The Meltdown and Spectre vulnerabilities are unspecific to any one vendor and take advantage of techniques commonly used in most modern processor architectures. This means a large range of products are affected. Mitigations could include updates to both OSs and firmware (BIOS).
NI recommends customers follow security best practices to protect against exploitation of vulnerabilities. These practices include adopting software updates, avoiding unrecognized hyperlinks and websites, not downloading files or applications from unknown sources, and following secure password policies.
NI has observed some negative system performance impact from applying the mitigations. Generally, performance degradation is in line with reports from the industry. In some cases, the impact could be significant but is specific to the application. The “Switch | Registry Settings” section of this Windows Support article describes how to enable or disable the Meltdown/Spectre mitigations. Note: If you disable the mitigations and then apply a Windows update from Microsoft, you may need to restart your computer twice to ensure that the mitigations remain disabled.
The “Verifying that protections are enabled” section of this Windows Support article can help identify whether the mitigations have been applied successfully.