• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Intel chip vulnerability"

Collapse

  • Dark Black
    replied
    The Register's response to Intel's press release...

    We translated Intel's crap attempt to spin its way out of CPU security bug PR nightmare

    Leave a comment:


  • d000hg
    replied
    I'm sure Apple will be offering me a nice new MacMini then, and claiming the cost from Intel...

    Leave a comment:


  • DaveB
    replied
    CERT have published their recommended solution.

    https://www.kb.cert.org/vuls/id/584653

    Solution
    Replace CPU hardware
    The underlying vulnerability is primarily caused by CPU architecture design choices. Fully removing the vulnerability requires replacing vulnerable CPU hardware.
    Translation : Software patches may fix it but only until someone breaks the software.

    Leave a comment:


  • NotAllThere
    replied
    Intel's CEO sold a load of his stock last month. I wonder why.

    https://www.fool.com/investing/2017/...-of-stock.aspx

    Leave a comment:


  • Hobosapien
    replied
    Originally posted by _V_ View Post
    Another reason then to choose a AMD ThreadRipper over an i9 cpu.

    https://www.extremetech.com/computin...intels-core-i9

    AMD also affected to a lesser degree, by the 'spectre' bug.

    Not the kind of James Bond product placement they were expecting.

    Leave a comment:


  • BR14
    replied
    Originally posted by woohoo View Post
    I was looking for an excuse to upgrade my aging 3 year old supercomputer.
    a Z9 ???

    Leave a comment:


  • woohoo
    replied
    Originally posted by NotAllThere View Post
    I was looking for an excuse to upgrade my aging 3 year old supercomputer.

    Leave a comment:


  • BR14
    replied
    oh, dear, but i must say this made me chuckle
    'Forcefully Unmap Complete Kernel With Interrupt Trampolines'
    well, the acronym.

    ah, well, it's all back to proper computers people!
    Z/OS for ever!

    Leave a comment:


  • DaveB
    replied
    The bit thats really going to bite is the performance hit of the fix. Up to 30% slowdown depending on the application.

    Thats going to cost a lot of people a lot of money, especially the ones who've been sweating their kit or stingy on the original specs.

    Leave a comment:


  • _V_
    replied
    Another reason then to choose a AMD ThreadRipper over an i9 cpu.

    https://www.extremetech.com/computin...intels-core-i9

    Leave a comment:


  • NotAllThere
    started a topic Intel chip vulnerability

    Intel chip vulnerability

    Interesting read here https://www.theregister.co.uk/2018/0...u_design_flaw/
Working...
X