Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 97 Results
  • Items Per Page

Scaling Internet of Things Data Movement with Amazon Kinesis Paper

White Paper: Collect, cache, and distribute high volume data coming from Intel® IoT Gateways with Amazon Kinesis. (v.2, Nov. 2014)

Preview | Download

Common Functionality in the 2.6 Linux* Network Stack

White Paper: Outlines the network stack and commonly used mechanisms of the 2.6 Linux* kernel, focusing on Internet Protocol and functionality.

Preview | Download

Improve IPSec Performance Using Intel® AES Instructions

White Paper: Demos IPSec performance capabilities in Linux* using Intel® AES New Instructions and Galois Counter Mode* algorithm combination.

Preview | Download

LTE Control Plane on Intel® Architecture

White Paper: LTE control plane overview and processor selection instructions for optimizing system power and performance. (v.1, Jan. 2013)

Preview | Download

Workload Consolidation in Communications Infrastructure

Intel® Virtualization Technology enables workload consolidation on a single architecture, simplifying network complexity and management.

Intel® Processors for Communications Infrastructure: Update

Spec Update: Errata and spec changes and clarifications for four Intel® processor series for communications infrastructure. (v.1, May 2012)

Preview | Download

Intel® Gateway Solutions for the Internet of Things: Video

Video: Describes the benefits of Intel® Gateway Solutions, including fast time to market, security, manageability, and scalability. (Oct. 2014)

Transportation Applications for Intel® Quark™ SoC X1000: Video

Video: Discusses the Intel® Quark™ SoC X1000 in today’s transportation applications. (Oct. 2014)

Retail Applications for Intel® Quark™ SoC X1000: Training Video

Video: Discusses the Intel® Quark™ SoC X1000 in today’s retail applications. (Oct. 2014)

Smart Building Applications for Intel® Quark™ SoC X1000: Video

Video: Smart buildings use Intel® IoT Gateways and the Intel® Quark™ SoC to solve key challenges of security and legacy infrastructure. (Oct. 2014)