3409 Search Results

Avalanche Cybercriminal Infrastructure Takedown

Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure!  The U.S. Attorney’s Office, FBI, Europol, German Police, and others from over 40 countries were involved in...


DWX17 – Call for Papers for the Cross-Platform- and Web-Backend-Day

#### See English version below #### Die Developer-Week ist eine der größten Entwickler-Konferenzen in Deutschland. Dieses Jahr war ich als Programmverantwortlicher für den Cross-Platform Day zuständig. Ich habe während der Konferenz und sogar noch...

Democratizing 3D Content Creation: Tilt Brush to Adobe’s Project Felix

For the 2D artist and designer, creating 3D concept art, 3D product photography, or 3D UIs has been challenging. Typically, this work is only in reach to those skilled with and trained in 3D tools.  This post will expose new possibilities for...

Announcing Ubuntu* and Wind River Pulsar* support with Intel® IoT Developer Kit 5.0

We are very excited to announce the release of Intel® IoT Developer Kit 5.0!  This release brings Ubuntu* support for the Intel® Joule™ development platform and Intel® IoT Gateway, providing developers with additional OS options for their IoT...

Did You Forget to Patch Your IP Camera?

IP cameras are usually a purchase, install, and don’t-touch type of device.  But in the current climate of cyber-attacks, they now require regular updates and patches.  Otherwise your security tool may be hacked, leak video, or join a...

This Ransomware Turns Victims Against Their Associates

Popcorn Time ransomware, a newcomer to the malware scene, has an incentive program for victims.  If they successfully infect others who pay, they will get their files unlocked for free.  Sacrificing others to save your own files.  This is a new...

Intel® Ultimate Coder Challenge for IoT: What is Team Vaidya* Up to Now?

Find out what progress Grand Prize Winner Team Vaidya* has made with their winning solution.

Intel® Ultimate Coder Challenge for IoT – What Is Team Geras up to Now?

Now that the eight-week Intel® Ultimate Coder Challenge for IoT is complete, teams continue developing and expanding their projects. Find out what they are up to today.

Cyberhack Steals $31 Million in Assets

Hackers stole 2 billion rubles, about $31 million in U.S. dollars, from the Russian Central Bank last week.  They fell short of their targeted goal of about 5 billion rubles ($78 million dollars), but still enough for a good haul.  Such big heists...

Intel® XDK Update for December 2016

Happy Holidays Intel® XDK customers and Happy New Year in advance!   In the spirit of the holiday season, we are bringing you some new IoT features.   We have added support for additional IoT platforms. In this release, Intel® XDK now supports...

Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality.  It is currently being used by a number of...

How to Reduce Your Data Center Footprint

Learn about innovative ways to address the rapidly increasing growth of Video streaming demands while reducing your data center footprint and costs.

December Top Ten

Top Ten Intel® Software Developer Stories | December

A little Shakespeare, more from CERN and some fun from SC16 in this month's Top Ten.

Why Intel® CoFluent™ Technology for Big Data

Intel CoFluent Studio is a product from Intel that lets you build models of pretty much any system to evaluate performance and behavior using an abstract model instead of concrete code.

The Fab Five: Game Dev Content | December

Arizona Sunshine*, a dog named Waffles, and the Escape Room*. Read all about it in this month's best of Game Dev Blog.

The Best of Modern Code | December

Read the best Modern Code articles and blogs for the month of December.

VTune Amplifier - Collection failed due to SCP failing to copy files from the host to the target

<p>VTune Amplifier uses SCP as a mechanism to copy files to and from the host and the target system, while performing a remote collection.&nbsp;</p> <p>Often, you may encounter an issue where VTune Amplifier will stop with the...

Top Intel® Software Innovators of 2016

The Intel® Software Innovator program has been very active for 2016 with growing support for developers in North America, Brazil, Europe, India, Asia Pacific, and China. The program supports innovative, independent developers who excel at creating...

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 3

This is the third post in a series of blogs about how to configure and deploy a bare metal controller using Ironic.

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 2

This is the second post in a series of blogs about how to configure and deploy a bare metal controller using Ironic

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 1

OpenStack is a virtualization environment supported by several operating systems. Over the years, Linux* distributions have become easier to install and configure, however, despite these improvements, installing an OS on a server is still time consuming. This series of blogs shows the steps to...

Intel GameDev at VRDC 2016

Last updated: December 6, 2016

As a Diamond Sponsor of the Virtual Reality Developer’s Conference, Intel showcased a number of new VR technologies live in San Francisco.  Featured VR Games included Arizona Sunshine and The Unspoken, see below for more. The Intel GameDev program...

Metal Minds

Intel hosted AI Day last month. Read about the latest in AI, Machine Learning and Deep Learning including new student and educational programs.

Smart Hospitals Need to be Secured

I want my hospital to be smart, but I demand it be secure and safe!  A new report from the European Union Agency for Network and Information Security (ENISA) outlines strong recommendations for hospitals to protect themselves from cyber risks as...

Intel® Software Innovators Summit Collaboration Challenge

The second annual Intel® Software Innovator Summit was held in Seattle, Washington in November 2016. 50 Innovators from North America, South America, and Europe attended the event and this year we included a team collaboration mini-hackathon...

Intel® Software Innovator Summit 2016

The second annual Intel® Software Innovator Summit was hosted at the Edgewater Hotel in Seattle, beautifully located right on the bay. 50 innovators from North America, South America, and Europe arrived throughout the day with free time to explore...

How to Plot OpenMP* Scaling Results

Short Version When plotting scaling graphs for Intel processors which support multiple hardware threads/core, NEVER use an X-axis labelled “Threads”, but always use “Cores”, and plot separate data for 1thread/core, 2threads/core and, on Intel® Xeon...

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet...

Presence, Reality, and the Art of Astonishment in Arizona Sunshine

What is presence, why does it matter to VR, and how did Intel and Vertigo Games improve it in Arizona Sunshine?

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Where Cybercriminals Will Go Knowing what cybercriminals are targeting today is easy.  Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop.  The tougher challenge is figuring out where...