Real life impact of the patch

This is an example of how the cpu utilization for the same workload will jump after applying the patch. So if you don't over provision like this guy, you might have to deploy 3 times the server for the same workload.

Or just use AMD :^)

twitter.com/timgostony/status/948682862844248065

Other urls found in this thread:

cnbc.com/2018/01/04/intel-ceo-reportedly-sold-shares-after-the-company-already-knew-about-massive-security-flaws.html
twitter.com/NSFWRedditGif

holy shit that is bad.

>Intel

truly fucked

30% MY ASS!

>2% to 6%
This caused a massive shitstorm?

that's a 300% icrease

Imagine it being 20% to 60%

>300%
Holy shit.

Isn't it a 200% increase? Going from 2% to 4% would be a 100% increase, therefore 2% to 6% is a 200% increase.

>use more CPU
>get charged more by amazong
>rubbinghands.png

Fuck off

rip shintel
press S to spit in grave

3 * 2 = 6 henne 300% increase

Wrong. A 0% increase means no increase, and a 100% increase must mean double. It's because it is being labeled as "an increase".

nice one Sup Forums

Correct. CPU utilization increased by 200%, meaning it's now at 300% of the original utilization.

NOOOOOOOOOOOO

>4% utilization
It's over.

that's a +300~+400% load for allegedly the same workload, fucking idiot.

>just got a new intel chip a few days ago

yeah, I brainfarted.

>linux related impact
>suggest using AMD on linux for no performance gain whatsoever.

can you return it?

wow, enjoy your cpu

just overclock it by a few percent and you'll be back to normal

No

Unless you're running a high load server you literally won't feel a difference.

>you literally won't feel a difference.
Fucking idiot.

a 30%-40% overclock is easy to achieve with a liquid nitrogen cooling setup

you have nothing to worry about, you can still get the performance you paid for with a simple tuning

I'd rather mine a few bitcoins for pajeet than lose all that performance tbqh

>mfw every Windows admin ever will install Windows updates and expect they are done

oh lord theres gonna be chaos at a lot of small businesses

Has any vendor anywhere released a firmware update? I keep seeing these "contact your OEM" but I haven't found a single OEM that cares

cnbc.com/2018/01/04/intel-ceo-reportedly-sold-shares-after-the-company-already-knew-about-massive-security-flaws.html

But is it the service he is running on the server that has contributed the most to that increase or is it other processes?
The question is how the increase will actually scale and his graph doesn't hint at that at all.

not xer, but thats a good point. would be useful to see some other graphs

Somebody tested their own shit on Sup Forums.

holy shit, yesterday the reports said his transactions were for 11 million dollars, but it was actually 25 millions?

he sold 25 million dollars worth of stock just before, just before the "meltdown"

HOW
FUCKING
CONVENIENT

Man, 99% of the server workloads are I/O syscalls, unless you're mining or trans-coding. Truth be told, same applies to typical desktop workloads too

>not xer,

nigger pls.

Yeah, but he did an absolute worst case kind of test.

Those results look pretty damn bad. Are these results on a windows server or desktop os?

Would it even matter whether the OS is server or client edition?

To be honest, I personally don't know. I was just commenting on the increase in latency between sys calls, that is all. This all adds up the more work your system is doing.

The way I'm reading it, this bullshit

Is on by default on client OSs, but not servers.

>whether the OS is server or client edition
utterly irrelevant.

Yes, you L I T E R A L L Y won't feel a difference.

Can someone explain what exactly happened like I'm a broker trying to understand the reason I shouldn't be buying intel right now?

if the ceo sells his stock, I doubt it's a good time to buy

I'd rather trade Intel stock with bitcoins right now

There's a serious security flaw in ALL Intel CPU products since like 1995 that was discovered. The fix guts performance by like 5 to 20% depending on model. Abandon Intel's ship while you can. This is the short version

Merry christmas, Shitlel!

Bug in Intel going back 23 years affecting all Intel chips. If it drops below 40 you better be prepared to bug out.

Might as well just not run the patch then if it goes so far back.

Not an option since the attack code can even be executed in fucking javascript. So every webpage could be an attack vector

>AmeriKEK customer rights

This affects stuff like personal information, right?
You know the stuff that's being handed around left ans right for years now.

>get the performance you pay for
>pay for liquid nitrogen cooling setup

>So every webpage could be an attack vector
so those who listened to the oldfags of Sup Forums on having no javascript ever are safe if not cruising on the most crippled version of the modern internet

>since like 1995

The date goes further back every time I hear it. Pretty sure it's just as far back as 2007.

It affects (cloud) servers too, they too can be compromised by this. Every intel cpu device in the world is compromised, including servers, personal computers, you name it. This is huge

This is a javacript-overwrites-your-BIOS-with-16mb-of-dolphin-porn level security flaw.
You REALLY don't want it hanging wide open.

The only reason it hasn't been a problem yet is because it was undiscovered (the NSA probably knew though).

>Pretty sure it's just as far back as 2007.
Pentium Pro, nigger. Intel built a house of cards on top of it all the way to 2018.

>you literally won't feel a difference.
>Fucking idiot.
All that "proof".

Well my patch is still 12 days away AFAIK so a lot can happen during that time.

Is Intel just disabling speculative execution on their CPU's then to stop the attack, that would explain the performance hit?

KB number?

Can someone please explain to me I am an idiot who doesn't understand computer security how something like this happens?
Couldn't they have seen back in 1995 or whenever that this sort of "speculative execution" might not be the best thing to implement?

As usual, they were warned

...

But why do they still do it, if they knew it was a bad idea?

Why is this happening, this is what baffles me about this, not the vulnerability or the extent of it. But the fact that somehow something like this can even happen at all.

>Why is this happening
What dream did you wake up from that you don't realize this is how reality works?

jewish trickery
nsa backdoor
cheaper r&d
pick the closest to your ideology

There's nothing wrong with speculative execution in theory, it's just that the implementation wasn't quite up to par.

Speculative execution allows for massive performance boosts, since the CPU can spend less time waiting and more time actually crunching numbers.

wow so it's like running linux with x enabled

>everyone is incompetent and things never go right
holy shit, this is just how the world works after all

you now realize that all the horror stories written by HP Lovecraft is one massive allegory regarding the dismal state of mankind's reality

>horrors from beyond the stars are an allegory for the self-destroying, infinitely incompetent aspects of the human condition
Scary.

Does the windos patch affect AMD performance too?

Dude. This won't affect your gaming. Intel or AMD.

Where's the patch at? On the intel site or is it just done via windows?

There is finally a reason to overclock my 4770k

Fuck off incuck answer the question.

Excuse me, faggots. Intel products are in fact completely safe.

All my cpus are intel besides an old athlon XP in the basement
wat do Sup Forums

Abandon Intel. They're staffed with pajeets. Why do you think Raja from Radeon group managed to get on board Intel so easily? Because of fellow pajeets.
Sink them. Sink them hard.
AMD shall Ryzen from the grave.

Dude. It's not going to effect your gaming. I doubt you own a server if you have to ask this. They have people that help them with the red tape.

Only use internet with your phone from now on. Unplug your computer, do a complete wipe and never install any programs again.

That's what Takata said about its airbags before they went completely bankrupt.

Dude. This will not effect you at all. Why do people suddenly care about a exploit that has been know about for 10 year?

I vomit all morning because of this.

Does the windows patch gimp AMD too, or did they do it right like Linux did?

Because a simple javascript on a website can now steal all passwords from your browser. Now, as in right this fucking moment.

Thats because you worked yourself up over nothing. This breed Technophobes because of their lack of knowledge.

...are you kidding me?

Windows deploys a patch but then requires manual activation of the security protections?

What the fuck is microsoft doing???

> he pays for liquid nitrogen
> he doesn t infiltrate every night into a production center to steal tons of ln2

Willingly letting java run. You are just asking for it at this point.

doing what Micro$hit has always been doing
fucking up

I refuse to update to get slower speeds

I'll just make my desktop and offline gaming machine

Fuck you intel

The exploit allows an attacker to read cryptographic keys and passwords, which he can then use to get privileged access.

And it works even if the attacker is just a client of a cloud service - he can get access to everyone else's credentials who are also clients of that cloud host he's on, including the admin account running the server.

This is the worst computer vulnerability in computing history.

Can this be used to break DRM by reading tbe keys from protected memory?