Уточнить результаты
Другие материалы

Активные метки

  • 14643 Результаты
  • Результатов на страницу

Intel® Atom™ Processor E3800 Series: MIPI CSI-2 Camera: Paper

Paper: The Intel® Atom™ processor E3800 implements the MIPI CSI-2 standard to support cameras in cellphones and tablets. (v.1, Jul. 2014)

Предварительный просмотр | Материалы для загрузки

Intel® Atom™ E3800 Graphics Driver Options for Windows* 7: Guide

Guide: Intel® Atom™ E3800 graphics driver decision options between Intel® EMGD vs. Intel® HD Graphics Driver for Windows* 7 features. (v.1, Aug. 2014)

Предварительный просмотр | Материалы для загрузки

Intel® Quark™ SoC X1000: Spec Update

Spec Update: Errata and changes for Intel® Quark™ SoC X1000 for hardware and software system designers. (v.4, Jun. 2014)

Предварительный просмотр | Материалы для загрузки

Intel® Quark™ SoC X1000 Debug Operations: User Guide

Guide: Intel® Quark™ SoC X1000 processor is next generation secure, low-power Intel® Architecture (IA) SoC for embedded applications. (v.2, Jan. 2014)

Предварительный просмотр | Материалы для загрузки

Intel® Xeon® Processor Industrial System Consolidation: Case Study

Case Study: How Intel® Xeon® processor-based virtualization enables system consolidation in industrial applications. (v.1, Aug. 2014)

Предварительный просмотр | Материалы для загрузки

Intel® EMGD for Windows* Embedded Compact 7: Install Package

Install package for Windows* Embedded Compact 7 (build #1011). (v36.16.0, Jun. 2104)

HyperScan Helps Deliver 36 Gbps Deep Packet Inspection Throughput

Solution brief: HyperScan pattern matching software scales with Intel® architecture to optimize deep packet inspection performance and throughput.

Предварительный просмотр | Материалы для загрузки

Intel Chip Chat Podcast: Driving Tomorrow’s Data Center

Diane Bryant discusses a wide range of topics including what are the most exciting innovations in the data center surrounding cloud and big data.

Intel® Cloud Builders: HyTrust and Cloud Computing Security

HyTrust builds a cloud computing solution that ensures security from the lowest layers of the stack utilizing Trusted Compute Pools with VMware.