Processor Archive

CES 2018: New 8th Gen Intel Core Processors with Radeon RX Vega M Graphics Offer 3x Boost in Frames per Second in Devices as Thin as 17 mm 0

Today, Intel is launching a first-of-its kind processor: the 8th Gen Intel® Core™ processor with Radeon™ RX Vega M Graphics. Packed with features and performance crafted for gamers, content creators and fans of virtual and mixed reality, it expands Intel’s portfolio thanks to its optimization for small form factors like

CES 2018: AMD Redefines High-Performance Computing with New Processor and Graphics Products Preview 0

Building on the global enthusiasm generated in 2017 by Ryzen™ processors and Radeon™ graphics technology, AMD(NASDAQ: AMD) today detailed its forthcoming roll-out plan for its new and next generation of high-performance computing and graphics products during an event in Las Vegas just prior to the opening of CES 2018. Alongside

Industry Testing Shows Recently Released Security Updates Not Impacting Performance in Real-World Deployments 0

As Intel and others across the industry partner to protect customers from the exploits (referred to as “Spectre” and “Meltdown”) reported Wednesday, extensive testing has been conducted to assess any impact to system performance from the recently released security updates. Apple, Amazon, Google and Microsoft are among those reporting

Intel Issues Updates to Protect Systems from Security Exploits 0

Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems — including personal computers and servers — that render those systems immune from both exploits (referred to as “Spectre” and “Meltdown”) reported by Google Project Zero. Intel and its partners have made significant progress

An Update on AMD Processor Security 0

There has been recent press coverage regarding a potential security issue related to modern microprocessors and speculative execution. Information security is a priority at AMD, and our security architects follow the technology ecosystem closely for new threats. It is important to understand how the speculative execution vulnerability described in