Chip binning : why your CPU is most likely broken (partially)?

CPU manufacturing is so complex that the chips often have imperfections. Some cores do not work or must run at lower speeds. Manufacturers test them and sell based on performance.

Evolution of GPU Architectures and Hardware Graphics Pipeline through Nintendo Consoles - Part 1

This article goes over the evolution of the hardware graphics pipeline on GPUs across the different game console generations.

Optimizing regular expressions

This article will explain in detail how to optimize regular expressions. It will explore various techniques to reduce backtracking and improve speed, enabling the writing of more efficient and high-performance regex.

Learning a program's behaviour without looking at its code using active learning

This article explains a machine learning method that makes it possible to reproduce in finite time the complete behaviour of any program that behaves like a black box, without ever having access to its code.

Starlink et l'internet par satellite

Une brève introduction au monde de l’internet par satellite avec une présentation des spécificités de la société Starlink

LadderLeak, comment retrouver une clef privée ECC sur analyse de consommation électrique

Short article to cover the LadderLeak problem for ECC

Developing a Bluetooth application on Linux

Introduction to BlueZ and its API

Why Wayland: A Brief History of Display Protocols

A short introduction to the world of display protocols, detailing parts of the design of the X Window System, its shortcomings and the rise of the Wayland protocol.

Holographic Displays: Your Windshield as a Virtual Assistant

A quick view on how holographic displays aim to aid driving

Random number generation in embedded systems

This article explores the world of random number generation in embedded systems, covering both pseudo-random number generators (PRNGs) and hardware-based random number generators (HRNGs). It explains their principles, provides examples of code, discusses their advantages and limitations, and highlights their applications in embedded systems.