Latest Intel publications

Intel CEO Brian Krzanich resigns over employee relationship

Brian Krzanich, Intel’s CEO since 2013, has resigned after it was revealed he had been engaged in a ‘consensual relationship’ with an Intel employee. This relationship violated Intel’s non-fraternisation policy for management and as such Krzanich was forced out. The company says that it was ‘informed’ of the relationship, after which point an investigation was… Read More

Dell unveils modular data center products for AI workloads

Dell Technologies, at the Dell Technologies World Conference in Las Vegas, rolled out a new line of modular data center products, focused on workloads involving AI, machine learning, and big data. The company unveiled Dell EMC PowerMax storage systems, engineered with end-to-end NVMe all-flash arrays and a built-in machine learning engine. The PowerMax has a capacity… Read More

Intel data centre customers turning to rivals

Customers who use Intel chips in their data centres are considering using rival firms after a security flaw caused major slowdowns. The Meltdown and Spectre bugs, which have been found to leave a massive number of Intel chips vulnerable to attack, have caused havoc for the firm. Passwords and encryption keys on devices that use… Read More

Intel CEO addresses Meltdown, announces quantum developments

Intel boss Brian Krzanich took to the stage at CES to address the Meltdown and Spectre news, as well as announcing the firm’s plans for quantum computing. Speaking at the keynote address, Krzanich spoke on a diverse range of topics, but was first compelled to address the elephant in the room. Recent revelations about processor… Read More

Critical security vulnerability in millions of Intel processors

Intel has released a security alert regarding a critical elevation of privilege vulnerability that affects millions of servers and computers. This alert impacts systems using Intel Management Engine (ME) Firmware versions 11.0 and higher, Server Platform Service (SPS) Firmware version 4.0, and Trusted Execution Engine (TXE) version 3.0. By accessing the elevation of privilege vulnerability, an… Read More

Do NOT follow this link or you will be banned from the site!