Download this configuration guide for step-by-step procedures on installing trusted compute pools on Red Hat Enterprise Linux* OpenStack* Platform 3.
Download this configuration guide for step-by-step procedures on installing and configuring trusted compute pools on Red Hat Enterprise Linux* OpenStack* Platform 3 with control and compute nodes, storage nodes, and required software and hardware.
UOL discusses how their cloud utility computing solution benefits from Intel® Trusted Execution Technology for security and load migration.
UOL discusses the benefits of Intel® technology and Intel® Trusted Execution Technology in their one stop shop Cloud solution for utility computing which provides customized security embedded in the processor and simplified load migration.Просмотр полностью >
Case Study: UOL CLOUD* pioneers a cloud computing platform in Brazil featuring Intel® Trusted Execution Technology for improved performance, security.
Case Study: UOL CLOUD* pioneers the use of Intel® Trusted Execution Technology in a cloud computing platform in Brazil, offering high performance, scalability, and security in the hardware through utility computing.
Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
IT experts from Intel discuss the OpenStack proof of concept and reference architecture, which outlines how to build a secure, energy efficient cloud computing infrastructure with OpenStack and Intel technology.Просмотр полностью >
Combining McAfee software and Intel hardware technologies like Intel® TXT, Trapezoid offers end-to-end cloud security.
Combining McAfee software and Intel hardware technologies like Intel® TXT, Trapezoid offers end-to-end cloud security with more information, monitoring, and management capabilities, making it easy to protect physical and virtual environments.Просмотр полностью >
Video: Executives from Terremark, VMware, and Intel view how cloud security built into hardware provides robust protections to platforms and data.
Intel® embedded platform architect provides discussion on implementing Intel(R) TXT for embedded applications.
Discusses how Intel® Trusted Execution Technology uses data verification to ensure a system is in a trusted configuration on every boot, protecting high security environments. (v.001, Dec. 2010)
Provides identity and access control, and protects the content during transit to / from the cloud.