Blog post

What is Intel® Secure Key Technology?

Introduction:

Authored by Gael H. (Blackbelt) Last updated on 05/30/2018 - 07:40
Blog post

Apps for Kids and Privacy: A Growing Problem

Apps and privacy practices are not two things that you hear linked together very often, and with good reason: there doesn’t exist a good framework in the app development ecosystem for integrating t

Authored by Wendy B. (Intel) Last updated on 01/29/2019 - 13:40
Blog post

How COPPA Affects App Developers

The app ecosystem is growing at a fantastic rate, and with that growth has come an increase in

Authored by Wendy B. (Intel) Last updated on 01/29/2019 - 13:40
Blog post

User Privacy: Seven Ways App Developers Can Protect It

With the unprecedented growth of the app ecosystem, user privacy is becoming more and more of a hot button issue, especially when that privacy is violated.

Authored by Wendy B. (Intel) Last updated on 01/29/2019 - 13:40
Blog post

Legalizing App Privacy: What Developers Should Know

App privacy is becoming more of a public issue, which means it’s also starting to become an issue for our elected officials. This past week, U.S.

Authored by Wendy B. (Intel) Last updated on 01/29/2019 - 13:40
Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Authored by Last updated on 06/23/2019 - 18:50
Blog post

The Last Line Effect

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:00
Blog post

Overview of Intel® Software Guard Extension Enclaves

Enclaves are isolated memory regions of code and data that are highly secure. Application code can be put into an enclave via special instructions and software via the Intel® SGX SDK. SGX Enclaves are hardened by CPU-based security mechanisms and can be remotely provisioned and attested.
Authored by Last updated on 10/08/2019 - 18:20
Article

Technology Brief: Intel® Identity Protection Technology (Intel® IPT)

Safeguard Sensitive Information with Intel® Identity Protection Technology ( Intel® IPT )
Authored by Jeff Kataoka (Intel) Last updated on 10/28/2019 - 16:20
Article

The future of authentication and transactions over the web (Part 1)

Banks and the payment industry have realized long ago that knowledge is not enough to confirm money transactions through the web.

Authored by Last updated on 10/28/2019 - 16:20