3280 Resultados da pesquisa

The Best of Modern Code | December

Read the best Modern Code articles and blogs for the month of December.

VTune Amplifier - Collection failed due to SCP failing to copy files from the host to the target

VTune Amplifier uses SCP as a mechanism to copy files to and from the host and the target system, while performing a remote collection.  Often, you may encounter an issue where VTune Amplifier will stop with the "Collection failed" error with a sub...

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 3

This is the third post in a series of blogs about how to configure and deploy a bare metal controller using Ironic.

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 2

This is the second post in a series of blogs about how to configure and deploy a bare metal controller using Ironic

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 1

OpenStack is a virtualization environment supported by several operating systems. Over the years, Linux* distributions have become easier to install and configure, however, despite these improvements, installing an OS on a server is still time consuming. This series of blogs shows the steps to...

Intel GameDev at VRDC 2016

Publicado em 6 de dezembro de 2016

As a Diamond Sponsor of the Virtual Reality Developer’s Conference, Intel showcased a number of new VR technologies live in San Francisco.  Featured VR Games included Arizona Sunshine and The Unspoken, see below for more. The Intel GameDev program...

Metal Minds

Intel hosted AI Day last month. Read about the latest in AI, Machine Learning and Deep Learning including new student and educational programs.

Smart Hospitals Need to be Secured

I want my hospital to be smart, but I demand it be secure and safe!  A new report from the European Union Agency for Network and Information Security (ENISA) outlines strong recommendations for hospitals to protect themselves from cyber risks as...

How to Plot OpenMP* Scaling Results

Short Version When plotting scaling graphs for Intel processors which support multiple hardware threads/core, NEVER use an X-axis labelled “Threads”, but always use “Cores”, and plot separate data for 1thread/core, 2threads/core and, on Intel® Xeon...

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet...

Presence, Reality, and the Art of Astonishment in Arizona Sunshine

What is presence, why does it matter to VR, and how did Intel and Vertigo Games improve it in Arizona Sunshine?

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Where Cybercriminals Will Go Knowing what cybercriminals are targeting today is easy.  Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop.  The tougher challenge is figuring out where...

Interview with Well Told Entertainment about their Virtual Reality Escape Room Game

You light a few candles, turn off the lights, and say Bloody Mary’s name 3 times in to the mirror… can you get past your terror and solve a series of puzzles to escape the room before Mary can get through? Just in time for Halloween, Well Told...

Farewell SHA-1 Hash Algorithm

Rest-in-Peace SHA-1.  Like all security controls, they are only valuable for a certain period of time. SHA-1, a legacy hashing algorithm once used heavily in secure web browsing, has outlived its usefulness, therefore it is time to be...

What is the Intel® Software Innovator Program? A Quick Look

Intel® Software Innovator Program Did you know that Intel® offers a program specifically designed to support independent developers in using the latest technology and open source software to bring their ideas to life? Intel created this program in...

SVG Images are a New Ransomware Threat

Creative cyber criminals are taking advantage of Facebook's compatibility with SVG images to infect victims with ransomware. SVG (Scalable Vector Graphics) files are dangerous on social media sites, in email, and even instant messaging tools, as...

How Simics found a Xen Bug – Why Target Variation Matters

A few months ago, Intel® simulation engineers working on Wind River* Simics* reported a bug in the Xen* hypervisor to the public email list. The bug was that Xen did not do the right thing when enabling Intel® Memory Protection Extensions (Intel®...

Code Modernization: Powering Scientific Discovery and Fostering Innovation Globally at CERN (Part 2)

An Interview with Maria Girone, CTO, CERN openlab  Intel recently talked to CERN openlab CTO Maria Girone to discuss how CERN and Intel work together to deliver improvements in processing speed, sometimes by factors, and how that impacts CERN’s...

"Upstreaming" Artificial Intelligence: Making AI Available for All

Artificial intelligence (AI) - machines that can learn from their results to improve their programming for better results. This is how humans operate. We try something, we judge the result and modify our behavior. What some considered to be science...

Intel Invites Everyone to Game

Publicado em 16 de novembro de 2016

IndieCade kicked off this year’s festival for the first time on USC School of Cinematic Arts and Intel jumped at the chance to join in with the Gaming for Everyone Pavilion.

Maximizing performance in the cloud

Getting an instant boost on common web apps hosted in the cloud

Modern Code November

The Best of Modern Code | November

Learn about best practices for vector programming, scaling your application, and how Intel and CERN are moving Modern Code ahead.

Where hackers take their money – Casinos, Cryptocurrency, and Virtual Worlds

Cybercrime is reaching epidemic levels. Some estimates predict global annual cybercrime costs will reach $6 trillion by 2021.  This includes the costs of security as well as the losses from thefts and fraud from successful attacks.  Criminals are...

MeshCommander v0.3.8 released

A few days back I released MeshCommander v0.3.8 with quite a bit of improvements to how MeshCommander deals with Intel® AMT TLS. Anyone that works with Intel® AMT knows that certificates are a big part of the process. Often times, administrators...

IoT Worms Could Spread Like Zombies

Security researchers recently created a proof-of-concept attack against Internet connected lightbulbs, causing breached devices to reach out and infect their neighbors.  Propagation continues and spreads itself across the community.  This hack...

Scalable software controller, the next evolution in Intel Rack Scale Design

Publicado em 25 de outubro de 2016, atualizado 12 de novembro de 2016Por Mrittika G. (Intel)

In our last discussion, I outlined the need for flexibility and scale in the datacenter and how it necessitates the need for flexible hardware architectures like Intel® Rack Scale Design (RSD). RSD architecture provides pooling of physical resources...

CyberSeek is the Cybersecurity Career Site Needed by Job Seekers

U.S Department of Commerce National Institute of Standards and Technology(NIST) has created a free interactive online website, CyberSeek, to help cybersecurity job seekers understand opportunities, find openings, and develop a plan for career...

Code Modernization: Powering Scientific Discovery and Fostering Innovation Globally at CERN (Part 1)

An Interview with Maria Girone, CTO, CERN openlab  Intel recently talked to CERN openlab CTO Maria Girone to discuss how CERN and Intel work together to deliver improvements in processing speed, sometimes by factors, and how that impacts CERN’s...

Intel Software Guard Extensions Tutorial Series update: a new SDK version and a brief intermission

An update to the Windows version of the Intel Software Guard Extensions SDK was just posted to the Developer Zone. This new release, version 1.7, adds Visual Studio Professional 2015 Update 3 to the list of supported Microsoft IDE's and the Intel...

See Why Vertigo Software* Recommends Intel® Core™ i7 Processors for their VR game Arizona Sunshine

Learn what advanced features the developers of upcoming VR title Arizona Sunshine were able to add to the game if you have an Intel® Core™ i7 Processor (hint: it involves dismembering zombies).

Páginas