Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Size: px
Start display at page:

Download "Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms"

Transcription

1 Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services AUDIENCE AND PURPOSE Intel Xeon Processor 5600 Series For Cloud Service Providers, infrastructure hosts, and Enterprise IT administrators looking to enhance or build their public or private cloud infrastructure, the decision to use a cloud for the delivery of IT services needs to include a security strategy which protects the various layers of the deployment. This document addresses the key aspects of the usage model, Security Monitoring and Service Catalog*, defined by the Open Data Center Alliance*. This reference architecture presents a complete model of a Parallels* Trusted Compute Pool deployment on Intel Xeon processor 5600 series servers, and addresses how to establish a trusted platform on the physical server layer of a public or private cloud. Since the creation and operation of a cloud requires integration and customization to existing IT infrastructure and business requirements, it is not expected that this guide can be used as-is. For example, the adaptation to existing networks and the identification of end-to-end security requirements are out of scope for this guide. Therefore, it is expected that the user of this guide will make appropriate adjustments to any deployment to meet specific customer security requirements, especially given the variations in threat levels and attack points that face users when they operate in a public or private cloud usage model. Copyright 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others.

2 Table of Contents Executive Summary... 3 Introduction: Enable Mission-Critical and Enterprise Applications in the Public Cloud... 3 Trusted Computing Starts with a Trusted and Encrypted Infrastructure... 3 Intel Trusted Execution Technology Overview... 4 Parallels* Public Cloud Compute Pool Implementation... 5 Parallels Business and Operations Automation* Installation and Set-Up...5 Define Trusted Compute Service Resources with POA*...5 Define Trusted Compute Service Plans with PBA*...6 Public Cloud Compute Pools Summary... 8 Future Features... 8 Glossary... 8 Footnote

3 Executive Summary The adoption of cloud computing, whether public or private, injects a new level of security concerns when compared to standard enterprise compute models and architectures. Principal factors in the decision whether or not to deploy an IT service in a cloud traditionally include: Business continuity: The threshold of acceptable downtime due to security incidents Data compliance: When applications should be disqualified due to sensitive content Multi-tenancy: Decision of when sharing computing resources with others, potentially competitors, constitutes an unacceptable risk Complexity: Determination of when an application has too many interdependencies or vulnerabilities, which render it unfit for the cloud Migration: Potential complications due to security administration, including audits, key management, attestation, and configuration management Trust: Ability or inability to establish that the operating environment (i.e. the Operating System and Virtual Machine Monitor) being run on a given set of physical servers is trusted code that has been measured and checked against a known trusted code state and capable of controlling, managing and protecting the platform workloads. With new technologies and a complete end-to-end security model, these concerns can be addressed and the benefits of cloud infrastructures optimally reaped. The main area of focus for this guide is around the last area, where establishing that the operating environment has achieved a trusted boot on a set of physical servers to provide a more robust foundation for the deployment of secure multi-tenancy operations. Introduction: Enable Mission-Critical and Enterprise Applications in the Public Cloud Under the current state of cloud computing, there have been few practical approaches to examine a cloud service s virtualization and hardware implementation from a security perspective in order to verify the service s conformance or compliance to a standard. Audit processes exist, but they are labor intensive, inconsistent, and non-scalable. Due to the expense involved, these processes yield a static snapshot that is probably obsolete by the time it is delivered. Ideally, the audit would be done in real time, which is not realistic under previously deployed technology. Because of the concerns expressed above, many public cloud deployments to-date consist of non-core applications such as electronic mail, CRM for sales force automation, and Human Resource applications, such as job postings or expense reports. Cost factors will provide appreciable financial incentives for organizations to consider on-boarding core business processes and sensitive data to a private cloud. For this transformation to happen, proven (and auditable) security mechanisms need to exist that ensure a predefined level of integrity and protection for processes and data. Because public clouds are not under internal IT control, such cloud offerings are being held to a higher bar of security. As mentioned above, the monitoring capability needs to provide and work on real-time data. Static audit processes are too limited for cloud deployments as they are not dynamic enough to support the elastic nature of such services. Real-time flexible and configurable supervision is needed to assess the internal state of the infrastructure and its capability to meet the required service levels. Eventually, organizations which deploy cloud services will develop the visibility and controls needed to prove compliance for even their most critical data. At that point, these organizations will realize the value of the cloud with the higher payoff of critical applications in terms of infrastructure substitution and migration away from specialized equipment and one-off, inhouse applications. At the same time, they will provide greater visibility for what is possible today with most current infrastructures. The first step to providing insight into infrastructure health is to be able to verify the configuration of a platform. Once the correctness of the platform state is determined, better decisions about what data or workloads are suitable for running on that platform can be made. Further, if many resources with proven known good controlling software are present, these resources can be aggregated into pools of like systems and this information and assurances of higher integrity can be used to manage the flow or dynamics of cloud-enabled datacenters. One compelling use model is to create and identify pools of trusted platforms and restrict the deployment and movement of their more sensitive and confidential data to only the trusted platforms within the trusted pools. Trusted Computing Starts with a Trusted and Encrypted Infrastructure Information security cannot be overemphasized as a consideration in cloud infrastructures. Support for security needs to form an uninterrupted chain from the application user interfaces, all the way down to the hardware infrastructures. Any gaps or interruptions in this logical chain will only create attack targets. Security mechanisms at the hardware level constitute necessary conditions to facilitate the implementation of secure conditions in the logical layers higher up. Today, visibility into the lower layers of cloud infrastructures is almost absent. This condition represents a real obstacle to onboarding high-value applications to an external infrastructure that provides no visibility. Technology is evolving that will 3

4 allow Enterprise IT and managed service providers to monitor security conditions within a cloud s physical and virtual infrastructure and the layers above. With increased visibility into the infrastructure, it will be possible for Enterprise IT and managed service providers to attain: Visibility into the security states of the hardware hosts. Delivery of automated reporting on the configuration of the physical and virtual infrastructure on the hosted machines. Ability to map measurements that verify platform configuration to security compliance and service levels. Multiple views, including logical views to track cloud resources use and to prevent improper use, such as coresidency of peer customers who are also competitors. Agile and flexible provisioning. However, among each of these usage models, there is a requirement for compliance and standards. The use of the Trusted Computing Group* (TCG) compliant Trusted Platform Module* (TPM) and TCGcompliant encryption standards provides the flexibility and choice required as a foundation for cloud computing growth. In addition, the requirement of a device to initiate a tamper-resistant trusted boot provides assurance for IT managers. Finally, the inclusion of a policy and console manager capable of the management of the virtual machine (VM) workloads and physical servers provides the visibility IT managers require. This is a model of how hardware and software can come together to form a more robust security foundation. All of these drive the usage models and their required solution architectures. Given this background, VMware ESXi* (managed by the Hytrust Appliance*) has enabled the capability of trusted compute pools by leveraging Intel Trusted Execution Technology (Intel TXT) and presented a solution targeted for high-end private clouds implementations to market in early This guide explores how cloud service providers can create trusted public cloud virtual private server (VPS) offerings by combining Parallels Automation* with VMware vsphere ESXi*. Using the Application Packaging Standard* (APS), Parallels system integration partner Softec* is building the linkages to enable Parallels public cloud automation to be controlled by the VMware virtual infrastructure, enabling workloads to be assigned to trusted computing resource pools or standard computing resource pools. Intel Trusted Execution Technology Overview Intel Trusted Execution Technology (Intel TXT) 1 is a set of enhanced hardware components designed to build and maintain a chain of trust to protect sensitive information from software-based attacks. Intel TXT creates a measured launch environment (MLE) that enables an accurate comparison of all the critical elements of the launch environment against a known good source. Intel TXT creates a cryptographically unique identifier for each approved launchenabled component, and then provides hardware-based enforcement mechanisms to block the launch of code that does not match the approved code. This hardwarebased solution provides the foundation on which trusted platform solutions can be built to protect against the software-based attacks that threaten integrity, confidentiality, reliability, and availability of systems. Such attacks, when successful, create costly downtime and remediation expenses, as well as potentially large costs related to data breaches. While intrusion detection and anti-virus remains a key function of security personnel via currently Figure 1: Intel TXT with Virtual Machines available tools, Intel TXT enables a new base-level of server hardware hardening to be established. Intel TXT provides: Verified Launch: A hardware-based chain of trust that enables launch of the MLE into a known good state. Changes to the MLE can be detected through cryptographic (hash-based or signed) measurements Launch Control Policy (LCP): A policy engine for the creation and implementation of enforceable lists of known good, or approved, executable code Secret Protection: Hardware-assisted methods that remove residual data at an improper MLE shutdown, which protects data from memory-snooping software and reset attacks Attestation: The ability to provide platform measurement credentials to local or remote users/systems to complete the trust verification process and support compliance and audit activities; 3 rd party ISVs like Parallels can added value to this underlying trust verification process by delivering an attestation system which manages a deployment of trusted servers. For more technical details on the implementation of trusted computing with VMware ESXi* and the Hytrust Appliance*, please see the following guide: Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms. 4

5 Parallels* Public Cloud Compute Pool Implementation Parallels Business and Operations Automation* Installation and Set-Up The first phase of setting-up a Parallels* Public Cloud Trusted Compute Pool requires Parallels Business Automation* (PBA*) and Parallels Operations Automation* (POA*) installation. This work is normally performed by Parallels Services and will not be covered by this guide. The remainder of this section focuses on how to set up the standard and trusted VPS instances, not the VMware hardware nodes themselves (which is covered in the previously referenced Intel Cloud Builders Guide). Define Trusted Compute Service Resources with POA* The first step to deploy a Public Cloud Trusted Compute Pool is to select the hardware node or nodes to be assigned to the new VPS resource being defined. This is accomplished by opening the POA* Service Director and then the VMware Manager*. For purposes of this guide, one node was selected, which is named misclin01.rootvps.eu, and it is assumed the selected hardware node is based on an Intel Xeon processor 5600 series server with Intel TXT enabled, running VMware ESXi* 4.1 Update 1 or higher with Hytrust Appliance*, see Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms for details. Figure 2: POA* VMware Manager VPS Hardware Nodes Once the hardware node or nodes are identified, the next step is to create a virtual private server (VPS) service, which will be called trustedvm with the POA* Add New VM function. This creates the service that is eventually linked to PBA*. 5

6 Figure 3: POA* VMware Manager Add New VM VPS Service Now that the new service, trustedvm.rootvps.eu, is created on the Intel TXT enabled hardware node misclin01.rootvps.eu, it can be linked to a PBA* Service Plan that will be created in the next section of this guide. Using this same Add New VM feature, a standard compute resource pool also can be created. For the purposes of this guide, the hardware node is named misclin02.rootvps.eu, and is a server without Intel TXT capabilities enabled. Note the name of the non-trusted VPS service is standardvm.rootvps.eu. Figure 4: POA* VMware Manager Add New VPS Service Define Trusted Compute Service Plans with PBA* To create a new service plan within PBA*, define a new Service Template using the Product Director function in the left-side navigation. As a shortcut, the SSL Certificates template is used, which is the last item in the available list of templates in Figure 5 under the PBA Plan Manager > Service Templates 6

7 Figure 5: PBA* Plan Manager Service Template, Add New Service Template To create a new service plan named Trusted SSL Service Plan, clone the SSL Certificates Template with the Clone Plan function. Figure 6: PBA* Plan Manager Service Plan: Clone Service Template The next step in PBA* to create a new service plan is to open the Plan Categories function and create the Trusted VPS Hosting plan. Figure 7: PBA* Category Manager Clone Service Template Now that the PBA* Service Plan and Service Category are created, the POA* trustedvm.rootvps.eu service resource (i.e. ESXi-based VM), which was created on the server resource misclin01.rootvps.eu, can be imported into PBA and linked to the newly-created Trusted VPS Hosting Plan. Once additional billing parameters are established, this enables a service provider to offer a Trusted SSL VPS instance on the service resource trustedvm.rootvps.eu. 7

8 Public Cloud Compute Pools Summary The are many additional steps to set-up a PBA* service plan during the installation and set-up process, and Parallels Services* provides assistance for its customers. This summarized creation overview of a trusted service on a hardware node based on an Intel Xeon processor 5600 series server with Intel TXT enabled, running VMware ESXi* 4.1 Update 1 or higher with Hytrust Appliance*, and the connection of that server to a PBA Trusted VPS Hosting Plan was outlined to provide a general guide of possibilities for public cloud service providers to create differentiated service offerings based on Trusted Compute Pools versus Standard Compute Pools. With the Trusted VPS Service Plan example, service providers are able to market the offering to select vertical industries which are concerned about running their SaaS applications on a public cloud. Trusted Compute Pools, running on Intel Xeon processor 5600 series servers with Intel TXT enabled, leveraging VMware ESXi 4.1 Update 1 or higher with Hytrust Appliance, removes one of the barriers to providing more secure public cloud VPS service offerings. In addition, by offering trusted service plans, such as the example Trusted VPS Service Plan detailed in this guide, service providers should be able to also deliver what would be a cost-prohibitive service at scale to small- and mediumbusinesses at prices significantly lower than a private cloud deployment in those same businesses. Future Features Note that because the Softec VMware APS* package is still under development, the user interface used in the development of this concept white paper is based on a generic virtual private server (VPS) deployment Glossary Hardware Node (or Node) is a server on which the VMware ESXi* 4.1 software is installed for hosting VPS VM instances Intel Trusted Execution Technology (Intel TXT): Intel Trusted Execution Technology (Intel TXT) is a set of enhanced hardware components designed to build and maintain a chain of trust to protect sensitive information from software-based attacks. Formerly codenamed LaGrande Technology (LT) and LaGrande Technology Server Extensions (LT-SX) Measured Launch Environment (MLE): The environment measured and launched as a result of the GETSEC [SENTER] instruction. This can be an Operating System, VMM, or any trusted code that supports Intel Trusted Execution Technology. TCG: Trusted Computing Group: Industry initiative for advancing computer security ( Trusted Platform Module (TPM) 1.2: (Third-party silicon), a hardware device defined by the Trusted Compute Group that provides a set of security features used by Intel Trusted Execution Technology Footnote 1 Intel Trusted Execution Technology, 8

9 To learn more about deployment of cloud solutions, visit Disclaimers Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. See for details.? Hyper-Threading Technology requires a computer system with an Intel processor supporting Hyper-Threading Technology and an HT Technology enabled chipset, BIOS and operating system. Performance will vary depending on the specific hardware and software you use. See for more information including details on which processors support HT Technology. Intel Virtualization Technology requires a computer system with an enabled Intel processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain platform software enabled for it. Functionality, performance or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web site at Copyright 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, Xeon inside, Intelligent Power Node Manager, Dynamic Data Center Manager, Intel Cloud Builder, Virtualization Technology, VT Flex-Migration, and Hyper-Threading are trademarks of Intel Corporation in the U.S. and other countries. Copyright 2011 Parallels, Inc. The Parallels logo is registered trademark of Parallels, Inc. *Other names and brands may be claimed as the property of others

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Ubuntu* Enterprise Cloud Executive Summary Intel Cloud Builder Guide Intel Xeon Processor Ubuntu* Enteprise Cloud Canonical*

More information

Cloud based Holdfast Electronic Sports Game Platform

Cloud based Holdfast Electronic Sports Game Platform Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide

More information

Intel Service Assurance Administrator. Product Overview

Intel Service Assurance Administrator. Product Overview Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

A Superior Hardware Platform for Server Virtualization

A Superior Hardware Platform for Server Virtualization A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

Control your corner of the cloud.

Control your corner of the cloud. Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing

More information

The Case for Rack Scale Architecture

The Case for Rack Scale Architecture The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage

More information

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor Servers Enhanced Cloud Security with HyTrust* and VMware* Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms Enhanced Cloud Security

More information

Integrated OpenStack Cloud Solution with Service Assurance

Integrated OpenStack Cloud Solution with Service Assurance White Paper Redapt Intel SAA Integrated OpenStack Cloud Solution with Service Assurance Open Reference Cloud Architecture White Paper Redapt, Inc. and Intel Corporation Executive Summary Enterprise IT

More information

Index. BIOS rootkit, 119 Broad network access, 107

Index. BIOS rootkit, 119 Broad network access, 107 Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,

More information

Intel Media SDK Library Distribution and Dispatching Process

Intel Media SDK Library Distribution and Dispatching Process Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

CLOUD SECURITY: Secure Your Infrastructure

CLOUD SECURITY: Secure Your Infrastructure CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED

More information

Reducing PCI DSS Scope: The Gateway Approach

Reducing PCI DSS Scope: The Gateway Approach WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

with PKI Use Case Guide

with PKI Use Case Guide Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION

More information

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

Intel Network Builders

Intel Network Builders Intel Network Builders Nakina Systems Solution Brief Intel Xeon Processors Intel Network Builders Nakina Systems and Intel Make NFV Network Operational Introduction Every great generation of computing

More information

Benefits of Client-Side Virtualization

Benefits of Client-Side Virtualization SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

Intel Trusted Execution Technology

Intel Trusted Execution Technology white paper Intel Trusted Execution Technology Intel Trusted Execution Technology Hardware-based Technology for Enhancing Server Platform Security Executive Summary A building is only as good as its foundation.

More information

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Fast, Low-Overhead Encryption for Apache Hadoop*

Fast, Low-Overhead Encryption for Apache Hadoop* Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software

More information

Life With Big Data and the Internet of Things

Life With Big Data and the Internet of Things Life With Big Data and the Internet of Things Jim Fister Lead Strategist, Director of Business Development james.d.fister@intel.com www.linkedin.com/pub/jim-fister/0/3/aa/ Preston Walters Director, Business

More information

Leading Virtualization 2.0

Leading Virtualization 2.0 Leading Virtualization 2.0 How Intel is driving virtualization beyond consolidation into a solution for maximizing business agility within the enterprise White Paper Intel Virtualization Technology (Intel

More information

Intel Remote Configuration Certificate Utility Frequently Asked Questions

Intel Remote Configuration Certificate Utility Frequently Asked Questions Intel Remote Configuration Certificate Utility Frequently Asked Questions General Info 1. What operating system do I have to use to run the wizard? 2. What configurations are required prior to running

More information

Trusted Geolocation in The Cloud Technical Demonstration

Trusted Geolocation in The Cloud Technical Demonstration Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation Trusted Geolocation in the Cloud Business Business

More information

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History

More information

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 李 國 輝 客 戶 方 案 事 業 群 亞 太 區 解 決 方 案 架 構 師 美 商 英 特 爾 亞 太 科 技 有 限 公 司 Email: kuo-hui.li@intel.com 1 Legal

More information

Intel Embedded Virtualization Manager

Intel Embedded Virtualization Manager White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization

More information

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp. Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not

More information

Evaluating Intel Virtualization Technology FlexMigration with Multi-generation Intel Multi-core and Intel Dual-core Xeon Processors.

Evaluating Intel Virtualization Technology FlexMigration with Multi-generation Intel Multi-core and Intel Dual-core Xeon Processors. Evaluating Intel Virtualization Technology FlexMigration with Multi-generation Intel Multi-core and Intel Dual-core Xeon Processors. Executive Summary: In today s data centers, live migration is a required

More information

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology WHITE PAPER Intel Trusted Execution Technology Intel Xeon Processor Secure Cloud Computing Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology The Taiwan Stock Exchange Corporation

More information

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide Opal* Compatibility Guide 1.0 Order Number: 331049-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL

More information

Software Solutions for Multi-Display Setups

Software Solutions for Multi-Display Setups White Paper Bruce Bao Graphics Application Engineer Intel Corporation Software Solutions for Multi-Display Setups January 2013 328563-001 Executive Summary Multi-display systems are growing in popularity.

More information

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 Technical Brief v1.0 February 2013 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*

More information

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and

More information

Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers Huawei SingleCLOUD* Case Study Cloud Design and Deployment on Intel Xeon Processor-based Platforms Huawei SingleCLOUD* AUDIENCE AND PURPOSE

More information

iscsi Quick-Connect Guide for Red Hat Linux

iscsi Quick-Connect Guide for Red Hat Linux iscsi Quick-Connect Guide for Red Hat Linux A supplement for Network Administrators The Intel Networking Division Revision 1.0 March 2013 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH

More information

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First

More information

How to Configure Intel X520 Ethernet Server Adapter Based Virtual Functions on Citrix* XenServer 6.0*

How to Configure Intel X520 Ethernet Server Adapter Based Virtual Functions on Citrix* XenServer 6.0* How to Configure Intel X520 Ethernet Server Adapter Based Virtual Functions on Citrix* XenServer 6.0* Technical Brief v1.0 December 2011 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To

More information

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer. Installation Guide This guide explains how to install an (Intel SSD) in a SATA-based desktop or notebook computer. The instructions include migrating your data from your current storage device (such as

More information

Intel Platform Controller Hub EG20T

Intel Platform Controller Hub EG20T Intel Platform Controller Hub EG20T General Purpose Input Output (GPIO) Driver for Windows* Order Number: 324257-002US Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Document Number: 324818-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intel SSD 520 Series Specification Update

Intel SSD 520 Series Specification Update Intel SSD 520 Series Specification Update June 2012 Revision 1.0 Document Number: 327567-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

How High Temperature Data Centers and Intel Technologies Decrease Operating Costs

How High Temperature Data Centers and Intel Technologies Decrease Operating Costs Intel Intelligent Management How High Temperature Data Centers and Intel Technologies Decrease Operating Costs and cooling savings through the use of Intel s Platforms and Intelligent Management features

More information

Intel Virtualization Technology FlexMigration Application Note

Intel Virtualization Technology FlexMigration Application Note Intel Virtualization Technology FlexMigration Application Note This document is intended only for VMM or hypervisor software developers and not for application developers or end-customers. Readers are

More information

Intel Desktop Board DP55WB

Intel Desktop Board DP55WB Intel Desktop Board DP55WB Specification Update July 2010 Order Number: E80453-004US The Intel Desktop Board DP55WB may contain design defects or errors known as errata, which may cause the product to

More information

Intel Desktop Board DG43RK

Intel Desktop Board DG43RK Intel Desktop Board DG43RK Specification Update December 2010 Order Number: E92421-003US The Intel Desktop Board DG43RK may contain design defects or errors known as errata, which may cause the product

More information

Intelligent Business Operations

Intelligent Business Operations White Paper Intel Xeon Processor E5 Family Data Center Efficiency Financial Services Intelligent Business Operations Best Practices in Cash Supply Chain Management Executive Summary The purpose of any

More information

Intel Data Center Manager. Data center IT agility and control

Intel Data Center Manager. Data center IT agility and control Intel Data Center Manager Data center IT agility and control The Data Center Ecosystem 2 Why do we care about Data Center Management? attributed to devices connected to the Internet of Everything (up from

More information

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK KEY FEATURES LIFECYCLE MANAGEMENT OF VIRTUALIZATION TECHNOLOGIES MADE SIMPLE Automation of lifecycle management reduces costs and errors while improving

More information

Improving OpenStack* Hybrid Cloud Security

Improving OpenStack* Hybrid Cloud Security SOLUTION BRIEF Intel Trusted Execution Technology Hybrid Security Improving OpenStack* Hybrid Security Together, Intel, Mirantis, and IBM SoftLayer demonstrate how Intel Trusted Execution Technology, attestation,

More information

Intel Data Migration Software

Intel Data Migration Software User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY

More information

Intel Matrix Storage Console

Intel Matrix Storage Console Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,

More information

Accelerating Business Intelligence with Large-Scale System Memory

Accelerating Business Intelligence with Large-Scale System Memory Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness

More information

Intel Desktop Board D945GCPE Specification Update

Intel Desktop Board D945GCPE Specification Update Intel Desktop Board D945GCPE Specification Update Release Date: July 11, 2007 Order Number: E11670-001US The Intel Desktop Board D945GCPE may contain design defects or errors known as errata, which may

More information

Intel Virtualization Technology (VT) in Converged Application Platforms

Intel Virtualization Technology (VT) in Converged Application Platforms Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January

More information

Intel Desktop Board D945GCPE

Intel Desktop Board D945GCPE Intel Desktop Board D945GCPE Specification Update January 2009 Order Number: E11670-003US The Intel Desktop Board D945GCPE may contain design defects or errors known as errata, which may cause the product

More information

Intel Integrated Native Developer Experience (INDE): IDE Integration for Android*

Intel Integrated Native Developer Experience (INDE): IDE Integration for Android* Intel Integrated Native Developer Experience (INDE): IDE Integration for Android* 1.5.8 Overview IDE Integration for Android provides productivity-oriented design, coding, and debugging tools for applications

More information

How Intel Cloud SSO Works

How Intel Cloud SSO Works TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

Intel Data Direct I/O Technology (Intel DDIO): A Primer > Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

VNF & Performance: A practical approach

VNF & Performance: A practical approach VNF & Performance: A practical approach Luc Provoost Engineering Manager, Network Product Group Intel Corporation SDN and NFV are Forces of Change One Application Per System Many Applications Per Virtual

More information

Intel Desktop Board DG41BI

Intel Desktop Board DG41BI Intel Desktop Board DG41BI Specification Update July 2010 Order Number: E88214-002US The Intel Desktop Board DG41BI may contain design defects or errors known as errata, which may cause the product to

More information

http://www.intel.com/performance/resources Version 2008-09 Rev. 1.0

http://www.intel.com/performance/resources Version 2008-09 Rev. 1.0 Software Evaluation Guide for ImTOO* YouTube* to ipod* Converter and Adobe Premiere Elements* 4.0 Downloading YouTube videos to your ipod while uploading a home video to YouTube http://www.intel.com/performance/resources

More information

Intel Desktop Board D101GGC Specification Update

Intel Desktop Board D101GGC Specification Update Intel Desktop Board D101GGC Specification Update Release Date: November 2006 Order Number: D38925-003US The Intel Desktop Board D101GGC may contain design defects or errors known as errata, which may cause

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers Power Management & Security within Open Source Private Cloud with Intel & OpenStack Intel Cloud Builders Guide to Cloud Design and Deployment

More information

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers Enhancing Cloud Platform Security with Enomaly ECP* HAE and Dell PowerEdge* Servers Intel Cloud Builders Guide: Cloud Design and Deployment

More information

Trusted Geolocation in the Cloud. Based on NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation

Trusted Geolocation in the Cloud. Based on NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation Trusted Geolocation in the Cloud Based on NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation 2 Agenda Definition of cloud computing Trusted Geolocation in

More information

Intel Desktop Board DQ43AP

Intel Desktop Board DQ43AP Intel Desktop Board DQ43AP Specification Update July 2010 Order Number: E69398-005US The Intel Desktop Board DQ43AP may contain design defects or errors known as errata, which may cause the product to

More information

Affordable Building Automation System Enabled by the Internet of Things (IoT)

Affordable Building Automation System Enabled by the Internet of Things (IoT) Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,

More information

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Intel delivers flexible, end-to-end data protection for retail point-of-sale transactions any device, anywhere, anytime.

More information

Intel Extreme Memory Profile (Intel XMP) DDR3 Technology

Intel Extreme Memory Profile (Intel XMP) DDR3 Technology Intel Extreme Memory Profile (Intel XMP) DDR3 Technology White Paper January 2009 Document Number: 319124-002 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

Intel Desktop Board DG41TY

Intel Desktop Board DG41TY Intel Desktop Board DG41TY Specification Update July 2010 Order Number E58490-006US The Intel Desktop Board DG41TY may contain design defects or errors known as errata, which may cause the product to deviate

More information

New Dimensions in Configurable Computing at runtime simultaneously allows Big Data and fine Grain HPC

New Dimensions in Configurable Computing at runtime simultaneously allows Big Data and fine Grain HPC New Dimensions in Configurable Computing at runtime simultaneously allows Big Data and fine Grain HPC Alan Gara Intel Fellow Exascale Chief Architect Legal Disclaimer Today s presentations contain forward-looking

More information

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Identity Protection Technology with PKI (Intel IPT with PKI) Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION

More information

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1. Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*

More information

Intel Desktop Board DG31PR

Intel Desktop Board DG31PR Intel Desktop Board DG31PR Specification Update July 2010 Order Number: E30564-007US The Intel Desktop Board DG31PR may contain design defects or errors known as errata, which may cause the product to

More information

Citrix and Intel Deliver Client Virtualization

Citrix and Intel Deliver Client Virtualization Citrix XenClient and Intel vpro Citrix and Intel Deliver Client Virtualization Citrix and Intel work together to deliver local virtual desktops, aiming to make virtualization ubiquitous on client devices.

More information

Software Evaluation Guide for Autodesk 3ds Max 2009* and Enemy Territory: Quake Wars* Render a 3D character while playing a game

Software Evaluation Guide for Autodesk 3ds Max 2009* and Enemy Territory: Quake Wars* Render a 3D character while playing a game Software Evaluation Guide for Autodesk 3ds Max 2009* and Enemy Territory: Quake Wars* Render a 3D character while playing a game http://www.intel.com/performance/resources Version 2008-09 Rev. 1.0 Information

More information

Security in the Cloud

Security in the Cloud solution brief Cloud Computing Security in the Cloud Intel Xeon Processor E5-4600/2600/2400/1600 Intel Technologies Enable More Secure Business Computing in the Cloud Would you like to begin transforming

More information

Integration and Automation with Lenovo XClarity Administrator

Integration and Automation with Lenovo XClarity Administrator Integration and Automation with Lenovo XClarity Administrator Extend Management Processes to Existing Ecosystems Lenovo Enterprise Business Group April 2015 2015 Lenovo. All rights reserved. Introduction

More information

Intel Trusted Platforms Overview

Intel Trusted Platforms Overview Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

System Event Log (SEL) Viewer User Guide

System Event Log (SEL) Viewer User Guide System Event Log (SEL) Viewer User Guide For Extensible Firmware Interface (EFI) and Microsoft Preinstallation Environment Part Number: E12461-001 Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN

More information

RAID and Storage Options Available on Intel Server Boards and Systems

RAID and Storage Options Available on Intel Server Boards and Systems and Storage Options Available on Intel Server Boards and Systems Revision 1.0 March, 009 Revision History and Storage Options Available on Intel Server Boards and Systems Revision History Date Revision

More information

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms

More information

System Image Recovery* Training Foils

System Image Recovery* Training Foils Intel-powered Classmate PC System Image Recovery* Training Foils Version 1.0 1 *Other names and brands may be claimed as the property of others. Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Intel Xeon Processor E7 v2 Family-Based Platforms

Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Intel Xeon Processor E7 v2 Family-Based Platforms Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Family-Based Platforms Executive Summary Complex simulations of structural and systems performance, such as car crash simulations,

More information

Intel Simple Network Management Protocol (SNMP) Subagent v6.0

Intel Simple Network Management Protocol (SNMP) Subagent v6.0 Intel Simple Network Management Protocol (SNMP) Subagent v6.0 User Guide March 2013 ii Intel SNMP Subagent User s Guide Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Accelerating Business Intelligence with Large-Scale System Memory

Accelerating Business Intelligence with Large-Scale System Memory Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness

More information