MHB How Did NAND Memory Impact the ASUS Transformer TF300?

AI Thread Summary
The discussion centers around ideas for a research report on Advanced Computer Architecture, with a focus on topics like pipelining, branch prediction, and memory design. One suggestion highlights the potential of quantum computing advancements, emphasizing its relevance to current technology. Another contributor shares a personal experience with an ASUS Transformer TF300 tablet, noting its performance issues due to NAND memory and the introduction of the TRIM operation in Android 4.3 to mitigate these problems. This technical detail could serve as an interesting case study in memory design and its impact on device performance.
ineedhelpnow
Messages
649
Reaction score
0
Hi. I don't know if this is the right place to post this but I had a feeling that many of you might have some ideas on this. I have to write a research report on Advanced Computer Architecture. It can be about pipelining, branch prediction, memory or whatever. I want something really interesting and I have to be able to relate it with current technology today. For exam a distinct memory design for a new Dell processor or something like that. I'd appreciate any ideas because I'm not able to brainstorm much on it.
 
Technology news on Phys.org
Welcome back! :D

I would likely focus on the current advances being made in the field of quantum computing:

Quantum Computers News
 
Thanks unc :D
 
Several years ago I bought an ASUS Transformer TF300 tablet. It turned out to be OK except for one major flaw. If I understand correctly, it had NAND memory, which apparently was new and not well tested at the time. It turned out that it becomes slow over time to a point of a crawl. Therefore, something called TRIM operation was added to Android 4.3. It cleans the memory when the tablet is not in use. Unfortunately for me, ASUS never released Android 4.3 update for TF300. I think the technical details of this would be quite interesting.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top