back to article How Intel and AMD hope to win the cloud security game

As cloud service providers increasingly look to x86 architecture alternatives, Intel and AMD are trying to find ways to gain or hold favor in the market – and this includes baking in security features and forming services and partnerships. Both semiconductor giants announced cloud security initiatives this week. At the Intel …

  1. Claptrap314 Silver badge

    Honestly?

    Is there ANYONE who thinks that the folks at AMD _want_ x86 to continue? Did not Intel roll out a completely new system around, ohh, 1998?

    x86 is bolted on the outside of their designs. Okay, the K5 was a bad idea, but the inside of the K7 was about as non-x86 as you could ask for while not losing speed. I assume Intel's been the same way.

    The issue is the install base.

  2. amanfromMars 1 Silver badge

    Apples are Good for You* .... and MKUltra Tasty when Tested Too?

    Intel is expected to run a pilot for Project Amber with select customers later this year.

    Or, and Intel may confirm it or choose to trial and trail that they can neither confirm or deny, a select customer will master pilot a Project Amber iteration for them that generates wealth and power and prestige and grows economies ....... for that minimal degree of separation that maximises protection from persecution should anything go terribly wrong or spectacularly right ..... "It was him/her/them/IT/an AI what done it, your honour, not us working with Intel"

    One thing to bear in mind though, and it's a real doozy, is such a program as has a select customer master piloting a Project Amber iteration for Intel that generates wealth and power and prestige and grows economies, is equally easily availed by any other global foundry/chip designer/ultra secure manufacturer with the simple will or great need or insatiable desire to provide the aforementioned Master Piloted AIM, which one would have to concede and agree is truly ambitious to the nth degree.

    Further subtle surreal revelatory details on the how all such is to be done are to be found in a post registered with the title ..... For Sale To Lease and Lend For Nothing and a Real Bargain at Hellish Prices

    * Although there are naysayers who would try to prevent you knowing too much about something revealing and exploring and expanding the nature of everything :-) ......

    Adam and Eve were told by God that they mustn’t eat the fruit from the tree of knowledge or they would die. In the Garden of Eden, a deceitful snake told Eve that God was lying. He made Eve believe that if they ate the fruit, she and Adam would become wise like God. Eve picked an apple and took a bite. She offered the fruit to Adam and when they were finished eating, they realized for the first time that they were not wearing clothes. According to the story, God punished the pair by making their lives, and the lives of their descendants, difficult. ..... https://www.reference.com/world-view/bit-apple-first-adam-eve-81995f5003166e41

    There's a hell of a lot going on out there in the Virtual Space, El Reg, and way out in front of IT with AIMaster Pilots allows one to lead like a Stirling with its Sterling Stellar Reporting ...... [think Per Ardua ad Astra on Metadata Base Steroids for an inkling of the flavoursome delights to savour and favour/mentor and monitor]

  3. Paul Crawford Silver badge

    Hmm, given the secretive nature of the x86 (and other) management engines, and the fundamentally unknowable status of a someone else's running machine you start execution on, I don't think you can really have "secure" cloud computing in any real sense. Those in charge of the hardware always have means of subverting you.

    Yes, it might help with cross-load snooping and stuff like encrypted data at rest helps with preserving security on disposed of (or stolen) hardware, but just how secure is it against the cloud company country of operation's spooks?

    1. amanfromMars 1 Silver badge

      Take Care. Be Aware and Beware the Cure does Break the Bank rather than Provide the Ransom

      Those in charge of the hardware always have means of subverting you. ... Paul Crawford

      If the only means of doing that is by those in charge of the hardware pulling out the plug on connected machinery, and there are those who will tell that is the only surefire way, is the resultant disastrous chaos and destruction to that and those in charge on at least an equal par to the recognised rapidly approaching calamity that they thought was worth subverting.

      Shooting yourselves in the head, as the above would be akin to, to avoid a preventable dilemma with myriad solutions readily available for presentation and deployment/employment and enjoyment, albeit with such in the command and control of others, other than those in present current charge of disorder and mayhem, is surely the dumbest and craziest answer available ...... anywhere.

      Y’all are taking a long time recognising and accepting such tasks are what computers and virtual machines are for by virtue of their Specifically IntelAIgently Designed Beings.

      Take a comfortable back seat, stretch out and put your feet up and enjoy the Crazy Diamonds at urWork, REST and Play Show

    2. amanfromMars 1 Silver badge

      To Be Forewarned is To Be Forearmed, however ..... there are Occasionally Exceptional Exceptions

      Yes, it might help with cross-load snooping and stuff like encrypted data at rest helps with preserving security on disposed of (or stolen) hardware, but just how secure is it against the cloud company country of operation's spooks? ...... Paul Crawford

      Talking of spooky country lines of operations, here's a real doozy you may know very little about before it tries its very best to decimate you and extraordinarily prerender/rerender you both practically powerless and virtually helpless, only to discover far too late to prevent their folly, the self destructive error and diabolically punitive nature of their way.

      The Super Sub Atomic NEUKlearer HyperRadioProACTivated IT Time Bombe ... and/or the Target of that Weaponry ...... and that which you have just been advised to recognise and accept and take care of, be aware and beware the cure does break the bank rather than provide the ransom ....... If You Thought The Coinbase Bankruptcy Disclosures Were Bad...

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2022