Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 79 Results
  • Items Per Page

Intel® Trusted Execution Technology Graphic

Graphic shows how Intel® Trusted Execution Technology verifies system BIOS and firmware, matches hypervisor measure, and then launches OS and apps.

First the Tick, Now the Tock: Intel® Microarchitecture (Nehalem)

White Paper discusses Intel® Microarchitecture (Nehalem), the basis for the Intel® Xeon® processor 3500 and 5500 series.

Preview | Download

Intel Visual Technology

Intel Visual Technology integrates a suite of technologies in 2nd generation Intel® Core™ processors that delivers stunning visual experiences.

Jasper Forest From Intel Animation

Video introduces Jasper Forest: the newest addition to the Intel® Xeon® processor family.

Intel® 64 Architecture

Intel® 64 architecture expands addressable memory to over 4 GB by enabling 64-bit computing in embedded designs, improving performance.

Data Center Power Management with Intel® Node Manager

Optimize data center power management with Intel® Node Manager, and manage power and cooling resources.

OpenStack* Open Source Software for Cloud Computing

Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.

Trust the Cloud: Intel® TXT, Intel® Trusted Execution Technology

Terremark (Verizon), Hytrust, RSA, and Cisco talk about hypervisor attacks and how Intel® Trusted Execution Technology helps increase cloud security.

Cloud Security Vendor Spotlight: McAfee

Deepak Thakkar discusses how McAfee and Intel are working together to deliver cloud security solutions.

Preview | Download

Security Preparation: BIOS Based Root Kit Attack

McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.