Blog post
Blog post

The Right Mindset for Testing (Testing Theory Part 1)

Authored by Engblom, Jakob (Intel) Last updated on 07/13/2018 - 14:32
Blog post
Blog post
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Fuzzing is a common technique used by hackers to find vulnerabilities, where random inputs are sent to expose mistakes in code.

Authored by Engblom, Jakob (Intel) Last updated on 06/07/2019 - 16:12
Blog post

Develop and Test SAP HANA*-based Applications on an Intel® NUC Mini-PC

Authored by Last updated on 07/04/2019 - 18:45
Blog post

The Right Toolset for Testing (Testing Theory Part 2)

Authored by Engblom, Jakob (Intel) Last updated on 07/04/2019 - 18:48
Blog post
Blog post