Advanced Technology to Boost Your Intelligent Systems

Discover technologies that lower costs, increase security, and simplify the management of embedded devices

Overview

The proliferation of interconnected smart devices has revolutionized how people and organizations interact, communicate, and work. As demand for devices with greater connectivity and functionality grows so does concern for power management, data transfer, and security. Intel® processors are designed to meet these challenges with advanced technology to simplify the deployment, management, and security of intelligent systems.

 

Intel® Active Management Technology

Intel® Active Management Technology (Intel® AMT) enables cost-effective remote management of networked embedded systems even when the systems are powered off. IT personnel can discover, heal, and protect networked embedded systems, without incurring the expense of onsite support.1

Remotely manage embedded systems with Intel® Active Management Technology >

 

Packet Processing on Intel® Architecture

With Intel® processors, it's possible to transition from using discrete architectures per major workload (application, control, packet, and signal processing) to a single architecture that consolidates the workloads into a more scalable and simplified solution. As a result, developers may be able to eliminate special-purpose hardware, such as network processors (NPUs), co-processors, application-specific integrated circuits (ASICs), and field-programmable gate arrays (FPGAs).

Consolidate workloads with packet processing on Intel® architecture >

 

Signal Processing on Intel® Architecture

Signal processing functions have often required special-purpose hardware, such as digital signal processors (DSPs) and field-programmable gate arrays (FPGAs). However, recent enhancements to Intel® architecture processors are providing developers an alternative: the ability to execute signal processing workloads on an Intel® processor.

See how signal processing on Intel® architecture can simplify embedded design development >

 

Intel® Thermal and Power Management Technology

Embedded developers understand the profound impact power consumption has on end-user utility bills, device form factor, and attainable performance, as well as battery runtime for mobile devices. A very effective way to manage power consumption is to put the system into a lower power state when the system workload decreases. Intel® processors support a number of power states that enable substantial power savings.

Improve battery life with Intel thermal and power management technology >

 

Intel® QuickAssist Accelerator Technology for Embedded Systems

As the complexity of networking and security applications continues to grow, systems need more and more computational resources for workloads, including cryptography, data compression, and pattern matching. Intel® QuickAssist Technology is designed to optimize the use and deployment of algorithm accelerators in these kinds of applications.

Boost embedded systems with Intel® QuickAssist Accelerator >

 

Hardware-Assisted Virtualization Technology

Hardware-based Intel® Virtualization Technology (Intel® VT)2 improves the fundamental flexibility and robustness of traditional software-based virtualization solutions by accelerating key functions of the virtualized platform. This efficiency offers benefits to the IT, embedded developer, and intelligent systems communities.

Design flexible intelligent systems with Intel® Virtualization Technology >

 

Intel® Trusted Execution Technology

Trusted compute pools with Intel® Trusted Execution Technology (Intel® TXT)3 support IT compliance by protecting virtualized data centers’ private, public, and hybrid clouds against attacks toward hypervisor and BIOS, firmware, and other pre-launch software components.

Build secure embedded designs with Intel® Trusted Execution Technology >


Intel® Data Protection Technology for Transactions

Using a combination of hardware authentication and end-to-end encryption, Intel® Data Protection Technology for Transactions is designed to secure data from the moment a transaction is initiated all the way through the storage of the encrypted information on retailer and bank server networks.

Protect payment transactions and consumer information from point-of-sale to server >

 

Enable Intelligent Designs

Intel® EDC support

Access technical and sales assistance, register for an Intel EDC account, or manage your account.

Contact us >

Learn more about Intel® products

Explore Intel® processors and associated chipsets >

Design Resources

Diskussionen

Produkt- und Leistungsinformationen

open

1. Für die Intel® Active-Management-Technik (Intel® AMT) ist eine Aktivierung und ein System mit Verbindung zu einem Firmennetzwerk, einem Chipsatz mit Intel®-AMT-Funktionalität sowie Netzwerkhardware und entsprechende Software erforderlich. Bei Notebooks kann es sein, dass über eine VPN-Verbindung, die auf dem Betriebssystem des Hosts basiert, bzw. bei einer Funkverbindung, im Akkubetrieb, im Standby- oder Ruhezustand und bei abgeschaltetem Gerät die Intel® AMT nicht verfügbar ist oder bestimmte Funktionen eingeschränkt sind. Die Ergebnisse können je nach Hardware, Setup und Konfiguration unterschiedlich ausfallen. Weitere Informationen siehe www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.

2. Für die Intel® Virtualisierungstechnik (Intel® VT) ist ein Computersystem erforderlich, dessen Intel® Prozessor(en), BIOS und Virtual-Machine-Monitor (VMM) für diese Technik geeignet sind. Bei einigen Anwendungen gilt diese Forderung zusätzlich für bestimmte Plattformsoftware. Die Funktions- und Leistungseigenschaften sowie andere Merkmale unterscheiden sich je nach Hardware- und Softwarekonfiguration, wobei ein BIOS-Update erforderlich sein kann. Softwareanwendungen sind möglicherweise nicht mit allen Betriebssystemen kompatibel. Weitere Informationen erhalten Sie beim Anbieter der Anwendung.

3. Kein Computer bietet unter allen Bedingungen absolute Sicherheit. Für die Intel® Trusted-Execution-Technik sind ein Computer mit Intel® Virtualisierungstechnik sowie ein für die Intel Trusted-Execution-Technik geeigneter Prozessor, Chipsatz, BIOS-Code, entsprechende Authenticated-Code-Module und ein mit der Intel Trusted-Execution-Technik kompatibles MLE (Measured Launched Environment) erforderlich. Voraussetzung für die Intel Trusted-Execution-Technik ist außerdem die Ausstattung des Systems mit einem TPM v1.2. Weitere Informationen siehe www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.