لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 60 النتائج
  • العناصر في كل صفحة

Chip Chat: Jim Greene on Data Center Security

Chip Chat’s Allyson Klein interviews Jim Greene, discussing the future of data center security, how to stay ahead of threats, and his new book.

Intel Trusted Execution Technology

Hardware diagram of Intel Trusted Execution Technology (TXT).

مجموعات أجهزة الكمبيوتر الموثوق بها المزودة بتقنية التنفيذ الموثق بها Intel® Trusted Execution Technology

تعلّم كيف تقوم مجموعات أجهزة الكمبيوتر الموثوق بها المزودة بتقنية مستندة إلى الأجهزة بتحسين أمان النظام الأساسي للخادم.

Hardware-Based Security Protects Embedded Systems: Tech Brief

Technology Brief: Hardware-based security hierarchies create system privilege levels, preventing malware and intrusion attacks. (v.001, July 2009)

مراجعة | تنزيل

Intel Trusted Execution Technology Evolves Integrity

White Paper: Intel® Trusted Execution Technology conducts periodic hypervisor integrity checks across a server cluster with positive results.

مراجعة | تنزيل

Trusted Compute Pools in Linux* OpenStack* Platform Guide

Download this configuration guide for step-by-step procedures on installing trusted compute pools on Red Hat Enterprise Linux* OpenStack* Platform 3.

Building the Transparent Cloud

Case Study: Expedient Communications expands services with cloud infrastructure solutions using the Intel® Xeon® processor X5650.

مراجعة | تنزيل

Guide: Cloud Design, Deployment, and Enhanced Security

Guide: Utilizing Intel® Trusted Execution Technology, VMware vCenter*, and VMware vSphere* creates cloud server security.

مراجعة | تنزيل

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.

What is Intel® TXT, Intel® Trusted Execution Technology?

James Greene,shares the benefits of a hardware root of trust with Intel® Trusted Execution Technology, Intel® TXT.