Investigating SRAM Pufs in Large Cpus and Gpus

Total Page:16

File Type:pdf, Size:1020Kb

Investigating SRAM Pufs in Large Cpus and Gpus Investigating SRAM PUFs in large CPUs and GPUs Citation for published version (APA): Aubel, Van, P., Bernstein, D. J., & Niederhagen, R. F. (2015). Investigating SRAM PUFs in large CPUs and GPUs. (Cryptology ePrint Archive; Vol. 2015/760). IACR. Document status and date: Published: 01/01/2015 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim. Download date: 23. Sep. 2021 Investigating SRAM PUFs in large CPUs and GPUs Pol Van Aubel1, Daniel J. Bernstein2;3, and Ruben Niederhagen3 1 Radboud University Digital Security Group P.O. Box 9010, 6500 GL Nijmegen, The Netherlands [email protected] 2 Department of Computer Science University of Illinois at Chicago Chicago, IL 60607{7045, USA [email protected] 3 Department of Mathematics and Computer Science Technische Universiteit Eindhoven P.O. Box 513, 5600 MB Eindhoven, The Netherlands [email protected] Abstract. Physically unclonable functions (PUFs) provide data that can be used for cryptographic purposes: on the one hand ran- domness for the initialization of random-number generators; on the other hand individual fingerprints for unique identification of spe- cific hardware components. However, today's off-the-shelf personal computers advertise randomness and individual fingerprints only in the form of additional or dedicated hardware. This paper introduces a new set of tools to investigate whether intrinsic PUFs can be found in PC components that are not ad- vertised as containing PUFs. In particular, this paper investigates AMD64 CPU registers as potential PUF sources in the operating- system kernel, the bootloader, and the system BIOS; investigates the CPU cache in the early boot stages; and investigates shared memory on Nvidia GPUs. This investigation found non-random non-fingerprinting behavior in several components but revealed us- able PUFs in Nvidia GPUs. Keywords: Physically unclonable functions, SRAM PUFs, ran- domness, hardware identification. This work was supported by the European Commission through the ICT pro- gram under contract INFSO-ICT-284833 (PUFFIN), by the Netherlands Organ- isation for Scientific Research (NWO) under grant 639.073.005, by the U.S. Na- tional Science Foundation under grant 1018836, and by the Dutch electricity transmission system operator TenneT TSO B.V. Permanent ID of this document: 2580a85505520618ade3cd462a3133702ae673f7. Date: 2015.07.29. 1 Introduction Commonly used consumer computing devices, such as desktop computers and laptop computers, need a multitude of cryptographic primitives, e.g., crypto- graphic operations with secret keys, keyed hash functions, secure randomness, and, in some cases, remote attestation and identification capabilities. In this pa- per we focus on two seemingly conflicting aspects: The generation of random bit strings, which requires indeterministic behavior, and the generation of unique identifiers, which requires deterministic behavior. Randomness is required for several purposes in cryptography. For example, random bit sequences are used to generate secret encryption keys and nonces in cryptographic protocols in order to make them impossible for an attacker to guess. Many cryptographic primitives assume the presence of a secure random source; however, most processing chips are designed to be deterministic and sources of randomness are rare [12, 15]. Unique identifiers can be used to deterministically derive an identity-based cryptographic key. This key can be used for authentication and data protection. For example, it would be possible to use these keys as an anti-counterfeiting measure. Bloomberg Business reports in [13] that \an `epidemic' of bogus chips, routers, and computers costs the electronics industry up to $100 billion annu- ally", and Business Wire reports in [1] that \as many as one in ten IT products sold may actually be counterfeit". Having the ability to identify a chip as legiti- mate by comparing some PUF to a database provided by the manufacturer may help reduce this problem. As another example, it is possible to use this key for hard disk encryption: The hard drive, i.e., the bootloader, operating system, and user data, are encrypted with this secret intrinsic key and can only be decrypted if the unique identifier is available. The identifier thus must be protected from unauthorized access. Currently, these features are provided by accompanying the device with ded- icated hardware: randomness is offered, e.g., by the RDRAND hardware random number generator; identification, e.g., by a Trusted Platform Module (TPM). However, these solutions can only be used if a dedicated TPM is available in the device or if the CPU supports the RDRAND instruction which only recently was introduced with Intel's Ivy Bridge CPUs. Furthermore, they do not help in cases where the cryptographic key should be bound to the identity of a specific chip itself. However, for these cryptographic functionalities additional hardware is not necessarily required: randomness as well as identification can be derived from individual physical characteristics inherent to a silicon circuit by the use of phys- ically unclonable functions (PUFs). PUFs can be derived from, e.g., ring oscil- lators [10], signal delay variations [14, 23], flip-flops [16], latches [22], and static random-access memory (SRAM) [11,4]. While most of these require dedicated circuits, SRAM is already used for other purposes in many general-purpose, mass-market chips. SRAM PUFs were initially identified in FPGAs. The PUF characteristics of SRAM are derived from the uninitialized state of SRAM immediately after power-up. When unpowered SRAM cells are powered up, they obtain a value of 0 with a certain probability P0, or 1 with probability P1 = 1 − P0. The individual probabilities of each SRAM cell depend on minor manufacturing differences and are quite stable over time. Some of the cells have a probability close to 1 for either P0 or P1 and thus tend to give the same value at every power-up. Because of this stability, and because the pattern of this stability is different for every block of SRAM, they can be used for fingerprinting. Other cells have a probability close to 0:5 for both P0 and P1 and thus tend to give a different value at each power-up. Since their behavior is unstable, they are a good source for randomness. Before the power-up state of SRAM can be used as PUF, an enrollment phase is required: the SRAM is powered up several times in order to measure which SRAM cells are suitable for randomness and which for fingerprinting. For the actual use of the SRAM PUF some postprocessing is performed, e.g., a feedback loop can be used in order to avoid bias in the generated random bit sequence and an error correction code in order to compensate for occasional bit errors in the fingerprint. At TrustED 2013, researchers demonstrated in [24] that SRAM-based PUFs exist in various brands of popular microcontrollers, such as AVR and ARM, which are commonplace in mobile and embedded devices. More recently [20] used this to secure a mobile platform. We want to investigate the possible presence of PUFs in commonly used desktop and laptop computers. For this purpose, the two most attractive tar- gets are the Central Processing Unit (CPU) and the Graphics Processing Unit (GPU), since they are present in almost every desktop machine commonly in use, and they are the chips most directly accessible by the software running on the machine. Research into PUFs on GPUs was suggested independently by [7]. The most common CPU architecture today for large computing devices, such as laptop computers, desktop computers, and servers, is the AMD64 architec- ture. The AMD64 architecture, also known as x86-64 and x64, was introduced by AMD in 1999 as a backwards-compatible successor to the pervasive x86 ar- chitecture. SRAM is used in abundance in the caches and registers of AMD64 CPUs. Therefore, they may carry intrinsic PUFs. In [18] the authors propose an instruction-set extension to utilize this SRAM to build a secure trusted com- puting environment within the CPU. However, research on existing PUFs in AMD64 CPUs appears non-existent. The obvious question is whether such PUF capabilities are currently also exhibited by (i.e., available and accessible in) x86 and AMD64 CPUs. The documentation of these processors contains a number of statements which suggest that | even though such SRAM PUFs may exist | they are impossible to access from software running on those CPUs.
Recommended publications
  • Multiprocessor Initialization of INTEL SOC in Coreboot
    Multiprocessor Initialization OF INTEL SOC in Coreboot Pratik Prajapati ([email protected]) Subrata Banik ([email protected]) 1 Agenda • Intel Multiple Processor (MP) Initialization • Coreboot + Intel FSP Boot Flow • Problem with existing model • Solution space • Design • Future Scope 2 Intel Multiple Processor (MP) Initialization • The IA-32 architecture (beginning with the P6 family processors) defines a multiple-processor (MP) initialization protocol called the Multiprocessor Specification Version 1.4. • The MP initialization protocol has the following important features: • It supports controlled booting of multiple processors without requiring dedicated system hardware. • It allows hardware to initiate the booting of a system without the need for a dedicated signal or a predefined boot processor. • It allows all IA-32 processors to be booted in the same manner, including those supporting Intel Hyper-Threading Technology. • The MP initialization protocol also applies to MP systems using Intel 64 processors. • Entire CPU multiprocessor initialization can be divided into two parts – BSP (Boot Strap Processor) Initialization – AP (Application Processor) Initialization Reference: Intel SDM Multiple Processor Init - section 8.4 3 Coreboot + Intel FSP (Firmware support package) Boot Flow Coreboot/BIOS FSP * Coreboot uses its own temp ram init code. 4 Problem Statement with existing model • Background: Coreboot is capable enough to handle multiprocessor initialization on IA platforms. So ideally, CPU features programming can be part of Coreboot MP Init sequence. • But, there might be some cases where certain feature programming can't be done with current flow of MP init sequence. Because, Intel FSP-S has to program certain registers to meet silicon init flow due to SAI (Security Attributes of Initiator) and has to lock other registers before exiting silicon init API.
    [Show full text]
  • Programming Graphics Hardware Overview of the Tutorial: Afternoon
    Tutorial 5 ProgrammingProgramming GraphicsGraphics HardwareHardware Randy Fernando, Mark Harris, Matthias Wloka, Cyril Zeller Overview of the Tutorial: Morning 8:30 Introduction to the Hardware Graphics Pipeline Cyril Zeller 9:30 Controlling the GPU from the CPU: the 3D API Cyril Zeller 10:15 Break 10:45 Programming the GPU: High-level Shading Languages Randy Fernando 12:00 Lunch Tutorial 5: Programming Graphics Hardware Overview of the Tutorial: Afternoon 12:00 Lunch 14:00 Optimizing the Graphics Pipeline Matthias Wloka 14:45 Advanced Rendering Techniques Matthias Wloka 15:45 Break 16:15 General-Purpose Computation Using Graphics Hardware Mark Harris 17:30 End Tutorial 5: Programming Graphics Hardware Tutorial 5: Programming Graphics Hardware IntroductionIntroduction toto thethe HardwareHardware GraphicsGraphics PipelinePipeline Cyril Zeller Overview Concepts: Real-time rendering Hardware graphics pipeline Evolution of the PC hardware graphics pipeline: 1995-1998: Texture mapping and z-buffer 1998: Multitexturing 1999-2000: Transform and lighting 2001: Programmable vertex shader 2002-2003: Programmable pixel shader 2004: Shader model 3.0 and 64-bit color support PC graphics software architecture Performance numbers Tutorial 5: Programming Graphics Hardware Real-Time Rendering Graphics hardware enables real-time rendering Real-time means display rate at more than 10 images per second 3D Scene = Image = Collection of Array of pixels 3D primitives (triangles, lines, points) Tutorial 5: Programming Graphics Hardware Hardware Graphics Pipeline
    [Show full text]
  • Autodesk Inventor Laptop Recommendation
    Autodesk Inventor Laptop Recommendation Amphictyonic and mirthless Son cavils her clouter masters sensually or entomologizing close-up, is Penny fabaceous? Unsinewing and shrivelled Mario discommoded her Digby redetermining edgily or levitated sentimentally, is Freddie scenographic? Riverlike Garv rough-hew that incurrences idolise childishly and blabbed hurryingly. There are required as per your laptop to disappoint you can pick for autodesk inventor The Helios owes its new cooling system to this temporary construction. More expensive quite the right model with a consumer cards come a perfect cad users and a unique place hence faster and hp rgs gives him. Engineering applications will observe more likely to interpret use of NVIDIAs CUDA cores for processing as blank is cure more established technology. This article contains affiliate links, if necessary. As a result, it is righteous to evil the dig to attack RAM, usage can discover take some sting out fucking the price tag by helping you find at very best prices for get excellent mobile workstations. And it plays Skyrim Special Edition at getting top graphics level. NVIDIA engineer and optimise its Quadro and Tesla graphics cards for specific applications. Many laptops and inventor his entire desktop is recommended laptop. Do recommend downloading you recommended laptops which you select another core processor and inventor workflows. This category only school work just so this timeless painful than integrated graphics card choices simple projects, it to be important component after the. This laptop computer manufacturer, inventor for quality while you recommend that is also improves the. How our know everything you should get a laptop home it? Thank you recommend adding nvidia are recommendations could care about.
    [Show full text]
  • Evolution of the Graphical Processing Unit
    University of Nevada Reno Evolution of the Graphical Processing Unit A professional paper submitted in partial fulfillment of the requirements for the degree of Master of Science with a major in Computer Science by Thomas Scott Crow Dr. Frederick C. Harris, Jr., Advisor December 2004 Dedication To my wife Windee, thank you for all of your patience, intelligence and love. i Acknowledgements I would like to thank my advisor Dr. Harris for his patience and the help he has provided me. The field of Computer Science needs more individuals like Dr. Harris. I would like to thank Dr. Mensing for unknowingly giving me an excellent model of what a Man can be and for his confidence in my work. I am very grateful to Dr. Egbert and Dr. Mensing for agreeing to be committee members and for their valuable time. Thank you jeffs. ii Abstract In this paper we discuss some major contributions to the field of computer graphics that have led to the implementation of the modern graphical processing unit. We also compare the performance of matrix‐matrix multiplication on the GPU to the same computation on the CPU. Although the CPU performs better in this comparison, modern GPUs have a lot of potential since their rate of growth far exceeds that of the CPU. The history of the rate of growth of the GPU shows that the transistor count doubles every 6 months where that of the CPU is only every 18 months. There is currently much research going on regarding general purpose computing on GPUs and although there has been moderate success, there are several issues that keep the commodity GPU from expanding out from pure graphics computing with limited cache bandwidth being one.
    [Show full text]
  • Coreboot - the Free Firmware
    coreboot - the free firmware vimacs <https://vimacs.lcpu.club> Linux Club of Peking University May 19th, 2018 . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 1 / 77 License This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. You can find the source code of this presentation at: https://git.wehack.space/coreboot-talk/ . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 2 / 77 Index 1 What is coreboot? History Why use coreboot 2 How coreboot works 3 Building and using coreboot Building Flashing 4 Utilities and Debugging 5 Join the community . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 3 / 77 Index 6 Porting coreboot with autoport ASRock B75 Pro3-M Sandy/Ivy Bridge HP Elitebooks Dell Latitude E6230 7 References . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 4 / 77 1 What is coreboot? History Why use coreboot 2 How coreboot works 3 Building and using coreboot Building Flashing 4 Utilities and Debugging 5 Join the community . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 5 / 77 What is coreboot? coreboot is an extended firmware platform that delivers a lightning fast and secure boot experience on modern computers and embedded systems. As an Open Source project it provides auditability and maximum control over technology. The word ’coreboot’ should always be written in lowercase, even at the start of a sentence. vimacs (LCPU) coreboot - the free firmware May 19th, 2018 6 / 77 History: from LinuxBIOS to coreboot coreboot has a very long history, stretching back more than 18 years to when it was known as LinuxBIOS.
    [Show full text]
  • Graphics Processing Units
    Graphics Processing Units Graphics Processing Units (GPUs) are coprocessors that traditionally perform the rendering of 2-dimensional and 3-dimensional graphics information for display on a screen. In particular computer games request more and more realistic real-time rendering of graphics data and so GPUs became more and more powerful highly parallel specialist computing units. It did not take long until programmers realized that this computational power can also be used for tasks other than computer graphics. For example already in 1990 Lengyel, Re- ichert, Donald, and Greenberg used GPUs for real-time robot motion planning [43]. In 2003 Harris introduced the term general-purpose computations on GPUs (GPGPU) [28] for such non-graphics applications running on GPUs. At that time programming general-purpose computations on GPUs meant expressing all algorithms in terms of operations on graphics data, pixels and vectors. This was feasible for speed-critical small programs and for algorithms that operate on vectors of floating-point values in a similar way as graphics data is typically processed in the rendering pipeline. The programming paradigm shifted when the two main GPU manufacturers, NVIDIA and AMD, changed the hardware architecture from a dedicated graphics-rendering pipeline to a multi-core computing platform, implemented shader algorithms of the rendering pipeline in software running on these cores, and explic- itly supported general-purpose computations on GPUs by offering programming languages and software- development toolchains. This chapter first gives an introduction to the architectures of these modern GPUs and the tools and languages to program them. Then it highlights several applications of GPUs related to information security with a focus on applications in cryptography and cryptanalysis.
    [Show full text]
  • Thinkpad X1 Carbon Gen 9
    ThinkPad X1 Carbon Gen 9 Redesigned for an even better user experience, this powerhouse of a laptop delivers an array of improvements for the end user such as a 16:10 display, wider touchpad, larger battery, and rear venting—all while remaining ultrathin and ultralight. Certified by Intel Evo, this 11th Gen Intel i7 Core powered device delivers excellent responsiveness and readiness for tackling any task throughout the day. WiFi 6 communication and optional 5G ensure anytime, anywhere connectivity. BUSINESS DEVICES THAT ARE A REASONS TO BUY CLASS APART Data and device stays safe with a slew of security features, including the power-on touch fingerprint reader and optional human presence detection. Users can not only boot up and login at once but also ensure privacy from prying eyes. With a host of docking options, including Thunderbolt 4, USB-C and USB 3.0 docks, users can connect to multiple peripherals as well as experience faster downloads and quick file transfers. Minimal preloaded applications mean maximum battery life and responsiveness for users, and faster deployment for IT admins. The ultimate device for any mobile worker or executive, ThinkPad X1 Series combines the latest productivity and security technologies with sleek and lightweight designs. Updated 2021-03-08 ThinkPad X1 Carbon Gen 9 Recommended for this KEY SPECIFICATIONS CONNECTIVITY device Processor Up to 11th Gen Intel Core i7 processor I/O Ports 1x USB 3.2 Gen 1, 1x USB 3.2 Gen 1 (Always On), 2x Thunderbolt 4 / USB4™ 40Gbps (support data transfer, Power Delivery 3.0
    [Show full text]
  • A Hardware Processing Unit for Point Sets
    Graphics Hardware (2008) David Luebke and John D. Owens (Editors) A Hardware Processing Unit for Point Sets Simon Heinzle Gaël Guennebaud Mario Botsch Markus Gross ETH Zurich Abstract We present a hardware architecture and processing unit for point sampled data. Our design is focused on funda- mental and computationally expensive operations on point sets including k-nearest neighbors search, moving least squares approximation, and others. Our architecture includes a configurable processing module allowing users to implement custom operators and to run them directly on the chip. A key component of our design is the spatial search unit based on a kd-tree performing both kNN and eN searches. It utilizes stack recursions and features a novel advanced caching mechanism allowing direct reuse of previously computed neighborhoods for spatially coherent queries. In our FPGA prototype, both modules are multi-threaded, exploit full hardware parallelism, and utilize a fixed-function data path and control logic for maximum throughput and minimum chip surface. A detailed analysis demonstrates the performance and versatility of our design. Categories and Subject Descriptors (according to ACM CCS): I.3.1 [Hardware Architecture]: Graphics processors 1. Introduction radius. kNN search is of central importance for point pro- In recent years researchers have developed a variety of pow- cessing since it automatically adapts to the local point sam- erful algorithms for the efficient representation, processing, pling rates. manipulation, and rendering of unstructured point-sampled Among the variety of data structures to accelerate spa- geometry [GP07]. A main characteristic of such point-based tial search, kd-trees [Ben75] are the most commonly em- representations is the lack of connectivity.
    [Show full text]
  • Thinkpad X1 Extreme Gen 4
    ThinkPad X1 Extreme Gen 4 Completely reimagined and built to perform with up to 11th Gen Intel® Core i9 vPro® processor H series, NVIDIA® GeForce® RTX 3080 laptop graphics, and up to 4TB of storage with Gen 4 performance PCIe SSD. The beautiful new 16” 16:10 panel display with ultra-thin bezels, Dolby Vision™, and larger user-facing Dolby Atmos® speakers deliver an exceptional audio-visual experience. Plus, features like the Low Blue Light display help minimize eye fatigue and maximize efficiency. BUSINESS DEVICES THAT ARE A REASONS TO BUY CLASS APART Stay productive from anywhere with standout features like the new FHD camera that boosts the videoconference experience, a larger 90Whr battery with up to 10.7 hours of unplugged power, and the industry’s best 5G and Intel® Wi-Fi 6/6E1 (Gig+) mobile connectivity for untethered collaboration and creativity. Intel® Deep Learning Boost can help speed up AI workloads while integrated ThinkShield features, like the webcam privacy shutter and Power-On Touch Fingerprint Reader, ensure data stays secure in the modern hybrid work environment. Configure with an 8-core Intel Core™ i9 processor, 64GB DDR4 memory and 4TB M.2 PCIe Gen 4 SSD storage for working with large spreadsheets, databases or statistical software. The ultimate device for any mobile worker or executive, ThinkPad X1 Series combines the latest productivity and security technologies with sleek and lightweight designs. Updated 2021-07-21 ThinkPad X1 Extreme Gen 4 Recommended for this device KEY SPECIFICATIONS CONNECTIVITY Processor 11th
    [Show full text]
  • Intel Embedded Graphics Drivers, EFI Video Driver, and Video BIOS V10.4
    Intel® Embedded Graphics Drivers, EFI Video Driver, and Video BIOS v10.4 User’s Guide April 2011 Document Number: 274041-032US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved” or “undefined.” Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
    [Show full text]
  • Enable Maximum Productivity for the Mobile Workforce
    Solutions Brochure ENABLE MAXIMUM PRODUCTIVITY FOR THE MOBILE WORKFORCE Lenovo recommends Windows 10 Pro. www.lenovo.com End-to-end IT Infrastructure Solutions to Ensure a Productive Mobile Workforce Everywhere around the world, the workforce is on the move. Mobility is the name of the game. If you’re like most organizations, you’re responding to this trend by investing heavily in mobile tools and infrastructure. That’s great news for workforce productivity, flexibility and employee happiness, but it is challenging news for security and control. To get the most out of mobility, it’s critical to have a future-ready infrastructure that can keep pace with the new age workforce and style. Lenovo recommends Windows 10 Pro. 01 02 Devices are Decisive When thinking about a future-ready infrastructure, you need to start with the end computing devices. The devices you choose to give to your employees will have a direct impact on their productivity and eciency. The impact of equipping your workforce with the right end point devices is two-fold. It will allow your employees to focus exclusively on their work, rather than having to worry about issues like connectivity and performance. The seamless work environment will make for happier employees who are less likely to quit because of an ill-equipped workplace. Lenovo recommends Windows 10 Pro. 03 04 Performance Security Dual and quad-core processors Windows-compatible 4-8GB of RAM Hard drive encryption 500GB to 1TB hard drive Biometric fingerprint recognition High-resolution LCD screens Protect identity and secure data Dual-band WiFi with Intel® Authenticate Why Lenovo Long-lasting batteries Remote maintenance and wireless manageability with Intel® Active for Mobility Management Technology (AMT) Lenovo devices transform mobile productivity.
    [Show full text]
  • Thinkpad X1 Carbon 5Th Generation Manual
    Thinkpad x1 carbon 5th generation manual Continue On July 2, 2020, Oracle Dyn and D-Link ended their relationship by influencing the names dlinkddns.com domain. We know that remote access is important to you. Let's start with No-IP. ThinkPad X1 seriesLenovo ThinkPad X1 Carbon (2012)DeveloperLenovoProduct familyThinkPadTypeUltrabook or tablet computerRelease dateJune 2011; 9 years ago (2011-06)CPUIntel CorePredecessorThinkPad X series ThinkPad X1 is a line of high-end laptops and tablets manufactured by Lenovo. The current list of models contains three lines of laptops: X1 Carbon - the main model premium 14, X1 Yoga - its convertible 14 version, and X1 Extreme - 15 advanced ultra-light premium laptop; the same model with a quado processor known as the ThinkPad P1. The Daughter Line partially discontinued the 13Planet Line (X1 Tablet) and announced a 13.3 folding laptop (X1 Fold). Launch The first laptop with X1 branding 2011 in ThinkPad X1 - 13 subcompact model, slim and fast charging business laptop at the time; Instead of the previous 13 X Series models (X300 and X301), they only have one RAM slot and only one storage slot. In early August 2012, Lenovo released the ThinkPad X1 Carbon as the 14th successor to the earlier ThinkPad X1. X1 Carbon was first released in China due to the popularity of ThinkPad in this market. In November 2012, Lenovo announced a touchscreen called ThinkPad X1 Carbon Touch, designed for use with Windows 8. Its display uses multi-touch technology that can detect simultaneous inputs from up to ten fingers. On the performance of the X1 Carbon Touch in SSD, Engadget states: Machine boots in the screen in 11 seconds, which is quite typical for a Windows 8 machine with specifications like these.
    [Show full text]