Same here. You sure about that? HT might not even be the best idea if you need to rely on those threads. Give it a try.I do audio production using many threads, its really not an option to disable hyperthreading for me.
Cheers
Same here. You sure about that? HT might not even be the best idea if you need to rely on those threads. Give it a try.I do audio production using many threads, its really not an option to disable hyperthreading for me.
One of the first things that I do when I get a new system is to disable hyperthreading - and I've done this since when HT first appeared.HT might not even be the best idea if you need to rely on those threads.
That is really interesting and you have me looking at this different now. A lot of my software and particularly plugins utilize distributed processing across multiple cores. I'll have to try disabling HT while running a large session with a lot of plugins and see if it's the same CPU performance if not better.One of the first things that I do when I get a new system is to disable hyperthreading - and I've done this since when HT first appeared.
On a case-by-case basis, I may enable hyperthreading. Those cases are when the system spends significant time with all physical cores busy. If you don't have significant periods of time with 100% CPU usage, hyperthreading can hurt your performance. Even if you do hit over 100%, hyperthreading is often only a mild benefit.
Actually, what worried me most was the vulnerability was demonstrated attacking a computer running the current version of TOR browser within a VM instance of Tails. Just goes to show with the right set of skills a hacker will achieve their payload regardless of most basic security implementations. I guess these Intel processors are just RIDL'd with security holesYou'll probably be fine, then. Install NoScript if you're still paranoid. Internet street-smarts should be your front-line defense. If you get hit with an attack but have HT disabled, guess what - you still have a problem because malicious code is still running on your machine.
- Is your web browser up to date?
- Do you have an adblocker extension installed? (to prevent malvertising attacks)
- Xprotect definitions up to date?
- Is your Mac behind a router with a firewall?
- Do you avoid visiting shady websites?
- Do you carefully vet the source of the software you download?
Actually, what worried me most was the vulnerability was demonstrated attacking a computer running the current version of TOR browser within a VM instance of Tails. Just goes to show with the right set of skills a hacker will achieve their payload regardless of most basic security implementations. I guess these Intel processors are just RIDL'd with security holes
That's what I was trying to get at. But as always: YMMVThose cases are when the system spends significant time with all physical cores busy. If you don't have significant periods of time with 100% CPU usage, hyperthreading can hurt your performance.
You can change that in the settings.(For some reason, "htop" numbers CPUs from 1 to N, whereas most tools number them from 0 to N-1.)
I hope that I'm wrong, but I'm inclined to think that Intel announced that they don't plan to issue microcode corrections for Nehalem and Westmere Xeons to force enterprise upgrades for servers with these processors still in use.Could be wrong, but I cannot see Intel staying the course and refusing to update the microcodes for the X56 proc regardless what they put in print. Why, this was one of the main procs in the HP 360/380 line for the 5520 chipset in the G7s. There are a lot of G7s out there in data centers all over the world still running and still under extended warranty by HP. Yes, you would be surprised. Unless Intel is willing to assist HP and not Apple. There would be too much blowback coming out of this vulnerability and Intel sitting on their hands. Maybe Intel seen Apple had so much fun on their planned obsolescence class action suite, Intel wanted to get in some of that action too.
In case this info is helpful to anyone. I am on a 4,1->5,1 with a MVC-flashed GTX 980 and still on HS 10.13.6 due to lack of drivers for Mojave. I was still able to download the Mojave full installer and run the 144 BootROM upgrade. I guess the installer doesn’t check the GPU too closely during the BootROM upgrade.
In case this info is helpful to anyone. I am on a 4,1->5,1 with a MVC-flashed GTX 980 and still on HS 10.13.6 due to lack of drivers for Mojave. I was still able to download the Mojave full installer and run the 144 BootROM upgrade. I guess the installer doesn’t check the GPU too closely during the BootROM upgrade.
Good to know. Thnx.FWIW, with the 144 firmware and the NVRAM settings to disable HyperThreading, my Windows 10 UEFI installation (yes I know, I know) is unstable. It intermittently freezes on the Windows logo at the beginning of the boot sequence, before the spinning wheel, and goes no further. When it does boot successfully, it shows HyperThreading disabled, as others have pointed out. If I reset the NVRAM to clear out those settings, Windows goes back to being stable again.
I’m not sure if reinstalling Windows with those NVRAM settings in effect would help, but I just reinstalled Windows for other reasons so I’m not super keen on doing that. I’m also afraid to mess with it too much more, since I think it’s freezing right around when the SecureBoot/certificate stuff happens, and I know that is already a known problem area for these machines...
FWIW, with the 144 firmware and the NVRAM settings to disable HyperThreading, my Windows 10 UEFI installation (yes I know, I know) is unstable. It intermittently freezes on the Windows logo at the beginning of the boot sequence, before the spinning wheel, and goes no further. When it does boot successfully, it shows HyperThreading disabled, as others have pointed out. If I reset the NVRAM to clear out those settings, Windows goes back to being stable again.
I’m not sure if reinstalling Windows with those NVRAM settings in effect would help, but I just reinstalled Windows for other reasons so I’m not super keen on doing that. I’m also afraid to mess with it too much more, since I think it’s freezing right around when the SecureBoot/certificate stuff happens, and I know that is already a known problem area for these machines...
I´m curious about How many users ara disabling HT. In my case, not a chance.
Thank you so much. I can see the "Nothing" is a winner.We already have a poll going.
https://forums.macrumors.com/thread...-patching-for-older-macpros-now-what.2181576/
Does this mean we should manually download the updated updates and re-install them? Are the build numbers different on the newer updates?Today Apple re-issued:
All of last week non-beta releases were deprecated. Reissues have the same builds as last week:
- 10.14.5 combo/delta,
- Security Update 2019-003 for 10.12.6,
- Security Update 2019-003 for 10.13.6
- iTunes Device Support
View attachment 838170
- 18F132 build for 10.14.5
- 17G7024 for Security Update 2019-003 for 10.13.6
- 16G2016 for Security Update 2019-003 for 10.12.6
[doublepost=1558403757][/doublepost]No firmware changes, btw.