Solved

Pentium II Bugs

Posted on 1998-04-10
4
170 Views
Last Modified: 2010-04-12
Does anybody know if Intel corrected the FP bugs on the Pentium II processor? Or they just give a "software solution" ? Thanks
0
Comment
Question by:garkelin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 4

Expert Comment

by:saar2
ID: 1134224
May I ask what is the FP bugs?
Thanks for the info,

Saar
0
 

Author Comment

by:garkelin
ID: 1134225
I'm referring to the bugs found on the Floating Point (FP) Unit. I don't know exactly what the bug was about, but i think it was something similar the  Pentium bug.
0
 
LVL 11

Accepted Solution

by:
alexo earned 50 total points
ID: 1134226
All your questions will be answered if you just point your browser to http://www.x86.org/ and surf.

0
 
LVL 7

Expert Comment

by:busuka
ID: 1134227
Do you mean Dan-411 bug ?
0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question