Article

Manage Deep Learning Networks with Caffe* Optimized for Intel® Architecture

How to optimize Caffe* for Intel® Architecture, train deep network models, and deploy networks.
Authored by Andres Rodriguez (Intel) Last updated on 03/11/2019 - 13:17
Blog post

Track Reconstruction with Deep Learning at the CERN CMS Experiment

This blog post is part of a series that describes my summer school project at CERN openlab.

Authored by Last updated on 03/21/2019 - 12:00
Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Authored by admin Last updated on 03/28/2019 - 11:24
Offsite Link

Protect Password Databases Using Trusted Hardware

A human-chosen password is relatively easy to guess and is frequently reused. Increase security by generating a random salt value for each user, and then concatenate it with the password before hashing.
Authored by admin Last updated on 03/28/2019 - 10:10
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Fuzzing is a common technique used by hackers to find vulnerabilities, where random inputs are sent to expose mistakes in code.

Authored by Engblom, Jakob (Intel) Last updated on 06/07/2019 - 16:12