لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 44 النتائج
  • العناصر في كل صفحة

Intel® Hardware-Based Technologies for Intelligent Systems

Discover hardware-based technologies that lower costs, increase security, and simplify the management of intelligent systems. (v.1, Aug. 2013)

Intel® Trusted Execution Technology Framework for Calpella

Software: Package includes Intel® Trusted Execution Technology reference code that can be ported into specific system BIOS implementations.

Intel® Trusted Execution Technology EFI Tool Kit

Software: Package EFI tool kit with applications to test, check, and demonstrate Intel® Trusted Execution Technology features. (v.1, Oct. 2015)

Intel® Cloud Builders Guide: M2Mi Software Defined Networking*

This Cloud Builders guide leverages Intel® Xeon® processors and M2Mi Software Defined Networking* to create a multi-hypervisor cloud environment.

مراجعة | تنزيل

Guide: Cloud Design, Deployment, and Enhanced Security

Guide: Utilizing Intel® Trusted Execution Technology, VMware vCenter*, and VMware vSphere* creates cloud server security.

مراجعة | تنزيل

Intel® Trusted Execution Technology

تعلّم كيف تقوم مجموعات حوسبية موثوق بها مزودة بتقنية مستندة إلى الأجهزة بتحسين أمان النظام الأساسي للخادم.

Create Trusted Compute Pools in the Cloud

White Paper: Learn how to build trusted compute pools using Ubuntu Server*, OpenStack*, and Intel® Xeon® processors, ensuring security in the cloud.

مراجعة | تنزيل

HP Servers* and Intel® TXT Activation Guide

How to activate Intel® TXT on Intel® Xeon® processor-based HP servers* for security against hypervisor and other pre-launch attacks.

مراجعة | تنزيل

Intel® Trusted Execution Technology Creates Cloud Security

Short version: Intel® Trusted Execution Technology improves cloud infrastructure with greater visibility and efficiency, and stronger security.

مراجعة | تنزيل

Chip Chat: Jim Greene on Data Center Security

Chip Chat’s Allyson Klein interviews Jim Greene, discussing the future of data center security, how to stay ahead of threats, and his new book.