Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: mem Clear Filter

Nvidia supplier SK Hynix second-quarter profit and revenue hit record highs, topping estimates

The SK Hynix Inc. logo is displayed on a glass door at the company's office in Seoul, South Korea, on Monday, Jan. 27, 2014. SK Hynix aims to select a U.S. site for its advanced chip packaging plant and break ground there around the first quarter of next year. South Korea's SK Hynix on Thursday posted record operating profit and revenue in the second quarter on sustained demand for its high bandwidth memory technology used in generative AI chipsets. Here are SK Hynix's second-quarter results c

OpenAI's New CEO of Applications Strikes Hyper-Optimistic Tone in First Memo to Staff

OpenAI’s incoming CEO of applications, Fidji Simo, sent her first note to staff on Monday, telling employees the tools they’re developing “will unlock more opportunities for more people than any other technology in history.” “If we get this right, AI can give everyone more power than ever,” Simo wrote, striking a hyper-optimistic tone, according to a copy of the memo viewed by WIRED. “But I also realize those opportunities won’t magically appear on their own.” Simo previously worked as the CEO

Memory Efficiency in iOS: Reducing footprint and beyond

Previously, we explored how memory is measured and what tools are available for inspecting usage in iOS apps. Now, let’s shift our focus to reducing memory consumption using a set of practical techniques and development best practices. But first let’s discuss different approaches to treat this problem. Initial Source of a Problem Every spike in memory has a cause, and memory optimization is no exception. Sometimes it’s a 3rd-party library — Lottie is a classic example, especially if you export

How we tracked down a Go 1.24 memory regression

When Go 1.24 was released in early 2025, we were eager to roll it out across our services. The headline feature—the new Swiss Tables map implementation—promised reduced CPU and memory overhead. Our story begins while the new version was being rolled out internally. Shortly after deploying it to one of our data-processing services, we noticed an unexpected memory usage increase: We observed the same pattern, a ~20% increase in memory usage, across multiple environments before pausing the rollou

I'm Rebelling Against the Algorithm

I'm rebelling against the algorithm 14 Jul, 2025 I grew up on the internet. I'm old enough to remember when my news feeds actually ended. Remember the times before infinite scroll was engineered? I remember when algorithms weren't good enough to keep me in a trance-like state for eternity. Fast forward to today, I experience firsthand the horrible effects of the algorithms. We weren't meant to read the thoughts of 100s of people all at once. It's also not possible to fully check out from soci

How to write Rust in the Linux kernel: part 3

How to write Rust in the kernel: part 3 [LWN subscriber-only content] Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! The interfaces between C and Rust in the kernel have grown over time; any non-trivial Rust driver will use a number of

Multiplatform Matrix Multiplication Kernels

Few algorithmic problems are as central to modern computing as matrix multiplication. It is fundamental to AI, forming the basis of fully connected layers used throughout neural networks. In transformer architectures, most of the computation is spent performing matrix multiplication. And since compute largely determines capability, faster matrix multiplication algorithms directly translate into more powerful models [1 ]. NVIDIA probably deserves much of the credit for making matrix multiplicatio

CP/M creator Gary Kildall's memoirs released as free download

The year before his death in 1994, Gary Kildall—inventor of the early microcomputer operating system CP/M—wrote a draft of a memoir, “Computer Connections: People, Places, and Events in the Evolution of the Personal Computer Industry.” He distributed copies to family and friends, but died before realizing his plans to release it as a book. This week, the Computer History Museum in Mountain View, with the permission of Kildall’s children, released the first portion of that memoir. You can downlo

CP/M Creator Gary Kildall's Memoirs Released as Free Download

The year before his death in 1994, Gary Kildall—inventor of the early microcomputer operating system CP/M—wrote a draft of a memoir, “Computer Connections: People, Places, and Events in the Evolution of the Personal Computer Industry.” He distributed copies to family and friends, but died before realizing his plans to release it as a book. This week, the Computer History Museum in Mountain View, with the permission of Kildall’s children, released the first portion of that memoir. You can downlo

Xbox Hacks: The A20 (2021)

In November of this year (2021) we will hit 20 years since the release of the original Xbox. This console was full of vulnerabilities (or misconfiguration) from the software to the hardware and with such a low price point two decades ago for a computer - it was highly popular. For this post we are going to go into a lot of details regarding one mistake Microsoft made which was the A20. All the discoveries and research belongs to The Xbox Linux Project and Michael Steil. Research was obtained be

Original Xbox Hacks: The A20 CPU Gate (2021)

In November of this year (2021) we will hit 20 years since the release of the original Xbox. This console was full of vulnerabilities (or misconfiguration) from the software to the hardware and with such a low price point two decades ago for a computer - it was highly popular. For this post we are going to go into a lot of details regarding one mistake Microsoft made which was the A20. All the discoveries and research belongs to The Xbox Linux Project and Michael Steil. Research was obtained be

A Rust shaped hole

A Rust shaped hole By a process of elimination, I've arrived at a conclusion that I should write Rust, or at least give it a rigorous try. Let us say I want to write a "native" program. This train of thought started with wanting to write a program, an xfdesktop replacement, that can serve as my desktop background, slowly meandering though a pastel game of life, or floating through a Mandelbrot set. But the specifics are not relevant, because I find myself on the same train when thinking of ot

Trump Sues to Fire Big Bird’s Boss

Back in April, Donald Trump fired three Democratic members of the board at the Corporation for Public Broadcasting (CPB), a move similar to his efforts to oust Democrats from the Federal Trade Commission and the Kennedy Center, among others. The board members—Laura Ross, Thomas Rothman, and Diane Kaplan— simply never left. Now, the Trump administration is suing to remove them from their seats. Trump gave notice of the attempted firings on April 28, which led to the CPB and its would-be unemploy

Co-op confirms data of 6.5 million members stolen in cyberattack

UK retailer Co-op has confirmed that personal data of 6.5 million members was stolen in the massive cyberattack in April that shut down systems and caused food shortages in its grocery stores. Co-op (short for the Co-operative Group) is one of the United Kingdom's largest consumer co-operatives, operating food stores, funeral services, insurance, and legal services. It is owned by millions of members who receive discounts on services and share in the company's governance. Co-op's CEO, Shirine

A Rust Shaped Hole

A Rust shaped hole By a process of elimination, I've arrived at a conclusion that I should write Rust, or at least give it a rigorous try. Let us say I want to write a "native" program. This train of thought started with wanting to write a program, an xfdesktop replacement, that can serve as my desktop background, slowly meandering though a pastel game of life, or floating through a Mandelbrot set. But the specifics are not relevant, because I find myself on the same train when thinking of ot

Co-op boss confirms all 6.5m members had data stolen

Co-op boss confirms all 6.5m members had data stolen 3 hours ago Share Save Joe Tidy Cyber correspondent, BBC World Service Imran Rahman-Jones Technology reporter Share Save Watch: Co-op boss says immediate action was taken when the data breach was discovered The chief executive of Co-op has confirmed that all 6.5 million of its members had their data stolen in a cyber-attack on the retailer in April. "I'm devastated that information was taken. I'm also devastated by the impact that it took o

Here’s what Mac you need for Cyberpunk 2077

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Cyberpunk 2077 is launching on macOS tomorrow, and CD Projekt Red is now sharing details on exactly what Mac you’ll need to get the most out of the game. While Cyberpunk 2077 has been optimized for a variety of Macs, from early M1 models up, if you want the top “very high fidelity” config then you’ll need an M3 Ultra or M4 Max machine with 36GB of unified memory. CD Projekt Re

GPUHammer: Rowhammer attacks on GPU memories are practical

GPUHammer: Rowhammer Attacks on GPU Memories are Practical # Chris (Shaopeng) Lin†, Joyce Qu†, Gururaj Saileshwar, from University of Toronto Published at USENIX Security 2025 (link to paper). Artifact available on GitHub and Zenodo. † equal contribution GPUHammer is the first attack to show Rowhammer bit flips on GPU memories, specifically on a GDDR6 memory in an NVIDIA A6000 GPU. Our attacks induce bit flips across all tested DRAM banks, despite in-DRAM defenses like TRR, using user-level C

Topics: bit dram flips gpu memory

Human Stigmergy: The world is my task list

Marco Giancotti , July 10, 2025 Cover image: Termite mound cross-section, Wikimedia Commons Termites and ants have no central planning. There are no architect ants in a nest-building project, no sponsors or supervisors, no instructions. Each worker is unaware and completely uninterested in what form the final mega-structure will take. No blueprints are to be found in any of their minds or outside them. Yet they build them all the time, and very well, too. Their substitute for plans and bluepri

How incel language infected the mainstream internet — and brought its toxicity with it

This excerpt from Adam Aleksic’s Algospeak: How Social Media Is Transforming the Future of Language has been abridged for online publication. The book is out on July 15th. The modern-­day incel is entirely an invention of the twenty-­first century. Before the internet, lonely men simply didn’t have a way to gather and share ideas. That all began to change in 1997, when a Canadian student started a website called Alana’s Involuntary Celibacy Project to connect with others over her shared lack of

Let's Learn x86-64 Assembly (2020)

Let's Learn x86-64 Assembly! Part 0 - Setup and First Steps published on Apr 18 2020 The way I was taught x86 assembly at the university had been completely outdated for many years by the time I had my first class. It was around 2008 or 2009, and 64-bit processors had already started becoming a thing even in my neck of the woods. Meanwhile, we were doing DOS, real-mode, memory segmentation and all the other stuff from the bad old days. Nevertheless, I picked up enough of it during the classes

Holographic ribbon aims to oust magnetic tape with 50-year life span and 200TB

Details behind HoloMem’s holographic tape innovations are beginning to come into clearer view. The UK-based startup recently chatted with Blocks & Files about its potentially disruptive technology for long-term cold storage. HoloMem is another emerging storage idea which relies on optical technology - to enable holographic storage. However, it cleverly melds the durability and density advantage of optical formats with a flexible polymer ribbon-loaded cartridge, so it can usurp entrenched LTO mag

C3 solved memory lifetimes with scopes

2025-07-11 Modern languages offer a variety of techniques to help with dynamic memory management, each one a different tradeoff in terms of performance, control and complexity. In this post we’ll look at an old idea, memory allocation regions or arenas, implemented via the C3 Temp allocator, which is the new default for C3. The Temp allocator combines the ease of use of garbage collection with C3’s unique features to give a simple and (semi)-automated solution within a manual memory management

Let's Learn x86-64 Assembly Part 0 – Setup and First Steps

Let's Learn x86-64 Assembly! Part 0 - Setup and First Steps published on Apr 18 2020 The way I was taught x86 assembly at the university had been completely outdated for many years by the time I had my first class. It was around 2008 or 2009, and 64-bit processors had already started becoming a thing even in my neck of the woods. Meanwhile, we were doing DOS, real-mode, memory segmentation and all the other stuff from the bad old days. Nevertheless, I picked up enough of it during the classes

These LGBTQ+ Archives Defy Erasure, One Memory at a Time

Being queer, often, means feeling unseen. “We come from a history of erasure that is manifested not only through hate crimes and discrimination, but also through a lack of representation, symbolic violence, and the absence of legal protections,” explains André Mere Rivera, director of the Queer Memory Archive of Peru (Archivo de la Memoria Marica del Perú). The project Mere leads is part of a growing wave of collaborative projects in which Latin American LGBTQ+ communities preserve and share th

Making a Speedrun Timer in D

How I made a speedrun timer in D I semi-recently played through the original Deus Ex, and enjoyed my time with it so much that I felt like getting into speedrunning it, which ended up with me having to create a custom speedrun timer that “injects” itself into the game in order to implement features such as auto-splitting and load time removal. This article details the rough journey I went through. It’s not super well structured, but I was sorely lacking resources such as this when I was implem

Topics: 00 bytes game map memory

Fundamentals of garbage collection (2023)

Access to this page requires authorization. You can try signing in or changing directories . Fundamentals of garbage collection In the common language runtime (CLR), the garbage collector (GC) serves as an automatic memory manager. The garbage collector manages the allocation and release of memory for an application. Therefore, developers working with managed code don't have to write code to perform memory management tasks. Automatic memory management can eliminate common problems such as forg

Fundamentals of Garbage Collection

Access to this page requires authorization. You can try signing in or changing directories . Fundamentals of garbage collection In the common language runtime (CLR), the garbage collector (GC) serves as an automatic memory manager. The garbage collector manages the allocation and release of memory for an application. Therefore, developers working with managed code don't have to write code to perform memory management tasks. Automatic memory management can eliminate common problems such as forg

NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks

NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory. The company is reinforcing the recommendation as new research demonstrates a Rowhammer attack against an NVIDIA A6000 GPU (graphical processing unit). Rowhammer is a hardware fault that can be triggered through software processes and stems from memory cells being too close to each other. The attack was demonstrated on DRAM cells but i

How I personalized my ChatGPT conversations - why it's a game changer

Elyse Betters Picaro / ZDNET ChatGPT offers several ways to customize and personalize your conversations. You can share details about your life, including your name, your profession, or other tidbits. You're able to tell it what traits it should possess, such as patience, sympathy, or understanding. You can add and save certain facts about yourself and tell it to reference memories from past conversations. That all sounds helpful. But what does ChatGPT do with the information it knows about yo