3337 Search Results

Faster, Smarter Development for Embedded Solutions - Free Webinars

Take advantage of these two deep dive free technical webinars for optimizing embedded applications and system software. Find and fix power efficiency and performance issues, improve reliability, and speed your development so you can go to market...

Sharing Cybersecurity Threat Intelligence is the Only Way We Win!

  Cybersecurity is a team sport. The bad guys share information, expertise, code, and help one another. The good guys must do the same to keep pace. Sharing Threat Intelligence is a key aspect where knowledge gained by owners of sensor networks...

What Will Kill ROP Cyberattacks?

IBM recently announced a software-oriented solution to help eradicate Return Oriented Programming (ROP) malware attacks.  ROP is a significant and growing problem in the industry.  Crafty hackers use snippets of code from other trusted programs...

Top Ten Intel® Software Developer Stories | October

Find out what's buzzing this month with the October Top Ten!

The New Reality for IoT Security

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet of Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices and conscripting them into their botnet...

Intel® Level Up Game Dev Contest – 2016 Runners Up

Each year we celebrate the winners of the Intel® Level Up Game Dev Contest. This year’s field had both a large of number of submissions and was very deep with wonderful games that our internal screeners enjoyed play testing.  The strength of the...

Speaking about Simics and SystemC at DVCon Europe

On October 20, I will be speaking at the Design and Verification Conference and Exhibition Europe 2016 (known as DVCon Europe), presenting a paper titled “Integrating Different Types of Models into a Complete Virtual System – The Simics SystemC*...

Intel® Xeon Phi™ Product Family x200 (KNL) User mode (ring 3) MONITOR and MWAIT

The Intel® Xeon Phi™ Product Family x200 series processors (formerly known as “Knights Landing”) contain a model specific feature, which allows the MONITOR and MWAIT[1] instructions to be executed in rings other than ring 0, whereas architecturally...

MICRO49-Tutorial on Intel® Processor Graphics: Microarchitecture and ISA

Intel Processor Graphics: Microarchitecture and ISA Organizers: Jason Ross, Subramaniam Maiyuran and Guei-Yuan Lueh (all from Intel) Email: {jason.ross, subramaniam.maiyuran, guei-yuan.lueh}@intel.com Duration: Half Day Slides: Architecture...

The Intel® XDK and Node.js* IoT Apps

Some of you may know that the Intel® XDK mobile app development tool was previously produced in multiple flavors: The Intel XDK The Intel XDK EA Pre-Release The Intel XDK IoT Edition With our August 2016 release of the Intel XDK we moved to a...

Doctor Fortran in "Thirty-Eight"

October 2, 1978 was a typical New England fall day. I walked into the entrance of what had once been a Caldor department store in Tewksbury, Massachusetts. This converted shopping center was the just-opened software development outpost of Digital...

Build a Path to Deeper Insights

HPC Speaker Series at Stanford Shows How Modern Code Helps Developers Build Code Designed to Take Advantage of Today’s Powerful From the discovery of the Higgs boson particle at the Large Hadron Collider, to the development of hypersonic vehicles...

Mitch moving on…but not too far

For the last seven years (nearly my whole professional career) I’ve had the privilege of working at Intel to serve the needs of game developers.

Maritime Hackathon in Hamburg

24 hours, one mission: New ideas and approaches for the maritime industry to develop. With a great view over the port of Hamburg the 20 participants hacked like crazy one day and one night. After the breakfast the countdown to work started exactly...

Intel® and IoT Solutions World Congress Hackathon

Explore. Innovate. Create a New World. Fira Barcelona, Gran Via Venue, Hall 2 Barcelona Spain October 23-24, 2016   Beyond its revolutionary impact in business and industries, IoT has enormous potential to respond to critical problems in...

Pipeline and the Efficient Chef (Part 1)

Advanced computer concepts for the (not so) common Chef So far, we’ve talked about the components of a computer system, e.g. the core, memory hierarchy, and program. Let’s now get into the guts (sic) of the core itself, also called the micro-...

Intel® IoT Developer Kit: Your Gateway to Commercial Cloud Solutions with Microsoft Azure* IoT

By Joe W., Added September 26, 2016

Microsoft Azure* paired with the Intel® IoT Developer Kit provides developers with a full set of development tools – from the edge to the cloud.

Driving Cloud Gaming into the Mainstream

A quick glance through all 2016 cloud gaming related news and articles is enough to realize how fundamentally divided game pundits are towards the streaming delivery model. On one side are the bulls. They espouse the sheer beauty of the concept:...

How GameStream* Answers the Challenges of Cloud Gaming

The transformation of usage models from physical distribution to unlimited streaming of content is a trend that spans across all entertainment industries – from music to movies to gaming. However, each of these industries is at a different stage of...

Trending on IoT: Our Most Popular Developer Stories | September

Code Sample: Earthquake Detector in JavaScript* for an Intel® Joule™ Development Platform This code sample shows you how to keep track of seismic data using a development platform and an assortment of extensible sensors. Introducing the Intel...

Open Source Software is Leading Us Into a Technical Utopia

It’s unlike anything else in any industry. Open source software can turn individual developers into influencers overnight. Free enterprises from decades-long licensing dependencies. Turn startups into publicly traded companies in no time. But it...

Phoenix Mobile and IoT Festival 2016

Come join your fellow developers, enthusiasts, and makers for a fun-filled day of technology-focused talks at the Phoenix Mobile and IoT Festival. It is a free, all-day networking event to be held on Saturday, September 24th, at Grand Canyon...

Deprecating the PCOMMIT Instruction

The PCOMMIT instruction has been deprecated.

The Best of Modern Code | September

Boost Performance and Energy Efficiency on HPC Workloads with Intel® Xeon Phi™ Processors Discover how optimizing code on the latest Intel® Xeon® processors E5 v4 and Intel® Xeon Phi™ processors can help transform many core processing power into...

Cryptocurrencies are a Target for Cybercriminals – Social Platforms are Next (Part 2)

Continuation from part 1: Cryptocurrencies are a Target for Cybercriminals – The New Risks of Innovation Cyber criminals are always looking for victims and ways to exploit them. Stealing what is valuable is the goal. Cryptocurrencies hold...

Event Recap: PAX West 2016

The Intel Booth at PAX West featured streamers, pro gamers, VR, indie games, and even a DJ and cooking!  Going to PAX and announcing the winners of our Intel® Level Up Game Dev Contest is among my top three things I get to do each year. That has...

My Experience from Spark Summit

Spark Summit is a professional conference which usually has in attendance thousands of developers, scientist, analysts, researchers and executives from all over the world. At the conference, attendees come together to understand how big data,...

Intel Software Guard Extensions (Intel SGX) Tutorial Series: Looking ahead

Part 4 of the Intel Software Guard Extensions (Intel SGX) Tutorial Series will be coming out in the next few days. In it, we'll be starting our enclave implementation, focusing on the bridge/proxy functions for the enclave itself as well as the...

The power of simulation and why developers should consider it mandatory—A conversation with IoT expert Sangeeta Ghangam

Getting your system and software architecture right is very important to the success of a product. It is particularly important when the system you are building has a long expected life time. Internet-of-Things (IoT) edge analytics is such a...

Cryptocurrencies are a Target for Cybercriminals – The New Risks of Innovation (part 1)

All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. It is the Willie Sutton principle. Willie, a famous bank robber in the 20’s-30’s, was asked why he robbed banks....

Pages