Фильтры

Блоги

How to Enable an Intel® Trusted Execution Technology Capable Server

Intel® Trusted Execution Technology (Intel® TXT) is a collection of hardware-based security technologies built into Intel’s silicon.  They address the security threats across physical and virtual i

Автор: Thai Le (Intel) Последнее обновление: 26.03.2019 - 12:20
Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Автор: Последнее обновление: 23.06.2019 - 18:50
Article

Intel® Trusted Execution Technology (Intel® TXT) Enabling Guide

Download as PDF

Автор: David Mulnix (Intel) Последнее обновление: 16.07.2019 - 08:18
Article

MeshCentral - Introduction & Overview

 
Автор: Ylian S. (Blackbelt) Последнее обновление: 30.05.2019 - 16:46
Article

McAfee* Application Control 6.1.0: Command Line Interface Guide

The McAfee* Application Control 6.1.0 Guide is a reference for the commands available for the command line interface (CLI) and includes supported arguments and their descriptions, for use in standa

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

McAfee* Application Control 6.1.0: Product Guide

The McAfee* Application Control 6.1.0 Product Guide covers workflow concepts, control modes, and dynamic whitelisting, using the CLI interpreter and deployment of Application Control to protect sys

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

McAfee* Change Control 6.1.0: Product Guide

The McAfee* Change Control Product Guide is a comprehensive reference that covers initial set-up, configuration, and ongoing maintenance of change control and includes remote administration and tro

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

McAfee* Embedded Control 6.5.0: User Guide

The McAfee* Embedded Control user guide provides information about using Embedded Control 6.5.0 with Wind River* Linux* 5.0.1 to provide system integrity and change control and block unauthorized a

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

MeshCentral on Intel® IoT Gateways Simplifies IoT Management: Brief

The solution brief introduces the MeshCentral open source device management solution that is interoperable with Intel® IoT Gateways, and how to use these i

Автор: Последнее обновление: 29.03.2019 - 13:31
Article

The Dark Side of the Internet of Things

Most of us are keenly aware of the potential and promise of the Internet of Things (IoT). It’s easy to visualize a bright future arising from the many advantages of linking cars, shipping containers, office buildings, factories, refrigerators, cooking devices, health monitors, thermostats, and other things to a vast repository in the cloud where intelligence extracted from Big Data can inform our...
Автор: Lee Purcell Последнее обновление: 10.07.2018 - 08:00