Feeds

Dixon Intel mobile PIIs have serial numbers – it's a bug, official

It's a manufacturing erratum, not a bug, Intel insists

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Updated A Register reader is claiming that Pentium II/mobiles using the Dixon cores embed unique serial numbers and has posted information on his site to back up his claim. And now Intel has confirmed it has a manufacturing problem. Pierre Chassaing's Web site produces evidence for his claim. He used a utility called WCPUID to interrogate a Dell Inspiron 7000 laptop. An Intel representative confirmed there was a problem. He said: "There is an erratum in a limited number of the mobile processors. Some prototype circuitry has gone through. We'll do a BIOS patch in the next day. This was not intentional." He added: "This erratum only affects those mobile Celeron and Pentium II Processor parts with on-die L2 cache that use the mobile module package. These products were introduced on Jan 25th of this year, and have only been sold in systems since then." Intel describes bugs as errata, not bugs. ® Intel moves to re-assure industry on erratanotbugs Intel Developer Forum Feb 99

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.