Wissens- und Ressourcen-Hub

{"limitDisplayedContent":"showAll","collectionRelationTags":{"relations":{"OR":["etm-52ca462e290248fb99cfadce4bb7c8a3","etm-77D03322-D0B8-4592-BF23-A1D15DB9C809"]},"featuredIds":[]},"collectionId":"649342","resultPerPage":24.0,"filters":[{"facetId":"@stm_10355_de","field":"stm_10355_de","type":"hierarchical","basePath":"Subject","displayName":"Subject","deprecated":false,"rootFilter":"","position":0},{"facetId":"ContentType","type":"ContentType","deprecated":true,"name":"ContentType","position":1},{"facetId":"lastupdated","type":"lastupdated","deprecated":true,"name":"lastupdated","position":2},{"facetId":"@stm_10382_de","field":"stm_10382_de","type":"specific","basePath":"Content Format","displayName":"Content Format","deprecated":false,"rootFilter":"","position":3}],"coveoRequestHardLimit":"1000","accessDetailsPagePath":"/content/www/us/en/secure/design/internal/access-details.html","cardView":true,"sorting":"Newest","defaultImagesPath":"/content/dam/www/public/us/en/images/uatable/default-icons","coveoMaxResults":5000,"coveoSplitSize":0,"fpgaFacetRootPaths":"{\"fpgadevicefamily\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® Programmable Devices\"],\"quartusedition\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® Quartus Software\"],\"quartusaddon\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® Quartus Software - Add-ons\"],\"fpgaplatform\":[\"Primary Content Tagging\",\"Intel® FPGAs\",\"Intel® FPGA Platforms\"]}","newWrapperPageEnabled":true,"descendingSortingForNumericalFacetsName":"[\"Intel® Quartus® Prime Pro Edition\",\"Intel® Quartus® Prime Lite Edition\",\"Intel® Quartus® Prime Standard Edition\",\"Quartus® II Subscription Edition\",\"Quartus® II Web Edition\"]","columnsConfiguration":{"idColumn":false,"dateColumn":false,"versionColumn":false,"contentTypeColumn":false,"columnsMaxSize":0},"dynamicColumnsConfiguration":[{"name":"DynamicColumn_id","type":"id","gtv":"ID","width":60,"selected":true},{"name":"DynamicColumn_date","type":"date","gtv":"Datum","width":60,"selected":true},{"name":"DynamicColumn_version","type":"version","gtv":"Version","width":135,"selected":true}],"curatedFilter":[{"title":"Analytics","tags":[{"relationship":"OR","value":"Analytics","id":"etm-b47068d7211b481d82c7e8dd89401e95"},{"relationship":"OR","value":"Business Intelligence (BI)","id":"etm-0f220aad4c3c43228398c28824e70a0d"},{"relationship":"OR","value":"Big Data","id":"etm-cfa052abf4e04bc4b945fe1a5680777e"}]},{"title":"Artificial Intelligence","tags":[{"relationship":"OR","value":"Artificial Intelligence (AI)","id":"etm-b543349dfd0747fa99ab2673f4042144"},{"relationship":"OR","value":"Computer Vision","id":"etm-519e906f30694108a34f26dc16ade899"},{"relationship":"OR","value":"Visual Computing","id":"etm-7cda0f2103a2415695048712a04656ad"}]},{"title":"Client Computing","tags":[{"relationship":"OR","value":"Client Computing","id":"etm-a6dab7fe162a4e049e340e13b15f2116"},{"relationship":"OR","value":"PC Upgrades","id":"etm-f182185f77194c08a4ae28d52b4987c2"}]},{"title":"Cloud Computing","tags":[{"relationship":"OR","value":"Cloud Computing","id":"etm-74aaa36986364101bb78ec870c47f854"}]},{"title":"Data Center","tags":[{"relationship":"OR","value":"Data Centers (DC)","id":"etm-98a3d91f714742ec812ea877dcbeb6a3"},{"relationship":"OR","value":"Enterprise Architecture (EA)","id":"etm-ef78584dfb23464cb63b44d12cc7b047"},{"relationship":"OR","value":"Enterprise Computing","id":"etm-8bf3c28714744016969acdad9e9b10f6"},{"relationship":"OR","value":"High Performance Computing (HPC)","id":"etm-4251d377e2514f7c8ec9e883b0808ab4"},{"relationship":"OR","value":"IT Organizations","id":"etm-24b87d4740654591841cf0fbc5dad94b"},{"relationship":"OR","value":"IT Performance","id":"etm-c06fc13c1811479495e77c5edc37de62"},{"relationship":"OR","value":"IT Transformation","id":"etm-1fc40b797fce4a889ebcc4d4bb31ed6c"},{"relationship":"OR","value":"Platform Analysis, Tuning, and Performance Monitoring","id":"etm-6a1bcf86524f4d57b1136c3a8e2e22a8"},{"relationship":"OR","value":"Reliability, Availability, and Serviceability (RAS)","id":"etm-565290bd2ee149ed88ac117da04ee269"},{"relationship":"OR","value":"Storage and Memory","id":"etm-74785a5c34194531b44150f984099db2"},{"relationship":"OR","value":"Sustainability","id":"etm-c9f44fb0240b4e9f875c57f531de9818"}]},{"title":"Network, Edge and IoT","tags":[{"relationship":"OR","value":"Connectivity","id":"etm-3792ac612ef8435cbecf1f94b5637ff4"},{"relationship":"OR","value":"Edge Computing","id":"etm-e8e76f55df59440f85ed0062d74af2a4"},{"relationship":"OR","value":"Intelligent Edge","id":"etm-1a133ac8ca014bf1aa9800e190345ba2"},{"relationship":"OR","value":"Internet of Things (IoT)","id":"etm-a77f4a815e0a456fa6a2d7bea980749d"},{"relationship":"OR","value":"Media Delivery","id":"etm-6aabb899c4924660a7bc78ef372ca230"},{"relationship":"OR","value":"Networking","id":"etm-8c59181bf7404ee79892189493e6e721"},{"relationship":"OR","value":"Porting","id":"etm-4bdbc971cc27478191bba23194814c39"},{"relationship":"OR","value":"Signal Processing","id":"etm-41dd5a820d7f483ea5aa8add3e31b5c4"}]},{"title":"Sales Enablement","tags":[{"relationship":"OR","value":"Sales and Marketing","id":"etm-ad9cbeea7e5a4f8f9cf118d6c90a4fc6"},{"relationship":"OR","value":"Brand Hub Branded Stories","id":"etm-7e89bb8fd2084164b4ab8976f3249be1"},{"relationship":"OR","value":"Business Competitors","id":"etm-088cdac88f1c4c908754518493c7c4f0"},{"relationship":"OR","value":"Partner Enablement","id":"etm-660150be0e814362bbf1d8ea8d022612"},{"relationship":"OR","value":"Sales Enablement","id":"etm-46cfa547fb8f4cfeb1cdf08dae9c79e9"}]},{"title":"Security","tags":[{"relationship":"OR","value":"Information Security (InfoSec)","id":"etm-8eebdce4c4354b37beace399e432f0f1"},{"relationship":"OR","value":"Security","id":"etm-57fc8d86ed9b48d7a9fc68cadbc767aa"},{"relationship":"OR","value":"Confidential computing","id":"etm-faa0acf8f2f04b76b2cfb5eb2155d796"},{"relationship":"OR","value":"Data Protection","id":"etm-42542d1248d94c4c95210884ac9a6784"},{"relationship":"OR","value":"Enterprise Security","id":"etm-def88d388b9c43b882b1de4cf4874c87"},{"relationship":"OR","value":"Identity and Access Management (IAM)","id":"etm-4c008b67cf92413dad81ed0cca0425f6"},{"relationship":"OR","value":"Internet of Things (IoT) Security","id":"etm-7a63ef423be743bb9ce97344f77a62a7"},{"relationship":"OR","value":"Product Security Incident Response Team (PSIRT)","id":"etm-e8bb1f254c1e4d2aaa7a7c24f2a11813"}]},{"title":"Software","tags":[{"relationship":"OR","value":"Code Modernization","id":"etm-916bce6f0d514702b3527fdce1864f40"},{"relationship":"OR","value":"Open Ecosystem and Software Solutions","id":"etm-b8e118c3e0d64163aa3fef724a09a306"},{"relationship":"OR","value":"Software Development","id":"etm-5358fb6ef892436188a93ba0384b1143"}]}],"updateCollateralMetadataEnabled":true,"relatedAssetsEnable":true,"disableExpandCollapseAll":false,"enableRelatedAssetsOnExpandAll":false}

Der Inhalt dieser Seite ist eine Kombination aus menschlicher und computerbasierter Übersetzung des originalen, englischsprachigen Inhalts. Dieser Inhalt wird zum besseren Verständnis und nur zur allgemeinen Information bereitgestellt und sollte nicht als vollständig oder fehlerfrei betrachtet werden. Sollte eine Diskrepanz zwischen der englischsprachigen Version dieser Seite und der Übersetzung auftreten, gilt die englische Version. Englische Version dieser Seite anzeigen.