Major Intel CPU vulnerability
-
@scottalanmiller said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@storageninja said in Major Intel CPU vulnerability:
@mlnews said in Major Intel CPU vulnerability:
Ars Technica agrees that Intel's CEO knew before he sold.
As long as his Broker executed this plan without MNPI he's in the clear.
10b5-1 doesn't actually require public disclosure but it does help avoid PR problems like this.As a result of his stock sale, Krzanich received more than $39 million. Intel stock, as of today, is trading at roughly the same price as Krzanich sold stock at, so he did not yield any significant gain from selling before the vulnerability was announced
SEC officials could still see the maneuver as a trade based on insider information—especially if there was no other material reason for Krzanich to sell the stock.
He's following a set pattern on his trades, and no stockholders short of day traders were hurt by this. The SEC really isn't going to bother with this unless there is some sort of smoking gun found in the way of text messages telling his broker "SELL IT ALL NOW BAD SHIT GOING DOWN".
When you can click a button and make a cool $39 million, you can easily avoid the scrutiny of the SEC or anyone else. Money = power, power = easy to avoid legal entanglements.
Bloomberg is pointing out that this was NOT following his established pattern: https://www.bloomberg.com/news/articles/2018-01-08/intel-ceo-krzanich-s-stock-sales-seen-warranting-sec-examination
RTFA
Intel says Krzanich’s sales were part of a pre-arranged stock plan with an automated schedule, but some securities lawyers say the larger-than-usual transaction will probably be examined by the U.S. Securities & Exchange Commission
It's a clickbait headline. They will look into it, but if it was part of an automated schedule they will quickly close their case.
-
@rojoloco said in Major Intel CPU vulnerability:
So maybe it becomes a PR night are for Intel, but the actual guilty party will walk away scot free.
If he had an automated trading plan that his broker was trading on his behalf under specific instructions and the broker was not made aware to change said plan between the time he got the bad news and the sale he's not guilty.
Then again, the internet court is more fun.
Youtube Video -
@storageninja said in Major Intel CPU vulnerability:
If he had an automated trading plan that his broker was trading on his behalf under specific instructions and the broker was not made aware to change said plan between the time he got the bad news and the sale he's not guilty.
That's a significant misunderstanding of SEC law. Just because you don't tell a broker and turn a crime into a plan doesn't change guilt or have anything to do with it.
That's like saying that it's not a crime to rob a bank, as long as you planned ahead and didn't tell the get away driver.
-
@storageninja said in Major Intel CPU vulnerability:
Intel says Krzanich’s sales were part of a pre-arranged stock plan with an automated schedule, but some securities lawyers say the larger-than-usual transaction will probably be examined by the U.S. Securities & Exchange Commission
Given that we already know that the plan came AFTER it was already insider trading, we all know that this statement implies Intel's involvement in the guilt, not a lack of that guilt. I'm not sure how you see planning and automation as ways to remove the issue of insider trading. Building a robot to murder someone at a set time in the future is still murder.
What we know at this point...
- The "plan" is just misdirection to confuse those not looking at the timeline. The planning and scheduling happened AFTER it was already insider trading.
- The release of the information to the public was coordinated so that it fell after the plan was actioned.
- The pattern of sales was violated in order to make these sales.
So any claims that a plan, schedule, or pattern somehow excuse the insider trading are just fanciful fairly land talk. If this is insider trading or not is not affected by those. It has nothing to do with it. But they sounds reasonable to people not doing the research. But bottom line, you can't use any of these things or the quotes of his own employees to say he's not guilty. None of those things are even relevant.
-
Finally Dell R720, R520 are getting BIOS updates.
-
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
No! Gotta take care of the kids but I wouldn't mind going to Colocation every so often
-
Don't get too excited. You'll probably have performance issues (:winking_face: lol) post patch but it's probably not permanent.
https://www.itnews.com.au/news/meltdown-and-spectre-fix-will-slow-down-machines-480794
Enterprise and business customers may have to choose between applying the Meltdown and Spectre fixes, or carefully evaluating what code they are running on their systems, since Microsoft's Windows Server operating system will slow down significantly with the security mitigations applied.
Microsoft explained that older versions of Windows have more user-kernel transitions "because of legacy design decisions" and will suffer a larger performance hit when the Meltdown and Spectre fixes are applied, compared to Windows 10.
For instance, on Windows 7 and Windows 8, all font rendering takes place in the operating system kernel, Microsoft said.Also, http://www.theregister.co.uk/2018/01/09/meltdown_spectre_slowdown/
Intel said as much in its statement, claiming "any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time."
That may be true eventually, thanks in part to a processor feature called Processor-Context ID, or PCID.
^ the PCID section of that article has some useful information -
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
No! Gotta take care of the kids but I wouldn't mind going to Colocation every so often
Kids? No trade!!!!
It is nice to drive over to the colo, because they tell me to go early afternoon and they pay me for the rest of the day. And I get ramen.
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
@RojoLoco I am on a sabbatical from posting but did not want to mislead you, if your R720 has 2.5.4 BIOS then there is no other update yet. Anyone with Hyper V Also should update the integration services as well after the Microsoft Update.
I am out.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
@RojoLoco I am on a sabbatical from posting but did not want to mislead you, if your R720 has 2.5.4 BIOS then there is no other update yet. Anyone with Hyper V Also should update the integration services as well after the Microsoft Update.
I am out.
What? you're talking a vacation from posting with us? oh no.....
-
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
I don't see the R520 BIOS Updates. It is still showing 2.4.2 from 2016 in Drivers and Downloads. Is there another place I need to look?
-
-
@pmoncho said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
I don't see the R520 BIOS Updates. It is still showing 2.4.2 from 2016 in Drivers and Downloads. Is there another place I need to look?
No, as I stated before I jumped the gun, the update will be available 2/1/2018
http://www.dell.com/support/article/us/en/04/SLN308588/en
and 11G servers will be next month as well. -
@scottalanmiller said in Major Intel CPU vulnerability:
Given that we already know that the plan came AFTER it was already insider trading
You have yet to prove this statement. Nothing else you have said matters until you show proof.
@StorageNinja on the otherhand clearly showed proof that is was.
-
@jaredbusch said in Major Intel CPU vulnerability:
@scottalanmiller said in Major Intel CPU vulnerability:
Given that we already know that the plan came AFTER it was already insider trading
You have yet to prove this statement. Nothing else you have said matters until you show proof.
@StorageNinja on the otherhand clearly showed proof that is was.
How did he show proof? I've seen nothing of the kind yet.