Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: memory Clear Filter

We rewrote the Ghostty GTK application

August 14, 2025 We just completed rewriting the Ghostty GTK application fully embracing the GObject type system from Zig and also verifying with Valgrind every step of the way. The result is a more feature rich, stable, and maintainable Ghostty on Linux and BSD. There are multiple interesting, technical topics from this process, but I want to focus in on two (1) interfacing with the GObject type system from Zig and (2) verifying a GTK application with Valgrind and reflecting on the memory issu

We Rewrote the Ghostty GTK Application

August 14, 2025 We just completed rewriting the Ghostty GTK application fully embracing the GObject type system from Zig and also verifying with Valgrind every step of the way. The result is a more feature rich, stable, and maintainable Ghostty on Linux and BSD. There are multiple interesting, technical topics from this process, but I want to focus in on two (1) interfacing with the GObject type system from Zig and (2) verifying a GTK application with Valgrind and reflecting on the memory issu

Why top and free in containers don't show the correct container memory (2018)

Hey, Something that is very common to get wrong when starting with Linux containers is to think that free and other tools like top should report the memory limits. Here you’ll not only go through why that happens and how to get it right, but also take a look at where is the Kernel looking for information when you ask it for memory statistics. Also, if you’re curious about how the code for keeping track of per-cgroup page counter looks, stick to the end! This is the third article in a series

A spellchecker used to be a major feat of software engineering (2008)

A Spellchecker Used to Be a Major Feat of Software Engineering Here's the situation: it's 1984, and you're assigned to write the spellchecker for a new MS-DOS word processor. Some users, but not many, will have 640K of memory in their PCs. You need to support systems with as little as 256K. That's a quarter megabyte to contain the word processor, the document being edited, and the memory needed by the operating system. Oh, and the spellchecker. For reference, on my MacBook, the standard dictio

Claude can now save you more time by automatically referencing past chats

J Studios/Getty Images ZDNET's key takeaways Claude can now be prompted to reference past user interactions. The feature rolls out today to Max, Team, and Enterprise users. It'll be turned on by default, but you can also switch it off. Claude just got a major memory upgrade: Anthropic's flagship generative AI chatbot can now retrieve information from past conversations, the company announced Monday. The new feature is designed to enable a more streamlined, convenient, and personalized user

A Spellchecker Used to Be a Major Feat of Software Engineering

A Spellchecker Used to Be a Major Feat of Software Engineering Here's the situation: it's 1984, and you're assigned to write the spellchecker for a new MS-DOS word processor. Some users, but not many, will have 640K of memory in their PCs. You need to support systems with as little as 256K. That's a quarter megabyte to contain the word processor, the document being edited, and the memory needed by the operating system. Oh, and the spellchecker. For reference, on my MacBook, the standard dictio

Anthropic’s Claude chatbot can now remember your past conversations

is The Verge’s senior AI reporter. An AI beat reporter for more than five years, her work has also appeared in CNBC, MIT Technology Review, Wired UK, and other outlets. Posts from this author will be added to your daily email digest and your homepage feed. On Monday, Anthropic released a hotly anticipated memory function for its Claude chatbot. In a YouTube video, the company demonstrated a user asking what they had been chatting about with Claude before their vacation. Claude searches past c

Operation Costs in CPU Clock Cycles (2016)

Author: “No Bugs” Hare Follow: Job Title: Sarcastic Architect Hobbies: Thinking Aloud, Arguing with Managers, Annoying HRs, Calling a Spade a Spade, Keeping Tongue in Cheek UPDATED: TLB and CAS/atomics (including different NUMA node) added Click to enlarge NB: scale is logarithmic! Premature Pessimization Easy on yourself, easy on the code: All other things being equal, notably code complexity and readability, certain efficient design patterns and coding idioms should just flow naturally

Inside OS/2 (1987)

by Vaughn Vernon from the December 1987 issue of Computer Language OS/2, Microsoft’s latest addition to its operating system line, could well become the operating system of the next decade for Intel 80286/80386 microcomputers. Its multitasking capabilities, full-featured application programming interface (API), and extendability to future hardware almost guarantee its success. Microsoft sees microcomputing as a platform for office automation hardware and software: The office of the future (re

Booting 5000 Erlangs on Ampere One 192-core

Booting 5000 Erlangs on Ampere One 192-core Underjord is an artisanal consultancy doing consulting in Elixir, Nerves with an accidental speciality in marketing and outreach. If you like the writing you should really try the pro version. In the previous post on 500 virtual linux devices on ARM64 I hinted that I expected serious improvements if we got KVM working. Well. We’re there. Let’s see what we got going on. Disclosure: I am running a conference called Goatmire Elixir which Ampere is a sp

9 Best WIRED-Tested Cooling Mattresses (2025)

BedJet BedJet Other Cooling Options There are a ton of mattresses and related on the market that claim to have cooling benefits. Here are a few others we tested and liked, but not as much as the options above. BedJet 3 for $387: WIRED reviewer Christopher Null liked this climate-control device a lot because it allowed him to sleep cool without having to buy a whole new mattress. This device uses a large blower under your bed to blast hot or cool air beneath your covers. If you like your exist

Best Cheap Laptop: Budget Computers for Every Use

There are a ton of models for less than $1,000 on the market at any given moment, and a large fraction of those are less than $500. As long as you manage your expectations regarding options and specs, you can still get quite a bit from a budget laptop model, including good battery life and a reasonably lightweight laptop body. (If you're replacing an old Windows laptop that's not up to running Windows anymore, consider turning it into a Chromebook.) Price If the statistics Intel and PC manufac

Content-Aware Spaced Repetition

Content-aware Spaced Repetition Spaced repetition systems are powerful, but they have a fundamental blind spot: they don’t understand what your flashcards are about. To your SRS, a card asking “what’s the capital of Italy?” and another asking “what country is Rome the capital of?” are treated independently, each with its own isolated review history. It has no concept that reviewing related material should reinforce your memory of the whole topic. At the heart of every SRS is a memory model wh

What Can a Cell Remember?

Then, in a process Kukushkin described as a tedious choreography of clockwork pipetting, they exposed the cells to precisely timed bursts of chemicals that imitated bursts of neurotransmitters in the brain. Kukushkin’s team found that the both the nerve and kidney cells could finely differentiate these patterns. A steady three-minute burst activated CRE, making the cells glow for a few hours. But the same amount of chemicals, delivered as four shorter pulses spaced 10 minutes apart, lit up the p

A deep dive into Rust and C memory interoperability

“Memory oppresses me.” - Severian, The Book of the New Sun Interviewer: “What happens if you allocate memory with C’s malloc and try to free it with Rust’s dealloc, if you get a pointer to the memory from C?” Me: “If we do it via FFI then there’s a possibility the program may continue working (because the underlying structs share the same memory layout? right? …right?)” Now if you have any experience working with memory management, you know that this is a dangerous answer. But I didn’t know it a

Topics: 00 bytes free memory size

Part 1: A Deep Dive into Rust and C Memory Interoperability

“Memory oppresses me.” - Severian, The Book of the New Sun Interviewer: “What happens if you allocate memory with C’s malloc and try to free it with Rust’s dealloc, if you get a pointer to the memory from C?” Me: “If we do it via FFI then there’s a possibility the program may continue working (because the underlying structs share the same memory layout? right? …right?)” Now if you have any experience working with memory management, you know that this is a dangerous answer. But I didn’t know it a

Topics: 00 bytes free memory size

This Old SGI: notes and memoirs on the Silicon Graphics 4D series (1996)

This Old SGI Consisting of a collection of notes and memoirs on my experiences with the 4D series machines. Compiled and maintained by A. J. Corda (Email) copyright (c) 1996 Version 2.0 Visitor Number Introduction I am posting this assortment of notes and observations as a kind of "thank you" to the numerous people who have replied to my posts in the past. The free flow of information is the life-blood of the internet community, and this is my feeble attempt to maintain that flow, while at

Emacs: The macOS Bug

Emacs: The MacOS Bug The Context I have been recently roaming. Doing some Zig, doing some Go, some Janet. Some C integration. Should have focused on my project but life threw more at me than I could handle, so I sought… happy distractions. My experience with those technologies taught me new tricks and one day, when I needed some more distraction, I decided to debug something that had made me furious for years: Emacs jank. Whatever build I tried, whatever configuration I used, Emacs always r

Blog series on creating an OS in Rust

Writing an OS in Rust This blog series creates a small operating system in the Rust programming language. Each post is a small tutorial and includes all needed code, so you can follow along if you like. The source code is also available in the corresponding Github repository. Latest post: Async/Await Bare Bones Interrupts CPU Exceptions CPU exceptions occur in various erroneous situations, for example, when accessing an invalid memory address or when dividing by zero. To react to them, we ha

Positron believes it has found the secret to take on Nvidia in AI inference chips — here’s how it could benefit enterprises

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now As demand for large-scale AI deployment skyrockets, the lesser-known, private chip startup Positron is positioning itself as a direct challenger to market leader Nvidia by offering dedicated, energy-efficient, memory-optimized inference chips aimed at relieving the industry’s mounting cost, power, and availability bottlenecks. “A key diffe

Wolf Memory Foam Hybrid Premium Firm Mattress Review: A New Alpha

Not too unlike wolves moving in a pack, the WIRED Reviews team often bands together to help one another out with product reviews. I’ve tested hundreds of beds and brands over the years, so I get pretty jazzed when something I haven't tried is on the prowl, but I'm a singular tester with only so many nighttime hours a week. Thankfully, my teammate Molly Higgins stepped in to test Wolf's 12-Inch Memory Foam Hybrid Essential Medium-Firm Mattress. Not to spoil anything, but it made our list of the b

Elon Musk confirms Tesla has signed a $16.5 billion chip contract with Samsung Electronics

Samsung Electronics has entered into a $16.5 billion contract for supplying semiconductors to Tesla , based on a regulatory filing by the South Korean firm and Tesla CEO Elon Musk's posts on X. The memory chipmaker, which had not named the counterparty, mentioned in its filing that the effective start date of the contract was July 26, 2025 — receipt of orders — and its end date was Dec. 31, 2033. However, Musk later confirmed in a reply to a post on social media platform X that Tesla was the c

SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets

1 Introduction An increasingly connected world makes us dependent on computing devices that handle a wide range of security- and privacy-critical operations. We use smartphones and watches to manage bank transactions and store biometric information. On the industrial and government side, embedded devices monitor remote system operations and feed data critical to industrial processes and national defense. Physical access to these devices leads to a wide range of security exploits, including imper

New Koske Linux malware hides in cute panda images

A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory. Researchers from cybersecurity company AquaSec analyzed Koske and described it as "a sophhisticated Linux threat." Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks. Koske’s purpose is to deploy CPU and

There is no memory safety without thread safety

There is no memory safety without thread safety Memory safety is all the rage these days. But what does the term even mean? That turns out to be harder to nail down than you may think. Typically, people use this term to refer to languages that make sure that there are no use-after-free or out-of-bounds memory accesses in the program. This is then often seen as distinct from other notions of safety such as thread safety, which refers to programs that do not have certain kinds of concurrency bugs

Nvidia supplier SK Hynix posts record second-quarter profit and revenue on strong AI memory demand

A visitor takes a picture of a model of SK hynix's high-bandwidth memory (HBM) technology during the 2025 World IT Show in Seoul on April 24, 2025. Jung Yeon-je | Afp | Getty Images South Korea's SK Hynix on Thursday posted record operating profit and revenue in the second quarter, driven by sustained demand for its high bandwidth memory used in artificial intelligence technology. Here are SK Hynix's second-quarter results compared with LSEG SmartEstimates, which are weighted toward forecasts f

Nvidia supplier SK Hynix second-quarter profit and revenue hit record highs, topping estimates

The SK Hynix Inc. logo is displayed on a glass door at the company's office in Seoul, South Korea, on Monday, Jan. 27, 2014. SK Hynix aims to select a U.S. site for its advanced chip packaging plant and break ground there around the first quarter of next year. South Korea's SK Hynix on Thursday posted record operating profit and revenue in the second quarter on sustained demand for its high bandwidth memory technology used in generative AI chipsets. Here are SK Hynix's second-quarter results c

Memory Efficiency in iOS: Reducing footprint and beyond

Previously, we explored how memory is measured and what tools are available for inspecting usage in iOS apps. Now, let’s shift our focus to reducing memory consumption using a set of practical techniques and development best practices. But first let’s discuss different approaches to treat this problem. Initial Source of a Problem Every spike in memory has a cause, and memory optimization is no exception. Sometimes it’s a 3rd-party library — Lottie is a classic example, especially if you export

How we tracked down a Go 1.24 memory regression

When Go 1.24 was released in early 2025, we were eager to roll it out across our services. The headline feature—the new Swiss Tables map implementation—promised reduced CPU and memory overhead. Our story begins while the new version was being rolled out internally. Shortly after deploying it to one of our data-processing services, we noticed an unexpected memory usage increase: We observed the same pattern, a ~20% increase in memory usage, across multiple environments before pausing the rollou

How to write Rust in the Linux kernel: part 3

How to write Rust in the kernel: part 3 [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! The interfaces between C and Rust in the kernel have grown over time; any non-trivial Rust driver will use a number of