F Software
Certification Issues.
https://prosefights2.org/
First
posted
Wednesday March 11 11::21
UpdatedF
Wednesday April 22 17:25
7/19/24 1/24/24.
_
fKaneohe Poseiden P8A FOIA.
Vinson F-35C FOIA.
1/10/24.
liaison1. communication or cooperation which facilitates1/8/24.
a close working relationship between people or organizations.FOIA.GOV.12/2/23.
Department of Defense Department of the Navy
202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
11/25/23.bamboozle11/11/23.
fool or cheat (someone).certification11/10/23.
the action or process of providing someone or something with an official document attesting to a status or level of achievement.retaliation
the action of harming someone because they have harmed oneself; revenge.
11/9/23.nemesis11/7/23.
the inescapable agent of someone's or something's downfall.conpersuade (someone) to do or believe something, typically by use of a deception.
10/31/23conned
persuade (someone) to do or believe something, typically by use of a deception.
7/5/23Reprimand: "a rebuke, especially an official one.3/22/23.
Phone numbers issues.1-855-658-2676.3/21/23.
1-888-127-6445478.
Recording 2, 3, 4, 5, 6, 7, 8, 9.Phone message from US government?.3/20/23
Two forms of id?Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil
Good evening, Mr. Payne,
Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:
1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.
2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/
As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term FOIAonline (the correct site should appear as the top hit, and it will contain foiaonline.gov as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.
Regards,
Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer
Christopher.a.julka.civ@us.navy.mil
(703) 697-0031
From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address
Hello Mr Julka,
Alternate email address.
Sunday February 26, 2023 19:07
Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.
Poster attended book signing at Page One i Albuquerque.
Sunday, January 07, 2001 5:52 PM
Dear Friend,
we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.
With thanks
On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/
Wednesday, January 17, 2001 7:10 PM
Dear Friend,
A stand for Ahmad but why this question?
Iran Danesjoo Information Committee project reports. [1, 2 , 3].Swiss Radio International link fixed with irp2014 switch from malwarebytes.Admiral fornmer Navy Seal.
Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Another request?
Unable to copy.
[1, 2, 3]
AI Overview
Yes, the CIA and NSA, in partnership with West German intelligence (BND), secretly owned Crypto AG
and rigged their encryption devices with backdoors. This operation, known as "Operation Thesaurus"
and later "Operation Rubicon", allowed US and German intelligence to easily break the codes of over
120 countries, including Iran. Wikipedia Wikipedia +2
Key Details of the Operation:
Notes
Wednesay April 22 17:25
____hese are results for is googlebecoming more dangerous to itself because of
arcane questions answered, excessive water and electricity consumption
and fuel sources requires provide electricity
AI Overview
AI development and the integration of Gemini into Search are creating environmental
and operational strains. This could pose long-term risks to the company's sustainability
goals and reputation. Factors contributing to this include:
Emissions and Energy Use: Google's greenhouse gas emissions have risen 65% since 2019.
The company is struggling to meet high electricity demand, causing it to fall behind on its
sustainability goals.
Water Consumption: Google's data centers used 5.6 billion gallons of water in 2021.
This number has continued to rise due to cooling needs for AI servers. This can put
a strain on local communities and watersheds.
Energy Intensity of AI Overviews: AI-powered "AI Overviews" require more power.
Estimates suggest they can use 10-15% of the total electricity consumed by Google.
Accuracy and Trust Issues: AI can result in incorrect information. This can negatively i
mpact user trust and company reputation.
Dependency on High-Energy Fuel Sources: AI adoption may delay or derail
environmental progress.
The resource-heavy nature of AI is causing significant sustainability issues that are
challenging the companys environmental goals.
____AI Overview
The product of the first 1000 prime numbersstarting with 2, 3, 5... and ending with 7919
is a massive 2,336-digit number. This value, known as the 1000th primorial ( ), is roughly .
Quora Quora +4
The exact value is:
11,356,769,871,639,834,366,628,078,343,660,801,213,021,002,603,808,017,113,484,083,
456,481,393,624,183,355,161,423,988,601,739,578,097,269,175,036,999,016,380,044,894,
643,879,365,114,584,536,377,648,421,251,919,478,851,653,433,974,523,196,310,641,
702,368,516,916,764,541,545,146,381,989,396,087,448,510.
Key Details
1000th Prime Number: The 1000th prime number is 7,919.
Size of the Product: The resulting product is far too large for standard calculators, featuring 2,336 digits.
Scientific Notation: It is approximately .
Units Digit: The product ends in 0.
Sudden data center load losses prompt NERC alert, recommendations.
AMD Finally Found Its Edge
_____Itanium: The Great X86 Replacement That Never Was.||
ESP32 Hosts A Public Website.
Can 15,120 be bactored by a low-cost low-Watt Nanocomputer
executing ~all instructions in one clock cyle?
Step 1: Convert to binary.
115 120 = 0b11100000110110000
Step 2:| Divice by 24.
TDivision leas
1110000011011 and 2*2*2*2*2 discovered as one of the part is the product.
Step 3: The low 11 may be a 3 and not a two's complement -1?
1110000011011 made readable 0001 1100 0001 1011 in hex 1C1B?
The hexadecimal number 1C1B is equivalent to 7195 in decimal.__
____Google unveils chips for AI training and inference
in latest shot at Nvidia.
Claude Desktop changes app access settings for
browsers you don't even have installed yet.
Meta breaks ground on over $1 billion data center
in Oklahoma's Tulsa.
Broadcom expands collaboration with Google Cloud.Microsoft releases emergency patches for critical ASP.NET flaw.____
New GoGra malware for Linux uses Microsoft Graph API for comms.Magnificent irony as Meta staff unhappy about
running surveillance software on work PC.____
__\\
____Five charts on how US clean electricity output keeps climbing.
Wind Energy Market Analysis Across Europe, APAC, and North America.
Try 1
Tuesay April 21 12:05
____Behind the Curtain: The kids aren't AI-right, Part 2.____
Binary 11 is:
1 An snsiged iteger;||
00
01
10 11 ro r=tthe base 4?
2 A sgined twos mplement number
11 one's complement is 00lAdd 1 01 to gets its
'true' value: minus 1?
11 minis 1|
Add 1 00.
Add another 1 01
Add another 1 10.
So the seuqnece is
11 Minus 1.
00 Plus 0
01 Plus 1
10 Minus 0 whis is 01 plus 1 10 s 'ttue' Minus 2?
So intwo's compment all binary ones 'true' minus 1
while a 1 frfollowed byall azeros the smallest negative number?___
1.5 - 2.25 = -75?\
.75 - 00,11 in binary
In two's complment 11,00 + 1 = 11.01. And 1101 x 2-2 floating point.
While 1.5 is
0011x 2-1?
But to do the subtraction the binary point must be aligned.
So0110 x 2-2.
2.25 = 10.;01 in binary.
Two's complement is 01,10 + 1 = 01,11
0111
0110
____
1101 But in rwo's complementl!
So the 'true' vaule is 0010 + 1 = 0011 ... 2x-2. Or -.75
___Chinas energy fortress was built to withstand just this type of oil shock.Try 1
Sunday April 19 09:35
___AI Overview
Yes, a large integer can be factored using an 8-bit computer, but it is not efficient or
practical for modern cryptographic-sized numbers (e.g., 2048-bit RSA keys).
An 8-bit nanocomputer or microcontroller can handle arbitrarily large numbers by
breaking them into smaller, 8-bit chunks (bytes) and performing multi-precision arithmetic,
similar to how one performs long division by hand. Electrical Engineering Stack Exchange
Electrical Engineering Stack Exchange
Here is the breakdown of why this is possible but impractical:
___Microsofts Fairwater AI Datacenter Goes Live Early,
Unleashing Hundreds of Thousands of NVIDIA Blackwell GPUs On The World.
__Oracle adds $100B in market cap on major announcement.
____Fusion start-up Helion stands by 2028 timeline despite rivals doub.
Try 1.
Sarurday April 18 07:20
____AI Overview
Yes, C is generally "fast" even when it does not have to be because its speed is a default consequence
of its design, not a feature that must be consciously activated. C compiles directly to native machine
code, meaning it maps closely to the hardware with minimal abstraction overhead.
Here is why C remains fast even without intensive optimization or performance requirements:
Low-Level Nature: C acts as a "high-level assembler," offering direct memory manipulation and hardw
are control.
Minimal Runtime: It has no built-in "magic" like automatic garbage collection or constructor calls,
which often introduce unpredictable delays in other languages.
Minimalist Abstractions: The abstractions in C (like structures) are designed to be thin and
transparent, translating efficiently into machine instructions.
Transparency: C's cost model is obvious. If a C program is slow, it is because it is doing a lot
of work, rather than hiding heavy operations behind simple syntax. Reddit Reddit +
When C is not necessarily "faster" While inherently fast, C is not always faster than
other languages if used incorrectly. 4
Bad Code: A superior programmer in a "slower" language can often outperform a poor
programmer using C.
High-Level Optimization: Certain high-level languages can optimize specialized tasks better
than C through techniques like JIT compilation or advanced compiler algorithms.
Development Speed: In many applications, C's execution speed advantage is irrelevant
because the program spends most of its time waiting on input/output rather than raw computation.
Note: The search results provided a mix of information regarding the programming language
"C" and the speed of light " " in physics, but the above points focus on the programming language.
____Meta layoffs: Tech giant to cut about 8,000 jobs in May, report says.
AI Overview
Yes, Meta, Google, Amazon, and Microsoft have largely transformed the primary
use of computers and the internet into a vast advertising ecosystem. Together with ByteDance
(TikTok), these companies are projected to account for over 60% of global digital ad
spending by 2026, consolidating power over online attention and information.
Dominance of Ad-Based Models: The core business model for several tech giants is rooted
in digital advertising. Meta (Facebook, Instagram, WhatsApp) and Alphabet (Google,
YouTube) rely on user data to sell highly targeted ad space, with over 90% of Meta's
revenue frequently coming from advertising.
The "Billboard" Effect: Search engines (Google), social media feeds (Meta), e-commerce sites
(Amazon), and operating systems (Microsoft) now prioritize ad placements alongside organic
content. As of early 2025, 42% of the world's population uses a Meta product daily, turning
these platforms into massive, personalized billboards.
Expansion Beyond the Screen: These companies are shifting toward "full-funnel" AI-powered
ads, where they can track a user from seeing an ad on a streaming service (like Amazon Prime
Video) to the final purchase on their platform.
Aggressive Growth: Amazon's advertising business has grown rapidly, making it a major player
alongside Google and Meta, targeting not just their own sites but expanding across the internet.
LinkedIn LinkedIn +4
While these platforms offer free or low-cost services, the exchange is user attention and behavioral
data, which are then monetized to serve targeted ads. Total Security Total Security +1___
Quantum Breakthrough: Unhackable Keys Sent Over 120 km Using Quantum Dots.
Try 1.
Fridnesday April 17 15:48
____AI Overview
Yes, many Instruction Set Architectures (ISAs) use a base address (often in a register)
plus an offset (immediate value or another register) to calculate the effective address (EA)
for memory operations. This commonly used method is known as displacement or
base-plus-index addressing, where . Reddit Reddit +2
Key details about this mechanism include:
Base+Offset/Displacement: Often used to access struct fields or stack variables,
where a register points to the base, and an immediate value acts as the offset
(e.g., lw $t0, 4($s0)).
Base+Index: Used for arrays, where two registers are added together ( ).
x86 Example: The x86 architecture uses a complex formula: .
Purpose: This method allows for efficient addressing of memory locations relative
to a pointer, simplifying array indexing and stack management.
____Oracles New AWS Partnership Just Put It Ahead of Azure and Google Cloud.____vidia AI chip rivals attract record funding as competition heats up.___
Microsoft Finally Ups FAT32 Size Limit.Orange Pi Zero 3W An Allwinner A733 SBC in Raspberry Pi Zero form factor.____New Microsoft Defender RedSun zero-day PoC grants SYSTEM privileges.
:(?
4/16/26
Try 2,
Thurednesday April 16 09::27
____what did ricghard feynman mean by u=0?
AI Overview
Richard Feynmans reference to " " (or more broadly, "everything equals zero") is a conceptual,
often tongue-in-cheek, summary of physical laws. He meant that all fundamental physical laws can
be rearranged, squared, and summed into a single equation, where the total expression ( ) equals
zero, essentially implying the universe is a complex set of constraints where only certain states are
allowed. Quora Quora +1
Key Aspects of the " " Concept:
A "Trick" of Formulation: Feynman regarded this not as a revolutionary simplification of physics,
but rather as a mathematical "trick" or a way to summarize complex laws (like
Unified Constraint: The formula represents a total, summed-up "unworldliness" or constraint where
all physical action balances out, as discussed in.
Context: This concept is often associated with discussions on his blackboard at the time of his death,
or in discussions about quantum mechanics and the mathematical structure of physical laws. Quora Quora +3
Note: Some online discussions (e.g.,) suggest a similar-sounding, but different phrase "nobody understands
quantum mechanics" refers to the difficulty in reconciling quantum theory with common sense.
Will printf work on LLVM target platforms?
AI Overview
Yes, printf will work on LLVM target platforms, provided that a C standard library (libc) is available and
correctly linked for that specific target.
Since printf is not a built-in LLVM instruction but a function defined in libc, its functionality depends on
the environment rather than the LLVM compiler itself. Stack Overflow Stack Overflow +1
Key Considerations for Using printf in LLVM
...
For high-level development, Clang handles these details automatically when compiling C/C++ code
for any supported LLVM target. TypeFox TypeFox +1
___AI Overview____
Yes, how well Windows 11 works on a laptop depends heavily on the manufacturer,
specific model, and the internal hardware components (CPU, RAM, SSD), not just the
software itself. While minimum requirements (e.g., TPM 2.0, secure boot, specific Intel/AMD
processors) are strict, performance varies based on manufacturer-installed bloatware, driver
optimization, and build quality. Microsoft Microsoft +4
Key Factors Affecting Performance
Manufacturer Optimization: Laptops from major manufacturers (Dell, HP, Lenovo, ASUS)
usually perform well because they provide tailored driver updates to match Windows 11's
requirements.
Hardware Specifications: Performance hinges on having a supported CPU (generally Intel
8th Gen+ or AMD Ryzen 2000+), at least 4GB of RAM (8GB+ is recommended), and
an SSD, which are crucial for running the OS smoothly.
Bloatware and Customization: Some laptops come pre-installed with excessive software
that can slow down performance, whereas clean installs run faster.
"Copilot+ PCs" Requirement: Newer AI features require specific hardwarea neural
processing unit (NPU) capable of 40+ TOPSavailable only on specialized, newer laptop
models (e.g., Snapdragon X series, new Intel/AMD chips).
mportant Considerations:
Unsupported Hardware: While Windows 11 can sometimes be forced to run on older hardware,
performance may suffer, and these devices may not receive critical security updates.Microsoft
Microsoft +4
Driver Availability: Older laptops may lack the specialized drivers required for newer
hardware features to function properly.
You can use the PC Health Check application to verify if your specific model meets
the requirements.
AI Overview
Linus Torvalds has not recently announced a specific number of lines of code for the Linux kernel;
in fact, he recently made headlines for criticizing the use of lines of code as a productivity metric.
Instagram Instagram +2
Key details regarding current Linux code statistics and Torvalds' stance include:
....
Current Involvement: Torvalds has noted that he no longer writes much kernel code himself,
instead spending his time merging between 11,000 and 13,000 commits during busy merge windows.
Linux Begins Removing Support For Russia's Baikal CPUs.Behind the Curtain: The kids aren't AI-right.
Try 1.
Wednesday April 15 06::46
____AI Overview
The Snapdragon X2 Elite utilizes an Arm-based Instruction Set Architecture (ISA), specifically
featuring Qualcomm's custom 3rd Gen Oryon CPU cores. Designed for next-gen Windows on
Arm laptops, this 3nm chip (e.g., X2E-96-100) features 18 cores12 high-performance "Prime"
cores and 6 efficiency coresoperating up to 5.0 GHz. Chips and Cheese Chips and Cheese +2
Key Architectural Details:
...
The Snapdragon X2 Elite series is designed for superior efficiency and AI acceleration in AI PCs,
with laptops arriving in early 2026.
____Microsofts (MSFT) Data Center Push Continues with 3,200 Acre Wyoming Campus.___Qualcomm's Snapdragon X2 Elite leaves Intel & AMD in the dust, even at low power limits.
AI Overview
Based on early 2026 benchmarks, the Qualcomm Snapdragon X2 Elite (18-core) generally
outperforms current Intel Panther Lake and AMD Ryzen AI Max chips in single-core and
multi-core performance, especially in thin-and-light laptops. It demonstrates superior efficiency,
often providing higher performance at lower power limits compared to competing x86 chips.
Performance Highlights
...
Compatibility: While performance is top-tier, software compatibility remains a consideration
compared to the mature Intel/AMD x86 ecosystem. Reddit Reddit +4
Disclaimer: Performance results are based on early reports and benchmarks available as of April 2026.___ The U.S. Is Making Major Strides Toward Nuclear Fuel Independence.Try 1.
Tuesday April 14 07::24
____The Raspberry Pi's 15-year reign is quietly endinghere's why.____
NVIDIA Hiring More LLVM Engineers To Work On CUDA Tile.
OpenAI rips Anthropic, distances itself from Microsoft.
WARNING: Oracle's AI obsession could mean higher prices and worse suppor.
Alphabet gets 90-day catalyst watch at Citi as search and cloud may see Gemini boost.
We will not survive: Toyota, Honda and Ford CEOs issue
chilling warning about China and it could hit your portfolio.AI Overview
As of 2026, the most accurate Analog-to-Digital Converters (ADCs) for precision measurement
are 32-bit Delta-Sigma ( ) converters. These converters offer the highest resolution and lowest noise
for low-bandwidth, high-precision applications. For high-speed applications, 16-bit pipelined
converters remain standard, while 12-bit, multi-gigahertz converters handle high bandwidths.
Most Accurate ADCs as of 2026 Highest Resolution: 32-bit Delta-Sigma ( ) ADCs (e.g., from Texas
Instruments and Analog Devices) are the leaders in accuracy.
Architecture: Delta-Sigma is favored for high dynamic range and high-resolution data acquisition.
Performance: These converters can achieve 32-bit resolution in low-sampling rate applications
(e.g., precise scientific instrumentation).
Alternative High Precision: Successive Approximation (SAR) converters can reach
18-20 bits of resolution, often preferred for speed over maximum resolution. Dewesoft Dewesoft +4
Note: While 32-bit is the top resolution, many industrial and high-end audio devices currently
use 24-bit as a standard high-fidelity level. Dewesoft Dewesoft +3
____Is China the Worlds Best Prepared Nation for an Energy Crisis?.
Try 3/
Monday April 13 18::0
____Stanford report highlights growing disconnect
between AI insiders and everyone else.
____
____
The three realities of AI.how man c++ feature additions are included to gcc c?
AI Overview
GCC includes hundreds of individual feature additions across various C++ standards,
ranging from major core language changes to minor library improvements. Rather
than a single fixed count, these additions are categorized by the ISO C++ standard
version they implement. GCC, the GNU Compiler Collection GCC, the
GNU Compiler Collection +3
Core Language Features by Standard GCC maintains detailed implementation status
for each standard revision:
C++11: Complete as of GCC 4.8.1, including approximately 40+ major features like
lambdas, auto, and rvalue references.
C++14: Fully supported since GCC 5.1, adding around 12-15 core features such
as generic lambdas and variable templates.
C++17: Fully supported since GCC 7.1, introducing roughly 30 major additions,
C++20: Substantially complete as of GCC 11.0, though some complex areas like
Modules remain experimental.
C++23: Nearly complete in GCC 14+, adding major features like std::expected
and multidimensional subscript operators.
C++26: Experimental support is ongoing in GCC 15, with over a dozen features already
implemented, such as pack indexing and #embed.
GNU-Specific Extensions
...
How to Check Your Version's Features
,,,
Comprehensive Table: Refer to the Official GCC C++ Status Page or the cppreference
Compiler Support Table for a live-updated count of every individual proposal implemented
by version.
AI Overview
GCC C++ updates and development are primarily funded by major technology corporations
that rely on the compiler, including Red Hat, Google, Intel, SUSE, and ARM, which pay
developers to contribute full-time. While managed by the Free Software Foundation (FSF),
development is driven by these commercial interests.
Corporate Contributors: Companies like Red Hat and SUSE Labs are key contributors, providing
infrastructure, optimizations, and maintainers.
Purpose: Corporations fund GCC to ensure support for their hardware architectures, improve
performance for their platforms, and maintain compliance with C++ standards.
Community & FSF: While commercial firms do much of the work, the FSF provides stewardship,
and the project benefits from global community contributions.
The compiler is technically part of the GNU Project, but its ongoing maintenance is heavily
supported by the industry rather than solely through donations to the FSF.
Try 1.
Sunday April 12 10:44
____2.25 x 1.5 = 3.375 in decimal fixed point.
For decimalf;oating pint thinkers
3375. x 10-3.
____Big Short Michael Burry sends signal on Nvidia stock.____
China is gaining an edge in AI by offering significantly cheaper
computing (tokens), potentially pressuring U.S. firms on pricing,
demand, and energy consumption dynamics.One UI 8.5 rollout possibly delayed for these two reasons.
Try 1.
Saaturday April 11 12:38
___A software reckoning is coming.
Nearly half of US data centers planned for 2026 canceled or delayed.
AI Overview.
AWS Graviton is a family of 64-bit ARM-based processors (CPUs) designed specifically by
Amazon Web Services (AWS) to deliver the best price-performance for cloud workloads
running in Amazon Elastic Compute Cloud (Amazon EC2)
These custom chips are developed by Annapurna Labs (an AWS subsidiary) to provide a more
energy-efficient, cost-effective alternative to traditional x86 processors from Intel or AMD.
Wikipedia
Wikipedia +1
Here are the key details about AWS Graviton:
...
Migration and Support Many applications can move to Graviton with minimal effort, especially
those using open-source software (Linux, Python, Java, etc.). AWS offers tools like the "
Porting Advisor for Graviton" and the "Graviton Savings Dashboard" to help evaluate potential
savings and make the switch. Amazon Web Services Amazon Web Services +1
____How Should We Prepare for the Looming Quantum Encryption Apocalypse?.
USB, Abstra,
____Rust-y Firmware For Waveshare Smartwatch.____Samsung Confirms Upgrade OfferGalaxy Owners Must Now Decide.____Amazon CEO Says Chip Business Is On Fire, Graviton & Trainium____
Now Competing At Intel, AMD, And NVIDIA Scale.
Two customers ask to buy all of AWS' Graviton instance capacity in 2026.
PC Industry in Dire Straits, Asking You to Own Nothing and Be Happy,
Says Framework CEO.
Microsoft suspends dev accounts for high-profile open source projects.
The computer in the cloud has increasingly greater economic output
than the computer in the hand,
AI Overview
Yes, cloud computing can expose users to limitations or unauthorized access regarding
application and data usage by cloud service provider (CSP) employees. These risks
stem from insider threats, inadequate Identity and Access Management (IAM) controls,
and the need to trust providers with data oversight. Key risks include:
Insider Threats & Access Abuse: Cloud provider employees may have broader access
than necessary, leading to risks where they can abuse privileges to access client data
or applications.
Misconfiguration Risks: Inadequate access controls by the CSP can lead to accidental
data exposure, where sensitive application data is inadvertently shared or exposed by the vendor.
Lack of Transparency: Organizations often have limited visibility into how cloud employees
manage, maintain, or access their systems, creating reliance on the vendor's internal security policies.
Insecure APIs & Credentials: Improperly secured interfaces (APIs) can allow unauthorized
access to services.
To mitigate these risks, organizations should enforce strict identity and access management (IAM)
policies, monitor for unauthorized activity, and ensure robust security measures.
Fastly, along with Akamai and Cloudflare, tumbles after Anthropic launches Managed Agents,
Economists Starting to Admit They May Have Been Wrong About AI Never Replacing Human Jobs.
Oracle's Layoffs: The $4 Billion Return Threshold Investors Cannot Ignore,
The Oracle Stock Meltdown Is A Massive Overreaction.
In math math decimal .9999... = 1.00000.... because
n = .9999... and
10 x n = 9.9999.
So 10 x n - n = 9 x n - 9 since all the decimal point ar 0s.
In computer math in binary
n = .11111... and 10 x n = 1.11111.
BUT 10 x 1 - 1 IS NEVER = 1 becaause ciomputer arithmetic is of finite length!!
In Islam maath hexadeciaml
n = .FFFFF...
10 x n = F.FFFF...
and
10 x n - n = F x n = F.FFFFF ...
and h x F/F = 1?
AI Overview +6 Y
our observations accurately highlight the difference between theoretical mathematics
and practical computer arithmetic. Here is a breakdown of the concepts you raised:
1. Computer Math (Finite Precision) Binary: In theory, (recurring) equals 1.
Computer Reality: Because computers use finite length (e.g., 32-bit or 64-bit IEEE
754 floating point), is always truncated.
The Problem: Therefore, (shifting the binary point) minus does not equal because
the "last" bit or the infinite tail is missing. The calculation results in (a limited number
of ones), not
2. Hexadecimal Math (Base 16)
In hexadecimal, the digits are and . {ctrl c issue.]
: This represents the maximum value less than in hexadecimal, equivalent to in decimal.
: Multiplying by the base ( or ) shifts the hex point.
: is the highest single digit, equal to . is equivalent to . , which is .
3. Regarding " " If you are asking about in hexadecimal, yes, any non-zero number divided by itself is .
(which is ).
In summary, the difference you see is because theoretical math allows infinite precision,
whereas computers must truncate or round, making never quite reach .![]()
____Vineyard Wind sues GE Vernova to block itTry 2.
from abandoning work on wind farm.
China Commissions Wind Farm At Its Deepest Offshore Position.
Friday April 10 06:35
____Microsoft Stock (MSFT) Is Down 23% I____
s This a Rare Buying Opportunity or a Warning Sign?.
Amazon creates 'Project Houdini' to make data center delays disappear,what are the major improvements to A/D converters from 1985 to 2026?____
AI Overview
Major advancements in Analog-to-Digital Converters (ADCs) from 1985 to 2026 have focused on
exponential increases in speed and resolution, dramatic power reduction, and on-chip integration, d
riven by advancements in CMOS technology. Key improvements include high-speed, high-resolution
pipelined/SAR architectures, sigma-delta converters with noise shaping, digital self-calibration, and
multi-channel integration for systems-on-chip (SoC).
ey Architectural & Technological Improvements (1985-2026):
Massive Speed and Bandwidth Increases: By 2026, time-interleaved ADCs have enabled extremely
high-speed, multi-GS/s (gigasamples per second) conversion with relatively small footprints, such as
7-bit, 175 GS/s converters for communication systems.
Resolution and Dynamic Range: Early 1980s 16-bit converters have evolved into 24-bit to 32-bit
delta-sigma converters used for high-precision, low-speed measurements.
ADC Architecture Shifts
: SAR (Successive Approximation Register): Became the standard for moderate speed/high
resolution and low power, enabled by low-power CMOS.
Sigma-Delta ( ): Became the standard for high-precision audio and sensor applications due to noise
shaping, reducing the need for complex anti-aliasing filters. Pipelined: Evolved as the workhorse
for high-speed, medium-resolution applications like video and telecommunications.
Pipelined: Evolved as the workhorse for high-speed, medium-resolution applications like video and
telecommunications.
Digital Assistance/Self-Calibration: Advanced algorithms now correct for component mismatches,
nonlinearity, and offset errors in real-time, improving accuracy without requiring high-precision analog
components.
Integration and Multi-Channel Packages: The shift from individual monolithic chips to multi-channel
(quad/octal) converters and full SoC integration, where the ADC is integrated with digital processing
on the same die.
Power Efficiency: Modern ADCs operate at fractions of the power required in 1985, often with
1.8V supplies or lower, utilizing 0.18 m and smaller processes.
Key Milestone Comparisons:
1985-1995: Focus on 16-bit converters for digital audio (CD players) and early digital telephony.
2000s: Growth of pipelined ADCs for imaging and communications; rise of oversampling techniques.
2010s-2026: Widespread adoption of digital calibration, time-interleaving for 5G/6G, and
AI-driven adaptive calibration.
Is it important to digitize at the sensor and is shielding a good idea?
AI Overview
Digitizing at the sensor (placing an Analog-to-Digital Converter, or ADC, close to the sensing
element) is highly beneficial to minimize noise, signal attenuation, and electromagnetic interference
(EMI) before transmission. Shielding is also considered excellent practice to prevent external
interference from corrupting sensitive low-level signals. Celera Motion Celera Motion +5
Key Reasons for Digitizing at the Sensor
Signal Integrity: By converting to digital near the source, the signal is less susceptible to noise
degradation compared to transmitting delicate analog signals over long wires.
Reduced Noise Coupling: Digital signals are more robust than analog voltages, which often act
as antennas for EMI, such as radio waves, motors, and high-voltage lines.
Performance: It enables higher fidelity and reduces the need for complex, heavy shielding
on long cables.
Essential for Sensitivity: In high-sensitivity, high-speed, or IoT environments, shielding is a
crucial component to maintain reliable, accurate data transmission.
Reliability: It is considered crucial for any type of connection in industrial or high-EMI
environments. Celera Motion Celera Motion +7
Key Considerations
Proper Grounding: A shield is only effective if it is properly grounded.
Cost and Weight: Shielding can add weight and cost to a design.
Alternative Solutions: In some cases, proper signal routing or differential
signaling might reduce the absolute need for shielding, but it is generally regarded
as best practice.Big Tech Is Quietly Fueling a Natural Gas Boom.
____IMF chief's warning: No painless exit from war's energy shock.Try 2.
Thursday April 9 09::21
____Big Tech's hiring boom is over. 2 charts show where its workforce stands now.
Tech industry lays off nearly 80,000 employees in the first
quarter of 2026 almost 50% of affected positions cut due to AI.
___Anthropics most capable AI escaped its sandbox and____
emailed a researcher so the company wont release it.
Scoop: Meta removes ads for social media addiction litigation.Microsoft 365 Network-Level Disruption Affecting Exchange___
Online, Teams, and Core Suite Services.
Hackers exploiting Acrobat Reader zero-day flaw since December. Amazon revamps S3 cloud storage for the AI era, removing a key
barrier for apps and agents.which is worse: FORTRAN FORMAT or c printf?
AI Overview
Which formatting system is "worse" often depends on whether you prioritize simplicity
and safety (Fortran) or flexibility and compactness (C).
1. Fortran FORMAT Fortran's
FORMAT system is often considered "worse" for modern readability but "better" for
structured, high-volume scientific data. Fortran Discourse Fortran Discourse +2
Pros:
Power & Repetition: Features like (*(_)) (unlimited format repetition) and colon editing make it
significantly more powerful for printing large arrays or tables compared to C.
Reusability: A single FORMAT statement can be referenced by multiple WRITE statements,
ensuring consistent table layout across a program.
Abstraction: It hides hardware representation, allowing programmers to specify desired
precision rather than CPU-specific types.
Cons:
Arcane Syntax: Critics often describe it as "unwieldy" and difficult to remember.
Rigid Input: For reading data, every character must appear exactly as specified in the
FORMAT statement, making it less flexible than free-format alternatives.
Verbosity: Variable declarations and formatting strings can be incredibly verbose
compared to C
2. C printf
C's printf is often considered "worse" due to critical safety and security risks.
Pros:
Compactness: It is generally easier to read for simple output and less verbose than
Fortran for small numbers of values. Ubiquity: As a core part of the C standard
library, it is available on virtually every platform.
ons:
Safety Risks: printf is notoriously unsafe; it has no way of verifying that the number
or types of arguments passed match the format specifiers, which frequently leads
to "nonsense" output or program crashes.
Security Vulnerabilities: Improper use of format strings (e.g., using user input as the
format string) is a classic source of buffer overruns and other security vulnerabilities.
No Native Array Support: Unlike Fortran, C requires manual iteration or custom functions
to print arrays. Fortran Discourse Fortran Discourse +7
Summary Comparison.
Try 1.
Wednesday April 8 07::38
____Micron, Credo, Lumentum: 3 AI Strong Buys.
what is the difference between fix and floatiing point arithmwetic?
AI Overview
Difference Between Fixed Point and Floating Point - Pediaa.Com Fixed point vs floating point
arithmetic in FPGA - imperix Fixed point vs Floating point Fixed Point Representation -
GeeksforGeeks Fixed point vs floating point arithmetic in FPGA - imperix View all Fixed-point
arithmetic uses a pre-defined, set number of digits for fractional parts, acting like integers to
provide fast, precise calculations over a limited range. Floating-point arithmetic uses scientific
notation (mantissa and exponent) to "float" the decimal point, allowing a vast range of values
but with lower precision and higher computational cost. Stack Overflow Stack Overflow +4
Key Differences:
Range and Precision: Fixed-point is ideal for fixed precision (e.g., currency) but limited in range.
Floating-point excels at representing very large or very small numbers but with lower precision.
Speed and Efficiency: Fixed-point is generally faster and consumes less energy, making it
ideal for embedded systems and DSPs.
Complexity: Fixed-point requires careful scaling to avoid overflow, while floating-point
handles scaling automatically.
Hardware: Fixed-point uses simple integer hardware; floating-point requires complex
dedicated units (FPU).
When to Use Which:
Fixed-Point: Accounting/finance, embedded microcontrollers, Digital Signal Processing
(DSP) where speed and determinism are crucial.
Floating-Point: Scientific computing, 3D graphics, and applications requiring a massive
range of values, such as scientific simulations.
TinyGo Boldly Goes Where No Go Ever Did Go Before.
128/256 bit fixed and floating point,
1.5 is 1,1 in binary.
11 x 2-1.
2.25 is 10.01 in binary.
1
11. x 2-1 .
1001. x 2-2.
Do computer math peop;e think in binary but write in hexadecimal? :)
9. x 2-2. x 3. x 2-1 = 1B. x x 2-3?.
1.5 x 2.25 = 3.375.
1B. hex = 00011011. binary,
The binary point must be shifted 3 bits to the left which is 11.011, :)
In 128 bit fix and floating point arithmeticboth
are mapped into integers. :)++?.
The demise of software engineering jobs has been greatly exaggerated. ____Waymo's Stopped Testing Robotaxis In New York City, So What Now?.____
Video captures Waymo Robotaxi entering Whataburger drive-thru the wrong way. Downtown Aust in photographed from Waymo crossinr on Lamar street.Anthropic says its most powerful AI cyber model is too dangerous
to release publicly so it built Project Glasswing.
____The Biggest Oil Disruption in History Is Accelerating the Energy Transition.Try 3.r
Tuesday April 7 08::53
____Why my next microcontroller will be an ESP32, not a Raspberry Pi Pico.____
$2 WeAct CH32V006F8U6 Mini Core board features CH32V006
RISC-V MCU, supports 3.3V or 5V I/O voltage.\Anyone can code with AI. But it might come with a hidden cost.____
r does coding with ai involve use of LLVM/Clsng?
AI Overview
Yes, coding with AI can involve the use of LLVM/Clang, particularly for complex
C/C++ projects where AI tools (like LLM-based assistants) need precise semantic
context that tools like clangd provide. While AI generates code, LLVM/Clang acts
as the underlying infrastructure to compile, optimize, and validate that code, though
LLVM strictly requires a "human in the loop" to review AI-generated contributions.
How AI Coding Interacts with LLVM/Clang:
The LLVM project has a strict policy regarding AI-assisted code: the human is
responsible for the quality and must be able to understand the code, not just
use the AI to generate it. ____ 1.5 is 1,1 in binary.
2.25 is 10.01 in binary.
in128/256 bit fixed and floating point
11 x 2-1 .
1001 x 2-2.The Next Battleground for Robotaxis.____Microsoft Stock Is Down 30% From Its Peak.
History Says This Is What Happens Next.
Windows Wrap: One team is fixing Windows 11 while others break it.
____Victims say deceptive solar sales left them with crushing debt and broken promises,Try 5.
Monday April 6 15::49
____Waymo self-driving car rescued from flooded crossing,___
New Password Stealer Bypasses 2FAChrome,
Edge And Firefox Targeted.
Austin trip issues.
The Next Battleground for Robotaxis.Pocket-Sized E-Ink Gets A Firmware Upgrade.____Meta salaries revealed: How much the social media giant____
pays engineers, AI researchers, and more.
36 Malicious npm Packages Exploited Redis,
PostgreSQL to Deploy Persistent Implants.
Analysis-Investors press Amazon, Microsoft and
Google on water, power use in US data centers.
Retail Silent killers: How AI start-ups are trying to
solve one of the retail industrys biggest problems.if a-b is a+(-b), then is subtract with borrow an unnecessary instruction
AI Overview
No, subtract with borrow (often implemented as SBB or SBC) is not an unnecessary
instruction. While it is true that in two's complement arithmetic, is equivalent to
(where is found by inverting bits and adding 1), the "subtract with borrow"
instruction is crucial for multi-precision arithmetic (subtracting numbers
larger than the register size, e.g., 64-bit subtraction on a 32-bit CPU).
Stack Overflow Stack Overflow +4
Here is why SBB is necessary:
Multi-Word Subtraction: When subtracting 64-bit numbers on a 32-bit machine, t
he processor must subtract the lower 32 bits first, and then the upper 32 bits. If
the lower subtraction results in a borrow (i.e., the lower bits of the subtrahend
are larger than the minuend), that borrow must be subtracted from the
upper 32-bit calculation.
Borrow/Carry Flag Linkage: The "subtract with borrow" instruction uses the Carry
Flag (CF) from the previous SUB operation to determine if 1 should be
subtracted from the next higher chunk of the calculation.
Borrow/Carry Flag Linkage: The "subtract with borrow" instruction uses the Carry
Flag (CF) from the previous SUB operation to determine if 1 should be
subtracted from the next higher chunk of the calculation.
Without a specialized "subtract with borrow" instruction, performing multi-word
subtraction would require significantly more code to manually check the carry flag
and adjust the result, decreasing performance.Refresh. :)||
AI Overview
No, Subtract with Borrow (SBC) is not an unnecessary instruction in computer
architecture, even though theoretically .
While it is true that modern computers perform subtraction by adding the negated
value of the subtrahend ( ), the "subtract with borrow" instruction is crucial for
multi-precision arithmetic. Stack Overflow Stack Overflow +1
Here is why it remains necessary:
1. Handling Large Number Subtraction (Multi-precision) Computers have fixed
register sizes (e.g., 8-bit, 32-bit, 64-bit). To subtract a 128-bit number on a
64-bit machine, the operation must be broken into parts:
If the architecture only provided a simple SUB instruction, the programmer
would need extra instructions to check the flag and adjust the higher-order
calculation, making code less efficient and slower.Step 2: Subtract the upper
64 bits. This subtraction must account for the
borrow from Step 1.
...
Therefore, SBC is a specialized, necessary instruction for handling complex
arithmetic efficiently. This 28TB Seagate IronWolf Pro CMR NAS 7200 RPM HDD
deal is even better than the 20TB one.____ The massive economic impact of the global energy crisis,
Try 1.
Under malware attackS! Microsoft appears to be attacker.
Sunday April 5 07:29
____Mapped: Americas Data Center Construction Boom.______can a cPanel FTP password be viewed
AI Overview
No, a cPanel FTP password cannot be viewed directly once it has been set, as it is
encrypted for security. However, you can easily change or reset an existing
FTP password within the "FTP Accounts" section of cPanel. For the primary
account, you may need to use your hosting provider's client portal to update
credentials. Reclaim Hosting Reclaim Hosting +5
Here is how to manage FTP passwords in cPanel:
View Username/Server: You can see the FTP username and server address
by clicking "Configure FTP Client" next to the account in the "FTP Accounts"
menu. Chang
hange Password: To set a new password, go to Files > FTP Accounts, find
the account, and click "Change Password".
Primary Account: The main FTP account usually shares the same
password as the cPanel login itself.
Host Provider Portal: If you cannot access cPanel, most hosts (e.g.,
GoDaddy, Reclaim Hosting) allow you to change the FTP/cPanel password
from your billing/client dashboard. Reclaim Hosting Reclaim Hosting +4
This video shows how to find your FTP username and server in cPanel:
Note: For security reasons, do not use weak passwords. Always use the
password generator to create a strong password for your FTP account.
Try 1,
Saturday April 4 08:22
____Ex-Microsoft engineer believes Azure problems stem from talent exodus.
Are there some Cloud apps which run under Windows 11 but not run under Windows 10?
AI Overview
Yes, some specialized cloud-enabled apps and features are exclusive to Windows 11,
focusing on AI integration, native Android support, and tighter cloud management. Key examples
include Copilot in Windows, Windows 365 Cloud Apps (streaming apps directly), and enhanced
AI-powered tools within the updated Photos and Snipping Tool. YouTube YouTube +4
Copilot in Windows: Deeply integrated AI functionality, allowing for cloud-based AI
assistance directly from the desktop, which is not available in Windows 10.
Windows 365 Cloud Apps: Stream individual apps from the cloud rather than a full desktop,
designed for efficiency, currently in preview for Windows 11.
Native Apps & Tools: Updated versions of Notepad, Photos, MS-Paint, and
Snipping Tool, which offer better integration with cloud-native workflows and Microsoft 365.
WSA (Windows Subsystem for Android): While being deprecated, it demonstrated the push
for Android app compatibility natively on Windows 11 rather than Windows 10.
Improved Cloud Management: Enhanced integration with Intune and Azure Active Directory
(now Entra ID) for managing cloud apps. YouTube YouTube +4
While the majority of standard cloud apps (like OneDrive, Google Drive, or Slack)
work on both, Windows 11 offers tighter integration for cloud-native workflows.
Microsoft Community Hub Microsoft Community Hub +2
____Modder uses Claude AI to rewrite BIOS so they can boot unsupported 1
2 P-core Bartlett Lake CPU in Windows on a Z790 motherboard.
does Claude use LLVM/Clang
AI Overview
Based on recent reports regarding the "Claude C Compiler" (CCC) project,
Claude built a functional C compiler from scratch in Rust, but it is designed
to be "LLVM-like" rather than using LLVM/Clang as its underlying engin
e.
LLVM-like" Design: The compiler created by Claude uses an Intermediate
Representation (IR) similar to LLVM, with components like
GetElementPtr and basic block terminators that would look familiar
to LLVM developers.
Trained on Clang/LLVM Data: Claude was able to generate this compiler
because it ingested vast amounts of open-source compiler code during its
training, including GCC and LLVM/Clang. Independent, But Validated by
GCC: While not using LLVM/Clang for its operation, the Claude-generated
compiler relied heavily on GCC during development for testing and validation.
Current Limitations: The compiler generated by Claude currently produces l
ess efficient code than standard compilers and cannot yet serve as a full,
drop-in replacement for LLVM/Clang or GCC.
In summary, Claude did not simply wrap Clang; it generated its own
Rust-based compiler based on the knowledge it acquired from studying
LLVM/Clang source code. LinkedIn LinkedIn +1
____Micron Could Be The Next Intel.
____The global oil crisis is turning into an everything crisis.
Coal is back in fashion.
Try 1.
Friday April 3 07:39
Try 1.
Thursday April 2 07:18
____The first quantum computer to break encryption is now shockingly close.Try 3.
Tuesday March 31 08:40
____Thloomberg.com Thousands of Dumped Wind-TurbineTry 1.
Blades Prompt Crackdown in Texas.
Moday March 30 09:03
Try 5.
Sunday March 29 08:40
Try 1.
Saturday March 28 10:40
___Windows 11 updates are increasing in frequency due to a shift towards
"continuous innovation," delivering new features via monthly, non-
security previews in addition to mandatory "Patch Tuesday"
security updates. Users may experience more updates if they enable
"Get the latest updates as soon as they're available" or receive
frequent, small Defender security intelligence updates. Reddit Reddit
Try 2.
Thursday March 26 16:05
____Google Issues New Warning About the
Quantum Computing Security Apocalypse.
Try d?
Sturday March 21 07:45
____Trump officials announce 10-gigawatt data center,____
gas plants for former Ohio uranium site.
Microsoft Stock Makes No Sense, Play The
Spending Versus Revenue Gap.
____Quantum Computers Will Tap Out Before
Breaking Encryption, Theory Claims.'
Try 4.
Thursday March 19 06:30
____what is long division
AI Overview
Long Division Method - GeeksforGeeksLong division is a step-by-step,
digit-by-digit method for dividing multi-digit numbers, typically starting from
the left. It involves a repeating four-step processDivide, Multiply, Subtract,
and Bring Down (DMSB)to manage large calculations by breaking them
into smaller, manageable parts. It is used to find both the quotient and the remainder.
YouTube YouTube +3 This video explains the step-by-step process of long
division using the DMSB method:
Key Aspects of Long Division...
Long division is generally introduced in 4th to 6th grade as a fundamental
arithmetic skill._
How did programming jobs and opportunities evolve from the 1970s to now for those who started in the early days of computing? Profile photo for William Payne William Payne Former MTS, Retired at Sandia National Laboratories (19801992)1h AI Overview Programming jobs have evolved from a highly specialized, hardware-focused craft in the 1970soften involving manual machine instructions or low-level languages like Assembly and COBOLto a diverse, abstract, and high-level discipline that now incorporates artificial intelligence . For those who started in the early days, this evolution meant moving from being "tech wizards" operating behind the scenes on mainframes to becoming "software engineers" in the 2000s, and eventually collaborating with AI tools in the 2020s.Medium +3 Evolution of Programming Roles (1970sPresent) The 1970s - The "Machine" Era: Programmers in this era were focused on system efficiency, interacting closely with hardware (mainframes). Jobs involved writing in FORTRAN, COBOL, or the newly developed C language to manage memory directly. The 1980s-1990s - The "Personal Computing & Web" Era: The rise of personal computers shifted focus toward user experience (GUI) and applications. The internet boom introduced web development (HTML, JS, PHP), shifting roles from "programmers" to "web developers" and "software engineers". The 2000s-2010s - The "Cloud & Agile" Era: Software development shifted from a "waterfall" approach (linear phases) to Agile, demanding faster iteration. The rise of cloud computing and DevOps meant developers no longer just wrote code, but also handled its deployment, infrastructure, and scalability. 2020s - The "AI-Assisted & Multi-disciplinary" Era: Modern developers act as "product builders," using high-level scripting languages (Python) and AI-assisted tools ("vibe coding"). Roles have diversified into AI/ML engineering, full-stack, and data science.Medium +8 Major Shifts in Job Opportunities and Work Life From Specialist to Generalist: Early programmers often had narrow specializations (e.g., maintaining a specific mainframe system). The modern agile paradigm favors "full-stack" developers who can manage multiple aspects of a project, reducing handover overhead. Abstraction of Hardware: Professionals no longer need to know Assembly language. Modern tools, compilers, and cloud infrastructure have abstracted the hardware, making it easier to begin programming, but increasing the overall complexity of software stacks. Demographic Shift: Ironically, while programming was in its early days, women played a massive role, but the 1970s saw a rise in the "masculine" stereotype as the field gained prestige and economic value, significantly changing its demographics. The "Software Crisis" to "Feature Bloat": While early programming was dominated by the "software crisis" (difficulty in writing large software), modern challenges are more about managing complexity, feature bloat, and navigating vast ecosystems.Hack Reactor +5 Career Longevity and Adaptation Professionals who started in the 1970s had to adapt from procedural programming (like COBOL/C) to Object-Oriented Programming (C++/Java) in the 90s, and then to scripting and dynamic web languages in the 2000s. Despite these shifts, many developers from that era found that while tools changed, the fundamental need for structured, logical problem-solving remained consistent.Quora +4 Current Landscape (2025-2026) The job market in 2025 has seen significant shifts, with U.S. programming jobs for "computer programmers" falling to their lowest levels since 1980 due to AI advancements and high-level automation, leading to a new spectrum ranging from "vibe coding" to specialized AI engineering.
***
Public key cryptography is based on the principle that one known prime is multiplied by by a sccret prime. The product is
published But, in decimal, is hard to factor
by stupid people, of course. Smart use long division in binary to divide the product [dividend] by the public prime.
Whhen division complete, the secret is the quotient and the remainder si 0!
computer math and Islam math willing, of course
AI Overview
No, this statement is entirely false. While public key cryptography (specifically RSA) is indeed based on
multiplying two large secret prime numbers to create a public product, the method described to break it is
incorrect. Dividing the product by a public prime will not work because the "public prime" mentioned is not
the prime factor.
Here is a breakdown of why this claim is incorrect:
Factoring is Hard: In RSA, the public key is the product (where and are two large prime numbers). The
security relies entirely on the fact that for computers, finding and when only is known is computationally
infeasible (i.e., extremely hard), not just for "stupid people," but even for supercomputers.
Division Doesn't Help: If you have the public product , you do not know or . You cannot
simply "divide the product by the public prime" because you do not have the prime factor to divide by.
Trial Division is Infeasible: The "smart" method describedusing division to test factorsis known
as trial division. To break a modern 2048-bit RSA key, you would have to test more prime
numbers than there are atoms in the universe, which would take billions of years, not a quick division operation.
How it is Actually Broken: Only with a Quantum Computer running Shor's algorithm could a large RSA
product be factored efficiently in a reasonable amount of time. Classical computers are currently unable
to do this efficiently.
The description provided represents a fundamental misunderstanding of the "trapdoor" function that makes
public-key cryptography secure.
AI Overview
This claim is mostly false and represents a misunderstanding of how public-key cryptography (specifically RSA)
works. While it correctly identifies that public-key cryptography involves multiplying secret primes to create a
public product, it incorrectly assumes that breaking this system is as simple as performing long division.
Here is a breakdown of why the statement is incorrect:
1. The Core Principle (Correct Part) True: Public-key cryptography (e.g., RSA) is based on picking two large
secret prime numbers ( and ) and multiplying them to produce a public product ( ). This product is published as
part of the public key. True: This is a "one-way function." It is extremely easy for a computer to multiply two 2048-bit
primes, but currently infeasible for even the most powerful supercomputers to factor that resulting 4096-bit number
back into its components, and
2. The Fallacy of Easy Division (Incorrect Part) False: The claim states that one can divide the public product ( )
by the public key ( ) to find the secret prime. This is false. The public key is not one of the prime factors ( or ).
The public key is typically a pair , where is the product ( ), but is a small exponent (often ) chosen to be coprime to .
3. Binary vs. Decimal (Irrelevant Part) False: The difficulty of factoring is not related to the number base (decimal
vs. binary). Computers perform all operations in binary, and they find factoring 4096-bit binary numbers equally
impossible. Brilliant
Summary
The claim suggests a simple division can break RSA. If that were true, all secure communication on the internet
(banking, HTTPS, PGP) would have been broken long ago. Currently, there is no efficient way for a classical
computer to factor these products, making them secure.
AMZN, GOOGL, META, and MSFT Are Too Big to Fail, Says Top Analyst.A.I. Agents: Theyre Fun. Theyre Useful.
But Dont Give Them the Credit Card.____ Oil Prices Hit $112 as Iran Expands Strikes on Gulf Energy Sites.Try 1.
Coal plant forced to stay open due to
emergency order isnt even running.
$200 Oil No Longer Crazy Idea as Middle East Supply Collapses.
Wednesday March 18 07
____Why Garry Tans Claude Code setup
has gotten so much love, and hate.
Try 1.
Tuesday March 17 08:51
____SparkFun OpenScale IoT An ESP32 board with
HX711 ADC for smart scales with WiFi and Bluetooth connectivity.
____
AMD: The Trojan Horse In The Server Room.
___Oracle Layoff Plan Raises Questions____
For AI And Cloud Growth Story.
Oracle, NYSE:ORCL, is reportedly preparing
layoffs of 20,000 to 30,000 employees, or up to
18% of its workforce.
Ask HN: What is it like being in a CS major program these days?.
LLMs can be exhausting (tomjohnell.com).Teslas Terafab chip fab ambitions ignore its
total lack of semiconductor experience.
\____The Grid Needs an Expansion. Who Will Foot the Bill?,Try 2.
Trump muses over taking Cuba as islands power grid collapses after weeks of US oil blockade.
Moday March 16 07:48
____what are certification differences between a 64-bit hardware____
multiply and an 8-bit software implementation?
AI Overview
The certification differences between a 64-bit hardware multiplier and an 8-bit software implementation
(e.g., in IEC 61508 or DO-178C/DO-254) center on hardware fault handling vs. software systematic
failure analysis. A 64-bit hardware multiply is usually certified as part of the processor (DO-254/IEC 61508-2)
focusing on random hardware failures, while an 8-bit software implementation requires rigorous software
validation (DO-178C/IEC 61508-3) to prove it cannot produce systematic errors, such as overflow or
timing issues. Reddit Reddit +2 Certification
Key Differences
64-bit Hardware Multiply
Focus: Random Hardware Failures (e.g., transistor failure). Standards:
...
Validation:
...
Complexity:
...
Assurance:
8-bit Software Implementation (Software Multiplier)
Standards:
...
Validation:
...
Complexity:...
Assurance:
Summary of Certification Impact.
In high-integrity applications (e.g., SIL 3/4 or DAL A), the 64-bit hardware
path is often preferred because it is easier to prove safe state transitions and
detect hardware faults, whereas an 8-bit software multiplication requires massive
documentation, verification of every branch, and proof that the intermediate
8-bit calculations never produce invalid results.Memory Suppliers Are Actually Worried the Demand Boom
Wont Last Too Long, and Are Already Rethinking Expansion Plans.
AI Overview
data centers, paired with constrained capacity is driving massive price hikes and an optimistic
outlook for Micron. HBM demand for 2026 is already sold out, with server unit growth and
limited supply for NAND/DRAM likely to keep pricing elevated through 2027. CNBC CNBC +4
Key factors fueling this demand include:
AI Infrastructure Boom:
...
Tight Supply Dynamics:
...
Broader Market Growth
...
Higher-Margin Products:
These factors are forcing customers to sign multiyear agreements,
providing Micron with strong revenue visibility.
Try 1
Sunday March 15, 16::36
___Practical Guide to Bare Metal C++.
____Dominion Energy Falls Into The Dispatchable Trap Over Data Center Power,
____fhow many pro,e numbers arethere between 0____
and2 to the 64 power minus 1?
AI Overview
There are exactly 425,656,284,035,217,743 prime numbers
between \(0\) and \(2^{64}-1\). Mathematics Stack Exchange
1. Identify the search range
...
2. Use the Prime Counting Function
...
3. Determine the exact value
...
4. Understand the distribution
Answer There are 425,656,284,035,217,743
prime numbers between \(0\) and \(2^{64}-1\).
3 x 5 x 7 = 105.
1101001 is 7 bits long?
4 is tthree bits lon
b0b1b2b3
16 x 4 = 64 which is less tnr 105 so b0=1.
8 x 4 = 32 + 64 96 which is less than 105 so b1-1.
4 x 4 = 16. 96+16-116 which is greater than 105 so b2=0
4x2 =8. 10 so b3 =1.
4x1-4 104+4=108 so b3=0
AND THE REMAINDER IS 1?
The deuvudend us 105.
The divisor is 9=3x3. 1001 binary with length 4 bits.
Spsecifying more bits than are need for the quotiient causes
no isssues ecuase the most significant unneed bit willl be 0s.
b0b1b2b3b4.
9x16=135 which is biggester than 105 so b0=0.?
9x8=72 which is less than 105 so b1=1.
9x4=36. 72+36=108 so bi2=0.
9x2=18. 18+72=88 so b3=1.
9x1=9 88+9=97. b4=1
The quotientis bimary is 1011 and 11 decimaal.
105-99=6 which is the remainder?
Can a 256 diviidend easily and quickly be divided by a
128 bit divisor on low-Watt low-cost Nanocomputer
executing ~every instruction in one clock cycle?Trumps Offshore Wind NightmareTry 5.
Has Become Reality
Saturay March 14, 07:01
____NewsGalaxy S26 Ultra display causing eye strain
and headache; Samsung is apparently investigating..
Try 1.
Friday March 13, 07:30
____Who Is Handala The Iran-Linked Ghost Group____
That Just Wiped 200K Stryker Devices.Who is really footing the AI energy bill? Inside____
the debate about data center electricity costs.
Data centers, utility costs, and projected upgrades.After 16,000 layoffs, Amazon may cut____
14,000 more jobs in second phase.Is a cyber attack on world economies underway?
AI Overview
Yes, a sustained, high-level cyber campaign is actively targeting world economies
through ransomware, data theft, and attacks on critical infrastructure like banking,
energy, and healthcare. With cybercrime costs projected to hit trillion by 2027, these,
state-sponsored and criminal activities represent a critical, ongoing threat to global
financial stability. International Monetary Fund | IMF International Monetary Fund |
IMF +5
Key details regarding the current, underway cyber attacks:
...
Recent examples, include, attacks, on, airlines, and, manufacturing, companies, that,
caused, significant, operational, disruptions,.
AI Overview
Companies using C++ are not necessarily bad investments; while development
costs are higher due to specialized skill requirements, C++ is often chosen for
superior performance, speed, and efficiency in critical, high-margin industries like gaming,
finance, and high-performance computing. Although development is slower compared to l
anguages like Python or Java, the resulting lower long-term operational costs and high
efficiency can provide a strong return on investment (ROI). Reddit Reddit +3
Key Considerations for C++ Investments:
....
Conclusion:
C++ companies are suitable for investors looking for firms that prioritize
high-performance and scalability over rapid, cheap development, particularly in specialized t
echnical sectors.
___
a=4.125,
b=2.5.
a*b=
b-a=
____Microsoft in Talks to Lease Large Texas____
Data Center Site After Oracle Walked Away.is Linux Copy/Paste is a same as Microsoft____
drag/drop without the theatrics?
AI Overview
Linux copy/paste is functionally similar to Microsoft drag-and-drop for moving data,
but they operate differently. Linux often uses a direct, often keyboard-driven,
intermediary clipboard, while Windows drag-and-drop is a mouse-based, direct
manipulation method. Linux users can experience issues with drag/drop, whereas
it is generally more consistent on Windows. gigi.nullneuron.net gigi.nullneuron.net +3
Key differences between the two include:
...
Alternative Tools: Clipboard Managers can improve the workflow in
Linux. gigi.nullneuron.net,Amazon holds engineering meeting
following AI-related outages.
Tenstorrent TT-QuietBox 2 Launched: A RISC-V Powered
AI Workstation With 128 GB GDDR6 Memory,
Liquid-Cooling & $9999 Starting Price.
Metas Moltbook gamble looks a
lot like bubble behavior.
____Charted: Where the Worlds Oil Comes From by Region.Try 1.
Friday March 13, 07:30
____Who Is Handala The Iran-Linked Ghost Group____
That Just Wiped 200K Stryker Devices.Who is really footing the AI energy bill? Inside____
the debate about data center electricity costs.
Data centers, utility costs, and projected upgrades.After 16,000 layoffs, Amazon may cut____
14,000 more jobs in second phase.Is a cyber attack on world economies underway?
AI Overview
Yes, a sustained, high-level cyber campaign is actively targeting world economies
through ransomware, data theft, and attacks on critical infrastructure like banking,
energy, and healthcare. With cybercrime costs projected to hit trillion by 2027, these,
state-sponsored and criminal activities represent a critical, ongoing threat to global
financial stability. International Monetary Fund | IMF International Monetary Fund |
IMF +5
Key details regarding the current, underway cyber attacks:
...
Recent examples, include, attacks, on, airlines, and, manufacturing, companies, that,
caused, significant, operational, disruptions,.
AI Overview
Companies using C++ are not necessarily bad investments; while development
costs are higher due to specialized skill requirements, C++ is often chosen for
superior performance, speed, and efficiency in critical, high-margin industries like gaming,
finance, and high-performance computing. Although development is slower compared to l
anguages like Python or Java, the resulting lower long-term operational costs and high
efficiency can provide a strong return on investment (ROI). Reddit Reddit +3
Key Considerations for C++ Investments:
....
Conclusion:
C++ companies are suitable for investors looking for firms that prioritize
high-performance and scalability over rapid, cheap development, particularly in specialized t
echnical sectors.
___
a=4.125,
b=2.5.
a*b=
b-a=
____Microsoft in Talks to Lease Large Texas____
Data Center Site After Oracle Walked Away.is Linux Copy/Paste is a same as Microsoft____
drag/drop without the theatrics?
AI Overview
Linux copy/paste is functionally similar to Microsoft drag-and-drop for moving data,
but they operate differently. Linux often uses a direct, often keyboard-driven,
intermediary clipboard, while Windows drag-and-drop is a mouse-based, direct
manipulation method. Linux users can experience issues with drag/drop, whereas
it is generally more consistent on Windows. gigi.nullneuron.net gigi.nullneuron.net +3
Key differences between the two include:
...
Alternative Tools: Clipboard Managers can improve the workflow in
Linux. gigi.nullneuron.net,Amazon holds engineering meeting
following AI-related outages.
Tenstorrent TT-QuietBox 2 Launched: A RISC-V Powered
AI Workstation With 128 GB GDDR6 Memory,
Liquid-Cooling & $9999 Starting Price.
Metas Moltbook gamble looks a
lot like bubble behavior.
____Charted: Where the Worlds Oil Comes From by Region.Try 1.
Thursday March 12 07:00
____
The
a=4.25,
b=2.5.
a*b=
b-a=
4.25x4 in binary 0001 0001 since tge binary point was moved to thr right.
2.5 x 2 binary 0000 0101 since the binqary point was moved one place to the right.
Multiplication in binary with multiplier 2.5 and multiplicand 4.25,
0001 0101 is added to partial procuct 0000 0000
0001 0001
Thebnshift left 1 place.
0010 0010
Next most significant bit in 2.5 is a 0 so no add of multiplicand to partial project.
shift left once again.
0100 0100
Least significant bit of 2.5 is 1 so add the multiplicand to the partial project.
0100 0100
0100 0100
0001 0001
________
0101 0101
The binary point is at the far right so it must be shifted 3 positions to the leftto separate the
Mantissa from the integer.
01010.101 8+2 = 10 for the integer and .5+.125 = .625 for the manitessa
Integers + mantissa are conerted to integers, the multiplication performed as a multiplication of
two integers, thehn the product is converted back to an integer and mantissa.
Does this simplfy floating-point multiplication?
4.25 x 4 in inbary 0001 0001
The one's complement is 1110 1110. add 1 to get the two's complement 1110 1111.
The 2.5 in binary is 0000 0011 but the binary point is one place to the right of the far right.
so the binary point must be shifted one more place left to align with the binary point of the
negtive 4.25?
0000 0110
1110 1111 ________ 1011 0111
1110 1101
Since scaling is to east significant mantissa
____Microsoft in Talks to Lease Large Texas____
Data Center Site After Oracle Walked Away.is Linux Copy/Paste is a same as Microsoft____
drag/drop without the theatrics?
AI Overview
Linux copy/paste is functionally similar to Microsoft drag-and-drop for moving data,
but they operate differently. Linux often uses a direct, often keyboard-driven,
intermediary clipboard, while Windows drag-and-drop is a mouse-based, direct
manipulation method. Linux users can experience issues with drag/drop, whereas
it is generally more consistent on Windows. gigi.nullneuron.net gigi.nullneuron.net +3
Key differences between the two include:
...
Alternative Tools: Clipboard Managers can improve the workflow in
Linux. gigi.nullneuron.net,Amazon holds engineering meeting
following AI-related outages.
Tenstorrent TT-QuietBox 2 Launched: A RISC-V Powered
AI Workstation With 128 GB GDDR6 Memory,
Liquid-Cooling & $9999 Starting Price.
Metas Moltbook gamble looks a
lot like bubble behavior.
____Easy-to-use solar panels are coming,Try 3
but utilities are trying to delay them..""
Hacker trail
Poster. Hacker Bragawatt