System Data Verification Protects Embedded Applications
We are sorry, This PDF is available in download format only
VideosView More Videos
First Three Zone Campaign
A demonstration of how to create campaigns with multiple display zones, including: zone sizing...
Channel Creation and Player...
This video details the steps of creating a channel, and registering a new player to this newly...
See how Intel is intelligently connecting systems of all types (1:50)
Accelerator offers superior cloud performance by significantly increasing data download speed.
Intelligent Network Platform...
Off-the-shelf components provide a high-quality solution without using custom hardware.
Firewall Analytics Improve...
Firewall monitors user traffic, analyzes applications, and searches for malware.
Liquid Applications* Improves...
Base station technology places content close to mobile subscribers and enhances user...
Intel® Technology Optimizes...
Optimized pattern matching detects malware and helps achieve maximum computing performance.
Security Measures Improve...
Security measures include data encryption/decryption, access controllers, and user management.
Get all the details about how to create playlists and playlist types, including ordered,... (7:09)
Simple Campaign Tutorial
This introductory video walks through setting up a very simple campaign in Intel® Retail...
Learn about the "when" of RCM, including public schedules, importing/exporting schedules,... (6:34)
Learn how the command entity works, including creating a command entity, using command details...
Conditional Play: Intel® AIM...
Learn how Intel® AIM Suite can be integrated with Intel® Retail Client Manager including RCM...
User Roles and Permissions
This video explains Intel® RCM's security schema of users, roles, and permissions.