A spate of hacking attacks on U.S. companies over the past two years has caused insurers to massively increase cyber premiums for some companies, leaving firms that are perceived to be a high risk scrambling for cover.
On top of rate hikes, insurers are raising deductibles and in some cases limiting the amount of coverage to $100 million, leaving many potentially exposed to big losses from hacks that can cost more than twice that.
“Some companies are struggling to find the money to buy the coverage they want,” said Tom Reagan, a cyber insurance executive with Marsh & McLennan Co’s Marsh broker unit.
The price of cyber coverage – which helps cover costs like forensic investigations, credit monitoring, legal fees and settlements – varies widely, depending on the strength of a company’s security. But the overall trend is sharply up.
Retailers and health insurers have been especially hard hit by the squeeze after high-profile breaches at Home Depot Inc , Target Corp, Anthem Inc and Premera Blue Cross.
Health insurers who suffered hacks are facing the most extreme increases, with some premiums tripling at renewal time, said Bob Wice, a leader of Beazley Plc’s cyber insurance practice.
Average rates for retailers surged 32 percent in the first half of this year, after staying flat in 2014, according to previously unreported figures from Marsh.
Higher deductibles are also now common for retailers and health insurers. And even the biggest insurers will not write policies for more than $100 million for risky customers. That leave companies like Target, which says its big 2013 data breach has cost $264 million, paying out of pocket.
No. 2 U.S. health insurer Anthem ran into difficulties renewing its coverage after an attack early this year that compromised some 79 million customer records, according to testimony from Anthem General Counsel Thomas Zielinski at an August hearing of the National Association of Insurance Commissioners.
Renewal rates were “prohibitively expensive,” according to minutes of that session seen by Reuters. The company managed to get $100 million in coverage, Zielinski said, but only after agreeing to pay the first $25 million in costs for any future attacks. The company would not say what that figure was before, but it was likely much smaller.
The Chinese company said the data center will span over 10 cloud services including Elastic Compute Service, offering scalable computing services, an Analytic Database Service that provides real-time, high-concurrency online analytical processing, and a Cloud Monitor System using an open platform for the real-time monitoring of sites and servers.
Alibaba did not respond to a request for more information on the new data center.
The company said earlier this year that it was investing US$1 billion in its cloud computing business. It launched its first data center in Silicon Valley in March, confirming its ambitions to enter the U.S. market.
The new data center is designed to accommodate the cloud and big data requirements of customers in the U.S. West Coast for the next three to five years, the company said. Alibaba has been targeting Chinese enterprises in the U.S, but it eventually wants to also attract U.S. firms there.
The launch of a data center in Silicon Valley enables Internet companies in China to expand their businesses in North America, Simon Hu, president of Alibaba cloud computing, said in May. Beyond that, the strategy would be predicated on consumer demand, the executive said ahead of the launch of the second data center in California.
Although smaller than some of its peers like Amazon Web Services, the company is rated by analysts as the largest cloud services provider in China, and has the opportunity to expand its business in Asia and other markets as some of its Chinese customers expand their operations outside China.
A problem with Cisco VPN systems could be exposing enterprise passwords to the sort of people who use them for bad things.
Yesterday we had Cisco warning about someone else’s problem, but today we have a company called Volexity volleying a shot in Cisco’s direction. Volexity said that it has found two exploitable vulnerabilities that can be used to drain details from databases. It reckons that this represents an upscaling in attacks, their means and their methods.
The problems exist in the web-based Cisco Clientless SSL VPN (Web VPN) that connects users to Cisco Adaptive Security Appliance devices. A screenshot shows this as a typical log-in box that asks for a username and password.
“As the industry is learning, firewalls, network devices and anything else an attacker might be able to gain access to should be scrutinised just as much as any workstation or server in an organisation.
“Having your own devices turned against you can make for a bad week. This represents yet another way attackers are taking credential theft and network persistence to the next level.”
We have asked Cisco to comment on the Volexity report, and are waiting for a response. Volexity has plenty to say, and explained that even two-factor authentication would have quailed in the face of the threat because of its positioning on the network.
The vulnerability has been present for at least a year, according to the study, and has been addressed by Cisco in the past. However, hackers moved fast and got a foot in the door.
“While Cisco provided updated software to address the vulnerability, attackers were already off to the races. Vulnerable organisations that were slow to update may have received an unwelcome addition to the source of their logon.html file,” added Volexity.
“Victim organisations effectively had their Cisco Web VPN devices turned into credential collectors for the attackers. This particular round of attacks appears to have compromised several organisations around the globe.”
This is the second time in a month that Cisco has had the insecurity finger pointed at its hardware. In September Mandiant warned about Synful Knock. Then Cisco released prophylactic tools, and thanked the messenger.
The tried and tested fake application threat has been felt again in the Android Play store, according to security research outfit ESET.
ESET is not new to this, nor is the Play store. The security firm said that the aim of the latest infections and attack is to take over a handset and flood it with advertising.
The infected applications are piggybacking on two popular games called Pou and Subway Surfers, both of which have been downloaded over 200,000 times.
“The apps pose as Cheats for Pou, Guide for Subway and Cheats For Subway, claiming to offer the same application functionality in apps. The payload of these applications is to deliver ads to users at regular intervals,” ESET said.
This sort of thing is common in a lot of apps, and is traditionally called advertising.
ESET said in a We Live Security blog post that this is much worse, explaining that once installed the application will resist all efforts at removal and will be a very stubborn presence and persistent marketing mouthpiece.
“While ad-supported applications are common in the Android ecosystem, there’s a clear boundary of behaviours that ESET cannot condone. These particular AdDisplay POUs [potentially unwanted applications] contain specialised self-protection functionalities that not only make the removal of the app from the Android device more difficult, but help it evade detection by Google Bouncer in the first place,” the firm said.
“When users realise that the apps are exhibiting very unusual behaviour and try to uninstall them, they will find that this is far from easy. The apps will ask the user to activate the device’s administrator rights. Thus, users may have difficulty removing this AdDisplay threat.”
The firm has announced workarounds for anyone suffering from the malware. We have, of course, asked Google for its own information and statements.
This isn’t the first time that Google Bouncer has been evaded for malicious gain. Perhaps the system is having some personal problems that are distracting it from work.
The Obama administration will not pursue legislation at this point to ban the encryption of communications by many technology services and product vendors, but will work on a compromise with industry, a senior U.S. official said.
“The administration is not seeking legislation at this time,” Federal Bureau of Investigation Director James Comey said in a statement before a Senate Committee on Homeland Security and Governmental Affairs.
Comey had previously asked for a “robust debate” on encryption of communications, saying that the technology could come in the way of his doing his job to keep people safe.
In his testimony, he said that the government is “actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services.”
Civil rights groups and the tech industry have asked President Barack Obama to take a stand against any dilution of encryption, including mandating the creation of backdoors for law enforcement, citing the right of individuals to use encryption for their privacy and security.
In a recent letter to Obama, Ed Black, president and CEO of industry body Computer & Communications Industry Association wrote that he was aware of an ongoing discussion within the administration regarding the growing availability of strong encryption in consumer products and communications systems, and its implications for criminal and counter-terrorism investigations.
“Technical and legislative policy proposals, from mandates to incentives, are being debated by a variety of stakeholders,” Black wrote.
Soitec’s CEO and board chairman has raised an eyebrow or two when he said that the iPhone 6s has multiple RF chips built on silicon-on-insulator (SOI) substrates and that Intel and IBM are using the tech for their silicon photonics push.
According to EETimes Paul Boudre, who claimed that SOI is already being used by Apple and Intel even though neither company is broadcasting it. SOI appears to be on track to major market penetration even while the rest of the industry is talking FinFETs.
GlobalFoundries general manager Rutger Wijburg told the SEMICON Europa 2015 that his outfit’s 22-nanometer “22FDX” SOI platform delivers FinFET-like performance but at a much lower power point and at a cost comparable to 28-nanometer planar technologies.
The 300-millimeter $250 million FD-SOI foundry here in the “Silicon Saxony” area of Germany, builds on 20 years of GlobalFoundries’ investments in Europe’s largest semiconductor fabs.
GlobalFoundries said it will extend Moore’s Law by using fully-deleted silicon-on-insulator (FD-SOI) transistors on wafers bought from Soitec.
Many had thought that if GloFlo’s FD-SOI gamble paid off then it would be a while before FinFET would have a serious rival. But Boudre’s claims suggests that SOI is already being used.
Customers like Intel and OEMs supplying fully-deleted silicon-on-insulator (FD-SOI) RF transistors to Apple proves that SOI and Soitec are past the cusp of the growth curve, destined to ramp up exponentially.
The problem for Soitec is no one is really talking about it. Chipzilla is committed to the FinFET, because it is higher performance than FD-SOI, even though it is higher power too.
Boudre said that it was supplying SOI wafers to Intel for other applications that don’t require high-performance. For instance, our wafers are very good for their silicon photonics projects.
Apple is already using SOI for several radio frequency (RF) chips in their front-ends, because they use 20-times less power. The iPhone is still using gallium arsenide (GaAs) for its power amplifier (PA) because it needs the high-power device for good connections, but for other RF front-end chips, and in fact for all the chips that they want to keep “always on,” the lower power consumption of FD-SOI is pushing the smartphone makers to Soitec, Boudre said.
SOI wafers cost three-times as much as bulk silicon but the cost per die is less because of the simplified processing steps including fewer masks.
Normally GPS chips run on 0.8 volts and consume over 20 milliamps, so they must be turned off most of the time. But when they are made with SOI wafers, they can run on 0.4 volts and consume only 1 milliamp. The mobile device to leave them on all the time and new and more accurate location sensing and new kinds of location-based applications can be developed.
What is amusing then is that Intel’s reason for going with FinFETs was that SOI wafers were too expensive but it did find a use for it.
GlobalFoundries’ Saxony fab will offer four varieties of its 22FDX process.
FDX-ulp for the mainstream and low-cost smartphone market. This will use body-biasing to beat FinFETs on power, but equal them in performance.
FDX-uhp for networking applications using analogue integration to match FinFETs while minimizing energy consumption
FDX-ull for ultra-low power required by wearables and Internet of Things applications. This will have a 1 picoamp per micron leakage
DDX-rfa for radio frequency (RF) analogue applications delivering 50 percent lower power and reduced system costs for LTE-A cellular transceivers, high-order multiple-input/multiple-output (MIMO) WiFi combo chips and millimeter wave radar.
The company recommended deleting the apps but did not name them, which may make it hard for people to know which apps put their data at risk.
The apps in question installed their own digital certificates on a person’s Apple mobile device. It would enable the apps to terminate an encrypted connection between a device and a service and view the traffic, which is a potential security risk.
Most websites and many apps use SSL/TLS (Secure Socket Layer/Transport Security Layer), a protocol that encrypts data traffic exchanged with a user. SSL/TLS is a cornerstone of Web security, ensuring data traffic that is intercepted is unreadable.
It is possible in some cases to interfere with an encrypted connection. Many enterprises that want to analyze encrypted traffic for security reasons will use SSL proxies to terminate a session at the edge of their network and initiate a new one with their own digital certificate, allowing them to inspect traffic for malicious behavior.
In that scenario, employees would likely be more aware or expect that kind of monitoring. But people downloading something from the App Store probably would have no idea of the access granted to their sensitive data traffic.
Apple checks applications to ensure that malicious ones are not offered in its store. Those checks are in large part the reason why Apple has had fewer problems with malicious mobile applications in its store.
Installing digital certificates isn’t itself a malicious action per se, but Apple may be concerned that users are not fully aware of the consequences of allowing an app to do so.
Eight months after admitting a major data breach, ride service Uber is focusing its legal efforts on obtaining more information about an internet address that it has persuaded a court could lead to identifying the hacker. That address, two sources familiar with the matter say, can be traced to the chief of technology at its main U.S. rival, Lyft.
In February, Uber revealed that as many as 50,000 of its drivers’ names and license numbers had been improperly downloaded, and the company filed a lawsuit in San Francisco federal court in an attempt to unmask the perpetrator.
Uber’s court papers claim that an unidentified person using a Comcast IP address had access to a security key used in the breach. The two sources said the address was assigned to Lyft’s technology chief, Chris Lambert.
The court papers draw no direct connection between the Comcast IP address and the hacker. In fact, the IP address was not the one from which the data breach was launched.
However, U.S. Magistrate Judge Laurel Beeler ruled that the information sought by Uber in a subpoena of Comcast records was “reasonably likely” to help reveal the “bad actor” responsible for the hack.
On Monday, Lyft spokesman Brandon McCormick said the company had investigated the matter “long ago” and concluded “there is no evidence that any Lyft employee, including Chris, downloaded the Uber driver information or database, or had anything to do with Uber’s May 2014 data breach.”
McCormick declined to comment on whether the Comcast IP address belongs to Lambert. He also declined to describe the scope of Lyft’s internal investigation or say who directed it.
Lambert declined to comment in person or over email.
Smartphone owners running Google’s Android operating system in more than 20 countries have been infected with a particularly aggressive malware program that bombards devices with unwanted advertisements.
Researchers from FireEye found that the malicious component, nicknamed Kemoge, has been seeded inside what appear to be legitimate apps offered on third-party application stores.
“This is another malicious adware family, possibly written by Chinese developers or controlled by Chinese hackers, spreading on a global scale that represents a significant threat,” wrote Yulong Zhang, a staff research scientist with FireEye.
Whomever created Kemoge repackaged legitimate apps with the malware and then promoted them on websites and through in-app ads to persuade people to download them.
Zhang listed a dozed affected apps: Sex Cademy, Assistive Touch, Calculator, Kiss Browser, Smart Touch, Shareit, Privacy Lock, Easy Locker, 2048kg, Talking Tom 3, WiFi Enhancer and Light Browser.
Third-party apps stores are considered risky places to download Android apps, as hackers frequently upload malicious apps to them. Google performs a security check on apps in its Play store, although harmful ones occasionally sneak in.
Kemoge not only displays unwanted ads, but it’s also loaded with eight root exploits that target a wide range of Android devices, Zhang wrote. A successful attack using those exploits means an attacker would have complete control over the device.
Kemoge will collect a device’s IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.
That command-and-control server was still running, Zhang wrote. An analysis of traffic exchanged between an infected device and the server showed Kemoge also tries to uninstall antivirus apps.
FireEye came across an app called Shareit in Google’s Play store that was signed by the same digital certificate as the malicious one found on the third-party source.
The Google Play version of ShareIt did not have the eight root exploits or contact the command-and-control server, but it did have some of the same Kemoge code libraries. It now appears to be gone from Google Play.
Samsung is not doing that well in smartphones. To be fair, no one is, but Samsung has the ability to become something much more interesting – it could replace AMD as Intel’s rival.
Actually AMD is pretty cheap right now and if it was not for the pesky arrangement that prevents AMD’s buyer getting its x86 technology then it would have been snapped up a while ago. But with, or without AMD, Samsung could still make a good fist of chipmaking if it put its mind to it. At the moment its chipmaking efforts are one of the better things on its balance sheet.
Its high-margin semiconductor business is more than making up for the shortfall in smartphones. Selling chips to rivals would be more lucrative if they were not spinning their own mobile business. The products it have are worth $11.7 billion this year, more than half the company’s total.
Growing demand for chips and thin-film displays is probably the main reason that Samsung now expects operating profit to have reached $6.3 billion. After applying Samsung’s 16 percent corporate tax rate, its chip division is likely to bring in net income of slightly less than $10 billion.
To put this figure into perspective Intel expects to earn $10.5 billion in this year. Samsung is also sitting on a $48 billion net cash pile. Samsung could see its handset and consumer electronics business as a sideline and just focus on bumping off Intel.
The two sides of such a war would be fascinating. Intel has its roots in the PC chip market which is still suffering while Samsung is based in the mobile chip market which is growing. Intel has had no luck crossing into the mobile market, but Samsung could start looking at server and PC chips.
AMD is still dying and unable to offer Intel any challenge but there is a large market for those PC users who do not want to buy Intel. What Samsung should have done is use its huge cash pile to buy its way into the PC market. It might have done so with the IBM tech which went to Lenovo. It is still not out of the running on that front. Lenovo might be happy to sell IBM tech to Samsung.
Another scenario is that it might try to buy an x86 licence from Intel. With AMD dying, Intel is sitting on a huge monopoly for PC technology. It is only a matter of time before an anti-trust suit appears. Intel might think it is worthwhile to get a reliable rival to stop those allegations taking place. Samsung would be a dangerous rival, but it would take a while before it got itself established. Intel might do well to consider it. Of course Samsung might buy AMD which could sweeten that deal for Intel.
Samsung could try adapting its mobile chip technology for the PC/server market – it has the money to do it. Then it has a huge job marketing itself as the new Intel.
It might just work.
Distributed Denial-of-Service (DDoS) attacks continue to plague companies and have spiked in numbers in the past three months, according to security firm and interested party Corero Network Security.
Some poor companies were hit with an average of 4.5 DDoS attacks a day in the past three months, an increase of about a third against the previous quarter.
While the attacks increased, they softened a bit, and Corero said that studies of its customer network found a number of low-bandwidth attacks, under 10Gbps, that lasted for less than 30 minutes. In fact, these attacks accounted for 95 percent of all those during the period.
Corero reckons that these quick fire DDoS attacks have been enabled by the ease of access to cheap, sometimes even free, attack tools that are easy to launch and easy to execute.
“Attackers are continuing to leverage DDoS attacks as part of their cyber threat arsenal to disrupt business operations or access sensitive corporate information, and they’re doing it in increasingly creative ways that circumvent traditional security solutions or nullify the previous effectiveness of scrubbing centres,” said Dave Larson, CTO and VP for product at Corero.
“In order to effectively protect their networks, prevent disruptions to customer operations, and better protect against data theft and financial loss, companies need real-time visibility and mitigation of all DDoS attack traffic targeting their networks, regardless of size or duration.”
Corero’s findings differ from predictions by Akamai, which reported a rise in mega DDoS attacks that are large in size and scale. Akamai has previously warned that big attacks with a 100Gbps hammer blow are likely to affect companies during the quarter and in the future.
Whatever, any kind of DDoS attack is a bad thing but, as Corero helpfully points out, companies offer protective solutions for the threat. So mega or mini, we can sleep safely knowing that the threat is in safe hands.
Dell Inc, the world’s third largest personal computer maker, is holding discussions to acquire data storage company EMC Corp, a person familiar with the matter said, in what could be one of the biggest technology deals ever.
A deal could be an option for EMC, under pressure from activist investor Elliott Management Corp to spin off majority-owned VMware Inc.
The terms being discussed were not known, but if the deal goes through it would top Avago Technologies’ $37 billion offer for Broadcom. EMC has a market value of about $50 billion.
Dell is also in talks with banks to finance an all-cash offer for EMC, the person told Reuters on condition of anonymity as the talks were confidential.
Dell spokesman David Flink and EMC spokesman Dave Farmer declined to comment.
A deal could further strengthen Dell’s presence among corporate clients at a time when founder Michael Dell has been trying to transform the company he founded in 1984 into a complete provider of enterprise computing services such as Hewlett-Packard Co and IBM.
The talks come two years after Michael Dell and private-equity firm Silver Lake took Dell private for $24.9 billion, ending its decades-long run as one of the world’s largest publicly traded PC makers.
In August, Re/code reported that EMC was contemplating a takeover by VMware. The Wall Street Journal reported last year that EMC was exploring options and had held talks with Dell and HP.
Jim Zemlin, chief executive of the Foundation, said in his opening remarks that this year’s opening day falls on the 24th anniversary of Linux itself and the 30th of the Free Software Foundation, giving credit to delegates for their part in the success of both.
He also noted that research conducted into the value of the Linux codebase has shown that in the past few years the code has been worth over $5bn.
As part of the launch he also made three key announcements. Firstly, a workgroup is being created to standardise the future of the software supply chain. The Openchain workgroup is centred on creating best practices to ease compliance for open source developers and companies.
In doing so it is hoped that cost and duplication of effort can be reduced significantly, and in doing so ease friction points in the supply chain. The workgroup’s founder members include ARM, Cisco, NexB, Qualcomm, SanDisk and Wind River.
By providing a baseline process, which can then be customised according to customer need, Linux developers will have a basis for monitoring and developing compliance programmes.
Existing best practices such as Debian and the Software Package Data Exchange will be used as foundations for the framework.
The second announcement involves an acceleration to the process of real-time Linux development. the Real-Time Linux Collaborative Project will bring together industry leaders and thinkers to advance the type of tech that is crucial for areas such as robotics, telecom, manufacturing, aviation and medical industries.
Two of this morning’s keynotes centred around the ideas of real-time Linux. Sean Gauley, founder of big data analysts Quid, talked about the $300m spent on a new London to New York undersea cable to cut just five milliseconds off data speed, coupled with the seven minutes of downtime the New York Stock Exchange has to suffer while humans crunch the impact of a Treasury announcement.
The Real-Time Linux Collaborative Project brings together organisations as diverse as Google, Texas Instruments, Intel, ARM and Altera.
Thomas Gleixner of the Open Source Automation Development Lab has been made a Linux Foundation fellow in order to lead the process of integrating real-time code into the main Linux kernel, which Zemlin joked would be finished within six months.
In reality this is a long-term goal, albeit a highly achievable one that could revolutionise a number of key industries.
Finally, FOSSology, the open source licence compliance software project and toolkit founded by HP in 2007, is moving home to become part of the Linux Foundation. With it comes FOSSology 3.0, due for release this week.
“As Linux and open source have become the primary building blocks for creating today’s most innovative technologies, projects like FOSSology are more relevant than ever,” said Zemlin.
“FOSSology’s proven track record for improving efficiency in licence compliance is the perfect complement to a suite of open compliance initiatives hosted at the Linux Foundation. This work is among the most important that we all do.”
FOSSology allows companies to run licence and copyright scans in a single click, and generate a Software Package Data Exchange, or readme file.
By moving the project to the Linux Foundation, the toolkit is kept in neutral hands alongside other initiatives such as the Core Infrastructure Initiative, the Open Container Project and Dronecode.
Dronecode’s Loenz Meier spoke alongside Tully Foote of the Open Source Robotics Foundation about their quest to “take back” the term ‘drone’ from its negative military connotations.
The team, whose work in Switzerland dates back to “when they were still called model aircraft”, included information about Mavlink, the self-styled ‘HTML for drones’, and Robot Operating System, a meta operating system for autonomous devices.
The team has been concentrating primarily on using telemetry data to allow drones to navigate around objects, in a similar way to that being achieved by Google’s self-driving cars.
LinuxCon Europe runs until Wednesday, bringing together representatives from back bedroom developers to giant corporations like Facebook, all sharing a common goal to nurture the community which approaches its quarter century primed to take over even more aspects of our everyday lives – quiet, unassuming but always there.
Speakers this year include people from Suse, Red Hat, Google, Raspberry Pi and the godfather of Linux, Linus Torvalds.
The INQUIRER will be talking tomorrow to some top bods from the Linux community. So early to bed for us tonight and absolutely no Guinness.
Industrial devices need flash that can work harder and withstand more extreme temperatures than consumer gear, and they’ll be operating out in the field years after a typical phone or camera card has been replaced. So SanDisk is introducing a line of components built for the Internet of Things.
IoT is expected to put thousands of sensors, meters, robots and machines into the field with growing needs to process and store data.
The SanDisk Industrial line includes cards for the familiar SD, microSD and eMMC (embedded MultiMediaCard) standards, but built to tougher specifications.
For example, the SanDisk Industrial XT SD Cards and XT iNAND embedded flash drives announced Monday are rated to work in temperatures as low as -40 degrees Celsius (-40 Fahrenheit), compared with -25 Celsius for a typical consumer SD card.
The industrial cards can also write more data before they have to be replaced: as much as 128TB, far more than is typical for a consumer-grade part, said Martin Booth, director of SanDisk Industrial and SanDisk Automotive. This kind of endurance is what’s needed in IoT devices like remote video cameras that will capture video around the clock for as long as five years, he said. Otherwise they would have to be replaced more frequently, a costly proposition if the owner needs to send out a truck and a technician.
Another feature, Enhanced Power Immunity, will help prevent data loss in case of power failure. It uses special firmware for recovering data if the power is cut off, something ordinary flash cards may not be able to do if, for example, the user pulls a card out of a PC while it’s still transferring data.
The new parts range in size from 4GB or 8GB up to 64GB and will cost more than comparable consumer-grade products, but less than twice as much, Booth said.
Intel’s next-generation Cannonlake consumer-targeted processors could be the chip to leap from quad-core designs for the great unwashed.
An Intel engineer has been caught boasting on this Linkedin profile that he had a hand in Cannonlake system-on-chip (SoC) parts which integrated four, six, or eight processing cores with a Converged Coherent Fabric (CCF). He described this as acting like the Northbridge of an old-fashioned chipset setup.
Intel has not used this phrase before but it does explain some rather strange job adverts wanting a ‘Coherent Fabric Architecture Engineer.’ We have not met anyone in the fashion industry who was coherent let alone a fabric maker.
Intel has been making products with lots of processing cores but it seems addicted to four cores on consumer desktops (with or without the HyperThreading technology that extends it to running eight simultaneous threads.)
If the leak is right, then the 10nm Cannonlake family could be offered in hexa- and octa-core varieties.
Boosting the number of CPU cores on its next-generation products would allow the company to continue to tell software developers to concentrate on making the best use of CPU cores rather than looking to HSA and other than the general-purpose GPU to boost performance.