Language Selection

English French German Italian Portuguese Spanish

Intel Says AMD Is To Blame For Its Own

Filed under
Hardware

Advanced Micro Devices Inc.'s failure to compete effectively with Intel in the microprocessor market is a "direct result of AMD's own actions or inaction," and weren't caused by any illegal actions by Intel, the microprocessor market leader said in court documents filed Thursday.

The filing in U.S. District Court was Intel's first formal response to AMD's lawsuit filed in June that charged Intel with using bribery and coercion of computer makers and retailers to limit the use of AMD processors.

AMD has used "out-of-context snippets ... to create the impression that Intel engaged in misconduct," Intel said its response. AMD's lawsuit also represents "a case study in legal dissonance. Although AMD has purportedly brought its complaint to promote competition, its true aim is the opposite. Under the cover of competitive law, AMD seeks to shield itself from competition."

AMD didn't immediately comment on the Intel response.

Full Story.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News