{"id":1126,"date":"2018-01-08T14:21:44","date_gmt":"2018-01-08T20:21:44","guid":{"rendered":"http:\/\/sites.augsburg.edu\/it\/?p=1126"},"modified":"2018-01-08T14:25:54","modified_gmt":"2018-01-08T20:25:54","slug":"meltdown-and-spectre-vulnerabilities","status":"publish","type":"post","link":"https:\/\/sites.augsburg.edu\/it\/2018\/01\/08\/meltdown-and-spectre-vulnerabilities\/","title":{"rendered":"Meltdown and Spectre vulnerabilities"},"content":{"rendered":"<div>The latest computer vulnerabilities, being called Meltdown and\u00a0<span class=\"il\">Spectre<\/span>, relate to how the CPU (brain) of computers operates. The major software vendors are releasing patches to their software (Windows, MacOS, linux) to deal with the vulnerabilities.<\/div>\n<div><\/div>\n<div>We are updating servers as the updates are made available by vendors. We may have to schedule some off-hours downtime for major services to complete the patching.<\/div>\n<div><\/div>\n<div>For institutional PCs we&#8217;ll be pushing out updates once they are available.\u00a0 For Macs those will be pushed by Apple through the App Store under the Apple Menu. On your personal computers be sure to run your system updates.<\/div>\n<div><\/div>\n<div>Early news reports suggest computers may become slower after the patching though whether that will be noticeable will likely depend on how old the computer is.<\/div>\n<div><\/div>\n<div>We&#8217;ll be monitoring this as it continues to unfold.<\/div>\n<div class=\"yj6qo ajU\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The latest computer vulnerabilities, being called Meltdown and\u00a0Spectre, relate to how the CPU (brain) of computers operates. The major software vendors are releasing patches to their software (Windows, MacOS, linux) to deal with the vulnerabilities. We are updating servers as the updates are made available by vendors. We may have to schedule some off-hours downtime &hellip; <a href=\"https:\/\/sites.augsburg.edu\/it\/2018\/01\/08\/meltdown-and-spectre-vulnerabilities\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Meltdown and Spectre vulnerabilities&#8221;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1126","post","type-post","status-publish","format-standard","hentry","category-notification"],"_links":{"self":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts\/1126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/comments?post=1126"}],"version-history":[{"count":2,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts\/1126\/revisions"}],"predecessor-version":[{"id":1128,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts\/1126\/revisions\/1128"}],"wp:attachment":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/media?parent=1126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/categories?post=1126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/tags?post=1126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}