很抱歉，此 PDF 仅供下载
Secure the Enterprise with Intel® AES-NI: White PaperExecutive SummaryOur world today has insatiable demand for technology that can find, process, and communicate information and data in business environments, as well as in our personal lives. Protection of intellectual property, personal identities, and other sensitive information is more important than ever for data on the move and at rest.A large part of this protection is achieved through cryptography. Cryptography is the science of secret codes—transforming data from ordinary readable forms into unintelligible forms, thereby enabling the confidentiality of communication through an insecure or public/shared channel. Cryptography protects data against unauthorized parties by preventing its unauthorized use or alteration. The challenge is that traditionally, cryptography has been complex and computationally costly to execute.Generally speaking, a cryptographic system employs a mathematical or algorithmic process to transform readable plain text to coded “cipher text” and then convert that cipher text back to plain text. The algorithms used in the encryption/decryption processes are referred to as ciphers. The operation of a cipher is often controlled by a key or a set of keys. A number of factors, such as confidentiality, integrity, authenticity, and performance determine the end-user benefits of different encryption standards.Read the full Secure the Enterprise with Intel AES-NI White Paper.
下载 PDF 文档
Intel® Xeon® processors and Intel® SSDs boost performance, enhancing AutoCAD* 2013’s new workflow.
英特尔® 集成 I/O 将 I/O 控制器整合到处理器上以减少延迟。
英特尔市场推广事业部关键任务服务器领域市场经理 Michael Demshki 介绍了英特尔® 至强™ 处理器 7500 系列一个新增的可靠特性——机器校验架构恢复（MCA Recovery）。
英特尔® 博锐™ 技术，可以帮助IT经理通过远程管理平台对外设与拨号进行策略配置，从而有效防止外设泄密。
The Intel® Xeon® processor E7 v2 family supports real-time analytics with better performance.