encryption tagged posts:

Cyber Threats Are Becoming More Sophisticated, So Should You

January 18th, 2022 |
Cyber Threats Are Becoming More Sophisticated, So Should You

Cybercrime has become a sophisticated enterprise. Hacking tools built on the latest technologies such as AI or hybrid cloud are available on the black market, where stolen data is also bought and sold. And digital tools used in cinema have [See the full post…]

Download Audio FileListen/download audio 23:53  

Categories: Artificial Intelligence, Audio Podcast, Security, Technology, This Moment Matters Tags: , , , , , , , , , , , , , , , ,

Increasing Product Quality and Yield Using Machine Learning

Increasing Product Quality and Yield Using Machine Learning

IT Best Practices: Sensor data and analytics, powered by a robust Industrial Internet of Things (IIoT) solution can help manufacturers gain actionable insights into the behavior and performance of their tools in real time. With earlier and more accurate information, [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , ,

Security Innovation Within OpenStack – Intel Chip Chat – Episode 438

February 16th, 2016 |
Security Innovation Within OpenStack – Intel Chip Chat – Episode 438

In this Intel Chip Chat audio podcast with Allyson Klein: In this livecast from OpenStack Summit Tokyo Ravi Varanasi, General Manager of Cloud Security Solutions at Intel discusses the importance of security to enable enterprise grade OpenStack. He emphasizes that [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , ,

Improving Performance and Security of Big Data and Cloud Solutions

Improving Performance and Security of Big Data and Cloud Solutions

Intelligent Networking: Intel QuickAssist Technology (Intel QAT) offers encryption/decryption and compression/decompression acceleration to developers, enterprises and cloud service providers with APIs, add-in cards or chipset for increased performance and security.

Download PDFRead/Download PDF  

Categories: Intel, Intel: Intelligent Networking, Intel: Software Defined Infrastructure Tags: , , , , , , , , , , , ,

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices: Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated manageability, [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Inside IT: McAfee Drive Encryption at Intel

November 12th, 2013 |
Inside IT: McAfee Drive Encryption at Intel

IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In the [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , ,

DuPont Increases Security with Intel-Based Encryption

February 18th, 2013 |
DuPont Increases Security with Intel-Based Encryption

Business Solutions for IT Managers: IT engineers from DuPont and Intel see performance improvements of up to 300 percent in encryption and decryption.

Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: , , , , , , , , , , , ,

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution improves [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

October 14th, 2011 |
Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

In this episode of The Tomorrow Project: Science Fiction author, Cory Doctorow and Intel Futurist, Brian David Johnson discuss Cory’s “Knights of the Rainbow Table” story included in the new “Tomorrow Project Anthology” book.

Download Video FileWatch/download video  

Categories: HD Video, Intel, The Tomorrow Project Tags: , , , , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to mitigate [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual effort [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson Intel Director of Xeon Platform Marketing, Intel Rock Star, and frequent Intel Chip Chat guest discusses security, embedded encryption, trust and cloud computing trends. See also: The Server [See the full post…]

Download Audio FileListen/download audio  

Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , ,

Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

November 9th, 2010 |
Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time. See also: IT Center Open Port

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Live from IDF: Gelsinger Puts Nehalem and Virtualization on Display

September 18th, 2007 |
Live from IDF: Gelsinger Puts Nehalem and Virtualization on Display

In his keynote today at the Intel Developer Forum in San Francisco, Patrick Gelsinger, senior vice president and general manager of Intel’s Digital Enterprise Group, gave a broad update on Intel’s efforts this year. In this podcast, Gelsinger covers what [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel Developer Forum, Intel IT, Intel Nehalem, IT@Intel Tags: , , , , , , , , , , , , , , ,

SNWSpotlight PM – Tuesday, April 17th, 2007

April 17th, 2007 |
SNWSpotlight PM – Tuesday, April 17th, 2007

SNW Spotlight is your source for the latest information from Storage Networking World, in San Diego. In this edition of SNW Spotlight, storage in China, and security on your hard drive. Four Chinese journalists opine about what needs to happen [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, SNWSpotlight Tags: , , , , , , , , ,