Skip navigation

Download Now

 

Air Products.jpgAir Products decided to refresh more than 18,000 employee client systems worldwide to upgrade the operating system and take advantage of the latest processing technologies. The IT group selected desktops and laptops with Intel® Core™ i5 and i7 vPro™ processors running Microsoft Windows* 7. Administrators expect Intel® vPro™ technology will help them resolve more software-related issues remotely, while security technologies from Intel will help protect data stored on client systems and the network. The new processors will also help deliver the performance for a full range of tasks, from running productivity software to conducting processor-intensive engineering simulations, while preparing the enterprise for desktop virtualization.


“Intel vPro technology will enable us to access system files before the OS boots, which should help us resolve a greater percentage of software problems remotely,” explained Bob Elward, director of infrastructure engineering for Air Products.


For the whole story, download our new Air Products business success story. You can find more business success stories like this one on Intel.com and iTunes.   And to keep up to date on the latest business success stories, be sure to follow ReferenceRoom on Twitter.

 

*Other names and brands may be claimed as the property of others.

In preparing for some future events and training courses, a request was made to easily reset the client systems to original state.

 

A little bit of background - the "Reset" required each individual client's hardware to be reimaged back to original state.   No virtual machines on the client (long story why this requirement... but know that each client's "start state" is unique).

 

I took a simple approach - reimage for the operating system partition using a locally stored image.   To initiate the process, use the IDE-Redirection capability of Intel vPro Technology delivering a scripted bootable ISO image to the client.

 

A few additional steps were needed - ensuring a separate partition was large enough to store the "backup" image, creating the bootable ISO image, using 2-stage IDER boot to accelerate the boot\load time, and so forth.

 

But the result - client systems were reset in less than 10 minutes.   Here's a quick screenshot of the client, running Ghost software to restore partition image stored in the second operating system partition to "reset" the first partition.

ghost partition.png

 

Not too bad... I'm sure there are a few great ideas out there how to further optimize this scenario.   One I had - do this with an Intel SSD (I'll have to check and see just how much that helps)

Today, more than ever before, employees are demanding the ability to work from anywhere at any time. Whether you’re dealing with an executive road warrior or an employee needing a more flexible work environment, IT organizations are challenged to address these needs without compromising security. 

 

Citrix and Intel have worked closely together to address these concerns. Citrix XenClient Enterprise provides IT complete security, control, and centralized management.  And the combination of XenClient Enterprise with Laptops based on 3rd Generation Intel Core vPro Processors is an ideal solution for enterprises looking to enable mobile workstyles.

 

Join me and Dan McCall, Citrix Vice President, responsible for XenClient for a webinar on Tuesday, July 24, from 2:00 PM - 3:00 PM EDT. We’ll talk about how XenClient Enterprise and 3rd Genertion Intel Core vPro Processors can help you address these needs. You can use the following link to find out more or to register.

 

Register Here!

The contribution of new technology can make a big difference to a non-profit organization that’s used to running on a barebones IT system.  Earlier this month, Eric Townsend, Intel director of MSP and SMB Marketing, took part in a day-long IT transformation for Mission Arlington, a Texas ministry that provides assistance to up to 1000 people a day.  Watch this video, and see the good things that can happen when people and organizations work together for the benefit of others.

 

The makeover brought together Intel, the Coffee Coaching team and some 100 volunteers from HTG to deploy a new state-of-the art IT system for Mission Arlington. The system was built with contributed technology from Intel, Microsoft and HP, and included new PCs running Intel® vPro Technology to provide the mission with increased IT security and the capacity for remote management and repair.

 

Now, Mission Arlington can focus on its services and ministry with faster and easier access to information, plus make use of more tools and resources for reaching and serving people in need, all while trusting that its data is safe.

 

It’s all part of doing the right thing and giving back to the community. Mission Arlington now has the perfect IT architecture for their needs, so they can better serve the needs of others.

samsung.jpgCompanies worldwide are choosing Intel® Core™ vPro® processors for both the power and the manageability their enterprises need. Read about some of them in these new business success stories:

  • Afval-Energie: A waste management company gains an immediate return on investment (ROI) with an Intel-designed intelligent desktop.
  • Samsung SDS: Deploying an Intel Core i7 vPro processor-based platform allows for more stable remote management of a digital signage system.
  • Stratix: Ruggedized laptops powered by Intel Core vPro processors enhance processing speed, reliability, and battery life.

 

You can find more business success stories like these on both Intel.com and iTunes. And to keep up to date on the latest business success stories, be sure to follow ReferenceRoom on Twitter.

 

*Other names and brands may be claimed as the property of others.

A new version of Intel® SCS is now available!

Version 8.1 (download) is an update to version 8.0.  New installations of SCS do not require 8.0 to be installed first, as 8.1 is a full package. 

Interested to see what's new? Watch a demo of Intel® 8.1

 

Version 8.1 Highlights

  • Windows 8 Professional clients (in legacy desktop mode)
  • Detection and fix for hostname FQDN mismatches
  • Discovery and  configuration of business Ultrabooks
  • Migration utilities for SCS 5.x and 8.0
  • Compatible with AMT 8.1 ME firmware

 

Detailed Highlights

  • Windows 8 Pro “metro mode” client configuration is not supported at this time.
  • Hostname FQDN mismatches can be detected by system discovery with the /ReportToRCS parameter. 
  • Ultrabooks without a wired LAN port on their system will be configured over wireless in client control mode.  Upgrading to admin control mode requires a PKI certificate, and is supported via the “movetoacm” upgrade process (introduced in SCS 7.1)
  • Migration utilities include CLI and wizard.  Systems provisioned with a management console cannot “migrate” to using SCS with these utilities.  The following types of migrations are supported.
  • Unconfiguration of AMT active directory objects automatically done
  • Mandatory encryption when creating or editing XML files (non-database mode)
  • Separate power policy for wireless adapters can be defined

 

Where do I download SCS?

You can go to the SCS product page to obtain the latest version (and download the newly updated product brief).  Developers and ISV’s can obtain the Implementation and Reference Guide and sample code from the SCS page on the vPro Developer Community.

 

Have feedback?

If you have any feedback on SCS, please visit our support community: Intel® Setup and Configuration Software

Watch Now


Cummins is a corporation made up of complementary business units that design, manufacture, distribute, and service engines and related technologies. See how it gets valuable out-of-band management support capabilities for its helpdesk using Intel® vPro™ technology and Intel® Active Management Technology in our new Cummins video.

 
You can find more business success stories on Intel.com and iTunes.  And to keep up to date on the latest business success stories, follow ReferenceRoom on Twitter.

The Intel Event Response Tool (or ERT since we love our acronyms) is a tool for creating simple vPro workflows and some basic automation around those workflows. There are two primary tools available; a script creator that supports simple 1:1 workflows, and an event response tool (great name eh?) that will listen for events and execute scripts based on those events.

 

The good news is that we’re releasing the tools and all the source code with the tools. The even better news is that the event listener plugins and action plugins have an API so you can create your own if you like. Currently there are plugins for basic functionality (serial over lan, IDER, system defense, power management, etc), but if you wanted to create a plugin that would say, integrate with your trouble ticket system, you can (it’s all .NET based code).

 

You can download ERT from here: Download Intel ERT

 

Thanks!

 

--Richard

Today's hackers have moved well beyond the viruses and Trojan horses that attack at the operating system level. Recent rootkit attacks and other new techniques have suddenly made tokens and smart cards insufficient at blocking unauthorized access to the client's IT system. This has become a critical issue as remote users and cloud computing are becoming commonplace. So how can you combat these cutting-edge hackers?

Amy Doescher, Enterprise Security Product Marketing Engineer at Intel, and Marty Jost, senior manager of product marketing at Symantec, will explain how you can take authentication to the next level. Register for our webinar to learn how embedded, hardware-based authentication solutions can help you:

  • Fend off attacks that circumvent traditional software-only-based security measures.
  • Step up authentication with embedded hardware-based storage of authentication tokens and certificates.
  • Prevent screen scraping and other malware attacks by verifying a human presence at the PC.
  • Reduce costs associated with lost smart cards or tokens, and minimize IT staff time associated with traditional token and smart card provisioning.

 

Marty and Amy will also discuss how our new solutions can assist you in disaster recovery scenarios. They'll even be answering questions live, so be sure to bring a question or two to ask. It's a great chance to get answers directly from industry experts on IT security.

 

 

 

Intel IT Center Talk to an Expert webinar series
IT Security and Cost Control without Compromise: A Fresh Look at Authentication
Thursday, July 19, 2012
9 a.m. Pacific Daylight Time

Register now >

I had a chance to check out the Lenovo M92p Tiny a few weeks ago and it made a pretty big impression.  By way of introduction, the M92P Lenovo’s latest desktop PC.  It’s based the Intel’s 3rd Generation Core i5 vPro processor.  It has all the vPro management and security features plus Lenovo’s TVTs, or ThinkVantage Technologies.  What’s cool  is Lenovo has managed to pack all this into an amazingly small 1 liter desktop.  To give you a mental image, for those of you that golf, that’s about the size a box of a dozen golf balls.  It's small size, and energy efficiency allow for nearly silent operation.  The tiny can easily sit beside your monitor, or even mount to the back of a flat panel.

 

M92M92p_Tiny_details_01.jpg

 

Displays are another strong point.  With its Intel integrated graphics, the Tiny is also able to support up to three independent monitors, or four monitors in what Lenovo refers to as their Quad Mosaic Mode.  Quad Mosaic essentially allows four monitors to function as one.  With this capability, a single image to be enlarged to displayed across four monitors.  The tiny comes with a regular hard drive, and SSD as well as a diskless option.  The diskless option can come in handy for those of you who are interested in taking advantage of desktop virtualization.

The Intel® vPro™ Technology Resource Kit

 

The Intel® vPro™ Technology Resource Kit is a downloader tool that is a compilation of tools, utilities, and supporting documentation to simply educate you and easily walk you through the implementation of Intel vPro technology. Using the easy-to-use downloader tool, you can choose which items to download to your computer. Simply check the items you want and the downloader will get the latest version for you from the Intel website.

 

This kit provides Intel customers with the resources they need in ONE simple location to do the following:

  • Understand the value of Intel vPro technology to make informed purchasing decisions
  • Understand how to prepare and resource configuration projects for success
  • Implement solutions that take advantage of Intel vPro technology using step-by-step instructions and free sample code

 

 

Download Intel® vPro™ Technology Resource Kit Here Now!

 

screenshot.png

Today's hackers have moved well beyond the viruses and Trojan horses that attack at the operating system level. Recent rootkit attacks and other new techniques have suddenly made tokens and smart cards insufficient at blocking unauthorized access to the client's IT system. This has become a critical issue as remote users and cloud computing are becoming commonplace. So how can you combat these cutting-edge hackers?

Amy Doescher, Enterprise Security Product Marketing Engineer at Intel, and Marty Jost, senior manager of product marketing at Symantec, will explain how you can take authentication to the next level. Register for our webinar to learn how embedded, hardware-based authentication solutions can help you:

  • Fend off attacks that circumvent traditional software-only-based security measures.
  • Step up authentication with embedded hardware-based storage of authentication tokens and certificates.
  • Prevent screen scraping and other malware attacks by verifying a human presence at the PC.
  • Reduce costs associated with lost smart cards or tokens, and minimize IT staff time associated with traditional token and smart card provisioning.

  Marty and Amy will also discuss how our new solutions can assist you in disaster recovery scenarios.

They'll even be answering questions live, so be sure to bring a question or two to ask. It's a great chance to get answers directly from industry experts on IT security. L

Intel IT Center Talk to an Expert webinar series
IT Security and Cost Control without Compromise: A Fresh Look at Authentication
Thursday, July 19, 2012
9 a.m. Pacific Daylight Time

Register now >

Filter Blog

By date: By tag: