Two weeks ago, I traveled to Taiwan to launch Intel’s most powerful desktop processor yet—the Intel® Core™ i7 processor Extreme Edition at Computex. And if you’ve read any of the performance reviews, there’s agreement that this is a monster processor. … Read more >
Recent Blog Posts
As our connected retail ecosystem grows ever larger, I’m particularly excited that we are working more closely with Impinj. Together, we are developing a solution comprised of both Intel and Impinj components to create an offering that meets the needs … Read more >
The post Intel IoT and Impinj Usher in a New Era for Inventory Visibility appeared first on IoT@Intel.
A little over a year ago, in May 2015, Intel announced a partnership with the Oakland Unified School District (OUSD) to raise student awareness of the opportunities available in computer science and engineering—and to lay the groundwork for further studies … Read more >
The post Intel Looks Back on a Year of Partnership and Progress with OUSD appeared first on CSR@Intel.
Intel, in partnership with Microsoft, has published a technology preview, showing how innovation in silicon architecture can help protect against advanced code-reuse attack techniques. This is an example of how brilliant minds across the industry can think long-term, to make … Read more
The Internet of Things (IoT) is rapidly expanding across industries and among those, building automation technology has undergone an unprecedented transformation, inspiring new, robust solutions for building management. Intel IoT, with its ecosystem partners, is making an impact in this … Read more >
The post Intel IoT Solutions Transforming Smart Buildings from the Ground Up appeared first on IoT@Intel.
Interview with Cameron Freberg, Utility Strategist, Emerging Tech Team at Austin Energy How can a utility company steward meaningful change in its service territory, while also providing a beachhead for the whole world to replicate and scale the value captured … Read more >
The post Capturing Value from Emerging Tech Is Aiding a Culture Change in Utilities appeared first on Grid Insights by Intel.
There is an emerging recognition in the regulatory analysis of cybersecurity that metrics or benchmarks representing best practices are crucial for creating flexible, enforceable, and effective regulations. Several recent initiatives, such as the US Cyber Security Framework (or CSF) moved … Read more >
At its root, connected retail is about one thing: Creating amazing and frictionless customer experiences. That’s where Intel technology-based unified commerce solutions come into the picture, connecting with customers every time, everywhere, and in every way they choose to engage. … Read more >
The post Unified Commerce Solutions Lead to Seamless Shopping Experiences appeared first on IoT@Intel.
Today, we raise a glass to you, our comrades in arms looking to improve your skills as a business pros, engineers, or experts in the art of technology. Today, we became one milestone stronger — a close-knit LinkedIn community of more than 75,000 IT and business professionals and our closest friends dedicated to being smarter, stronger, and more capable team members.
Working for something bigger than ourselves
We’re all in the same boat trying to catch enough wind in our sails to move this work ship along. As we learn new skills to do better business or implement new technologies, we share what we’ve learned with others here in the community. We look to more than just Intel to educate each other — even if it sometimes means promoting a competitor or cohort above ourselves. Because you know what? That is exactly the thing that makes us a united team. Sometimes we need to look beyond our bubbles to learn new ways of doing the same old things.
We built this community for you
We work painstakingly to find the best mix of content for you — from the IoT, to data centers to the PC (and other devices) and everything in between. We also look beyond our walls to cultivate thought-provoking industry news and trends to expand your skills. This is truly an edge-to-cloud knowledge-sharing experience. We find the articles that will resonate best with you and help you succeed as a professional.
Let us know what you would like to hear more about by simply commenting on our posts. We are listening.
The secret is you: We’ll keep sharing our favorite content and as long as you keep reading and asking questions so we can all grow together.
Now that you know our motivation, here’s where you can follow us to find more great information:
Here’s to another 75,000 followers and a growing educational hub. Please, keep in touch!
Online video is a huge part of our connected world today. It’s a medium that we use daily to share, communicate, learn, and of course, be entertained – and there seems to be no limit to its growth. Facebook is a great example – they are now getting an amazing 8 billion video views a day, more than double what they saw 6 months earlier. According to a recent Cisco report, video traffic will be 80% of all consumer Internet traffic in 2019, up from 64% in 2014, and mobile video will increase 11X in the next 5 years. In China alone, the online video market is expected to reach more than $17B by 2018 according to iresearch.
As a video and tech enthusiast, these developments are hugely exciting, but this relentless deluge of video does indeed present some very real challenges (and opportunities). Infrastructure challenges are obvious, given the need for increased storage and compute to process, transcode and manipulate videos for end user consumption. However, there is another, less straightforward, problem to overcome. How can viewers best navigate the flood of online video content? And how can content providers and advertisers efficiently and intelligently provide video content that is relevant (and useful) to consumers?
This is certainly a daunting task and something that we as humans are ill equipped to handle. Frankly, it is no wonder that many companies are investigating the possibility of developing intelligent systems that leverage machine learning and deep neural networks (DNN) to help automate these tasks.
With this in mind, Intel, Quanta, and Viscovery came together to build a full stack solution to this problem that leverages a deep learning based application from Viscovery, the power and scalability of Intel® Xeon® processors, and Quanta’s efficient platform designs. We created a turnkey solution specifically designed to solve the video content recognition problem. At Intel, we recognize that it is critical to take a holistic view when tackling these types of challenges and enable solutions that include everything from the silicon and server hardware to the libraries and open source components all the way to the end application. And of course, all of these ingredients must be optimized for cloud scale deployments. Below is a high level view of the solution stack:
In order to tackle these problems at scale, libraries like Intel® Math Kernel Library and optimized open source components like Caffe* are tightly integrated into Viscovery’s Deep Learning-based video content recognition engine to take full advantage of the performance of Intel® processors. The result is a solution that seamlessly runs across Intel® Xeon® and Intel® Xeon Phi™ processor-based platforms providing the capability to train DNNs quickly and deploy at scale at an efficient total cost of ownership. Below is an example of types of content that the Viscovery application uses to train their DNNs. As you can see they’ve moved significantly beyond simple image and object classification:
OCR in the wild
Of course, the real proof of success is in the usage of this platform by end customers. Leaders in video content delivery such as LeEco, YouKu, 8sian, Alimama (part of Alibaba) and many others have already deployed solutions based on this stack.
If you’re at Computex this month, you can check out this video discovery service in action running on our Intel Xeon and Intel Xeon Phi processors at Quanta’s booth and during Intel’s keynote speech by Diane Bryant. And with any luck, as video content recognition capabilities continue to advance, you’ll never find yourself watching irrelevant or unwanted video content again.
From video streaming to remote workstations, more content is being delivered via cloud computing every day. Data centers everywhere are dealing with a flood of video traffic, and many enterprises are also dealing with the computing demands of complex design applications and massive data sets that are used by employees and contractors scattered around the world.
For design and content creation companies to remain competitive in today’s global business climate, they need to employ technologies that help technical employees and contractors collaborate to solve complex and interconnected design problems. Their designers, sales people, customers, contractors and others involved in the design process need access to design information and tools – anywhere and anytime, and the enterprise needs to safeguard its valuable intellectual property. The enterprise is therefore faced with finding ways to securely share data models and content over a widely distributed workforce without breaking the bank.
Enabling the Global Design Workforce
Securing access to complex and sensitive design models and content, quickly and easily providing access to a highly distributed workforce and ecosystem and providing an excellent user experience to that workforce are the collaboration challenges faced by the IT organizations at design firms.
However, there’s a simple solution to these challenges. Cloud-hosted remote workstations allow engineers to use demanding 3D graphics applications from virtually anywhere in the world, with all data and applications hosted on servers based on Intel Xeon processors in a secure data center. Employees can safely collaborate with external contractors while avoiding sending designs from computer-to-computer and protecting enterprise intellectual property.
Remote users can also work from the same data set, with no need for high-volume data transfers. This allows the enterprise to deliver fast and clear graphics running on a dense, cost-effective infrastructure.
New Architectures and Ecosystems
To support the demands of remote workstations, new solutions and partnerships are absolutely necessary.
The Intel Xeon processor E3-1500 v5 product family offers hardware-enhanced integrated graphics capabilities that are optimized for remote application delivery workloads. These integrated graphics solutions cost-effectively accelerate video and enable secure, remote delivery of applications by combining the performance of Intel Xeon processors with integrated Iris Pro graphics.
Intel-powered remote workstation solutions allow technical professionals and content creators to have greater access to key applications on their computing device(s) while securely collaborating with colleagues. For IT, these solutions provide centralized management, more provisioning control, and easier patching and updating of applications.
The newly announced Intel Xeon processor E3-1500 v5 includes Intel Graphics Virtualization Technology (Intel GVT) to address multiple customer use cases. These include direct assignment of a given GPU’s capabilities to a single user; the ability to allow multiple local or remote virtual machines to share access to a GPU; and the ability to share a GPU’s resources through multiple concurrent users in a time-slice scenario.
Productivity and Progress: Central to the Enterprise
Organizations can increase the security of enterprise information by centrally hosting critical applications and data and avoiding delivering valuable visual content to contractors. The enterprise can also avoid provisioning powerful workstations to users who need infrequent access to graphic-intensive applications, such as salespeople who only occasionally need to provide design input.
Intel works with a partner ecosystem to enhance the delivery and minimize the complexity of high-performance remote workstations within the enterprise. For example, the enterprise can turn to VMware Horizon 7 to deliver virtual or hosted desktops or Citrix XenApp and XenDesktop to deliver secure virtual apps and desktops.
Adopting secure remote workstations allows the enterprise to deliver once out-of-reach workstation performance and visual content to designers, engineers, media creators, and other professionals. This enables major leaps in collaboration and productivity, further empowering each employee to drive progress for the enterprise.
Our most powerful desktop processor yet – the new Intel® Core™ i7 processor Extreme Edition. I can’t remember when I was so excited by a new product launch. But with the Intel® Core™ i7 processor Extreme Edition, we’ve built a … Read more >
In today’s digital world, consumers face a barrage of online phishing attacks, new forms of nasty malware, and the risk of virus-infected desktops like never before. Unfortunately, cyber criminals do not discriminate, and it’s very easy to fall victim to their scams.
But what if you could rest easy at night knowing all of your pictures, videos, and personal files are securely stored on a high-capacity, always-available desktop PC that stays safely in your home? [i],[ii] Here are a few ways that Intel Security is making this possible.
Built-In Protection for Stronger Security
At its core, Intel-based desktops build security in from the silicon up to help safeguard your files, online transactions, data, and identity on a device that can reside securely in your home. Desktop PCs that are running 6th gen Intel Core processors feature hardware-based technologies that protect against a wide range of malware attacks and exploits—and help keep your system and data free from hacking, viruses, and prying eyes.
As an added layer of support, the hardware-based security capabilities of Intel Identity Protection Technology can be found on more than 500 million PCs[iii] to support trusted device authentication. Now you can enjoy amazing computing experiences and more control over your personal content and information without worrying about the next Trojan horse.
Creating one strong password that you can remember is hard enough, but doing it for every single online account is almost impossible—until now. Many people use the same password everywhere, so it doesn’t take a skilled hacker to break into an account, just a good guesser.
“More than 90 percent of passwords today are weak, predictable, and ultimately crackable,” says Dave Singh, product marketer, Intel Client Computing Group. “What we’re trying to do is help consumers develop good security habits when they’re browsing and shopping online, and password managers make this very convenient by decreasing frustration to provide a better user experience on their PCs.”
As one example, True Key comes preloaded on most Intel-based desktop PCs with McAfee LiveSafe software. Users can sync their data across Windows, Mac, Android, and iOS devices and import passwords from all browsers and competitors. Advanced multi-factor authentication (MFA) and biometric security make it easy to sign into any account. Choose at least two different factors (e.g., trusted device, face, email, master password, numeric pin, or fingerprint) and the app will verify your identity. For additional security, you can add more factors and make your profile even stronger. Basically, True Key can recognize you and sign you in—eliminating the need for passwords altogether.
“With so many different ways to log in and get to your personal content and information, password managers can really help increase productivity by saving time and headaches,” adds Singh.
Imagine being able to walk up to your PC and have one central app manage your mobile wallet, healthcare account, or hotel membership profile. You can now book travel, buy and ship gifts or upload photos to the cloud more conveniently and better protected against malware.
Some password managers can also store wallet items—credit cards, addresses, memberships—and make it easy to “tap and pay” at checkout for secure online payments and transactions. Intel technologies feature fast, end-to-end data encryption to keep your information safe without slowing you down, with built-in hardware authentication to provide seamless protection for online transactions.
“Your high-capacity, always-available desktop can stay safely at your home with all your locally stored files, but you can securely access the information from other devices, including your smartphone,” Singh says.
“Paired with new Windows 10 sign-in options like Windows Hello, desktop computing is truly becoming more personal and secure. It really shows how digital security is advancing to work better together for the best home computing experience.”
So the next time you log into your home desktop PC, you can do it with a smile. Download the Flash Card for more tips on how to safeguard your digital security.
[i] Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.
[ii] Requires an Intel® Ready Mode Technology-enabled system or motherboard, a genuine Intel® processor, Windows* 7, Windows 8.1, or Windows 10 OS. Results dependent upon hardware, applications installed, Internet connectivity, setup and configuration.
[iii] True Key™ by Intel Security. Security White Paper 1.0. https://b.tkassets.com/shared/TrueKey-SecurityWhitePaper-v1.0-EN.pdf
By John Kincaide, Privacy and Security Policy Attorney at Intel On May 11, 2016 the US Senate Judiciary Subcommittee on Privacy, Technology and the Law held a hearing on “Examining the Proposed FCC Privacy Rules”. The objective of the hearing … Read more >
The post US Senate Judiciary Committee Holds Hearings on the FCC’s Proposed Privacy Rules appeared first on Policy@Intel.
Intel Internet of Things (IoT) technology drove robust smart and connected retail solutions and interactive brand experiences at JDA FOCUS in Nashville this month. JDA’s annual global conference brings together more than 2,000 retail and manufacturing professionals to network, share … Read more >
The post Intel IoT Tech Drives Enhanced Store Intelligence Solutions at JDA Focus appeared first on IoT@Intel.
By James Hsu, Director of Technical Marketing at Citrix
One of the great experiences in our industry is to see products from different vendors—hardware and software—come together to solve real customer problems. That’s what’s been happening with Citrix and Intel for the last two years as we worked together to apply Intel Graphics Virtualization Technology (Intel GVT) to the Citrix XenServer virtualization platform. The result of that effort is Citrix XenServer 7.0, which we are announcing at Citrix Synergy 2016 in Las Vegas. It’s the first commercial hypervisor product to leverage Intel GVT-g, Intel’s virtual graphics processing unit that can power multiple VMs with one physical GPU. As well as announcing XenServer 7.0, Citrix is also announcing XenDesktop 7.9 offering industry-leading remote graphics delivery supported by Intel. Let me tell you what that does for users running graphics-intensive virtualized desktop applications, and then I’ll tell you how we used Intel GVT-g to do it.
Citrix XenApp and XenDesktop lets you deliver virtualized desktop and applications hosted on a server to remote workstations. Many desktop applications—like computer-aided design and manufacturing apps and even accelerated Microsoft Office—require the high-performance graphics capabilities of a graphics processing unit (GPU). In XenDesktop 7.9 Citrix also added support for Intel Iris Pro graphics in the HDX 3D Pro remote display protocol.
Earlier versions of XenServer enabled Intel GPU capabilities on virtualized desktops in a pass-through mode that allocated the GPU to a single workstation. Now, XenServer 7.0 expands our customers’ options by using Intel GVT-g to virtualize access to the Intel Iris Pro Graphics GPU integrated onto select Intel Xeon processor E3 family products , allowing it to be shared by as many as seven virtual workstations.
With Intel GVT-g, each virtual desktop machine has its own copy of Intel’s native graphics driver, and the hypervisor directly assigns the full GPU resource to each virtual machine on a time-sliced basis. During its time slice, each virtual machine gets a dedicated GPU, but the overall effect is that a number of virtual machines share a single GPU. It’s an ideal solution in applications where high-end graphics are required but shared access is sufficient to meet needs. Using the Intel Xeon processor E3 family, small single-socket servers can pack a big graphics punch. It’s an efficient, compact design that enables a new scale-out approach to virtual application delivery. And it’s a cost-effective alternative to high-end workstations and servers with add-on GPU cards.
The advantages go beyond just cost efficiency. Providing shared access by remote users to server-based data and applications enhances worker productivity and improves collaboration. It also tightens security and enables compliance, because critical intellectual property, financial data, and customer information stays in the data center rather than drifting out to individual workstations and mobile devices. And security is further enhanced, because Intel Xeon processors contain Intel Trusted Execution Technology (Intel TXT) to let you create trusted computing pools. Intel TXT attests to the integrity and trust of the platform, assures nothing has been tampered with, and verifies that the platform is running the authorized versions of firmware and software when booting up.
At Citrix, our goal is to provide our customers with the computing experience they need to innovate and be productive—on a range of platforms and usage models and in a way that enhances the security of their business. And we want to give them the flexibility to access the computing resources they need anywhere, any time, and from any device. Our collaboration with Intel has let us deliver on that promise, and it lets us provide even more options for platform choice and deployment configurations. It’s been a great experience for us, and now it will enable a great experience for our mutual customers.
The shift from fee-for-service to fee-for-performance is changing the conversation around patient care. Reducing readmissions is one benchmark for analyzing the quality of care, and more discussion is happening around bringing telehealth into the mix to improve this metric.
Traditionally, when patients leave the clinical setting, interaction between the care team and the patient decreases. With telehealth and remote patient monitoring, technology allows the provider team to remain in contact with the patient to follow up on regiments and make sure instructions are followed. The result can be a shift in outcomes for the better.
To learn more about telehealth, we sat down with Fadesola Adetosoye from Dell Healthcare Services, who says telehealth allows patients to overcome challenges, like transportation issues, to obtain better primary care and stay in touch with clinicians following discharge.
Watch the video above and let us know what questions you have about telehealth? Is your organization using a telehealth strategy?
Developers – your HPC Ninja Platform is here! HPC developers worldwide have begun to participate in the Developer Access Program (DAP) – a bootstrap effort for early access to code development and optimization on the next generation Intel Xeon Phi processor. A key part of the program is the Ninja Developer Platform.
Several supercomputing-class systems are currently powered by the Intel Xeon Phi processor (code name Knights Landing (KNL))—a powerful many core, highly parallel processor. KNL delivers massive thread parallelism, data parallelism, and memory bandwidth with improved single-thread performance and Intel Xeon processor binary-compatibility in a standard CPU form factor.
In anticipation of KNL’s general availability, we, along with our partners, are bringing to market a developer access program, which provides an ideal, platform for code developers. Colfax, a valued Intel partner, is handling the program, which is already underway.
The Ninja Platform
Think of the Ninja Developer Platform as a stand-alone box that has a single bootable next-generation Intel Xeon Phi processor. Developers can start kicking the tires and getting a feel for the processor’s capabilities. They can begin developing the highly parallel codes needed to optimize existing and new applications.
As part of Intel’s Developer Access Program, the Ninja platform has everything you need in the way of hardware, software, tools, education and support. It comes fully configured with memory, local storage, CentOS 7.2 and also includes a one-year license for Intel Parallel Studio XE tools and libraries. You can get to work immediately whether you’re a developer experienced with previous generations of Intel Xeon Phi coprocessors or if you are new to the Intel Xeon Phi processor family.
Colfax has pulled out all the stops in designing the education and support resources including white papers, webinars, and how-to and optimization guides. Currently underway are a series of KNL webinars and hands-on workshops – see details at http://dap.xeonphi.com/#trg
Here is a quick look at the two platform options that are being offered by the Developer Access Program – both are customizable to meet your application needs.
Given the richness of the technology and the tools being offered along with the training and support resources, developers should find the process of transitioning to the latest Intel Xeon Phi processor greatly accelerated.
The Ninja Development Platform is particularly well suited to meet the needs of code developers in such disciplines as academia, engineering, physics, big data analytics, modeling and simulation, visualization and a wide variety of scientific applications.
The platform will cost ~$5,000 USD for the single node pedestal server with additional costs for customization. On the horizon is our effort to take this program global with Colfax and partners. Stay tuned for details in my next blog.
You can pre-order the Ninja Developer Platform now at http://www.xeonphideveloper.com.
By Kent Landfield, Director of Standards and Technology Policy, Intel The Information Sharing and Analysis Organization Standards Organization (ISAO SO) held its Third Public Forum on May 18-19 in Anaheim California. More than 100 participants from academia, government and industry … Read more >