サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
2024年ランキング
www.intel.com
Using Intel.com Search You can easily search the entire Intel.com site in several ways. Brand Name: Core i9 Document Number: 123456 Code Name: Emerald Rapids Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice* Quick Links You can also try the quick links below to see results for most popular searches. Product Information Support Drivers & Software
Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing firmware updates and an optional software sequence to mitigate this potential vulnerability. Vulnerability Details: CVEID: CVE-2022-40982 Description: Information exposure through microarchitectural state after transient execution in certain vector execution units for some In
The long life of Intel® Architecture has resulted in a rich software ecosystem with an enormous installed base that extends from PCs to the cloud to mobile and from embedded devices to supercomputers and beyond. Since its introduction over 20 years ago, the Intel® 64 architecture became the dominant operating mode. As an example of this evolution, Microsoft stopped shipping the 32-bit version of t
New PCs enabled by Intel® Core™ processors and Intel’s broad portfolio of intellectual property and platform technologies are ready to deliver the full potential of new Windows 11 experiences — allowing people to collaborate, create and connect in ways that are meaningful to them. What’s New: Renowned for deep co-engineering and collaboration to advance computing, Intel and Microsoft today deepen
Overview On May 14, 2019, Intel and other industry partners shared details and information about a new group of vulnerabilities collectively called Microarchitectural Data Sampling (MDS). First identified by Intel’s internal researchers and partners, and independently reported to Intel by external researchers, MDS is a subclass of previously disclosed speculative execution side channel vulnerabili
Summary: Security researchers have identified a speculative execution side-channel method called L1 Terminal Fault (L1TF). This method impacts select microprocessor products supporting Intel® Software Guard Extensions (Intel® SGX). Further investigation by Intel has identified two related applications of L1TF with the potential to impact additional microprocessors, operating systems, system manage
Summary: Security researchers identified two software analysis methods that, if used for malicious purposes, have the potential to improperly gather sensitive data from multiple types of computing devices with different vendors’ processors and operating systems. Intel is committed to product and customer security and to coordinated disclosure. We worked closely with other technology companies and
SINGULARITY P2 Containers for Science, Reproducibility and Mobility Presented By: Gregory M. Kurtzer HPC Systems Architect Lawrence Berkeley National Lab [email protected] http://singularity.lbl.gov/ CONTAINERS IN HPC: SINGULARITY CONTAINERS (YESTERDAY IN A NUTSHELL) CONTAINERS IN HPC: SINGULARITY SO… WHAT IS ALL THE COMMOTION ABOUT? ▸ Reproducibility and archival software and environment stacks ▸
This article describes issues related to security vulnerabilities found in the Intel® Management Engine Firmware. This article doesn't contain information related to the processor side-channel vulnerability (known as Meltdown/Spectre). If you're looking for information on the Meltdown/Spectre issue, go to Side-Channel Analysis Facts and Intel® Products. In response to issues identified by external
TensorFlow* is a widely-used machine learning framework in the deep learning arena, demanding efficient utilization of computational resources. In order to take full advantage of Intel® architecture and to extract maximum performance, the TensorFlow framework has been optimized using oneAPI Deep Neural Network Library (oneDNN) primitives, a popular performance library for deep learning application
These repositories are no longer being updated as of 2020, and all newer releases can be found on the Intel® oneAPI Toolkits Installation Guide for Linux* OS. This page provides general installation and support notes about the Community forum supported Intel® Performance Libraries and Intel® Distribution for Python* as they are distributed via the APT repositories described below. These software d
Executive Summary Intel uses a tick-tock model associated with its generation of processors. The new generation, the Intel® Xeon® processor Scalable family (formerly code-named Skylake-SP), is a “tock” based on 14nm process technology. Major architecture changes take place on a “tock,” while minor architecture changes and a die shrink occur on a “tick.” Figure 1. Tick-Tock model. Intel Xeon proces
Discontinuation Notice Intel is discontinuing this product. Technical support will continue until June 30, 2023. Warranty support will continue until June 30, 2024. Developers still working with the Intel NCS2 are advised to transition to the Intel® Edge AI box for video analytics, which offers hardware options to support your needs. Note Not all options listed include the Intel® Movidius™ Myriad™
SOLUTION BRIEF Intel® QuickAssist Technology Accelerating OpenSSL* Using Intel® QuickAssist Technology Modifications to open source implementation yield dramatic performance improvement. Wider Use of Encryption Historically, the demand for secure data transmissions over the Internet was driven primarily by institutions conducting e-commerce and banking transactions. Today, the volume of secured co
次のページ
このページを最初にブックマークしてみませんか?
『Laptop, Notebook, Desktop, Server and Embedded Processor Technology - Intel』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く