Major Intel CPU vulnerability
-
@rojoloco said in Major Intel CPU vulnerability:
So maybe it becomes a PR night are for Intel, but the actual guilty party will walk away scot free.
If he had an automated trading plan that his broker was trading on his behalf under specific instructions and the broker was not made aware to change said plan between the time he got the bad news and the sale he's not guilty.
Then again, the internet court is more fun.
Youtube Video -
@storageninja said in Major Intel CPU vulnerability:
If he had an automated trading plan that his broker was trading on his behalf under specific instructions and the broker was not made aware to change said plan between the time he got the bad news and the sale he's not guilty.
That's a significant misunderstanding of SEC law. Just because you don't tell a broker and turn a crime into a plan doesn't change guilt or have anything to do with it.
That's like saying that it's not a crime to rob a bank, as long as you planned ahead and didn't tell the get away driver.
-
@storageninja said in Major Intel CPU vulnerability:
Intel says Krzanich’s sales were part of a pre-arranged stock plan with an automated schedule, but some securities lawyers say the larger-than-usual transaction will probably be examined by the U.S. Securities & Exchange Commission
Given that we already know that the plan came AFTER it was already insider trading, we all know that this statement implies Intel's involvement in the guilt, not a lack of that guilt. I'm not sure how you see planning and automation as ways to remove the issue of insider trading. Building a robot to murder someone at a set time in the future is still murder.
What we know at this point...
- The "plan" is just misdirection to confuse those not looking at the timeline. The planning and scheduling happened AFTER it was already insider trading.
- The release of the information to the public was coordinated so that it fell after the plan was actioned.
- The pattern of sales was violated in order to make these sales.
So any claims that a plan, schedule, or pattern somehow excuse the insider trading are just fanciful fairly land talk. If this is insider trading or not is not affected by those. It has nothing to do with it. But they sounds reasonable to people not doing the research. But bottom line, you can't use any of these things or the quotes of his own employees to say he's not guilty. None of those things are even relevant.
-
Finally Dell R720, R520 are getting BIOS updates.
-
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
No! Gotta take care of the kids but I wouldn't mind going to Colocation every so often
-
Don't get too excited. You'll probably have performance issues (:winking_face: lol) post patch but it's probably not permanent.
https://www.itnews.com.au/news/meltdown-and-spectre-fix-will-slow-down-machines-480794
Enterprise and business customers may have to choose between applying the Meltdown and Spectre fixes, or carefully evaluating what code they are running on their systems, since Microsoft's Windows Server operating system will slow down significantly with the security mitigations applied.
Microsoft explained that older versions of Windows have more user-kernel transitions "because of legacy design decisions" and will suffer a larger performance hit when the Meltdown and Spectre fixes are applied, compared to Windows 10.
For instance, on Windows 7 and Windows 8, all font rendering takes place in the operating system kernel, Microsoft said.Also, http://www.theregister.co.uk/2018/01/09/meltdown_spectre_slowdown/
Intel said as much in its statement, claiming "any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time."
That may be true eventually, thanks in part to a processor feature called Processor-Context ID, or PCID.
^ the PCID section of that article has some useful information -
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
No! Gotta take care of the kids but I wouldn't mind going to Colocation every so often
Kids? No trade!!!!
It is nice to drive over to the colo, because they tell me to go early afternoon and they pay me for the rest of the day. And I get ramen.
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
@RojoLoco I am on a sabbatical from posting but did not want to mislead you, if your R720 has 2.5.4 BIOS then there is no other update yet. Anyone with Hyper V Also should update the integration services as well after the Microsoft Update.
I am out.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
@RojoLoco I am on a sabbatical from posting but did not want to mislead you, if your R720 has 2.5.4 BIOS then there is no other update yet. Anyone with Hyper V Also should update the integration services as well after the Microsoft Update.
I am out.
What? you're talking a vacation from posting with us? oh no.....
-
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
I don't see the R520 BIOS Updates. It is still showing 2.4.2 from 2016 in Drivers and Downloads. Is there another place I need to look?
-
-
@pmoncho said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
I don't see the R520 BIOS Updates. It is still showing 2.4.2 from 2016 in Drivers and Downloads. Is there another place I need to look?
No, as I stated before I jumped the gun, the update will be available 2/1/2018
http://www.dell.com/support/article/us/en/04/SLN308588/en
and 11G servers will be next month as well. -
@scottalanmiller said in Major Intel CPU vulnerability:
Given that we already know that the plan came AFTER it was already insider trading
You have yet to prove this statement. Nothing else you have said matters until you show proof.
@StorageNinja on the otherhand clearly showed proof that is was.
-
@jaredbusch said in Major Intel CPU vulnerability:
@scottalanmiller said in Major Intel CPU vulnerability:
Given that we already know that the plan came AFTER it was already insider trading
You have yet to prove this statement. Nothing else you have said matters until you show proof.
@StorageNinja on the otherhand clearly showed proof that is was.
How did he show proof? I've seen nothing of the kind yet.
-
@storageninja said in Major Intel CPU vulnerability:
@scottalanmiller said in Major Intel CPU vulnerability:
Pretty cut and dry insider trading, I wonder how much of hiding this flaw from the public was solely to hide the insider trading?
" To avoid charges of trading on insider knowledge, executives often put in place plans that automatically sell a portion of their stock holdings or exercise some of their options on a predetermined schedule, typically referred to as Rule 10b5-1(c) trading plans. According to an SEC filing, the holdings that Krzanich sold in November — 245,743 shares of stock he owned outright and 644,135 shares he got from exercising his options — were divested under just such a trading plan.
But Krzanich put that plan in place only on October 30, according to the filing. "
The plan was created in 2015 per Bloomberg.
You can also see the history of transactions here.Since the plan was set up, Krzanich has had a common trading pattern. In February, he gets his equity payout under Intel’s performance-based incentive plan. For fiscal years 2015, 2016 and 2017, he received 89,581, 87,061 and 278,868 shares, respectively. Then in the last quarter of each of those years, he makes sales that are proportionate to the awards he got. In the last quarter of 2015, he sold 70,000 and in 2016 he sold more than 50,000. And this year, the sale was much larger in light of the large payout he got in February.
Looks like he traded on 11/29.
Market Close was at $43.95 that day. Market Close today is $44.74 today. I expect Intel shares to go up as people realize public clouds need to buy 20% more compute this quarter (and it's too late to qualify to move those workloads to ARM/AMD systems, nor can AMD/GF handle an order that large).While I know insider trading doesn't require you actually make money off of it, I'd argue he missed out on gains by not waiting to sell until now. Intel is clearly fine, and while this is painful for a lot of people who have to go do patching, the market isn't punishing Intel in any serious way.
Note: the stock has doubled under Brian as CEO. This design decision was made in 1995 (well technically earlier given how long it takes to get something out the door).
Equifax is different in that their trades were NOT scheduled. Those yahoos are going to jail or to pay a token fine and promise not to do it again.
Also, EqualFax has only recovered 1/2 of its losses from the breach.Full SEC yadayadayada disclaimer, I hold no Intel, but am considering a long position in the near future.
This above is not "proof" in any way as equal sources say that a NEW trading plan was put in place and the one from 2015 was not followed. Which we know from observation, as the results weren't part of the pattern. Everything we know from sources after this is that this article was mistaken and had bad info that skipped that the NEW plan was AFTER the chip issue was known and that there WASN'T a pattern followed. Which is obvious, has he never did what he did before, ever.