F Software Certification Issues.

https://prosefights2.org/

First posted
Wednesday March 11 11::21
UpdatedF
Wednesday April 22 17:25

7/19/24 1/24/24.
_
f
Kaneohe Poseiden P8A FOIA.



Vinson F-35C FOIA.


1/10/24.

liaison
1. communication or cooperation which facilitates
a close working relationship between people or organizations.
1/8/24.
FOIA.GOV.
Department of Defense Department of the Navy

202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil

Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
12/2/23.
11/25/23.
bamboozle

fool or cheat (someone).
11/11/23.
certification

the action or process of providing someone or something with an official document attesting to a status or level of achievement.
11/10/23.
retaliation

the action of harming someone because they have harmed oneself; revenge.

11/9/23.
nemesis
the inescapable agent of someone's or something's downfall.
11/7/23.
con
persuade (someone) to do or believe something, typically by use of a deception.

10/31/23
conned

persuade (someone) to do or believe something, typically by use of a deception.

7/5/23
Reprimand: "a rebuke, especially an official one.
3/22/23.

Phone numbers issues.
1-855-658-2676.
1-888-127-6445478.

Recording 2, 3, 4, 5, 6, 7, 8, 9.
3/21/23.
Phone message from US government?.

Two forms of id?
3/20/23
Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil

Good evening, Mr. Payne,

Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:

1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.

2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/

As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term “FOIAonline” (the correct site should appear as the top hit, and it will contain “foiaonline.gov” as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.

Regards,

Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer

Christopher.a.julka.civ@us.navy.mil

(703) 697-0031

From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address

Hello Mr Julka,
Alternate email address.

Sunday February 26, 2023 19:07

Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.






Poster attended book signing at Page One i Albuquerque.





Sunday, January 07, 2001 5:52 PM
Dear Friend,

we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.

With thanks

On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/

Wednesday, January 17, 2001 7:10 PM

Dear Friend,

A stand for Ahmad but why this question?

Iran Danesjoo Information Committee project reports. [1, 2 , 3].
Swiss Radio International link fixed with irp2014 switch from malwarebytes.

Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Admiral fornmer Navy Seal.


Another request?

Unable to copy.


[1, 2, 3]

AI Overview

Yes, the CIA and NSA, in partnership with West German intelligence (BND), secretly owned Crypto AG
and rigged their encryption devices with backdoors. This operation, known as "Operation Thesaurus"
and later "Operation Rubicon", allowed US and German intelligence to easily break the codes of over
120 countries, including Iran. Wikipedia Wikipedia +2

Key Details of the Operation:

Notes

Wednesay April 22 17:25
____
hese are results for is googlebecoming more dangerous to itself because of
arcane questions answered, excessive water and electricity consumption
and fuel sources requires provide electricity

AI Overview

AI development and the integration of Gemini into Search are creating environmental
and operational strains. This could pose long-term risks to the company's sustainability
goals and reputation. Factors contributing to this include:

Emissions and Energy Use: Google's greenhouse gas emissions have risen 65% since 2019.
The company is struggling to meet high electricity demand, causing it to fall behind on its
sustainability goals.

Water Consumption: Google's data centers used 5.6 billion gallons of water in 2021.
This number has continued to rise due to cooling needs for AI servers. This can put
a strain on local communities and watersheds.

Energy Intensity of AI Overviews: AI-powered "AI Overviews" require more power.
Estimates suggest they can use 10-15% of the total electricity consumed by Google.

Accuracy and Trust Issues: AI can result in incorrect information. This can negatively i
mpact user trust and company reputation.

Dependency on High-Energy Fuel Sources: AI adoption may delay or derail
environmental progress.

The resource-heavy nature of AI is causing significant sustainability issues that are
challenging the company’s environmental goals.

____
AI Overview

The product of the first 1000 prime numbers—starting with 2, 3, 5... and ending with 7919—
is a massive 2,336-digit number. This value, known as the 1000th primorial ( ), is roughly .
Quora Quora +4

The exact value is:

11,356,769,871,639,834,366,628,078,343,660,801,213,021,002,603,808,017,113,484,083,
456,481,393,624,183,355,161,423,988,601,739,578,097,269,175,036,999,016,380,044,894,
643,879,365,114,584,536,377,648,421,251,919,478,851,653,433,974,523,196,310,641,
702,368,516,916,764,541,545,146,381,989,396,087,448,510.

Key Details

1000th Prime Number: The 1000th prime number is 7,919.

Size of the Product: The resulting product is far too large for standard calculators, featuring 2,336 digits.

Scientific Notation: It is approximately .

Units Digit: The product ends in 0.


Sudden data center load losses prompt NERC alert, recommendations.


AMD Finally Found Its Edge

_____
Itanium: The Great X86 Replacement That Never Was.||

ESP32 Hosts A Public Website.

Can 15,120 be bactored by a low-cost low-Watt Nanocomputer
executing ~all instructions in one clock cyle?

Step 1: Convert to binary.

115 120 = 0b11100000110110000

Step 2:| Divice by 24.

TDivision leas

1110000011011 and 2*2*2*2*2 discovered as one of the part is the product.

Step 3: The low 11 may be a 3 and not a two's complement -1?

1110000011011 made readable 0001 1100 0001 1011 in hex 1C1B?

The hexadecimal number 1C1B is equivalent to 7195 in decimal.






__

Google unveils chips for AI training and inference
in latest shot at Nvidia
.

Claude Desktop changes app access settings for
browsers you don't even have installed yet
.

Meta breaks ground on over $1 billion data center
in Oklahoma's Tulsa
.

Broadcom expands collaboration with Google Cloud.

____
Microsoft releases emergency patches for critical ASP.NET flaw.

New GoGra malware for Linux uses Microsoft Graph API for comms.
____
Magnificent irony as Meta staff unhappy about
running surveillance software on work PC
.

____

What Oracle’s layoffs reveal about leadership and trust.

__\\
 
____
Five charts on how US clean electricity output keeps climbing.

Wind Energy Market Analysis Across Europe, APAC, and North America.


Try 1

Tuesay April 21 12:05
____
Behind the Curtain: The kids aren't AI-right, Part 2.

____

Binary 11 is:

1 An snsiged iteger;||
00
01
10 11 ro r=tthe base 4?
2 A sgined twos mplement number

11 one's complement is 00l

Add 1 01 to gets its

'true' value: minus 1?
11 minis 1|
Add 1 00.
Add another 1 01
Add another 1 10.
So the seuqnece is
11 Minus 1.
00 Plus 0
01 Plus 1
10 Minus 0 whis is 01 plus 1 10 s 'ttue' Minus 2?

So intwo's compment all binary ones 'true' minus 1
while a 1 frfollowed byall azeros the smallest negative number?

___

1.5 - 2.25 = -75?\

.75 - 00,11 in binary

In two's complment 11,00 + 1 = 11.01. And 1101 x 2-2 floating point.

While 1.5 is

0011x 2-1?

But to do the subtraction the binary point must be aligned.

So

0110 x 2-2.

2.25 = 10.;01 in binary.

Two's complement is 01,10 + 1 = 01,11




0111
0110
____

1101 But in rwo's complementl!

So the 'true' vaule is 0010 + 1 = 0011 ... 2x-2. Or -.75







 

___
China’s energy fortress was built to withstand just this type of oil shock.
Try 1

Monday April 20 15:50
__
Meta layoffs: Tech giant to cut about 8,000 jobs in May, report says.

Silicon Valley has forgotten what normal people want.

____
BeagleConnect Zepto – A “$1 computer” based on TI
MSPM0L1117 Cortex-M0+ MCU
.


Try 2. 

 
Sunday April 19 09:35
___
AI Overview

Yes, a large integer can be factored using an 8-bit computer, but it is not efficient or
practical for modern cryptographic-sized numbers (e.g., 2048-bit RSA keys).

An 8-bit nanocomputer or microcontroller can handle arbitrarily large numbers by
breaking them into smaller, 8-bit chunks (bytes) and performing multi-precision arithmetic,
similar to how one performs long division by hand. Electrical Engineering Stack Exchange
Electrical Engineering Stack Exchange

Here is the breakdown of why this is possible but impractical:

___
Microsoft’s Fairwater AI Datacenter Goes Live Early,
Unleashing Hundreds of Thousands of NVIDIA Blackwell GPUs On The World
.


__
Oracle adds $100B in market cap on major announcement.



____
Fusion start-up Helion stands by 2028 timeline despite rivals’ doub.

Try 1.

Sarurday April 18 07:20
____
AI Overview

Yes, C is generally "fast" even when it does not have to be because its speed is a default consequence
of its design, not a feature that must be consciously activated. C compiles directly to native machine
code, meaning it maps closely to the hardware with minimal abstraction overhead.

Here is why C remains fast even without intensive optimization or performance requirements:

Low-Level Nature: C acts as a "high-level assembler," offering direct memory manipulation and hardw
are control.

Minimal Runtime: It has no built-in "magic" like automatic garbage collection or constructor calls,
which often introduce unpredictable delays in other languages.

Minimalist Abstractions: The abstractions in C (like structures) are designed to be thin and
transparent, translating efficiently into machine instructions.

Transparency: C's cost model is obvious. If a C program is slow, it is because it is doing a lot
of work, rather than hiding heavy operations behind simple syntax. Reddit Reddit +

When C is not necessarily "faster" While inherently fast, C is not always faster than
other languages if used incorrectly. 4


Bad Code: A superior programmer in a "slower" language can often outperform a poor
programmer using C.

High-Level Optimization: Certain high-level languages can optimize specialized tasks better
than C through techniques like JIT compilation or advanced compiler algorithms.

Development Speed: In many applications, C's execution speed advantage is irrelevant
because the program spends most of its time waiting on input/output rather than raw computation.

Note: The search results provided a mix of information regarding the programming language
"C" and the speed of light " " in physics, but the above points focus on the programming language.


____
Meta layoffs: Tech giant to cut about 8,000 jobs in May, report says.

AI Overview

Yes, Meta, Google, Amazon, and Microsoft have largely transformed the primary
use of computers and the internet into a vast advertising ecosystem. Together with ByteDance
(TikTok), these companies are projected to account for over 60% of global digital ad
spending by 2026, consolidating power over online attention and information.

Dominance of Ad-Based Models: The core business model for several tech giants is rooted
in digital advertising. Meta (Facebook, Instagram, WhatsApp) and Alphabet (Google,
YouTube) rely on user data to sell highly targeted ad space, with over 90% of Meta's
revenue frequently coming from advertising.

The "Billboard" Effect: Search engines (Google), social media feeds (Meta), e-commerce sites
(Amazon), and operating systems (Microsoft) now prioritize ad placements alongside organic
content. As of early 2025, 42% of the world's population uses a Meta product daily, turning
these platforms into massive, personalized billboards.

Expansion Beyond the Screen: These companies are shifting toward "full-funnel" AI-powered
ads, where they can track a user from seeing an ad on a streaming service (like Amazon Prime
Video) to the final purchase on their platform.

Aggressive Growth: Amazon's advertising business has grown rapidly, making it a major player
alongside Google and Meta, targeting not just their own sites but expanding across the internet.
LinkedIn LinkedIn +4

While these platforms offer free or low-cost services, the exchange is user attention and behavioral
data, which are then monetized to serve targeted ads. Total Security Total Security +1

___

Quantum Breakthrough: Unhackable Keys Sent Over 120 km Using Quantum Dots.


 
Try 1.

Fridnesday April 17 15:48
____
AI Overview

Yes, many Instruction Set Architectures (ISAs) use a base address (often in a register)
plus an offset (immediate value or another register) to calculate the effective address (EA)
for memory operations. This commonly used method is known as displacement or
base-plus-index addressing, where . Reddit Reddit +2

Key details about this mechanism include:

Base+Offset/Displacement: Often used to access struct fields or stack variables,
where a register points to the base, and an immediate value acts as the offset
(e.g., lw $t0, 4($s0)).

Base+Index: Used for arrays, where two registers are added together ( ).

x86 Example: The x86 architecture uses a complex formula: .

Purpose: This method allows for efficient addressing of memory locations relative
to a pointer, simplifying array indexing and stack management.

____
Oracle’s New AWS Partnership Just Put It Ahead of Azure and Google Cloud.
____
vidia AI chip rivals attract record funding as competition heats up.

Microsoft Finally Ups FAT32 Size Limit.
___
Orange Pi Zero 3W – An Allwinner A733 SBC in Raspberry Pi Zero form factor.
____
New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges.

:(?



4/16/26
 
Try 2,
 
 

Thurednesday April 16 09::27
____
what did ricghard feynman mean by u=0?
AI Overview

Richard Feynman’s reference to " " (or more broadly, "everything equals zero") is a conceptual,
often tongue-in-cheek, summary of physical laws. He meant that all fundamental physical laws can
be rearranged, squared, and summed into a single equation, where the total expression ( ) equals
zero, essentially implying the universe is a complex set of constraints where only certain states are
allowed. Quora Quora +1

Key Aspects of the " " Concept:

A "Trick" of Formulation: Feynman regarded this not as a revolutionary simplification of physics,
but rather as a mathematical "trick" or a way to summarize complex laws (like

Unified Constraint: The formula represents a total, summed-up "unworldliness" or constraint where
all physical action balances out, as discussed in.

Context: This concept is often associated with discussions on his blackboard at the time of his death,
or in discussions about quantum mechanics and the mathematical structure of physical laws. Quora Quora +3

Note: Some online discussions (e.g.,) suggest a similar-sounding, but different phrase "nobody understands
quantum mechanics" refers to the difficulty in reconciling quantum theory with common sense.


Will printf work on LLVM target platforms?

AI Overview

Yes, printf will work on LLVM target platforms, provided that a C standard library (libc) is available and
correctly linked for that specific target.

Since printf is not a built-in LLVM instruction but a function defined in libc, its functionality depends on
the environment rather than the LLVM compiler itself. Stack Overflow Stack Overflow +1

Key Considerations for Using printf in LLVM
...
For high-level development, Clang handles these details automatically when compiling C/C++ code
for any supported LLVM target. TypeFox TypeFox +1




___
AI Overview

Yes, how well Windows 11 works on a laptop depends heavily on the manufacturer,
specific model, and the internal hardware components (CPU, RAM, SSD), not just the
software itself. While minimum requirements (e.g., TPM 2.0, secure boot, specific Intel/AMD
processors) are strict, performance varies based on manufacturer-installed bloatware, driver
optimization, and build quality. Microsoft Microsoft +4

Key Factors Affecting Performance

Manufacturer Optimization: Laptops from major manufacturers (Dell, HP, Lenovo, ASUS)
usually perform well because they provide tailored driver updates to match Windows 11's
requirements.

Hardware Specifications: Performance hinges on having a supported CPU (generally Intel
8th Gen+ or AMD Ryzen 2000+), at least 4GB of RAM (8GB+ is recommended), and
an SSD, which are crucial for running the OS smoothly.

Bloatware and Customization: Some laptops come pre-installed with excessive software
that can slow down performance, whereas clean installs run faster.

"Copilot+ PCs" Requirement: Newer AI features require specific hardware—a neural
processing unit (NPU) capable of 40+ TOPS—available only on specialized, newer laptop
models (e.g., Snapdragon X series, new Intel/AMD chips).

mportant Considerations:

Unsupported Hardware: While Windows 11 can sometimes be forced to run on older hardware,
performance may suffer, and these devices may not receive critical security updates.Microsoft
Microsoft +4

Driver Availability: Older laptops may lack the specialized drivers required for newer
hardware features to function properly.

You can use the PC Health Check application to verify if your specific model meets
the requirements.


AI Overview

Linus Torvalds has not recently announced a specific number of lines of code for the Linux kernel;
in fact, he recently made headlines for criticizing the use of lines of code as a productivity metric.
Instagram Instagram +2

Key details regarding current Linux code statistics and Torvalds' stance include:
....
Current Involvement: Torvalds has noted that he no longer writes much kernel code himself,
instead spending his time merging between 11,000 and 13,000 commits during busy merge windows.

Linux Begins Removing Support For Russia's Baikal CPUs.
____
Behind the Curtain: The kids aren't AI-right.
 
Try 1.

Wednesday April 15 06::46
____
AI Overview

The Snapdragon X2 Elite utilizes an Arm-based Instruction Set Architecture (ISA), specifically
featuring Qualcomm's custom 3rd Gen Oryon CPU cores. Designed for next-gen Windows on
Arm laptops, this 3nm chip (e.g., X2E-96-100) features 18 cores—12 high-performance "Prime"
cores and 6 efficiency cores—operating up to 5.0 GHz. Chips and Cheese Chips and Cheese +2

Key Architectural Details:
...
The Snapdragon X2 Elite series is designed for superior efficiency and AI acceleration in AI PCs,
with laptops arriving in early 2026.

____
Microsoft’s (MSFT) Data Center Push Continues with 3,200 Acre Wyoming Campus.
___
Qualcomm's Snapdragon X2 Elite leaves Intel & AMD in the dust, even at low power limits.

AI Overview

Based on early 2026 benchmarks, the Qualcomm Snapdragon X2 Elite (18-core) generally
outperforms current Intel Panther Lake and AMD Ryzen AI Max chips in single-core and
multi-core performance, especially in thin-and-light laptops. It demonstrates superior efficiency,
often providing higher performance at lower power limits compared to competing x86 chips.

Performance Highlights
...

Compatibility: While performance is top-tier, software compatibility remains a consideration
compared to the mature Intel/AMD x86 ecosystem. Reddit Reddit +4

Disclaimer: Performance results are based on early reports and benchmarks available as of April 2026.


 ___
The U.S. Is Making Major Strides Toward Nuclear Fuel Independence.
Try 1.

Tuesday April 14 07::24
____
The Raspberry Pi's 15-year reign is quietly ending—here's why.

NVIDIA Hiring More LLVM Engineers To Work On CUDA Tile.

OpenAI rips Anthropic, distances itself from Microsoft.

WARNING: Oracle's AI obsession could mean higher prices and worse suppor.

Alphabet gets 90-day catalyst watch at Citi as search and cloud may see Gemini boost.

We will not survive’: Toyota, Honda and Ford CEOs issue
chilling warning about China — and it could hit your portfolio
.
____
AI Overview

As of 2026, the most accurate Analog-to-Digital Converters (ADCs) for precision measurement
are 32-bit Delta-Sigma ( ) converters. These converters offer the highest resolution and lowest noise
for low-bandwidth, high-precision applications. For high-speed applications, 16-bit pipelined
converters remain standard, while 12-bit, multi-gigahertz converters handle high bandwidths.

Most Accurate ADCs as of 2026 Highest Resolution: 32-bit Delta-Sigma ( ) ADCs (e.g., from Texas
Instruments and Analog Devices) are the leaders in accuracy.

Architecture: Delta-Sigma is favored for high dynamic range and high-resolution data acquisition.

Performance: These converters can achieve 32-bit resolution in low-sampling rate applications
(e.g., precise scientific instrumentation).

Alternative High Precision: Successive Approximation (SAR) converters can reach
18-20 bits of resolution, often preferred for speed over maximum resolution. Dewesoft Dewesoft +4

Note: While 32-bit is the top resolution, many industrial and high-end audio devices currently
use 24-bit as a standard high-fidelity level. Dewesoft Dewesoft +3
 
____
Is China the World’s Best Prepared Nation for an Energy Crisis?.


Try 3/

Monday April 13 18::0
____
Stanford report highlights growing disconnect
between AI insiders and everyone else
.

____

The three realities of AI.
____
how man c++ feature additions are included to gcc c?

AI Overview

GCC includes hundreds of individual feature additions across various C++ standards,
ranging from major core language changes to minor library improvements. Rather
than a single fixed count, these additions are categorized by the ISO C++ standard
version they implement. GCC, the GNU Compiler Collection GCC, the
GNU Compiler Collection +3

Core Language Features by Standard GCC maintains detailed implementation status
for each standard revision:

C++11: Complete as of GCC 4.8.1, including approximately 40+ major features like
lambdas, auto, and rvalue references.

C++14: Fully supported since GCC 5.1, adding around 12-15 core features such
as generic lambdas and variable templates.

C++17: Fully supported since GCC 7.1, introducing roughly 30 major additions,

C++20: Substantially complete as of GCC 11.0, though some complex areas like
Modules remain experimental.

C++23: Nearly complete in GCC 14+, adding major features like std::expected
and multidimensional subscript operators.

C++26: Experimental support is ongoing in GCC 15, with over a dozen features already
implemented, such as pack indexing and #embed.

GNU-Specific Extensions
...
How to Check Your Version's Features
,,,
Comprehensive Table: Refer to the Official GCC C++ Status Page or the cppreference
Compiler Support Table for a live-updated count of every individual proposal implemented
by version.


AI Overview

GCC C++ updates and development are primarily funded by major technology corporations
that rely on the compiler, including Red Hat, Google, Intel, SUSE, and ARM, which pay
developers to contribute full-time. While managed by the Free Software Foundation (FSF),
development is driven by these commercial interests.

Corporate Contributors: Companies like Red Hat and SUSE Labs are key contributors, providing
infrastructure, optimizations, and maintainers.

Purpose: Corporations fund GCC to ensure support for their hardware architectures, improve
performance for their platforms, and maintain compliance with C++ standards.

Community & FSF: While commercial firms do much of the work, the FSF provides stewardship,
and the project benefits from global community contributions.

The compiler is technically part of the GNU Project, but its ongoing maintenance is heavily
supported by the industry rather than solely through donations to the FSF.





Try 1.

Sunday April 12 10:44
____
2.25 x 1.5 = 3.375 in decimal fixed point.
For decimalf;oating pint thinkers
3375. x 10-3.

____
Big Short’ Michael Burry sends signal on Nvidia stock.

China is gaining an edge in AI by offering significantly cheaper
computing (tokens), potentially pressuring U.S. firms on pricing,
demand, and energy consumption dynamics
.
____
One UI 8.5 rollout possibly delayed for these two reasons.
 
Try 1.

Saaturday April 11 12:38
___
A software reckoning is coming.

Nearly half of US data centers planned for 2026 canceled or delayed.

AI Overview
AWS Graviton is a family of 64-bit ARM-based processors (CPUs) designed specifically by
Amazon Web Services (AWS) to deliver the best price-performance for cloud workloads
running in Amazon Elastic Compute Cloud (Amazon EC2)

These custom chips are developed by Annapurna Labs (an AWS subsidiary) to provide a more
energy-efficient, cost-effective alternative to traditional x86 processors from Intel or AMD.
Wikipedia
Wikipedia +1

Here are the key details about AWS Graviton:
...
Migration and Support Many applications can move to Graviton with minimal effort, especially
those using open-source software (Linux, Python, Java, etc.). AWS offers tools like the "
Porting Advisor for Graviton" and the "Graviton Savings Dashboard" to help evaluate potential
savings and make the switch. Amazon Web Services Amazon Web Services +1
.
____
How Should We Prepare for the Looming Quantum Encryption Apocalypse?.

USB, Abstra,

____
Rust-y Firmware For Waveshare Smartwatch.
____
Samsung Confirms Upgrade Offer—Galaxy Owners Must Now Decide.
____
Amazon CEO Says Chip Business Is ‘On Fire,’ Graviton & Trainium
Now Competing At Intel, AMD, And NVIDIA Scale
.

Two customers ask to buy all of AWS' Graviton instance capacity in 2026.

PC Industry in Dire Straits, ‘Asking You to Own Nothing and Be Happy,’
Says Framework CEO
.

Microsoft suspends dev accounts for high-profile open source projects.

    The computer in the cloud has increasingly greater economic output
    than the computer in the hand,

AI Overview

Yes, cloud computing can expose users to limitations or unauthorized access regarding
application and data usage by cloud service provider (CSP) employees. These risks
stem from insider threats, inadequate Identity and Access Management (IAM) controls,
and the need to trust providers with data oversight. Key risks include:

Insider Threats & Access Abuse: Cloud provider employees may have broader access
than necessary, leading to risks where they can abuse privileges to access client data
or applications.

Misconfiguration Risks: Inadequate access controls by the CSP can lead to accidental
data exposure, where sensitive application data is inadvertently shared or exposed by the vendor.

Lack of Transparency: Organizations often have limited visibility into how cloud employees
manage, maintain, or access their systems, creating reliance on the vendor's internal security policies.

Insecure APIs & Credentials: Improperly secured interfaces (APIs) can allow unauthorized
access to services.

To mitigate these risks, organizations should enforce strict identity and access management (IAM)
policies, monitor for unauthorized activity, and ensure robust security measures.

Fastly, along with Akamai and Cloudflare, tumbles after Anthropic launches Managed Agents,

Economists Starting to Admit They May Have Been Wrong About AI Never Replacing Human Jobs.

Oracle's Layoffs: The $4 Billion Return Threshold Investors Cannot Ignore,

The Oracle Stock Meltdown Is A Massive Overreaction.
____
In math math decimal .9999... = 1.00000.... because

n = .9999... and
10 x n = 9.9999.

So 10 x n - n = 9 x n - 9 since all the decimal point ar 0s.
In computer math in binary
n = .11111... and 10 x n = 1.11111.
BUT 10 x 1 - 1 IS NEVER = 1 becaause ciomputer arithmetic is of finite length!!

In Islam maath hexadeciaml

n = .FFFFF...
10 x n = F.FFFF...
and

10 x n - n = F x n = F.FFFFF ...

and h x F/F = 1?

AI Overview +6 Y

our observations accurately highlight the difference between theoretical mathematics
and practical computer arithmetic. Here is a breakdown of the concepts you raised:

1. Computer Math (Finite Precision) Binary: In theory, (recurring) equals 1.

Computer Reality: Because computers use finite length (e.g., 32-bit or 64-bit IEEE
754 floating point), is always truncated.

The Problem: Therefore, (shifting the binary point) minus does not equal because
the "last" bit or the infinite tail is missing. The calculation results in (a limited number
of ones), not

2. Hexadecimal Math (Base 16)

In hexadecimal, the digits are and . {ctrl c issue.]

: This represents the maximum value less than in hexadecimal, equivalent to in decimal.

: Multiplying by the base ( or ) shifts the hex point.

: is the highest single digit, equal to . is equivalent to . , which is .

3. Regarding " " If you are asking about in hexadecimal, yes, any non-zero number divided by itself is .

(which is ).
In summary, the difference you see is because theoretical math allows infinite precision,
whereas computers must truncate or round, making never quite reach .





 
____
Vineyard Wind sues GE Vernova to block it
from abandoning work on wind farm
.

China Commissions Wind Farm At Its Deepest Offshore Position.
Try 2.

Friday April 10 06:35
____
Microsoft Stock (MSFT) Is Down 23% — I
s This a Rare Buying Opportunity or a Warning Sign?
.

Amazon creates 'Project Houdini' to make data center delays disappear,
____
what are the major improvements to A/D converters from 1985 to 2026?

AI Overview

Major advancements in Analog-to-Digital Converters (ADCs) from 1985 to 2026 have focused on
exponential increases in speed and resolution, dramatic power reduction, and on-chip integration, d
riven by advancements in CMOS technology. Key improvements include high-speed, high-resolution
pipelined/SAR architectures, sigma-delta converters with noise shaping, digital self-calibration, and
multi-channel integration for systems-on-chip (SoC).

ey Architectural & Technological Improvements (1985-2026):

Massive Speed and Bandwidth Increases: By 2026, time-interleaved ADCs have enabled extremely
high-speed, multi-GS/s (gigasamples per second) conversion with relatively small footprints, such as
7-bit, 175 GS/s converters for communication systems.

Resolution and Dynamic Range: Early 1980s 16-bit converters have evolved into 24-bit to 32-bit
delta-sigma converters used for high-precision, low-speed measurements.

ADC Architecture Shifts

: SAR (Successive Approximation Register): Became the standard for moderate speed/high
resolution and low power, enabled by low-power CMOS.

Sigma-Delta ( ): Became the standard for high-precision audio and sensor applications due to noise
shaping, reducing the need for complex anti-aliasing filters. Pipelined: Evolved as the workhorse
for high-speed, medium-resolution applications like video and telecommunications.

Pipelined: Evolved as the workhorse for high-speed, medium-resolution applications like video and
telecommunications.

Digital Assistance/Self-Calibration: Advanced algorithms now correct for component mismatches,
nonlinearity, and offset errors in real-time, improving accuracy without requiring high-precision analog
components.

Integration and Multi-Channel Packages: The shift from individual monolithic chips to multi-channel
(quad/octal) converters and full SoC integration, where the ADC is integrated with digital processing
on the same die.

Power Efficiency: Modern ADCs operate at fractions of the power required in 1985, often with
1.8V supplies or lower, utilizing 0.18 m and smaller processes.

Key Milestone Comparisons:

1985-1995: Focus on 16-bit converters for digital audio (CD players) and early digital telephony.

2000s: Growth of pipelined ADCs for imaging and communications; rise of oversampling techniques.

2010s-2026: Widespread adoption of digital calibration, time-interleaving for 5G/6G, and
AI-driven adaptive calibration.

Is it important to digitize at the sensor and is shielding a good idea?

AI Overview

Digitizing at the sensor (placing an Analog-to-Digital Converter, or ADC, close to the sensing
element) is highly beneficial to minimize noise, signal attenuation, and electromagnetic interference
(EMI) before transmission. Shielding is also considered excellent practice to prevent external
interference from corrupting sensitive low-level signals. Celera Motion Celera Motion +5

Key Reasons for Digitizing at the Sensor

Signal Integrity: By converting to digital near the source, the signal is less susceptible to noise
degradation compared to transmitting delicate analog signals over long wires.

Reduced Noise Coupling: Digital signals are more robust than analog voltages, which often act
as antennas for EMI, such as radio waves, motors, and high-voltage lines.

Performance: It enables higher fidelity and reduces the need for complex, heavy shielding
on long cables.

Essential for Sensitivity: In high-sensitivity, high-speed, or IoT environments, shielding is a
crucial component to maintain reliable, accurate data transmission.

Reliability: It is considered crucial for any type of connection in industrial or high-EMI
environments. Celera Motion Celera Motion +7

Key Considerations

Proper Grounding: A shield is only effective if it is properly grounded.

Cost and Weight: Shielding can add weight and cost to a design.

Alternative Solutions: In some cases, proper signal routing or differential
signaling might reduce the absolute need for shielding, but it is generally regarded
as best practice.
____
Big Tech Is Quietly Fueling a Natural Gas Boom.
 
____
IMF chief's warning: No painless exit from war's energy shock.
Try 2.

Thursday April 9 09::21
____
Big Tech's hiring boom is over. 2 charts show where its workforce stands now.

Tech industry lays off nearly 80,000 employees in the first
quarter of 2026 — almost 50% of affected positions cut due to AI
.

___
Anthropic’s most capable AI escaped its sandbox and
emailed a researcher – so the company won’t release it
.

Scoop: Meta removes ads for social media addiction litigation.
____
Microsoft 365 Network-Level Disruption Affecting Exchange
Online, Teams, and Core Suite Services
.

Hackers exploiting Acrobat Reader zero-day flaw since December. Amazon revamps S3 cloud storage for the AI era, removing a key
barrier for apps and agents
.
___
which is worse: FORTRAN FORMAT or c printf?

AI Overview

Which formatting system is "worse" often depends on whether you prioritize simplicity
and safety (Fortran) or flexibility and compactness (C).

1. Fortran FORMAT Fortran's
FORMAT system is often considered "worse" for modern readability but "better" for
structured, high-volume scientific data. Fortran Discourse Fortran Discourse +2

Pros:

Power & Repetition: Features like (*(_)) (unlimited format repetition) and colon editing make it
significantly more powerful for printing large arrays or tables compared to C.

Reusability: A single FORMAT statement can be referenced by multiple WRITE statements,
ensuring consistent table layout across a program.

Abstraction: It hides hardware representation, allowing programmers to specify desired
precision rather than CPU-specific types.

Cons:
Arcane Syntax: Critics often describe it as "unwieldy" and difficult to remember.

Rigid Input: For reading data, every character must appear exactly as specified in the
FORMAT statement, making it less flexible than free-format alternatives.

Verbosity: Variable declarations and formatting strings can be incredibly verbose
compared to C

2. C printf

C's printf is often considered "worse" due to critical safety and security risks.

Pros:

Compactness: It is generally easier to read for simple output and less verbose than
Fortran for small numbers of values. Ubiquity: As a core part of the C standard
library, it is available on virtually every platform.

ons:

Safety Risks: printf is notoriously unsafe; it has no way of verifying that the number
or types of arguments passed match the format specifiers, which frequently leads
to "nonsense" output or program crashes.

Security Vulnerabilities: Improper use of format strings (e.g., using user input as the
format string) is a classic source of buffer overruns and other security vulnerabilities.

No Native Array Support: Unlike Fortran, C requires manual iteration or custom functions
to print arrays. Fortran Discourse Fortran Discourse +7

Summary Comparison.













 
Try 1.

Wednesday April 8 07::38
____
Micron, Credo, Lumentum: 3 AI Strong Buys.

what is the difference between fix and floatiing point arithmwetic?

AI Overview

Difference Between Fixed Point and Floating Point - Pediaa.Com Fixed point vs floating point
arithmetic in FPGA - imperix Fixed point vs Floating point Fixed Point Representation -
GeeksforGeeks Fixed point vs floating point arithmetic in FPGA - imperix View all Fixed-point
arithmetic uses a pre-defined, set number of digits for fractional parts, acting like integers to
provide fast, precise calculations over a limited range. Floating-point arithmetic uses scientific
notation (mantissa and exponent) to "float" the decimal point, allowing a vast range of values
but with lower precision and higher computational cost. Stack Overflow Stack Overflow +4

Key Differences:

Range and Precision: Fixed-point is ideal for fixed precision (e.g., currency) but limited in range.
Floating-point excels at representing very large or very small numbers but with lower precision.

Speed and Efficiency: Fixed-point is generally faster and consumes less energy, making it
ideal for embedded systems and DSPs.

Complexity: Fixed-point requires careful scaling to avoid overflow, while floating-point
handles scaling automatically.

Hardware: Fixed-point uses simple integer hardware; floating-point requires complex
dedicated units (FPU).

When to Use Which:

Fixed-Point: Accounting/finance, embedded microcontrollers, Digital Signal Processing
(DSP) where speed and determinism are crucial.

Floating-Point: Scientific computing, 3D graphics, and applications requiring a massive
range of values, such as scientific simulations.

TinyGo Boldly Goes Where No Go Ever Did Go Before.

128/256 bit fixed and floating point,
1.5 is 1,1 in binary.
11 x 2-1.

2.25 is 10.01 in binary.
1
11. x 2-1 .
1001. x 2-2.

Do computer math peop;e think in binary but write in hexadecimal? :)

9. x 2-2. x 3. x 2-1 = 1B. x x 2-3?.

1.5 x 2.25 = 3.375.

1B. hex = 00011011. binary,

The binary point must be shifted 3 bits to the left which is 11.011, :)

In 128 bit fix and floating point arithmeticboth
are mapped into integers. :)++?
.

The demise of software engineering jobs has been greatly exaggerated.
____
Waymo's Stopped Testing Robotaxis In New York City, So What Now?.

Video captures Waymo Robotaxi entering Whataburger drive-thru the wrong way.
Downtown Aust in photographed from Waymo crossinr on Lamar street.

____
Anthropic says its most powerful AI cyber model is too dangerous
to release publicly — so it built Project Glasswing
.
 
____
The Biggest Oil Disruption in History Is Accelerating the Energy Transition.
Try 3.
r

Tuesday April 7 08::53
____
Why my next microcontroller will be an ESP32, not a Raspberry Pi Pico.

$2 WeAct CH32V006F8U6 Mini Core board features CH32V006
RISC-V MCU, supports 3.3V or 5V I/O voltage
.\
____
Anyone can code with AI. But it might come with a hidden cost.

r does coding with ai involve use of LLVM/Clsng?

AI Overview

Yes, coding with AI can involve the use of LLVM/Clang, particularly for complex
C/C++ projects where AI tools (like LLM-based assistants) need precise semantic
context that tools like clangd provide. While AI generates code, LLVM/Clang acts
as the underlying infrastructure to compile, optimize, and validate that code, though
LLVM strictly requires a "human in the loop" to review AI-generated contributions.

How AI Coding Interacts with LLVM/Clang:

The LLVM project has a strict policy regarding AI-assisted code: the human is
responsible for the quality and must be able to understand the code, not just
use the AI to generate it. ____ 1.5 is 1,1 in binary.
2.25 is 10.01 in binary.
in128/256 bit fixed and floating point
11 x 2-1 .
1001 x 2-2.
____
The Next Battleground for Robotaxis.
____
Microsoft Stock Is Down 30% From Its Peak.
History Says This Is What Happens Next
.

Windows Wrap: One team is fixing Windows 11 while others break it.
 
____
Victims say deceptive solar sales left them with crushing debt and broken promises,
Try 5.

Monday April 6 15::49
____
Waymo self-driving car rescued from flooded crossing,

New Password Stealer Bypasses 2FA—Chrome,
Edge And Firefox Targeted
.

Austin trip issues.

The Next Battleground for Robotaxis.
___
Pocket-Sized E-Ink Gets A Firmware Upgrade.
____
Meta salaries revealed: How much the social media giant
pays engineers, AI researchers, and more
.

36 Malicious npm Packages Exploited Redis,
PostgreSQL to Deploy Persistent Implants
.

Analysis-Investors press Amazon, Microsoft and
Google on water, power use in US data centers
.

Retail ‘Silent killers’: How AI start-ups are trying to
solve one of the retail industry’s biggest problems
.
____
if a-b is a+(-b), then is subtract with borrow an unnecessary instruction

AI Overview

No, subtract with borrow (often implemented as SBB or SBC) is not an unnecessary
instruction. While it is true that in two's complement arithmetic, is equivalent to
(where is found by inverting bits and adding 1), the "subtract with borrow"
instruction is crucial for multi-precision arithmetic (subtracting numbers
larger than the register size, e.g., 64-bit subtraction on a 32-bit CPU).
Stack Overflow Stack Overflow +4

Here is why SBB is necessary:

Multi-Word Subtraction: When subtracting 64-bit numbers on a 32-bit machine, t
he processor must subtract the lower 32 bits first, and then the upper 32 bits. If
the lower subtraction results in a borrow (i.e., the lower bits of the subtrahend
are larger than the minuend), that borrow must be subtracted from the
upper 32-bit calculation.

Borrow/Carry Flag Linkage: The "subtract with borrow" instruction uses the Carry
Flag (CF) from the previous SUB operation to determine if 1 should be
subtracted from the next higher chunk of the calculation.

Borrow/Carry Flag Linkage: The "subtract with borrow" instruction uses the Carry
Flag (CF) from the previous SUB operation to determine if 1 should be
subtracted from the next higher chunk of the calculation.

Without a specialized "subtract with borrow" instruction, performing multi-word
subtraction would require significantly more code to manually check the carry flag
and adjust the result, decreasing performance.
Refresh. :)||

AI Overview

No, Subtract with Borrow (SBC) is not an unnecessary instruction in computer
architecture, even though theoretically .

While it is true that modern computers perform subtraction by adding the negated
value of the subtrahend ( ), the "subtract with borrow" instruction is crucial for
multi-precision arithmetic. Stack Overflow Stack Overflow +1

Here is why it remains necessary:

1. Handling Large Number Subtraction (Multi-precision) Computers have fixed
register sizes (e.g., 8-bit, 32-bit, 64-bit). To subtract a 128-bit number on a
64-bit machine, the operation must be broken into parts:

If the architecture only provided a simple SUB instruction, the programmer
would need extra instructions to check the flag and adjust the higher-order
calculation, making code less efficient and slower.Step 2: Subtract the upper
64 bits. This subtraction must account for the
borrow from Step 1.
...
Therefore, SBC is a specialized, necessary instruction for handling complex
arithmetic efficiently
. This 28TB Seagate IronWolf Pro CMR NAS 7200 RPM HDD
deal is even better than the 20TB one
.
 ____
The massive economic impact of the global energy crisis,



Try 1.



Under malware attackS! Microsoft appears to be attacker.

Sunday April 5 07:29
____
Mapped: America’s Data Center Construction Boom.
______
can a cPanel FTP password be viewed

AI Overview

No, a cPanel FTP password cannot be viewed directly once it has been set, as it is
encrypted for security. However, you can easily change or reset an existing
FTP password within the "FTP Accounts" section of cPanel. For the primary
account, you may need to use your hosting provider's client portal to update
credentials. Reclaim Hosting Reclaim Hosting +5

Here is how to manage FTP passwords in cPanel:

View Username/Server: You can see the FTP username and server address
by clicking "Configure FTP Client" next to the account in the "FTP Accounts"
menu. Chang

hange Password: To set a new password, go to Files > FTP Accounts, find
the account, and click "Change Password".

Primary Account: The main FTP account usually shares the same
password as the cPanel login itself.

Host Provider Portal: If you cannot access cPanel, most hosts (e.g.,
GoDaddy, Reclaim Hosting) allow you to change the FTP/cPanel password
from your billing/client dashboard. Reclaim Hosting Reclaim Hosting +4

This video shows how to find your FTP username and server in cPanel:

Note: For security reasons, do not use weak passwords. Always use the
password generator to create a strong password for your FTP account.


 
Try 1,

Saturday April 4 08:22
____
Ex-Microsoft engineer believes Azure problems stem from talent exodus.

Are there some Cloud apps which run under Windows 11 but not run under Windows 10?

AI Overview

Yes, some specialized cloud-enabled apps and features are exclusive to Windows 11,
focusing on AI integration, native Android support, and tighter cloud management. Key examples
include Copilot in Windows, Windows 365 Cloud Apps (streaming apps directly), and enhanced
AI-powered tools within the updated Photos and Snipping Tool. YouTube YouTube +4

Copilot in Windows: Deeply integrated AI functionality, allowing for cloud-based AI
assistance directly from the desktop, which is not available in Windows 10.

Windows 365 Cloud Apps: Stream individual apps from the cloud rather than a full desktop,
designed for efficiency, currently in preview for Windows 11.

Native Apps & Tools: Updated versions of Notepad, Photos, MS-Paint, and
Snipping Tool, which offer better integration with cloud-native workflows and Microsoft 365.

WSA (Windows Subsystem for Android): While being deprecated, it demonstrated the push
for Android app compatibility natively on Windows 11 rather than Windows 10.

Improved Cloud Management: Enhanced integration with Intune and Azure Active Directory
(now Entra ID) for managing cloud apps. YouTube YouTube +4

While the majority of standard cloud apps (like OneDrive, Google Drive, or Slack)
work on both, Windows 11 offers tighter integration for cloud-native workflows.
Microsoft Community Hub Microsoft Community Hub +2

____
Modder uses Claude AI to rewrite BIOS so they can boot unsupported 1
2 P-core Bartlett Lake CPU in Windows on a Z790 motherboard
.

does Claude use LLVM/Clang

AI Overview

Based on recent reports regarding the "Claude C Compiler" (CCC) project,
Claude built a functional C compiler from scratch in Rust, but it is designed
to be "LLVM-like" rather than using LLVM/Clang as its underlying engin
e.
LLVM-like" Design: The compiler created by Claude uses an Intermediate
Representation (IR) similar to LLVM, with components like
GetElementPtr and basic block terminators that would look familiar
to LLVM developers.

Trained on Clang/LLVM Data: Claude was able to generate this compiler
because it ingested vast amounts of open-source compiler code during its
training, including GCC and LLVM/Clang. Independent, But Validated by
GCC: While not using LLVM/Clang for its operation, the Claude-generated
compiler relied heavily on GCC during development for testing and validation.

Current Limitations: The compiler generated by Claude currently produces l
ess efficient code than standard compilers and cannot yet serve as a full,
drop-in replacement for LLVM/Clang or GCC.

In summary, Claude did not simply wrap Clang; it generated its own
Rust-based compiler based on the knowledge it acquired from studying
LLVM/Clang source code. LinkedIn LinkedIn +1


____
Micron Could Be The Next Intel.


____
The global oil crisis is turning into an everything crisis.

Coal is back in fashion.

Try 1.

Friday April 3 07:39
 
Try 1.

Thursday April 2 07:18
____
The first quantum computer to break encryption is now shockingly close.

Try 3.

Wednesday April 3 09:15
____
Watch Out Bitcoin: Cryptography-Breaking Quantum
Computers May Be Closer Than Expected, Says Caltech
.
____

Oracle Cuts 29,000 Jobs & Wall Street Throws a Party,


 
____

How a Wind Turbine Blessing Turned Into a Nightmare in Texas.

Try 1.



Tuesday March 31 08:40
 
____
Thloomberg.com Thousands of Dumped Wind-Turbine
Blades Prompt Crackdown in Texas
.
Try 1.

Moday March 30 09:03


Try 5.

Sunday March 29 08:40
 
Try 1.

Saturday March 28 10:40
___
Windows 11 updates are increasing in frequency due to a shift towards
"continuous innovation," delivering new features via monthly, non-
security previews in addition to mandatory "Patch Tuesday"
security updates. Users may experience more updates if they enable
"Get the latest updates as soon as they're available" or receive
frequent, small Defender security intelligence updates. Reddit Reddit

 
Try 2.


 Friday March 27 09:23
____
News Hardware Gaming Mobile Roundups Interviews Reviews How To
Discussions 11 Deals Hardware Industry ARM’s CEO Rene Haas Says the
‘AGI CPU’ Will Bite Into the x86 Dominance, Referring to Intel as “Historic
”.


____

I was paid to write fake Google reviews –
then my ‘bosses’ tried to scam me
.


t
ry 3

Thursday March 26 16:05
____
Google Issues New Warning About the
Quantum Computing Security Apocalypse
.


 
Try d?

Monday March 23 00:07
____
Tech Employees Are Reportedly Being Evaluated
by How Fast They Burn Through LLM Tokens
.
____
Tesla and SpaceX announce $25B ‘Terafab’ chip factory
— here’s why it reeks of desperation
.
 
Try 1.

Sunday March 22 07:57
____
ESP32: When Is A P4 A P4, But Not The P4 You Thought It Was.

Google expands utility deals to curb
data-center power use during peak demand
,


____
Can Carbon Credits Clean Up
Big Tech’s AI-Fueled Emissions Surge?
.

Microsoft outs Windows 11 KB5085516 to fix internet
access to OneDrive, Edge, Teams, Copilo
t.
____
Oracle's $553 Billion Backlog Is Either a Gold Mine or
a Mirage. Earnings Just Revealed the Answer
.
____
Scientists chased the dream of limitless fusion for 70 years —
Now “magnetic bottles” may finally trap the energy of a star
.

Trump Makes The Wind Power Case For The Global Shipping Industry.
Try 1
.

Sturday March 21 07:45
____
Trump officials announce 10-gigawatt data center,
gas plants for former Ohio uranium site
.
____

Microsoft Stock Makes No Sense, Play The
Spending Versus Revenue Gap
.

____
Quantum Computers Will Tap Out Before
Breaking Encryption
, Theory Claims.

'
Try 4.

Friday March 20 07:12
____
Clintech Pico – The first Raspberry Pi RP2354B board
offers 48 GPIOs in Raspberry Pi Pico form factor
.

Reading The World’s Smallest Hard Drive.
____
Using AI makes writing more bland, study finds.
.
___
Broadcom Just Shipped the World’s First Quantum-
Safe Network Encryption — 3 Reasons AVGO Investors
Should Pay Attention
.
____
The Long Farewell to Mark Zuckerberg’s
Metaverse Mike
.

Meta decides not to shut down Horizon Worlds on VR after all,

Nadella's Flip-Flop.


 
Try 2,

Thursday March 19 06:30
____
what is long division

AI Overview

Long Division Method - GeeksforGeeksLong division is a step-by-step,
digit-by-digit method for dividing multi-digit numbers, typically starting from
the left. It involves a repeating four-step process—Divide, Multiply, Subtract,
and Bring Down (DMSB)—to manage large calculations by breaking them
into smaller, manageable parts. It is used to find both the quotient and the remainder.

YouTube YouTube +3 This video explains the step-by-step process of long
division using the DMSB method:

Key Aspects of Long Division...
Long division is generally introduced in 4th to 6th grade as a fundamental
arithmetic skill.
_

How did programming jobs and opportunities evolve from the 1970s to now for those who started in the early days of computing? Profile photo for William Payne William Payne Former MTS, Retired at Sandia National Laboratories (1980–1992)1h AI Overview Programming jobs have evolved from a highly specialized, hardware-focused craft in the 1970s—often involving manual machine instructions or low-level languages like Assembly and COBOL—to a diverse, abstract, and high-level discipline that now incorporates artificial intelligence . For those who started in the early days, this evolution meant moving from being "tech wizards" operating behind the scenes on mainframes to becoming "software engineers" in the 2000s, and eventually collaborating with AI tools in the 2020s.Medium +3 Evolution of Programming Roles (1970s–Present) The 1970s - The "Machine" Era: Programmers in this era were focused on system efficiency, interacting closely with hardware (mainframes). Jobs involved writing in FORTRAN, COBOL, or the newly developed C language to manage memory directly. The 1980s-1990s - The "Personal Computing & Web" Era: The rise of personal computers shifted focus toward user experience (GUI) and applications. The internet boom introduced web development (HTML, JS, PHP), shifting roles from "programmers" to "web developers" and "software engineers". The 2000s-2010s - The "Cloud & Agile" Era: Software development shifted from a "waterfall" approach (linear phases) to Agile, demanding faster iteration. The rise of cloud computing and DevOps meant developers no longer just wrote code, but also handled its deployment, infrastructure, and scalability. 2020s - The "AI-Assisted & Multi-disciplinary" Era: Modern developers act as "product builders," using high-level scripting languages (Python) and AI-assisted tools ("vibe coding"). Roles have diversified into AI/ML engineering, full-stack, and data science.Medium +8 Major Shifts in Job Opportunities and Work Life From Specialist to Generalist: Early programmers often had narrow specializations (e.g., maintaining a specific mainframe system). The modern agile paradigm favors "full-stack" developers who can manage multiple aspects of a project, reducing handover overhead. Abstraction of Hardware: Professionals no longer need to know Assembly language. Modern tools, compilers, and cloud infrastructure have abstracted the hardware, making it easier to begin programming, but increasing the overall complexity of software stacks. Demographic Shift: Ironically, while programming was in its early days, women played a massive role, but the 1970s saw a rise in the "masculine" stereotype as the field gained prestige and economic value, significantly changing its demographics. The "Software Crisis" to "Feature Bloat": While early programming was dominated by the "software crisis" (difficulty in writing large software), modern challenges are more about managing complexity, feature bloat, and navigating vast ecosystems.Hack Reactor +5 Career Longevity and Adaptation Professionals who started in the 1970s had to adapt from procedural programming (like COBOL/C) to Object-Oriented Programming (C++/Java) in the 90s, and then to scripting and dynamic web languages in the 2000s. Despite these shifts, many developers from that era found that while tools changed, the fundamental need for structured, logical problem-solving remained consistent.Quora +4 Current Landscape (2025-2026) The job market in 2025 has seen significant shifts, with U.S. programming jobs for "computer programmers" falling to their lowest levels since 1980 due to AI advancements and high-level automation, leading to a new spectrum ranging from "vibe coding" to specialized AI engineering.

***
Public key cryptography is based on the principle that one known prime is multiplied by by a sccret prime. The product is
published But, in decimal, is hard to factor
… by stupid people, of course. Smart use long division in binary to divide the product [dividend] by the public prime.
Whhen division complete, the “secret” is the quotient and the remainder si 0!

computer math and Islam math willing, of course


AI Overview

No, this statement is entirely false. While public key cryptography (specifically RSA) is indeed based on
multiplying two large secret prime numbers to create a public product, the method described to break it is
incorrect. Dividing the product by a public prime will not work because the "public prime" mentioned is not
the prime factor.

Here is a breakdown of why this claim is incorrect:

Factoring is Hard: In RSA, the public key is the product (where and are two large prime numbers). The
security relies entirely on the fact that for computers, finding and when only is known is computationally
infeasible (i.e., extremely hard), not just for "stupid people," but even for supercomputers.

Division Doesn't Help: If you have the public product , you do not know or . You cannot
simply "divide the product by the public prime" because you do not have the prime factor to divide by.

Trial Division is Infeasible: The "smart" method described—using division to test factors—is known
as trial division. To break a modern 2048-bit RSA key, you would have to test more prime
numbers than there are atoms in the universe, which would take billions of years, not a quick division operation.

How it is Actually Broken: Only with a Quantum Computer running Shor's algorithm could a large RSA
product be factored efficiently in a reasonable amount of time. Classical computers are currently unable
to do this efficiently.

The description provided represents a fundamental misunderstanding of the "trapdoor" function that makes
public-key cryptography secure
.





AI Overview

This claim is mostly false and represents a misunderstanding of how public-key cryptography (specifically RSA)
works. While it correctly identifies that public-key cryptography involves multiplying secret primes to create a
public product, it incorrectly assumes that breaking this system is as simple as performing long division.

Here is a breakdown of why the statement is incorrect:

1. The Core Principle (Correct Part) True: Public-key cryptography (e.g., RSA) is based on picking two large
secret prime numbers ( and ) and multiplying them to produce a public product ( ). This product is published as
part of the public key. True: This is a "one-way function." It is extremely easy for a computer to multiply two 2048-bit
primes, but currently infeasible for even the most powerful supercomputers to factor that resulting 4096-bit number
back into its components, and

2. The Fallacy of Easy Division (Incorrect Part) False: The claim states that one can divide the public product ( )
by the public key ( ) to find the secret prime. This is false. The public key is not one of the prime factors ( or ).
The public key is typically a pair , where is the product ( ), but is a small exponent (often ) chosen to be coprime to .

3. Binary vs. Decimal (Irrelevant Part) False: The difficulty of factoring is not related to the number base (decimal
vs. binary). Computers perform all operations in binary, and they find factoring 4096-bit binary numbers equally
impossible. Brilliant

Summary

The claim suggests a simple division can break RSA. If that were true, all secure communication on the internet
(banking, HTTPS, PGP) would have been broken long ago. Currently, there is no efficient way for a classical
computer to factor these products, making them secure.


AMZN, GOOGL, META, and MSFT Are ‘Too Big to Fail,’ Says Top Analyst.

A.I. Agents: They’re Fun. They’re Useful.
But Don’t Give Them the Credit Card
.

____
Oil Prices Hit $112 as Iran Expands Strikes on Gulf Energy Sites.

Coal plant forced to stay open due to
emergency order isn’t even running
.

$200 Oil No Longer Crazy Idea as Middle East Supply Collapses.
Try 1.

Wednesday March 18 07
____
Why Garry Tan’s Claude Code setup
has gotten so much love, and hate
.


 
Try 1.

Tuesday March 17 08:51
____
SparkFun OpenScale IoT – An ESP32 board with
HX711 ADC for smart scales with WiFi and Bluetooth connectivity
.

____

AMD: The Trojan Horse In The Server Room.

___
Oracle Layoff Plan Raises Questions
For AI And Cloud Growth Story
.
    Oracle, NYSE:ORCL, is reportedly preparing
    layoffs of 20,000 to 30,000 employees, or up to
    18% of its workforce.

Ask HN: What is it like being in a CS major program these days?.

LLMs can be exhausting (tomjohnell.com).
____
Tesla’s Terafab chip fab ambitions ignore its
total lack of semiconductor experience
.


\____
The Grid Needs an Expansion. Who Will Foot the Bill?,



Trump muses over ‘taking Cuba’ as island’s power grid collapses after weeks of US oil blockade.
Try 2.

Moday March 16 07:48
____
what are certification differences between a 64-bit hardware
multiply and an 8-bit software implementation?

AI Overview

The certification differences between a 64-bit hardware multiplier and an 8-bit software implementation
(e.g., in IEC 61508 or DO-178C/DO-254) center on hardware fault handling vs. software systematic
failure analysis. A 64-bit hardware multiply is usually certified as part of the processor (DO-254/IEC 61508-2)
focusing on random hardware failures, while an 8-bit software implementation requires rigorous software
validation (DO-178C/IEC 61508-3) to prove it cannot produce systematic errors, such as overflow or
timing issues. Reddit Reddit +2 Certification

Key Differences

64-bit Hardware Multiply

Focus: Random Hardware Failures (e.g., transistor failure). Standards:
...
Validation:
...
Complexity:
...
Assurance:

8-bit Software Implementation (Software Multiplier)

Standards:
...
Validation:
...
Complexity:...
Assurance:

Summary of Certification Impact.

In high-integrity applications (e.g., SIL 3/4 or DAL A), the 64-bit hardware
path is often preferred because it is easier to prove safe state transitions and
detect hardware faults, whereas an 8-bit software multiplication requires massive
documentation, verification of every branch, and proof that the intermediate
8-bit calculations never produce invalid results.
____
Memory Suppliers Are Actually Worried the Demand Boom
Won’t Last ‘Too Long’, and Are Already Rethinking Expansion Plans
.

AI Overview

data centers, paired with constrained capacity is driving massive price hikes and an optimistic
outlook for Micron. HBM demand for 2026 is already sold out, with server unit growth and
limited supply for NAND/DRAM likely to keep pricing elevated through 2027. CNBC CNBC +4

Key factors fueling this demand include:

AI Infrastructure Boom:
...
Tight Supply Dynamics:
...
Broader Market Growth
...
Higher-Margin Products:

These factors are forcing customers to sign multiyear agreements,
providing Micron with strong revenue visibility.




Try 1

 
Sunday March 15, 16::36
___
Practical Guide to Bare Metal C++.

____
Dominion Energy Falls Into The “Dispatchable” Trap Over Data Center Power,

____
fhow many pro,e numbers arethere between 0
and2 to the 64 power minus 1?

AI Overview

There are exactly 425,656,284,035,217,743 prime numbers
between \(0\) and \(2^{64}-1\). Mathematics Stack Exchange

1. Identify the search range
...
2. Use the Prime Counting Function
...
3. Determine the exact value
...
4. Understand the distribution

Answer There are 425,656,284,035,217,743
prime numbers between \(0\) and \(2^{64}-1\). 


3 x 5 x 7 = 105.

1101001 is 7 bits long?

4 is tthree bits lon

b0b1b2b3

16 x 4 = 64 which is less tnr 105 so b0=1.

8 x 4 = 32 + 64 96 which is less than 105 so b1-1.

4 x 4 = 16. 96+16-116 which is greater than 105 so b2=0

4x2 =8. 10 so b3 =1.

4x1-4 104+4=108 so b3=0

AND THE REMAINDER IS 1?

The deuvudend us 105.

The divisor is 9=3x3. 1001 binary with length 4 bits.
Spsecifying more bits than are need for the quotiient causes
no isssues ecuase the most significant unneed bit willl be 0s.

b0b1b2b3b4.

9x16=135 which is biggester than 105 so b0=0.?

9x8=72 which is less than 105 so b1=1.

9x4=36. 72+36=108 so bi2=0.

9x2=18. 18+72=88 so b3=1.

9x1=9 88+9=97. b4=1

The quotientis bimary is 1011 and 11 decimaal.

105-99=6 which is the remainder?

Can a 256 diviidend easily and quickly be divided by a
128 bit divisor on low-Watt low-cost Nanocomputer
executing ~every instruction in one clock cycle?
____
Trump’s Offshore Wind Nightmare
Has Become Reality
Try 5.


Saturay March 14, 07:01
____
NewsGalaxy S26 Ultra display causing eye strain
and headache; Samsung is apparently investigating
..

 
Try 1.

Friday March 13, 07:30
____
Who Is Handala — The Iran-Linked Ghost Group
That Just Wiped 200K Stryker Devices
.
____
Who is really footing the AI energy bill? Inside
the debate about data center electricity costs
.

Data centers, utility costs, and projected upgrades.
____
After 16,000 layoffs, Amazon may cut
14,000 more jobs in second phase
.
____
Is a cyber attack on world economies underway?

AI Overview

Yes, a sustained, high-level cyber campaign is actively targeting world economies
through ransomware, data theft, and attacks on critical infrastructure like banking,
energy, and healthcare. With cybercrime costs projected to hit trillion by 2027, these,
state-sponsored and criminal activities represent a critical, ongoing threat to global
financial stability. International Monetary Fund | IMF International Monetary Fund |
IMF +5

Key details regarding the current, underway cyber attacks:
...
Recent examples, include, attacks, on, airlines, and, manufacturing, companies, that,
caused, significant, operational, disruptions,.



AI Overview

Companies using C++ are not necessarily bad investments; while development
costs are higher due to specialized skill requirements, C++ is often chosen for
superior performance, speed, and efficiency in critical, high-margin industries like gaming,
finance, and high-performance computing. Although development is slower compared to l
anguages like Python or Java, the resulting lower long-term operational costs and high
efficiency can provide a strong return on investment (ROI). Reddit Reddit +3

Key Considerations for C++ Investments:
....
Conclusion:

C++ companies are suitable for investors looking for firms that prioritize
high-performance and scalability over rapid, cheap development, particularly in specialized t
echnical sectors.


___

a=4.125,
b=2.5.
a*b=

b-a=
____
Microsoft in Talks to Lease Large Texas
Data Center Site After Oracle Walked Away
.
____
is Linux Copy/Paste is a same as Microsoft
drag/drop without the theatrics?

AI Overview

Linux copy/paste is functionally similar to Microsoft drag-and-drop for moving data,
but they operate differently. Linux often uses a direct, often keyboard-driven,
intermediary clipboard, while Windows drag-and-drop is a mouse-based, direct
manipulation method. Linux users can experience issues with drag/drop, whereas
it is generally more consistent on Windows. gigi.nullneuron.net gigi.nullneuron.net +3

Key differences between the two include:
...
Alternative Tools: Clipboard Managers can improve the workflow in
Linux. gigi.nullneuron.net,
____
Amazon holds engineering meeting
following AI-related outages
.

Tenstorrent TT-QuietBox 2 Launched: A RISC-V Powered
AI Workstation With 128 GB GDDR6 Memory,
Liquid-Cooling & $9999 Starting Price
.

Meta’s Moltbook gamble looks a
lot like bubble behavior
.


____
Charted: Where the World’s Oil Comes From by Region.
Try 1.
Friday March 13, 07:30
____
Who Is Handala — The Iran-Linked Ghost Group
That Just Wiped 200K Stryker Devices
.
____
Who is really footing the AI energy bill? Inside
the debate about data center electricity costs
.

Data centers, utility costs, and projected upgrades.
____
After 16,000 layoffs, Amazon may cut
14,000 more jobs in second phase
.
____
Is a cyber attack on world economies underway?

AI Overview

Yes, a sustained, high-level cyber campaign is actively targeting world economies
through ransomware, data theft, and attacks on critical infrastructure like banking,
energy, and healthcare. With cybercrime costs projected to hit trillion by 2027, these,
state-sponsored and criminal activities represent a critical, ongoing threat to global
financial stability. International Monetary Fund | IMF International Monetary Fund |
IMF +5

Key details regarding the current, underway cyber attacks:
...
Recent examples, include, attacks, on, airlines, and, manufacturing, companies, that,
caused, significant, operational, disruptions,.



AI Overview

Companies using C++ are not necessarily bad investments; while development
costs are higher due to specialized skill requirements, C++ is often chosen for
superior performance, speed, and efficiency in critical, high-margin industries like gaming,
finance, and high-performance computing. Although development is slower compared to l
anguages like Python or Java, the resulting lower long-term operational costs and high
efficiency can provide a strong return on investment (ROI). Reddit Reddit +3

Key Considerations for C++ Investments:
....
Conclusion:

C++ companies are suitable for investors looking for firms that prioritize
high-performance and scalability over rapid, cheap development, particularly in specialized t
echnical sectors.


___

a=4.125,
b=2.5.
a*b=

b-a=
____
Microsoft in Talks to Lease Large Texas
Data Center Site After Oracle Walked Away
.
____
is Linux Copy/Paste is a same as Microsoft
drag/drop without the theatrics?

AI Overview

Linux copy/paste is functionally similar to Microsoft drag-and-drop for moving data,
but they operate differently. Linux often uses a direct, often keyboard-driven,
intermediary clipboard, while Windows drag-and-drop is a mouse-based, direct
manipulation method. Linux users can experience issues with drag/drop, whereas
it is generally more consistent on Windows. gigi.nullneuron.net gigi.nullneuron.net +3

Key differences between the two include:
...
Alternative Tools: Clipboard Managers can improve the workflow in
Linux. gigi.nullneuron.net,
____
Amazon holds engineering meeting
following AI-related outages
.

Tenstorrent TT-QuietBox 2 Launched: A RISC-V Powered
AI Workstation With 128 GB GDDR6 Memory,
Liquid-Cooling & $9999 Starting Price
.

Meta’s Moltbook gamble looks a
lot like bubble behavior
.


____
Charted: Where the World’s Oil Comes From by Region.
Try 1.


Thursday March 12 07:00
____

a=4.25,
b=2.5.

a*b=



b-a=


4.25x4 in binary 0001 0001 since tge binary point was moved to thr right.




2.5 x 2 binary 0000 0101 since the binqary point was moved one place to the right.

Multiplication in binary with multiplier 2.5 and multiplicand 4.25,

0001 0101 is added to partial procuct 0000 0000

0001 0001

Thebnshift left 1 place.

0010 0010

Next most significant bit in 2.5 is a 0 so no add of multiplicand to partial project.
shift left once again.

0100 0100
Least significant bit of 2.5 is 1 so add the multiplicand to the partial project.

0100 0100
0100 0100
0001 0001
________

0101 0101

The binary point is at the far right so it must be shifted 3 positions to the leftto separate the
Mantissa from the integer.
01010.101 8+2 = 10 for the integer and .5+.125 = .625 for the manitessa
The

Integers + mantissa are conerted to integers, the multiplication performed as a multiplication of
two integers, thehn the product is converted back to an integer and mantissa.

Does this simplfy floating-point multiplication?

4.25 x 4 in inbary 0001 0001
The one's complement is 1110 1110. add 1 to get the two's complement 1110 1111.

The 2.5 in binary is 0000 0011 but the binary point is one place to the right of the far right.
so the binary point must be shifted one more place left to align with the binary point of the
negtive 4.25?

0000 0110
1110 1111 ________ 1011 0111
1110 1101










Since scaling is to east significant mantissa



____
Microsoft in Talks to Lease Large Texas
Data Center Site After Oracle Walked Away
.
____
is Linux Copy/Paste is a same as Microsoft
drag/drop without the theatrics?

AI Overview

Linux copy/paste is functionally similar to Microsoft drag-and-drop for moving data,
but they operate differently. Linux often uses a direct, often keyboard-driven,
intermediary clipboard, while Windows drag-and-drop is a mouse-based, direct
manipulation method. Linux users can experience issues with drag/drop, whereas
it is generally more consistent on Windows. gigi.nullneuron.net gigi.nullneuron.net +3

Key differences between the two include:
...
Alternative Tools: Clipboard Managers can improve the workflow in
Linux. gigi.nullneuron.net,
____
Amazon holds engineering meeting
following AI-related outages
.

Tenstorrent TT-QuietBox 2 Launched: A RISC-V Powered
AI Workstation With 128 GB GDDR6 Memory,
Liquid-Cooling & $9999 Starting Price
.

Meta’s Moltbook gamble looks a
lot like bubble behavior
.


 
____
Easy-to-use solar panels are coming,
but utilities are trying to delay them
.
Try 3
.""

Hacker trail



Poster. Hacker Bragawatt