have been working on a much improved web based Intel® AMT console that we now call MeshCommander. Over the last two months, we have made huge progress in building the first,...

Criminals Are Getting Excited for Tax Filing Season

Cyber criminals are plotting to take advantage of tax season, by fraudulently impersonating consumers and scamming Americans. For the citizens of the United States, tax season is upon us, where we diligently file our annual tax returns with the US...

Whippering Indie Cup 2015 - A Competition & Celebration of Independent Gaming

When deciding to organize our own indie gaming event, we looked to a rather unlikely place for inspiration: tech startups. Having spent a fair number of years attending startup competitions and conferences like TechCrunch Disrupt and LAUNCH Festival...

Why the Yocto Project isn't called "Linux*"

Juliet: "What's in a name? That which we call a rose By any other name would smell as sweet." Romeo and Juliet (II, ii, 1-2) Is it true that a name is simply an arbitrary label with no particular meaning, as Juliet claims? Or is there...

3 Questions Every Game Developer Should Ask Before they Begin Developing

In January we brought the Intel® Buzz Workshop series to Montreal for the first time. Montreal in January? YES! It was cold (for those of us from Oregon) but it was amazing! We partnered with IGDA Montreal to host our event during the day before...

Cybersecurity is Suffering Due to Human-Resource Challenges

The cybersecurity industry is in a state of disrepair. Human resource problems are growing which put the efforts to secure technology at risk, due to insufficient staffing, skills, and diversity. The need for talent is skyrocketing, but there...

Cyber Threats are a Danger to Corporate Growth

Executives are beginning to understand that cyber-based threats are a potentially significant impediment to business success. The challenges extend far beyond the annoyance of rising security budgets. The recent PwC survey showed 61% of CEO’s...

Software Will Drive “Sensification” of Computing, i.e. Everything

The phrase “sensification” has become an earworm of sorts. I can’t shake it. Intel CEO Brian Krzanich discussed it at CES, where he explained computing will move to things that sense their environment, are connected, and become an extension of the...

Cyber Criminals are Becoming More Sophisticated

One constant in cybersecurity is the continual rise of sophistication and creativity of cyber criminals. In 2016, we will see a fundamental expansion of the techniques of attackers. Integrity attacks will rise. The industry has become comfortable...

Pages