SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Information Literacy Course




                 Intel® vPro™ technology




                    Robert Dennyson.A
                         BP08505


            PG Department Of Computer Science,
                   Sacred Heart College,
                       Tirupattur.
1|P ag e
Intel® vPro™ technology
Abstract
       Proven Intel® vPro™ technology is built into notebook and desktop PCs to extend the
reach and functionality of the management console and meet your critical IT challenges.

This hardware-based technology delivers security and manageability on the chip through:

   •   Intel® Centrino® 2 with vPro™ technology-based notebooks.
   •   Intel® Core™2 processor with vPro™ technology based desktop PCs.

    IT technicians can now protect, maintain, and manage notebook and desktop PCs – even if
the PC’s power is off, its OS is unresponsive, hardware (such as a hard drive) has failed, or
software agents are missing.

Overview
       IT administrators can quickly identify and contain more security threats, remotely
maintain PCs virtually anytime, take more accurate hardware/software inventories, quickly
resolve more software and OS problems down-the-wire, and accurately diagnose hardware
problems – all without leaving the service center. Technicians can even securely maintain,
update, troubleshoot, repair, and receive alerts from notebook and desktop PCs that are on an
open wired LAN outside the corporate firewall. With new Intel® Anti-Theft Technology (Intel®
AT) for notebooks, IT administrators can also be more assured that encrypted data is better
protected from unauthorized access if a system is lost or stolen. For Intel Centrino 2 with vPro
technology based notebooks, optional, integrated WiFi/WiMAX allow users to experience
broadband connectivity on the go for wireless access beyond today’s hot spots.

        With Intel vPro technology, IT managers benefit from lower support costs, easier and
more automated maintenance, improved security, increased compliance and more accurate
inventories. In turn, companies can see significantly fewer service depot and deskside visits, and
less interruption to business. The latest Intel-based notebook and desktop PCs also deliver
significantly improved performance for compute intensive applications and multitasking all in a
power efficient package that is Microsoft Windows 7* ready. These PCs also include hardware-
based capabilities that enable next-generation standard practice virtualization use cases, such as
OS and application streaming, as well as traditional virtualization in a faster, separate
environment. IT organizations can now spend less time on routine tasks, and can focus resources
where they are most needed.




2|P ag e
Notebook and desktop PCs with Intel® vPro™ technology
         Notebook and desktop PCs with Intel vPro technology deliver down the- wire security,
enhanced maintenance, and remote management designed right into the chip. Today’s IT
challenges Information technology (IT) managers have a critical need for capabilities that make
it easier to secure and manage notebook and desktop PCs anywhere, anytime. Key IT challenges
today include:

           •    A dramatic increase in data breaches, identity theft, malicious attacks on PCs, and
                computer theft.
            • A critical need to reduce user downtime caused by malicious attacks, maintenance
                IT work, diagnostics and repair, updates, upgrades, and other IT tasks.
            • Financial and legal pressure to accurately inventory assets.
            • Escalating demand for IT services — especially for mobile PCs — that strain IT
                budgets.
        Typical security and management solutions are software-based. Unfortunately, IT cannot
typically use software-based solutions to protect or manage a PC whose power is off, OS is
unresponsive, or management agents are missing. They also can’t securely manage or protect a
notebook or desktop PC in certain types of remote locations, such as over an open wired LAN
outside the corporate firewall. There is an increased need to establish secure, well-managed
environments for both mobile and desktop PCs; however, the cost of managing PCs has become
a significant percentage of the Total Cost of Ownership (TCO) of technology. A critical
capability that has proven to help IT do more with the resources they have is the ability to protect
and remotely manage both notebook and desktop PCs, regardless of power state, wired or
wireless state, the state of the OS, or the location of the PC.

Security and remote manageability built into the chip

       Designed for business, notebook and desktop PCs with Intel vPro technology deliver the
hardware-based capabilities IT organizations need to meet the increasing demands for their
services.
       • Intel® Centrino® 2 with vPro™ technology for notebooks.
       • Intel® Core™2 processor with vPro™ technology for desktop PCs.

Challenge                                          Solution   with           Intel®        vPro™
                                                   technology
Systems unmanageable when powered down             Remotely and securely monitor
                                                   and manage PCs anytime:
                                                   •Access the PC even if PC power is off, the OS
                                                   is unresponsive, management agents are
                                                   missing, or hardware (such as a hard drive) has
                                                   failed.
                                                   •Access critical system information (asset
                                                   information, event logs, BIOS information,
                                                   etc.) virtually anytime, even if PC power is off,

3|P ag e
to identify systems that need maintenance or
                                          service.
                                          •Remotely and securely power up PCs for
                                          maintenance and service.
Unsecured communications with PCs         More securely communicate with notebook
                                          and desktop PCs both inside or outside the
                                          corporate firewall:
                                          •Access PCs through a secure, out-of-band
                                          communication channel inside the corporate
                                          firewall.
                                          •Establish a secure tunnel to PCs on a wired
                                          open LAN even outside the corporate firewall.
Spiraling and costly deskside visits      Significantly reduce deskside visits with:
                                          •Remote remediation, even if management
                                          agents are missing or the OS is unresponsive.
                                          •Remote problem resolution, even if the OS is
                                          unresponsive or hardware (such as a hard
                                          drive) has failed.
Unprotected assets                        Protect assets better:
                                          •Remotely power up PCs anytime to help
                                          ensure more complete saturation for patching
                                          and other updates.
                                          •Built-in, programmable system defense filters
                                          and agent-presence checking for automated,
                                          hardware-based protection against viruses and
                                          attacks.
                                          •Built-in, programmable triggers and responses
                                          in notebooks to protect data and the PC after
                                          loss or theft of the system.
Lack of configuration compliance          Ensure compliance:
                                          •Remote inventory and agent presence
                                          checking as a hardware-based, automated,
                                          policy-based service.
Costly and time consuming manual Eliminate virtually all manual inventories:
inventories                               •Accurate, remote asset inventories, even if
                                          PCs are powered off or management agents are
                                          missing.
Undiscoverable assets                     Discover virtually all PCs:
                                          •Persistent device ID available anytime, even if
                                          PC power is off, the OS has been rebuilt,
                                          hardware or software configuration has
                                          changed, or the hard drive has been reimaged.
Proven technology for critical challenges




4|P ag e
The latest notebook and desktop PCs with Intel vPro technology are delivered with
proven hardware-based technology designed to address the top IT challenges in security and
manageability. These notebook and desktop PCs deliver even more powerful security,
maintenance, and management capabilities. These PCs also offer full, secure remote deployment
to help IT managers eliminate deskside visits during large roll-outs.

Access the PC anytime, anywhere

        The hardware-based capabilities of Intel vPro technology let authorized technicians
remotely access PCs that have traditionally been unavailable to the management console.
Technicians can use Intel vPro technology to manage the wired or wireless notebook or wired
desktop PC even if PC power is off, the OS is unresponsive, hardware (such as a hard drive) has
failed, or management agents are missing. Best of all, with a secure tunnel for communications
even outside the corporate firewall, technicians can remotely maintain, update, and repair both
notebook and desktop PCs even on an open wired LAN, at sites that don’t have a proxy server.

Intel vPro technology: Summary of benefits
        The new notebook and desktop PCs are designed for business in an advanced, energy-
efficient package with 64-bit multi-core performance and 64-bit integrated graphics support that
is Microsoft Windows 7 ready. These PCs deliver:

v Security
        So you can help ensure compliance down-the-wire on virtually all PCs with Intel vPro
technology; ensure that third-party security software is available when needed; remotely identify
viruses, worms, and other threats faster; and stop those threats more effectively. Intel vPro
technology supports 802.1x, Cisco Self-Defending Network* (Cisco SDN), or Microsoft
Network Access Protection* (Microsoft NAP), so you can maintain and manage these PCs even
in secure network environments. Intel® Anti-Theft Technology (Intel® AT) for notebooks can
help prevent unauthorized access to encrypted data if a notebook is lost or stolen.

v Improved maintenance

       So you can streamline processes, increase automation, and dramatically improve
technician efficiencies for monitoring and maintenance of all PCs with Intel vPro technology
during a scheduled maintenance cycle.

v Remote problem-resolution

       So you can accurately diagnose hardware problems and troubleshoot and resolve more
software and OS problems, including OS rebuilds, without leaving the service center.

v Remote inventory and discovery

       To help you eliminate manual inventories, improve compliance with government and
industry regulations, and reduce management costs.

5|P ag e
v Remote configuration during deployment

       So you can remotely configure both notebook and desktop PCs without a deskside visit.

v Energy savings

       Companies are finding that Intel vPro technology is helping deliver substantial power
savings by letting IT be more effective in power management. IT can use Intel vPro technology
to securely and remotely power systems up for maintenance and management anytime, so PCs
can be powered down when not in use. Combined with third-party management applications, the
new generation of Intel vPro technology allows IT administrators to simplify maintenance,
eliminate a significant number of deskside visits, reduce overspending on existing resources, and
minimize interruptions to business.


What’s New…
       Advancements in Intel vPro technology include the integration of new capabilities into
both notebook and desktop PCs. Additional features have been added to improve security and
manageability both inside and outside the corporate firewall. Along with significant performance
gains over previous generation PCs, key advancements in the latest PCs with Intel vPro
technology include:

   •   Support for Microsoft NAP (as well as existing support for 802.1x, PXE, and Cisco
       SDN) in both notebook and desktop PCs, so you can use out-of-band management even
       in secure network
   •   Environments.

   •   Secure tunnel for communications with the management console for both notebook and
       desktop PCs operating on an open, wired LAN outside the corporate firewall.

   •   PC-initiated secure communications to the IT console for wired PCs over an open LAN,
       outside the corporate firewall, for specific requests for help or service:

           ü Hotkey feature that lets a user quickly establish a secure connection from PC to
              management console — whether from inside or outside the corporate firewall —
              for help or system servicing.
           ü PC-initiated request for remote, prescheduled maintenance, even if the notebook
              or desktop system is asleep or powered down.
           ü Automated remote IT alert, so the PC can automatically and securely report
              critical events to the management console even from outside the corporate
              firewall.
   •   Intel Anti-Theft Technology, an optional feature for notebooks, which provides IT with
       programmable triggers and “poison pill” responses that, can be used to disable the PC
       and/or prevent unauthorized access to encrypted data if a notebook is lost or stolen.

6|P ag e
•   Auditor oversight for protected event logs, in addition to the traditional ability for a
       system administrator to view and/or erase standard logs.

   •   Virtualization support, including for next-generation OS and application streaming
       models into secure virtual environments, on both notebook and desktop PCs via Intel®
       Virtualization Technology (Intel® VT).

Architecture
       In computer engineering, computer architecture is the conceptual design and fundamental
operational structure of a computer system. It is a blueprint and functional description of
requirements (especially speeds and interconnections) and design implementations for the
various parts of a computer — focusing largely on the way by which the central processing unit
(CPU) performs internally and accesses addresses in memory.

        IT Service Management (ITSM) is a way of managing large scale technology systems by
centering the management decisions around the customer's perspective of the contribution of IT
and related systems to the actual business. It essentially is a framework that is used for the
interaction of IT and business users.




                                     vPro Architecture – AMT 4.0



Best for business:
Remote maintenance, management, and security virtually anytime
Intel vPro technology capabilities are available virtually anytime,
even if:

   •   PC power is off.
   •   OS is unresponsive.
   •   Management agents are missing.
   •   Hardware (such as a hard drive) has failed.
7|P ag e
Most capabilities are available even for wired PCs outside the corporate firewall, while
some capabilities are also available for wireless notebooks in the presence of a host OS-based
VPN. IT administrators now have more control where they need it: at the remote IT console.

        Combined with third-party management tools such as management consoles and
scripting, Intel vPro technology makes it easier to secure, maintain, and manage PCs. The results
can be dramatically reduced site visits; substantially improved technician efficiencies;
streamlined diagnostics, repair, and remediation; and more automation
of processes. In turn, this can help IT managers free up resources for other projects.

Secure and manage PCs outside the corporate firewall

       Intel vPro technology delivers both new and proven capabilities to secure and maintain
PCs even when they are outside the corporate firewall. For example, these notebook and desktop
systems support a “client-initiated” or PC-initiated secure tunnel for communication outside the
corporate firewall for specific requests for help or service.




                    All capabilities are available for notebook and desktop PCs wired and on AC power

       Hardware-based communication and capabilities are available virtually any time for
wired, AC-powered PCs. All key capabilities are also available for wireless notebooks within the
corporate network even if the PC is powered off, its OS is inoperable, or the notebook is asleep.
(Some capabilities are active only when the notebook is awake and performing a particular task.)
All capabilities are available for wired PCs outside the corporate network on an open LAN.
Agent presence checking, hardware-asset tracking, and remote configuration are available even
when a PC is awake, working properly, and connected to the corporate network through a host
OS-based VPN.

        PC-initiated communications can be requested from in-band or out-of-band (OOB). In-
band, a communications agent passes the request to the hardware and firmware. After that,
secure communications are established through the TLS-secured OOB communications channel
to the IT console. OOB communications can be established either by the PC itself (requesting

8|P ag e
service or passing a critical alert) or established by the user by interrupting the boot process at
BIOS with a command key or hotkey which then connects the PC to the IT console for service.

PC-initiated communications can be particularly useful for:

   •   Out-of-band remote diagnostics and repair. Since the PC can initiate secure
       communications even if the OS is down, users can get faster service without having to
       make a service-depot call.

   •   Remote scheduled system maintenance, including patching, system defense filter updates,
       audits/event logs, and inventory reporting.

   •   Alerting, so IT technicians can be quickly notified when a problem occurs — such as a
       notebook falling out of compliance, or hard disk filling to capacity — so they can
       proactively maintain and service PCs before an OS or application becomes inoperable.


Managing wired or wireless PCs
       PCs with Intel vPro technology are designed to keep your workforce mobile, managed,
and secure, whether working on a notebook or desktop PC. They are also designed to make
management easier for both wired and wireless states:

   •   Identify notebook or desktop PC power state remotely.
   •   Maintain and manage the notebook in both wired and wireless states.
   •   Communicate more securely with notebook or desktop PCs in an open wired LAN —
       even outside the corporate firewall.
   •   Protect a notebook’s data and its OS even if the system is lost or stolen.
   •   Secure, manage, and maintain PCs remotely — without user participation.


Manage PCs regardless of power state

         PCs with Intel vPro technology are designed to give IT technicians greater remote
visibility into the system in both wired and wireless states. Technicians can remotely power up a
wired or wireless notebook or wired desktop PC almost anytime. (In order to prevent unexpected
battery use in notebooks, remote power-up is not applicable to the battery-powered, wireless
sleep state). Technicians can also reboot the PC, use secure console redirection, and use other
critical maintenance and management capabilities of Intel vPro technology for wired or wireless
PCs.

Ready for the future


9|P ag e
Notebook and desktop PCs with Intel vPro technology are stable, standardized platforms
with broad industry support, ready for future operating systems and applications.

    •   64-bit multi-core processor: Windows Vista and Windows 7 ready. PCs with Intel vPro
        technology handle today’s OSs and are ready for Windows Vista and Windows 7, which
        has a heavily threaded architecture, updated Windows Display Driver Mode (WDDM),
        built-in security features like Windows Defender,* BitLocker drive encryption, and other
        advanced features.

    •   Multithreaded CPU: Ready for Office 2007.* Intel Core 2 processors provide the
        performance needed for the next-generation of Microsoft Office,* including the
        performance for intense, always-on (by default) text-based search indexing, which is
        heavily multithreaded.

    •   64-bit graphics support: No need for a discrete graphics card. PCs with Intel vPro
        technology have built-in 64-bit graphics for an outstanding Windows Aero* experience.
        There is no need for a discrete graphics card with these PCs.

Applications
Modeling and Animation

        The additional color precision available with the 12-bitper-component frame buffer in the
VPro graphics architecture brings enhanced realism to the digital content-creation process. This
enhanced realism translates directly into increased workflow productivity. Visual effects, which
previously required a time-consuming software render to preview, can now be viewed in real
time as they are created.

Blending

        In the process of creating digital content, blending is utilized to create special effects such
as surface transparency. This technique, also known as alpha blending, uses the A value in the
RGBA quartet to determine how the new color for a pixel is to be combined with the current
pixel color. Without blending operations, each new pixel color simply would overwrite the old
one in the frame buffer. Thus, by combining the two colors using an alpha-blend equation, a
portion of the original color will show through. In the VPro graphics architecture, these blending
calculations are performed with 12 bits of precision per component versus the only 8 bits
available on a typical desktop graphics system. As a result, the Silicon Graphics Tezro and
Silicon Graphics Fuel visual workstations have 16 times the alpha precision of a typical desktop
system, with 4,096 discrete alpha values compared with only 256 discrete alpha values available
on a typical desktop system. This yields more realistic results that are much closer to those that
will be obtained during the final software render performed when going to tape or film.

Lighting



10 | P a g e
In the graphics rendering pipeline, lighting calculations of final vertex color values are
performed in 3D prior to the viewport transformation to 2D coordinates. These final color values
calculated by the XFORM unit, within the VPro graphics architecture, have 12 bits of precision
per color component. As a result, applications that utilize the graphics subsystem
hardware to calculate lighting effects will produce higher-quality images on SGI® systems with
the VPro graphics architecture than on typical graphics systems that support only 8 bits of
precision per color component. Again, this technology provides more realistic results without
needing to software render. This improves the workflow by reducing the time required to
complete a project.

Film Compositing

       The support for RGBA12 in the Silicon Graphics Tezro visual workstation, Silicon
Graphics Fuel visual workstation, and the SGI Onyx 3000 series with Infinite Performance
graphics provides several benefits for high-end film and video compositing applications. Digital
compositing combines multiple images from various sources such as human-generated elements,
computer-generated images, and scanned images from film or video into a single image.

Color Space Conversion

        The most common type of material used in digital compositing is live-action footage
scanned or digitized from film or video. Film and video content captured for use in compositing
is typically stored in 16-bit YUV422 format to economize disk-space usage. However,
compositing operations are generally performed in RGBA. This requires a color space
conversion from YUV422 to RGBA. The color space conversion between YUV422, a nonlinear
color space, into linear RGBA can produce banding in dark-colored regions of an image if an
insufficient color resolution is used. In the past, in order to maintain
the required 10–12 bits of color information per component, the color space conversion was
performed in software on the host CPU. With the VPro graphics architecture, the color space
conversion can now be performed quickly and easily in the 12-bit-percomponent on-chip
graphics-imaging pipeline using the color matrix functionality of OpenGL.

Attached Alpha

        Typical graphics systems support only RGBA8, or if they do support more bits of
precision per color component, they support only RGBA with 10 bits of precision for RGB and 2
bits of precision for alpha. Or, if they do support 12 bits of precision per component like the
MXE graphics subsystem previously available on

CAD Styling

       For CAD styling applications, the 12-bit-per-component capability translates into a more
accurate understanding of surface contours. Surface details can now be viewed interactively
without the need to prerender models. On SGI systems with the VPro graphics architecture with
12 bits of precision per color component, this interactivity shortens development time by
eliminating the time required to produce high-quality renderings of models and reducing the
need for physical prototypes.

11 | P a g e
Finite Element Analysis

       Finite element analysis applications rely on the color precision of the graphics system to
accurately reflect the data and provide a precise visual representation of the numerical results. In
applications of this type, data variations are shown graphically by varying the color over a range.
With 68 billion addressable colors versus only 16 million on typical desktop workstations, the
Silicon Graphics Tezro and Silicon Graphics Fuel visual workstations provide high-quality
images that are easily reviewed and understood. As a result, engineering decisions can be made
more quickly, reducing product development time.

Conclusion
        Intel is uniquely positioned to provide critical business and IT capabilities on a notebook
or desktop PC through extensive, breakthrough research and development, leading-edge
manufacturing, and a unique ability to catalyze broad ISV support for creative solutions. For IT
organizations, the result is a professional-grade system designed from hardware to software with
proven, built-in capabilities that resolve the most critical challenges of business and IT:
improved, proactive security and remote manageability with energy-efficient performance. With
Intel built in, IT organizations can address a wider range of enterprise needs and shift resources
from managing and securing their notebook and desktop PCs, to accelerating business into the
future.


Location:

 S.       Name of the
                              Issue       Selected/                          Located Information (with Page Nos.)
 No.       Magazine
                                          Rejected

 1     Oxfordjournals      Security       Selected
                                                      http://comjnl.oxfordjournals.org/cgi/search?fulltext=vpro&x=security&y=0

 2     Springer            Features       Selected
                                                      http://www.springer.com/computer/computer+imaging/journal/11263
                           Security
 3     InformatIK                         Rejected
                           Leaks                      http://www.informatik.uni-trier.de/~ley/db/journals/Threats_vpro
                           Introduction
 4     CSCJournals                        Selected
                           Vpro                       http://www.cscjournals.org/csc/description.php?JCode=IJCSS
                           History &
 5     MIT Press                          Selected
                           Contents                   http://www.mitpressjournals.org/

 6     SGI.com             Applications   Selected
                                                      http://www.sgi.com/pdfs/3660.pdf

 7     Intel.com           Architecture   Selected
                                                      http://communities.intel.com/docs/DOC-1757

 8     VPro.nl             Design         Selected
                                                      www.vpro.nl/attachment.db/Sonic_Architecture2.doc?23220323
                           Hack into
 9     Computerworld.com                  Rejected
                           VPro                       http://www.computerworld.com/s/article/9124958/Researchers_hack_into_Intel_s_vPro




12 | P a g e

Contenu connexe

Tendances

Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.Keshav Murthy
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelIntel IT Center
 
TCO & TVT
TCO & TVTTCO & TVT
TCO & TVTLeoCurtis
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutionsCanon Business CEE
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II TechMike Sawall
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your DesktopsScriptLogic
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environmentajitambekar
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkawayrichardebowers
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finalBen Ohana
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010Vadimazz
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMSCharles Stevenson
 
WiFi for the Hospitality Industry
WiFi for the Hospitality IndustryWiFi for the Hospitality Industry
WiFi for the Hospitality IndustryGuest Internet
 
Fusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and SupportFusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and SupportPanda Security
 

Tendances (20)

Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
TCO & TVT
TCO & TVTTCO & TVT
TCO & TVT
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
 
Thin Clients webex
Thin Clients webexThin Clients webex
Thin Clients webex
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-final
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
WiFi for the Hospitality Industry
WiFi for the Hospitality IndustryWiFi for the Hospitality Industry
WiFi for the Hospitality Industry
 
Fusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and SupportFusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and Support
 

Similaire à V Pro Bp08505 Phase Iii Edited

How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...Spiceworks
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink AndreAndrzejSzadzins
 
Desmi remote access internet uplink ver1
Desmi remote access internet uplink ver1Desmi remote access internet uplink ver1
Desmi remote access internet uplink ver1AndreAndrzejSzadzins
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Desktop Virtualization made Simpler
Desktop Virtualization made SimplerDesktop Virtualization made Simpler
Desktop Virtualization made SimplerDeskStream, Inc
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small bizRamon Ray
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-nyjcaire
 

Similaire à V Pro Bp08505 Phase Iii Edited (20)

How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
 
Virtual Desktops Brochure
Virtual Desktops BrochureVirtual Desktops Brochure
Virtual Desktops Brochure
 
IoTHub_Edge (1).pptx
IoTHub_Edge (1).pptxIoTHub_Edge (1).pptx
IoTHub_Edge (1).pptx
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink
 
Desmi remote access internet uplink ver1
Desmi remote access internet uplink ver1Desmi remote access internet uplink ver1
Desmi remote access internet uplink ver1
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Desktop Virtualization made Simpler
Desktop Virtualization made SimplerDesktop Virtualization made Simpler
Desktop Virtualization made Simpler
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small biz
 
2_16_2016_Resume
2_16_2016_Resume2_16_2016_Resume
2_16_2016_Resume
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
G3sixty Overview
G3sixty OverviewG3sixty Overview
G3sixty Overview
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-ny
 

Plus de SHC

Perform brute force
Perform brute forcePerform brute force
Perform brute forceSHC
 
AJAX ASP.Net
AJAX ASP.NetAJAX ASP.Net
AJAX ASP.NetSHC
 
C++ plus data structures, 3rd edition (2003)
C++ plus data structures, 3rd edition (2003)C++ plus data structures, 3rd edition (2003)
C++ plus data structures, 3rd edition (2003)SHC
 
Inside Asp.Net Web Matrix
Inside Asp.Net Web MatrixInside Asp.Net Web Matrix
Inside Asp.Net Web MatrixSHC
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedSHC
 
XForms with Linux
XForms with LinuxXForms with Linux
XForms with LinuxSHC
 
XForms
XFormsXForms
XFormsSHC
 
Rails
RailsRails
RailsSHC
 
Call
CallCall
CallSHC
 
Action Mailer
Action MailerAction Mailer
Action MailerSHC
 
Ruby Security
Ruby SecurityRuby Security
Ruby SecuritySHC
 
Web Services
Web ServicesWeb Services
Web ServicesSHC
 
Pragmatic Agile Web Development With Rails.3rd Edition.2009
Pragmatic   Agile Web Development With Rails.3rd Edition.2009Pragmatic   Agile Web Development With Rails.3rd Edition.2009
Pragmatic Agile Web Development With Rails.3rd Edition.2009SHC
 
Ruby Basics
Ruby BasicsRuby Basics
Ruby BasicsSHC
 
Ruby Installation
Ruby InstallationRuby Installation
Ruby InstallationSHC
 
Mysql Statments
Mysql StatmentsMysql Statments
Mysql StatmentsSHC
 
Mysql Fun
Mysql FunMysql Fun
Mysql FunSHC
 
Mysql
MysqlMysql
MysqlSHC
 
MySQL Built-In Functions
MySQL Built-In FunctionsMySQL Built-In Functions
MySQL Built-In FunctionsSHC
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile ComputingSHC
 

Plus de SHC (20)

Perform brute force
Perform brute forcePerform brute force
Perform brute force
 
AJAX ASP.Net
AJAX ASP.NetAJAX ASP.Net
AJAX ASP.Net
 
C++ plus data structures, 3rd edition (2003)
C++ plus data structures, 3rd edition (2003)C++ plus data structures, 3rd edition (2003)
C++ plus data structures, 3rd edition (2003)
 
Inside Asp.Net Web Matrix
Inside Asp.Net Web MatrixInside Asp.Net Web Matrix
Inside Asp.Net Web Matrix
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
XForms with Linux
XForms with LinuxXForms with Linux
XForms with Linux
 
XForms
XFormsXForms
XForms
 
Rails
RailsRails
Rails
 
Call
CallCall
Call
 
Action Mailer
Action MailerAction Mailer
Action Mailer
 
Ruby Security
Ruby SecurityRuby Security
Ruby Security
 
Web Services
Web ServicesWeb Services
Web Services
 
Pragmatic Agile Web Development With Rails.3rd Edition.2009
Pragmatic   Agile Web Development With Rails.3rd Edition.2009Pragmatic   Agile Web Development With Rails.3rd Edition.2009
Pragmatic Agile Web Development With Rails.3rd Edition.2009
 
Ruby Basics
Ruby BasicsRuby Basics
Ruby Basics
 
Ruby Installation
Ruby InstallationRuby Installation
Ruby Installation
 
Mysql Statments
Mysql StatmentsMysql Statments
Mysql Statments
 
Mysql Fun
Mysql FunMysql Fun
Mysql Fun
 
Mysql
MysqlMysql
Mysql
 
MySQL Built-In Functions
MySQL Built-In FunctionsMySQL Built-In Functions
MySQL Built-In Functions
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Dernier

Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 

Dernier (20)

Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 

V Pro Bp08505 Phase Iii Edited

  • 1. Information Literacy Course Intel® vPro™ technology Robert Dennyson.A BP08505 PG Department Of Computer Science, Sacred Heart College, Tirupattur. 1|P ag e
  • 2. Intel® vPro™ technology Abstract Proven Intel® vPro™ technology is built into notebook and desktop PCs to extend the reach and functionality of the management console and meet your critical IT challenges. This hardware-based technology delivers security and manageability on the chip through: • Intel® Centrino® 2 with vPro™ technology-based notebooks. • Intel® Core™2 processor with vPro™ technology based desktop PCs. IT technicians can now protect, maintain, and manage notebook and desktop PCs – even if the PC’s power is off, its OS is unresponsive, hardware (such as a hard drive) has failed, or software agents are missing. Overview IT administrators can quickly identify and contain more security threats, remotely maintain PCs virtually anytime, take more accurate hardware/software inventories, quickly resolve more software and OS problems down-the-wire, and accurately diagnose hardware problems – all without leaving the service center. Technicians can even securely maintain, update, troubleshoot, repair, and receive alerts from notebook and desktop PCs that are on an open wired LAN outside the corporate firewall. With new Intel® Anti-Theft Technology (Intel® AT) for notebooks, IT administrators can also be more assured that encrypted data is better protected from unauthorized access if a system is lost or stolen. For Intel Centrino 2 with vPro technology based notebooks, optional, integrated WiFi/WiMAX allow users to experience broadband connectivity on the go for wireless access beyond today’s hot spots. With Intel vPro technology, IT managers benefit from lower support costs, easier and more automated maintenance, improved security, increased compliance and more accurate inventories. In turn, companies can see significantly fewer service depot and deskside visits, and less interruption to business. The latest Intel-based notebook and desktop PCs also deliver significantly improved performance for compute intensive applications and multitasking all in a power efficient package that is Microsoft Windows 7* ready. These PCs also include hardware- based capabilities that enable next-generation standard practice virtualization use cases, such as OS and application streaming, as well as traditional virtualization in a faster, separate environment. IT organizations can now spend less time on routine tasks, and can focus resources where they are most needed. 2|P ag e
  • 3. Notebook and desktop PCs with Intel® vPro™ technology Notebook and desktop PCs with Intel vPro technology deliver down the- wire security, enhanced maintenance, and remote management designed right into the chip. Today’s IT challenges Information technology (IT) managers have a critical need for capabilities that make it easier to secure and manage notebook and desktop PCs anywhere, anytime. Key IT challenges today include: • A dramatic increase in data breaches, identity theft, malicious attacks on PCs, and computer theft. • A critical need to reduce user downtime caused by malicious attacks, maintenance IT work, diagnostics and repair, updates, upgrades, and other IT tasks. • Financial and legal pressure to accurately inventory assets. • Escalating demand for IT services — especially for mobile PCs — that strain IT budgets. Typical security and management solutions are software-based. Unfortunately, IT cannot typically use software-based solutions to protect or manage a PC whose power is off, OS is unresponsive, or management agents are missing. They also can’t securely manage or protect a notebook or desktop PC in certain types of remote locations, such as over an open wired LAN outside the corporate firewall. There is an increased need to establish secure, well-managed environments for both mobile and desktop PCs; however, the cost of managing PCs has become a significant percentage of the Total Cost of Ownership (TCO) of technology. A critical capability that has proven to help IT do more with the resources they have is the ability to protect and remotely manage both notebook and desktop PCs, regardless of power state, wired or wireless state, the state of the OS, or the location of the PC. Security and remote manageability built into the chip Designed for business, notebook and desktop PCs with Intel vPro technology deliver the hardware-based capabilities IT organizations need to meet the increasing demands for their services. • Intel® Centrino® 2 with vPro™ technology for notebooks. • Intel® Core™2 processor with vPro™ technology for desktop PCs. Challenge Solution with Intel® vPro™ technology Systems unmanageable when powered down Remotely and securely monitor and manage PCs anytime: •Access the PC even if PC power is off, the OS is unresponsive, management agents are missing, or hardware (such as a hard drive) has failed. •Access critical system information (asset information, event logs, BIOS information, etc.) virtually anytime, even if PC power is off, 3|P ag e
  • 4. to identify systems that need maintenance or service. •Remotely and securely power up PCs for maintenance and service. Unsecured communications with PCs More securely communicate with notebook and desktop PCs both inside or outside the corporate firewall: •Access PCs through a secure, out-of-band communication channel inside the corporate firewall. •Establish a secure tunnel to PCs on a wired open LAN even outside the corporate firewall. Spiraling and costly deskside visits Significantly reduce deskside visits with: •Remote remediation, even if management agents are missing or the OS is unresponsive. •Remote problem resolution, even if the OS is unresponsive or hardware (such as a hard drive) has failed. Unprotected assets Protect assets better: •Remotely power up PCs anytime to help ensure more complete saturation for patching and other updates. •Built-in, programmable system defense filters and agent-presence checking for automated, hardware-based protection against viruses and attacks. •Built-in, programmable triggers and responses in notebooks to protect data and the PC after loss or theft of the system. Lack of configuration compliance Ensure compliance: •Remote inventory and agent presence checking as a hardware-based, automated, policy-based service. Costly and time consuming manual Eliminate virtually all manual inventories: inventories •Accurate, remote asset inventories, even if PCs are powered off or management agents are missing. Undiscoverable assets Discover virtually all PCs: •Persistent device ID available anytime, even if PC power is off, the OS has been rebuilt, hardware or software configuration has changed, or the hard drive has been reimaged. Proven technology for critical challenges 4|P ag e
  • 5. The latest notebook and desktop PCs with Intel vPro technology are delivered with proven hardware-based technology designed to address the top IT challenges in security and manageability. These notebook and desktop PCs deliver even more powerful security, maintenance, and management capabilities. These PCs also offer full, secure remote deployment to help IT managers eliminate deskside visits during large roll-outs. Access the PC anytime, anywhere The hardware-based capabilities of Intel vPro technology let authorized technicians remotely access PCs that have traditionally been unavailable to the management console. Technicians can use Intel vPro technology to manage the wired or wireless notebook or wired desktop PC even if PC power is off, the OS is unresponsive, hardware (such as a hard drive) has failed, or management agents are missing. Best of all, with a secure tunnel for communications even outside the corporate firewall, technicians can remotely maintain, update, and repair both notebook and desktop PCs even on an open wired LAN, at sites that don’t have a proxy server. Intel vPro technology: Summary of benefits The new notebook and desktop PCs are designed for business in an advanced, energy- efficient package with 64-bit multi-core performance and 64-bit integrated graphics support that is Microsoft Windows 7 ready. These PCs deliver: v Security So you can help ensure compliance down-the-wire on virtually all PCs with Intel vPro technology; ensure that third-party security software is available when needed; remotely identify viruses, worms, and other threats faster; and stop those threats more effectively. Intel vPro technology supports 802.1x, Cisco Self-Defending Network* (Cisco SDN), or Microsoft Network Access Protection* (Microsoft NAP), so you can maintain and manage these PCs even in secure network environments. Intel® Anti-Theft Technology (Intel® AT) for notebooks can help prevent unauthorized access to encrypted data if a notebook is lost or stolen. v Improved maintenance So you can streamline processes, increase automation, and dramatically improve technician efficiencies for monitoring and maintenance of all PCs with Intel vPro technology during a scheduled maintenance cycle. v Remote problem-resolution So you can accurately diagnose hardware problems and troubleshoot and resolve more software and OS problems, including OS rebuilds, without leaving the service center. v Remote inventory and discovery To help you eliminate manual inventories, improve compliance with government and industry regulations, and reduce management costs. 5|P ag e
  • 6. v Remote configuration during deployment So you can remotely configure both notebook and desktop PCs without a deskside visit. v Energy savings Companies are finding that Intel vPro technology is helping deliver substantial power savings by letting IT be more effective in power management. IT can use Intel vPro technology to securely and remotely power systems up for maintenance and management anytime, so PCs can be powered down when not in use. Combined with third-party management applications, the new generation of Intel vPro technology allows IT administrators to simplify maintenance, eliminate a significant number of deskside visits, reduce overspending on existing resources, and minimize interruptions to business. What’s New… Advancements in Intel vPro technology include the integration of new capabilities into both notebook and desktop PCs. Additional features have been added to improve security and manageability both inside and outside the corporate firewall. Along with significant performance gains over previous generation PCs, key advancements in the latest PCs with Intel vPro technology include: • Support for Microsoft NAP (as well as existing support for 802.1x, PXE, and Cisco SDN) in both notebook and desktop PCs, so you can use out-of-band management even in secure network • Environments. • Secure tunnel for communications with the management console for both notebook and desktop PCs operating on an open, wired LAN outside the corporate firewall. • PC-initiated secure communications to the IT console for wired PCs over an open LAN, outside the corporate firewall, for specific requests for help or service: ü Hotkey feature that lets a user quickly establish a secure connection from PC to management console — whether from inside or outside the corporate firewall — for help or system servicing. ü PC-initiated request for remote, prescheduled maintenance, even if the notebook or desktop system is asleep or powered down. ü Automated remote IT alert, so the PC can automatically and securely report critical events to the management console even from outside the corporate firewall. • Intel Anti-Theft Technology, an optional feature for notebooks, which provides IT with programmable triggers and “poison pill” responses that, can be used to disable the PC and/or prevent unauthorized access to encrypted data if a notebook is lost or stolen. 6|P ag e
  • 7. Auditor oversight for protected event logs, in addition to the traditional ability for a system administrator to view and/or erase standard logs. • Virtualization support, including for next-generation OS and application streaming models into secure virtual environments, on both notebook and desktop PCs via Intel® Virtualization Technology (Intel® VT). Architecture In computer engineering, computer architecture is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional description of requirements (especially speeds and interconnections) and design implementations for the various parts of a computer — focusing largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory. IT Service Management (ITSM) is a way of managing large scale technology systems by centering the management decisions around the customer's perspective of the contribution of IT and related systems to the actual business. It essentially is a framework that is used for the interaction of IT and business users. vPro Architecture – AMT 4.0 Best for business: Remote maintenance, management, and security virtually anytime Intel vPro technology capabilities are available virtually anytime, even if: • PC power is off. • OS is unresponsive. • Management agents are missing. • Hardware (such as a hard drive) has failed. 7|P ag e
  • 8. Most capabilities are available even for wired PCs outside the corporate firewall, while some capabilities are also available for wireless notebooks in the presence of a host OS-based VPN. IT administrators now have more control where they need it: at the remote IT console. Combined with third-party management tools such as management consoles and scripting, Intel vPro technology makes it easier to secure, maintain, and manage PCs. The results can be dramatically reduced site visits; substantially improved technician efficiencies; streamlined diagnostics, repair, and remediation; and more automation of processes. In turn, this can help IT managers free up resources for other projects. Secure and manage PCs outside the corporate firewall Intel vPro technology delivers both new and proven capabilities to secure and maintain PCs even when they are outside the corporate firewall. For example, these notebook and desktop systems support a “client-initiated” or PC-initiated secure tunnel for communication outside the corporate firewall for specific requests for help or service. All capabilities are available for notebook and desktop PCs wired and on AC power Hardware-based communication and capabilities are available virtually any time for wired, AC-powered PCs. All key capabilities are also available for wireless notebooks within the corporate network even if the PC is powered off, its OS is inoperable, or the notebook is asleep. (Some capabilities are active only when the notebook is awake and performing a particular task.) All capabilities are available for wired PCs outside the corporate network on an open LAN. Agent presence checking, hardware-asset tracking, and remote configuration are available even when a PC is awake, working properly, and connected to the corporate network through a host OS-based VPN. PC-initiated communications can be requested from in-band or out-of-band (OOB). In- band, a communications agent passes the request to the hardware and firmware. After that, secure communications are established through the TLS-secured OOB communications channel to the IT console. OOB communications can be established either by the PC itself (requesting 8|P ag e
  • 9. service or passing a critical alert) or established by the user by interrupting the boot process at BIOS with a command key or hotkey which then connects the PC to the IT console for service. PC-initiated communications can be particularly useful for: • Out-of-band remote diagnostics and repair. Since the PC can initiate secure communications even if the OS is down, users can get faster service without having to make a service-depot call. • Remote scheduled system maintenance, including patching, system defense filter updates, audits/event logs, and inventory reporting. • Alerting, so IT technicians can be quickly notified when a problem occurs — such as a notebook falling out of compliance, or hard disk filling to capacity — so they can proactively maintain and service PCs before an OS or application becomes inoperable. Managing wired or wireless PCs PCs with Intel vPro technology are designed to keep your workforce mobile, managed, and secure, whether working on a notebook or desktop PC. They are also designed to make management easier for both wired and wireless states: • Identify notebook or desktop PC power state remotely. • Maintain and manage the notebook in both wired and wireless states. • Communicate more securely with notebook or desktop PCs in an open wired LAN — even outside the corporate firewall. • Protect a notebook’s data and its OS even if the system is lost or stolen. • Secure, manage, and maintain PCs remotely — without user participation. Manage PCs regardless of power state PCs with Intel vPro technology are designed to give IT technicians greater remote visibility into the system in both wired and wireless states. Technicians can remotely power up a wired or wireless notebook or wired desktop PC almost anytime. (In order to prevent unexpected battery use in notebooks, remote power-up is not applicable to the battery-powered, wireless sleep state). Technicians can also reboot the PC, use secure console redirection, and use other critical maintenance and management capabilities of Intel vPro technology for wired or wireless PCs. Ready for the future 9|P ag e
  • 10. Notebook and desktop PCs with Intel vPro technology are stable, standardized platforms with broad industry support, ready for future operating systems and applications. • 64-bit multi-core processor: Windows Vista and Windows 7 ready. PCs with Intel vPro technology handle today’s OSs and are ready for Windows Vista and Windows 7, which has a heavily threaded architecture, updated Windows Display Driver Mode (WDDM), built-in security features like Windows Defender,* BitLocker drive encryption, and other advanced features. • Multithreaded CPU: Ready for Office 2007.* Intel Core 2 processors provide the performance needed for the next-generation of Microsoft Office,* including the performance for intense, always-on (by default) text-based search indexing, which is heavily multithreaded. • 64-bit graphics support: No need for a discrete graphics card. PCs with Intel vPro technology have built-in 64-bit graphics for an outstanding Windows Aero* experience. There is no need for a discrete graphics card with these PCs. Applications Modeling and Animation The additional color precision available with the 12-bitper-component frame buffer in the VPro graphics architecture brings enhanced realism to the digital content-creation process. This enhanced realism translates directly into increased workflow productivity. Visual effects, which previously required a time-consuming software render to preview, can now be viewed in real time as they are created. Blending In the process of creating digital content, blending is utilized to create special effects such as surface transparency. This technique, also known as alpha blending, uses the A value in the RGBA quartet to determine how the new color for a pixel is to be combined with the current pixel color. Without blending operations, each new pixel color simply would overwrite the old one in the frame buffer. Thus, by combining the two colors using an alpha-blend equation, a portion of the original color will show through. In the VPro graphics architecture, these blending calculations are performed with 12 bits of precision per component versus the only 8 bits available on a typical desktop graphics system. As a result, the Silicon Graphics Tezro and Silicon Graphics Fuel visual workstations have 16 times the alpha precision of a typical desktop system, with 4,096 discrete alpha values compared with only 256 discrete alpha values available on a typical desktop system. This yields more realistic results that are much closer to those that will be obtained during the final software render performed when going to tape or film. Lighting 10 | P a g e
  • 11. In the graphics rendering pipeline, lighting calculations of final vertex color values are performed in 3D prior to the viewport transformation to 2D coordinates. These final color values calculated by the XFORM unit, within the VPro graphics architecture, have 12 bits of precision per color component. As a result, applications that utilize the graphics subsystem hardware to calculate lighting effects will produce higher-quality images on SGI® systems with the VPro graphics architecture than on typical graphics systems that support only 8 bits of precision per color component. Again, this technology provides more realistic results without needing to software render. This improves the workflow by reducing the time required to complete a project. Film Compositing The support for RGBA12 in the Silicon Graphics Tezro visual workstation, Silicon Graphics Fuel visual workstation, and the SGI Onyx 3000 series with Infinite Performance graphics provides several benefits for high-end film and video compositing applications. Digital compositing combines multiple images from various sources such as human-generated elements, computer-generated images, and scanned images from film or video into a single image. Color Space Conversion The most common type of material used in digital compositing is live-action footage scanned or digitized from film or video. Film and video content captured for use in compositing is typically stored in 16-bit YUV422 format to economize disk-space usage. However, compositing operations are generally performed in RGBA. This requires a color space conversion from YUV422 to RGBA. The color space conversion between YUV422, a nonlinear color space, into linear RGBA can produce banding in dark-colored regions of an image if an insufficient color resolution is used. In the past, in order to maintain the required 10–12 bits of color information per component, the color space conversion was performed in software on the host CPU. With the VPro graphics architecture, the color space conversion can now be performed quickly and easily in the 12-bit-percomponent on-chip graphics-imaging pipeline using the color matrix functionality of OpenGL. Attached Alpha Typical graphics systems support only RGBA8, or if they do support more bits of precision per color component, they support only RGBA with 10 bits of precision for RGB and 2 bits of precision for alpha. Or, if they do support 12 bits of precision per component like the MXE graphics subsystem previously available on CAD Styling For CAD styling applications, the 12-bit-per-component capability translates into a more accurate understanding of surface contours. Surface details can now be viewed interactively without the need to prerender models. On SGI systems with the VPro graphics architecture with 12 bits of precision per color component, this interactivity shortens development time by eliminating the time required to produce high-quality renderings of models and reducing the need for physical prototypes. 11 | P a g e
  • 12. Finite Element Analysis Finite element analysis applications rely on the color precision of the graphics system to accurately reflect the data and provide a precise visual representation of the numerical results. In applications of this type, data variations are shown graphically by varying the color over a range. With 68 billion addressable colors versus only 16 million on typical desktop workstations, the Silicon Graphics Tezro and Silicon Graphics Fuel visual workstations provide high-quality images that are easily reviewed and understood. As a result, engineering decisions can be made more quickly, reducing product development time. Conclusion Intel is uniquely positioned to provide critical business and IT capabilities on a notebook or desktop PC through extensive, breakthrough research and development, leading-edge manufacturing, and a unique ability to catalyze broad ISV support for creative solutions. For IT organizations, the result is a professional-grade system designed from hardware to software with proven, built-in capabilities that resolve the most critical challenges of business and IT: improved, proactive security and remote manageability with energy-efficient performance. With Intel built in, IT organizations can address a wider range of enterprise needs and shift resources from managing and securing their notebook and desktop PCs, to accelerating business into the future. Location: S. Name of the Issue Selected/ Located Information (with Page Nos.) No. Magazine Rejected 1 Oxfordjournals Security Selected http://comjnl.oxfordjournals.org/cgi/search?fulltext=vpro&x=security&y=0 2 Springer Features Selected http://www.springer.com/computer/computer+imaging/journal/11263 Security 3 InformatIK Rejected Leaks http://www.informatik.uni-trier.de/~ley/db/journals/Threats_vpro Introduction 4 CSCJournals Selected Vpro http://www.cscjournals.org/csc/description.php?JCode=IJCSS History & 5 MIT Press Selected Contents http://www.mitpressjournals.org/ 6 SGI.com Applications Selected http://www.sgi.com/pdfs/3660.pdf 7 Intel.com Architecture Selected http://communities.intel.com/docs/DOC-1757 8 VPro.nl Design Selected www.vpro.nl/attachment.db/Sonic_Architecture2.doc?23220323 Hack into 9 Computerworld.com Rejected VPro http://www.computerworld.com/s/article/9124958/Researchers_hack_into_Intel_s_vPro 12 | P a g e