3435 Search Results

-NEW- Intel® BETA 15.40.18.4380 Graphics Driver for Windows® 7/8.1/10 [15.40]

DRIVER VERSION: 15.40.18.64.4380 & 15.40.18.32.4380 DATE: February 5, 2016 This driver is in zip format intended for developers and IT professionals. 32bit - win32_154018.4380.zip 64bit - win64_154018.4380.zip SUMMARY: This beta version...

Upcoming IXPUG meeting in Ostrav, Czech Republic - March 15-18

Please join IXPUG (Intel® Xeon Phi™ Users Group) for a meeting at the Clarion Congress Hotel, hosted by IT4Innovations, VŠB - Technical University of Ostrava in Ostrava, Czech Republic. The meeting will combine Intel PCC members-only meeting (March 14-15) with IXPUG Workshops and Tutorials, which...

What's New - Intel RealSense SDK (Windows) v8 (2016 R1) release

As the first release of the Intel® RealSense™ SDK (Windows) in 2016, R1 (aka version 8.0.24.6528)  focuses on improvements for the Intel® RealSense™ SR300 camera, introduction of Platform Camera support, and major changes in Scene Perception (SP)...

Securing Firmware is Crucial for IoT

I recently did an interview with Motherboard about IoT device security, and what role firmware plays in the overall software picture. As computers grow more ubiquitous (linking household appliances to phones to cars in a vast, nebulous “Internet...

What Node.js means for WordPress

(Cross-posted from my blog on http://evangelists.intel.com) If you are a fan of PHP for developing web applications (as I am), you could feel the world shift a bit as it was announced that WordPress was switching from PHP to Node.js.  Don't...

Undefined behavior is closer than you think

Some people think that undefined behavior is caused only by gross errors (accessing outside the bounds of the array, for instance) or inadequate constructions (i = i++ + ++i, for example). That's why it is quite surprising when a programmer sees...

What Does Node.js Mean for WordPress?

If you are a fan of PHP for developing web applications (as I am), you could feel the world shift a bit as it was announced that WordPress was switching from PHP to Node.js*.  Don’t think of WordPress as a blog engine. Think of it as an open...

Top Ten Intel® Software Developer Stories | February

1. An eCryptfs-Based Solution for Securing Your Data on Android*   The threat to data on mobile devices is a serious issue. Not only have Android* developers worked on security, but many application developers work to ensure the security of the...

How did Multi-OS Engine Technology Preview help Auriga* build its new Wireless Patient Monitoring App?

Here is another success story of how the Multi-OS Engine Technology Preview helped one of our customer firms, Auriga which has been developing innovative solutions for its clients for 25 years in the field of embedded software for medical devices,...

Progress Report: Bringing Erasure Coding to Apache Hadoop*

Check out this joint Intel & Cloudera blog to get an update on the progress of the effort to bring erasure coding to HDFS, including a report about fresh performance benchmark testing results.

Getting Started with Tachyon by Use Cases

In-memory computing has become an irreversible trend in big data technology, for which the wide popularity of Spark provides a good evidence. Meanwhile, memory storage and management for large data sets are still posing challenges. Out of numerous solutions, Tachyon, a memory-centric distributed...

Advice to a Network Admin Seeking a Career in Cybersecurity

Even after nearly 25 years, I continue to be excited and passionate about security. I enjoy discussing my experiences, opinions, and crazy ideas with the community. I often respond to questions and comments on my blogs and in LinkedIn, as it is a...

Explore Intel® AVX-512 Code Paths with Intel® Advisor XE while not Having Compatible Hardware

Many factors that can make programs difficult for automatic vectorization. We will examine some of the factors that can make vectorizing code problematic without providing the compiler with some additional hints. Vectorizing loops is critical for increasing your applications’ performance, and Intel...

Intel’s Secret Cybersecurity Advantage

Intel Corporation has a secret advantage to protect itself from cyber threats; a world class Information Technology (IT) shop. The 2015-2016 Intel IT Annual Performance Report showcases the depth of security, operational efficiency, and innovation...

Mesh Commander v0.1.4 Released

Quick note to mention that over the holiday break and into January, we have been working on a much improved web based Intel® AMT console that we now call MeshCommander. Over the last two months, we have made huge progress in building the first,...

Criminals Are Getting Excited for Tax Filing Season

Cyber criminals are plotting to take advantage of tax season, by fraudulently impersonating consumers and scamming Americans. For the citizens of the United States, tax season is upon us, where we diligently file our annual tax returns with the US...

Whippering Indie Cup 2015 - A Competition & Celebration of Independent Gaming

When deciding to organize our own indie gaming event, we looked to a rather unlikely place for inspiration: tech startups. Having spent a fair number of years attending startup competitions and conferences like TechCrunch Disrupt and LAUNCH Festival...

Why the Yocto Project isn't called "Linux*"

Juliet: "What's in a name? That which we call a rose By any other name would smell as sweet." Romeo and Juliet (II, ii, 1-2) Is it true that a name is simply an arbitrary label with no particular meaning, as Juliet claims? Or is there...

3 Questions Every Game Developer Should Ask Before they Begin Developing

In January we brought the Intel® Buzz Workshop series to Montreal for the first time. Montreal in January? YES! It was cold (for those of us from Oregon) but it was amazing! We partnered with IGDA Montreal to host our event during the day before...

Cybersecurity is Suffering Due to Human-Resource Challenges

The cybersecurity industry is in a state of disrepair. Human resource problems are growing which put the efforts to secure technology at risk, due to insufficient staffing, skills, and diversity. The need for talent is skyrocketing, but there...

Cyber Threats are a Danger to Corporate Growth

Executives are beginning to understand that cyber-based threats are a potentially significant impediment to business success. The challenges extend far beyond the annoyance of rising security budgets. The recent PwC survey showed 61% of CEO’s...

Software Will Drive “Sensification” of Computing, i.e. Everything

The phrase “sensification” has become an earworm of sorts. I can’t shake it. Intel CEO Brian Krzanich discussed it at CES, where he explained computing will move to things that sense their environment, are connected, and become an extension of the...

Cyber Criminals are Becoming More Sophisticated

One constant in cybersecurity is the continual rise of sophistication and creativity of cyber criminals. In 2016, we will see a fundamental expansion of the techniques of attackers. Integrity attacks will rise. The industry has become comfortable...

Ready to use VTune(TM) Amplifier XE in guest Linux* based on KVM?

Former VTune(TM) Amplifier XE can be installed in guest Linux* operation system based on Virtual Machine, however only user mode data collectors (they are basic hotspots, concurrency, locksandwaits analysis) can be supported, event-based cannot be...

Trending on IoT: Our Most Popular Intel® IoT Developer Stories

Our team of software developers, experts, partners and enthusiasts have continuously shared innovative and exciting ideas in the Intel® IoT Developer Zone. This month we’ve compiled a list of our most popular IoT stories to guide you through the...

An Intro to MCDRAM (High Bandwidth Memory) on Knights Landing

Intel’s next generation Xeon Phi™ processor family x200 product (code-named Knights Landing) brings in new memory technology, a high bandwidth on package memory called Multi-Channel DRAM (MCDRAM) in addition to the traditional DDR4. MCDRAM is a high bandwidth, low capacity memory, packaged with the...

Security on Silicon is Where Cyber is Going

With the growth of IoT devices, going from 15 billion to 200 billion by 2020 and the focus by attackers to get further down the stack, silicon based security will play a greater role in protecting technology and users. As attackers evolve, they get...

Doctor Fortran in "A Blast from the Past"

Last updated: January 19, 2016

David Muxworthy, ISO Fortran standards committee (WG5) Corrigenda editor and member of BCS (formerly British Computer Society) recently sent along a fascinating document. It comes from a project to digitize old papers from the archive of the BCS...

Intel® Awarded ‘Best Strategic Partner’ by HTML5 DreamWorks in China

Last week it was announced that Intel® joined Google* China and Liepin* as winners of the Best Strategic Partner award. 16 additional awards were granted including Best Gaming, Best Gaming Engine, and Best Tech Innovation. Read the entire...

Automotive Security is About to Change

The focus and scrutiny on automobiles and the transportation sector as a whole (planes, trains, etc.) will increase to unprecedented levels. In 2015, we saw major vulnerabilities in automotive technology, where researchers were able to take over...

Pages