FAA/NTSB flight control software
cover-up remediation
FAA FOIA lsawsuit - District of
Columbia avoidable.
End Monday July 7, 2025 07:24 https://prosefights2.org/irp2024/windscammers23.htm.
24 too long. Split into 25/6.
Start Monday July 7, 2025 08:26:
https://prosefights2.org/irp2023/windscammers27.htm
7/27/24
Conduct unbecoming navy officer Admiral William H Payne Complaint.
7/19/24
EyeglassWorld reading glasses and and optometrist exam issues.
Unable to update above page. Updated page below.
https://prosefights2.org/irp2023/mvdnow4.htm
1/24/24.Kaneohe Poseiden P8A FOIA.
Vinson F-35C FOIA.
1/10/24.
liaison1. communication or cooperation which facilitates1/8/24.
a close working relationship between people or organizations.FOIA.GOV.12/2/23.
Department of Defense Department of the Navy
202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
policy.a course or principle of action adopted or proposed by a government, party, business, or individual.
11/25/23.bamboozle11/11/23.
fool or cheat (someone).certification11/10/23.
the action or process of providing someone or something with an official document attesting to a status or level of achievement.retaliation
the action of harming someone because they have harmed oneself; revenge.
11/9/23.nemesis11/7/23.
the inescapable agent of someone's or something's downfall.conpersuade (someone) to do or believe something, typically by use of a deception.
10/31/23conned
persuade (someone) to do or believe something, typically by use of a deception.
7/5/23Reprimand: "a rebuke, especially an official one.3/22/23.
Phone numbers issues.1-855-658-2676.3/21/23.
1-888-127-6445478.
Recording 2, 3, 4, 5, 6, 7, 8, 9.Phone message from US government?.3/20/23
Two forms of id?Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil
Good evening, Mr. Payne,
Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:
1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.
2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/
As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term FOIAonline (the correct site should appear as the top hit, and it will contain foiaonline.gov as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.
Regards,
Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer
Christopher.a.julka.civ@us.navy.mil
(703) 697-0031
From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address
Hello Mr Julka,
Alternate email address.
Sunday February 26, 2023 19:07
Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.
3/1/23F-18 Carrier break and landing!.12/25/22
,![]()
12/21/22.The statute of limitations for a FOIA claim is six years. However, a requester may refile their FOIA request to restart the statute of limitations.Feb 21, 201711/24/22.Airbus A220 autopilot warning. Full coverage.9/18/22
FAA wants pilots to be less dependent on computer autopilots.
4/3/22prosefights hacked. Again. :(
6000 lines of code vs 100 60 lines of code missing.
Hacking attempted recovery 4.6.22.
2/5/22.
__________________
5/01/22.
Linus Torvalds reveals the 'true' anniversary of Linux code.9/21/21.
US Navy software FOIA request.9/3/21.
Christopher Julka (703)-697-0031 DONFOIAPublicLiaison@navy.mil.8/24/21.
c/c++ wind turbine software use too?NTSB 8/20/21 phone message.
Tweet.
![]()
4/22/21.4/21/21.
No appeal possted yet. "(
Software tehnology? c/c++?Scary USS Gerald R. Ford - How Powerful is the CVN-78? US Navy's $13 Billion Aircraft Carrier.4/20/21.
Speed display disappear? Software issue?"(where's) my speed my speed"4/18/21.
4/17/21.
Transcript.Where is air speed?4/1921.4/16/21.
Rapid Descent and Crash into Water Atlas Air Inc. Flight 3591 Boeing 767-375BCF, N1217A.NTSB Ms Tamara Crawford phone conversation 4/16.4/1421.
We are Legion.
We do not forgive.
We do not forget.
Expect us.4/13/21. 'view' oly appeared starting today?
4/12/21.What computers? How many modules? Lines of code for each module?4/11/21
Tamara Crawford audio 4/9/21.
https://data.ntsb.gov/Docket?ProjectID=99013
4/19/21.4/10/21.
Poster attended book signing at Page One i Albuquerque.
Sunday, January 07, 2001 5:52 PM
Dear Friend,
we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.
With thanks
On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/
Wednesday, January 17, 2001 7:10 PM
Dear Friend,
A stand for Ahmad but why this question?
Iran Danesjoo Information Committee project reports. [1, 2 , 3].Swiss Radio International link fixed with irp2014 switch from malwarebytes.Admiral fornmer Navy Seal.
Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Another request?
Phone message attachment.
3/23/21.LIGHTWEIGHT OS FOR ANY PLATFORM.
3/20/21.
3/22/21 Attachments.
1
1
1
1
2/4/21.12/30/20.12/25/20.
R44jPT22f3d12/22/20. :( !!!
J210*9t765r^
12/22/20. :( !!12/21/20. :( !
J210*9t765r^
12/17/20. :(
12/16/20. Something wrong?12/15/10
12/14/20.
12/10/20.
12/8/20.
Tuesday December 8, 2020 14:43
http://www.prosefights.org/irp2020/windscammers13.htm#ntsbbryson
Hello Ms. Bryson,
This is an appeal of FOIA No. FOIA-2020-00406 denial.
Ms. Melba Moye wrote on September 14, 2020
appears inapplicable for denial because FOIA requested DATAFinal 3 minutes of Atlas Air #3591 Boeing 767:from
1 Names of all software modules executed.
2 Time of execution. Nanosecond accuracy, if possible.
3 Altitude of #3591 at time software module entered.NTSB chairman Sumwalt, Friday June 12, 2020 10:32.Ms. Moye's denial reason is unsupported.
Ms. Moye/Ms. Joy Gordon make legal attempt to deny my FOIAThese legal arguments should be addressed to a judge/jury in event I am unable to receive requested documents by
administrative means?
Since no legitimate reason for denial provided by Ms. Moye and Ms. Gordon exist, I ask that you grant appeal.
And have NTSB deliver requested documents.
Regards,
william harris payne.10/26/20 FAA FOIA lawsuit - District of Columbia..
12/9/20.
____https://dms.ntsb.gov/pubdms/.
https://www.ntsb.gov/_layouts/ntsb.aviation/index.aspx.
NTSB
AttN: Ms Sharon Bryson
Manager Director
490 L'Enfant Plaza SW
Washington, D.C. 20594
Chaff?
Boeing 787: A Financial Engineering Nightmare?.10/6/20.
____10/5/20.
Boeing 737 MAX: Turning A Crisis Into A Win.
Programming languages: Java founder James Gosling reveals more on Java and Android.
Liberal arts 'educated'?Linux 5 day course in focus because of 737 MAX and Raspberry Pi 4B.10/4/20
https://forums.linuxmint.com/viewtopic.php?t=294209
Programming languages: Java founder James Gosling reveals more on Java and Android.10/1/20.
Back again after deletion.
"Back in the early 1990s it was well understood that the number one source of security
vulnerabilities was just pointers, was just bugs, like 50% to 60% to 70% were bugs and the
vast majority of them were like buffer overflows.
Liam Tung.
why java michael barr.
At that stage, C an C++"absolutely owned the universe" and everything was being written in those languages.
The statistics in this article have been a part of software engineering for decades.
Back in 1990, they were a major pain point, and a major motivator behind many of the features
of Java.
James Gosling.
9/18/20.Unable to shrink email.9/14/20
:( ++
9/11/20
ntsb foia status message.8/11/20.
8 rings.____
Boeing 747s still get critical updates via floppy disks.
Which OSs support floppies?
This surprise Linux malware warning shows that hackers are changing their targets.
8/10/20.
FAA Dave Duff phone message 1 2. 8/01/20.8/7/20.
A declaratory judgment is a binding judgment from a court defining the
legal relationship between parties and their rights in a matter before the court.
Typically, a party will first send a cease and desist letter prior to seeking
declaratory judgment from a court.
Injunctive relief, also known as an injunction, is a remedy which
restrains a party from doing certain acts or requires a party to act in a certain way.
It is generally only available when there is no other remedy at law and
irreparable harm will result if the relief is not granted.
Where is Mark House?
206-231-2046 call audio.
7
* UNITED STATES DISTRICT COURT
Mounday July 7, 2025 07:18
End Monday July 7, 2025 07:24 https://prosefights2.org/irp2024/windscammers23.htm.
24 too long. Split into 25/6.
Start Monday July 7, 2025 08:26: https://prosefights2.org/irp2023/windscammers27.htm
____which esp32 run a bare metal os?____
Overview.
While the ESP32 is often associated with FreeRTOS (an RTOS)
within the ESP-IDF, it is indeed possible to run a bare metal
OS on the ESP32. Several resources, including a GitHub
project, provide bare metal SDKs for the ESP32 and
ESP32-C3, allowing for direct interaction with the
hardware without the abstraction of an RTOS.
Here's why and how:
ESP-IDF and FreeRTOS:
Bare Metal SDKs:
Example: Toggling an LED:
Challenges:
Bare metal development on the ESP32 can be more
complex, requiring a deeper understanding of the
hardware and its architecture.
whicharm m series run a bare metal os?
I Overview.
Bare-metal refers to running software directly on the hardware
without an operating system (OS). ARM Cortex-M processors,
which are typically used in microcontrollers, are often
programmed this way.
pecifically, many of the ARM Cortex-M series processors can be
programmed to run bare-metal applications. This is because, unlike
Cortex-A cores that have a memory management unit (MMU) for
virtual memory (essential for full-fledged operating systems like Linux),
Cortex-M cores are designed for resource-constrained
environments like microcontrollers and do not have an MMU.
Instead of a full OS, Cortex-M programs can run either bare-metal
or on a Real-Time Operating System (RTOS) which provides real-time
scheduling and other functionalities. Popular RTOS options for
Cortex-M processors include FreeRTOS, Zephyr, and Azure
RTOS ThreadX.
Essentially, if you're working with an ARM Cortex-M series microcontroller,
you have the option of developing and running bare-metal code directly on
the hardware. The decision to go bare-metal or use an RTOS depends on
the complexity and requirements of your specific application.
which stm32 run a bare metal os?
AI Overview.
Any STM32 microcontroller can run in a "bare metal" environment, meaning
without an operating system. The term "bare metal" refers to programming
directly with the hardware without an abstraction layer like an RTOS or a
full-fledged OS. Examples of STM32 series well-suited for this include
the STM32F4, STM32F1, and STM32L4 series.
Explanation:
Bare Metal Programming:
No OS Requirement:
Examples of STM32 Families:
Tools:
Bare metal development on STM32 typically involves using a toolchain
like GCC, along with a hardware abstraction layer like libopencm3 or
ST's HAL libraries, and an IDE like STM32CubeIDE or Keil MDK.
Why Bare Metal?
Bare metal programming can offer advantages in terms of performance
and resource usage, especially when dealing with time-critical tasks or
when the application is simple enough to not require the overhead of
an RTOS, says a user on Reddit.
160-core RISC V Board Is The M.2 CoProcessor You Didnt
Know You Needed.A non-anthropomorphized view of LLMs
(addxorrol.blogspot.com).
Tech companies are paying up to $200,000 in
premiums for AI experience, report finds.
Atlassian migrated 4 million Postgres databases to shrink AWS bill.
are some standards committess designed to sabotage projects to
make them unusable?.
AI Overview.
While standards committees are generally intended to facilitate and
improve processes, not to sabotage them, there's a distinction to
be made between their design and how individuals within them might operate.
Standards committees are typically established to:
Define common guidelines, specifications, or methodologies.
Promote interoperability and efficiency.
However, the concept of intentional disruption or sabotage within
organizations, including committees, does exist:
Delay and obstruction:
Misuse of procedures:
Creating additional layers of review and approval:
It's important to note:
These actions are typically carried out by individuals, not inherent to
the design or purpose of a standards committee itself.
The effects can be similar to actual sabotage, even if the intention is
not malicious.
Such tactics can make systems or processes
functionally unusable.
In essence, while the official purpose of standards committees is
not to sabotage, they can be utilized as a tool for individuals to
engage in activities that disrupt and hinder project progress,
potentially leading to unusable outcomes. This could be done
with the intention of sabotaging a project or simply due to
inefficiency and bureaucracy within the committee itself.
FIG Forth standards committe changes:
1 skip/scan.
2 eliminate <BUILDS/DOES..
3 Eliminate state-smart words.
Another big career, jobs website files Chapter 11 bankruptcy.
Windows 11 25H2 native option could allow you
to remove default Microsoft apps.
Silicon Valley's winner-take-all era.
Nine-figure signing bonus for a few, layoffs for thousands.
Welcome to Big Tech's big divide
Linux 6.16 Performance Regression Tracked Down In New Futex Code.
____6?kW helical twist destroys small wind power Try 2.
Its better than covering the roof with solar panel.
Defunct oil wells are a national problem. Finding them is the first step.
Sunday July 56 2025 17:37
____gimli glider 676 ram deployment.
India Crash EXCLUSIVE: Global Probe Blames RAT System Failure.
____The Seattle Times Behind Microsofts layoffs: A new attitude shaped by AI.
She Wanted to Save the World From A.I. Then the Killings Started.
5 reasons why an M.2 2230 SSD has replaced all my flash drives.
____C++ Encounters Of The Rusty Zig Kind.
Building Bare-Metal Systems with Zig.
AI Overview.
Yes, Kindle books can be read on a PC. You can download the Kindle for PC application
from Amazon.com. Alternatively, you can use the Kindle Cloud Reader, which allows
you to read Kindle books directly in your web browser, according to Amazon.
AI Overview.
Yes, both Zig and Rust can be used for bare-metal development,
which means running code directly on hardware
without an operating system.
Rust and bare-metal:
Rust can create freestanding binaries that don't link the standard
library and thus don't rely on an operating system.
Rust can create freestanding binaries that don't link the standard
library and thus don't rely on an operating system.
Zig and bare-metal:
Zig is designed for low-level, efficiency-centered development and
is well-suited for embedded software due to its compile-time
execution and lack of standard library dependence.
In essence, both languages allow for low-level control and
can run without an operating system, making them suitable
for bare-metal development, especially in areas like embedded
systems and OS development.
AI Overview.
Both Zig and Rust are designed to be cross-platform, allowing
them to run on a wide variety of hardware platforms and
operating systems.
Here's a summary of their platform support:
In essence, both languages are highly portable and capable of
running on a diverse range of hardware, from embedded systems
to high-performance servers.
AI Overview.
The Zig compiler is primarily written in Zig, making it a self-hosting
compiler.
It achieves this through a bootstrapping process:
AI Overview.
The Rust compiler, rustc, was initially written in OCaml. However, the
Rust compiler is now self-hosted, meaning it is written in Rust itself.
This was achieved through a process called bootstrapping, where a
compiler written in another language (OCaml) is used to compile
the initial version of the Rust compiler, which is then used to compile
subsequent versions of itself.
Here's a more detailed explanation:
____The Coder Village at the Heart of Chinas A.I. Frenzy.
Behind Microsofts layoffs: A new attitude shaped by AI.
was linux "put together' from parts by linus torvalds?
AI Overview.
Yes, in a way, Linus Torvalds "put together" the initial version of the
Linux kernel, drawing inspiration and tools from existing projects,
rather than writing the entire operating system from scratch.
Here's a breakdown:
In summary: Linus Torvalds was the original developer of the Linux kernel,
drawing inspiration from existing systems and utilizing existing free
software tools, but not directly using code from other projects in the
initial kernel. The kernel was later combined with other software
(primarily from the GNU project) to create a complete operating system,
commonly referred to as Linux.____
____FBI warns travelers of 'Scattered Spider' group targeting airlines.
Ingram Micro says identified ransomware on certain of its internal systems.____
jitaace blackwell gb200 passmark.
AI Overview.
It's important to clarify that Jitaace is not a publicly known term related
to the Nvidia GB200 or its performance benchmarks. The information
regarding the Nvidia GB200 Blackwell GPU primarily focuses on its
performance in AI workloads and data center applications, not
typical desktop gaming benchmarks like PassMark.
Here's what s known about the GB200 Blackwell:
AI Overview.
Nvidia unveils next-gen Blackwell GPUs with 25X lower costs ... The Nvidia GB200 Blackwell superchip, which combines one Grace CPU and two Blackwell GPUs, is projected to consume 2700W of power. This configuration effectively doubles
the GPU computing power and memory compared to the GH200. The GB200's
high power consumption is a key factor driving the need for advanced liquid
cooling solutions in data centers.
GB200 Configuration:
The GB200 combines two B200 GPUs with a Grace CPU, resulting in a
total power consumption of 2700W.
AMD Srrix Halo ....
AI Overview.
AMD Ryzen Strix Halo APU is matching the RTX 4070 laptop GPU ... AMD Strix Halo APUs, part of the Ryzen AI Max series, have a configurable TDP (Thermal Design
Power) ranging from 45W to 120W. These APUs are designed for AI PCs and workstations, offering high performance with a focus on both CPU and
integrated GPU capabilities.
Key details about Strix Halo power consumption:____
Late-Career Job Losses Are Blurring What Retirement Looks Like in America.
Try 1.
1 Hackers?
2 AI LLM verbosilty?
Everything around LLMs is still magical and wishful thinking (dmitriid.com).
Saturday July 5, 2025 15:38
____how is x86 c++ vulnerable to 1 bugs 2 hacker attacks?____
AI Overview.
x86 architecture combined with C++ can be vulnerable to bugs
and hacker attacks due to C++'s direct memory management
and the potential for software vulnerabilities that interact with
the processor's architecture.
1. Bugs in C++ and their Exploitation:
2. Hacker Attacks Leveraging C++ and x86:
Key Takeaway:
C++'s powerful memory management capabilities, when used
without sufficient security considerations, can create vulnerabilities
that attackers can exploit. The x86 architecture, while robust, also
has features that can be exploited by attackers if the software
running on it is not properly secured.who pays gcc c++ compiler maintainers?____
AI Overview.
The development and maintenance of the GCC C++ compiler primarily relies
on a combination of volunteers and individuals who are paid by various
organizations to work on the project.
Here's a breakdown of how it works:
does the c++ community have a leader?
AI Overview.
While Bjarne Stroustrup is considered the creator of C++ and remains an influential
figure, the C++ community doesn't have a single, definitive leader in the traditional sense. Instead, it's more accurate to say it's guided and shaped by a collective of prominent
individuals and organizations involved in its standardization, development, and use.
Here's a breakdown of the key figures and organizations that contribute to
C++'s leadership:
The ISO C++ Standards Committee (WG21):
Are ISO C++ Standards Committee (WG21) members paid? If paid, by who?
AI Overview.
No, ISO C++ Standards Committee (WG21) members are not typically paid
by ISO or the committee itself. Instead, their participation is often funded by
their employers, their own resources, or through financial assistance programs
offered by organizations like the Standard C++ Foundation.
Here's a more detailed breakdown:
In summary, while there isn't a single person who dictates the direction
of the entire C++ community, the ISO C++ Standards Committee and
its key members, along with influential figures like Bjarne Stroustrup and
major implementers, contribute to its leadership and evolution.3 things I wish I knew before upgrading to 64GB of RAM.____Ingram Micro suffers global outage as
internal systems inaccessible.
Critical Sudo Vulnerabilities Let Local Users Gain Root Access
on Linux, Impacting Major Distros.
The Story So Far: The Boeing (NYSE:BA) Air India Crash.
We asked 3 autonomous driving experts to comment on Tesla's
robotaxi launch and break down videos of some of its errors.
AI Overview.
Speaking in Tongues - 10 Things to Know From the Bible ... "Speaking i
n tongues," also known as glossolalia, is a religious practice where
individuals utter sounds or words that are not part of any known language.
It's often associated with Pentecostal and charismatic Christian traditions,
where it's believed to be a spiritual gift from the Holy Spirit. Some believe
it's a way to communicate with God or express religious ecstasy.
Here's a more detailed explanation:
AI Overview.
Believe it or not, snipes are real A snipe hunt is a type of practical joke
or prank where someone is tricked into searching for a non-existent
bird called a "snipe". Participants are typically given a bag or pillowcase
and sent into the woods or a dark area, often with instructions to make
specific noises to attract the "snipe". The "snipe" is a fictional creature,
and the person is left alone, often in the dark, to realize they've been tricked.
how can AI Agents be hacked?
AI Overview.
Yes, AI agents can be hacked and are vulnerable to various security threats.
As they become more widespread and sophisticated, AI agents present an
expanded attack surface for malicious actors.
Here are some of the key vulnerabilities and attack vectors that make
AI agents susceptible to hacking:
It's important to note that AI agents are an evolving technology, and new
vulnerabilities and attack vectors are constantly emerging. Organizations
and individuals using AI agents must take proactive measures to mitigate
these risks and ensure the safe and secure use of this technology.
how can LLMS be hacked?
AI Overview.
Large Language Models (LLMs) can be "hacked" through a variety of techniques that manipulate their behavior and potentially lead to undesirable outcomes. These attacks often exploit the way LLMs process and respond to user inputs and data, which can be summarized in several key ways:
It is important to note that the field of LLM security is constantly evolving.
As new attack methods emerge, so do the defense strategies to counter them.
who maintains the gcc x86 c++ compiler?
AI Overview.
The GNU Compiler Collection (GCC), including the x86 C++ compiler, is maintained
by a varied group of programmers from around the world under the direction of a steering committee. This distributed, community-driven model of maintenance
evolved from its origins with Richard Stallman and the Free Software Foundation (FSF).
Major decisions about GCC are made by this steering committee, which guides the project's development and ensures adherence to its mission statement. Contributions
to GCC are made by numerous individuals, with code typically assigned to the FSF. The specific front-ends, such as the C++ front-end (G++), also have their own
maintainers within this larger structure.
who maintains the gcc ARM c++ compiler?
AI Overview.
The GNU C++ compiler for ARM is a part of the broader GNU Compiler Collection (GCC), which is maintained by the GNU Project and a global community of developers.
Specifically for the ARM architecture, Arm itself contributes to and maintains the GNU Toolchain for the Arm Architecture, which includes GCC for ARM. They produce
releases of this toolchain, incorporating features from open-source projects
like GCC, Binutils, glibc, Newlib, and GDB.
Therefore, while the core GCC project is maintained by the GNU Project, the ARM-specific releases and optimizations of the GCC toolchain are supported and maintained by Arm.
This collaborative model leverages the open-source nature of GCC while allowing
Arm to provide integrated and validated toolchains tailored for their architecture
and its various profiles (A, R, and M).
____Putins radioactive chokehold on the world.Try 1.
The Kremlin dominates the cross-border
business of nuclear fuel and technology.
The perils and promise of our new nuclear age.
Friday July 4, 2025 16:15
____do cult leaders rely on volunteers?____
AI Overview.
Yes, cult leaders often rely on volunteers to operate their groups
and further their agendas. Here's why and how this reliance on
volunteers plays out in cult dynamics:
Free Labor:
Building Community and Commitment:
Indoctrination and Control:
Exploitation of Vulnerabilities:
Promoting Group Goals:
Funding and Operations:
It's important to remember that not all volunteer organizations
are cults, and many groups rely on volunteers for positive contributions
to society. However, in cult contexts, volunteering can be a critical element
of manipulation, control, and exploitation.
Why GitHub Copilot Isnt Your Coding Partner.
Elon Musk confirms xAI is buying an overseas power plant and shipping the whole thing to the U.S.
to power its new data center 1 million AI GPUs and up to 2 Gigawatts of power under
one roof, equivalent to powering 1.9 million homes.This Is Why Teslas Robotaxi Launch Needed Human Babysitters.____
China is building an entire empire on data.
what fueled in industrial revolution?
AI verview.
Why was coal so important to the Industrial Revolution ...
The primary fuel that drove the Industrial Revolution was coal,
which powered steam engines and other machinery. This increased
the demand for coal, leading to further advancements in mining and
transportation, including the development of steam-powered trains and
ships. The abundance of coal in Great Britain, where the revolution
began, was a key factor in its early success.
Here's a more detailed explanation:
Coal as the main energy source:
ncreased demand for coal:
Advancements in mining:
Transportation revolution:
Other factors:
While coal was the primary fuel, other factors like the
availability of iron (also heavily reliant on coal), a
capitalist economic system, and a growing
population also played significant roles in fueling
the Industrial Revolution.
xAI data center gets air permit to run 15 turbines,
but imaging shows 24 on site.
Try 1.
File should be <~50,000 bytes.
Thursday July 3, 2025 10:33
____Oracle, OpenAI Expand Stargate Deal for More US Data Centers.____
Google revealed as developer behind nearly 470-acre
data center project in Franklin Township.
AI Is Not in the Memo, but It Haunts Every Layoff at Xbox.
Microsoft Trying Their Damndest to Replace Jobs with AI Agents,
According to One Developer.6 smart home devices anyone can build with a
cheap ESP32 and an even cheaper sensor.
____
____
Multitasking OS purveyors have too much power?.
The New Era of Work Travel.
I want to run my 64 bit multiply program and
not have a multitasking OS run it. How do I do this?
AI Overview.
Running a 64-bit multiply program without a multitasking OS is a
form of bare-metal programming. This means your program will be
the only code running on the processor, directly controlling the
hardware without the intervention of an operating system.
It's a complex undertaking that requires significant understanding
of the specific hardware you'll be running on.
Here's a breakdown of how you might achieve this:
1. Bare-Metal Programming:
Understanding the Hardware:
Creating a Minimal Environment:
Writing Your 64-bit Multiply Program:
oading the Program:
2. Methods for 64-bit Multiplication:
Important Considerations:
In summary, running a 64-bit multiply program without a
multitasking OS involves writing your program as a bare-metal
application that initializes the hardware and performs the multiplication
using processor-specific instructions or a software implementation.
This requires in-depth hardware knowledge and is significantly more
complex than standard application development.
II want to run my gcc c transparent portable 64 bit multiply program
and not have a multitasking OS run it. How do I do this? :)
AI Overview.
It's definitely possible to run your GCC C program for 64-bit multiplication
without a multitasking operating system, but it involves some significant
considerations and work. This approach is often referred to as "bare-metal
programming".
Here's a breakdown of how you would approach this:
...
3. Compiling and Linking:
GCC Toolchain: Use the GCC toolchain to compile your C code into a
binary executable.
Linker Script: A critical part of bare-metal development is the linker
script. This script defines how the compiled code is structured
to run independently without an OS.
Memory Management:
Without an OS to handle memory allocation, your program must
manage memory manually. 4.
4. Loading and Execution:
Bootloader:
Hardware Setup:
Important Considerations:
Complexity:
Device Drivers:
Debugging:
In summary, running a C program without a multitasking OS is achievable
with bare-metal programming, but it involves more effort and requires
you to manage many aspects that an OS typically handles, such as
hardware initialization, memory management, and device interactions.
...
Gen Z is ditching college for more secure trade jobs
but building inspectors, electricians and plumbers actually have the worst unemployment.How Nintendo locked down the Switch 2s USB-C port
and broke third-party docking.
Tesla Gets Dismal Sales News After Disastrous Robotaxi Launch/.
It's not looking good.
Tesla delivers 384,000 vehicles in Q2 2025,
deploys 9.6 GWh in energy storage.
Tesla Is in Disarray. Musk Has Already Moved Beyond Caring About Cars..
____Worlds first nuclear reactor producingTry 4.
200 tons of hydrogen daily launched in US.
Wyoming Drilling Crew Hopes To Find
Huge Uranium Deposit In Powder River Basin.
Tuesday July 1, 2025 16:41
____are computer programming jobs shifting rom full time employment to
contractors from all over the world?
AI Overview.
Yes, there's a discernible shift in the computer programming job market,
with a move towards outsourcing and contracting, often leveraging a global
talent pool.
Key Trends and Observations:
Increased Outsourcing:
Growth in Staff Augmentation:
Nearshoring Popularity:
Cost Savings as a Driving Factor:
Factors Contributing to the Shift:
Potential Implications:
In conclusion, the computer programming job market is indeed seeing
a shift towards increased outsourcing and the use of contractors
from around the world. This is driven by various factors, including
cost efficiency, access to talent, and the rise of remote work.
However, companies must carefully consider the potential
implications and challenges associated with these trends.
____is modern c++ obfuscated?
AI Overview.
Modern C++ is not inherently obfuscated, but its complexity and feature richness can
lead to code that is difficult to understand if not written carefully. The language itself is
a tool, and like any tool, it can be used for good or ill. While it offers powerful features
that can improve performance and expressiveness, these features can also be misused
to create code that is deliberately confusing.
Why modern C++ might be perceived as obfuscated:
Complex Syntax and Features:
Low-Level Memory Management:
emplate Metaprogramming:
Poorly Written Code:
Intentional Obfuscation:
In summary, modern C++ is a powerful language with a
learning curve, and its features can be used to create both
clear and obfuscated code.
Does modern c++ have dependency certification issues with
safety-critical apps?
AI Overview Yes, modern C++ does have challenges related to
dependency certification issues within safety-critical applications.
While C++ is widely used and provides low-level control, which is
sometimes necessary for safety-critical systems, it presents challenges:
Inherited memory safety vulnerabilities from C:
Difficulty in ensuring safety:
Dependence on external libraries and code:
Complexity and undefined behavior:
is modern c++ expensive to maintain?
AI Overview.
Modern C++, while introducing powerful features
and abstractions, can present some challenges that might lead
to increased maintenance costs, depending on various factors.
Factors that can increase maintenance costs with modern C++:
Complexity:
Legacy Codebases:
Steep Learning Curve:
Overuse of advanced features:
is modern c++ project costs an issue with investors?
AI Overview.
Using modern C++ in software projects can have cost implications
that may raise concerns for investors.
Why modern C++ projects can be costly: :( ?
____Arm muscles into server market but can't wrestle____
control from x86 just yet.
Canonical Decides To Double Down On Their Investment I
n Java For Ubuntu.
Microsoft quietly implies Windows has LOST
millions of users since Windows 11 debut
are people really abandoning ship?.
what is x86 instruction fluff?
AI Overview.
In the context of x86 instruction sets, "fluff" refers to the
unnecessary or redundant instructions that can be included
in assembly code. These instructions don't perform any
essential function for the program's logic but are often
added for specific purposes, such as:
Obfuscation: Malware authors or attackers may include "fluff"
instructions to make it harder for security analysts to understand
and analyze their code. This is a common technique in reverse
engineering and code obfuscation.
Padding and Alignment: Instructions like the "NOP" (no operation)
instruction can be used to pad code and ensure proper alignment
of instructions or data, which can improve performance on some
processor architectures.
Exploits and Shellcode: In the context of buffer overflow attacks,
"NOP sleds" or "NOP slides" are sequences of NOP instructions used
as a "landing area" for injected shellcode. If the exploit overwrites
the instruction pointer (EIP) to point anywhere within the NOP sled,
the execution flow will slide down the NOPs until it reaches the
malicious shellcode.
Examples of X86 instruction fluff:
In summary, while the term "fluff" can have a negative
connotation suggesting inefficiency, these extra instructions
serve various purposes in x86 assembly, from enhancing code
security to
facilitating exploits.
7 things every Linux beginner should know before downloading
their first distro.
are linux distros large supported by volunteers?
AI Overview.
Yes, many large Linux distributions are supported by volunteers,
though it's important to understand the nuances.
Here's a breakdown:
In summary:
Many large Linux distributions rely heavily on volunteers for their
development, maintenance, and support. While commercial
distributions exist and offer paid support, the open-source nature
of Linux allows for vibrant community contributions to both
commercial and community-driven distributions. The Linux kernel itself,
the core component of Linux distributions, is also a testament to
this collaborative, often volunteer-driven development model.Mark Zuckerberg Already Knows Your Life.
Now He Wants His AI to Run It.
Critics blast Microsoft's limited reprieve for those stuck on Windows 10.
what windows 10 version works best for legacy hardware?
AI Overview.
For older hardware, Windows 10 21H2 or earlier versions are often recommended.
These versions may be more compatible with older drivers and hardware components
that might not be supported by later versions like 22H2 or Windows 11. Specifically,
some users report success with versions like 1709 or even the initial release (v1507)
if newer versions fail.
Here's a more detailed breakdown:
Try 3.
Monday June 30, 2025 14:33
____Why is AI taking peoples jobs, and what job sector is the most affected by it?
AI Overview.
AI's impact on the job market stems from its ability to automate tasks previously
done by humans, leading to job displacement in various sectors. While AI has the
potential to augment some roles and create new jobs, the immediate impact often
involves replacing workers in repetitive or predictable tasks. The most affected
sectors include customer service, manufacturing, transportation, and some
white-collar jobs.
Here's a more detailed breakdown:
Automation of Tasks:
Job Displacement:
Sector Specific Impacts:
Customer Service:
Manufacturing:
Transportation: Self-driving vehicles and trucks, powered by AI,
could disrupt the transportation industry, affecting jobs like drivers.
White-Collar Jobs: While some white-collar jobs might be augmented by AI,
others, especially those involving data analysis, coding, and writing, are
also at risk of automation.
Income Inequality: AI could exacerbate income inequality if displaced
workers struggle to find comparable jobs or face lower wages in new roles.
____Mini-PC wity 16 Zen5 Cores ....____
AMD Ryzen AI Max+ 395.
Multithread Rating 52901
Single Thread Rating 4123
Clockspeed: 3.0 GHz Turbo Speed: 5.1 GHz
Cores: 16 Threads: 32
Typical TDP: 55 W
does intel n4020 have 64 bit wide data path?
AI Overview.
Yes, the Intel Celeron N4020 processor supports 64-bit processing.
This means it has a 64-bit wide data path, which allows it to handle
more data at once compared to a 32-bit system.
This capability is important for:
does intel n6000 have 64 bit wide data path?
AI Overview.
Yes, the Intel Pentium Silver N6000 processor supports 64-bit architecture.
This means it can process data in chunks of 64 bits, allowing it to utilize
a larger address space and potentially perform certain tasks more
efficiently than a processor with a 32-bit architecture.
Here are some key facts about the Intel N6000:
AI Overview.
AMD Ryzen AI 300 series 'Strix Point' APU laptops launch ... AMD's
Ryzen AI 300 series, featuring Zen 5 architecture, RDNA 3.5 graphics,
and an XDNA 2 NPU, is designed for a new generation of laptops,
including ultra-slim and high-performance models. These processors,
also known as "Strix", aim to improve AI capabilities and overall
performance, with the first laptops expected to launch around July
and August.
Key Features and Improvements:
do AMD's Ryzen AI 300 series require new drivers
to run windows 11 ad ubuntu?
AI Overview.
Yes, AMD Ryzen AI 300 series processors do require specific drivers for
both Windows 11 and Ubuntu to function properly and utilize their
full capabilities, especially the integrated AI features.
For Windows 11:
For Ubuntu (and other Linux distributions):
In summary:
Behind RadioShacks Cheapest Computer.Anker just issued a recall on these six power banks ____
how to see if yours is affected.Nvidia insiders dump more than $1 billion in stock, according to report.
Try 2.
Sunday June 29, 2025 17:34
____Power banks manufactured before 2024 now banned from air travel in China.____
https://hackaday.com/2025/06/29/windows-95-on-playstation-2-works-as-well-as-you-expected/https://hackaday.com/2025/06/29/windows-95-on-playstation-2-works-as-well-as-you-expected/
Tech Nvidia insiders dump more than $1 billion in stock, according to report.gcc c inline assemblers obfuscating and incomplete. :(____
AI Overview.
On x86 platforms, GCC's extended inline assembly allows you to specify assembler
instructions using either AT&T syntax (the default) or Intel syntax.
Here's how GCC enables assembly of various x86 instruction forms:
Dialect Support:
AT&T Syntax:
ntel Syntax: Can be activated globally with the -masm=intel option or
locally within the asm block using ".intel_syntax noprefix".
Mixing Dialects:
Basic vs. Extended Assembly:
Basic asm:
Extended asm:
instruction Forms:
Important Considerations:
Syntax Differences:
Extended Assembly:
Optimization:
Portability: Inline assembly is platform-specific and may need
adjustments when porting code.
how is a simple x86 assembler code "nop nop nop"coded and run
using gcc c inline assembler?
AI Overview.
In order to code and run a simple "nop nop nop" sequence using GCC inline
assembly on an x86 system, you can use the asm keyword within your C code.
This allows you to embed assembly instructions directly.
Here's a breakdown of how it's done:
#include stdio.h // add<>
int main() {
printf("Executing NOP instructions...\n");
// Inline assembly block for NOP instructions asm("nop");
asm("nop");
asm("nop");
printf("NOP instructions executed.\n");
return 0;
asm("nop");: The asm keyword indicates that inline assembly code will follow.
The string literal within the parentheses contains the assembly instruction
to be executed. In this case, there are three separate asm statements,
each containing a single "nop" instruction.
2. Compiling the Code with GCC: Save the C code above into a file,
such as nop_example.c. Compile it using GCC:
bash
gcc -o nop_example nop_example.c
3. Running the Executable:
After compilation, run the executable from your terminal:
bash ./nop_example
Explanation:
asm keyword: GCC translates the asm() statements into inline assembler code,
eliminating function call overhead.
nop instruction: The "nop" instruction (No Operation) instructs the processor to do
nothing for one clock cycle. By using three asm("nop") statements,
three nop instructions are inserted into the generated machine code.
This example demonstrates how to embed basic assembly instructions within C code
using GCC inline assembly. For more complex scenarios, extended asm statements
can be used to interact with C variables and define operand constraints.
How to associate assembly code to exact line in C program?.Intel Nova Lake performance leak claims 10% single____
and 60% multi-threaded uplift.
AI Overview.
Intel's Nova Lake is the codename for their next-generation desktop CPU
architecture, slated for release in 2026. While specific PassMark scores for
Nova Lake are not yet available, leaked information suggests a significant
performance uplift compared to previous generations, including potential
increases of over 10% in single-threaded performance and 60% in
multi-threaded performance. This is partly due to a new core architecture
with up to 52 cores (16 P-cores, 32 E-cores, and 4 LP-Cores).
Key points about Intel Nova Lake:
AI Overview.
Intel Nova Lake preliminary desktop specs list 52 cores: 16P ...
Intel Nova Lake CPUs are expected to have a power consumption
range of 65W to 150W, with the high-end models potentially reaching 150W TDP.
Specifically, the Nova Lake-S series is rumored to have a flagship model
with 52 cores (16P + 32E + 4LP) and a 150W TDP, according to a Reddit
thread. The lower-end Nova Lake-S models are expected to have a 65W TDP.
The inclusion of low-power (LP) efficient cores is a key feature aimed at
improving power efficiency, especially for background tasks.
Here's a more detailed breakdown:
NVIDIA GeForce RTX 5070 SUPER reportedly features 6400 CUDA cores
and 18GB memory.
AI Overview.
The NVIDIA GeForce RTX 5070 has a typical power consumption of 250W,
according to TechPowerUp's GPU database. This is the maximum power
draw specified by NVIDIA for the reference card. However, actual power consumption
can vary depending on the specific game, settings, and whether the card is
overclocked. For example, some users have reported power consumption
between 90-110 watts when undervolting and playing games like Final Fantasy XVI
and The Last of Us Part II at 2K resolution with DLSS. In more demanding
scenarios like Furmark stress tests, the power consumption can reach higher levels.Lidar is lame: why Elon Musks vision for a self-driving Tesla taxi faltered.
____Stop These Things Weekly Round Up: 29 June 2025.Try 1.
PGE wants to add solar to troubled wind farm instead of replacing turbines.
Suzlon wind turbines Spanish Fork UT.
Full Savage coal truck descending to Wellington UT.
Empty coal truck ascending to Soldier Summit UT.
Entering Moab UT.
AI Overview.
Energy News: A New Uranium Boom? - Utah Geological Survey A new uranium mine, the Velvet-Wood mine,
has been approved in San Juan County, Utah, southeast of Moab. The project is the first to be approved under
the Trump administration's emergency declaration expediting energy projects. The mine, located near
Lisbon Valley, will also produce vanadium.
Key Points:
Uranium mining in Utah.
Saturday June 28, 2025 18:44
____Former Texas governor and US energy sec plans 11GW data center campus
outside Amarillo, Texas.
Surprising group are living in fear as they struggle to get hired despite
strong job market.
AI Overview.
Canonical The Company Behind Ubuntu with Mark ... Ubuntu is owned and
developed by Canonical Ltd., a private company founded by Mark Shuttleworth.
While Canonical is the primary publisher and developer, Ubuntu is also a
collaborative project with contributions from a large community of volunteers.
Here's a more detailed breakdown:
Mark Shuttleworth: He founded Canonical and is the driving force behind Ubuntu.
Canonical (company).
AI Overview.
According to various sources, approximately 13,000 Navajo households on the
Navajo Nation reservation lack access to electricity. This number represents a
significant portion of Native American homes without electricity nationwide.
The Navajo Nation covers a large area spanning parts of Arizona, Utah, and
New Mexico.
Here are some key points about the situation:
AI Overview.
On x86 platforms, GCC's extended inline assembly allows you to specify assembler
instructions using either AT&T syntax (the default) or Intel syntax.
Here's how GCC enables assembly of various x86 instruction forms:
____Anker issues new global recall for five power____
bank models over fire hazard.
AI Overview.
Older cell phone batteries swell due to a combination of factors,
primarily related to the breakdown of the battery's internal
components and the resulting gas production. Specifically,
the electrolyte, a liquid inside the battery, can decompose and
release gases like hydrogen, oxygen, and carbon dioxide.
This gas buildup inside the sealed battery casing causes it
to expand.
Here's a more detailed breakdown:
Overcharging:
AI Overview.
Yes, virtually all new cell phones are equipped with overcharging prevention
hardware and software, often integrated within a Battery Management
System (BMS).
Here's why this is standard in modern devices:
mportant Notes:
do solar charge/load controllers have overcharging prevention
hardware/software?
AI Overview.
Yes, solar charge controllers are designed to prevent battery overcharging,
and they achieve this through both hardware and software features.
How they prevent overcharging:
Solar charge controllers act as the "gatekeeper" for your battery bank,
ensuring proper charging, preventing overcharging, and protecting the
longevity and safety of your system.
does solar charge/load controller use multitasking software technology
like is used in Linux?
AI Overcvew.
Yes, solar charge controllers, especially those using advanced technologies
like Maximum Power Point Tracking (MPPT), often utilize multitasking software technology, similar in concept to what is used in Linux, but typically
implemented with a Real-Time Operating System (RTOS).
Here's why and how:
In essence, while a solar charge controller doesn't typically run a full version
of Linux, it does employ similar multitasking principles within its embedded
software, often utilizing an RTOS, to efficiently manage its diverse functions.
do inexpensive, <$25 solar charge/load controller use multitasking software technology like is used in Linux? :)
AI Overview.
No, inexpensive, sub-$25 solar charge/load controllers are highly unlikely to use complex multitasking operating system technology like that found in Linux.
Here's why:
inux is for complex systems:
Simple embedded systems:
Efficiency:
Cost and Resources:
Multitasking in Embedded Systems: While some embedded systems do utilize multitasking, it's typically handled through Real-Time Operating Systems (RTOS)
or simpler approaches that offer more control and predictability than a full OS like
Linux. These inexpensive controllers likely use a simple "main loop" approach
where the microcontroller rapidly switches between different tasks to give the
illusion of multitasking.
In essence, a sub-$25 solar charge controller is a dedicated device with specific functions, making a complex OS like Linux unnecessary and impractical.
AI Overview.
No, inexpensive solar charge controllers, particularly those under $25,
generally do not offer the same performance as more expensive MPPT
controllers, even if they are advertised as "MPPT".
Here's why:
In summary: While a very cheap controller might suffice for simple needs
(like charging lights or small devices), you should not expect it to deliver
the same level of performance and reliability as a genuine, higher-quality
MPPT controller.
If you need a more efficient and reliable charge controller, especially
for larger solar setups or for charging sensitive lithium batteries, it's
generally worth investing in a reputable MPPT controller, even if it
means spending more than $25.
AI Overview,
Yes, expensive and complex solar charge controllers, especially MPPT
(Maximum Power Point Tracking) ones, can require software or
firmware updates.
Here's why and the benefits of updating:
In summary, while not all solar charge controllers require firmware updates,
the more sophisticated and expensive ones, especially MPPT controllers, benefit significantly from these updates to optimize performance, enhance reliability, and
ensure continued functionality.
who pays for expensive complex solar charge/load controller software updates?
AI Overview.
In general, the customer is responsible for the cost of software updates for
solar charge controllers, especially if they are not included in the initial purchase
or an ongoing maintenance contract.
Here's a breakdown of the typical scenarios:
In summary, while the initial software updates may be included in the purchase
price, ongoing access to updates may require a separate payment or be
covered by a maintenance agreement.4 things Linux still gets wrong for the average user.____
AI Overview.
DRM-protected content refers to digital media, like movies, music, or ebooks,
that has been encrypted and controlled by a system called Digital Rights
Management (DRM). This system limits how users can access and use the
content, often preventing unauthorized copying, sharing, or redistribution.
Essentially, DRM grants users a license to use the content under specific
conditions, rather than outright ownership.
Here's a more detailed breakdown:
AI Overview.
In 2024, Linux's desktop market share reached 4%, a significant milestone
for the open-source operating system. This figure, however, represents only
a portion of the total global computer usage, with Windows and macOS
still dominating the market. While Linux's adoption is growing, particularly
in specific regions and for certain applications, it still faces challenges
in achieving widespread mainstream adoption on desktop PCs.
Here's a more detailed look:
In conclusion: While Linux has a dedicated and growing user base, particularly
in specialized areas, it still faces challenges in achieving widespread mainstream
adoption on desktop PCs. However, its open-source nature, cost-effectiveness,
and increasing user-friendliness are contributing to its ongoing growth and
relevance in the computing landscape.
4 times an HDD is still better than an SSD.
Developers of Linux distro Fedora propose dropping 32-bit support entirely,
but it's being claimed that the change 'would kill off projects like Bazzite entirely'.Ford CEO favors Waymos LiDAR approach over____
Teslas vision-only self-driving.Is anyone else just done with the industry?.____ Solar panel maker Meyer Burger US files for Chapter 11 bankruptcy [Update].Try 1.
Friday June 27, 2025 17:13
____The College-Major Gamble.____
2,000-GPU data center launches powered exclusively by reusable batteries
12-megawatt storage system built on hundreds of repurposed EV batteries.Speed comparison between USB 2.0, USB 3.0, eSATA,____
Firewire and Thunderbolt.Chinas new army of engineers.____In Pursuit of Godlike Technology, Mark Zuckerberg____
Amps Up the A.I. Race.
Meta hires key OpenAI researcher to work on
AI reasoning models.
Meta says its winning the talent war with OpenAI.was windows me installed on a marketed us automobile?____
AI Overview.
It is highly unlikely that Windows Me (Millennium Edition) was
ever installed on a commercially marketed US automobile.
Windows Me was designed for home PC users, not embedded
systems like car infotainment systems. It included features
meant for personal computing, such as video editing and multimedia
tools. Windows Me was also known for its instability issues,
making it unsuitable for a critical system like a car's operating system.
Microsoft developed operating systems specifically for automobiles,
like Windows Embedded Automotive (formerly Microsoft Auto,
Windows CE for Automotive, etc.). These were built on more
appropriate bases like Windows CE and were used in
systems like Ford Sync.
Windows Me was not the right fit for the demands and needs of a
car's operating system, and a separate, more suitable platform
like Windows Embedded Automotive was used instead.
was windows installed on a marketed us automobile? [Insider information. :) ]
AI Overview.
Yes, various car models marketed in the US have had infotainment
and telematics systems powered by a version of the Windows
operating system called Windows Embedded Automotive
(formerly Microsoft Auto, Windows CE for Automotive,
Windows Automotive, and Windows Mobile for Automotive).
Examples of US-marketed cars that have used Windows Embedded
Automotive include:
Windows Embedded Automotive is a specialized operating system built
on Windows CE, designed for the automotive industry's specific needs.
It is not a full version of Windows, like the one on a desktop computer.
While Microsoft's automotive platform was used in various vehicles,
some manufacturers have switched to other operating systems like
BlackBerry QNX.
Tesla's Robotaxi: Worth Way More Than Waymo.
Windows Embedded Automotive.Why hasnt the x86 architecture ever been replaced in personal computers____
and workstations?
Jeff Sturm VP, Information Systems (2020present)
A few reasons, but in truth x86 has been replaced several times now
with a new evolution of the CPU architecture.
...
It remains to be seen whether x86 will ever become obsolete, or just continue t
o evolve indefinitely as computing technology adapts to our changing needs and
our online lifestyle. Today it is ubiquitous in Windows-compatible desktops and laptops,
and also Mac hardware from Apple, though most mobile devices have evolved supporting
a different architecture, partly due to the need for lower power and low cost. The shift
from x86 may be gradual as mobile devices continue to replace desktops for everyday use.
A look at history:
does amd now have a 256 bit data path cpu?
AI Overview.
Yes, AMD does have CPUs with 256-bit data paths, and they also have CPUs
with 512-bit data paths. The "Zen 5" architecture, used in processors like the
Ryzen 9000 series and 5th Gen EPYC, features a 512-bit FPU (Floating Point Unit)
data path. However, some "Zen 5" cores, particularly those found in mobile SoCs
like "Strix Point", have a 256-bit wide FPU data path. Additionally, AMD's
EPYC 9004 series processors implement AVX-512 by effectively using a
256-bit data path twice (double-pumping).
Here's a more detailed breakdown:
what are AVX-512 instructions?
AI Overview.
AVX-512 (Advanced Vector Extensions 512) is a set of x86 instructions designed
to enhance performance, particularly for compute-intensive workloads like scientific
simulations, AI, and data analysis. These instructions operate on 512-bit vectors,
enabling parallel processing of larger data sets compared to previous AVX versions.
Here's a breakdown of key aspects:
AI Overview.
AMD EPYC 9004 series processors, also known as the 4th Gen EPYC, have a range
of power consumption levels depending on the specific model and workload.
The default TDP (Thermal Design Power) for these processors can range
from 165W to 400W, with some models even reaching 360W or higher.
For example, the EPYC 9754 has a default TDP of 360W and a configurable
TDP (cTDP) range of 320-400W.
Here's a more detailed breakdown:Trump says the U.S. has signed a deal
with China on trade, without giving details.
AMD Ryzen CPUs continue to crush Intel processors
on Amazon best-seller list.
:)++Try 1.
MPPT work? What software technology used? :)
what is the optimum power output for a wind mppt?
AI Overview.
The optimal power output for a wind turbine with MPPT (Maximum Power Point Tracking)
is the highest power that can be extracted from the wind at a given wind speed, and
this is achieved by constantly adjusting the turbine's operating point to match the
changing wind conditions. MPPT algorithms aim to find and maintain this optimal
operating point, ensuring the turbine delivers the maximum possible power for
the existing wind speed.
Here's a more detailed explanation:
Solar manufacturing is booming. Advocates say it could go bust without incentives.
AI Overview.
The maximum power point voltage of a solar panel is typically 75% to 80% of its
open-circuit voltage (VOC). This means that when a solar panel is operating at its
maximum power output, the voltage will be around 75-80% of the voltage it produces
when no load is connected (open-circuit voltage).
Here's a more detailed explanation:
Inexpensive solar charge/load controllers do ~mppt, we found over years of testing.
Iranian woman, who has lived in US for 47 years,
taken by Ice while gardening.
AI Overview.
U.S. Immigration and Customs Enforcement (ICE) is a federal law enforcement agency
under the Department of Homeland Security. It enforces federal laws governing border
control, customs, trade, and immigration. ICE's primary mission is to promote homeland
security and public safety through the enforcement of these laws.
Here's a more detailed breakdown:
Thursday June 26, 2025 17:43
____Embedded Systems:
This is a common use case for bare-metal C programming.
Many embedded systems (like those in cars, appliances,
or industrial equipment) don't have full-fledged operating
systems but utilize C code running directly on their microcontrollers.
gcc freestanding environment example.
AI Overview.
GCC Freestanding Environment Example A freestanding environment,
often referred to as "bare-metal," is a minimal C/C++ execution
environment that does not rely on a standard operating system
or its typical library facilities. Examples include operating system kernels,
embedded systems, or bootloaders.
To compile a program for a freestanding environment using GCC,
you need to use specific compiler and linker options.
Here's an example:
gcc -ffreestanding -nostdlib freestanding.c -o freestanding
This example provides a basic outline. Real-world freestanding development,
especially for operating systems or embedded systems, is much more complex
and involves careful low-level programming and platform-specific configurations.
____AI Overview.
James Gosling is a Canadian computer scientist best known as the
"father of Java." He led the development of the Java programming
language at Sun Microsystems in the 1990s. Java's platform independence
(write once, run anywhere) revolutionized software development, making
it widely used across diverse platforms and applications.
Key points about James Gosling and Java:
was james goslig's java influenced by forth's portability?
AI Overview.
Yes, Java's portability was significantly influenced by the concept of
using intermediate code, which is a key element in the portability of
languages like Forth and Pascal's p-code.
How this relates to Java's design:
In summary:
While Java's syntax and other features have roots in other languages
like C++, the fundamental principle behind its portability the use of a
virtual machine and intermediate code was inspired by techniques
used in languages like Forth and Pascal's p-code. This allowed Java to
achieve its goal of being "architecture-neutral and portable".
AI Overview.
Understanding USB 3.2 and Type-C - Tech Design Forum Techniques
USB 3.2 Gen 2, when implemented with a USB-C connector, offers a
data transfer rate of 10 Gbps (SuperSpeed+) and supports features like
Power Delivery (up to 100W) and DisplayPort Alternate Mode (DP
Alt Mode) for video output. It is also backwards compatible with older
USB standards.
Key Specifications:
~1.25 MB/s?
AI Overview.
The Hewlett-Packard (HP) 9800 series was first marketed starting in 1971
with the introduction of the HP 9810A. The HP 9800 series was a family of
desktop computers, initially marketed as "calculators" by HP, and included
several models introduced over time.
Here's a breakdown of the models and their release dates:
AI Overview.
IBM's Early PC Attracts Time Travelers | Hackaday The IBM 5100 Portable
Computer was first marketed in September 1975. It was announced on
September 9, 1975, with deliveries beginning in the same month,
according to Bitsavers.org.
____Nvidia Stock Hits All-Time High. 'Golden Wave'____
Of Gen AI Seen.
Metas recruiting blitz claims three OpenAI researchers.
Tesla's robotaxi peppered with driving mistakes in Texas tests.
Tesla's Robotaxis Are Going Poorly.AVX-512's Enormous Advantage For AMD EPYC 4005
Series Performance.
AI Overview.
The PassMark PerformanceTest benchmark includes an AVX-512 test,
which can impact CPU performance scores, particularly for Intel
processors that support it. AMD processors, however, do not
natively support AVX-512, which can lead to a performance
difference in benchmarks that utilize this instruction set. :(?
Blender 5.0 Introducing HDR Support On Linux With Vulkan + Wayland.
AI Overview.
Blender 5.0, like previous versions, is primarily funded by the Blender
Development Fund. This fund is a voluntary, crowdfunding initiative
where individuals and companies contribute money on a monthly
or yearly basis. Additionally, various companies like AMD, Nvidia, Meta,
Apple, Epic Games, and Ubisoft contribute as corporate sponsors, i
nvesting in Blender's development, often due to their vested interest
in its success and compatibility with their hardware and tools.
Here's a more detailed breakdown:
Before Windows 10 goes EOL, I'm testing three alternative
Linux distros to save my 6-year-old laptop from the landfill.
Try 1.
Wednesday June 25, 2025 15:58
____AI Overview.
No, Solaris itself is not a bytecode operating system.
Here's why:
____AI Overview.
No, not all flash memory devices contain a dedicated microcontroller
for managing the flash memory. While many devices like SSDs, USB flash
drives, and SD cards do utilize flash memory controllers (often integrated
with a microcontroller), simpler devices might rely on the host system's
firmware or software for basic flash management.
Here's a more detailed explanation:
____Stable careers are a myth and no one wants to be a leader:____
A new report reveals the depths of worker pessimism with
corporate America.China breaks RSA encryption with a quantum computer,____
threatening global data security.
[Was public keu broken in ~1991/2 by NSA?]
____Is the last bug was fixed." software fiction?___
AI Overview.
Based on the provided search results, the idea that
"the last bug was fixed" in software is considered
a myth and is generally viewed as unattainable.
Here's why:
Software Complexity: Modern software is inherently complex,
making it extremely difficult, if not impossible, to predict and
account for every possible user interaction, environmental variable,
and edge case that could trigger a bug.
Infinite Possibilities: Users interact with software in countless ways,
often in unpredictable environments (different operating systems,
hardware, configurations), leading to the emergence of bugs that
may not be caught during testing.
Evolving Software: Software development is an ongoing process.
As new features are added or existing ones are modified, new bugs
can be introduced, making the idea of a permanently "bug-free"
state unrealistic.
Subjectivity of "Bug-Free": What one person considers a "bug"
might be seen as a minor inconvenience or even expected
behavior by another, further complicating the notion of a
completely bug-free product.
Evolving Software: Software development is an ongoing process.
As new features are added or existing ones are modified, new
bugs can be introduced, making the idea of a permanently "bug-free"
state unrealistic. Subjectivity of "Bug-Free": What one person
considers a "bug" might be seen as a minor inconvenience or
even expected behavior by another, further complicating the
notion of a completely bug-free product.
Instead of aiming for 100% bug-free software, the focus in software
development is on minimizing risks, addressing critical bugs, and
managing bugs effectively. This involves strategies such as: [mainframe
mentality? ( ?]
While striving for excellence and minimizing bugs is essential, recognizing
that some bugs may always exist is a crucial aspect of realistic software
zdevelopment. The goal is to build reliable software that delivers value
to users, even if it's not entirely flawless. [:(-?]
AI Overview.
Yes, platform temperature can be an issue related to software bugs,
but often in the context of hardware-software interactions.
Here's why:
Hardware issues triggered by temperature: Overheating can cause hardware components like RAM or other parts to malfunction or fail. These hardware
issues, in turn, can manifest as software bugs, leading to crashes, errors, or
unexpected behavior.
Software's role in temperature management: Software (like operating
systems and firmware) plays a crucial role in monitoring and managing
system temperature, for instance by controlling fan speeds.
Software bugs impacting temperature sensing/control: A software bug in
temperature sensor reading or thermal management logic can lead to a
device overheating or misinterpreting temperature data, which can then
result in system errors.
Firmware sensitivity to temperature: In some cases, firmware can be
overly sensitive to temperature changes, leading to false errors, such as
in the example of a 3D printer's thermal runaway detection.
Diagnosing temperature-related bugs: It can be challenging to determine
whether a bug is rooted in software or hardware, as exemplified by the
Quora user's experience with a hardware-induced driver issue.
In summary: While software bugs aren't directly "caused" by temperature
in the sense of software code being directly changed by heat, platform
temperature can trigger or exacerbate software-related issues, often
via underlying hardware problems.Tesla removed from Charlottes approved EV list due to safety issues.____
Heres a running list of all of Teslas robotaxi mishaps so far.Intel Starts Layoffs Under Lip-Bu Tan,
Some Impacted Roles Listed.____ Stop These Things Weekly Round Up: 22 June 2025.Try 2.
Tuesday June 24, 2025 15:30
____AI Overview.
HyperTerminal, developed by Hilgraeve, was first marketed as a "lite"
version of their HyperACCESS program and licensed to Microsoft for
use in their set of communications utilities in 1995.
More specifically:
Hilgraeve's first software product was initially designed for 8-bit Heath
computers to communicate over a modem, and in 1985 it was ported
to IBM PCs and compatible systems.
Over time, this technology was ported to other operating systems l
ike OS/2, Windows 95, and Windows NT.
IBM bundled a version of Hilgraeve's terminal program, "HyperAccess Lite",
with OS/2 Warp 3.0 in 1994.
Microsoft followed suit and licensed HyperTerminal for bundling with
Windows 95, where it was included up through Windows XP.
In summary, while the underlying technology predates 1995,
HyperTerminal itself entered the market by being bundled with Windows 95.
____Hackers Target Over 70 Microsoft Exchange Servers to____
Steal Credentials via Keyloggers.AI Overview.____
FORTH, Inc. (founded in 1971): This company was founded by Charles H. Moore
and Elizabeth Rather to explore commercial uses of the Forth programming l
anguage. They developed and sold implementations of Forth for various
computers, starting with microFORTH for specific microprocessors in 1976.IBM Already Working On What Is Likely Power12 Support____
For The GCC Compiler.Data center spending soared amid rising GPU demand in Q1.____Teslas robotaxis have already caught the attention___
of federal safety regulators.
are there any linux oses which are hacker-proof?
AI Overview.
No, there is no Linux operating system that is truly "hacker-proof."
While certain distributions are designed with security in mind and come
with tools for penetration testing and security analysis, no OS
can be completely impervious to attacks.
Here's why:
Open-source nature:
Linux is open-source, meaning its code is publicly available. This
allows for constant review and modification, but it also means
potential vulnerabilities can be identified and exploited by
malicious actors.
Complexity:
Linux systems, especially those used for security testing like
Kali Linux, can be complex. Understanding and securing them
requires a high level of expertise.
Human error:
Even with the most secure system, user error or misconfigurations
can create vulnerabilities that hackers can exploit.
Evolving threats:
The threat landscape is constantly changing, and new attack vectors
are developed regularly. No OS can stay ahead of all possible
threats at all times.
While you can make Linux systems very secure through proper
configuration and ongoing maintenance, there's no silver bullet
to make them completely hacker-proof.
Examples of Linux distributions focused on security:
Tesla Robotaxi Terrifyingly Jerks Wheel Back and Forth While
Carrying Passenger.
Im not buying the Tesla robotaxi hype heres why
its still miles behind Waymo.Notepad++ Vulnerability Let Attacker Gain Complete System____
Control PoC Released.Building A Modern Dashboard with Python and Taipy.____
AI Overview.
Yes, Python is a software technology that uses bytecode and
has threading capabilities, but with nuances related to the
Global Interpreter Lock (GIL). Taipy is a Python library,
meaning it relies on Python's underlying architecture, i
ncluding its bytecode and threading mechanisms.
Here's a breakdown:
Python and Bytecode:
Python source code is compiled into bytecode before execution by the
Python Virtual Machine (PVM).
Bytecode is a lower-level, platform-independent representation of the
source code, allowing it to run on any system with a compatible Python
interpreter.
Python and Threading:
Python supports multithreading, allowing programs to have multiple threads
of execution within a single process.
However, the Global Interpreter Lock (GIL) in CPython (the standard Python implementation) ensures that only one thread can execute Python bytecode
at a time, limiting true parallelism for CPU-bound tasks.
The GIL is released during I/O operations (like file reads or network requests)
and certain C extension operations (like NumPy calculations), allowing other
threads to run concurrently during these times.
Taipy and Bytecode/Threading:
Taipy is a Python library for building data and AI applications, implying it runs on
top of the Python interpreter and utilizes its execution model.
Therefore, Taipy applications will inherit Python's bytecode execution and threading behavior, including the impact of the GIL.
Taipy supports asynchronous execution for handling long-running tasks
without blocking the user interface, which could involve features that
interact with Python's concurrency mechanisms.
In summary, both Python and Taipy, being a Python library, are related to
bytecode execution and threading, with the understanding that Python's
threading is constrained by the GIL in CPython.Intel makes a harsh decision amid declining sales.
Will FPGA Advancement Revive AMD's
Embedded Segment Revenues?.____ Worlds first wind- and hybrid-powered cargo shipTry1.
marks 2 years at sea.
Why forecasting offshore wind project costs
is getting even harder.
Monday June 23, 2025 19:21
____AI Overview.____
Microsoft's first multitasking operating system, Windows 1.0, was marketed
starting on November 20, 1985. It was released as a graphical operating system
shell for MS-DOS, marking Microsoft's initial foray into the world of graphical user
interfaces. While initially achieving modest success, it laid the foundation for
future versions of Windows.
AI Overview.
GW-BASIC first appeared in 1983. It was a disk-based Microsoft product distributed
with non-IBM MS-DOS computers. It was a dialect of the BASIC programming language, functionally identical to IBM BASICA, but it was self-contained and didn't require the
Cassette BASIC ROM chip found in the original IBM PCs.
AI Overview.
Intel released the first version of MCS BASIC-52 (version 1.0) for their 8051 family of microcontrollers in 1984. A manual for Version 1.0 is dated July 1984, indicating
that it was being developed around this time.
Subsequently, in 1985, Intel introduced the 8052AH-BASIC microcontroller which
had the Version 1.1 interpreter factory-masked into its ROM. This was the most
common version, despite having a few errors.
AI Overview.
WANG 2200 computer Wang Museum
The Wang 2200 Basic minicomputer was first marketed in May 1973.
Wang Laboratories released the Wang 2200, which i
ncluded a built-in BASIC interpreter, in May 1973. It was an all-in-one minicomputer
with a CRT display, keyboard, and integrated cassette tape storage. The first model was designated as the 2200-A, with later models like the 2200-B and 2200-C offering more arithmetic capabilities.
AI Overview.
Sinclair BASIC first appeared in 1980. It was the operating system for the Sinclair ZX80,
which was launched on January 29, 1980. The ZX80 featured an Integer-only version of
BASIC stored in a 4 KB ROM. This was later upgradable to an 8 KB floating-point BASIC
ROM after the release of the ZX81.
Sinclair BASIC was also used in subsequent Sinclair
computers like the ZX81 and ZX Spectrum. The ZX81 was launched on March 5, 1981,
and had a more complete, but not full, 8K BASIC interpreter in ROM.
Therefore, Sinclair
BASIC was first marketed in 1980, coinciding with the launch of the Sinclair ZX80.
AI Overview.
The Jupiter Ace was first marketed and went on sale on 22 September 1982. Initially,
it was available through mail order. By January 1983, production difficulties had been
overcome, and units started arriving in shops. The introductory price was £89.95.How to switch from Windows 10 to Linux: A technical guide.____
Microsoft surprises MS-DOS fans with remake of ancient
text editor that works on Linux.
Intel Xeon 6300 vs. AMD EPYC 4005 SMT/HT Performance.Elon MuskFirst Look at Teslas Robotaxi App:____
features, design, and more.
AI Overview.
No, Tesla robotaxis are not guaranteed to be hacker-proof.
Here's why:
Autonomous vehicles, including Tesla's, are complex systems relying on computer
control and interconnected devices. This increases the potential for cyberattacks.
Security researchers have demonstrated vulnerabilities in Tesla's systems.
For example, researchers successfully exploited a vulnerability in the Tesla
Model 3's Tire Pressure Monitoring System (TPMS) to gain remote code execution.
Even systems not specifically designed for self-driving, like TPMS, can be exploited
as entry points for malicious activities.
The interconnected nature of autonomous vehicles with other systems (like the
Internet of Things) creates a broader attack surface.
While Tesla has taken measures to address security, vulnerabilities can emerge
in complex systems, and ongoing efforts are needed to address them.
Experts emphasize the importance of continuous cybersecurity efforts and the
need for rigorous testing and robust safeguards in autonomous vehicle technology.
n summary, while Tesla strives for safety and security, like any technology, robotaxis
face the potential for cyberattacks. The emphasis on robust cybersecurity measures
and ongoing security updates is critical to address these risks and safeguard the
safety of autonomous vehicles.
Tesla Robotaxi rollout proves that Elon Musk still delivers, even if its late.Windows Snipping Tool now lets you create____
animated GIF recordings.
Microsoft Confirms Windows 11 Automatic Deletions:
Take Action Now To Protect Yourself.
I can't ignore these 8 drawbacks to open-source software.
I've been using this cheap ESP32-based display
instead of a Flipper Zero, and it's just as versatile.Tesla Stock Surges After Musks Robo-Taxi Rollout.____
Where Shares Go From Here.Zuckerberg Leads AI Recruitment Blitz____
Armed With $100 Million Pay Packages.
Super-rich Americans like Mark Zuckerberg and Jay-Z
have taken out mortgages for homes heres why.
Nvidia RTX 5090 beats RTX Pro 6000 in tests after shunt mod to a
staggering 800W consumer flagship barely scrapes past the
$10,000 Pro despite eye-watering power modification.Techie went home rather than fix mistake
that caused a massive meltdown.
Urgent alarm issued after mother of all data breaches
sees 16 billion passwords exposed do this ASAP.
____Diisabling Intel Graphics Security Mitigation Boosts
GPU Compute Performance 20% (phoronix.com).
Chinas First 6nm GPU Aimed to Rival NVIDIAs GeForce RTX 4060,
But Fell Short Against the Decade-Old GTX 660 Ti.
____is there new unaium mining near moab?Try 1.
AI Overview.
Yes, there is new uranium mining activity near Moab, Utah. The Velvet-Wood mine,
located in southeastern Utah, has recently been approved for reopening under a
fast-tracked environmental review process initiated by the Trump administration,
according to news sources. This mine is located south of Moab and Monticello,
and is the first project approved under the new process.
Here's a more detailed breakdown:
New York to Build One of First U.S. Nuclear-Power Plants in Generation.
What's plaguing America's power grid?.
Iran tensions make thermal coal a winner against pricier LNG.
Power utility built $95 million 500-megawatt power substation for
Intel's $100 billion Ohio fab, but six-year delay leaves substation
capable of powering 500,000 homes idle.
Israel says it struck Tehran's Evin prison ... .
Sunday June 22, 2025 14:11
____$2 development board features Puya PY32F030 Cortex-M0+ MCU
with 64KB Flash, 8KB RAM.
Process Explorer Is Task Manager Dialed To 11.
____is microsoft's decision to encourage installation of___
windows 11 on legacy hardware to make legacy
hardware look bad going to damage microsoft financially?
AI Overview.
Microsoft doesn't explicitly encourage installing Windows 11 on legacy
hardware. Instead, they have specific minimum hardware requirements for
Windows 11 installation, such as:
UEFI Secure Boot
Trusted Platform Module (TPM) version 2.0
Approved processors (8th generation Intel Core or newer, 2nd generation
AMD Ryzen or newer, or Qualcomm Snapdragon 850 or later) [:)?]
While installing Windows 11 on unsupported hardware is possible,
Microsoft strongly recommends against it. Installing Windows 11
on legacy hardware can have significant drawbacks and potential
risks, such as:
Lack of support:
Compatibility issues:
No guaranteed updates:
Potential for instability and performance issues:
Financial implications for Microsoft:
Conclusion:
Microsoft's decision to have strict hardware requirements
for Windows 11, rather than encouraging installations on legacy
hardware, is likely driven by a desire to provide a more secure
and stable user experience and potentially increase hardware sales.
While this approach may initially lead to some frustration among
users, it is unlikely to cause significant financial damage to
Microsoft. In fact, it could have positive financial implications
in the long run.
Microsoft finally allowed keeping 10 1909 on Lenovo
Ryzem 7 4700U 8+0 cores aftere destroying it with Windows 11 install.
First hp stresam 13 Celeron N3050 1/2/2.16 GHz 2/32 GB previously stuck
at 10 1511 for ~5y photographed 6/21/25 running 10 1909. :(
Above laptop at right charging.
Left stream 13 ran 10 20H2 but now runs Ubuntu.
hp steamsapparently have battery over-charge protection. Charge leds extinguish when over charge detected.
Amazon Web Swevices Boardman OR
AWS
AWS Employee housing?
Hood River OR,
Cannob Beach OR.
Microsft notfied 6/22/25 that the snipping tool was moving. Unable to save some pics with old snipping tool.
Microsofts Free Upgrade Deadline For 400 Million Windows Users.
Ready to ditch Windows? 'End of 10' makes converting
your PC to Linux easier than ever.IBM laid off 8,000 employees to replace them with AI____
what they didnt expect was having to rehire as many due to AI.
Prediction: This Artificial Intelligence (AI) Data Center Stock
Will Be Worth More Than Palantir by 2030.
The $50 Billion Company That Does Almost Nothing.
Try 5.
Saturday June 21, 2025 16:10
____Massive subsidies, minimal jobs: The math behind
America's data center boom.
From Killer Drones to Robotaxis, Sci-Fi Dreams Are Coming to Life.
____Tesla Robo-Taxis, With Human Safety Monitors,____
to Launch in 2 Days.
whata oses does tesla robotaxis use?
AI Overview.
Tesla utilizes Linux as the operating system for its robotaxi service,
which leverages its proprietary Full Self-Driving (FSD) software.
Tesla designs and manufactures its own custom hardware and software systems, including the onboard computers for its vehicles, utilizing a
custom operating system that is based on Linux.
Key aspects of Tesla's robotaxi software:
FSD Software:
Custom Software:
Linux Base: Tesla's central console and instrument cluster use Linux,
based on Ubuntu.
Embedded Systems:
Neural Networks:
Dojo Supercomputer:
are ubuntu dependencies certified?
AI Overview.
When discussing "certification" in the context of Ubuntu and its dependencies,
it's important to differentiate between hardware certification and software
certification.
Hardware Certification: Canonical (the company behind Ubuntu) certifies
hardware devices to ensure they are compatible with Ubuntu. This
certification process involves extensive testing to verify that the
hardware works reliably with the operating system.
The focus is on ensuring compatibility between the hardware and the
Ubuntu operating system, including drivers and overall system functionality.
Certified hardware receives continuous testing to ensure updates don't
negatively impact performance or reliability.
Benefits of certified hardware include reduced costs, faster time-to-market,
and increased peace of mind regarding compatibility and support.
Software Dependencies and Certification:
Standard Ubuntu packages and their dependencies are built from open-source
code on a trusted infrastructure. While they aren't individually "certified" in the same way as hardware, their origin and build process ensure they can be audited and are
designed to function in a particular way.
Ubuntu Pro offers FIPS 140-2 and 140-3 certified modules for cryptographic packages. These modules are tested and attested by a NIST accredited laboratory, ensuring
they meet rigorous security standards for sensitive environments like those in government and regulated industries.
Ubuntu's Extended Security Maintenance (ESM) provides security fixes for critical vulnerabilities in open-source software dependencies. These fixes are created by Canonical's security team and distributed through the same trusted build process
as regular Ubuntu packages, helping to mitigate software supply chain risks.
In summary:While hardware certification ensures a device's compatibility and reliable performance with Ubuntu, software dependencies in Ubuntu are not typically "certified" in theTherefore, while you might not find "certified" labels on individual dependencies
same manner as hardware.
However, Ubuntu's approach to software dependencies emphasizes security and reliability through trusted build processes, FIPS certified modules (available with
Ubuntu Pro), and ESM for security fixes.
in the traditional sense, Ubuntu provides mechanisms to ensure the security
and reliability of the software you run, particularly for critical components
and in regulated environments.Windows 11 vs. Ubuntu Linux Performance On The___
AMD Ryzen AI Max PRO 390 "Strix Halo.
Linux Delivering Driver Fix For 30 Year Old Creative SoundBlaster
AWE32 ISA Sound Card.The Computer-Science Bubble Is Bursting.
Try 1,
Friday June 20, 2025 17:20
____Bento Is An All-In-One Computer Designed To Be Useful.____
The rise of RISC-V: Is it a real threat to ARM and x86?.
Fission Simulator Melts Down RP2040.Tesla releases details about Robotaxi launch:___
theres a safety monitor in front seat.
Everything we know about Teslas robotaxi launch in Austin.
what is a secure safety-critical app?
AI Overview.
A safety-critical application is a software program whose failure could
lead to death, injury, or significant damage. These applications
are designed to operate with extremely high reliability and undergo
rigorous testing and validation to minimize the risk of failure.
Here's a more detailed breakdown:
Key Characteristics of Safety-Critical Applications:
High Reliability:
Rigorous Testing and Validation:
Safety Standards Compliance:
Fail-Safe Design:
Secure Development Practices:
Examples of Safety-Critical Applications:
Avionics Systems:
Automotive Systems:
Medical Devices:
Nuclear Power Plants:
Industrial Automation:
The Importance of Security:
In addition to functional safety, security is also a critical aspect of
safety-critical applications. A security breach could potentially
compromise the safety functionality of the system, leading to
serious consequences. For example, a hacker could exploit a
vulnerability in a medical device to cause harm.
In essence, safety-critical applications are those where failures can
have severe consequences, and therefore, they require a
high degree of reliability, rigorous testing, and adherence to
safety standards, as well as robust security measures to
ensure safe and dependable operation.
r is running an OS concurrently with a secure safety-critical app a good idea?
AI Overview.
In general, running a secure safety-critical application concurrently with a
general-purpose operating system (OS) on the same system is
not recommended due to significant risks.
Here's why:
Security Vulnerabilities:
Loss of Determinism:
Reduced Safety Assurance:
Complexity:
Alternative approaches for safety-critical systems:
Proprietary, Single-Purpose OSes:
Virtualization/Hypervisors:
In summary: While you can run multiple OSes on a single system using
technologies like hypervisors, directly running a safety-critical application
concurrently with a general-purpose OS is generally discouraged due to
security and reliability concerns. The emphasis in safety-critical systems
is on robust safety features, real-time performance, and a highly controlled
environment, which are often not well-suited for general-purpose OSes.Latest Bcachefs Code Draws Torvalds' Ire Over Late Feature Code.____
The $20 "Cheap Yellow Display" is the best addition to my smart home in months.The United States wondered how China managed to make such progress____
in the field of electronic chips. Huawei and Xiaomi are the answer,
with massive development.
Is China's RISC-V Pivot Undermining Arm's Growth Prospects?. Microsoft just revealed a way to keep using Windows 10 until 2032.
Microsoft is removing legacy drivers from Windows Update.
Windows 11 migration heats up... on desktops.
Small businesses are using AI, but not spending much.
Microsoft to lay off thousands in July,
but don't worry, AI's getting $80 billion.Broadband Outage Reports: CenturyLink, Quantum Fiber, Brightspeed
Among Networks Down.
16 Billion Apple, Facebook, Google And Other Passwords Leaked
Act Now.
184 million passwords for Google, Microsoft, Facebook,
and more leaked in massive data breach.
___White House moves to keep costly, dirty, unneeded Michigan coal plants open.Try 1.
Thursday June 19, 2025 13:09
___AI Overview.
Directly writing machine language hex codes and compiling
them with GCC in a standard way is generally not how you
use a compiler like GCC. GCC is designed to compile
higher-level languages like C, C++, and Assembly language
into machine code.
Here's why and what you can do instead:
____Post fromLenovo N6000 128/256 Windows 11 aptop.
Revo uninstaller used to remove Onedrive, Edge, and other Microsoft products.
wifi internet donwload very fast. 1.2 gs!
____AI Overview.____
Whether software obfuscation and endless updates are "threatening
the future of computing" is a complex question with no simple answer.
Here's a breakdown of the key points to consider:
1. Software Obfuscation and Security:
2. The Need for Updates:
3. Potential Drawbacks of "Endless Updates":
4. Are We "Trapped in a Perpetual Cycle of Updates"?
In Conclusion:
Software obfuscation, by itself, is not inherently a threat to computing.
However, its use by malicious actors and its impact on the "software
understanding gap" are important considerations. Regular software
updates are necessary for security and functionality, but their
frequency and scale can be challenging for both developers and users.
The "endless updates" trend, a product of the dynamic nature of
software development, may raise concerns about development
efficiency, user experience, and the overall complexity of
software systems.
he impact of obfuscation and updates is a subject of ongoing
research and discussion in the cybersecurity community.
Godot 4.5 Beta Released With Better Wayland Support.
are there better choices than c++ for safety-critical apps?
AI Overview.
Yes, there are programming languages that are considered better
choices than C++ for developing safety-critical applications, primarily
due to their emphasis on safety and reliability features built into the
language design.
Here are some of the key languages and why they are often
favoredover C++ in safety-critical contexts:
Ada:
SPARK:
Rust:
Why C++ Can Be Problematic (Despite its Popularity): While
widely used, C and C++ were not originally designed with
safety as a core goal. Their flexibility can make it easier to
introduce bugs, and they can exhibit undefined behavior.
In Summary: Languages like Ada and SPARK are specifically
designed for safety-critical applications with built-in features
and verification capabilities. Rust is also a strong alternative
with its memory safety features. The best choice depends
on project needs and team expertise.
is c++ losing favor because of obfuscation costs and
deppendenacy certification issues.
AI Overview.
While concerns about memory safety and the challenges of ensuring
security in C++ code are well-documented, the idea that C++ is l
osing favor specifically due to obfuscation costs or dependency
certification issues is not clearly supported by the provided
search results.
Here's a breakdown of the information found:
Obfuscation in C++:
In summary, while C++ presents certain complexities and security
challenges, including memory safety concerns, there's no strong
evidence to suggest that it's losing favor due to obfuscation
costs or dependency certification issues. The language
continues to be widely used and remains relevant in
various industries.
AI Overview.
The TIOBE index is a measure of the popularity of programming l
anguages, published monthly by the company TIOBE. It's based
on the number of search engine results for queries containing
a specific language, and is used to gauge the relative usage
and demand for different programming languages in the
software development industry.
Here's a more detailed explanation:New Linux Flaws Enable Full Root Access via PAM and Udisks____
Across Major Distributions.
How you can get Microsoft 365 (formerly Office) for free
- 3 easy ways.600MW data center campus proposed in Montana.____Meta's Scale AI deal has clients like Google halting projects,
contractors scrambling, and one investor bailing out.
One of ChatGPT's popular uses just got
skewered by Stanford researchers.____ First Solar Scales U.S. Manufacturing to Meet Rising Demand.Try 1.
Plan to remove 34 turbines from Highland wind farm.
The Wrong Way to Build a Nuclear Renaissance.
Wednesday June 18, 2025 19:44
____ZPUI Could Be Your Tiny Embedded GUI.____Charted: Future Electricity Usage by Country.
____$3.50 nanoCH57x CH570/CH572 RISC-V development board
offers USB-C port, 2.4GHz radio/BLE, and GPIO.
____Nvidia Goes Nuclear, Investing in Bill Gates Start-Up.
I always disable this one feature in every UEFI / BIOS.
____AI Overview.
To load and run a GCC C application on a Windows 11 laptop without having to use Windows 11,
you can either install MinGW (a Windows-based GCC distribution) or use a virtual machine with
a Linux distribution that includes GCC. Alternatively, you can use WSL (Windows Subsystem for
Linux) to run Linux alongside Windows.
Here's a more detailed explanation:
1. MinGW (Minimalist GNU for Windows):
2. Virtual Machine:
3. WSL (Windows Subsystem for Linux):
4. Other Options:
Zig Compiler:
MSYS2:
AI Factories Are Hungry for Power. Expect Gigawatt-Scale Growth.
how does u-boot work?
AI Overview.
U-Boot, short for Universal Boot Loader, is a versatile open-source bootloader primarily used
in embedded systems. It acts as the bridge between the hardware and the operating system, i
nitializing the system and loading the OS into memory. U-Boot performs hardware initialization,
loads the kernel and other necessary components like the device tree, and then transfers
control to the operating system.
Here's a more detailed breakdown:
1. Hardware Initialization:
2. Loading the Operating System:
3. Transferring Control to the Kernel:
4. Command-Line Interface (CLI):
5. Script Support:
In essence, U-Boot acts as a smart intermediary, taking the raw hardware and preparing it for
the operating system. Its flexibility and features make it a crucial component in the boot process
of many embedded systems.
This video provides a tutorial on the embedded bootloader U-boot:
____are "hardware compatibility " issues driving sofware writers'____
to support as many sofware versios as their are hardware versions?
AI Overview.
Yes, hardware compatibility issues can significantly impact software developers'
efforts to support different software versions, but it's not a direct one-to-one
relationship where every hardware version demands a separate software
version.
Here's why: [!!!] [Nvidia, Intel, AMD expense issue?]
Indian RISC-V Startup Slashes Design Time to Minutes.
NVIDIA to launch GeForce RTX 5090DD for Chinese market
with GB202-240 GPU and 24GB memory.
Microsoft study finds "infinite workday" is hurting productivity.
Visualized: How Many New Businesses Survive 10 Years?.
why is it important to have more than one windows 10 or 11 laptop?
AI Overview.
Having multiple Windows 10 or 11 laptops can be beneficial for various reasons,
including having a backup device, testing new features, or using different operating
systems for specific tasks. Dual-booting, which allows you to have both
Windows 10 and 11 on the same machine, offers similar advantages without needing
a second physical laptop.
Here's a more detailed look at the benefits:
Testing and Experimentation:AI Overview.
No, Windows 2000 was not the first operating system to use
ring 0 software, nor was it the first to expose it to a mass audience.
Here's a breakdown:
Ring 0 is a concept in operating system architecture. It represents the
highest level of system resource access, where the operating
system kernel functions.
Operating systems have utilized privileged access, similar to ring 0,
for many years, predating Windows 2000. The division between
privileged (kernel) and unprivileged (user) modes is a fundamental
aspect of modern operating systems.
The Windows 9x series (including Windows 95, 98, and Me), which
came before Windows 2000, also used ring 0 code, although their
architecture was a hybrid 16/32-bit system.
Windows 2000, based on the NT codebase, also used ring 0
for its kernel and core components, offering unrestricted access
to hardware and system resources.
The NT-based Windows operating systems (including Windows 2000
and later versions like Windows XP) are known for their kernel mode
drivers (Ring 0) and the security risks associated with them.
Thus, while Windows 2000 improved the Windows NT architecture
and security features, it did not introduce the concept of ring 0
software to the masses.
AI Overview.
No, when a user-mode application (running in ring 3) in
Windows 2000 attempts to execute a protected instruction
requiring a higher privilege level (like ring 0), Windows
2000 does not simply close the app window without an
error message. Instead, it will typically trigger a privilege
violation exception.
Here's why:
AI Overview.
No, the statement is not revision specific. It's a fundamental
aspect of operating system architecture, specifically how
Windows 2000 handles exceptions and privileged instructions,
regardless of its specific version or service pack.
Here's why:
AI Overview.
Can a User Fix a Windows 2000 Ring 0 Writer's Software Bug?
Generally, a regular user is unable to directly fix a Windows 2000
Ring 0 writer's software bug. Ring 0, also known as the kernel mode,
is the most privileged protection ring in the operating system.
It holds the core of the OS and interacts directly with the hardware.
Here's why users can't directly fix these bugs:
Privilege Level: Ring 0 code has full system privileges and direct access
to hardware. This is necessary for the OS to function properly, but also
makes it highly sensitive to modifications.
However, a user can take these steps to address Ring 0 issues:
Apply Windows Updates: Microsoft released service packs and security
updates for Windows 2000 that addressed many bugs, including those
affecting the kernel. Make sure your Windows 2000 installation is fully updated.
Are windows uppdates buggy?
AI Overview.
Yes, Windows updates can sometimes be buggy. While updates are
crucial for security and performance, Microsoft has faced criticism
for releasing updates that introduce new issues or break existing
functionality. These bugs can range from minor annoyances to major
problems like system crashes or boot failures.
Here's a more detailed look:
Hardware Compatibility:
Windows supports a vast range of hardware, making it challenging to ensure compatibility with every update.
AI Overview.
Yes, you can attempt to repair missing interrupt errors in Windows 2000,
as they are often related to driver or hardware conflicts that can be
addressed through troubleshooting.
Here's a breakdown of how to approach this problem in Windows 2000,
drawing on information from
the search results:____ Try 5.
Key Points:
Led by China's Growth, Offshore Wind Capacity Will Hit 100 GW by 2026.
Children born now may live in a world where the US
can only produce half as much of its key food crops.
Tuesday June 17, 2025 16:48
____are backdoors planted at ring 0?
AI Overview.
Yes, backdoors can be planted at Ring 0, also known as the kernel mode, which is the
most privileged level of an operating system.
Here's why and how it happens:
In summary, backdoors can be planted at Ring 0, and because of the high level of privilege at this
level, such backdoors are particularly dangerous as they can bypass security mechanisms,
maintain persistence, and gain complete control over the system.
is the linux kernel the same as ring 0 software?
AI Overview.
No, the Linux kernel is not exactly the same as ring 0 software, but they are very closely related.
The Linux kernel primarily runs in ring 0 (the most privileged execution mode on x86 processors).
However, "ring 0 software" can refer to any code running in that privileged mode, not just the
kernel. While the kernel uses ring 0, other software, like certain drivers, can also run in ring 0.
Here's a more detailed explanation:
Pro-Israel hackers claim cyberattack on Iranian bank.
do hack attacks frequencly involve ring 0 software?
AI Overview.
Yes, hack attacks frequently involve or attempt to gain access to Ring 0 software,
particularly the operating system kernel and its associated components like drivers.
Why hackers target Ring 0:
In summary, due to the immense power and control it offers, Ring 0 is a prime target
for attackers seeking to compromise systems and evade security measures. The sophistication
of these attacks continues to evolve, making kernel-level security a critical focus for both
security professionals and the development of new operating system features.
____ESP32-C61-DevKitC-1 development board features ESP32-C61____
low-cost WiFi 6 and Bluetooth LE 5.0 SoC.Windows 11s emergency June update causes even more bugs and chaos.____is there 3 a shared memory way to pass data from ring 0 to 3 in addition to 1 DeviceIoControl 2 Cloud way in Windows 10 ad 11?____
AI Overview.
Yes, in addition to DeviceIoControl and "cloud-based" methods, there are
other ways to pass data from Ring 0 (kernel mode) to Ring 3 (user
mode) in Windows 10 and 11, specifically through shared memory.
Here's how shared memory is used for this purpose:
are the intel n6000 and ryzen 7 7730 low power 8 bit platforms
as well as 16, 32, and 64 bit platforms?
AI Overview.
Both the Intel N6000 and the AMD Ryzen 7 7730U are designed as low-power processors.
Intel N6000: It has a default TDP (Thermal Design Power) of 6W,
making it suitable for passively cooled devices like tablets, laptops, and mini-PCs.
AMD Ryzen 7 7730U: It has a TDP of 15W, indicating it consumes relatively
little energy.
Regarding bit platforms:
Both processors primarily operate on 64-bit architectures. This is the standard
for modern processors designed for general-purpose computing. While they
support operations on smaller data sizes (like 8-bit, 16-bit, and 32-bit),
they are optimized for and function within a 64-bit environment.
In summary:
Low power: Yes, both processors are designed for low power consumption.
8-bit platform: No, neither is an 8-bit platform. They are primarily 64-bit processors, supporting smaller data sizes for compatibility and certain operations.
16, 32, and 64-bit platforms: Yes, they support operations on 16, 32, and 64-bit data as part of their 64-bit architecture.
do the intel n6000 and ryzen 7 7730 both support 8 bit add with carry i
nstructions and other 8 instructions?
AI Overview.
Yes, both the Intel N6000 and the AMD Ryzen 7 7730U, being x86 architecture processors, support 8-bit ADD with carry (ADC) instructions, along with a
wide range of other 8-bit operations.
Explanation:
ADC Instruction: The ADC instruction (Add with Carry) specifically performs an
addition operation and includes the value of the carry flag (CF) in the result.
This is crucial for multi-byte arithmetic operations, allowing for the correct
handling of overflows.
In summary:
Intel N6000: As an x86 processor, it supports 8-bit instructions, including ADC.
AMD Ryzen 7 7730U: Also based on the x86 architecture (specifically Zen 3),
it includes support for 8-bit operations and instructions like ADC.
Therefore, you can expect both processors to handle 8-bit addition with carry,
as well as various other 8-bit instructions, as they are fundamental components
of the x86 instruction set architecture.
can a 64 bit multiply using add with carry written for a 8 bit platform also run on a Intel n6000 and AMD Ryzen 7 7730?
AI Overview.
Yes, a 64-bit multiply operation implemented using an "add with carry" routine
(designed for an 8-bit platform) can technically run on Intel N6000 and
AMD Ryzen 7 7730 processors, which are 64-bit processors.
Here's why:
In summary:
While the 8-bit add with carry method can be executed on these processors
because the underlying instructions are present, it's not the most efficient or
practical way to perform 64-bit multiplication on such powerful machines.
Modern 64-bit processors offer much better native support for 64-bit arithmetic operations.
Dive deeper in AI mode.
Allwinner H618.
Multithread Rating 653
Single Thread Rating 395
Clockspeed: 1.4 GHz
Cores: 4 Threads: 4
Oranage Pi zero 2W H618 hosstig Ubutu Chinaruns MUL53 accurately while consumerig ~<1 W ... and fast!
H618 uses an ARM Curtex A53 processor. :)
____Linux 6.17 Looks Like It Could Go Ahead And Make
SMP Support Unconditional.7 DOS games that have incredible modern remasters.____Intel will lay off 15% to 20% of its factory workers,____
memo says.Vandals cut fiber-optic lines, causing outage for Spectrum
Internet subscribers.
AT&T outage: Millions across US lose service as network goes dark.
Anubis Ransomware Encrypts and Wipes Files, Making
Recovery Impossible Even After Payment.
TP-Link Router Flaw CVE-2023-33538 Under Active Exploit,
CISA Issues Immediate Alert.
____States, ratepayer advocates urge FERC to reject MISO petitionTry 1.
to limit market monitor oversight.
Nuclear-Related Stocks Surge.
This Stock Has Soared 195% Since Sam Altman Left.
Monday June 16, 2025 16:06
____Luckfox Lyra Zero W is a small Rockchip RK3506B SBC with MIPI DSI connector,____
WiFi 6 and Bluetooth 5.2.
Tesla confirms massive hardware change for autonomy improvement.
Mapped: The Biggest Tech Talent Hubs in the World.
Uniwill Laptop Driver Proposed For Linux To Enable Additional Features.
is there a fig forth for the 1802
AI Overview.
Mystery 1802 Computer Was A Homebrew Project | Hackaday Yes, there
is a FIG-Forth implementation specifically for the RCA 1802 microprocessor.
The FIG-Forth Manual provides detailed documentation on its design, implementation,
and how it works with the 1802. This manual includes information on how to test
and replicate the FIG-Forth implementation on hardware, like the Lattice board,
which includes the necessary hardware. Furthermore, a document from the
Forth Interest Group details a specific version of FIG-Forth for the 1802,
including its assembly, start-up constants, disk buffer sizes, and UART configuration.
is there a fig forth for the 6502/
AI Overview.
Yes, there is a fig-Forth implementation specifically for the 6502 processor.
The Forth Interest Group (FIG) released a version of their fig-Forth system
for the 6502, including assembly source code. This implementation was
designed to be relatively easy to port to different 6502-based systems,
with the main differences being in the input/output routines.
Here's a more detailed breakdown:
is there a fig forth for the 8051 family?
AI Overview.
Yes, there is a FIG-Forth implementation for the 8051 microcontroller family. William H. Payne's book provides a complete "kit" for building an 8051 Forth system, including a metacompiler for the IBM PC. This FIG-Forth version is designed to map well onto the 8051's architecture.
Here's a more detailed explanation:
Is there a FIG forth for various 8080 platforms?
AI Overview.
Yes, there was a FIG-Forth implementation for the Intel 8080 processor. The Forth Interest Group (FIG)
released a version of FIG-Forth specifically for the 8080, which was later integrated with the CP/M
operating system. This implementation allowed users to run Forth on various 8080-based systems,
including those using CP/M.
Here's a more detailed breakdown:
Barry Werger Barry Werger ·
Why were the 16 bit computers so much more powerful than the 8 bit computers?
Having been computing in this era, Ill give a slightly different answer. Most 8-bit processors were very
limited in ways beyond the bus/register sizes. And specifically, they were very limited in ADDRESSING MODES.
they could not support many basic operating system features such as re-entrant code because of this.
The Motorola 6809 was considered one of the peak 8-bit processors, to the point that it was sometimes
referred to as an 8/16 bit processor. This manifested in obvious ways, such as a multiply and divide
instructions that grouped two 8-bit registers together to provide 16 bit operands (for division) or
results (for multiplication). But more importantly, it supported (uniquely in the 8-bit world, or at least rarely)
complex addressing modes that involved 16-bit pointer arithmetic. Specifically, this allowed reentrant
code that enabled pretty much all the advanced OS features of the time OS-9, a popular OS for the 6809,
was basically Unix running on an 8-(ish)-bit processor. This made, for example, the cheap and
childishly-marketed TRS-80 Color Computer a real sleeper powerhouse in many non-mainstream
applications. OS-9 and other 6809 OSes were the standard for many real-time applications, and i
n many cases this remains the situation today, all because of the OS features enabled by the complex
addressing modes. so, in addition to the size of the busses and registers, what sets the 16-bit generation
of processors apart from the 8-bit generation is that pretty much all of them included the more advanced
addressing modes that enabled modern OS features, vastly enhancing capabilities to the point that they
could soon compete with minicomputers, and became the primary locus of software development and
deployment.
5.8K views View 41 upvotes View 1 share.
Update Windows Now Microsoft Confirms System Takeover Danger.Intel Nova Lake.
Intel Core Ultra 9 185H.
Multithread Rating 29425
Single Thread Rating 3699
Typical TDP: 45 W
TDP Down: 35 W :)?
AMD EPYC 9124.
Typical TDP: 200 W. :(--
____iis commerical jet flight control software a safety-critical app?___
AI Overview.
Yes, commercial jet flight control software is absolutely a safety-critical application.
Its failure could lead to catastrophic consequences, including loss of life, significant
property damage, or environmental harm.
Elaboration:
does Linux Alpine have protected-mode instructions?
AI Overview. T
he protected mode in the x86 architecture LeftAsExercise Yes, Alpine Linux
utilizes protected mode on architectures that support it (like x86-64). It's
a fundamental part of how modern operating systems, including Linux
distributions, manage memory and access control. Alpine Linux, being a
general-purpose operating system, leverages protected mode to
isolate processes, manage memory allocation, and implement security features.
Here's a more detailed explanation:
does Linux Kali have protected-mode instructions?
AI Overview.
Yes, Kali Linux, being a standard Linux distribution, utilizes protected mode
in its operation. Protected mode is the standard operational mode for
modern x86-compatible CPUs, including those used by Kali Linux, and
is crucial for its functionality.
Here's why:
does ubuntu core have protected-mode instructions?
AI Overview.
Yes, Ubuntu Core utilizes protected mode for its kernel and applications.
It leverages the security features provided by protected mode, such as
memory protection and privilege levels, to ensure a secure and stable
environment for embedded systems and IoT devices.
Here's a breakdown:
is there a second method other than deviceiocontrol for transmitting
data from protected ring o to app ring 3?
AI Overview.
Yes, there is another method for Ring devices to transmit data to the Ring app
beyond DeviceIoControl. Ring devices primarily communicate with the Ring
app through cloud-based services. This means that when a Rin
g doorbell button is pressed, or motion is detected, the device sends this
information to Ring's servers. The app then retrieves this data from the cloud, r
ather than directly from the device.
Here's a more detailed breakdown:
is there a differnec in code between copy/paste and drag and drop
in windows 10 and 11?
AI Overview.
While the user experience of "copy/paste" and "drag and drop" in Windows 10 and 11
is similar, there are some subtle differences in the underlying mechanisms and how
they handle file operations, especially regarding the default behavior for moving
vs. copying.
User Experience:
are ring 0 windows device drivers written in c++?
AI Overview.
While modern Windows device drivers can be written in C++, they are often written
in C due to historical reasons and the need for strict resource management and
portability. C++ was officially supported for most drivers starting with Windows 8,
but even then, a subset of C++ functionality is generally used, according to OSR
Online.
Here's a more detailed explanation:The Latest X.Org Server Activity Are A Lot Of Code Reverts.____AI race between US and China resembles Cold War Marc Andreessen.____We're done" - major government organization
slams Microsoft Teams as it drops Windows for good.
Try 1.
Sunday June 15, 2025 08:43
____does DeviceIoControl still exist in windows 10 and 11?___
AI Overview.
Yes, the DeviceIoControl function, used for direct device input and output
control in Windows, still exists in Windows 10 and 11. It provides a general-purpose
interface for applications to interact with device drivers through control codes.
DeviceIoControl is a fundamental part of the Windows API and is used in a wide
range of applications that need to communicate directly with hardware or devices.
It allows for sending specific commands and receiving data from device drivers,
enabling low-level control and interaction with hardware components.
Key points about DeviceIoControl:
do linux distros support protected mode instructions?
AI Overview.
Yes, all modern Linux distributions support and rely on protected mode.
Protected mode is the standard operating mode for the x86 architecture
used by virtually all modern operating systems, including Linux distributions.
Explanation:
is there an 386+ OS that allows execution of all x86 instructions?
AI Overview.
Yes, operating systems like Windows 95, Windows 98, and modern Linux
distributions (with a 32-bit kernel) can execute all x86 instructions, including
those introduced with the Intel 386 processor and later. These operating s
ystems leverage the 32-bit protected mode capabilities of the 386 and subsequent
processors to run a wide range of applications, including those designed for
earlier 16-bit processors like the 8086 and 80286.
Here's why:The Tech Job Meltdown (professoraxelrod.com).
____Stop These Things Weekly Round Up: 15 June 2025.Try 3.
Saturday June 14, 2025 07:22
____do sata memories use DMA in windows?___
AI Overview.
Direct Memory Access (DMA): Working, Principles, and ... Yes, SATA (Serial ATA) memory
(storage devices like SSDs and HDDs) in Windows always uses Direct Memory Access (DMA). This means that data transfer between the SATA device and your computer's memory happens
directly, without needing constant intervention from the CPU.
Here's why:
SATA inherently uses DMA:
Intel preparing budget Core 5 120F 6-core CPU featuring only P-cores.
Intel Core 5 120U.
Multithread Rating 17120
Single Thread Rating 3758
Typical TDP: 15 W
TDP Down: 12 W
Cassette Data Storage From The 1970s.Ranked: The 50 Richest Countries by GDP Per Capita in 2025.
Try 2.
Friday June 13, 2025 19:42
____The cloud broke Thursday and it'll happen again
- how to protect your business before then.
Bcachefs Is Now Able To Auto-Fix A Few More Fsck Errors.
3 reasons I'll never trust an SSD for long-term data storage.
____AI Overview.____
Using DMA for data transfer can significantly increase speed compared
to not using DMA, especially in applications with high data transfer rates
or where the CPU needs to be free for other tasks. DMA eliminates
CPU involvement in data transfers, allowing the CPU to perform other
operations while the DMA controller handles the transfer, leading
to faster data processing and potentially a more responsive system.
Here's a breakdown of the speed improvements: CPU-Free Data Transfer:
how to ensure that windows is using dma transfersi?
AI Overview.
To ensure Windows is using Direct Memory Access (DMA) for data transfers,
you need to verify that DMA is enabled for the relevant hardware devices.
This is typically done through Device Manager. You'll need to navigate
to the specific device (e.g., IDE ATA/ATAPI controllers) and its properties,
then check the "Advanced Settings" or similar tab to enable DMA.
Here's a more detailed breakdown:
AI Overview.
To enable DMA (Direct Memory Access) in your system, you can typically do so
through your computer's BIOS or by using a software utility like Device Manager.
In Device Manager, navigate to the specific device for which you want to enable
DMA and change the "Current Transfer Mode" to "DMA if Available".
Here's a more detailed breakdown:Ryzen 5 5500X3D stealthily unveiled as AMD's newest Zen 3___
desktop offering.
AMD Ryzen 5 5600X3D.
Typical TDP: 105 W.
Multithread Rating 21879
Single Thread Rating 3187
AMD Ryzen 7 7730U.
Typical TDP: 15 W
Google Cloud outages: Spotify, Discord, Snapchat
and more were down for hours.9999999
Cloudflare Blames Google Cloud For Mass Services Outages.
Is Meta really spending $15 billion to hire a 28-year-old?.____ China Leaves West in the Dust: Its Small Nuclear Reactor Leap____
Puts Beijing Years Ahead in the Future of Clean Energy.
China solar industry to address overcapacity challenge but turnaround far off,
experts say.Worker dies in wind turbine after climbing device accident.Try 1.
Amazon joins the big nuclear party, buying 1.92 GW for AWS.
Wednsday June 11, 2025 17:22
___Quantum Tiny Linux SBC features an Allwinner H3 SoC, WiFi,
a small Display, and more. CPU Quad-core Cortex-A7 @ 1GHz. :)
____Talen to sell Amazon 1.9 GW from Susquehanna nuclear plant.____
Fine-tuning LLMs is a waste of time (codinginterviewsmadesimple.substack.com).
mean: does windows 11 run slower on new inexpensive computers?
Yes, Windows 11 may run slower on new, inexpensive computers, especially those with limited RAM or storage. Windows 11 has higher system requirements than previous versions and can be resource-intensive. This means that if a computer doesn't meet these requirements, it may struggle to run Windows 11 smoothly.
Here's why:
Here's a more detailed explanation: Higher System Requirements:how is tdp computed?___
AI Overview.
CPU TDP (Thermal Design Power) Explained In computer hardware,
Thermal Design Power (TDP) is a measure of the maximum amount
of heat a component, like a CPU or GPU, can dissipate under normal
operating conditions. It's usually expressed in watts and indicates the
component's cooling requirements and power consumption. TDP is
not the same as actual power consumption, but rather the maximum
heat the component needs to be cooled away.
Here's a more detailed explanation:
AI Overview.
Yes, a Lenovo laptop running Windows 10 or Windows 11 can pause updates for
up to 35 days, regardless of whether Microsoft requires an update at the time of pausing.
After that period, the system will resume automatically installing updates.
Explanation:Ubuntu Server Weighing Tmux vs. Screen, Wget vs. Cur.
____Bipolar Uranium Extraction From Seawater With Ultra-Low Cell Voltage.Try 2.
Tuesday June 10, 2025 18:59
____Google Offers Buyouts to Employees in Search and Ads, Other Units
____has microsoft recently limited pause updates for only one day?
AI Overview.
No, Microsoft has not recently limited pause updates for only one day.
The ability to pause updates for up to 35 days still exists in Windows
10 and 11. You can pause updates in Windows Update settings for
up to 35 days, but after that, you'll need to install the latest updates
before you can pause them again.
AI Overview.
New operating systems often don't work well on older hardware
because newer OS versions require newer hardware features and
capabilities, and older hardware lacks the necessary components.
Additionally, newer OS versions may not include drivers for older
hardware, or the new OS may not be compatible with the
specific hardware configuration.
Here's a more detailed explanation:.
AMD Preps Linux Support For User CPUID Faulting.
In conclusion, while the specific names "8051" and "Forth" might not be used, the Soviet Union definitely
utilized similar technologies and programming concepts in their weapons systems. They probably developed
their own microcontroller designs and stack-based programming languages for embedded control purposes.
____The GeeFarce 5027 POS is a PC disguised as a graphics card.____IBM just took a 'significant' step toward useful quantum computing.____
Meta launching AI superintelligence lab with nine-figure pay push,
reports say.
The Ongoing BcacheFS Filesystem Stability Controversy.Samsung Galaxy S25 series camera ring issue sparks concerns.
____Dead and gone: Trump's most hated offshore wind farm pulls the plug.Try 2.
EconomyRanked: Top Countries by Annual Electricity Production (19852024).
Monday June 9, 2025 16:19
____
AI Overview.
Yes, in general, adding more cores to a CPU significantly improves multitasking performance
but has a more limited impact on single-task performance. While a multi-core CPU can still
perform single-core tasks, the primary benefit of more cores is the ability to handle multiple
tasks concurrently.
Elaboration:.
Intel Celeron N4020 @ 1.10GHz
Multithread Rating 1545
Single Thread Rating 1137
Typical TDP: 6 W
Intel Pentium Silver N6000 @ 1.10GHz
Multithread Rating 3000
Single Thread Rating 1393
Typical TDP: 6 W
Both ~$119=130 Asus and Lenovo. Best Buy and Walmart.
____AI Overview.
The highest reported clock speed for a RISC-V processor is 5 GHz. This was achieved by
Micro Magic, who demonstrated a 64-bit RISC-V core operating at 5 GHz with a CoreMark
score of 13,000 while consuming only 1 Watt of power. Additionally, the same core has
been demonstrated to operate at 3 GHz with 8,000 CoreMarks, while consuming less than 70mW,
according to EETimes.
AI Overview.
The ESP32-C3 RISC-V core can operate at a maximum clock speed of 160 MHz.
The ESP32-P4, a high-performance SoC, features a dual-core RISC-V CPU that can run
up to 400 MHz, according to Espressif. The ESP32-C5, another RISC-V MCU, can also
reach a clock speed of 240 MHz.
AMD EPYC 4345P 8-Core CPU Performance.
AMD EPYC 4345P:
Multithread Rating 37671
Single Thread Rating 4672
Typical TDP: 65 W
Rtzen 7 7730:
Multithread Rating 18127
Single Thread Rating 3014
Typical TDP: 15 W
AMD Ryzen 7 5800HS:
Multithread Rating 19736
Single Thread Rating 2994
Typical TDP: 35 W
____Solar Bankruptcies Show US Clean Energy Industry Is Teetering on the Brink.____
The USB-C dream is dead and its too late to revive it.
Amazon to spend $20 billion on data centers in Pennsylvania,
including one next to a nuclear power plant.9 Open Source Operating Systems That Aren't Linux.___
LoongArch Enables Multi-Core Scheduler Support In Linux 6.16.Nearly 25% of Americans are now functionally unemployed____
heres what that harsh reality really means.Microsoft quietly burying a massive Windows 7 hardware
driver feature as Windows 11 kills it.
\1
1 Lenovo Ryaen 7 4700U 8+0 core running Windows 10 1909 +20H2>? AND hOTmETAL for years
recently quit running Hotmetal and suffered other software damages.
2 Microsoft offered to Installl Winodws 11.
3 Offer accepted.
4 4700U performed so badly that it was ~unusable.
5 Windows 111 1909 reinstalled along with Hotmtal>
6 4700U now runs Hotmetal and runs faster than when ~22H2 instALLED.
7 uUpdate paused untilJune 1, 2025.
8
Google Chrome displayed a message at the botton that MIcrosoft Edge should be used.
9 Is Microsoft on its way to bankruptcy?
10 Microsoft message receuved us how bad Windows 11 us runnning on legacy hardware.
Intel
Celeron11
11 Message delivered is how good Windows 10 1909 works on legacy hardware
... including hp stream 13 9N3050 2/32 GB laptop. :)
AI Overview.
No, Microsoft will not continue to push Windows updates or security fixes on computers after
October 14, 2025, when Windows 10 support ends, even if updates are paused. The updates
will cease, and Microsoft will no longer provide technical assistance or security patches. However,
the computer will continue to function, according to Microsoft Support.
Explanation:
____West Virginia coal mine had 30 years of production left. It will close..Try 1.
Sunday June 8, 2025 10:17
____what is uobtainium?____
AI Overview.
Unobtanium is a term used to describe a material that is desirable for a particular
application but is incredibly difficult or impossible to obtain, often due to its rarity, cost,
or the fact that it's fictional. The term is often used humorously or in a hand-waving
manner when describing materials with highly desirable, yet unattainable, properties.
Elaboration:
what technologies allow Nvidia, Intel and AMD to bring new hardware
AI Overview.
Nvidia, Intel, and AMD utilize a combination of cutting-edge technologies and efficient
product development processes to accelerate their hardware product releases.
Key Technologies:
Modular Reference Architectures:
Leveraging platforms like NVIDIA's MGX allows system
builders to use reference designs and CPU host processor modules to reduce
development costs and slash development time. This reduces the need to build
every component from scratch for each product.
Rapid Prototyping and Iterative Design:
Employing rapid prototyping techniques, potentially involving 3D printing and additive
manufacturing, speeds up the process of concept creation, testing, and refinement.
This allows for the creation of multiple prototype variations quickly, facilitating quicker
realization of product concepts and speeding up design validation.
Advanced Semiconductor Packaging:
Technologies like 2.5D and 3D packaging allow multiple chips to be integrated into a single package,
sincreasing performance and power efficiency while reducing cost and complexity. This is essential
for high-performance computing (HPC) and AI applications, which require more sophisticated and capable microelectronic devices.
High-NA EUV Lithography: I
ntel's use of high-NA EUV in its 14A process, for example, allows for the creation of smaller
and more precise features, which increases transistor density and improves energy efficiency.
This technology is critical for pushing the boundaries of what's possible in chip design.
Specialized Accelerators:
Companies like Intel employ dedicated accelerators like Intel Quick Assist Technology (QAT),
Intel Dynamic Load Balancer (DLB), Intel In-Memory Analytics Accelerator (IAA), and Intel
Data Streaming Accelerator (DSA) to handle specific tasks and workloads efficiently.
Development Processes:
Streamlined Collaboration with Partners:
The companies leverage their global network of partners to speed up product development
and deployment. For example, NVIDIA's collaboration with cloud service providers like AWS,
Google Cloud, and Microsoft Azure enables developers to access and utilize NVIDIA GPUs
within those platforms.
Data-Driven Product Development:
This likely involves utilizing data analytics and insights to inform product design and
development decisions.
By combining these advanced technologies and efficient development practices, Nvidia,
Intel, and AMD can bring innovative hardware products to market more quickly than would
otherwise be possible.ChatGPT Patched A BIOS Binary, And It Worked.
____Stop These Things Weekly Round Up: 8 June 2025.Try 1.
Saturday June 7 2025 07:37 ____ which Linux distros are single taks OSs?____
AI Overview.
It seems there might be a misunderstanding in the wording of your question. "Single taks OS"
doesn't appear to be a recognized term in the context of Linux distributions. Linux distributions
are operating systems, and they are all "taks" in that they perform a variety of tasks, including
handling user interface, managing files, networking, and running applications. However, some Linux
distributions focus on specific tasks or use cases, and could be considered "more single-task" than
others in a broad sense.
For example:
Alpine Linux: .
This is a very lightweight distribution designed for resource-constrained environments and is
often used for server-side applications or embedded systems. While it does more than just
handle one task, it's optimized for efficiency and minimal resource usage.
Kali Linux: .
Known for its focus on penetration testing, ethical hacking, and cybersecurity,
Kali Linux is a single-task OS in the sense that its primary use case is to provide the tools
and environment for that specific purpose.
Ubuntu Core: .
s
A specialized version of Ubuntu designed for IoT (Internet of Things) devices,
it is focused on running applications on these embedded systems. It is important to note that
even "single-task" distributions can still be used for a variety of purposes.
U.S. Manufacturing by State: Who Gains Most from Made in America?.Top researchers leave Intel to build startup with the biggest, baddest CPU.AMD's Kernel Compute Driver "AMDKFD" Can Now Be Enabled On RISC-V.
AMD Radeon RX 9060 XT 8GB Review: Not Good,
Tesla AI VP Milan Kovac Resigns After 9 Years Leading FSD and Optimus Projects.
The Bellmac-32 CPU What?.
Americas Largest Defense Contractors. [certified softwar used?]
Over 7 million Americans are unemployed the most since 2017. Why it wont get better anytime soon.
____Indias Coal & Gas Decline Signals Accelerating Renewable Energy Transition.Try 1.
The NRC is conducting a special inspection at the Quad Cities nuclear plant. Here's why:.
Friday June 6, 2025 18:27
____Microsoft fights USB-C chaos on Windows 11 laptops with new label.____
Over 4 billion user records leaked in "largest breach ever"
- here's what you need to know.Intel Celeron N4020 dual-core mini PC
sells for $45 with 4GB RAM, 128GB eMMC flash.
~6 W?
AI Overview.
USB 3.2 Gen 2 Type-C Male to Type-A Male Cable USB 3.2 Type-C supports
several data transfer speeds: USB 3.2 Gen 1 (5 Gbps), Gen 2 (10 Gbps),
and Gen 2x2 (20 Gbps). The Gen 2x2 speed is achieved by using two
10 Gbps lanes, effectively doubling the bandwidth.
AI Overview.
Wi-Fi 5, also known as 802.11ac, offers a maximum theoretical speed of 3.5 Gbps.
In real-world scenarios, users are likely to experience speeds closer to 866 Mbps or
1733 Mbps, depending on their device and the router's capabilities. These speeds are
faster than Wi-Fi 4 (802.11n), which has a maximum theoretical speed of 600 Mbps.
AI Overview.
AMD Announces Radeon RX 9060 XT Graphics Card, Claims ... The AMD Radeon RX 9060 XT
typically consumes between 150W and 182W of power. It can reach boost clock
speeds of up to 3.1 GHz and is equipped with 32 RDNA 4 compute units, 32 RT
accelerators, and 64 AI accelerators. AMD recommends a 450W power supply for
systems using this GPU.
Next-gen E2 SSDs pack 1 petabyte of storage,
enough for 11,000 4K movies in a ruler-sized drive.
Intel vs AMD? Microsoft seemingly has a clear recommendation
for Windows 11 Pro PC upgrade
____Linux 6.16 NFS Client Exposes LOCALIO State Via sysfs.____Tesla seeks to block city of Austin from releasing records on robotaxi trial.
____Houston-based solar energy company Sunnova Energy announces mass layoffs.Try 2.
s
Thursday June 5, 2025 17:03
____Does PJM have a data center problem?.____
Proposed Alaska bitcoin mine would use as much power
as the states largest coal plant produces.
Data Centers Are Building Their Own Gas Power Plants in Texas.
FreeBSD Developers Deciding What To Do For WiFi With FreeBSD 15: Stable Or Unstable.
Corporate layoffs have ramped up in recent weeks. Here are the companies making cuts.how many gcc c x86 compiler issues are awaitig a fix?
AI Overview.
It's difficult to provide a precise number of outstanding GCC C x86 compiler issues
without accessing the bug tracking system directly. The number is constantly changing
as new issues are reported and old ones are fixed. However, here's what
can be said:
GCC is actively maintained:
The GNU Compiler Collection (GCC) uses a bug tracking system where issues are reported
and tracked. No exact number: While the bug tracking system exists, the exact number
of outstanding issues, especially for a specific combination like "C x86 compiler issues,"
might not be readily available in a public dashboard. Active development: New
versions of GCC are released +regularly, incorporating bug fixes and improvements.
Bug tracking:
The GNU Compiler Collection (GCC) uses a bug tracking system where issues are
reported and tracked.
No exact number:
While the bug tracking system exists, the exact number of outstanding issues, especially for a specific combination like "C x86 compiler issues," might not be readily available in a public dashboard.
Active development:
New versions of GCC are released regularly, incorporating bug fixes and improvements.
____A full Atari 8-bit computer has been____
recreated on a stamp-sized FPGA module.
Piko, Your ESP32 Powered Fitness Buddy.
Machine Code Isn't Scary (jimmyhmiller.com).
This compact Ryzen 7 mini PC with 32GB RAM is only $299 today.
which is better value a mini pc or a laptopo?
AI Overview.
Generally, a mini PC offers better value for money than a laptop, especially when
considering price-to-performance ratio. Mini PCs can provide comparable performance
to laptops at a lower cost, requiring only a monitor, keyboard, and mouse to be complete.
However, the decision depends on your needs, as laptops offer portability and
all-in-one convenience.
Rust-Based Redox OS Begins Implements X11
Support, GTK3 Port.
who is funding rust compier development and support?
AI Overview.
The Rust Foundation is the primary entity funding Rust compiler development
and support. It is a non-profit corporation with operational and funding responsibility
for the project's infrastructure. The Rust Foundation is supported by a wide range
of corporate sponsors, including companies like Microsoft, Google, Amazon, Meta,
and Huawei. In addition to these corporate sponsors, the Rust Foundation also receives
funding from the Community Grants Program, which supports individual and
organizational projects.
On February 8, 2021, the formation of the Rust Foundation was announced by five
founding companies: Amazon Web Services, Google, Huawei, Microsoft, and Mozilla.
The foundation, led by Shane Miller for its first two years, offered $20,000 grants
and other support for programmers working on major Rust features.
Ubuntu Developers Discuss The Difficult Issue Of Splitting Up Firmware Packages.
Is ChatGPT Plus still worth $20 when the free version packs so many premium features?.Trump's huge bill includes immediate gift
for layoff-ridden Bay Area tech.
____Chinas Coal Power Plant Approvals Rebound.Try 1.
NSA considers then disavows leadership reshuffle.
Wesnesday June 4, 2025 16:23
____proseifhgts appears to have been hit with malware attck.
With 51 reported deaths, how safe are Tesla's robotaxis?.
___Google search's AI overviews are awful, but here's a
browser extension that gets rid of them.
___Microsoft accused of tech extortion over Windows 10 support ending
in campaign to get people to upgrade to Linux.
what are the advantanges of using a laptopo as a desktop? AI Overview. Using a laptop as a primary desktop computer offers several advantages, primarily related to portability and efficiency. Laptops can be easily moved from one location to another, and they often take up less space than a traditional desktop. Additionally, laptops can be used for work or entertainment in locations without a dedicated desk. Here's a more detailed look at the advantages: ___ 10 nuclear stocks expected to rise as much as 94% after Meta-Constellation deal. Constellation Energy Stock Jumped on Meta Deal. Why It Didnt Last. AMD Radeon RX 9060 XT 16 GB review (XFX Swift). AI Overview. The RTX 5060 typically has a TDP (Thermal Design Power) of 145W. The RTX 5060 Ti, on the other hand, has a TDP of 180W. These cards use a single 8-pin power connector.
____
One UI 7.0 becomes shortest-lived One UI version.
Try 3.
Monday June 2, 2025 19:23
____Open-Source TPDE Can Compile Code 10-20x Faster Than LLVM.
How Stack Overflow's moderation system led to its own downfall.
____is software for a full self driving vehicle considered a safety-critical app?____
AI Overview.
Yes, software for a full self-driving vehicle is considered a safety-critical application.
The software directly controls the vehicle's movement and actions, making any
errors or malfunctions potentially dangerous to the vehicle occupants, other drivers,
and pedestrians.
Here's why:
Direct Control:
Potential for Harm:
Importance of Safety:
Evolving Standards:
Human-Machine Interaction:
Specific Standards and Certifications:
AI responses may include mistakes.
is software for a ffighter jet considered a safety-critical app?
AI Overview.
Yes, software for a fighter jet is definitely considered a safety-critical application. Fighter jet
software controls critical flight functions, and any software errors can have devastating consequences,
including loss of life. This necessitates rigorous development processes, testing, and certification
standards to ensure safety and reliability.
Here's why:
Critical Flight Functions:
High Stakes:
harm. Certification Standards:
Real-time Requirements:
Security Considerations:
AI responses may include mistakes.
do seemiconductors manufacturers bguild or just test to mil specs?
AI Overview.
Semiconductor manufacturers both build and test semiconductors to meet Mil-Specs (military specifications).
The process involves rigorous testing to ensure components meet specific reliability and performance standards,
and may involve the use of military test standards like MIL-STD-883 and MIL-STD-750.
Building:
Testing:
if haardware is changed on a safety-critical ceretifiied app, then is recertificatioin required?
AI Overview.
Yes, changing hardware in a safety-critical certified application typically requires recertification. The reason i
s that hardware changes can impact the safety features of the application, and a new certification is needed
to ensure the application still meets safety requirements after the hardware modifications.
Here's why:
recertification is often necessary:
does software certification of mil spec system require certification testing over full temperature range?
AI Overview.
Yes, software certification for a Mil-Spec (Military Specification) system typically requires testing over
the full temperature range specified in the MIL-STD-810 standard. This is because the software's functionality
and performance must be validated to ensure it can operate reliably under the environmental conditions
a Mil-Spec product is designed to endure.
Elaboration:Microsoft warns new Windows 11/10 installation ISO downloads____
must have this Defender update.
Windows 11 gets emergency KB5062170 patch to fix errors when installing recent updates.
NFS Server Supporting Larger I/O Block Size With Linux 6.16.Goodbye to 8,000 jobs IBM replaces workers with artificial intelligence,____
sparking a wave of global reactions.Moab UT.
Colmbia river looking east toward Hood River OR.
Motel room view, Hood River.
Astoria OR Trolley pulling electric generator.
____How much energy does AI really use? The answer is surprising - and a little complicated.Try 1.
Sunday June 1, 2025 18:56
____Googles latest AI Overview blunder is more proof AI still needs a reality check.
how many lines of code in which languages does apache server contain?
AI Overview.
The Apache HTTP Server has a codebase that contains approximately 1,650,453 lines of code,
primarily written in C. It also supports various server-side programming languages like Perl,
Python, Tcl, and PHP through compiled modules.
Here's a more detailed breakdown:
____Bill Gates publicly admits his biggest mistake,
a blunder that could have led to Microsofts bankruptcy.
OpenAI can stop pretending (theatlantic.com).
Nvidia: The Jensen Magic May Be Fading (Rating Downgrade).
Apparent Git Scripting Issue Raised Concerns Of Possible Malicious Linux Kernel Activity.
____The white-collar bloodbath is all part of the AI hype machine (cnn.com).
___Stop These Things Weekly Round Up: 1 June 2025.Try 1.
3 Stocks to Buy to Ride the Nuclear Power Renaissance.
____did taliban officials assert that us had no evidence that Osama bin Laden
was responsible for the 911 attacks?
AI Overview.
Yes, Taliban officials have asserted that the US had no evidence that Osama bin Laden
was responsible for the 9/11 attacks.
Specifically:
was the qaana massacre the reason for the 911 attacks?
AI Overview.
The Qana massacre was not the reason for the 9/11 attacks, but it was cited by Al-Qaeda
as a motivation for their actions and policies towards the United States.
Here's a more detailed explanation:
did author of A Pretext for War conclude that the qaana massacre the reason for the 911 attacks?
AI Overview.
No, the author of "A Pretext for War," James Bamford, does not claim that the Qaana massacre
was the reason for the 9/11 attacks. Bamford's book focuses on the Bush administration's alleged
misuse of intelligence and its response to the 9/11 attacks, arguing that it led to the invasion of Iraq.
The book criticizes the handling of intelligence, the justifications for the Iraq War, and the administration's
perceived failure to acknowledge the role of the Palestinian issue in fueling anti-American sentiment.
Bamford's book does not discuss the Qaana massacre in any way, focusing instead on the events
leading up to and following the 9/11 attacks and the subsequent political decisions made by the
Bush administration.
did khalid sheik mohammed mastermind the 911 attacks? Search instead for did ka=halid sheik
mohammed mastermind the 911 attacks?
An AI Overview is not available for this search.
Mohammed, the accused mastermind of the 9/11 terror attacks on the US, had been due
to plead guilty this week - more than 23 years after almost 3,000 people were killed in
what the US government has described as "the most egregious criminal act on American
soil in modern history".
why is khalid sheik mohammed being held by the us government?
AI Overview.
Khalid Sheikh Mohammed is being held at Guantanamo Bay by the US government
due to his alleged role in the 9/11 terrorist attacks. He is charged with conspiracy to
commit terrorism, attacking civilians and civilian objects, and other related offenses.
He has been identified as the "principal architect" of the 9/11 attacks in
the 9/11 Commission Report.
++:
Saturday May 31, 2025 16:25
____Anyone making a living from a paid API?.
Amazon Programmers Say What Happened After Turn to AI Was Dark.
Linux's Trusted Security Manager Sees First Updates In Over A Year.
should uncertified software be placed in safety-critical apps?
AI Overview.
No, uncertified software should not be used in safety-critical applications.
Safety-critical systems, like those in medical devices, aircraft, or nuclear power plants, require
the highest levels of reliability and dependability because a failure could lead to loss of life,
serious injury, or significant damage. Uncertified software lacks the rigorous testing, validation,
and verification processes that ensure it meets the stringent safety requirements of these applications.
Here's why:
Lack of Validation and Verification:
Potential for Errors and Failures:
Regulatory and Compliance Issues:
In essence, safety-critical systems require software that has been thoroughly vetted and
proven to be reliable and safe. Uncertified software does not meet these rigorous standards
and should not be used in these critical applications.
is "Yes, a single-task operating system can indeed load and run an Apache web server on an
ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking
operating system, and Apache can be run as a single process within it.? an ai hallucination?
AI Overview.
No, that statement is not an AI hallucination, but rather a bit misleading in the context of
RPiOS (Raspberry Pi OS). While RPiOS can run Apache, it's not a single-task operating system,
and it's not necessarily limited to running Apache as a single process.s
Here's a breakdown:
In essence, the statement is technically true in the abstract, but it oversimplifies the nature of
RPiOS and the typical use of Apache within it. RPiOS is designed for multitasking and running
multiple processes concurrently, including Apache as a web server process.
____Is "U.S. President Ronald Reagan informed the world on national television that the United States
was reading Libyan communications." true?
In conclusion, President Reagan did inform the public via a televised address about evidence
slinking Libya to terrorist activities, which stemmed from intercepted communications.
AI Overview.
Yes, the statement is generally true. In 1986, President Ronald Reagan publicly addressed the
nation regarding U.S. airstrikes against Libya and revealed the existence of evidence that the
U.S. had intercepted communications linking Libya to terrorist acts.
Here's why this statement is considered true:
____Forner IEEE software and Xoouter editor-in-chief.
____5 RISC-V SBCs that are worth using instead of a Raspberry Pi.
Try 2.
Friday May 30, 2025 17:09
____
AI Overview..
The term "hallucinate" can refer to two distinct concepts, depending on the context:
1. Human Hallucination:
2. AI Hallucination:
Radeon Software For Linux Dropping AMD's Proprietary OpenGL/Vulkan Drivers.
____Atum A3 Nano development board combines Agilex 3 FPGA
and USB-Blaster III programmer (Crowdfunding).
____how many dependencies does apache server have on___
the RPoiOS implementation?
AI Overview.
The Apache HTTP Server itself doesn't have a specific number of dependencies
strictly tied to the "rpiOS implementation". Here's why, and a breakdown of
what dependencies it does have:
Understanding the Layers
Apache's Core Dependencies.
Apache's dependencies are primarily related to:
Operating System Libraries:
It depends on libraries provided by the operating system (rpiOS in your case), such as:
Standard C Library (libc): Essential for basic functions.
Networking Libraries: For handling
network communication. Security Libraries: For SSL/TLS support, if enabled.
...
AI responses may include mistakes.
"AI Overview.
Yes, a single-task operating system can indeed load and run an Apache web server on an ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking operating system, and Apache can be run as a single process within it. " :) ?
Stack Overflows Plan to Survive the Age of AI.
for Can software maintenance costs at nvidia, intel and amd for high power consumption,
expensive, new hardware chips lead to bankruptcies?
AI Overview.
While high software maintenance costs, expensive hardware, and power consumption
issues could strain a company's finances, it's unlikely to be the sole cause of bankruptcy
for Nvidia, Intel, or AMD. These companies are large, global players with diverse r
evenue streams and extensive financial resources.
resources. Here's a more detailed breakdown:
Ask HN: What is the best LLM for consumer grade hardware?.
AI didnt kill Stack Overflow.Welcome to the age of cyber insecurity in business.____IcePI Zero: A Pi Zero For FPGA.
Forced E-Waste PCs And The Case Of Windows 11s Trusted Platform.
____Oklo vs. NuScale: Which Nuclear Startup Stock is the Better Player Now?.Try 2.
Nuclear Waste: An Integrated Disposal Plan Could Help DOE Complete Its
Cleanup Mission and Save Billions.
Thursday May 29, 2025 19:22
____Bring Back The BIOS! (To UEFI Systems, That Is).
AI Overview.
Mark Zuckerberg, while a Harvard dropout himself, has expressed concerns about
whether traditional college education is effectively preparing students for the
jobs of the future, especially in the tech industry. He believes that some universities
may not be keeping pace with the rapid changes in the labor market and the
growing demand for specific technical skills.
Here's a more detailed breakdown of his viewpoint:
____NuScale's bigger reactor design approved by Nuclear Regulatory Commission.
Trump's 'Consequential' Shift In Energy Policy Fuels Upgrades For These Nuclear Stocks.
Linux 6.16 Networking Brings Some Big Performance Improvements & OpenVPN Driver.
when will tax vernova reactor come online?
AI Overview.
The GE Vernova BWRX-300 reactor, planned to be built at the TVA's
Clinch River site in Oak Ridge, Tennessee, is expected to come online in l
ate 2032. This timeline is based on the multi-year federal permitting process
that TVA is currently working through. According to Seeking Alpha, the
application kicks off this process, with the reactor potentially providing power for
300,000 homes by that time according to Seeking Alpha.
____A Love Letter To Embedded Systems By V. Hunter Adams.____did NSA sponser a program to try to destory FIG Forth to try to
deny its use by NSA percievied enemies?
AI Overview.
Based on my current knowledge and search results, there's no evidence to suggest
that the NSA sponsored a program to destroy FIG Forth or deny its use by perceived enemies.
It's important to note that:
FIG Forth was a popular version of the Forth programming language, known for its
simplicity and efficiency. It was particularly favored in the 1970s and 1980s, finding use
in embedded systems and various applications.
The NSA (National Security Agency) is a US intelligence agency focused on signals intelligence
and information security. Their activities are often classified.
Lack of Evidence: There's no publicly available information or historical record that indicates
any NSA involvement in trying to undermine or destroy FIG Forth.
Conspiracy Theories: The i
dea of such a program might be a conspiracy theory due to the secrecy surrounding
NSA activities and the niche nature of FIG Forth.
Conclusion:
While the possibility of such a program cannot be completely ruled out, there's no
supporting evidence to suggest it existed. It's more likely that this is a
misunderstanding
or a unsubstantiated claim.
It's always recommended to rely on verified information and credible sources
when exploring such claims.
AI responses may include mistakes.
did nsa insert code in to crypro ag cyphering machines so that
nsa could read iranian messages?
AI Overview.
Yes, reports indicate that the NSA, in collaboration with the CIA and German intelligence,
inserted vulnerabilities into Crypto AG's encryption machines so that they could read
encrypted messages from numerous countries, including Iran. This was done through a j
oint operation called "Thesaurus" and later "Rubicon". The NSA, along with other
intelligence agencies, rigged Crypto AG's devices, including instruction manuals,
to make it easier to decrypt messages.
Oops, something went wrong.
how is the us know that Libya was responsible for the La Belle disco bombing?
AI Overview.
The US determined Libya was responsible for the La Belle disco bombing based on i
ntercepted communications and other intelligence gathered before and after
the attack. Specifically, U.S. intelligence sources had identified a high probability of a
terrorist act in Berlin and intercepted messages between Tripoli and the Libyan
Embassy in East Berlin that included orders for the operation and a report of
its successful outcome.
Here's a more detailed breakdown:
La Belle Discotheque Bombing.
____Windows 11 KB5058405 fails installs with 0xc0000098
as it breaks system CPU power driver.____ Why Cameco, Oklo, and NuScale Power Stocks All Popped Today.Try 5.
Wednesday May 28, 2025 07:23
____what language was wang basic written in?___
AI Overview.
Wang BASIC, a version of the BASIC programming language developed by Wang Laboratories
, was primarily written in Dartmouth BASIC. While it followed the original Dartmouth BASIC
syntax, it was implemented as an interpreter rather than a compile-and-go system.
Additionally, Wang BASIC was designed to be stored in ROM on the Wang 2200 machine,
which had implications for its implementation and performance.
In simpler terms: Wang BASIC was essentially a slightly modified version of the
standard BASIC language that was first created at Dartmouth College. It was
designed to run on Wang computers, and it followed the basic syntax of
the original Dartmouth BASIC.
was ibm pc a bad business decisio for ibm?
AI Overview.
The IBM PC was not a bad business decision for IBM, despite later struggles in the PC market.
While IBM's PC division eventually became a commodity business and was sold off, the initial
decision to enter the PC market with the IBM PC was a success that significantly i
mpacted
the industry.
Here's why:
what editor is best for ubuntu gcc c preogramming?
AI Overview.
For C programming with GCC on Ubuntu, Qt Creator and Visual Studio Code are
highly recommended. Qt Creator is a robust IDE with integrated debugging and GUI
layout tools. Visual Studio Code is a lightweight, versatile editor with extensive features
and a strong community, especially when used with the C/C++ extension.
are upgrades sometimes used to destroy a software product?
AI Overview.
Yes, software upgrades can sometimes unintentionally damage a product. While upgrades
are often intended to improve functionality, fix bugs, or enhance security, they can also
introduce new issues, compatibility problems, or even make a software product unusable.
Here's why upgrades can lead to damage:EXT4 For Linux 6.16 Brings A Change Yielding "Really Stupendous Performance".
Linux 6.16 Upstreams Support For Hardware-Wrapped Encryption Keys.
Linux 6.16 Merges A Fix For The Macintosh II.
What features you get with Google AI Pro and AI Ultra.
Is Google AI Mode better than regular Google Search? I tested both, and there's a clear winner.
Try 2.
Tuesday May 27, 2025 17:39
____does the gcc c inline assembler allow imserting hex codes in its insructions?
AI Overview.
Yes, the GCC C inline assembler allows inserting hexadecimal codes within assembly instructions.
Hexadecimal values can be directly used as immediate operands, and they can also be used
as addresses or within data definitions.
Using Hexadecimal Numbers in Inline Assembly:
____do all distros of linus run the gcc c compiler?
AI Overview.
No, not every Linux distribution includes the gcc C compiler by default. While many
distributions include GCC, it's not a universally guaranteed part of the core system.
Some distributions might have it installed as a default part of a development environment,
while others might require explicit installation via their package manager.
Elaboration:
is Broken Web The Coming Collapse of the Internet valid concern?
AI Overview.
Yes, "The Broken Web" is a valid concern, and the book by George Ure, "Broken Web:
The Coming Collapse of the Internet", explores this idea. While a complete collapse
of the internet is unlikely due to its decentralized nature and redundancy,
several factors contribute to the notion of a "broken web," including infrastructure
vulnerabilities, rising costs, and increased cybersecurity threats.
Here's a breakdown of the valid concerns:
While the internet is designed to be robust and resilient, the vulnerabilities outlined above
do raise valid concerns about its future and the potential for significant disruptions or
even a gradual decline in its functionality.
____does windows 10 1909 work on the nearlists windows 10 hardware
as well as on the lastest widows 11 laredwre?
AI Overview.
Yes, Windows 10 version 1909 can be installed on hardware that is compatible with the l
atest Windows 11. However, it is important to note that Windows 10 version 1909 has
reached its end-of-life and is no longer receiving security updates, according to
Microsoft. This means that continued use of this version exposes the device to
potential security vulnerabilities.
should a linux be installed before installing windows 10 1909 after a malware attack?
AI Overview.
No, installing Linux before reinstalling Windows 10 1909 after a malware attack
is not necessary and may even be counterproductive. A fresh install of Windows 10 1909
will effectively wipe out all existing files and software, including the malware, and restore
your system to a clean state.
Here's why:
do any data centers have idustrial tours for the public?
AI Overview.
While data centers generally don't offer open public tours due to security concerns,
some facilities do offer tours to prospective customers or interested parties.
These tours are often used for marketing and to showcase the facility's features.
did wang labs computers have an operating system like msdoes
purchased from seattle computer?
AI Overview.
No, Wang Laboratories computers did not typically use an operating system
like MS-DOS that was purchased from Seattle Computer Products. MS-DOS was
primarily associated with IBM PCs and compatibles. While Wang Laboratories did
create their own operating systems for their specific hardware, they were not
directly related to the operating system developed by SCP that Microsoft later purchased.
did wang labs software devwlopers have to use direct sector reads/writes?
AI Overview.
Yes, Wang Computer Systems WCS/15 technical documentation specifically mentions
that programmers could access diskette sectors directly using "Absolute Sector Addressing".
This allowed for creating a diskette operating system if desired, or for performing low-level
data manipulation with specific control information. Essentially, they could read and write
data on a per-sector basis.
was forth software technology used to develop wang basic?
AI Overview.
No, FORTH software technology was not used to develop Wang BASIC.
Here's why:
Wang BASIC's roots: Wang BASIC was primarily based on the original Dartmouth BASIC,
which was developed in the 1960s. It followed the Dartmouth BASIC syntax closely and
was implemented as an interpreter.
FORTH's distinct approach: FORTH, on the other hand,
is a very different type of programming language, known for its stack-based architecture and
extensibility. It's often considered a low-level, real-time oriented language, and was designed
for direct interaction with hardware.
Different purposes: Wang BASIC was aimed at providing
a user-friendly programming environment for general-purpose computing on Wang computers,
particularly in business and office settings. FORTH was developed for embedded systems,
real-time control, and other applications where close interaction with hardware is crucial.
In short: While both languages have their own unique history and applications, there's
no evidence suggesting that FORTH played a role in the development of Wang BASIC.
was wang labs reliance of basic a contributing facyot in its demise?
AI Overview.
While not solely responsible, Wang Laboratories' heavy reliance on proprietary hardware and software,
including its early focus on BASIC, was a significant contributing factor to its downfall. The company's
decision to concentrate on hardware and word processors, particularly in the face of rising PC competition,
ultimately proved to be a strategic misstep.
can a single task OS load an run apache server on a ARM platrorm like RPiOS does?
AI Overview.
Yes, a single-task operating system can indeed load and run an Apache web server on an ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking operating system, and Apache can be run as a single process within it.
Here's why and how:
Single-Task OS vs. Multitasking OS: While the term "single-task OS" might sound restrictive, the context here is important. RPiOS (and most modern Linux distributions) are multitasking, meaning they can manage multiple processes concurrently. However, you can configure Apache to run as a single process, essentially dedicating
all available resources to that task.
Running Apache on RPiOS:
Installation: You can easily install Apache on RPiOS using package managers like apt.
Configuration: Apache can be configured to listen on specific ports and handle different types of web content.
Performance: While a single-task configuration could potentially limit performance under heavy load,
it can be suitable for low-traffic or resource-constrained applications.
Try 4.
Sunday May 25, 2025 15:34
___does the gcc c inline assembler restrict whicih register it will compile and use obfuscation?
AI Overview Learn.
Yes, inline assembly in GCC does restrict the registers it uses and doesn't obfuscate the code.
It provides a way to embed assembly instructions within C/C++ code, but the compiler still
controls register allocation and must be informed about which registers are modified by
the inline assembly.
AI Overview Learn more Better inline asm for C++23? : r/cpp Yes, inline assembly in GCC does restrict the registers it uses and doesn't obfuscate the code. It provides a way to embed assembly instructions within C/C++ code, but the compiler still controls register allocation and must be informed about which registers are modified by the inline assembly.
Study with experiments of the gcc c x86 inline assembler of whether this is an obfuscated syntax
assembler. : "r" (a) ...
Ubuntu copying from terminal text to an exitor requires experimentation. :(
Assembly is followed by disassembly.
%eaxmov assembler issue?
____5 myths about PC BIOS updates you need to forget about.____
Linux 6.16 Features Include A Lot From Intel, NVIDIA Blackwell,
AMDGPU User Mode Queues.
9 Linux Distros I've Used Over 9 YearsRanked.The Market Is Setting Up For A Move (Technical Analysis).
Tesla having problems over Robotaxi ? NHTSA demands information on this key feature.
Try 2.
Saturday May 24, 2025 08:50
____
has there been an increases in microsoft malware attacks to damage old compters____
and prevent usedof legacy software?
AI Overview.
Yes, there has been a noted increase in Microsoft-targeted malware attacks, particularly
targeting legacy systems and software to cause damage or prevent use of older applications.
This is due to several factors, including the fact that many older systems are easier
to exploit because of outdated security measures and unpatched vulnerabilities,
and that they are often running legacy applications that are no longer supported
by their vendors.
Here's a more detailed breakdown:
is a university education required for successful hacking?
AI Overview.
While a university education in computer science, cybersecurity,
or a related field can be beneficial for a career in ethical hacking,
it's not strictly required for success. Many successful ethical hackers
have gained their skills through self-directed learning, certifications,
and hands-on experience.
Elaboration:
Is havung more th one windows 10 and 11 pcs with different
hardware congifurations a good idea?
AI Overview.
Yes, having multiple PCs with different hardware configurations and different
Windows versions (10 and 11) can be a good idea depending on your needs
and preferences. It allows for flexibility in how you use your computers,
like dedicated workstations for specific tasks or personal/professional use.
Here's a more detailed look at the pros and cons:
is a backup windows 10 laptop frequently needed to try to fix main laptop?
AI Overview.
Yes, frequently backing up your Windows 10 laptop is a good idea, especially when
troubleshooting or attempting to fix issues. A backup can help restore your system
to a known good state if repairs go wrong or if you need to revert to a previous
version of the operating system.
Here's why backing up is recommended:Mike Blumenkrantz Axes Old Mesa Code: Goodbye Gallium Nine.____Nvidia GeForce RTX 5060 Laptop Performance Preview -
Almost at the level of the RTX 5070 Laptop.
The chilling AI trend using reverse geolocation thats going viral.
Try 6.
Wednesday May 21, 2025 16:19
____Microsoft says 394,000 Windows computers infected by Lumma malware globally.
Coinbase says its data breach affects at least 69,000 customers.
____THE MOUSE LANGUAGE, RUNNING ON ARDUINO.____
WORKING ON OPEN-SOURCE HIGH-SPEED ETHERNET SWITCH.
Linux Scheduler Patches Aim To Address Performance Regression Since Last Year.
Fedora 43 Cleared To Ship With Wayland-Only GNOME.
Why Property Testing Finds Bugs Unit Testing Does Not (2021) (buttondown.com/hillelwayne).how did google ai get so good so fast?__
AI Overview.
Google's advancements in AI can be attributed to a combination of factors,
including pioneering research, vast data resources, powerful computing
infrastructure, and a strategic approach to AI development and deployment.
Alphabet Has A Good Chance Of Winning The AI Race.
Tech Workers Are Having an Even Harder Time Finding Work, Thanks to AI.
is software obfuscation taught at universities?
AI Overview.
Yes, software obfuscation techniques are indeed taught at universities,
particularly in cybersecurity, software engineering, and computer science
programs. Obfuscation is a key topic in understanding how to protect intellectual
property and prevent reverse engineering, making it relevant for professionals
in software development, security, and related fields.
Here's why and how it's taught:
Protection of Intellectual Property:
Security:
Understanding Reverse Engineering:
Software Engineering:
Cybersecurity:
how can gcc c be forced to compileAdd ith carry instead of Add?
AI Overview.
To explicitly control whether ADD or ADC (Add with Carry) instructions
are used in GCC C code, you can't directly force GCC to use ADC instead of ADD.
GCC, in general, optimizes C code and might choose the most efficient
instruction based on the target architecture and the specific context
of your code.
Is there an example of gcc c inline assembler code?
AI Overview.
Here's a simple example of inline assembly code in C using GCC:.
are software obfuscators going to find future employment more diffficult?
AI Overview .
It's difficult to definitively say whether software obfuscators will find future employment
more difficult, as the demand for obfuscation tools and services is complex and depends
on various factors, according to sources and the NDepend Blog. While obfuscation is still a
common practice for protecting intellectual property and securing applications, its
effectiveness is a topic of ongoing debate, according to the Communications of the ACM.
Here's a more detailed look at the factors involved:Red Hat Enterprise Linux 10.0 Formally Announced, Joined
By RISC-V Developer Preview.
____First US utility seeks permit for a small nuclear reactor.Try 1.
GE Vernova rises to all-time high as TVA applies to
build company's reactor.
Trump admin lifts hold on offshore wind farm, doesnt explain why.
Visualized: Global Carbon Emissions by Sector.
Chinas battery giant eyes world domination.
Tuesday May 20, 2025 15:55
____LibreOffice 25.8 Alpha 1 Released With Performance Optimizations.____
is the number of nonsingular binary matrices for given dimension known?
AI Overview.
Yes, it is known that the number of nonsingular binary matrices of a given dimension n
can be calculated using the General Linear Group GL(n, 2). The formula is derived
from the properties of finite fields and their invertible matrices.
why does the gcc c compiler sometimes stop compiling with no error message?
AI Overview.
GCC might stop compiling silently (without error messages) due to a few reasons,
often related to undefined behavior or linker issues. The linker might not detect type
mismatches or other problems, and the compiler might not issue warnings for every
instance of undefined behavior.
Reasons for Silent Compilation Failures:
Undefined Behavior:
Static Initialization Fiasco (C++):
...
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation.is disassembly study essential to discover___
what compiler writers are doing?
AI Overview.
Yes, studying disassembly is essential for discovering how compiler
writers approach code generation and optimization. By analyzing the
generated assembly code, one can gain insights into the compiler's
strategies and identify areas where it might be possible to improve
performance or achieve desired code behavior. This knowledge is
crucial for performance optimization, reverse engineering, and
understanding compiler behavior.
Here's why disassembly is important:
Understanding Compiler Choices:
Performance Optimization:
Reverse Engineering:
Compiler Verification:
IDA Pro and Ghidra:
what is IDA Pro?
AI Overview.
IDA Pro Introduction: SecPod Blog : IDA Pro (Interactive Disassembler Pro) is
a powerful, widely-used tool for reverse engineering and malware analysis.
It's essentially a disassembler that translates machine code into assembly
language, making it easier to understand how a program works at a low level.
IDA Pro also offers features like debugging and a decompiler, which can
translate assembly code into something resembling C source code,
further aiding in reverse engineering efforts.
what is Ghidra?
AI Overview.
Ghidra is a free and open-source software reverse engineering (SRE)
framework developed by the National Security Agency (NSA). It's a
suite of tools used to analyze compiled software, particularly
when the original source code is unavailable or inaccessible.
Ghidra allows users to disassemble, decompile, and analyze
code, providing insights into its functionality and structure.
does the x86 isa have too many rarely used instructions?
AI Overview.
Yes, the x86 ISA (instruction set architecture) does contain many instructions
that are rarely used in typical software applications. While the x86 ISA
offers a vast and complex set of instructions, not all of them are
frequently used, and some are even considered "fluff".
does a disassembler reveal dependencies?
AI Overview.
Yes, disassemblers can reveal some dependencies, but not all types.
Disassemblers primarily convert machine code into assembly language,
which can be used to identify imported functions and libraries. They can
also help in understanding how different sections of code relate to
each other. However, disassemblers don't inherently reveal all dependencies,
especially those that are not directly reflected in the assembly code.
Here's a more detailed breakdown:
should a software certification inspector certify accuracy of compiled code?
AI Overview.
A software certification inspector does not typically certify the accuracy of
compiled code directly. Their focus is on validating that the software meets
defined requirements and adheres to specific standards, including those
related to security, reliability, and performance. While they may review
the compiled code as part of their broader assessment, the primary goal
is not to verify the code's exact correctness at the compiled level.
Here's why and what they do instead:
Focus on requirements and standards:
Code review and validation:
Testing and validation:
Compliance:
Software Bill of Materials (SBOM) validation:US DOJ opens investigation into Coinbase's recent cyberattack.____
DDoSecrets publishes 410 GB of heap dumps,
hacked from TeleMessage (micahflee.com).Zero-click searches: Googles AI tools are____
the culmination of its hubris.Huawei launches first laptops using____
home-grown Harmony operating system.
Intel Adds OpenMP Multi-Threading To Its Speedy x86-simd-sort Library.
GitHub Launches Its Coding Agent.Alphabets Waymo wins approval to expa.nd____
driverless ride-hailing service to San Jose.TechnologyCharted: A Decade of Smartphone Production,
by Brand (2015-2024).
____Trump Loses Big Game Of Offshore Wind Chicken, Bigly.Try 1.
State of the solar industry as GOP eliminates homeowners tax credits.
Siemens Gamesa chief: 'still no orders' for relaunched 4.X wind turbine.
Monday May 19, 2025 19:12
____does a usb ssd drive wear out memory locations?
AI Overview.
Yes, USB SSD drives do experience memory location wear over time, though
they are typically much more durable than earlier flash memory technologies.
This wear is due to the nature of how flash memory, which is used in SSDs,
stores data. Each time a flash memory cell is written to or erased, it undergoes
a wear process. Over many program/erase cycles, the cells can degrade,
and this degradation can affect the drive's ability to retain data or its
performance.
___Microsoft employee disrupts Satya Nadellas keynote with Free Palestine protest.
Microsoft open sources a command-line text editor and more at Build.
The Windows Subsystem for Linux is now open source.
Tesla Robotaxi deemed a total failure by media
even though it hasnt been released.
____where can malware reside on a multitasking computer OS?____
AI Overview.
Malware on a multitasking operating system can reside in various locations,
including temporary folders, within other software, or even within the
OS kernel itself. It can also exploit vulnerabilities in legitimate software
or the OS to gain control over the computer's memory.
can malware computer penetration occur at the verilog silicon compiler level?
AI Overview.
While not a primary target, malware penetration can potentially occur at the
Verilog silicon compiler level, although it's a complex and less direct
attack vector compared to software vulnerabilities.
can uefi be elimiated with a direct boot into an app?
AI Overview.
No, UEFI cannot be completely eliminated by booting directly into an application.
UEFI is the firmware that manages the computer's boot process, and while it can be
configured to boot directly into a specific application, it is always involved in the
initial boot sequence. According to the National Security Agency, UEFI relies
on Secure Boot or vendor-specific boot protection solutions.
is uefi a ploy to force users into an OS?
AI Overview.
No, UEFI is not a ploy to force users into a specific OS. While Secure Boot, a UEFI
feature, can be used by manufacturers and operating system developers to
limit boot options, this is not inherent to UEFI itself. UEFI is a replacement for
the older BIOS system, offering various improvements like faster boot times,
better security features,
and support for larger drives.
how can a user boot directly into an app?
AI Overview.
To boot directly into an application, you need to replace the standard
Windows shell (typically Windows Explorer) with the application's
executable. This can be done by modifying the registry
key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
to point to the desired application. Alternatively, you can use a method
like shell:startup or schedule a task to launch the application upon login.
does a secure app need to be accountable of every bit in host computer?
AI Overview.
No, a secure app doesn't need to be accountable for every single bit on
the host computer. A secure app focuses on securing its own operations
and data, and while it might interact with the host computer's resources,
it's not typically responsible for the overall security of the entire system.
Instead, it relies on the host operating system and security mechanisms
to protect the host's resources.can eax and b\ebx be used without saving with the gcc c compiler?
AI Overview.
Yes, EAX, EBX, ECX, and EDX registers can be used without saving
their values with the GCC C compiler. These registers are considered "
caller-saved," meaning the function that calls another function is
responsible for preserving their values if they are needed after the call.
which registers in a gcc c subroutine do not have to be preserved?
AI Overview.
In a GCC C subroutine, registers designated as "caller-saved" or "caller-clobbered"
do not have to be preserved by the callee (the called function). These registers are
typically used for argument passing and temporary values and are considered safe
for modification by the called function without causing issues for the caller.
GCC knows which registers are used by the code it generates. It also requires
the user to inform it about register use in inline assembly through the clobbers
list, allowing the compiler to save those registers if necessary.
In the x86 architecture, the registers EAX, ECX, and EDX are typically
caller-saved, while other registers like EBX, EBP, and ESP are callee-saved.
____does a forth used for chaip interactive hardware debug__
just implement INTERPRET but not COMPILE?
AI Overview.
No, a Forth language implementation used for CHAI-P interactive
hardware debugging typically does implement both INTERPRET and
COMPILE, although it might prioritize interactive debugging and
experimentation by making the INTERPRET mode readily available and
potentially more optimized for this purpose.
Here's why:
interactive Debugging:
Forth's strength lies in its interactive nature, allowing for rapid
testing and experimentation. A Forth system used for hardware
debugging needs to allow the user to interact with the system,
define new "words" (functions), test them, and debug them on
the fly without needing to recompile the entire application.
This requires both INTERPRET to execute the commands
immediately and COMPILE to define new "words" for later use.
Compiler for Complex Applications:
While interactive debugging is a key feature, Forth can also
compile "words" into threaded code or even native code for
more complex applications or for testing more thoroughly.
Resource Constraints:
In some hardware debugging scenarios, resource constraints
(memory, processing power) may require a more efficient
COMPILE mode to generate faster-executing code.
Flexibility:
Forth's ability to compile and compile-to-machine-code
allows it to adapt to different hardware platforms
and applications.
is it best to use the gcc c compiler or some other language to
build a forth used for chip interactive hardware debug?
AI Overview.
For developing an interactive hardware debugging tool ("Fort" in this context),
using C with GCC (GNU Compiler Collection) is generally the best approach.
C's direct access to memory and low-level hardware control, coupled with
GCC's robust debugging support and widespread availability, makes it an
ideal choice for this task.
For interactive hardware debugging on chips, building a Forth implementation
using C or C++ compilers like GCC or Clang is generally considered the best
approach. While other languages could be used, C/C++ offers advantages
in portability, optimization, and integration with hardware debugging tools.
Alphabet Has A Good Chance Of Winning The AI Race.Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access.____StarPro64: Raspberry Pi alternative with powerful NPU and PCIe.____
Linux 6.15-rc7 Released With AMD Zen 6 CPU Identification,
New Intel & ARM Mitigations.
Debian 13 "Trixie" Now In Hard Freeze: MIPS64EL Demoted,
RISC-V 64-bit Promoted.
Ubuntu 25.04 Delivers Decisive Lead Over Fedora 42 For
Ampere Altra Performance.
"Rust is so good you can get paid $20k to make it as fast as C".NVIDIA Grows Quantum Computing Ecosystem With___
Taiwan Manufacturers and Supercomputing.
NVIDIA Powers Worlds Largest Quantum Research Supercomputer.
Nvidia Stock Falls. Whats Overshadowing Its AI Chip Moves.
Intel demos running Panther Lake systems, touts performance
and power efficiency improvements.
Intel Core i7-5600U @ 2.60GHz
Multithread Rating 3016 . :(
Typical TDP: 15 W
Intel's new CEO says the company has 55% of the data centre market.
Qualcomm to make data center processors that connect to Nvidia chips.Americas College Towns Go From Boom to Bust.
____Casting Shade On Shade-Tolerant Solar Panels.Try 1.
US nuclear sector intensifies lobbying in bid to prevent subsidy cuts.
Stop These Things Weekly Round Up: 18 May 2025.
Sunday May 18, 2025 17:46
____Massive recall for 27,000 cars over software issues
Check every model affected.
____Speed Up Arduino With Clever Coding.
Decades-old Windows systems are still running trains, printers, and hospitals.
____~$420 Asus Ryzen 5800HS Windows 11 running legacy ~1999 HotMetal Pro 6.0
Post from 5800Hs.
____OPEN SOURCE HIDING IN PLAIN SIGHT.____ Nobodys seen it: An elusive report could drive Empire Wind to collapse.Try 3.
EPIC Comes Out in Favor of Responsible Offshore Wind Development,
Joins States in Legal Effort to Overturn Trumps Offshore Wind Ban.
Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: '
Those guys are good'.
Saturday May 17, 2025 18:23
____was forth a good idea for sun microsystems?____
AI Overview.
No, the programming language Forth was not a good idea for Sun Microsystems.
Sun Microsystems, known for its SPARC processors and various operating systems,
was more focused on mainstream programming languages like Java and C. Forth is a
niche language that never achieved the widespread adoption that Java did, and i
ts use within Sun was likely limited to specific projects rather than a core technology.
was apple open system boot architecture a good idea?
AI Overview.
Apple's Open Firmware, while more advanced than the BIOS used in Windows PCs,
is not considered a universally "good" choice for Windows. Apple transitioned to EFI,
a firmware interface developed by Intel, because EFI offered improvements over Open Firmware.
Here's a more detailed explanation:
Open Firmware:
EFI:
Why EFI was preferred:
Compatibility Issues:
Modern Macs:
why did atari discontinue forth use in it game software?
AI Overview.
Atari stopped using Forth in its game software due to a combination of factors,
including the rise of more popular programming languages, the challenges
of developing games on the Atari 2600 with Forth, and a shift in focus
towards more commercially viable technologies.
Here's a more detailed explanation:
is forth new used in robotics?
AI Overview.
Yes, Forth is still used in robotics and embedded systems. It's particularly
well-suited for applications where real-time performance, compact code,
and interactive development are important, says a Medium article.
are forth dependencies certifiable?
AI Overview.
No, Forth dependencies, in the context of project dependencies or software
dependencies in embedded systems, are generally not certifiable in the same
way that code might be certified under standards like MISRA C or DO-178C for
safety-critical applications.
which computer languages have certifiable dependencies?
AI Overview.
Several programming languages offer ways to handle dependencies, some more robustly
than others. For example, languages like Python, Ruby, Java, and JavaScript have
built-in dependency management tools like pip, Bundler, Maven, and npm, respectively.
However, the term "certifiable dependencies" suggests a need for verifiable integrity
and provenance, which is a more specialized area.after a Ubntu install why does it task so many steps amd so long after sudo apt upgrade?Ubuntu edor choice for .txt save discovered important.
AI Overview.
After an Ubuntu installation, the sudo apt upgrade command can take numerous steps and a
considerable amount of time due to several factors related to package management, network c
onnectivity, and system resources.
Here's a breakdown of the reasons:
1. Package Dependencies and Updates:
2. Network Connectivity and Download Speed:
3. System Resources:
4. System Settings and Third-Party Repositories:
5. Other Factors:
Nano installed on Asus N6000 4/64 GB Windows 11 laptop runnung Ubuntu. :_
Switch back to Ubuntu from Windows 10 on $0 hp stream 13 N3060 4/64 GB dual boot laptop.
UX :)Material 3 Expressive (design.google).____
Thoughts on thinking (dcurt.is).
Keeping Up With AI: The Painful New Mandate for Software Engineers.
OpenAI introduces Codex, its first full-fledged AI agent for coding.Microsoft Confirms Windows Upgrade ChoiceYou Must Now Decide.___
6 reasons why Linux is better than ever.Zotacs 2025 mini PC lineup includes fanless models with Intel Twin____
lake and Core Ultra Series 2 chips.
what are Intel Twin lake and Core Ultra Series 2 chips?
AI Overview.
Intel Twin Lake and Core Ultra Series 2 chips represent distinct advancements in
Intel's processor technology. Twin Lake is a low-power, E-core-only processor line, i
deal for entry-level systems and devices requiring efficient performance. Core Ultra Series 2,
on the other hand, is a high-performance, AI-focused processor line targeting desktops
and mobile devices, offering enhanced AI capabilities and advanced features.
Arms ubiquitous CPU cores get new, less confusing names.
Intel Struggles To Reverse AMDs Share Gains In x86 CPU Ma.
why does x88 fig forth run ~10X faster usig virtualbox than it does with dosbox?
AI Overview.
The discrepancy in performance between running x88 FIG Forth in VirtualBox and DOSBox,
with VirtualBox being significantly faster (~10x), stems from fundamental differences
in how these two tools handle the emulation/virtualization process:
1. Virtualization vs. Emulation:
2. Performance Implications:2. Performance Implications:
3. Target Environments:
In Summary:
The significant speed difference comes down to the fact that VirtualBox leverages
hardware virtualization for faster execution, while DOSBox uses software emulation,
which is slower due to the instruction translation overhead. While DOSBox prioritizes
accuracy and has specialized features for DOS games, VirtualBox provides a faster
environment when hardware virtualization is available.
Oklo: Downstream Of The Bottleneck.
Oracle VM VirtualBox VM Escape via VGA Device (github.com/google).Teslas robotaxi fleet will be powered by plenty of teleoperation.____
teleoperation definition?
AI Overview.
Compensation of driver shortage with teleoperation | DHL Freight Teleoperation, also known
as remote operation or telerobotics, is the ability to control a system or machine from a distance.
It involves transmitting commands and receiving feedback from the remote system, allowing a
human operator to manipulate or interact with it as if they were physically present. This technology
is commonly used in robotics, especially in applications where it is unsafe or impractical for humans
to be physically present, such as in hazardous environments or remote locations.
Tesla's FSD vs. Waymo's robotaxi: One pulled a move that would tank any driving test. [msm :(?]Samsung Galaxy S25 Edge Battery Test Results are out: not as bad as feared.
____Why Cutting the Department of Energys Budget Is a Good Thing.Try 2.
Empire Wind 1 stop work order may force projects termination soon: Equinor.
'Poster
Thursday May 15, 2025 17:26
____Windows 11 and Red Hat Linux hacked on first day of Pwn2Own.
hp stream n3050 2/32gb run windows 10 1909. But is it better to buy a
new laptop which runs windows 11 as well as 10 1909?
AI Overview.
It's generally a good idea to consider buying a new laptop that runs Windows 11,
especially if the HP Stream N3050 with Windows 10 1909 is starting to show its age.
While Windows 10 is still functional, Windows 11 offers improvements in performance,
security, and features like the new start menu and taskbar. If the current laptop is
experiencing slow performance or compatibility issues, a new one with Windows 11
could be a worthwhile upgrade.
A fraction of proposed data centers will get built. Utilities are wising up.
Valve Addresses Alleged Steam Hack And Clarifies Situation.
CachyOS, Clear Linux & Debian 13 Deliver The Best Performance On
Framework Laptop 13 With AMD Strix Point.
____which is better dosbox or virtualbox to run 8088 forth?____
AI Overview.
For running an 8088-based Forth system, DOSBox is likely a better choice than VirtualBox.
DOSBox is specifically designed to emulate the DOS environment, which is what
many 8088 systems used, offering a more optimized experience for older programs.
While VirtualBox can also run DOS, it's a more general-purpose virtualization tool
that might not be as well-suited for emulating the specific characteristics of
an 8088-based system.Tesla has yet to start testing its robotaxi service____
without driver weeks before launch.
are tesla's software dependencies certified?
AI Overview.
Tesla's software dependencies, including its use of open-source software,
are subject to various certifications and conformity requirements. While Tesla
uses open-source components like Linux, they also develop and maintain
proprietary software. Tesla's products, including the software, are certified
to comply with certain standards to ensure safety and prevent interference.
are tesla's software dependencies less than one page of source code?
AI Overview.
No, Tesla's software dependencies are not limited to one page of source code.
Tesla's software is built upon a complex system of open-source and proprietary
components. While some underlying systems like the Linux kernel
have open-source code, Tesla's proprietary applications, such as Autopilot,
are not publicly available.
Tesla Is Seriously Struggling With Its Robotaxi Service.
does waymo's software defendencies certified?
AI Overview.
Waymo's software dependencies are subject to a certification process,
but it's not a simple "yes" or "no" answer. Waymo's autonomous driving
technology is certified for specific operational design domains, meaning
it's considered safe within those limitations. The California DMV,
for example, has approved Waymo to operate autonomous vehicles
in designated areas, certifying that they have met the necessary
safety standards.
does waymo's software defendencies all less than one page of source code?
AI Overview.
No, Waymo's software dependencies are not all less than one page of
source code.
Software engineer lost his $150K-a-year job to AIhes been rejected from 800
jobs and forced to DoorDash and live in a trailer to make ends meet.
Laid-Off Metaverse Engineer Says He Is DoorDashing and Living in a Trailer.Linux Swap Table Code Shows The Potential For Huge Performance Gains.____
Cheaper Nvidia RTX 5050 laptops leaked via retail listings.
is obsolescence of destiops forcing nvidia to build laptops that run their
AI Overview.
Nvidia Goes All-In on AI Large and Small, Led by RTX AI ... While obsolescence of desktops
might be a contributing factor, it's not the primary driver for Nvidia to develop laptops with
AI accelerators. Nvidia's focus on AI is a broader trend, and they are leveraging laptop
portability and AI capabilities to address a wider market, including professional users and gamers.
is having Windows 11 work legacy software on new hardware a better idea than
forcing recycling old hardware and purchase of new apps?
AI Overview.
Yes, enabling Windows 11 to run legacy software on newer hardware is generally a
better approach than forcing the recycling of old hardware and the purchase of new
applications. It promotes sustainability, reduces costs for users, and avoids the
unnecessary generation of e-waste.Why Nuclear Stock Oklo Has Popped 30% This Week.____
US would assess nuclear waste, plutonium for reactor fuel under draft order.
(264-1)(264-1) run on X86 platform p starting and endomg debug print. william-payne@william-payne-IdeaPad-1-14IGL7:~/Desktop$ gcc -o ee mul53.c william-payne@william-payne-IdeaPad-1-14IGL7:~/Desktop$ ./ee a[] = ffffffff:ffffffff exponentof(a) = 0 b[] = ffffffff:ffffffff exponentof(b) = 0 kk= 08 aa= ff bl=8 al=8 abl=16 add c[] = 00000000:00000000:00000000:00000000 c[0]= ff b[0]= ff aaaa=255 carry= 00 c[1]= ff b[1]= ff aaaa=255 carry= 00 c[2]= ff b[2]= ff aaaa=255 carry= 00 c[3]= ff b[3]= ff aaaa=255 carry= 00 c[4]= ff b[4]= ff aaaa=255 carry= 00 c[5]= ff b[5]= ff aaaa=255 carry= 00 c[6]= ff b[6]= ff aaaa=255 carry= 00 c[7]= ff b[7]= ff aaaa=255 carry= 00 c[8]= 00 aaaa=0 carry= 00 _____ middle of debug print omitted. c[0]= 01 b[0]= ff aaaa=257 carry= 01 c[1]= 00 b[1]= ff aaaa=256 carry= 01 c[2]= 00 b[2]= ff aaaa=256 carry= 01 c[3]= 00 b[3]= ff aaaa=256 carry= 01 c[4]= 00 b[4]= ff aaaa=256 carry= 01 c[5]= 00 b[5]= ff aaaa=256 carry= 01 c[6]= 00 b[6]= ff aaaa=256 carry= 01 c[7]= 00 b[7]= ff aaaa=256 carry= 01 c[8]= fe aaaa=254 carry= 00 c[9]= ff aaaa=255 carry= 00 c[10]= ff aaaa=255 carry= 00 c[11]= ff aaaa=255 carry= 00 c[12]= ff aaaa=255 carry= 00 c[13]= ff aaaa=255 carry= 00 c[14]= ff aaaa=255 carry= 00 c[15]= ff aaaa=255 carry= 00 add e c[] = 01000000:00000000:feffffff:ffffffffCode compiled with gcc c compilere on X86 platforem running Ubuntu. /*gcc -o ee mul53.c gcc -g -c mul53.c objdump -d -M inte1 -S mul53.o */ #include <stdio.h> int main() { static void *array[]={ &&byte7, &&byte6, &&byte5, &&byte4, /*0*/ &&byte3, &&byte2, &&byte1, &&byte0, /*4*/ &&bit80, &&bit40, &&bit20, &&bit10, /*8*/ &&bit80a, &&bit40a, &&bit20a, &&bit10a, /*12*/ &&bit08, &&bit04, &&bit02, &&bit01, /*16*/ &&bit08a, &&bit04a, &&bit02a, &&bit01a, /*20*/ &&init, &&add, &&printa, &&printc, /*24*/ &&shift, &&done, &&mul, &&byte9, /*28*/ &&bit01b, &&bit70}; &&alen, &&bit01c ; /*32*/ unsigned char a[8] ; // mltiplier unsigned char b[8] ; // mulplicand unsigned char c[16]; // product unsigned char aa,aaa,bb,bbb,bbbb,carry,carry0,carry1; int aaaa, al,bl,abl,kk,jj; short int exponentofa, exponentofb, exponentofc; init: a[0]=0xff; a[1]=0xff; a[2]=0xff; a[3]=0xff; a[4]=0xff; a[5]=0xff; a[6]=0xff; a[7]=0xff; exponentofa = 0; b[0]=0xff; b[1]=0xff; b[2]=0xff; b[3]=0xff; b[4]=0xff; b[5]=0xff; b[6]=0xff; b[7]=0xff; exponentofb = 0; c[0]=0x0; c[1]=0x0; c[2]=0x0; c[3]=0x0; c[4]=0x0; c[5]=0x0; c[6]=0x0; c[7]=0x0; c[8]=0x0; c[9]=0x0; c[10]=0x0; c[11]=0x0; c[12]=0x0; c[13]=0x0; c[14]=0x0; c[15]=0x0; exponentofc = 0; jj=100; goto printa; mul: if(b[7] != 0) {bl=8; goto alen;} // multiplicand if(b[6] != 0) {bl=7; goto alen;} if(b[5] != 0) {bl=6; goto alen;} if(b[4] != 0) {bl=5; goto alen;} if(b[3] != 0) {bl=4; goto alen;} if(b[2] != 0) {bl=3; goto alen;} if(b[1] != 0) {bl=2; goto alen;} if(b[0] != 0) {bl=1; goto alen;} printf("\n mul en\n"); alen: if(a[7] != 0) {al=8; abl=bl+al; goto byte7;} // multiplier if(a[6] != 0) {al=7; abl=bl+al; goto byte6;} if(a[5] != 0) {al=6; abl=bl+al; goto byte5;} if(a[4] != 0) {al=5; abl=bl+al; goto byte4;} if(a[3] != 0) {al=4; abl=bl+al; goto byte3;} if(a[2] != 0) {al=3; abl=bl+al; goto byte2;} if(a[1] != 0) {al=2; abl=bl+al; goto byte1;} if(a[0] != 0) {al=1; abl=bl+al; goto byte0;} printf("\n mul en\n"); goto printc; byte7: aaa=a[7]; kk=al; goto bit80; byte6: aaa=a[6]; kk=al; goto bit80; byte5: aaa=a[5]; kk=al; goto bit80; byte4: aaa=a[4]; kk=al; goto bit80; byte3: aaa=a[3]; kk=al; goto bit80; byte2: aaa=a[2]; kk=al; goto bit80; byte1: aaa=a[1]; kk=al; goto bit80; byte0: aaa=a[0]; kk=al; goto bit80; byte9: goto printc; bit80: aa=aaa;printf("kk= %2.2x aa= %2.2x bl=%d al=%d abl=%d\n",kk,aa,bl,al,abl); if(aa & 0X80) {jj=12; goto add;}; bit80a: jj=9; goto shift; bit40: if(aa & 0X40) {jj=13; goto add;}; bit40a: jj=10; goto shift; bit20: if(aa & 0X20) {jj=14; goto add;}; bit20a: jj=11; goto shift; bit10: if(aa & 0X10) {jj=15; goto add;}; bit10a: jj=16; goto shift; bit08: if(aa & 0X08) {jj=20; goto add;}; bit08a: jj=17; goto shift; bit04: if(aa & 0X04) {jj=21; goto add;}; bit04a: jj=18; goto shift; bit02: if(aa & 0X02) {jj=22; goto add;}; bit02a: jj=19; goto shift; bit01: if(aa & 0X01) {jj=23; goto add;}; bit01a: if(kk!=1){jj=32; goto shift;}; bit01b: kk=kk-1; if(kk==0){goto bit01c; }; goto bytem; bit01c: goto printc; add: printf("add c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); aaaa=c[0]+b[0]; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; c[0]=c[0]+b[0]; printf("\nc[0]= %2.2x b[0]= %2.2x aaaa=%d carry= %2.2x",c[0],b[0],aaaa,carry); aaaa=c[1]+b[1]+carry; c[1]=c[1]+b[1]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[1]= %2.2x b[1]= %2.2x aaaa=%d carry= %2.2x",c[1],b[1],aaaa,carry); aaaa=c[2]+b[2]+carry; c[2]=c[2]+b[1]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[2]= %2.2x b[2]= %2.2x aaaa=%d carry= %2.2x",c[2],b[2],aaaa,carry); aaaa=c[3]+b[3]+carry; c[3]=c[3]+b[3]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[3]= %2.2x b[3]= %2.2x aaaa=%d carry= %2.2x",c[3],b[3],aaaa,carry); aaaa=c[4]+b[4]+carry; c[4]=c[4]+b[4]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[4]= %2.2x b[4]= %2.2x aaaa=%d carry= %2.2x",c[4],b[4],aaaa,carry); aaaa=c[5]+b[5]+carry; c[5]=c[5]+b[5]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[5]= %2.2x b[5]= %2.2x aaaa=%d carry= %2.2x",c[5],b[5],aaaa,carry); aaaa=c[6]+b[6]+carry; c[6]=c[6]+b[6]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[6]= %2.2x b[6]= %2.2x aaaa=%d carry= %2.2x",c[6],b[6],aaaa,carry); aaaa=c[7]+b[7]+carry; c[7]=c[7]+b[7]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[7]= %2.2x b[7]= %2.2x aaaa=%d carry= %2.2x",c[7],b[7],aaaa,carry); aaaa=c[8]+carry; c[8]=c[8]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[8]= %2.2x aaaa=%d carry= %2.2x",c[8],aaaa,carry); aaaa=c[9]+carry; c[9]=c[9]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[9]= %2.2x aaaa=%d carry= %2.2x",c[9],aaaa,carry); aaaa=c[10]+carry; c[10]=c[10]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[10]= %2.2x aaaa=%d carry= %2.2x",c[10],aaaa,carry); aaaa=c[11]+carry; c[11]=c[11]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[11]= %2.2x aaaa=%d carry= %2.2x",c[11],aaaa,carry); aaaa=c[12]+carry; c[12]=c[12]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[12]= %2.2x aaaa=%d carry= %2.2x",c[12],aaaa,carry); aaaa=c[13]+carry; c[13]=c[13]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[13]= %2.2x aaaa=%d carry= %2.2x",c[13],aaaa,carry); aaaa=c[14]+carry; c[14]=c[14]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[14]= %2.2x aaaa=%d carry= %2.2x",c[14],aaaa,carry); aaaa=c[15]+carry; c[15]=c[15]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[15]= %2.2x aaaa=%d carry= %2.2x",c[15],aaaa,carry); printf("\n"); printf("add e c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); //return 3; goto bit70; //*array[jj];array[jj]; shift: printf("c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); carry1=0x00; if(c[0]&0x80){carry1=0x01;}; c[0]=c[0]<<1; carry0=carry1; carry1=0; if(c[1]&0x80){carry1=0x01;}; c[1]=c[1]<<1; c[1]=c[1]|carry0; if(abl==2){goto bit70;}; carry0=carry1; carry1=0; if(c[2]&0x80){carry1=0x01;}; c[2]=c[2]<<1; c[2]=c[2]|carry0; if(abl==3){goto bit70;}; carry0=carry1; carry1=0; if(c[3]&0x80){carry1=0x01;}; c[3]=c[3]<<1; c[3]=c[3]|carry0; if(abl==4){goto bit70;}; carry0=carry1; carry1=0; if(c[4]&0x80){carry1=0x01;}; c[4]=c[4]<<1; c[4]=c[4]|carry0; if(abl==4){goto bit70;}; carry0=carry1; carry1=0; if(c[5]&0x80){carry1=1;}; c[5]=c[5]<<1; c[5]=c[5]|carry0; if(abl==5){goto bit70;}; carry0=carry1; carry1=0; if(c[6]&0x80){carry1=1;}; c[6]=c[6]<<1; c[6]=c[6]|carry0; if(abl==6){goto bit70;}; carry0=carry1; carry1=0; if(c[7]&0x80){carry1=1;}; c[7]=c[7]<<1; c[7]=c[7]|carry0; if(abl==7){goto bit70;}; carry0=carry1; carry1=0; if(c[8]&0x80){carry1=1;}; c[8]=c[8]<<1; c[8]=c[8]|carry0; if(abl==8){goto bit70;}; carry0=carry1; carry1=0; if(c[9]&0x80){carry1=1;}; c[9]=c[9]<<1; c[9]=c[9]|carry0; if(abl==9){goto bit70;}; carry0=carry1; carry1=0; if(c[10]&0x80){carry1=1;}; c[10]=c[10]<<1; c[10]=c[10]|carry0; if(abl==10){goto bit70;}; carry0=carry1; carry1=0; if(c[9]&0x80){carry1=1;}; c[11]=c[11]<<1; c[11]=c[11]|carry0; if(abl==11){goto bit70;}; carry0=carry1; carry1=0; if(c[12]&0x80){carry1=1;}; c[12]=c[12]<<1; c[12]=c[12]|carry0; if(abl==12){goto bit70;}; carry0=carry1; carry1=0; if(c[13]&0x80){carry1=1;}; c[13]=c[13]<<1; c[13]=c[13]|carry0; if(abl==13){goto bit70;}; carry0=carry1; carry1=0; if(c[14]&0x80){carry1=1;}; c[14]=c[14]<<1; c[14]=c[14]|carry0; if(abl==14){goto bit70;}; carry0=carry1; carry1=0; if(c[15]&0x80){carry1=1;}; c[15]=c[15]<<1; c[15]=c[15]|carry0; if(abl==15){goto bit70;}; carry0=carry1; carry1=0; if(c[16]&0x80){carry1=1;}; c[16]=c[16]<<1; c[16]=c[16]|carry0; if(abl==16){goto bit70;}; carry0=carry1; goto bit70; //*array[jj]; bit70: if(jj==9){goto bit40; }; if(jj==10){ goto bit20;}; if(jj==11){ goto bit10;}; if(jj==12){goto bit80a;}; if(jj==13){goto bit40a; }; if(jj==14){goto bit20a;}; if(jj==15){ goto bit10a;}; if(jj==16){goto bit08; }; if(jj==17){goto bit04; }; if(jj==18){goto bit02; }; if(jj==19){goto bit01; }; if(jj==20){goto bit08a;}; if(jj==21){goto bit04a; }; if(jj==22){goto bit02a;}; if(jj==23){goto bit01a; }; if(jj==32){goto bit01b;} if(jj==35){goto bit01c; }; printf("\nInvaid bit jump number = %2x\n",jj); return 3; byte70: if(kk==7){goto byte7;}; if(kk==6){goto byte6;}; if(kk==5){goto byte5;}; if(kk==4){goto byte4;}; if(kk==3){goto byte3;}; if(kk==2){goto byte2;}; if(kk==1){goto byte1;}; if(kk==0){goto byte0;}; printf("\nInvaid bytejump number = %2x\n",kk); return 2; bytem: if(kk==7){aaa=a[7]; goto bit80;}; if(kk==6){aaa=a[6]; goto bit80;}; if(kk==5){aaa=a[5]; goto bit80;}; if(kk==4){aaa=a[4]; goto bit80;}; if(kk==3){aaa=a[3]; goto bit80;}; if(kk==2){aaa=a[2]; goto bit80;}; if(kk==1){aaa=a[1]; goto bit80;}; //if(kk==0){aaa=a[0]; goto bit80;}; printf("\nInvaid number of byte decrements. = %d\n",kk); return 2; printa: printf("\na[] = %2.2x%2.2x%2.2x%2.2x",a[0],a[1],a[2],a[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", a[4],a[5],a[6],a[7]) ; printf("\nexponentof(a) = %d\n",exponentofa); printf("\nb[] = %2.2x%2.2x%2.2x%2.2x", b[0],b[1],b[2],b[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", b[4],b[5],b[6],b[7]) ; printf("\nexponentof(b) = %d\n\n",exponentofb); goto mul; printc: exponentofc = exponentofa + exponentofb ; printf("\nc[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[12],c[13],c[14],c[15]); printf("\nexponentof(c) = %d\n",exponentofc); goto done ; done: printf("Done.\n"); return 0; }____ GE Vernova and Vestas rule lackluster US wind turbine market.Try 2.FAA/NTSB flight control software cover-up remediation
FAA FOIA lsawsuit - District of Columbia avoidable.First posted 'End Thursday May 15, 2025 13:50 https://prosefights2.org/irp2023/windscammers23.htm.
Friday March 24, 2023 20:08
Upda2d
Wednesday July 2, 2025 10:37
Start Thursday May 15, 2025 14:41: https://prosefights2.org/irp2023/windscammers23.htm.
7/27/24
Conduct unbecoming navy officer Admiral William H Payne Complaint.
7/19/24
EyeglassWorld reading glasses and and optometrist exam issues.
Unable to update above page. Updated page below.
https://prosefights2.org/irp2023/mvdnow4.htm
1/24/24.Kaneohe Poseiden P8A FOIA.
Vinson F-35C FOIA.
1/10/24.
liaison1. communication or cooperation which facilitates1/8/24.
a close working relationship between people or organizations.FOIA.GOV.12/2/23.
Department of Defense Department of the Navy
202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
policy.a course or principle of action adopted or proposed by a government, party, business, or individual.
11/25/23.bamboozle11/11/23.
fool or cheat (someone).certification11/10/23.
the action or process of providing someone or something with an official document attesting to a status or level of achievement.retaliation
the action of harming someone because they have harmed oneself; revenge.
11/9/23.nemesis11/7/23.
the inescapable agent of someone's or something's downfall.conpersuade (someone) to do or believe something, typically by use of a deception.
10/31/23conned
persuade (someone) to do or believe something, typically by use of a deception.
7/5/23Reprimand: "a rebuke, especially an official one.3/22/23.
Phone numbers issues.1-855-658-2676.3/21/23.
1-888-127-6445478.
Recording 2, 3, 4, 5, 6, 7, 8, 9.Phone message from US government?.3/20/23
Two forms of id?Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil
Good evening, Mr. Payne,
Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:
1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.
2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/
As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term FOIAonline (the correct site should appear as the top hit, and it will contain foiaonline.gov as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.
Regards,
Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer
Christopher.a.julka.civ@us.navy.mil
(703) 697-0031
From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address
Hello Mr Julka,
Alternate email address.
Sunday February 26, 2023 19:07
Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.
3/1/23F-18 Carrier break and landing!.12/25/22
,![]()
12/21/22.The statute of limitations for a FOIA claim is six years. However, a requester may refile their FOIA request to restart the statute of limitations.Feb 21, 201711/24/22.Airbus A220 autopilot warning. Full coverage.9/18/22
FAA wants pilots to be less dependent on computer autopilots.
4/3/22prosefights hacked. Again. :(
6000 lines of code vs 100 60 lines of code missing.
Hacking attempted recovery 4.6.22.
2/5/22.
__________________
5/01/22.
Linus Torvalds reveals the 'true' anniversary of Linux code.9/21/21.
US Navy software FOIA request.9/3/21.
Christopher Julka (703)-697-0031 DONFOIAPublicLiaison@navy.mil.8/24/21.
c/c++ wind turbine software use too?NTSB 8/20/21 phone message.
Tweet.
![]()
4/22/21.4/21/21.
No appeal possted yet. "(
Software tehnology? c/c++?Scary USS Gerald R. Ford - How Powerful is the CVN-78? US Navy's $13 Billion Aircraft Carrier.4/20/21.
Speed display disappear? Software issue?"(where's) my speed my speed"4/18/21.
4/17/21.
Transcript.Where is air speed?4/1921.4/16/21.
Rapid Descent and Crash into Water Atlas Air Inc. Flight 3591 Boeing 767-375BCF, N1217A.NTSB Ms Tamara Crawford phone conversation 4/16.4/1421.
We are Legion.
We do not forgive.
We do not forget.
Expect us.4/13/21. 'view' oly appeared starting today?
4/12/21.What computers? How many modules? Lines of code for each module?4/11/21
Tamara Crawford audio 4/9/21.
https://data.ntsb.gov/Docket?ProjectID=99013
4/19/21.4/10/21.
Poster attended book signing at Page One i Albuquerque.
Sunday, January 07, 2001 5:52 PM
Dear Friend,
we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.
With thanks
On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/
Wednesday, January 17, 2001 7:10 PM
Dear Friend,
A stand for Ahmad but why this question?
Iran Danesjoo Information Committee project reports. [1, 2 , 3].Swiss Radio International link fixed with irp2014 switch from malwarebytes.Admiral fornmer Navy Seal.
Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Another request?
Phone message attachment.
3/23/21.LIGHTWEIGHT OS FOR ANY PLATFORM.
3/20/21.
3/22/21 Attachments.
1
1
1
1
2/4/21.12/30/20.12/25/20.
R44jPT22f3d12/22/20. :( !!!
J210*9t765r^
12/22/20. :( !!12/21/20. :( !
J210*9t765r^
12/17/20. :(
12/16/20. Something wrong?12/15/10
12/14/20.
12/10/20.
12/8/20.
Tuesday December 8, 2020 14:43
http://www.prosefights.org/irp2020/windscammers13.htm#ntsbbryson
Hello Ms. Bryson,
This is an appeal of FOIA No. FOIA-2020-00406 denial.
Ms. Melba Moye wrote on September 14, 2020
appears inapplicable for denial because FOIA requested DATAFinal 3 minutes of Atlas Air #3591 Boeing 767:from
1 Names of all software modules executed.
2 Time of execution. Nanosecond accuracy, if possible.
3 Altitude of #3591 at time software module entered.NTSB chairman Sumwalt, Friday June 12, 2020 10:32.Ms. Moye's denial reason is unsupported.
Ms. Moye/Ms. Joy Gordon make legal attempt to deny my FOIAThese legal arguments should be addressed to a judge/jury in event I am unable to receive requested documents by
administrative means?
Since no legitimate reason for denial provided by Ms. Moye and Ms. Gordon exist, I ask that you grant appeal.
And have NTSB deliver requested documents.
Regards,
william harris payne.10/26/20 FAA FOIA lawsuit - District of Columbia..
12/9/20.
____https://dms.ntsb.gov/pubdms/.
https://www.ntsb.gov/_layouts/ntsb.aviation/index.aspx.
NTSB
AttN: Ms Sharon Bryson
Manager Director
490 L'Enfant Plaza SW
Washington, D.C. 20594
Chaff?
Boeing 787: A Financial Engineering Nightmare?.10/6/20.
____10/5/20.
Boeing 737 MAX: Turning A Crisis Into A Win.
Programming languages: Java founder James Gosling reveals more on Java and Android.
Liberal arts 'educated'?Linux 5 day course in focus because of 737 MAX and Raspberry Pi 4B.10/4/20
https://forums.linuxmint.com/viewtopic.php?t=294209
Programming languages: Java founder James Gosling reveals more on Java and Android.10/1/20.
Back again after deletion.
"Back in the early 1990s it was well understood that the number one source of security
vulnerabilities was just pointers, was just bugs, like 50% to 60% to 70% were bugs and the
vast majority of them were like buffer overflows.
Liam Tung.
why java michael barr.
At that stage, C an C++"absolutely owned the universe" and everything was being written in those languages.
The statistics in this article have been a part of software engineering for decades.
Back in 1990, they were a major pain point, and a major motivator behind many of the features
of Java.
James Gosling.
9/18/20.Unable to shrink email.9/14/20
:( ++
9/11/20
ntsb foia status message.8/11/20.
8 rings.____
Boeing 747s still get critical updates via floppy disks.
Which OSs support floppies?
This surprise Linux malware warning shows that hackers are changing their targets.
8/10/20.
FAA Dave Duff phone message 1 2. 8/01/20.8/7/20.
A declaratory judgment is a binding judgment from a court defining the
legal relationship between parties and their rights in a matter before the court.
Typically, a party will first send a cease and desist letter prior to seeking
declaratory judgment from a court.
Injunctive relief, also known as an injunction, is a remedy which
restrains a party from doing certain acts or requires a party to act in a certain way.
It is generally only available when there is no other remedy at law and
irreparable harm will result if the relief is not granted.
Where is Mark House?
206-231-2046 call audio.
* UNITED STATES DISTRICT COURT
FAA/NSTB FOIAs
Boeing 737 MAX, Atlas Air #3591 767-375 1992
software certification?Thursday April 25, 2019 15:38
Updated
Friday May 31, 2019 16:45
3/7/23
New Mexico
Energy, Minerals & Natural Resources Department
nformation request
First posted
Monday June 22, 2020 13:10
Updated
Friday October 23, 2020 09:27
Notes
Wednesday July 2, 2025 10:34
____Why The Latest Linux Kernel Wont Run____
On Your 486 And 586 Anymore.Microsoft to Cut 9,000 Workers in Second Wave of Major Layoffs.
Try 3.
Tuesday July 1, 2025 16:41
____are computer programming jobs shifting rom full time employment to
contractors from all over the world?
AI Overview.
Yes, there's a discernible shift in the computer programming job market,
with a move towards outsourcing and contracting, often leveraging a global
talent pool.
Key Trends and Observations:
Increased Outsourcing:
Growth in Staff Augmentation:
Nearshoring Popularity:
Cost Savings as a Driving Factor:
Factors Contributing to the Shift:
Potential Implications:
In conclusion, the computer programming job market is indeed seeing
a shift towards increased outsourcing and the use of contractors
from around the world. This is driven by various factors, including
cost efficiency, access to talent, and the rise of remote work.
However, companies must carefully consider the potential
implications and challenges associated with these trends.
____is modern c++ obfuscated?
AI Overview.
Modern C++ is not inherently obfuscated, but its complexity and feature richness can
lead to code that is difficult to understand if not written carefully. The language itself is
a tool, and like any tool, it can be used for good or ill. While it offers powerful features
that can improve performance and expressiveness, these features can also be misused
to create code that is deliberately confusing.
Why modern C++ might be perceived as obfuscated:
Complex Syntax and Features:
Low-Level Memory Management:
emplate Metaprogramming:
Poorly Written Code:
Intentional Obfuscation:
In summary, modern C++ is a powerful language with a
learning curve, and its features can be used to create both
clear and obfuscated code.
Does modern c++ have dependency certification issues with
safety-critical apps?
AI Overview Yes, modern C++ does have challenges related to
dependency certification issues within safety-critical applications.
While C++ is widely used and provides low-level control, which is
sometimes necessary for safety-critical systems, it presents challenges:
Inherited memory safety vulnerabilities from C:
Difficulty in ensuring safety:
Dependence on external libraries and code:
Complexity and undefined behavior:
is modern c++ expensive to maintain?
AI Overview.
Modern C++, while introducing powerful features
and abstractions, can present some challenges that might lead
to increased maintenance costs, depending on various factors.
Factors that can increase maintenance costs with modern C++:
Complexity:
Legacy Codebases:
Steep Learning Curve:
Overuse of advanced features:
is modern c++ project costs an issue with investors?
AI Overview.
Using modern C++ in software projects can have cost implications
that may raise concerns for investors.
Why modern C++ projects can be costly: :( ?
____Arm muscles into server market but can't wrestle____
control from x86 just yet.
Canonical Decides To Double Down On Their Investment I
n Java For Ubuntu.
Microsoft quietly implies Windows has LOST
millions of users since Windows 11 debut
are people really abandoning ship?.
what is x86 instruction fluff?
AI Overview.
In the context of x86 instruction sets, "fluff" refers to the
unnecessary or redundant instructions that can be included
in assembly code. These instructions don't perform any
essential function for the program's logic but are often
added for specific purposes, such as:
Obfuscation: Malware authors or attackers may include "fluff"
instructions to make it harder for security analysts to understand
and analyze their code. This is a common technique in reverse
engineering and code obfuscation.
Padding and Alignment: Instructions like the "NOP" (no operation)
instruction can be used to pad code and ensure proper alignment
of instructions or data, which can improve performance on some
processor architectures.
Exploits and Shellcode: In the context of buffer overflow attacks,
"NOP sleds" or "NOP slides" are sequences of NOP instructions used
as a "landing area" for injected shellcode. If the exploit overwrites
the instruction pointer (EIP) to point anywhere within the NOP sled,
the execution flow will slide down the NOPs until it reaches the
malicious shellcode.
Examples of X86 instruction fluff:
In summary, while the term "fluff" can have a negative
connotation suggesting inefficiency, these extra instructions
serve various purposes in x86 assembly, from enhancing code
security to
facilitating exploits.
7 things every Linux beginner should know before downloading
their first distro.
are linux distros large supported by volunteers?
AI Overview.
Yes, many large Linux distributions are supported by volunteers,
though it's important to understand the nuances.
Here's a breakdown:
In summary:
Many large Linux distributions rely heavily on volunteers for their
development, maintenance, and support. While commercial
distributions exist and offer paid support, the open-source nature
of Linux allows for vibrant community contributions to both
commercial and community-driven distributions. The Linux kernel itself,
the core component of Linux distributions, is also a testament to
this collaborative, often volunteer-driven development model.Mark Zuckerberg Already Knows Your Life.
Now He Wants His AI to Run It.
Critics blast Microsoft's limited reprieve for those stuck on Windows 10.
what windows 10 version works best for legacy hardware?
AI Overview.
For older hardware, Windows 10 21H2 or earlier versions are often recommended.
These versions may be more compatible with older drivers and hardware components
that might not be supported by later versions like 22H2 or Windows 11. Specifically,
some users report success with versions like 1709 or even the initial release (v1507)
if newer versions fail.
Here's a more detailed breakdown:
Try 3.
Monday June 30, 2025 14:33
____Why is AI taking peoples jobs, and what job sector is the most affected by it?
AI Overview.
AI's impact on the job market stems from its ability to automate tasks previously
done by humans, leading to job displacement in various sectors. While AI has the
potential to augment some roles and create new jobs, the immediate impact often
involves replacing workers in repetitive or predictable tasks. The most affected
sectors include customer service, manufacturing, transportation, and some
white-collar jobs.
Here's a more detailed breakdown:
Automation of Tasks:
Job Displacement:
Sector Specific Impacts:
Customer Service:
Manufacturing:
Transportation: Self-driving vehicles and trucks, powered by AI,
could disrupt the transportation industry, affecting jobs like drivers.
White-Collar Jobs: While some white-collar jobs might be augmented by AI,
others, especially those involving data analysis, coding, and writing, are
also at risk of automation.
Income Inequality: AI could exacerbate income inequality if displaced
workers struggle to find comparable jobs or face lower wages in new roles.
____Mini-PC wity 16 Zen5 Cores ....____
AMD Ryzen AI Max+ 395.
Multithread Rating 52901
Single Thread Rating 4123
Clockspeed: 3.0 GHz Turbo Speed: 5.1 GHz
Cores: 16 Threads: 32
Typical TDP: 55 W
does intel n4020 have 64 bit wide data path?
AI Overview.
Yes, the Intel Celeron N4020 processor supports 64-bit processing.
This means it has a 64-bit wide data path, which allows it to handle
more data at once compared to a 32-bit system.
This capability is important for:
does intel n6000 have 64 bit wide data path?
AI Overview.
Yes, the Intel Pentium Silver N6000 processor supports 64-bit architecture.
This means it can process data in chunks of 64 bits, allowing it to utilize
a larger address space and potentially perform certain tasks more
efficiently than a processor with a 32-bit architecture.
Here are some key facts about the Intel N6000:
AI Overview.
AMD Ryzen AI 300 series 'Strix Point' APU laptops launch ... AMD's
Ryzen AI 300 series, featuring Zen 5 architecture, RDNA 3.5 graphics,
and an XDNA 2 NPU, is designed for a new generation of laptops,
including ultra-slim and high-performance models. These processors,
also known as "Strix", aim to improve AI capabilities and overall
performance, with the first laptops expected to launch around July
and August.
Key Features and Improvements:
do AMD's Ryzen AI 300 series require new drivers
to run windows 11 ad ubuntu?
AI Overview.
Yes, AMD Ryzen AI 300 series processors do require specific drivers for
both Windows 11 and Ubuntu to function properly and utilize their
full capabilities, especially the integrated AI features.
For Windows 11:
For Ubuntu (and other Linux distributions):
In summary:
Behind RadioShacks Cheapest Computer.Anker just issued a recall on these six power banks ____
how to see if yours is affected.Nvidia insiders dump more than $1 billion in stock, according to report.
Try 2.
Sunday June 29, 2025 17:34
____Power banks manufactured before 2024 now banned from air travel in China.____
https://hackaday.com/2025/06/29/windows-95-on-playstation-2-works-as-well-as-you-expected/https://hackaday.com/2025/06/29/windows-95-on-playstation-2-works-as-well-as-you-expected/
Tech Nvidia insiders dump more than $1 billion in stock, according to report.gcc c inline assemblers obfuscating and incomplete. :(____
AI Overview.
On x86 platforms, GCC's extended inline assembly allows you to specify assembler
instructions using either AT&T syntax (the default) or Intel syntax.
Here's how GCC enables assembly of various x86 instruction forms:
Dialect Support:
AT&T Syntax:
ntel Syntax: Can be activated globally with the -masm=intel option or
locally within the asm block using ".intel_syntax noprefix".
Mixing Dialects:
Basic vs. Extended Assembly:
Basic asm:
Extended asm:
instruction Forms:
Important Considerations:
Syntax Differences:
Extended Assembly:
Optimization:
Portability: Inline assembly is platform-specific and may need
adjustments when porting code.
how is a simple x86 assembler code "nop nop nop"coded and run
using gcc c inline assembler?
AI Overview.
In order to code and run a simple "nop nop nop" sequence using GCC inline
assembly on an x86 system, you can use the asm keyword within your C code.
This allows you to embed assembly instructions directly.
Here's a breakdown of how it's done:
#include stdio.h // add<>
int main() {
printf("Executing NOP instructions...\n");
// Inline assembly block for NOP instructions asm("nop");
asm("nop");
asm("nop");
printf("NOP instructions executed.\n");
return 0;
asm("nop");: The asm keyword indicates that inline assembly code will follow.
The string literal within the parentheses contains the assembly instruction
to be executed. In this case, there are three separate asm statements,
each containing a single "nop" instruction.
2. Compiling the Code with GCC: Save the C code above into a file,
such as nop_example.c. Compile it using GCC:
bash
gcc -o nop_example nop_example.c
3. Running the Executable:
After compilation, run the executable from your terminal:
bash ./nop_example
Explanation:
asm keyword: GCC translates the asm() statements into inline assembler code,
eliminating function call overhead.
nop instruction: The "nop" instruction (No Operation) instructs the processor to do
nothing for one clock cycle. By using three asm("nop") statements,
three nop instructions are inserted into the generated machine code.
This example demonstrates how to embed basic assembly instructions within C code
using GCC inline assembly. For more complex scenarios, extended asm statements
can be used to interact with C variables and define operand constraints.
How to associate assembly code to exact line in C program?.Intel Nova Lake performance leak claims 10% single____
and 60% multi-threaded uplift.
AI Overview.
Intel's Nova Lake is the codename for their next-generation desktop CPU
architecture, slated for release in 2026. While specific PassMark scores for
Nova Lake are not yet available, leaked information suggests a significant
performance uplift compared to previous generations, including potential
increases of over 10% in single-threaded performance and 60% in
multi-threaded performance. This is partly due to a new core architecture
with up to 52 cores (16 P-cores, 32 E-cores, and 4 LP-Cores).
Key points about Intel Nova Lake:
AI Overview.
Intel Nova Lake preliminary desktop specs list 52 cores: 16P ...
Intel Nova Lake CPUs are expected to have a power consumption
range of 65W to 150W, with the high-end models potentially reaching 150W TDP.
Specifically, the Nova Lake-S series is rumored to have a flagship model
with 52 cores (16P + 32E + 4LP) and a 150W TDP, according to a Reddit
thread. The lower-end Nova Lake-S models are expected to have a 65W TDP.
The inclusion of low-power (LP) efficient cores is a key feature aimed at
improving power efficiency, especially for background tasks.
Here's a more detailed breakdown:
NVIDIA GeForce RTX 5070 SUPER reportedly features 6400 CUDA cores
and 18GB memory.
AI Overview.
The NVIDIA GeForce RTX 5070 has a typical power consumption of 250W,
according to TechPowerUp's GPU database. This is the maximum power
draw specified by NVIDIA for the reference card. However, actual power consumption
can vary depending on the specific game, settings, and whether the card is
overclocked. For example, some users have reported power consumption
between 90-110 watts when undervolting and playing games like Final Fantasy XVI
and The Last of Us Part II at 2K resolution with DLSS. In more demanding
scenarios like Furmark stress tests, the power consumption can reach higher levels.Lidar is lame: why Elon Musks vision for a self-driving Tesla taxi faltered.
____Stop These Things Weekly Round Up: 29 June 2025.Try 1.
PGE wants to add solar to troubled wind farm instead of replacing turbines.
Suzlon wind turbines Spanish Fork UT.
Full Savage coal truck descending to Wellington UT.
Empty coal truck ascending to Soldier Summit UT.
Entering Moab UT.
AI Overview.
Energy News: A New Uranium Boom? - Utah Geological Survey A new uranium mine, the Velvet-Wood mine,
has been approved in San Juan County, Utah, southeast of Moab. The project is the first to be approved under
the Trump administration's emergency declaration expediting energy projects. The mine, located near
Lisbon Valley, will also produce vanadium.
Key Points:
Uranium mining in Utah.
Saturday June 28, 2025 18:44
____Former Texas governor and US energy sec plans 11GW data center campus
outside Amarillo, Texas.
Surprising group are living in fear as they struggle to get hired despite
strong job market.
AI Overview.
Canonical The Company Behind Ubuntu with Mark ... Ubuntu is owned and
developed by Canonical Ltd., a private company founded by Mark Shuttleworth.
While Canonical is the primary publisher and developer, Ubuntu is also a
collaborative project with contributions from a large community of volunteers.
Here's a more detailed breakdown:
Mark Shuttleworth: He founded Canonical and is the driving force behind Ubuntu.
Canonical (company).
AI Overview.
According to various sources, approximately 13,000 Navajo households on the
Navajo Nation reservation lack access to electricity. This number represents a
significant portion of Native American homes without electricity nationwide.
The Navajo Nation covers a large area spanning parts of Arizona, Utah, and
New Mexico.
Here are some key points about the situation:
AI Overview.
On x86 platforms, GCC's extended inline assembly allows you to specify assembler
instructions using either AT&T syntax (the default) or Intel syntax.
Here's how GCC enables assembly of various x86 instruction forms:
____Anker issues new global recall for five power____
bank models over fire hazard.
AI Overview.
Older cell phone batteries swell due to a combination of factors,
primarily related to the breakdown of the battery's internal
components and the resulting gas production. Specifically,
the electrolyte, a liquid inside the battery, can decompose and
release gases like hydrogen, oxygen, and carbon dioxide.
This gas buildup inside the sealed battery casing causes it
to expand.
Here's a more detailed breakdown:
Overcharging:
AI Overview.
Yes, virtually all new cell phones are equipped with overcharging prevention
hardware and software, often integrated within a Battery Management
System (BMS).
Here's why this is standard in modern devices:
mportant Notes:
do solar charge/load controllers have overcharging prevention
hardware/software?
AI Overview.
Yes, solar charge controllers are designed to prevent battery overcharging,
and they achieve this through both hardware and software features.
How they prevent overcharging:
Solar charge controllers act as the "gatekeeper" for your battery bank,
ensuring proper charging, preventing overcharging, and protecting the
longevity and safety of your system.
does solar charge/load controller use multitasking software technology
like is used in Linux?
AI Overcvew.
Yes, solar charge controllers, especially those using advanced technologies
like Maximum Power Point Tracking (MPPT), often utilize multitasking software technology, similar in concept to what is used in Linux, but typically
implemented with a Real-Time Operating System (RTOS).
Here's why and how:
In essence, while a solar charge controller doesn't typically run a full version
of Linux, it does employ similar multitasking principles within its embedded
software, often utilizing an RTOS, to efficiently manage its diverse functions.
do inexpensive, <$25 solar charge/load controller use multitasking software technology like is used in Linux? :)
AI Overview.
No, inexpensive, sub-$25 solar charge/load controllers are highly unlikely to use complex multitasking operating system technology like that found in Linux.
Here's why:
inux is for complex systems:
Simple embedded systems:
Efficiency:
Cost and Resources:
Multitasking in Embedded Systems: While some embedded systems do utilize multitasking, it's typically handled through Real-Time Operating Systems (RTOS)
or simpler approaches that offer more control and predictability than a full OS like
Linux. These inexpensive controllers likely use a simple "main loop" approach
where the microcontroller rapidly switches between different tasks to give the
illusion of multitasking.
In essence, a sub-$25 solar charge controller is a dedicated device with specific functions, making a complex OS like Linux unnecessary and impractical.
AI Overview.
No, inexpensive solar charge controllers, particularly those under $25,
generally do not offer the same performance as more expensive MPPT
controllers, even if they are advertised as "MPPT".
Here's why:
In summary: While a very cheap controller might suffice for simple needs
(like charging lights or small devices), you should not expect it to deliver
the same level of performance and reliability as a genuine, higher-quality
MPPT controller.
If you need a more efficient and reliable charge controller, especially
for larger solar setups or for charging sensitive lithium batteries, it's
generally worth investing in a reputable MPPT controller, even if it
means spending more than $25.
AI Overview,
Yes, expensive and complex solar charge controllers, especially MPPT
(Maximum Power Point Tracking) ones, can require software or
firmware updates.
Here's why and the benefits of updating:
In summary, while not all solar charge controllers require firmware updates,
the more sophisticated and expensive ones, especially MPPT controllers, benefit significantly from these updates to optimize performance, enhance reliability, and
ensure continued functionality.
who pays for expensive complex solar charge/load controller software updates?
AI Overview.
In general, the customer is responsible for the cost of software updates for
solar charge controllers, especially if they are not included in the initial purchase
or an ongoing maintenance contract.
Here's a breakdown of the typical scenarios:
In summary, while the initial software updates may be included in the purchase
price, ongoing access to updates may require a separate payment or be
covered by a maintenance agreement.4 things Linux still gets wrong for the average user.____
AI Overview.
DRM-protected content refers to digital media, like movies, music, or ebooks,
that has been encrypted and controlled by a system called Digital Rights
Management (DRM). This system limits how users can access and use the
content, often preventing unauthorized copying, sharing, or redistribution.
Essentially, DRM grants users a license to use the content under specific
conditions, rather than outright ownership.
Here's a more detailed breakdown:
AI Overview.
In 2024, Linux's desktop market share reached 4%, a significant milestone
for the open-source operating system. This figure, however, represents only
a portion of the total global computer usage, with Windows and macOS
still dominating the market. While Linux's adoption is growing, particularly
in specific regions and for certain applications, it still faces challenges in achieving widespread mainstream adoption on desktop PCs.
Here's a more detailed look:
In conclusion: While Linux has a dedicated and growing user base, particularly
in specialized areas, it still faces challenges in achieving widespread mainstream
adoption on desktop PCs. However, its open-source nature, cost-effectiveness,
and increasing user-friendliness are contributing to its ongoing growth and
relevance in the computing landscape.
4 times an HDD is still better than an SSD.
Developers of Linux distro Fedora propose dropping 32-bit support entirely,
but it's being claimed that the change 'would kill off projects like Bazzite entirely'.Ford CEO favors Waymos LiDAR approach over____
Teslas vision-only self-driving.Is anyone else just done with the industry?.____ Solar panel maker Meyer Burger US files for Chapter 11 bankruptcy [Update].Try 1.
Friday June 27, 2025 17:13
____The College-Major Gamble.____
2,000-GPU data center launches powered exclusively by reusable batteries
12-megawatt storage system built on hundreds of repurposed EV batteries.Speed comparison between USB 2.0, USB 3.0, eSATA,____
Firewire and Thunderbolt.Chinas new army of engineers.____In Pursuit of Godlike Technology, Mark Zuckerberg____
Amps Up the A.I. Race.
Meta hires key OpenAI researcher to work on
AI reasoning models.
Meta says its winning the talent war with OpenAI.was windows me installed on a marketed us automobile?____
AI Overview.
It is highly unlikely that Windows Me (Millennium Edition) was
ever installed on a commercially marketed US automobile.
Windows Me was designed for home PC users, not embedded
systems like car infotainment systems. It included features
meant for personal computing, such as video editing and multimedia
tools. Windows Me was also known for its instability issues,
making it unsuitable for a critical system like a car's operating system.
Microsoft developed operating systems specifically for automobiles,
like Windows Embedded Automotive (formerly Microsoft Auto,
Windows CE for Automotive, etc.). These were built on more
appropriate bases like Windows CE and were used in
systems like Ford Sync.
Windows Me was not the right fit for the demands and needs of a
car's operating system, and a separate, more suitable platform
like Windows Embedded Automotive was used instead.
was windows installed on a marketed us automobile? [Insider information. :) ]
AI Overview.
Yes, various car models marketed in the US have had infotainment
and telematics systems powered by a version of the Windows
operating system called Windows Embedded Automotive
(formerly Microsoft Auto, Windows CE for Automotive,
Windows Automotive, and Windows Mobile for Automotive).
Examples of US-marketed cars that have used Windows Embedded
Automotive include:
Windows Embedded Automotive is a specialized operating system built
on Windows CE, designed for the automotive industry's specific needs.
It is not a full version of Windows, like the one on a desktop computer.
While Microsoft's automotive platform was used in various vehicles,
some manufacturers have switched to other operating systems like
BlackBerry QNX.
Tesla's Robotaxi: Worth Way More Than Waymo.
Windows Embedded Automotive.Why hasnt the x86 architecture ever been replaced in personal computers____
and workstations?
Jeff Sturm VP, Information Systems (2020present)
A few reasons, but in truth x86 has been replaced several times now
with a new evolution of the CPU architecture.
...
It remains to be seen whether x86 will ever become obsolete, or just continue t
o evolve indefinitely as computing technology adapts to our changing needs and
our online lifestyle. Today it is ubiquitous in Windows-compatible desktops and laptops,
and also Mac hardware from Apple, though most mobile devices have evolved supporting
a different architecture, partly due to the need for lower power and low cost. The shift
from x86 may be gradual as mobile devices continue to replace desktops for everyday use.
A look at history:
does amd now have a 256 bit data path cpu?
AI Overview.
Yes, AMD does have CPUs with 256-bit data paths, and they also have CPUs
with 512-bit data paths. The "Zen 5" architecture, used in processors like the
Ryzen 9000 series and 5th Gen EPYC, features a 512-bit FPU (Floating Point Unit)
data path. However, some "Zen 5" cores, particularly those found in mobile SoCs
like "Strix Point", have a 256-bit wide FPU data path. Additionally, AMD's
EPYC 9004 series processors implement AVX-512 by effectively using a
256-bit data path twice (double-pumping).
Here's a more detailed breakdown:
what are AVX-512 instructions?
AI Overview.
AVX-512 (Advanced Vector Extensions 512) is a set of x86 instructions designed
to enhance performance, particularly for compute-intensive workloads like scientific
simulations, AI, and data analysis. These instructions operate on 512-bit vectors,
enabling parallel processing of larger data sets compared to previous AVX versions.
Here's a breakdown of key aspects:
AI Overview.
AMD EPYC 9004 series processors, also known as the 4th Gen EPYC, have a range
of power consumption levels depending on the specific model and workload.
The default TDP (Thermal Design Power) for these processors can range
from 165W to 400W, with some models even reaching 360W or higher.
For example, the EPYC 9754 has a default TDP of 360W and a configurable
TDP (cTDP) range of 320-400W.
Here's a more detailed breakdown:Trump says the U.S. has signed a deal
with China on trade, without giving details.
AMD Ryzen CPUs continue to crush Intel processors
on Amazon best-seller list.
:)++Try 1.
MPPT work? What software technology used? :)
what is the optimum power output for a wind mppt?
AI Overview.
The optimal power output for a wind turbine with MPPT (Maximum Power Point Tracking)
is the highest power that can be extracted from the wind at a given wind speed, and
this is achieved by constantly adjusting the turbine's operating point to match the
changing wind conditions. MPPT algorithms aim to find and maintain this optimal
operating point, ensuring the turbine delivers the maximum possible power for
the existing wind speed.
Here's a more detailed explanation:
Solar manufacturing is booming. Advocates say it could go bust without incentives.
AI Overview.
The maximum power point voltage of a solar panel is typically 75% to 80% of its
open-circuit voltage (VOC). This means that when a solar panel is operating at its
maximum power output, the voltage will be around 75-80% of the voltage it produces
when no load is connected (open-circuit voltage).
Here's a more detailed explanation:
Inexpensive solar charge/load controllers do ~mppt, we found over years of testing.
Iranian woman, who has lived in US for 47 years,
taken by Ice while gardening.
AI Overview.
U.S. Immigration and Customs Enforcement (ICE) is a federal law enforcement agency
under the Department of Homeland Security. It enforces federal laws governing border
control, customs, trade, and immigration. ICE's primary mission is to promote homeland
security and public safety through the enforcement of these laws.
Here's a more detailed breakdown:
Thursday June 26, 2025 17:43
____Embedded Systems:
This is a common use case for bare-metal C programming.
Many embedded systems (like those in cars, appliances,
or industrial equipment) don't have full-fledged operating
systems but utilize C code running directly on their microcontrollers.
gcc freestanding environment example.
AI Overview.
GCC Freestanding Environment Example A freestanding environment,
often referred to as "bare-metal," is a minimal C/C++ execution
environment that does not rely on a standard operating system
or its typical library facilities. Examples include operating system kernels,
embedded systems, or bootloaders.
To compile a program for a freestanding environment using GCC,
you need to use specific compiler and linker options.
Here's an example:
gcc -ffreestanding -nostdlib freestanding.c -o freestanding
This example provides a basic outline. Real-world freestanding development,
especially for operating systems or embedded systems, is much more complex
and involves careful low-level programming and platform-specific configurations.
____AI Overview.
James Gosling is a Canadian computer scientist best known as the
"father of Java." He led the development of the Java programming
language at Sun Microsystems in the 1990s. Java's platform independence
(write once, run anywhere) revolutionized software development, making
it widely used across diverse platforms and applications.
Key points about James Gosling and Java:
was james goslig's java influenced by forth's portability?
AI Overview.
Yes, Java's portability was significantly influenced by the concept of
using intermediate code, which is a key element in the portability of
languages like Forth and Pascal's p-code.
How this relates to Java's design:
In summary:
While Java's syntax and other features have roots in other languages
like C++, the fundamental principle behind its portability the use of a
virtual machine and intermediate code was inspired by techniques
used in languages like Forth and Pascal's p-code. This allowed Java to
achieve its goal of being "architecture-neutral and portable".
AI Overview.
Understanding USB 3.2 and Type-C - Tech Design Forum Techniques
USB 3.2 Gen 2, when implemented with a USB-C connector, offers a
data transfer rate of 10 Gbps (SuperSpeed+) and supports features like
Power Delivery (up to 100W) and DisplayPort Alternate Mode (DP
Alt Mode) for video output. It is also backwards compatible with older
USB standards.
Key Specifications:
~1.25 MB/s?
AI Overview.
The Hewlett-Packard (HP) 9800 series was first marketed starting in 1971
with the introduction of the HP 9810A. The HP 9800 series was a family of
desktop computers, initially marketed as "calculators" by HP, and included
several models introduced over time.
Here's a breakdown of the models and their release dates:
AI Overview.
IBM's Early PC Attracts Time Travelers | Hackaday The IBM 5100 Portable
Computer was first marketed in September 1975. It was announced on
September 9, 1975, with deliveries beginning in the same month,
according to Bitsavers.org.
____Nvidia Stock Hits All-Time High. 'Golden Wave'____
Of Gen AI Seen.
Metas recruiting blitz claims three OpenAI researchers.
Tesla's robotaxi peppered with driving mistakes in Texas tests.
Tesla's Robotaxis Are Going Poorly.AVX-512's Enormous Advantage For AMD EPYC 4005
Series Performance.
AI Overview.
The PassMark PerformanceTest benchmark includes an AVX-512 test,
which can impact CPU performance scores, particularly for Intel
processors that support it. AMD processors, however, do not
natively support AVX-512, which can lead to a performance
difference in benchmarks that utilize this instruction set. :(?
Blender 5.0 Introducing HDR Support On Linux With Vulkan + Wayland.
AI Overview.
Blender 5.0, like previous versions, is primarily funded by the Blender
Development Fund. This fund is a voluntary, crowdfunding initiative
where individuals and companies contribute money on a monthly
or yearly basis. Additionally, various companies like AMD, Nvidia, Meta,
Apple, Epic Games, and Ubisoft contribute as corporate sponsors, i
nvesting in Blender's development, often due to their vested interest
in its success and compatibility with their hardware and tools.
Here's a more detailed breakdown:
Before Windows 10 goes EOL, I'm testing three alternative
Linux distros to save my 6-year-old laptop from the landfill.
Try 1.
Wednesday June 25, 2025 15:58
____AI Overview.
No, Solaris itself is not a bytecode operating system.
Here's why:
____AI Overview.
No, not all flash memory devices contain a dedicated microcontroller
for managing the flash memory. While many devices like SSDs, USB flash
drives, and SD cards do utilize flash memory controllers (often integrated
with a microcontroller), simpler devices might rely on the host system's
firmware or software for basic flash management.
Here's a more detailed explanation:
____Stable careers are a myth and no one wants to be a leader:____
A new report reveals the depths of worker pessimism with
corporate America.China breaks RSA encryption with a quantum computer,____
threatening global data security.
[Was public keu broken in ~1991/2 by NSA?]
____Is the last bug was fixed." software fiction?___
AI Overview.
Based on the provided search results, the idea that
"the last bug was fixed" in software is considered
a myth and is generally viewed as unattainable.
Here's why:
Software Complexity: Modern software is inherently complex,
making it extremely difficult, if not impossible, to predict and
account for every possible user interaction, environmental variable,
and edge case that could trigger a bug.
Infinite Possibilities: Users interact with software in countless ways,
often in unpredictable environments (different operating systems,
hardware, configurations), leading to the emergence of bugs that
may not be caught during testing.
Evolving Software: Software development is an ongoing process.
As new features are added or existing ones are modified, new bugs
can be introduced, making the idea of a permanently "bug-free"
state unrealistic.
Subjectivity of "Bug-Free": What one person considers a "bug"
might be seen as a minor inconvenience or even expected
behavior by another, further complicating the notion of a
completely bug-free product.
Evolving Software: Software development is an ongoing process.
As new features are added or existing ones are modified, new
bugs can be introduced, making the idea of a permanently "bug-free"
state unrealistic. Subjectivity of "Bug-Free": What one person
considers a "bug" might be seen as a minor inconvenience or
even expected behavior by another, further complicating the
notion of a completely bug-free product.
Instead of aiming for 100% bug-free software, the focus in software
development is on minimizing risks, addressing critical bugs, and
managing bugs effectively. This involves strategies such as: [mainframe
mentality? ( ?]
While striving for excellence and minimizing bugs is essential, recognizing
that some bugs may always exist is a crucial aspect of realistic software
zdevelopment. The goal is to build reliable software that delivers value
to users, even if it's not entirely flawless. [:(-?]
AI Overview.
Yes, platform temperature can be an issue related to software bugs,
but often in the context of hardware-software interactions.
Here's why:
Hardware issues triggered by temperature: Overheating can cause hardware components like RAM or other parts to malfunction or fail. These hardware
issues, in turn, can manifest as software bugs, leading to crashes, errors, or
unexpected behavior.
Software's role in temperature management: Software (like operating
systems and firmware) plays a crucial role in monitoring and managing
system temperature, for instance by controlling fan speeds.
Software bugs impacting temperature sensing/control: A software bug in
temperature sensor reading or thermal management logic can lead to a
device overheating or misinterpreting temperature data, which can then
result in system errors.
Firmware sensitivity to temperature: In some cases, firmware can be
overly sensitive to temperature changes, leading to false errors, such as
in the example of a 3D printer's thermal runaway detection.
Diagnosing temperature-related bugs: It can be challenging to determine
whether a bug is rooted in software or hardware, as exemplified by the
Quora user's experience with a hardware-induced driver issue.
In summary: While software bugs aren't directly "caused" by temperature
in the sense of software code being directly changed by heat, platform
temperature can trigger or exacerbate software-related issues, often
via underlying hardware problems.Tesla removed from Charlottes approved EV list due to safety issues.____
Heres a running list of all of Teslas robotaxi mishaps so far.Intel Starts Layoffs Under Lip-Bu Tan,
Some Impacted Roles Listed.____ Stop These Things Weekly Round Up: 22 June 2025.Try 2.
Tuesday June 24, 2025 15:30
____AI Overview.
HyperTerminal, developed by Hilgraeve, was first marketed as a "lite"
version of their HyperACCESS program and licensed to Microsoft for
use in their set of communications utilities in 1995.
More specifically:
Hilgraeve's first software product was initially designed for 8-bit Heath
computers to communicate over a modem, and in 1985 it was ported
to IBM PCs and compatible systems.
Over time, this technology was ported to other operating systems l
ike OS/2, Windows 95, and Windows NT.
IBM bundled a version of Hilgraeve's terminal program, "HyperAccess Lite",
with OS/2 Warp 3.0 in 1994.
Microsoft followed suit and licensed HyperTerminal for bundling with
Windows 95, where it was included up through Windows XP.
In summary, while the underlying technology predates 1995,
HyperTerminal itself entered the market by being bundled with Windows 95.
____Hackers Target Over 70 Microsoft Exchange Servers to____
Steal Credentials via Keyloggers.AI Overview.____
FORTH, Inc. (founded in 1971): This company was founded by Charles H. Moore
and Elizabeth Rather to explore commercial uses of the Forth programming l
anguage. They developed and sold implementations of Forth for various
computers, starting with microFORTH for specific microprocessors in 1976.IBM Already Working On What Is Likely Power12 Support____
For The GCC Compiler.Data center spending soared amid rising GPU demand in Q1.____Teslas robotaxis have already caught the attention___
of federal safety regulators.
are there any linux oses which are hacker-proof?
AI Overview.
No, there is no Linux operating system that is truly "hacker-proof."
While certain distributions are designed with security in mind and come
with tools for penetration testing and security analysis, no OS
can be completely impervious to attacks.
Here's why:
Open-source nature:
Linux is open-source, meaning its code is publicly available. This
allows for constant review and modification, but it also means
potential vulnerabilities can be identified and exploited by
malicious actors.
Complexity:
Linux systems, especially those used for security testing like
Kali Linux, can be complex. Understanding and securing them
requires a high level of expertise.
Human error:
Even with the most secure system, user error or misconfigurations
can create vulnerabilities that hackers can exploit.
Evolving threats:
The threat landscape is constantly changing, and new attack vectors
are developed regularly. No OS can stay ahead of all possible
threats at all times.
While you can make Linux systems very secure through proper
configuration and ongoing maintenance, there's no silver bullet
to make them completely hacker-proof.
Examples of Linux distributions focused on security:
Tesla Robotaxi Terrifyingly Jerks Wheel Back and Forth While
Carrying Passenger.
Im not buying the Tesla robotaxi hype heres why
its still miles behind Waymo.Notepad++ Vulnerability Let Attacker Gain Complete System____
Control PoC Released.Building A Modern Dashboard with Python and Taipy.____
AI Overview.
Yes, Python is a software technology that uses bytecode and
has threading capabilities, but with nuances related to the
Global Interpreter Lock (GIL). Taipy is a Python library,
meaning it relies on Python's underlying architecture, i
ncluding its bytecode and threading mechanisms.
Here's a breakdown:
Python and Bytecode:
Python source code is compiled into bytecode before execution by the
Python Virtual Machine (PVM).
Bytecode is a lower-level, platform-independent representation of the
source code, allowing it to run on any system with a compatible Python
interpreter.
Python and Threading:
Python supports multithreading, allowing programs to have multiple threads
of execution within a single process.
However, the Global Interpreter Lock (GIL) in CPython (the standard Python implementation) ensures that only one thread can execute Python bytecode
at a time, limiting true parallelism for CPU-bound tasks.
The GIL is released during I/O operations (like file reads or network requests)
and certain C extension operations (like NumPy calculations), allowing other
threads to run concurrently during these times.
Taipy and Bytecode/Threading:
Taipy is a Python library for building data and AI applications, implying it runs on
top of the Python interpreter and utilizes its execution model.
Therefore, Taipy applications will inherit Python's bytecode execution and threading behavior, including the impact of the GIL.
Taipy supports asynchronous execution for handling long-running tasks
without blocking the user interface, which could involve features that
interact with Python's concurrency mechanisms.
In summary, both Python and Taipy, being a Python library, are related to
bytecode execution and threading, with the understanding that Python's
threading is constrained by the GIL in CPython.Intel makes a harsh decision amid declining sales.
Will FPGA Advancement Revive AMD's
Embedded Segment Revenues?.____ Worlds first wind- and hybrid-powered cargo shipTry1.
marks 2 years at sea.
Why forecasting offshore wind project costs
is getting even harder.
Monday June 23, 2025 19:21
____AI Overview.____
Microsoft's first multitasking operating system, Windows 1.0, was marketed
starting on November 20, 1985. It was released as a graphical operating system
shell for MS-DOS, marking Microsoft's initial foray into the world of graphical user
interfaces. While initially achieving modest success, it laid the foundation for
future versions of Windows.
AI Overview.
GW-BASIC first appeared in 1983. It was a disk-based Microsoft product distributed
with non-IBM MS-DOS computers. It was a dialect of the BASIC programming language, functionally identical to IBM BASICA, but it was self-contained and didn't require the
Cassette BASIC ROM chip found in the original IBM PCs.
AI Overview.
Intel released the first version of MCS BASIC-52 (version 1.0) for their 8051 family of microcontrollers in 1984. A manual for Version 1.0 is dated July 1984, indicating
that it was being developed around this time.
Subsequently, in 1985, Intel introduced the 8052AH-BASIC microcontroller which
had the Version 1.1 interpreter factory-masked into its ROM. This was the most
common version, despite having a few errors.
AI Overview.
WANG 2200 computer Wang Museum
The Wang 2200 Basic minicomputer was first marketed in May 1973.
Wang Laboratories released the Wang 2200, which i
ncluded a built-in BASIC interpreter, in May 1973. It was an all-in-one minicomputer
with a CRT display, keyboard, and integrated cassette tape storage. The first model was designated as the 2200-A, with later models like the 2200-B and 2200-C offering more arithmetic capabilities.
AI Overview.
Sinclair BASIC first appeared in 1980. It was the operating system for the Sinclair ZX80,
which was launched on January 29, 1980. The ZX80 featured an Integer-only version of
BASIC stored in a 4 KB ROM. This was later upgradable to an 8 KB floating-point BASIC
ROM after the release of the ZX81.
Sinclair BASIC was also used in subsequent Sinclair
computers like the ZX81 and ZX Spectrum. The ZX81 was launched on March 5, 1981,
and had a more complete, but not full, 8K BASIC interpreter in ROM.
Therefore, Sinclair
BASIC was first marketed in 1980, coinciding with the launch of the Sinclair ZX80.
AI Overview.
The Jupiter Ace was first marketed and went on sale on 22 September 1982. Initially,
it was available through mail order. By January 1983, production difficulties had been
overcome, and units started arriving in shops. The introductory price was £89.95.How to switch from Windows 10 to Linux: A technical guide.____
Microsoft surprises MS-DOS fans with remake of ancient
text editor that works on Linux.
Intel Xeon 6300 vs. AMD EPYC 4005 SMT/HT Performance.Elon MuskFirst Look at Teslas Robotaxi App:____
features, design, and more.
AI Overview.
No, Tesla robotaxis are not guaranteed to be hacker-proof.
Here's why:
Autonomous vehicles, including Tesla's, are complex systems relying on computer
control and interconnected devices. This increases the potential for cyberattacks.
Security researchers have demonstrated vulnerabilities in Tesla's systems.
For example, researchers successfully exploited a vulnerability in the Tesla
Model 3's Tire Pressure Monitoring System (TPMS) to gain remote code execution.
Even systems not specifically designed for self-driving, like TPMS, can be exploited
as entry points for malicious activities.
The interconnected nature of autonomous vehicles with other systems (like the
Internet of Things) creates a broader attack surface.
While Tesla has taken measures to address security, vulnerabilities can emerge
in complex systems, and ongoing efforts are needed to address them.
Experts emphasize the importance of continuous cybersecurity efforts and the
need for rigorous testing and robust safeguards in autonomous vehicle technology.
n summary, while Tesla strives for safety and security, like any technology, robotaxis
face the potential for cyberattacks. The emphasis on robust cybersecurity measures
and ongoing security updates is critical to address these risks and safeguard the
safety of autonomous vehicles.
Tesla Robotaxi rollout proves that Elon Musk still delivers, even if its late.Windows Snipping Tool now lets you create____
animated GIF recordings.
Microsoft Confirms Windows 11 Automatic Deletions:
Take Action Now To Protect Yourself.
I can't ignore these 8 drawbacks to open-source software.
I've been using this cheap ESP32-based display
instead of a Flipper Zero, and it's just as versatile.Tesla Stock Surges After Musks Robo-Taxi Rollout.____
Where Shares Go From Here.Zuckerberg Leads AI Recruitment Blitz____
Armed With $100 Million Pay Packages.
Super-rich Americans like Mark Zuckerberg and Jay-Z
have taken out mortgages for homes heres why.
Nvidia RTX 5090 beats RTX Pro 6000 in tests after shunt mod to a
staggering 800W consumer flagship barely scrapes past the
$10,000 Pro despite eye-watering power modification.Techie went home rather than fix mistake
that caused a massive meltdown.
Urgent alarm issued after mother of all data breaches
sees 16 billion passwords exposed do this ASAP.
____Diisabling Intel Graphics Security Mitigation Boosts
GPU Compute Performance 20% (phoronix.com).
Chinas First 6nm GPU Aimed to Rival NVIDIAs GeForce RTX 4060,
But Fell Short Against the Decade-Old GTX 660 Ti.
____is there new unaium mining near moab?Try 1.
AI Overview.
Yes, there is new uranium mining activity near Moab, Utah. The Velvet-Wood mine,
located in southeastern Utah, has recently been approved for reopening under a
fast-tracked environmental review process initiated by the Trump administration,
according to news sources. This mine is located south of Moab and Monticello,
and is the first project approved under the new process.
Here's a more detailed breakdown:
New York to Build One of First U.S. Nuclear-Power Plants in Generation.
What's plaguing America's power grid?.
Iran tensions make thermal coal a winner against pricier LNG.
Power utility built $95 million 500-megawatt power substation for
Intel's $100 billion Ohio fab, but six-year delay leaves substation
capable of powering 500,000 homes idle.
Israel says it struck Tehran's Evin prison ... .
Sunday June 22, 2025 14:11
____$2 development board features Puya PY32F030 Cortex-M0+ MCU
with 64KB Flash, 8KB RAM.
Process Explorer Is Task Manager Dialed To 11.
____is microsoft's decision to encourage installation of___
windows 11 on legacy hardware to make legacy
hardware look bad going to damage microsoft financially?
AI Overview.
Microsoft doesn't explicitly encourage installing Windows 11 on legacy
hardware. Instead, they have specific minimum hardware requirements for
Windows 11 installation, such as:
UEFI Secure Boot
Trusted Platform Module (TPM) version 2.0
Approved processors (8th generation Intel Core or newer, 2nd generation
AMD Ryzen or newer, or Qualcomm Snapdragon 850 or later) [:)?]
While installing Windows 11 on unsupported hardware is possible,
Microsoft strongly recommends against it. Installing Windows 11
on legacy hardware can have significant drawbacks and potential
risks, such as:
Lack of support:
Compatibility issues:
No guaranteed updates:
Potential for instability and performance issues:
Financial implications for Microsoft:
Conclusion:
Microsoft's decision to have strict hardware requirements
for Windows 11, rather than encouraging installations on legacy
hardware, is likely driven by a desire to provide a more secure
and stable user experience and potentially increase hardware sales.
While this approach may initially lead to some frustration among
users, it is unlikely to cause significant financial damage to
Microsoft. In fact, it could have positive financial implications
in the long run.
Microsoft finally allowed keeping 10 1909 on Lenovo
Ryzem 7 4700U 8+0 cores aftere destroying it with Windows 11 install.
First hp stresam 13 Celeron N3050 1/2/2.16 GHz 2/32 GB previously stuck
at 10 1511 for ~5y photographed 6/21/25 running 10 1909. :(
Above laptop at right charging.
Left stream 13 ran 10 20H2 but now runs Ubuntu.
hp steamsapparently have battery over-charge protection. Charge leds extinguish when over charge detected.
Amazon Web Swevices Boardman OR
AWS
AWS Employee housing?
Hood River OR,
Cannob Beach OR.
Microsft notfied 6/22/25 that the snipping tool was moving. Unable to save some pics with old snipping tool.
Microsofts Free Upgrade Deadline For 400 Million Windows Users.
Ready to ditch Windows? 'End of 10' makes converting
your PC to Linux easier than ever.IBM laid off 8,000 employees to replace them with AI____
what they didnt expect was having to rehire as many due to AI.
Prediction: This Artificial Intelligence (AI) Data Center Stock
Will Be Worth More Than Palantir by 2030.
The $50 Billion Company That Does Almost Nothing.
Try 5.
Saturday June 21, 2025 16:10
____Massive subsidies, minimal jobs: The math behind
America's data center boom.
From Killer Drones to Robotaxis, Sci-Fi Dreams Are Coming to Life.
____Tesla Robo-Taxis, With Human Safety Monitors,____
to Launch in 2 Days.
whata oses does tesla robotaxis use?
AI Overview.
Tesla utilizes Linux as the operating system for its robotaxi service,
which leverages its proprietary Full Self-Driving (FSD) software.
Tesla designs and manufactures its own custom hardware and software systems, including the onboard computers for its vehicles, utilizing a
custom operating system that is based on Linux.
Key aspects of Tesla's robotaxi software:
FSD Software:
Custom Software:
Linux Base: Tesla's central console and instrument cluster use Linux,
based on Ubuntu.
Embedded Systems:
Neural Networks:
Dojo Supercomputer:
are ubuntu dependencies certified?
AI Overview.
When discussing "certification" in the context of Ubuntu and its dependencies,
it's important to differentiate between hardware certification and software
certification.
Hardware Certification: Canonical (the company behind Ubuntu) certifies
hardware devices to ensure they are compatible with Ubuntu. This
certification process involves extensive testing to verify that the
hardware works reliably with the operating system.
The focus is on ensuring compatibility between the hardware and the
Ubuntu operating system, including drivers and overall system functionality.
Certified hardware receives continuous testing to ensure updates don't
negatively impact performance or reliability.
Benefits of certified hardware include reduced costs, faster time-to-market,
and increased peace of mind regarding compatibility and support.
Software Dependencies and Certification:
Standard Ubuntu packages and their dependencies are built from open-source
code on a trusted infrastructure. While they aren't individually "certified" in the same way as hardware, their origin and build process ensure they can be audited and are
designed to function in a particular way.
Ubuntu Pro offers FIPS 140-2 and 140-3 certified modules for cryptographic packages. These modules are tested and attested by a NIST accredited laboratory, ensuring
they meet rigorous security standards for sensitive environments like those in government and regulated industries.
Ubuntu's Extended Security Maintenance (ESM) provides security fixes for critical vulnerabilities in open-source software dependencies. These fixes are created by Canonical's security team and distributed through the same trusted build process
as regular Ubuntu packages, helping to mitigate software supply chain risks.
In summary:While hardware certification ensures a device's compatibility and reliable performance with Ubuntu, software dependencies in Ubuntu are not typically "certified" in theTherefore, while you might not find "certified" labels on individual dependencies
same manner as hardware.
However, Ubuntu's approach to software dependencies emphasizes security and reliability through trusted build processes, FIPS certified modules (available with
Ubuntu Pro), and ESM for security fixes.
in the traditional sense, Ubuntu provides mechanisms to ensure the security
and reliability of the software you run, particularly for critical components
and in regulated environments.Windows 11 vs. Ubuntu Linux Performance On The___
AMD Ryzen AI Max PRO 390 "Strix Halo.
Linux Delivering Driver Fix For 30 Year Old Creative SoundBlaster
AWE32 ISA Sound Card.The Computer-Science Bubble Is Bursting.
Try 1,
Friday June 20, 2025 17:20
____Bento Is An All-In-One Computer Designed To Be Useful.____
The rise of RISC-V: Is it a real threat to ARM and x86?.
Fission Simulator Melts Down RP2040.Tesla releases details about Robotaxi launch:___
theres a safety monitor in front seat.
Everything we know about Teslas robotaxi launch in Austin.
what is a secure safety-critical app?
AI Overview.
A safety-critical application is a software program whose failure could
lead to death, injury, or significant damage. These applications
are designed to operate with extremely high reliability and undergo
rigorous testing and validation to minimize the risk of failure.
Here's a more detailed breakdown:
Key Characteristics of Safety-Critical Applications:
High Reliability:
Rigorous Testing and Validation:
Safety Standards Compliance:
Fail-Safe Design:
Secure Development Practices:
Examples of Safety-Critical Applications:
Avionics Systems:
Automotive Systems:
Medical Devices:
Nuclear Power Plants:
Industrial Automation:
The Importance of Security:
In addition to functional safety, security is also a critical aspect of
safety-critical applications. A security breach could potentially
compromise the safety functionality of the system, leading to
serious consequences. For example, a hacker could exploit a
vulnerability in a medical device to cause harm.
In essence, safety-critical applications are those where failures can
have severe consequences, and therefore, they require a
high degree of reliability, rigorous testing, and adherence to
safety standards, as well as robust security measures to
ensure safe and dependable operation.
r is running an OS concurrently with a secure safety-critical app a good idea?
AI Overview.
In general, running a secure safety-critical application concurrently with a
general-purpose operating system (OS) on the same system is
not recommended due to significant risks.
Here's why:
Security Vulnerabilities:
Loss of Determinism:
Reduced Safety Assurance:
Complexity:
Alternative approaches for safety-critical systems:
Proprietary, Single-Purpose OSes:
Virtualization/Hypervisors:
In summary: While you can run multiple OSes on a single system using
technologies like hypervisors, directly running a safety-critical application
concurrently with a general-purpose OS is generally discouraged due to
security and reliability concerns. The emphasis in safety-critical systems
is on robust safety features, real-time performance, and a highly controlled
environment, which are often not well-suited for general-purpose OSes.Latest Bcachefs Code Draws Torvalds' Ire Over Late Feature Code.____
The $20 "Cheap Yellow Display" is the best addition to my smart home in months.The United States wondered how China managed to make such progress____
in the field of electronic chips. Huawei and Xiaomi are the answer,
with massive development.
Is China's RISC-V Pivot Undermining Arm's Growth Prospects?. Microsoft just revealed a way to keep using Windows 10 until 2032.
Microsoft is removing legacy drivers from Windows Update.
Windows 11 migration heats up... on desktops.
Small businesses are using AI, but not spending much.
Microsoft to lay off thousands in July,
but don't worry, AI's getting $80 billion.Broadband Outage Reports: CenturyLink, Quantum Fiber, Brightspeed
Among Networks Down.
16 Billion Apple, Facebook, Google And Other Passwords Leaked
Act Now.
184 million passwords for Google, Microsoft, Facebook,
and more leaked in massive data breach.
___White House moves to keep costly, dirty, unneeded Michigan coal plants open.Try 1.
Thursday June 19, 2025 13:09
___AI Overview.
Directly writing machine language hex codes and compiling
them with GCC in a standard way is generally not how you
use a compiler like GCC. GCC is designed to compile
higher-level languages like C, C++, and Assembly language
into machine code.
Here's why and what you can do instead:
____Post fromLenovo N6000 128/256 Windows 11 aptop.
Revo uninstaller used to remove Onedrive, Edge, and other Microsoft products.
wifi internet donwload very fast. 1.2 gs!
____AI Overview.____
Whether software obfuscation and endless updates are "threatening
the future of computing" is a complex question with no simple answer.
Here's a breakdown of the key points to consider:
1. Software Obfuscation and Security:
2. The Need for Updates:
3. Potential Drawbacks of "Endless Updates":
4. Are We "Trapped in a Perpetual Cycle of Updates"?
In Conclusion:
Software obfuscation, by itself, is not inherently a threat to computing.
However, its use by malicious actors and its impact on the "software
understanding gap" are important considerations. Regular software
updates are necessary for security and functionality, but their
frequency and scale can be challenging for both developers and users.
The "endless updates" trend, a product of the dynamic nature of
software development, may raise concerns about development
efficiency, user experience, and the overall complexity of
software systems.
he impact of obfuscation and updates is a subject of ongoing
research and discussion in the cybersecurity community.
Godot 4.5 Beta Released With Better Wayland Support.
are there better choices than c++ for safety-critical apps?
AI Overview.
Yes, there are programming languages that are considered better
choices than C++ for developing safety-critical applications, primarily
due to their emphasis on safety and reliability features built into the
language design.
Here are some of the key languages and why they are often
favoredover C++ in safety-critical contexts:
Ada:
SPARK:
Rust:
Why C++ Can Be Problematic (Despite its Popularity): While
widely used, C and C++ were not originally designed with
safety as a core goal. Their flexibility can make it easier to
introduce bugs, and they can exhibit undefined behavior.
In Summary: Languages like Ada and SPARK are specifically
designed for safety-critical applications with built-in features
and verification capabilities. Rust is also a strong alternative
with its memory safety features. The best choice depends
on project needs and team expertise.
is c++ losing favor because of obfuscation costs and
deppendenacy certification issues.
AI Overview.
While concerns about memory safety and the challenges of ensuring
security in C++ code are well-documented, the idea that C++ is l
osing favor specifically due to obfuscation costs or dependency
certification issues is not clearly supported by the provided
search results.
Here's a breakdown of the information found:
Obfuscation in C++:
In summary, while C++ presents certain complexities and security
challenges, including memory safety concerns, there's no strong
evidence to suggest that it's losing favor due to obfuscation
costs or dependency certification issues. The language
continues to be widely used and remains relevant in
various industries.
AI Overview.
The TIOBE index is a measure of the popularity of programming l
anguages, published monthly by the company TIOBE. It's based
on the number of search engine results for queries containing
a specific language, and is used to gauge the relative usage
and demand for different programming languages in the
software development industry.
Here's a more detailed explanation:New Linux Flaws Enable Full Root Access via PAM and Udisks____
Across Major Distributions.
How you can get Microsoft 365 (formerly Office) for free
- 3 easy ways.600MW data center campus proposed in Montana.____Meta's Scale AI deal has clients like Google halting projects,
contractors scrambling, and one investor bailing out.
One of ChatGPT's popular uses just got
skewered by Stanford researchers.____ First Solar Scales U.S. Manufacturing to Meet Rising Demand.Try 1.
Plan to remove 34 turbines from Highland wind farm.
The Wrong Way to Build a Nuclear Renaissance.
Wednesday June 18, 2025 19:44
____ZPUI Could Be Your Tiny Embedded GUI.____Charted: Future Electricity Usage by Country.
____$3.50 nanoCH57x CH570/CH572 RISC-V development board
offers USB-C port, 2.4GHz radio/BLE, and GPIO.
____Nvidia Goes Nuclear, Investing in Bill Gates Start-Up.
I always disable this one feature in every UEFI / BIOS.
____AI Overview.
To load and run a GCC C application on a Windows 11 laptop without having to use Windows 11,
you can either install MinGW (a Windows-based GCC distribution) or use a virtual machine with
a Linux distribution that includes GCC. Alternatively, you can use WSL (Windows Subsystem for
Linux) to run Linux alongside Windows.
Here's a more detailed explanation:
1. MinGW (Minimalist GNU for Windows):
2. Virtual Machine:
3. WSL (Windows Subsystem for Linux):
4. Other Options:
Zig Compiler:
MSYS2:
AI Factories Are Hungry for Power. Expect Gigawatt-Scale Growth.
how does u-boot work?
AI Overview.
U-Boot, short for Universal Boot Loader, is a versatile open-source bootloader primarily used
in embedded systems. It acts as the bridge between the hardware and the operating system, i
nitializing the system and loading the OS into memory. U-Boot performs hardware initialization,
loads the kernel and other necessary components like the device tree, and then transfers
control to the operating system.
Here's a more detailed breakdown:
1. Hardware Initialization:
2. Loading the Operating System:
3. Transferring Control to the Kernel:
4. Command-Line Interface (CLI):
5. Script Support:
In essence, U-Boot acts as a smart intermediary, taking the raw hardware and preparing it for
the operating system. Its flexibility and features make it a crucial component in the boot process
of many embedded systems.
This video provides a tutorial on the embedded bootloader U-boot:
____are "hardware compatibility " issues driving sofware writers'____
to support as many sofware versios as their are hardware versions?
AI Overview.
Yes, hardware compatibility issues can significantly impact software developers'
efforts to support different software versions, but it's not a direct one-to-one
relationship where every hardware version demands a separate software
version.
Here's why: [!!!] [Nvidia, Intel, AMD expense issue?]
Indian RISC-V Startup Slashes Design Time to Minutes.
NVIDIA to launch GeForce RTX 5090DD for Chinese market
with GB202-240 GPU and 24GB memory.
Microsoft study finds "infinite workday" is hurting productivity.
Visualized: How Many New Businesses Survive 10 Years?.
why is it important to have more than one windows 10 or 11 laptop?
AI Overview.
Having multiple Windows 10 or 11 laptops can be beneficial for various reasons,
including having a backup device, testing new features, or using different operating
systems for specific tasks. Dual-booting, which allows you to have both
Windows 10 and 11 on the same machine, offers similar advantages without needing
a second physical laptop.
Here's a more detailed look at the benefits:
Testing and Experimentation:AI Overview.
No, Windows 2000 was not the first operating system to use
ring 0 software, nor was it the first to expose it to a mass audience.
Here's a breakdown:
Ring 0 is a concept in operating system architecture. It represents the
highest level of system resource access, where the operating
system kernel functions.
Operating systems have utilized privileged access, similar to ring 0,
for many years, predating Windows 2000. The division between
privileged (kernel) and unprivileged (user) modes is a fundamental
aspect of modern operating systems.
The Windows 9x series (including Windows 95, 98, and Me), which
came before Windows 2000, also used ring 0 code, although their
architecture was a hybrid 16/32-bit system.
Windows 2000, based on the NT codebase, also used ring 0
for its kernel and core components, offering unrestricted access
to hardware and system resources.
The NT-based Windows operating systems (including Windows 2000
and later versions like Windows XP) are known for their kernel mode
drivers (Ring 0) and the security risks associated with them.
Thus, while Windows 2000 improved the Windows NT architecture
and security features, it did not introduce the concept of ring 0
software to the masses.
AI Overview.
No, when a user-mode application (running in ring 3) in
Windows 2000 attempts to execute a protected instruction
requiring a higher privilege level (like ring 0), Windows
2000 does not simply close the app window without an
error message. Instead, it will typically trigger a privilege
violation exception.
Here's why:
AI Overview.
No, the statement is not revision specific. It's a fundamental
aspect of operating system architecture, specifically how
Windows 2000 handles exceptions and privileged instructions,
regardless of its specific version or service pack.
Here's why:
AI Overview.
Can a User Fix a Windows 2000 Ring 0 Writer's Software Bug?
Generally, a regular user is unable to directly fix a Windows 2000
Ring 0 writer's software bug. Ring 0, also known as the kernel mode,
is the most privileged protection ring in the operating system.
It holds the core of the OS and interacts directly with the hardware.
Here's why users can't directly fix these bugs:
Privilege Level: Ring 0 code has full system privileges and direct access
to hardware. This is necessary for the OS to function properly, but also
makes it highly sensitive to modifications.
However, a user can take these steps to address Ring 0 issues:
Apply Windows Updates: Microsoft released service packs and security
updates for Windows 2000 that addressed many bugs, including those
affecting the kernel. Make sure your Windows 2000 installation is fully updated.
Are windows uppdates buggy?
AI Overview.
Yes, Windows updates can sometimes be buggy. While updates are
crucial for security and performance, Microsoft has faced criticism
for releasing updates that introduce new issues or break existing
functionality. These bugs can range from minor annoyances to major
problems like system crashes or boot failures.
Here's a more detailed look:
Hardware Compatibility:
Windows supports a vast range of hardware, making it challenging to ensure compatibility with every update.
AI Overview.
Yes, you can attempt to repair missing interrupt errors in Windows 2000,
as they are often related to driver or hardware conflicts that can be
addressed through troubleshooting.
Here's a breakdown of how to approach this problem in Windows 2000,
drawing on information from
the search results:____ Try 5.
Key Points:
Led by China's Growth, Offshore Wind Capacity Will Hit 100 GW by 2026.
Children born now may live in a world where the US
can only produce half as much of its key food crops.
Tuesday June 17, 2025 16:48
____are backdoors planted at ring 0?
AI Overview.
Yes, backdoors can be planted at Ring 0, also known as the kernel mode, which is the
most privileged level of an operating system.
Here's why and how it happens:
In summary, backdoors can be planted at Ring 0, and because of the high level of privilege at this
level, such backdoors are particularly dangerous as they can bypass security mechanisms,
maintain persistence, and gain complete control over the system.
is the linux kernel the same as ring 0 software?
AI Overview.
No, the Linux kernel is not exactly the same as ring 0 software, but they are very closely related.
The Linux kernel primarily runs in ring 0 (the most privileged execution mode on x86 processors).
However, "ring 0 software" can refer to any code running in that privileged mode, not just the
kernel. While the kernel uses ring 0, other software, like certain drivers, can also run in ring 0.
Here's a more detailed explanation:
Pro-Israel hackers claim cyberattack on Iranian bank.
do hack attacks frequencly involve ring 0 software?
AI Overview.
Yes, hack attacks frequently involve or attempt to gain access to Ring 0 software,
particularly the operating system kernel and its associated components like drivers.
Why hackers target Ring 0:
In summary, due to the immense power and control it offers, Ring 0 is a prime target
for attackers seeking to compromise systems and evade security measures. The sophistication
of these attacks continues to evolve, making kernel-level security a critical focus for both
security professionals and the development of new operating system features.
____ESP32-C61-DevKitC-1 development board features ESP32-C61____
low-cost WiFi 6 and Bluetooth LE 5.0 SoC.Windows 11s emergency June update causes even more bugs and chaos.____is there 3 a shared memory way to pass data from ring 0 to 3 in addition to 1 DeviceIoControl 2 Cloud way in Windows 10 ad 11?____
AI Overview.
Yes, in addition to DeviceIoControl and "cloud-based" methods, there are
other ways to pass data from Ring 0 (kernel mode) to Ring 3 (user
mode) in Windows 10 and 11, specifically through shared memory.
Here's how shared memory is used for this purpose:
are the intel n6000 and ryzen 7 7730 low power 8 bit platforms
as well as 16, 32, and 64 bit platforms?
AI Overview.
Both the Intel N6000 and the AMD Ryzen 7 7730U are designed as low-power processors.
Intel N6000: It has a default TDP (Thermal Design Power) of 6W,
making it suitable for passively cooled devices like tablets, laptops, and mini-PCs.
AMD Ryzen 7 7730U: It has a TDP of 15W, indicating it consumes relatively
little energy.
Regarding bit platforms:
Both processors primarily operate on 64-bit architectures. This is the standard
for modern processors designed for general-purpose computing. While they
support operations on smaller data sizes (like 8-bit, 16-bit, and 32-bit),
they are optimized for and function within a 64-bit environment.
In summary:
Low power: Yes, both processors are designed for low power consumption.
8-bit platform: No, neither is an 8-bit platform. They are primarily 64-bit processors, supporting smaller data sizes for compatibility and certain operations.
16, 32, and 64-bit platforms: Yes, they support operations on 16, 32, and 64-bit data as part of their 64-bit architecture.
do the intel n6000 and ryzen 7 7730 both support 8 bit add with carry i
nstructions and other 8 instructions?
AI Overview.
Yes, both the Intel N6000 and the AMD Ryzen 7 7730U, being x86 architecture processors, support 8-bit ADD with carry (ADC) instructions, along with a
wide range of other 8-bit operations.
Explanation:
ADC Instruction: The ADC instruction (Add with Carry) specifically performs an
addition operation and includes the value of the carry flag (CF) in the result.
This is crucial for multi-byte arithmetic operations, allowing for the correct
handling of overflows.
In summary:
Intel N6000: As an x86 processor, it supports 8-bit instructions, including ADC.
AMD Ryzen 7 7730U: Also based on the x86 architecture (specifically Zen 3),
it includes support for 8-bit operations and instructions like ADC.
Therefore, you can expect both processors to handle 8-bit addition with carry,
as well as various other 8-bit instructions, as they are fundamental components
of the x86 instruction set architecture.
can a 64 bit multiply using add with carry written for a 8 bit platform also run on a Intel n6000 and AMD Ryzen 7 7730?
AI Overview.
Yes, a 64-bit multiply operation implemented using an "add with carry" routine
(designed for an 8-bit platform) can technically run on Intel N6000 and
AMD Ryzen 7 7730 processors, which are 64-bit processors.
Here's why:
In summary:
While the 8-bit add with carry method can be executed on these processors
because the underlying instructions are present, it's not the most efficient or
practical way to perform 64-bit multiplication on such powerful machines.
Modern 64-bit processors offer much better native support for 64-bit arithmetic operations.
Dive deeper in AI mode.
Allwinner H618.
Multithread Rating 653
Single Thread Rating 395
Clockspeed: 1.4 GHz
Cores: 4 Threads: 4
Oranage Pi zero 2W H618 hosstig Ubutu Chinaruns MUL53 accurately while consumerig ~<1 W ... and fast!
H618 uses an ARM Curtex A53 processor. :)
____Linux 6.17 Looks Like It Could Go Ahead And Make
SMP Support Unconditional.7 DOS games that have incredible modern remasters.____Intel will lay off 15% to 20% of its factory workers,____
memo says.Vandals cut fiber-optic lines, causing outage for Spectrum
Internet subscribers.
AT&T outage: Millions across US lose service as network goes dark.
Anubis Ransomware Encrypts and Wipes Files, Making
Recovery Impossible Even After Payment.
TP-Link Router Flaw CVE-2023-33538 Under Active Exploit,
CISA Issues Immediate Alert.
____States, ratepayer advocates urge FERC to reject MISO petitionTry 1.
to limit market monitor oversight.
Nuclear-Related Stocks Surge.
This Stock Has Soared 195% Since Sam Altman Left.
Monday June 16, 2025 16:06
____Luckfox Lyra Zero W is a small Rockchip RK3506B SBC with MIPI DSI connector,____
WiFi 6 and Bluetooth 5.2.
Tesla confirms massive hardware change for autonomy improvement.
Mapped: The Biggest Tech Talent Hubs in the World.
Uniwill Laptop Driver Proposed For Linux To Enable Additional Features.
is there a fig forth for the 1802
AI Overview.
Mystery 1802 Computer Was A Homebrew Project | Hackaday Yes, there
is a FIG-Forth implementation specifically for the RCA 1802 microprocessor.
The FIG-Forth Manual provides detailed documentation on its design, implementation,
and how it works with the 1802. This manual includes information on how to test
and replicate the FIG-Forth implementation on hardware, like the Lattice board,
which includes the necessary hardware. Furthermore, a document from the
Forth Interest Group details a specific version of FIG-Forth for the 1802,
including its assembly, start-up constants, disk buffer sizes, and UART configuration.
is there a fig forth for the 6502/
AI Overview.
Yes, there is a fig-Forth implementation specifically for the 6502 processor.
The Forth Interest Group (FIG) released a version of their fig-Forth system
for the 6502, including assembly source code. This implementation was
designed to be relatively easy to port to different 6502-based systems,
with the main differences being in the input/output routines.
Here's a more detailed breakdown:
is there a fig forth for the 8051 family?
AI Overview.
Yes, there is a FIG-Forth implementation for the 8051 microcontroller family. William H. Payne's book provides a complete "kit" for building an 8051 Forth system, including a metacompiler for the IBM PC. This FIG-Forth version is designed to map well onto the 8051's architecture.
Here's a more detailed explanation:
Is there a FIG forth for various 8080 platforms?
AI Overview.
Yes, there was a FIG-Forth implementation for the Intel 8080 processor. The Forth Interest Group (FIG)
released a version of FIG-Forth specifically for the 8080, which was later integrated with the CP/M
operating system. This implementation allowed users to run Forth on various 8080-based systems,
including those using CP/M.
Here's a more detailed breakdown:
Barry Werger Barry Werger ·
Why were the 16 bit computers so much more powerful than the 8 bit computers?
Having been computing in this era, Ill give a slightly different answer. Most 8-bit processors were very
limited in ways beyond the bus/register sizes. And specifically, they were very limited in ADDRESSING MODES.
they could not support many basic operating system features such as re-entrant code because of this.
The Motorola 6809 was considered one of the peak 8-bit processors, to the point that it was sometimes
referred to as an 8/16 bit processor. This manifested in obvious ways, such as a multiply and divide
instructions that grouped two 8-bit registers together to provide 16 bit operands (for division) or
results (for multiplication). But more importantly, it supported (uniquely in the 8-bit world, or at least rarely)
complex addressing modes that involved 16-bit pointer arithmetic. Specifically, this allowed reentrant
code that enabled pretty much all the advanced OS features of the time OS-9, a popular OS for the 6809,
was basically Unix running on an 8-(ish)-bit processor. This made, for example, the cheap and
childishly-marketed TRS-80 Color Computer a real sleeper powerhouse in many non-mainstream
applications. OS-9 and other 6809 OSes were the standard for many real-time applications, and i
n many cases this remains the situation today, all because of the OS features enabled by the complex
addressing modes. so, in addition to the size of the busses and registers, what sets the 16-bit generation
of processors apart from the 8-bit generation is that pretty much all of them included the more advanced
addressing modes that enabled modern OS features, vastly enhancing capabilities to the point that they
could soon compete with minicomputers, and became the primary locus of software development and
deployment.
5.8K views View 41 upvotes View 1 share.
Update Windows Now Microsoft Confirms System Takeover Danger.Intel Nova Lake.
Intel Core Ultra 9 185H.
Multithread Rating 29425
Single Thread Rating 3699
Typical TDP: 45 W
TDP Down: 35 W :)?
AMD EPYC 9124.
Typical TDP: 200 W. :(--
____iis commerical jet flight control software a safety-critical app?___
AI Overview.
Yes, commercial jet flight control software is absolutely a safety-critical application.
Its failure could lead to catastrophic consequences, including loss of life, significant
property damage, or environmental harm.
Elaboration:
does Linux Alpine have protected-mode instructions?
AI Overview. T
he protected mode in the x86 architecture LeftAsExercise Yes, Alpine Linux
utilizes protected mode on architectures that support it (like x86-64). It's
a fundamental part of how modern operating systems, including Linux
distributions, manage memory and access control. Alpine Linux, being a
general-purpose operating system, leverages protected mode to
isolate processes, manage memory allocation, and implement security features.
Here's a more detailed explanation:
does Linux Kali have protected-mode instructions?
AI Overview.
Yes, Kali Linux, being a standard Linux distribution, utilizes protected mode
in its operation. Protected mode is the standard operational mode for
modern x86-compatible CPUs, including those used by Kali Linux, and
is crucial for its functionality.
Here's why:
does ubuntu core have protected-mode instructions?
AI Overview.
Yes, Ubuntu Core utilizes protected mode for its kernel and applications.
It leverages the security features provided by protected mode, such as
memory protection and privilege levels, to ensure a secure and stable
environment for embedded systems and IoT devices.
Here's a breakdown:
is there a second method other than deviceiocontrol for transmitting
data from protected ring o to app ring 3?
AI Overview.
Yes, there is another method for Ring devices to transmit data to the Ring app
beyond DeviceIoControl. Ring devices primarily communicate with the Ring
app through cloud-based services. This means that when a Rin
g doorbell button is pressed, or motion is detected, the device sends this
information to Ring's servers. The app then retrieves this data from the cloud, r
ather than directly from the device.
Here's a more detailed breakdown:
is there a differnec in code between copy/paste and drag and drop
in windows 10 and 11?
AI Overview.
While the user experience of "copy/paste" and "drag and drop" in Windows 10 and 11
is similar, there are some subtle differences in the underlying mechanisms and how
they handle file operations, especially regarding the default behavior for moving
vs. copying.
User Experience:
are ring 0 windows device drivers written in c++?
AI Overview.
While modern Windows device drivers can be written in C++, they are often written
in C due to historical reasons and the need for strict resource management and
portability. C++ was officially supported for most drivers starting with Windows 8,
but even then, a subset of C++ functionality is generally used, according to OSR
Online.
Here's a more detailed explanation:The Latest X.Org Server Activity Are A Lot Of Code Reverts.____AI race between US and China resembles Cold War Marc Andreessen.____We're done" - major government organization
slams Microsoft Teams as it drops Windows for good.
Try 1.
Sunday June 15, 2025 08:43
____does DeviceIoControl still exist in windows 10 and 11?___
AI Overview.
Yes, the DeviceIoControl function, used for direct device input and output
control in Windows, still exists in Windows 10 and 11. It provides a general-purpose
interface for applications to interact with device drivers through control codes.
DeviceIoControl is a fundamental part of the Windows API and is used in a wide
range of applications that need to communicate directly with hardware or devices.
It allows for sending specific commands and receiving data from device drivers,
enabling low-level control and interaction with hardware components.
Key points about DeviceIoControl:
do linux distros support protected mode instructions?
AI Overview.
Yes, all modern Linux distributions support and rely on protected mode.
Protected mode is the standard operating mode for the x86 architecture
used by virtually all modern operating systems, including Linux distributions.
Explanation:
is there an 386+ OS that allows execution of all x86 instructions?
AI Overview.
Yes, operating systems like Windows 95, Windows 98, and modern Linux
distributions (with a 32-bit kernel) can execute all x86 instructions, including
those introduced with the Intel 386 processor and later. These operating s
ystems leverage the 32-bit protected mode capabilities of the 386 and subsequent
processors to run a wide range of applications, including those designed for
earlier 16-bit processors like the 8086 and 80286.
Here's why:The Tech Job Meltdown (professoraxelrod.com).
____Stop These Things Weekly Round Up: 15 June 2025.Try 3.
Saturday June 14, 2025 07:22
____do sata memories use DMA in windows?___
AI Overview.
Direct Memory Access (DMA): Working, Principles, and ... Yes, SATA (Serial ATA) memory
(storage devices like SSDs and HDDs) in Windows always uses Direct Memory Access (DMA). This means that data transfer between the SATA device and your computer's memory happens
directly, without needing constant intervention from the CPU.
Here's why:
SATA inherently uses DMA:
Intel preparing budget Core 5 120F 6-core CPU featuring only P-cores.
Intel Core 5 120U.
Multithread Rating 17120
Single Thread Rating 3758
Typical TDP: 15 W
TDP Down: 12 W
Cassette Data Storage From The 1970s.Ranked: The 50 Richest Countries by GDP Per Capita in 2025.
Try 2.
Friday June 13, 2025 19:42
____The cloud broke Thursday and it'll happen again
- how to protect your business before then.
Bcachefs Is Now Able To Auto-Fix A Few More Fsck Errors.
3 reasons I'll never trust an SSD for long-term data storage.
____AI Overview.____
Using DMA for data transfer can significantly increase speed compared
to not using DMA, especially in applications with high data transfer rates
or where the CPU needs to be free for other tasks. DMA eliminates
CPU involvement in data transfers, allowing the CPU to perform other
operations while the DMA controller handles the transfer, leading
to faster data processing and potentially a more responsive system.
Here's a breakdown of the speed improvements: CPU-Free Data Transfer:
how to ensure that windows is using dma transfersi?
AI Overview.
To ensure Windows is using Direct Memory Access (DMA) for data transfers,
you need to verify that DMA is enabled for the relevant hardware devices.
This is typically done through Device Manager. You'll need to navigate
to the specific device (e.g., IDE ATA/ATAPI controllers) and its properties,
then check the "Advanced Settings" or similar tab to enable DMA.
Here's a more detailed breakdown:
AI Overview.
To enable DMA (Direct Memory Access) in your system, you can typically do so
through your computer's BIOS or by using a software utility like Device Manager.
In Device Manager, navigate to the specific device for which you want to enable
DMA and change the "Current Transfer Mode" to "DMA if Available".
Here's a more detailed breakdown:Ryzen 5 5500X3D stealthily unveiled as AMD's newest Zen 3___
desktop offering.
AMD Ryzen 5 5600X3D.
Typical TDP: 105 W.
Multithread Rating 21879
Single Thread Rating 3187
AMD Ryzen 7 7730U.
Typical TDP: 15 W
Google Cloud outages: Spotify, Discord, Snapchat
and more were down for hours.9999999
Cloudflare Blames Google Cloud For Mass Services Outages.
Is Meta really spending $15 billion to hire a 28-year-old?.____ China Leaves West in the Dust: Its Small Nuclear Reactor Leap____
Puts Beijing Years Ahead in the Future of Clean Energy.
China solar industry to address overcapacity challenge but turnaround far off,
experts say.Worker dies in wind turbine after climbing device accident.Try 1.
Amazon joins the big nuclear party, buying 1.92 GW for AWS.
Wednsday June 11, 2025 17:22
___Quantum Tiny Linux SBC features an Allwinner H3 SoC, WiFi,
a small Display, and more. CPU Quad-core Cortex-A7 @ 1GHz. :)
____Talen to sell Amazon 1.9 GW from Susquehanna nuclear plant.____
Fine-tuning LLMs is a waste of time (codinginterviewsmadesimple.substack.com).
mean: does windows 11 run slower on new inexpensive computers?
Yes, Windows 11 may run slower on new, inexpensive computers, especially those with limited RAM or storage. Windows 11 has higher system requirements than previous versions and can be resource-intensive. This means that if a computer doesn't meet these requirements, it may struggle to run Windows 11 smoothly.
Here's why:
Here's a more detailed explanation: Higher System Requirements:how is tdp computed?___
AI Overview.
CPU TDP (Thermal Design Power) Explained In computer hardware,
Thermal Design Power (TDP) is a measure of the maximum amount
of heat a component, like a CPU or GPU, can dissipate under normal
operating conditions. It's usually expressed in watts and indicates the
component's cooling requirements and power consumption. TDP is
not the same as actual power consumption, but rather the maximum
heat the component needs to be cooled away.
Here's a more detailed explanation:
AI Overview.
Yes, a Lenovo laptop running Windows 10 or Windows 11 can pause updates for
up to 35 days, regardless of whether Microsoft requires an update at the time of pausing.
After that period, the system will resume automatically installing updates.
Explanation:Ubuntu Server Weighing Tmux vs. Screen, Wget vs. Cur.
____Bipolar Uranium Extraction From Seawater With Ultra-Low Cell Voltage.Try 2.
Tuesday June 10, 2025 18:59
____Google Offers Buyouts to Employees in Search and Ads, Other Units
____has microsoft recently limited pause updates for only one day?
AI Overview.
No, Microsoft has not recently limited pause updates for only one day.
The ability to pause updates for up to 35 days still exists in Windows
10 and 11. You can pause updates in Windows Update settings for
up to 35 days, but after that, you'll need to install the latest updates
before you can pause them again.
AI Overview.
New operating systems often don't work well on older hardware
because newer OS versions require newer hardware features and
capabilities, and older hardware lacks the necessary components.
Additionally, newer OS versions may not include drivers for older
hardware, or the new OS may not be compatible with the
specific hardware configuration.
Here's a more detailed explanation:.
AMD Preps Linux Support For User CPUID Faulting.
In conclusion, while the specific names "8051" and "Forth" might not be used, the Soviet Union definitely
utilized similar technologies and programming concepts in their weapons systems. They probably developed
their own microcontroller designs and stack-based programming languages for embedded control purposes.
____The GeeFarce 5027 POS is a PC disguised as a graphics card.____IBM just took a 'significant' step toward useful quantum computing.____
Meta launching AI superintelligence lab with nine-figure pay push,
reports say.
The Ongoing BcacheFS Filesystem Stability Controversy.Samsung Galaxy S25 series camera ring issue sparks concerns.
____Dead and gone: Trump's most hated offshore wind farm pulls the plug.Try 2.
EconomyRanked: Top Countries by Annual Electricity Production (19852024).
Monday June 9, 2025 16:19
____
AI Overview.
Yes, in general, adding more cores to a CPU significantly improves multitasking performance
but has a more limited impact on single-task performance. While a multi-core CPU can still
perform single-core tasks, the primary benefit of more cores is the ability to handle multiple
tasks concurrently.
Elaboration:.
Intel Celeron N4020 @ 1.10GHz
Multithread Rating 1545
Single Thread Rating 1137
Typical TDP: 6 W
Intel Pentium Silver N6000 @ 1.10GHz
Multithread Rating 3000
Single Thread Rating 1393
Typical TDP: 6 W
Both ~$119=130 Asus and Lenovo. Best Buy and Walmart.
____AI Overview.
The highest reported clock speed for a RISC-V processor is 5 GHz. This was achieved by
Micro Magic, who demonstrated a 64-bit RISC-V core operating at 5 GHz with a CoreMark
score of 13,000 while consuming only 1 Watt of power. Additionally, the same core has
been demonstrated to operate at 3 GHz with 8,000 CoreMarks, while consuming less than 70mW,
according to EETimes.
AI Overview.
The ESP32-C3 RISC-V core can operate at a maximum clock speed of 160 MHz.
The ESP32-P4, a high-performance SoC, features a dual-core RISC-V CPU that can run
up to 400 MHz, according to Espressif. The ESP32-C5, another RISC-V MCU, can also
reach a clock speed of 240 MHz.
AMD EPYC 4345P 8-Core CPU Performance.
AMD EPYC 4345P:
Multithread Rating 37671
Single Thread Rating 4672
Typical TDP: 65 W
Rtzen 7 7730:
Multithread Rating 18127
Single Thread Rating 3014
Typical TDP: 15 W
AMD Ryzen 7 5800HS:
Multithread Rating 19736
Single Thread Rating 2994
Typical TDP: 35 W
____Solar Bankruptcies Show US Clean Energy Industry Is Teetering on the Brink.____
The USB-C dream is dead and its too late to revive it.
Amazon to spend $20 billion on data centers in Pennsylvania,
including one next to a nuclear power plant.9 Open Source Operating Systems That Aren't Linux.___
LoongArch Enables Multi-Core Scheduler Support In Linux 6.16.Nearly 25% of Americans are now functionally unemployed____
heres what that harsh reality really means.Microsoft quietly burying a massive Windows 7 hardware
driver feature as Windows 11 kills it.
\1
1 Lenovo Ryaen 7 4700U 8+0 core running Windows 10 1909 +20H2>? AND hOTmETAL for years
recently quit running Hotmetal and suffered other software damages.
2 Microsoft offered to Installl Winodws 11.
3 Offer accepted.
4 4700U performed so badly that it was ~unusable.
5 Windows 111 1909 reinstalled along with Hotmtal>
6 4700U now runs Hotmetal and runs faster than when ~22H2 instALLED.
7 uUpdate paused untilJune 1, 2025.
8
Google Chrome displayed a message at the botton that MIcrosoft Edge should be used.
9 Is Microsoft on its way to bankruptcy?
10 Microsoft message receuved us how bad Windows 11 us runnning on legacy hardware.
Intel
Celeron11
11 Message delivered is how good Windows 10 1909 works on legacy hardware
... including hp stream 13 9N3050 2/32 GB laptop. :)
AI Overview.
No, Microsoft will not continue to push Windows updates or security fixes on computers after
October 14, 2025, when Windows 10 support ends, even if updates are paused. The updates
will cease, and Microsoft will no longer provide technical assistance or security patches. However,
the computer will continue to function, according to Microsoft Support.
Explanation:
____West Virginia coal mine had 30 years of production left. It will close..Try 1.
Sunday June 8, 2025 10:17
____what is uobtainium?____
AI Overview.
Unobtanium is a term used to describe a material that is desirable for a particular
application but is incredibly difficult or impossible to obtain, often due to its rarity, cost,
or the fact that it's fictional. The term is often used humorously or in a hand-waving
manner when describing materials with highly desirable, yet unattainable, properties.
Elaboration:
what technologies allow Nvidia, Intel and AMD to bring new hardware
AI Overview.
Nvidia, Intel, and AMD utilize a combination of cutting-edge technologies and efficient
product development processes to accelerate their hardware product releases.
Key Technologies:
Modular Reference Architectures:
Leveraging platforms like NVIDIA's MGX allows system
builders to use reference designs and CPU host processor modules to reduce
development costs and slash development time. This reduces the need to build
every component from scratch for each product.
Rapid Prototyping and Iterative Design:
Employing rapid prototyping techniques, potentially involving 3D printing and additive
manufacturing, speeds up the process of concept creation, testing, and refinement.
This allows for the creation of multiple prototype variations quickly, facilitating quicker
realization of product concepts and speeding up design validation.
Advanced Semiconductor Packaging:
Technologies like 2.5D and 3D packaging allow multiple chips to be integrated into a single package,
sincreasing performance and power efficiency while reducing cost and complexity. This is essential
for high-performance computing (HPC) and AI applications, which require more sophisticated and capable microelectronic devices.
High-NA EUV Lithography: I
ntel's use of high-NA EUV in its 14A process, for example, allows for the creation of smaller
and more precise features, which increases transistor density and improves energy efficiency.
This technology is critical for pushing the boundaries of what's possible in chip design.
Specialized Accelerators:
Companies like Intel employ dedicated accelerators like Intel Quick Assist Technology (QAT),
Intel Dynamic Load Balancer (DLB), Intel In-Memory Analytics Accelerator (IAA), and Intel
Data Streaming Accelerator (DSA) to handle specific tasks and workloads efficiently.
Development Processes:
Streamlined Collaboration with Partners:
The companies leverage their global network of partners to speed up product development
and deployment. For example, NVIDIA's collaboration with cloud service providers like AWS,
Google Cloud, and Microsoft Azure enables developers to access and utilize NVIDIA GPUs
within those platforms.
Data-Driven Product Development:
This likely involves utilizing data analytics and insights to inform product design and
development decisions.
By combining these advanced technologies and efficient development practices, Nvidia,
Intel, and AMD can bring innovative hardware products to market more quickly than would
otherwise be possible.ChatGPT Patched A BIOS Binary, And It Worked.
____Stop These Things Weekly Round Up: 8 June 2025.Try 1.
Saturday June 7 2025 07:37 ____ which Linux distros are single taks OSs?____
AI Overview.
It seems there might be a misunderstanding in the wording of your question. "Single taks OS"
doesn't appear to be a recognized term in the context of Linux distributions. Linux distributions
are operating systems, and they are all "taks" in that they perform a variety of tasks, including
handling user interface, managing files, networking, and running applications. However, some Linux
distributions focus on specific tasks or use cases, and could be considered "more single-task" than
others in a broad sense.
For example:
Alpine Linux: .
This is a very lightweight distribution designed for resource-constrained environments and is
often used for server-side applications or embedded systems. While it does more than just
handle one task, it's optimized for efficiency and minimal resource usage.
Kali Linux: .
Known for its focus on penetration testing, ethical hacking, and cybersecurity,
Kali Linux is a single-task OS in the sense that its primary use case is to provide the tools
and environment for that specific purpose.
Ubuntu Core: .
s
A specialized version of Ubuntu designed for IoT (Internet of Things) devices,
it is focused on running applications on these embedded systems. It is important to note that
even "single-task" distributions can still be used for a variety of purposes.
U.S. Manufacturing by State: Who Gains Most from Made in America?.Top researchers leave Intel to build startup with the biggest, baddest CPU.AMD's Kernel Compute Driver "AMDKFD" Can Now Be Enabled On RISC-V.
AMD Radeon RX 9060 XT 8GB Review: Not Good,
Tesla AI VP Milan Kovac Resigns After 9 Years Leading FSD and Optimus Projects.
The Bellmac-32 CPU What?.
Americas Largest Defense Contractors. [certified softwar used?]
Over 7 million Americans are unemployed the most since 2017. Why it wont get better anytime soon.
____Indias Coal & Gas Decline Signals Accelerating Renewable Energy Transition.Try 1.
The NRC is conducting a special inspection at the Quad Cities nuclear plant. Here's why:.
Friday June 6, 2025 18:27
____Microsoft fights USB-C chaos on Windows 11 laptops with new label.____
Over 4 billion user records leaked in "largest breach ever"
- here's what you need to know.Intel Celeron N4020 dual-core mini PC
sells for $45 with 4GB RAM, 128GB eMMC flash.
~6 W?
AI Overview.
USB 3.2 Gen 2 Type-C Male to Type-A Male Cable USB 3.2 Type-C supports
several data transfer speeds: USB 3.2 Gen 1 (5 Gbps), Gen 2 (10 Gbps),
and Gen 2x2 (20 Gbps). The Gen 2x2 speed is achieved by using two
10 Gbps lanes, effectively doubling the bandwidth.
AI Overview.
Wi-Fi 5, also known as 802.11ac, offers a maximum theoretical speed of 3.5 Gbps.
In real-world scenarios, users are likely to experience speeds closer to 866 Mbps or
1733 Mbps, depending on their device and the router's capabilities. These speeds are
faster than Wi-Fi 4 (802.11n), which has a maximum theoretical speed of 600 Mbps.
AI Overview.
AMD Announces Radeon RX 9060 XT Graphics Card, Claims ... The AMD Radeon RX 9060 XT
typically consumes between 150W and 182W of power. It can reach boost clock
speeds of up to 3.1 GHz and is equipped with 32 RDNA 4 compute units, 32 RT
accelerators, and 64 AI accelerators. AMD recommends a 450W power supply for
systems using this GPU.
Next-gen E2 SSDs pack 1 petabyte of storage,
enough for 11,000 4K movies in a ruler-sized drive.
Intel vs AMD? Microsoft seemingly has a clear recommendation
for Windows 11 Pro PC upgrade
____Linux 6.16 NFS Client Exposes LOCALIO State Via sysfs.____Tesla seeks to block city of Austin from releasing records on robotaxi trial.
____Houston-based solar energy company Sunnova Energy announces mass layoffs.Try 2.
s
Thursday June 5, 2025 17:03
____Does PJM have a data center problem?.____
Proposed Alaska bitcoin mine would use as much power
as the states largest coal plant produces.
Data Centers Are Building Their Own Gas Power Plants in Texas.
FreeBSD Developers Deciding What To Do For WiFi With FreeBSD 15: Stable Or Unstable.
Corporate layoffs have ramped up in recent weeks. Here are the companies making cuts.how many gcc c x86 compiler issues are awaitig a fix?
AI Overview.
It's difficult to provide a precise number of outstanding GCC C x86 compiler issues
without accessing the bug tracking system directly. The number is constantly changing
as new issues are reported and old ones are fixed. However, here's what
can be said:
GCC is actively maintained:
The GNU Compiler Collection (GCC) uses a bug tracking system where issues are reported
and tracked. No exact number: While the bug tracking system exists, the exact number
of outstanding issues, especially for a specific combination like "C x86 compiler issues,"
might not be readily available in a public dashboard. Active development: New
versions of GCC are released +regularly, incorporating bug fixes and improvements.
Bug tracking:
The GNU Compiler Collection (GCC) uses a bug tracking system where issues are
reported and tracked.
No exact number:
While the bug tracking system exists, the exact number of outstanding issues, especially for a specific combination like "C x86 compiler issues," might not be readily available in a public dashboard.
Active development:
New versions of GCC are released regularly, incorporating bug fixes and improvements.
____A full Atari 8-bit computer has been____
recreated on a stamp-sized FPGA module.
Piko, Your ESP32 Powered Fitness Buddy.
Machine Code Isn't Scary (jimmyhmiller.com).
This compact Ryzen 7 mini PC with 32GB RAM is only $299 today.
which is better value a mini pc or a laptopo?
AI Overview.
Generally, a mini PC offers better value for money than a laptop, especially when
considering price-to-performance ratio. Mini PCs can provide comparable performance
to laptops at a lower cost, requiring only a monitor, keyboard, and mouse to be complete.
However, the decision depends on your needs, as laptops offer portability and
all-in-one convenience.
Rust-Based Redox OS Begins Implements X11
Support, GTK3 Port.
who is funding rust compier development and support?
AI Overview.
The Rust Foundation is the primary entity funding Rust compiler development
and support. It is a non-profit corporation with operational and funding responsibility
for the project's infrastructure. The Rust Foundation is supported by a wide range
of corporate sponsors, including companies like Microsoft, Google, Amazon, Meta,
and Huawei. In addition to these corporate sponsors, the Rust Foundation also receives
funding from the Community Grants Program, which supports individual and
organizational projects.
On February 8, 2021, the formation of the Rust Foundation was announced by five
founding companies: Amazon Web Services, Google, Huawei, Microsoft, and Mozilla.
The foundation, led by Shane Miller for its first two years, offered $20,000 grants
and other support for programmers working on major Rust features.
Ubuntu Developers Discuss The Difficult Issue Of Splitting Up Firmware Packages.
Is ChatGPT Plus still worth $20 when the free version packs so many premium features?.Trump's huge bill includes immediate gift
for layoff-ridden Bay Area tech.
____Chinas Coal Power Plant Approvals Rebound.Try 1.
NSA considers then disavows leadership reshuffle.
Wesnesday June 4, 2025 16:23
____proseifhgts appears to have been hit with malware attck.
With 51 reported deaths, how safe are Tesla's robotaxis?.
___Google search's AI overviews are awful, but here's a
browser extension that gets rid of them.
___Microsoft accused of tech extortion over Windows 10 support ending
in campaign to get people to upgrade to Linux.
what are the advantanges of using a laptopo as a desktop? AI Overview. Using a laptop as a primary desktop computer offers several advantages, primarily related to portability and efficiency. Laptops can be easily moved from one location to another, and they often take up less space than a traditional desktop. Additionally, laptops can be used for work or entertainment in locations without a dedicated desk. Here's a more detailed look at the advantages: ___ 10 nuclear stocks expected to rise as much as 94% after Meta-Constellation deal. Constellation Energy Stock Jumped on Meta Deal. Why It Didnt Last. AMD Radeon RX 9060 XT 16 GB review (XFX Swift). AI Overview. The RTX 5060 typically has a TDP (Thermal Design Power) of 145W. The RTX 5060 Ti, on the other hand, has a TDP of 180W. These cards use a single 8-pin power connector.
____
One UI 7.0 becomes shortest-lived One UI version.
Try 3.
Monday June 2, 2025 19:23
____Open-Source TPDE Can Compile Code 10-20x Faster Than LLVM.
How Stack Overflow's moderation system led to its own downfall.
____is software for a full self driving vehicle considered a safety-critical app?____
AI Overview.
Yes, software for a full self-driving vehicle is considered a safety-critical application.
The software directly controls the vehicle's movement and actions, making any
errors or malfunctions potentially dangerous to the vehicle occupants, other drivers,
and pedestrians.
Here's why:
Direct Control:
Potential for Harm:
Importance of Safety:
Evolving Standards:
Human-Machine Interaction:
Specific Standards and Certifications:
AI responses may include mistakes.
is software for a ffighter jet considered a safety-critical app?
AI Overview.
Yes, software for a fighter jet is definitely considered a safety-critical application. Fighter jet
software controls critical flight functions, and any software errors can have devastating consequences,
including loss of life. This necessitates rigorous development processes, testing, and certification
standards to ensure safety and reliability.
Here's why:
Critical Flight Functions:
High Stakes:
harm. Certification Standards:
Real-time Requirements:
Security Considerations:
AI responses may include mistakes.
do seemiconductors manufacturers bguild or just test to mil specs?
AI Overview.
Semiconductor manufacturers both build and test semiconductors to meet Mil-Specs (military specifications).
The process involves rigorous testing to ensure components meet specific reliability and performance standards,
and may involve the use of military test standards like MIL-STD-883 and MIL-STD-750.
Building:
Testing:
if haardware is changed on a safety-critical ceretifiied app, then is recertificatioin required?
AI Overview.
Yes, changing hardware in a safety-critical certified application typically requires recertification. The reason i
s that hardware changes can impact the safety features of the application, and a new certification is needed
to ensure the application still meets safety requirements after the hardware modifications.
Here's why:
recertification is often necessary:
does software certification of mil spec system require certification testing over full temperature range?
AI Overview.
Yes, software certification for a Mil-Spec (Military Specification) system typically requires testing over
the full temperature range specified in the MIL-STD-810 standard. This is because the software's functionality
and performance must be validated to ensure it can operate reliably under the environmental conditions
a Mil-Spec product is designed to endure.
Elaboration:Microsoft warns new Windows 11/10 installation ISO downloads____
must have this Defender update.
Windows 11 gets emergency KB5062170 patch to fix errors when installing recent updates.
NFS Server Supporting Larger I/O Block Size With Linux 6.16.Goodbye to 8,000 jobs IBM replaces workers with artificial intelligence,____
sparking a wave of global reactions.Moab UT.
Colmbia river looking east toward Hood River OR.
Motel room view, Hood River.
Astoria OR Trolley pulling electric generator.
____How much energy does AI really use? The answer is surprising - and a little complicated.Try 1.
Sunday June 1, 2025 18:56
____Googles latest AI Overview blunder is more proof AI still needs a reality check.
how many lines of code in which languages does apache server contain?
AI Overview.
The Apache HTTP Server has a codebase that contains approximately 1,650,453 lines of code,
primarily written in C. It also supports various server-side programming languages like Perl,
Python, Tcl, and PHP through compiled modules.
Here's a more detailed breakdown:
____Bill Gates publicly admits his biggest mistake,
a blunder that could have led to Microsofts bankruptcy.
OpenAI can stop pretending (theatlantic.com).
Nvidia: The Jensen Magic May Be Fading (Rating Downgrade).
Apparent Git Scripting Issue Raised Concerns Of Possible Malicious Linux Kernel Activity.
____The white-collar bloodbath is all part of the AI hype machine (cnn.com).
___Stop These Things Weekly Round Up: 1 June 2025.Try 1.
3 Stocks to Buy to Ride the Nuclear Power Renaissance.
____did taliban officials assert that us had no evidence that Osama bin Laden
was responsible for the 911 attacks?
AI Overview.
Yes, Taliban officials have asserted that the US had no evidence that Osama bin Laden
was responsible for the 9/11 attacks.
Specifically:
was the qaana massacre the reason for the 911 attacks?
AI Overview.
The Qana massacre was not the reason for the 9/11 attacks, but it was cited by Al-Qaeda
as a motivation for their actions and policies towards the United States.
Here's a more detailed explanation:
did author of A Pretext for War conclude that the qaana massacre the reason for the 911 attacks?
AI Overview.
No, the author of "A Pretext for War," James Bamford, does not claim that the Qaana massacre
was the reason for the 9/11 attacks. Bamford's book focuses on the Bush administration's alleged
misuse of intelligence and its response to the 9/11 attacks, arguing that it led to the invasion of Iraq.
The book criticizes the handling of intelligence, the justifications for the Iraq War, and the administration's
perceived failure to acknowledge the role of the Palestinian issue in fueling anti-American sentiment.
Bamford's book does not discuss the Qaana massacre in any way, focusing instead on the events
leading up to and following the 9/11 attacks and the subsequent political decisions made by the
Bush administration.
did khalid sheik mohammed mastermind the 911 attacks? Search instead for did ka=halid sheik
mohammed mastermind the 911 attacks?
An AI Overview is not available for this search.
Mohammed, the accused mastermind of the 9/11 terror attacks on the US, had been due
to plead guilty this week - more than 23 years after almost 3,000 people were killed in
what the US government has described as "the most egregious criminal act on American
soil in modern history".
why is khalid sheik mohammed being held by the us government?
AI Overview.
Khalid Sheikh Mohammed is being held at Guantanamo Bay by the US government
due to his alleged role in the 9/11 terrorist attacks. He is charged with conspiracy to
commit terrorism, attacking civilians and civilian objects, and other related offenses.
He has been identified as the "principal architect" of the 9/11 attacks in
the 9/11 Commission Report.
++:
Saturday May 31, 2025 16:25
____Anyone making a living from a paid API?.
Amazon Programmers Say What Happened After Turn to AI Was Dark.
Linux's Trusted Security Manager Sees First Updates In Over A Year.
should uncertified software be placed in safety-critical apps?
AI Overview.
No, uncertified software should not be used in safety-critical applications.
Safety-critical systems, like those in medical devices, aircraft, or nuclear power plants, require
the highest levels of reliability and dependability because a failure could lead to loss of life,
serious injury, or significant damage. Uncertified software lacks the rigorous testing, validation,
and verification processes that ensure it meets the stringent safety requirements of these applications.
Here's why:
Lack of Validation and Verification:
Potential for Errors and Failures:
Regulatory and Compliance Issues:
In essence, safety-critical systems require software that has been thoroughly vetted and
proven to be reliable and safe. Uncertified software does not meet these rigorous standards
and should not be used in these critical applications.
is "Yes, a single-task operating system can indeed load and run an Apache web server on an
ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking
operating system, and Apache can be run as a single process within it.? an ai hallucination?
AI Overview.
No, that statement is not an AI hallucination, but rather a bit misleading in the context of
RPiOS (Raspberry Pi OS). While RPiOS can run Apache, it's not a single-task operating system,
and it's not necessarily limited to running Apache as a single process.s
Here's a breakdown:
In essence, the statement is technically true in the abstract, but it oversimplifies the nature of
RPiOS and the typical use of Apache within it. RPiOS is designed for multitasking and running
multiple processes concurrently, including Apache as a web server process.
____Is "U.S. President Ronald Reagan informed the world on national television that the United States
was reading Libyan communications." true?
In conclusion, President Reagan did inform the public via a televised address about evidence
slinking Libya to terrorist activities, which stemmed from intercepted communications.
AI Overview.
Yes, the statement is generally true. In 1986, President Ronald Reagan publicly addressed the
nation regarding U.S. airstrikes against Libya and revealed the existence of evidence that the
U.S. had intercepted communications linking Libya to terrorist acts.
Here's why this statement is considered true:
____Forner IEEE software and Xoouter editor-in-chief.
____5 RISC-V SBCs that are worth using instead of a Raspberry Pi.
Try 2.
Friday May 30, 2025 17:09
____
AI Overview..
The term "hallucinate" can refer to two distinct concepts, depending on the context:
1. Human Hallucination:
2. AI Hallucination:
Radeon Software For Linux Dropping AMD's Proprietary OpenGL/Vulkan Drivers.
____Atum A3 Nano development board combines Agilex 3 FPGA
and USB-Blaster III programmer (Crowdfunding).
____how many dependencies does apache server have on___
the RPoiOS implementation?
AI Overview.
The Apache HTTP Server itself doesn't have a specific number of dependencies
strictly tied to the "rpiOS implementation". Here's why, and a breakdown of
what dependencies it does have:
Understanding the Layers
Apache's Core Dependencies.
Apache's dependencies are primarily related to:
Operating System Libraries:
It depends on libraries provided by the operating system (rpiOS in your case), such as:
Standard C Library (libc): Essential for basic functions.
Networking Libraries: For handling
network communication. Security Libraries: For SSL/TLS support, if enabled.
...
AI responses may include mistakes.
"AI Overview.
Yes, a single-task operating system can indeed load and run an Apache web server on an ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking operating system, and Apache can be run as a single process within it. " :) ?
Stack Overflows Plan to Survive the Age of AI.
for Can software maintenance costs at nvidia, intel and amd for high power consumption,
expensive, new hardware chips lead to bankruptcies?
AI Overview.
While high software maintenance costs, expensive hardware, and power consumption
issues could strain a company's finances, it's unlikely to be the sole cause of bankruptcy
for Nvidia, Intel, or AMD. These companies are large, global players with diverse r
evenue streams and extensive financial resources.
resources. Here's a more detailed breakdown:
Ask HN: What is the best LLM for consumer grade hardware?.
AI didnt kill Stack Overflow.Welcome to the age of cyber insecurity in business.____IcePI Zero: A Pi Zero For FPGA.
Forced E-Waste PCs And The Case Of Windows 11s Trusted Platform.
____Oklo vs. NuScale: Which Nuclear Startup Stock is the Better Player Now?.Try 2.
Nuclear Waste: An Integrated Disposal Plan Could Help DOE Complete Its
Cleanup Mission and Save Billions.
Thursday May 29, 2025 19:22
____Bring Back The BIOS! (To UEFI Systems, That Is).
AI Overview.
Mark Zuckerberg, while a Harvard dropout himself, has expressed concerns about
whether traditional college education is effectively preparing students for the
jobs of the future, especially in the tech industry. He believes that some universities
may not be keeping pace with the rapid changes in the labor market and the
growing demand for specific technical skills.
Here's a more detailed breakdown of his viewpoint:
____NuScale's bigger reactor design approved by Nuclear Regulatory Commission.
Trump's 'Consequential' Shift In Energy Policy Fuels Upgrades For These Nuclear Stocks.
Linux 6.16 Networking Brings Some Big Performance Improvements & OpenVPN Driver.
when will tax vernova reactor come online?
AI Overview.
The GE Vernova BWRX-300 reactor, planned to be built at the TVA's
Clinch River site in Oak Ridge, Tennessee, is expected to come online in l
ate 2032. This timeline is based on the multi-year federal permitting process
that TVA is currently working through. According to Seeking Alpha, the
application kicks off this process, with the reactor potentially providing power for
300,000 homes by that time according to Seeking Alpha.
____A Love Letter To Embedded Systems By V. Hunter Adams.____did NSA sponser a program to try to destory FIG Forth to try to
deny its use by NSA percievied enemies?
AI Overview.
Based on my current knowledge and search results, there's no evidence to suggest
that the NSA sponsored a program to destroy FIG Forth or deny its use by perceived enemies.
It's important to note that:
FIG Forth was a popular version of the Forth programming language, known for its
simplicity and efficiency. It was particularly favored in the 1970s and 1980s, finding use
in embedded systems and various applications.
The NSA (National Security Agency) is a US intelligence agency focused on signals intelligence
and information security. Their activities are often classified.
Lack of Evidence: There's no publicly available information or historical record that indicates
any NSA involvement in trying to undermine or destroy FIG Forth.
Conspiracy Theories: The i
dea of such a program might be a conspiracy theory due to the secrecy surrounding
NSA activities and the niche nature of FIG Forth.
Conclusion:
While the possibility of such a program cannot be completely ruled out, there's no
supporting evidence to suggest it existed. It's more likely that this is a
misunderstanding
or a unsubstantiated claim.
It's always recommended to rely on verified information and credible sources
when exploring such claims.
AI responses may include mistakes.
did nsa insert code in to crypro ag cyphering machines so that
nsa could read iranian messages?
AI Overview.
Yes, reports indicate that the NSA, in collaboration with the CIA and German intelligence,
inserted vulnerabilities into Crypto AG's encryption machines so that they could read
encrypted messages from numerous countries, including Iran. This was done through a j
oint operation called "Thesaurus" and later "Rubicon". The NSA, along with other
intelligence agencies, rigged Crypto AG's devices, including instruction manuals,
to make it easier to decrypt messages.
Oops, something went wrong.
how is the us know that Libya was responsible for the La Belle disco bombing?
AI Overview.
The US determined Libya was responsible for the La Belle disco bombing based on i
ntercepted communications and other intelligence gathered before and after
the attack. Specifically, U.S. intelligence sources had identified a high probability of a
terrorist act in Berlin and intercepted messages between Tripoli and the Libyan
Embassy in East Berlin that included orders for the operation and a report of
its successful outcome.
Here's a more detailed breakdown:
La Belle Discotheque Bombing.
____Windows 11 KB5058405 fails installs with 0xc0000098
as it breaks system CPU power driver.____ Why Cameco, Oklo, and NuScale Power Stocks All Popped Today.Try 5.
Wednesday May 28, 2025 07:23
____what language was wang basic written in?___
AI Overview.
Wang BASIC, a version of the BASIC programming language developed by Wang Laboratories
, was primarily written in Dartmouth BASIC. While it followed the original Dartmouth BASIC
syntax, it was implemented as an interpreter rather than a compile-and-go system.
Additionally, Wang BASIC was designed to be stored in ROM on the Wang 2200 machine,
which had implications for its implementation and performance.
In simpler terms: Wang BASIC was essentially a slightly modified version of the
standard BASIC language that was first created at Dartmouth College. It was
designed to run on Wang computers, and it followed the basic syntax of
the original Dartmouth BASIC.
was ibm pc a bad business decisio for ibm?
AI Overview.
The IBM PC was not a bad business decision for IBM, despite later struggles in the PC market.
While IBM's PC division eventually became a commodity business and was sold off, the initial
decision to enter the PC market with the IBM PC was a success that significantly i
mpacted
the industry.
Here's why:
what editor is best for ubuntu gcc c preogramming?
AI Overview.
For C programming with GCC on Ubuntu, Qt Creator and Visual Studio Code are
highly recommended. Qt Creator is a robust IDE with integrated debugging and GUI
layout tools. Visual Studio Code is a lightweight, versatile editor with extensive features
and a strong community, especially when used with the C/C++ extension.
are upgrades sometimes used to destroy a software product?
AI Overview.
Yes, software upgrades can sometimes unintentionally damage a product. While upgrades
are often intended to improve functionality, fix bugs, or enhance security, they can also
introduce new issues, compatibility problems, or even make a software product unusable.
Here's why upgrades can lead to damage:EXT4 For Linux 6.16 Brings A Change Yielding "Really Stupendous Performance".
Linux 6.16 Upstreams Support For Hardware-Wrapped Encryption Keys.
Linux 6.16 Merges A Fix For The Macintosh II.
What features you get with Google AI Pro and AI Ultra.
Is Google AI Mode better than regular Google Search? I tested both, and there's a clear winner.
Try 2.
Tuesday May 27, 2025 17:39
____does the gcc c inline assembler allow imserting hex codes in its insructions?
AI Overview.
Yes, the GCC C inline assembler allows inserting hexadecimal codes within assembly instructions.
Hexadecimal values can be directly used as immediate operands, and they can also be used
as addresses or within data definitions.
Using Hexadecimal Numbers in Inline Assembly:
____do all distros of linus run the gcc c compiler?
AI Overview.
No, not every Linux distribution includes the gcc C compiler by default. While many
distributions include GCC, it's not a universally guaranteed part of the core system.
Some distributions might have it installed as a default part of a development environment,
while others might require explicit installation via their package manager.
Elaboration:
is Broken Web The Coming Collapse of the Internet valid concern?
AI Overview.
Yes, "The Broken Web" is a valid concern, and the book by George Ure, "Broken Web:
The Coming Collapse of the Internet", explores this idea. While a complete collapse
of the internet is unlikely due to its decentralized nature and redundancy,
several factors contribute to the notion of a "broken web," including infrastructure
vulnerabilities, rising costs, and increased cybersecurity threats.
Here's a breakdown of the valid concerns:
While the internet is designed to be robust and resilient, the vulnerabilities outlined above
do raise valid concerns about its future and the potential for significant disruptions or
even a gradual decline in its functionality.
____does windows 10 1909 work on the nearlists windows 10 hardware
as well as on the lastest widows 11 laredwre?
AI Overview.
Yes, Windows 10 version 1909 can be installed on hardware that is compatible with the l
atest Windows 11. However, it is important to note that Windows 10 version 1909 has
reached its end-of-life and is no longer receiving security updates, according to
Microsoft. This means that continued use of this version exposes the device to
potential security vulnerabilities.
should a linux be installed before installing windows 10 1909 after a malware attack?
AI Overview.
No, installing Linux before reinstalling Windows 10 1909 after a malware attack
is not necessary and may even be counterproductive. A fresh install of Windows 10 1909
will effectively wipe out all existing files and software, including the malware, and restore
your system to a clean state.
Here's why:
do any data centers have idustrial tours for the public?
AI Overview.
While data centers generally don't offer open public tours due to security concerns,
some facilities do offer tours to prospective customers or interested parties.
These tours are often used for marketing and to showcase the facility's features.
did wang labs computers have an operating system like msdoes
purchased from seattle computer?
AI Overview.
No, Wang Laboratories computers did not typically use an operating system
like MS-DOS that was purchased from Seattle Computer Products. MS-DOS was
primarily associated with IBM PCs and compatibles. While Wang Laboratories did
create their own operating systems for their specific hardware, they were not
directly related to the operating system developed by SCP that Microsoft later purchased.
did wang labs software devwlopers have to use direct sector reads/writes?
AI Overview.
Yes, Wang Computer Systems WCS/15 technical documentation specifically mentions
that programmers could access diskette sectors directly using "Absolute Sector Addressing".
This allowed for creating a diskette operating system if desired, or for performing low-level
data manipulation with specific control information. Essentially, they could read and write
data on a per-sector basis.
was forth software technology used to develop wang basic?
AI Overview.
No, FORTH software technology was not used to develop Wang BASIC.
Here's why:
Wang BASIC's roots: Wang BASIC was primarily based on the original Dartmouth BASIC,
which was developed in the 1960s. It followed the Dartmouth BASIC syntax closely and
was implemented as an interpreter.
FORTH's distinct approach: FORTH, on the other hand,
is a very different type of programming language, known for its stack-based architecture and
extensibility. It's often considered a low-level, real-time oriented language, and was designed
for direct interaction with hardware.
Different purposes: Wang BASIC was aimed at providing
a user-friendly programming environment for general-purpose computing on Wang computers,
particularly in business and office settings. FORTH was developed for embedded systems,
real-time control, and other applications where close interaction with hardware is crucial.
In short: While both languages have their own unique history and applications, there's
no evidence suggesting that FORTH played a role in the development of Wang BASIC.
was wang labs reliance of basic a contributing facyot in its demise?
AI Overview.
While not solely responsible, Wang Laboratories' heavy reliance on proprietary hardware and software,
including its early focus on BASIC, was a significant contributing factor to its downfall. The company's
decision to concentrate on hardware and word processors, particularly in the face of rising PC competition,
ultimately proved to be a strategic misstep.
can a single task OS load an run apache server on a ARM platrorm like RPiOS does?
AI Overview.
Yes, a single-task operating system can indeed load and run an Apache web server on an ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking operating system, and Apache can be run as a single process within it.
Here's why and how:
Single-Task OS vs. Multitasking OS: While the term "single-task OS" might sound restrictive, the context here is important. RPiOS (and most modern Linux distributions) are multitasking, meaning they can manage multiple processes concurrently. However, you can configure Apache to run as a single process, essentially dedicating
all available resources to that task.
Running Apache on RPiOS:
Installation: You can easily install Apache on RPiOS using package managers like apt.
Configuration: Apache can be configured to listen on specific ports and handle different types of web content.
Performance: While a single-task configuration could potentially limit performance under heavy load,
it can be suitable for low-traffic or resource-constrained applications.
Try 4.
Sunday May 25, 2025 15:34
___does the gcc c inline assembler restrict whicih register it will compile and use obfuscation?
AI Overview Learn.
Yes, inline assembly in GCC does restrict the registers it uses and doesn't obfuscate the code.
It provides a way to embed assembly instructions within C/C++ code, but the compiler still
controls register allocation and must be informed about which registers are modified by
the inline assembly.
AI Overview Learn more Better inline asm for C++23? : r/cpp Yes, inline assembly in GCC does restrict the registers it uses and doesn't obfuscate the code. It provides a way to embed assembly instructions within C/C++ code, but the compiler still controls register allocation and must be informed about which registers are modified by the inline assembly.
Study with experiments of the gcc c x86 inline assembler of whether this is an obfuscated syntax
assembler. : "r" (a) ...
Ubuntu copying from terminal text to an exitor requires experimentation. :(
Assembly is followed by disassembly.
%eaxmov assembler issue?
____5 myths about PC BIOS updates you need to forget about.____
Linux 6.16 Features Include A Lot From Intel, NVIDIA Blackwell,
AMDGPU User Mode Queues.
9 Linux Distros I've Used Over 9 YearsRanked.The Market Is Setting Up For A Move (Technical Analysis).
Tesla having problems over Robotaxi ? NHTSA demands information on this key feature.
Try 2.
Saturday May 24, 2025 08:50
____
has there been an increases in microsoft malware attacks to damage old compters____
and prevent usedof legacy software?
AI Overview.
Yes, there has been a noted increase in Microsoft-targeted malware attacks, particularly
targeting legacy systems and software to cause damage or prevent use of older applications.
This is due to several factors, including the fact that many older systems are easier
to exploit because of outdated security measures and unpatched vulnerabilities,
and that they are often running legacy applications that are no longer supported
by their vendors.
Here's a more detailed breakdown:
is a university education required for successful hacking?
AI Overview.
While a university education in computer science, cybersecurity,
or a related field can be beneficial for a career in ethical hacking,
it's not strictly required for success. Many successful ethical hackers
have gained their skills through self-directed learning, certifications,
and hands-on experience.
Elaboration:
Is havung more th one windows 10 and 11 pcs with different
hardware congifurations a good idea?
AI Overview.
Yes, having multiple PCs with different hardware configurations and different
Windows versions (10 and 11) can be a good idea depending on your needs
and preferences. It allows for flexibility in how you use your computers,
like dedicated workstations for specific tasks or personal/professional use.
Here's a more detailed look at the pros and cons:
is a backup windows 10 laptop frequently needed to try to fix main laptop?
AI Overview.
Yes, frequently backing up your Windows 10 laptop is a good idea, especially when
troubleshooting or attempting to fix issues. A backup can help restore your system
to a known good state if repairs go wrong or if you need to revert to a previous
version of the operating system.
Here's why backing up is recommended:Mike Blumenkrantz Axes Old Mesa Code: Goodbye Gallium Nine.____Nvidia GeForce RTX 5060 Laptop Performance Preview -
Almost at the level of the RTX 5070 Laptop.
The chilling AI trend using reverse geolocation thats going viral.
Try 6.
Wednesday May 21, 2025 16:19
____Microsoft says 394,000 Windows computers infected by Lumma malware globally.
Coinbase says its data breach affects at least 69,000 customers.
____THE MOUSE LANGUAGE, RUNNING ON ARDUINO.____
WORKING ON OPEN-SOURCE HIGH-SPEED ETHERNET SWITCH.
Linux Scheduler Patches Aim To Address Performance Regression Since Last Year.
Fedora 43 Cleared To Ship With Wayland-Only GNOME.
Why Property Testing Finds Bugs Unit Testing Does Not (2021) (buttondown.com/hillelwayne).how did google ai get so good so fast?__
AI Overview.
Google's advancements in AI can be attributed to a combination of factors,
including pioneering research, vast data resources, powerful computing
infrastructure, and a strategic approach to AI development and deployment.
Alphabet Has A Good Chance Of Winning The AI Race.
Tech Workers Are Having an Even Harder Time Finding Work, Thanks to AI.
is software obfuscation taught at universities?
AI Overview.
Yes, software obfuscation techniques are indeed taught at universities,
particularly in cybersecurity, software engineering, and computer science
programs. Obfuscation is a key topic in understanding how to protect intellectual
property and prevent reverse engineering, making it relevant for professionals
in software development, security, and related fields.
Here's why and how it's taught:
Protection of Intellectual Property:
Security:
Understanding Reverse Engineering:
Software Engineering:
Cybersecurity:
how can gcc c be forced to compileAdd ith carry instead of Add?
AI Overview.
To explicitly control whether ADD or ADC (Add with Carry) instructions
are used in GCC C code, you can't directly force GCC to use ADC instead of ADD.
GCC, in general, optimizes C code and might choose the most efficient
instruction based on the target architecture and the specific context
of your code.
Is there an example of gcc c inline assembler code?
AI Overview.
Here's a simple example of inline assembly code in C using GCC:.
are software obfuscators going to find future employment more diffficult?
AI Overview .
It's difficult to definitively say whether software obfuscators will find future employment
more difficult, as the demand for obfuscation tools and services is complex and depends
on various factors, according to sources and the NDepend Blog. While obfuscation is still a
common practice for protecting intellectual property and securing applications, its
effectiveness is a topic of ongoing debate, according to the Communications of the ACM.
Here's a more detailed look at the factors involved:Red Hat Enterprise Linux 10.0 Formally Announced, Joined
By RISC-V Developer Preview.
____First US utility seeks permit for a small nuclear reactor.Try 1.
GE Vernova rises to all-time high as TVA applies to
build company's reactor.
Trump admin lifts hold on offshore wind farm, doesnt explain why.
Visualized: Global Carbon Emissions by Sector.
Chinas battery giant eyes world domination.
Tuesday May 20, 2025 15:55
____LibreOffice 25.8 Alpha 1 Released With Performance Optimizations.____
is the number of nonsingular binary matrices for given dimension known?
AI Overview.
Yes, it is known that the number of nonsingular binary matrices of a given dimension n
can be calculated using the General Linear Group GL(n, 2). The formula is derived
from the properties of finite fields and their invertible matrices.
why does the gcc c compiler sometimes stop compiling with no error message?
AI Overview.
GCC might stop compiling silently (without error messages) due to a few reasons,
often related to undefined behavior or linker issues. The linker might not detect type
mismatches or other problems, and the compiler might not issue warnings for every
instance of undefined behavior.
Reasons for Silent Compilation Failures:
Undefined Behavior:
Static Initialization Fiasco (C++):
...
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation.is disassembly study essential to discover___
what compiler writers are doing?
AI Overview.
Yes, studying disassembly is essential for discovering how compiler
writers approach code generation and optimization. By analyzing the
generated assembly code, one can gain insights into the compiler's
strategies and identify areas where it might be possible to improve
performance or achieve desired code behavior. This knowledge is
crucial for performance optimization, reverse engineering, and
understanding compiler behavior.
Here's why disassembly is important:
Understanding Compiler Choices:
Performance Optimization:
Reverse Engineering:
Compiler Verification:
IDA Pro and Ghidra:
what is IDA Pro?
AI Overview.
IDA Pro Introduction: SecPod Blog : IDA Pro (Interactive Disassembler Pro) is
a powerful, widely-used tool for reverse engineering and malware analysis.
It's essentially a disassembler that translates machine code into assembly
language, making it easier to understand how a program works at a low level.
IDA Pro also offers features like debugging and a decompiler, which can
translate assembly code into something resembling C source code,
further aiding in reverse engineering efforts.
what is Ghidra?
AI Overview.
Ghidra is a free and open-source software reverse engineering (SRE)
framework developed by the National Security Agency (NSA). It's a
suite of tools used to analyze compiled software, particularly
when the original source code is unavailable or inaccessible.
Ghidra allows users to disassemble, decompile, and analyze
code, providing insights into its functionality and structure.
does the x86 isa have too many rarely used instructions?
AI Overview.
Yes, the x86 ISA (instruction set architecture) does contain many instructions
that are rarely used in typical software applications. While the x86 ISA
offers a vast and complex set of instructions, not all of them are
frequently used, and some are even considered "fluff".
does a disassembler reveal dependencies?
AI Overview.
Yes, disassemblers can reveal some dependencies, but not all types.
Disassemblers primarily convert machine code into assembly language,
which can be used to identify imported functions and libraries. They can
also help in understanding how different sections of code relate to
each other. However, disassemblers don't inherently reveal all dependencies,
especially those that are not directly reflected in the assembly code.
Here's a more detailed breakdown:
should a software certification inspector certify accuracy of compiled code?
AI Overview.
A software certification inspector does not typically certify the accuracy of
compiled code directly. Their focus is on validating that the software meets
defined requirements and adheres to specific standards, including those
related to security, reliability, and performance. While they may review
the compiled code as part of their broader assessment, the primary goal
is not to verify the code's exact correctness at the compiled level.
Here's why and what they do instead:
Focus on requirements and standards:
Code review and validation:
Testing and validation:
Compliance:
Software Bill of Materials (SBOM) validation:US DOJ opens investigation into Coinbase's recent cyberattack.____
DDoSecrets publishes 410 GB of heap dumps,
hacked from TeleMessage (micahflee.com).Zero-click searches: Googles AI tools are____
the culmination of its hubris.Huawei launches first laptops using____
home-grown Harmony operating system.
Intel Adds OpenMP Multi-Threading To Its Speedy x86-simd-sort Library.
GitHub Launches Its Coding Agent.Alphabets Waymo wins approval to expa.nd____
driverless ride-hailing service to San Jose.TechnologyCharted: A Decade of Smartphone Production,
by Brand (2015-2024).
____Trump Loses Big Game Of Offshore Wind Chicken, Bigly.Try 1.
State of the solar industry as GOP eliminates homeowners tax credits.
Siemens Gamesa chief: 'still no orders' for relaunched 4.X wind turbine.
Monday May 19, 2025 19:12
____does a usb ssd drive wear out memory locations?
AI Overview.
Yes, USB SSD drives do experience memory location wear over time, though
they are typically much more durable than earlier flash memory technologies.
This wear is due to the nature of how flash memory, which is used in SSDs,
stores data. Each time a flash memory cell is written to or erased, it undergoes
a wear process. Over many program/erase cycles, the cells can degrade,
and this degradation can affect the drive's ability to retain data or its
performance.
___Microsoft employee disrupts Satya Nadellas keynote with Free Palestine protest.
Microsoft open sources a command-line text editor and more at Build.
The Windows Subsystem for Linux is now open source.
Tesla Robotaxi deemed a total failure by media
even though it hasnt been released.
____where can malware reside on a multitasking computer OS?____
AI Overview.
Malware on a multitasking operating system can reside in various locations,
including temporary folders, within other software, or even within the
OS kernel itself. It can also exploit vulnerabilities in legitimate software
or the OS to gain control over the computer's memory.
can malware computer penetration occur at the verilog silicon compiler level?
AI Overview.
While not a primary target, malware penetration can potentially occur at the
Verilog silicon compiler level, although it's a complex and less direct
attack vector compared to software vulnerabilities.
can uefi be elimiated with a direct boot into an app?
AI Overview.
No, UEFI cannot be completely eliminated by booting directly into an application.
UEFI is the firmware that manages the computer's boot process, and while it can be
configured to boot directly into a specific application, it is always involved in the
initial boot sequence. According to the National Security Agency, UEFI relies
on Secure Boot or vendor-specific boot protection solutions.
is uefi a ploy to force users into an OS?
AI Overview.
No, UEFI is not a ploy to force users into a specific OS. While Secure Boot, a UEFI
feature, can be used by manufacturers and operating system developers to
limit boot options, this is not inherent to UEFI itself. UEFI is a replacement for
the older BIOS system, offering various improvements like faster boot times,
better security features,
and support for larger drives.
how can a user boot directly into an app?
AI Overview.
To boot directly into an application, you need to replace the standard
Windows shell (typically Windows Explorer) with the application's
executable. This can be done by modifying the registry
key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
to point to the desired application. Alternatively, you can use a method
like shell:startup or schedule a task to launch the application upon login.
does a secure app need to be accountable of every bit in host computer?
AI Overview.
No, a secure app doesn't need to be accountable for every single bit on
the host computer. A secure app focuses on securing its own operations
and data, and while it might interact with the host computer's resources,
it's not typically responsible for the overall security of the entire system.
Instead, it relies on the host operating system and security mechanisms
to protect the host's resources.can eax and b\ebx be used without saving with the gcc c compiler?
AI Overview.
Yes, EAX, EBX, ECX, and EDX registers can be used without saving
their values with the GCC C compiler. These registers are considered "
caller-saved," meaning the function that calls another function is
responsible for preserving their values if they are needed after the call.
which registers in a gcc c subroutine do not have to be preserved?
AI Overview.
In a GCC C subroutine, registers designated as "caller-saved" or "caller-clobbered"
do not have to be preserved by the callee (the called function). These registers are
typically used for argument passing and temporary values and are considered safe
for modification by the called function without causing issues for the caller.
GCC knows which registers are used by the code it generates. It also requires
the user to inform it about register use in inline assembly through the clobbers
list, allowing the compiler to save those registers if necessary.
In the x86 architecture, the registers EAX, ECX, and EDX are typically
caller-saved, while other registers like EBX, EBP, and ESP are callee-saved.
____does a forth used for chaip interactive hardware debug__
just implement INTERPRET but not COMPILE?
AI Overview.
No, a Forth language implementation used for CHAI-P interactive
hardware debugging typically does implement both INTERPRET and
COMPILE, although it might prioritize interactive debugging and
experimentation by making the INTERPRET mode readily available and
potentially more optimized for this purpose.
Here's why:
interactive Debugging:
Forth's strength lies in its interactive nature, allowing for rapid
testing and experimentation. A Forth system used for hardware
debugging needs to allow the user to interact with the system,
define new "words" (functions), test them, and debug them on
the fly without needing to recompile the entire application.
This requires both INTERPRET to execute the commands
immediately and COMPILE to define new "words" for later use.
Compiler for Complex Applications:
While interactive debugging is a key feature, Forth can also
compile "words" into threaded code or even native code for
more complex applications or for testing more thoroughly.
Resource Constraints:
In some hardware debugging scenarios, resource constraints
(memory, processing power) may require a more efficient
COMPILE mode to generate faster-executing code.
Flexibility:
Forth's ability to compile and compile-to-machine-code
allows it to adapt to different hardware platforms
and applications.
is it best to use the gcc c compiler or some other language to
build a forth used for chip interactive hardware debug?
AI Overview.
For developing an interactive hardware debugging tool ("Fort" in this context),
using C with GCC (GNU Compiler Collection) is generally the best approach.
C's direct access to memory and low-level hardware control, coupled with
GCC's robust debugging support and widespread availability, makes it an
ideal choice for this task.
For interactive hardware debugging on chips, building a Forth implementation
using C or C++ compilers like GCC or Clang is generally considered the best
approach. While other languages could be used, C/C++ offers advantages
in portability, optimization, and integration with hardware debugging tools.
Alphabet Has A Good Chance Of Winning The AI Race.Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access.____StarPro64: Raspberry Pi alternative with powerful NPU and PCIe.____
Linux 6.15-rc7 Released With AMD Zen 6 CPU Identification,
New Intel & ARM Mitigations.
Debian 13 "Trixie" Now In Hard Freeze: MIPS64EL Demoted,
RISC-V 64-bit Promoted.
Ubuntu 25.04 Delivers Decisive Lead Over Fedora 42 For
Ampere Altra Performance.
"Rust is so good you can get paid $20k to make it as fast as C".NVIDIA Grows Quantum Computing Ecosystem With___
Taiwan Manufacturers and Supercomputing.
NVIDIA Powers Worlds Largest Quantum Research Supercomputer.
Nvidia Stock Falls. Whats Overshadowing Its AI Chip Moves.
Intel demos running Panther Lake systems, touts performance
and power efficiency improvements.
Intel Core i7-5600U @ 2.60GHz
Multithread Rating 3016 . :(
Typical TDP: 15 W
Intel's new CEO says the company has 55% of the data centre market.
Qualcomm to make data center processors that connect to Nvidia chips.Americas College Towns Go From Boom to Bust.
____Casting Shade On Shade-Tolerant Solar Panels.Try 1.
US nuclear sector intensifies lobbying in bid to prevent subsidy cuts.
Stop These Things Weekly Round Up: 18 May 2025.
Sunday May 18, 2025 17:46
____Massive recall for 27,000 cars over software issues
Check every model affected.
____Speed Up Arduino With Clever Coding.
Decades-old Windows systems are still running trains, printers, and hospitals.
____~$420 Asus Ryzen 5800HS Windows 11 running legacy ~1999 HotMetal Pro 6.0
Post from 5800Hs.
____OPEN SOURCE HIDING IN PLAIN SIGHT.____ Nobodys seen it: An elusive report could drive Empire Wind to collapse.Try 3.
EPIC Comes Out in Favor of Responsible Offshore Wind Development,
Joins States in Legal Effort to Overturn Trumps Offshore Wind Ban.
Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: '
Those guys are good'.
Saturday May 17, 2025 18:23
____was forth a good idea for sun microsystems?____
AI Overview.
No, the programming language Forth was not a good idea for Sun Microsystems.
Sun Microsystems, known for its SPARC processors and various operating systems,
was more focused on mainstream programming languages like Java and C. Forth is a
niche language that never achieved the widespread adoption that Java did, and i
ts use within Sun was likely limited to specific projects rather than a core technology.
was apple open system boot architecture a good idea?
AI Overview.
Apple's Open Firmware, while more advanced than the BIOS used in Windows PCs,
is not considered a universally "good" choice for Windows. Apple transitioned to EFI,
a firmware interface developed by Intel, because EFI offered improvements over Open Firmware.
Here's a more detailed explanation:
Open Firmware:
EFI:
Why EFI was preferred:
Compatibility Issues:
Modern Macs:
why did atari discontinue forth use in it game software?
AI Overview.
Atari stopped using Forth in its game software due to a combination of factors,
including the rise of more popular programming languages, the challenges
of developing games on the Atari 2600 with Forth, and a shift in focus
towards more commercially viable technologies.
Here's a more detailed explanation:
is forth new used in robotics?
AI Overview.
Yes, Forth is still used in robotics and embedded systems. It's particularly
well-suited for applications where real-time performance, compact code,
and interactive development are important, says a Medium article.
are forth dependencies certifiable?
AI Overview.
No, Forth dependencies, in the context of project dependencies or software
dependencies in embedded systems, are generally not certifiable in the same
way that code might be certified under standards like MISRA C or DO-178C for
safety-critical applications.
which computer languages have certifiable dependencies?
AI Overview.
Several programming languages offer ways to handle dependencies, some more robustly
than others. For example, languages like Python, Ruby, Java, and JavaScript have
built-in dependency management tools like pip, Bundler, Maven, and npm, respectively.
However, the term "certifiable dependencies" suggests a need for verifiable integrity
and provenance, which is a more specialized area.after a Ubntu install why does it task so many steps amd so long after sudo apt upgrade?Ubuntu edor choice for .txt save discovered important.
AI Overview.
After an Ubuntu installation, the sudo apt upgrade command can take numerous steps and a
considerable amount of time due to several factors related to package management, network c
onnectivity, and system resources.
Here's a breakdown of the reasons:
1. Package Dependencies and Updates:
2. Network Connectivity and Download Speed:
3. System Resources:
4. System Settings and Third-Party Repositories:
5. Other Factors:
Nano installed on Asus N6000 4/64 GB Windows 11 laptop runnung Ubuntu. :_
Switch back to Ubuntu from Windows 10 on $0 hp stream 13 N3060 4/64 GB dual boot laptop.
UX :)Material 3 Expressive (design.google).____
Thoughts on thinking (dcurt.is).
Keeping Up With AI: The Painful New Mandate for Software Engineers.
OpenAI introduces Codex, its first full-fledged AI agent for coding.Microsoft Confirms Windows Upgrade ChoiceYou Must Now Decide.___
6 reasons why Linux is better than ever.Zotacs 2025 mini PC lineup includes fanless models with Intel Twin____
lake and Core Ultra Series 2 chips.
what are Intel Twin lake and Core Ultra Series 2 chips?
AI Overview.
Intel Twin Lake and Core Ultra Series 2 chips represent distinct advancements in
Intel's processor technology. Twin Lake is a low-power, E-core-only processor line, i
deal for entry-level systems and devices requiring efficient performance. Core Ultra Series 2,
on the other hand, is a high-performance, AI-focused processor line targeting desktops
and mobile devices, offering enhanced AI capabilities and advanced features.
Arms ubiquitous CPU cores get new, less confusing names.
Intel Struggles To Reverse AMDs Share Gains In x86 CPU Ma.
why does x88 fig forth run ~10X faster usig virtualbox than it does with dosbox?
AI Overview.
The discrepancy in performance between running x88 FIG Forth in VirtualBox and DOSBox,
with VirtualBox being significantly faster (~10x), stems from fundamental differences
in how these two tools handle the emulation/virtualization process:
1. Virtualization vs. Emulation:
2. Performance Implications:2. Performance Implications:
3. Target Environments:
In Summary:
The significant speed difference comes down to the fact that VirtualBox leverages
hardware virtualization for faster execution, while DOSBox uses software emulation,
which is slower due to the instruction translation overhead. While DOSBox prioritizes
accuracy and has specialized features for DOS games, VirtualBox provides a faster
environment when hardware virtualization is available.
Oklo: Downstream Of The Bottleneck.
Oracle VM VirtualBox VM Escape via VGA Device (github.com/google).Teslas robotaxi fleet will be powered by plenty of teleoperation.____
teleoperation definition?
AI Overview.
Compensation of driver shortage with teleoperation | DHL Freight Teleoperation, also known
as remote operation or telerobotics, is the ability to control a system or machine from a distance.
It involves transmitting commands and receiving feedback from the remote system, allowing a
human operator to manipulate or interact with it as if they were physically present. This technology
is commonly used in robotics, especially in applications where it is unsafe or impractical for humans
to be physically present, such as in hazardous environments or remote locations.
Tesla's FSD vs. Waymo's robotaxi: One pulled a move that would tank any driving test. [msm :(?]Samsung Galaxy S25 Edge Battery Test Results are out: not as bad as feared.
____Why Cutting the Department of Energys Budget Is a Good Thing.Try 2.
Empire Wind 1 stop work order may force projects termination soon: Equinor.
'Poster
Thursday May 15, 2025 17:26
____Windows 11 and Red Hat Linux hacked on first day of Pwn2Own.
hp stream n3050 2/32gb run windows 10 1909. But is it better to buy a
new laptop which runs windows 11 as well as 10 1909?
AI Overview.
It's generally a good idea to consider buying a new laptop that runs Windows 11,
especially if the HP Stream N3050 with Windows 10 1909 is starting to show its age.
While Windows 10 is still functional, Windows 11 offers improvements in performance,
security, and features like the new start menu and taskbar. If the current laptop is
experiencing slow performance or compatibility issues, a new one with Windows 11
could be a worthwhile upgrade.
A fraction of proposed data centers will get built. Utilities are wising up.
Valve Addresses Alleged Steam Hack And Clarifies Situation.
CachyOS, Clear Linux & Debian 13 Deliver The Best Performance On
Framework Laptop 13 With AMD Strix Point.
____which is better dosbox or virtualbox to run 8088 forth?____
AI Overview.
For running an 8088-based Forth system, DOSBox is likely a better choice than VirtualBox.
DOSBox is specifically designed to emulate the DOS environment, which is what
many 8088 systems used, offering a more optimized experience for older programs.
While VirtualBox can also run DOS, it's a more general-purpose virtualization tool
that might not be as well-suited for emulating the specific characteristics of
an 8088-based system.Tesla has yet to start testing its robotaxi service____
without driver weeks before launch.
are tesla's software dependencies certified?
AI Overview.
Tesla's software dependencies, including its use of open-source software,
are subject to various certifications and conformity requirements. While Tesla
uses open-source components like Linux, they also develop and maintain
proprietary software. Tesla's products, including the software, are certified
to comply with certain standards to ensure safety and prevent interference.
are tesla's software dependencies less than one page of source code?
AI Overview.
No, Tesla's software dependencies are not limited to one page of source code.
Tesla's software is built upon a complex system of open-source and proprietary
components. While some underlying systems like the Linux kernel
have open-source code, Tesla's proprietary applications, such as Autopilot,
are not publicly available.
Tesla Is Seriously Struggling With Its Robotaxi Service.
does waymo's software defendencies certified?
AI Overview.
Waymo's software dependencies are subject to a certification process,
but it's not a simple "yes" or "no" answer. Waymo's autonomous driving
technology is certified for specific operational design domains, meaning
it's considered safe within those limitations. The California DMV,
for example, has approved Waymo to operate autonomous vehicles
in designated areas, certifying that they have met the necessary
safety standards.
does waymo's software defendencies all less than one page of source code?
AI Overview.
No, Waymo's software dependencies are not all less than one page of
source code.
Software engineer lost his $150K-a-year job to AIhes been rejected from 800
jobs and forced to DoorDash and live in a trailer to make ends meet.
Laid-Off Metaverse Engineer Says He Is DoorDashing and Living in a Trailer.Linux Swap Table Code Shows The Potential For Huge Performance Gains.____
Cheaper Nvidia RTX 5050 laptops leaked via retail listings.
is obsolescence of destiops forcing nvidia to build laptops that run their
AI Overview.
Nvidia Goes All-In on AI Large and Small, Led by RTX AI ... While obsolescence of desktops
might be a contributing factor, it's not the primary driver for Nvidia to develop laptops with
AI accelerators. Nvidia's focus on AI is a broader trend, and they are leveraging laptop
portability and AI capabilities to address a wider market, including professional users and gamers.
is having Windows 11 work legacy software on new hardware a better idea than
forcing recycling old hardware and purchase of new apps?
AI Overview.
Yes, enabling Windows 11 to run legacy software on newer hardware is generally a
better approach than forcing the recycling of old hardware and the purchase of new
applications. It promotes sustainability, reduces costs for users, and avoids the
unnecessary generation of e-waste.Why Nuclear Stock Oklo Has Popped 30% This Week.____
US would assess nuclear waste, plutonium for reactor fuel under draft order.
(264-1)(264-1) run on X86 platform p starting and endomg debug print. william-payne@william-payne-IdeaPad-1-14IGL7:~/Desktop$ gcc -o ee mul53.c william-payne@william-payne-IdeaPad-1-14IGL7:~/Desktop$ ./ee a[] = ffffffff:ffffffff exponentof(a) = 0 b[] = ffffffff:ffffffff exponentof(b) = 0 kk= 08 aa= ff bl=8 al=8 abl=16 add c[] = 00000000:00000000:00000000:00000000 c[0]= ff b[0]= ff aaaa=255 carry= 00 c[1]= ff b[1]= ff aaaa=255 carry= 00 c[2]= ff b[2]= ff aaaa=255 carry= 00 c[3]= ff b[3]= ff aaaa=255 carry= 00 c[4]= ff b[4]= ff aaaa=255 carry= 00 c[5]= ff b[5]= ff aaaa=255 carry= 00 c[6]= ff b[6]= ff aaaa=255 carry= 00 c[7]= ff b[7]= ff aaaa=255 carry= 00 c[8]= 00 aaaa=0 carry= 00 _____ middle of debug print omitted. c[0]= 01 b[0]= ff aaaa=257 carry= 01 c[1]= 00 b[1]= ff aaaa=256 carry= 01 c[2]= 00 b[2]= ff aaaa=256 carry= 01 c[3]= 00 b[3]= ff aaaa=256 carry= 01 c[4]= 00 b[4]= ff aaaa=256 carry= 01 c[5]= 00 b[5]= ff aaaa=256 carry= 01 c[6]= 00 b[6]= ff aaaa=256 carry= 01 c[7]= 00 b[7]= ff aaaa=256 carry= 01 c[8]= fe aaaa=254 carry= 00 c[9]= ff aaaa=255 carry= 00 c[10]= ff aaaa=255 carry= 00 c[11]= ff aaaa=255 carry= 00 c[12]= ff aaaa=255 carry= 00 c[13]= ff aaaa=255 carry= 00 c[14]= ff aaaa=255 carry= 00 c[15]= ff aaaa=255 carry= 00 add e c[] = 01000000:00000000:feffffff:ffffffffCode compiled with gcc c compilere on X86 platforem running Ubuntu. /*gcc -o ee mul53.c gcc -g -c mul53.c objdump -d -M inte1 -S mul53.o */ #include <stdio.h> int main() { static void *array[]={ &&byte7, &&byte6, &&byte5, &&byte4, /*0*/ &&byte3, &&byte2, &&byte1, &&byte0, /*4*/ &&bit80, &&bit40, &&bit20, &&bit10, /*8*/ &&bit80a, &&bit40a, &&bit20a, &&bit10a, /*12*/ &&bit08, &&bit04, &&bit02, &&bit01, /*16*/ &&bit08a, &&bit04a, &&bit02a, &&bit01a, /*20*/ &&init, &&add, &&printa, &&printc, /*24*/ &&shift, &&done, &&mul, &&byte9, /*28*/ &&bit01b, &&bit70}; &&alen, &&bit01c ; /*32*/ unsigned char a[8] ; // mltiplier unsigned char b[8] ; // mulplicand unsigned char c[16]; // product unsigned char aa,aaa,bb,bbb,bbbb,carry,carry0,carry1; int aaaa, al,bl,abl,kk,jj; short int exponentofa, exponentofb, exponentofc; init: a[0]=0xff; a[1]=0xff; a[2]=0xff; a[3]=0xff; a[4]=0xff; a[5]=0xff; a[6]=0xff; a[7]=0xff; exponentofa = 0; b[0]=0xff; b[1]=0xff; b[2]=0xff; b[3]=0xff; b[4]=0xff; b[5]=0xff; b[6]=0xff; b[7]=0xff; exponentofb = 0; c[0]=0x0; c[1]=0x0; c[2]=0x0; c[3]=0x0; c[4]=0x0; c[5]=0x0; c[6]=0x0; c[7]=0x0; c[8]=0x0; c[9]=0x0; c[10]=0x0; c[11]=0x0; c[12]=0x0; c[13]=0x0; c[14]=0x0; c[15]=0x0; exponentofc = 0; jj=100; goto printa; mul: if(b[7] != 0) {bl=8; goto alen;} // multiplicand if(b[6] != 0) {bl=7; goto alen;} if(b[5] != 0) {bl=6; goto alen;} if(b[4] != 0) {bl=5; goto alen;} if(b[3] != 0) {bl=4; goto alen;} if(b[2] != 0) {bl=3; goto alen;} if(b[1] != 0) {bl=2; goto alen;} if(b[0] != 0) {bl=1; goto alen;} printf("\n mul en\n"); alen: if(a[7] != 0) {al=8; abl=bl+al; goto byte7;} // multiplier if(a[6] != 0) {al=7; abl=bl+al; goto byte6;} if(a[5] != 0) {al=6; abl=bl+al; goto byte5;} if(a[4] != 0) {al=5; abl=bl+al; goto byte4;} if(a[3] != 0) {al=4; abl=bl+al; goto byte3;} if(a[2] != 0) {al=3; abl=bl+al; goto byte2;} if(a[1] != 0) {al=2; abl=bl+al; goto byte1;} if(a[0] != 0) {al=1; abl=bl+al; goto byte0;} printf("\n mul en\n"); goto printc; byte7: aaa=a[7]; kk=al; goto bit80; byte6: aaa=a[6]; kk=al; goto bit80; byte5: aaa=a[5]; kk=al; goto bit80; byte4: aaa=a[4]; kk=al; goto bit80; byte3: aaa=a[3]; kk=al; goto bit80; byte2: aaa=a[2]; kk=al; goto bit80; byte1: aaa=a[1]; kk=al; goto bit80; byte0: aaa=a[0]; kk=al; goto bit80; byte9: goto printc; bit80: aa=aaa;printf("kk= %2.2x aa= %2.2x bl=%d al=%d abl=%d\n",kk,aa,bl,al,abl); if(aa & 0X80) {jj=12; goto add;}; bit80a: jj=9; goto shift; bit40: if(aa & 0X40) {jj=13; goto add;}; bit40a: jj=10; goto shift; bit20: if(aa & 0X20) {jj=14; goto add;}; bit20a: jj=11; goto shift; bit10: if(aa & 0X10) {jj=15; goto add;}; bit10a: jj=16; goto shift; bit08: if(aa & 0X08) {jj=20; goto add;}; bit08a: jj=17; goto shift; bit04: if(aa & 0X04) {jj=21; goto add;}; bit04a: jj=18; goto shift; bit02: if(aa & 0X02) {jj=22; goto add;}; bit02a: jj=19; goto shift; bit01: if(aa & 0X01) {jj=23; goto add;}; bit01a: if(kk!=1){jj=32; goto shift;}; bit01b: kk=kk-1; if(kk==0){goto bit01c; }; goto bytem; bit01c: goto printc; add: printf("add c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); aaaa=c[0]+b[0]; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; c[0]=c[0]+b[0]; printf("\nc[0]= %2.2x b[0]= %2.2x aaaa=%d carry= %2.2x",c[0],b[0],aaaa,carry); aaaa=c[1]+b[1]+carry; c[1]=c[1]+b[1]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[1]= %2.2x b[1]= %2.2x aaaa=%d carry= %2.2x",c[1],b[1],aaaa,carry); aaaa=c[2]+b[2]+carry; c[2]=c[2]+b[1]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[2]= %2.2x b[2]= %2.2x aaaa=%d carry= %2.2x",c[2],b[2],aaaa,carry); aaaa=c[3]+b[3]+carry; c[3]=c[3]+b[3]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[3]= %2.2x b[3]= %2.2x aaaa=%d carry= %2.2x",c[3],b[3],aaaa,carry); aaaa=c[4]+b[4]+carry; c[4]=c[4]+b[4]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[4]= %2.2x b[4]= %2.2x aaaa=%d carry= %2.2x",c[4],b[4],aaaa,carry); aaaa=c[5]+b[5]+carry; c[5]=c[5]+b[5]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[5]= %2.2x b[5]= %2.2x aaaa=%d carry= %2.2x",c[5],b[5],aaaa,carry); aaaa=c[6]+b[6]+carry; c[6]=c[6]+b[6]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[6]= %2.2x b[6]= %2.2x aaaa=%d carry= %2.2x",c[6],b[6],aaaa,carry); aaaa=c[7]+b[7]+carry; c[7]=c[7]+b[7]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[7]= %2.2x b[7]= %2.2x aaaa=%d carry= %2.2x",c[7],b[7],aaaa,carry); aaaa=c[8]+carry; c[8]=c[8]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[8]= %2.2x aaaa=%d carry= %2.2x",c[8],aaaa,carry); aaaa=c[9]+carry; c[9]=c[9]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[9]= %2.2x aaaa=%d carry= %2.2x",c[9],aaaa,carry); aaaa=c[10]+carry; c[10]=c[10]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[10]= %2.2x aaaa=%d carry= %2.2x",c[10],aaaa,carry); aaaa=c[11]+carry; c[11]=c[11]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[11]= %2.2x aaaa=%d carry= %2.2x",c[11],aaaa,carry); aaaa=c[12]+carry; c[12]=c[12]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[12]= %2.2x aaaa=%d carry= %2.2x",c[12],aaaa,carry); aaaa=c[13]+carry; c[13]=c[13]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[13]= %2.2x aaaa=%d carry= %2.2x",c[13],aaaa,carry); aaaa=c[14]+carry; c[14]=c[14]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[14]= %2.2x aaaa=%d carry= %2.2x",c[14],aaaa,carry); aaaa=c[15]+carry; c[15]=c[15]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[15]= %2.2x aaaa=%d carry= %2.2x",c[15],aaaa,carry); printf("\n"); printf("add e c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); //return 3; goto bit70; //*array[jj];array[jj]; shift: printf("c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); carry1=0x00; if(c[0]&0x80){carry1=0x01;}; c[0]=c[0]<<1; carry0=carry1; carry1=0; if(c[1]&0x80){carry1=0x01;}; c[1]=c[1]<<1; c[1]=c[1]|carry0; if(abl==2){goto bit70;}; carry0=carry1; carry1=0; if(c[2]&0x80){carry1=0x01;}; c[2]=c[2]<<1; c[2]=c[2]|carry0; if(abl==3){goto bit70;}; carry0=carry1; carry1=0; if(c[3]&0x80){carry1=0x01;}; c[3]=c[3]<<1; c[3]=c[3]|carry0; if(abl==4){goto bit70;}; carry0=carry1; carry1=0; if(c[4]&0x80){carry1=0x01;}; c[4]=c[4]<<1; c[4]=c[4]|carry0; if(abl==4){goto bit70;}; carry0=carry1; carry1=0; if(c[5]&0x80){carry1=1;}; c[5]=c[5]<<1; c[5]=c[5]|carry0; if(abl==5){goto bit70;}; carry0=carry1; carry1=0; if(c[6]&0x80){carry1=1;}; c[6]=c[6]<<1; c[6]=c[6]|carry0; if(abl==6){goto bit70;}; carry0=carry1; carry1=0; if(c[7]&0x80){carry1=1;}; c[7]=c[7]<<1; c[7]=c[7]|carry0; if(abl==7){goto bit70;}; carry0=carry1; carry1=0; if(c[8]&0x80){carry1=1;}; c[8]=c[8]<<1; c[8]=c[8]|carry0; if(abl==8){goto bit70;}; carry0=carry1; carry1=0; if(c[9]&0x80){carry1=1;}; c[9]=c[9]<<1; c[9]=c[9]|carry0; if(abl==9){goto bit70;}; carry0=carry1; carry1=0; if(c[10]&0x80){carry1=1;}; c[10]=c[10]<<1; c[10]=c[10]|carry0; if(abl==10){goto bit70;}; carry0=carry1; carry1=0; if(c[9]&0x80){carry1=1;}; c[11]=c[11]<<1; c[11]=c[11]|carry0; if(abl==11){goto bit70;}; carry0=carry1; carry1=0; if(c[12]&0x80){carry1=1;}; c[12]=c[12]<<1; c[12]=c[12]|carry0; if(abl==12){goto bit70;}; carry0=carry1; carry1=0; if(c[13]&0x80){carry1=1;}; c[13]=c[13]<<1; c[13]=c[13]|carry0; if(abl==13){goto bit70;}; carry0=carry1; carry1=0; if(c[14]&0x80){carry1=1;}; c[14]=c[14]<<1; c[14]=c[14]|carry0; if(abl==14){goto bit70;}; carry0=carry1; carry1=0; if(c[15]&0x80){carry1=1;}; c[15]=c[15]<<1; c[15]=c[15]|carry0; if(abl==15){goto bit70;}; carry0=carry1; carry1=0; if(c[16]&0x80){carry1=1;}; c[16]=c[16]<<1; c[16]=c[16]|carry0; if(abl==16){goto bit70;}; carry0=carry1; goto bit70; //*array[jj]; bit70: if(jj==9){goto bit40; }; if(jj==10){ goto bit20;}; if(jj==11){ goto bit10;}; if(jj==12){goto bit80a;}; if(jj==13){goto bit40a; }; if(jj==14){goto bit20a;}; if(jj==15){ goto bit10a;}; if(jj==16){goto bit08; }; if(jj==17){goto bit04; }; if(jj==18){goto bit02; }; if(jj==19){goto bit01; }; if(jj==20){goto bit08a;}; if(jj==21){goto bit04a; }; if(jj==22){goto bit02a;}; if(jj==23){goto bit01a; }; if(jj==32){goto bit01b;} if(jj==35){goto bit01c; }; printf("\nInvaid bit jump number = %2x\n",jj); return 3; byte70: if(kk==7){goto byte7;}; if(kk==6){goto byte6;}; if(kk==5){goto byte5;}; if(kk==4){goto byte4;}; if(kk==3){goto byte3;}; if(kk==2){goto byte2;}; if(kk==1){goto byte1;}; if(kk==0){goto byte0;}; printf("\nInvaid bytejump number = %2x\n",kk); return 2; bytem: if(kk==7){aaa=a[7]; goto bit80;}; if(kk==6){aaa=a[6]; goto bit80;}; if(kk==5){aaa=a[5]; goto bit80;}; if(kk==4){aaa=a[4]; goto bit80;}; if(kk==3){aaa=a[3]; goto bit80;}; if(kk==2){aaa=a[2]; goto bit80;}; if(kk==1){aaa=a[1]; goto bit80;}; //if(kk==0){aaa=a[0]; goto bit80;}; printf("\nInvaid number of byte decrements. = %d\n",kk); return 2; printa: printf("\na[] = %2.2x%2.2x%2.2x%2.2x",a[0],a[1],a[2],a[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", a[4],a[5],a[6],a[7]) ; printf("\nexponentof(a) = %d\n",exponentofa); printf("\nb[] = %2.2x%2.2x%2.2x%2.2x", b[0],b[1],b[2],b[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", b[4],b[5],b[6],b[7]) ; printf("\nexponentof(b) = %d\n\n",exponentofb); goto mul; printc: exponentofc = exponentofa + exponentofb ; printf("\nc[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[12],c[13],c[14],c[15]); printf("\nexponentof(c) = %d\n",exponentofc); goto done ; done: printf("Done.\n"); return 0; }____ GE Vernova and Vestas rule lackluster US wind turbine market.Try 2.FAA/NTSB flight control software cover-up remediation
FAA FOIA lsawsuit - District of Columbia avoidable.First posted 'End Thursday May 15, 2025 13:50 https://prosefights2.org/irp2023/windscammers23.htm.
Friday March 24, 2023 20:08
Upda2d
Wednesday July 2, 2025 10:37
Start Thursday May 15, 2025 14:41: https://prosefights2.org/irp2023/windscammers23.htm.
7/27/24
Conduct unbecoming navy officer Admiral William H Payne Complaint.
7/19/24
EyeglassWorld reading glasses and and optometrist exam issues.
Unable to update above page. Updated page below.
https://prosefights2.org/irp2023/mvdnow4.htm
1/24/24.Kaneohe Poseiden P8A FOIA.
Vinson F-35C FOIA.
1/10/24.
liaison1. communication or cooperation which facilitates1/8/24.
a close working relationship between people or organizations.FOIA.GOV.12/2/23.
Department of Defense Department of the Navy
202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
policy.a course or principle of action adopted or proposed by a government, party, business, or individual.
11/25/23.bamboozle11/11/23.
fool or cheat (someone).certification11/10/23.
the action or process of providing someone or something with an official document attesting to a status or level of achievement.retaliation
the action of harming someone because they have harmed oneself; revenge.
11/9/23.nemesis11/7/23.
the inescapable agent of someone's or something's downfall.conpersuade (someone) to do or believe something, typically by use of a deception.
10/31/23conned
persuade (someone) to do or believe something, typically by use of a deception.
7/5/23Reprimand: "a rebuke, especially an official one.3/22/23.
Phone numbers issues.1-855-658-2676.3/21/23.
1-888-127-6445478.
Recording 2, 3, 4, 5, 6, 7, 8, 9.Phone message from US government?.3/20/23
Two forms of id?Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil
Good evening, Mr. Payne,
Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:
1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.
2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/
As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term FOIAonline (the correct site should appear as the top hit, and it will contain foiaonline.gov as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.
Regards,
Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer
Christopher.a.julka.civ@us.navy.mil
(703) 697-0031
From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address
Hello Mr Julka,
Alternate email address.
Sunday February 26, 2023 19:07
Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.
3/1/23F-18 Carrier break and landing!.12/25/22
,![]()
12/21/22.The statute of limitations for a FOIA claim is six years. However, a requester may refile their FOIA request to restart the statute of limitations.Feb 21, 201711/24/22.Airbus A220 autopilot warning. Full coverage.9/18/22
FAA wants pilots to be less dependent on computer autopilots.
4/3/22prosefights hacked. Again. :(
6000 lines of code vs 100 60 lines of code missing.
Hacking attempted recovery 4.6.22.
2/5/22.
__________________
5/01/22.
Linus Torvalds reveals the 'true' anniversary of Linux code.9/21/21.
US Navy software FOIA request.9/3/21.
Christopher Julka (703)-697-0031 DONFOIAPublicLiaison@navy.mil.8/24/21.
c/c++ wind turbine software use too?NTSB 8/20/21 phone message.
Tweet.
![]()
4/22/21.4/21/21.
No appeal possted yet. "(
Software tehnology? c/c++?Scary USS Gerald R. Ford - How Powerful is the CVN-78? US Navy's $13 Billion Aircraft Carrier.4/20/21.
Speed display disappear? Software issue?"(where's) my speed my speed"4/18/21.
4/17/21.
Transcript.Where is air speed?4/1921.4/16/21.
Rapid Descent and Crash into Water Atlas Air Inc. Flight 3591 Boeing 767-375BCF, N1217A.NTSB Ms Tamara Crawford phone conversation 4/16.4/1421.
We are Legion.
We do not forgive.
We do not forget.
Expect us.4/13/21. 'view' oly appeared starting today?
4/12/21.What computers? How many modules? Lines of code for each module?4/11/21
Tamara Crawford audio 4/9/21.
https://data.ntsb.gov/Docket?ProjectID=99013
4/19/21.4/10/21.
Poster attended book signing at Page One i Albuquerque.
Sunday, January 07, 2001 5:52 PM
Dear Friend,
we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.
With thanks
On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/
Wednesday, January 17, 2001 7:10 PM
Dear Friend,
A stand for Ahmad but why this question?
Iran Danesjoo Information Committee project reports. [1, 2 , 3].Swiss Radio International link fixed with irp2014 switch from malwarebytes.Admiral fornmer Navy Seal.
Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Another request?
Phone message attachment.
3/23/21.LIGHTWEIGHT OS FOR ANY PLATFORM.
3/20/21.
3/22/21 Attachments.
1
1
1
1
2/4/21.12/30/20.12/25/20.
R44jPT22f3d12/22/20. :( !!!
J210*9t765r^
12/22/20. :( !!12/21/20. :( !
J210*9t765r^
12/17/20. :(
12/16/20. Something wrong?12/15/10
12/14/20.
12/10/20.
12/8/20.
Tuesday December 8, 2020 14:43
http://www.prosefights.org/irp2020/windscammers13.htm#ntsbbryson
Hello Ms. Bryson,
This is an appeal of FOIA No. FOIA-2020-00406 denial.
Ms. Melba Moye wrote on September 14, 2020
appears inapplicable for denial because FOIA requested DATAFinal 3 minutes of Atlas Air #3591 Boeing 767:from
1 Names of all software modules executed.
2 Time of execution. Nanosecond accuracy, if possible.
3 Altitude of #3591 at time software module entered.NTSB chairman Sumwalt, Friday June 12, 2020 10:32.Ms. Moye's denial reason is unsupported.
Ms. Moye/Ms. Joy Gordon make legal attempt to deny my FOIAThese legal arguments should be addressed to a judge/jury in event I am unable to receive requested documents by
administrative means?
Since no legitimate reason for denial provided by Ms. Moye and Ms. Gordon exist, I ask that you grant appeal.
And have NTSB deliver requested documents.
Regards,
william harris payne.10/26/20 FAA FOIA lawsuit - District of Columbia..
12/9/20.
____https://dms.ntsb.gov/pubdms/.
https://www.ntsb.gov/_layouts/ntsb.aviation/index.aspx.
NTSB
AttN: Ms Sharon Bryson
Manager Director
490 L'Enfant Plaza SW
Washington, D.C. 20594
Chaff?
Boeing 787: A Financial Engineering Nightmare?.10/6/20.
____10/5/20.
Boeing 737 MAX: Turning A Crisis Into A Win.
Programming languages: Java founder James Gosling reveals more on Java and Android.
Liberal arts 'educated'?Linux 5 day course in focus because of 737 MAX and Raspberry Pi 4B.10/4/20
https://forums.linuxmint.com/viewtopic.php?t=294209
Programming languages: Java founder James Gosling reveals more on Java and Android.10/1/20.
Back again after deletion.
"Back in the early 1990s it was well understood that the number one source of security
vulnerabilities was just pointers, was just bugs, like 50% to 60% to 70% were bugs and the
vast majority of them were like buffer overflows.
Liam Tung.
why java michael barr.
At that stage, C an C++"absolutely owned the universe" and everything was being written in those languages.
The statistics in this article have been a part of software engineering for decades.
Back in 1990, they were a major pain point, and a major motivator behind many of the features
of Java.
James Gosling.
9/18/20.Unable to shrink email.9/14/20
:( ++
9/11/20
ntsb foia status message.8/11/20.
8 rings.____
Boeing 747s still get critical updates via floppy disks.
Which OSs support floppies?
This surprise Linux malware warning shows that hackers are changing their targets.
8/10/20.
FAA Dave Duff phone message 1 2. 8/01/20.8/7/20.
A declaratory judgment is a binding judgment from a court defining the
legal relationship between parties and their rights in a matter before the court.
Typically, a party will first send a cease and desist letter prior to seeking
declaratory judgment from a court.
Injunctive relief, also known as an injunction, is a remedy which
restrains a party from doing certain acts or requires a party to act in a certain way.
It is generally only available when there is no other remedy at law and
irreparable harm will result if the relief is not granted.
Where is Mark House?
206-231-2046 call audio.
* UNITED STATES DISTRICT COURT
FAA/NSTB FOIAs
Boeing 737 MAX, Atlas Air #3591 767-375 1992
software certification?Thursday April 25, 2019 15:38
Updated
Friday May 31, 2019 16:45
3/7/23
New Mexico
Energy, Minerals & Natural Resources Department
nformation request
First posted
Monday June 22, 2020 13:10
Updated
Friday October 23, 2020 09:27
Notes
Wednesday July 2, 2025 10:34
____Why The Latest Linux Kernel Wont Run____
On Your 486 And 586 Anymore.Microsoft to Cut 9,000 Workers in Second Wave of Major Layoffs.
Try 3.
Tuesday July 1, 2025 16:41
____are computer programming jobs shifting rom full time employment to
contractors from all over the world?
AI Overview.
Yes, there's a discernible shift in the computer programming job market,
with a move towards outsourcing and contracting, often leveraging a global
talent pool.
Key Trends and Observations:
Increased Outsourcing:
Growth in Staff Augmentation:
Nearshoring Popularity:
Cost Savings as a Driving Factor:
Factors Contributing to the Shift:
Potential Implications:
In conclusion, the computer programming job market is indeed seeing
a shift towards increased outsourcing and the use of contractors
from around the world. This is driven by various factors, including
cost efficiency, access to talent, and the rise of remote work.
However, companies must carefully consider the potential
implications and challenges associated with these trends.
____is modern c++ obfuscated?
AI Overview.
Modern C++ is not inherently obfuscated, but its complexity and feature richness can
lead to code that is difficult to understand if not written carefully. The language itself is
a tool, and like any tool, it can be used for good or ill. While it offers powerful features
that can improve performance and expressiveness, these features can also be misused
to create code that is deliberately confusing.
Why modern C++ might be perceived as obfuscated:
Complex Syntax and Features:
Low-Level Memory Management:
emplate Metaprogramming:
Poorly Written Code:
Intentional Obfuscation:
In summary, modern C++ is a powerful language with a
learning curve, and its features can be used to create both
clear and obfuscated code.
Does modern c++ have dependency certification issues with
safety-critical apps?
AI Overview Yes, modern C++ does have challenges related to
dependency certification issues within safety-critical applications.
While C++ is widely used and provides low-level control, which is
sometimes necessary for safety-critical systems, it presents challenges:
Inherited memory safety vulnerabilities from C:
Difficulty in ensuring safety:
Dependence on external libraries and code:
Complexity and undefined behavior:
is modern c++ expensive to maintain?
AI Overview.
Modern C++, while introducing powerful features
and abstractions, can present some challenges that might lead
to increased maintenance costs, depending on various factors.
Factors that can increase maintenance costs with modern C++:
Complexity:
Legacy Codebases:
Steep Learning Curve:
Overuse of advanced features:
is modern c++ project costs an issue with investors?
AI Overview.
Using modern C++ in software projects can have cost implications
that may raise concerns for investors.
Why modern C++ projects can be costly: :( ?
____Arm muscles into server market but can't wrestle____
control from x86 just yet.
Canonical Decides To Double Down On Their Investment I
n Java For Ubuntu.
Microsoft quietly implies Windows has LOST
millions of users since Windows 11 debut
are people really abandoning ship?.
what is x86 instruction fluff?
AI Overview.
In the context of x86 instruction sets, "fluff" refers to the
unnecessary or redundant instructions that can be included
in assembly code. These instructions don't perform any
essential function for the program's logic but are often
added for specific purposes, such as:
Obfuscation: Malware authors or attackers may include "fluff"
instructions to make it harder for security analysts to understand
and analyze their code. This is a common technique in reverse
engineering and code obfuscation.
Padding and Alignment: Instructions like the "NOP" (no operation)
instruction can be used to pad code and ensure proper alignment
of instructions or data, which can improve performance on some
processor architectures.
Exploits and Shellcode: In the context of buffer overflow attacks,
"NOP sleds" or "NOP slides" are sequences of NOP instructions used
as a "landing area" for injected shellcode. If the exploit overwrites
the instruction pointer (EIP) to point anywhere within the NOP sled,
the execution flow will slide down the NOPs until it reaches the
malicious shellcode.
Examples of X86 instruction fluff:
In summary, while the term "fluff" can have a negative
connotation suggesting inefficiency, these extra instructions
serve various purposes in x86 assembly, from enhancing code
security to
facilitating exploits.
7 things every Linux beginner should know before downloading
their first distro.
are linux distros large supported by volunteers?
AI Overview.
Yes, many large Linux distributions are supported by volunteers,
though it's important to understand the nuances.
Here's a breakdown:
In summary:
Many large Linux distributions rely heavily on volunteers for their
development, maintenance, and support. While commercial
distributions exist and offer paid support, the open-source nature
of Linux allows for vibrant community contributions to both
commercial and community-driven distributions. The Linux kernel itself,
the core component of Linux distributions, is also a testament to
this collaborative, often volunteer-driven development model.Mark Zuckerberg Already Knows Your Life.
Now He Wants His AI to Run It.
Critics blast Microsoft's limited reprieve for those stuck on Windows 10.
what windows 10 version works best for legacy hardware?
AI Overview.
For older hardware, Windows 10 21H2 or earlier versions are often recommended.
These versions may be more compatible with older drivers and hardware components
that might not be supported by later versions like 22H2 or Windows 11. Specifically,
some users report success with versions like 1709 or even the initial release (v1507)
if newer versions fail.
Here's a more detailed breakdown:
Try 3.
Monday June 30, 2025 14:33
____Why is AI taking peoples jobs, and what job sector is the most affected by it?
AI Overview.
AI's impact on the job market stems from its ability to automate tasks previously
done by humans, leading to job displacement in various sectors. While AI has the
potential to augment some roles and create new jobs, the immediate impact often
involves replacing workers in repetitive or predictable tasks. The most affected
sectors include customer service, manufacturing, transportation, and some
white-collar jobs.
Here's a more detailed breakdown:
Automation of Tasks:
Job Displacement:
Sector Specific Impacts:
Customer Service:
Manufacturing:
Transportation: Self-driving vehicles and trucks, powered by AI,
could disrupt the transportation industry, affecting jobs like drivers.
White-Collar Jobs: While some white-collar jobs might be augmented by AI,
others, especially those involving data analysis, coding, and writing, are
also at risk of automation.
Income Inequality: AI could exacerbate income inequality if displaced
workers struggle to find comparable jobs or face lower wages in new roles.
____Mini-PC wity 16 Zen5 Cores ....____
AMD Ryzen AI Max+ 395.
Multithread Rating 52901
Single Thread Rating 4123
Clockspeed: 3.0 GHz Turbo Speed: 5.1 GHz
Cores: 16 Threads: 32
Typical TDP: 55 W
does intel n4020 have 64 bit wide data path?
AI Overview.
Yes, the Intel Celeron N4020 processor supports 64-bit processing.
This means it has a 64-bit wide data path, which allows it to handle
more data at once compared to a 32-bit system.
This capability is important for:
does intel n6000 have 64 bit wide data path?
AI Overview.
Yes, the Intel Pentium Silver N6000 processor supports 64-bit architecture.
This means it can process data in chunks of 64 bits, allowing it to utilize
a larger address space and potentially perform certain tasks more
efficiently than a processor with a 32-bit architecture.
Here are some key facts about the Intel N6000:
AI Overview.
AMD Ryzen AI 300 series 'Strix Point' APU laptops launch ... AMD's
Ryzen AI 300 series, featuring Zen 5 architecture, RDNA 3.5 graphics,
and an XDNA 2 NPU, is designed for a new generation of laptops,
including ultra-slim and high-performance models. These processors,
also known as "Strix", aim to improve AI capabilities and overall
performance, with the first laptops expected to launch around July
and August.
Key Features and Improvements:
do AMD's Ryzen AI 300 series require new drivers
to run windows 11 ad ubuntu?
AI Overview.
Yes, AMD Ryzen AI 300 series processors do require specific drivers for
both Windows 11 and Ubuntu to function properly and utilize their
full capabilities, especially the integrated AI features.
For Windows 11:
For Ubuntu (and other Linux distributions):
In summary:
Behind RadioShacks Cheapest Computer.Anker just issued a recall on these six power banks ____
how to see if yours is affected.Nvidia insiders dump more than $1 billion in stock, according to report.
Try 2.
Sunday June 29, 2025 17:34
____Power banks manufactured before 2024 now banned from air travel in China.____
https://hackaday.com/2025/06/29/windows-95-on-playstation-2-works-as-well-as-you-expected/https://hackaday.com/2025/06/29/windows-95-on-playstation-2-works-as-well-as-you-expected/
Tech Nvidia insiders dump more than $1 billion in stock, according to report.gcc c inline assemblers obfuscating and incomplete. :(____
AI Overview.
On x86 platforms, GCC's extended inline assembly allows you to specify assembler
instructions using either AT&T syntax (the default) or Intel syntax.
Here's how GCC enables assembly of various x86 instruction forms:
Dialect Support:
AT&T Syntax:
ntel Syntax: Can be activated globally with the -masm=intel option or
locally within the asm block using ".intel_syntax noprefix".
Mixing Dialects:
Basic vs. Extended Assembly:
Basic asm:
Extended asm:
instruction Forms:
Important Considerations:
Syntax Differences:
Extended Assembly:
Optimization:
Portability: Inline assembly is platform-specific and may need
adjustments when porting code.
how is a simple x86 assembler code "nop nop nop"coded and run
using gcc c inline assembler?
AI Overview.
In order to code and run a simple "nop nop nop" sequence using GCC inline
assembly on an x86 system, you can use the asm keyword within your C code.
This allows you to embed assembly instructions directly.
Here's a breakdown of how it's done:
#include stdio.h // add<>
int main() {
printf("Executing NOP instructions...\n");
// Inline assembly block for NOP instructions asm("nop");
asm("nop");
asm("nop");
printf("NOP instructions executed.\n");
return 0;
asm("nop");: The asm keyword indicates that inline assembly code will follow.
The string literal within the parentheses contains the assembly instruction
to be executed. In this case, there are three separate asm statements,
each containing a single "nop" instruction.
2. Compiling the Code with GCC: Save the C code above into a file,
such as nop_example.c. Compile it using GCC:
bash
gcc -o nop_example nop_example.c
3. Running the Executable:
After compilation, run the executable from your terminal:
bash ./nop_example
Explanation:
asm keyword: GCC translates the asm() statements into inline assembler code,
eliminating function call overhead.
nop instruction: The "nop" instruction (No Operation) instructs the processor to do
nothing for one clock cycle. By using three asm("nop") statements,
three nop instructions are inserted into the generated machine code.
This example demonstrates how to embed basic assembly instructions within C code
using GCC inline assembly. For more complex scenarios, extended asm statements
can be used to interact with C variables and define operand constraints.
How to associate assembly code to exact line in C program?.Intel Nova Lake performance leak claims 10% single____
and 60% multi-threaded uplift.
AI Overview.
Intel's Nova Lake is the codename for their next-generation desktop CPU
architecture, slated for release in 2026. While specific PassMark scores for
Nova Lake are not yet available, leaked information suggests a significant
performance uplift compared to previous generations, including potential
increases of over 10% in single-threaded performance and 60% in
multi-threaded performance. This is partly due to a new core architecture
with up to 52 cores (16 P-cores, 32 E-cores, and 4 LP-Cores).
Key points about Intel Nova Lake:
AI Overview.
Intel Nova Lake preliminary desktop specs list 52 cores: 16P ...
Intel Nova Lake CPUs are expected to have a power consumption
range of 65W to 150W, with the high-end models potentially reaching 150W TDP.
Specifically, the Nova Lake-S series is rumored to have a flagship model
with 52 cores (16P + 32E + 4LP) and a 150W TDP, according to a Reddit
thread. The lower-end Nova Lake-S models are expected to have a 65W TDP.
The inclusion of low-power (LP) efficient cores is a key feature aimed at
improving power efficiency, especially for background tasks.
Here's a more detailed breakdown:
NVIDIA GeForce RTX 5070 SUPER reportedly features 6400 CUDA cores
and 18GB memory.
AI Overview.
The NVIDIA GeForce RTX 5070 has a typical power consumption of 250W,
according to TechPowerUp's GPU database. This is the maximum power
draw specified by NVIDIA for the reference card. However, actual power consumption
can vary depending on the specific game, settings, and whether the card is
overclocked. For example, some users have reported power consumption
between 90-110 watts when undervolting and playing games like Final Fantasy XVI
and The Last of Us Part II at 2K resolution with DLSS. In more demanding
scenarios like Furmark stress tests, the power consumption can reach higher levels.Lidar is lame: why Elon Musks vision for a self-driving Tesla taxi faltered.
____Stop These Things Weekly Round Up: 29 June 2025.Try 1.
PGE wants to add solar to troubled wind farm instead of replacing turbines.
Suzlon wind turbines Spanish Fork UT.
Full Savage coal truck descending to Wellington UT.
Empty coal truck ascending to Soldier Summit UT.
Entering Moab UT.
AI Overview.
Energy News: A New Uranium Boom? - Utah Geological Survey A new uranium mine, the Velvet-Wood mine,
has been approved in San Juan County, Utah, southeast of Moab. The project is the first to be approved under
the Trump administration's emergency declaration expediting energy projects. The mine, located near
Lisbon Valley, will also produce vanadium.
Key Points:
Uranium mining in Utah.
Saturday June 28, 2025 18:44
____Former Texas governor and US energy sec plans 11GW data center campus
outside Amarillo, Texas.
Surprising group are living in fear as they struggle to get hired despite
strong job market.
AI Overview.
Canonical The Company Behind Ubuntu with Mark ... Ubuntu is owned and
developed by Canonical Ltd., a private company founded by Mark Shuttleworth.
While Canonical is the primary publisher and developer, Ubuntu is also a
collaborative project with contributions from a large community of volunteers.
Here's a more detailed breakdown:
Mark Shuttleworth: He founded Canonical and is the driving force behind Ubuntu.
Canonical (company).
AI Overview.
According to various sources, approximately 13,000 Navajo households on the
Navajo Nation reservation lack access to electricity. This number represents a
significant portion of Native American homes without electricity nationwide.
The Navajo Nation covers a large area spanning parts of Arizona, Utah, and
New Mexico.
Here are some key points about the situation:
AI Overview.
On x86 platforms, GCC's extended inline assembly allows you to specify assembler
instructions using either AT&T syntax (the default) or Intel syntax.
Here's how GCC enables assembly of various x86 instruction forms:
____Anker issues new global recall for five power____
bank models over fire hazard.
AI Overview.
Older cell phone batteries swell due to a combination of factors,
primarily related to the breakdown of the battery's internal
components and the resulting gas production. Specifically,
the electrolyte, a liquid inside the battery, can decompose and
release gases like hydrogen, oxygen, and carbon dioxide.
This gas buildup inside the sealed battery casing causes it
to expand.
Here's a more detailed breakdown:
Overcharging:
AI Overview.
Yes, virtually all new cell phones are equipped with overcharging prevention
hardware and software, often integrated within a Battery Management
System (BMS).
Here's why this is standard in modern devices:
mportant Notes:
do solar charge/load controllers have overcharging prevention
hardware/software?
AI Overview.
Yes, solar charge controllers are designed to prevent battery overcharging,
and they achieve this through both hardware and software features.
How they prevent overcharging:
Solar charge controllers act as the "gatekeeper" for your battery bank,
ensuring proper charging, preventing overcharging, and protecting the
longevity and safety of your system.
does solar charge/load controller use multitasking software technology
like is used in Linux?
AI Overcvew.
Yes, solar charge controllers, especially those using advanced technologies
like Maximum Power Point Tracking (MPPT), often utilize multitasking software technology, similar in concept to what is used in Linux, but typically
implemented with a Real-Time Operating System (RTOS).
Here's why and how:
In essence, while a solar charge controller doesn't typically run a full version
of Linux, it does employ similar multitasking principles within its embedded
software, often utilizing an RTOS, to efficiently manage its diverse functions.
do inexpensive, <$25 solar charge/load controller use multitasking software technology like is used in Linux? :)
AI Overview.
No, inexpensive, sub-$25 solar charge/load controllers are highly unlikely to use complex multitasking operating system technology like that found in Linux.
Here's why:
inux is for complex systems:
Simple embedded systems:
Efficiency:
Cost and Resources:
Multitasking in Embedded Systems: While some embedded systems do utilize multitasking, it's typically handled through Real-Time Operating Systems (RTOS)
or simpler approaches that offer more control and predictability than a full OS like
Linux. These inexpensive controllers likely use a simple "main loop" approach
where the microcontroller rapidly switches between different tasks to give the
illusion of multitasking.
In essence, a sub-$25 solar charge controller is a dedicated device with specific functions, making a complex OS like Linux unnecessary and impractical.
AI Overview.
No, inexpensive solar charge controllers, particularly those under $25,
generally do not offer the same performance as more expensive MPPT
controllers, even if they are advertised as "MPPT".
Here's why:
In summary: While a very cheap controller might suffice for simple needs
(like charging lights or small devices), you should not expect it to deliver
the same level of performance and reliability as a genuine, higher-quality
MPPT controller.
If you need a more efficient and reliable charge controller, especially
for larger solar setups or for charging sensitive lithium batteries, it's
generally worth investing in a reputable MPPT controller, even if it
means spending more than $25.
AI Overview,
Yes, expensive and complex solar charge controllers, especially MPPT
(Maximum Power Point Tracking) ones, can require software or
firmware updates.
Here's why and the benefits of updating:
In summary, while not all solar charge controllers require firmware updates,
the more sophisticated and expensive ones, especially MPPT controllers, benefit significantly from these updates to optimize performance, enhance reliability, and
ensure continued functionality.
who pays for expensive complex solar charge/load controller software updates?
AI Overview.
In general, the customer is responsible for the cost of software updates for
solar charge controllers, especially if they are not included in the initial purchase
or an ongoing maintenance contract.
Here's a breakdown of the typical scenarios:
In summary, while the initial software updates may be included in the purchase
price, ongoing access to updates may require a separate payment or be
covered by a maintenance agreement.4 things Linux still gets wrong for the average user.____
AI Overview.
DRM-protected content refers to digital media, like movies, music, or ebooks,
that has been encrypted and controlled by a system called Digital Rights
Management (DRM). This system limits how users can access and use the
content, often preventing unauthorized copying, sharing, or redistribution.
Essentially, DRM grants users a license to use the content under specific
conditions, rather than outright ownership.
Here's a more detailed breakdown:
AI Overview.
In 2024, Linux's desktop market share reached 4%, a significant milestone
for the open-source operating system. This figure, however, represents only
a portion of the total global computer usage, with Windows and macOS
still dominating the market. While Linux's adoption is growing, particularly
in specific regions and for certain applications, it still faces challenges in achieving widespread mainstream adoption on desktop PCs.
Here's a more detailed look:
In conclusion: While Linux has a dedicated and growing user base, particularly
in specialized areas, it still faces challenges in achieving widespread mainstream
adoption on desktop PCs. However, its open-source nature, cost-effectiveness,
and increasing user-friendliness are contributing to its ongoing growth and
relevance in the computing landscape.
4 times an HDD is still better than an SSD.
Developers of Linux distro Fedora propose dropping 32-bit support entirely,
but it's being claimed that the change 'would kill off projects like Bazzite entirely'.Ford CEO favors Waymos LiDAR approach over____
Teslas vision-only self-driving.Is anyone else just done with the industry?.____ Solar panel maker Meyer Burger US files for Chapter 11 bankruptcy [Update].Try 1.
Friday June 27, 2025 17:13
____The College-Major Gamble.____
2,000-GPU data center launches powered exclusively by reusable batteries
12-megawatt storage system built on hundreds of repurposed EV batteries.Speed comparison between USB 2.0, USB 3.0, eSATA,____
Firewire and Thunderbolt.Chinas new army of engineers.____In Pursuit of Godlike Technology, Mark Zuckerberg____
Amps Up the A.I. Race.
Meta hires key OpenAI researcher to work on
AI reasoning models.
Meta says its winning the talent war with OpenAI.was windows me installed on a marketed us automobile?____
AI Overview.
It is highly unlikely that Windows Me (Millennium Edition) was
ever installed on a commercially marketed US automobile.
Windows Me was designed for home PC users, not embedded
systems like car infotainment systems. It included features
meant for personal computing, such as video editing and multimedia
tools. Windows Me was also known for its instability issues,
making it unsuitable for a critical system like a car's operating system.
Microsoft developed operating systems specifically for automobiles,
like Windows Embedded Automotive (formerly Microsoft Auto,
Windows CE for Automotive, etc.). These were built on more
appropriate bases like Windows CE and were used in
systems like Ford Sync.
Windows Me was not the right fit for the demands and needs of a
car's operating system, and a separate, more suitable platform
like Windows Embedded Automotive was used instead.
was windows installed on a marketed us automobile? [Insider information. :) ]
AI Overview.
Yes, various car models marketed in the US have had infotainment
and telematics systems powered by a version of the Windows
operating system called Windows Embedded Automotive
(formerly Microsoft Auto, Windows CE for Automotive,
Windows Automotive, and Windows Mobile for Automotive).
Examples of US-marketed cars that have used Windows Embedded
Automotive include:
Windows Embedded Automotive is a specialized operating system built
on Windows CE, designed for the automotive industry's specific needs.
It is not a full version of Windows, like the one on a desktop computer.
While Microsoft's automotive platform was used in various vehicles,
some manufacturers have switched to other operating systems like
BlackBerry QNX.
Tesla's Robotaxi: Worth Way More Than Waymo.
Windows Embedded Automotive.Why hasnt the x86 architecture ever been replaced in personal computers____
and workstations?
Jeff Sturm VP, Information Systems (2020present)
A few reasons, but in truth x86 has been replaced several times now
with a new evolution of the CPU architecture.
...
It remains to be seen whether x86 will ever become obsolete, or just continue t
o evolve indefinitely as computing technology adapts to our changing needs and
our online lifestyle. Today it is ubiquitous in Windows-compatible desktops and laptops,
and also Mac hardware from Apple, though most mobile devices have evolved supporting
a different architecture, partly due to the need for lower power and low cost. The shift
from x86 may be gradual as mobile devices continue to replace desktops for everyday use.
A look at history:
does amd now have a 256 bit data path cpu?
AI Overview.
Yes, AMD does have CPUs with 256-bit data paths, and they also have CPUs
with 512-bit data paths. The "Zen 5" architecture, used in processors like the
Ryzen 9000 series and 5th Gen EPYC, features a 512-bit FPU (Floating Point Unit)
data path. However, some "Zen 5" cores, particularly those found in mobile SoCs
like "Strix Point", have a 256-bit wide FPU data path. Additionally, AMD's
EPYC 9004 series processors implement AVX-512 by effectively using a
256-bit data path twice (double-pumping).
Here's a more detailed breakdown:
what are AVX-512 instructions?
AI Overview.
AVX-512 (Advanced Vector Extensions 512) is a set of x86 instructions designed
to enhance performance, particularly for compute-intensive workloads like scientific
simulations, AI, and data analysis. These instructions operate on 512-bit vectors,
enabling parallel processing of larger data sets compared to previous AVX versions.
Here's a breakdown of key aspects:
AI Overview.
AMD EPYC 9004 series processors, also known as the 4th Gen EPYC, have a range
of power consumption levels depending on the specific model and workload.
The default TDP (Thermal Design Power) for these processors can range
from 165W to 400W, with some models even reaching 360W or higher.
For example, the EPYC 9754 has a default TDP of 360W and a configurable
TDP (cTDP) range of 320-400W.
Here's a more detailed breakdown:Trump says the U.S. has signed a deal
with China on trade, without giving details.
AMD Ryzen CPUs continue to crush Intel processors
on Amazon best-seller list.
:)++Try 1.
MPPT work? What software technology used? :)
what is the optimum power output for a wind mppt?
AI Overview.
The optimal power output for a wind turbine with MPPT (Maximum Power Point Tracking)
is the highest power that can be extracted from the wind at a given wind speed, and
this is achieved by constantly adjusting the turbine's operating point to match the
changing wind conditions. MPPT algorithms aim to find and maintain this optimal
operating point, ensuring the turbine delivers the maximum possible power for
the existing wind speed.
Here's a more detailed explanation:
Solar manufacturing is booming. Advocates say it could go bust without incentives.
AI Overview.
The maximum power point voltage of a solar panel is typically 75% to 80% of its
open-circuit voltage (VOC). This means that when a solar panel is operating at its
maximum power output, the voltage will be around 75-80% of the voltage it produces
when no load is connected (open-circuit voltage).
Here's a more detailed explanation:
Inexpensive solar charge/load controllers do ~mppt, we found over years of testing.
Iranian woman, who has lived in US for 47 years,
taken by Ice while gardening.
AI Overview.
U.S. Immigration and Customs Enforcement (ICE) is a federal law enforcement agency
under the Department of Homeland Security. It enforces federal laws governing border
control, customs, trade, and immigration. ICE's primary mission is to promote homeland
security and public safety through the enforcement of these laws.
Here's a more detailed breakdown:
Thursday June 26, 2025 17:43
____Embedded Systems:
This is a common use case for bare-metal C programming.
Many embedded systems (like those in cars, appliances,
or industrial equipment) don't have full-fledged operating
systems but utilize C code running directly on their microcontrollers.
gcc freestanding environment example.
AI Overview.
GCC Freestanding Environment Example A freestanding environment,
often referred to as "bare-metal," is a minimal C/C++ execution
environment that does not rely on a standard operating system
or its typical library facilities. Examples include operating system kernels,
embedded systems, or bootloaders.
To compile a program for a freestanding environment using GCC,
you need to use specific compiler and linker options.
Here's an example:
gcc -ffreestanding -nostdlib freestanding.c -o freestanding
This example provides a basic outline. Real-world freestanding development,
especially for operating systems or embedded systems, is much more complex
and involves careful low-level programming and platform-specific configurations.
____AI Overview.
James Gosling is a Canadian computer scientist best known as the
"father of Java." He led the development of the Java programming
language at Sun Microsystems in the 1990s. Java's platform independence
(write once, run anywhere) revolutionized software development, making
it widely used across diverse platforms and applications.
Key points about James Gosling and Java:
was james goslig's java influenced by forth's portability?
AI Overview.
Yes, Java's portability was significantly influenced by the concept of
using intermediate code, which is a key element in the portability of
languages like Forth and Pascal's p-code.
How this relates to Java's design:
In summary:
While Java's syntax and other features have roots in other languages
like C++, the fundamental principle behind its portability the use of a
virtual machine and intermediate code was inspired by techniques
used in languages like Forth and Pascal's p-code. This allowed Java to
achieve its goal of being "architecture-neutral and portable".
AI Overview.
Understanding USB 3.2 and Type-C - Tech Design Forum Techniques
USB 3.2 Gen 2, when implemented with a USB-C connector, offers a
data transfer rate of 10 Gbps (SuperSpeed+) and supports features like
Power Delivery (up to 100W) and DisplayPort Alternate Mode (DP
Alt Mode) for video output. It is also backwards compatible with older
USB standards.
Key Specifications:
~1.25 MB/s?
AI Overview.
The Hewlett-Packard (HP) 9800 series was first marketed starting in 1971
with the introduction of the HP 9810A. The HP 9800 series was a family of
desktop computers, initially marketed as "calculators" by HP, and included
several models introduced over time.
Here's a breakdown of the models and their release dates:
AI Overview.
IBM's Early PC Attracts Time Travelers | Hackaday The IBM 5100 Portable
Computer was first marketed in September 1975. It was announced on
September 9, 1975, with deliveries beginning in the same month,
according to Bitsavers.org.
____Nvidia Stock Hits All-Time High. 'Golden Wave'____
Of Gen AI Seen.
Metas recruiting blitz claims three OpenAI researchers.
Tesla's robotaxi peppered with driving mistakes in Texas tests.
Tesla's Robotaxis Are Going Poorly.AVX-512's Enormous Advantage For AMD EPYC 4005
Series Performance.
AI Overview.
The PassMark PerformanceTest benchmark includes an AVX-512 test,
which can impact CPU performance scores, particularly for Intel
processors that support it. AMD processors, however, do not
natively support AVX-512, which can lead to a performance
difference in benchmarks that utilize this instruction set. :(?
Blender 5.0 Introducing HDR Support On Linux With Vulkan + Wayland.
AI Overview.
Blender 5.0, like previous versions, is primarily funded by the Blender
Development Fund. This fund is a voluntary, crowdfunding initiative
where individuals and companies contribute money on a monthly
or yearly basis. Additionally, various companies like AMD, Nvidia, Meta,
Apple, Epic Games, and Ubisoft contribute as corporate sponsors, i
nvesting in Blender's development, often due to their vested interest
in its success and compatibility with their hardware and tools.
Here's a more detailed breakdown:
Before Windows 10 goes EOL, I'm testing three alternative
Linux distros to save my 6-year-old laptop from the landfill.
Try 1.
Wednesday June 25, 2025 15:58
____AI Overview.
No, Solaris itself is not a bytecode operating system.
Here's why:
____AI Overview.
No, not all flash memory devices contain a dedicated microcontroller
for managing the flash memory. While many devices like SSDs, USB flash
drives, and SD cards do utilize flash memory controllers (often integrated
with a microcontroller), simpler devices might rely on the host system's
firmware or software for basic flash management.
Here's a more detailed explanation:
____Stable careers are a myth and no one wants to be a leader:____
A new report reveals the depths of worker pessimism with
corporate America.China breaks RSA encryption with a quantum computer,____
threatening global data security.
[Was public keu broken in ~1991/2 by NSA?]
____Is the last bug was fixed." software fiction?___
AI Overview.
Based on the provided search results, the idea that
"the last bug was fixed" in software is considered
a myth and is generally viewed as unattainable.
Here's why:
Software Complexity: Modern software is inherently complex,
making it extremely difficult, if not impossible, to predict and
account for every possible user interaction, environmental variable,
and edge case that could trigger a bug.
Infinite Possibilities: Users interact with software in countless ways,
often in unpredictable environments (different operating systems,
hardware, configurations), leading to the emergence of bugs that
may not be caught during testing.
Evolving Software: Software development is an ongoing process.
As new features are added or existing ones are modified, new bugs
can be introduced, making the idea of a permanently "bug-free"
state unrealistic.
Subjectivity of "Bug-Free": What one person considers a "bug"
might be seen as a minor inconvenience or even expected
behavior by another, further complicating the notion of a
completely bug-free product.
Evolving Software: Software development is an ongoing process.
As new features are added or existing ones are modified, new
bugs can be introduced, making the idea of a permanently "bug-free"
state unrealistic. Subjectivity of "Bug-Free": What one person
considers a "bug" might be seen as a minor inconvenience or
even expected behavior by another, further complicating the
notion of a completely bug-free product.
Instead of aiming for 100% bug-free software, the focus in software
development is on minimizing risks, addressing critical bugs, and
managing bugs effectively. This involves strategies such as: [mainframe
mentality? ( ?]
While striving for excellence and minimizing bugs is essential, recognizing
that some bugs may always exist is a crucial aspect of realistic software
zdevelopment. The goal is to build reliable software that delivers value
to users, even if it's not entirely flawless. [:(-?]
AI Overview.
Yes, platform temperature can be an issue related to software bugs,
but often in the context of hardware-software interactions.
Here's why:
Hardware issues triggered by temperature: Overheating can cause hardware components like RAM or other parts to malfunction or fail. These hardware
issues, in turn, can manifest as software bugs, leading to crashes, errors, or
unexpected behavior.
Software's role in temperature management: Software (like operating
systems and firmware) plays a crucial role in monitoring and managing
system temperature, for instance by controlling fan speeds.
Software bugs impacting temperature sensing/control: A software bug in
temperature sensor reading or thermal management logic can lead to a
device overheating or misinterpreting temperature data, which can then
result in system errors.
Firmware sensitivity to temperature: In some cases, firmware can be
overly sensitive to temperature changes, leading to false errors, such as
in the example of a 3D printer's thermal runaway detection.
Diagnosing temperature-related bugs: It can be challenging to determine
whether a bug is rooted in software or hardware, as exemplified by the
Quora user's experience with a hardware-induced driver issue.
In summary: While software bugs aren't directly "caused" by temperature
in the sense of software code being directly changed by heat, platform
temperature can trigger or exacerbate software-related issues, often
via underlying hardware problems.Tesla removed from Charlottes approved EV list due to safety issues.____
Heres a running list of all of Teslas robotaxi mishaps so far.Intel Starts Layoffs Under Lip-Bu Tan,
Some Impacted Roles Listed.____ Stop These Things Weekly Round Up: 22 June 2025.Try 2.
Tuesday June 24, 2025 15:30
____AI Overview.
HyperTerminal, developed by Hilgraeve, was first marketed as a "lite"
version of their HyperACCESS program and licensed to Microsoft for
use in their set of communications utilities in 1995.
More specifically:
Hilgraeve's first software product was initially designed for 8-bit Heath
computers to communicate over a modem, and in 1985 it was ported
to IBM PCs and compatible systems.
Over time, this technology was ported to other operating systems l
ike OS/2, Windows 95, and Windows NT.
IBM bundled a version of Hilgraeve's terminal program, "HyperAccess Lite",
with OS/2 Warp 3.0 in 1994.
Microsoft followed suit and licensed HyperTerminal for bundling with
Windows 95, where it was included up through Windows XP.
In summary, while the underlying technology predates 1995,
HyperTerminal itself entered the market by being bundled with Windows 95.
____Hackers Target Over 70 Microsoft Exchange Servers to____
Steal Credentials via Keyloggers.AI Overview.____
FORTH, Inc. (founded in 1971): This company was founded by Charles H. Moore
and Elizabeth Rather to explore commercial uses of the Forth programming l
anguage. They developed and sold implementations of Forth for various
computers, starting with microFORTH for specific microprocessors in 1976.IBM Already Working On What Is Likely Power12 Support____
For The GCC Compiler.Data center spending soared amid rising GPU demand in Q1.____Teslas robotaxis have already caught the attention___
of federal safety regulators.
are there any linux oses which are hacker-proof?
AI Overview.
No, there is no Linux operating system that is truly "hacker-proof."
While certain distributions are designed with security in mind and come
with tools for penetration testing and security analysis, no OS
can be completely impervious to attacks.
Here's why:
Open-source nature:
Linux is open-source, meaning its code is publicly available. This
allows for constant review and modification, but it also means
potential vulnerabilities can be identified and exploited by
malicious actors.
Complexity:
Linux systems, especially those used for security testing like
Kali Linux, can be complex. Understanding and securing them
requires a high level of expertise.
Human error:
Even with the most secure system, user error or misconfigurations
can create vulnerabilities that hackers can exploit.
Evolving threats:
The threat landscape is constantly changing, and new attack vectors
are developed regularly. No OS can stay ahead of all possible
threats at all times.
While you can make Linux systems very secure through proper
configuration and ongoing maintenance, there's no silver bullet
to make them completely hacker-proof.
Examples of Linux distributions focused on security:
Tesla Robotaxi Terrifyingly Jerks Wheel Back and Forth While
Carrying Passenger.
Im not buying the Tesla robotaxi hype heres why
its still miles behind Waymo.Notepad++ Vulnerability Let Attacker Gain Complete System____
Control PoC Released.Building A Modern Dashboard with Python and Taipy.____
AI Overview.
Yes, Python is a software technology that uses bytecode and
has threading capabilities, but with nuances related to the
Global Interpreter Lock (GIL). Taipy is a Python library,
meaning it relies on Python's underlying architecture, i
ncluding its bytecode and threading mechanisms.
Here's a breakdown:
Python and Bytecode:
Python source code is compiled into bytecode before execution by the
Python Virtual Machine (PVM).
Bytecode is a lower-level, platform-independent representation of the
source code, allowing it to run on any system with a compatible Python
interpreter.
Python and Threading:
Python supports multithreading, allowing programs to have multiple threads
of execution within a single process.
However, the Global Interpreter Lock (GIL) in CPython (the standard Python implementation) ensures that only one thread can execute Python bytecode
at a time, limiting true parallelism for CPU-bound tasks.
The GIL is released during I/O operations (like file reads or network requests)
and certain C extension operations (like NumPy calculations), allowing other
threads to run concurrently during these times.
Taipy and Bytecode/Threading:
Taipy is a Python library for building data and AI applications, implying it runs on
top of the Python interpreter and utilizes its execution model.
Therefore, Taipy applications will inherit Python's bytecode execution and threading behavior, including the impact of the GIL.
Taipy supports asynchronous execution for handling long-running tasks
without blocking the user interface, which could involve features that
interact with Python's concurrency mechanisms.
In summary, both Python and Taipy, being a Python library, are related to
bytecode execution and threading, with the understanding that Python's
threading is constrained by the GIL in CPython.Intel makes a harsh decision amid declining sales.
Will FPGA Advancement Revive AMD's
Embedded Segment Revenues?.____ Worlds first wind- and hybrid-powered cargo shipTry1.
marks 2 years at sea.
Why forecasting offshore wind project costs
is getting even harder.
Monday June 23, 2025 19:21
____AI Overview.____
Microsoft's first multitasking operating system, Windows 1.0, was marketed
starting on November 20, 1985. It was released as a graphical operating system
shell for MS-DOS, marking Microsoft's initial foray into the world of graphical user
interfaces. While initially achieving modest success, it laid the foundation for
future versions of Windows.
AI Overview.
GW-BASIC first appeared in 1983. It was a disk-based Microsoft product distributed
with non-IBM MS-DOS computers. It was a dialect of the BASIC programming language, functionally identical to IBM BASICA, but it was self-contained and didn't require the
Cassette BASIC ROM chip found in the original IBM PCs.
AI Overview.
Intel released the first version of MCS BASIC-52 (version 1.0) for their 8051 family of microcontrollers in 1984. A manual for Version 1.0 is dated July 1984, indicating
that it was being developed around this time.
Subsequently, in 1985, Intel introduced the 8052AH-BASIC microcontroller which
had the Version 1.1 interpreter factory-masked into its ROM. This was the most
common version, despite having a few errors.
AI Overview.
WANG 2200 computer Wang Museum
The Wang 2200 Basic minicomputer was first marketed in May 1973.
Wang Laboratories released the Wang 2200, which i
ncluded a built-in BASIC interpreter, in May 1973. It was an all-in-one minicomputer
with a CRT display, keyboard, and integrated cassette tape storage. The first model was designated as the 2200-A, with later models like the 2200-B and 2200-C offering more arithmetic capabilities.
AI Overview.
Sinclair BASIC first appeared in 1980. It was the operating system for the Sinclair ZX80,
which was launched on January 29, 1980. The ZX80 featured an Integer-only version of
BASIC stored in a 4 KB ROM. This was later upgradable to an 8 KB floating-point BASIC
ROM after the release of the ZX81.
Sinclair BASIC was also used in subsequent Sinclair
computers like the ZX81 and ZX Spectrum. The ZX81 was launched on March 5, 1981,
and had a more complete, but not full, 8K BASIC interpreter in ROM.
Therefore, Sinclair
BASIC was first marketed in 1980, coinciding with the launch of the Sinclair ZX80.
AI Overview.
The Jupiter Ace was first marketed and went on sale on 22 September 1982. Initially,
it was available through mail order. By January 1983, production difficulties had been
overcome, and units started arriving in shops. The introductory price was £89.95.How to switch from Windows 10 to Linux: A technical guide.____
Microsoft surprises MS-DOS fans with remake of ancient
text editor that works on Linux.
Intel Xeon 6300 vs. AMD EPYC 4005 SMT/HT Performance.Elon MuskFirst Look at Teslas Robotaxi App:____
features, design, and more.
AI Overview.
No, Tesla robotaxis are not guaranteed to be hacker-proof.
Here's why:
Autonomous vehicles, including Tesla's, are complex systems relying on computer
control and interconnected devices. This increases the potential for cyberattacks.
Security researchers have demonstrated vulnerabilities in Tesla's systems.
For example, researchers successfully exploited a vulnerability in the Tesla
Model 3's Tire Pressure Monitoring System (TPMS) to gain remote code execution.
Even systems not specifically designed for self-driving, like TPMS, can be exploited
as entry points for malicious activities.
The interconnected nature of autonomous vehicles with other systems (like the
Internet of Things) creates a broader attack surface.
While Tesla has taken measures to address security, vulnerabilities can emerge
in complex systems, and ongoing efforts are needed to address them.
Experts emphasize the importance of continuous cybersecurity efforts and the
need for rigorous testing and robust safeguards in autonomous vehicle technology.
n summary, while Tesla strives for safety and security, like any technology, robotaxis
face the potential for cyberattacks. The emphasis on robust cybersecurity measures
and ongoing security updates is critical to address these risks and safeguard the
safety of autonomous vehicles.
Tesla Robotaxi rollout proves that Elon Musk still delivers, even if its late.Windows Snipping Tool now lets you create____
animated GIF recordings.
Microsoft Confirms Windows 11 Automatic Deletions:
Take Action Now To Protect Yourself.
I can't ignore these 8 drawbacks to open-source software.
I've been using this cheap ESP32-based display
instead of a Flipper Zero, and it's just as versatile.Tesla Stock Surges After Musks Robo-Taxi Rollout.____
Where Shares Go From Here.Zuckerberg Leads AI Recruitment Blitz____
Armed With $100 Million Pay Packages.
Super-rich Americans like Mark Zuckerberg and Jay-Z
have taken out mortgages for homes heres why.
Nvidia RTX 5090 beats RTX Pro 6000 in tests after shunt mod to a
staggering 800W consumer flagship barely scrapes past the
$10,000 Pro despite eye-watering power modification.Techie went home rather than fix mistake
that caused a massive meltdown.
Urgent alarm issued after mother of all data breaches
sees 16 billion passwords exposed do this ASAP.
____Diisabling Intel Graphics Security Mitigation Boosts
GPU Compute Performance 20% (phoronix.com).
Chinas First 6nm GPU Aimed to Rival NVIDIAs GeForce RTX 4060,
But Fell Short Against the Decade-Old GTX 660 Ti.
____is there new unaium mining near moab?Try 1.
AI Overview.
Yes, there is new uranium mining activity near Moab, Utah. The Velvet-Wood mine,
located in southeastern Utah, has recently been approved for reopening under a
fast-tracked environmental review process initiated by the Trump administration,
according to news sources. This mine is located south of Moab and Monticello,
and is the first project approved under the new process.
Here's a more detailed breakdown:
New York to Build One of First U.S. Nuclear-Power Plants in Generation.
What's plaguing America's power grid?.
Iran tensions make thermal coal a winner against pricier LNG.
Power utility built $95 million 500-megawatt power substation for
Intel's $100 billion Ohio fab, but six-year delay leaves substation
capable of powering 500,000 homes idle.
Israel says it struck Tehran's Evin prison ... .
Sunday June 22, 2025 14:11
____$2 development board features Puya PY32F030 Cortex-M0+ MCU
with 64KB Flash, 8KB RAM.
Process Explorer Is Task Manager Dialed To 11.
____is microsoft's decision to encourage installation of___
windows 11 on legacy hardware to make legacy
hardware look bad going to damage microsoft financially?
AI Overview.
Microsoft doesn't explicitly encourage installing Windows 11 on legacy
hardware. Instead, they have specific minimum hardware requirements for
Windows 11 installation, such as:
UEFI Secure Boot
Trusted Platform Module (TPM) version 2.0
Approved processors (8th generation Intel Core or newer, 2nd generation
AMD Ryzen or newer, or Qualcomm Snapdragon 850 or later) [:)?]
While installing Windows 11 on unsupported hardware is possible,
Microsoft strongly recommends against it. Installing Windows 11
on legacy hardware can have significant drawbacks and potential
risks, such as:
Lack of support:
Compatibility issues:
No guaranteed updates:
Potential for instability and performance issues:
Financial implications for Microsoft:
Conclusion:
Microsoft's decision to have strict hardware requirements
for Windows 11, rather than encouraging installations on legacy
hardware, is likely driven by a desire to provide a more secure
and stable user experience and potentially increase hardware sales.
While this approach may initially lead to some frustration among
users, it is unlikely to cause significant financial damage to
Microsoft. In fact, it could have positive financial implications
in the long run.
Microsoft finally allowed keeping 10 1909 on Lenovo
Ryzem 7 4700U 8+0 cores aftere destroying it with Windows 11 install.
First hp stresam 13 Celeron N3050 1/2/2.16 GHz 2/32 GB previously stuck
at 10 1511 for ~5y photographed 6/21/25 running 10 1909. :(
Above laptop at right charging.
Left stream 13 ran 10 20H2 but now runs Ubuntu.
hp steamsapparently have battery over-charge protection. Charge leds extinguish when over charge detected.
Amazon Web Swevices Boardman OR
AWS
AWS Employee housing?
Hood River OR,
Cannob Beach OR.
Microsft notfied 6/22/25 that the snipping tool was moving. Unable to save some pics with old snipping tool.
Microsofts Free Upgrade Deadline For 400 Million Windows Users.
Ready to ditch Windows? 'End of 10' makes converting
your PC to Linux easier than ever.IBM laid off 8,000 employees to replace them with AI____
what they didnt expect was having to rehire as many due to AI.
Prediction: This Artificial Intelligence (AI) Data Center Stock
Will Be Worth More Than Palantir by 2030.
The $50 Billion Company That Does Almost Nothing.
Try 5.
Saturday June 21, 2025 16:10
____Massive subsidies, minimal jobs: The math behind
America's data center boom.
From Killer Drones to Robotaxis, Sci-Fi Dreams Are Coming to Life.
____Tesla Robo-Taxis, With Human Safety Monitors,____
to Launch in 2 Days.
whata oses does tesla robotaxis use?
AI Overview.
Tesla utilizes Linux as the operating system for its robotaxi service,
which leverages its proprietary Full Self-Driving (FSD) software.
Tesla designs and manufactures its own custom hardware and software systems, including the onboard computers for its vehicles, utilizing a
custom operating system that is based on Linux.
Key aspects of Tesla's robotaxi software:
FSD Software:
Custom Software:
Linux Base: Tesla's central console and instrument cluster use Linux,
based on Ubuntu.
Embedded Systems:
Neural Networks:
Dojo Supercomputer:
are ubuntu dependencies certified?
AI Overview.
When discussing "certification" in the context of Ubuntu and its dependencies,
it's important to differentiate between hardware certification and software
certification.
Hardware Certification: Canonical (the company behind Ubuntu) certifies
hardware devices to ensure they are compatible with Ubuntu. This
certification process involves extensive testing to verify that the
hardware works reliably with the operating system.
The focus is on ensuring compatibility between the hardware and the
Ubuntu operating system, including drivers and overall system functionality.
Certified hardware receives continuous testing to ensure updates don't
negatively impact performance or reliability.
Benefits of certified hardware include reduced costs, faster time-to-market,
and increased peace of mind regarding compatibility and support.
Software Dependencies and Certification:
Standard Ubuntu packages and their dependencies are built from open-source
code on a trusted infrastructure. While they aren't individually "certified" in the same way as hardware, their origin and build process ensure they can be audited and are
designed to function in a particular way.
Ubuntu Pro offers FIPS 140-2 and 140-3 certified modules for cryptographic packages. These modules are tested and attested by a NIST accredited laboratory, ensuring
they meet rigorous security standards for sensitive environments like those in government and regulated industries.
Ubuntu's Extended Security Maintenance (ESM) provides security fixes for critical vulnerabilities in open-source software dependencies. These fixes are created by Canonical's security team and distributed through the same trusted build process
as regular Ubuntu packages, helping to mitigate software supply chain risks.
In summary:While hardware certification ensures a device's compatibility and reliable performance with Ubuntu, software dependencies in Ubuntu are not typically "certified" in theTherefore, while you might not find "certified" labels on individual dependencies
same manner as hardware.
However, Ubuntu's approach to software dependencies emphasizes security and reliability through trusted build processes, FIPS certified modules (available with
Ubuntu Pro), and ESM for security fixes.
in the traditional sense, Ubuntu provides mechanisms to ensure the security
and reliability of the software you run, particularly for critical components
and in regulated environments.Windows 11 vs. Ubuntu Linux Performance On The___
AMD Ryzen AI Max PRO 390 "Strix Halo.
Linux Delivering Driver Fix For 30 Year Old Creative SoundBlaster
AWE32 ISA Sound Card.The Computer-Science Bubble Is Bursting.
Try 1,
Friday June 20, 2025 17:20
____Bento Is An All-In-One Computer Designed To Be Useful.____
The rise of RISC-V: Is it a real threat to ARM and x86?.
Fission Simulator Melts Down RP2040.Tesla releases details about Robotaxi launch:___
theres a safety monitor in front seat.
Everything we know about Teslas robotaxi launch in Austin.
what is a secure safety-critical app?
AI Overview.
A safety-critical application is a software program whose failure could
lead to death, injury, or significant damage. These applications
are designed to operate with extremely high reliability and undergo
rigorous testing and validation to minimize the risk of failure.
Here's a more detailed breakdown:
Key Characteristics of Safety-Critical Applications:
High Reliability:
Rigorous Testing and Validation:
Safety Standards Compliance:
Fail-Safe Design:
Secure Development Practices:
Examples of Safety-Critical Applications:
Avionics Systems:
Automotive Systems:
Medical Devices:
Nuclear Power Plants:
Industrial Automation:
The Importance of Security:
In addition to functional safety, security is also a critical aspect of
safety-critical applications. A security breach could potentially
compromise the safety functionality of the system, leading to
serious consequences. For example, a hacker could exploit a
vulnerability in a medical device to cause harm.
In essence, safety-critical applications are those where failures can
have severe consequences, and therefore, they require a
high degree of reliability, rigorous testing, and adherence to
safety standards, as well as robust security measures to
ensure safe and dependable operation.
r is running an OS concurrently with a secure safety-critical app a good idea?
AI Overview.
In general, running a secure safety-critical application concurrently with a
general-purpose operating system (OS) on the same system is
not recommended due to significant risks.
Here's why:
Security Vulnerabilities:
Loss of Determinism:
Reduced Safety Assurance:
Complexity:
Alternative approaches for safety-critical systems:
Proprietary, Single-Purpose OSes:
Virtualization/Hypervisors:
In summary: While you can run multiple OSes on a single system using
technologies like hypervisors, directly running a safety-critical application
concurrently with a general-purpose OS is generally discouraged due to
security and reliability concerns. The emphasis in safety-critical systems
is on robust safety features, real-time performance, and a highly controlled
environment, which are often not well-suited for general-purpose OSes.Latest Bcachefs Code Draws Torvalds' Ire Over Late Feature Code.____
The $20 "Cheap Yellow Display" is the best addition to my smart home in months.The United States wondered how China managed to make such progress____
in the field of electronic chips. Huawei and Xiaomi are the answer,
with massive development.
Is China's RISC-V Pivot Undermining Arm's Growth Prospects?. Microsoft just revealed a way to keep using Windows 10 until 2032.
Microsoft is removing legacy drivers from Windows Update.
Windows 11 migration heats up... on desktops.
Small businesses are using AI, but not spending much.
Microsoft to lay off thousands in July,
but don't worry, AI's getting $80 billion.Broadband Outage Reports: CenturyLink, Quantum Fiber, Brightspeed
Among Networks Down.
16 Billion Apple, Facebook, Google And Other Passwords Leaked
Act Now.
184 million passwords for Google, Microsoft, Facebook,
and more leaked in massive data breach.
___White House moves to keep costly, dirty, unneeded Michigan coal plants open.Try 1.
Thursday June 19, 2025 13:09
___AI Overview.
Directly writing machine language hex codes and compiling
them with GCC in a standard way is generally not how you
use a compiler like GCC. GCC is designed to compile
higher-level languages like C, C++, and Assembly language
into machine code.
Here's why and what you can do instead:
____Post fromLenovo N6000 128/256 Windows 11 aptop.
Revo uninstaller used to remove Onedrive, Edge, and other Microsoft products.
wifi internet donwload very fast. 1.2 gs!
____AI Overview.____
Whether software obfuscation and endless updates are "threatening
the future of computing" is a complex question with no simple answer.
Here's a breakdown of the key points to consider:
1. Software Obfuscation and Security:
2. The Need for Updates:
3. Potential Drawbacks of "Endless Updates":
4. Are We "Trapped in a Perpetual Cycle of Updates"?
In Conclusion:
Software obfuscation, by itself, is not inherently a threat to computing.
However, its use by malicious actors and its impact on the "software
understanding gap" are important considerations. Regular software
updates are necessary for security and functionality, but their
frequency and scale can be challenging for both developers and users.
The "endless updates" trend, a product of the dynamic nature of
software development, may raise concerns about development
efficiency, user experience, and the overall complexity of
software systems.
he impact of obfuscation and updates is a subject of ongoing
research and discussion in the cybersecurity community.
Godot 4.5 Beta Released With Better Wayland Support.
are there better choices than c++ for safety-critical apps?
AI Overview.
Yes, there are programming languages that are considered better
choices than C++ for developing safety-critical applications, primarily
due to their emphasis on safety and reliability features built into the
language design.
Here are some of the key languages and why they are often
favoredover C++ in safety-critical contexts:
Ada:
SPARK:
Rust:
Why C++ Can Be Problematic (Despite its Popularity): While
widely used, C and C++ were not originally designed with
safety as a core goal. Their flexibility can make it easier to
introduce bugs, and they can exhibit undefined behavior.
In Summary: Languages like Ada and SPARK are specifically
designed for safety-critical applications with built-in features
and verification capabilities. Rust is also a strong alternative
with its memory safety features. The best choice depends
on project needs and team expertise.
is c++ losing favor because of obfuscation costs and
deppendenacy certification issues.
AI Overview.
While concerns about memory safety and the challenges of ensuring
security in C++ code are well-documented, the idea that C++ is l
osing favor specifically due to obfuscation costs or dependency
certification issues is not clearly supported by the provided
search results.
Here's a breakdown of the information found:
Obfuscation in C++:
In summary, while C++ presents certain complexities and security
challenges, including memory safety concerns, there's no strong
evidence to suggest that it's losing favor due to obfuscation
costs or dependency certification issues. The language
continues to be widely used and remains relevant in
various industries.
AI Overview.
The TIOBE index is a measure of the popularity of programming l
anguages, published monthly by the company TIOBE. It's based
on the number of search engine results for queries containing
a specific language, and is used to gauge the relative usage
and demand for different programming languages in the
software development industry.
Here's a more detailed explanation:New Linux Flaws Enable Full Root Access via PAM and Udisks____
Across Major Distributions.
How you can get Microsoft 365 (formerly Office) for free
- 3 easy ways.600MW data center campus proposed in Montana.____Meta's Scale AI deal has clients like Google halting projects,
contractors scrambling, and one investor bailing out.
One of ChatGPT's popular uses just got
skewered by Stanford researchers.____ First Solar Scales U.S. Manufacturing to Meet Rising Demand.Try 1.
Plan to remove 34 turbines from Highland wind farm.
The Wrong Way to Build a Nuclear Renaissance.
Wednesday June 18, 2025 19:44
____ZPUI Could Be Your Tiny Embedded GUI.____Charted: Future Electricity Usage by Country.
____$3.50 nanoCH57x CH570/CH572 RISC-V development board
offers USB-C port, 2.4GHz radio/BLE, and GPIO.
____Nvidia Goes Nuclear, Investing in Bill Gates Start-Up.
I always disable this one feature in every UEFI / BIOS.
____AI Overview.
To load and run a GCC C application on a Windows 11 laptop without having to use Windows 11,
you can either install MinGW (a Windows-based GCC distribution) or use a virtual machine with
a Linux distribution that includes GCC. Alternatively, you can use WSL (Windows Subsystem for
Linux) to run Linux alongside Windows.
Here's a more detailed explanation:
1. MinGW (Minimalist GNU for Windows):
2. Virtual Machine:
3. WSL (Windows Subsystem for Linux):
4. Other Options:
Zig Compiler:
MSYS2:
AI Factories Are Hungry for Power. Expect Gigawatt-Scale Growth.
how does u-boot work?
AI Overview.
U-Boot, short for Universal Boot Loader, is a versatile open-source bootloader primarily used
in embedded systems. It acts as the bridge between the hardware and the operating system, i
nitializing the system and loading the OS into memory. U-Boot performs hardware initialization,
loads the kernel and other necessary components like the device tree, and then transfers
control to the operating system.
Here's a more detailed breakdown:
1. Hardware Initialization:
2. Loading the Operating System:
3. Transferring Control to the Kernel:
4. Command-Line Interface (CLI):
5. Script Support:
In essence, U-Boot acts as a smart intermediary, taking the raw hardware and preparing it for
the operating system. Its flexibility and features make it a crucial component in the boot process
of many embedded systems.
This video provides a tutorial on the embedded bootloader U-boot:
____are "hardware compatibility " issues driving sofware writers'____
to support as many sofware versios as their are hardware versions?
AI Overview.
Yes, hardware compatibility issues can significantly impact software developers'
efforts to support different software versions, but it's not a direct one-to-one
relationship where every hardware version demands a separate software
version.
Here's why: [!!!] [Nvidia, Intel, AMD expense issue?]
Indian RISC-V Startup Slashes Design Time to Minutes.
NVIDIA to launch GeForce RTX 5090DD for Chinese market
with GB202-240 GPU and 24GB memory.
Microsoft study finds "infinite workday" is hurting productivity.
Visualized: How Many New Businesses Survive 10 Years?.
why is it important to have more than one windows 10 or 11 laptop?
AI Overview.
Having multiple Windows 10 or 11 laptops can be beneficial for various reasons,
including having a backup device, testing new features, or using different operating
systems for specific tasks. Dual-booting, which allows you to have both
Windows 10 and 11 on the same machine, offers similar advantages without needing
a second physical laptop.
Here's a more detailed look at the benefits:
Testing and Experimentation:AI Overview.
No, Windows 2000 was not the first operating system to use
ring 0 software, nor was it the first to expose it to a mass audience.
Here's a breakdown:
Ring 0 is a concept in operating system architecture. It represents the
highest level of system resource access, where the operating
system kernel functions.
Operating systems have utilized privileged access, similar to ring 0,
for many years, predating Windows 2000. The division between
privileged (kernel) and unprivileged (user) modes is a fundamental
aspect of modern operating systems.
The Windows 9x series (including Windows 95, 98, and Me), which
came before Windows 2000, also used ring 0 code, although their
architecture was a hybrid 16/32-bit system.
Windows 2000, based on the NT codebase, also used ring 0
for its kernel and core components, offering unrestricted access
to hardware and system resources.
The NT-based Windows operating systems (including Windows 2000
and later versions like Windows XP) are known for their kernel mode
drivers (Ring 0) and the security risks associated with them.
Thus, while Windows 2000 improved the Windows NT architecture
and security features, it did not introduce the concept of ring 0
software to the masses.
AI Overview.
No, when a user-mode application (running in ring 3) in
Windows 2000 attempts to execute a protected instruction
requiring a higher privilege level (like ring 0), Windows
2000 does not simply close the app window without an
error message. Instead, it will typically trigger a privilege
violation exception.
Here's why:
AI Overview.
No, the statement is not revision specific. It's a fundamental
aspect of operating system architecture, specifically how
Windows 2000 handles exceptions and privileged instructions,
regardless of its specific version or service pack.
Here's why:
AI Overview.
Can a User Fix a Windows 2000 Ring 0 Writer's Software Bug?
Generally, a regular user is unable to directly fix a Windows 2000
Ring 0 writer's software bug. Ring 0, also known as the kernel mode,
is the most privileged protection ring in the operating system.
It holds the core of the OS and interacts directly with the hardware.
Here's why users can't directly fix these bugs:
Privilege Level: Ring 0 code has full system privileges and direct access
to hardware. This is necessary for the OS to function properly, but also
makes it highly sensitive to modifications.
However, a user can take these steps to address Ring 0 issues:
Apply Windows Updates: Microsoft released service packs and security
updates for Windows 2000 that addressed many bugs, including those
affecting the kernel. Make sure your Windows 2000 installation is fully updated.
Are windows uppdates buggy?
AI Overview.
Yes, Windows updates can sometimes be buggy. While updates are
crucial for security and performance, Microsoft has faced criticism
for releasing updates that introduce new issues or break existing
functionality. These bugs can range from minor annoyances to major
problems like system crashes or boot failures.
Here's a more detailed look:
Hardware Compatibility:
Windows supports a vast range of hardware, making it challenging to ensure compatibility with every update.
AI Overview.
Yes, you can attempt to repair missing interrupt errors in Windows 2000,
as they are often related to driver or hardware conflicts that can be
addressed through troubleshooting.
Here's a breakdown of how to approach this problem in Windows 2000,
drawing on information from
the search results:____ Try 5.
Key Points:
Led by China's Growth, Offshore Wind Capacity Will Hit 100 GW by 2026.
Children born now may live in a world where the US
can only produce half as much of its key food crops.
Tuesday June 17, 2025 16:48
____are backdoors planted at ring 0?
AI Overview.
Yes, backdoors can be planted at Ring 0, also known as the kernel mode, which is the
most privileged level of an operating system.
Here's why and how it happens:
In summary, backdoors can be planted at Ring 0, and because of the high level of privilege at this
level, such backdoors are particularly dangerous as they can bypass security mechanisms,
maintain persistence, and gain complete control over the system.
is the linux kernel the same as ring 0 software?
AI Overview.
No, the Linux kernel is not exactly the same as ring 0 software, but they are very closely related.
The Linux kernel primarily runs in ring 0 (the most privileged execution mode on x86 processors).
However, "ring 0 software" can refer to any code running in that privileged mode, not just the
kernel. While the kernel uses ring 0, other software, like certain drivers, can also run in ring 0.
Here's a more detailed explanation:
Pro-Israel hackers claim cyberattack on Iranian bank.
do hack attacks frequencly involve ring 0 software?
AI Overview.
Yes, hack attacks frequently involve or attempt to gain access to Ring 0 software,
particularly the operating system kernel and its associated components like drivers.
Why hackers target Ring 0:
In summary, due to the immense power and control it offers, Ring 0 is a prime target
for attackers seeking to compromise systems and evade security measures. The sophistication
of these attacks continues to evolve, making kernel-level security a critical focus for both
security professionals and the development of new operating system features.
____ESP32-C61-DevKitC-1 development board features ESP32-C61____
low-cost WiFi 6 and Bluetooth LE 5.0 SoC.Windows 11s emergency June update causes even more bugs and chaos.____is there 3 a shared memory way to pass data from ring 0 to 3 in addition to 1 DeviceIoControl 2 Cloud way in Windows 10 ad 11?____
AI Overview.
Yes, in addition to DeviceIoControl and "cloud-based" methods, there are
other ways to pass data from Ring 0 (kernel mode) to Ring 3 (user
mode) in Windows 10 and 11, specifically through shared memory.
Here's how shared memory is used for this purpose:
are the intel n6000 and ryzen 7 7730 low power 8 bit platforms
as well as 16, 32, and 64 bit platforms?
AI Overview.
Both the Intel N6000 and the AMD Ryzen 7 7730U are designed as low-power processors.
Intel N6000: It has a default TDP (Thermal Design Power) of 6W,
making it suitable for passively cooled devices like tablets, laptops, and mini-PCs.
AMD Ryzen 7 7730U: It has a TDP of 15W, indicating it consumes relatively
little energy.
Regarding bit platforms:
Both processors primarily operate on 64-bit architectures. This is the standard
for modern processors designed for general-purpose computing. While they
support operations on smaller data sizes (like 8-bit, 16-bit, and 32-bit),
they are optimized for and function within a 64-bit environment.
In summary:
Low power: Yes, both processors are designed for low power consumption.
8-bit platform: No, neither is an 8-bit platform. They are primarily 64-bit processors, supporting smaller data sizes for compatibility and certain operations.
16, 32, and 64-bit platforms: Yes, they support operations on 16, 32, and 64-bit data as part of their 64-bit architecture.
do the intel n6000 and ryzen 7 7730 both support 8 bit add with carry i
nstructions and other 8 instructions?
AI Overview.
Yes, both the Intel N6000 and the AMD Ryzen 7 7730U, being x86 architecture processors, support 8-bit ADD with carry (ADC) instructions, along with a
wide range of other 8-bit operations.
Explanation:
ADC Instruction: The ADC instruction (Add with Carry) specifically performs an
addition operation and includes the value of the carry flag (CF) in the result.
This is crucial for multi-byte arithmetic operations, allowing for the correct
handling of overflows.
In summary:
Intel N6000: As an x86 processor, it supports 8-bit instructions, including ADC.
AMD Ryzen 7 7730U: Also based on the x86 architecture (specifically Zen 3),
it includes support for 8-bit operations and instructions like ADC.
Therefore, you can expect both processors to handle 8-bit addition with carry,
as well as various other 8-bit instructions, as they are fundamental components
of the x86 instruction set architecture.
can a 64 bit multiply using add with carry written for a 8 bit platform also run on a Intel n6000 and AMD Ryzen 7 7730?
AI Overview.
Yes, a 64-bit multiply operation implemented using an "add with carry" routine
(designed for an 8-bit platform) can technically run on Intel N6000 and
AMD Ryzen 7 7730 processors, which are 64-bit processors.
Here's why:
In summary:
While the 8-bit add with carry method can be executed on these processors
because the underlying instructions are present, it's not the most efficient or
practical way to perform 64-bit multiplication on such powerful machines.
Modern 64-bit processors offer much better native support for 64-bit arithmetic operations.
Dive deeper in AI mode.
Allwinner H618.
Multithread Rating 653
Single Thread Rating 395
Clockspeed: 1.4 GHz
Cores: 4 Threads: 4
Oranage Pi zero 2W H618 hosstig Ubutu Chinaruns MUL53 accurately while consumerig ~<1 W ... and fast!
H618 uses an ARM Curtex A53 processor. :)
____Linux 6.17 Looks Like It Could Go Ahead And Make
SMP Support Unconditional.7 DOS games that have incredible modern remasters.____Intel will lay off 15% to 20% of its factory workers,____
memo says.Vandals cut fiber-optic lines, causing outage for Spectrum
Internet subscribers.
AT&T outage: Millions across US lose service as network goes dark.
Anubis Ransomware Encrypts and Wipes Files, Making
Recovery Impossible Even After Payment.
TP-Link Router Flaw CVE-2023-33538 Under Active Exploit,
CISA Issues Immediate Alert.
____States, ratepayer advocates urge FERC to reject MISO petitionTry 1.
to limit market monitor oversight.
Nuclear-Related Stocks Surge.
This Stock Has Soared 195% Since Sam Altman Left.
Monday June 16, 2025 16:06
____Luckfox Lyra Zero W is a small Rockchip RK3506B SBC with MIPI DSI connector,____
WiFi 6 and Bluetooth 5.2.
Tesla confirms massive hardware change for autonomy improvement.
Mapped: The Biggest Tech Talent Hubs in the World.
Uniwill Laptop Driver Proposed For Linux To Enable Additional Features.
is there a fig forth for the 1802
AI Overview.
Mystery 1802 Computer Was A Homebrew Project | Hackaday Yes, there
is a FIG-Forth implementation specifically for the RCA 1802 microprocessor.
The FIG-Forth Manual provides detailed documentation on its design, implementation,
and how it works with the 1802. This manual includes information on how to test
and replicate the FIG-Forth implementation on hardware, like the Lattice board,
which includes the necessary hardware. Furthermore, a document from the
Forth Interest Group details a specific version of FIG-Forth for the 1802,
including its assembly, start-up constants, disk buffer sizes, and UART configuration.
is there a fig forth for the 6502/
AI Overview.
Yes, there is a fig-Forth implementation specifically for the 6502 processor.
The Forth Interest Group (FIG) released a version of their fig-Forth system
for the 6502, including assembly source code. This implementation was
designed to be relatively easy to port to different 6502-based systems,
with the main differences being in the input/output routines.
Here's a more detailed breakdown:
is there a fig forth for the 8051 family?
AI Overview.
Yes, there is a FIG-Forth implementation for the 8051 microcontroller family. William H. Payne's book provides a complete "kit" for building an 8051 Forth system, including a metacompiler for the IBM PC. This FIG-Forth version is designed to map well onto the 8051's architecture.
Here's a more detailed explanation:
Is there a FIG forth for various 8080 platforms?
AI Overview.
Yes, there was a FIG-Forth implementation for the Intel 8080 processor. The Forth Interest Group (FIG)
released a version of FIG-Forth specifically for the 8080, which was later integrated with the CP/M
operating system. This implementation allowed users to run Forth on various 8080-based systems,
including those using CP/M.
Here's a more detailed breakdown:
Barry Werger Barry Werger ·
Why were the 16 bit computers so much more powerful than the 8 bit computers?
Having been computing in this era, Ill give a slightly different answer. Most 8-bit processors were very
limited in ways beyond the bus/register sizes. And specifically, they were very limited in ADDRESSING MODES.
they could not support many basic operating system features such as re-entrant code because of this.
The Motorola 6809 was considered one of the peak 8-bit processors, to the point that it was sometimes
referred to as an 8/16 bit processor. This manifested in obvious ways, such as a multiply and divide
instructions that grouped two 8-bit registers together to provide 16 bit operands (for division) or
results (for multiplication). But more importantly, it supported (uniquely in the 8-bit world, or at least rarely)
complex addressing modes that involved 16-bit pointer arithmetic. Specifically, this allowed reentrant
code that enabled pretty much all the advanced OS features of the time OS-9, a popular OS for the 6809,
was basically Unix running on an 8-(ish)-bit processor. This made, for example, the cheap and
childishly-marketed TRS-80 Color Computer a real sleeper powerhouse in many non-mainstream
applications. OS-9 and other 6809 OSes were the standard for many real-time applications, and i
n many cases this remains the situation today, all because of the OS features enabled by the complex
addressing modes. so, in addition to the size of the busses and registers, what sets the 16-bit generation
of processors apart from the 8-bit generation is that pretty much all of them included the more advanced
addressing modes that enabled modern OS features, vastly enhancing capabilities to the point that they
could soon compete with minicomputers, and became the primary locus of software development and
deployment.
5.8K views View 41 upvotes View 1 share.
Update Windows Now Microsoft Confirms System Takeover Danger.Intel Nova Lake.
Intel Core Ultra 9 185H.
Multithread Rating 29425
Single Thread Rating 3699
Typical TDP: 45 W
TDP Down: 35 W :)?
AMD EPYC 9124.
Typical TDP: 200 W. :(--
____iis commerical jet flight control software a safety-critical app?___
AI Overview.
Yes, commercial jet flight control software is absolutely a safety-critical application.
Its failure could lead to catastrophic consequences, including loss of life, significant
property damage, or environmental harm.
Elaboration:
does Linux Alpine have protected-mode instructions?
AI Overview. T
he protected mode in the x86 architecture LeftAsExercise Yes, Alpine Linux
utilizes protected mode on architectures that support it (like x86-64). It's
a fundamental part of how modern operating systems, including Linux
distributions, manage memory and access control. Alpine Linux, being a
general-purpose operating system, leverages protected mode to
isolate processes, manage memory allocation, and implement security features.
Here's a more detailed explanation:
does Linux Kali have protected-mode instructions?
AI Overview.
Yes, Kali Linux, being a standard Linux distribution, utilizes protected mode
in its operation. Protected mode is the standard operational mode for
modern x86-compatible CPUs, including those used by Kali Linux, and
is crucial for its functionality.
Here's why:
does ubuntu core have protected-mode instructions?
AI Overview.
Yes, Ubuntu Core utilizes protected mode for its kernel and applications.
It leverages the security features provided by protected mode, such as
memory protection and privilege levels, to ensure a secure and stable
environment for embedded systems and IoT devices.
Here's a breakdown:
is there a second method other than deviceiocontrol for transmitting
data from protected ring o to app ring 3?
AI Overview.
Yes, there is another method for Ring devices to transmit data to the Ring app
beyond DeviceIoControl. Ring devices primarily communicate with the Ring
app through cloud-based services. This means that when a Rin
g doorbell button is pressed, or motion is detected, the device sends this
information to Ring's servers. The app then retrieves this data from the cloud, r
ather than directly from the device.
Here's a more detailed breakdown:
is there a differnec in code between copy/paste and drag and drop
in windows 10 and 11?
AI Overview.
While the user experience of "copy/paste" and "drag and drop" in Windows 10 and 11
is similar, there are some subtle differences in the underlying mechanisms and how
they handle file operations, especially regarding the default behavior for moving
vs. copying.
User Experience:
are ring 0 windows device drivers written in c++?
AI Overview.
While modern Windows device drivers can be written in C++, they are often written
in C due to historical reasons and the need for strict resource management and
portability. C++ was officially supported for most drivers starting with Windows 8,
but even then, a subset of C++ functionality is generally used, according to OSR
Online.
Here's a more detailed explanation:The Latest X.Org Server Activity Are A Lot Of Code Reverts.____AI race between US and China resembles Cold War Marc Andreessen.____We're done" - major government organization
slams Microsoft Teams as it drops Windows for good.
Try 1.
Sunday June 15, 2025 08:43
____does DeviceIoControl still exist in windows 10 and 11?___
AI Overview.
Yes, the DeviceIoControl function, used for direct device input and output
control in Windows, still exists in Windows 10 and 11. It provides a general-purpose
interface for applications to interact with device drivers through control codes.
DeviceIoControl is a fundamental part of the Windows API and is used in a wide
range of applications that need to communicate directly with hardware or devices.
It allows for sending specific commands and receiving data from device drivers,
enabling low-level control and interaction with hardware components.
Key points about DeviceIoControl:
do linux distros support protected mode instructions?
AI Overview.
Yes, all modern Linux distributions support and rely on protected mode.
Protected mode is the standard operating mode for the x86 architecture
used by virtually all modern operating systems, including Linux distributions.
Explanation:
is there an 386+ OS that allows execution of all x86 instructions?
AI Overview.
Yes, operating systems like Windows 95, Windows 98, and modern Linux
distributions (with a 32-bit kernel) can execute all x86 instructions, including
those introduced with the Intel 386 processor and later. These operating s
ystems leverage the 32-bit protected mode capabilities of the 386 and subsequent
processors to run a wide range of applications, including those designed for
earlier 16-bit processors like the 8086 and 80286.
Here's why:The Tech Job Meltdown (professoraxelrod.com).
____Stop These Things Weekly Round Up: 15 June 2025.Try 3.
Saturday June 14, 2025 07:22
____do sata memories use DMA in windows?___
AI Overview.
Direct Memory Access (DMA): Working, Principles, and ... Yes, SATA (Serial ATA) memory
(storage devices like SSDs and HDDs) in Windows always uses Direct Memory Access (DMA). This means that data transfer between the SATA device and your computer's memory happens
directly, without needing constant intervention from the CPU.
Here's why:
SATA inherently uses DMA:
Intel preparing budget Core 5 120F 6-core CPU featuring only P-cores.
Intel Core 5 120U.
Multithread Rating 17120
Single Thread Rating 3758
Typical TDP: 15 W
TDP Down: 12 W
Cassette Data Storage From The 1970s.Ranked: The 50 Richest Countries by GDP Per Capita in 2025.
Try 2.
Friday June 13, 2025 19:42
____The cloud broke Thursday and it'll happen again
- how to protect your business before then.
Bcachefs Is Now Able To Auto-Fix A Few More Fsck Errors.
3 reasons I'll never trust an SSD for long-term data storage.
____AI Overview.____
Using DMA for data transfer can significantly increase speed compared
to not using DMA, especially in applications with high data transfer rates
or where the CPU needs to be free for other tasks. DMA eliminates
CPU involvement in data transfers, allowing the CPU to perform other
operations while the DMA controller handles the transfer, leading
to faster data processing and potentially a more responsive system.
Here's a breakdown of the speed improvements: CPU-Free Data Transfer:
how to ensure that windows is using dma transfersi?
AI Overview.
To ensure Windows is using Direct Memory Access (DMA) for data transfers,
you need to verify that DMA is enabled for the relevant hardware devices.
This is typically done through Device Manager. You'll need to navigate
to the specific device (e.g., IDE ATA/ATAPI controllers) and its properties,
then check the "Advanced Settings" or similar tab to enable DMA.
Here's a more detailed breakdown:
AI Overview.
To enable DMA (Direct Memory Access) in your system, you can typically do so
through your computer's BIOS or by using a software utility like Device Manager.
In Device Manager, navigate to the specific device for which you want to enable
DMA and change the "Current Transfer Mode" to "DMA if Available".
Here's a more detailed breakdown:Ryzen 5 5500X3D stealthily unveiled as AMD's newest Zen 3___
desktop offering.
AMD Ryzen 5 5600X3D.
Typical TDP: 105 W.
Multithread Rating 21879
Single Thread Rating 3187
AMD Ryzen 7 7730U.
Typical TDP: 15 W
Google Cloud outages: Spotify, Discord, Snapchat
and more were down for hours.9999999
Cloudflare Blames Google Cloud For Mass Services Outages.
Is Meta really spending $15 billion to hire a 28-year-old?.____ China Leaves West in the Dust: Its Small Nuclear Reactor Leap____
Puts Beijing Years Ahead in the Future of Clean Energy.
China solar industry to address overcapacity challenge but turnaround far off,
experts say.Worker dies in wind turbine after climbing device accident.Try 1.
Amazon joins the big nuclear party, buying 1.92 GW for AWS.
Wednsday June 11, 2025 17:22
___Quantum Tiny Linux SBC features an Allwinner H3 SoC, WiFi,
a small Display, and more. CPU Quad-core Cortex-A7 @ 1GHz. :)
____Talen to sell Amazon 1.9 GW from Susquehanna nuclear plant.____
Fine-tuning LLMs is a waste of time (codinginterviewsmadesimple.substack.com).
mean: does windows 11 run slower on new inexpensive computers?
Yes, Windows 11 may run slower on new, inexpensive computers, especially those with limited RAM or storage. Windows 11 has higher system requirements than previous versions and can be resource-intensive. This means that if a computer doesn't meet these requirements, it may struggle to run Windows 11 smoothly.
Here's why:
Here's a more detailed explanation: Higher System Requirements:how is tdp computed?___
AI Overview.
CPU TDP (Thermal Design Power) Explained In computer hardware,
Thermal Design Power (TDP) is a measure of the maximum amount
of heat a component, like a CPU or GPU, can dissipate under normal
operating conditions. It's usually expressed in watts and indicates the
component's cooling requirements and power consumption. TDP is
not the same as actual power consumption, but rather the maximum
heat the component needs to be cooled away.
Here's a more detailed explanation:
AI Overview.
Yes, a Lenovo laptop running Windows 10 or Windows 11 can pause updates for
up to 35 days, regardless of whether Microsoft requires an update at the time of pausing.
After that period, the system will resume automatically installing updates.
Explanation:Ubuntu Server Weighing Tmux vs. Screen, Wget vs. Cur.
____Bipolar Uranium Extraction From Seawater With Ultra-Low Cell Voltage.Try 2.
Tuesday June 10, 2025 18:59
____Google Offers Buyouts to Employees in Search and Ads, Other Units
____has microsoft recently limited pause updates for only one day?
AI Overview.
No, Microsoft has not recently limited pause updates for only one day.
The ability to pause updates for up to 35 days still exists in Windows
10 and 11. You can pause updates in Windows Update settings for
up to 35 days, but after that, you'll need to install the latest updates
before you can pause them again.
AI Overview.
New operating systems often don't work well on older hardware
because newer OS versions require newer hardware features and
capabilities, and older hardware lacks the necessary components.
Additionally, newer OS versions may not include drivers for older
hardware, or the new OS may not be compatible with the
specific hardware configuration.
Here's a more detailed explanation:.
AMD Preps Linux Support For User CPUID Faulting.
In conclusion, while the specific names "8051" and "Forth" might not be used, the Soviet Union definitely
utilized similar technologies and programming concepts in their weapons systems. They probably developed
their own microcontroller designs and stack-based programming languages for embedded control purposes.
____The GeeFarce 5027 POS is a PC disguised as a graphics card.____IBM just took a 'significant' step toward useful quantum computing.____
Meta launching AI superintelligence lab with nine-figure pay push,
reports say.
The Ongoing BcacheFS Filesystem Stability Controversy.Samsung Galaxy S25 series camera ring issue sparks concerns.
____Dead and gone: Trump's most hated offshore wind farm pulls the plug.Try 2.
EconomyRanked: Top Countries by Annual Electricity Production (19852024).
Monday June 9, 2025 16:19
____
AI Overview.
Yes, in general, adding more cores to a CPU significantly improves multitasking performance
but has a more limited impact on single-task performance. While a multi-core CPU can still
perform single-core tasks, the primary benefit of more cores is the ability to handle multiple
tasks concurrently.
Elaboration:.
Intel Celeron N4020 @ 1.10GHz
Multithread Rating 1545
Single Thread Rating 1137
Typical TDP: 6 W
Intel Pentium Silver N6000 @ 1.10GHz
Multithread Rating 3000
Single Thread Rating 1393
Typical TDP: 6 W
Both ~$119=130 Asus and Lenovo. Best Buy and Walmart.
____AI Overview.
The highest reported clock speed for a RISC-V processor is 5 GHz. This was achieved by
Micro Magic, who demonstrated a 64-bit RISC-V core operating at 5 GHz with a CoreMark
score of 13,000 while consuming only 1 Watt of power. Additionally, the same core has
been demonstrated to operate at 3 GHz with 8,000 CoreMarks, while consuming less than 70mW,
according to EETimes.
AI Overview.
The ESP32-C3 RISC-V core can operate at a maximum clock speed of 160 MHz.
The ESP32-P4, a high-performance SoC, features a dual-core RISC-V CPU that can run
up to 400 MHz, according to Espressif. The ESP32-C5, another RISC-V MCU, can also
reach a clock speed of 240 MHz.
AMD EPYC 4345P 8-Core CPU Performance.
AMD EPYC 4345P:
Multithread Rating 37671
Single Thread Rating 4672
Typical TDP: 65 W
Rtzen 7 7730:
Multithread Rating 18127
Single Thread Rating 3014
Typical TDP: 15 W
AMD Ryzen 7 5800HS:
Multithread Rating 19736
Single Thread Rating 2994
Typical TDP: 35 W
____Solar Bankruptcies Show US Clean Energy Industry Is Teetering on the Brink.____
The USB-C dream is dead and its too late to revive it.
Amazon to spend $20 billion on data centers in Pennsylvania,
including one next to a nuclear power plant.9 Open Source Operating Systems That Aren't Linux.___
LoongArch Enables Multi-Core Scheduler Support In Linux 6.16.Nearly 25% of Americans are now functionally unemployed____
heres what that harsh reality really means.Microsoft quietly burying a massive Windows 7 hardware
driver feature as Windows 11 kills it.
\1
1 Lenovo Ryaen 7 4700U 8+0 core running Windows 10 1909 +20H2>? AND hOTmETAL for years
recently quit running Hotmetal and suffered other software damages.
2 Microsoft offered to Installl Winodws 11.
3 Offer accepted.
4 4700U performed so badly that it was ~unusable.
5 Windows 111 1909 reinstalled along with Hotmtal>
6 4700U now runs Hotmetal and runs faster than when ~22H2 instALLED.
7 uUpdate paused untilJune 1, 2025.
8
Google Chrome displayed a message at the botton that MIcrosoft Edge should be used.
9 Is Microsoft on its way to bankruptcy?
10 Microsoft message receuved us how bad Windows 11 us runnning on legacy hardware.
Intel
Celeron11
11 Message delivered is how good Windows 10 1909 works on legacy hardware
... including hp stream 13 9N3050 2/32 GB laptop. :)
AI Overview.
No, Microsoft will not continue to push Windows updates or security fixes on computers after
October 14, 2025, when Windows 10 support ends, even if updates are paused. The updates
will cease, and Microsoft will no longer provide technical assistance or security patches. However,
the computer will continue to function, according to Microsoft Support.
Explanation:
____West Virginia coal mine had 30 years of production left. It will close..Try 1.
Sunday June 8, 2025 10:17
____what is uobtainium?____
AI Overview.
Unobtanium is a term used to describe a material that is desirable for a particular
application but is incredibly difficult or impossible to obtain, often due to its rarity, cost,
or the fact that it's fictional. The term is often used humorously or in a hand-waving
manner when describing materials with highly desirable, yet unattainable, properties.
Elaboration:
what technologies allow Nvidia, Intel and AMD to bring new hardware
AI Overview.
Nvidia, Intel, and AMD utilize a combination of cutting-edge technologies and efficient
product development processes to accelerate their hardware product releases.
Key Technologies:
Modular Reference Architectures:
Leveraging platforms like NVIDIA's MGX allows system
builders to use reference designs and CPU host processor modules to reduce
development costs and slash development time. This reduces the need to build
every component from scratch for each product.
Rapid Prototyping and Iterative Design:
Employing rapid prototyping techniques, potentially involving 3D printing and additive
manufacturing, speeds up the process of concept creation, testing, and refinement.
This allows for the creation of multiple prototype variations quickly, facilitating quicker
realization of product concepts and speeding up design validation.
Advanced Semiconductor Packaging:
Technologies like 2.5D and 3D packaging allow multiple chips to be integrated into a single package,
sincreasing performance and power efficiency while reducing cost and complexity. This is essential
for high-performance computing (HPC) and AI applications, which require more sophisticated and capable microelectronic devices.
High-NA EUV Lithography: I
ntel's use of high-NA EUV in its 14A process, for example, allows for the creation of smaller
and more precise features, which increases transistor density and improves energy efficiency.
This technology is critical for pushing the boundaries of what's possible in chip design.
Specialized Accelerators:
Companies like Intel employ dedicated accelerators like Intel Quick Assist Technology (QAT),
Intel Dynamic Load Balancer (DLB), Intel In-Memory Analytics Accelerator (IAA), and Intel
Data Streaming Accelerator (DSA) to handle specific tasks and workloads efficiently.
Development Processes:
Streamlined Collaboration with Partners:
The companies leverage their global network of partners to speed up product development
and deployment. For example, NVIDIA's collaboration with cloud service providers like AWS,
Google Cloud, and Microsoft Azure enables developers to access and utilize NVIDIA GPUs
within those platforms.
Data-Driven Product Development:
This likely involves utilizing data analytics and insights to inform product design and
development decisions.
By combining these advanced technologies and efficient development practices, Nvidia,
Intel, and AMD can bring innovative hardware products to market more quickly than would
otherwise be possible.ChatGPT Patched A BIOS Binary, And It Worked.
____Stop These Things Weekly Round Up: 8 June 2025.Try 1.
Saturday June 7 2025 07:37 ____ which Linux distros are single taks OSs?____
AI Overview.
It seems there might be a misunderstanding in the wording of your question. "Single taks OS"
doesn't appear to be a recognized term in the context of Linux distributions. Linux distributions
are operating systems, and they are all "taks" in that they perform a variety of tasks, including
handling user interface, managing files, networking, and running applications. However, some Linux
distributions focus on specific tasks or use cases, and could be considered "more single-task" than
others in a broad sense.
For example:
Alpine Linux: .
This is a very lightweight distribution designed for resource-constrained environments and is
often used for server-side applications or embedded systems. While it does more than just
handle one task, it's optimized for efficiency and minimal resource usage.
Kali Linux: .
Known for its focus on penetration testing, ethical hacking, and cybersecurity,
Kali Linux is a single-task OS in the sense that its primary use case is to provide the tools
and environment for that specific purpose.
Ubuntu Core: .
s
A specialized version of Ubuntu designed for IoT (Internet of Things) devices,
it is focused on running applications on these embedded systems. It is important to note that
even "single-task" distributions can still be used for a variety of purposes.
U.S. Manufacturing by State: Who Gains Most from Made in America?.Top researchers leave Intel to build startup with the biggest, baddest CPU.AMD's Kernel Compute Driver "AMDKFD" Can Now Be Enabled On RISC-V.
AMD Radeon RX 9060 XT 8GB Review: Not Good,
Tesla AI VP Milan Kovac Resigns After 9 Years Leading FSD and Optimus Projects.
The Bellmac-32 CPU What?.
Americas Largest Defense Contractors. [certified softwar used?]
Over 7 million Americans are unemployed the most since 2017. Why it wont get better anytime soon.
____Indias Coal & Gas Decline Signals Accelerating Renewable Energy Transition.Try 1.
The NRC is conducting a special inspection at the Quad Cities nuclear plant. Here's why:.
Friday June 6, 2025 18:27
____Microsoft fights USB-C chaos on Windows 11 laptops with new label.____
Over 4 billion user records leaked in "largest breach ever"
- here's what you need to know.Intel Celeron N4020 dual-core mini PC
sells for $45 with 4GB RAM, 128GB eMMC flash.
~6 W?
AI Overview.
USB 3.2 Gen 2 Type-C Male to Type-A Male Cable USB 3.2 Type-C supports
several data transfer speeds: USB 3.2 Gen 1 (5 Gbps), Gen 2 (10 Gbps),
and Gen 2x2 (20 Gbps). The Gen 2x2 speed is achieved by using two
10 Gbps lanes, effectively doubling the bandwidth.
AI Overview.
Wi-Fi 5, also known as 802.11ac, offers a maximum theoretical speed of 3.5 Gbps.
In real-world scenarios, users are likely to experience speeds closer to 866 Mbps or
1733 Mbps, depending on their device and the router's capabilities. These speeds are
faster than Wi-Fi 4 (802.11n), which has a maximum theoretical speed of 600 Mbps.
AI Overview.
AMD Announces Radeon RX 9060 XT Graphics Card, Claims ... The AMD Radeon RX 9060 XT
typically consumes between 150W and 182W of power. It can reach boost clock
speeds of up to 3.1 GHz and is equipped with 32 RDNA 4 compute units, 32 RT
accelerators, and 64 AI accelerators. AMD recommends a 450W power supply for
systems using this GPU.
Next-gen E2 SSDs pack 1 petabyte of storage,
enough for 11,000 4K movies in a ruler-sized drive.
Intel vs AMD? Microsoft seemingly has a clear recommendation
for Windows 11 Pro PC upgrade
____Linux 6.16 NFS Client Exposes LOCALIO State Via sysfs.____Tesla seeks to block city of Austin from releasing records on robotaxi trial.
____Houston-based solar energy company Sunnova Energy announces mass layoffs.Try 2.
s
Thursday June 5, 2025 17:03
____Does PJM have a data center problem?.____
Proposed Alaska bitcoin mine would use as much power
as the states largest coal plant produces.
Data Centers Are Building Their Own Gas Power Plants in Texas.
FreeBSD Developers Deciding What To Do For WiFi With FreeBSD 15: Stable Or Unstable.
Corporate layoffs have ramped up in recent weeks. Here are the companies making cuts.how many gcc c x86 compiler issues are awaitig a fix?
AI Overview.
It's difficult to provide a precise number of outstanding GCC C x86 compiler issues
without accessing the bug tracking system directly. The number is constantly changing
as new issues are reported and old ones are fixed. However, here's what
can be said:
GCC is actively maintained:
The GNU Compiler Collection (GCC) uses a bug tracking system where issues are reported
and tracked. No exact number: While the bug tracking system exists, the exact number
of outstanding issues, especially for a specific combination like "C x86 compiler issues,"
might not be readily available in a public dashboard. Active development: New
versions of GCC are released +regularly, incorporating bug fixes and improvements.
Bug tracking:
The GNU Compiler Collection (GCC) uses a bug tracking system where issues are
reported and tracked.
No exact number:
While the bug tracking system exists, the exact number of outstanding issues, especially for a specific combination like "C x86 compiler issues," might not be readily available in a public dashboard.
Active development:
New versions of GCC are released regularly, incorporating bug fixes and improvements.
____A full Atari 8-bit computer has been____
recreated on a stamp-sized FPGA module.
Piko, Your ESP32 Powered Fitness Buddy.
Machine Code Isn't Scary (jimmyhmiller.com).
This compact Ryzen 7 mini PC with 32GB RAM is only $299 today.
which is better value a mini pc or a laptopo?
AI Overview.
Generally, a mini PC offers better value for money than a laptop, especially when
considering price-to-performance ratio. Mini PCs can provide comparable performance
to laptops at a lower cost, requiring only a monitor, keyboard, and mouse to be complete.
However, the decision depends on your needs, as laptops offer portability and
all-in-one convenience.
Rust-Based Redox OS Begins Implements X11
Support, GTK3 Port.
who is funding rust compier development and support?
AI Overview.
The Rust Foundation is the primary entity funding Rust compiler development
and support. It is a non-profit corporation with operational and funding responsibility
for the project's infrastructure. The Rust Foundation is supported by a wide range
of corporate sponsors, including companies like Microsoft, Google, Amazon, Meta,
and Huawei. In addition to these corporate sponsors, the Rust Foundation also receives
funding from the Community Grants Program, which supports individual and
organizational projects.
On February 8, 2021, the formation of the Rust Foundation was announced by five
founding companies: Amazon Web Services, Google, Huawei, Microsoft, and Mozilla.
The foundation, led by Shane Miller for its first two years, offered $20,000 grants
and other support for programmers working on major Rust features.
Ubuntu Developers Discuss The Difficult Issue Of Splitting Up Firmware Packages.
Is ChatGPT Plus still worth $20 when the free version packs so many premium features?.Trump's huge bill includes immediate gift
for layoff-ridden Bay Area tech.
____Chinas Coal Power Plant Approvals Rebound.Try 1.
NSA considers then disavows leadership reshuffle.
Wesnesday June 4, 2025 16:23
____proseifhgts appears to have been hit with malware attck.
With 51 reported deaths, how safe are Tesla's robotaxis?.
___Google search's AI overviews are awful, but here's a
browser extension that gets rid of them.
___Microsoft accused of tech extortion over Windows 10 support ending
in campaign to get people to upgrade to Linux.
what are the advantanges of using a laptopo as a desktop? AI Overview. Using a laptop as a primary desktop computer offers several advantages, primarily related to portability and efficiency. Laptops can be easily moved from one location to another, and they often take up less space than a traditional desktop. Additionally, laptops can be used for work or entertainment in locations without a dedicated desk. Here's a more detailed look at the advantages: ___ 10 nuclear stocks expected to rise as much as 94% after Meta-Constellation deal. Constellation Energy Stock Jumped on Meta Deal. Why It Didnt Last. AMD Radeon RX 9060 XT 16 GB review (XFX Swift). AI Overview. The RTX 5060 typically has a TDP (Thermal Design Power) of 145W. The RTX 5060 Ti, on the other hand, has a TDP of 180W. These cards use a single 8-pin power connector.
____
One UI 7.0 becomes shortest-lived One UI version.
Try 3.
Monday June 2, 2025 19:23
____Open-Source TPDE Can Compile Code 10-20x Faster Than LLVM.
How Stack Overflow's moderation system led to its own downfall.
____is software for a full self driving vehicle considered a safety-critical app?____
AI Overview.
Yes, software for a full self-driving vehicle is considered a safety-critical application.
The software directly controls the vehicle's movement and actions, making any
errors or malfunctions potentially dangerous to the vehicle occupants, other drivers,
and pedestrians.
Here's why:
Direct Control:
Potential for Harm:
Importance of Safety:
Evolving Standards:
Human-Machine Interaction:
Specific Standards and Certifications:
AI responses may include mistakes.
is software for a ffighter jet considered a safety-critical app?
AI Overview.
Yes, software for a fighter jet is definitely considered a safety-critical application. Fighter jet
software controls critical flight functions, and any software errors can have devastating consequences,
including loss of life. This necessitates rigorous development processes, testing, and certification
standards to ensure safety and reliability.
Here's why:
Critical Flight Functions:
High Stakes:
harm. Certification Standards:
Real-time Requirements:
Security Considerations:
AI responses may include mistakes.
do seemiconductors manufacturers bguild or just test to mil specs?
AI Overview.
Semiconductor manufacturers both build and test semiconductors to meet Mil-Specs (military specifications).
The process involves rigorous testing to ensure components meet specific reliability and performance standards,
and may involve the use of military test standards like MIL-STD-883 and MIL-STD-750.
Building:
Testing:
if haardware is changed on a safety-critical ceretifiied app, then is recertificatioin required?
AI Overview.
Yes, changing hardware in a safety-critical certified application typically requires recertification. The reason i
s that hardware changes can impact the safety features of the application, and a new certification is needed
to ensure the application still meets safety requirements after the hardware modifications.
Here's why:
recertification is often necessary:
does software certification of mil spec system require certification testing over full temperature range?
AI Overview.
Yes, software certification for a Mil-Spec (Military Specification) system typically requires testing over
the full temperature range specified in the MIL-STD-810 standard. This is because the software's functionality
and performance must be validated to ensure it can operate reliably under the environmental conditions
a Mil-Spec product is designed to endure.
Elaboration:Microsoft warns new Windows 11/10 installation ISO downloads____
must have this Defender update.
Windows 11 gets emergency KB5062170 patch to fix errors when installing recent updates.
NFS Server Supporting Larger I/O Block Size With Linux 6.16.Goodbye to 8,000 jobs IBM replaces workers with artificial intelligence,____
sparking a wave of global reactions.Moab UT.
Colmbia river looking east toward Hood River OR.
Motel room view, Hood River.
Astoria OR Trolley pulling electric generator.
____How much energy does AI really use? The answer is surprising - and a little complicated.Try 1.
Sunday June 1, 2025 18:56
____Googles latest AI Overview blunder is more proof AI still needs a reality check.
how many lines of code in which languages does apache server contain?
AI Overview.
The Apache HTTP Server has a codebase that contains approximately 1,650,453 lines of code,
primarily written in C. It also supports various server-side programming languages like Perl,
Python, Tcl, and PHP through compiled modules.
Here's a more detailed breakdown:
____Bill Gates publicly admits his biggest mistake,
a blunder that could have led to Microsofts bankruptcy.
OpenAI can stop pretending (theatlantic.com).
Nvidia: The Jensen Magic May Be Fading (Rating Downgrade).
Apparent Git Scripting Issue Raised Concerns Of Possible Malicious Linux Kernel Activity.
____The white-collar bloodbath is all part of the AI hype machine (cnn.com).
___Stop These Things Weekly Round Up: 1 June 2025.Try 1.
3 Stocks to Buy to Ride the Nuclear Power Renaissance.
____did taliban officials assert that us had no evidence that Osama bin Laden
was responsible for the 911 attacks?
AI Overview.
Yes, Taliban officials have asserted that the US had no evidence that Osama bin Laden
was responsible for the 9/11 attacks.
Specifically:
was the qaana massacre the reason for the 911 attacks?
AI Overview.
The Qana massacre was not the reason for the 9/11 attacks, but it was cited by Al-Qaeda
as a motivation for their actions and policies towards the United States.
Here's a more detailed explanation:
did author of A Pretext for War conclude that the qaana massacre the reason for the 911 attacks?
AI Overview.
No, the author of "A Pretext for War," James Bamford, does not claim that the Qaana massacre
was the reason for the 9/11 attacks. Bamford's book focuses on the Bush administration's alleged
misuse of intelligence and its response to the 9/11 attacks, arguing that it led to the invasion of Iraq.
The book criticizes the handling of intelligence, the justifications for the Iraq War, and the administration's
perceived failure to acknowledge the role of the Palestinian issue in fueling anti-American sentiment.
Bamford's book does not discuss the Qaana massacre in any way, focusing instead on the events
leading up to and following the 9/11 attacks and the subsequent political decisions made by the
Bush administration.
did khalid sheik mohammed mastermind the 911 attacks? Search instead for did ka=halid sheik
mohammed mastermind the 911 attacks?
An AI Overview is not available for this search.
Mohammed, the accused mastermind of the 9/11 terror attacks on the US, had been due
to plead guilty this week - more than 23 years after almost 3,000 people were killed in
what the US government has described as "the most egregious criminal act on American
soil in modern history".
why is khalid sheik mohammed being held by the us government?
AI Overview.
Khalid Sheikh Mohammed is being held at Guantanamo Bay by the US government
due to his alleged role in the 9/11 terrorist attacks. He is charged with conspiracy to
commit terrorism, attacking civilians and civilian objects, and other related offenses.
He has been identified as the "principal architect" of the 9/11 attacks in
the 9/11 Commission Report.
++:
Saturday May 31, 2025 16:25
____Anyone making a living from a paid API?.
Amazon Programmers Say What Happened After Turn to AI Was Dark.
Linux's Trusted Security Manager Sees First Updates In Over A Year.
should uncertified software be placed in safety-critical apps?
AI Overview.
No, uncertified software should not be used in safety-critical applications.
Safety-critical systems, like those in medical devices, aircraft, or nuclear power plants, require
the highest levels of reliability and dependability because a failure could lead to loss of life,
serious injury, or significant damage. Uncertified software lacks the rigorous testing, validation,
and verification processes that ensure it meets the stringent safety requirements of these applications.
Here's why:
Lack of Validation and Verification:
Potential for Errors and Failures:
Regulatory and Compliance Issues:
In essence, safety-critical systems require software that has been thoroughly vetted and
proven to be reliable and safe. Uncertified software does not meet these rigorous standards
and should not be used in these critical applications.
is "Yes, a single-task operating system can indeed load and run an Apache web server on an
ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking
operating system, and Apache can be run as a single process within it.? an ai hallucination?
AI Overview.
No, that statement is not an AI hallucination, but rather a bit misleading in the context of
RPiOS (Raspberry Pi OS). While RPiOS can run Apache, it's not a single-task operating system,
and it's not necessarily limited to running Apache as a single process.s
Here's a breakdown:
In essence, the statement is technically true in the abstract, but it oversimplifies the nature of
RPiOS and the typical use of Apache within it. RPiOS is designed for multitasking and running
multiple processes concurrently, including Apache as a web server process.
____Is "U.S. President Ronald Reagan informed the world on national television that the United States
was reading Libyan communications." true?
In conclusion, President Reagan did inform the public via a televised address about evidence
slinking Libya to terrorist activities, which stemmed from intercepted communications.
AI Overview.
Yes, the statement is generally true. In 1986, President Ronald Reagan publicly addressed the
nation regarding U.S. airstrikes against Libya and revealed the existence of evidence that the
U.S. had intercepted communications linking Libya to terrorist acts.
Here's why this statement is considered true:
____Forner IEEE software and Xoouter editor-in-chief.
____5 RISC-V SBCs that are worth using instead of a Raspberry Pi.
Try 2.
Friday May 30, 2025 17:09
____
AI Overview..
The term "hallucinate" can refer to two distinct concepts, depending on the context:
1. Human Hallucination:
2. AI Hallucination:
Radeon Software For Linux Dropping AMD's Proprietary OpenGL/Vulkan Drivers.
____Atum A3 Nano development board combines Agilex 3 FPGA
and USB-Blaster III programmer (Crowdfunding).
____how many dependencies does apache server have on___
the RPoiOS implementation?
AI Overview.
The Apache HTTP Server itself doesn't have a specific number of dependencies
strictly tied to the "rpiOS implementation". Here's why, and a breakdown of
what dependencies it does have:
Understanding the Layers
Apache's Core Dependencies.
Apache's dependencies are primarily related to:
Operating System Libraries:
It depends on libraries provided by the operating system (rpiOS in your case), such as:
Standard C Library (libc): Essential for basic functions.
Networking Libraries: For handling
network communication. Security Libraries: For SSL/TLS support, if enabled.
...
AI responses may include mistakes.
"AI Overview.
Yes, a single-task operating system can indeed load and run an Apache web server on an ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking operating system, and Apache can be run as a single process within it. " :) ?
Stack Overflows Plan to Survive the Age of AI.
for Can software maintenance costs at nvidia, intel and amd for high power consumption,
expensive, new hardware chips lead to bankruptcies?
AI Overview.
While high software maintenance costs, expensive hardware, and power consumption
issues could strain a company's finances, it's unlikely to be the sole cause of bankruptcy
for Nvidia, Intel, or AMD. These companies are large, global players with diverse r
evenue streams and extensive financial resources.
resources. Here's a more detailed breakdown:
Ask HN: What is the best LLM for consumer grade hardware?.
AI didnt kill Stack Overflow.Welcome to the age of cyber insecurity in business.____IcePI Zero: A Pi Zero For FPGA.
Forced E-Waste PCs And The Case Of Windows 11s Trusted Platform.
____Oklo vs. NuScale: Which Nuclear Startup Stock is the Better Player Now?.Try 2.
Nuclear Waste: An Integrated Disposal Plan Could Help DOE Complete Its
Cleanup Mission and Save Billions.
Thursday May 29, 2025 19:22
____Bring Back The BIOS! (To UEFI Systems, That Is).
AI Overview.
Mark Zuckerberg, while a Harvard dropout himself, has expressed concerns about
whether traditional college education is effectively preparing students for the
jobs of the future, especially in the tech industry. He believes that some universities
may not be keeping pace with the rapid changes in the labor market and the
growing demand for specific technical skills.
Here's a more detailed breakdown of his viewpoint:
____NuScale's bigger reactor design approved by Nuclear Regulatory Commission.
Trump's 'Consequential' Shift In Energy Policy Fuels Upgrades For These Nuclear Stocks.
Linux 6.16 Networking Brings Some Big Performance Improvements & OpenVPN Driver.
when will tax vernova reactor come online?
AI Overview.
The GE Vernova BWRX-300 reactor, planned to be built at the TVA's
Clinch River site in Oak Ridge, Tennessee, is expected to come online in l
ate 2032. This timeline is based on the multi-year federal permitting process
that TVA is currently working through. According to Seeking Alpha, the
application kicks off this process, with the reactor potentially providing power for
300,000 homes by that time according to Seeking Alpha.
____A Love Letter To Embedded Systems By V. Hunter Adams.____did NSA sponser a program to try to destory FIG Forth to try to
deny its use by NSA percievied enemies?
AI Overview.
Based on my current knowledge and search results, there's no evidence to suggest
that the NSA sponsored a program to destroy FIG Forth or deny its use by perceived enemies.
It's important to note that:
FIG Forth was a popular version of the Forth programming language, known for its
simplicity and efficiency. It was particularly favored in the 1970s and 1980s, finding use
in embedded systems and various applications.
The NSA (National Security Agency) is a US intelligence agency focused on signals intelligence
and information security. Their activities are often classified.
Lack of Evidence: There's no publicly available information or historical record that indicates
any NSA involvement in trying to undermine or destroy FIG Forth.
Conspiracy Theories: The i
dea of such a program might be a conspiracy theory due to the secrecy surrounding
NSA activities and the niche nature of FIG Forth.
Conclusion:
While the possibility of such a program cannot be completely ruled out, there's no
supporting evidence to suggest it existed. It's more likely that this is a
misunderstanding
or a unsubstantiated claim.
It's always recommended to rely on verified information and credible sources
when exploring such claims.
AI responses may include mistakes.
did nsa insert code in to crypro ag cyphering machines so that
nsa could read iranian messages?
AI Overview.
Yes, reports indicate that the NSA, in collaboration with the CIA and German intelligence,
inserted vulnerabilities into Crypto AG's encryption machines so that they could read
encrypted messages from numerous countries, including Iran. This was done through a j
oint operation called "Thesaurus" and later "Rubicon". The NSA, along with other
intelligence agencies, rigged Crypto AG's devices, including instruction manuals,
to make it easier to decrypt messages.
Oops, something went wrong.
how is the us know that Libya was responsible for the La Belle disco bombing?
AI Overview.
The US determined Libya was responsible for the La Belle disco bombing based on i
ntercepted communications and other intelligence gathered before and after
the attack. Specifically, U.S. intelligence sources had identified a high probability of a
terrorist act in Berlin and intercepted messages between Tripoli and the Libyan
Embassy in East Berlin that included orders for the operation and a report of
its successful outcome.
Here's a more detailed breakdown:
La Belle Discotheque Bombing.
____Windows 11 KB5058405 fails installs with 0xc0000098
as it breaks system CPU power driver.____ Why Cameco, Oklo, and NuScale Power Stocks All Popped Today.Try 5.
Wednesday May 28, 2025 07:23
____what language was wang basic written in?___
AI Overview.
Wang BASIC, a version of the BASIC programming language developed by Wang Laboratories
, was primarily written in Dartmouth BASIC. While it followed the original Dartmouth BASIC
syntax, it was implemented as an interpreter rather than a compile-and-go system.
Additionally, Wang BASIC was designed to be stored in ROM on the Wang 2200 machine,
which had implications for its implementation and performance.
In simpler terms: Wang BASIC was essentially a slightly modified version of the
standard BASIC language that was first created at Dartmouth College. It was
designed to run on Wang computers, and it followed the basic syntax of
the original Dartmouth BASIC.
was ibm pc a bad business decisio for ibm?
AI Overview.
The IBM PC was not a bad business decision for IBM, despite later struggles in the PC market.
While IBM's PC division eventually became a commodity business and was sold off, the initial
decision to enter the PC market with the IBM PC was a success that significantly i
mpacted
the industry.
Here's why:
what editor is best for ubuntu gcc c preogramming?
AI Overview.
For C programming with GCC on Ubuntu, Qt Creator and Visual Studio Code are
highly recommended. Qt Creator is a robust IDE with integrated debugging and GUI
layout tools. Visual Studio Code is a lightweight, versatile editor with extensive features
and a strong community, especially when used with the C/C++ extension.
are upgrades sometimes used to destroy a software product?
AI Overview.
Yes, software upgrades can sometimes unintentionally damage a product. While upgrades
are often intended to improve functionality, fix bugs, or enhance security, they can also
introduce new issues, compatibility problems, or even make a software product unusable.
Here's why upgrades can lead to damage:EXT4 For Linux 6.16 Brings A Change Yielding "Really Stupendous Performance".
Linux 6.16 Upstreams Support For Hardware-Wrapped Encryption Keys.
Linux 6.16 Merges A Fix For The Macintosh II.
What features you get with Google AI Pro and AI Ultra.
Is Google AI Mode better than regular Google Search? I tested both, and there's a clear winner.
Try 2.
Tuesday May 27, 2025 17:39
____does the gcc c inline assembler allow imserting hex codes in its insructions?
AI Overview.
Yes, the GCC C inline assembler allows inserting hexadecimal codes within assembly instructions.
Hexadecimal values can be directly used as immediate operands, and they can also be used
as addresses or within data definitions.
Using Hexadecimal Numbers in Inline Assembly:
____do all distros of linus run the gcc c compiler?
AI Overview.
No, not every Linux distribution includes the gcc C compiler by default. While many
distributions include GCC, it's not a universally guaranteed part of the core system.
Some distributions might have it installed as a default part of a development environment,
while others might require explicit installation via their package manager.
Elaboration:
is Broken Web The Coming Collapse of the Internet valid concern?
AI Overview.
Yes, "The Broken Web" is a valid concern, and the book by George Ure, "Broken Web:
The Coming Collapse of the Internet", explores this idea. While a complete collapse
of the internet is unlikely due to its decentralized nature and redundancy,
several factors contribute to the notion of a "broken web," including infrastructure
vulnerabilities, rising costs, and increased cybersecurity threats.
Here's a breakdown of the valid concerns:
While the internet is designed to be robust and resilient, the vulnerabilities outlined above
do raise valid concerns about its future and the potential for significant disruptions or
even a gradual decline in its functionality.
____does windows 10 1909 work on the nearlists windows 10 hardware
as well as on the lastest widows 11 laredwre?
AI Overview.
Yes, Windows 10 version 1909 can be installed on hardware that is compatible with the l
atest Windows 11. However, it is important to note that Windows 10 version 1909 has
reached its end-of-life and is no longer receiving security updates, according to
Microsoft. This means that continued use of this version exposes the device to
potential security vulnerabilities.
should a linux be installed before installing windows 10 1909 after a malware attack?
AI Overview.
No, installing Linux before reinstalling Windows 10 1909 after a malware attack
is not necessary and may even be counterproductive. A fresh install of Windows 10 1909
will effectively wipe out all existing files and software, including the malware, and restore
your system to a clean state.
Here's why:
do any data centers have idustrial tours for the public?
AI Overview.
While data centers generally don't offer open public tours due to security concerns,
some facilities do offer tours to prospective customers or interested parties.
These tours are often used for marketing and to showcase the facility's features.
did wang labs computers have an operating system like msdoes
purchased from seattle computer?
AI Overview.
No, Wang Laboratories computers did not typically use an operating system
like MS-DOS that was purchased from Seattle Computer Products. MS-DOS was
primarily associated with IBM PCs and compatibles. While Wang Laboratories did
create their own operating systems for their specific hardware, they were not
directly related to the operating system developed by SCP that Microsoft later purchased.
did wang labs software devwlopers have to use direct sector reads/writes?
AI Overview.
Yes, Wang Computer Systems WCS/15 technical documentation specifically mentions
that programmers could access diskette sectors directly using "Absolute Sector Addressing".
This allowed for creating a diskette operating system if desired, or for performing low-level
data manipulation with specific control information. Essentially, they could read and write
data on a per-sector basis.
was forth software technology used to develop wang basic?
AI Overview.
No, FORTH software technology was not used to develop Wang BASIC.
Here's why:
Wang BASIC's roots: Wang BASIC was primarily based on the original Dartmouth BASIC,
which was developed in the 1960s. It followed the Dartmouth BASIC syntax closely and
was implemented as an interpreter.
FORTH's distinct approach: FORTH, on the other hand,
is a very different type of programming language, known for its stack-based architecture and
extensibility. It's often considered a low-level, real-time oriented language, and was designed
for direct interaction with hardware.
Different purposes: Wang BASIC was aimed at providing
a user-friendly programming environment for general-purpose computing on Wang computers,
particularly in business and office settings. FORTH was developed for embedded systems,
real-time control, and other applications where close interaction with hardware is crucial.
In short: While both languages have their own unique history and applications, there's
no evidence suggesting that FORTH played a role in the development of Wang BASIC.
was wang labs reliance of basic a contributing facyot in its demise?
AI Overview.
While not solely responsible, Wang Laboratories' heavy reliance on proprietary hardware and software,
including its early focus on BASIC, was a significant contributing factor to its downfall. The company's
decision to concentrate on hardware and word processors, particularly in the face of rising PC competition,
ultimately proved to be a strategic misstep.
can a single task OS load an run apache server on a ARM platrorm like RPiOS does?
AI Overview.
Yes, a single-task operating system can indeed load and run an Apache web server on an ARM platform like RPiOS (Raspberry Pi OS). RPiOS is based on Linux, which is a multitasking operating system, and Apache can be run as a single process within it.
Here's why and how:
Single-Task OS vs. Multitasking OS: While the term "single-task OS" might sound restrictive, the context here is important. RPiOS (and most modern Linux distributions) are multitasking, meaning they can manage multiple processes concurrently. However, you can configure Apache to run as a single process, essentially dedicating
all available resources to that task.
Running Apache on RPiOS:
Installation: You can easily install Apache on RPiOS using package managers like apt.
Configuration: Apache can be configured to listen on specific ports and handle different types of web content.
Performance: While a single-task configuration could potentially limit performance under heavy load,
it can be suitable for low-traffic or resource-constrained applications.
Try 4.
Sunday May 25, 2025 15:34
___does the gcc c inline assembler restrict whicih register it will compile and use obfuscation?
AI Overview Learn.
Yes, inline assembly in GCC does restrict the registers it uses and doesn't obfuscate the code.
It provides a way to embed assembly instructions within C/C++ code, but the compiler still
controls register allocation and must be informed about which registers are modified by
the inline assembly.
AI Overview Learn more Better inline asm for C++23? : r/cpp Yes, inline assembly in GCC does restrict the registers it uses and doesn't obfuscate the code. It provides a way to embed assembly instructions within C/C++ code, but the compiler still controls register allocation and must be informed about which registers are modified by the inline assembly.
Study with experiments of the gcc c x86 inline assembler of whether this is an obfuscated syntax
assembler. : "r" (a) ...
Ubuntu copying from terminal text to an exitor requires experimentation. :(
Assembly is followed by disassembly.
%eaxmov assembler issue?
____5 myths about PC BIOS updates you need to forget about.____
Linux 6.16 Features Include A Lot From Intel, NVIDIA Blackwell,
AMDGPU User Mode Queues.
9 Linux Distros I've Used Over 9 YearsRanked.The Market Is Setting Up For A Move (Technical Analysis).
Tesla having problems over Robotaxi ? NHTSA demands information on this key feature.
Try 2.
Saturday May 24, 2025 08:50
____
has there been an increases in microsoft malware attacks to damage old compters____
and prevent usedof legacy software?
AI Overview.
Yes, there has been a noted increase in Microsoft-targeted malware attacks, particularly
targeting legacy systems and software to cause damage or prevent use of older applications.
This is due to several factors, including the fact that many older systems are easier
to exploit because of outdated security measures and unpatched vulnerabilities,
and that they are often running legacy applications that are no longer supported
by their vendors.
Here's a more detailed breakdown:
is a university education required for successful hacking?
AI Overview.
While a university education in computer science, cybersecurity,
or a related field can be beneficial for a career in ethical hacking,
it's not strictly required for success. Many successful ethical hackers
have gained their skills through self-directed learning, certifications,
and hands-on experience.
Elaboration:
Is havung more th one windows 10 and 11 pcs with different
hardware congifurations a good idea?
AI Overview.
Yes, having multiple PCs with different hardware configurations and different
Windows versions (10 and 11) can be a good idea depending on your needs
and preferences. It allows for flexibility in how you use your computers,
like dedicated workstations for specific tasks or personal/professional use.
Here's a more detailed look at the pros and cons:
is a backup windows 10 laptop frequently needed to try to fix main laptop?
AI Overview.
Yes, frequently backing up your Windows 10 laptop is a good idea, especially when
troubleshooting or attempting to fix issues. A backup can help restore your system
to a known good state if repairs go wrong or if you need to revert to a previous
version of the operating system.
Here's why backing up is recommended:Mike Blumenkrantz Axes Old Mesa Code: Goodbye Gallium Nine.____Nvidia GeForce RTX 5060 Laptop Performance Preview -
Almost at the level of the RTX 5070 Laptop.
The chilling AI trend using reverse geolocation thats going viral.
Try 6.
Wednesday May 21, 2025 16:19
____Microsoft says 394,000 Windows computers infected by Lumma malware globally.
Coinbase says its data breach affects at least 69,000 customers.
____THE MOUSE LANGUAGE, RUNNING ON ARDUINO.____
WORKING ON OPEN-SOURCE HIGH-SPEED ETHERNET SWITCH.
Linux Scheduler Patches Aim To Address Performance Regression Since Last Year.
Fedora 43 Cleared To Ship With Wayland-Only GNOME.
Why Property Testing Finds Bugs Unit Testing Does Not (2021) (buttondown.com/hillelwayne).how did google ai get so good so fast?__
AI Overview.
Google's advancements in AI can be attributed to a combination of factors,
including pioneering research, vast data resources, powerful computing
infrastructure, and a strategic approach to AI development and deployment.
Alphabet Has A Good Chance Of Winning The AI Race.
Tech Workers Are Having an Even Harder Time Finding Work, Thanks to AI.
is software obfuscation taught at universities?
AI Overview.
Yes, software obfuscation techniques are indeed taught at universities,
particularly in cybersecurity, software engineering, and computer science
programs. Obfuscation is a key topic in understanding how to protect intellectual
property and prevent reverse engineering, making it relevant for professionals
in software development, security, and related fields.
Here's why and how it's taught:
Protection of Intellectual Property:
Security:
Understanding Reverse Engineering:
Software Engineering:
Cybersecurity:
how can gcc c be forced to compileAdd ith carry instead of Add?
AI Overview.
To explicitly control whether ADD or ADC (Add with Carry) instructions
are used in GCC C code, you can't directly force GCC to use ADC instead of ADD.
GCC, in general, optimizes C code and might choose the most efficient
instruction based on the target architecture and the specific context
of your code.
Is there an example of gcc c inline assembler code?
AI Overview.
Here's a simple example of inline assembly code in C using GCC:.
are software obfuscators going to find future employment more diffficult?
AI Overview .
It's difficult to definitively say whether software obfuscators will find future employment
more difficult, as the demand for obfuscation tools and services is complex and depends
on various factors, according to sources and the NDepend Blog. While obfuscation is still a
common practice for protecting intellectual property and securing applications, its
effectiveness is a topic of ongoing debate, according to the Communications of the ACM.
Here's a more detailed look at the factors involved:Red Hat Enterprise Linux 10.0 Formally Announced, Joined
By RISC-V Developer Preview.
____First US utility seeks permit for a small nuclear reactor.Try 1.
GE Vernova rises to all-time high as TVA applies to
build company's reactor.
Trump admin lifts hold on offshore wind farm, doesnt explain why.
Visualized: Global Carbon Emissions by Sector.
Chinas battery giant eyes world domination.
Tuesday May 20, 2025 15:55
____LibreOffice 25.8 Alpha 1 Released With Performance Optimizations.____
is the number of nonsingular binary matrices for given dimension known?
AI Overview.
Yes, it is known that the number of nonsingular binary matrices of a given dimension n
can be calculated using the General Linear Group GL(n, 2). The formula is derived
from the properties of finite fields and their invertible matrices.
why does the gcc c compiler sometimes stop compiling with no error message?
AI Overview.
GCC might stop compiling silently (without error messages) due to a few reasons,
often related to undefined behavior or linker issues. The linker might not detect type
mismatches or other problems, and the compiler might not issue warnings for every
instance of undefined behavior.
Reasons for Silent Compilation Failures:
Undefined Behavior:
Static Initialization Fiasco (C++):
...
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation.is disassembly study essential to discover___
what compiler writers are doing?
AI Overview.
Yes, studying disassembly is essential for discovering how compiler
writers approach code generation and optimization. By analyzing the
generated assembly code, one can gain insights into the compiler's
strategies and identify areas where it might be possible to improve
performance or achieve desired code behavior. This knowledge is
crucial for performance optimization, reverse engineering, and
understanding compiler behavior.
Here's why disassembly is important:
Understanding Compiler Choices:
Performance Optimization:
Reverse Engineering:
Compiler Verification:
IDA Pro and Ghidra:
what is IDA Pro?
AI Overview.
IDA Pro Introduction: SecPod Blog : IDA Pro (Interactive Disassembler Pro) is
a powerful, widely-used tool for reverse engineering and malware analysis.
It's essentially a disassembler that translates machine code into assembly
language, making it easier to understand how a program works at a low level.
IDA Pro also offers features like debugging and a decompiler, which can
translate assembly code into something resembling C source code,
further aiding in reverse engineering efforts.
what is Ghidra?
AI Overview.
Ghidra is a free and open-source software reverse engineering (SRE)
framework developed by the National Security Agency (NSA). It's a
suite of tools used to analyze compiled software, particularly
when the original source code is unavailable or inaccessible.
Ghidra allows users to disassemble, decompile, and analyze
code, providing insights into its functionality and structure.
does the x86 isa have too many rarely used instructions?
AI Overview.
Yes, the x86 ISA (instruction set architecture) does contain many instructions
that are rarely used in typical software applications. While the x86 ISA
offers a vast and complex set of instructions, not all of them are
frequently used, and some are even considered "fluff".
does a disassembler reveal dependencies?
AI Overview.
Yes, disassemblers can reveal some dependencies, but not all types.
Disassemblers primarily convert machine code into assembly language,
which can be used to identify imported functions and libraries. They can
also help in understanding how different sections of code relate to
each other. However, disassemblers don't inherently reveal all dependencies,
especially those that are not directly reflected in the assembly code.
Here's a more detailed breakdown:
should a software certification inspector certify accuracy of compiled code?
AI Overview.
A software certification inspector does not typically certify the accuracy of
compiled code directly. Their focus is on validating that the software meets
defined requirements and adheres to specific standards, including those
related to security, reliability, and performance. While they may review
the compiled code as part of their broader assessment, the primary goal
is not to verify the code's exact correctness at the compiled level.
Here's why and what they do instead:
Focus on requirements and standards:
Code review and validation:
Testing and validation:
Compliance:
Software Bill of Materials (SBOM) validation:US DOJ opens investigation into Coinbase's recent cyberattack.____
DDoSecrets publishes 410 GB of heap dumps,
hacked from TeleMessage (micahflee.com).Zero-click searches: Googles AI tools are____
the culmination of its hubris.Huawei launches first laptops using____
home-grown Harmony operating system.
Intel Adds OpenMP Multi-Threading To Its Speedy x86-simd-sort Library.
GitHub Launches Its Coding Agent.Alphabets Waymo wins approval to expa.nd____
driverless ride-hailing service to San Jose.TechnologyCharted: A Decade of Smartphone Production,
by Brand (2015-2024).
____Trump Loses Big Game Of Offshore Wind Chicken, Bigly.Try 1.
State of the solar industry as GOP eliminates homeowners tax credits.
Siemens Gamesa chief: 'still no orders' for relaunched 4.X wind turbine.
Monday May 19, 2025 19:12
____does a usb ssd drive wear out memory locations?
AI Overview.
Yes, USB SSD drives do experience memory location wear over time, though
they are typically much more durable than earlier flash memory technologies.
This wear is due to the nature of how flash memory, which is used in SSDs,
stores data. Each time a flash memory cell is written to or erased, it undergoes
a wear process. Over many program/erase cycles, the cells can degrade,
and this degradation can affect the drive's ability to retain data or its
performance.
___Microsoft employee disrupts Satya Nadellas keynote with Free Palestine protest.
Microsoft open sources a command-line text editor and more at Build.
The Windows Subsystem for Linux is now open source.
Tesla Robotaxi deemed a total failure by media
even though it hasnt been released.
____where can malware reside on a multitasking computer OS?____
AI Overview.
Malware on a multitasking operating system can reside in various locations,
including temporary folders, within other software, or even within the
OS kernel itself. It can also exploit vulnerabilities in legitimate software
or the OS to gain control over the computer's memory.
can malware computer penetration occur at the verilog silicon compiler level?
AI Overview.
While not a primary target, malware penetration can potentially occur at the
Verilog silicon compiler level, although it's a complex and less direct
attack vector compared to software vulnerabilities.
can uefi be elimiated with a direct boot into an app?
AI Overview.
No, UEFI cannot be completely eliminated by booting directly into an application.
UEFI is the firmware that manages the computer's boot process, and while it can be
configured to boot directly into a specific application, it is always involved in the
initial boot sequence. According to the National Security Agency, UEFI relies
on Secure Boot or vendor-specific boot protection solutions.
is uefi a ploy to force users into an OS?
AI Overview.
No, UEFI is not a ploy to force users into a specific OS. While Secure Boot, a UEFI
feature, can be used by manufacturers and operating system developers to
limit boot options, this is not inherent to UEFI itself. UEFI is a replacement for
the older BIOS system, offering various improvements like faster boot times,
better security features,
and support for larger drives.
how can a user boot directly into an app?
AI Overview.
To boot directly into an application, you need to replace the standard
Windows shell (typically Windows Explorer) with the application's
executable. This can be done by modifying the registry
key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
to point to the desired application. Alternatively, you can use a method
like shell:startup or schedule a task to launch the application upon login.
does a secure app need to be accountable of every bit in host computer?
AI Overview.
No, a secure app doesn't need to be accountable for every single bit on
the host computer. A secure app focuses on securing its own operations
and data, and while it might interact with the host computer's resources,
it's not typically responsible for the overall security of the entire system.
Instead, it relies on the host operating system and security mechanisms
to protect the host's resources.can eax and b\ebx be used without saving with the gcc c compiler?
AI Overview.
Yes, EAX, EBX, ECX, and EDX registers can be used without saving
their values with the GCC C compiler. These registers are considered "
caller-saved," meaning the function that calls another function is
responsible for preserving their values if they are needed after the call.
which registers in a gcc c subroutine do not have to be preserved?
AI Overview.
In a GCC C subroutine, registers designated as "caller-saved" or "caller-clobbered"
do not have to be preserved by the callee (the called function). These registers are
typically used for argument passing and temporary values and are considered safe
for modification by the called function without causing issues for the caller.
GCC knows which registers are used by the code it generates. It also requires
the user to inform it about register use in inline assembly through the clobbers
list, allowing the compiler to save those registers if necessary.
In the x86 architecture, the registers EAX, ECX, and EDX are typically
caller-saved, while other registers like EBX, EBP, and ESP are callee-saved.
____does a forth used for chaip interactive hardware debug__
just implement INTERPRET but not COMPILE?
AI Overview.
No, a Forth language implementation used for CHAI-P interactive
hardware debugging typically does implement both INTERPRET and
COMPILE, although it might prioritize interactive debugging and
experimentation by making the INTERPRET mode readily available and
potentially more optimized for this purpose.
Here's why:
interactive Debugging:
Forth's strength lies in its interactive nature, allowing for rapid
testing and experimentation. A Forth system used for hardware
debugging needs to allow the user to interact with the system,
define new "words" (functions), test them, and debug them on
the fly without needing to recompile the entire application.
This requires both INTERPRET to execute the commands
immediately and COMPILE to define new "words" for later use.
Compiler for Complex Applications:
While interactive debugging is a key feature, Forth can also
compile "words" into threaded code or even native code for
more complex applications or for testing more thoroughly.
Resource Constraints:
In some hardware debugging scenarios, resource constraints
(memory, processing power) may require a more efficient
COMPILE mode to generate faster-executing code.
Flexibility:
Forth's ability to compile and compile-to-machine-code
allows it to adapt to different hardware platforms
and applications.
is it best to use the gcc c compiler or some other language to
build a forth used for chip interactive hardware debug?
AI Overview.
For developing an interactive hardware debugging tool ("Fort" in this context),
using C with GCC (GNU Compiler Collection) is generally the best approach.
C's direct access to memory and low-level hardware control, coupled with
GCC's robust debugging support and widespread availability, makes it an
ideal choice for this task.
For interactive hardware debugging on chips, building a Forth implementation
using C or C++ compilers like GCC or Clang is generally considered the best
approach. While other languages could be used, C/C++ offers advantages
in portability, optimization, and integration with hardware debugging tools.
Alphabet Has A Good Chance Of Winning The AI Race.Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access.____StarPro64: Raspberry Pi alternative with powerful NPU and PCIe.____
Linux 6.15-rc7 Released With AMD Zen 6 CPU Identification,
New Intel & ARM Mitigations.
Debian 13 "Trixie" Now In Hard Freeze: MIPS64EL Demoted,
RISC-V 64-bit Promoted.
Ubuntu 25.04 Delivers Decisive Lead Over Fedora 42 For
Ampere Altra Performance.
"Rust is so good you can get paid $20k to make it as fast as C".NVIDIA Grows Quantum Computing Ecosystem With___
Taiwan Manufacturers and Supercomputing.
NVIDIA Powers Worlds Largest Quantum Research Supercomputer.
Nvidia Stock Falls. Whats Overshadowing Its AI Chip Moves.
Intel demos running Panther Lake systems, touts performance
and power efficiency improvements.
Intel Core i7-5600U @ 2.60GHz
Multithread Rating 3016 . :(
Typical TDP: 15 W
Intel's new CEO says the company has 55% of the data centre market.
Qualcomm to make data center processors that connect to Nvidia chips.Americas College Towns Go From Boom to Bust.
____Casting Shade On Shade-Tolerant Solar Panels.Try 1.
US nuclear sector intensifies lobbying in bid to prevent subsidy cuts.
Stop These Things Weekly Round Up: 18 May 2025.
Sunday May 18, 2025 17:46
____Massive recall for 27,000 cars over software issues
Check every model affected.
____Speed Up Arduino With Clever Coding.
Decades-old Windows systems are still running trains, printers, and hospitals.
____~$420 Asus Ryzen 5800HS Windows 11 running legacy ~1999 HotMetal Pro 6.0
Post from 5800Hs.
____OPEN SOURCE HIDING IN PLAIN SIGHT.____ Nobodys seen it: An elusive report could drive Empire Wind to collapse.Try 3.
EPIC Comes Out in Favor of Responsible Offshore Wind Development,
Joins States in Legal Effort to Overturn Trumps Offshore Wind Ban.
Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: '
Those guys are good'.
Saturday May 17, 2025 18:23
____was forth a good idea for sun microsystems?____
AI Overview.
No, the programming language Forth was not a good idea for Sun Microsystems.
Sun Microsystems, known for its SPARC processors and various operating systems,
was more focused on mainstream programming languages like Java and C. Forth is a
niche language that never achieved the widespread adoption that Java did, and i
ts use within Sun was likely limited to specific projects rather than a core technology.
was apple open system boot architecture a good idea?
AI Overview.
Apple's Open Firmware, while more advanced than the BIOS used in Windows PCs,
is not considered a universally "good" choice for Windows. Apple transitioned to EFI,
a firmware interface developed by Intel, because EFI offered improvements over Open Firmware.
Here's a more detailed explanation:
Open Firmware:
EFI:
Why EFI was preferred:
Compatibility Issues:
Modern Macs:
why did atari discontinue forth use in it game software?
AI Overview.
Atari stopped using Forth in its game software due to a combination of factors,
including the rise of more popular programming languages, the challenges
of developing games on the Atari 2600 with Forth, and a shift in focus
towards more commercially viable technologies.
Here's a more detailed explanation:
is forth new used in robotics?
AI Overview.
Yes, Forth is still used in robotics and embedded systems. It's particularly
well-suited for applications where real-time performance, compact code,
and interactive development are important, says a Medium article.
are forth dependencies certifiable?
AI Overview.
No, Forth dependencies, in the context of project dependencies or software
dependencies in embedded systems, are generally not certifiable in the same
way that code might be certified under standards like MISRA C or DO-178C for
safety-critical applications.
which computer languages have certifiable dependencies?
AI Overview.
Several programming languages offer ways to handle dependencies, some more robustly
than others. For example, languages like Python, Ruby, Java, and JavaScript have
built-in dependency management tools like pip, Bundler, Maven, and npm, respectively.
However, the term "certifiable dependencies" suggests a need for verifiable integrity
and provenance, which is a more specialized area.after a Ubntu install why does it task so many steps amd so long after sudo apt upgrade?Ubuntu edor choice for .txt save discovered important.
AI Overview.
After an Ubuntu installation, the sudo apt upgrade command can take numerous steps and a
considerable amount of time due to several factors related to package management, network c
onnectivity, and system resources.
Here's a breakdown of the reasons:
1. Package Dependencies and Updates:
2. Network Connectivity and Download Speed:
3. System Resources:
4. System Settings and Third-Party Repositories:
5. Other Factors:
Nano installed on Asus N6000 4/64 GB Windows 11 laptop runnung Ubuntu. :_
Switch back to Ubuntu from Windows 10 on $0 hp stream 13 N3060 4/64 GB dual boot laptop.
UX :)Material 3 Expressive (design.google).____
Thoughts on thinking (dcurt.is).
Keeping Up With AI: The Painful New Mandate for Software Engineers.
OpenAI introduces Codex, its first full-fledged AI agent for coding.Microsoft Confirms Windows Upgrade ChoiceYou Must Now Decide.___
6 reasons why Linux is better than ever.Zotacs 2025 mini PC lineup includes fanless models with Intel Twin____
lake and Core Ultra Series 2 chips.
what are Intel Twin lake and Core Ultra Series 2 chips?
AI Overview.
Intel Twin Lake and Core Ultra Series 2 chips represent distinct advancements in
Intel's processor technology. Twin Lake is a low-power, E-core-only processor line, i
deal for entry-level systems and devices requiring efficient performance. Core Ultra Series 2,
on the other hand, is a high-performance, AI-focused processor line targeting desktops
and mobile devices, offering enhanced AI capabilities and advanced features.
Arms ubiquitous CPU cores get new, less confusing names.
Intel Struggles To Reverse AMDs Share Gains In x86 CPU Ma.
why does x88 fig forth run ~10X faster usig virtualbox than it does with dosbox?
AI Overview.
The discrepancy in performance between running x88 FIG Forth in VirtualBox and DOSBox,
with VirtualBox being significantly faster (~10x), stems from fundamental differences
in how these two tools handle the emulation/virtualization process:
1. Virtualization vs. Emulation:
2. Performance Implications:2. Performance Implications:
3. Target Environments:
In Summary:
The significant speed difference comes down to the fact that VirtualBox leverages
hardware virtualization for faster execution, while DOSBox uses software emulation,
which is slower due to the instruction translation overhead. While DOSBox prioritizes
accuracy and has specialized features for DOS games, VirtualBox provides a faster
environment when hardware virtualization is available.
Oklo: Downstream Of The Bottleneck.
Oracle VM VirtualBox VM Escape via VGA Device (github.com/google).Teslas robotaxi fleet will be powered by plenty of teleoperation.____
teleoperation definition?
AI Overview.
Compensation of driver shortage with teleoperation | DHL Freight Teleoperation, also known
as remote operation or telerobotics, is the ability to control a system or machine from a distance.
It involves transmitting commands and receiving feedback from the remote system, allowing a
human operator to manipulate or interact with it as if they were physically present. This technology
is commonly used in robotics, especially in applications where it is unsafe or impractical for humans
to be physically present, such as in hazardous environments or remote locations.
Tesla's FSD vs. Waymo's robotaxi: One pulled a move that would tank any driving test. [msm :(?]Samsung Galaxy S25 Edge Battery Test Results are out: not as bad as feared.
____Why Cutting the Department of Energys Budget Is a Good Thing.Try 2.
Empire Wind 1 stop work order may force projects termination soon: Equinor.
'Poster
Thursday May 15, 2025 17:26
____Windows 11 and Red Hat Linux hacked on first day of Pwn2Own.
hp stream n3050 2/32gb run windows 10 1909. But is it better to buy a
new laptop which runs windows 11 as well as 10 1909?
AI Overview.
It's generally a good idea to consider buying a new laptop that runs Windows 11,
especially if the HP Stream N3050 with Windows 10 1909 is starting to show its age.
While Windows 10 is still functional, Windows 11 offers improvements in performance,
security, and features like the new start menu and taskbar. If the current laptop is
experiencing slow performance or compatibility issues, a new one with Windows 11
could be a worthwhile upgrade.
A fraction of proposed data centers will get built. Utilities are wising up.
Valve Addresses Alleged Steam Hack And Clarifies Situation.
CachyOS, Clear Linux & Debian 13 Deliver The Best Performance On
Framework Laptop 13 With AMD Strix Point.
____which is better dosbox or virtualbox to run 8088 forth?____
AI Overview.
For running an 8088-based Forth system, DOSBox is likely a better choice than VirtualBox.
DOSBox is specifically designed to emulate the DOS environment, which is what
many 8088 systems used, offering a more optimized experience for older programs.
While VirtualBox can also run DOS, it's a more general-purpose virtualization tool
that might not be as well-suited for emulating the specific characteristics of
an 8088-based system.Tesla has yet to start testing its robotaxi service____
without driver weeks before launch.
are tesla's software dependencies certified?
AI Overview.
Tesla's software dependencies, including its use of open-source software,
are subject to various certifications and conformity requirements. While Tesla
uses open-source components like Linux, they also develop and maintain
proprietary software. Tesla's products, including the software, are certified
to comply with certain standards to ensure safety and prevent interference.
are tesla's software dependencies less than one page of source code?
AI Overview.
No, Tesla's software dependencies are not limited to one page of source code.
Tesla's software is built upon a complex system of open-source and proprietary
components. While some underlying systems like the Linux kernel
have open-source code, Tesla's proprietary applications, such as Autopilot,
are not publicly available.
Tesla Is Seriously Struggling With Its Robotaxi Service.
does waymo's software defendencies certified?
AI Overview.
Waymo's software dependencies are subject to a certification process,
but it's not a simple "yes" or "no" answer. Waymo's autonomous driving
technology is certified for specific operational design domains, meaning
it's considered safe within those limitations. The California DMV,
for example, has approved Waymo to operate autonomous vehicles
in designated areas, certifying that they have met the necessary
safety standards.
does waymo's software defendencies all less than one page of source code?
AI Overview.
No, Waymo's software dependencies are not all less than one page of
source code.
Software engineer lost his $150K-a-year job to AIhes been rejected from 800
jobs and forced to DoorDash and live in a trailer to make ends meet.
Laid-Off Metaverse Engineer Says He Is DoorDashing and Living in a Trailer.Linux Swap Table Code Shows The Potential For Huge Performance Gains.____
Cheaper Nvidia RTX 5050 laptops leaked via retail listings.
is obsolescence of destiops forcing nvidia to build laptops that run their
AI Overview.
Nvidia Goes All-In on AI Large and Small, Led by RTX AI ... While obsolescence of desktops
might be a contributing factor, it's not the primary driver for Nvidia to develop laptops with
AI accelerators. Nvidia's focus on AI is a broader trend, and they are leveraging laptop
portability and AI capabilities to address a wider market, including professional users and gamers.
is having Windows 11 work legacy software on new hardware a better idea than
forcing recycling old hardware and purchase of new apps?
AI Overview.
Yes, enabling Windows 11 to run legacy software on newer hardware is generally a
better approach than forcing the recycling of old hardware and the purchase of new
applications. It promotes sustainability, reduces costs for users, and avoids the
unnecessary generation of e-waste.Why Nuclear Stock Oklo Has Popped 30% This Week.____
US would assess nuclear waste, plutonium for reactor fuel under draft order.
(264-1)(264-1) run on X86 platform p starting and endomg debug print. william-payne@william-payne-IdeaPad-1-14IGL7:~/Desktop$ gcc -o ee mul53.c william-payne@william-payne-IdeaPad-1-14IGL7:~/Desktop$ ./ee a[] = ffffffff:ffffffff exponentof(a) = 0 b[] = ffffffff:ffffffff exponentof(b) = 0 kk= 08 aa= ff bl=8 al=8 abl=16 add c[] = 00000000:00000000:00000000:00000000 c[0]= ff b[0]= ff aaaa=255 carry= 00 c[1]= ff b[1]= ff aaaa=255 carry= 00 c[2]= ff b[2]= ff aaaa=255 carry= 00 c[3]= ff b[3]= ff aaaa=255 carry= 00 c[4]= ff b[4]= ff aaaa=255 carry= 00 c[5]= ff b[5]= ff aaaa=255 carry= 00 c[6]= ff b[6]= ff aaaa=255 carry= 00 c[7]= ff b[7]= ff aaaa=255 carry= 00 c[8]= 00 aaaa=0 carry= 00 _____ middle of debug print omitted. c[0]= 01 b[0]= ff aaaa=257 carry= 01 c[1]= 00 b[1]= ff aaaa=256 carry= 01 c[2]= 00 b[2]= ff aaaa=256 carry= 01 c[3]= 00 b[3]= ff aaaa=256 carry= 01 c[4]= 00 b[4]= ff aaaa=256 carry= 01 c[5]= 00 b[5]= ff aaaa=256 carry= 01 c[6]= 00 b[6]= ff aaaa=256 carry= 01 c[7]= 00 b[7]= ff aaaa=256 carry= 01 c[8]= fe aaaa=254 carry= 00 c[9]= ff aaaa=255 carry= 00 c[10]= ff aaaa=255 carry= 00 c[11]= ff aaaa=255 carry= 00 c[12]= ff aaaa=255 carry= 00 c[13]= ff aaaa=255 carry= 00 c[14]= ff aaaa=255 carry= 00 c[15]= ff aaaa=255 carry= 00 add e c[] = 01000000:00000000:feffffff:ffffffffCode compiled with gcc c compilere on X86 platforem running Ubuntu. /*gcc -o ee mul53.c gcc -g -c mul53.c objdump -d -M inte1 -S mul53.o */ #include <stdio.h> int main() { static void *array[]={ &&byte7, &&byte6, &&byte5, &&byte4, /*0*/ &&byte3, &&byte2, &&byte1, &&byte0, /*4*/ &&bit80, &&bit40, &&bit20, &&bit10, /*8*/ &&bit80a, &&bit40a, &&bit20a, &&bit10a, /*12*/ &&bit08, &&bit04, &&bit02, &&bit01, /*16*/ &&bit08a, &&bit04a, &&bit02a, &&bit01a, /*20*/ &&init, &&add, &&printa, &&printc, /*24*/ &&shift, &&done, &&mul, &&byte9, /*28*/ &&bit01b, &&bit70}; &&alen, &&bit01c ; /*32*/ unsigned char a[8] ; // mltiplier unsigned char b[8] ; // mulplicand unsigned char c[16]; // product unsigned char aa,aaa,bb,bbb,bbbb,carry,carry0,carry1; int aaaa, al,bl,abl,kk,jj; short int exponentofa, exponentofb, exponentofc; init: a[0]=0xff; a[1]=0xff; a[2]=0xff; a[3]=0xff; a[4]=0xff; a[5]=0xff; a[6]=0xff; a[7]=0xff; exponentofa = 0; b[0]=0xff; b[1]=0xff; b[2]=0xff; b[3]=0xff; b[4]=0xff; b[5]=0xff; b[6]=0xff; b[7]=0xff; exponentofb = 0; c[0]=0x0; c[1]=0x0; c[2]=0x0; c[3]=0x0; c[4]=0x0; c[5]=0x0; c[6]=0x0; c[7]=0x0; c[8]=0x0; c[9]=0x0; c[10]=0x0; c[11]=0x0; c[12]=0x0; c[13]=0x0; c[14]=0x0; c[15]=0x0; exponentofc = 0; jj=100; goto printa; mul: if(b[7] != 0) {bl=8; goto alen;} // multiplicand if(b[6] != 0) {bl=7; goto alen;} if(b[5] != 0) {bl=6; goto alen;} if(b[4] != 0) {bl=5; goto alen;} if(b[3] != 0) {bl=4; goto alen;} if(b[2] != 0) {bl=3; goto alen;} if(b[1] != 0) {bl=2; goto alen;} if(b[0] != 0) {bl=1; goto alen;} printf("\n mul en\n"); alen: if(a[7] != 0) {al=8; abl=bl+al; goto byte7;} // multiplier if(a[6] != 0) {al=7; abl=bl+al; goto byte6;} if(a[5] != 0) {al=6; abl=bl+al; goto byte5;} if(a[4] != 0) {al=5; abl=bl+al; goto byte4;} if(a[3] != 0) {al=4; abl=bl+al; goto byte3;} if(a[2] != 0) {al=3; abl=bl+al; goto byte2;} if(a[1] != 0) {al=2; abl=bl+al; goto byte1;} if(a[0] != 0) {al=1; abl=bl+al; goto byte0;} printf("\n mul en\n"); goto printc; byte7: aaa=a[7]; kk=al; goto bit80; byte6: aaa=a[6]; kk=al; goto bit80; byte5: aaa=a[5]; kk=al; goto bit80; byte4: aaa=a[4]; kk=al; goto bit80; byte3: aaa=a[3]; kk=al; goto bit80; byte2: aaa=a[2]; kk=al; goto bit80; byte1: aaa=a[1]; kk=al; goto bit80; byte0: aaa=a[0]; kk=al; goto bit80; byte9: goto printc; bit80: aa=aaa;printf("kk= %2.2x aa= %2.2x bl=%d al=%d abl=%d\n",kk,aa,bl,al,abl); if(aa & 0X80) {jj=12; goto add;}; bit80a: jj=9; goto shift; bit40: if(aa & 0X40) {jj=13; goto add;}; bit40a: jj=10; goto shift; bit20: if(aa & 0X20) {jj=14; goto add;}; bit20a: jj=11; goto shift; bit10: if(aa & 0X10) {jj=15; goto add;}; bit10a: jj=16; goto shift; bit08: if(aa & 0X08) {jj=20; goto add;}; bit08a: jj=17; goto shift; bit04: if(aa & 0X04) {jj=21; goto add;}; bit04a: jj=18; goto shift; bit02: if(aa & 0X02) {jj=22; goto add;}; bit02a: jj=19; goto shift; bit01: if(aa & 0X01) {jj=23; goto add;}; bit01a: if(kk!=1){jj=32; goto shift;}; bit01b: kk=kk-1; if(kk==0){goto bit01c; }; goto bytem; bit01c: goto printc; add: printf("add c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); aaaa=c[0]+b[0]; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; c[0]=c[0]+b[0]; printf("\nc[0]= %2.2x b[0]= %2.2x aaaa=%d carry= %2.2x",c[0],b[0],aaaa,carry); aaaa=c[1]+b[1]+carry; c[1]=c[1]+b[1]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[1]= %2.2x b[1]= %2.2x aaaa=%d carry= %2.2x",c[1],b[1],aaaa,carry); aaaa=c[2]+b[2]+carry; c[2]=c[2]+b[1]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[2]= %2.2x b[2]= %2.2x aaaa=%d carry= %2.2x",c[2],b[2],aaaa,carry); aaaa=c[3]+b[3]+carry; c[3]=c[3]+b[3]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[3]= %2.2x b[3]= %2.2x aaaa=%d carry= %2.2x",c[3],b[3],aaaa,carry); aaaa=c[4]+b[4]+carry; c[4]=c[4]+b[4]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[4]= %2.2x b[4]= %2.2x aaaa=%d carry= %2.2x",c[4],b[4],aaaa,carry); aaaa=c[5]+b[5]+carry; c[5]=c[5]+b[5]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[5]= %2.2x b[5]= %2.2x aaaa=%d carry= %2.2x",c[5],b[5],aaaa,carry); aaaa=c[6]+b[6]+carry; c[6]=c[6]+b[6]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[6]= %2.2x b[6]= %2.2x aaaa=%d carry= %2.2x",c[6],b[6],aaaa,carry); aaaa=c[7]+b[7]+carry; c[7]=c[7]+b[7]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[7]= %2.2x b[7]= %2.2x aaaa=%d carry= %2.2x",c[7],b[7],aaaa,carry); aaaa=c[8]+carry; c[8]=c[8]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[8]= %2.2x aaaa=%d carry= %2.2x",c[8],aaaa,carry); aaaa=c[9]+carry; c[9]=c[9]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[9]= %2.2x aaaa=%d carry= %2.2x",c[9],aaaa,carry); aaaa=c[10]+carry; c[10]=c[10]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[10]= %2.2x aaaa=%d carry= %2.2x",c[10],aaaa,carry); aaaa=c[11]+carry; c[11]=c[11]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[11]= %2.2x aaaa=%d carry= %2.2x",c[11],aaaa,carry); aaaa=c[12]+carry; c[12]=c[12]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[12]= %2.2x aaaa=%d carry= %2.2x",c[12],aaaa,carry); aaaa=c[13]+carry; c[13]=c[13]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[13]= %2.2x aaaa=%d carry= %2.2x",c[13],aaaa,carry); aaaa=c[14]+carry; c[14]=c[14]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[14]= %2.2x aaaa=%d carry= %2.2x",c[14],aaaa,carry); aaaa=c[15]+carry; c[15]=c[15]+carry; carry = 0X00 ; if (aaaa>255){carry = 0X01 ;}; ; printf("\nc[15]= %2.2x aaaa=%d carry= %2.2x",c[15],aaaa,carry); printf("\n"); printf("add e c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); //return 3; goto bit70; //*array[jj];array[jj]; shift: printf("c[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x \n",c[12],c[13],c[14],c[15]); carry1=0x00; if(c[0]&0x80){carry1=0x01;}; c[0]=c[0]<<1; carry0=carry1; carry1=0; if(c[1]&0x80){carry1=0x01;}; c[1]=c[1]<<1; c[1]=c[1]|carry0; if(abl==2){goto bit70;}; carry0=carry1; carry1=0; if(c[2]&0x80){carry1=0x01;}; c[2]=c[2]<<1; c[2]=c[2]|carry0; if(abl==3){goto bit70;}; carry0=carry1; carry1=0; if(c[3]&0x80){carry1=0x01;}; c[3]=c[3]<<1; c[3]=c[3]|carry0; if(abl==4){goto bit70;}; carry0=carry1; carry1=0; if(c[4]&0x80){carry1=0x01;}; c[4]=c[4]<<1; c[4]=c[4]|carry0; if(abl==4){goto bit70;}; carry0=carry1; carry1=0; if(c[5]&0x80){carry1=1;}; c[5]=c[5]<<1; c[5]=c[5]|carry0; if(abl==5){goto bit70;}; carry0=carry1; carry1=0; if(c[6]&0x80){carry1=1;}; c[6]=c[6]<<1; c[6]=c[6]|carry0; if(abl==6){goto bit70;}; carry0=carry1; carry1=0; if(c[7]&0x80){carry1=1;}; c[7]=c[7]<<1; c[7]=c[7]|carry0; if(abl==7){goto bit70;}; carry0=carry1; carry1=0; if(c[8]&0x80){carry1=1;}; c[8]=c[8]<<1; c[8]=c[8]|carry0; if(abl==8){goto bit70;}; carry0=carry1; carry1=0; if(c[9]&0x80){carry1=1;}; c[9]=c[9]<<1; c[9]=c[9]|carry0; if(abl==9){goto bit70;}; carry0=carry1; carry1=0; if(c[10]&0x80){carry1=1;}; c[10]=c[10]<<1; c[10]=c[10]|carry0; if(abl==10){goto bit70;}; carry0=carry1; carry1=0; if(c[9]&0x80){carry1=1;}; c[11]=c[11]<<1; c[11]=c[11]|carry0; if(abl==11){goto bit70;}; carry0=carry1; carry1=0; if(c[12]&0x80){carry1=1;}; c[12]=c[12]<<1; c[12]=c[12]|carry0; if(abl==12){goto bit70;}; carry0=carry1; carry1=0; if(c[13]&0x80){carry1=1;}; c[13]=c[13]<<1; c[13]=c[13]|carry0; if(abl==13){goto bit70;}; carry0=carry1; carry1=0; if(c[14]&0x80){carry1=1;}; c[14]=c[14]<<1; c[14]=c[14]|carry0; if(abl==14){goto bit70;}; carry0=carry1; carry1=0; if(c[15]&0x80){carry1=1;}; c[15]=c[15]<<1; c[15]=c[15]|carry0; if(abl==15){goto bit70;}; carry0=carry1; carry1=0; if(c[16]&0x80){carry1=1;}; c[16]=c[16]<<1; c[16]=c[16]|carry0; if(abl==16){goto bit70;}; carry0=carry1; goto bit70; //*array[jj]; bit70: if(jj==9){goto bit40; }; if(jj==10){ goto bit20;}; if(jj==11){ goto bit10;}; if(jj==12){goto bit80a;}; if(jj==13){goto bit40a; }; if(jj==14){goto bit20a;}; if(jj==15){ goto bit10a;}; if(jj==16){goto bit08; }; if(jj==17){goto bit04; }; if(jj==18){goto bit02; }; if(jj==19){goto bit01; }; if(jj==20){goto bit08a;}; if(jj==21){goto bit04a; }; if(jj==22){goto bit02a;}; if(jj==23){goto bit01a; }; if(jj==32){goto bit01b;} if(jj==35){goto bit01c; }; printf("\nInvaid bit jump number = %2x\n",jj); return 3; byte70: if(kk==7){goto byte7;}; if(kk==6){goto byte6;}; if(kk==5){goto byte5;}; if(kk==4){goto byte4;}; if(kk==3){goto byte3;}; if(kk==2){goto byte2;}; if(kk==1){goto byte1;}; if(kk==0){goto byte0;}; printf("\nInvaid bytejump number = %2x\n",kk); return 2; bytem: if(kk==7){aaa=a[7]; goto bit80;}; if(kk==6){aaa=a[6]; goto bit80;}; if(kk==5){aaa=a[5]; goto bit80;}; if(kk==4){aaa=a[4]; goto bit80;}; if(kk==3){aaa=a[3]; goto bit80;}; if(kk==2){aaa=a[2]; goto bit80;}; if(kk==1){aaa=a[1]; goto bit80;}; //if(kk==0){aaa=a[0]; goto bit80;}; printf("\nInvaid number of byte decrements. = %d\n",kk); return 2; printa: printf("\na[] = %2.2x%2.2x%2.2x%2.2x",a[0],a[1],a[2],a[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", a[4],a[5],a[6],a[7]) ; printf("\nexponentof(a) = %d\n",exponentofa); printf("\nb[] = %2.2x%2.2x%2.2x%2.2x", b[0],b[1],b[2],b[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", b[4],b[5],b[6],b[7]) ; printf("\nexponentof(b) = %d\n\n",exponentofb); goto mul; printc: exponentofc = exponentofa + exponentofb ; printf("\nc[] = %2.2x%2.2x%2.2x%2.2x", c[0],c[1],c[2],c[3]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[4],c[5],c[6],c[7]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[8],c[9],c[10],c[11]) ; printf(":%2.2x%2.2x%2.2x%2.2x", c[12],c[13],c[14],c[15]); printf("\nexponentof(c) = %d\n",exponentofc); goto done ; done: printf("Done.\n"); return 0; }____ GE Vernova and Vestas rule lackluster US wind turbine market.Try 2.