Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Open at Intel Podcast

Stories from the open ecosystem.

Intro
Projects
Guides & Tutorials
News & Events
Podcast
Participate
Team

The Open at Intel podcast covers open source innovation as we build the future together. Join us for critical conversations about security, artificial intelligence, cloud computing, Linux*, and more, bringing together some of the best minds from Intel and the open source community. Hosted by Katherine Druckman.

 

Subscribe wherever you listen to podcasts.

Apple Podcasts* | Spotify* | Google Podcasts* | Amazon Music* | iHeart* | RSS

Featured Episodes

Open Source Isn’t Broken

Security starts with people.

How Confidential Computing Builds a Secure Future

Like passports or background checks for your data.

Kubernetes*, DevOps and Constant Reinvention

How to build on what came before.

Show more Show less

Meet your Host

Katherine Druckman, an Intel Open Source Evangelist, is a host of podcasts Open at Intel, Reality 2.0 and FLOSS Weekly.

A security and privacy advocate, software engineer, and former digital director of Linux Journal, she's a long-time champion of open source and open standards.

 

 

 

  • Season 2
  • Season 1

Season 2

Episode 8: Developer Experience Is Everything

Happy developers, happy life.

Episode 7: Lessons From GitHub*

Open source wisdom from the hub of open source software.

Episode 6: The Best Ethernet on Mars

Open source and Ethernet will take you places.

Episode 5: Kubernetes*, DevOps and Constant Reinvention

How to build on what came before.

Episode 4: From Microservices to Cloud Native: Getting Security Right

From monoliths to containers.

Episode 3: Security and the Open Source Program Office: Team Players

Everyone has a role to play in security.

Episode 2: Open Source Isn’t Broken

Security starts with people.

Episode 1: Open Source: The Nerd Version of Formula One

Winning with cloud native on the desktop.

The Latest

Featured Guest

“Trying to figure out what components you're using, trying to figure out what vulnerabilities they actually have, trying to figure out which ones have been mitigated and which ones haven't... is more challenging than you think!”

Read More

 

Dr. Terri Oda

Security Researcher, Intel.

Season 1

Episode 11: Creating Trust with Attestation: From Silicon to Serverless

Providing evidence of integrity.

Episode 10: OpenSSF Scorecard: A Tool to Evaluate Project Security

Over 1 million projects scanned, weekly.

Episode 9: Strategies for Consuming Open Source Software Securely

Careful evaluation is the key to success.

Episode 8: Scanning for Vulnerabilities with CVE Binary Tool

You can’t secure what you can’t see.

Episode 7: Securing Applications with Gramine

Ease the path to running your unmodified applications in a trusted execution environment.

Episode 6: How Confidential Computing Builds a Secure Future

Like passports or background checks for your data.

Episode 5: Security at Every Step: Why Software Supply Chains Are Critical

“The speed of development has really exacerbated trust problems and security problems,” Marcela Melara.

Episode 4: Dan Williams: Kernels of Wisdom

Here he talks about the “janitorial” aspect of maintainers, what he’s seen in 17 years of commits, his take on the discontinuation of the Intel Optane* as well as his new role as chair on the Technical Advisory Board at the Linux Foundation*.

Episode 3: Why You Need a Software Bill of Materials

This humble but important document is gaining importance.

Episode 2: Christopher "CRob" Robinson Shares an Optimistic Take on Open Source Security

CRob shares his insights with Open Ecosystem Evangelist Katherine Druckman on the current threat landscape and finding joy in security work.

Episode 1: The Basics of Threat Modeling with John Squared

Security experts John Andersen and John Whiteman share advice on creating and maintaining good threat models as part of the software development lifecycle.

Meet a New Voice for Open Source: Open at Intel Podcast

Open at Intel is a brand-new podcast exploring the most intriguing conversations in the open source world brought to you by Intel’s Open Ecosystem group.

The Latest

Featured Guest

“Trying to figure out what components you're using, trying to figure out what vulnerabilities they actually have, trying to figure out which ones have been mitigated and which ones haven't... is more challenging than you think!”

Read More

 

Dr. Terri Oda

Security Researcher, Intel.

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo