{"id":332,"date":"2018-02-13T16:29:55","date_gmt":"2018-02-13T21:29:55","guid":{"rendered":"http:\/\/blog.richmond.edu\/mgmt340-03\/?p=332"},"modified":"2018-02-13T16:29:55","modified_gmt":"2018-02-13T21:29:55","slug":"intels-failure-to-manage-quality-in-production","status":"publish","type":"post","link":"https:\/\/blog.richmond.edu\/mgmt340-03\/2018\/02\/13\/intels-failure-to-manage-quality-in-production\/","title":{"rendered":"Intel&#8217;s Failure to Manage Quality in Production"},"content":{"rendered":"<p>During the first week of January 2018, independent researchers announced that they had discovered massive security breaches in all of Intel&#8217;s chips. These flaws allowed hackers to penetrate the data within to recover files stored on the chips that were deemed the most secure. Spectre and Meltdown, as the breach points have become known, are now two of the biggest problems plaguing Intel&#8217;s supply of processors currently. The extent of this discovered breach is massive as it impacts almost every single PC, smartphone, and server in the entire world. Intel has a near monopoly on the supply of these processors world-wide, however over the last few years many have been eyeing their position in hopes of gaining market share. Soon after the research was posted, Intel released a software patch that supposedly fixes and alleviates security concerns but slows down all of their chips by 30%. This severely impacted their reputation as one of the driving forces in computing and a brand of the highest quality.<\/p>\n<p>This is a clear example of a problem that is an assignable cause to all of their products. Fortunately, being a piece of technology that doesn&#8217;t need to be re-hardwired the company was able to save billions on potential recalls for millions of their chips. However many cloud based services are preparing suits against Intel as they are losing 30% of their previous capacity due to the update, as well as the large potential security breaches. This is a huge issue for their corporation that could have been avoided if they had made quality and security more of a priority during production and development of the chips.<\/p>\n<p>The corporation runs on a tight schedule, attempting to release the newest generation of faster processors every twelve months. The pressure to continue to innovate and create ever faster chips must have put a large strain on engineers attempting to decrease their critical path. The lack of slack time involved in the project must have put an extra stress on assets that are order qualifiers such as security that they are not focused on, in order to achieve an order winner such as speed of the processor. Intel has continually pushed to have the fastest and most efficient processors on the market. This pressure could have been a reason that the security issue was allowed to go so far without being noticed over the last 20 years.<\/p>\n<p>Intel should focus on improving their processes surrounding security, in order to prevent such flaws from being incorporated into their chips. They can develop new projects and processes to improve security while maintaining the current levels of speed that the processors possess today. Security is increasingly becoming more of an order winner as the Internet develops more sophisticated criminals that would be able to easily take advantage of security leaks such as this. Intel should prioritize security for the next round of chip production, as the average consumer won&#8217;t particularly hurt by any potential speed improvements yet would give their public image a much needed facelift.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-333\" src=\"https:\/\/blog.richmond.edu\/mgmt340-03\/files\/2018\/02\/Intel-Chip-Image-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Additional Sources:<\/p>\n<p>http:\/\/www.zdnet.com\/article\/security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable\/<\/p>\n<p>https:\/\/www.wired.com\/story\/meltdown-spectre-bug-collision-intel-chip-flaw-discovery\/<\/p>\n<p>https:\/\/web-a-ebscohost-com.newman.richmond.edu\/bsi\/detail\/detail?vid=5&#038;sid=18400241-7115-4fcc-a3f2-ab722bcbeaf5%40sessionmgr4009&#038;bdata=JnNpdGU9YnNpLWxpdmU%3d#db=bth&#038;AN=127382714<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the first week of January 2018, independent researchers announced that they had discovered massive security breaches in all of<\/p>\n","protected":false},"author":3074,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[71151],"tags":[],"class_list":["post-332","post","type-post","status-publish","format-standard","hentry","category-managing-quality"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/posts\/332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/users\/3074"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":0,"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richmond.edu\/mgmt340-03\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}