When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Raptor Lake - Wikipedia

    en.wikipedia.org/wiki/Raptor_Lake

    [33] [34] The issue was initially attributed to Nvidia GeForce graphics drivers; however, in a driver update published on April 13, 2024, Nvidia acknowledged the instability problem as being associated with the Intel 13th/14th generation CPUs, and that owners of them should contact Intel customer support for further assistance. [35]

  3. Reptar (vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Reptar_(vulnerability)

    Reptar is a CPU vulnerability discovered in late 2023, affecting a number of recent families of Intel x86 CPUs. According to The Register, the following CPU families are vulnerable: Alder Lake, Raptor Lake and Sapphire Rapids. [1] The Reptar vulnerability relates to processing of x86 instruction prefixes in ways that lead to unexpected behavior ...

  4. List of Intel CPU microarchitectures - Wikipedia

    en.wikipedia.org/wiki/List_of_Intel_CPU_micro...

    Broadwell: 14 nm derivative of the Haswell microarchitecture, released in September 2014. Three-cycle FMUL latency, 64 entry scheduler. Formerly called Rockwell. Skylake 14 nm microarchitecture, released August 5, 2015. Kaby Lake: successor to Skylake, released in August 2016, broke Intel's tick-tock schedule due to delays with the 10 nm process.

  5. Downfall (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Downfall_(security...

    Downfall, known as Gather Data Sampling (GDS) by Intel, [1] is a computer security vulnerability found in 6th through 11th generations of consumer and 1st through 4th generations of Xeon Intel x86-64 microprocessors. [2]

  6. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  7. Intel Core (microarchitecture) - Wikipedia

    en.wikipedia.org/wiki/Intel_Core_(microarchitecture)

    The Intel Core microarchitecture (provisionally referred to as Next Generation Micro-architecture, [1] and developed as Merom) [2] is a multi-core processor microarchitecture launched by Intel in mid-2006. It is a major evolution over the Yonah, the previous iteration of the P6 microarchitecture series which started in 1995 with Pentium Pro.

  8. Comparison of Intel processors - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_Intel_processors

    Intel 7, 14 nm, 22 nm, 32 nm, 45 nm, 65 nm 2.9 W – 73 W 1 or 2, 2 /w hyperthreading 800 MHz, 1066 MHz, 2.5GT/s, 5 GT/s 64 KiB per core 2x256 KiB – 2 MiB 0 KiB – 3 MiB Intel Core: Txxxx Lxxxx Uxxxx Yonah: 2006–2008 1.06 GHz – 2.33 GHz Socket M: 65 nm 5.5 W – 49 W 1 or 2 533 MHz, 667 MHz 64 KiB per core 2 MiB N/A Intel Core 2: Uxxxx

  9. Intel microcode - Wikipedia

    en.wikipedia.org/wiki/Intel_Microcode

    In the mid-1990s, a facility for supplying new microcode was initially referred to as the Pentium Pro BIOS Update Feature. [18] [19] It was intended that user-mode applications should make a BIOS interrupt call to supply a new "BIOS Update Data Block", which the BIOS would partially validate and save to nonvolatile BIOS memory; this could be supplied to the installed processors on next boot.