System Data Verification Protects Embedded Applications
We are sorry, This PDF is available in download format only
VideosView More Videos
UOL Utility Computing with...
UOL discusses the security and migration benefits of Intel® Trusted Execution Technology.
Channel Creation and Player...
This video details the steps of creating a channel, and registering a new player to this newly...
First Three Zone Campaign
A demonstration of how to create campaigns with multiple display zones, including: zone sizing...
See how Intel is intelligently connecting systems of all types (1:50)
New Business for Perceptual...
Mark Yahiro discusses developing devices that interpret cues for intuitive perceptual...
Reduce cost, complexity, and footprint consolidating on real-time virtualization. (v.2, Feb....
Simple Campaign Tutorial
This introductory video walks through setting up a very simple campaign in Intel® Retail...
Learn about the "when" of RCM, including public schedules, importing/exporting schedules,... (6:34)
Get all the details about how to create playlists and playlist types, including ordered,... (7:09)
A detailed overview of tickers, including how to create tickers in campaign zones, creating...
Conditional Play: Categories
Learn about the benefits and use of conditional play by category, category creation, assigning...
This tutorial explains how an external resource can interrupt an Intel® RCM campaign by...
User Roles and Permissions
This video explains Intel® RCM's security schema of users, roles, and permissions.
Introduction to Managing Media
Get all the specifics about the role of a typical media manager (a role that creates and...
Learn how the command entity works, including creating a command entity, using command details...