AES New Instructions
- Intel® AES New Instructions (Intel® AES-NI)
Overview of Intel® AES-NI, a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data.
- Securing the Enterprise with Intel® AES-NI
Learn why cryptography is hot in the marketplace today, especially in the enterprise.
- Intel® Advanced Encryption Standard Instructions (AES-NI)
Description of the six new instructions that make up the AES-NI instruction set and perform several compute intensive parts of the AES algorithm.
Digital Random Number Generator
- Bull Mountain is Intel's code name for its new Intel® 64 Architecture instruction RdRand and its underlying Digital Random Number Generator (DRNG) hardware implementation. Bull Mountain provides a processor-based RNG solution that is of high quality and performance, highly available, and secure.
Intel Instruction Set Architecture Extensions
- Intel® Memory Protection Extensions (Intel® MPX) is a name for Intel Architecture extensions designed to increase robustness of software
- Software Guard Extensions (SGX) is a name for Intel Architecture extensions designed to increase the security of software through an “inverse sandbox” mechanism
- Intel® Secure Hash Algorithm Extensions (Intel® SHA) are a family of seven Intel® Streaming SIMD Extensions (Intel® SSE)-based instructions that are used together to accelerate the performance of SHA-1 and SHA-256 on Intel architecture-based processors
In this show Bob and Rhonda discuss the day two keynote from Renee James who runs the Software and Services Group. They discuss HTML5, transparent computing, cloud services and new software security features from McAfee.
What are Ultrabooks™ and how do they affect software? From sensors and touch to security – there are many exciting opportunities
Intel® Virtualization Technology (Intel® VT)
- Virtualization HW technical brief
Intel Virtualization Technology (Intel VT) provides comprehensive hardware assists that boost virtualization software performance, improve application response times and provide greater reliability, security and flexibility.
- Virtualization: A Developer's Friend
The more developers use virtualization, the more they find new uses for it. Discover what you’re missing and how virtualization can help you get more done.
- Intel® Virtualization Technology: Flash* Animation
This animation provides an overview of Intel® Virtualization Technology, which is a technique by which hardware resources can be abstracted, divided, and shared between multiple operating system environments running simultaneously.
- Intel® Virtualization Technology: Best Practices for Software Vendors
This series of articles functions as an aid to help software vendors tailor their applications for use with Intel VT.
Ylian has written a blog about Intel AMT Setup and Configuration using TLS-PSK and TLS-PKI. Ylian stumbled across an interesting issue while updating the provisioning functionality of the OpenDTK tool. What Ylian found was that for developers who are building their own Intel AMT Activation software, they will be required to use a non-standard TLS stack (the .NET TLS stack does not work.) Watch RTFB 7 and learn more about what Intel AMT developers must know about writing software to enable Intel AMT systems with TLS.
Ylian Saint-Hilaire walks the audience through an introduction of Meshcentral.com. Learn how to install the agent, how to add a “Mesh” and then how to remotely control your remote devices.
In episode of RTFB (Reaching Technology From Blogs), Gael Hofemeier interviews Ylian Saint-Hilaire about two of his Meshcentral blogs:
Intel® Virtualization Technology Pt. 1 of 3 - Virtualization Introduction [id:1127428458001]
Intel® Virtualization Technology Pt. 3 of 3 - Emerging Usage Models
Intel® Virtualization Technology Pt. 2 of 3 - Virtualization Usage Models