Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Authored by Last updated on 06/23/2019 - 18:50
Article

Live Webinar: Boost Python* Performance with Intel® Math Kernel Library

Python* is a popular open-source scripting language known for its easy-to-learn syntax and active developer community.
Authored by Mike P. (Intel) Last updated on 06/07/2017 - 10:28
Article

Set Up Intel® Software Optimization for Theano* and Supporting Tools

Get recipes for installing development tools and libraries on various platforms for the Python library.
Authored by Sunny G. (Intel) Last updated on 05/08/2018 - 10:50
Offsite Link

A Practical Library Operating System for Unmodified Applications

This paper disproves assumptions that unmodified applications can cause poor performance and a larger trusted computing base while running on Intel® Software Guard Extensions.
Authored by admin Last updated on 03/27/2019 - 16:09
Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Authored by admin Last updated on 03/28/2019 - 11:24
Offsite Link

Panoply: Low-Trusted Computing Base (TCB) Linux* Applications with Intel® SGX Enclaves (PDF)

In this paper, we present a new system called Panoply which bridges the gap between the Intel® Software Guard Extensions (Intel® SGX)-native abstractions and the standard OS abstractions which feat

Authored by admin Last updated on 04/02/2019 - 11:35
Offsite Link

How to Secure System Logs

System logs are the greatest forensics assets that capture how an operating system or a program behaves.

Authored by admin Last updated on 02/01/2019 - 10:48
Offsite Link

Create a Nondisclosure Cryptographic Library

Enforcing integrity and confidentiality of users’ application code and data is a challenging mission that any software developer working on an online production grade service is facing.

Authored by admin Last updated on 02/01/2019 - 09:25
Offsite Link

Enhance the Security and Privacy of Tor's Ecosystem Using Trusted Execution Environments

A practical approach to effectively enhancing the security and privacy of Tor by utilizing Intel® SGX, a commodity trusted execution environment
Authored by admin Last updated on 02/01/2019 - 10:46