recentpopularlog in

bug

« earlier   
I Got a Knuth Check for 0x$3.00 | Something Something Programming
Donald Knuth is a computer scientist who is so committed to the correctness of his books that he offers one US hexadecimal dollar ($2.56, 0x$1.00) for any “bug” found in his books, where a bug is anything that is “technically, historically, typographically, or politically incorrect”.
taocp  knuth  check  programming  cool  search  bug 
6 days ago by bekishore
macOS: Photos Won’t Sync Photo Stream [Solved]
Use Activity Monitor to find and quit "Photos Agent" process.
macos  mac  photosapp  photos  app  won't  sync  photostream  problem  bug  syncing  fails 
7 days ago by 44sunsets
AMD Intel HD Graphics | Community
Apparently if the WDDM version doesn't match on windows 10 you could face problems running a discrete video card with the onboard Intel GPU
sysadmin  tips  tricks  video  card  driver  WDDM  version  mismatch  bug  windows  10 
8 days ago by asteroza
Intel Side Channel Vulnerability MDS
On May 14, 2019, Intel and other industry partners shared details and information about a new group of vulnerabilities collectively called Microarchitectural Data Sampling (MDS).

First identified by Intel’s internal researchers and partners, and independently reported to Intel by external researchers, MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques. Under certain conditions, MDS provides a program the potential means to read data that program otherwise would not be able to see. MDS techniques are based on a sampling of data leaked from small structures within the CPU using a locally executed speculative execution side channel. Practical exploitation of MDS is a very complex undertaking. MDS does not, by itself, provide an attacker with a way to choose the data that is leaked.

For products where MDS is not addressed in hardware, Intel is releasing processor microcode updates (MCU) as part of our regular update process with OEMs. These are coupled with corresponding updates to operating system and hypervisor software.

When these mitigations are enabled, minimal performance impacts are expected for the majority of PC client application based benchmarks. Performance or resource utilization on some data center workloads may be affected and may vary accordingly.

Once these updates are applied, it may be appropriate for some customers to consider additional steps. This includes customers who cannot guarantee that trusted software is running on their system(s) and are using Simultaneous Multi-Threading (SMT). In these cases, customers should consider how they utilize SMT for their particular workload(s), guidance from their OS and VMM software providers, and the security threat model for their particular environment. Because these factors will vary considerably by customer, Intel is not recommending that Intel® HT be disabled, and it’s important to understand that doing so does not alone provide protection against MDS.

More detailed information on mitigations affecting MDS vulnerabilities can be found here https://software.intel.com/security-software-guidance/software-guidance/microarchitectural-data-sampling
intel  cpu  hardware  security  bug 
10 days ago by some_hren
Screen Time old device bug: Dev used device ID as key, forgot Apple ID
Dev needed to use combination of Apple ID and Device ID to manage device, used only Device ID.
s  bug  sphone4all 
14 days ago by jgordon
Can't suspend again after suspending one time. · Issue #11810 · systemd/systemd
After suspending the system once can't suspend again. Shutdown gives unmount failed errors and can't shutdown too. System info System: Host: Capsparrow Kernel: 4.20.10-1-MANJARO x86_64 bits: 64 compiler: gcc v: 8.2.1 Desktop: KDE Plasma ...
hardware  bug  amd 
18 days ago by djbl

Copy this bookmark:





to read