System Data Verification Protects Embedded Applications
We are sorry, This PDF is available in download format only
VideosView More Videos
Channel Creation and Player...
This video details the steps of creating a channel, and registering a new player to this newly...
First Three Zone Campaign
A demonstration of how to create campaigns with multiple display zones, including: zone sizing...
See how Intel is intelligently connecting systems of all types (1:50)
User Roles and Permissions
This video explains Intel® RCM's security schema of users, roles, and permissions.
Learn about the "when" of RCM, including public schedules, importing/exporting schedules,... (6:34)
A detailed overview of tickers, including how to create tickers in campaign zones, creating...
Conditional Play: Categories
Learn about the benefits and use of conditional play by category, category creation, assigning...
Introduction to Managing Media
Get all the specifics about the role of a typical media manager (a role that creates and...
Learn how the command entity works, including creating a command entity, using command details...
This tutorial explains how an external resource can interrupt an Intel® RCM campaign by...
Get all the details about how to create playlists and playlist types, including ordered,... (7:09)
Simple Campaign Tutorial
This introductory video walks through setting up a very simple campaign in Intel® Retail...
See how sensing, interconnectivity, and intelligence cooperatively make driving safer, more... (4:00)
Reduce cost, complexity, and footprint consolidating on real-time virtualization. (v.2, Feb....
Accelerator offers superior cloud performance by significantly increasing data download speed.