2D material helps new computer chip process and store data like a neuron

Engineers at EPFL have created a new computer chip that can both process and store data in the same circuit. It’s made using a two-dimensional material called molybdenum disulfide (MoS2), paving the way for smaller and more energy efficient electronics… Continue reading 2D material helps new computer chip process and store data like a neuron

Intel launches 11th Gen Tiger Lake processors for laptops

Intel has unveiled its new generation of laptop processors. Codenamed Tiger Lake, the new 11th Gen Intel Core processors are much faster than their predecessors for office work, gaming and content creation.Continue ReadingCategory: Computers, Technolog… Continue reading Intel launches 11th Gen Tiger Lake processors for laptops

Gaming in Different Languages

One of the perks of using older hardware is its comparative simplicity and extensive documentation. After years or decades of users programming on a platform, the amount of knowledge available for it can become extensive. This is certainly the case with the 6502 microprocessor, used in old Apple computers and …read more

Continue reading Gaming in Different Languages

Intel reveals 10th Gen desktop processors, its fastest ever

After unveiling its flashy new laptop processors a few weeks ago, Intel has now shown off its latest generation of desktop processors. The 10th Gen Intel Core S-series is much faster for playing games, streaming content and editing video, with the comp… Continue reading Intel reveals 10th Gen desktop processors, its fastest ever

Intel’s new neuron-based computer matches brain of a small mammal

As impressive as computers are becoming, they still pale in comparison to nature’s version – the brain. As such scientists have started designing computer chips that work in a similar way to the brain, using artificial neurons and synapses. Now Intel h… Continue reading Intel’s new neuron-based computer matches brain of a small mammal

Where The Work Is Really Done – Casual Profiling

Once a program has been debugged and works properly, it might be time to start optimizing it. A common way of doing this is a method called profiling – watching a program execute and counting the amount of computing time each step in the program takes. This is all well …read more

Continue reading Where The Work Is Really Done – Casual Profiling

Hacking The Pocket Operator

The number of easily usable and programmable microcontrollers is small, so when selecting one for a project there are only a handful of very popular, well documented chips that most of us reach for. The same can be said for most small companies selling electronics as well, so if you …read more

Continue reading Hacking The Pocket Operator

Scientists claim to have invented the unhackable processor

An intriguing paper published by researchers at the University of Michigan describes a new processor architecture capable of self-encryption that can fend off any hacks. A DARPA-supported project, the new chip design renders the current electronic secu… Continue reading Scientists claim to have invented the unhackable processor

An Arduino From The Distant Past

Arduinos are a handy tool to have around. They’re versatile, cheap, easy to program, and have a ton of software libraries to build on. They’ve only been around for about a decade and a half though, so if you were living in 1989 and wanted to program a microcontroller you’d probably be stuck with an 8-bit microprocessor with no built-in peripherals to help, reading from a physical book about registers and timing, and probably trying to get a broken ribbon cable to behave so it would actually power up. If you want a less frustrating alternate history to live in, …read more

Continue reading An Arduino From The Distant Past

Intel CPUs Undermined By Fresh Speculative Execution Flaws

‘Foreshadow” and other vulnerabilities in Intel processors can be exploited to steal sensitive information stored inside personal computers or personal clouds. Continue reading Intel CPUs Undermined By Fresh Speculative Execution Flaws