Recap of Wiwynn Techday 2023: Empower AI with Wiwynn
The highly anticipated Wiwynn Techday 2023, brought together esteemed guests, partners, investors, and media friends under one roof. Held from May 31...
On June 11, researchers published a paper entitled “RAMBleed Reading Bits in Memory without Accessing Them”. RAMBleed describes attacks on DRAM modules that are already susceptible to Rowhammer style attacks. Systems using DRAM modules mitigated against Rowhammer style attacks remain protected from RAMBleed. On certain microprocessors, the researchers describe a method to reveal partial physical memory address information that does not contain user secrets. This information is not required to enable RAMBleed, and even with revelation of this information, systems with DRAM modules mitigated against Rowhammer style attacks remain protected against RAMBleed.
Wiwynn’s servers based on Intel Xeon® Processor E5 v3 Family (Haswell EP) are related to this issue. Utilizing DRAM modules resistant to Rowhammer style attacks is recommended. This includes the majority of DDR4 DRAM modules.
Customers can contact techsupport@wiwynn.com for further supports and
find more information from Intel-SA-00247.
The highly anticipated Wiwynn Techday 2023, brought together esteemed guests, partners, investors, and media friends under one roof. Held from May 31...
Taipei, May 29, 2023 – Wiwynn Corporation (hereinafter, “the Company”, TWSE Stock code: 6669) today held its 2023 Annual Shareholders’ Meeting at...
Following the Board of Directors meeting today (May 8), Wiwynn Corporation announced consolidated revenue achieved NT$74.226 billion, increased by...