La versione del browser in uso non è consigliata per questo sito.Prendere in considerazione l'aggiornamento alla versione più recente del proprio browser facendo clic su uno dei link seguenti.
Questo PDF è disponibile solo per il download
4th Generation Intel® Core™ Processor for Military, Aerospace, GovernmentAdvancing Mission SuccessThe 4th generation Intel® Core™ processor family enables improved decision making in critical military, aerospace, and government environmentsChallenges• Mission-critical applications in military, aerospace, and government (Mag) environments require the highest possible performance at the lowest-size weight power possible, without compromising the stringent security and anti-tamper requirements.• Mission-critical applications are moving from 2-D to 3-D, adding richer content for better, faster intelligence gathering. Richer graphics content, including increased use of video and HD content, requires a new level of performance to meet growing compute-intensive demands.• Economic considerations require that large technology investments be as future-proofed as possible, securing long-term gains in security, efficiency, performance per watt, and other benefits.• Mag personnel require long-lasting, portable devices that enable consistent responsiveness to operational needs, when and where they arise.• Greater optimization of the rising volumes of data must be achieved via improved analytics able to turn rising data volumes into mission value.Read the full 4th Generation Intel® Core™ Processor for Military, Aerospace, Government Solution Brief.
Download del PDF
AOpen’s solutions, powered by 4th gen Intel® Core™ processors, deliver responsive content.
Demos tools, oscilloscope, platform, waveform analysis, SigTest software, and reports. (v.001, Mar. 2010)
Webinar details AltiVec* SIMD macros translator migration to Intel® processors. (v.1, May 2009)
Ishu Verma discusses Android* SDK and NDK toolsets as well as the benefits of using NDK. (v.001, Oct. 2011)
Mark Hatle describes creating a custom embedded distribution on any architecture. (v.001, Oct. 2011)
A discussion of experimental techniques for rapid mitigation of phishing and spam. (v.1 June 2009)