Article

Intel® Virtualization Technology: Best Practices for Software Vendors

Overview
Authored by admin Last updated on 06/07/2017 - 10:39
Article

Improving the Performance of the Secure Hash Algorithm (SHA-1)

Improving the performance of the Secure Hash Algorithm (SHA-1) with Intel® Supplemental SSE3 instructions.

Introduction

Authored by Max Locktyukhin (Intel) Last updated on 06/07/2017 - 10:38
Article

Service Virtualization using a non-von Neumann Parallel, Distributed & Scalable Computing Model

Dr. Rao Mikkilineni, Member, IEEE

Authored by Last updated on 06/07/2017 - 10:44
Article

Fault, Configuration, Accounting, Performance and Security Management of Distributed Transactions

Fault, Configuration, Accounting, Performance and Security Management of Distributed Transactions

Dr. Rao Mikkilineni

Authored by Last updated on 06/07/2017 - 10:38
Article

Intel Inspector XE defect resulting in loss of SSA result state information

Use of more than one Inspector XE version to access SSA result files for a single project will cause SSA result state information to be permanently lost.
Authored by Kevin D (Intel) Last updated on 06/07/2017 - 11:57
Article

90 errors in open-source projects

There are actually 91 errors described in the article, but number 90 looks nicer in the title. The article is intended for C/C++ programmers, but developers working with other languages may also find it interesting.
Authored by Andrey Karpov Last updated on 06/07/2017 - 10:38
Article

How to Automate Static Security Analysis with Intel® C++ Compiler for Linux*

This article shows a BKM on how to automate the static security analysis check done by the Intel® C Compiler for Linux.
Authored by andres-more (Intel) Last updated on 06/07/2017 - 10:42
For more complete information about compiler optimizations, see our Optimization Notice.