Talk:Row hammer
Latest comment: 10 months ago by 200.215.172.184 in topic TRR in DDR4 or in LPDDR4
This is the talk page for discussing improvements to the Row hammer article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 3 months |
This article is rated GA-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||
|
Row hammer has been listed as one of the Engineering and technology good articles under the good article criteria. If you can improve it further, please do so. If it no longer meets these criteria, you can reassess it. Review: September 28, 2015. (Reviewed version). |
A fact from Row hammer appeared on Wikipedia's Main Page in the Did you know column on 12 October 2015 (check views). The text of the entry was as follows:
|
TRR in DDR4 or in LPDDR4
editHi. We should check, was TRR included to DDR4 standard or LPDDR4 standard...
- Ref for LPDDR4 with TRR: http://www.memcon.com/pdfs/proceedings2014/MOB102.pdf "LPDDR4 DRAM requires controllers to do repair using Target row refresh mode (TRR)"
- text of DDR4 without TRR: JESD79-4 sep2012 = www.softnology.biz/pdf/JESD79-4_DDR4_SDRAM.pdf
a5b (talk) 16:33, 9 January 2016 (UTC)
- Hello! That's a very good remark, went ahead and updated the article by clarifying and correcting the description of target row refresh (TRR) support in LPDDR4 and DDR4 products and related JEDEC standards, all that with additional references where required. We should be covered now, if you agree. — Dsimic (talk | contribs) 05:00, 10 January 2016 (UTC)
knowing the meaning of the acronyms often helps style
edit"DRAM memory module" = Dynamic Random-Access Memory memory module. :-) But I ain't no native speaker, it's your language, maybe it's okay there. --grin ✎ 08:27, 1 September 2016 (UTC)
Flip Feng Shui, KSM and other goodies
editAs a cheery update see this article: http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/ (references paper at usenix). It's getting even better as tests (though not really thorough ones) seem to show disappointing results for DDR4 and TRR. --grin ✎ 09:19, 1 September 2016 (UTC)