博客

Why P scales as C*V^2*f is so obvious (pt 2)

THE GORY DETAILS

Let’s continue from where we left off last time. Let’s figure out the why of the equation,

P = C * V^2 * (a * f)

作者: 最后更新时间: 2019/05/09 - 22:55
博客

针对婴幼儿和父母的物联网

I am back from a generous 8-months parental leave, courtesy of Intel and the government of Germany. During this time, I was much less active in trying out technology than I thought I would. As most first time parents, I overestimated my future availability for much else. I did some testing, but besides time I would like to have had budget to do more. There are plenty of technology available for...
作者: Sulamita G. (Intel) 最后更新时间: 2019/06/17 - 11:43
Article

如何在虚拟机中运行 Yocto Linux 操作系统

有时我们需要一个完整的开发环境来编译、部署和测试解决方案,有时无法直接在硬件上操作,或者简单来说,提供的 SDK 不足以实行我们的开发计划。 这可能是,比如,英特尔 Edison 或 Galileo 所面临的情况:如何在 Yocto Linux 操作系统上编译整个框架、运行时,以及它们之间的依赖关系?

作者: 最后更新时间: 2019/03/10 - 23:28
博客

Supporting a New SoM Baseboard with MRAA's JSON Platform API

Intel has been developing SoM (SoC on module or System on module) for a while and with the Intel® Joule™ module and Intel® Edison module you can easily create your own daughterboard/baseboard easil

作者: 最后更新时间: 2019/06/23 - 22:00
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
作者: Engblom, Jakob (Intel) 最后更新时间: 2019/08/02 - 15:51