Sorry, just realised the link I posted was broken. If one follows the links from that document, to this one:
https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-inThere are official ways to enable or disable either part of the patches via the registry.
Aside from testing, I'm probably going to stay away from the updated microcode and the patches and the drivers.... The microcode is now being advised to be avoided, as are the patches, and the drivers are known to have major issues. Apparently, that Jan 9 deadline for the patches, wasn't enough time, and there wasn't enough testing done. I'm going to wait for new microcode and patches and update when the updates are not broken.
I feel bad for vendors, like EVGA, because I know that they invested their staff's time and effort in making BIOS updates available, only to have intel announce that they are no good, just two weeks later. I like to think that it might be worth EVGA's time, to make a tool to modify existing BIOS with updated microcode. Seems that it would be faster and cheaper, for them to do that, than to have to actually make and release all the new BIOS all over again.