Language Selection

English French German Italian Portuguese Spanish

Intel cripples programs on AMD chips

Filed under
Hardware
Legal

Intel's compilers recognise when they're running on an AMD processor, and generates code that either degrades performance or causes it to crash. That's one of the many accusations in AMD's lengthy document of complaints against Intel in its recent lawsuit against the chip giant.

The paragraph in question, number 123, reads:

"Intel has designed its compiler purposely to degrade performance when a program is run on an AMD platform. To achieve this, Intel designed the compiler to compile code along several alternate code paths. Some paths are executed when the program runs on an Intel platform and others are executed when the program is operated on a computer with an AMD microprocessor. (The choice of code path is determined when the program is started, using a feature known as "CPUID" which identifies the computer's microprocessor.) By design, the code paths were not created equally. If the program detects a "Genuine Intel" microprocessor, it executes a fully optimized code path and operates with the maximum efficiency. However, if the program detects an "Authentic AMD" microprocessor, it executes a different code path that will degrade the program's performance or cause it to crash."

Among the other issues raised by AMD were:

- That Intel used illegal subsidies to win sales and, in some cases, threatened companies with "severe consequences" for using or selling AMD products.

- That Intel has allegedly abused its dominate market position by forcing major customers into exclusive deals in return for outright cash payments, discriminatory pricing or marketing subsidies.

Following AMD's accusations, representatives of the European Commission and of national competition authorities carried out on-site inspections of several Intel offices and of the offices of an undisclosed number of PC manufacturers, as part of "an ongoing competition investigation", according to an EC spokeswoman.

By Manek Dubash
Techworld

More in Tux Machines

Mastodon 2.0

About 6 months have passed since April, during which the major mainstream breakthrough of our decentralized social network took place. From 20,000 users to almost a million! What better time to run through a couple examples of what’s been introduced since then? Mastodon is defined by its focus on good user experience, polished design and superior anti-abuse tools. In that vein, the web app has received numerous updates. Using the latest browser features, the web app receives real push notifications, making it almost indistinguishable from a native mobile app. It works faster and looks smoother thanks to many performance and design improvements. Read more

Red Hat: Satellite, OpenShift, Government, SoftBank

  • A Red Hat Satellite tutorial to install an update server
    Is server patch management the best part of your job? Stop reading here. Many IT organizations struggle with OS patching processes. For Red Hat administrators who are willing to invest some initial energy to simplify later tasks, Satellite provides infrastructure lifecycle management, including capabilities for provisioning, reporting and configuration management. To this end, follow this Red Hat Satellite tutorial to set up a simple server for updates. Once we review how to install the basic update server, we'll create one example client.
  • Red Hat updates Gluster storage for OpenShift container apps
    Red Hat bolstered Gluster storage for its OpenShift Container Platform, adding iSCSI block and S3 object interfaces, as well as greater persistent volume density.
  • Red Hat to Cover Open Source Collaboration at Gov’t Symposium; Paul Smith Comments
    Red Hat (NYSE: RHT) is set to hold its annual symposium on federal information technology on Nov. 9 where the company will host discussions on open source collaboration and its potential benefits for government, GovCon Executive reported Oct. 11.
  • Red Hat’s Container Technologies and Knowledge Were Chosen by SoftBank to Embrace DevOps
    Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced that several of Red Hat’s open source technologies, including Red Hat OpenShift Container Platform, as well as the knowledge of Red Hat Consulting, were chosen by SoftBank Corp (“SoftBank”), a subsidiary of SoftBank Group Corp., to implement DevOps methodology for its Service Platform Division, IT Service Development Division, Information Technology Unit, and Technology Unit, the company’s in-house IT organization. This large, varied organization develops, maintains and operates SoftBank’s IT systems for internal work and operations, supporting 600 diverse systems.
  • Form 4 RED HAT INC For: Oct 17 Filed by: Kelly Michael A
  • Taking a Fresh Look at Red Hat, Inc. (RHT)

Security: Google Play, WPA2, FERC, HackerOne

  • 8 'Minecraft' apps infected with Sockbot malware on Google Play found adding devices to botnet

    Security researchers have discovered that at least eight malware-laced apps on Google Play Store are ensnaring devices to a botnet to potentially carry out distributed denial-of-service (DDoS) and other malicious attacks. These apps claimed to provide skins to tweak the look of characters in the popular Minecraft: Pocket Edition game and have been downloaded as many as 2.6 million times.

  • KRACK Vulnerability: What You Need To Know
    This week security researchers announced a newly discovered vulnerability dubbed KRACK, which affects several common security protocols for Wi-Fi, including WPA (Wireless Protected Access) and WPA2. This is a bad vulnerability in that it likely affects billions of devices, many of which are hard to patch and will remain vulnerable for a long time. Yet in light of the sometimes overblown media coverage, it’s important to keep the impact of KRACK in perspective: KRACK does not affect HTTPS traffic, and KRACK’s discovery does not mean all Wi-Fi networks are under attack. For most people, the sanest thing to do is simply continue using wireless Internet access.
  • FERC sets rules to protect grid from malware spread through laptops
    The Federal Energy Regulatory Commission on Thursday proposed new mandatory cybersecurity controls to protect the utility system from the threat posed by laptops and other mobile devices that could spread malicious software. The standards are meant to "further enhance the reliability and resilience of the nation's bulk electric system" by preventing malware from infecting utility networks and bringing down the power grid, according to the nation's grid regulator.
  • Hack These Apps And Earn $1,000 — Bug Bounty Program Launched By Google And HackerOne
  • Security Vulnerability Puts Linux Kernel at Risk

Smartphone Waste and Tizen News