INTEL launches the new generation of Tiger Lake processors

(To Alessandro Rugolo)
07/09/20

On September XNUMX, Intel announced the release of the new generation of processors, the eleventh, called "Tiger Lake".
The Santa Clara house announces improvements in all areas, from individual productivity to gaming. The main ones concern the graphics capabilities of the new Intel® Iris® Xe processor, considered as the best processor for laptops and capable of doubling performance in video games. More than 150 products from the main manufacturers of laptops based on the new generation processor are expected, also thanks to its low power consumption which allows to increase battery life and speed up charging.
Nine different configurations will be available, starting from the dual core i3-1110G4 with a base frequency of 1.8 GHz up to the i7-1185G7 quadcore with a maximum speed of 4.9GHz, all with the new Iris Xe graphics processor integrated inside.

The new platforms (Intel Evo) will be equipped with the new connection technologies Thunderbolt 4 (cable) and Intel 6 WiFi (Gig +), with the intent to provide buyers with the best possible user experience.

The new generation of processors makes extensive use of Artificial Intelligence thanks to the introduction of the first instruction set for inferential neural networks for integrated graphics.

On closer inspection, this time Intel seems to have also seriously considered an aspect that has become critical in recent years.
I do not think it is necessary to remember that two major security holes in Intel processors (and not only!) Have been highlighted recently, known since 2018 with the names Meltdown e Spectre (v.articolo) and followed by more recent vulnerabilities of the same category. Not to mention attempts to fix flaws via software that have caused further problems and general degradation of processor performance.

The new generation of Intel processors also seems to take a step forward in the field of security, implementing the new Intel technology Control-Flow Enforcement Technology (Intel CET).

According to experts from Zero Day Initiative di Trend Micro Most of the attacks discovered are based on mismanagement of memory access and the new technology intends to take this problem seriously by providing programmers with various security options that can be used to prevent "control-flow hijacking malware" attacks using techniques of "indirect branch tracking" and "Shadow Stack".

Everything will lie in seeing if what promised will be kept, we hope so!

To learn more:
https://www.difesaonline.it/evidenza/cyber/meltdown-considerazioni-sulli...
https://www.pcmag.com/news/intel-launches-11th-generation-core-tiger-lak...
https://newsroom.intel.com/news-releases/11th-gen-tiger-lake-evo/#gs.ff40co
https://newsroom.intel.com/editorials/intel-cet-answers-call-protect-com...
https://www.lesnumeriques.com/informatique/meltdown-spectre-qu-faut-savo...
https://meltdownattack.com/
https://www.zerodayinitiative.com/advisories/published/
https://www.trendmicro.com/it_it/about/newsroom/press-releases/2019/2019...
https://software.intel.com/content/www/us/en/develop/articles/technical-...