after the moment passed, one of those
life changing decisions that, somewhere inside,
I know altered my chemistry, my core and will
reside with me the rest of this life, and each that may follow,
I said to myself, years from now, will I forgive, regret, or forget?
Now I am here today, looking back on 40 years
it took to arrive and I run across the river flowing swift,
I climb the rocks from the shoreline, and I stop at the bridge.
Years from now will I still be standing here again
running circles always coming back to the same place
or will I finally make it across to the other side,
to whatever is waiting?
Sands cover the landscape spewing steam.
The vast ocean surfaced with the grains I have discarded.
Passing through dimensions and space and time.
Passing through all matter.
I wait here on the rocky shores.
The shores of an unnamed planet.
What we have spans time.
I know beyond what the immediate senses are telling me
that you will soon emerge from the depths and upon
recognizing my presence, we can walk into the sunset
bordered by two moons.
Computer researchers have recently found out that the main chip in most modern computers—the CPU—has a hardware bug. It’s really a design flaw in the hardware that has been there for years. This is a big deal because it affects almost every computer on networks, including workstation and servers.
This hardware bug allows malicious programs to steal data that is being processed in your computer memory. Normally, applications are not able to do that because they are isolated from each other and the operating system. This hardware bug breaks that isolation.
So, if the bad guys are able to get malicious software running on your computer, they may be able to get access to your passwords stored in a password manager or browser, your emails, instant messages, and documents.
The more severe vulnerability, Meltdown (CVE-2017-5754), appears isolated to Intel processors developed in the last 10 years. Spectre (CVE-2017-5715 and CVE-2017-5753) on the other hand, theoretically affects all processors that use speculative execution, including most modern processors manufactured by Intel, AMD, ARM and potentially more.
From a quick read of the many articles, mitigation will require OS patches and firmware updates from Intel, AMD, Arm, etc. For Microsoft, the patch is dependent on having an approved AV application running that sets a compatibility registry key that Microsoft updates will reference. Windows Defender and Microsoft Security Essentials are of course approved and can be used if nothing else is available.
Below are links to information for Microsoft, VMware, Apple, and AWS.