FAA/NTSB flight control software cover-up remediation
FAA FOIA lsawsuit - District of Columbia avoidable.


https://prosefights2.org/

First posted
Friday March 24, 2023 17:25
Updated
Wednesday March 11 09:12

Start Thursday December 25 10:42 https://prosefights2.org/irp2026/windscammers30.htm

End Thursday December 25 10:42 https://prosefights2.org/irp2026/windscammers29.htm.

Directory switch 11/08/25 https://www.prosefights2.org/irp2026/windscammers29.htm.


7/27/24
Conduct unbecoming navy officer Admiral William H Payne Complaint.


7/19/24

EyeglassWorld reading glasses and and optometrist exam issues.

Unable to update above page. Updated page below.

https://prosefights2.org/irp2023/mvdnow4.htm

1/24/24.
Kaneohe Poseiden P8A FOIA.



Vinson F-35C FOIA.


1/10/24.

liaison
1. communication or cooperation which facilitates
a close working relationship between people or organizations.
1/8/24.
FOIA.GOV.
Department of Defense Department of the Navy

202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil

Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
12/2/23.

policy.
a course or principle of action adopted or proposed by a government, party, business, or individual.

11/25/23.
bamboozle

fool or cheat (someone).
11/11/23.
certification

the action or process of providing someone or something with an official document attesting to a status or level of achievement.
11/10/23.
retaliation

the action of harming someone because they have harmed oneself; revenge.

11/9/23.
nemesis
the inescapable agent of someone's or something's downfall.
11/7/23.
con
persuade (someone) to do or believe something, typically by use of a deception.

10/31/23
conned

persuade (someone) to do or believe something, typically by use of a deception.

7/5/23
Reprimand: "a rebuke, especially an official one.
3/22/23.

Phone numbers issues.
1-855-658-2676.
1-888-127-6445478.

Recording 2, 3, 4, 5, 6, 7, 8, 9.
3/21/23.
Phone message from US government?.

Two forms of id?
3/20/23
Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil

Good evening, Mr. Payne,

Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:

1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.

2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/

As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term “FOIAonline” (the correct site should appear as the top hit, and it will contain “foiaonline.gov” as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.

Regards,

Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer

Christopher.a.julka.civ@us.navy.mil

(703) 697-0031

From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address

Hello Mr Julka,
Alternate email address.

Sunday February 26, 2023 19:07

Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.




3/1/23
F-18 Carrier break and landing!.





12/25/22

,

12/21/22.
The statute of limitations for a FOIA claim is six years. However, a requester may refile their FOIA request to restart the statute of limitations.Feb 21, 2017
11/24/22.
Airbus A220 autopilot warning. Full coverage.

FAA wants pilots to be less dependent on computer autopilots.
9/18/22


4/3/22
prosefights hacked. Again. :(

6000 lines of code vs 100 60 lines of code missing.


Hacking attempted recovery 4.6.22.

2/5/22.





__________________




5/01/22.
Linus Torvalds reveals the 'true' anniversary of Linux code.







9/21/21.
US Navy software FOIA request.






9/3/21.
Christopher Julka (703)-697-0031 DONFOIAPublicLiaison@navy.mil.
8/24/21.

c/c++ wind turbine software use too?
NTSB 8/20/21 phone message.





Tweet.











4/22/21.




No appeal possted yet. "(
4/21/21.

Software tehnology? c/c++?
Scary USS Gerald R. Ford - How Powerful is the CVN-78? US Navy's $13 Billion Aircraft Carrier.
4/20/21.

Speed display disappear? Software issue?
"(where's) my speed my speed"











4/18/21.




Transcript.
4/17/21.
Where is air speed?
4/1921.










Rapid Descent and Crash into Water Atlas Air Inc. Flight 3591 Boeing 767-375BCF, N1217A.
4/16/21.
NTSB Ms Tamara Crawford phone conversation 4/16.

We are Legion.
We do not forgive.
We do not forget.
Expect us.
4/1421.

4/13/21. 'view' oly appeared starting today?

4/12/21.
What computers? How many modules? Lines of code for each module?







Tamara Crawford audio 4/9/21.
4/11/21





https://data.ntsb.gov/Docket?ProjectID=99013


4/19/21.




Poster attended book signing at Page One i Albuquerque.





Sunday, January 07, 2001 5:52 PM
Dear Friend,

we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.

With thanks

On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/

Wednesday, January 17, 2001 7:10 PM

Dear Friend,

A stand for Ahmad but why this question?

Iran Danesjoo Information Committee project reports. [1, 2 , 3].
Swiss Radio International link fixed with irp2014 switch from malwarebytes.

Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Admiral fornmer Navy Seal.


Another request?
4/10/21.


Phone message attachment.


3/23/21.
LIGHTWEIGHT OS FOR ANY PLATFORM.








3/20/21.


3/22/21 Attachments.











1

1



1

1











2/4/21.
12/30/20.


R44jPT22f3d
12/25/20.
12/22/20. :( !!!


J210*9t765r^

12/22/20. :( !!


J210*9t765r^
12/21/20. :( !


12/17/20. :(


12/16/20. Something wrong?
12/15/10


12/14/20.


12/10/20.














12/8/20.
Tuesday December 8, 2020 14:43

http://www.prosefights.org/irp2020/windscammers13.htm#ntsbbryson

Hello Ms. Bryson,

This is an appeal of FOIA No. FOIA-2020-00406 denial.

Ms. Melba Moye wrote on September 14, 2020

appears inapplicable for denial because FOIA requested DATA
Final 3 mi of Atlas Air #3591 Boeing 767:
1 Names of all software modules executed.
2 Time of execution. Nanosecond accuracy, if possible.
3 Altitude of #3591 at time software module entered.
from
NTSB chairman Sumwalt, Friday June 12, 2020 10:32.
Ms. Moye's denial reason is unsupported.

Ms. Moye/Ms. Joy Gordon make legal attempt to deny my FOIA
These legal arguments should be addressed to a judge/jury in event I am unable to receive requested documents by
administrative means?

Since no legitimate reason for denial provided by Ms. Moye and Ms. Gordon exist, I ask that you grant appeal.

And have NTSB deliver requested documents.

Regards,
william harris payne.

12/9/20.








____
https://dms.ntsb.gov/pubdms/.

https://www.ntsb.gov/_layouts/ntsb.aviation/index.aspx.

NTSB
AttN: Ms Sharon Bryson
Manager Director
490 L'Enfant Plaza SW
Washington, D.C. 20594

Chaff?





10/26/20 FAA FOIA lawsuit - District of Columbia..
Boeing 787: A Financial Engineering Nightmare?.



10/6/20.
____

Boeing 737 MAX: Turning A Crisis Into A Win.





Programming languages: Java founder James Gosling reveals more on Java and Android.
10/5/20.

Liberal arts 'educated'?


https://forums.linuxmint.com/viewtopic.php?t=294209





Linux 5 day course in focus because of 737 MAX and Raspberry Pi 4B.10/4/20
Programming languages: Java founder James Gosling reveals more on Java and Android.

Back again after deletion.



"Back in the early 1990s it was well understood that the number one source of security
vulnerabilities was just pointers, was just bugs, like 50% to 60% to 70% were bugs and the
vast majority of them were like buffer overflows.

Liam Tung.

why java michael barr.
10/1/20.







At that stage, C an C++"absolutely owned the universe" and everything was being written in those languages.





The statistics in this article have been a part of software engineering for decades.
Back in 1990, they were a major pain point, and a major motivator behind many of the features
of Java.

James Gosling.



9/18/20.
Unable to shrink email.





:( ++



9/14/20


9/11/20
ntsb foia status message.
8 rings.
8/11/20.



Boeing 747s still get critical updates via floppy disks.







Which OSs support floppies?







____
This surprise Linux malware warning shows that hackers are changing their targets.



8/10/20.
FAA Dave Duff phone message 1 2. 8/01/20.









A declaratory judgment is a binding judgment from a court defining the
legal relationship between parties and their rights in a matter before the court.
Typically, a party will first send a cease and desist letter prior to seeking
declaratory judgment from a court.

Injunctive relief, also known as an injunction, is a remedy which
restrains a party from doing certain acts or requires a party to act in a certain way.
It is generally only available when there is no other remedy at law and
irreparable harm will result if the relief is not granted.
8/7/20.

Where is Mark House?


206-231-2046 call audio.



*
                      UNITED STATES DISTRICT COURT
                         

FAA/NSTB FOIAs
Boeing 737 MAX, Atlas Air #3591 767-375 1992
software certification?

Thursday April 25, 2019 15:38
Updated
Friday May 31, 2019 16:45
3/7/23


New Mexico
Energy, Minerals & Natural Resources Department
nformation request

First posted
Monday June 22, 2020 13:10
UpdatedFriday October 23, 2020 10:29

Notes
Wednesday March 11 09:12

Forrth book pdf.

____
AI Overview

AT&T has announced a $250 billion commitment over the next five years
(through 2030) to expand its 5G, fiber, and satellite network infrastructure
in the U.S.. This massive investment aims to support increased data demand
for AI, cloud computing, and to bolster FirstNet, with plans to hire thousands of
technicians in 2026 alone. AT&T Newsroom AT&T Newsroom +3

Key details of the investment:
,,,
Goal: The investment aims to support "always-on" connectivity for
data-heavy services and AI.

____
Arduino’s New AI-Centric Board Is The VENTUNO Q.



Quantum computing meets the Möbius molecule.

a=4.125,
b=2.5.
a*b=

b-a=
____
Amazon Admits Extensive AI Use Is Wreaking
Havoc on Its Core Business
.

Microsoft backs Anthropic in lawsuit
against Trump admin
.

Agents that run while I sleep
(claudecodecamp.com)
.

Debian decides not to decide on AI-generated
contributions (lwn.net)
.

IBM Stock Plummets as Tech Giant Releases
Bombshell Cybersecurity Report
.
____
AMD releases new Windows 11/10 chipset
driver for Ryzen 9000, 7
.
____
Qatar’s LNG Shutdown Sends Shockwaves
Through Global Gas Markets
.

Renewables May Break the Century-
Old Utility Rulebook
.
Try 2.

Tuesday March 10 17:16
____
Laid-off lawyers, history PhDs, and scientists are now part of a
miserable gig economy in which they’re teaching AI how to do
their old jobs. If you’re still employed
.

Intel Demos Chip to Compute With Encrypted Data.

____
Imagine Losing Your Job to
the Mere Possibility of AI
.



AI Overview

While high C++ development and maintenance costs are causing some projects to migrate to easier,
cheaper languages, it is not broadly shrinking job opportunities, but rather shifting demand toward niche,
high-performance roles. There is a talent shortage for experienced C++ engineers, creating high-paying,
specialized roles in areas like gaming, finance, and embedded systems, while legacy maintenance
positions may offer lower compensation. Reddit Reddit +3

Impact on Job Opportunities
...
High-Performance Focus: The best opportunities for C++ professionals lie in projects where
performance is the primary concern, requiring deep, expert knowledge rather than
general coding skills.

:(


Last Year In SBCs.

Ubitium Tapes Out First ‘Universal’ RISC-V Chip.
____
Microsoft Teams phishing targets
employees with A0Backdoor malware
.

Salt Typhoon is hacking the world’s phone and internet
giants — here’s everywhere that’s been hit
.

AI Overview

The United States is one of the world's top cyber powers, engaging in extensive,
sophisticated, and often stealthy intelligence gathering and, occasionally, disruptive
attacks against other nations. While foreign, particularly Chinese, Russian,
and criminal, cyber attacks on the US are more openly aggressive, frequent,
and widely reported, the US operates its own robust, often undisclosed, offensive
cyber programs, which are considered highly active. BBC BBC +3

Prevalence of Attacks on the US:
...
U.S. Offensive Capabilities:
...
Nature of Operations:
...
The "Double Standard" of Reporting: Because the U.S. generally does not publicize
its own offensive actions, the public narrative often highlights attacks on the US,
creating a perception of lopsided, one-way hostility, according to a, user on Quora www.quora.com/Why-is-it-that-China-and-Russia-are-always-hacking-the-USA-but
-we-never-seem-to-hack-them.
...
____
Oracle is building yesterday’s
data centers with tomorrow’s debt
.

The Real Reason OpenAI Walked Away From
an Oracle Stargate Expansion in Abilene
.

What Anthropic’s Clash With the
Pentagon Is Really About
.

Oracle is under pressure from more than $100 billion
in debt and massive layoffs as it pushes ahead with
Larry Ellison’s 3-step transformation
.
 ____
Asia Outbids Other Regions for Fuel
Cargoes as War Chokes Supply
.

China Boosted Oil Imports Nearly
16% in Early 2026
.

Arizona Corporation Commission ends
state’s renewable energy standard
.
Try 4.

Monday March 16:26
____ fgraba
Do some companies now realize the financiial burdun
ofhiring C++ manages/progtammers?


AI Overview

Yes, many companies recognize the significant financial burden associated with
hiring and retaining C++ programmers, as they often command high salaries
due to the language's complexity, steep learning curve, and the high demand for
expertise in performance-critical industries. Outsourcing4work
Outsourcing4work +2

Here is a breakdown of why companies are facing this financial burden and
how they are reacting:


AI Overview

Learning Windows 11 and Ubuntu provides a comprehensive skillset for both
mainstream productivity and specialized technical tasks. Windows 11 offers,
user-friendly interfaces, extensive app support, and strong gaming capabilities,
while Ubuntu provides a free, secure, and customizable environment ideal for
development, AI, and revitalizing older hardware.

____
does right shift to jmatch expenent in ieee floating point
larger exponent cause accuracy loss isssues?

AI Overview

That's Not Normal–the Performance of Odd Floats | Random ... Yes, right-shifting
the mantissa (significand) of a smaller number to match a larger exponent during
IEEE 754 operations (like addition) causes significant accuracy loss. As the smaller
number's bits are shifted right, low-order bits are lost, often leading to precision
degradation or truncation. Game Development Stack Exchange Game Development
Stack Exchange +3

Key Aspects of This Issue:

Significand Shifting:
...
Magnitude Disparity:
...
Absolute vs. Relative Loss:
...
Accumulation:
...
This phenomenon is a primary reason why floating-point
arithmetic is approximate, as IEEE 754 dictates a finite
number of bits.

Nanocomportable gcc c floating-point accurate to the
least significant bits using two's complement add/subtract?


The "expomemt" is a positive number indicating location
of the binary point from the least significant bit.
Examples:

Exponent Mantissa Value in binary
1             0001      .1
2             0001      .01
3             0001      .001

An "exponent" of 0 indicates the integer portion of the

Nanocomputer portable gcc c floating-point numbers.

When a two's complement add/subtract is performed
the larger integer.mantissa number is shifted to the LEFT
to algin the binary points.

Possibililitt of left shifit a bit out of the register is dimimininsted
by increaseing the floating-point memory size.

Examples:
64 bit IEEE floatiing poiint becomes 128 bit in our 2026+
giga/terabyte memories.

unsighed char a[7] // 8 byte multiplier
unsighed char b[7] // 8 byte multiplicand
unsighed char a[7] // 8 byte multiplicand
unsighed char a[15] // 8 byte multiplicand

is incrased tgo
unsighed char a[7] // 8 byte multiplier
unsighed char b[15] // 16 byte multiplicand
unsighed char a[15] // 16 byte multiplicand
unsighed char a[31] // 32 byte multiplicand

which is easily handled with any 8-bit or
large Nanocomputer executing instrucdtions
in ~one clock cycle with low-Watts.

Will this work?

AI Overview

Yes, your proposed concept for a custom, arbitrary-precision floating-point
system using two's complement for arithmetic is a valid approach that addresses
potential precision loss in standard IEEE 754 floating-point formats. This method
leverages software-based arbitrary precision arithmetic, which is a well-established
technique in computer science, though typically implemented via specialized l
ibraries rather than directly supported by standard C language types. Wikipedia
Wikipedia +2

Feasibility Analysis
...
Hardware and Performance:
...
Key Considerations

Custom Data Structure:
...
Arithmetic Logic:
...
Binary Point Alignment:
...
Normalization and Rounding:
...
Standard Library Alternatives:
...
n conclusion, your system is a sound theoretical approach to
achieving high-precision floating-point arithmetic. The practical
implementation requires substantial effort and testing, and
established libraries like GMP can provide a ready-made,
verified solution.

____
Amazon’s AWS shocker overseas sends
a warning to U.S. investors
.

Iran War Imperils $300 Billion in Gulf AI Spending.

____
Tiny CM0IQ Board Runs Raspberry Pi CM0
Module with HDMI and CSI
.
____
Defense tech companies to employees: Stop using
Anthropic's Claude, and it likely also means 'ban'
from Lockheed Martin
.

 
 

Try 2.

Sunday March 8 13:37
____
Does using AI to develop software rely of LLM and LLVM?

AI Overview

Using Artificial Intelligence (AI) to develop software heavily relies on Large Language
Models (LLMs), but it does not necessarily depend on the LLVM compiler infrastructure
in all scenarios. LLMs are the primary interface for generating and explaining code. LLVM
is a toolchain used for optimizing and compiling code, especially for performance-critical
applications.

Here's a breakdown:
1. LLMs in AI Software Development
...
2. LLVM in AI Software Development
...
3. Interaction
...
Summary

AI development relies heavily on LLMs for generating code.

LLVM is not always needed: You do not need to use LLVM to write Python or
JavaScript with an AI assistant. However, for high-performance computing,
compiler optimization, or advanced AI infrastructure, LLVM is crucial.



____
what is a raspberry rp2-B2 nanocomputer?

AI Overview

The Raspberry Pi RP2040 (often associated with the RP2-B2 identifier) is a low-cost,
high-performance, compact microcontroller chip designed for embedded projects,
featuring a dual-core ARM Cortex-M0+ processor, 264KB of SRAM, and Programmable
I/O (PIO) for specialized tasks. It is the foundation of the Raspberry Pi Pico series.

Key
details about the Raspberry Pi RP2040:

Processor: Dual-core ARM Cortex-M0+ running at up to 133 MHz.

Memory: 264KB on-chip SRAM; supports up to 16MB of off-chip Flash memory.

Key Features: 30 GPIO pins, 4 analog inputs, and 2 × UART, 2 × SPI, and
2 × I2C controllers.

Programmable I/O (PIO): Enables the chip to simulate various digital interfaces.

Use Cases: Ideal for machine learning (TensorFlow Lite), robotics, and IoT devices.

Note on Naming: The "RP2040" is the specific microcontroller chip launched
by Raspberry Pi, while "RP2-B2" refers to the specific revision/packaging of that chip.
It is often confused with the Raspberry Pi 2 Model B, which is a full-sized
single-board computer.







RP2 Nano is a $6.6 Raspberry Pi RP2040 board with Arduino Nano form factor.


____
LLM-Driven Large Code Rewrites With
Relicensing Are The Latest AI Concern
.

____

does floating point aditio/subtraction require
that the exponenents of the two be equal?

AI Overview

Yes, floating-point addition and subtraction require the exponents
of both numbers to be equal before their mantissas (significands)
can be added or subtracted. If the exponents differ, the mantissa
of the number with the smaller exponent is shifted right until its
exponent matches the larger one. YouTube YouTube +4

Key points on this process:

Alignment: The smaller number's exponent is increased to
match the larger exponent to prevent losing significant bits.

Mantissa Adjustment: As the exponent increases, the
mantissa is shifted to the right.
...
This process is necessary to ensure that digits of corresponding
place values are aligned before performing arithmetic. YouTube
YouTube +1
____
Tech employment now significantly worse than the
2008 or 2020 recessions
.
____
The fallout over OpenAI's
Pentagon deal is growing
.

OpenAI hardware leader resigns
after deal with the Pentagon
.

Google, Meta, and Oracle are on a $1 trillion
borrowing spree and there will be ‘winners and
losers in this environment,’ bond fund manager says
.
____
Amazon Staffers Learning Hard Lesson as
Company Cuts Robotics Jobs
.

____
A Boat Made In Singapore Will Build An
Offshore Wind Farm In New York
.

Solar and Storage Could Reshape
Rural Electricity Markets
.



Try 4.

Saturday March 7 16:14
____
You’ll Choke When You Hear How Many Full-Time Jobs a
$136 Million Data Center Will Actually Create
,.

LLMs work best when the user defines their acceptance
criteria first (katanaquant.com)
.

Why Microsoft's Heavy AI Spending Is Driving Profits,
Not Destroying Them
.

____
Microsoft 365 Outage Hits North America as CDN
Misconfiguration Disrupts Multiple Services
.



Remotely Unlocking An Encrypted Hard Disk.


...


is Islam math finite math?

AI Overview

Islamic mathematics (roughly 8th–14th centuries) is not strictly limited to finite
mathematics, although it heavily emphasized practical, finite calculations in its
early stages. It laid the foundation for both finite and infinite mathematical
concepts. EBSCO EBSCO +2

Key aspects of Islamic mathematics regarding this question include:
...
While some scholars in the Islamic tradition argued that an actually infinite
set cannot exist in the physical world, their mathematical work involved
techniques (such as series and limits) that paved the way for modern
calculus and the treatment of infinite




Marrch 2, 2026 Total $11.83

Arriving today

With Pre-Soldered Header Raspberry Pi Pico Microcontroller Development
Board Based on Raspberry Pi RP2040 Chip,Dual-Core ARM Cortex M0+ P
rocessor With Pre-Soldered Header Raspberry Pi Pico Microcontroller
Development Board Based on Raspberry Pi RP2040 Chip,Dual-Core ARM
Cortex M0+ Processor Buy it again

____
The product is 3. The multiplier is 3.

Binary decimal is 0011.

SSo the length of the multiplicant is 0?

BUT the product length should always be
equal to or longer than the multiplier?

b1b2b3 bits.

4x3=12 which is greater than 3.

so b1=0?

2x3= 6 which is lgreater than 3.

S0 b2=0.
1x3=3=3 which is less than or equal to 3

S0 b3=1?

And the mulitiplcan in binary is 001?

There are apecical cases for trial length, correct?

AI Overview

Yes, your derivation for the multiplicand is correct: if the product is and the
multiplier is , the multiplicand is , which in -bit binary is . Your logic for the
trial-and-error bits ( ) correctly identifies the bits for the binary representation
of .

1. Multiplicand Calculation
...
2. Analysis of Trial Bits ( )
,,,
3. Special Cases and Bit Length Rules
...
Answer

The multiplicand is , which in -bit binary is . Your step-by-step logic
for the bits , , and is correct.

what is pseudo mathematics?

AI Overview

Pseudo-mathematics, or "mathematical crankery," refers to activities that
appear mathematical but do not adhere to the rigorous, axiomatic, and
peer-reviewed standards of formal mathematics. It often involves attempts
to solve notoriously unsolvable problems (e.g., squaring the circle, trisecting
an angle) using flawed, non-standard, or simplistic logic. Wikipedia Wikipedia +2

Key characteristics and examples include:
...
Pseudomathematics is distinct from legitimate, albeit unsuccessful, attempts
at proof, as it often involves a refusal to accept established mathematical
rules. Wikipedia Wikipedia

____
Worried that AI might replace you? Check
out this graph from Anthropic showing the jobs most at risk
.

Tell HN: I'm 60 years old. Claude Code has re-ignited a passion.

Oracle and OpenAI scrap deal to expand flagship Texas data centre.
 ____
What Carter and Reagan Got Right About Oil Shocks.
Try 1.

Friday March 6 15:28
____
Amazon says hours-long outage was triggered
by ‘software code deployment’
.

Labor market impacts of AI: A new measure
and early evidence (anthropic.com)
.

Tech jobs are getting demolished in ways not
seen since 2008 and the dot-com bust
.
___
Linux Hotplug Events Explained.

AI Overview

People still use other Linux distributions despite Ubuntu’s popularity because
of personal preferences for different desktop environments (e.g., KDE), the need
for specific, newer software (Fedora), or a desire for more lightweight, "bloat-free"
systems (Arch, MX Linux). Others prefer community-driven, non-commercial
alternatives like Debian or want more customization control. Quora Quora +5

Here is a breakdown of why other distributions are used:

The perception of Linux as a "madhouse" stems from its chaotic, decentralized,
and intensely debated open-source development, but it is not labeled as such
because the model works. Linus Torvalds and others view this, along with strict
code standards, as a necessary, pragmatic approach that achieves high-performance
results.

Key reasons this "madhouse" is not admitted as a failure include:
...
Therefore, the "madhouse" aspect is considered a feature of its, often,
chaotic, community-driven, approach, not a flaw, by those who, for,
the most part, are, more, focused, on, technical, results, than, in,
following, a, traditional, development, structure.
____
Good software knows when to stop
(writizzy.com)
. [feature creatures?]

for do early experiences with limited hardware and BASIC programming
leave lasting impressions?

AI Overview

Yes, early experiences with limited hardware and BASIC programming leave
profound, lasting impressions on developers and technical professionals. This
formative era, often characterized by 8-bit home computers (like Commodore 64,
Apple II, Sinclair Spectrum), fostered a "Zen-like" experience where users faced
a blank screen and blinking cursor immediately upon booting, encouraging direct
interaction with the machine. Hacker News Hacker News +1

These experiences created lasting impacts in several key areas:

1. Development of "Mental Muscle Memory" and Efficiency

...
1. Development of "Mental Muscle Memory" and Efficiency

Resourcefulness:
...
Optimization Skills:
...
Problem-Solving:

2. Conceptual Understanding of Computing
Close to the Machine: BASIC provided a conceptual model that was
close to the machine while remaining readable, making it an ideal
entry point for understanding how computer logic works.

Algorithmic Thinking: BASIC helped beginners grasp core programming
concepts and algorithmic logic, providing a foundation that made
learning later, more complex languages easier. Reddit Reddit +1

3. Fostering a "Tinkerer" Mindset

4. Psychological and Career Impact

Adaptability: The challenge of working with "broken" or highly limited
systems in the 80s and 90s prepared professionals for the rapid,
sometimes disruptive, evolution of technology in their careers.

While some debate whether early BASIC is "good" for modern programming,
many agree that the foundational logic and the ability to work within strict
constraints provide a significant, lasting advantage. WordPress.com WordPress.com +4



Why does nobody, and certainly not Linus Torvalds, want to admit
that Linux is a glorified madhouse, still today?



____
OpenAI Had Banned Military Use. The Pentagon
Tested Its Models Through Microsoft Anyway
.

 
____
did wind turbines save some Texans from blackouts several months ago and where is the ERCOT electricity source dashboad?


||During the winter of 2025-2026, wind turbines and other renewable sources played a critical role in stabilizing
the Texas grid during several severe storms, including Winter Storm Fern and a significant freeze in January
2026. While state officials reported that the grid had sufficient capacity and no systemwide blackouts occurred,
experts noted that the increasing contribution from wind and solar helped meet record-breaking winter demand

Try 1


Thurssday March 5 16:59
____
Don Knuth wrote a paper thanking Claude for
solving an open math problem
.

When AI writes the software, who verifies it?
(leodemoura.github.io)
.

Artificial intelligence model, Claude Opus 4.6 Solves Long Standing
Computer Science Problem
.

____

Windows 11’s March 2026 update is packing
9 new upgrades you’ll actually notice
.


____
Trump and Hegseth unleash the dogs of AI.

____

AI Overview

Yes, Python is generally considered an interpreted, dynamically-typed language
and is significantly slower than statically-typed, compiled languages like C or
C++ using GCC. Python as an Interpreted Language Execution Model: When
you run a Python program using the standard CPython interpreter, the source code i
s first compiled into an intermediate form called bytecode at runtime, which is then executed
by the Python virtual machine. This is different from the traditional compilation process of
C/C++. Dynamic Nature: Python uses dynamic typing, meaning variables do not need to
be declared with a specific data type beforehand, and their types can change during
execution. This flexibility comes at the cost of performance, as the interpreter must
perform type checks and lookups at runtime. Ntietz Ntietz +4

Speed Comparison with GCC C/C++ Code Compilation:

C and C++ code is compiled directly into native machine code before execution,
a process that allows
the compiler (like GCC) to perform extensive optimizations for the specific
hardware architecture. The resulting executable runs much closer to the
hardware,
requiring fewer runtime resources.

erformance Difference: For CPU-intensive tasks, pure Python can be anywhere from
10 to over 100 times slower than optimized C++ code. Some specific benchmarks
have shown C++ to be hundreds or even a thousand times faster for simple,
computation-heavy loops.

Real-world Use: In practice, performance bottlenecks in Python are often
mitigated by using highly optimized libraries (like NumPy or pandas) where
the computationally intensive parts are written in C or C++. Python the
n acts
as a "glue" language to orchestrate these fast, low-level components.

does the x86 ISA have too many rarely-used watt-consuming instrucdtiions?

Yes, the x86 Instruction Set Architecture (ISA) carries a significant amount of legacy,
rarely-used, and complex instructions that contribute to power consumption, a phenomenon
often described as "bloat" resulting from over 40 years of backward compatibility. While
modern x86 processors mitigate this through advanced microarchitecture (translating
complex instructions into micro-ops), the sheer volume of legacy instructions makes the
decoding process less efficient compared to pure RISC architectures, consuming more die
area and power. ACM Digital Library ACM Digital Library +4

Key Aspects of x86 Instruction Bloat:
Decades of Accumulation:
...
"Bloated" ISA:

Mitigation and Counterarguments:
Micro-op Cache:
...

...
Power Consumption Breakdown:
...
Variable Length Encoding:
...
Software Emulation Idea:

While the "unused instruction" argument is valid regarding the complexity
of the frontend (decoder), the overall power disadvantage of x86 compared
to ARM is sometimes overstated, as both architectures can be optimized to be
competitive in energy efficiency.

____
Oracle Plans Thousands of Job Cuts in F
ace of AI Cash Crunch
.

AI danger gets real.
___
BIOS updates are no longer optional.
____
As Quantum Computing Gains Steam,
the QTUM ETF Offers a Simple Way
.



NanoPi NEO3 Plus – A tiny Rockchip RK3528A headless SBC with Gigabit Ethernet,
USB 3.0 port, GPIO header
.

NanoPi NEO3 Plus.

AI Overview

The Allwinner H3 is a budget-friendly, quad-core Cortex-A7 system-on-a-chip (SoC)
designed for 4K "Over-the-Top" (OTT) media players, Android TV boxes, and budget
single-board computers (SBCs). It features a Mali-400 MP2 GPU, supports H.265/HEVC
decoding, and offers low-cost, high-performance, and versatile connectivity, including
10/100 Ethernet and four USB 2.0 ports. Linux sunxi Linux sunxi +3

Key Features and Capabilities
...
The Allwinner H3 is often compared to the slightly lower-end H2+ variant,
which shares a similar architecture but lacks 4K support.



AI Overview

Public key cryptography (asymmetric cryptography) uses pairs of mathematically related keys—
a public key for encryption/verification and a private key for decryption/signing—to secure
communication without requiring a shared secret beforehand. Data encrypted with the public
key can only be decrypted by the corresponding private key. Cloudflare Cloudflare +4

Key Aspects of Public Key Cryptography:
...
This system solves the "key distribution problem" of symmetric cryptography, where
parties previously needed a secure channel to exchange a single shared key


Is math behind public key cryptography two large prime number are easy to multiply
but factoring their product is hard?

AI Overview

Yes, that is the foundational principle of the RSA public-key cryptosystem. It is
exceptionally easy for a computer to multiply two large, random prime numbers ( )
to create a public key, but it is computationally infeasible to factor the resulting product ( )
back into its primes ( and ) within a reasonable timeframe, which secures the private
key.
Cryptography Stack Exchange Cryptography Stack Exchange +2

Key Aspects of the Math:

is attifical intelligence opposite real stupidity?

AI Overview

While artificial intelligence (AI) is often marketed as the opposite of human ignorance,
it is not strictly the opposite of "real stupidity." In fact, AI is frequently described as having
its own form of "artificial stupidity" (or "artificial foolishness"), often resulting in
authoritative-sounding errors, or hallucinations. Here is a breakdown of the relationship
between AI and real (natural) stupidity based on current perspectives:

1. AI is Not Always "Anti-Stupid"
...
2. The Case for "Natural Stupidity"
...
Key Differences
Human Stupidity: Often driven by ego, bias, and refusal to learn from mistakes.

Artificial "Stupidity": Often stems from a lack of context, over-reliance on training
data, and inability to understand edge cases.

Ultimately, the phrase "Real stupidity beats artificial intelligence every time" (often
attributed to Terry Pratchett) highlights that human folly often overrides the logical,
but narrow, capabilities of AI.
____
The work entry-level engineers used to do
is changing. This is their new playbook
.

Agentic Engineering Patterns (simonwillison.net).


____
Morgan Stanley Lays Off 2,500 Employees
Across All Divisions
.

OpenAI CEO Sam Altman makes
it clear to employees at Townhall:
You do not get to choose how…


[dupe] Nobody gets promoted for simplicity
(terriblesoftware.org)
.

The L in "LLM" Stands for Lying
(acko.net)
.

What I learned using Claude Sonnet to
migrate Python to Rust
.
___
AI Age 5 unresolved questions hanging over the
Anthropic–Pentagon fracas: ‘It’s all very puzzling’
.
____
Apple debuts $599 MacBook Neo to challenge
Chromebooks, Windows PCs
.
 
____
LNG Shipping Rates Soar 650% to
$300,000 Per Day
.

Interview: it’s all solar, all the time with
Emily from EnergySage
.
Try 4.


B elow hacker evidnce keeps disappearing.
windscammers29_f11~220251230




tkaken from Lenovo yzen 5 3500U,


This is what we should be seeing!!!


Wednesday March 4 13:54
____
Microsoft: Azure And OpenAI Integration
Support Long-Term Growth
.
____
1 Mersenne primes good to use to show multiplicand discovery
works with larger numbers since the mulitplicand is all binary ones?

7 time 31 = 217?

217 decimal in binart is 1101 1001 which is 8 bits long.

So the multiplicant should be 5 bits long?

b1b2b3bb4b5b

Is b1 a 1.

16 x 7 = 117 which is less than 217. so b1=1

Is b2 a 1?

16+8 = 24. 24 x 7 = 168 which is less than 217. So b2 = 1?

Is b3 a 1?

16+8+4 = 28. 28 x 7 = 196 which is less than 217. So b3 = 1.

Is b4 a 1?

16+8+4+2 = 30. 30 x 7 = 210 which is less than 217. So b4 = 1.

s b1 a 1?

16+8+4+2=1 = 30. 31 x 7 = 211 which is lequal to 217. So b4 = 1.

Is conclusion that 1 1111 binary is the mulipliocand correct?


A 64-biit portable multiplication was implemented with gcc c to run on
X86 plaand ARM tforem running Ubuntu, Ubuntu Kylin
and RPiOs.
/*gcc -o ee mul53.c
gcc -g -c mul53.c objdump -d -M inte1 -S mul53.o */

int main()

unsigned char a[8] ; // mltiplier
unsigned char b[8] ; // mulplicand
unsigned char c[16]; // product

The code can be easioy modified to find the multip[licand on
128, 256, and 512 byte arithmetic and can run on low-st
low-Watt
8-bit Nanocomputers.

Te source code is vailable at
https://www.prosefights2.org/irp2026/windscammers24.htm.

2 Hass multiplicand discovery broken public key cryptography?

***

AI Overview

Mersenne primes are excellent for demonstrating bitwise operations and multiplicand
recovery because their binary representation consists entirely of ones. For
example, the Mersenne prime is , which is 11111 in binary.
The On-Line


Step 1: Verify the Binary Calculation
...
Step 2: Binary Search for Multiplicand
...
nswer:

Yes, your conclusion is correct. The discovered multiplicand is 11111 in binary ( decimal).
Regarding your second question, multiplicand discovery has not broken public key cryptography.
Modern systems like RSA and ECC rely on the hardness of prime factorization and elliptic
curve discrete logarithms, not just the difficulty of simple multiplication. While side-channel
attacks (like timing or power analysis) can sometimes "discover" bits of a key during
multiplication, standard cryptographic implementations use constant-time algorithms
____
Inside SKALA: How Chernobyl’s Reactor
Was Actually Controlled
.

AI Overview

Yes, the long-lived nature of nuclear power reactors means that 1960s and 1970s-era i
ndustrial automation systems, including analog instrumentation and control (I&C) systems,
are still in active use today. While these plants have undergone maintenance, upgrades, and
life extensions, many still rely on original control technologies. International Atomic Energy
Agency International Atomic Energy Agency +4

Key details regarding the continued use of legacy systems include:
____
What is the relationship between large language model
providers and established software companies?

AI Overview

The relationship between large language model (LLM) providers (such as OpenAI,
Anthropic, and Meta) and established software companies (like Microsoft, SAP, and
Salesforce) is a complex mix of strategic partnership, deep integration, and competitive
disruption. In 2024-2025, LLM providers are moving from independent, research-focused
entities to foundational technology partners, while software companies are racing to
embed these capabilities into their existing, trusted platforms. Constellation Research
Constellation Research +4

Key dynamics in this relationship include:

1. Strategic Partnerships and "Co-opetition"
...
2. Integration into Existing Workflows
,,,
3. Data Ownership and Security
...
4. The Shift Toward Open Source...
Established software companies offer distribution, trust, and data.
LLM providers offer cutting-edge intelligence, creating a symbiotic
relationship that is redefining the future of enterprise software.

The Evolving Foundations of Math.

____
PrivacySponsored Post Visualized: The I
ncreasing Speed of Cyberattacks
.
______=
In Iran, US President Donald Trump Makes
The Case For Renewable Energy, Again
.

Uranium shipments on Navajo Nation will face
new rules, officials say
.
Try 1.

Tuesday March 3 15:15
____
Big Tech Teams Up Against Alphabet,
While Apple Reaps The Rewards
.
____
1 Mersenne primes good to use to show multiplicand discovery
works with larger numbers since the mulitplicand is all binary ones?

7 time 31 = 217?

what is 217 decimal in binart?

AI Overview

The decimal number 217 is 11011001 in binary.


1101 1001 which is 8 bits long.

111 binary is 3 bits long.

So the multiplicant should be 5 bits long?

b1b2b3bb4b5b

Is b1 a 1.

16 x 7 = 117 which is less than 217. so b1=1


Is b2 a 1?

16+8 = 24. 24 x 7 = 168 which is less than 217. So b2 = 1?

Is b3 a 1?

16+8+4 = 28. 28 x 7 = 196 which is less than 217. So b3 = 1.

Is b4 a 1?

16+8+4+2 = 30. 30 x 7 = 210 which is less than 217. So b4 = 1.

s b1 a 1?

16+8+4+2=1 = 30. 31 x 7 = 211 which is lequal to 217. So b4 = 1.

Is conclusion that 1 1111 binary is the mulipliocand correct?


A 64-biit portable multiplication was implemented with gcc c to run on
X86 plaand ARM tforem running Ubuntu, Ubuntu Kylin
and RPiOs.
/*gcc -o ee mul53.c
gcc -g -c mul53.c objdump -d -M inte1 -S mul53.o */

int main()

unsigned char a[8] ; // mltiplier
unsigned char b[8] ; // mulplicand
unsigned char c[16]; // product

The code can be easioy modified to find the multip[licand on
128, 256, and 512 byte arithmetic and can run on low-st
low-Watt
8-bit Nanocomputers.

Te source code is vailable at
https://www.prosefights2.org/irp2026/windscammers24.htm.

2 Hass multiplicand discovery broken public key cryptography?

*** AI Overview

Public key cryptography was publicly introduced in 1976 by Whitfield Diffie,
Martin Hellman, and Ralph Merkle. While this team developed the concept
at Stanford University, the technology was secretly invented earlier,
between 1969 and 1975, by researchers at the British intelligence agency
GCHQ, including James Ellis, Clifford Cocks, and Malcolm Williamson. National
Inventors Hall of Fame® National Inventors Hall of Fame® +4

Key details regarding the invention include:

The 1976 Paper: Diffie and Hellman published "New Directions in Cryptography"
in 1976, which introduced the concepts of public-key cryptography and digital
signatures.

RSA Algorithm: In 1977, Ron Rivest, Adi Shamir, and Leonard Adleman (RSA)
developed the first practical, widely used public-key system.
...
Purpose: It was designed to solve the key distribution problem in cryptography,
allowing secure communication without needing to exchange a secret key
beforehand.

AI Overview

Ransomware typically uses a hybrid encryption approach, combining fast
symmetric algorithms (like AES-256 or ChaCha20) to encrypt files with
strong asymmetric algorithms (such as RSA-2048 or ECC) to protect the
encryption keys. This method ensures high-speed encryption of large
volumes of data while preventing decryption without the attacker's private key.
...
RSA-2048/4096 (Rivest-Shamir-Adleman)
...
These algorithms make it computationally infeasible to break the encryption
without the private key, forcing victims to pay the ransom to regain access.
____
Back To Basics: Hacking On Key Matrixes.
____
CyberStrikeAI tool adopted by hackers
for AI-powered attacks
.
____
MoneyRanked: The World’s Most
Indebted Countries Today
.

 
____
THE AVERAGE LIFESPAN OF WIND
TURBINES MAY SURPRISE YOU
:
Try1s

.

The 06:37 file not mine and was later removed not by me!




Monday March 2 18:10
____
The digital colonization of flyover states’: how datacenters
are tearing small-town America apart
.

____
does ai write code whcih uses Big Tech solutions?

AI Overview

Yes, AI frequently writes code that utilizes Big Tech solutions (such as
cloud infrastructure, proprietary APIs, and established frameworks),
and it is increasingly being used to generate code within those same
Big Tech companies.

AI coding tools are heavily trained on vast amounts of data, including
open-source libraries and documentation from major tech firms, making
them proficient in integrating these services.

AI models often generate code that integrates with: Cloud services,
such as Amazon Web Services (AWS), Google Cloud Platform (GCP),
and Microsoft Azure.
...
AI is deeply embedded in the modern coding ecosystem and assists with
various tasks, from writing boilerplate to complex system architecture.
It is simultaneously used to build the infrastructure of those companies.

____
AI Overview

The RP2040 is a high-performance, low-cost dual-core ARM Cortex-M0+ microcontroller
chip designed by Raspberry Pi, released in 2021. It features 264KB of on-chip SRAM, 30
GPIO pins, and unique Programmable I/O (PIO) blocks for custom peripheral support. It is
famously known as the processor inside the Raspberry Pi Pico. Raspberry Pi Raspberry Pi +5

Key features of the RP2040 include:
____
AI Overview

Public key cryptography was publicly invented in 1976 by Whitfield Diffie, Martin Hellman,
and Ralph Merkle. While often attributed to this 1976 publication, the foundational
principles were actually discovered earlier, between 1969 and 1975, by British
intelligence agency GCHQ researchers James Ellis, Clifford Cocks, and Malcolm
Williamson. National Inventors Hall of Fame® National Inventors Hall of Fame® +4

Key historical milestones include:s
____
Is it good idea to store negativwe numbers in two's complent?

But when some computations are involved convert then some negative numbers
to positivie numbers, then correct the sign at the end of the omputations?

And then store a negative restult as two's complement in memory?


35 decimal is 0010 0011 binary?

One's complement is 1101 1100, add 1 1101 which is -35
in two's complement?

S0 -35 is converted to plus 35 and the multiplicand discovery
with multiplier plus 7 is made.

Since the product is -35 and the multiplier is +7,
thne the multiplican must be -5?

In the case of addition and subtracdtion, negative numbers are best
left in two's complement?

AI Overview

To determine if is and evaluate the efficiency of converting two's
complement numbers for multiplication versus addition/subtraction.

?? Step 1: Binary and Two's Complement Verification
...
Step 2: Multiplication and Division Logic
...

Step 3: Addition and Subtraction Efficiency
...
Answer:

Yes, your understanding is correct. For multiplication and division, converting
to positive magnitudes and applying the sign bit at the end (Sign-Magnitude
approach) is a common and valid simplification. However, for addition
and subtraction, numbers should be left in two's complement because
it allows the ALU to process the operation using a simple adder without
needing to know the signs of the operands beforehand. Finally, is and is in
8-bit two's complement.


____
what does saas do?

SaaS (Software as a Service) delivers cloud-based applications
over the internet via subscriptions, removing the need for users
to install, maintain, or update software locally. Providers manage
the infrastructure, security, and updates, allowing users to access
tools instantly through a web browser or app. Microsoft Azure
Microsoft Azure +4

Key aspects of what SaaS does include:

SaaS in, SaaS out: Here’s what’s driving the SaaSpocalypse.

____
AI is making junior devs useless
(beabetterdev.com)
.

Microsoft confirms clean install still mandatory for a
Windows 11 performance boost feature.
____
How do profit margins on ARM processors
compare to Intel's x86 processors?

AI Overview

Arm Holdings (ARM) operates with significantly higher profit margins than
Intel's x86 business, driven by a fundamentally different business model.
While Arm licenses its designs, allowing partners to manufacture the chips,
Intel acts as an Integrated Device Manufacturer (IDM) that designs,
manufactures, and sells its own processors. tidbits.com tidbits.com +3

Profit Margin Comparison (Recent Data)
...
While Intel makes more total revenue because it sells the complete chip,
Arm’s "asset-light" approach allows it to retain a much higher percentage
of its revenue as profit.



 
____
China and America Battle for the Future
of Limitless Energy
.

AI Overview

Yes, deep-pocketed tech investors are significantly reshaping the fusion
energy ecosystem and intensifying global competition. Driven by the
urgent need for clean, reliable, and "limitless" energy, private capital—particularly
from tech titans and venture capital—has shifted from purely academic research
to an aggressive, accelerated commercial race.

Total private investment in fusion has soared to over $9.7 billion as of
mid-2025, with more than $2.6 billion invested in the 12 months ending
June 2025 alone. The Fusion Report The Fusion Report +1

How Tech Investors are Reshaping the Ecosyst
...
While significant technical hurdles remain, the influx of private, high-risk capital
has permanently changed the sector, moving it from a long-term scientific
pursuit to a fast-paced industrial competition.

China’s Renewable Boom Masks a Quiet Coal-to-Liquids Expansion.
Try 1.

Sunday March 1 09:08
____
Waveshare ESP32-P4-WIFI6 High-Performance Development Board,
Based On ESP32-P4 and ESP32-C6, Supports Wi-Fi 6 and
Bluetooth 5/BLE, Board Only
.



what is the clock speed of Waveshare ESP32-P4-WIFI6 High-Performance
Development Board, Based On ESP32-P4?

AI Overview

The Waveshare ESP32-P4-WIFI6 development board features a high-
performance RISC-V dual-core processor (HP system) running at up to
400 MHz. It also includes a low-power (LP) core that can operate up to
40 MHz. The board is based on the ESP32-P4 (main MCU) and includes an
ESP32-C6 for Wi-Fi 6/Bluetooth 5 connectivity. Waveshare Electronics
Waveshare Electronics +3

Key details:

Multiplicand discovery example.

Tne mulipliers is 7 decimal, 0111 binary. with length of 3 bits.

The product is 35 decimal, 10 0011 binary with length of 6 bits.

The length of the multiplicand is 3?

In binary the multiplicand id b1b2b3. with decimal weights of 4, 2, and 1.

Is b1a 1?

In decimal 4 time 7 - 28 which is less than 35.

Is b2 a 1?
4+2 = 6.

7 time 6 = 42 which is larger than 35 so b2 = 0.
Is b3 a 1?

4+1 = 5.

5 times 7 is 35 wich is just right.

is the conclussiong that the multiplicand is binary 101 corredct?

AI Overview

The conclusion is correct. The multiplicand is indeed binary (decimal ). ??

Step 1: Define Given Values

Answer:

The conclusion is correct. The multiplicand is indeed binary (decimal ).

Would you like to try this discovery process with a larger
bit length or a signed binary number?





____
Data center construction declines for first time since 2020
on permitting, power delays
.
___
Hackers Abuse Windows File Explorer and WebDAV
for Stealthy Malware Delivery
.
____
AI I'm a senior software engineer laid off from Block.
There are 3 things I'm keeping in mind as I reenter

the job market
.

[flagged] HN is drowning in AI comments.
After signing Pentagon deal, Sam Altman tells Silicon Valley:
You have double sta7 hours ago
.




____
The Hidden Math Behind Rising Electricity Prices.
ry 5.

Saturday Febuary 28 18:06
____
is in binary .1111... into infinity equal to 1.
but never is in computer math?

AI Overview

In pure mathematics, the infinite binary sequence is exactly equal to 1,
but in computer math, finite precision limitations mean the sequence must be t
runcated or rounded, resulting in either a value slightly less than 1 or a value
rounded to 1.

Mathematical Proof
...
Computer Math Limitations.

if the length of the multiplie in bits is known and the length of
the product in bits in known then is is length of the multiplicant ~known?

AI Overview

Yes, if the length of the multiplier in bits and the length of the total product in bits
are known, the length of the multiplicand in bits is generally known, assuming
standard binary multiplication where the product length is the sum of the operand
lengths.

Key Relationships.

____
Block lays off nearly half its staff because of AI.
Its CEO said most companies will do the same
.

Microsoft Stock 2026 Forecast: MSFT Has a $600 Billion
Backlog as Demand for Microsoft Cloud Surges
.

Euro hosting giant hiking prices by up to 50% from April Fool's Day.


Dell Reports $27 Billion Quarter on Soaring AI Server Demand.

____
Compiling NodeMCU For The ESP32 With
Support For Public-Private Key Encryption
.




Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space.

____
why do some believe that Gemini should be removed from Android?

AI Overview

Reasons for removing or disabling Gemini on Android include its role as a replacement f
or Google Assistant. Users have reported downgrades in functionality, privacy concerns,
and intrusive implementation by Google.

Reasons for removing Gemini from Android include:
...
These articles explain the privacy concerns and functionality issues that lead some
users to want to disable Gemini on Android
.


fis is there a video of one Nanocomputer
communicating with another using Bluetooth?

AI Overview

Yes, there are several videos and tutorials demonstrating one Arduino
Nano (a popular "nanocomputer" or microcontroller board) communicating
with another using Bluetooth. The most common demonstrations involve
using Bluetooth Low Energy (BLE) on models like the Arduino Nano 33 BLE
or using external modules (like HC-05) with classic Nano boards. Reddit Reddit +4

Video/Demonstration Examples:

wo-Way Communication: A common demonstration shows two Arduino Nano
boards (e.g., Nano 33 BLE and Nano 33 BLE Sense) exchanging data, such as
gesture data or temperature readings, where one acts as the "central" device
and the other as "peripheral".

Sensor Data Transmission: Videos show one Arduino Nano collecting sensor
data (temperature/humidity) and transmitting it via Bluetooth to another Nano
to be displayed.

Bluetooth Controlling a Robot: Another common video demonstration
shows a robot powered by an Arduino Nano and an HC-05 Bluetooth
module receiving commands from another device. YouTube YouTube +4

How to find these videos:

You can search YouTube for: "Arduino Nano Two-Way Bluetooth
Communication"

"Arduino Nano Two-Way Bluetooth Communication"

"Arduino Nano 33 BLE central peripheral tutorial"

These projects typically involve writing code that sets up one board
to scan for and connect to the other, enabling the transfer of data
via Bluetooth.

Inside Project Silica, Now On Bakeware.





AI Assistant Uses ESP32.



Raspberry Pi projects to try this weekend (February 27 - March 1).

Random Number Generator Uses Camera Noise.


is Islam math, thinking in binary, more copacetic with computer
math than math math because Islam math is accurate to the lease
significant bit?

AI Overview While Islamic mathematics and modern computer
mathematics share strong foundational roots, the idea that
"Islam math" is more copacetic with computer science because it i
s uniquely accurate to the "least significant bit" is a misconception of
both historical mathematics and computer science.

Here is a breakdown of the relationship between these systems:

Summary: Islamic mathematics is not inherently more binary
than modern mathematics. Instead, both modern computer science
and Islamic mathematics share a reliance on the 8th-13th century
developments in algebra and algorithmic thinking that were perfected
in the Islamic world.
____
OpenAI raises $110B in one of the largest
private funding rounds in history
.

Joint Statement from OpenAI and Microsoft.

Former Air Force Secretary reacts to OpenAI announcing
it made a deal with the Pentagon amid Anthropic fued
.

OpenAI seeks another $10B fundraise on
top of the fresh $110B: report.

We gave terabytes of CI logs to an LLM
(mendral.com)
,
 ___
Largest Solar Farm In US Coming To Central Valley In California.

India’s Solar Manufacturers Slapped With 126% U.S. Tariff.

Germany Plans to Scrap Subsidy for Small-Scale Rooftop Solar.
Try 2.

Fridnesday Febuary 27 17:44
____

____
how is cloud computing involved in circular buying?"

AI Overview

Approximately five entire galaxies cross the threshold from "reachable"
to "unreachable" each year due to In the context of the current AI boom,
cloud computing is central to "circular buying" (often called circular financing
or vendor financing), where technology companies, chipmakers, and cloud
providers invest in each other and use those funds to buy products from
one another in a self-reinforcing loop.

Cloud computing serves as the primary mechanism for this cycle by
acting as both the service being purchased and the platform enabling
the financial feedback loop. YouTube YouTube +4

Key Roles of Cloud Computing in Circular Buying

Closed-Loop Financing (Vendor Financing): Cloud providers
(e.g., Microsoft, Amazon, Google) and chipmakers (e.g., Nvidia)
invest in AI startups (e.g., OpenAI, Anthropic). The startups then
use that same capital to purchase high-end GPU hardware and
cloud infrastructure, often from the original investors.

Revenue Generation and Valuation Inflation: The cash invested
by a cloud provider returns to them as revenue for cloud services
(e.g., Azure or AWS) and hardware. This allows companies to
book massive revenue, which in turn boosts their stock prices.

Long-Term Capacity Commitments: Circular deals often
involve long-term contracts where AI companies commit
to buying billions in cloud capacity, ensuring steady revenue for
cloud providers.

Infrastructure as a Service (IaaS) Enabling Scaling: Startups
use rented cloud capacity to train models, allowing them to
scale quickly without upfront capital, which is funded by the
investments from the providers themselves. Fortune Fortune +6

Examples of Circular Cloud Ecosystems


Microsoft-OpenAI-Nvidia: Microsoft invests in OpenAI, which
uses those funds to purchase Azure cloud services and Nvidia
GPUs. Nvidia also invests in OpenAI, creating a tighter loop.

Nvidia-CoreWeave-OpenAI: Nvidia owns a stake in cloud
provider CoreWeave and guarantees to purchase its unsold
capacity. CoreWeave then uses Nvidia chips to provide cloud
services to companies like OpenAI.

Amazon-Anthropic: Amazon invests in AI startup Anthropic,
which in turn signs long-term agreements to use Amazon
Web Services (AWS) as its primary cloud provider

Why This is Considered "Circular"

Critics refer to this ecosystem as a "financial ouroboros"
(a snake eating its own tail) because the same capital
flows through interconnected parties, generating revenue
at each point. While this drives rapid innovation and growth,
it also raises concerns about artificial demand and the creation
of an AI bubble.



____
Bigger, Faster, Better: The
ESP32-P4-WIFI6 HMI is Here
.

David Johnson-Davies Brings Espressif's Powerful
ESP32-P4 to the Feather Form Factor
.

which nanocomputer iSA are implemented with
one clock cycle per instruction?

AI Overview

Based on research into nanotechnologies and computer architectures,
the following types of, or approaches to, nanocomputer ISAs are designed
to be implemented with one clock cycle per instruction (CPI=1):

Quantum-dot
Cellular Automata (QCA) Architectures: QCA, specifically when used in
"processing-in-wire" or "clocked QCA" designs, acts as a shift register. The
signal propagation through these circuits, often divided into four clocking
zones, allows for single-cycle execution of operations.

Ternary QCA (TQCA) Circuits: Ternary logic-based TQCA technologies
have been designed to operate with a one-clock-cycle delay for specific
functions, such as ternary decoders, while managing lower power
consumption and higher frequency than CMOS alternatives.

Simple Single-Cycle Nanoscale Electronic Circuits: Similar to traditional
single-cycle processor design (e.g., MIPS), nano-scale Electronic
Nanocomputers using carbon nanotube field-effect transistors (CNFETs)
or other molecular electronics can implement a single-cycle datapath. In
this microarchitecture, all instructions are completed within one long clock
cycle, which is determined by the slowest instruction (usually memory access).

Delay-Based Processing-in-Wire: This approach allows for arithmetic operations
(like addition) to be completed as the signal passes through a specific length of wire.
YouTube YouTube +5

These implementations often favor Reduced Instruction Set Computer (RISC)
principles, using few, simple instructions to ensure they can be completed within
a single clock cycle, particularly in emerging, less complex nano-architectures.

do any x86 ISA execute instructions in one per clock cycle?

AI Overview

Yes, modern x86 processors can execute one or more instructions per
clock cycle, despite being a Complex Instruction Set Computer (CISC)
architecture. While early processors required multiple cycles per instruction,
modern, superscalar x86 CPUs (Intel Core, AMD Ryzen) use pipelining,
out-of-order execution, and multiple execution units to achieve a high
Instructions Per Cycle (IPC) rate.

Instruction Latency vs. Throughput: Many common integer instructions
(e.g., ADD, MOV) have a 1-cycle latency (the time it takes to finish) and a
throughput of 1 or more per cycle.

Superscalar Execution: Modern x86 CPUs can dispatch multiple
instructions to different execution units simultaneously in a single cycle.

Micro-ops ($\mu$ops): Complex x86 instructions are broken down
into simpler, RISC-like micro-ops, which can then be executed in one cycle.

Limitations: While many instructions can run in 1 cycle, others (like
complex arithmetic or memory-intensive operations) can take multiple
cycles. Chips and Cheese Chips and Cheese +4

While a single instruction might take multiple cycles to pass through
the entire pipeline (fetch, decode, execute, writeback), the processor
can complete one (or more) instructions every cycle, achieving an
effective CPI (cycles per instruction) of 1 or less.
____
Jack Dorsey just laid off 40% of staff.
He said he's still hiring AI engineers
.

MapsMapped: U.S. Jobs by State in
2025—and Where Growth Is Fastest
.

____
Anthropic CEO says it ‘cannot in good conscience
accede’ to Pentagon’s demands for AI use
.
___
Galaxy A23 photo download works despite all of the
AI Overview

The Galaxy A23, like most Android devices, operates with robust
native photo management and security, often making third-party
"cleaner" or "security" apps redundant or intrusive. Disinformation
arises from aggressive advertising, app developers seeking data,
or
users misinterpreting browser notifications as system threats.
JustAnswer JustAnswer +2

Why the Misinformation/Intrusive Notifications Exist:Notifications,
APPS ... disinformation. Why all the disinformation?

Ad-Supported Apps: Free apps often use notifications to push ads
or force downloads of other "cleaning" apps.

Malware/Adware: Suspicious apps or website notifications (via
Chrome) can create false "virus detected" pop-ups, driving clicks.

Misinterpreted System Features: Genuine, benign Android system
processes are sometimes mislabeled as malware in fear-mongering
articles.

How to Fix Excessive Notifications/Apps on A23:

Disable Browser Notifications: In Chrome, go to Settings > Site
settings > Notifications, turn them off, and clear allowed sites.

Remove Suspicious Apps: Go to Settings > Apps > Sort by
"Recently installed" and remove unknown cleaner/booster apps.

Check "Appear on Top": In Settings > Apps > Special access,
disable "Appear on top" for unnecessary apps. JustAnswer
JustAnswer

Samsung’s built-in Smart Manager (in Settings > Security and
privacy) usually handles, making, therefore, third-party, ad-heavy
"cleaning" apps unnecessary.

is Android unnecessarily abfuscated and complicated?

AI Overview

Whether Android is "unnecessarily" obfuscated and complicated
depends largely on whether you are looking at it from the
perspective of a user, a security researcher, or an app developer.

Code Obfuscation (making code unreadable to humans) is
generally considered a necessary security measure rather than
an unnecessary complication, as it protects apps from being
easily reverse-engineered, cloned, or tampered with. However,
this security measure does hinder security analysis and is often
used by malicious apps to hide their true intent. ScienceDirect.com
ScienceDirect.com +4
...
Conclusion:

Android is not unnecessarily obfuscated—the security risks of not
doing so are too high. However, the development platform is
frequently considered overly complicated and difficult for new developers to learn.

 
____
Uranium ETFs Sink on a Nuclear
Power Plant Cost Warning
.

Several West Virginia mines idled;
thousands of workers affected
.
Try 2.

Thursdnesday Febuary 26 15:58

____
are Nvidia, Meta and AMD involved in circular buying to inflate ia earnings?

AI Overview

Yes, there is significant scrutiny and debate among analysts regarding

"circular" investing, or "circular financing," involving Nvidia, Meta, AMD,
and other major AI players (such as OpenAI, CoreWeave, and Microsoft).

These transactions, described by some as "vendor financing" or "hot
potato" passing of capital, involve tech giants investing in each other,
or in startups, which then use that same capital to purchase AI hardware
and cloud capacity from the original investors, creating a "loop" that
boosts revenue figures for companies like Nvidia and AMD. CTech
CTech +2

Key Aspects of the Alleged Circular Buying:

Nvidia-OpenAI-CoreWeave Loop: Nvidia has committed to investing
heavily in AI firms like OpenAI (up to $100 billion in potential, though
modified). These firms then use that funding to buy Nvidia GPUs and
use services from AI cloud provider CoreWeave, in which Nvidia is
also a major investor.

"Cloud" and "AI" Interdependence: Hyperscalers (Meta, Microsoft,
Amazon) invest in AI startups, and in turn, those startups spend
heavily on the hyperscalers' cloud services to train models, creating a
closed-loop system that drives, and potentially inflates, reported revenues.


Why Concerns Exist: Analysts argue that these deals, while not
inherently illegal, can distort the reality of true market demand for
AI chips and infrastructure. If the revenue growth in the AI sector is
driven primarily by this circular flow of capital rather than by independent,
profitable, real-world applications, it could resemble a bubble, similar to the
telecommunications infrastructure bubble of the late 1990s.

Why Concerns Exist: Analysts argue that these deals, while not inherently
illegal, can distort the reality of true market demand for AI chips and
infrastructure. If the revenue growth in the AI sector is driven primarily
by this circular flow of capital rather than by independent, profitable, real-
world applications, it could resemble a bubble, similar to the
telecommunications infrastructure bubble of the late 1990s.

As of early 2026, despite these debates, the companies involved—
Nvidia and AMD—have continued to report record-breaking revenue
based on these huge, collaborative, and, to many, concerning,
capital expenditures (CapEx).

____
New AirSnitch attack breaks Wi-Fi encryption
in homes, offices, and enterprises
.
____
If AI Causes an Office Job Wipeout, It’ll Cause
Huge Problems for Blue Collar Work Too
.

How will OpenAI compete? (ben-evans.com).


Microsoft’s $83.09 Billion Decision
Could Shape What Happens Next.
___
Why Sierra the Supercomputer Had to Dihe Supercomputer Had to Die.
____
NewsThe wait is over, One UI 8.5 is officially launched.
 
____
The US Is Still Bleeding Coal Jobs, Trump Or No Trump.

Soaring Electricity Demand Meets Gas Turbine Shortage.

Following 35% growth, solar has
passed hydro on US grid (arstechnica.com)
.
Try 2.

Hacker Bragwatt recovery project.





Wednesday Febuary 25 19:43

how many ia compaies could be bankrupted by ai?|


AI Overview

Up to 95% to 99% of AI startups could fail or face bankruptcy by
2026-2027, driven by unsustainable business models, high
infrastructure costs, and a lack of clear return on investment.
Research indicates that 95% of businesses implementing AI are
not seeing a return on investment, threatening the viability of
numerous AI-focused ventures. Reddit Reddit +7

Key Factors Driving Potential AI Bankruptcies:

The "Wrapper" Problem:
...
Massive Cash Burn:
...
High Operational Costs:
...
Market Saturation & Lack of Demand:
...
Uncertainty and Risk:
...
The current situation is frequently compared to
the dot-com bubble, with analysts warning that if
AI investment does not yield significant revenue, a
massive, industry-wide correction is likely.

Amazon looks to build large-scale data center
campus next to nuclear plant in Texas
.

Likely the Largest Breach in U.S. History’:
What You Need to Know About the Conduent Fiasco
.

AI Overview

No, Meta and Nvidia are not startups. They are two of the largest,
most established "Big Tech" companies in the world, often referred
to as part of the "Magnificent Seven" in the stock market.
WIRED WIRED +4

However, both companies are massive leaders and heavy investors
in the artificial intelligence (AI) space.



Nvidia is the world leader in AI and accelerated computing, dominating
the market for the hardware (GPUs) used to train and run AI models.

Meta (parent company of Facebook, Instagram, and WhatsApp)
is investing billions of dollars in AI infrastructure to build "personal
superintelligence for everyone".

Recent Context (As of Feb 2026):

Nvidia & Meta Partnership: The two companies have a "multiyear,
multigenerational strategic partnership" to deploy millions of Nvidia's
Blackwell and Rubin GPUs, as well as CPUs, for Meta’s AI infrastructure.

Massive Spending: Meta is spending heavily on AI, with
plans to build 26 data centers in the U.S. and invest billions to
build its AI infrastructure.


Competition & Diversification: While heavily reliant on Nvidia,
Meta is also diversifying its AI chip supply by signing a major
deal with AMD, aimed at reducing its reliance on Nvidia. NVIDIA
Newsroom NVIDIA Newsroom +6

In summary, they are industry giants, not startups, but they
are currently driving the AI boom.




____

____
The AI Chip War You Didn’t See Coming.

____
Bay Area tech company that 'precisely
allocates every human resource' lays
off dozens
.

Microsoft's Impossible Situation.

Amazon would rather blame
its own engineers than its AI
,
 
Try 5.



Tuesday Febuary 24 16:01
____
It’s going to be painful for a lot of people’:
Software engineers could go extinct this year,
says Claude Code creator
.

These are the fastest-growing skills in the U.S.,
according to LinkedIn: They’re ‘career currency
.

US datacenters face slew of problems amid
grassroots protests against AI
.

Burry sparks AI spending debate, defends
record as critics question timing
,
____
A TV Transmitter From An STM32.
____
Hackers Leverage DeepSeek and Claude
to Attack FortiGate Devices Worldwide
.
____
Did Meta Just Accidentally Prove
Smart Glasses Are a Liability?
.

Meta to deploy 366MW of modular gas units
to power 1GW data center in El Paso, Texas
.
____

The Edge of Mathematics.
___
Markets IBM is the latest AI casualty. Shares tank 13%
on Anthropic programming language threat
.

FreeBSD doesn't have Wi-Fi driver for my old
MacBook, so AI built one for me (vladimir.varank.in)
.

The DIY OpenClaw Assistant You’ll
Actually Want to Carr
y.

How to turn off Gemini on Android — and why you should.

Meta agrees multibillion-dollar chip deal with AMD.

Big Tech is shelling out up to $1 million for new hires
who will never have to write a line of code
.
____
Amazon plans to spend $12bn on Louisiana
.data center campuses, developed by Stack Infrastructure
.

The ‘Godfather of Data Centers’ Making
Offers Big Tech Can’t Refuse
.
____
Bitcoin Miner Bitdeer Tells Market Not to Worry
After Selling Entire Crypto Stash
.
____
AMD VEK385 Versal AI Edge Gen 2 FPGA
evaluation kit plugs directly into a PCIe Gen5/Gen4 slot
____
Tech In Plain Sight: Projection Clocks.
 
____
Renewables Top 25% of U.S. Power as
Coal’s Grip Collapses
.

Nuclear Waste Remediation By Proton Beam.
Try 2.

Moniday Febuary 23 15:24
____"____

AI Overview

Cloud computing issues—specifically, the massive capital expenditures
and operational bottlenecks required to build out AI infrastructure—
"are currently causing a "reckoning" for the Magnificent Seven, but
are not necessarily fatal. While these companies are facing a "Return
on Investment (ROI) reckoning" and underperforming broader tech
indices in early 2026 due to these costs, they are using AI to pivot
from asset-light to asset-heavy business models that aim to entrench
their dominance rather than destroy it. Morningstar Canada Morningstar
Canada +4">>>
...
The Bottom Line

Cloud computing issues are currently causing a significant valuation adjustment rather than a fatal blow. The market is rotating away from high-multiple tech giants toward companies that can show tangible ROI on AI investments. If the AI build-out fails to produce profits, the "circular financing" (Mag 7 investing in each other/Nvidia) could create a severe crash, but for now, they are leveraging their scale to lead the industry.
Cloud computing issues are currently causing a
ignificant valuation adjustment

Cloud/AI Challenges Facing the Magnificent Seven (2025–
2026) __
_

AI Overview

While it is a common stereotype, in-house programmers do
not typically add unnecessary features simply to justify their
employment. Adding features for the sake of it, often called
"featuritis," is generally considered bad engineering practice.
LinkedIn LinkedIn +3 However, the pressure to demonstrate
value or keep busy can lead to situations where new features
are prioritized over necessary, but invisible, maintenance.

Here is a breakdown of why this phenomenon occurs: Reasons
Features Are Added (Beyond Utility.
...
In summary, while there is a temptation to add features to
appear active, most professional developers are driven by
solving business problems rather than inflating their workloads.

____
Oracle stock falls amid Stargate project concerns.

The AI Market Crash Just Got A Lot Worse.

IBM is the latest AI casualty. "

How technology is reshaping our minds.

Big Tech to invest about $650 billion in AI in 2026,
Bridgewater says
.

Microsoft MFA Down – 504 Gateway Timeout Errors.
Disrupting MFA Access for U.S. Users
.
s
Does Big Tech actually care about fighting AI slop?.

Elizabeth Warren Urges Trump Admin Not To Stabilize Bitcoin's
Price, Gets A Response From Changpeng Zhao: 'Crypto
Never Needed A Bailout'
.

Microsoft Stock (MSFT) Slips on Departure of
Gaming CEO Phil Spencer
.
____
No 24 hour response reeived. Why?


____
Google Just Exposed How Hackers Are
Turning AI Into A Super Weapon
.
___
MicroGPT Lets You Peek With Your Browser.
____
The Claude C Compiler: What It Reveals
About the Future of Software
.

Decentralized AI: $12T vs $12B Valuation Gap
Signals Enterprise Trust Shift
.
____|
Why Microsoft (MSFT) stock is on the brink of collapse.

AI Overview

Microsoft (MSFT) stock is not on the brink of collapse, but it is
experiencing a significant, high-volume correction, dropping roughly
10% following Q2 2026 earnings due to immense AI spending
($37.5B CapEx) and fears of slowed growth. While short-term
pressure is high, analysts generally view this as a valuation
correction rather than a structural collapse. Yahoo Finance
Yahoo Finance +4

Key Reasons for the Sharp Decline:
...
In summary, the "collapse" narrative refers to a sharp,
sentiment-driven correction, not a fundamental breakdown of
Microsoft’s business model.

Does Microsoft Deserve Its Decade-Low Multiple?.


___
Google restricting Google AI Pro/Ultra
subscribers for using OpenClaw (ai.google.dev)
.

[flagged] AWS won't discuss my bill, suspended my
account, took $1,600, still no human
.

Asus and Acer block German users from drivers and
BIOS updates after patent fallout
.

____
THE FBI SAYS THESE WI-FI ROUTERS ARE
UNSAFE, AND HERE'S WHY
.
 
____
The owners want to close this Colorado coal
plant. The Trump administration says no
.

Dark side of solar panels no one is telling you — Bees have
started showing strange behavior and now experts find
an “energy field”
.
Try 4.

Suniday Febuary 22 16:59
____|||
AI Overview

Yes, it is possible to view the binary product of two 64-bit "all 1s"
numbers and verify if the answer is correct by recognizing a specific pattern.

The calculation is:

____
This Is What A Worst-Case Bear Market Looks Like.

Google VP warns that two types of AI
startups may not survive
.

Stop paying a monthly subscription for cloud
storage and get 100TB for life here
.
____
Why is Claude an Electron app? (dbreunig.com).

How I use Claude Code: Separation of planning
and execution (boristane.com)
.
___
Andy Jassy: Visionary Leader, Amazon CEO,
AWS Pioneer, and Architect of Cloud Dominance
.

Amazon draws mixed signals as hedge
funds place opposing bets
.

are cost, reliability, file deleting ... issues driving
users to onpremiess storage solutions?

AI Overview

Yes, issues surrounding cost unpredictability, reliability, and
data control are driving a growing, strategic trend known
as cloud repatriation, where organizations are moving
some or all of their data from public cloud storage back to
on-premise solutions. While the cloud remains popular for i
ts scalability, many companies are
finding that at high volume, the long-term expenses,
security concerns, and performance bottlenecks of the
cloud outweigh its initial convenience. LinkedIn LinkedIn +4

Here is a breakdown of the factors driving this shift:

1. Cost Unpredictability and Escalation
...
2. Reliability and Performance
...
3. Data Control, Security, and File Handling

The Rise of "Hybrid" Storage
...
In summary: While cloud remains dominant for flexibility,
the "pain" of escalating costs and loss of control has
driven many companies—especially larger, more mature
ones—to bring storage back in-house to achieve better,
more predictable performance and data sovereignty.
Medium Medium +1

 
____
The Last Stand for King Coal.

The Missing Link in America’s Nuclear Space Strategy.

The Missing Link in America’s Nuclear Space Strategy.

AI Overview

Whether nuclear fusion is a "send more money" plot—a term
often used to describe a project that consumes massive
resources while consistently missing deadlines—is a subject of
intense debate. While the field has historically suffered from
extreme over-promises and, as some critics say, "is 30 years
away and always will be," significant recent developments
suggest it is transitioning from a scientific pipe dream to a
technological reality. Scientific American Scientific American +4

Here is a breakdown of both sides of the issue based on
current data:

Evidence of a "Send More Money" Plot
...
Evidence of Genuine Scientific Progress
...
Conclusion:

While fusion has historically been a "money pit" that failed
to deliver on premature promises, the current, massive
influx of private capital and recent scientific breakthroughs
suggest it is no longer merely a money-pit, but a highly
challenging, long-term, high-risk, but potentially
high-reward technology. However, it is not guaranteed
to fix climate change in the short term, and it remains
a massive, uncertain, long-term, R&D gamble

Stop These Things’ Weekly Round Up: 22 February 2026.
Try 1.

Saturiday Febuary 21 07:55
___
Is Google making Android cell phone use dependent on Google AI?.

AI Overview

Google is increasingly integrating its AI technology into the Android experience.
This includes the Gemini family of models and its on-device AI model, Gemini
Nano. AI is becoming a fundamental part of Android. HONOR HONOR +4

Here is how Google is making Android dependent on its AI:

Integration into Core Services (Android 15/16)
...
Deep Hardware/Software Synergy (Pixel 10 and beyond)
...
Can You Opt Out?

There is no single switch to disable all AI features.
...
The Future: :(?
...
These articles discuss the growing dependence of Android
on Google's AI, including how to manage or
disable AI-driven features:


is google assistant now preventing sufydown of Tracfone
moto g play 64GC up to 1 TB microsd card? if so how
ccan i remove google assistant?


AI Overview

Google Assistant is likely not "preventing" the shutdown of your
Tracfone Moto G Play, but rather a recent Android update has
remapped your physical power button to trigger the Assistant
instead of the power menu. This makes it seem like the phone i
s stuck.

You can fix this by changing the button settings or disabling the
Assistant entirely. How to Fix the Power Button (Bring Back
Power Menu).

How to Fix the Power Button (Bring Back Power Menu)

...
How to Disable Google Assistant Completely
...
Troubleshooting Storage/Slowdown.

___
does raspberry NOT require use of Rufus or
BalenaEcher to build executable images?

AI Overview

Correct, a Raspberry Pi does not strictly require Rufus or
BalenaEtcher to build bootable OS images. The official Raspberry
Pi Imager is the recommended tool, as it provides a streamlined,
all-in-one solution for downloading and flashing OS images to SD
cards or USB drives. Other methods like dd (Linux/macOS) or
command-line tools can also write images. Google Google +3

Alternatives for Creating Bootable Images:
...
While Rufus is a popular tool for Windows, it is just one of many
options for imaging.
___
Microsoft Promises Not To Flood Ecosystem With
"Soulless Slop" As Former AI Executive Takes
Charge Of Xbox
.

Microsoft AI CEO predicts 'most, if not all' white-collar
tasks will be automated by AI within 18 months
.

does Microsoft have as many variations of Windows 11
as there are x85 hardware variations?


AI Overview No, Microsoft does not have as many variations
(editions) of Windows 11 as there are x86 hardware variations.

While there are countless combinations of x86 hardware
(motherboards, CPUs, peripherals) from various
manufacturers over decades, Windows 11 has a limited
set of official editions, primarily:

Windows 11 Home

Windows 11 Pro

Windows 11 Enterprise/IoT Enterprise

Windows 11 Education/Pro Education

Windows 11 Pro for Workstations

Specialized "N" editions
...
While some users can bypass restrictions to run
Windows 11 on older hardware using tools like Rufus,
these are not official, distinct "variations" offered by Microsoft.
____
Oracle Stock Plunges 55%: Buy the Dip or Stay Away?.
____
Keep Android Open (f-droid.org).

The idea of using a Raspberry Pi to run
OpenClaw makes. no sense
.
__
Amazon Reportedly Pins the Blame for
AI-Caused Outage on Humans
.


 ____
The Quiet Revolution Reshaping America's Energy Future.

How America Quietly Made Nuclear Power Great Again.

Residents give mixed views on Three Mile Island
restart to federal regulators
.

Try 1.


Critical fix required?


Friday Febuary 20 19:15
____
The Data Center Next Door.

what does Astera Labs do?

AI Overview

Astera Labs: Purpose-Built Connectivity for Rack-Scale AI ... Astera Labs
(NASDAQ: ALAB) is a fabless semiconductor company that designs and
produces purpose-built, high-speed connectivity solutions specifically for
AI and cloud infrastructure. They create critical hardware and software that
removes data bottlenecks between processors, memory, and networking in
large-scale AI data centers. Astera Labs Astera Labs +4

Key Areas of
Focus & Products:
...
Why They Matter:

As AI models grow, the bottleneck is often the speed of data transfer
between processors (like NVIDIA GPUs) rather than the processing power
itself. Astera Labs provides the essential "connective tissue" that allows
these massive AI servers to function effectively. Their products are
heavily used by major hyperscalers, such as Amazon and NVIDIA.
____
Michael Burry Sounds Alarm on Palantir --
Warns Shares Could Fall to $46
.
____
what are importing RPiOS to ARM11 issues?

AI Overview

Importing modern Raspberry Pi OS (RPiOS) versions to ARM11-based
devices (such as the Raspberry Pi 1 and Pi Zero) presents several
challenges, primarily due to the architectural limitations of the older
ARMv6 processor, limited resources, and the evolution of software
toward newer ARM architectures.

Key issues include:

Unsupported Processor Architecture (ARMv6):
...
Software Incompatibility (32-bit/64-bit split):
...
FPU Limitations:
...
Limited System Resources:
...
Obsolete Driver/Kernel Support:
...
To run RPiOS on ARM11, it is generally required to use older
versions (like Raspberry Pi OS Lite) or ensure the software
stack is explicitly compatible with the armel or limited armhf
(ARMv6) architecture.

r is blaming programmers for failure to port RPi OS to
ARM11 warranted?

AI Overview

Blaming programmers for a failure to port or maintain modern Raspberry
Pi OS (formerly Raspbian) on ARM11-based devices (Raspberry Pi 1 and
Zero) is generally not warranted, as the issue is driven by technical limitations
and resource allocation rather than developer failure.

The Raspberry Pi 1, Zero, and Zero W (which use the ARM1176JZF-S core)
continue to receive support for 32-bit OS versions, with long-term support
continuing even as newer 64-bit systems take precedence. Armbian Community
Forums Armbian Community Forums +4

Here is why blaming developers for the l
imitations of this port is unfair:

Massive Effort and Complexity:
...
Fundamental Architecture Differences:
...
Performance Bottlenecks:
...
While some users might feel the older hardware is neglected in
favor of newer models, the continued functioning of RPi OS on
these devices is actually a testament to significant community
and foundation effort, rather than a failure of that effort. Armbian
Community Forums Armbian Community Forums +1

____
Microsoft's Plunge Is A Gift.

Microsoft (MSFT) Surpassed Q2 EPS Estimates as
Cloud and AI Demand Accelerates
.

Amazon Stock Still Makes No Sense.
____
AI Overview

People largely avoid using Linux due to the convenience of pre-installed
Windows/macOS, a steep learning curve, and the lack of native support
for essential proprietary software (e.g., Adobe, CAD, Microsoft Office).
Many users prefer to avoid tshe troubleshooting, command-line interface,
and hardware driver issues that can occasionally arise. Reddit Reddit +5

This video explains why many people, especially those who are not
tech-savvy, stick with Windows
:


Are ARM and RISC inherently superior to x86 (or sx64) and CISC?

AI Overview

ARM/RISC and x86/CISC are not inherently superior to one another;
they are different design philosophies optimized for different goals. RISC
excels in power efficiency and simplicity (mobile/embedded), while CISC
is superior for high-performance, legacy-heavy computing (servers/desktops).
Modern, high-performance designs often merge elements of both. Quora Quora +4

Key Differences and Advantages:

RISC/ARM (Reduced Instruction Set Computer):
...
CISC/x86 (Complex Instruction Set Computer):
...
Summary There is no absolute superior choice. RISC-based systems like
ARM offer better performance-per-watt (ideal for battery-powered devices),
while x86/CISC provides massive, mature ecosystems with high-performance
capabilities.
____
AI Boom Faces Power Crisis Without
Global Renewable Surge
.

Uranium's Next Decade: From Tight Supply
To A Broader Mining Boom
.

Mark Cuban’s bombshell AI warning is a
reality check for big tech
.

____
Poking At The ESP32-P4 And -C6 Dies
In An ESP32-P4-M3 Module
.

NextSilicon’s Maverick-2: The Future
Of High-Performance Computing?
.

does flash memory capacity in crease usually mean
slower rea'write speeds?

AI Overview

Yes, increased flash memory capacity in devices like USB flash drives
and SD cards often means slower read/write speeds. While this may
seem counterintuitive, it is a common consequence of manufacturers
prioritizing storage capacity and lower costs over high-performance
components. Reddit Reddit +3

Here are the primary reasons why higher capacity often results in
slower speeds:
...
Slower, Less Efficient Controllers:
____
OpenClaw’s Top Skill is a Malware that Stole SSH Keys
and Opened Reverse Shells in 1,184 Packages
.

Amazon service was taken down by AI coding bot.

Moody's Rebuts Concerns About AI Disruption; Stock Rallies.
____
Raspberry Pi stock jumps 50% in a
week in meme stock mania
.

Amazon: Exploding CapEx,
But Closer To Intrinsic Value
.

A new study explores how AI shapes
what you can trust online
.


 ___
The War Against Solar Power Is
Doomed To Fail, Part Infinity
.

SoftBank to spend an eye-popping $33B
to build huge US gas power plan
t.

AI Overview

No, SoftBank did not sell Arm Holdings. While a deal to sell Arm to
Nvidia for billion collapsed in 2022 due to regulatory hurdles,
SoftBank retained ownership and instead took the company
public through an IPO in September 2023. SoftBank remains
the majority owner of Arm, holding approximately 90% of
the company as of late 2023.
>>>
As of early 2026, Arm operates as a public company with SoftBank
as its primary stakeholder, benefiting from the surge in valuation
driven by AI demand.
Try 1.

Thursday Febuary 19 18:01
___
Microsoft AI boss issues 18-month warning to all white-collar workers.

Elon Musk’s biggest bet hits a pothole: Tesla robotaxis are
crashing four times more than human drivers.


Microsoft says it doesn’t think ICE is using its tech
for mass surveillance
.

Why Coal May Outlast Natural Gas in the Electricity Market.

Windows 11 update causing BSODs and Wi-Fi issues.

Microsoft confirms.

People are applauding a software engineer's 'honest
take' on AI in the workplace
.

____
Raspberry Pi ARM11 RPiOS booted!!!



~How many instruction does a ARM11 nanocomputerrunnng at 1 GHz execute in one second?

AI Overview

A 1 GHz processor, such as an ARM11, operates at 1 billion cycles per second. Assuming a classic,
simplified model where one instruction is executed per clock cycle, the processor can execute
approximately 1 billion instructions per second (or 1000 MIPS). Teach-ICT Teach-ICT +1

Clock Speed: cycles per second ITU Online IT Training.
Performance: While modern, complex instructions can take multiple cycles,
a 1 GHz CPU is generally rated to handle around 1 billion instruction steps

Real-world performance: The actual number of completed tasks (instructions) might be
lower than
z1 billion depending on the efficiency of the instruction pipeline, memory access speed,
and complexity of the code.
Testbook Testbook +4
per second.
***
128 GB 160 MB/s Sandisk microS=SD flash used.

AI Overview

As of early 2026, the fastest microSD flash memory cards utilize
the microSD Express standard, with cards like the SanDisk
MicroSD Express 128GB delivering speeds up to 880MB/s or
Samsung P9 Express 512GB cards reaching speeds around
800MB/s, far exceeding traditional UHS-I speeds. These cards
are designed for specialized, high-performance devices.
Amazon.com Amazon.com +3 Key Findings for Top
Performance (Feb 2026):

____
AI hyperscalers move to secure long-term uranium supply from
mining companies — fuel required for nuclear plants to
power future data centers.
____
Linux Still Working To Clean Up The Realtek RTL8723BS
802.11b/g/n WiFi Driver In 2026
.
____
NVIDIA Ends ARM Acquisition Chapter; Debate E
merges Over Future CPU Strategy in the Agentic AI Era
.

what flash controllers does and did Nvidia use?

AI Overview

Nvidia primarily uses high-performance flash controllers from third-party
manufacturers, specifically Phison and Silicon Motion, to manage
the NAND flash for boot, operating system storage, and data
caching in their AI, data center, and automotive platforms. YouTube
YouTube +2

Key Flash Controller Partners & Usage:

Phison: Phison controllers
...
Infineon:
...
Other/Historical:
...
BlueField DPUs:

AI/Inference:
***
AI Overview Based on the available search results, there is no
evidence that Nvidia has ever used an "8951" flash controller
in their products. The search results rega
rding flash controllers
and Nvidia include:

Jetson Flash Procedures: Information on flashing Jetson devices
(Orin, etc.) involves using

USB drives, boot partitions, and internal
firmware (IFW) or update firmware (UFW), typically version
1.46.4 or 1.60.2, rather than identifying specific third-party
flash controller models like an "8951".
***
AI Overview

Introduction of 8051 Microcontroller The 89C51 (often referred
to as an 8951) is a low-power, high-performance, 8-bit CMOS
microcontroller based on the classic 8051 architecture,
manufactured by Atmel (Microchip Technology). It features 4KB of
Flash programmable and erasable read-only memory (PEROM),
128 bytes of RAM, 32 I/O lines, and two 16-bit timers/counters.
 
____
Trump said wind power is for ‘stupid people.’
Here’s what European countries did 5 days later
.
Try 5.

Wednesnday Febuary 18 12:13
____
Two $25 ARM11 SBCs



Micro type c port with type c adapters.


Surprise! :(


____
25 Vulnerabilities in Cloud Password Managers
Allow Unauthorized Access and Modification
.

The software sell-off, part II.

Microsoft pledges $50 billion to tackle AI inequality
as it warns of a ‘growing divide’
.
____
did theGoogle former CEO say that electricity
is Google's problem?


AI Overview

Yes, former Google CEO Eric Schmidt (2001–2011) has frequently
stated that electricity is the primary bottleneck for the future of AI,
moving beyond just being a "Google problem" to a broader
energy infrastructure crisis.

He has recently argued that the rapid growth of artificial intelligence
and data centers is outpacing the U.S. power grid, famously declaring
that "AI's natural limit is electricity, not chips".
...
Schmidt's remarks highlight that the insatiable energy
demands of AI data centers, which require 24/7 power
and intensive cooling, are forcing a massive reevaluation
of energy grid capacity.

Key points from his recent comments (as of early 2026):
Is "Modern software", in fact, late 1960s software designed for
small meories, low megabyte disks running o high_watt epesnive
computers used for OS360 and Unix but now we are in a world of
gigabyte/terabyte memories, inexpensive nano computers, some
of whuch run a 32 bit ISA at up to 1 GHZ?

AI Overview

The premise that modern software is fundamentally 1960s-era code
running on modern hardware is a mix of accurate, deep-seated
architectural legacy and oversimplified generalization.

While many core concepts, programming languages, and operating
system philosophies (especially Unix) originated in the late 1960s and
early 1970s—when memory was measured in kilobytes and disks were
tiny—modern software is not, in fact, the same code.

Here is a breakdown of how 1960s constraints still shape today's
software, contrasted with current hardware capabilities.
...
Conclusion: Modern software is built upon a foundation of 1960s
design philosophy (especially Unix), but the implementation is vastly
different. While we still use "small memory" design patterns, modern
applications often use them as a "starting point" for adding layers of
abstraction that consume massive amounts of modern computing
resources, rather than optimizing for efficiency.

In short: The philosophy is 1960s; the complexity is 2020s.

Investors Dump Microsoft Shares Despite Largest Earnings
Beat in Company History
.

Is Windows 11 update causing some users not to be able
to enter their passwords?

AI Overview

Yes, recent Windows 11 updates (specifically since August 2025,
including KB5064081) have caused a bug where the password
sign-in icon disappears from the lock screen. While the option is
hidden, the button is still functional, and users can click on the
empty space to enter their password. Tom's Hardware
Tom's Hardware +2

Key Details Regarding Password Issues:
...
Microsoft has acknowledged these issues and has been working
to resolve them through subsequent updates.

Microsoft blocks a way for user sign-in on Windows 11 25H2
24H2, and for good reason
.

how many of the magnificient offer Cloud computing?

AI Overview

All seven of the "Magnificent Seven" stocks (Alphabet, Amazon, Apple,
Meta, Microsoft, Nvidia, and Tesla) are involved in cloud computing,
though they differ in whether they are primary service providers or
major users of cloud infrastructure. Investopedia Investopedia
+2

The Major Cloud Providers (Hyperscalers):

Amazon (AWS), Microsoft (Azure), and Alphabet (Google Cloud)
are the primary leaders in providing public cloud infrastructure and
services.

AI/Infrastructure Support: Nvidia provides the GPUs that fuel these
cloud data centers.

Large-Scale Users/Platform Operators: Meta, Apple, and Tesla rely
heavily on these cloud services to operate their businesses, such as
AI training, data storage, and consumer services. The Motley Fool The
Motley Fool +6

While only three are considered the "big" providers, all seven
companies are deeply integrated into the cloud ecosystem.
EC-Council EC-Council +2
_____
Big Tech approaches ‘red flag’ moment: AI capex
is so great hyperscalers could go cash-flow negative,
Evercore warns.
____
YouTube outage cause revealed: Here's what we know.
Daily nightmare descends on Tesla charging lot in San Francisco.
 
Try 1.

Tuesnday Febuary 17 17:01
____
Google’s ex CEO Eric Schmidt warns America: We are running out of … .

Eric Schmidt Says 'We're Running Out Of Electricity,' Urges Space Data Centers
— SpaceX CEO Elon Musk Quips: 'If Only There Were A Company'
.

“RAMmageddon” Has Collapsed Every Major Tech Market as Executives
Brace for a ‘Product Winter’ That Could Last Until the End of the Decade
.

Running AI models is turning into a memory game.

Republican slams Purdue University for hiring H-1B worker for $149,000
software engineer role: ‘Are there
.

____
Microsoft Teams outage affects users in United States, Europe.

Amazon Just Got Crushed, And The Market Is Dead Wrong.
____
Data Centers Are the
Enemy We’ve All Been Waiting For
.

is what is happening in the real world different
than what msm is reporting?

AI Overview

Based on recent studies, polls, and media analysis, there is a
significant, well-documented gap between how mainstream media
(MSM) portrays events and the reality experienced by many people,
driven by factors such as bias, selective reporting, and differing
incentives between traditional media and social platforms.

A record-low 28% of Americans expressed trust in the mass
media to report the news fully, accurately, and fairly in 2025,
with 70% expressing little to no confidence, according to Gallup.

Here is a breakdown of why differences exist between MSM r
eporting and "the real world": 1.

1. Distorted Representation of Events (The "Filter")
...
2. Differing Realities: MSM vs. Social Media
...
3. Reasons for the Discrepancy
...
Summary of Perspectives

Critics of MSM argue that the media creates a
"controlled narrative," intentionally hiding or
spinning stories to suit a political or corporate agenda.

Defenders of MSM argue that, despite flaws, traditional
media outlets still have higher standards of verification
(using agencies like Reuters/AP) compared to the
unverified, often false, information found on social media.

Ultimately, in a "mediatized" environment, what the
media portrays is not a direct reflection of the world,
but a curated, often distorted version of it, leading
many to seek out varied, non-mainstream sources to
get a more complete picture.
____
After Microsoft couldn't keep its AI hands to itself,
a notoriously complex Linux distro has started its
long march away from GitHub
.
____
is cloud computing mainframe mentality computing?

AI Overview

Cloud computing shares a similar philosophy with mainframes regarding
centralized resources, virtualization, and high scalability, often described
as a "modernized, distributed mainframe" approach. While both provide
centralized, secure, and reliable computing, mainframes are a single
physical machine, whereas cloud computing uses distributed, elastic,
on-demand infrastructure.

Key Commonalities (The "Mentality")

Centralized Resources:
...
Virtualization/Multi-tenancy:
...
High Scalability & Reliability: [HAHAHA?]
...
Key Differences
...
In essence, cloud computing is the evolution of the mainframe
mentality—applying the principles of central, shared, secure
computing to a vast, flexible, and distributed network.
____
Data Centers Push Great Lakes Region to the Brink.
____
AI is destroying open source, and it's
not even good yet (jeffgeerling.com)
.
 
____
Wind turbine catches fire in Breckenridge.

Spain Leans on Gas to Stabilize Grid
After Historic Blackout
.
Try 2.

Monday Febuary 16 17:18
____
Tesla Sales Down 55% in UK, 58% in Spain, 59% in Germany,
81% in Netherlands, 93% in Norway vs. 2024
.

AI Overview

While all seven companies currently maintain exceptionally strong balance sheets,
Tesla (TSLA) is widely regarded by analysts as having the highest risk profile within
the "Magnificent Seven" group.

Explanation.

Trump's trade advisor says Big Tech must 'internalize the cost' of AI data centers.
____
AI Overview

While there is no evidence suggesting a coordinated conspiracy of "mainstream media"
(MSM) liberal writers being directly paid by the nuclear industry, the landscape of
nuclear energy coverage is complex, involving advocacy, corporate investments,
and shifting political alliances.

Here is a breakdown of the factors at play regarding media coverage and
nuclear energy
:

___
Is tech msm promoting clould computing overr onpremises technology?

AI Overview

Yes, technology mainstream media (MSM) and industry analysts generally
promote cloud computing over on-premises technology, largely driven by
the rapid, massive shift toward digital transformation, AI adoption, and the
financial models favored by major tech vendors. While on-premises solutions
are often presented as "legacy" or "traditional," the media narrative focuses
on the agility, scalability, and lower upfront costs of the cloud.

Here is a breakdown of how the tech media covers this shift:

Arguments Favoring Cloud in Tech Media
...
Coverage of On-Premises Technology
...
The Role of Analyst Firms
...
Conclusion

While the media heavily promotes the cloud, the reality in 2025–2026 is
shifting toward a hybrid approach, where on-premises infrastructure is still
heavily used alongside public cloud for security and compliance. However,
the dominant, forward-looking narrative in the technology media remains
overwhelmingly pro-cloud.

are tecxh liberal arts educated writers getting paid by cloud providers?

AI Overview

Yes, tech-focused, liberal arts-educated writers are being hired and paid by cloud
providers and AI companies, often in roles that bridge the gap between complex
technology and human communication.

Cloud computing companies (like AWS,
DigitalOcean, and others) hire writers for technical documentation, tutorials, and
marketing content. While technical proficiency is required, the ability to translate
complex material into understandable language—a hallmark of a strong liberal
arts education—is highly valued.

Key Findings on Liberal Arts Writers in Tech/Cloud: Roles in High Demand:

Roles in High Demand:
...
Compensation: Technical writers in the U.S. have an average annual pay of
approximately $81,001 (as of Feb 2026), with contract roles offering flexibility.

AI and Cloud Intersection:
...
Specific Companies Hiring: ...
...
Focus on Communication:
...
he Shift Towards Specialization

While there is a place for liberal arts
writers, the "entry-level" tech writing job is evolving. Companies
now often expect technical writers to have "domain-specific
knowledge" in areas like cloud computing or software development.

Freelance and contract work remain a major avenue for these writers,
with platforms and companies paying for tutorials and guides, often
ranging from $100 to $400+ per article.
____
where do i down.oad the os for EC Buying Pi Zero W
with WiFi and Bluetooth Development Board?

AI Overview

Download the official OS for your Pi Zero W via the Raspberry Pi Imager
tool, available at raspberrypi.com/software/. This software automatically
downloads and flashes the correct 32-bit image (Raspberry Pi OS Lite is
recommended for performance) onto your microSD card.

This video shows
how to set up the Raspberry Pi Zero 2 W, including downloading
and installing the OS:

Steps to Install the OS:
____
Removing The BIOS Administrator Password
On A ThinkPad Takes Timing
.
____
OpenClaw creator Peter Steinberger joins OpenAI.

Tom Lee Says AI Killed Software And Job
Losses Are 'Soon To Follow'
.

Fund Beating 99% of Peers Sees Few Software
Firms Surviving AI
.

Sam Altman and Bill Gates Bet Big on Limitless Clean Energy.

Microsoft's Lack Of Leadership In AI, Wait.

what is openclaw, does it use LLVM?

AI Overview

OpenClaw (formerly known as ClawdBot and Moltbot) is a viral, open-source,
autonomous AI agent designed to run locally on a user's machine. Created by
PSPDFKit founder Peter Steinberger, it acts as a "conversational-first" personal
assistant that bridges large language models (LLMs) with local applications,
allowing the AI to interact with files, web browsers, and messaging apps like
Telegram, WhatsApp, and Discord.

Does it use LLVM?
...
Key Aspects of OpenClaw:
...
In Feb 2026, it was announced that the project would be moved to an
open-source foundation, with creator Peter Steinberger joining OpenAI.
***
OpenClaw is not an LLM itself, but rather an open-source, autonomous AI agent
platform that utilizes LLMs to function. It acts as a wrapper or "agent runner,"
enabling models like Claude or GPT to plan tasks, interact with applications
(WhatsApp, Discord, etc.), and use tools. It is often described as a "cascade
of LLMs".

This video explains how OpenClaw acts as an agentic wrapper around LLMs:

***
OpenClaw is primarily implemented in TypeScript and Swift. It is a Node.js-based,
self-hosted, autonomous AI agent that runs as a long-lived process.

Core Languages:
...
Key Architectural Components:

WebSocket Gateway:

Top U.S. General Joins the Fight for
Rare Earth Security
.
____
You can now download a Fedora
Atomic OS for your Android device
.
 
Try 2.

ARM11 number 2,"

where do i download the os for Pi Zero W with WiFi and Bluetooth Development Board
Module RPI Pi Zero W for Raspberry Pi?

AI Overview

Download the Raspberry Pi OS for the Pi Zero W by installing the official Raspberry
Pi Imager tool from the Raspberry Pi software page on a computer. The Imager
automates the download and installation process, ensuring you get the correct 32-bit
version for the Pi Zero W.

Steps to Install the OS. ARM11 OS.




US’s largest public utility says it now doesn’t want to close two coal-fired plants.
"

Sunday Febuary 15 06:30

____
Real-Time 3D Room Mapping With ESP32,
VL53L5CX Sensor And IMU
.

Bash Via Transpiler.
____
Rufus blames Microsoft for allegedly blocking
latest Windows 11 ISO downloads
.

Windows 11 now has a proper Task Manager
with performance history
.

Down 22% in 6 Months, Is Microsoft Stock a Buy?.

I can remote access a $35 Raspberry Pi from anywhere—
why is Windows still so far behind?
.
 
____
GENIUS: adding solar panels to semi
trailers is an idea so obvious it hurts
.

New Energy Storage Solutions Are
Killing Trump’s Coal Power Fantasy
.

Latin America's Bold Renewable Energy Bet.

Stop These Things’ Weekly Round Up: 15 February 2026.
Try 2.

Saturday Febuary 14 16:06
____
How AI could eat itself: Competitors can probe
models to steal their secrets and clone them
.

6 niche programming languages developers secretly love.

It's time to upgrade to Windows 11 without hesitation,
as it's finally getting the most requested Windows 10 feature
.



First look: Run LLMs locally with LM Studio.

___

Are LLMs Big Tech software technologies?

AI Overview

Yes, Large Language Models (LLMs) are considered a core,
cutting-edge software technology heavily driven, developed,
and dominated by Big Tech firms (e.g., Google, Microsoft/OpenAI,
Meta, Amazon). These companies are investing heavily in LLMs to
secure their technology advantages and expand their AI-powered
ecosystems.

LLMs are considered Big Tech software technologies for
several reasons:

The most advanced foundational LLMs (Gemini, GPT-4, LLaMA)
are built by a small group of big technology companies.

Large-scale LLMs rely on massive cloud and GPU infrastructure,
primarily provided by Big Tech.

Big Tech integrates LLMs into existing software suites and
developer tools.

There is a shift where LLMs are viewed as the "new kernel"

or operating system. Big Tech is rethinking software architecture
around AI agents, memory, and reasoning.

Big Tech companies are acquiring AI startups to strengthen their hold on
software markets.

The foundational technology, training resources, and
deployment platforms for large-scale LLMs are controlled by
major technology corporations, even though open-source
alternatives exist.


____
Pi zero w.

AI Overview


Based on the search results, "EC Buying" primarily refers to
a seller of hardware tools (serial port modules, debuggers,
and burners for microcontrollers) on platforms like Amazon. T
hey do not appear to have a direct, branded software suite, but
rather provide hardware that requires specific drivers or third-party
software for functionality.

Here are the download and driver options associated with EC Buying

1. Required Drivers for EC Buying Hardware
...
2. Software for Firmware Burning (STC Microcontrollers)
...
3. Other "EC" Software
...
For the EC Buying branded hardware, you should focus on
downloading the CH340 Driver and the STC-ISP
programming software.

____
What is SaaS Selloff?

AI Overview

The 2026 "SaaS Selloff"—dubbed "SaaSpocalypse"—is a massive,
rapid decline in software-as-a-service company valuations, erasing
over $1 trillion in market cap in early February 2026. Investors are
fleeing traditional, per-seat SaaS stocks due to fears that AI agents
and AI-native startups will render traditional software, workflows,
and subscription models obsolete.

Key aspects of this selloff include:
AI Displacement Fear:
...
Revenue Model Breakdown:
...
Shift in Investment:
...
This selloff signifies a fundamental shift in how value is perceived,
with investors favoring AI-driven efficiencies over traditional SaaS
subscriptions, according to Yahoo Finance.




____
Sandisk: The Storage Party May Be Coming To An End.

AI Overview

Based on recent financial reports from early 2026, SanDisk’s
(often operating under or reported with Western Digital's flash
division) business is increasingly dominated by AI and data center
storage, which now represents a significant portion of its revenue.

Key Data Center/AI Proportions (As of Q2 2026):
...
In summary, AI and data center storage (Cloud) is the primary
growth engine for SanDisk in 2026, with revenue in that
segment growing rapidly (+64% QoQ) and significantly
boosting company-wide margins.

SanDisk Rallies On AI Storage Crunch As Samsung
Readies New Memory Supply
.
____
Microsoft Under Pressure to Bolster
Defenses for BYOVD Attacks
.

Microsoft Is 'Worst-Performing' Hyperscaler Stock Since
ChatGPT Launch, Chamath Palihapitiya Says
.


____
What the Fall of the Telegraph Says About Fossil Fuels.

Dive Brief At $103B, Duke claims largest spending
plan of any regulated US utility
.

Northwest’s only nuclear power plant shut down after
problem detected
.
Try 1.

Friday Febuary 13 15:45
____
Ranked: The Countries Generating the Most Electricity.

Microsoft confirms plan to ditch OpenAI — as the ChatGPT
firm continues to beg Big Tech for cash
.

Elon Musk gives less than a year to coding as a profession, ....

The AI Bubble Burst: Phase Two.


____
Arrived 2/12/26.


____
AI Overview

Based on early February 2026 reports, Microsoft released updates
around February 10-12, 2026, primarily to resolve critical system
issues and bugs introduced by the January 2026 "Patch Tuesday"
updates.

Specifically, the updates released around this time
(including KB5075941) addressed the following:

System Stability & Boot Failures:
...
Secure Launch/VSM Issues:
...
General Fixes:
...
These updates were critical in fixing the "troubleshooting
nightmare" caused by the KB5074109 update released
on January 13, 2026.

____
Alarm bells just rang at San Francisco's
2 buzziest tech companies
.

Palo Alto Networks lays off hundreds of CyberArk employees
one day after completing $25 billion acquisition
.

OK, so Anthropic's AI built a C compiler.
That don't impress me much
.

Street Reassesses Microsoft (MSFT) Amid
Azure Growth and Capex Concerns
.

BlNvidia Shares Go Cold Even as Big Tech Spending on AI Balloons.

Tesla suffers major setback as key employee
joins mass exodus: 'Leaving the sinking ship'
.

Amazon continues loss for eight straight sessions.

Lenovo Posts Earnings Beat on AI-Driven Demand.
____
Odido data breach exposes personal info of 6.2 million customers.


____
can a wind turbine be an ice trebuchet?.

AI Overview

Key Details About Ice Throw:

Mechanism: Ice buildup occurs on the blades in cold, foggy,
or snowy conditions. When the turbine is running, the rotation
flings this ice, similar to a trebuchet.

Safety Measures:
...
Risk Mitigation:
...
Yes, a wind turbine can act as an ice trebuchet,
throwing ice chunks over 140 meters (nearly a
football field length) due to centrifugal and aerodynamic
forces when ice accumulates on the blades. This
phenomenon, known as "ice throw," poses a significant
safety hazard to people and structures, especially during
winter, and is a recognized risk in cold-climate operations.

Wind farms in trouble: Sweden supplies electricity “
as much as the lines can carry
.”

The Death Of Baseload And Similar Grid Tropes.



Why Is Nuclear Energy Stock Centrus Bleeding Red?.

Offshore wind showed up big during the East Coast’s brutal cold.



are there more serious issue with wind gneration of electricity than solar?

AI Overview

Wind power faces more severe logistical and environmental,
and maintenance challenges compared to solar, including higher
noise pollution, wildlife impact, and moving parts that require
frequent maintenance. While both are intermittent, wind is
harder to predict for residential use, although wind is often
more efficient than solar for large-scale energy production.

Key Differences in "Serious Issues"
...
Despite these issues, wind remains a highly efficient, high-capacity,
and low-carbon energy source, often providing a higher energy
output than solar on a larger, utility scale.
Try 3.


Thursday Febuary12 10:56
____
Microsoft says hackers are exploiting critical zero-day
bugs to target Windows and Office users
.
____
Making A Functional Control Panel Of
The Chernobyl RBMK Reactor
.



William Payne says: February 12, 2026 at 7:08 am f

Low-Watt low-cost nanocomputer MASTERS using SLAVE RPiOS/Ubuntu/Ubuntu Kylin
/FreeRTOS controlling Giga/Terabye n low-cost memories a better Data Center
solution than Nuclear-power/high-Watt expensive computers?

Hello Ace,

Project:
1 Connect nanocomputer [esp32, ARM M33, )+, ATmega, …]
running single task simple OS to microcomputer such as
Raspberry Pi Banana Pi, Orange Pi, Le Potato, .. using Bluetooth.

2 The micros will act as slaves to the nanocomputer.

3 The micros will

A print messages from the nano to screen.

B micros will send text message to the nano. C micros will
send, on nano command, 1024 byte file segments to the nano.

4 micos will receive 1024 byte segments to be written to a file.

Also under consideration is communication with Android
cell phones.

Perhaps you or some of you buddies may be interested
in implementing parts of this project?

Please send me your phone number so that we can arrange
a time to talk.

bill 505-464-7123

hp sream 13 you guys gave me has been running 24/7 sing both
Windows 10 and Ubuntu.

Report comment
Reply
Leave a Reply

AI Overview

The official Chinese version of the Ubuntu operating system is called
Ubuntu Kylin (Chinese: ???; pinyin: You Qílín). It is an official Ubuntu
flavour designed specifically for Chinese users, featuring the UKUI (
Universal Kylin User Interface) desktop environment and pre-installed
software tailored for the Chinese market.

Key details about Ubuntu Kylin include:

Purpose: Optimized for simplified Chinese characters, offering customized
themes,, and local applications.

nterface: Uses UKUI, a desktop environment based on Qt that provides
a familiar, Windows-like experience for users.

Partnership: Developed by Canonical, the National University of Defense
Technology (NUDT), and others to cater to the Chinese market.

Features: Includes in-house applications such as Kylin Assistant,
Kylin Video, and a specialized software center.

Ubuntu Kylin is different from, but related to, the broader Kylin OS,
which has its roots in military/government projects.


____
AI insiders are sounding the alarm.
[The existential AI threat is here — and some
AI leaders are fleeing]

We’re entering a ‘very violent technology cycle’ driven by AI
– Apollo Asset Management
.
___
Linus Torvalds Rejects MMC Changes For Linux 7.0 Cycle:
"Complete Garbage"
.


____
iOS 26.3—Update Now Warning Issued To All iPhone Users.

Windows 11 update KB5077181 is causing critical boot
loops for some users
.
____
NewsSamsung held S23, S24, S25 prices steady,
but Galaxy S26 changes the game
.



____
Three-quarters of US wind projects no longer viable: report.

Britain Doubles Down on Wind as Europe
Plans a Shared Clean Energy Grid
.

Energy Department Announces $175 Million to Modernize Coal Plants,
Keeping Affordable Reliable Power Online for Americans
.

Canada Blows A Big, Fat Offshore Wind Raspberry At Trump.

New Mexico Rebukes Federal Agency Over Nuclear Waste at Los Alamos.
.


Lenovo Ryzen 7 4700U. :)


Wednesday Febuary11 13:20
____
The false promise of a tech job.

Microsoft sets Copilot agents loose on your OneDrive files.

Something big is happening in AI — and most people will be blindsided.
____
hhe Market Hates Big Cloud Spending. The Data Says
The Market Is Wrong. UncoverAlpha
.

Hyperscaler spending to hit over $600 billion.
____
Microsoft 365 outage takes down admin center in North America.

NewsGoogle flags 1 billion at-risk Android users, Samsung fans included.
____
why is the ARM M33 is popular?

AI Overview

The ARM Cortex-M33 is popular because it offers an optimal
blend of high performance, low power consumption, and enhanced
security (TrustZone) based on the ARMv8-M architecture, making it
ideal for IoT and embedded applications. It provides roughly 20% better
performance than the Cortex-M4 and includes advanced features like
DSP, floating-point units, and hardware-level isolation, positioning it
as a versatile, future-proof, and secure replacement for earlier cores.

Key Reasons for Popularity:

Robust Security (TrustZone):
...
High Performance & Efficiency:
...
Advanced Features:
...
Advanced Features:
...
Broad Ecosystem & Migration:
...
Efficient Architecture: The 3-stage pipeline design ensures
fast instruction execution, which is suitable for real-time
control, IoT, and wearables.
___
do all LLMs use LLVM? AI Overview

No, not all Large Language Models (LLMs) use LLVM. While LLVM is a dominant
compiler infrastructure used to optimize code, and its subproject MLIR
(Multi-Level Intermediate Representation) is increasingly used for AI model
compilation, it is not universally adopted by all AI frameworks.


This video explains what LLVM is and why it's important:

...
In summary, LLVM is a common tool for compiling and optimizing the
code generated by LLMs (code generation tasks) or potentially optimizing
the execution of the models themselves via MLIR, but it is not a requirement
for the training or inference of all LLMs.

Hello Ace,

Project:
1 Connect nanocomputer [esp32, ARM M33, )+, ATmega, ...] running single
task simple OS to microcomputer such as Raspberry Pi Banana Pi,
Orange Pi, Le Potato, .. using Bluetooth.

2 The micros will act as slaves to the nanocomputer. 3 The micros will

A print messages from the nano to screen.

B micros will send text message to the nano.

C micros will send, on nano command, 1024 byte file segments to the nano.

4 micos will receive 1024 byte segments to be written to a file.

Also under consideration is communication with Android cell phones.

Perhaps you or some of you buddies may be interested in implementing
parts of this project?

Please send me your phone number so that we can arrange a time to talk.

bill 505-464-7123

hp sream 13 you guys gave me has been running 24/7 sing both Windows 10
and Ubuntu.





Several years purchases. :)
____
Markets French software maker Dassault Systèmes
plunges 18%, on track for worst day ever
.

Amazon limits on Claude Code frustrate employees, including
some who have to sell it to cloud customers
.

Windows Update ends support for printer drivers.

Linux 7.0 Bringing Mainline Support For The SpacemiT K3
RVA23 SoC, Qualcomm Kaanapali
.

Why so many companies are rethinking performance reviews.

Microsoft Releases Critical Windows 11 Cumulative Updates
for Versions 25H2, 24H2, and 23H2
.
 
Try 2.

Tuesday Febuary10 09:11
____
Living In The (LLM) Past.
____
are sata ands as doccking stations interchangeable?

AI Overview

SATA and SAS docking stations are not fully interchangeable,
although they share similar physical interfaces. The
compatibility is strictly one-way:

SATA and SAS docking stations are not fully interchangeable,
although they share similar physical interfaces. The compatibility
is strictly one-way:

SAS Docks (SAS/SATA Hybrid): Can accept both SAS and
SATA drives.

SATA Docks: Can only accept SATA drives.

Here is the breakdown of compatibility:

Key Takeaways

If you have a SAS drive, you must use a dedicated SAS dock
or an HBA (Host Bus Adapter) card.

SAS drives are generally for enterprise/server use, while SATA i
s for consumer use.

You cannot mix SAS and SATA drives in the same RAID array,
even in a compatible dock.




____
MapsMapped: The Global Cost of Living Index 2026.


 
Try 2.

Morday Febuary 9 067:82
____
Russian military scrambles to find Starlink
alternative after access blocked
.

____
The tech firms embracing a 72-hour working week.

Windows Wrap: Microsoft’s new Copilot Reminders
show us what not to do — abandon a once-great app
.

____
The Renewable Energy Transition Is
Running Out of Places to Go
.

AI Overview

The renewable energy transition is not running out of physical space,
but it is facing severe constraints in finding "socially" and "
environmentally" acceptable locations. Mounting resistance from local
communities, environmental concerns regarding large-scale developments,
and grid capacity limitations are making it harder to site new mega-projects.

Key challenges to the renewable expansion include:

Land Use Conflicts:
...
Infrastructure Constraints:
...
Continued Growth:
...
A successful, sustainable energy transition will require compromises, such
as better, more inclusive planning, and perhaps, as suggested by experts,
moving projects to more suitable locations rather than abandoning them.



Try 5.

Sunday Febuary 8 17:13
____|
AI Overview

Yes, Microsoft is progressively moving Hotmail users to the Outlook for
Windows interface and web experience as part of a long-term modernization
effort. While your @hotmail.com email address remains active and valid, the
underlying service, interface, and application are being updated to Outlook,
with automatic migrations for many users starting in 2025.

Key details regarding the transition:


____
Texas Instruments unveils MSPM33C321A mixed-signal
Cortex-M33 microcontroller with 256KB SRAM, 1MB flash
.

do flash controllers use a operating system?

AI Overview

Flash controllers generally do not use a full operating system like Windows
or Linux, but they run specialized, low-level firmware or a minimal, embedded
real-time operating system (RTOS). This firmware, often referred to as a "Flash OS," manages the Flash Transition Layer (FTL), which handles wear leveling,
data mapping, and error correction.

Firmware vs. Operating System:

Why do Bluetooth mice and keyboards work so well with Android,
Windows 11 and Ubuntu now?

AI Overview

Bluetooth mice and keyboards work seamlessly across Android,
Windows 11, and Ubuntu due to matured, standardized protocols
(Bluetooth HID), improved driver support, and better cross-platform
compatibility. Enhanced OS integration, particularly in Windows 11's
automatic updates and Linux's improved kernel support, reduces
manual setup and connection issues.
...
In essence, while it is not a traditional "operating system," the
firmware provides necessary functions to bridge the gap between
the host computer and raw flash storage
.
...
However, occasional issues like lag or disconnection can still occur
due to interference from other wireless devices, as mentioned in the
Lenovo Forums
.

or what do c++ CONSTRUCTORS and DESTRUCTORS do
and how are they iplemented?

AI Overview

C++ constructors initialize objects when they are created, and destructors
clean up resources when objects are destroyed. The

Constructors

A constructor is a special member function that is automatically called when
an object of a class is created. It is used to initialize the object's data
members and establish a valid initial state.

Key Characteristics
...
Destructors

A destructor is a special member function that is automatically called when
an object goes out of scope or is explicitly deleted. Its primary purpose is
to perform necessary cleanup operations, such as deallocating dynamically
allocated memory, closing file handles, or releasing network connections.

Key Characteristics

Implementation Example.
___
Microsoft's $625 Billion AI Flywheel.
____
Dan Ives Says Software Selloff Is Worst He's Seen
In 25 Years As Microsoft, Salesforce Face Brutal AI Reckoning
.

Why I'm divorcing Big Tech and moving
all my data to open source alternatives
.
__
Think AWS Is Losing To Azure and Google Cloud? You Need
To Hear This Quote From Amazon CEO Andy Jassy
.
Try 1.

Saturday Febuary 7 16:39
____
Ali Vakili Rad: The perfect murder and an imperfect getaway.

Did US provice decrypted messages that led to Vakili Rads conviction?.

No Google AI response. BUT

NSA, Crypto AG, and the Iraq-Iran Conflict.
____
South Korean crypto firm accidentally sends $44 billion in bitcoin to users.

____
is quora a source of mis/disinformation?

AI Overview

Yes, Quora can be a source of misinformation and disinformation,
as it is a crowdsourced, user-generated content platform where
anyone can answer questions without mandatory, real-time fact-checking.
While industry experts often contribute, the lack of rigorous verification Quora include:
means false, biased, or misleading information can be shared.

Key aspects regarding mis/disinformation on Quora include:

Crowdsourced Nature: Because it relies on community answers,
the accuracy of information can vary significantly.

Expert vs. User Input: While experts use the platform, there is no guarantee
that top-voted answers are factually correct.

Platform Risks: Like many user-driven forums, it can be used to
spread disinformation, necessitating critical evaluation by users.

To avoid misinformation, users should verify information found on
Quora with reliable, authoritative sources.


____
Cloud Giants Recent Events IBM (company) Tech History Component Manufacturing Cloud Computing Core Products + 5 Are today's cloud giants making their own components to run their core products just like IBM did in the 1960s? Profile photo for William Payne William Payne Former MTS, Retired at Sandia National Laboratories (1980–1992)58m

AI slop?

AI Overview

Yes, today’s major cloud giants—Alphabet (Google), Amazon (AWS), Microsoft, and Meta—are increasingly mimicking IBM’s 1960s strategy of vertical integration by designing their own custom silicon, servers, and networking hardware to power their core cloud and AI products. Just as IBM developed its proprietary System/360 architecture in the 1960s to control the entire technology stack, these modern "hyperscalers" are developing in-house components to optimize performance, reduce dependence on third-party suppliers like Nvidia, and improve energy efficiency. 1960s vs. Today: The Parallel Strategies

1960s IBM ("Big Blue"): Introduced the System/360, a comprehensive ecosystem of proprietary hardware, software, and services that locked customers into their ecosystem. 2020s Cloud Giants: Developing custom AI chips (ASICs), networking gear, and data center hardware to create "walled gardens" optimized for specific workloads like training large language models.

Key Components Cloud Giants are Making AI Accelerators/Chips: Google has Tensor Processing Units (TPUs), Amazon has Trainium and Inferentia chips, and Microsoft introduced the Maia 100/200 AI chips. Networking Gear: Hyperscalers are creating custom network switches and interface cards to handle massive data throughput. Custom Processors: Companies like Amazon are designing ARM-based server chips (Graviton) to reduce reliance on Intel and AMD. Data Center Infrastructure: Meta (META) and others design their own server racks and power systems to maximize efficiency.

Drivers of the "New IBM" Strategy The AI Boom & Cost Control: As AI models require intense computational power, designing custom silicon (like Google's TPU) allows companies to run workloads more cheaply and efficiently than relying solely on high-priced third-party GPUs. Supply Chain Control: By designing their own components, cloud providers reduce their vulnerability to hardware shortages and vendor lock-in. Performance Optimization: Tailoring hardware specifically for their software stack results in better, faster performance for cloud services.

While these companies still buy massive amounts of hardware from traditional vendors, the strategic push is undeniably towards in-house development to dominate the AI-driven infrastructure of the future. Big Tech companies are starting to look like IBM in the 1960sFeb 7, 2026 — Big Tech "hyperscalers" Alphabet (GOOG, GOOGL), Meta (META), Microsoft (MSFT), and Amazon (AMZN) are all in various stages of deve...News, Politics, Sports, Mail & Latest Headlines·
Big Tech firms are beginning to resemble IBM during the 1960sFeb 6, 2026 — The Shift Toward Vertical Integration in the AI Era. As the competition to lead the rapidly expanding artificial intelligence sect...Bitget Microsoft Challenges GPU Dominance with Maia 200: A New Era of ‘ ...Feb 5, 2026 —

Microsoft Challenges GPU ...
____
what is Bluetooth speed in bytes per second?

AI Overview.

Bluetooth speeds typically range from about 15.6 KB/s to 375 KB/s (kilobytes
per second) for Low Energy, and up to roughly 300 KB/s for Basic/Enhanced
Rate (EDR) in practical applications. While theoretical speeds are higher (1–3 Mbps),
actual, real-world data transfer speeds are limited by protocol overhead, environmental
interference, and device capabilities, often resulting in speeds well below 1 megabyte
per
second.
Common Bluetooth Transfer Speeds in Bytes per Second.



____
What wind turbine issues reqires replace,ent of fiberglass blades?

AI Overview

Fiberglass wind turbine blades require replacement due to severe structural
failures, such as deep cracks, delamination (layers separating), or
catastrophic damage from lightning or, in some cases, extreme weather.
Other major, non-repairable issues include structural root failure, severe l
eading-edge erosion that cannot be repaired, and reaching the end of
their 20-25 year operational lifespan.

Key issues leading to replacement include:

Structural Cracks and Splits:
...
Delamination:
...
Severe Leading-Edge Erosion:
...
End-of-Life/Repowering: Older blades are frequently replaced
to install larger, more efficient blades to increase power output.

These issues, if left unaddressed, can lead to complete blade failure.
____
for what are the electrical differences between a
usb typ e a and a usb typle B cable?

AI Overview

USB Type-A and Type-B connectors are electrically identical regarding signal
mapping (\(V_{BUS}\), GND, D+, D-), as they are designed for the same
data transfer and power delivery protocols. The key differences are
purely physical (shape) and functional (defining the host/device relationship),
with Type-A going to the host (PC) and Type-B to the peripheral (printer). 

Key Electrical and Design Distinctions:
...
Essentially, the electrical specifications—voltage, amperage limits, and
data speeds—are identical between the corresponding USB generations
(e.g., 2.0 A vs. 2.0 B).
Essentially, the electrical specifications—voltage, amperage limits,
and data speeds—are identical between the corresponding USB
generations (e.g., 2.0 A vs. 2.0 B).
____
TechnologyRanked: The Jobs Most Exposed to
Generative AI, According to Microsof
t.

Will Quora be an AI casulty?
AI Overview

Quora is not necessarily a "casualty" of AI in the sense of imminent
shutdown, but it is undergoing a fundamental transformation that
has led many users to believe its original, community-driven form is
dying. Rather than being killed by AI, Quora has actively embraced it,
aiming to evolve into a platform that mixes human expertise with
automated content.

Here is an analysis of Quora’s future in the age of AI:
...
Conclusion Quora is unlikely to disappear immediately, but "Classic Quora"
is likely becoming a casualty of AI. The platform is morphing into a new,
heavily automated, and more chaotic entity where AI-generated content
drives traffic, while human-written, nuanced content becomes harder to find.
Whether this new form of Quora can maintain a loyal user base is the
central question for its future.

Should I be using WordPres instead of HotMetal Pro 6.0?

AI Overview

Yes, you should strongly consider switching to WordPress instead of using
HoTMetaL Pro 6.0 for modern web development.

HoTMetaL Pro 6.0 was a
popular WYSIWYG (What You See Is What You Get) HTML editor in the late
1990s and early 2000s, specialized for HTML 4.0. Today, it is obsolete, meaning
it does not support modern web standards, responsiveness, or security,
making it impractical for building contemporary websites. Here is a
breakdown of why WordPress is the better choice:

Why Switch to WordPress

Modern Standards & Responsiveness:
,,,
Ease of Use & Updates:
...
When to Keep Using HoTMetaL (Only if...)
...
For any new, modern, or frequently updated website, WordPress (or
another modern CMS) is the industry standard.

What dependencies does WordPress rely on?.

Core Server-Side Dependencies [HAHAHA++?]
...
Internal WordPress Dependencies
...
Developer Libraries: For more complex projects, developers often
use the PHP dependency manager Composer to explicitly declare
and manage external PHP libraries or specific versions of WordPress
core, themes, and plugins. This ensures consistent development
and production environments.

Has WordPress been hacked?

AI Overview

Yes, thousands of individual WordPress sites are frequently hacked, often due
to vulnerabilities in outdated plugins, themes, or weak passwords. Recent
reports show threats like the UNC5142 group using blockchain-based "
EtherHiding" to infect sites, and over 40,000 sites affected by new,
separate malware, highlighting ongoing security risks for the popular,
targeted platform.

Common Attack Methods:

...
What to do if hacked: Immediately put the site into maintenance mode,
update all software, remove unknown users, and scan for malware.
____


Sixteen Claude AI agents working together created a new C compiler.

Elon Musk makes a bold prediction, says
‘In 36 months, cheap ...
.
____
If You must interview 10 people for a C++ position. What 5 very
difficult questions would you ask them?

AI Overview

I would ask the following five questions to probe deep understanding
and practical application of C++ concepts: ____|
If You must interview 10 people for a C++ position. What 5 very
difficult questions would you ask them?

AI Overview

I would ask the following five questions to probe deep understanding
and practical application of C++ concepts:
...
Rationale: This is a very advanced topic that distinguishes expert candidates
who understand the mechanics of how C++ templates resolve types
and constraints, especially before the introduction of C++20 Concepts.

___
Galaxy S26 Ultra pre-orders could be a big downgrade.
 
Try 1.

Friday Febuary 6 15:27

____

do managers riset to their level of incompetence?

AI Overview

Yes, many managers rise to their level of incompetence, a phenomenon
known as the Peter Principle. This occurs because organizations frequently
promote high-performing employees into managerial roles based on their
success in previous, different, roles, rather than for the skills required for
the new position.

Key Aspects of the Peter Principle:
...
The Solution: Companies can combat this by providing better training, creating
"parallel growth paths" (allowing advancement without managing others),
and assessing if a top worker has management potential before promoting
them
.

Is an attempt to manage a teamof 10x programmers possible?

AI Overview

Yes, it is possible to manage a team of high-performing ("10x") programmers,
but it requires a shift from traditional micromanagement to servant leadership,
structural support, and psychological safety.

While some debate the existence of "10x" individuals, most experts agree
that high-performing teams exist and that they require a specific
management style to prevent burnout, ego clashes, and technical debt.

Here is how to manage a team of 10x programmers effectively, based on i
ndustry best practices:
...
In short, you manage 10x programmers by building a 10x culture, not by
trying to out-code them.

____
Amazon shares fall as it joins Big Tech AI spending spree.

Mark Zuckerberg under fire after ex-employee makes
startling claims: 'Will be a total loss
.

____
Amazon's stock sinks despite upbeat cloud growth.
____
WHICH NANOCOMPUTERS HAVE DUAL DATA POINTERS?

AI Overview

The Dallas 80C320 (and related DS80C320) microcontroller is explicitly
noted for having a dual data pointer feature. This feature allows for
faster program execution by providing two data pointers (DPTR
and DPTR1), enabling the selection between them via a special
function register (DPS).

While not characterized as having dual data pointers in the
traditional 8051 sense, the NVIDIA Jetson Nano is a widely used small
AI computer designed for parallel computing, IoT data mining, and
high-resolution sensor data processing.

Key Findings:


WHAT PRODUCTS DO ATMEGA HAVE?

AI Overview

ATmega is a popular family of 8-bit AVR microcontrollers (MCUs)
developed by Atmel, which was acquired by Microchip Technology
in 2016. These microcontrollers are widely used in embedded systems,
notably serving as the heart of many Arduino boards.

Here are the main
types of products and series within the ATmega line
:

Cubie A7S – A compact Allwinner A733 SBC with USB-C DisplayPort,
GbE, WiFi 6, PCIe Gen3 FFC connector, GPIO headers
.

AI Overview

Based on the provided search results, the Radxa Cubie A7S (and
related models like the A7Z and A7A) is a new single-board computer
(SBC) produced by Radxa.

Here are the confirmed vendors and distributors where
Radxa products are available
:
...
The Cubie A7 series (A7A/A7Z/A7S) is part of the Radxa ecosystem,
which focuses on Allwinner-based compact SBCs.

Ubuntu To Support The SpacemiT K3 As One Of
The First RISC-V RVA23 SoCs
.

____
Down 28% From Its Highs, Is Microsoft Stock a Buy?.

Amazon Shares Plunge After Q4 Earnings Results
And Aggressive 2026 AI Spending Forecast
.

Crypto crash accelerates as investors flee risky assets.

which cloud and data centers does bitcoin use?

AI Overview

Bitcoin operates on a decentralized network, not a specific cloud provider,
but mining relies on massive, specialized, and often Texas-based data
centers (e.g., Riot Platforms, Marathon Digital). Major firms like IREN (formerly
Iris Energy), Cipher Mining, and Core Scientific operate these high-power,
often liquid-cooled, facilities. Recently, many of these centers are pivoting to
support AI, partnering with companies like Microsoft.

Key data center operators and locations for Bitcoin infrastructure include:

Texas: The hub for US mining, with sites operated by Riot Platforms, Cipher
Mining, and IREN.

Marathon Digital Holdings: Operates its own sites in the US and a 250 MW,
immersion-cooled facility in Abu Dhabi.

Crusoe Energy Systems: Focuses on using flared gas for data centers,
now heavily pivoting to AI infrastructure.

International Sites: Iceland and Kazakhstan were significant, although
focus has shifted heavily toward the US, particularly with the 2024 halving.

The industry is rapidly shifting from pure mining to AI, utilizing existing
high-density power and cooling infrastructure to host GPUs, particularly
as miners diversify revenue streams.

Bitcoin Is Crashing So Hard That Miners Are Unplugging Their Equipment.
____
what is amazon ceo jassy spendiong $200B on?

AI Overview

Based on the Q4 2025 earnings report released in February 2026,
Amazon CEO Andy Jassy announced plans to spend $200 billion in
capital expenditures (CapEx) in 2026, a significant increase from
the roughly $131 billion spent in 2025.

This record-breaking, multi-billion dollar investment is primarily
focused on accelerating Amazon’s infrastructure to meet explosive,
AI-driven demand.

Here is a breakdown of what that $200B is being spent on:

Generative AI and Data Centers: The vast majority of the
spending is directed towards expanding data centers for Amazon
Web Services (AWS) to meet high demand for AI computing capacity.
Jassy stated that they are "monetizing capacity as fast as we
can install it".

Robotics and Logistics Automation: Heavy investment in automation
for fulfillment centers to support faster shipping speeds.

Low Earth Orbit Satellites: Funding for Project Kuiper, Amazon’s initiative
to provide satellite-based internet, with roughly $1 billion in specifically
higher costs flagged for this project in 2026.

Jassy defended the aggressive investment as a "seminal opportunity"
to reshape the business, anticipating strong long-term returns on invested
capital. While the announcement initially caused Amazon's stock to drop
due to concerns about short-term profit margins, the company emphasized
that this is a demand-led spending spree, not a speculative one.

Amazon shocked Wall Street with its 2026 spending plan.
Which companies could benefit?
.

Why a new AI tool hammered some software stocks this week.
 
____
State of Texas sues company accused of illegally dumping
thousands of wind turbine blades in Sweetwater
.

AI Overview

Global Fiberglass Solutions, Inc. (often referred to as GFS) has been
sued by the State of Texas for allegedly abandoning and illegally
dumping thousands of wind turbine blades outside Sweetwater,
Texas.

Key details regarding the situation:
,,,
Global Fiberglass Solutions, based in Washington state, had previously
claimed it would shred the blades for recycling, but failed to do so.

Overreliance on Renewables Leaves Americans Out in the Cold.
Try 1.

Thursday Febuary 5 18:13
_______
Bitcoin’s latest selloff is shattering many of its most enduring myths.
Bitcoin gets a zero price target in wake of Burry warning.

Azure outage disrupts VMs and identity services for over 10 hours..

___
SoftBank slips 7% as Arm Holdings licensing
revenues lag Wall Street expectations
.





AI Overview

The ESP32-S3FH4R2 is a high-performance 2.4 GHz Wi-Fi and
Bluetooth 5 (LE) SoC featuring a 240MHz dual-core
Xtensa LX7 processor. It includes 4MB embedded Flash,
2MB PSRAM, and 512KB SRAM. Designed for AI/IoT, it
supports USB Serial/JTAG, has 34+ GPIOs, and runs 32-bit
instructions. Core

Specifications



AI Overview

The article titled "Graduate education: The Ph.D. glut: response and rebuttal," which discussed the Ph.D. glut
in the context of computer science, was written by William H. Payne. It was published in the
Communications of the ACM (CACM) in March 1973.

ESP32-S3-Zero.

____
AI Overview

Android is an open-source operating system based on a
modified Linux kernel. Its core system components,
hardware abstraction layers (HAL), and runtime libraries
are primarily written in C and C++ for high performance. The
application framework and system user interface (UI) are
built using Java and Kotlin, with Kotlin now being the preferred
language for modern app development.

Key details about the Android OS structure:
Core OS & Drivers:
...
Android Runtime (ART):
...
Application Framework:
...
Native Development Kit (NDK):
....
Kernel: Modified Linux kernel.
Android is developed by the Open Handset
Alliance, led by Google.


can android source code be disassembled into
platform machine code?

AI Overview

Yes, Android source code, including compiled apps (APKs),
can be disassembled or decompiled into intermediate
representation (Smali/bytecode) or disassembled into
platform machine code (ARM, x86) using tools like APKTool,
JADX, or Android-Disassembler. This process allows for
analyzing, debugging, or modifying the code, though it
is usually referred to as reverse engineering.

Key details regarding Android code disassembly:

Methodology: Android apps (APKs) contain classes.dex files
which are disassembled into Smali code (an assembly-like
format) using tools like APKTool, or converted back to
readable Java code with JADX.

Native Code (.so files): Native C/C++ code, often found in .so
files, can be disassembled into machine code (e.g., ARM) using
tools like Ghidra, IDA Pro, or Android-Disassembler on GitHub.

Modification: Once disassembled into Smali or analyzed via
machine code, the code can be modified and recompiled.

Limitations: While you can get close to the original source
code, decompiled code is rarely identical to the original;
it is often less readable, similar to a book with removed
punctuation and reordered content.

It is important to note that reverse engineering, decompiling,
or modifying applications without permission may breach
license agreements.

AI Overview

As of 2025, the Android Open Source Project (AOSP) consists of
over 250 million total lines of code, with approximately 92 million l
ines of code running on an average device, including C, C++, Java, Kotlin,
and Rust. This makes it one of the largest and most complex software
projects in existence, having grown significantly from earlier estimates of
12-15 million lines.

Key Data on Android Codebase Size:
...
The codebase is constantly expanding with each new Android release,
often adding tens of millions of lines of code between versions.

Runs Android 14 ... well.



Up to 1 TB of sd memory. :)

____
SanDisk and Seagate: Analysts Bang the Drum on
the Hottest Tech Stocks Today
.
____
AWS intruder achieved admin access in under 10 minutes
thanks to AI assist, researchers say
.
____
Trillion-Dollar Tech Wipeout Ensnares
All Stocks in AI’s Pathh
.

Microsoft releases urgent Office patch.
Russian-state hackers pounce
.
____
AI Overview

The placement of the Most Significant Bit (MSB) on the far left
of a byte is primarily a result of adhering to standard mathematical
positional notation, similar to how we write decimal numbers (where
the hundreds place is to the left of the tens place). While it may seem
counter-intuitive to some "little-endian" storage conventions, this MSB-left
convention is nearly universal for bits, unlike the varying byte-order
conventions (big-endian/little-endian) used in memory.

Here is why the MSB is on the far left:

Mathematical Convention:
...
Sign-Bit Consistency:
,,,
Bit-Shifting Alignment:
...
Historical Development:
...
Addressing the Consistency Question:
...
The "left-to-right" convention applies to both the ordering
of bits inside a byte and the convention of writing memory
addresses (lowest at top/left, highest at bottom/right).
Thus, placing the MSB on the left is actually perfectly
consistent with storing the MSB of a larger number at the
lowest memory address.

___
The ‘weird’ things that happened when
Clickhouse replaced C++ with Rust
.

AI Overview

ClickHouse's partial shift to Rust has faced several technical
and practical issues related to interoperability with the existing
C++ codebase, a significant increase in dependencies, and
challenges with Rust's error handling in a server environment.

Specific issues and challenges include:

Complex Interoperability (FFI): Mixin
,,,
"Panic" Behavior in Libraries:
...
Dependency Explosion:
...
Build System and Sanitizer Conflicts:
...
Cross-Compilation Issues:
...
Learning Curve and Hiring:
...
Despite these issues, ClickHouse continues to use an
incremental approach to integrate Rust where it offers
concrete advantages, rather than a full rewrite of its
1.5 million line C++ codebase.

Microsoft's New Open-Source Project: LiteBox As
A Rust-Based Sandboxing Library OS
.
___
Texas Instruments strikes $7.5 billion deal for
Silicon Labs to boost wireless footprint
.
____
Western Digital's Innovation Day has implications
for Seagate, BNP Paribas says
.

____
Stifel predicts bitcoin crash to $38,000.
Yes, you read it right
.

Microsoft Plummets While Meta Platforms Soars.
Which Is the Better Buy Now?
.


Shares of Arm plunge in after hours trading
amid concerns over smartphone chips
.
.
 ____
US Solar Industry Innovators Are Quie
t-Quitting US Energy Policy
.
Try 4.

Wednesday Febuary 4 15:44
____
Microsoft’s Pivotal AI Product Is Running Into Big Problems.
____
Big Short’ investor Michael Burry warns bitcoin plunge
could trigger $1 billion gold, silver selloff
.

AI Overview

Yes, Bitcoin is a massive consumer of electricity, water, and specialized
high-cost hardware. As of 2025–2026, it consumes over 175–211 TWh
annually—roughly 0.5%–0.83% of global electricity—rivaling the usage of
small nations like Thailand. This energy-intensive process is necessary
for Proof-of-Work, utilizing specialized ASICs for calculations.

Key resource consumption aspects include:

Electricity: The network consumes electricity comparable to countries
like Argentina, generating significant carbon emissions.

Water: Massive amounts of water are used for cooling high-performance
mining rigs, with estimates suggesting a single transaction can consume
thousands of liters of water.

Hardware: Mining relies on specialized, expensive, high-wattage
computing devices (ASICs) that quickly become obsolete, contributing
to significant electronic waste.

The environmental impact is significant, with studies indicating the
carbon footprint is comparable to that of nations like Greece.
____
Waveshare’s New $27 ESP32-S3 Board Features
a Unique ePaper-Like RLCD
.

AI Overview

Yes, the ESP32-S3 is designed as a low-power, high-performance
System-on-Chip (SoC) specifically aimed at AIoT (Artificial Intelligence
of Things) applications. It balances high-speed, dual-core processing
with efficient, low-power consumption through advanced power
management modes.

Here is a breakdown of why the ESP32-S3 fits this description:
...

Performance vs. Consumption While peak power consumption is
similar to previous models, the S3's ability to complete tasks
faster means it often has lower average power consumption for complex,
intermittent tasks. However, for "always-on" high-performance, it may
consume more power compared to, for example, the ESP32-C3 or
dedicated ultra-low-power microcontrollers (like nRF52).


In summary, the ESP32-S3 is a high-performance choice when
AI acceleration and high connectivity are needed, provided its
power-saving features are properly utilized.

Data centers in space makes no sense (civai.org).

Microsoft and ServiceNow's exploitable agents reveal a
growing - and preventable - AI security crisis
.



The Global Power Sector Faces a Reckoning in 2026.



Symbian On Nokia Lives Again, In 2026.



https://www.quora.com/Is-WebAssembly-virtual-machine-a-von-Neumann-or-a-Harward-architecture-or-is-it-something-else.




___
Was i misinfomred in 1958 that a Diophantine equation was limited to integer only solutions?

AI Overview

In 1958, the definition you were taught was the standard modern convention,
though it was technically a narrow interpretation of the term’s historical roots.
While the "correct" definition depends on whether you follow historical precedent
or modern technical usage, you were not so much "misinformed" as you were
taught the specific version used in Number Theory.

The Two Definitions
...
Conclusion: You were taught the definition required for 20th-century logic and
number theory, which remains the dominant definition today. However, if you
were reading the original Greek texts of Diophantus, your 1958 instructor
would have been "wrong" by historical standards.
 
Try 2.


windsca mmers29 too targe! :(


Tuesday Febuary 3 16:40
____
Sorry, Micron: Smart Money Is Moving To Sandisk (Here's Why).

AI Overview

Yes, significant issues with cloud computing—specifically rising, unpredictable
costs and reliability concerns—are driving a trend, often referred to as a
"cloud reset" or repatriation, where organizations and individuals are adopting
hybrid, local, or on-premises terabyte storage solutions. While cloud remains
popular for its scalability, many are finding that long-term subscription fees,
data egress charges, and the risks of vendor lock-in make local Network
Attached Storage (NAS) or direct-attached, multi-terabyte drives more
cost-effective and secure for large, static datasets.

Key Drivers for Shifting to Local Storage

____
Raspberry Pi boards are too expensive
(and big) for simple projects
.

____

This update posted from $85 Lenovo laptop.

Gigabit WiFi!






____
User reactions make it clear Microsoft’s real AI problem
on Windows 11 isn’t the tech — it’s trust
.

is ai use in wiindows 11 causing issues?

AI Overview

Yes, AI features in Windows 11, particularly Agentic AI and Copilot,
are causing reported issues as of early 2026, including system
instability, reduced battery life, and security concerns. Users have
reported that these background AI processes consume excessive
resources, leading Microsoft to scale back some integrations.

Key issues and concerns identified include:

Security Risks:
...
System Bugs:
...
Functional Limitations:
...
Due to these issues, Microsoft is reportedly scaling
back some "AI everywhere" plans to focus on
core system stability.
____
Fabrinet targets up to $1.2B Q3 revenue as
capacity and HPC ramp drive record growth
.

what is fabrinet?

AI Overview

Fabrinet is a leading independent contract manufacturer providing
advanced optical, electro-mechanical, and electronic manufacturing
services (EMS) to original equipment manufacturers (OEMs) of
complex products. Founded in 2000, it specializes in high-complexity,
high-mix, and low-volume production, serving industries like optical
communication, networking, automotive, and medical.


Key details about Fabrinet include:

Core Services:
...
Specialization:
...
Market Focus:
...
inancial Status:
...
Fabrinet is considered a trusted partner for creating complex,
customized, and high-precision products, often bridging
the gap between product design and volume manufacturing.

Memory costs impacting smartphone SoC space: Counterpoint.
____
what is the square root of 2 in binary and how was it computed?

AI Overview

The square root of 2 in binary is approximately 1.01101010000010011110....
Because \(\sqrt{2}\) is an irrational number, its binary expansion is infinite
and does not repeat. 
...
Answer:

The square root of 2 in binary is 1.0110101000001001111001100110011111110011... (truncated to 40 fractional bits). It is computed either manually through a digit-by-digit
"long division" method or computationally using iterative algorithms like Newton's Method.
____

I tried a Claude Code alternative that's local, open source, and completely free
- how it works
.
    I was curious if Block's Goose agent, ...
___
Ranked: The World’s Top Economies in 1980 vs. 2025.

The Countries Driving China’s $1.2T Trade Surplus. ____


Windows 11 running on $130 Walmaart Lenovo N50300 Pentium silver 4/128 GB replacing Ubuntu.

$96 Best Buy Lenovo N4020 4/64 GB ruinning Winodws 10 1909 and Hotmetal Pro 6.0.

Previously ran Ubuntu.




Runnin Chia Ubuntu on ARM A53 Allwinnder 618H ... for moth with no crashed.




Orange Pi shares screen with Lenovo N4020 4/64 GB running Windows 11.


 ____
Why China is building so many coal plants
despite its solar and wind boom
.

The Net Zero Paradox No One Admits.

Judge Hands Trump a Fifth Loss in His Effort
to Halt Offshore Wind Projects
.
Try 1.


Mounday Febuary 2 18:00
___
Elon Musk's SpaceX to merge with xAI.

Amazon announces 16,000 job cuts across organization.

Why Microsoft Access is dying (and what is replacing it).

The Intel 286 CPU was introduced on this day in 1982 — 16-bit x86
chip introduced protected mode memory, and would power the IBM
PC/AT and a tidal wave of clones
.
____
India courts Big Tech with long-term
tax breaks as it doubles down on AI ambitions
.

After laying off 1500 people, losing $88 billion; Meta CFO Susan Li
tells analyst where the Reality Labs division will focus on
.

Oracle Slides on $50 Billion Cloud Funding Plan.
____

Windows 10 22H2 appears to have deleted/hidden Hotmetal Pro 6
from flash drive. $95 Best Buy Lenovo N4020 4/64 GB Windows
10 1909 Ubuntu replacement resultedin 22H2 Miocroasft upgrade.
No Hotmetal setup.exe on flash. Ubuntu reinstalled and 1909 installed
with forced stop of 22H2 upgrade. Hotmetal now running fusisng
backup flash. Is 22H2 used to damage Lenovo laptop?

AI Overview

Based on the details provided, the Windows 10 22H2 update
did not likely "damage" the Lenovo laptop hardware itself,
but it did cause a severe compatibility issue that resulted
in data/file loss on your external flash drive. The 22H2 update
frequently causes issues with older software, and in your case,
it appears to have either hidden or deleted the Hotmetal files,
possibly due to it flagging them as "incompatible" or "untrusted".

Here is a breakdown of what likely occurred:
22H2 Conflict:
...
Flash Drive Issues: [HAHAHA?]
...
Forced Updates:
...
No Permanent Damage:
,,,
Steps to prevent this in the future:

Unplug external drives
during any major Windows feature update (like the 22H2 upgrade).

Keep Windows Updates paused
...
Use Tools to Hide Updates:
...
In summary, the 22H2 update caused software-level issues
and data loss on your flash drive, rather than permanent,
physical damage to the laptop. Using a backup was the correct approach.
____
GNU Hurd Is "Almost There" With x86_64,
SMP & ~75% Of Debian Packages Building
.
____
S&P 500 futures fall to start week on
bitcoin decline, Nvidia pullback: Live updates
.

Oracle Mulls Laying Off 30,000 Employees: Report.

Tech Oracle rises 5% after announcing $50 billion
fundraising plans. Here’s why
.

Oracle expects to raise $45B-$50B of gross
cash proceeds in 2026
.

Microsoft Is Tanking. What's Behind the Decline?.

Microsoft sends Wall Street a $625 billion message.

Microsoft confirms more Windows PCs
cannot shut down after recent updates
.
____
Notepad++ hijacked by state-sponsored
actors (notepad-plus-plus.org)
.
___
Galaxy S26 Ultra vs S25 Ultra: Every new design upgrade.
 
Try 2.


Unable to pause update on Lenovo Ryzen 7 4700U running Windows 10 1909.



why is Microsoft not allowing to set update pause date on some Windows 10 1909 laptoops?


AI Overview

Microsoft restricts pausing updates on older Windows 10 versions, including 1909, because
the version is well past its support lifecycle, forcing updates for security reasons. Other reasons
include hitting the maximum 35-day pause limit, bugs, or intentional pressure to upgrade
to Windows 11 on non-ESU devices.

End of Support: Windows 10, version 1909, is considered obsolete, as support for most
editions ended years ago.
,,,
Maximum Pause Limit Reached:
...
Non-ESU Restrictions:
...
Workarounds

If the option is grayed out, you may need to:

Use the Windows Update troubleshooter.
Ensure the system has not already hit the maximum pause limit.

Update to a supported version (e.g., 22H2) or upgrade to
Windows 11 for full control.
...

Sunday JFebuary 1 08:34
____
Bitcoin falls below $80,000, continuing
decline as liquidity worries mount
.

does both bitcoin and AI have electricity and water consumption i
ssues which which may be raising customers' bills?

AI Overview

Yes, both Bitcoin mining and Artificial Intelligence (AI)
data centers have significant electricity and water
consumption issues that are currently placing upward
pressure on utility bills for consumers and businesses.
The rapid growth of both industries is straining power grids,
with estimates suggesting that energy-hungry data centers
and crypto mines could contribute to an 8% increase in
average U.S. electricity bills by 2030.

Impact of AI on Utilities

Electricity Consumption:
...
Water Usage:
...
Cost Shift:
...
Impact of Bitcoin Mining on Utilities

Electricity Demand:
...
Water Usage:
...
Water Usage:
...
Grid Strain:
...
Summary of Bill Increases Data centers and
crypto mining are driving up electricity prices,
particularly in the West and Northeast, where
costs have increased faster than in other areas.
In areas with heavy data center activity, such
as
parts of Maryland and Ohio, increased demand
is estimated to add $16 to $18 more per
month to the average residential bill.
____
what is computer math?

AI Overview

Computer math, often referred to as computational mathematics,
involves using advanced mathematical techniques, algorithms, and
logic to enable computers to solve complex problems efficiently and
accurately. It bridges mathematics and computer science to handle
tasks like data modeling, numerical analysis, simulation, and
algorithm design.

Key aspects of computer math include:

Binary Math:
...
Numerical Methods & Analysis:
...
Discrete Mathematics:
...
Discrete Mathematics:
...
Computer Algebra (Symbolic Computation):
...
Applications:
...
In short, computer math covers the mathematical
principles required for programming, algorithm
design, and using computers to solve problems
that are too time-consuming for humans.

r can the square root to two be represented by
two relatively prime [no common factors].none
divided by the other Show original
results

AI Overview

No, the square root of two (\(\sqrt{2}\)) cannot be
represented as a fraction of two integers that are
relatively prime (i.e., having no common factors) and
not divisible by one another, such as \(\frac{a}{b}\).
This is because \(\sqrt{2}\) is an irrational number,
meaning it cannot be expressed as a ratio of
wo integers. 
...
Therefore, \(\sqrt{2}\) cannot be expressed as a
fraction of two integers. 
.

 
Try 1.



Saturday January 31 16:51
____
AI Overview !!!

Low-speed wind can be funneled into high-speed wind to power
turbines primarily through wind concentrator technologies that
leverage the Venturi effect (accelerating fluid through a narrowed
passage). These systems capture air over a large area,
compress it, and force it through a smaller area where the
turbine is located, accelerating the airflow by several times
the
input speed.

INVELOX (Increased Velocity) Technology

Here are the primary methods for funneling and accelerating
l INVELOX (Increased Velocity) Technology
...
. Shrouded or Diffuser-Augmented Wind Turbines (DAWT)
...
Wind Concentrator Systems (Wind Lenses)
...
. Solar-Augmented Wind Systems (Solar Chimneys)
....
Architectural & Landscape Integration
...
Summary of Benefits for Low Wind Areas.

____
Rufus 4.12.2314.

Crouching Typewriter, Hidden PC.
____
Ditch monthly cloud fees with this secure
Dropbox alternative for $99.97
.
____
what are the differences between 1 Western math
2 Islam math and 3 computer math?

AI Overview

The differences between Western mathematics, Islamic
(Golden Age) mathematics, and computer mathematics
lie primarily in their historical, cultural, and technical
motivations. While modern "Western" math is largely
global, it differs from historical Islamic math in its axiomatic,
formal nature, and from computer math in its reliance on
abstraction over pure computational speed.

Here is a breakdown of the differences:

Western Mathematics (Modern/Traditional)
...
Islamic Mathematics (Golden Age, 8th–15th Century)
...
Computer Mathematics (Computational Math)
...
Summary Comparison Table
...
ote: While historical Islamic math is distinct, it is important
to note that modern mathematics is an international,
global discipline that has absorbed contributions from all cultures.
____
Developers say AI coding tools work—
and that’s precisely what worries them
.

Meta Misread the Future Twice. Now They’re Sitting
on a Golden Egg, But Don’t Know It
.
__
How ‘friendship’ with Sam Altman is one of the biggest
reasons behind Microsoft's $360 billion crash in one
day How ‘friendship’ with Sam Altman is one of the
biggest reasons behind Microsoft's $360 billion crash in one day
.
 ____
The Chinese Renewable Energy Revolution
Affects The Whole World
.
Try 4.

Friday January 30 17:49
___
AI Overview

Yes, Quora is a private company named Quora, Inc., founded in
2009 and headquartered in Mountain View, California. It operates
a popular Q&A platform and, while employee counts vary by
source, it generally operates with a few hundred to just over
a thousand employees.

Key Details About Quora, Inc.:

____
Microsoft may finally get rid of useless AI features
in Windows 11 following user backlash
.

No, Linux is not "more secure" than Windows.

Microsoft: Struck By Deep AI Fears,
And That's Why I'm Buying
.

____
Microsoft Shares Plunge 10%, Wiping Out
Nearly $360 Billion in Market Value
.

Windows 11 users report critical bugs in newest
KB5074105 optional January update
.

SanDisk Stock Explodes 23% on Q2
Earnings Beat — Buy SNDK or Wait?
.
____
Trausti Thor Johannsson replied to your comment on an
answer to: "How is Linux better than Mac?"


Didn’t we agree that you would stop posting AI
answers? To just quickly take your points.
Your next AI slop will be deleted. Just post your
own answers.

Cost and licensing : Apple might have free licensing
to worthy people, they just have not found
anyone worthy, yet. Customization : You can really
customize it as much as you feel like, even run an
X server and run Gnome, KDE or whatever you
want to. It runs on a Mac also.

Hardware flexibility: There are versions of macOS
that run on Motorola 68030/68040 called NeXTSTEP,
OpenSTEP runs on PA-RISC, PowerPC and Sparc
CPU’s and it is thought that there is a MIPS variant
somewhere out there. You can run it on Intel CPU on
Apple Hardware and ARM CPU, even on many PC
boxes, I ran it on my gaming PC for years. It has
run on ARM CPU’s since the first day of the
iPhone/iPad/iPod touch. Yes, same operating system.

Performance: Depends, The new M line systems
are among the fastest computers available and
they are not the most expensive ones. Software
management: You have homebrew and many
other sources of software Privacy and control:
You don’t get much more privacy than on a Mac,
built in all sorts of protections against tracking
and viruses that is hard to beat. Reparability: Yeah.

There are pro and con sides to just about anything.



why does Linux inventor call AI "slop"?

AI Overview

Linus Torvalds, the creator of Linux, refers to low-quality,
AI-generated content as "slop" largely due to his frustration
with the influx of unverified, automated, and often useless
code contributions in the Linux kernel development community.

His perspective is rooted in a desire for technical quality over
hype, arguing that:

It’s a "Pointless" Debate: Torvalds dismissed arguments to
create specific documentation for AI-generated code, calling
it "pointless posturing." He believes that "bad actors" or
careless users will not properly label their code as AI-generated
anyway.
...
While he has criticized the "hype" around AI as being 90%
marketing, he has acknowledged it can be a useful tool,
but he strongly dislikes the "AI slop" that drains time and energy
due to poor quality
.


what is the size of Quora in terabutes
and where is it stored?

AI Overview

Based on available technical reports, Quora's core
database is estimated to be on the order of tens
of terabytes for its primary, active data (not
counting replicas).

Here are the specific details regarding Quora's storage:

Data Size: While early estimates (circa 2011)
suggested the database might be under 1 TB,
as of 2022, the critical data (questions, answers,
upvotes, comments) grew to "tens of terabytes".

Storage Technology: Quora relies heavily on
MySQL for its database, utilizing sharding to
distribute this large data volume across multiple
machines. To manage the high volume of read
queries, they use caching technologies like
Memcached and Redis.

Cloud (EC2) to host the servers that run its website. Data Growth: Due to the massive number of
daily active users and user-generated content,
the total storage needs include, but are not
limited to, the text data, images, and user
interaction logs.

Note: In 2025, some user-generated, unverified
content suggested that Quora has moved
towards Google Cloud for certain operations,
though historically, AWS has been the known partner. Is Quora's "Can YOU ndwer this question?" and invitation
to possibly solicit misinformation or incompleete information?

AI Overview

Yes, Quora's "Can YOU answer this question?" prompt and,
more specifically, its "Answer to Anyone" (A2A) invitation
system are designed to solicit answers from a wide range
of users, which can and does lead to the dissemination of
misinformation, incomplete, or highly subjective information.

The platform operates as a crowdsourced question-and-
answer site that relies on user-generated content rather than
curated expertise, meaning there is no guarantee of accuracy.

Key Aspects of the "Can YOU" / A2A System and Misinformation:

How Quora Handles Potential Misinformation:
...
While many experts and professionals provide high-quality, detailed
answers, the "Can YOU answer this?" system encourages a high
volume of input, making the platform a mix of accurate, helpful,
and, at times, misleading information.


Are the speculative conclusions in the bokk Broken Web likely correct?

AI Overview
...
Conclusion: The speculative conclusions in Broken Web are generally
considered "likely correct" within the context of the fictional universe,
providing a more nuanced, complex, and satisfying, storyline than the
initial setup of the series.


Are the speculative conclusions in the bokk Broken Web The Coming
Collapse of the Internet likely correct?

AI Overview
...
The core thesis—that society is in danger due to extreme dependency
on a fragile, centralized network—is considered accurate by many
technologists and experts. While the idea of a complete "shutdown"
is probably hyperbolic, the notion that the internet will experience
increasing, severe disruptions in utility and functionality is considered
highly likely.
___
what are the similarities/differences to China Ubuntu
ARM compared to US x86 Ubuntu?


AI Overview

"China Ubuntu ARM" usually refers to Ubuntu Kylin, an
official, customized flavor of Ubuntu tailored for the
Chinese market, running on ARM64 architecture (such
as Huawei Kunpeng processors or Raspberry Pi). "US
x86 Ubuntu" refers to standard Ubuntu Desktop/Server
running on Intel/AMD processors.

The key differences lie in localization/customization
(Kylin vs. Standard) and hardware architecture
(ARM vs. x86), rather than the core operating system
functionality. Key Similarities (Both)

Base System: Both are based on the same "
Debian/Ubuntu Linux kernel.
...
Key Differences

1. User Interface & Experience (UI/UX).
...
2. Regional Optimization & Software
...
Architecture & Performance (ARM vs. x86)
...
Software Compatibility (Binary Differences)
...
Summary
...
In short, Ubuntu Kylin on ARM acts as a specialized,
localized version of Ubuntu designed for energy-efficient
Chinese hardware, while standard x86 Ubuntu is the
general-purpose, high-performance standard.

 ____
Producers Rush to Hedge amid
Exploding Natural Gas Prices
.

Bill would ban LNG use for electricity.
Try 2.

Thursday January 29 19:02
____
AI Overview

Yes, a $200 Lenovo IdeaPad 1 ($15.6" N6000, 12GB RAM) runs the same core Windows 11 operating system features (apps, interface, file management) as a $1,000+ model, but it lacks the performance, build quality, and advanced, fast features of premium machines.

Key Differences and Limitations:

AI Overview Yes, a $200 Lenovo IdeaPad 1 ($15.6" N6000, 12GB RAM) runs the same core Windows 11 operating system features (apps, interface, file management) as a $1,000+ model, but it lacks the performance, build quality, and advanced, fast features of premium machines. Key Differences and Limitations: Performance: The Intel Pentium Silver N60
...
Performance:
...
Storage Speed:
...
Windows 11 Mode: Many inexpensive models come in
"Windows 11 in S Mode," which restricts app installation
to the Microsoft Store for security, though this can be
switched to full Windows 11 for free.

Build & Display:
...
In summary, the $200 laptop offers full Windows functionality,
but it is not built for heavy multitasking, gaming, or
high-performance creative work.

AI Overview

Based on the provided search results and general industry
knowledge regarding compiler technology, several of the
"Magnificent 7" companies—Apple, Nvidia, Microsoft, Meta,
and Alphabet (Google)—have adopted or heavily
contribute to LLVM (Low Level Virtual Machine) technology.
...
The Magnificent 7—Apple, Microsoft, Amazon, Alphabet,
Meta, Nvidia, and Tesla—are all heavily investing in AI
development, which relies on high-performance compiler technology.

is lvn a big tech complex costly attempt to achieve
software portability across hardware platforms?

AI Overview

LLVM is a massive, complex, and highly influential compiler infrastructure,
but characterizing it solely as a "costly attempt" by Big Tech masks its
fundamental success and industry-standard status. It was originally an
academic research project that was adopted by Apple, then Google,
Microsoft, and others, precisely because it solved the "n²" compiler
problem (needing a new compiler for every language-architecture
combination).

Here is a breakdown of your query based on current industry
perspectives
:
...
While it is true that LLVM's complexity can be overwhelming
and it is heavily dependent on corporate sponsorship, it is
generally viewed as an invaluable, necessary tool rather than a
failed or over-engineered attempt at portability.

AI Overview

Yes, a Lenovo laptop costing over $1,000 generally includes
a longer or superior warranty compared to a $200 or less
budget machine. While many consumer laptops start with a
standard 1-year warranty, high-end models (like ThinkPads)
often come with 2-3 years of coverage, whereas ultra-
budget models almost exclusively offer only 1 year.
Warranty Differences by Price Point
...
It is important to note that, according to Quora users,
the initial 1-year warranty is standard for most new laptops,
regardless of price.

____
Cyberattack on Polish energy grid
impacted around 30 facilities
.
____
Tech Microsoft stock drops 7% on
slowing cloud growth, light margin guidance
.

Microsoft Shares Dive as Data-Center
Spending Overshadows Earnings Surge
.

AI Overview

Based on Microsoft’s earnings report for the second fiscal
quarter of 2026 (ended Dec 31, 2025), Microsoft is
experiencing a slowdown in the growth rate of its Azure
cloud business—not an absolute revenue decline—primarily
due to hardware supply constraints that limit its ability to
meet intense, AI-driven demand. While revenue continues
to grow, it is not accelerating as fast a
s some investors expected, leading to concerns about
the
ROI of massive AI investments.

Here are the key factors driving this slowdown:
...
Despite these issues, Microsoft's cloud business remains
a dominant force, with the "Intelligent Cloud" segment
continuing to grow, though the pace of that growth
has tempered from its previous rapid

Meta burned $19 billion on VR last year,
and 2026 won’t be any better
.

____
The Amazing Maser.

what is a maser?

AI Overview

A maser (Microwave Amplification by Stimulated Emission
of Radiation) is a device that produces coherent, highly
focused, and monochromatic microwave radiation.
Invented in 1953 by Charles Townes and colleagues, it
operates on principles similar to a laser but functions in
the microwave region of the electromagnetic spectrum.

Key details about masers:
...
Relationship to Laser: The maser is considered the
predecessor to the laser, which was initially termed
an "optical maser"
____
which TWO of the magnificfent 7 are at risk of bankruptcy?

AI Overview

None of the "Magnificent Seven" companies are
considered at risk of bankruptcy. They
are among the largest and most financially
stable corporations in the world, often
described as "too big to fail".

The companies that have faced the most
significant recent performance struggles,
volatility, and various market concerns are
Tesla and Apple (along with Alphabet, though
to a slightly lesser extent).
...
Explanation

The concept of a "Magnificent Seven" company
going bankrupt is widely considered a non-concern
among financial analysts. These firms generate
substantial free cash flow, have strong balance
sheets, and are leaders in their respective
industries. Discussions among experts
focus on stock performance, valuation
risk, and potential slowdowns in growth,
not fundamental solvency issues.
...
I can provide more detail on the specific
financial metrics (like cash flow or debt
levels) for Tesla and Apple that show their
stability. Would looking at a breakdown of
their current financial health help you
better understand their low risk?
____
where does Iceland get it electricity?
AI Overview

Iceland generates almost 100% of its electricity f
rom renewable sources, primarily using
hydroelectric power (roughly 70–73%) and
geothermal energy (roughly 27–30%). The
country leverages its unique volcanic activity
for geothermal energy and glacial rivers for
hydropower to power homes and industries,
with a small but growing amount of wind
energy.

Key details about Iceland's electricity sources:
...
Future Growth: Iceland is exploring wind energy,
with the first wind farm projects beginning
construction in 2025.

Big tech’s $680bn buy-now-book-later problem.


____
A High-Stakes Effort to Relax Radiation
Limits and Restart Nuclear Growth
.

AI Overview

Nuclear-powered data center projects face a high probability
of encountering significant approval, regulatory, and construction
delays, often taking 10 to 12 years to plan, license, and build,
which mismatches the rapid, 1-3 year growth timeline of data
centers. While SMRs offer potential, they face complex licensing,
high first-of-a-kind (FOAK) costs, and potential for local opposition.

Key Approval & Development Hurdles.
...
Despite these hurdles, strong interest from tech companies
seeking clean, 24/7 power, combined with federal support (e.g.,
$80B+ commitment) and DOE loan guarantees, keeps these
projects moving forward, albeit with high skepticism regarding
timelines.

Freezing Weather Forces the World’s Top LNG Exporter to Import Gas.

AI Overview

Yes, U.S. natural gas prices have been increasing from historically
low levels set in 2024, with the Henry Hub spot price expected to
rise significantly through 2025 and 2026 due to increased demand,
LNG exports, and tighter market conditions. Prices surged sharply
to multi-year highs in early 2026, driven by intense winter
weather and strong demand.

Key Factors Behind the Increase:

Rebound from Lows: After 2024 saw some of the lowest
inflation-adjusted prices, the 2025 average price was expected
to rise by over 50%.

Rising Demand: Growing demand for U.S. liquefied
natural gas (LNG) exports and domestic consumption is
outpacing supply, as reported by the EIA.

Market Rebalancing: While 2023-2024 saw high inventory
levels, forecasts indicate inventories will fall below the
five-year average, supporting higher prices, according
to the EIA.



Europe’s Wind Bet Meets a Cold, Hard Energy Lesson.
Try 2.

Wednesday January 28 17:44
____
AI Overview

Icland is the world leader in electricity consumption per capita, driven by energy-intensive industries like aluminum smelting and its vast, affordable renewable energy resources. As of recent data, Iceland’s consumption exceeds \(50,000\) kWh per person annually, followed by Norway and Qatar. 

____
Why I'm self-hosting my entire digital life in 2026.

what are the advantages of self-hosting?

AI Overview

hosting offers full data ownership, enhanced privacy,
and superior customization, allowing users to run
services on their own hardware instead of relying on
third-party cloud providers. Key benefits include improved
security, reduced long-term subscription costs, i
ndependence from service provider limitations, and,
in some cases, better performance.

Key Advantages of Self-Hosting:
...
Self-hosting is ideal for those requiring strict data
security, such as researchers, developers, and
businesses, as well as individuals looking for
more control over their digital lives.
___
Tech Amazon laying off about 16,000
corporate workers in latest anti-bureaucracy push
.

Amazon bungles Wednesday layoff
plan with misfired internal email
.
____
Galaxy S26 Ultra will end the S25 Ultra camera flaw.
____
Google Chrome tests new feature that could slow your
Windows 11/10 PC when you turn it on
.
____
Zoom Is the First Casualty in France’s
War on American Big Tech
.
.
____
The Trump administration has secretly
rewritten nuclear safety rules
.
Try 2.

Tuesday January 27 16:57

____

Is Islamic algebra more applicable to computer arithmetic than western math?

https://dl.acm.org/doi/pdf/10.1145/359460.359464#:~:text=Non
singular%20binary%20matrices%20of%20order,register%
20sequence%20pseudorandom%20number%20generato
r.
____
Critical sandbox escape flaw found
in popular vm2 NodeJS library
.

WinRAR path traversal flaw still exploited
by numerous hackers
.

Artificial IntelligenceChrome, Edge Extensions
Caught Stealing ChatGPT Sessions
.

VBA is dying, and Microsoft is building
Excel's future without it
.
____
why did it take one how to install Windows 11
on a $130 Walmart Lenovo 4 core Pentium
silver 128 GB running Ubuntu using a iso flash drive?

AI Overview

Reinstalling Windows 11 on a budget-friendly, l
ow-power laptop ($130 Walmart Lenovo with
a Pentium Silver) in roughly one hour is actually
within the expected timeframe, particularly when
moving from a different OS like Ubuntu. The
1-hour+
duration is primarily caused by a combination
of entry-level hardware limitations and the
complexity of modern Windows 11 installation
procedures. Here is a breakdown of why it
took that long: 1.

Hardware Bottlenecks
...
Windows 11 Installation Proces
...
Potential Contributing Factors
...
Summary: While 20-30 minutes is standard
for a modern desktop, 1 hour to
1.5 hours is very typical for budget
devices with Pentium processors
and slower storage.


AI Overview

Laptops dominate the PC market, accounting
for approximately 75% to over 77% of total
PC shipments as of 2025-2026, while desktop
computers make up the remaining ~25%. The
high demand for portable, versatile devices,
accelerated by hybrid work and education needs,
has led to laptops consistently outselling desktops.

Market Share (Shipments): Notebooks and
laptops held roughly 77.45% of the market
in 2025, with desktops comprising the rest.
...
The market for laptops is expected to continue
growing, with sales volume projected to
reach 193.6 million units in 2025
.



RunningUbuntu which replaced Eindows 10 1909.



Installer crashed on below using both Windows 11 and 10 1909 iso flash drives/



Declined Microsoft fixes and used ethernet.



Much time spent declining Microsoft's offers.





Success!



Photos of install.



$110 Best Buy Moto g 5g 128 GB esim cell phone camera photosl.

____
Anthropic launches interactive Claude apps,
including Slack and other workplace tools
.
____
AWS's inevitable destiny: becoming the next Lumen.
____
CISA says critical VMware RCE
flaw now actively exploited
.

New Malware Toolkit Sends Users to Malicious
Websites While the URL Stays the Same
.

Storing your BitLocker key in the cloud?
Microsoft can give it to the FBI - what to do instead
.

Microsoft patches actively exploited
Office zero-day vulnerability
.

Microsoft now lets you rent a
Windows PC in the cloud in more regions
.

How to encrypt your PC’s disk without
giving the keys to Microsoft
.


 
Try 2.

Monday January 26 13:32
___
Nearly 800,000 Telnet servers exposed to remote attacks.

____
Ever-growing cloud migrations present pressure for smaller
cybersecurity vendors: Morgan Stanley.

____
Windows 11 Patch Tuesday horrors
continue as some PCs now cannot boo
t.

Microsoft’s first Windows 11 update of
2026 has been a mess
.
____
what is aka.ms/setupnetwork?

AI Overview

Aka.ms/setupnetwork (or often referred to as
aka.ms/networksetup) is a Microsoft-shortened
URL designed to help users troubleshoot or
configure network connectivity during the initial
setup of a new Windows PC. It typically directs
to support resources for resolving Wi-Fi
connection issues, such as enabling drivers or
updating settings.

Key Information regarding aka.ms/setupnetwork:

Purpose: It acts as a guide to help you get
connected to a network if the setup process
fails or stops.

Troubleshooting Steps: If you are directed here,
it is recommended to restart the setup, ensure
Windows is up to date, and temporarily disable
VPNs or firewalls.

Alternative Solutions: Users can also use
the Windows "Network Troubleshooter"
in Settings, or use commands like netsh
winsock reset to clear network issues.

Context: It is often used when a new
device fails to connect to Wi-Fi during
the initial Out-of-Box Experience (OOBE).
Note: aka.ms is Microsoft's legitimate URL
shortener. Context: It is often used when
a new device fails to connect to Wi-Fi
during the initial Out-of-Box Experience
(OOBE).

Note: aka.ms is Microsoft's legitimate URL
____
why dd Microsoft store refuse to download Lenovo
Vantage ofn 1/2424/26 unless i switched frfom
Chrome to Edge but then allowed download on 1/25/26?

AI Overview

Based on information regarding Lenovo Vantage
installation issues, the requirement to switch from
Chrome to Edge was likely due to Microsoft Store
integration issues with third-party browsers during a
period of system updates.

Here are the specific reasons why this likely occurred:
...
If this happens again, it is often recommended to use the
Windows WSRESET command in the Run dialog (Win + R)
to clear the Microsoft Store cache, rather than switching
browsers.
____
This is how much it costs to mine one
Bitcoin in the U.S.


AI Overview

As of late 2024, the average cost to mine one Bitcoin
in the US varies widely based on electricity rates and
hardware efficiency, with cash costs estimated around
$55,950 per coin, and total costs (including overhead)
exceeding $100,000 for some firms. Profitability
depends heavily on securing power below $0.05–
$0.06/kWh, as high summer costs in regions like
Texas can make mining unprofitable. Key Cost


Drivers & Factors.

are journaoism job in daner because of SI?

AI Overview

Yes, journalism jobs are considered to be in significant
danger due to the rise of Artificial Intelligence (AI),
with57.2% of surveyed journalists fearing that AI
will replace more jobs in the near future. While AI
offers efficiency in content creation, experts and
industry professionals warn that it is accelerating
the decline of the industry by replacing entry-level
roles, automating rote tasks, and threatening to erode
trust through misinformation.

How AI Threatens Journalism Jobs.

Long-Term Impact The future of journalism is likely to i
nvolve a hybrid model where AI handles mundane tasks,
freeing up human journalists for more in-depth reporting.
However, in the short term, the industry is facing a severe
disruption to its traditional business models and workforce,
with a 2024 Brookings report noting that while AI cannot
do everything a human can, it is still contributing to the
decline of traditional news roles.
 
____
Inside Japan's Controversial Shift
Back to Nuclear Energy
.

The Growing Gap Between Fossil
Fuel Use and Finds
.

Try 2.

Sunday January 25 07:18
____
AI Luminaries Clash At Davos Over How
Close Human-Level Intelligence Really Is
.

____
Microsoft's emergency patch broke Windows 11/10

further, KB5078127 KB5078132
,\,


f
 
____
Trump's Energy Policy Backfires as Consumer Bills Soarm.
Try 1.

Saturday January 24 07:10
____
is there a a vido of one Nanocomputer communica
ting with another using Bluetooth?

AI Overview

setup_vantage.bat is a batch script used to install
Lenovo Vantage on Windows computers,
particularly in enterprise or clean-install
environments where the Microsoft Store
is unavailable, disabled, or not desired. Key
details about setup_vantage.bat:

Purpose:
It automates the deployment of the Lenovo
Vantage application package (APPXBUNDLE).

Usage: It is typically run from an
administrator command prompt to
install the software, often used by IT
administrators for mass deployment
or to restore Vantage functionality.

Alternative to Store: This method allows
users to install the Lenovo Vantage
app without using the Microsoft Store.

Troubleshooting: If the installation fails,
IT admins sometimes edit this file or
use it within deployment tools like
Microsoft Deployment Toolkit (MDT)
to pinpoint errors.

Important Notes:

It should be executed from an Admin
Command Prompt, not simply
double-clicked in Windows Explorer.

It is often found in extracted,
standalone Lenovo Vantage
enterprise installation packages.

1/24/25 Lenovo Ryzen 7 4700U laptoop running Windowws 10 1909.




Embedded TPM: Watch Out!.

____
Tesla kills Autopilot, locks lane-keeping
behind $99/month fee (arstechnica.com)
.


____
The $21 All-in-One Dev Kit That Goes Anywhere.
 
Try 1.

Friday January 23 09:59

____
AI Overview

No, Dennis Ritchie, Ken Thompson, and Brian Kernighan
were not "brainwashed" by Fred Brooks, the leader of
the IBM System/360 OS project and author of The
Mythical Man-Month. In fact, the UNIX system they
created was developed as a direct, antithetical
reaction against the complexity and bloat
exemplified by IBM's 360 OS and the failed
Multics project.

Reaction Against IBM/Multics Complexity: Ken
Thompson, Dennis Ritchie, and others at Bell
Labs grew frustrated with the immense size and
complexity of large-scale, corporate-managed
systems like Multics (which was developed partly
to compete with IBM's 360 approaches).

The Philosophy of Simplicity: Instead of
adopting the "heavyweight" engineering
management style of the IBM 360, the
creators of UNIX aimed for a small, simple,
and elegant system. Their guiding principle
was that "simplicity scales" and that "the
best tools stay out of the way".

____
what is lenovo vantage and why is it a good
idea to have Vantage unning on a lenovo laptop?

AI Overview

What's Lenovo Vantage? | Coolblue Lenovo Vantage i
s a free, pre-installed Windows app designed to
optimize, customize, and secure Lenovo laptops by
managing drivers, battery health, and system
performance. It is essential for updating BIOS/drivers,
boosting performance, running hardware diagnostics,
and extending battery life via specialized settings.

Why It Is a Good Idea to Have Running:

Automated Maintenance: It keeps the system
running smoothly by automatically installing driver
and BIOS updates.

Performance Control: Allows users to adjust
power settings (Quiet, Balance, Performance)
and, on Legion devices, manage Hybrid Modes
for better GPU performance.

Security & Support: Monitors Wi-Fi
network risks, checks warranty status, and
offers hardware diagnostic tools.


Customization: Controls camera, microphone,
and keyboard lighting settings.

For most users, it is considered a useful,
non-intrusive tool to keep the device in
top shape.
____
I was banned from Claude for scaffolding a
Claude.md file? (hugodaniel.com).
.

Microsoft Gave FBI Keys To Unlock
Encrypted Data, Exposing Major Privacy Fla
.

Microsoft makes Outlook "completely unusable"
as Windows 11 25H2/24H2 update breaks it
[Update]
.
 
____
Is Al Gore the greenest?.

AI Overview

Al Gore is a prominent environmental advocate and
Nobel Peace Prize laureate recognized for bringing
global awareness to the climate crisis through An
Inconvenient Truth. While he is hailed as a leading,
long-standing "green" voice in politics, he has faced
criticism regarding his personal energy
consumption and, at times, for not being the
"boldest" voice in the climate movement.

Environmental Leadership: Since the 1970s,
Gore has been a vocal proponent of
environmental action, founding the Climate
Reality Project and organizing the Live Earth
concerts.

Impact: His work has been crucial in
accelerating the shift toward
renewable energy and sustainable
investment.

Criticisms: Reports have highlighted
high energy consumption at his
Tennessee residence. Additionally,
some environmentalists and political
opponents have critiqued his
effectiveness and actions during
his time in office.

Ultimately, while Al Gore is one of
the most recognizable and
influential figures in global
environmentalism, whether he
is considered the "greenest" is subjective and debated.
Try 1.

Thursday January 22 18:56
____
The Cool Down Coalition of over 200 organizations
fights back after data centers spur 'outrageous'
.

AI will be undersupplied by memory in the
upcoming years – Cantor Fitzgerald
.

Hackers exploit security testing apps to breach
Fortune 500 firms
.
____

Microsoft 365 is down, as rough January continues.

AI Overview


Microsoft is quickly changing the Windows
ecosystem by integrating AI (Copilot) and
agent-based features into the user interface
through 2025. Google's AI models, including
Gemini 3, are designed to adapt to major OS
changes and real-time information.

Here is a summary as of late 2025:

Microsoft's Rapid Interface Changes
...
Conclusion: Microsoft is changing the
Windows 11 interface quickly to emphasize
AI. While this challenges all search engines,
Google's AI capabilities generally keep up with
the major changes in the Windows ecosystem.
***
An ecosystem is a community where living
things (plants, animals, microbes) and
non-living components (water, soil,
sunlight, rocks) interact as a system,
linked by energy flow and nutrient cycles,
forming a self-contained unit that can
range from a tiny puddle to a vast forest.
Every part influences the others, creating
a complex web of interdependence,
where changes to one element affect
the whole.

AI Overview

Based on user feedback, technical reports, and
recent developments, Microsoft's aggressive
integration of AI into Windows 11 is causing
significant disruption to the established user
interface (UI) and user experience (UX). While
Microsoft frames this as an "evolution" toward
an agentic OS, many users and critics perceive
it as an intrusive, buggy, and often unnecessary
overlay that degrades system performance and
productivity. Here is a breakdown of how AI
is impacting the Windows UI:
...
Conclusion While AI offers potential
efficiency gains for some, the current
implementation is widely seen as damaging
to the traditional, stable Windows experience,
leading many to consider alternatives or seek
ways to remove the features entirely. Microsoft
has acknowledged that it has "work to do"
regarding the user experience and, in
particular, the needs of "power users".

Windows fails to tip the scales in grocery store deployment.
____
Hackers Weaponized 2,500+ Security Tools to Terminate
Endpoint Protection Before Deploying Ransomware
.

Hackers breach Fortinet FortiGate devices, steal firewall configs.

Saving files is currently broken on Windows 11 and Windows 10.

____
Engineer at Elon Musk’s xAI Departs After
Spilling the Beans in Podcast Interview
.

Elon Musk's xAI Colossus 2 is nowhere near
1 gigawatt capacity, satellite imagery
suggests — despite claims, site only has
350 megawatts of cooling capacity
.
____
Sandisk has surpassed 1,000%
performance in 6 months
.
 
____
Malfunction Forces Japan to Take Restarted
Nuclear Plant Offline
.

are Microsoft and Meta launching a MSM campaign
to promoted nuclear-powered data centers?

AI Overview

Yes, Microsoft and Meta are heavily investing in
and aggressively pursuing nuclear power to fuel
their AI data centers, and these actions are being
widely reported by major media outlets (MSM)
as a significant shift in tech infrastructure strategy.

While they are not necessarily running a joint,
public-facing marketing campaign, their actions
constitute a massive, public initiative to normalize
and secure nuclear power as the primary "clean"
energy source for AI.

Here are the details of their actions based on
recent announcements (January 2026):

Meta's Nuclear Strategy
...
Investment Goal:
...
Goal:
...
Microsoft's Nuclear Strategy

Three Mile Island (Sept 2024):
...
Goal:
...
Why This is Becoming a "Campaign"

The AI Energy Crunch:
>>>
Public Justification:
...
Media Coverage: The press (CNBC, WSJ,
AP, Reuters) is extensively covering
these moves, highlighting them as a major
turning point for the nuclear industry.

Note: The search results contain
information dated as recently as
January 9 and 13, 2026, confirming
these are current initiatives.

This OS quietly powers all AI - and most
future IT jobs
, too.,

These solar panels have been on Swiss rooftops
for more than 30 years, and they are still
delivering over 80% of their original output
in Switzerland
.

Germany’s Coal Plants Return to Profit.
Try 1.

Wednesday January 21 15:15
____
a new nanocomputer ISA need a c compiler:
is porting a gcc ARM compiler a better idea
than a X*^ gxcc c compilerf, or is there
anonother better option?

AI Overview

For a new nanocomputer ISA, porting GCC (GNU Compiler
Collection) for a similar existing architecture (like ARM) i
s generally better than X86 (or X*^ gxcc), or starting
from scratch, because GCC offers extensive
customization for new backends, better optimization
potential, and broad C standard support, with LLVM/Clang
being a strong alternative due to modularity, though GCC
is a proven path for new targets.

Why GCC (or LLVM) is a Good Starting Point
...
Other Options

LLVM/Clang: A strong contender, often preferred
for its modularity and cleaner architecture,
making it easier to integrate new backends.

Tiny C Compiler (TCC): Good for very small, simple ISAs
if extreme speed of compilation is needed, but less
feature-rich than GCC/LLVM.

Recommendation: Start with GCC or LLVM. If
your ISA is RISC-like, ARM GCC provides a more
relevant template than X86. Focus on creating a
clean, well-defined backend within the GCC/LLVM
framework.



____
The CEO of Microsoft Suddenly Sounds
Extremely Nervous About AI
.

Microsoft's AI Chief says we'll have intimate
AI companions within 5 years — they'll know
us "deeply" and help us navigate our lives.
____
You Should Add the $10 ESP32-C6 GEEK to Your Toolbox.

Espressif Introduces The ESP32-E22
Wi-Fi 6E And Bluetooth Co-Processor.
_
Windows 11's reputation is at an all-time low
____
Elon Musk's xAI Data Center Sparks Environmental Legal Battle.
____
Anthropic’s CEO stuns Davos with Nvidia criticism.
____
New Windows 11 KB5074109 update reportedly
breaks payroll and graphics applications
.

Nightmare’—Microsoft Update
Breaks Windows For Millions
.
____
Meta lays off hundreds in Seattle area.

Ask HN: Burned out from tech, what else is there?.


___
Losing Loser Loses Another Offshore Wind Fight, Again.

Trump administration claims offshore wind
poses a threat. But it won't say how
.

Try 3.

Tuesday January 20 16:53
___
Microsoft issues emergency patch for
latest Windows bugs - grab it ASAP
.

Microsoft: The $134 Billion Misunderstanding.

The CEO of Microsoft Suddenly
Sounds Extremely Nervous About AI
.

Majority of CEOs report zero
payoff from AI splurge
.
___
Sandisk (SNDK) Has Become the Hottest
Tech Stock to Pursue in 2026
.

What are some funny mathematics jokes?

A mathematician, a physicist and an engineer
are on a trip to Scotland together. They've just
crossed the border when they see a black sheep
in a field. “Oh, look,” says the engineer,
“In Scotland the sheep are black.” “No, no,’
days the physicist, ‘In Scotland some of the
sheep are black.” “ No,” says the mathematician,
‘In Scotland, there is at least one field,
containing at least one sheep, that is black,
on at least one side.”

Q What is purple and commutes?
A An Abelian grape.

AI Overview
Orderly enumeration of nonsingular binary matrices
involves creating a systematic, one-to-one
mapping between natural numbers and these
matrices (over the field {0, 1}) by generating |
all possible matrices and filtering out singular
(non-invertible) ones , often using techniques
like generating intermediate vectors and
transforming them, with applications in
cryptography and understanding matrix
properties like full rank or linear independence
of rows/columns.

ahttps://dl.acm.org/doi/pdf/10.1145/359460.359464#:~:
text=Nonsingular%20binary%20matrices%20of%20order,
register%20sequence%20pseudorandom%20number%20generator.

Was RSA public Key cryptography broken by NSA in ~1991/2?

Waveshare ESP32-C6-GEEK – A USB flash drive-like
ESP32-C6 development board
.

Espressif Goes Tri-Band with the New, Wi-Fi
6E-Capable ESP32-E22 Communications Coprocessor
.
___
As data centers jostle to get on Texas’ grid,
ERCOT promises new rules for planning
.
____
Meta’s VR layoffs, studio closures underscore
Zuckerberg’s massive pivot to AI
.
____
NVIDIA’s Laptop Chips, After a Long-Awaited
Build-Up, Are Set to Debut This Year By Q2;
N1/N1X SoCs to Challenge x86 Supremacy
.

____
Microsoft rushes out emergency updates to
fix a broken Windows Patch Tuesday
.

Microsoft: Something Doesn't Add Up.

Microsoft (MSFT) Traded Lower as Its Reported
Azure Cloud Growth and Forward Guidance
Fell Short of Expectations
.

Microsoft issues security advisory for IT admins
managing Windows Domain Controllers
.
 
____
Trump promised to cut energy bills in half.
One year later, has he delivered?
.
Try 1.

Monday January 19 18:20

____"
5-star analyst drops jaw-dropping price
target on AMD stock
.
____
Why is the BLS predicting -7% employment for computer
programmers through 2028? Does this mean it is a
very bad idea to study programming?

AI Overview

Why Coding in 2025 is a Career Misstep | by The Secret ...
The BLS projected a decline for "Computer Programmers"
(a specific, narrower role) due to outsourcing and AI
automating routine tasks, but this doesn't mean
programming is a bad idea; it signals a shift toward
higher-level roles like Software Developers, AI/ML
Engineers, Data Scientists, and Cybersecurity experts,
who design and solve complex problems, requiring
adaptability and new skills, not just coding. Studying
programming remains valuable, but focusing on design,
architecture, and leveraging AI tools for efficiency is
key for future success, as generic coding tasks are
increasingly automated. Why the Decline for
"Computer Programmers"?
...
In Summary: The trend is away from simple
"coding" and towards complex "engineering"
and problem-solving, requiring adaptability and
specialized skills in emerging tech a
reas,
notes a Facebook post
.

...z
____
Well, there goes the metaverse!.
____
A Petabyte NAS Using Consumer-Grade Parts.

Commercial Builders Are Losing Their Appetite
to Build Anything but Data Centers
.

Nvidia leans on emulation to squeeze more HPC
oomph from AI chips in race against AMD
.
____
Windows 11 shutdown bug forces Microsoft
into out-of-band damage control
.

how long did it take Wang Labs to go
from 33,00 employees to 0?

AI Overview

It took Wang Laboratories approximately 7 to 8 years
to go from its peak employment of over
31,000–33,000 workers to effectively
zero as an independent company, with the
sharpest decline occurring between 1985
and 1992
.
___
How a simple link allowed hackers to bypass
Copilot's security guardrails - and what
Microsoft did about it
.
____
Here’s how AI data centers
affect the electrical grid
.

All is not well between Meta CEO Mark Zuckerberg
and Meta's highest-paid employee as the company's
new reporting struct
ure shows
.

Meta's fresh layoffs trigger major sell-off.

Big Tech stocks are quickly falling out of favor.
Here’s the market’s new momentum trade
.

Google cofounder reveals 'tons' of recent hires do not
have degrees as CEOs question university system
.

10 things I learned from burning
myself out with AI coding agents
.

 
____
The Staggering £7.6 Trillion Price Tag of
Britain's Net Zero Ambition
.

Tesla Fires Up America’s First Major
Lithium Refinery
.

Home solar in rural America: how much
battery do you need to run a well pump?
.
Try 1.

Sunday January 18 09:39
____
AI companies will fail. We can salvage something
from the wreckage
.
.
____
NAND Demand Stays Strong as Chip Sales Slump.
Is Sandisk or Western Digital Stock a Better Buy
in January 2026?2
.

NanoPC-T6 Plus Rockchip RK3588 SBC switches
from LPDDR4x to LPDDR5 (up to 32GB)
.

where are microsoft data centers mapped?

AI Overview

Microsoft data centers are mapped globally across
numerous regions, with major concentrations in
the US (Virginia, Texas, Arizona, Washington) and
growing locations in Europe, Asia, and Latin America,
accessible via interactive maps on Microsoft Learn
or third-party sites like Data Center Map and Baxtel.
Specific city locations are often less publicized for
security, but major hubs include London (UK),
Zurich (Switzerland), Dublin (Ireland), and Sydney
(Australia).

Key Locations & Regions:
...
Important Note: While Microsoft lists regions, the exact
physical city within a region can be intentionally vague
for security, though specific areas are often inferred
through job postings and local infrastructure developments.

Microsoft outs Windows 11/10 KB5077744,
KB5077797 emergency updates for
manual downloading
.

Windows 11 PCs Fail to Shut Down After
January Security Update
.

Microsoft explains why Windows 11 25H2
got twice as heavy due to a key security update
.

Palo Alto Networks warns of DoS bug
letting hackers disable firewalls
.

____
NewsFresh Galaxy S26 leaks reveal charging
letdown, new S26 Ultra colors, and live
SIM tray images
.

Samsung will help fans upgrade to Galaxy S26.
 
____
Elon Musk’s xAI datacenter generating extra
electricity illegally, regulator rules
.

Trump Is Winning the Fight Against Offshore
Wind Despite Court Losses
.
Try 1.

Saturday January 17 06:48
____
AI Overview

AI on Google Search, which is powered by the
Gemini family of models, differs from
competitors like OpenAI (ChatGPT),
Anthropic (Claude), and Microsoft (Copilot)
mainly through its complete integration.
This includes custom hardware (TPUs)
and widespread consumer applications
(Search, Workspace, Android). OpenAI
often leads in creative or general tasks.
Anthropic excels in coding and safety.
AI on Google Search thrives on real-time
data, large multimodal context, and deep
ecosystem integration. Key differences
between AI on Google Search and
other offerings:


____
AI Overview

The "dark side" of Google's promotion and heavy use of
LLVM/Clang in conjunction with AI stems from the
increased burden on human reviewers, the potential
for introducing low-quality or buggy generated code,
and the centralization of compiler technology. While
Google heavily utilizes LLVM/Clang for performance
in Android and Chrome, the intersection with
AI-assisted development has introduced specific
risks to the open-source project's stability and
maintainability.

The "Dark Side" Risks and Issues:

In summary, the "dark side" is not necessarily
that LLVM/Clang is inherently bad, but that the
intersection of AI-generated, code and, high-velocity,
corporate development, risks overwhelming, human,
oversight, for a critical, piece, of,, internet
infrastructure.


AI Overview

The "dark side" of Google's promotion and heavy use of LLVM/Clang in conjunction with AI stems from the increased burden on human reviewers, the potential for introducing low-quality or buggy generated code, and the centralization of compiler technology. While Google heavily utilizes LLVM/Clang for performance in Android and Chrome, the intersection with AI-assisted development has introduced specific risks to the open-source project's stability and maintainability. The "Dark Side" Risks and Issues:
____
Why the future of data centers might
be smaller than you think
.

'Big Short' investor Michael Burry says
the AI boom will end badly. He shared
an old Warren Buffett story to explain why
.

will the ai boom end badly as Michael Burry predicts?

AI Overview

Yes, Michael Burry predicts the AI boom will
end badly, seeing an "AI bubble" fueled by
hype, citing overvalued stocks like Nvidia and
Palantir, slowing cloud growth, and
unsustainable spending on infrastructure,
potentially leading to a major correction,
though he emphasizes it's hard to time the
exact burst. He's taking large short positions,
betting that the current tech euphoria will give
way to reality as returns on massive
AI investments fail to materialize, similar
to past speculative tech manias.

What He's Doing:
...
The Bottom Line:

Burry is a noted contrarian investor who
sees classic bubble signs in AI, but he also
acknowledges that bubbles can last longer
than investors expect, making timing the
exit difficult, notes Business Insider.
Burry's Key Concerns:
...

Nvidia CEO sends biblical-scale reality check on AI.
...
____
Energy Biggest offshore wind project in U.S.
to resume construction after judge lifts
Trump suspension
.
Try 1.

Friday January 16 17:17
____
WCH CH32M030: Another Microcontroller
To Watch Out For
.

XIAO ESP32-C5 – A tiny USB-C IoT board with dual-band WiFi 6,
Bluetooth 5.0 LE, Zigbee, and Thread connectivity
.
____
White House seeks emergency power
auction for largest US electric grid
.
.___
AI Overview

MSM (Mainstream Media) writers and analysts gather
information on the "AI bubble" from a mix of financial,
technical, and corporate sources, often focusing on
infrastructure spending and market valuations.

Key sources include:
...
The narrative often focuses on whether the massive
spending on AI hardware (GPUs) by tech giants will
translate into actual, sustainable revenue.
____
Researchers Just Found Something That
Could Shake the AI Industry to Its Core
.

AI Overview

Recent research indicates major shifts in AI could
shake its core, including discoveries about
overtraining vulnerabilities in large models,
potentially making them unstable at extreme
scales, and significant progress by tech giants
like Amazon and Google in creating custom,
highly efficient AI chips, challenging Nvidia's
dominance and reducing reliance on single
suppliers. Furthermore, concerns persist
about the ethical implications of AI's impact
on jobs, creative industries (like music/art),
and potential societal “AI psychosis,” alongside
evolving legal battles over training data
copyright.

Here's a breakdown of key areas researchers
are finding could shake AI
:
...
These discoveries suggest AI's future isn't
just about bigger models but also about
addressing fundamental stability, ethical
responsibility, and the economic
structures it's reshaping.

____
Trump Orders Emergency Power
Auction for Big Tech AI Data Centers
.

Oracle struggles to attract workers to
Nashville ‘world HQ’—even with a
2-million-square-foot office
and Larry Ellison’s favorite restaurant
.

The college diploma is losing its
hold on Silicon Valley hiring
.
____
Miicrosoft updates Windows DLL
that triggered security alerts
.

does Windows 10 22H2 give Microsoft
the ability to hack websites?

AI Overview

Windows 10 22H2 is a specific, feature-complete
version of the operating system that does not
provide Microsoft with any inherent ability to
"hack" websites [1]. An operating system,
like Windows 10, provides the platform for
software to run, but it doesn't contain
built-in tools or functions designed for
unauthorized access to third-party
websites [1].

The operating system includes features
designed to provide security and functionality,
such as:

Security Updates: Microsoft provides
updates to patch ... !?

...
Ultimately, the actions taken on a computer,
including any attempts to access websites,
are initiated by the user or software they
install, not by the operating system itself
giving
pecial powers to the developer [1, 2].

can MIcrosoft run WS_FTP remotely with
Windows 10 22H2?


AI Overview

Yes, you can run and manage WS_FTP remotely
using a computer with Windows 10 22H2.
WS_FTP Server is a Windows-based
application, and its web-based management
console is accessible from any machine with
network access and a supported web browser.

Here is how remote access works and the
requirements:


can MIcrosoft run HotMaal 6 PRO remotely
with Windows 10 22H2?

AI Overview

No, it is not possible to run a specific legacy
software version like "Hotmail 6" remotely
on Windows 10 22H2, because Hotmail 6 is
an obsolete email client/service version that
has long been discontinued and replaced.
Microsoft's email service is now known
as Outlook.com and is accessed either
through a web browser or modern email
applications.

The current methods for accessing your
email on Windows 10 (version 22H2) are
:
...
Attempting to use very old, unsupported
software like Hotmail 6 is strongly discouraged
due to security vulnerabilities and complete
incompatibility with modern email protocols
and authentication standards. The "remote
access" features in Windows (like Remote
Desktop) are for connecting to the entire
PC desktop, not for running specific,
outdated applications as a service.

r what is an expression in c and how does
the gcc c compile its evaluation into
machine language?

AI Overview

An expression in C is a combination of
operands (variables, constants, function
calls) and operators that evaluates to a
single value, object, designator, or void [1].
The GCC C compiler translates this
expression into machine language through
a multi-stage process involving parsing,
semantic analysis, intermediate
representation, and code generation.

What is an Expression in C?
...
How GCC Compiles an Expression
,,,
You can observe these stages in action
by using specific flags with the GCC
compiler command, such as gcc -S
filename.c to produce the assembly
code output [2]
.
.
 
____
US offshore wind backlash grows as a fourth
offshore wind project sues Trump admin [update]
.

58 Gigawatts Of Solar Power Are Hiding In Plain Sight.

Offshore wind developer prevails in U.S. court
as Trump calls wind farms 'losers'
.
Try 2.


Thursday January 15 09:57
____
The 500,000-ton typo: Why data center
copper math doesn’t add up
.

___

AI Overview

Yes, frequent hardware changes do make unit testing
more challenging, primarily due to increased
maintenance overhead, tighter coupling with
specific hardware interfaces (requiring more
mocks/stubs or hardware-level tests), and
the need for robust abstraction layers (like
device drivers) to isolate code, making tests
more complex and increasing the risk of brittle
tests that break with hardware updates. While
unit testing remains crucial, hardware shifts
shift focus from purely logical unit tests to i
ntegration/hardware-level testing and
emphasize building flexible,
hardware-independent code.

Challenges Introduced by Frequent Hardware
Changes.
...
In essence, frequent hardware changes don't
make unit testing obsolete; they make poorly
designed unit testing ineffective and push
developers towards better software design
and more comprehensive testing strategies
that account for the hardware layer.

____
Meta makes drastic workforce decision
after $73 billion in losses
.

Michael Burry's Grim Warning:
Meta Just Crossed A Line
.

how did Meta lost $73 billion?

AI Overview

Meta lost around $73 billion primarily through
its Reality Labs division, which develops
metaverse, VR, and AR products, due to
massive investments in unproven virtual world
technology (like Horizon Worlds) and hardware
(Quest headsets) that failed to gain significant
consumer traction, leading to huge operating
losses that the company is now pivoting away
from, focusing more on AI instead.

Why the Losses Occurred:

Massive Investment in the Metaverse;
...
Lack of Consumer Adoption:

...
Long-Term Unprofitability:
...
Pivoting to AI:
...
Workforce Reduction:

In essence, the $73 billion loss reflects Meta's
costly, long-term bet on the metaverse that
didn't pay off, forcing a strategic pivot towards
more immediate and promising areas like
artificial intelligence.

Sam Altman’s OpenAI could go bankrupt in
the next 18 months
.

Verizon outage map: How to check your area.

Verizon says its service is back after a
10-hour outage.
____
is there a better way than Ubuntu install to co
mpletely remove Microsoft-installed Windows
10 22H2 from a Lenovo Ryzen 7 5700U
laptop?

AI Overview

The most effective way to completely remove
Windows 10 is to use a dedicated hard drive
wiping utility, or use the "erase disk" function
within the Ubuntu installer itself, which
effectively achieves the same goal. This
ensures all partitions, including hidden
recovery and EFI partitions, are securely
erased.

Using the Ubuntu Installer (Recommended
for your purpose)
,,,
Choose "Erase disk": :) !
...
Alternative: Using a Dedicated Wiping Tool
...
DBAN (Darik's Boot and Nuke):
...
Both the Ubuntu installation method and
dedicated wiping tools are more thorough
than simply using the Windows "Reset this
PC" option because they ensure all hidden
partitions are removed, providing a
completely clean slate for your new
operating system.


Has Microsoft includes 10 22H2 features,
depending on the specific laptop, to try to
prevent return to 10 1909?

No, Microsoft did not include specific features in
Windows 10 22H2 with the intention of
preventing a return to version 1909. The
difficulty in rolling back is a technical
consequence of how major Windows
updates work, not a deliberate feature
to lock users into a newer version. Why

Downgrading is Difficult.
...
The main goal of the update mechanism is to
ensure a stable and secure system. The
difficulty in rolling back across significant version
gaps is a technical limitation due to how
system files and updates are structured,
not a feature designed to prevent
user choice.

Windows 11/10 is "unbelievable ...
poor-quality software product", says
new owner of GOG
.

does windows 10 22h allow MIcrosoft to
make changes and run software on my
computer?

AI Overview

Yes, even with Windows 10 version 22H2
(the final version), Microsoft did make changes
(security/quality updates) and could run
software until October 14, 2025, when support
officially ended, meaning they no longer provide
updates, making PCs vulnerable; now, users
must upgrade to Windows 11 or purchase
Extended Security Updates (ESU) to get vital
security software/fixes, though the OS itself
still functions.

What Microsoft Could Do (Before Oct 14,
2025)
...
What Happens Now (After Oct 14, 2025)
...
What You Should Do

Upgrade to Windows 11:

how many computer hardware manufacturers
have implement 64 bit floating point in
hardware and do they all get the same results?


AI Overview

Virtually all modern computer hardware manufacturers
implement the IEEE 754 64-bit floating point standard
in hardware, including major players like Intel, AMD, IBM,
and Nvidia. However, they do not always produce
the exact same results across different systems due
to allowable variations within the standard and
implementation choices.

Key manufacturers implementing this include:

Intel:
...
AMD:
...
Nvidia:
...
ARM:
...
IBM:
...
Consistency of Results
...
Rounding Modes: The IEEE 754 standard
defines five different rounding rules, and
while "round to nearest, ties to even" is the
most common default, different systems
or specific program settings may use
different modes.
___
Looking At A Real Fake Raspberry Pi
RP2040 Board
.
 
____
Coal-Powered Thermal Generation Declines
In China & India, But Surges In US
.

AI Overview

Gloucester's wind turbines are being decommissioned
primarily because the power purchase agreement
with Applied Materials is ending, but also due to
high costs, significant downtime from maintenance/
parts issues (like the blade failure in 2022), and
the city seeking to move away from expensive,
underperforming renewable energy sources, reports
the Gloucester Daily Times. The city council plans to
terminate the deal and remove the turbines from
the Dory Road site, despite some past success in
generating power.

Key Reasons for Decommissioning:
...
The decision reflects a broader discussion about
the economic viability and practicalities of older
wind energy projects in New England, notes the
Cape Cod Times.
Try 2.


Wednesday January 14 17:15
____
The AI Market Bubble Will Pop When...

LLMs are a 400-year-long confidence trick
(tomrenner.com)
.
____
Verizon outage hits users across US.
___
AI Overview

It is generally better to ask Google AI directly for information
rather than clicking on links in unsolicited messages, often
referred to as "MSM" or suspicious messages [1].

Here's why:
...
In essence, using Google AI as your information source
provides a safer and more reliable experience compared
to interacting with suspicious links [1].

____
Meta makes drastic workforce decision
after $73 billion in losses
.


Meta cuts more than 1,000 in Bay Area
tech's first big layoff of 2026
.

Oracle sued by bondholders over
losses tied to AI buildout
.
____
is mozilla thunderbird have issue with some updates? AI Overview

Yes, Mozilla Thunderbird (TB) users frequently report
issues after updates, ranging from slow performance
(like delayed folder loading or filtering), inability to
send/receive emails due to security protocol changes
(TLS), update failures, folder display glitches, and
even data loss (though rarer), often linked to
specific versions like 128 or conflicts with
antivirus software or Windows updates. While
updates bring fixes, they can introduce new
bugs or expose compatibility issues with
OS/security software, so users often suggest
checking release notes and troubleshooting
settings.

Common Issues Reported After Updates:
...
In short, yes, updates can cause problems, but
they often come with fixes, so users should
stay informed via official channels and be
prepared to troubleshoot.
___
Why would a Lenovo ryzen 7 4700u running
Windows 10 1909 give a message saying
that Microsoft is updating to 22H2 then not do it?

AI Overview

The message indicates an attempt to initiate
the update process, but the actual installation
is failing due to various common issues, such
as corrupted update files, insufficient disk space,
software conflicts (like third-party antivirus
programs), or the significant jump in versions
from Windows 10 version 1909, which is
very old and past its end of servicing.

Primary Reasons for the Update Failure
...
By following these steps, you should be able
to resolve the underlying issues preventing
the 22H2 update installation.
___
OneDrive Backup just got a massive change f
or the better - how it works now
.

is it a good idea to kepp one or more backups
on local drives as well as OneDrive?

AI Overview

Yes, it's a very good idea to have backups on both
local drives and OneDrive (or another cloud service),
following the 3-2-1 backup rule: 3 copies of data, 2
different media types, 1 offsite (like OneDrive), but
ideally adding a disconnected local drive for true safety
against ransomware/sync issues, as OneDrive syncs
deletions too. A local backup offers speed, while
OneDrive provides offsite disaster recovery, but
combining them covers more risks, like hardware
failure, theft, fire, or malware.

Why you need Both.



Cloud marketplace Pax8 accidentally exposes data on 1,800 MSP partners.

WDC Skyrockets 87% in 3 Months: Is the Stock Still a Buy in 2026?. Hacking The Krups Cook4Me Smart
Cooking Pot For Doom
.

FortiOS and FortiSwitchManager Vulnerability
Let Remote Attackers Execute Arbitrary Code
.

____
BP Forecasts Up to $5 Billion Hit on Energy
Transition Assets
.

Why Greenland Matters for a Warming World.
Try 2.

Tuesday January 13 16:55
___
Google Photos is holding my storage hostage,
so I built my own local backup
.
____
Microsoft swears off local subsidies
as worry over AI power crunch looms
.

Oil and Gas to Fuel the 500% Surge
in Data Center Power Demand
.

Microsoft Stock Slumps as Company
Vows to Cover Full AI Data Center
Power Costs
.

Meta will suffer the most from shouldering
higher data center costs
.

Cold weather and data centres drive
up US greenhouse gas emissions
.
____
Oracle unveils Java development plans for 2026.

 
____
DOE kills radiation safety standard.
Try 7.

Monday January 12 10:18
____
Does ingle task OS/nanocomputer technolgy
have a solution of the data center electricity
consumption issues?

AI Overview

Yes, using specialized, energy-efficient
hardware, such as single-board computers
(SBCs) or systems with specialized
processors designed for specific
tasks, can contribute to significant
data center electricity savings. The
efficiency gains stem from several
factors:

Specialized Hardware for Efficiency
...
Nano Computers/Single-Board
Computers (SBCs):
...
n-Device AI:
...
Software and OS Optimization
...
Optimized Code:
...
Resource Management:
...
Overall Impact

Implementing these technologies
doesn't solve the entire data
center electricity consumption
problem alone, as cooling and
power distribution also consume
significant energy. However,
adopting energy-efficient
hardware and specialized
systems is a key strategy
industry leaders are using to
maximize performance within
existing power limits and lower
operational costs.

____
LILYGO T-Beam 1W – An ESP32-S3 + SX1262
high-power LoRa dev board with 32 dBm output,
GNSS support
.
____
CLI agents make self-hosting on a home
server easier and fun (fulghum.io)
.
____
Zuckerberg’s AI Dream Unravels :
Why Meta’s Push into AI is Falling Apart
.

Don't fall into the anti-AI hype (antirez.com).

This CEO laid off nearly 80% of his staff because
they refused to adopt AI fast enough. 2 years
later, he says he’d do it again
.

AI Overview

Eric Vaughan of enterprise software company
IgniteTech laid off nearly 80% of his staff in
2023-2024 for refusing to adopt an AI-first
strategy, viewing generative AI as an "
existential" shift requiring immediate
integration, a move he says he'd repeat
due to significant subsequent company
growth and profitability. Vaughan
implemented mandatory AI training
and projects, but faced strong resistance,
particularly from technical staff, leading
to widespread replacement with workers
more willing to embrace AI tools, resulting
in new AI-driven products and high profit
margins, according to reports from
Fortune and Appvance.

Key Details:
...
Outcome: The company saw major
financial success and launched new
AI products, proving the strategy's
effectiveness for the business, but
highlighting the risk for workers
unwilling to adapt.

 
____
No Wonder Oil Execs Are Skittish, They Know
Perovskite Solar Cells Are Coming
.

US Army Selects Nine Bases for Microreactors.

Government drops $800 million on 2 nuclear
technology projects: 'Shaping the nation's
... future'
.
Try 1.

Sunday January 11 13:56
___

are revest, shamir,] and adleman all of jewish faith?

AI Overview

Yes, Leonard Adleman and Adi Shamir are Jewish, while
information on Ron Rivest's faith is less explicit in the
provided sources. The three are the co-inventors of
the RSA algorithm.

More specifically:

are rivest, shamir and adleman israelis?

AI Overview

No, only Adi Shamir is Israeli. Ronald Rivest and
Leonard Adleman are Americans.
...
The three scientists collaborated at MIT to
invent the RSA encryption algorithm, a
significant breakthrough in public-key
cryptography, for which they shared
the 2002 A.M. Turing Award
.

AI Overview

The idea of the "best" crypto algorithm being
one only you can decrypt while others think
it's secure is the core principle of modern
cryptography, but it relies on key management,
not algorithm trickery; algorithms like AES or
RSA are strong, but the security hinges on
keeping the secret key private, making key
secrecy paramount, not hiding the algorithm
itself, which is often public for scrutiny.

Why Public Algorithms (But Secret Keys)
Work:
...
In essence: The "best" algorithm is a
well-vetted, public one (like AES or
RSA) combined with a strong, secret
key that only authorized parties
possess. Hiding the algorithm while
keeping the key secret is the f
oundation of strong, modern
encryption.

AI Overview

No, 8-bit instructions are generally less
efficient for inverting binary matrices
compared to 16, 32, or 64-bit instructions,
especially for larger matrices. Larger
instruction sets and data buses allow
processors to handle more data
in a single clock cycle, significantly
speeding up complex computational
tasks like matrix inversion.

Why Larger Bit Widths are More
Efficient
...
In summary, for general-purpose
computing and computationally
intensive tasks like matrix inversion, l
arger instruction sizes offer superior
performance and efficiency due to
enhanced processing power,
memory handling, and specialized
instruction sets.

AI Overview

Yes, the number of digits (bits) in the
binary representation of an RSA modulus
reveals its length in bits [1]. The length
of a number in binary is simply the count
of its binary digits, which is synonymous
with its size in bits. An RSA modulus is a
large positive integer, and like any integer,
its bit length is determined by its binary
representation. For example, a 2048-bit
modulus will have a binary representation
that is exactly 2048 digits long (including
the most significant '1' bit) [1].

AI Overview

"LINPACK" is a software library and
benchmark for dense floating-point
linear algebra problems, not binary
matrices. It is not designed to
directly invert a 4096x4096 binary
matrix (a matrix where all entries
are 0 or 1, and arithmetic is done
modulo 2).

LINPACK and Matrix

Inversion
...
In summary, you would use a
specialized library or custom
code for binary matrices, not
the standard LINPACK library.
__





:)

___
A Much Faster Mac On A Microcontroller.

XIAO ePaper DIY Kit – EE02 – An ESP32-S3 board
designed for 13.3-inch Spectra 6 color E-Ink display
.
____
is linux becomming unmaintainable?

vAI Overview

While the core Linux kernel remains highly
maintainable and dominant in servers,
some aspects of the wider Linux ecosystem,
especially the desktop experience for
average users, face ongoing
challenges with inconsistent hardwar
e support, software fragmentation,
and specific areas like accessibility, leading
to perceptions of it being "unmaintainable"
in certain contexts, though overall
development and stability are strong.
The kernel is robust, but distribution
-specific issues and driver compatibility
can create maintenance burdens for
users and developers, differing greatly
from Windows/macOS.
...
The Verdict: It Depends on Context
...
For Servers & Developers: Highly
maintainable and reliable.

For Average Desktop Users: Can be
a mixed bag; excellent for some,
frustrating for others, depending on
hardware and needs, but generally
improving.
___
Microsoft May Have Created the Slowest Windows
in 25 Years with Windows 11 (eteknix.com)
.

Brussels plots open source push to
pry Europe off Big Tech
.
____
NewsSamsung Galaxy S26 camera
debate ends at hardware
.




I had no electricity for six months': American
families struggle with soaring energy prices
.

From Dumb To Dumber To Dumberer-est,
Trump Is Losing The Renewable Energy War
.

Trump assails 'windmills' and wind energy as junk:
'They're losers'
.

What the Market Gets Wrong about Renewables.

STOP THESE THINGS Stop These Things’ Weekly Round Up:
11 January 2026
.
Try 1

Saturay January 10 09:04
____
The Staggering Complexity And
Subtlety Of Concurrency
.

Investor Michael Burry Reveals
Options Bet Against Oracle
.

____
Data Center Spurt Suggests Strong
Harvest for Seagate Technology (STX)
.
"
What’s Driving Sandisk Corporation
(SNDK) Higher
.

why is sandisk sstock going higher?

AI Overview

SanDisk (SNDK) stock is surging due
to massive demand for its NAND flash
storage driven by the AI boom, leading
to anticipated sharp price increases
for its high-capacity drives,
especially for enterprise servers
and data centers, with analysts
predicting significant revenue and
profit growth from these higher
prices and tight supply.

Key Drivers:
...
Long-Term Growth: The long-term
trend sees growing data needs
from AI, benefiting SanDisk as it
can capitalize on increased
demand and pricing power.


Is Internet computing collapsing
due to 1 buggy 2 malware
penetrated, 3 obfuscated/compkles
unmaintainable software?

AI Overview

Internet computing is not collapsing,
although it faces ongoing and
significant challenges related to
software vulnerabilities, cyber
security, and code complexity [1].
The system's resilience stems
from continuous advancements
in security, system architecture,
and international collaboration
to mitigate these issues as
they arise [1].

Key Challenges in Internet
Computing

...
To learn more about current
cybersecurity measures and
best practices, users can
explore resources from the NIST
Computer Security Resource
Center,


s cybersecurity protection which
does not account for what each
bit in a computer memory is
doing vulnerable to malware?

AI Overview

Cybersecurity protection which
does not monitor the semantic
content of a computer's memory
(i.e., "what each bit is doing") can
be vulnerable to advanced malware,
particularly fileless malware and
memory-resident attacks, because
these threats operate within
legitimate processes and often
bypass traditional, signature-based
security tools [1, 2].

Vulnerability Explained
...
Modern Defense Mechanisms
...
In essence, an effective cyber
security posture requires a
defense-in-depth strategy that
includes monitoring the behavior
and context of operations within
memory, not just relying on
surface-level file scans. You can
learn more about securing
your systems through
resources like the CISA
cybersecurity best practices.

Microsoft issues important
warning for Windows 11 Insiders
,
____
More Samsung Galaxy devices
enter One UI 8.5 testing
.

Samsung and SK Hynix are jacking
up DRAM prices by as much as 70 percent
,
 
Try 1.

Friday January 9 18:58
____
why does ubuntu workd on a computer
when windows does not?

AI Overview

Ubuntu often works when Windows struggles because it's
more flexible with hardware, especially older or different
systems, and handles boot modes (UEFI/Legacy) and
file systems (like ext4) more gracefully, offering easier
installation on diverse partitions, though setup needs
attention to UEFI/BIOS settings and drive partitioning
for successful dual-booting. Windows requires specific
formats (NTFS) and can be picky about boot modes,
whereas Ubuntu's open-source nature and default
tools often bypass these issues, providing a smoother
path for users wanting to try or install Linux, even
alongside Windows.
...
In essence, Ubuntu's design philosophy
prioritizes adaptability and user choice,
making it often more forgiving on varied
hardware and complex partition schemes
than Windows, which is built for a more
standardized, proprietary environment.

___
Why Oracle Stock Crushed it on Friday.

____
This is the tiniest Linux distro I've ever seen. [maintenance issue?]
____
Data Centers Are Asked to Bring Own
Power Generation... or Shut Down
.""

is big tech currently using in its data centers
1 high-watt hardware 2 old technology
obfuscated/compolex software?


AI Overview

Yes, big tech is currently utilizing both
high-watt hardware and some legacy/complex
software, but the latter is generally being
actively modernized rather than intentionally
obfuscated.

1. High-Watt Hardware
...
2. Old Technology & Software

Proprietary Efficiency: Big tech firms design much
of their own hardware and software
infrastructure to optimize performance
and efficiency for their specific needs. This
often results in complex, highly specialized
internal systems, but the goal is efficiency
and scale, not intentional obfuscation for
negative purposes.




Meta Signs Multi-Gigawatt Nuclear Deals
for AI Data Centers
.
____
Why Microsoft Employees Over 40 Fear
They're Being 'Targeted' in January 2026 Layoffs
.
____
Linus Torvalds: Stop making an issue out of AI slop
in kernel docs – you're not changing anybody's mind
.

____
A quantum leap for programming.
____


Does multiplying two square nonsingular matricies
of tghe same rank result in a nonsingular product?

AI Overview

Yes, multiplying two square, nonsingular matrices
of the same size always results in a nonsingular
matrix, because nonsingular matrices have full
rank (rank \(n\) for an \(n\times n\) matrix)
and the rank of a product of matrices doesn't
increase, so the product will also have full rank.
This means the determinant of the product is
non-zero, and the product matrix is invertible. 

Key Concepts:
...
In simpler terms: A nonsingular matrix
represents a transformation that doesn't
collapse space (it's invertible), and applying
two such transformations one after the other
still results in a transformation that doesn't
collapse space.

In RSA encryption if the encryption and
decryption exponent are contained in two
512 bit numbers, thn the modulus must be
contained in a 1024 bit number?


AI Overview

No, the size of the exponents does not
dictate the size of the modulus in RSA
encryption, although the decryption
exponent is typically around the same
size as the modulus. The security of
RSA depends on the difficulty of factoring
the modulus, which is why the modulus
must be significantly larger than the
prime numbers from which it is derived.

Here's a breakdown of the typical
relationships
:
...
Prime Numbers (p and q): These primes
are usually chosen to be roughly half the
size of the modulus in bits. For a
1024-bit modulus, two 512-bit
primes would be used.
...
Therefore, if your encryption and
decryption exponents are both 512
bits, the modulus would generally
be larger (typically 512 bits if using
smaller primes, which is now
considered insecure, or more
commonly 1024 bits or greater
for modern security standards,
in which case the decryption
exponent d would be close to that
size). The bit size of the exponents
is a consequence of the modulus
size (specifically \(\phi (N)\)),
not the other way around. 


what is the best way to inverft a
nonsngular matrix?


AI Overview

Inverse of a Matrix - GeeksforGeeks The
best way to invert a nonsingular matrix
depends on the context, but generally
involves Gaussian Elimination (Row
Reduction) (augmenting with the identity
matrix and reducing) for general cases, or
efficient Decomposition Methods (LU, QR,
SVD) (like LU Decomposition for speed or
SVD for numerical stability with
ill-conditioned matrices) for
computational performance, as these
are more stable and faster than
calculating determinants or cofactors for l
arge matrices.

___

New OAuth-Based Attack Let Hackers Bypass
Microsoft Entra Authentication Flows
to Steal Keys
.
\____
NewsSamsung phones are getting the
long-delayed update this month
.

is Samsung phones are getting the long-
delayed update this month going to fiz
a23 photo download issue?

AI Overview

It's unlikely a single update will magically fix
all A23 photo download issues, as
problems often stem from app conflicts
or specific software bugs, but a major OS
update (like One UI 6 or 8) could include
fixes, though users have reported issues
after updates too, so check official Samsung
forums for A23-specific patch notes for
the latest January 2026 updates for
solutions, or try clearing app cache/safe
mode first.

What to Do for Your A23:
....
Key Takeaway: A long-delayed update
might contain fixes, but it's more about
which update and what it addresses, so
investigate specific fixes for your A23
model rather than waiting for a general "
fix-all".

Samsung’s Galaxy S26 trio may actually
look like this



The

Samsung Galaxy S26 does not exist
yet as it is a forthcoming flagship model
expected to launch in early 2026, likely
with Android 16, not Android 14.
However, it is certain that any
Samsung S-series phone (a high-end
flagship line) will offer significantly better
performance than a budget-oriented
Moto G 5G model due to vastly
superior hardware.

Here is a general comparison of a
typical Samsung S-series phone (like
the recent S25 or rumored S26)
versus a Moto G 5G mode
l:


____
Meta strikes nuclear power agreements
with three companies
.
Try 1.

Thursday January 8 07:36
____
Stop Designing Languages. Write Libraries Instead”
(2016) (lbstanza.org)
.
____
Nvidia's Rubin Deployment Supports
The Burry Crash Thesis
.

What Nvidia just did could rewire the AI race.
____
Anthropic Plans $10B Funding Round
at $350B Valuation
.

Kelly Evans: Goodbye, Google.

AI Overview

There is no prominent person named Kelly Evans
who works at Google. The most
well-known Kelly Evans is a prominent
journalist and news anchor for CNBC.

She is the anchor of CNBC's program "The
Exchange" and co-anchor of "Power Lunch",
where she covers business and finance news.
She frequently writes commentary on
technology companies, including Google,
but she is not an employee of the company
itself.


____
One UI 8.5 makes Samsung lock screen
feel alive with AI weather effects
.



PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352,


 
____
How To Lose The War On
Renewable Energy, Bigly
.
Try 1.

Wedneday January 7 21 :30
____
AI Overview

No, the Intel Pentium Silver N6000 processor is not built
with the 18A process node. The Pentium Silver N6000
was launched in early 2021 and is manufactured using
the first-generation Intel 10 nm process (not 10 nm
SuperFin or Intel 7). The Intel 18A process (equivalent
to 1.8 nm) is a much newer, future-generation process
technology that is progressing toward high-volume
production in the second half of 2025.

The first products
expected to be built on the Intel 18A process are the
upcoming Panther Lake client CPUs and the Clearwater
Forest server processors.

____
AI Overview

The duel between the two main aircraft used in
commercial ... The Airbus A320 family has recently
surpassed the Boeing 737 family to become the
most delivered commercial aircraft type in history,
with Airbus breaking Boeing's long-standing
record in late 2025, making the A320 family
currently more numerous in total deliveries, t
hough the 737 had a significant head start.

Key Points:

____
The World’s 50 Largest Economies and How
Fast They’ve Grown Since 2000
.
____
Samsung Silently Changes Android On
Hundreds Of Millions Of Phones
.


does the galaxy s26 have a sim/sd slot?

I Overview

No, the Samsung Galaxy S26 series, following
the trend of recent flagship S-series phones l
ike the S24, does not have a microSD card
slot for expandable storage, though it does
have a SIM card slot (often hybrid for a
second SIM or eSIM). Samsung has
moved away from SD card support in its
main S-series to encourage higher internal
storage purchases, focusing expandable
storage on their A-series phones instead.

Key Points:

at is the price of the least expensive
moto g 5g 128 gb and where can it be
bought?

____
STM32MP21 Arm Cortex-A35/M33 MPU targets
cost-effective applications in smart factories,
homes, and cities
.

STM32MP21 Arm Cortex-A35/M33.

AI Overview

The STM32F405RG, being a powerful Cortex-M4
MCU, primarily uses C/C++ for development
via tools like STM32CubeIDE and supports
real-time operating systems (RTOS) like
FreeRTOS, alongside bare-metal programming,
with MicroPython also available for some
STM32s; while no traditional desktop OS
runs on it, the device interfaces with PCs
running Windows, Linux, or macOS using
drivers.

Supported Languages:

Redefining Edge Computing: How the STM32V8
18nm Node Outperforms Legacy 40nm MCUs
.
____
Tech Memory chip giants spark global
semiconductor rally as shortages
stoke price hikes
.

Seagate Technology (STX) Shares
Skyrocket, What You Need To Know
.

Why SanDisk Rocketed Higher, Yet Again,
Today
,.

Micron announces 3610 SSD, the
industry-first PCIe 5.0 QLC SSD
available to OEMs — offers 4TB
storage in a tiny single-sided
M.2 2230 and 11,000 MB/s
of performance
.

SanDisk is replacing WD Blue and
Black SSDs with new Optimus models
.
____
Is an AliExpress Homelab a Good Value?.
____

iif a publickey encryption exponent is maximum
512 bytes long, then can the decryption be be
up to 512 bytes long?

AI Overview

The question seems to be incomplete or based
on a misunderstanding of typical public-key
encryption (RSA) parameters. The size of an
RSA key usually refers to the modulus size
(e.g., 4096 bits or 512 bytes). The public
exponent is typically much smaller.

Assuming the user meant the modulus is
512 bytes long, here is the solution for the
private (decryption) key:

Step 1: Understand the Key
...
Answer: 

Yes, the decryption exponent (private
exponent \(d\)) in an RSA cryptosystem
with a 512-byte modulus can be up to 512
bytes long, typically slightly less, making it a
similar size to the modulus itself. The entire
private key, when encoded into a file, is
significantly larger due to the inclusion of
additional precomputed values used for
performance optimization. 
____
Pre-Compiled Headers Being Debated For
LLVM/Clang To Speed-Up Build By 1.5~2x
.
____
The creator of Claude Code's Claude setup
(twitter.com/bcherny)
.

what software system used to write Claude?

AI Overview

Anthropic built Claude using its own large language
model architecture, trained with tools like PyTorch,
JAX, and Triton, running on cloud platforms (AWS/GCP),
while specific applications like the command-line tool
Claude Code use a front-end tech stack of TypeScript,
React, Ink, Yoga, and Bun for development, with
the AI writing much of its own code.

Core AI System
...
Key Takeaway: Claude's "software system" is a
combination of its foundational AI model,
extensive training infrastructure, and specialized
application layers like Claude Code, which itself is
built using modern web and CLI technologies.

Anthropic's "infinite vibe coding machine".
____
Amazon is cutting checks to millions of
customers as part of a $2.5 billion FTC
settlement. Here’s who qualifies and
how to get paid
.

 
____
DOE orders 446-MW Colorado coal unit
to keep running
.

DOE Awards Billions to Bolster U.S.
Uranium Enrichment Supply Chain
.
Try 3.



Tuesay January 6 10:48
____02
Everyone hates OneDrive, Microsoft's cloud
app that steals then deletes all your files
.

Western Digital Vs. Pure Storage:
Battle Of Compute Storage
.

With Transmission Line Controversies,
Local Leaders Look to Move Away
from Data Center Growth
.

AWS raises GPU prices 15% on a Saturday,
hopes you weren't paying attention
.

Microsoft (MSFT) Eyes Major January
Layoffs as AI Costs Rise
.
____
AI godfather says Meta’s new 29-year-old AI boss is ‘
inexperienced’ and warns of staff exodus
.
___
Samsung’s January 2026 One UI patch is
different from usual updates; details out
.

whicch 2004/5 cell phones do not a
sim and sd card slots?

AI Overview

Cell phones from 2004 and 2005 that lacked both
a SIM card slot and an SD card slot were
typically those operating on CDMA networks
(common in the US with carriers like Verizon
and Sprint) rather than the GSM networks
(common globally). GSM phones have
always required a SIM card to connect to the
network.

Specific examples of phones, often flip phones,
from that era and network type that did not
use a SIM and typically relied solely on very
limited internal memory include:

Motorola
RAZR V3m (a CDMA variant of the popular
V3 model)
...
These phones were provisioned by the
carrier and relied on a built-in internal
memory for contacts and media, often
without the option for removable storage
expansion via an SD card.

Motorola's 2026 product lineup proves that
old habits die hard and this brand refuses
to learn
.

will a factory reset restore photo download
capability to a samsunung galaxy a23?

AI Overview

A factory reset erases everything, so it won't
restore existing download capability but can
fix issues preventing downloads if the problem
was software-related; photos already on the
phone are gone unless backed up to Google
Photos or Samsung Cloud/Smart Switch
before the reset, but you can redownload apps
and resync backed-up data after the reset.
If downloads fail due to a software glitch, a
reset might help, but if it's a network/account
issue, you'll need to fix that after the reset,
not with the reset itself.

Before Resetting (Check these first!)

Google Photos:

...
Samsung Cloud/Smart Switch:
...
Internet Connection:
...
...
App Permissions:
...
If You Must Factory Reset (and have
backups)
:
____
No phonw verifiation number arrived.







what is whatsapp?

AI Overview

What Is WhatsApp and Is It Secure? Features,
Download, Cost ... WhatsApp is a free, popular
messaging and calling app owned by Meta that l
ets users send texts, make voice/video calls, and
share media (photos, videos, documents) over
the internet, using your phone number for signup
and offering end-to-end encryption for secure
communication. It works across smartphones
(iOS/Android) and computers, leveraging Wi-Fi
or mobile data, making international
communication cheaper and easier than
traditional SMS, and includes features like
group chats, status updates, and channels.

Key Features:. [Big Tech solution?]
***
THis View Orders only occur on Lenovo Ryze7 4700U laptp.
____
The Quiet Unraveling of the Power Grid Monopoly.

Oklo Inc. (OKLO) Climbs 14.8% as
Govt Puts Nuclear Back In Spotlight
.

Centrus Energy wins $900M award to
restart domestic nuclear fuel production
.

Oak Ridge companies receive $1.8B to
strengthen domestic uranium enrichment
.
Try 1.

Monday January 5 17:09
____
C Is Best (2025) (sqlite.org).
____
Stop Paying for Storage.

SanDisk 4TB Portable SSD Crashes
to $0.06 per GB, With 1 Month
of Adobe Creative Cloud Included
.


Get your digital life in order with
10TB of lifetime cloud storage
.

How Energy Scarcity Is Reshaping
the Global Economy
.
____
ARM explained: How a chip designer
became central to modern computing
.

GitHub Disables Rockchip’s Linux MPP
Repository After DMCA Request
.

AI Overview

GitHub disabled the Rockchip Linux
MPP repository following a DMCA
takedown request from the FFmpeg
team due to severe license violations.

The core issue was that the
Rockchip Media Process Platform
(MPP) framework, which provides
hardware-accelerated video
operations, incorporated large
amounts of code directly copied
from FFmpeg without complying
with the original license terms.

Specific violations alleged by the
FFmpeg team include:
...
The FFmpeg team had attempted
to resolve this privately with
Rockchip for nearly two years,
but no action was taken by
Rockchip to rectify the
situation, ultimately leading
to the public DMCA request
and repository takedown by
GitHub.

What is the FFmpeg team and
who pays them?

AI Overview

The FFmpeg team is a community
of volunteers and developers
who maintain FFmpeg, a critical
open-source multimedia
framework used by companies
and applications worldwide for
handling audio and video. The
team members are largely unpaid
volunteers, though the project
receives funding and contributions
from various sources. The
FFmpeg Team.

The team is a loose community
of thousands of individual
contributors over the past 20
years, including hobbyists,
researchers, and employees
of corporations who contribute
to the project.
...
Who Pays Them

The team is not traditionally
"paid" a salary in the way
employees of a single company
are; rather, the project receives
financial support and in-kind
contributions through donations
and grants. The primary
sources of financial support include:
,,,
There has been ongoing public
debate regarding the reliance
of multi-billion dollar companies
on this volunteer-maintained,
critical infrastructure and the need
for more substantial, consistent
corporate funding for essential
open-source projects.

____
Chinese cyberattacks on Taiwan infrastructure
averaged 2.6 million a day in 2025, report s
.

are there US cyberattacks on China's
infrastructure?

AI Overview

China has accused the United States
of carrying out significant cyberattacks
on its critical infrastructure, including
its National Time Service Center, energy,
transportation, and communications
sectors. These are specific allegations
made by Chinese authorities in state
media and official ministry posts,
who claim to have evidence of
NSA involvement.

Chinese Allegations Against the US
...
US Position and Mutual Accusations
...
In essence, China claims the US is
attacking its systems, while the US
makes similar claims about China
targeting American infrastructure.
___
There Is No One Left On Debian's
Data Protection Team
.
____
Lessons from 14 years at Google
(addyosmani.com)
.

 
___
Soaring raw materials costs leave
solar power industry reeling
.

Singapore's Digital Empire Hits the
Energy Wal
l.
Try 1.

Sunday January 4 16:34

____
Albert Einstein's timeless quote,

"In the middle of difficulty lies '
opportunity," highlights
how challenges foster resilience
and innovation. This principle
remains crucial today, encouraging
us to adapt and grow from setbacks.
By embracing curiosity and
problem-solving, we can transform
obstacles into pathways for
progress and personal development. "

what software technologies are used in robotics?

AI Overview

Robotics software relies on core "
programming languages (C++,
Python, C), specialized frameworks
like the Robot Operating System "
(ROS) for complex tasks, and
simulation tools (Gazebo, NVIDIA
Isaac Sim) for design and testing,
along with CAD for hardware, AI
libraries (TensorFlow), and
proprietary PLC software for
industrial control, all working to
enable robot perception,
planning, and action.

Key Software Components
...
Key Technologies & Concepts
...
Cloud Robotics: Offloading computation
to the cloud for complex AI.

for is a hyperbola a parabola with it middle
draped around infinity?

That's a creative way to think about it, but
no, a hyperbola isn't a parabola with its
middle draped around infinity; they're
distinct conic sections with different
definitions and shapes, though both are
open curves extending infinitely, but a
hyperbola has two separate, mirrored
branches approaching asymptotes (lines)
while a parabola has one continuous
arm getting flatter, defined by a focus
and directrix, not asymptotes in the
same way.

...
So, while both are open and go to
infinity, the hyperbola's "draped"
look comes from its two branches
approaching those invisible asymptotes,
not from being a modified parabola.



is ilsam math more appli cable to
computers thab western math?

AI Overview

Islamic mathematics is not fundamentally
different from "Western" mathematics;
rather, it represents a crucial historical
bridge that preserved, translated, and
expanded upon the mathematical
knowledge of ancient Greece, India,
and other regions, forming the
foundation of modern, global
mathematics as it is known
today [1]. The concepts developed
during the Islamic Golden Age, such
as algebra and algorithms, are
indeed highly applicable to
computers, but this application is
part of the universal history of
the discipline, not the result of
a separate mathematical system.

Would Aboulghassem agree?

Linus Torvalds Gets Candid About
Windows, Workflows, and AI
,
____
Big Tech’s fast-expanding plans for data
centers are running into stiff community opposition
.

Are AI data centers still needed, or have the
Swiss punched holes in them?
.

___
A New Bridge Links the Strange
Math of Infinity to Computer Science
.
____
Samsung Camera gets polished video resolution
.interface in One UI 8.5 over One UI 8.0
.





is One UI buggy-- software destroying
Samsung cell phone business?

AI Overview

Yes, Samsung's One UI, particularly with
recent major updates like One UI 7
(Android 15), has experienced
significant bugs, leading to user
frustration, update pauses,
and concerns about software
quality impacting customer trust
and potentially business, though
it hasn't destroyed the business,
it's a significant challenge
alongside competition from
Chinese brands. Users reported
critical issues like inability to

unlock phones, battery drain,
and heating, causing Samsung
to halt rollouts to address
these problems and rebuild
confidence.

Key Issues with Recent One
UI Updates (e.g., One UI 7)

...
Impact on Samsung's Business:
...
In Summary: One UI faces
real, significant bugs that
hurt user experience and
brand image, but "destroying"
the business is an
overstatement; it's a
serious challenge that
Samsung must overcome
to compete effectively,
especially as they integrate
more Galaxy AI features.

____
"Microslop" trends on social media — backlash to
Microsoft's on-going AI obsession continues
.

 
Try 1.

Saturday January 3 18:53
____
21 Gigawatts of Solar for California Land
That Can No Longer Be Used for Agriculture.

____
The compiler is your best friend (daniel-beskin.com)

____
WCH CH32H417 dual-core RISC-V MCU
offers USB 3.0, 500MB/s UHSIF, and
Fast Ethernet interfaces
.

Benchmarking Windows Against Itself,
From Windows XP To Windows 11
.

5 FREE TOOLS TO KEEP YOUR WINDOWS 10 PC
SECURE WITHOUT FURTHER MICROSOFT SUPPORT
.

What Do You Want to See From Ubuntu in 2026?.

10 Biggest Ubuntu Changes in 2025.

Zork Running On 4-Bit Intel Computer.

what is zork?

AI Overview

Zork: The Great Inner Workings. Exploring
the source code and ... Zork is a classic,
influential text-based adventure game, a
form of interactive fiction where players type
commands (like "go north" or "take lamp")
to interact with a fantasy world described
by the computer. Players explore the "Great
Underground Empire," solving puzzles and
collecting treasures, with the game
responding in a witty, sarcastic tone.
Originally created at MIT in 1977,
its advanced language parser and
immersive world made it hugely popular
in the 1980s, paving the way for future
RPGs and inspiring modern games.

Key characteristics.
____
2026 is a ‘Reset Year’ for Samsung
One UI software
.


how do i get Samsung Galaxy A23 into
the usb data transfer mode?

AI Overview


To get your Samsung Galaxy A23
into USB data transfer mode,
connect it to your computer
with a USB cable, then swipe down
the notification panel on your phone
and tap the "Android System" or
"USB" notification to select
"Transferring files / Android
Auto" (or MTP) from the options.
This lets your computer see the
phone's storage for moving photos,
videos, and other files.

Step-by-Step Guide:
Unlock your Galaxy A23.

Connect your phone to
your computer using a USB
cable (USB-C to USB-A or
USB-C to USB-C, depending
on your PC).

Swipe Down from the top of
your phone's screen to open
the notification panel. Tap the
USB notification (it might say
"Charging this device" or
"Android System").

Select "Transferring files
Android Auto" (or MTP)
from the menu that appears.

Open File Explorer (or This
PC) on your computer and
find your device listed to
start transferring files.

Troubleshooting Tip:

If the notification doesn't
appear or you have issues,
try using a different USB port
or cable, ensure your phone is
unlocked, and check for a
prompt to "Allow" access
to your phone's data when
you first connect.
 
____
It’s 7 times the size of Manhattan and will be even
larger in 2026 — 7,000,000 solar panels aligned in China
.

is Permian basin waste water radioactive?

AI Overview

Yes, Permian Basin wastewater (produced water)
is radioactive, containing naturally occurring
radioactive materials (NORM) like radium, along
with high salinity, heavy metals, and oil/gas residue,
making it a hazardous waste that requires careful
management and disposal, often through deep
underground injection or specialized recycling.

Why it's radioactive:
,,,
What's in it:
...
Management & Concerns:

Airloom will showcase its new approach to wind power at CES.
Try 1.

Friday January 2 18:54
____
Microsoft wants to resurrect Three Mile Island.
It will never hapen
.

Mark Cuban Warns 4 Key Industries
Could Crumble in the Next Recession
.""

Mapped: A Snapshot of Global Migration.

325,000 Californians will need to replace REAL
IDs due to DMV software error
.

Seagate Technology is the top performing
technology hardware, storage, and
peripherals stock YTD
.




$9.3B lost to crypto scams. Here’s how
to avoid being a victim in 2026
.


Seagate Technology is the top performing
technology hardware, storage, and peripherals stock YTD
___
Microsoft CEO Satya Nadella is
now blogging about AI slop
.
____
Orange Pi: New SBC or mini PC with up to
96GB RAM runs circles around Raspberry
Pi 5 with 176 TOPS
.

what is the least experenive digitl calculator,
how is it powe

red and how many watts
does it draw?

AI Overview

The least expensive digital calculators
are basic, pocket-size models that
typically cost around $1 to $5. They
are powered by a combination of
solar power and a small battery backup,
and draw a minimal power of
approximately 0.02 to 0.35 watts
when in use.

Least Expensive Calculators: Details
...
You can find current offers for basic
calculators on retailer websit
____
Rent inexpensive vivobook laptops report
WiFi speed of 400 mbps while similar
lenovo report 1.2 gbps both running
Windows 11. Why?

AI Overview

The significant difference in WiFi speeds
between the two laptops is almost
certainly due to a difference in their internal
WiFi adapter hardware and the wireless
standard they support, not the operating
system. The Lenovo laptop likely has a
more advanced adapter than the Vivobook.

Hardware Differences are Key
...
To confirm the exact cause, you can
check the specific model of the WiFi
adapter in each laptop's Device Manager
in Windows and look up its specifications
online.


do recent hp laptop lids separate
easily from the body?

AI Overview

Yes, many recent HP laptops, especially
models like the Envy and Pavilion,
experience issues with lids separating or
hinges breaking from the body, often
due to plastic chassis cracking around
the hinge mounts, a design flaw
where hinge screws pull out of
plastic, not direct user error.
This leads to the lid's case detaching,
even with careful use, creating
significant gaps and structural failure.

Why This Happens (Common Issues):
...
In summary: The issue of lids
separating easily from the body,
particularly around the hinges,
appears to be a known problem
in many recent HP laptop lines
due to design and material
choices, leading to common
complaints and repairs.


is algebra Islamic math?

Algebra isn't inherently "Islamic
math," as math is universal,
but Muslim scholars, particularly
Muhammad ibn Musa al-Khwarizmi,
were crucial in developing algebra
as a distinct discipline and giving it
its name during the Islamic
Golden Age, codifying ancient
methods and adding significant
contributions like
solving quadratic equations,
which led to the term "algebra"
from the Arabic al-jabr.

Key Contributions by Islamic Scholars
...
In essence: While the roots of
algebra predate Islam, Muslim
mathematicians defined and
advanced it as a unique branch
of mathematics, making
foundational contributions that
shaped its modern form and
spread it globally.


what is al Jazeera?

Al Jazeera Media Network is a
Qatari-based, international
news organization,
headquartered in Doha,
known for its Arabic and
English news channels
that offer in-depth coverage
with a focus on multiple
perspectives, challenging
traditional state-controlled
media by providing a platform
for underreported stories and a
broad range of viewpoints.
Launched in 1996, it operates
globally, reaching millions and
includes various subsidiaries
like Al Jazeera English and AJ+.

This video provides a documentary
overview of the Al Jazeera network
.

____
Linux is good now
(pcgamer.com)
.
 
____
SMRs Explained: Real-World Economics,
Fuel Bottlenecks, and the Race to Scale
.

Orsted files legal challenge over Trump’s
halt to $5 billion offshore wind projec
.

The Case Against Offshore Wind Is Already
Crumbling (Shocker!)
.

CHINA'S LARGEST SOLAR FARM IS DOING
A LOT MORE THAN GENERATING ENERGY
.
.Try 1.


Photo at prosefights.org there but patjhs were caanged by hacker.

how often does hostgator backup its clients websites?

AI Overview

HostGator provides free weekly backups for most
shared/VPS/reseller plans, overwriting older ones,
but these aren't guaranteed and require a fee for
restoration; for more reliable, daily backups with
security monitoring, you need to purchase their
CodeGuard service, which runs automated daily
backups, while you can also create your own
manual backups via cPanel.

HostGator's Standard (Free) Backups:
..
For critical sites, use CodeGuard for daily protection
or set up manual backups frequently and store
them securely.


Thursday January 1 17:36
____
Charted: How Global Economic Power Shifted (1980–2025).

Charted: The sharp decline in federal employment.

Where are The World's Rare Earth Minerals Located?.

Blue states blow nothing but hot air on wind-power
boondoggles
.

European banks plan to cut 200,000 jobs as AI takes hold.

____
my hostgaore websited hack what should i do?

AI Overview

If your HostGator website has been hacked,
you need to act immediately to secure it
and minimize damage. The core steps
involve isolating the site, changing
all passwords, scanning for malware,
cleaning the infection, and then
restoring a clean version.

Immediate Actions
...
Malware Removal and Site Restoration
...
Post-Cleanup and Prevention



____
what are the lengthsin bits of the current argest
Public Key encription espondent and product?

AI Overview

The largest public key encryption key lengths in
widespread practical use are typically 4096
bits for the RSA algorithm and 521 bits for
Elliptic Curve Cryptography (ECC). Some
systems may support keys up to 8192 bits
for RSA, or 512 bits for certain ECC curves,
for extremely high-security or long-term data
protection needs.

Common Key Lengths in Practice
...
Key Observation
...
The specific "largest" key in use may
vary depending on specific application
requirements and performance
considerations, but the widely
available and supported maximums
are generally in the 4096 to 8192
bits range for RSA and around 521
bits for ECC.

n essence, ECC drastically improves
reliability but isn't foolproof; while it
prevents most silent data corruption,
it can't guarantee immunity from all
hardware failures or complex errors,
especially when the ECC mechanism
itself fails
.

In essence, ECC trades a bit of speed
and a higher price for significantly
enhanced reliability, a worthy
trade-off for mission-critical systems
but often overkill for typical desktop
use.
____
One UI 8.5’s Now Brief rings in the New.
Year 2026 with a personalized greeting
.

____
The Many-Sprites Interpretation
Of Amiga Mechanics
.
____
Zorin OS says Windows users drove nearly 1M downloads,
so I installed it to see why
.
____
2 major Oregon employers
announce mass layoffs
.
 
____
Trump administration orders a Colorado
coal-fired power generator to stay open
.

Electric Vehicles and Nuclear Power
Are Fighting Over One Obscure Mineral
.

The 10 Most Important Energy Stories of 2025.
Try 2.


Microsoft Sculpcomfort BT mouse used on Lenovo Ryzen 4700UU.

Wednseday December 31 16:09
____
What exactly is Canonical, the company behind Ubuntu?.

GCC & The GNU Toolchain's Exciting 2025 With New
Languages, More Optimization
.
____
DarkSpectre Hackers Infected 8.8 Million Chrome,
Edge, and Firefox Users with Malware
.

Researchers Spot Modified Shai-Hulud Worm Testing
Payload on npm Registry
.
____
One UISamsung’s One UI 8.5 refreshes
Software Update experience over
One UI 8.0
."

Unable to download photos from Samsung Galaxy A23 cell phone
ater One UI update on Decenber 7, 2925

Blow messsage briefly flashed on phone
which made it impossible to read.

Ohoto taken with moto g cell l phone.





Multiple Google AI inustructions to enable usb file transfer ffaied.

____
IBM Warns of Critical API Connect Bug
Allowing Remote Authentication Bypass
.
____
The 5 Best Cloud Storage Apps,
According To Consumer Reports
.

The 3 Cheap Alternatives That
Replaced USB Drives
.___
Go away Python
(lorentz.app).
 
____
Homeowners sound the alarm after
federal report reveals the dangers of
backup generators: 'Every single year …
there's a report of a few people dying'
.

Wind Power’s Lost Year May Be
Setting Up a Reset in 2026
.
Try 1.

Tuesday December 30 11:19


Pics not appearing at prosefights2.og. Hacker work?
____
Softbank has fully funded $40 billion
investment in OpenAI, sources tell CNBC
.

____



are the 8088 si and di registers effecrtively
data pointers?

AI Overview

Yes, the 8088's SI (Source Index) and DI
(Destination Index) registers function
effectively as data pointers. They are
specifically designed to hold offset
addresses for memory access.

Their primary functions are:
...
In essence, they operate much like
pointers in high-level languages like
C/C++, providing a flexible and
efficient means of accessing and
manipulating data in



____||
Samsung refreshes its Clock app
on One UI 8.5 Galaxy devices
.

Windows Vulnerabilities via Kernel Drivers
and Named Pipes Allows Privilege Escalation
.
____
The future of software development is software developers
(codemanship.wordpress.com)
.

Why your coding skills are more essential
than ever in the AI age
.
 
____
China is running out of critical battery material:
here are the countdowns
.

All of the World’s Oil Reserves by Country,
in One Visualization
.
Try 1.

Monday December 29 17:13
____
The AI Arms Race Is Cracking Open the
Nuclear Fuel Cycle
.


____
Only Known Copy Of UNIX V4
Recovered From Tape
.







what languages was UNIX V4 written in?

AI Overview

UNIX Version 4 (V4) was primarily written in the C
programming language, with some parts remaining i
n assembly language. This version, released in 1973,
was a major turning point as it was the first Unix
kernel to be largely written in a high-level language.

The use of C, which was developed alongside
Unix at Bell Labs by Dennis Ritchie, allowed the
operating system to be more portable across
different computer architectures, a revolutionary
concept at the time. The remaining assembly
code was mainly used for low-level,
processor-specific tasks like initial booting and
direct hardware interfacing, where C could not
provide the necessary control or performance
benefits.

Earlier versions of Unix (V0 through V3) had
been written almost entirely in assembly
language, with some utilities in the B language.
The development of the C language was
specifically
motivated by the need for a portable and
efficient systems programming language
to rewrite the operating system.

are mulitasking OSes complex?

Yes, multitasking operating systems (OSes)
are inherently complex because they must
manage multiple processes simultaneously,
requiring sophisticated scheduling algorithms,
memory management, and resource allocation
to give users the illusion of true parallel execution,
especially with preemptive multitasking, which is
more advanced than simpler cooperative
methods. This complexity involves the OS
constantly switching between tasks (context
switching), prioritizing critical functions, and
handling potential resource conflicts, all
while maintaining system responsiveness
and stability.

Key Complexities in Multitasking OSes:

Cooperative vs. Preemptive Multitasking:


who funded UNIX V4?

UNIX V4 (Fourth Edition), released in 1973,
wasn't "funded" in the modern commercial
sense; it was an internal research project
developed by AT&T Bell Labs, primarily by
Ken Thompson, Dennis Ritchie, and others,
using internal resources and equipment like
the PDP-11 minicomputer. They initially
secured a new computer by promising Bell
Labs' patent department to build software
for them, making it a passion project that
evolved into a landmark operating system,
funded by Bell Labs' research budget.

Key Funding & Development Details:

Developer: AT&T Bell Laboratories
(Western Electric). Key People: Ken
Thompson, Dennis Ritchie, Doug McIlroy,
Joe Ossanna.
...
In essence, UNIX V4 was an outgrowth
of Bell Labs' research efforts, leveraging
internal funding and resources rather
than external
.


does intel 8088 have usal dta pointers
and d use cycle stealing?

The Intel 8088 microprocessor does not
have integrated DMA pointers or a built-in
DMA controller; instead, it uses a separate,
external 8237 DMA controller chip. DMA
operations in the 8088 system typically
use the cycle stealing method.

DMA Operation in the 8088 System
...
In summary, the CPU itself doesn't manage
the DMA pointers or the transfer process;
it simply hands over the bus when requested,
allowing the dedicated 8237 chip to perform
the data movement efficiently using cycle
stealing.

***

Yes, the original IBM PC used Direct Memory
Access (DMA) with an Intel 8237 controller
for high-speed data transfers, primarily for
the floppy disk controller and RAM refresh,
allowing peripherals to move data to/from
memory without constant CPU intervention,
a crucial feature even though the 8088
CPU was slow.
____
former Meta engineer, who quickly rose
through the corporate ranks, says
you shouldn't 'aim for promotions'
.


____
Mini nuclear reactors are already losing their glow..
Try 2.
 

Sunday December 28 17:12
___
Forget Big Tech - I Think We're Looking ".

OpenAI CEO Sam Altman says he is ‘envious’ of
Gen Z college dropouts who have the ‘mental
space’ and time to build new startups
.

At A Big Rotation To Value.


___
44% Of GNOME Core Apps Are
Written In C, 13% In JavaScript & 10% In Rust
.

__
Please stop lowering your standards
for open source software
.
____
Billion-Dollar Data Centers Are
Taking Over the World
.

2 Nuclear Energy Stocks That Could Be
Going to $0, and 1 Generating Serious
Portfolio Power
.

Why I stopped recommending
NAS drives to normal people
.

AI Backlash Grew Massively in 2025.
___
One UI 8.5 vs One UI 8.0: The end of
Samsung’s ‘Battery Icon’
.

 
 ____
“We hope the Sun hits the panels” —
American woman shows what happens to
solar cells after a heavy snowfall
.


by Jamiu O. December 27, 2025 in Energy


____
Cost of turning off wind farms if network
cannot cope hits £1.5bn
.
Try 3.

Saturday December 27 08:32
____
Treating Functions As Vectors In Hilbert Space.



Is Oracle a Sinking Ship or a Buying Opportunity?.

Data centers pivot to aircraft turbines, generators
to bypass grid connection delays
.

So Long, GPT-5. Hello, Qwen.

My insulin pump controller uses the Linux kernel.
It also violates the GPL (reddit.com)
.

what is a software GPL violation?

AI Overview

A GPL violation is when someone distributes
software using GPL-licensed code (GNU
General Public License) but fails to meet the
license's core requirement: providing the full,
corresponding source code (and a way to get it)
to users, effectively hiding modifications or
locking down freedoms. This breaks the "copyleft"
principle, which uses copyright law to ensure
software freedom, meaning you can use, modify,
and share GPL code, but only if you also share
your changes under the same terms. Common
violations include shipping a product with GPL
software (like Linux) without offering the source,
or providing an incomplete source offer. Key

Examples of Violations:
____
Mapped: Share of Households with No Income, by U.S. State.
[New Mexico #2]
 ____
Bigger than a skyscraper: World’s biggest wind
turbine is finally running – It’s doing something
nobody expected
.

Turkey Eyes Major Energy Breakthroughs In 2026.
Try 1.

Friday December 26 07:32
____
Forget The Chips: Oracle Wins Phase 2 of AI.

Oracle shares on pace for worst quarter since 2001
as new CEOs face concerns about AI build-ou
t.

I Asked ChatGPT What Will Happen To the
Stock Market If the AI Bubble Bursts
.

5 Quiet Signals That Lurk In The 2026 Market Outlook.


Facebook.

Tech Will Deliver In 2026: AI, Quantum Computing To Propel Stocks Higher.





The Rotation Fear Won't Last; Betting On Tech's 2026 Comeback.
____
Treating Functions As Vectors In Hilbert Space.
 
____
Amid a battery boom, graphite mining
gets a fresh look in the US
.

Homeowner seeks advice after solar company
suspiciously tries to terminate contract: 'Has
this happened to anyone else?
.'

World’s third-largest solar producer could
generate 12 million tons waste by 2047
.

Try 3.


bragawatt appeared near the top of and the bottom of windscammers29.htm 12/14/26.

I did not add bragawatts! Who did?

windscammers30.htm transferred to prosefights2.org but did not appear on Internet 12/24 and 25/25.

Why?

Thursday December 25 16:22
____
Donald Knuth’s 2025 Christmas Lecture:
The Knight’s Tours
.

8 old programming languages
developers won’t quit
.

AI overestimates how smart people are,
according to economists
.

One real reason AI isn't delivering:
Meatbags in manglement
.
prosefights apparently hit by bragawatt or imposter hack.
Did you mean: who is braga watt?

AI Overview

"Bragawatt" is not a person, but a slang term
used within the data center and AI infrastructure
industries. The term describes the tendency of
companies to announce massive,
gigawatt-scale data center projects, often to
generate hype or intimidate competitors,
rather than for realistic, immediate execution. "

he term was coined by the head of i
nfrastructure at the investment firm KKR,
Waldemar Szlezak, who has advised clients
to "look beyond the bragawatts".

Key aspects of "bragawatts" include:

Hype vs. Reality: The announcements often
involve projects for which the necessary
permits, financing, or power interconnections
have not been fully secured.

Market Signaling: Companies may overstate
their capacity to secure a place in the
power grid's interconnection queue or to
impress investors.

Industry Context: The term reflects the
current race among
tech giants (like those in the AI space) to
build immense data center capacity,
leading to a lot of noise and making it
difficult to distinguish between speculative
and shovel-ready projects.

____
How many lines of code in whcih languages required
to implement Big Tech frameworks?

AII Overview

The number of lines of code (LOC) in Big Tech
frameworks varies widely depending on the
framework's complexity, age, and programming
languages used, but typically reaches millions
of lines across multiple languages. Microsoft,
for instance, has a goal to replace 1 billion
lines of C/C++ with Rust across its codebase.

Exact, up-to-date LOC counts for specific,
constantly evolving frameworks are hard to
pinpoint, but general estimates for large-scale
projects provide a sense of the scale.

Lines of
Code in Major Frameworks and Platforms.
...
Key Takeaways

Scale: Big Tech frameworks are classified as
"very large" projects, exceeding several million
lines of code.

Multi-language: They invariably use multiple
programming languages to leverage specific
strengths (e.g., C++ for speed, Python for ease
of use/scripting, JavaScript for web frontends).

Readability and maintainability are key
concerns for such large codebases,
influencing language choices and coding
practices.
____
I'm returning my Framework 16
(yorickpeterse.com)
.

are frameworks a Big Tech software solution?


AI Overview Software Engineering Frameworks:

The Ultimate Guide for 2023 ... Frameworks are
fundamental to Big Tech (and all modern
software), acting as pre-built structures that
boost efficiency, consistency, and speed by
handling common tasks, letting
developers focus on unique features, with
many popular ones like React (Meta) or
Angular (Google) actually created by Big
Tech to solve their own scaling problems,
though they often release them as
open-source. They are essential tools, not
just a Big Tech choice, saving massive
time and money by preventing developers
from reinventing the wheel.

Why Big Tech Uses (and Creates)
Frameworks.

...
Are They Only for Big Tech?

No, frameworks are for everyone! Small
companies and individual developers
rely on them even more heavily to
compete, leveraging the same
powerful tools created by tech giants
to build their own applications faster
and better.
____
AI Overview

The Intel 8088 processor has 20 physical address
pins, while the modern Pentium Silver N6000 has
a significantly larger physical address space width
(number of bits), though not necessarily a
dedicated pin for each address line on the
chip package
.

Intel 8088
...
Intel Pentium Silver N6000

 
____
Trump Tosses Lifelines to the Struggling Coal Industry.
[Strugglong msm industry?]

The Critical Failure Point in Modern
High-Efficiency Solar Cells
.



what is the battery voltage of a cell phone when 0% of battery remains displayed?

AI Overview

When a cell phone displays 0% battery remaining and shuts down, the lithium-ion
battery's voltage is typically around 3.0 to 3.3 volts per cell. The phone is
designed to shut off at this point to prevent the battery from reaching a truly
empty state, which would cause permanent damage.

Why the Battery Still Has Voltage at 0%.
...
In short, 0% displayed is not 0 volts; it is the manufacturer-defined safe
minimum operational voltage for the device and the battery's longevity.



Tesla signs massive 1 GWh Megapack project in the UK with Matrix Renewables.

AI Overview.

Matrix Renewables signs $89M financing agreement with ... Matrix
Renewables is a global renewable energy platform, backed by
investment giant TPG, focused on developing, building, and owning
solar, wind, and battery storage projects across North America,
Europe, and Latin America. It functions as a fully integrated
Independent Power Producer (IPP), managing the entire lifecycle
of clean energy assets, from initial development to operation,
to support the global energy transition with reliable, sustainable
power.

Key Aspect.

The year data centers went from backend to center stage.


Can a single data center use as much power as
5,000 homes? | Fact brief
.


AWS Servers Down — Check Games And Websites Affected.

Try 1.

Wednesday December 24 07:57
____
How AI coding agents work—and what
to remember if you use them
.
____
Waymo Released a Revealing Postmortem on Its
San Francisco Blackout Meltdown
.

Waymo to Update Software Across Fleet
After Major Power Failure in San Francisco
.

does waymo use wwuch linuxes?

AI Overview

Waymo uses a heavily customized, embedded
Linux for its self-driving vehicles, focusing on
the kernel and drivers for custom hardware
(ASICs, FPGAs) for its powerful onboard
computers, likely leveraging build systems like
Yocto or Buildroot and requiring deep
expertise in C/C++, networking, and real-
time performance for safety-critical functions.
While not a specific "flavor" like Ubuntu or
Fedora, it's a tailored Linux OS built for
high-performance, low-level hardware
interaction and stringent reliability.

Key Details about Waymo's Linux Use:
...
In essence, Waymo builds its own specific
Linux environment, rather than using a
standard desktop distribution, to meet
the unique demands of autonomous driving.



Be Wary Of Flash-less ESP32-C3 Super Mini Boards.



The question of whether Waymo uses
flash memory in its systems cannot
be directly answered from public
information, as specific details about
the type of memory hardware (such
as RAM, flash storage, etc.) used in their
on-board computers are not disclosed.
Publicly available information focuses on
the software stack, sensor suite, and
high-level computing partners: FDD
system:

The term "FDD"
...
In short, while flash memory is common
in computing devices for storage, there
is no public confirmation of its specific
use or role within the proprietary Waymo
FDD (Fréchet DINO Distance, or general
system) hardware stack.


how did Mark Cuban become a billionaire?

Mark Cuban became a billionaire primarily by
selling his internet radio company,
Broadcast.com (formerly AudioNet), to
Yahoo for $5.7 billion in stock in 1999,
capitalizing on the dot-com boom. He built
his fortune through early tech ventures,
starting with MicroSolutions, then co-
founding AudioNet with Todd Wagner,
which streamed audio over the internet,
leading to the massive acquisition by
Yahoo.

Key Steps to Billionaire Status:
...
In essence, Cuban's path to billionaire
status was paved with identifying early
internet opportunities, building a valuable
company around streaming, and
executing a perfectly timed, massive
sale during the tech boom, says this
YouTube video.


what is the status of Larry Ellison's data
center bets?

Larry Ellison's data center "bets" are progressing
with massive investments and significant
customer contracts (notably with OpenAI), but
also face challenges including high debt load,
market skepticism, and reports of project delays.

Current Status
...
In short, the bet has secured enormous
potential revenue but is a high-risk, high-reward
strategy that has divided Wall Street between "
giddy optimism and show-me skepticism".

Larry Ellison’s $40 billion pledge to his son’s
Paramount deal shows a shift in billionaire
giving: Philanthropic capitalism is taking over
.
 
____
U.S. Fossil-Fuel Peaker Plants Delay Retirement
as AI Power Demand Soars
.

Nuclear Developer Proposes Using Navy
Reactors for Data Center
.

Even more radioactive shrimp sold,
recalled in Oregon
.
Try 3.

Tuesday December 23 18:38
____
STOP WASTING MONEY ON CLOUD STORAGE: TRY THIS INSTEAD.
____
The AI Bubble Burst Phase One:
Here's What's Coming Next
.

2026 Market Outlook - "}
A Perfect Storm Is Brewing
.

Oracle RPO data suggests more than
$60B in revenue from OpenAI
by 2029: Wells Fargo
.

Oracle's new AI-enhanced support
portal leaves users fuming
.

Why Data Centers Are Falling Behind
Schedule; Jensen Huang’s Power "
Summit
.

WHAT AREE THE DIFFERENCES BETWEEN
1 UNINFORMED 2 MISINFORMED 3 DISINFORMED?

AI Overview

The core difference lies in the presence or
absence of information and the intent
behind any false information.
1. Uninformed

To be uninformed means an individual
"lacks information or has inadequate i
nformation on a particular topic.
Information Status: Has little to no
knowledge or facts. Intent: Neutral.
The condition is due to a lack of
exposure to information, lack of
interest, or not having done research.

Example: A person who has not read
any news about an upcoming local
election is uninformed about the
candidates' platforms

2. Misinformed To be misinformed
means an individual has false, i
naccurate, or misleading information
but believes it to be true. Information
Status: Possesses incorrect
facts/information. Intent: Neutral
(on the part of the person
sharing it). The person sharing the
false information does so
unknowingly and without the
intent to deceive or cause harm.
Example: A friend tells you the
post office opens at 9 a.m. on
Saturday, when it actually opens
at 10 a.m. Your friend made an
honest mistake and didn't intend
to give you bad information.

3. Disinformed (Note: The user
asked for "misinformed" twice,
the third term is typically "
disinformed" in this context). To
be disinformed means an
individual has been exposed
to false information that was
intentionally and deliberately
created and spread to mislead,
manipulate, or harm.
Information Status: Possesses
incorrect or fabricated
facts/information."

Intent: Malicious/Deliberate.
The information is spread
with a knowing purpose to
deceive for political gain,
financial profit, or to cause chaos.

Example: An actor with an
agenda purposefully creates
a fake news story about a
politician that is entirely
fabricated, in order to sway
public opinion before an election.

Summary Table
What Comes Next for Arduino after
Qualcomm’s Acquisition?
.
____

No, the GNU Compiler Collection (GCC) is
not considering dropping support for the
C compiler and focusing solely on C++.
GCC is a multi-language compiler suite
that actively supports many languages,
including C, C++, Objective-C, Fortran,
Ada, Go, and D.

Key points:

"GCC" is a collection: The name GCC
stands for the "GNU Compiler Collection,
" not just the "GNU C Compiler" (a
common misconception). It is
designed from the ground up to support
multiple front-ends for different
languages, all sharing a common
back-end.

Active C support: GCC has robust
and ongoing support for various
versions of the C standard (C89,
C99, C11, etc.) and its own
GNU extensions.

Separate front-ends: The gcc
command is primarily the driver
for the C compiler (by default, or
by file extension), and g++ is the
driver for the C++ compiler.
They share a lot of common
code but operate as distinct
language compilers with different
default settings and libraries.

No plans for deprecation:
There have been no official
announcements or indications
from the GCC steering
committee or the Free
Software Foundation
(which maintains GCC)
about deprecating the C
compiler.

The C and C++ compilers
within GCC are both
actively developed and
maintained, with ongoing
support for new language
standards for both C and
C++.



____6
Arm sheds billions in market capitalization
after Qualcomm hints at RISC-V adoption
with Ventara Micro acquisition
.
____
When the AI bubble bursts, humans will
finally have their chance to take back control
.

Oracle: All Eyes On The Balance Sheet.





Why Nuclear Fusion Will Not Solve the AI Power Problem.
___
12/20/25.

Christopher F Clark replied to your comment on
an answer to: "Can AI replace programmers?"

LLVM and CLANG are not the results of AI.
And while they are very good compiler
technology, they are simply the
representation of where that has
evolved to at this time. They do not
surprise me. No more than gcc did
previously, nor the MIPS compiler
suite that came out of Fred Chow’s
Stanford thesis and built on the
work that went into Pcode, which
was done to make portable Pascal
compilers, where Pascal was the
continuation of the trend that
started with Algol 60 and grew out
of the work done to make
FORTRAN (and at that point,
you are beyond my horizon of
experience). And, I don’t mean
that to be dismissive of them,
just to put them in context.

____
5 RASPBERRY PI PROJECTS THAT CAN REPLACE
YOUR EXPENSIVE SUBSCRIPTIONS
.

is NAS a ephamism for Gloud Computing?

AI Overview

No, NAS (Network Attached Storage) is
not a euphemism for cloud computing;
they are distinct storage types, though a
NAS can function as a "personal cloud," and
"Cloud NAS" services blend both, but
traditional NAS is local hardware, while
the cloud is remote, third-party
infrastructure. The key difference is
location: NAS is your own physical box
on your network (like a mini-server
for files), whereas the cloud means
storing data on someone else's
servers over the internet.

NAS Explained.

is NAS a a subscription service?

No, Network-Attached Storage (NAS)
is generally a one-time purchase of
hardware that does not require a
subscription service. It provides an
alternative to subscription-based
cloud storage services like
Google Drive or Dropbox,
allowing you to own and
control your data locally.

Key Points.
...
The primary financial benefit of a
NAS, especially for users with l
arge data storage needs, is the
long-term cost-effectiveness
compared to the accumulating
monthly fees of cloud storage
subscriptions.


More:
___
PoC Exploit Released for Use-After-Free
Vulnerability in Linux Kernel’s POSIX CPU
Timers Implementation
.

____
If you don't design your career, someone else will
(2014) (gregmckeown.com)
.
___
Surviving The RAM Apocalypse With
Software Optimizations
.

Memory is running out, and so are
excuses for software bloat
.
 
____
Global Coal Demand Hits All-Time High.

Battery Manufacturing
Investment by Country
.

China Aims for 15 Gigawatts of Solar
Thermal Power by 2030
.

The Hidden Risks of Rolling Back Biden's
Fuel Efficiency Standards
.

America's data center growth hot spots, mapped.
Try 2,

Monday December 22 16:03
____
Why "Cheaper" Batteries Are a
Multi-Billion Dollar Bet on China
.

____
In essence, Cramer sees Oracle as a pivotal
point: its financial situation and large
contracts with entities like OpenAI dictate
the potential pace and sustainability of
the entire industry's current AI
infrastructure expansion. He has
noted that he "wouldn't pick
Oracle" as an investment at this
time due to these risks. You can
find more of his commentary on
CNBC or Yahoo Finance.

____
Waymo resumes service in San Francisco
after robotaxis stall during blackout
.
____
what is the difference between a square
nonsingular binary matrix and a singular
binary matrix?
.

AI Overview

A binary matrix has elements restricted to
only 0 and 1. The key difference
between a nonsingular and a singular
square binary matrix lies in its
invertibility, which depends on its
determinant [1].

Nonsingular Binary Matrix:

Its determinant is non-zero
(specifically, it is 1 modulo 2 in
the field of two elements,
\(GF(2)\)) [1].

The matrix has a rank equal
to its dimension [1].

The corresponding system
of linear equations has a
unique solution [1].
...
Singular Binary Matrix:
...
In summary, the distinction is based
purely on whether the matrix is i
nvertible, a property determined
by its determinant being non-zero
or zero, respectively, even with
the restriction to binary values [1].

The Unusual Pi Boot Process Explained.
____
Advanced Micro Devices: Still Not A
Compelling Bet
.

does amd desing all its new chips
using software?

AI Overview
Yes, AMD designs all its chips using
sophisticated hardware description
languages (HDLs) and specialized
Electronic Design Automation (EDA)
software for modeling, simulation,
verification (pre-silicon/post-silicon),
and layout, but they also heavily
leverage AI and software
partnerships (like with OpenAI,
Cohere) to inform and optimize
those designs, ensuring hardware
and software (ROCm, etc.) work
seamlessly for AI workloads. It's a
holistic process where software
guides hardware creation, and
the hardware is built to run new
software efficiently. Key Aspects of

AMD's Design Process:
...
In essence, software isn't just an
afterthought; it's integral to
defining what the hardware needs
to do and how it needs to be
built, especially in the
competitive AI space.

do all amd new chips require
specialized driver software?

AI Overview

Yes, all new AMD chips, especially
those with integrated graphics
(APUs) or modern Ryzen/EPYC
CPUs, require specialized drivers,
primarily the AMD Chipset Drivers,
to ensure full functionality,
performance, and stability,
with separate Radeon Graphics
drivers needed for any built-in
or discrete GPUs, though Windows
might install basic versions
automatically.

Key Driver Types:\
...
In summary: Don't rely solely on
Windows Update; installing the
official AMD Chipset and Graphics
drivers is vital for a modern AMD
system's best experience.
 
____
Tech companies have paid lip service" -
US government is asking AI giants why
data centers are leading to rising bills
.

Trump administration says it's halting
offshore wind projects over national
security risks
.

Zuckerberg Already Blowing Up Relationship
With New Head of AI He Paid Ten Zillion
Dollars to Hire
.

Japan prepares to restart world's biggest
nuclear plant, 15 years after Fukushima
.

Grid-Scale Bubble Batteries Will
Soon Be Everywhere
.

An electricity crunch is driving high bills
in these states. It’s not getting better
anytime soon
.

Trump’s war on windmills, briefly explained.
Try 1.

Sunday December 21 15:46

____
what arer c++ certifiable code module issudes?

AI Overview

"Certifiable code module issues"
in C++ can refer both to technical
issues with the relatively new
C++20 Modules language
feature and to general software
vulnerabilities that certification
standards (like CERT C++ or
MISRA) aim to prevent.
Issues
with the C++20

Modules Language Feature

C++ Issues Addressed by Certification Standards.

____
Frozen Waymos backed up San Francisco
traffic during a widespread power outage
.

what caused Frozen Waymos in san francisco?

AI Overview

Frozen Waymos in San Francisco were caused
by a massive, city-wide power outage on a
Saturday night (December 20, 2025), which
knocked out traffic lights, leaving the
driverless cars unable to process
intersections and causing them to
stop mid-road, leading to gridlock and
forcing Waymo to halt service. The
outage, possibly linked to a PG&E
substation issue and high demand
from storms, disrupted all traffic
but highlighted a key vulnerability in
autonomous systems when urban
infrastructure fails, showing machines
struggle where humans adapt.

Key Causes:
____
AI was behind over 50,000 layoffs in 2025
— here are the top firms to cite it for job cuts
.

China's open AI models are in a dead heat
with the West - here's what happens next
.
____
The ‘Hidden’ Microphone Inside The
Sipeed NanoKVM
.

Decapsulating A PIC12F683 To Examine
Its CMOS Implementation
.
____
Never pay for cloud storage again
with this lifetime 20TB deal
.

This 100TB cloud storage lifetime
subscription just got 90% cheaper
.


___
do Big sTech software/hardware solutions
consume too much 1 electricity 2 water
3 money?


AI Overview

Yes, there is significant evidence that
the software/hardware solutions
powered by Big Tech are consuming
increasing and substantial amounts
of electricity and water, leading to
environmental strains and higher
costs for local communities. The
rapid expansion of AI is a primary
driver of this surge.

1. Electricity Consumption
...
2. Water Consumption
...
3. Monetary Cost (Money)


can grid-scale bantty banks be
destroyed using software?


Yes, grid-scale battery banks
can be severely damaged or
destroyed using software
through a cyberattack.
The primary risk comes
from manipulating the
control systems that
manage the battery's
operations. Grid-scale
batteries rely heavily on
sophisticated software,
such as the Battery
Management System
(BMS), the Energy
Management System
(EMS), and inverters,
to function safely and
efficiently.

How Software Can
Cause Destruction
...
To mitigate these risks,
the industry focuses on
robust cybersecurity
measures and improved
battery analytics software
to monitor system health,
predict degradation, and
prevent catastrophic
failures.

Reflections on AI at the End of 2025
(antirez.com)
.
 ___
A Tale Of Two Michigans — Solar vs.
Data Center Battle Intensifies
.

Stop These Things’ Weekly Round Up:
21 December 2025
.

Trump’s return brought stiff headwinds
for clean energy. So why are advocates
optimistic in 2026?
.
Try 2.

Saturday December 20 16:02
__
blem, Boosting Efficiency by Nearly 30%.

The Battery Boom Is Reshaping
Power Markets
.

Ranked: The Best Countries at Math.

Retrocomputing: Simulacrum Or The Real Deal?.

_____
OpenAI’s Stargate Data Center Approved in
Michigan as American Anger Starts to Boi.


The week in 5 numbers: PJM did it again.

OKLO and Surplus Plutonium: A New
Catalyst for Nuclear Growth
.

SpaceX Loses Starlink Satellite, This
Space Stock Initiated Overweight
.

what percent ot the us population uses internet?

AI Overview

As of 2024, about 96% of U.S. adults
use the internet, with data from Pew
Research showing a steady rise, while
other sources indicate around 93-95%
of the general population uses it, with
figures varying slightly by age, income,
and location, though the trend is
near-universal adoption, especially
for younger demographics.

Key Statistics & Trends:

what percent ot the us population uses AI?

Around half to two-thirds of U.S. adults use
AI, depending on the definition, with nearly
all Americans (around 99%) using
AI-powered features in everyday apps l
ike navigation or streaming services,
while closer to 50-60% use specific
generative AI tools like ChatGPT for
personal or work tasks, and about
one-fifth use it professionally, with
higher usage among younger, more
educated, and higher-income
individuals. Key

Statistics:
____
History LLMs: Models trained exclusively on
pre-1913 texts (github.com/dgoettlich)
.

Using AI Generated Code Will Make You a
Bad Programmer (rudism.com)
.
____
[Upgraded] 30A Solar Charge Controller,
Black Solar Panel Battery Intelligent
Regulator with Dual USB Port
12V/24V PWM Auto Paremeter
Adjustable LCD Display (30a).

Depvko.

Discharge Stop Voltage 10.7v (default, adjustable range 9-11.3v). destroys bttery!

12.1-12.3 50% SOC!
____
  ____
How the unstoppable electrification
revolution has led us to a solar and
wind-powered tipping point
.
Try 1.

Friday December 19 17:02
____
European factories are closing despite cheap gas:
experts explain the reasons
.

____
They graduated from Stanford.
Due to AI, they can’t find a job
.
______
How China built its ‘Manhattan Project’ to rival the
West in AI chips (japantimes.co.jp)
.

Broadcom: $121 Billion Revenue Boost F
rom OpenAI And Anthropic
.

Deepening our collaboration with
the U.S. Department of Energy
.

Oracle's fall from grace has made it the
poster child for AI-bubble excess
.
__
User finds how a key Windows 11 feature
could be quietly eating lots of RAM on your PC
.
 
Try 1/

Thursday December 18 17:07
____
Texas Grid Overhaul Leaves Battery
Operators With More Risk, Less Upside
.

can too low voltage discharge levels
destroy batteries? ""

AI Overview ""Yes, allowing batteries,
especially lithium-ion (Li-ion) and
lead-acid, to discharge to very low
voltage levels causes irreversible
damage, leading to permanent
capacity loss, increased internal
resistance, and potential failure,
as deep discharges trigger
harmful chemical reactions and
structural changes inside the
cells. For Li-ion, this means
"thickening of the protective
Solid Electrolyte Interphase "Z
(SEI) layer, while for lead-acid,
it causes sulfation and plate
shedding.
...
Key Takeaway

To maximize battery life and
performance, always avoid
deep discharges; keep
batteries within their
recommended voltage
or state-of-charge (SoC)
limits (often above 20%
for Li-ion) and use
protective systems like BMS.




___
Data center boom is pitting Indiana
residents against big tech
.


FERC Directs Nation’s Largest Grid Operator
to Create New Rules to Embrace Innovation
and Protect Consumers
.

ORCL Volatility Returns as Michigan AI
Data-Center Funding Headlines Collide
With Oracle’s $523B Backlog
.

In essence, Oracle is making an aggressive,
high-risk bet to become a leading provider
of AI cloud infrastructure, but its financial
strategy and heavy reliance on large,
potentially vulnerable clients have led
to significant market scrutiny and
investor apprehension.
...
The primary vulnerability that facilitated
many of these recent attacks was
CVE-2025-61882, a critical flaw in
Oracle's E-Business Suite that allows
for remote code execution without "
authentication. Oracle has released
patches and strongly recommended
that all affected customers apply
the relevant security updates
immediately.

Why is everybody so afraid that AI
is going to replace them?

AI Overview

People fear AI replacing them due to
potential massive job displacement,
especially in white-collar roles,
leading to economic instability,
and concerns that AI will surpass
human intelligence, creating
misalignment with human goals,
all amplified by historical
automation fears and capitalist
incentives to cut labor costs.
This anxiety stems from AI's
rapid progress in automating
cognitive tasks, threatening
jobs requiring creativity,
judgment, and complex
skills previously considered
safe, raising questions about
human purpose and economic
survival.

Key Reasons for the Fear:
...
In essence, the fear is a mix
of real economic anxieties,
uncertainty about
unprecedented technological
advancement, and concerns
about how society and
capitalism will adapt.

2025 Marks a Turning Point
for the World’s Power System
.
____
Economists warn of flaws in US inflation report.
____
Designing A CPU For Native BASIC.



Microsoft AI CEO Mustafa Suleyman says it will cost 'hundreds of billions' to keep up
with frontier AI in the next decade
.

___
Uniquely evil’: Michigan residents fight against
huge data center backed by top tycoons
.

Nearly 7,000 of the world’s 8,808 data centers
are built in the wrong climate, analysis find —
vast majority located outside optimal
temperature range for cooling, 600 in
locations considered too hot
.

Charted: The Shortage of U.S. Data Center
Capacity (2023–2028P)
.

Daily Open CNBC Daily Open: Concerns
over Oracle’s debt spill over into its project
s.

Meta Stock Climbs as New ‘AI Godfather’
Partner LeCun Plans €3B Superintelligent Startup
.


Why Oklo Stock Plunged on Wednesday.

Stock Market Today: Nasdaq, S&P 500
Close Below Critical Levels; Oracle,
Other AI Players Sell Off (Live Coverage)
.
‘Bragawatt___‘Bragawatt
‘BragawattNorway Plans Stronger Sabotage Response
Readiness for Grid Operators
.



is a Linux the primary OS used in
electric grid software?

AI Overview

Linux is a widely used and indispensable
operating system in electric grid software,
particularly for integrating renewable energy
resources, handling edge deployments,
and powering high-performance components.
However, the electric grid software
ecosystem utilizes a mix of operating
systems, including Windows and various
Real-Time Operating Systems (RTOS),
and Linux is not the sole or exclusive
primary OS across all components.

Role of Different Operating Systems
...
In essence, while Linux plays a pivotal
and growing role in modernizing the
electric grid due to its technical
advantages and open-source nature,
the overall infrastructure relies on a
diverse range of operating systems
working together.

are linux OSes buggy and malware
vulnerable?

AI Overview

Yes, Linux OSes have bugs and are
vulnerable to malware, but they
are generally considered more secure
than Windows due to robust permission
systems, open-source transparency
(faster patching), and lower desktop
market share (less incentive for
widespread attacks). However,
the myth of "Linux is unhackable"
is dangerous, as threats like
ransomware, cryptominers, and
rootkits increasingly target Linux
servers, cloud, and even
desktops, often exploiting
misconfigurations or supply
chain issues, not just kernel flaws.

Vulnerabilities & Bugs (Yes, they exist)
...
In summary: Linux isn't inherently
perfect, but its security model is
strong; however, users must
stay updated, practice good
security hygiene (strong passwords,
firewall), and avoid risky practices
(like curl | bash on untrusted scripts)
to stay protected.


‘Bragawatt
 
_+___
America’s Dirtiest Carbon Polluters,
Mapped to Ridiculous Precision
.

A New Solar Material Is Pushing Efficiency
Beyond Theoretical Limits
.

Oklo, Los Alamos National Laboratory
test plutonium-fueled reactor
.
Try 1.


Wednesday December 17 10:31
____
AMD Zen 6 Compiler Support
Merged For GCC 1
.
____
A ‘recession’ is arriving for people who
want jobs in technology
.
____
Oracle stock dips 4% on report
Blue Owl Capital won’t back $10 billion
data center
.
____
IBM, AWS veteran says 90% of your employees
are stuck in first gear with AI, just asking it
to ‘write their mean email in a slightly more
polite way’
.

Five worrying employment trends buried in
the latest jobs report
.

Broadcom Stock Sheds its Skin in an
18% Crash to Reveal a $100 Billion
AI Powerhouse
.

SpaceX Valuation Soars.

‘Bragawatt___‘Bragawatt
‘BragawattNVIDIA Is Now Rumored to Significantly
Reduce the Production of RTX 50 GPUs,
as It Factors in the Long-Term Impact
of Memory Shortages
.

Microsoft makes potential CPU, RAM,
disk hogging feature default on
Windows 11 25H2, 24H2
.

Is eddge will no longer download chrome true?

AI Overview

No, Microsoft Edge doesn't completely
block you from downloading Chrome,
but it aggressively uses pop-ups, banners,
and confusing interfaces (like blurred links)
within Windows and Edge itself to strongly
discourage you, highlighting Edge's built-in
security and features to make you stick
with it instead of switching to Chrome,
a tactic that's been ongoing for years.

What's Happening:
...
In short: Microsoft wants you to use
Edge, not Chrome, and is using various
methods within Windows and Edge to
persuade you to stay with its default
browser, but you can still get Chrome if
you persist

Home Tech Services & Software Operating
Systems Windows Windows 11 The
11 Microsoft apps I ditch on every
new Windows install - and the 11
I keep
.‘Bragawatt ‘Bragawatt Pricing Changes for GitHub Actions
(resources.github.com)
.‘Bragawatt


____
DOE orders WA coal plant to
continue operating despite state ban
.

NuScale Power's 6GW Push Advances:
Is the 2030 Target Achievable?
.


Try 1.


Tuesday December 16 18:04
___
After Decades, Linux Finally Gains
Stable GPIB Support.
___
Oracle's $248 Billion AI Bet Just Shook Wall Street-
-And It's Not on the Balance Sheet
.

Charted: $2.4 Trillion in Energy Transition
Spending, by Category
.
____

Current finaal answer.
CHARGE CONTROLLER SETTINGS 12/16/25 15:40

1 FLOAT 13-4-13.6.

2 RECONNECT 12.6.

3 DISCONNECT 11.1 ... TOO LOW... Can destroy battery!

4 WOKK ... SET AT 24

5 BATTERY TYPE. B01 sealed

How to Setup a Solar Charge Controller (menu, battery type & wiring) https://www.youtube.com/watch?v=EBjmAeNeDiE

____
Water levels across the Great Lakes are
falling – just as US data centers move in
.

The ‘Bragawatt’ Data Center Era Brings
Reality Checks—and Energy Breakthroughs
.

Copper Prices Surge Toward $12,000
on AI Demand and Supply Chaos
..
____
Jobs reports to finally lift the fog
on a fragile U.S. labor market
.

Economy Payrolls rose by 64,000 in
November after falling by 105,000
in October, delayed jobs numbers show
.

America’s job market just got some
troubling news
.

The AI doomers feel undeterred.
‘Bragawatt‘Bragawatt

____
Musk says small nuclear
reactors 'super dumb'
.
Try 3.


Monday December 15 19:34
___
Torvalds On Linux Security Modules: "I Already Think
We Have Too Many Of Those Pointless Things"
.

___
Microsoft shares slide 5% in just two weeks,
as Google leapfrogs the firm into third
place by market cap — and yes, it's all
to do with AI
.




____
Adafruit: Arduino’s Rules Are
‘Incompatible With Open Source
’.
___
What even is the AI bubble?.

The Good, Bad and Ugly of AI.

CNBC Daily Open: Investors sell off
tech despite steady Broadcom numbers
.

How Tech’s Biggest Companies Are
Offloading the Risks of the A.I. Boom
.

are the magnificent 7 in a bubble?

AI Overview

Yes, there are significant "bubble"
concerns around the Magnificent
7 (Mag 7) tech stocks, driven by
high valuations and massive AI
spending, but many analysts
debate whether it's irrational
exuberance like the dot-com
era or justified by transformative
AI technology, with some stocks
even underperforming the broader
market recently, showing a potential
rotation in the market.

Arguments for a Bubble/High Risk:
...
Arguments Against a
Bubble/Justified Growth:
...
Current Situation (as of late 2025):

The market is experiencing a mix
of both, with some Mag 7 stocks
(like Alphabet and Nvidia) still
outperforming the S&P 500, while
others (like Tesla, Apple, Microsoft,
Meta) have lagged, indicating a
complex dynamic rather than
a uniform bubble, according to Inc.com
____
does bitcoin consume more electricity
than Austin TX?

AI Overview

Yes, Bitcoin mining consumes vast
amounts of electricity, often
exceeding the usage of entire
cities like Austin, Texas, especially
considering the collective power
draw of numerous large-scale
mining operations in Texas alone,
which strain the state's power
grid and rival the energy
consumption of millions of
homes or smaller cities, with
single facilities sometimes
using as much as 300,000
homes' worth of power.

Key Comparisons:
...
In essence, while Austin itself is
a large city, the cumulative
power consumed by Bitcoin
mining operations, particularly
within Texas, far surpasses
what is needed to power
Austin, making it a significant
energy consumer.



how is a radicalized linux distro member identified?

AI Overview

You don't identify a "radicalized" Linux user
by their distro, as most distros (Ubuntu,
Fedora, Mint, Arch) are neutral; instead, "
radicalized" implies extremist views,
identified through their online activity,
forum posts, social media, and specific
software choices like highly specialized
security distros (Kali, BlackArch) or
anonymity tools (Tails, Whonix) used
for harmful purposes, not just by
the distro itself, which often serves
legitimate security, privacy, or
development needs.

Key Indicators (Beyond Just the Distro):
...
In essence, radicalization is a behavioral
and ideological issue, not a simple
technical flag set by a Linux distribution.

____
Oracle's $50B Bet: Cloud Aspirations
Meet Hyperscaler Reality
.

The AI Boom Is Pushing Data
Centers Past the Thermal Wall
.

____
All-Screen Keyboard Has Flexible Layouts.
 
Try 1.

Sunday December 14 16:01
____


1 aaa
2 N4000
3 espresif
4 ?

____
OpenAI isn't too big to fail. It's bigger.

AI Becomes a Boost for Global Oil Demand.
Not a Bridge to Net Zero.
____
Elon Musk just hit Sam Altman with
an $800 billion counterpunch
.

The View From Inside the AI Bubble.

Wall Street Sees an AI Bubble Forming
and Is Gaming What Pops It
.

AI Competitiveness by Country.

Ask HN: How can I get better at
using AI for programming?
.

Oracle racks up bullish views despite
worst weekly drop in seven years
.

ETF Edge Goldman Sachs makes
big bet on ETFs specializing in
downside protection
.
____
Please stop torturing your fingers
with membrane keyboards
.
____
what is backend programming?

AI Overview

Backend programming is the server-side of
software development, responsible for the
"behind-the-scenes" logic that makes
applications function, including databases,
servers, and application logic. It involves
writing code to manage data, handle user
requests, ensure security, and power the
core functionality that a user doesn't see
but relies on.

Key aspects of backend programming
...
Frameworks: These are built on top of
programming languages to simplify
development, such as Django for Python,
Spring for Java, and Ruby on Rails for
Ruby.

____
how do you detect a radicalized
renewable energy advocate?

AI Overview

Detecting a radicalized renewable energy advocate
involves watching for an absolutist,
black-and-white worldview,dismissal of nuance,
glorification of extreme tactics like sabotage
(ecotage), demonization of opponents (even
fellow environmentalists), and an embrace of
highly confrontational, anti-systemic actions
(like land occupations or disrupting infrastructure)
rather than pragmatic policy work, often rooted
in moral purity and a rejection of gradualism.
They might see compromise as betrayal,
viewing opponents as inherently evil, and use l
anguage framing climate action as a
zero-sum, life-or-death struggle.

Key Indicators of Radicalization:
...By observing a shift towards these
confrontational, absolutist, and
anti-systemic behaviors, one can
distinguish radicalized advocates
from those working within traditional
environmental advocacy.
___
s ansi forth a direct or indirect forth? AI Overview

ANSI Forth isn't strictly one or the other;
it defines the language standard,
but implementations (like Gforth)
often use hybrid threading, mixing
indirect-threaded code (ITC) for
elegance/portability and direc
t-threaded code (DTC) for speed,
with traditional Forth leaning heavily
on ITC for its compact, portable
nature. So, the language standard
is agnostic, but classic implementations
were ITC, while modern, optimized
ones often use DTC or hybrid
approaches.

Here's the breakdown:
...
In essence: ANSI Forth can be
implemented with either, but the
classic Forth spirit, often associated
with early standards like Forth-79,
was indirect-threaded, making it a
foundational concept, though
not a requirement for modern
ANSI compliance.
___
 
____
The New Power Rules Driving
Europe's Battery Storage Boom
.

Developers have canceled nearly 2,000
power projects this year - report
.
Try 2.

Saturday December 13 18:02
____
Microsoft’s AI chief Mustafa Suleyman has
warned that the odds of existential doom
are “nearly absolute” — the company
could walk away from AI if risks.
escalate
.

____
which is better option; 2 100 W solar panels
or one 200 w solar panel?

AI Overview

Neither option is inherently "better," as it
depends on your needs: 2x 100W panels
"offer flexibility, easier handling, and
redundancy (if one fails, you still
have power), ideal for RVs/portability;
while a single 200W panel offers
simpler wiring, potentially better
value for fixed setups, and faster
charging (fewer connections, unified
power), but is heavier, harder to
move, and a total loss if broken,
according to discussions on forums
like DIY Solar and Reddit.

Choose Two 100W Panels If:
...
Choose One 200W Panel If:
...
Key Considerations:

____
Stock Market Today: Nasdaq Lags As
Broadcom Slumps; Tesla Rival Soars
(Live Coverage)
.

Oracle’s collapsing stock shows the
AI boom is running into two hard limits:
physics and debt market
.

what is the difference between
Artificial Intelligence and Real Intelligence?

AI Overview

Real (or natural) intelligence comes
from biological brains, featuring
consciousness, emotions, adaptability,
and understanding meaning, while
Artificial Intelligence (AI) is human-made,
excelling at fast data processing and
specific tasks through algorithms, lacking
genuine feelings, self-awareness, and broad,
contextual understanding, though AGI
(Artificial General Intelligence) aims to
bridge this gap, notes University of Hull,
Psychology Today, Hakkoda. The key
difference lies in origin, consciousness,
and scope: humans understand why,
AI calculates how, working best in
partnership.

Real (Natural) Intelligence
...
Artificial Intelligence
...
The Core Distinction

Understanding vs. Mimicry: Humans
understand concepts, feelings, and
purpose; AI mimics understanding
through pattern recognition, operating
on logic and data without true sentience.

Scope: Human intelligence is broad
(General Intelligence), while most
AI is narrow (Narrow AI), designed
for specific functions.

Collaboration: The future sees them
as complementary tools, with AI
handling data tasks and humans
providing creativity, emotion, and
ethical guidance.
____
what are the safe voltage lower at higher
limits for a 12 volt rechargeable AGM battery?

AI Overview

For a 12V AGM battery, safe charging limits
involve a higher Absorption Voltage (around
14.4V - 15V) for bulk charging and a lower
Float Voltage (around 13.2V - 13.8V) for
maintenance, while safe discharge limits
are typically above 11.8V, with deep
cycles ideally not going below 50%
(around 12.2V-12.3V) to prevent
damage. The key is temperature
compensation; higher temps need
lower voltage, lower temps allow
slightly higher voltage, but always avoid
prolonged over 15V or below 11.8V for
standard use.

Charging Voltages (When
connected to a charger)
...
Key Takeaway

Always use a charger with an AGM
setting to get the right voltage profile,
especially during the absorption phase
(14.4-15V) and float phase (13.2-13.8V),
and avoid letting the resting voltage drop
below 12V for too long to protect your
battery's lifespan.
***
Here is a general 12V AGM battery voltage
chart (resting voltage/open-circuit voltage):

100% State of Charge (SOC): ~12.8V - 13.0V

75% SOC: ~12.5V

50% SOC: ~12.1V - 12.3V

25% SOC: ~11.9V - 12.1V

0% SOC: ~10.5V - 10.6V

Massless Structural Batteries Will
Transform Vehicle Design
.

 
Try 2.

Friday December 12 17:48
____
AI stocks sink on Broadcom,
Oracle worries
.

Nasdaq tumbles 2% and these
10 names have fueled the fire
.

RIP American Tech Dominance

____
Bank of America resets Nvidia stock
forecast after key meeting
.

Cost of insuring Oracle debt
against default surges
.

Oracle’s Earnings Call Highlights
Cloud and AI Growth
.

what are the parts of an unsigned
binary divide?

AI Overview

An unsigned binary division involves a Dividend,
a Divisor, a Quotient, and a Remainder,
working through repeated shift-and-subtract
operations, where the dividend (or partial
remainder in register A) is shifted left, the divisor
(in register M) is compared, subtracted if possible
(placing a '1' in the quotient), or shifted (placing
a '0') until the final result is formed, with the
quotient in register Q and remainder in register A.

Key Components
...
This process builds the quotient bit by bit, using
basic shift and subtraction operations, making
it fundamental for hardware implementation.



does the 64 bit x86 ISA support a 128 bit dividend
and 64 bit divisor?

AI Overview

Yes, the 64-bit x86 (x86-64) architecture directly
supports dividing a 128-bit value by a 64-bit
divisor using dedicated hardware instructions like
DIV and IDIV, where the 128-bit dividend is implicitly
held across the RDX:RAX registers (high 64 bits i
n RDX, low 64 bits in RAX), producing a 64-bit
quotient in RAX and a 64-bit remainder in RDX.

How it works:
...
This hardware support makes 128-bit/64-bit
division efficient, leveraging the paired register
convention common in x86 for handling
larger-than-native-word results and inputs.

Do the ARM 64 bit ISA provide similar hardware
support as the 64 bit X86 ISA?

AI Overview

Yes, modern 64-bit ARM (ARM64/AArch64) and
x86-64 ISAs offer comparable hardware support
for complex computing, but achieve it differently:
ARM focuses on power efficiency with more
registers and simpler instructions (RISC), while
x86 leverages legacy for compatibility (CISC) but
adds modern features, with performance now
often matching or exceeding x86 in many tasks,
blurring the traditional RISC vs. CISC
performance gap through sophisticated
designs. Both support advanced features
like large memory, SIMD, and virtualization,
but ARM's clean slate in 64-bit (AArch64)
avoids x86's baggage, enabling better
power/performance scaling, especially in
mobile, servers, and emerging PCs.

Key Similarities & Differences in Hardware
Support:
...
Key Takeaway:

While their underlying design philosophies
differ (ARM's clean 64-bit design vs. x86's
evolutionary path), modern 64-bit ARM and
x86 architectures provide powerful,
comparable hardware support for today's
demands, with ARM closing the performance
gap in traditionally x86 domains like PCs
and servers.

does python use llvm and clang compiler?

AI Overview

Python's standard implementation, CPython,
does not use the LLVM or Clang compilers
by default. However, several external projects
and alternative Python implementations use
LLVM for high-performance compilation, and
Python itself is used in the development and
testing of the LLVM/Clang tools.

Standard Python (CPython)
...
Python with LLVM and Clang
...
LLVM Development: Python is used
extensively within the development
process of the LLVM and Clang projects
for tasks like running test suites and
generating source files.

DOES RUST USE LLVM AND CLANG?

AI Overview

Yes, the Rust compiler (rustc) primarily uses
LLVM for code generation. However, it does
not use the Clang compiler directly as a part
of its standard compilation process.

How Rust Uses LLVM
...
Does Rust Use Clang?
...
In summary, Rust and Clang are both
separate frontends that leverage the
powerful, shared LLVM compiler
infrastructure for their back-end
compilation and optimization needs.
 
____
Solar remains robust despite policy
changes in US and China
.
Try 1.


Amazon Begins a Power Bank Stock Dump as This 10,000mAh Portable Charger
Drops to Near-Giveaway Pricing
.


Thursday December 11 17:56
___
NuScale slides as Citi reiterates
Sell rating, cuts price target in half
.

AI Overview

The "Magnificent Seven" (Mag7)
are seven dominant U.S.
technology companies that
have significantly driven the
stock market: Apple, Microsoft,
Amazon, Alphabet (Google),
Nvidia, Meta Platforms, and
Tesla, known for their massive
market caps and leadership in
AI, cloud, e-commerce, and
consumer tech. They are
named after the classic
Western film, symbolizing
their powerful influence on
market performance,
especially in the S&P 500
and Nasdaq indexes.

The Companies:

____
Dow jumps 600 points to record as Oracle sparks
rush out of AI trade into broader market: Live updates
.

Oracle drags down Nvidia and other AI
stocks as bubble fears intensify
.

Oracle CEO moves to quell fears about debt
needed for data center build-out after
disappointing Q2 results
.

'Architects of AI' named Time Magazine's
Person of the Year
.

The 'Godmother of AI' says your college diploma
is losing power — here's what she looks for instead
.

Hackers exploit unpatched Gogs
zero-day to breach 700 servers
.

Microsoft fights $2.8 billion UK lawsuit
over cloud computing licences
.

Your Supercomputer Arrives In The Cloud.

Failed 3D Printed Part Brings Down Small Plane.

does rivian new chip rely on cloud computing?

AI Overview

Yes, Rivian's vehicle systems, including data
generated from onboard computers and
sensors (which include chips), rely heavily

on cloud computing for a wide range
of functions, especially for back-end
processes and data analysis.

Rivian uses Amazon Web Services (AWS)
as its primary cloud provider for several key areas:

Engineering and Simulation:
...
While the vehicle's "NWQ chip" (likely
referring to the in-house developed
compute platform, which uses Qualcomm
Snapdragon processors among others)
handles real-time tasks onboard the vehicle,
it acts as an extension of the cloud
ecosystem. The data generated on the
chip is a key input for the cloud systems
that support the overall vehicle platform
and customer experience.

Datacenter Qualcomm takes RISC on
Arm alternative with Ventana acquisitio
n.
____
Yes, x86-64 processors have specific
instructions, MUL (unsigned) and IMUL
(signed, with one operand), that
perform 64-bit by 64-bit
multiplication, producing a full
128-bit result stored across
two general-purpose registers
(like RDX:RAX), enabling
high-precision integer math
for large numbers.

How it Works.

____
Oracle shares tumble as gloomy forecasts,
higher capex reignite AI bubble concerns
.

Oracle: Flunking On All Cylinders.

Why AI agents failed to take over in 2025
- it's 'a story as old as time,' says Deloitte
.

Oracle and the hard truths about software.

Is it a bubble?
(oaktreecapital.com)
.
Google Warns of Chrome 0-Day
Vulnerability Actively Exploited in the wild
.

what is sthe difference between
Google AI Overciew and Google AI mode?

AI Overview

Google AI Overview is a quick summary
at the top of standard search results
for fast answers, while Google AI
Mode is a separate, conversational
AI environment for complex, multi-
step research, acting like an AI
assistant that lets you ask
follow-up questions and explore
topics in-depth, providing a fully
AI-powered experience instead
of just a summary. AI Overviews
are integrated into regular search
for direct queries, whereas AI
Mode is a dedicated tab for
deeper dives, offering a more
interactive, context-aware
session.

Google AI Overview
...
Google AI Mode
...
Placement: Accessed via a
specific AI Mode tab, offering
a distinct, AI-first environment
.

does Google AI mode use llvm
and clang?

AI Overview

Yes, Google extensively uses
and contributes to the LLVM
and Clang projects across its
infrastructure, including in the
development of its AI systems
and tools. Here is a breakdown
of how LLVM and Clang are
involved in Google's
technology stack:

LLVM and Clang at Google
....
AI and Machine Learning Context
....
LLVM and Clang are
fundamental to Google's
compilation of
high-performance C/C++ c
ode. This supports AI and
machine learning
frameworks, such as
TensorFlow and Gemini.


AMD's new Windows 11 25H2
chipset driver has updates for
Ryzen 9000, 8000, 7000,
6000, 5000
.

___
Microgrids Set for $17 Billion
Boom as Central Grids Fai
l.

China’s Oil Pumping Power
Breaks All Records
.

New Rules Make German Electricity
Grid Investment More Appealing
.
Try 1.

 Wednesday December 10 18:12
____
New Permitting Freeze Threatens Hundreds
of U.S. Solar and Wind Projects
.

PJM, others challenge large load interconnection
filings at FERC
,

The World’s Top Resource Giants: Ranked
by Wealth per Capita
.
____
AI Overview

Users generally trust major cloud storage
providers for convenience and robust
security that often surpasses personal
setups, but trust is conditional, varying
with provider, user actions (like using
2FA), and data sensitivity, with
concerns lingering about breaches,
insider threats, and user error
leading some to prefer local
storage for highly sensitive files.
While providers offer strong
encryption and backups,
user mistakes (phishing, poor
settings) remain a top risk,
making a hybrid approach or
privacy-focused solutions
popular for maximizing security.
...I
n essence, users trust the technology but
remain cautious about implementation,
often adopting cloud storage for
convenience while employing extra
steps to secure their most
critical data.

____|
which large computer vendor initiated the
practice of not test software at the
module level but releasing their wsoftwre
to let users reort bugs?

AI Overview The computer vendor widely
associated with minimizing internal testing
and relying on user feedback to report bugs,
particularly in the mid-90s and early 2000s,
is Microsoft. This practice became part of
the company's approach during a shift from
traditional software development methods,

While the "release early, release
often" philosophy originated in
open-source development, notably
with the Linux kernel and discussed
in Eric Raymond's 1997 essay "
The Cathedral and the Bazaar," the
application of this with a reduced
internal testing team in a major
proprietary software vendor is
strongly linked to Microsoft.

In the 2010s, for example, Microsoft
made significant changes to its quality
assurance teams, laying off a large
number of dedicated testers and
expecting developers to rely more on
agile methodologies, internal "
dogfooding" (using their own
products internally), and automated
testing. This shift, combined with
widespread "Windows Error
Reporting" from a massive user
base, meant that a substantial
amount of bug detection effectively
occurred after the software was
released to users.

Dive Deeper.

Microsoft Issues Security Fixes for
56 Flaws, Including Active Exploit
and Two Zero-Days
.
____
does the x86 ISA hae a shift the
low-urder bit is shifted into the
carry and the carry is shifted into
the high-order bit position?

AI Overview

Yes, the x86 ISA has instructions that
do exactly that, specifically the
Rotate Left (ROL) and Rotate
Through Carry Left (RCL)
instructions, where bits shifted
out of the high end wrap around to
the low end, and the bit shifted out
of the low end goes into the Carry
Flag (CF), with the Carry Flag then
entering the high-order bit position
for RCL, making it a full bit rotation
with the CF involved.

Here's how these instructions work:
___
Where the Algo Meets the Asphalt.

Boom Supersonic raises $300M
to build natural gas turbines for
Crusoe data centers
.
____
A new threat to affordability – just
in time for winter
.

Chinese Firms Pour $80B Into
Global Clean-Tech
.
Try 3.

Tuesday December 9 16:18
____

____
Microsoft investigates Copilot outage
affecting users in EuropeW
.

Microsoft sends harsh message to
millions of Microsoft 365 customers
.
is "significant Microsoft 365 price hike
that will begin generating revenue in
the middle of 2026." a warning to
dfloud users?

AI Overview

Yes, the significant Microsoft 365 price hike
starting July 1, 2026, is a big deal and a
major warning for all commercial users
(businesses, government, nonprofits) to
review their subscriptions, as prices for
most business and government plans are
increasing due to new AI, security, and
management features, with frontline
worker plans seeing big jumps (F1,
F3) and enterprise plans (E3, E5) also
rising, requiring proactive budget
planning and feature utilization to justify
costs.

Key Details of the Price Hike:
...
In essence: Microsoft is increasing prices
to reflect the added value from recent
innovations, especially AI, making it a
substantial change after several years
without significant hikes for many
business plans.
[Is AI always to be believed?]

Has the cost of building software dropped
90%? (martinalderson.com)
.
____
can a binary number be representd
as a polynomial?

Yes, a binary number can be represented
as a polynomial where the bits
(0s and 1s) act as coefficients for
powers of a variable (like \(x\)), with
each position corresponding to a
power of 2, forming a polynomial
over the finite field \(\mathbb{F}_{2}\)
(where arithmetic is modulo 2).
This representation is useful for
symbolic manipulation, error-
correcting codes (like CRC), and
computer science algorithms,
effectively treating the binary string
\(b_{n}b_{n-1}...b_{1}b_{0}\)
as \(b_{n}x^{n}+b_{n-1}x^
{n-1}+...+b_{1}x+b_{0}\). 

How it works:

does the x86 ISA have a subtract
with borrow?

AI Overview

Yes, the x86 Instruction Set
Architecture (ISA) absolutely has
a dedicated Subtract with Borrow
(SBB) instruction, which works
in conjunction with the standard
SUB instruction to perform
arithmetic on numbers larger
than a single register, chaining
the borrow (or carry flag) from
lower-order operations to
higher-order ones. This is
essential for multi-precision
arithmetic, allowing you to
subtract numbers that exceed
32 or 64 bits by processing
them in chunks.

How it works:

does the ARM ISA have a
subtract with borrow?

AI Overview

Yes, the ARM ISA (both AArch32
and AArch64) absolutely has
subtract-with-borrow instructions,
typically named SBC (Subtract
with Carry) or SBCS (with flags),
which perform \(Destination=
Rn-Rm-\text{NOT}(\text{Carry\
Flag})\), effectively implementing
subtract-with-borrow for multi-
precision arithmetic. These
instructions use the processor's
Condition Flags, especially the
Carry Flag (C), to handle
borrows across multiple
machine-word operations. 

How it Works:

does the risc-v ISA have a
subtract with borrow?

AI Overview

The base RISC-V Integer Instruction
Set Architecture (ISA) does not
include a dedicated "subtract with
borrow" instruction. The standard
ISA avoids condition codes or
flags for general-purpose
arithmetic, which simplifies the
pipeline design of processors.

However, the optional RISC-V
Vector Extension (RVV) does
include specific vector
instructions for "subtract
with borrow" (vmsbc.vv,
vmsbc.vx), which are used
for multi-word and
high-performance arithmetic
operations.

Emulating Subtract with
Borrow in Base RISC-V
.

While this approach works,
it creates instruction
dependencies that can
impact performance on
superscalar processors
compared to ISAs with
built-in carry/borrow flags
or dedicated instructions.

AI Overview

No, Diophantine math isn't
exclusively "Islam Math,"
but Islamic mathematicians
made huge contributions to
number theory and the study
of Diophantine equations
(problems seeking integer
solutions), building on Greek
foundations (like
Diophantus's work) and
developing new methods,
effectively making it a
shared field with significant
Islamic development,
particularly through
figures like al-Khwarizmi
and al-Farisi.

Key Points:
...
In essence, Diophantine
analysis is a universal
branch of mathematics,
but Islamic scholars were
instrumental in its
preservation, development,
and integration into
broader algebraic
frameworks

"Diophantus and his works influenced
mathematics in the medieval
Islamic world, ..
."
 
____
Federal judge strikes down Trump's
anti-wind directive
.

Why NuScale Power Stock
Plunged 55% in November
.

2025 will be world's second or
third-hottest year on record, EU scientists
."

'Living off grid is not a dream, it's a nightmare'".

AI's energy gusher.

The climate cult’s dissolution is inevitable.

U.S. Fusion Industry Asks for Federal Help.

Try 1.
Monday December 8 16:16

____
is colmputation of the inverse of a nonsignular
binary matrix a diophantine equation?

AI Overview

No, the computation of the inverse of a
nonsingular binary matrix is not a
Diophantine equation.

A Diophantine
equation is a polynomial equation
with integer coefficients for which
only integer solutions are sough
t.

AI Overview

Gauss Elimination Method and Gauss
Jordan ... Gaussian elimination is a
systematic algorithm in linear algebra
for solving systems of linear equations
by transforming their matrix
representation into a simpler row
echelon form (upper triangular)
using allowed row operations,
making it easy to find solutions through
back-substitution. It works by
creating zeros below the main
diagonal (pivots) of the coefficient
matrix, effectively eliminating
variables one by one, and can
reveal if a system has one, infinite,
or no solutions. Key Concepts

___
what is a software certification masquerade?

AI Overview

A software certification masquerade is a type
of cyberattack where a malicious actor
makes their malicious software or artifact
appear legitimate and trusted to evade
security defenses and trick users into
executing it. This is often done by
manipulating features such as code
signatures, file names, or file locations
to mimic legitimate software. .

How the Attack Works
...
In essence, the attack leverages the trust
users and systems place in the appearance
and metadata associated with legitimate
software certification and naming conventions.


can software certification mean pretending
to sertify software without certifying the
dependencies at the machine language level?


AI Overview

Software certification generally involves the
verification of all components necessary for
the software to function, and it is not possible
to certify software in any meaningful,
trustworthy sense without implicitly or
explicitly verifying its dependencies down
to the machine code level.

The idea of "pretending" to certify
software while ignoring low-level
dependencies is a security and integrity
risk. Here's why:

Dependencies are part of the
executable code:
...
Trust Chain: A
...
Security Risks:
...
Certification Standards:
...
Self-Certification is Not Enough:
...
In essence, any legitimate certification
process for safety or security requires
proof that the entire execution
environment, including all dependencies
and their machine code, meets the
specified requirements.
____
Microsoft has a problem: nobody wants
to buy or use its shoddy AI products —
as Google's AI growth begins to outpace
Copilot products
.

Yes, AI is in a bubble. No, it's not just hype.

More than 200 environmental groups demand

halt to new US datacenters
.

NextEra to build 15 gigawatts of power
for data centers by 2035
.
____
Programming...Like a Fighter Pilot.

The C++ standard for the F-35 Fighter
Jet [video] (youtube.com)
.
____
AI boom fuels "environmental justice"
fears in communities of color
.

.Try 3.


can power banks be charged at the same time they are being used?

AI Overview

Yes, some power banks support simultaneous charging
and usage (pass-through charging), but many older or
cheaper models don't and will prevent charging or risk
overheating, so check your manual; if supported,
electricity flows through to the device while the
excess charges the bank, but without this feature,
it stresses components and causes heat, reducing
battery life.

If your power bank supports pass-through
charging (check specs for "pass-through,"
"power path"):
...
If your power bank does NOT support pass-
through charging:
...
The bottom line:

Check your manual: Look for "pass-
through charging" or similar terms
to know if it's safe for your specific
power bank. When in doubt, don't:

If it's an older or basic model,
charge it fully first, then use it
to charge your devices separately
to avoid damage.
????

AI Overview

There is no known recall for a power bank
with the specific serial number 299m999
mentioned in official U.S. Consumer Product
Safety Commission (CPSC) or manufacturer
notices.

Recalls for power banks typically involve
a range of serial numbers associated
with specific model numbers from
manufacturers like Anker and Belkin.
...
Recalled Power Banks and Affected Serial Numbers

INIU Power Banks The affected models have
serial numbers including 000G21, 000H21, 000I21,
and 000L21.
I



Sunday December 7 16:12
____
Passenger Jet Suddenly Dropped From
Sky for a Wild Reason, Airbus Says
.

____
what is gforth?

AI Overview

Gforth is a free, portable, and powerful
implementation of the Forth
programming language, adhering to
the ANS Forth standard and serving
as an interactive environment for
writing and running Forth code,
known for its stack-based nature,
simple syntax (Reverse Polish
Notation), and efficiency, making it
suitable for
everything from microcontrollers
to general-purpose programming.
It's a key tool for learning Forth and
offers features like metaprogramming
and direct memory access, all within a
tiny footprint.

Key Characteristics.

Forth Interpreter:
...
Stack-Based:
...
** ANS Forth Standard:
...
GNU Project:**
...
Efficient & Minimal:**

How it's Used

Learning Forth: Embedded Systems:*
...
** System Programming:** Provides a
powerful, scriptable shell with deep
machine access, ideal for system
administration tasks.

Anatomy Of A Minimalist Home Computer.

____
do actors try to p0rtray some people
while working on movie/tv sets?

AI Overview

Yes, actors frequently portray real
people while working on movie and TV
sets. This is a common and specialized
form of acting, often referred to as
playing a real-life character or a
biographical role [1].

Actors immerse themselves in
research to accurately depict the
person's mannerisms, speech
patterns, physical appearance, and
emotional life. The goal is to
capture the essence and specific
characteristics of the individual,
rather than just playing a generic
character [1].

Examples of this are frequent
and often
critically acclaimed
:
...
Therefore, striving to accurately
portray specific, real individuals is
a significant aspect of many actors'
work.
____
is solaris implemented with
certified modules?.

AI Overview

Yes, specific cryptographic modules
within the Oracle Solaris operating
system have been implemented with
certifications, specifically the FIPS
140-2 Level 1 standard, a U.S.
government computer security
standard for cryptography.

Oracle Solaris systems provide
two FIPS 140-2 approved
cryptographic providers
:
...
These certified modules allow Oracle
Solaris to meet or exceed
information assurance
requirements for secure and
compliant public sector and
enterprise environments.
Information on the specific
security policies and validation
certificates can be found on
the NIST Computer Security
Resource Center website. ____
How Wrong I Have Been': Michael Burry
Slams His Bitcoin Position Critics
____
JPMorgan CEO Jamie Dimon says
Europe has a ‘real problem
.

AI Overview

According to Jamie Dimon, CEO
of JPMorgan Chase, Europe's "real
problem" is a combination of slow
bureaucracy, over-regulation, and
fragmentation within the EU that
drives away business, investment,
and innovation.
...
Key issues highlighted by Dimon includ.



 ____
DOE Bets Big on Costly SMRs.

Why Does the End of the World
Look So Profitable?
.
    The AI boom's massive resource
    demands, particularly for energy and water,
    are being subsidized by the public,
   driving up costs while "efficiency"
   in the workplace leads to widespread
   job deletion and the flattening of the
   middle class.
Try 1.


More than 200,000 power banks sold on Amazon recalled over fire and burn risks.


Saturday December 6 16:05
____
AMD and IBM's CEO doesn't see an AI bubble
just $8 trillion in data centers
.
____
hOW MANY Solaris OS running on which computers?

AI Overview

While exact numbers are scarce, Oracle
Solaris runs primarily on Oracle's SPARC
servers
(like the Sun Fire series) and
increasingly on x86-based hardware
(Dell, HPE), supporting critical
enterprise workloads, with current
active versions being Solaris 11.4
(to 2034/2037) and Solaris 10 (to
2027) for legacy systems, maintaining
niche but vital enterprise use,
particularly for specific databases and
financial systems.

On Which Computers?
...
How Many?
...
Current Status ...
In essence, Solaris is a specialized,
robust OS for demanding
enterprise environments running
on specific Oracle hardware and
certified x86 servers, rather
than general-purpose computing.
____
Emulate ROMs At 12MHz With Pico2 PIO.


____
Cloudflare outage on December 5, 2025
(cloudflare.com)
.
____
From 'Icarus bug' to flawed panels: Airbus
counts cost of relying on single mode
l.
    Airbus forced to recall 6,000 jets for
     quick software fix

Waymo to issue recall over self-driving
vehicles driving past stopped school
buses
.
___
Meta acquires AI device startup Limitless.

is limitless a software company?

AI Overview

Yes, Limitless is a software company, though
there appear to be multiple entities with
similar names, most notably an AI startup
recently acquired by Meta.

Here are the primary "Limitless" software
entities found
in search results:

Limitless (AI Wearable Startup, now part
of Meta)
:

 ____
Electric Motor Market Set to Triple by 2032.

Nvidia CEO Says Nuclear Is AI's Future —
Oklo, NuScale Ready To Roar Back?
.

Amazon backs out of Project Blue data
center campus in Arizona - report
.

Colorado plans to phase out natural
gas heating in homes, prompting
many reader questions. We have
answers
.

How Falling Energy Supplies Are
Undermining Government Promises
.
Try 1.

Friday December 5 17:35

____
Ore Formation: A Surface Level Look.
____
OpenAI’s $500 Billion Valuation
Faces Huge Cut
.
____
Cloudflare down, websites offline with
500 Internal Server Error
.

Cloudflare blames today's outage
on React2Shell mitigations
.

Another Cloudflare outage takes down
websites including LinkedIn and Zoom
.

what are software certification actors?

AI Overview

Software certification actors are the individuals
(developers, testers, managers), systems
(databases, external apps), or organizations
involved in the process of getting software
certified, proving it meets standards (like
CSTE for testers, CSDP for developers), or
the entities interacting with the software
itself in use cases (like a customer or a
backend server), essentially anyone or
anything that touches or validates the
software's quality or functionality.

Two Main Interpretations of "Actors" in
Software
:
...
Examples of Actors in Certification Contexts:
...
n essence, these actors are the people,
roles, systems, or regulatory bodies that
define, perform, or are subject to the
quality and compliance checks in software
engineering.
****
Cloudflare outage resolved after
impacting Fortnite, LinkedIn, X, more
.
____
The godfather speaks - this is the device
Linus Torvalds says would be his perfect
Linux PC, but you'll never get. one
.

why do linuxes have so many bugs
requring freguent updates?

AI Overview

Linux does not inherently have an excessive
number of bugs or require updates more
frequently than other complex operating systems.
The perception of "so many bugs requiring
frequent updates" often stems from several
factors: the nature of open-source development,
security practices, and the broad scope of the
Linux ecosystem [1, 2].

Here are key reasons contributing to the
frequency of updates:

Transparency and Open-Source Nature
...
Diverse Ecosystem and Scope
...
Focus on Security
...
User Control
...
In summary, the frequency of updates
in Linux is a sign of a vibrant, secure,
and actively maintained ecosystem
rather than an indication of poor quality
software [1, 2].
____
does comcast/xfinity use fiiber optic
technologies?

AI Overview

Yes, Comcast/Xfinity uses extensive
fiber optic technology, primarily in a
Hybrid Fiber-Coax (HFC) model where
fiber runs close to homes, connecting
to neighborhood nodes, and then uses
existing coaxial cable for the final "last
mile" to the house, though they are
actively upgrading to fully fiber-to-
the-home (FTTH) in many areas for
symmetrical speeds. Their core network
is all-fiber, and they're deploying
advanced tech like DOCSIS 4.0 and
Distributed Access Architecture
(DAA) to deliver faster, more
symmetrical speeds over their
hybrid network, while also
building dedicated, all-fiber lines
(EPON) in some communities.

How Comcast's Network Works
(HFC Model)
:
...
In Summary: You're likely on an HFC
network that's being upgraded with
fiber technology for better
performance, but dedicated FTTH
is also expanding for customers
who can get it.


 ____
The Nuclear Revival Is Real: SMR Stocks
Flash Buy Signals After DOE Push
.

NextEra Energy, Inc. (NEE):
A Bull Case Theory
.

Oversupply Warning Jolts India’s
Solar Buildou
t.

Microsoft drops AI sales targets in half
after salespeople miss their quotas
(arstechnica.com) 424 points by
OptionOfT 1 day ago
.

___
California’s Oil Rush Slips Into Its Final Act.

Climate Change Study Predicting Dire
Economic Damage Is Retracted
.

PJM watchdog files complaint
over data centers
.
Try 2.

Thursday December 4 17:21
___

do true safety-critial software engineers require that
all software modules are certified?

AI Overview

No, it is not a requirement for every single
software module to be separately certified.
Instead, the entire safety-critical system
must meet specific, rigorous standards
and receive certification. While individual
modules are not typically certified, they
are subject to strict verification and
validation processes as part of the
overall system's certification effort.

Certification of the entire system.


AI Overview

Yes, actors are widely considered to appear
most frequently on television, particularly
due to the sheer volume of TV content
produced compared to movies and
the nature of acting roles.

Key reasons why actors appear more
frequently on TV
:
...
Overall, the episodic and high-volume
nature of television production makes
it the most frequent medium for a
working actor's appearances.

____
‘Godfather of AI’ says Bill Gates and Elon Musk are
right about the future of work—but he predicts
mass unemployment is on its way
.

Meta to cut up to 30% of metaverse budget,
Bloomberg News report
.

China’s AI Chip Output Is Expected to Far
Exceed Domestic Demand, as NVIDIA’s
CEO Warns the World About the AI ‘Belt
& Road’ Initiative
.

BRICKSTORM Backdoor.

AWS introduces Graviton5—the company’s
.most powerful and efficient CPU
.



AI Overview

A specific PassMark score for AWS Graviton
5-based Amazon EC2 M9g instances is not
available in public documentation or
benchmarks, as PassMark is a
third-party benchmarking tool and
AWS typically uses internal metrics.
However, AWS has provided general
performance metrics for the Graviton
5 processor, which was announced s
at re:Invent 2025 and is currently
available in preview M9g instances.

Key performance details provided
by AWS include:

Predator spyware uses new infection
vector for zero-click attacks
.

Alphabet’s Chip Business Alone Could
be Worth $900B, Says Five-Star Analyst
.

____
AI Overview

To watch the Smithsonian Channel on
your new 75-inch QLED TV with Xfinity,
use the voice remote
to say "Smithsonian
Channel" or find it in the Xfinity on-demand
menu. If you're using an Xfinity cable box,
it should be automatically connected to
your Xfinity service; if using a Smart TV
with the Xfinity Stream app, you'll need
to download and log in to the app first.

Option 1: Use an Xfinity TV Box
...
Option 2: Use the Xfinity Stream App
on a Smart TV


____
Exploitation is imminent' as 39 percent of
cloud environs have max-severity React hole
.

Why energy traders are sceptical of
the data centre build-out
.

Meta’s Zuckerberg Plans Deep Cuts
for Metaverse Efforts
.
____
Everyone in Seattle hates AI
(jonready.com)
.

why does comcast/xfinity have a coax runnng from
the wall into a settoop box which connects to a tv
with a hdmi cable?

AI Overview The setup uses a coaxial cable from the wall to
the Xfinity set-top box to receive the encrypted
cable signal, while an HDMI cable connects the
box to the TV to transmit the uncompressed,
decoded audio and video to your TV for a
high-quality picture and sound. This two-cable
system is necessary because the set-top box
acts as a decoder for the cable signal, which
the TV cannot directly display or process.

Why two cables are needed
,,,
What happens without the box

If you were to connect a coaxial cable
directly from the wall to an older TV,
you would only be able to receive
unencrypted channels, which are usually
a small number of local broadcast
channels. The Xfinity set-top box is
essential for accessing all the
channels that you subscribe to.

does comcast/xfinity cable service
work with new 75 inch qled
insignia software tv?

AI Overview

Yes, Comcast/Xfinity cable service
works with a new 75-inch QLED
Insignia TV, which can be
connected via a coaxial cable
for a standard cable box or
by using the Xfinity Stream
app on the TV's smart platform.
For the best experience, you
should run a channel scan
after connecting, and for app
access, download the Xfinity
Stream app from the TV's app
store.

Using a cable box
...
Using the Xfinity Stream app
...
Troubleshooting common issues
...
Remote control issues: You may
need to program your Xfinity
remote to work with the Insignia
TV. You can find the specific
remote codes for Insignia on the
Xfinity website or by using codes
listed on sites like PC Guide.

Firmware: Make sure your TV
has the latest firmware
updates installed, as this can
improve compatibility and
performance.

Customer receives rocks
instead of Nvidia GPU after
paying $1200, Best Buy
refuses refund
.
____
Marquis data breach impacts over
74 US banks, credit unions
.
____
Layoff announcements top 1.1 million
this year, the most since 2020
pandemic, Challenger says
 ____
The secret behind your skyrocketing
energy cost
s.

Sundar Pichai says Google will
deploy solar-powered data centers
in space by 2027
.

Africa needs to generate
more electricity
.

Soaring U.S. Natural Gas Prices Could
Boost Coal Power Generation
.
Try 1.





Hello,

Please join us for a workshop on January 14, 9 AM – 4 PM MT, to provide input into the Public Service Company of New Mexico’s 2026 Integrated Resource Plan (IRP). This facilitated workshop will focus on understanding the resource planning process, resource options, requirements, opportunities and challenges facing PNM over the next 20 years. Your voice can help guide the objectives and outcome of IRP recommendations.

Meeting Details: Wednesday, January 14, 9 AM – 4 PM MT - lunch provided.

Location: CNM Workforce Training Center, 5600 Eagle Rock Ave NE, Albuquerque, NM 87113

In-person attendance is strongly recommended, but we understand that travel may be difficult for some people. Therefore, ZOOM participation will be available.

RSVP Requested - Please RSVP to Deborah Shields at dshields@gridworks.org by 1/5/26 to indicate whether you plan to attend in person or via ZOOM.

Please watch for another email before the workshop with the agenda and reading materials.

Key Discussion Topics

Overviews of the PNM system - resources, demands, requirements, opportunities, and challenges

Small group discussions with subject matter experts on the above topics

Identification of topics needing additional conversation

Options for participation in future workshops

Your Voice Matters

Affordable, reliable power is essential for every New Mexican. As New Mexico transitions to cleaner energy and greater electrification, the choices made today will shape electric bills, the state’s economy, and its environment for decades to come. PNM is developing its next IRP—a roadmap for how it will serve its customers for the next 20 years. Whether focused on keeping costs down, ensuring reliability, advancing clean energy, or supporting economic growth, your voice is essential to shaping PNM’s future.

Questions?

The Gridworks team – Margie Tatro, Cathy Boies, and Deborah Shields – is here to help. Reach Margie at mtatro@gridworks.org.

Español?

Si necesita traducción al español, comuníquese con Margie Tatro, mtatro@gridworks.org. Please join us in advising PNM on its energy decisions for the next 20 years.

Best Regards,

Margie Tatro, Cathy Boies and Deborah Shields Gridworks Logo Deborah Shields Communications and Operations Director 323-203-6177 | dshields@gridworks.org www.gridworks.org LinkedInJoinUsHello,

Please join us for a workshop on January 14, 9 AM – 4 PM MT, to provide input into the Public Service Company of New Mexico’s 2026 Integrated Resource Plan (IRP). This facilitated workshop will focus on understanding the resource planning process, resource options, requirements, opportunities and challenges facing PNM over the next 20 years. Your voice can help guide the objectives and outcome of IRP recommendations.

Meeting Details: Wednesday, January 14, 9 AM – 4 PM MT - lunch provided. Location: CNM Workforce Training Center, 5600 Eagle Rock Ave NE, Albuquerque, NM 87113

In-person attendance is strongly recommended, but we understand that travel may be difficult for some people. Therefore, ZOOM participation will be available.

RSVP Requested - Please RSVP to Deborah Shields at dshields@gridworks.org by 1/5/26 to indicate whether you plan to attend in person or via ZOOM.

Please watch for another email before the workshop with the agenda and reading materials.

Key Discussion Topics

Overviews of the PNM system - resources, demands, requirements, opportunities, and challenges Small group discussions with subject matter experts on the above topics Identification of topics needing additional conversation Options for participation in future workshops

Your Voice Matters

Affordable, reliable power is essential for every New Mexican. As New Mexico transitions to cleaner energy and greater electrification, the choices made today will shape electric bills, the state’s economy, and its environment for decades to come. PNM is developing its next IRP—a roadmap for how it will serve its customers for the next 20 years. Whether focused on keeping costs down, ensuring reliability, advancing clean energy, or supporting economic growth, your voice is essential to shaping PNM’s future.

Questions?

The Gridworks team – Margie Tatro, Cathy Boies, and Deborah Shields – is here to help. Reach Margie at mtatro@gridworks.org.

Español?

Si necesita traducción al español, comuníquese con Margie Tatro, mtatro@gridworks.org.

Please join us in advising PNM on its energy decisions for the next 20 years. W Best Regards,

Margie Tatro, Cathy Boies and Deborah Shields
WGridworks Logo


Deborah Shields Communications and Operations Director
23-203-6177 | dshields@gridworks.org www.gridworks.org

LinkedInJoinUs

Wednesday December 3 14:31
____
Why a new data center in your area
could change your electricity bill
.

Touring this Charlotte data
center is like taking a peek inside the cloud
.

TVA urges residents near Browns Ferry
Nuclear Plant to stay emergency-ready
.
____
Logitech CEO Says AI Devices
Are Solutions Looking for Problems
.
____
AI Becomes the Operating
Backbone of the Power Sector
.
____
Airbus cuts plane delivery target
amid A320 fuselage problem
.

what is the difference between a
true software engineer and a
"software engineer"?


AI Overview

The difference lies in the scope and depth
of work: a "true" software engineer
applies formal engineering principles to
large-scale systems, focusing on design,
architecture, and a structured process,
while the common use of the title "software
engineer" is often interchangeable with
"developer" or "programmer" and may
involve more hands-on coding of specific
features or applications. The former role
involves high-level planning, system
integration, and optimization, while the
latter often focuses on building specific
parts of a system based on pre-existing
designs.

True software engineer

Focus: Large-scale systems, high-level
design, and applying formal engineering
principles.

Responsibilities: System architecture,
planning, performance optimization,
integration, and ensuring reliability
and dependability.

Involves: More
time on planning, analysis, design,
and documentation than actual
coding.

Examples: Designing the software
for a flight control system or a
nuclear power plant.

Background: Often associated
with formal engineering education
and a structured understanding
of the entire software
development lifecycle.

"Software engineer" (common usage)

Focus: Building specific software
features or applications.

Responsibilities: Writing, testing,
and debugging code based on
given requirements and designs.

Involves: Primarily hands-on coding.

Examples: Creating a new feature
for a mobile app or a website.

Background: This title is often used
interchangeably with "software
developer" or "programmer"
and may be given to individuals
without formal engineering
training, such as those from
coding bootcamps.

Key takeaway

The distinction is not always
clear-cut, as the industry often
uses the title "software engineer"
without the corresponding level of
responsibility or expertise. A true
software engineering role demands
a deeper understanding of
engineering principles for complex,
mission-critical systems, whereas
the common usage can be a broader
term that encompasses a wider range
of skills and responsibilities, often
closer to those of a software
developer or programmer.

The father of the Linux operating system,
Linus Torvalds, says the reason why
Windows has a rep for bugs and blue
screens isn't down to bad code but
bad memory
.
____
He predicted an automation crisis years
ago. Now, Andrew Yang says
AI may wipe out 40 million jobs over
the next decade
.
____
Google Starts Sharing All Your Text
Messages With Your Employer
.
____
Ranked: The World’s Most Profitable
Companies in 2025
.
 
____
LNG Sticker Shock Sends Europe Scrambling
Back to Domestic Gas
.

rump’s New Plan to Cut Energy Costs:
Use Walmart’s Backup Generators
.

DOE removes ‘renewable energy’
from lab’s name, shifts focus
.

Is Oklo A $14 Billion
“Paper Reactor” Bubble?
.s

Electric Utilities And Pinnacle West
In A Popping AI Bubble
.

Drill, Baby, Drill’: Europe Aims To
Reduce Reliance on US LNG
.

Try 1.


IS ALEXA AN AMAZON CLOUD-BASED APP?

AI Overview

Yes, Alexa is an Amazon cloud-based voice
service that runs on Amazon's servers, not
on the device itself. When you speak to
Alexa, a recording is sent to Amazon's
cloud for processing, which is how it
can access information, play music,
control smart home devices, and
perform other functions.

Cloud-based processing: S

Amazon data center linked to rare cancers
and miscarriages in Oregon, report warns
.

Tuesday December 2 16:22
____
IBM CEO says there is 'no way' spending
trillions on AI data centers will pay off at
today's infrastructure costs
.

Energy Department Selects TVA and Holtec
to Advance Deployment of U.S. Small
Modular Reactors
.

U.S. Natural Gas Surges to 3-Year High s
as Deep Freeze Hits December
.

Hackers are Moving to “Living Off the Land”
Techniques to Attack Windows Systems
Bypassing EDR.ssssss

The State of AI: Welcome to the
economic singularity
.

'Big Short' investor Michael Burry
says bitcoin is the 'tulip bulb of our time'
.

Charlie Munger Made Over $50 Million Betting
On Coal At 99—After Avoiding It For 60 Years
and Calling The Panic 'Horse Feathers'
.
____
Airbus May Face a New A320 Problem as
It Nears Resolution of Software Issue
.

how many lines of code does the A320 flight
control and automation coontain?


AI Overview

The exact number of lines of code in the
A320's flight control and automation
systems is not publicly available. However,
modern aircraft, such as the A320, have a
complex software architecture with millions
of lines of code distributed across its various
flight control computers, including the ELACs,
SECs, and FACs. For comparison, a modern
fighter jet can have over 20 million lines of
code, and some mid-range automobiles
have up to 100 million.

A320 ELAC B L104 Software Update Emergency AD.


____
OpenAI declares ‘code red’ as Google
catches up in AI race
.

How big tech is creating its own friendly media
bubble to ‘win the narrative battle online’
.

OpenAI’s Sam Altman declares ‘code red’
after rivals make advances
.
____
Another open source project dies of neglect,
leaving thousands scrambling
.
 
Try 2.

No restart on ryzen 7 4700u. :_||

what is a software arecibo event?

AI Overview

A "software Arecibo event" generally refers
to an event, workshop, or software feature
related to the historic Arecibo Observatory in
Puerto Rico or initiatives connected to its legacy. T
he name "Arecibo" is used in several different
contexts related to software and events:
...
The specific meaning depends entirely on
the context in which the term is used,
but it always relates back to the legacy
and location of the Arecibo Observatory.

An arecibo software event also refers to
a huge software crash as a result of
software parts not being certified.

AI Overview

The Arecibo collapse was caused by the
failure of steel cables due to long-term,
stress-induced zinc creep in the "spelter
sockets" that held them. This failure was
accelerated by hidden damage from previous
cable breaks, exacerbated by the stress from
Hurricane Maria, and possibly by the
observatory's own powerful radio
transmitter, leading to the final collapse
of the instrument platform.

Contributing factors.

Monday December 1 13:07
____
Airlines Airbus shares fall on reports
of new quality issue on dozens of A320 aircraft
.

what technologies are used for a320 software?

AI Overview
Airlines adopt software fix for Airbus A320
after plane has ... The Airbus A320 uses
a combination of technologies, including a
digital fly-by-wire (FBW) system that uses
computers to control flight surfaces,
real-time operating systems (RTOS)
like Integrity for critical functions like
the Flight Management Computer
(FMC), and various specialized
computer systems for tasks like
navigation, engine control, and
collision avoidance.

Flight control and automation
...
Operating systems System:
...
Specialized systems and hardware.


WHAT LANGUAGES USED UB A320 FLIGHT CONTROL SYSTEM?

AI Overview

ATA 27: Airbus A320 (Technical Notes) - AviationHunt
The Airbus A320 flight control system primarily uses Ada,
C, and C++ for its critical software. Ada is particularly
common for safety-critical avionics due to its reliability,
while C and C++ are also widely used, sometimes in
conjunction with model-based design tools that
automatically generate code. Other languages
like Python may be used for non-critical tasks like
testing and scripting.

Primary flight control languages.
____
Why Bonds Won’t Protect You
From an AI Bubble
.
____
US job cuts surged 183% in October to
a record 153K. Is this the end of
America's ‘no hire, no fire’ landscape?
.
 ___
Utility giant CEO wants brake
on wind and solar push
.

New study uncovers why millions of
Americans are dealing with
spiraling electric bills: 'Not all states
are suffering equally'
.

Power surge: law changes could
soon bring balcony solar to millions
across US
.

The Left’s Climate Dreams Hit
Energy Reality
.

German Energy Giant Warns Against
Wind and Solar Subsidies
.

Private Equity Pours $1.45 Billion
Into UK Renewable Energy
."

Cooking with gas gets more expensive
as Americans face rising prices into 2026
.s
Try 1.

ftp disappeaared from ryzen 7 4700u.

Sunday November 30 09:41
____
How The $10 Trillion AI Bubble Pops.

Datacenters in space aren't going
to work (taranis.ie)
.

 ____
$11 billion SunZia wind project to bring
New Mexico a renewable power surge
.

what is the sunzia project?

AI Overview

The SunZia project is a massive clean energy
infrastructure undertaking in the United States,
consisting of the SunZia Wind farms and the
SunZia Transmission line. Located in New
Mexico and Arizona, it is designed to generate
over 3,500 MW of wind power and transmit
it to markets in Arizona and California via a
550-mile high-voltage direct current (HVDC)
transmission line. Developed by Pattern
Energy, it is considered the largest clean
energy infrastructure project in U.S. history
and is expected to supply clean energy to
nearly three million consumers.
SunZia
Wind: A series of wind farms in rural New

Mexico
.l

AI Overview

[PRC rejects SunZia transmission line project \

The SunZia project is led by Pattern Energy,
which has selected Hitachi Energy and
Quanta Services as its main engineering,
procurement, and construction (EPC)
partners. Hitachi Energy is
responsible for the high-voltage
direct current (HVDC) equipment for
the transmission line, while Quanta
Services manages the construction of
the transmission infrastructure through its
Quanta Infrastructure Services Group and
the wind farm through its affiliate, Blattner
Energy. Pattern Energy: The primary
developer and owner of the SunZia project.
Hitachi Energy: The supplier of the HVDC
equipment for the transmission line.
Quanta Services: The EPC contractor for
the transmission line and the wind farm
(through its affiliate, Blattner Energy).
Try 1.


Two keb9ards faioled 11/28-29.


Saturay November 29 09:27
____
A buried Nvidia warning could shake
the entire AI buildout
.

Nvidia says it isn't using 'circular financing'
schemes. 2 famous short sellers disagree
.
____
how does infix differ from rpn?how does infix
differ from rpn?
AI Overview

Infix notation places operators between operands,
like \(3+4\), while RPN (Reverse Polish Notation)
places operators after their operands, like
\(3\;4\;+\). The key difference is that
infix requires parentheses and operator
precedence rules to be parsed, whereas
RPN eliminates both, making it easier for
computers to evaluate using a simple
left-to-right stack-based algorithm. 

Infix notation
...
RPN (Reverse Polish Notation).

does a Yacc convert from infix to rpn?

AI Overview
A Yacc parser does not automatically
convert infix notation to Reverse
Polish Notation (RPN); rather, it
parses the infix expression and
can be programmed to output
the RPN equivalent. The
conversion is defined by how
you write the grammar rules
and associated actions within
the Yacc specification.

How it Works.
...
Alternative Method:

Shunting-Yard Algorithm The
standard algorithm specifically
for converting infix to RPN (or
postfix) is the shunting-yard
algorithm, which typically
uses a stack data structure.
Yacc's internal shift-reduce
parsing mechanism can
achieve a similar result as
the shunting-yard algorithm
if the actions are correctly
implemented.


does intel mcs BASIC-52 convert
from infix to rpn each time an
expresion is interpreted?

AI Overview

Yes, the MCS BASIC-52 interpreter
evaluates expressions by
converting them to an internal
postfix representation, also
known as Reverse Polish
Notation (RPN), each time an
expression is encountered
during interpretation.

This approach is typical for
interpreters, especially those
in resource-constrained
environments like the
8052AH microcontroller,
for several reasons:
...
nterpreter Design: The original
expression in infix notation is
processed (parsed and
converted to RPN)
immediately as part of
the interpretation step
when the line is executed,
rather than being pre-
compiled into a
machine-code RPN
equivalent.

did Gates and associates x86 BASIC
convert from infix to rpn each time
an expression is interpreted?


AI Overview

Yes, early Microsoft BASIC interpreters
(including those developed by "Gates
and Associates," the name used on
the original Altair BASIC) converted
infix expressions to Reverse Polish
Notation (RPN) (also known as
postfix notation) as part of their i
nterpretation and evaluation
process.

his RPN token stream was then
evaluated using a simple
stack-based algorithm. This
approach was efficient for the
memory-constrained
microcomputers of the era
because:

Syntax Simplicity:
...
Stack Efficiency:
...

The source code for later
versions of Microsoft BASIC,
such as the 8080 and 8086
variants, confirms this design
choice, which was a common
and effective method for
interpreters at the time.




Windows keeps obsolete strings
forever to avoid breaking translations
.
 
Try 1.

riiday November 28 15:15
____
is burry winning his bet?

AI Overview

Michael Burry has a well-known history of making
significant, high-profile bets, and the question is
likely referring to one of two possibilities:
his famous bet against the US housing market,
which he already won, or his recent short
positions against certain AI stocks.

He famously made close to $800
million in profit for his firm (and
millions for himself) by betting
against the U.S. subprime mortgage
market before the 2008 financial
crisis. This bet has long been settled
and is the basis for the book and
movie The Big Short.

His Current AI Bet (Ongoing)

More recently, in November 2025,
Burry made headlines for building
significant bearish positions
(put options) against artificial
intelligence (AI) high-flyers

Nvidia (NVDA) and Palantir (PLTR),
totaling a notional value of over
$1 billion.

Palantir: Burry appears to be
winning this bet so far, as
Palantir's stock has plunged
significantly since his position
was revealed.

Nvidia: This situation is more
volatile. Nvidia's stock experienced
some dips following the news
of his bet and his subsequent
critiques, but its long-term
performance and reaction to
earnings reports mean the
outcome of this bet remains
uncertain and will depend on
future market movements. T
he bet is a recent development,
and its ultimate success or
failure will likely take months
to play out.

In summary, he has already
won his famous "Big Short"
bet, but the outcome of
his current bet against AI
stocks is still in progress.

His "Big Short" Bet (Won)
____
Michael Burry Just Exposed How
Big Tech Is Inflating AI Profits
.

what is circular buying?

AI Overview

The Role of Procurement in a Circular
Supply Chain Model Circular buying, or
circular procurement, is an approach
to purchasing that applies circular
economy principles to reduce waste and
the use of virgin resources by prioritizing
the entire lifecycle of a product. Instead
of the traditional "take-make-waste"
linear model, it involves buying
goods and services that are
designed for durability, reuse,
repair, remanufacturing, or that
contain recycled materials. This
strategy also includes clauses
for end-of-life management,
ensuring materials can be
recovered and reused.

Key principles of circular buying:
....
Benefits of circular buying:

are meta, meta, and amd
involved in circular buying?


AI Overview

Yes, AMD is involved in "circular
buying" through its strategic
partnership with OpenAI, which
has sparked concerns about an
AI investment bubble. Meta is
generally a customer in these
scenarios, and recent reports
suggest it is exploring deals
to buy chips from Google,
which could impact

AMD. AMD and Circular Deals

The Deal Structure:
...
Meta's Role.

Meta Throws Billions at Google AI Chips
-- The Winners and Losers.


Global Real Estate Bubble Risk in 2025.
___
Tenstorrent QuietBox tested: A
high-performance RISC-V AI
workstation trapped in a
software blackhole
.
___
The Cloud’s Not Fluffy, It’s a Hot, Loud Factorys.

how do some hackers discover software issues
that all them into install malware?

AI Overview

Hackers discover software vulnerabilities
by reverse engineering code, using
automated scanning tools, probing
software with "black box" approaches,
and leveraging publicly available information
like OSINT. They look for issues in
communication channels, databases,
and operating systems, often
exploiting known vulnerabilities in
specific versions of software or
hardware, and can use social
engineering to trick users into
downloading malware.

Methods hackers use to find vulnerabilities
...
How vulnerabilities lead to malware installation.

Data centers powering the AI boom are
pitting states against each other
.
 
____
Texas To Host Gigantic 11-GW Solar,
Energy Storage, Nuclear, & Gas Energy Island
.

EnergyThe Future of World Energy
Supply (2024–2050), Charted
.
Try 4.

Thursdnesday November 27 16:51
____
Malicious LLMs empower inexperienced
hackers with advanced tools
.

HPC won't be an x86 monoculture
forever – and it's starting to show
.

This Thanksgiving’s real drama may
be Michael Burry versus Nvidia
.

CodeRED emergency alert system
CodeDEAD after INC ransomware
attack
.

Single-name CDS are so hot right now.

We're losing our voice to LLMs
(tonyalicea.dev)
.




____
Benchmarking Chinese CPUs.

or is a version of yacc used to build

the gcc c compiler?

AI Overview

While GCC previously utilized a
Yacc-based (specifically, Bison)
parser for C and C++, it no longer
does. GCC transitioned to
hand-written recursive descent
parsers for both C++ and C.
The C++ parser switched first,
and later the C parser followed
suit, replacing the older
Yacc-based implementation.
This change was driven by
factors such as improved
maintainability and better
handling of complex language
features, particularly in C++.

____
No more PJM data centers unless they
can be reliably serve" market monitord
.

The bubble is ahead of us': hedge fund
exec says investors still don't get how big AI is
.

Will NuScale Power's (SMR) Share
Increase Proposal Reshape Its
AI-Focused Growth Ambitions?
.

do data centers contain certified software?

AI Overview

Yes, data centers contain certified software,
which can include both facility-level
certifications for the data center as a
whole and specific software certifications
for professionals who manage the
systems within them. These certifications
ensure the facility meets standards for
reliability, security, and performance,
and that the staff possess the
necessary skills for critical areas like
networking, cloud, and security.

Facility and hardware certifications

Uptime Institute Tier Certification:
Validates a data center's
infrastructure reliability and
performance against rigorous standards.

ISO 27001: Focuses on information
security management systems to
protect data.

HIPAA and PCI DSS: These
are important for data centers that
handle sensitive health or financial
data, respectively.

Intel® Data Center Certified:
Ensures hardware components,
like DDR5 memory, have been
rigorously tested for reliability in
demanding environments.

Professional software certifications

Cisco Certified Internetwork Expert
(CCIE) Data Center: Validates
expertise in complex data center
network infrastructures.

Red Hat Certified Specialist in
Security: Containers and
OpenShift: Confirms skills in
managing containers and
security within a

Red Hat environment.
Certified Kubernetes Security
Specialist (CKS): Certifies a
data center administrator's
ability to manage the security
of Kubernetes container
environments.

Migrating the main Zig repository from
GitHub to Codeberg (ziglang.org)
.


is relocateable code mainframe mentality?

AI Overview

The concept of relocatable code is
a fundamental concept in computing,
integral to operating systems across
many architectures, including
mainframes, and is not a "mainframe
mentality" in the sense of being
exclusive or unique to mainframes.

Relocatability allows code to be l
oaded into any available memory
address at runtime, which is crucial
for multi-user, multi-tasking
systems—a characteristic of
both mainframes and
modern systems.


Understanding Relocatable
Code and Mainframe Systems
...
The "mainframe mentality"
more commonly refers
to an engineering culture of
systems thinking, emphasizing
extreme reliability, thorough
error handling, and resource
awareness—anticipating
everything that can go
wrong—rather than a
specific low-level coding
technique like relocatability
itself.


have gigabyte and larger memories
largely obviated the need for
relocatable code?

AI Overview

No, gigabyte and larger memories have
not obviated the need for relocatable
code; in fact, its importance has
increased. Modern computing relies
heavily on relocation techniques
for efficient memory management,
dynamic linking, and security purposes.

The reasons for the continued necessity
of relocatable code are
:
...
Dynamic Linking: Most modern
software uses shared libraries
(e.g., DLLs on Windows). These
libraries are compiled as relocatable
code because the operating system
cannot know in advance where in a
program's memory space it will load
them. The dynamic linker adjusts
the internal addresses within the
library at runtime to match their
actual loaded location.
...
While larger address spaces
(like 64-bit) can reduce some
specific complexities, such as
the need for position-independent
code (PIC) in all cases, the
underlying principle of relocation
remains essential for modern
computing systems to function
correctly and securely.


who invented dlls and mangled names?

AI Overview

Dynamic Link Libraries (DLLs) are a
core component of the Microsoft
Windows operating system. While the
concept of shared libraries and
dynamically linked code existed before
Windows, the specific
implementation and widespread
use of DLLs are attributed to
Microsoft as part of the development
of their operating system.

Name mangling is a technique
primarily associated with C++, a
language invented by Bjarne
Stroustrup. Stroustrup developed
C++ (originally "C with Classes") in
1979 at Bell Labs. Name mangling
became a necessary feature in C++
to support features like function
overloading, namespaces, and
templates, which allow multiple
functions or entities to share the
same source code name but have
different underlying implementations
or contexts. The mangling
process creates unique names
for these entities in the compiled
code, which the linker can then
correctly resolve. While the specific
mangling schemes can vary
between compilers, the concept
originated with the development
of C++.



 
___
China Braces for a Winter That Could
Break Its Power Grid
.
Try 2.


Ryzen 7 4700U 10 1909 runns faster tham with 20H2.


Wednesday November 26 15:25
____

is everybody switching from windows 11 to linux?

AI Overview

No, not "everybody" is switching from
Windows 11 to Linux, but there is an
increase in the proportion of people
switching, driven by dissatisfaction
with Windows 11 and the growing
appeal of Linux. While some users
find Linux to be a better alternative
due to factors like privacy,
performance, and cost savings,
many find sticking with Windows
is better due to the learning curve
and software/hardware
compatibility issues with Linux.

You can watch this video to learn
more about the potential
challenges of switching from
Windows 11 to Linux:
...
Reasons people are switching to Linux.
...
Reasons people are not switching.
...
Linux community issues:

While most of the Linux community
[cult?] is helpful, some inexperienced
users report being put off by "toxic"
behavior in forums when asking for help.

___
The Mythical Man-Month, 1975.

Machine, assembly, and systems
programming for the IBM 360, 1969.

AI Overview

"Machine, assembly and systems programming
for the IBM 360" by W.H. Payne is a 1969 book
that serves as an introductory text to the IBM 360
computer system, focusing on its machine language,
assembly language, and systems programming
principles. It was designed as a foundation for
computer science students, covering fundamentals
of the machine's operation, assembly language
programming, and basic systems concepts
like the assembler and operating system
interactions.

Author: W.H. Payne

____
why does gcc c rbp rpn stack use
negative displacements?

AI Overview

GCC and the C language use negative
displacements with the %rbp
(base pointer) register because
the stack grows downwards, f
rom higher memory addresses
to lower memory addresses.

Here is a breakdown of how this works:
...
Using %rbp and fixed offsets makes
it easier for the compiler to manage
and debug local variables because the
offsets remain consistent throughout
the function's execution, even if the
stack pointer (%rsp) moves around
due to pushes and pops of
temporary values.


why amazon vega os?

AI Overview

Amazon developed Vega OS to create
a more efficient, high-performance
operating system for its devices,
especially those with low-end
hardware like the new Fire TV Stick
4K Select. Key reasons include a
desire for better performance,
the ability to control the entire
tech stack to innovate
independently, and a strategy
to curb piracy by preventing
unauthorized app installations
(sideloading). Vega OS is a
Linux-based system designed
to be scalable across a range
of devices, from streaming
sticks to smart displays, while
allowing developers to reuse
code across different
platforms.

Performance and efficiency
...
Code reuse: This approach
allows developers to reuse
existing code and skills
across different devices
and platforms, lowering
the cost of development
and support.
____
Visualizing the World’s Rare Earth Reserves.

‘Dr. Doom’ Nouriel Roubini breaks with
the crowd on the AI bubble, saying
the U.S. is headed for a ‘growth
recession’ and not a market crash
.

Oracle: Margin Call.

Alphabet’s stock is getting closer to
this huge milestone. Why Apple
should watch out
.

Michael Burry of 'The Big Short'
is now a full-time writer. Here's
why he and other investors put
pen to paper
.

California tech giant ]hp\
to slash 4,000 to 6,000 jobs
.
____
Trillions spent and big software

projects are still failing (ieee.org)
.

What they don't tell you about
maintaining an open source project
(andrej.sh)
.
 
Try 1.


Ryzen 7 4700u. Chein browser :)

Tuesday November 25 17:33
____
Data Centers, AI, and Energy:
Everything You Need to Know
.

Data Centers in Texas Could Lead
to Blackouts in the Middle of
Winter, Group Warns
.
___
NVIDIA Hits Back at Claims That
Google’s
TPUs Could Overtake Its AI Stack,
Saying It Offers “Greater
Performance and Versatility”
Than ASICs
.

Nuclear Stock Meltdown Continues
For Oklo, NuScale, Nano
.

Millions of Americans Are Losing Their
401(k)s Without Realising —
Employers Are Moving Their
Savings Into Cash Accounts
That Barely Grow
.
____
PhaseLatch Mini – An STM32-based low-cost
SDR digitizer with two 12-bit ADCs,
210 kS/s USB streaming
.
____
Microsoft: Exchange Online outage
blocks access to Outlook mailboxes
.

Famed software developer Martin Fowler
says his field is in a 'depression.'
Here's his advice for junior engineers
.
____
what is the differende between a s a
cult follo a skeptical cult follower and
a cult follower?

AI Overview

The key difference is that a skeptical
cult follower retains a degree of
critical thinking and internal doubt,
while a typical cult follower exhibits
absolute, unquestioning belief and
obedience. Cult structures are
specifically designed to suppress
skepticism and critical inquiry.

Typical Cult Follower
...
Skeptical Cult Follower
...
In essence, the fundamental
difference is the presence of
an internal, critical perspective
in the skeptical follower, which
is largely absent in the fully
indoctrinated cult follower.
____
Michael Burry, Peter Thiel, and other big
investors betting against the AI boom
.

Nvidia, AMD drop sharply as Meta weighs Google chips.
    Nvidia set to lose $180 billion in
    market value today as Meta weighs Google chips .

Hyperscalers Crash the Grid as
Big Tech Becomes a Power Trader
.

I Paid for Michael Burry’s New
$400 Substack So You Don’t Have To
. [RYZEN 5 3500u POST]

Markets Michael Burry’s next ‘Big Short’:
An inside look at his analysis showing AI is a bubble
.

Oracle-Linked Borrowing Binge Worries Lenders.

Nvidia: The Next Growth Frontier Is Sovereign AI.

"Good engineering management" is a fad
(lethain.com)
.

APT Rust requirement raises questions
(lwn.net)
.

what is the difference between a cult
follower and a cult member?


AI Overview

The main difference is that "cult follower"
is a broader term, while "cult member"
typically implies a deeper, more
committed, and often more
controlled level of involvement
within an organization. A
follower might be a casual
admirer, whereas a member
is usually fully integrated into
the group's structure, ideology,
and lifestyle, which often
involves isolation and undue
influence from a charismatic
leader.

Cult follower
...
Cult member
v

 
ry ?.
Solitaire disappeared from Lenonovo Ryzen 7 4700U runninf Wubsiws 10 1898,

But here us Edge which refuses to allow Google Chrome install.

Google News has been deporecated?




Chrome portable running.


Googlw pw successfullu entered.



Hacked?



1

Monday November 24 17:31

____
Are 64 bit high-watt Nvidia, Intel, AMD .. hardware
platforms obsolete to be replaced by low=watt
nanocomputers executing 64 bit fixed and
floating point point in two’s complement
arithmetic in machine language software?

____
has Big Tech made a mistake
not using certified software?

AI Overview

Whether Big Tech has made a "mistake" by not
universally using certified software is a complex
issue with no simple answer, as the use of
certification is often dictated by regulatory
requirements, industry best practices, and
a balance of risk and reward, rather than
an inherent failure of judgment.

No Single "Mistake"
Certification is often voluntary:
...
Internal standards can be rigorous:
...
The Trade-offs
...
In conclusion, the decision not to
universally use certified software
is rooted in a balance between
innovation, speed, cost, and risk,
with companies adhering to
certification when compliance
is legally required or strategically
beneficial. The potential "mistake"
is a matter of ongoing debate
involving regulators, consumer
advocates, and industry leaders,
particularly in the context of
high-impact failures and human
rights concerns related to data
privacy and platform control.

____
Years-old bugs in open source tool
left every major cloud open to disruption
.
____
Michael Burry launches newsletter to l
ay out his AI bubble views after
deregistering hedge fund
.

The Big Short’ investor Michael Burry
on an AI bubble: ‘There is a Cisco
at the center of it all … Its name is
Nvidia’
.

Warren Buffett Is Buying Artificial
Intelligence (AI) Stocks While
Michael Burry Is Shorting Them
-- Who's Right?
.

The Bitter Lesson of LLM Extensions
(sawyerhood.com)
.

How tech broke the job market.
    Applying to a job in 2025 is
    the statistical equivalent of
    hurling your resume into
    a black hole.
____
55 iich inexpensive software Insignia Fire TV.


x horizontal, y vertoca ONGOSUB BASIC, Labels as values goto c/c++ software implementation.

One optioni highlighted.

Remote wheel moves one to icon right, left, up on, down one.

Clicking Ok selects.





View fixed with 10 1909 install. :)

____
Several core problems with Rust
(bykozy.me)
.

Have complexity and obfuscation in
Linux caused decline in use?

AI Overview

No, Linux use is growing rapidly
across most computing sectors,
including servers, cloud computing,
supercomputers, and embedded
systems. While perceived
complexity remains a historical
barrier to mainstream consumer
desktop adoption, it has not
caused an overall decline in use.

Linux Usage Trends
...
omplexity as a Factor
...
In summary, the narrative
that complexity has caused
a decline in Linux use is
inaccurate. Linux is a
dominant force in
professional and
infrastructure
environments, and
efforts to improve
usability are even
showing steady
growth in the
consumer desktop
space.


how does linux UX compared to
Google Fire OS?

AI Overview

Linux offers a wide range of
customization and flexibility,
while Google's Fire OS provides
a more streamlined and
integrated experience based on
Android, but is increasingly
moving toward Amazon's own
Linux-based Vega OS for lower-
end devices. The primary
differences are the vast
software choice on Linux
compared to the app
ecosystem of Fire OS/Vega OS,
and the ability to customize
almost any aspect of Linux
versus the more locked-
down nature of Amazon's
devices.

User Experience.
____
Homeowners share surprising,
real-world data after installing
solar panels
.

A Stand Against Coal Could
Push Oakland Toward Bankruptcy
.
Try 1.

Post from Lenovo Ryen 7 4700U running Windows 10 1909.

Microsoft Edge won't allow Chrome browser install.

Chrome posts from Lenovo Ryzen 5 3599U.

Sunday November 23 18:06
____
Experts Warn The Internet Will Go Down
In A Big Way — And You'd Better Be Ready.
____
what is a cousin jack?

AI Overview

"Cousin Jack" is a nickname for a Cornishman,
especially a Cornish miner, particularly one
who emigrated from Cornwall, England.
The name is thought to have originated
from the practice of Cornish miners
asking for jobs for their "cousin Jack"
back home, a reference to their close-knit
community and family ties, {as explained
by the BBC
https://www.bbc.co.uk/legacies
/immig_emig/england/cornwall
/article_1.shtml}. Identity:

The term is a widely used identifier for
people of Cornish descent.
...
Reason: It is believed to have
originated from the way
Cornishmen would secure
jobs for their relatives in
the mining industry.

____

Here's why concerns about an
AI bubble are bigger than ever
.
____
are parameters passed to linux from
the command tail?

AI Overview

Yes, parameters can be passed to the
tail command in Linux. These
parameters, often referred to
as options or arguments,
modify the behavior of the
tail command.

Here are some common
parameters and their functions
:
____
Wall Street eyes a possible culprit in this
week’s head-spinning stock market reversal:
Bitcoin
.

Why investors are increasingly fatalistic.

GCC Steering Committee Allows New
Language Front-End To Land For GCC 16
.
____
Washington man spent 31 years at
Microsoft only to be fired on a call with 120 others.
Here's how he's rebuilding at 60
.
 ____
12 million Floridians are about to see
their electricity prices spike
.

Try 3.

Saturday November 22 17:32
____
This Looks Like A Bubble:
The Alarming Signs Inside
The AI Boom
.

Microsoft Open Sources Zork I,
II And III
.
____
RavynOS: Open Source MacOS
With Same BSD Pedigree
.

___

Nvidia CEO says the company is in a no-win
situation amid AI-bubble chatter,
leaked meeting reveals
.

Why Oracle (ORCL) Stock Is
Down Today
.

Top Economist Warns That
AI Data Center Investments
Are “Digital Lettuce” That’s
Already Starting to Wilt
.


Are we in an AI bubble? Four
charts will help you decide
.

Bill Gates Says We're In An
AI Bubble, But It's No 'Tulip Mania'
.

Microsoft's head of AI doesn't
understand why people don't
like AI, and I don'
t understand why he doesn't
understand because it's
pretty obvious
.


We should all be using dependency
cooldowns (yossarian.net)
.

____
What is UX in computing?

AI Overview

In computing, UX stands for User Experience
and refers to the overall experience a person
has when interacting with a product, system, or
service. It encompasses the user's feelings,
perceptions, and emotions, considering every
aspect from usability and design to the user's
overall satisfaction. The goal is to create a
holistic and positive interaction by
coordinating elements like layout, visual
design, and functionality to make a
product useful, valuable, and easy
to use.
...
It's the foundation of a good product:
A good user experience is crucial for
customer retention and is a key
aspect of product development,
ensuring that users find the
product valuable and effective
.


what is the difference between
Intel MCS BASIC-52 ONGOSB
and ONGOTO?

AI Overview

The fundamental difference between
ON...GOSUB and ON...GOTO in Intel
MCS BASIC-52 is that ON...GOSUB is a
subroutine call that expects a RETURN
statement to resume execution at
the next instruction after the call,
while ON...GOTO is an unconditional
jump that does not store a return
address and therefore continues
execution from the new location
without automatically returning.

Both statements use an index value
to select from a comma-
separated list of line numbers
(or labels in some BASIC
versions), but their behavior
after branching is distinct:
...
In essence, use ON...GOSUB
when you want to temporarily
branch to a shared block of
code and then resume
where you left off, and
use ON...GOTO to
permanently depart the
current sequence of
instructions
.


what is the length in bytes
of the gcc c and c++ jump
table && addresses?

AI Overview

The length in bytes of addr
esses within a GCC C and
C++ jump table is dependent
on the architecture of the
system the code is compiled
for.

On a 32-bit system:
Addresses are typically
4 bytes long, as they
need to be able to
represent a 32-bit
memory address
space.

On a 64-bit system:
Addresses are typically
8 bytes long, to
accommodate the l
arger
64-bit memory address
space.

Jump tables
themselves are arrays
of these addresses.
Therefore, the total
size of a jump table in
bytes would be the
number of entries in
the table multiplied by
the size of an
individual address
(4 or 8 bytes,
depending on the
architecture).
____
China unexpectedly closes 15 mines
— Experts uncover the true reason
and will make America think
.
Try 4.

Friday November 21 18:02
____
Did Qualcomm kill Arduino for good?.

Clang 21 Delivering Nice Performance
Gains On AMD EPYC Zen 4 With HBM3
.
____
Nuclear’s Costly Comeback Meets
Harsh Market Reality
.
___
Makers slam Qualcomm for tightening
the clamps on Arduino
.

AI Overview

The question of whether C++ itself is built using
"uncertified" software components is
complex because C++ is a standardized
language specification, not a single piece
of software built by one entity. Its
implementation involves various
components from numerous sources,
many of which are open-source and
not subject to a universal, single
"certification" process in the way
a single commercial product might
be. Here are

Here are key factors to consider:
...
AI Overview

The question of whether
C++ itself is built using "uncertified"
software components is complex
because C++ is a standardized
language specification, not a
single piece of software built
by one entity. Its implementation
involves various components
from numerous sources, many
of which are open-source and
not subject to a universal, single
"certification" process in the
way a single commercial
product might be.


is llvm [low-level virtual machine]
clang compiler written in c++?

AI Overview

Yes, the LLVM project, including the
Clang C, C++, and Objective-C
compiler, is primarily written in C++.
The LLVM tools and libraries make
extensive use of the C++
Standard Template Library (STL).

"At Qualcomm Technologies, we
maintain several compiler
toolchains to allow our teams
and customers to productize
their code for our platforms.
All our toolchains are based
on LLVM, and we try to
contribute as many of our
changes and improvements
to the LLVM open source
project as possible."

AI Overview
...
In summary, while LLVM is
foundational to the
software produced by "Big
Tech," it is a community
-driven open-source
project, not a single
company's exclusive
technology.
____
Bill Gates Is Rapidly Selling Microsoft Stock.
Here's What Investors Need to Know
.

AI Bubble or AI Boom? SA analysts
share their thoughts.

Canonical MicroCloud and Raspberry
Pi turned out to be a killer combo
.

Software TV/monitors.



____
How One Uncaught Rust Exception
Took Out Cloudflare
.

Cloudflare outage on
November 18, 2025
.
 
____
Going Nuclear.

Two died in tragic effort to save colleague
at wind farm, report finds
.
Try 1.

Thursday November 20 17:01
____
Microsoft and Amazon Got Hit With Huge
Downgrades—Why I’d Buy Anyway
.

Wear This RISC V, RPN Calculator
Watch For Maximum Nerd Cred
.



Microsoft Windows hits 40 years old:
A visual walk down memory lane
.

Microsoft finally admits almost all major
Windows 11 core features are broken
.

Stocks Tumble as Early Rally
Gives Way to Tech Anxiety
.

The A.I. Boom Has Found Another Gear.
Why Can’t People Shake Their Worries?
.

Apple shows how much faster the M5
runs local LLMs compared to the M4
.

do apple llms run llvm?

AI Overview

No, "Apple LLMs" do not run LLVM in the
way one might think; LLVM is a compiler
infrastructure used to compile code for
Apple platforms, which includes the
development of the MLX framework.
While Apple uses LLVM to compile
languages like Swift into machine
code, LLMs themselves are models
that run on hardware, and their
performance on Apple devices i
s optimized through frameworks
like MLX, not the other way around.
MLX leverages the Apple silicon GPU
for high-performance execution of
these models.
...
LLVM and MLX work together: LLVM
is used to compile the code that
makes up the MLX framework,
and this compiled code then
runs on the hardware. MLX,
in turn, provides the tools and
optimizations for running LLMs
efficiently, often on the GPU.

do apple oses run a version of forth internally?
[AI Overview labored over above question
for more than 15 minutes untile cancelled.]

Verizon Begins Laying Off More
Than 13,000 Employees.
____
Michael Burry Hits Back At Critics: Accuses
AI Companies Of 'Suspicious Revenue
Recognition' And Depreciation
Gimmicks: 'Fraud, Not A Flywheel'
.

Get Real,’ Says Analyst About
Microsoft Stock
.

Michael Burry Says Nvidia Spent
$112.5 Billion On Buybacks Adding
'Zero' Shareholder Value — 'The
True Cost...'
.
____
are best buy/amazon fire tvs software implemented?.

AI Overview

Yes, Amazon Fire TVs are built using Amazon's
own software, which is the Fire OS, an
Android-based operating system. Best
Buy is a partner in selling these TVs an
d
also offers its own branded sets
that include the Fire TV experience.
While the original Android-based
Fire OS is still in use, Amazon is also
implementing a new, custom
operating system called Vega
OS on some entry-level
devices, which is a departure
from the standard

Android build. Amazon Fire OS

Based on Android:
...
Vega OS
...
Current focus:
...
Best Buy's role

Retail partner: Best Buy partners with
Amazon to sell a wide variety of
Fire TV devices, including TVs from
brands like Insignia and Toshiba,
that come with the Fire TV software
built-in.

Exclusive models: In some cases,
Best Buy has exclusive models
and is the exclusive retailer for
some Amazon-branded Fire
TV models.
how many tv manufacturers use am
azon's fire os?

AI Overview Several TV manufacturers, including
TCL, Hisense, Toshiba, and Insignia,
use Amazon's Fire OS on their smart
TVs. Additionally, Amazon also
produces its own line of Fire TVs,
and other brands like JVC and
Grundig use the platform in specific
markets like Europe.
...
t's important to note that while
these manufacturers use the
same Fire OS platform, the picture
quality, features, and overall
performance can vary significantly
between brands because each
company controls its own
hardware and picture
processing, explain
www.bgr.com and PCMag.


Fire tv login.




Insignia remote.

____

"Hello World" for esp32 over one hour initiallization ofn Lenovo N5030 laptop/

Linux obfusctiion issues?


____
Possibly-Smallest ESP32 Board
Uses Smallest-Footprint Parts
.
___
CPython may go Rusty, but older platforms
risk getting iced out
.
 
____
Visualizing Future Solar Power
Capacity by Country
.

US DOE to Loan West Virginia Utilities $1.44B
to Extend Life of 6 High-Cost Coal Plants
.

Spread of data centers raises risk of
winter outages, grid monitor warns
.
Try 1.


Ryzen 5 3500U issues disappeared.. :)

Wednesday November 19 16:55
___
After Cloudflare outage, Microsoft 365
is now down as files become unusable
.
____
Waveshare ESP32-P4 + ESP32-C6 PoE
development board targets HMI and IoT applications
.

ST launches 800 MHz STM32V8 Arm
Cortex-M85 high-performance MCU
manufactured with 18nm FD-SOI
.
___
Current AI pullback is a ‘reset’ as market
valuations reflect reality – analyst
.

Burry's Puts. Thiel's Exit. Nvidia's
Earnings Could Shake Wall Street's AI Faith
.

The AI Power Surge Could End Badly.
____
You haven't heard of this self-hosted
Cloudflare Tunnel alternative
.

what is an on-premises cloud system?

AI Overview
An on-premises cloud system is an
IT infrastructure where an organization
hosts its own software and data on
hardware located within its physical
premises, such as a data center or
office building. This model gives the
organization complete control
over its hardware, software, and d
ata, but it also requires them to
manage and maintain the entire
system themselves, including
upfront costs for hardware, se
curity, and ongoing updates.


Key characteristics.
____
does the gcc c++ compiler support labels?

AI Overview

Yes, the GCC C++ compiler supports
labels. In C++, labels are primarily
used with the goto statement to
transfer control to a specific point
in the code.

Additionally, GCC provides
extensions related to labels,
such as:

Local Labels: These allow
you to declare labels within
a nested block scope using
the __label__ keyword,
making them visible only
within that block.

Labels as Values: This
extension allows you to
take the address of a label
using the && operator and
store it in a variable, which
can then be used with a
goto *expression;
statement for computed
gotos. This is a GNU
extension and not part
of standard C++.

____
Major Cloudflare outage took down
ChatGPT, X, and Spotify Tuesday-
here's what happened
.

Stock Market Today: Dow
Sinks 500 Points As Tech
Pressure Persists; Nvidia Falls
(Live Coverage)
.


 
____
This $1 Billion Trump Loan For Three
Mile Island Lifts S&P 500 Nuclear Giant
.

US to Own Nuclear Reactors Stemming
From Japan’s $550 Billion Pledge
.
Try 5.


ryzen 5 3500u issues.

Tuesday November 18 19:14
____
Cloudflare's outage took down half
the internet, but this open-source
app saved my homelab

____
Stock market wobbles as tech sells off.||

The AI bubble you haven't heard about.

Nvidia and Microsoft Just Teamed Up For a
Massive AI Deal. Is It The Latest Sign of
an AI Bubble?
.

____

AI Overview

The GCC C and C++ compiler does not
build a Reverse Polish Notation (RPN),
or Forth-like, stack on the target
machine for each statement ending
in a semicolon. Instead, it uses an
Abstract Syntax Tree (AST) as its
primary intermediate representation
(IR) during the initial parsing and
analysis phases.

Here's a breakdown of the GCC
process:
...
RPN is an expression notation that
can be efficiently evaluated using
a stack, but it is not the internal
data structure used by modern,
optimizing compilers like GCC
for processing the entire program logic.
____
Nuclear Stocks Crash, With A Potential
ayoff Still Years Away
.

Marvell Technology, Western Digital, Seagate
Technology, Penguin Solutions, and Applied
Materials Shares Plummet, What You Need
To Know
.

What is Cloudflare, and why did it cause
outages across the internet today?
.

AI Data Centers Are Banging on Crypto’s Door.

Your AI May Install Malware: Microsoft Stock
(NASDAQ:MSFT) Slips With New Agentic
AI Warning
.

Cloudflare outage could cause 'some
reputational risk,' but not structural:
BofA
.

Cloudflare slides as outage disrupts.
major apps
.

Arm expands partnership with Nvidia for
AI data center infrastructure
.

AMD, Intel, Monolithic Power Systems,
Micron, and Amkor Shares Are Falling,
What You Need To Know
.
____
Linus Torvalds is OK with vibe coding as l
ong as it's not used for anything that matters
.
____
is the THE fire tv login screen imPlemened with
vertical and horizontal ON GOSUBs in essence?

I Overview

The Amazon Fire TV (THE fire tc) login screen,
which is part of the Fire OS (based on
Android or the newer Linux-based Vega OS),
is not implemented using "vertical and
horizontal ON GOSUBs" in essence.

The terms "ON GOSUB" or "GOSUB" refer
to control flow statements typically found
in older, procedural programming

languages like BASIC. These
commands are used to transfer
control to a subroutine and return
later, a method largely obsolete
in modern software development.

Modern Fire TV interfaces are
built using contemporary
software development
frameworks and languages:

Operating System:
...
Programming:
...
UI/UX:

Navigation on the Fire TV home
and login screens is handled by
the underlying operating system's
UI framework, which manages
directional input from the
remote control to move
focus between UI elements
(menus, content rows,
buttons). The structure
involves horizontal content
rows within a vertical global
navigation menu, but this
is a design pattern for
navigation, not a direct
implementation using

obsolete procedural
commands.

We have to be able to hold tech
platforms accountable for fraud
.

Major Cloudflare outage
takes down ChatGPT, Spotify,
and X - here's the latest
.

Is Michael Burry Shutting His Fund
Just Before He’s About to Be
Proved Right?
.

____
Oracle’s astonishing $300bn OpenAI deal
is now valued at minus $60bn
.

13 Fallen S&P 500 Stocks Slip
Into Bear Market
.

Crypto market sheds more than $1tn
in six weeks amid fears of tech bubble
.

Bitcoin briefly slides below $90K for
the first time in seven months
.

US Layoffs Now Dump Workers
by Mass Emails
.


IS LLVM USED IN CLOUD SYSTEMS?

AI Overview

Yes, LLVM is used in cloud systems, both
for building and optimizing cloud-native
applications and for managing cloud
infrastructure. Examples include its
use in cloud-native databases,
high-performance computing
on cloud platforms, and for
building developer tools that run
on or interact with the cloud.

Examples of LLVM in cloud systems
...
LLVM's modular design is crucial
for cloud-based compiler design
tools, notes Meegle
.
For cloud systems how manying lines of
code and what languages re used?

AI Overview

There is no single answer for the "lines of
code" in cloud systems, as it varies widely
depending on the specific service or application.
However, common languages used across
cloud platforms include Python, Java,
JavaScript, Go, Ruby, and C# for tasks
like application development,
infrastructure automation, and
serverless functions.

Common cloud computing languages
...
Why a specific line count is not possible

Varied functions: Different languages
are used for different purposes.
For example, a cloud platform
might use Go for its
high-performance core,
Python for scripting and
automation, and Java for
business logic in specific services.

Amazon, Microsoft under EU probe f
or cloud computing services
.
____
Consequential decision’: PJM electrical
grid to decide who pays bill for massive
data centers
.

____

Stop These Things’ Weekly Round Up: 16 November 2025.

The Energy Chart Nobody Is Paying Attention To,
But It Could Change Everything
.
Try2.


Ryzen 5 3500U
issues.

Monday November 17 14:48
____
'Big Short' investor Michael Burry
sends another AI bubble warning, t
his time using a 'Lord of the Rings' meme
.

Your Laptop Isn’t Ready for LLMs.
That’s About to Change
.

Michael Burry Just Torched Big Tech's
AI Profit Party
.

Michael Burry's Warning to Wall Street
Just Rang Out Loud and Clear.
Should You Listen
?

Red Hat Losing Another Longtime
& Prominent Linux Kernel Engineer
.
____
.Will PJM do what it takes to get
data-center costs under control?
.

European Commission mulls if
big tech cloud providers should
face new curbs: report
.

Visualizing the State of World
Debt in 2025
.

How much of the AI data center boom
will be powered by renewable energy?
.
___
Bill & Melinda Gates Foundation Trust sold
approximately 65% of its Microsoft stock
to raise funds for its philanthropic mission
and to diversify its investment portfolio.
This strategic move helps provide
consistent capital for grants, supports
the foundation's long-term goal of
donating nearly 99% of its wealth, and
rebalances the portfolio away from a
heavy concentration in a single
company.

Fund philanthropic efforts:
...
Align with long-term goals: The
foundation's actions are consistent
with Bill Gates' commitment to
donating nearly his entire fortune
by 2045. The sales help meet
that goal by providing liquidity
and strong investment returns,
which are necessary to support
the foundation's operations
until its planned closure on
December 31, 2045.

Microsoft: Azure hit by 15 Tbps DDoS
attack using 500,000 IP addresses
.

____
who wrote rhw fire tv softwware?

AI Overview

Amazon wrote the software for Fire TV,
which is called Fire OS. Fire OS is based
on the Android operating system
but is developed by Amazon to
run its Fire TV devices and
tablets.

Developed by Amazon: Amazon
created
the Fire OS software or its Fire
TV line of
products.

Based on
Android: The Fire OS operating
system is a fork
of the Android operating system,
meaning it is built
on top of Android's open-source
code.

Software
development: Amazon uses tools
like Android
Studio to develop apps for Fire TV,
and the core
of Fire OS is written in languages
like C and C++.

fire tv tvs. Amazon.


pdsink – An open-source USB PD 3.2
sink stack for embedded devices
.
    using OnSemi FUSB302B
    + FreeRTOS (ESP32-C3).

what is psink for embedded controllers?

AI Overview

"Pdsink" is a specific, new open-source
USB Power Delivery (PD) 3.2 sink stack
for embedded devices. It is not a general
term like "current sink" in electronics,
but rather a dedicated software
solution (stack) that allows embedded
systems to negotiate and receive
power from a USB-C power source
(like a charger) using standard protocols.

Key Aspects of Pdsink:
...
In essence, pdsink provides the
necessary logic for an embedded
system to communicate over the
USB-C.

AI Overview

The term "pdsink" refers to an
open-source USB Power Delivery
(PD) sink stack for embedded devices,
not a specific commercial product
or brand name. As a result, there
are no specific "pdsink embedded
controller board vendors." Instead,
you can find vendors that sell
general-purpose embedded
controller boards that are
compatible with the pdsink
software, often found on
developer and supplier websites.

Vendors and Suppliers.
____
Server virtualization market heats
up as VMware rivals try to create alluring
alternatives
.

6 reasons Ubuntu Server makes a
better NAS than most NAS
operating systems
.

A NAS (Network Attached Storage)
operating system is a specialized
operating system that runs on a
storage device connected to a
network, allowing users to
centrally store, share, and
access files from various devices.
These operating systems are
designed to be efficient, reliable,
and user-friendly, often based
on a Linux core and supporting
common file-sharing protocols.
Examples include the systems.

The fate of "small" open source
(nolanlawson.com)
.

Nvidia Is Involved in "One of the
More Common Frauds of the
Modern Era," Says the
Legendary Investor Who
Predicted the 2008
Housing Crisis
.

Meta Platforms And Its Real Value.

 
____
Hydropower Is Getting Less Reliable as
the World Needs More Energy
.

Visualized: Future Electricity Usage
by Country (2024–2035)
.
Try 1.

Sunday November 16 09:48
____
I built a $5 uptime monitor using an ESP32 "
and it's surprisingly powerful
.
____
Bill and Melinda Gates Foundation just
slashed its Microsoft holdings by nearly 65%,
move raises eyebrows
.

what comes with old software products?

AI Overview

Old software products can come with
outdated media like floppy disks or
CDs, extensive user manuals, and included
extras like trial versions or even competing
software. They may also include bundled
software or "bloatware," which was
often pre-installed by manufacturers,
and a collection of fixes and updates,
known as service packs, that were
released during the software's active
support period.

Physical and bundled media
...
Included software and updates
---
Associated risks and considerations

Security vulnerabilities: Without security
updates, outdated software is more
susceptible to new exploits.

Limited support: Once a product reaches
the end of its lifecycle, support and

security fixes may stop, making it
incompatible with new hardware and
software.

Technical debt: Older software can
be built on outdated programming
platforms and may lack modern security
measures, increasing the risk of
exploitation.

Michael Burry Bets Against Nvidia and
Palantir. But It's Not What You Think
.



AI Is Making Big Tech Weaker.

The AI Bubble Everyone Fears
Doesn't Exist
.

Despite AI bubble fears, Warren Buffett’s
Berkshire Hathaway loads up on shares
of hyperscaler Alphabet amid huge rally
.

Peter Thiel dumps top AI stock, stirring
bubble fears
.

____
Canonical's MicroCloud turned out to be
an amazing addition to my home lab
.

what is canonical microcloud?

AI Overview

Canonical MicroCloud is an open-source,
automated private cloud solution from
Canonical designed for small-scale and
edge deployments. It combines
components like LXD for virtualization,
MicroCeph for storage, and MicroOVN
for networking into a lightweight, scalable,
and low-touch platform that can be
deployed with minimal effort. It is built
for ease of use, security, and
efficiency, allowing users to deploy
and manage virtual machines,
containers, and bare-metal
workloads in remote or
resource-constrained environments.

This video explains what MicroCloud
is and its use cases
:
...
On-premise private clouds: Creating
a private cloud for businesses on
their own infrastructure.
____
The BIOS you think you’re using
doesn’t exist anymore
.

____
can c++small code modules be certified if
they can be disassembled into a platform
machine code?

AI Overview

Yes, C++ code modules can be certified
if they are compiled into machine code.
The ability to disassemble the machine code
back into assembly language is a standard
practice for verification and debugging, not
a barrier to certification. Certification would
depend on the specific requirements of the
certification body, which would assess the
security, reliability, and safety of the
code's function regardless of how it was
generated.

Compilation and verification
...
mportant considerations

Decompilation: Disassembly is not the
same as decompilation. Decompilation
aims to reconstruct the original source
code, which is an extremely difficult and
often impossible task due to the loss of
high-level information during compilation.

Verification process: Certification would
involve rigorous testing and analysis of
the compiled module. The fact that it was
originally C++ and can be disassembled
is simply a part of its lifecycle that can
be inspected. GCC Developer Discovers "Our Codebase
Isn't Fully C++20 Ready".

is LLVM is Big Tech trying to dominate
Nanocomputer software.?

how man lines of code in what language
is a llvm? AI Overview The LLVM project,
a collection of modular and reusable
compiler and toolchain technologies,
is primarily written in C++. Regarding
the lines ofZ Zcode, LLVM is a very
large project. While the exact number
fluctuates with ongoing development,
it is generally understood to consist
of millions of lines of code. For
instance, reports from early 2022
indicated the LLVM mono repository
contained over 23.85 million lines of c
ode.

Other sources have estimated the
project to have around 12 million
lines of code across its various
components.

aretoolchains usually written in a linux?

AI Overview

Toolchains are not "written in Linux" in
the sense of being programmed using the
Linux operating system itself as a language.
Instead, toolchains are sets of programming
tools (like compilers, assemblers, linkers,
and debuggers) that are used on a Linux
system to develop software.

Specifically:
...
Therefore, while toolchains are extensively
used on Linux and are crucial for
developing software for Linux, they are not
"written in" the operating system itself.
They are software applications that run
within the Linux environment.


 
____||
Trump Bets Big on a Nuclear Comeback.
Try 1.

Saturday November 15 16:03
___


Why did IBM abandon the PC?

AI Overview

The IBM PC – Communications of the ACM
IBM didn't technically "abandon" the PC market,
but sold its personal computer business to
Lenovo in 2005, citing reasons such as
declining profit margins, the commodity
nature of PCs, and the strategic need
to refocus on core enterprise computing,
software, and services. IBM's initial
success with the open architecture of
the PC was undermined by competitors
who could build compatible systems at
lower costs, leading to a loss of market
share and profitability.

Key factors for IBM's exit.


____
GCC Compiler Developers Begin
Considering C++20 Default
.
____
Future data centers are driving up
forecasts for energy demand.
States want proof they'll get built
.

Datacenters meet resistance over
environmental concerns as AI boom
spreads in Latin America
.
should computer subscription services be
avoided if possible?

AI Overview

Whether to avoid computer subscription services
depends on individual needs, but they should be
considered carefully due to potential
higher long-term costs, data portability issues,
and dependency on the provider.
Alternatives like perpetual licenses or
open-source software can sometimes
be more cost-effective or offer greater
control.

Potential downsides of subscriptions
...
When a subscription might be beneficial
...
Alternatives to subscriptions

Perpetual licenses: A one-time fee grants
you the right to use a specific version of
the software, although you may have to
pay an additional annual fee for support
and updates.

Open-source software: Many powerful
and free alternatives exist for common
computer tasks, such as LibreOffice for
productivity or GIMP for image editing.

Cloud-based services with pay-as-you-go
models: Some services offer more
flexible payment options than a standard
monthly subscription.

Are Software Subscriptions Draining
Your Wallet?
.
____
$30 Billion Wiped Out: Is This Quantum's
Dot-Com Moment?

 
___
Renewables Are Too Cheap to Fail.

Residents voice concern at public
meeting on restarting Duane Arnold plant
.
Try 1

Friday November 17:20
____
Tiny386 On An Espressif ESP32-S3.
____
Oracle bonds sell off as
AI investment fuels investor concerns
.

JPMorgan Says Michael Burry Is
Dead Wrong About AI
.

GPU goliaths are devouring supercomputing –
and legacy storage can't feed the beast
.

Michael Burry Clears The Air On Math
Behind His Palantir Options Bet,
Teases New Move After Shutting
Down Hedge Fund
.
____
5 tasks an ESP32 can handle
better than a Raspberry Pi
.

Stop overspending on laptop storage,
here's the smart alternative
.

Yes, your desktop PC power
consumption does matte
r.

Running A Minecraft Server On A
WiFi Light Bulb
.
____
The ‘Big Short’ investor betting $1 billion against
the AI bubble says Meta and Oracle.’s
accounting is hiding the brutal truth
.

Big Short Investor Exits Wall Street Again —
Is Crypto the Only Trade Left Standing?
.

Nvidia's internal emails reveal a
'fundamental disconnect' with major
software clients
.

The ‘Big Short’ investor betting $1 billion
against the AI bubble says Meta and
Oracle’s accounting is hiding the
brutal truth
.

Applied Materials in charts: United States
revenue declines 43% Y/Y
.

Burry’s Depreciation Gripe Shines
Spotlight on Big Tech Profits
.

Top Analyst Says Oracle's 'Irresponsible'
AI Bet Differs From 'Healthy' Microsoft
And Google Demand: A 'Bad Business'
With 'Very Low Margins'
.

Oracle hit hard in Wall Street’s tech
sell-off over its huge AI bet
.

Oracle: Cloud Momentum And Heavy AI
Investment Turn A 30% Slide Into
Opportunity
.

Google claims win for everyone as
text scammers lost their cloud server
.

Transpiler, a Meaningless Word (2023)
(csail.mit.edu)
.
___
Intel lays off 669 more Oregon workers
as local headcount dwindles
.
 
____
Is NuScale Stock Attractive After Recent
42% Plunge and Funding Uncertainty?
.

Flexible Power Use by US Data Centers
Is Fiction, Report Says
.

Phantom’ data centres muddy forecasts
for US power needs
.

AI Data Centers Need More Power
Right Now. These Companies
Can Deliver It
.
Try2.

Thursday November 13 18:56
____
Dark Clouds Suddenly Gathering Over AI Industry.

Oklo setting the stage for U.S. nuclear buildout,
Wedbush says in backing bullish view
.

AI isn’t a bubble but rather an opportunity,
JPMorgan’s Erdoes says
.

Possible Setback For Linux x86_64 Laptops: Prominent
Developer Joins Qualcomm
.

OpenAI’s new LLM exposes the secrets of how AI really works.
    The experimental model won't compete with the biggest
    and best, but it could tell us why they behave in weird
    ways—and how trustworthy they really are.

ERP carnage continues as orgs jump in unprepared.

AI Overview

ERP stands for Enterprise Resource Planning.

2.4-GW New Jersey offshore wind project canceled
by developer
.

____
Microsoft Fixes 63 Security Flaws, Including a
Windows Kernel Zero-Day Under Active Attack
.

AI Overview

The cost to Microsoft for fixing 63 security flaws
is not a single figure, as it would be spread across
different programs and timeframes. Microsoft has
paid out $63 million in bug bounty rewards to
researchers over the past decade for reporting
vulnerabilities, with the rewards varying based
on the severity of the flaw. While the direct
financial cost of fixing each individual flaw isn't
publicly detailed, some reports suggest that
the high-level cost of fixing vulnerabilities in
the software development lifecycle can be
over $50,000 per vulnerability if not
addressed early.
...
Context: The $63 million in bug bounty
payments is a specific figure for the l
ast decade, not the total cost of fixing all
security flaws. It represents a portion of
the cost, as it only covers the rewards
paid out for vulnerabilities reported
through these programs.

____
Big Short’ investor Michael Burry to
close hedge fund as he warns on valuations
.

could a big tech buggle pop destroy
the us economy?

AI Overview

A big tech or AI bubble burst could
significantly harm the US economy
by wiping out trillions in wealth,
triggering a financial crisis, and
causing widespread investor and
consumer panic. However, the
extent of the damage would
depend on factors like how
much wealth is lost and
whether it triggers a
broader financial crisis similar
to 2008, rather than a more
contained event like the
dot-com bubble
burst, according to
The Conversation. The
impact would be less
severe if the bubble is
isolated to tech stocks
and doesn't topple major
lenders.

Potential impacts of a tech bubble burst
...
Why the impact might be contained
...
Positive long-term impact: Even
after a bust, the tech industry
may still leave behind valuable
infrastructure and technologies
that could boost productivity
in the long run, as seen in the
dot-com bubble,
notes Al Jazeera.

Oracle Slides as OpenAI Controversy, '
Modern Fraud' Claim Weigh on Stock
.

AI-Powered Toys Caught Telling
5-Year-Olds How to Find Knives
and Start Fires With Matches
.

Exowatt wants to power AI data centers
with billions of hot rocks
.

AI Overview

There is an ongoing debate regarding
whether some mainstream media
(MSM) tech writers exhibit bias in
favor of major technology
companies, with concerns often
raised about editorial independence
and the influence of advertising
revenue and access.

Critics suggest the following
factors can contribute to
potential bias:
...
owever, many professional
journalists adhere to strict ethical
codes emphasizing objectivity and
the public interest. Media outlets
often have dedicated opinion
sections or columnists who
provide critical perspectives
that may not align with the
news reporting, and some
seasoned reporters are known
for their critical, watchdog
coverage of the industry.
The consensus view in
the industry is that
maintaining public trust
requires an independent
and unbiased approach.

‘Big Short’ investor Michael Burry to
close hedge fund as he warns on
valuations
.

It's curtains for Michael Burry.

Michael Burry Shutters Hedge Fund
as
Trump’s 50-Year Mortgage
Threatens an $11 Trillion
Housing Collapse – Is Big
Short 2.0 Brewing in Housing,
Not Tech?
.

Michael Burry to shut down
hedge fund, names Phil Clifton
as successor
.

Michael Burry Feels Big Pain on
Nvidia, Palantir: 'It Will Work Out'
.

From the 'Big Short' to the big
mystery: A timeline of Michael
Burry’s bold market plays
.

Microsoft rolls out screen capture
prevention for Teams users
.

____
China's Baidu unveils new AI
processors, supercomputing products
.

There’s No Rust On This Ironclad Kernel.



what is the cost of a new porogramming
language over it's lifetime?

AI Overview

The cost of a new programming language
over its lifetime, or its Total Cost of
Ownership (TCO), is a complex, multi-
million dollar investment that extends
far beyond the initial development.
For large, successful programming
languages with long lifecycles,
maintenance and updates
often cost two to four times the
initial development expense.

Initial Development Costs
...
Lifetime and Operational Costs
...
Factors That Escalate Costs
...
In essence, while the initial cost of
developing a new programming
language is high, the long-term
commitment to its evolution,
maintenance, and support
is the defining financial burden
over its operational life.

Cheap Multimeter Gets Webified.



Tiny386 emulator turns tiny microcontroller into a full i386 PC — tiny virtual machine
can boot Windows 95 and Linux on ESP32-S3 chip'
.

Ubuntu 25.10's Rusty sudo holes quickly welded shut.

Canonical To Now Provide Up To 15 Years
Commercial Support For Ubuntu LTS Releases
.

AI Overview

The cost for up to 15 years of Ubuntu
LTS commercial support varies
depending on the subscription level,
with prices starting at $25 per year
for a desktop (self-support) or $500
per year for a server (self-support).
For full 24/7 support, it costs $300
per year for workstations and
$3,400 per year for servers, which
includes unlimited virtual machines.
An additional five-year "Legacy
Support" add-on is available to
extend support beyond the
standard 10 years, extending
the total to 15 years.

Ubuntu Pro pricing
...
Legacy Support: To extend to
15 years, a "Legacy Support"
add-on is available after the
10-year Ubuntu Pro period ends.

5 Linux distributions that look
as gorgeous as macOS
.

____
Another Major Tech Company Just
Announced Thousands of Layoffs
. [Synopsys?]

Bloomberg.com Michael Burry’s Scion Hedge
Fund Deregistered, SEC Filing Shows
.

'Big Short' investor Michael Burry deregisters
his hedge fund, saying he's moving on
to 'much better things'
.

The seven deadly sins of corporate exuberance.

The Big Short's Big Bet.

Here are the major Windows bugs resolved
in the latest Patch Tuesday updates
.

OpenAI slams court order that lets NYT
read 20 million complete user chats.
____
AI Overview

Yes, the IBM System/360 family and its
operating systems, including OS/360,
fundamentally established the modern
concept and "mentality" of the
mainframe computer. Before the
System/360, businesses and
scientific users required different,
incompatible computers and custom
software for each specific task. The
System/360 changed this by
introducing a standardized
architecture across an entire
product line, from small to large.

This innovation initiated the
"mainframe mentality" by:
...
In essence, the System/360
created the idea of a stable,
powerful, and backward-
compatible computing
platform that could serve
as the central nervous system
for large organizations'
data processing needs.
[Reapping thans to Google Chrome History.]
 
____
The People’s Solar: How Plug-In Solar Could Bring
Affordable Energy To 60 Million Americans
.

Are wind power generators a viable resource
at home? My honest truth after months of testing
.

The Remarkable Rise of Natural Gas.

Trump Adds Coal To Critical Minerals List.



Job losses loom at GE Vernova unit: ‘wind
blade market isn't what it was'
.
Try 4.

Wednesday November 12 13:53
____
IBM Delivers New Quantum Processors,
Software, and Algorithm Breakthroughs
on Path to Advantage and Fault Tolerance
.


where can i view the isa for the new
IBM Quantum Processors?

AI Overview

The Instruction Set Architecture (ISA) for IBM
Quantum Processors is not a single, fixed, publicly
released manual in the way classical computer ISAs
are. Instead, the specific instructions (known as
basis gates) and connectivity maps for each
individual processor are accessible in real-time
through the IBM Quantum Platform and the
Qiskit SDK.

Here is how you can access this information:

Germany launches ‘Otus’ supercomputer with
42,000 cores and carbon-free design
.

AI Overview

Otus does not run on an operating system
like a desktop application; rather, it is a
cloud-based Learning Management System
(LMS) that can be accessed through a web
browser on any device with an internet
connection. Users, such as students,
teachers, and administrators, can use
various operating systems like Windows,
macOS, iOS, or Android to access Otus
via their preferred browser or a mobile
app.

Cloud-based platform:

Michael Burry Scared Me,' Says 25-Year-Old
Who Bought Nvidia Dip For $101—'SOLD IT
ALL!!' Over AI Bubble Fears, Now Sitting
On Cash Awaiting Crash
.

Microsoft Stock To Drop 30%?.

____
Silicon Valley data centers totalling nearly
100MW could 'sit empty for years' due
to lack of power. — huge installations
are idle because Santa Clara can't
cope with surging electricity demands
.

Meta breaks ground on $1B AI data center
in Wisconsin utilizing dry-cooling
technology
.

Anthropic, Microsoft announce new
AI data center projects as industry's
construction push continues
.

____
Problems with C++ exceptions
(marler8997.github.io)
.


 ____
NuScale: Why TVA/ENTRA1 Matters
More Than Q3 EPS Miss
.
Try 3.

Tuesday November 11 16:00
____
were arsenic miners at risK?

AI Overview

Yes, arsenic miners were at significant risk,
facing health problems like lung cancer and
other illnesses from inhaling arsenic-containing
dust and coming into contact with arsenic
through the skin. Historical studies of miners
have shown a substantial increase in
respiratory cancer deaths, even with
relatively short exposure times.

Health risks for arsenic miners.

were uranium miners at risK?

AI Overview

Yes, uranium miners were at a high risk
due to exposure to radioactive particles
from poor ventilation in mines, which
significantly increased their risk of
developing lung cancer and other
diseases like pulmonary fibrosis,
silicosis, and cardiovascular issues.
Studies found that uranium miners
experienced much higher death rates
from lung cancer than the general
population, and despite early
warnings about the dangers, safety
measures were often inadequate.

Health risks.

New mexico experiences with uranium mining?

AI Overview New

Mexico's experience with uranium mining has been
overwhelmingly negative, leaving a legacy of
severe environmental contamination and
chronic health problems, particularly within
the Navajo Nation and the Grants Mineral
Belt area. The industry boomed during the
Cold War with little regulation, and companies
largely abandoned sites when the market
collapsed, leaving cleanup responsibilities to
the state and federal government.

Key Impacts and Experiences.
...
Current Status
Active uranium mining stopped in
New Mexico in 1998, and the
Navajo Nation banned all uranium
mining and processing on its lands
in 2005. Decades later, federal and
tribal agencies are still engaged in
extensive, costly cleanup efforts,
with the EPA overseeing the
remediation of many sites.
However, the toxic legacy is
expected to continue for
generations, and there is still
ongoing advocacy by groups
like the Eastern Navajo Diné
Against Uranium Mining and Diné
Citizens Against Ruining our
Environment (Diné CARE) to
address the lasting impacts and
prevent any potential future
mining operations.



____
‘Big Short’ investor Michael Burry accuses
AI hyperscalers of artificially boosting earnings
.
____
does software certification require extreme
temperatures testing for all hardware chips platforms?

AI Overview

No, software certification does not universally
require extreme temperature testing for all
hardware chip platforms. The necessity and
range of temperature testing depend
heavily on the intended application,
industry standards, and the required
reliability/safety level of the final product.

Key Factors Determining Temperature
Testing Requirements
.
...
In conclusion, while temperature testing
is a vital part of hardware validation,
it is not a "one-size-fits-all" requirement
for all software certifications and
hardware platforms. The required
testing is specific to the product's
environmental and safety demands.

____
Big Short’ investor Michael Burry accuses
AI hyperscalers of artificially boosting earnings
.

OpenAI Will Lose $74 Billion the Same Year That
Anthropic Breaks Even: Report
.

AMD expects data center chip market
to grow to $1 trillion by 2030
.

The Next AI Winner Isn't Big Tech,
It's Energy
.

Microsoft: Subdued Earnings Reaction
Clouds The Valuation Outlook
.
___
I tried Arduino's first Raspberry Pi competitor
and it's wonderfully weird
.
____
did unix inventor have mainframe mentality?.

AI Overview

No, the Unix inventors did not have a
mainframe mentality; in fact, they
developed Unix in reaction to the
complexity and perceived failures of a
large-scale, comprehensive mainframe
operating system project called
Multics. The Unix philosophy
fundamentally contrasts with
the typical monolithic mainframe
design approach.

Key differences in their approach:

Simplicity vs. Complexity:
...
In essence, Unix was a "leaner" and
more pragmatic approach to
computing, promoting flexibility
and composability, which was
a radical departure from the
prevailing mainframe mentality
of the time.

Moving From Windows To FreeBSD
As The Linux Chaos Alternative
.



____
This Tiny Lenovo Box Brings
Supercomputer Power to Your Desk
.

I stopped overcomplicating
my storage setup
.
____
ClickFix may be the biggest s
ecurity threat
.

Michael Burry accuses tech giants of inflating
profits by stretching asset lifespans
.

The AI Bubble Is Ignoring Michael Burry’s Fears.

Frustrated ex-Microsoft engineer
explains why Windows sucks
.

Microsoft plans to invest $10 billion
in Portuguese AI data hub
.

Once-hot cloud AI play CoreWeave
is tanking. A JPMorgan downgrade
is adding to the pressure
.
____
what is the length of the x86 displacement in bits?

AI Overview

The length of an x86 displacement can be
8, 16, 32, or 64 bits, depending on the
addressing mode, processor mode, and
instruction. Most commonly, it is 8, 16,
or 32 bits for 32-bit mode, while 64-bit
mode often uses RIP-relative addressing
with a 32-bit displacement, though
64-bit displacements are possible for c
ertain instructions.

Common displacement lengths

8-bit: The shortest and fastest
displacement, used for small
offsets (\(-128\) to \(+127\)).

16-bit: A common displacement l
ength, especially in

16-bit and 32-bit modes.

32-bit: The default displacement
length in

32-bit protected mode and a
common length in x86-64 for
relative jumps and memory
addressing (RIP-relative).

64-bit: Possible in x86-64 for
certain instructions, though
less common in practice for
jumps and calls compared to
the 32-bit relative displacement. 

Factors influencing displacement length

Processor Mode: The processor mode
(16-bit, 32-bit, or 64-bit) determines
the default size of addresses and
displacements.

Addressing Mode: Different
addressing modes allow for
different displacement sizes.

Addressing Mode: Different
addressing modes allow for
different displacement sizes.

Code Model: In x86-64, the "
Small," "Medium," and "Large"
code models affect how
displacements are handled.


 ____
Oklo gets DOE approval for nuclear safety
design of Aurora Fuel facility
.

Is your electric bill spiking? The Ohio battle
over who pays for data center power demands
.

AI power use forecast finds the
industry far off track to net zero
.

China’s Green Energy ‘Revolution’ Is
Powered by Coal
.
Try 1


why did new mexico pueblo indians fear the apaches?

AI Overview

Pueblo peoples feared the Apaches due to cent
uries of conflict driven by resource
competition, which included frequent
Apache raids for food, livestock, and other
goods. These raids were made more
severe by factors like droughts, which
caused famine, and the Apache's superior
raiding and survival tactics. This
history of conflict meant that the
Pueblo people fortified their villages
and lived in fear of attacks, a fear
that was sometimes shared by the
Spanish colonists.

Resource competition:

Monday November 10 16:09
____
How to bluff your way to AI credibility
with the right buzzwords?
.

Meta’s AI Ambitions Appear to
Be in a Tailspin
.

Michael Burry warns of $176 billion depreciation
understatement by tech giants
.

Dominion says largest US
offshore wind project on track
.

India’s Clean Power Push Nears
One-Third of Total Generation
.

____
“AI, Make Me A Degree Certificate”.

____
what is a software maintenabce ptogrammeer?

AI Overview

A software maintenance program is a
structured approach to modifying,
updating, and enhancing a software
application after it has been launched
to ensure it remains functional,
reliable, and relevant. This involves
a range of activities, including fixing
bugs, improving performance,
adapting to new environments,
and adding new features to meet
user needs and evolving business
demands.

Key components of a software
maintenance program

Correction: Fixing errors or bugs
discovered after the software is
in use to correct faults.

daptation: Modifying the
software to work with new
or changed hardware, operating
systems, or other external
software environments.
Enhancement: Improving
the software's performance,
maintainability, or overall
functionality beyond its
original specifications.

Support: Providing ongoing
user support, training, and
documentation to help
users effectively use the
software.

Support: Providing ongoing
user support, training, and
documentation to help users
effectively use the software.


Why a software maintenance
program is essential:

Extends software lifespan:
Regular updates help keep the
software functional and useful
for a longer.

Ensures security:
Addressing bugs and
vulnerabilities is crucial for
protecting the system and
user data from threats.

mproves user satisfaction:
Keeping up with user needs
and market changes ensures
the software remains
relevant and competitive.

Reduces long-term costs:
It is often more cost-effective
to maintain an existing
system than to develop
a completely new one.

AI Overview

Tim Paterson's primary contribution to
MS-DOS was that he was the original
author and developer of the operating
system that Microsoft would
purchase and rebrand.

Key details of his contribution include:

Creation of 86-DOS: While working
as a programmer for Seattle
Computer Products (SCP) in 1980,
Paterson developed an operating
system for their Intel 8086-based
computer kit because a 16-bit version
of the popular CP/M operating system
was not yet available from Digital
Research. This system was initially
called QDOS (Quick and Dirty
Operating System) and later
renamed 86-DOS.

CP/M Emulation: Paterson modeled
86-DOS after the API (Application
Programming Interface) and
command structure of CP/M to allow
for easy porting of existing software,
but it was an original implementation.
Notable differences included an impro
ved disk structure using the FAT file
system and safer disk-writing logic.

Sale to Microsoft: Microsoft, needing
an operating system for IBM's new
personal computer, secured the rights
to 86-DOS in December 1980 and
then purchased all rights in July 1981
for a total of $75,000.

Porting for the IBM PC: Paterson
was hired by Microsoft in May 1981
to port 86-DOS to the IBM PC
hardware, which used the Intel 8088
processor. He worked closely with
IBM engineers on the project, and
the final result was licensed to IBM
as PC DOS 1.0 and sold to other
vendors as MS-DOS.


when was multitasking first
incorporated into ms-dos?

AI Overview

Multitasking was first incorporated
into MS-DOS with the multitasking
version of MS-DOS 4.0, which was
released in 1985. However, this
version was an internal project and
only released to a few OEMs. The
more widely known and released
MS-DOS 4.0, released in 1988,
was a single-tasking system.

Multitasking MS-DOS 4.0: This
was the first version to include
multitasking, with a preemptive
priority scheduler, which was
developed in 1985 but
remained an internal project
and was not widely released.

MS-DOS 4.0 (1988): The version
of
MS-DOS 4.0 that most
users were familiar with
was a single-tasking
system released in 1988.

____
The AI revolution has a power problem.

s nucler going to solve the ai power problem?

AI Overview

Nuclear power is seen as a major potential
solution for AI's massive energy demands,
particularly through the development of
next-generation reactors like small modular
reactors (SMRs), which offer a steady,
carbon-free electricity source. While
nuclear provides a reliable energy solution
that doesn't depend on weather,
significant challenges like high costs,
long construction times, and waste
disposal need to be addressed for
it to fully solve the problem.
Therefore, while nuclear is a key part
of the solution, it is not the only
one and faces significant hurdles.

Nuclear's role in solving AI's power problem
...
In conclusion, nuclear energy has the
potential to solve a significant portion
of the AI power problem due to its
consistent, carbon-free energy output.
However, it is not a "magic bullet"
and will need to overcome significant
challenges related to cost, waste, and
regulatory approval to become a
dominant solution.

A new project aims to predict how
quickly AI will progress
.

Google, the sleeping AI giant, awakens.


TSMC Posts Slowest Growth in 18 Months
Amid AI Bubble Debate
.
____
An Unnecessary (But Cool) Processor.

The Manuscripts of Edsger W. Dijkstra (utexas.edu).
 
____
The Rise Of Perovskite Solar Cells, The Fall Of Fossil Fuels.

Why NuScale Power (SMR) Is Down 32.4%
After Q3 Miss, Equity Offering and TVA Deployment Deal
.

Millions of bats are being killed by wind turbines,
but smart sensors could help protect them
.

Shell abandons floating North Sea
wind farm projects
.

New study reveals that solar panels are
preventing premature deaths across the
US: 'Their broader societal benefits
are underexplored'
.
'Try 1.

Sunday November 9 16:37
____
Study identifies weaknesses in how AI systems are evaluated.
____

William Payne · 45m

Sunday November 9 16:44

____

Legal and maintenance liabilities along with
software complexity measured by number
of lines of code and failure to require
certified software will drive most
companies involved in software
into bankruptcies?

Mainframe mentality/Big Tech software technologies to blame?

why is high-level software disassembly important for
software certification and portability?

AI Overview
High-level software disassembly is important for
software certification and portability because it

...
____
Seattle job market is past its ‘golden age’
for tech workers
.

The biggest backup mistake everybody
makes, and how to avoid it
.

AI Overview

Several companies offer "data center in a box"
solutions, which are typically portable, modular,
and self-contained units for rapid deployment
in various environments, often used for edge
computing or quick expansion of existing
infrastructure.

Key companies working on these solutions include:
____
what roles does linux play in llvm implementation?

AI Overview

Linux primarily serves as both a host platform
for LLVM development and deployment and a
target environment for code generated by the LLVM
toolchain, including the Linux kernel itself.

Key roles include:

Hosting the LLVM Toolchain: Linux
distributions provide packages (e.g., the
LLVM Toolset in Red Hat Enterprise Linux)
that allow developers to use the full suite
of LLVM tools, including the Clang compiler,
LLDB debugger, and LLD linker, for
developing applications that run on Linux.

Compilation Target: The LLVM backend
can generate machine code for numerous
CPU architectures (x86, ARM, PowerPC,
etc.) that the Linux kernel runs on,
enabling the creation of Linux-compatible binaries.

Hosting the LLVM Toolchain: Linux
distributions provide packages (e.g., the
LLVM Toolset in Red Hat Enterprise Linux)
that allow developers to use the full suite
of LLVM tools, including the Clang compiler,
LLDB debugger, and LLD linker, for
developing applications that run on Linux.

Compilation Target: The LLVM backend
can generate machine code for numerous
CPU architectures (x86, ARM, PowerPC,
etc.) that the Linux kernel runs on,
enabling the creation of Linux-compatible
binaries.

Linux Kernel Compilation: LLVM/Clang
is now capable of producing production-ready
Linux kernels, offering an alternative to the
traditional GCC compiler. This allows kernel
developers to leverage LLVM's specific code
analysis tools (like clang-tidy and
clang-analyzer) and optimizations
(like Link Time Optimization, LTO).

Operating System Features: The
LLVM runtime environment and tools
rely on fundamental Linux kernel
features for managing hardware
resources like CPU, memory, and
I/O devices, and for basic OS
services like file system access
and process management.

Unix/Linux utilities such as ar, ranlib,
sh, and grep, facilitating seamless
use within the existing Linux build
environments.

Platform for Research and
Optimization: The open nature
of Linux and LLVM makes them a
common platform for research into
new compiler technologies, such as
optimizing the Linux kernel with tools
like LLVM BOLT (a post-link optimizer).
____
Stop paying for cloud stora.
ge every month —
own 100TB for life instead
.

After testing this NAS device, Ugreen
might have cornered the market for
personal cloud services with the
NASync DH2300
.

Internxt Reduces 10TB Encrypted
Storage Price by 90%
.


____
Energy company serving 38 states
files Chapter 11 bankruptcy
. [the compamy?]

which electric company serving
38 states filed for bankruptcy?

AI Overview

The energy company that recently filed
for Chapter 11 bankruptcy and has
operations in 38 states is Pine Gate
Renewables. The company is a
solar power generator and
renewable energy developer
based in North Carolina.

Pine Gate Renewables filed for
bankruptcy protection on
November 6, 2025, in Texas.
The company cited regulatory
and policy shifts, including changes
to federal tax credits for solar
and wind power, and reduced
investor interest, as reasons
for its financial strain.

Despite the bankruptcy filing,
Pine Gate Renewables intends
to continue its operations and
pursue a sales process for its
assets and development pipeline.
The company listed its assets
and liabilities in the range of
$1 billion to $10 billion.


Europe's LNG Demand Surge
Flips Global Gas Market
.
Try 1.

Saturiday November 8 13:45


Directory switch 11/08/25 https://www.prosefights2.org/irp2026/windscammers29.htm.

__
Big Tech needs a staggering $1.5 trillion to fund the
AI boom. This is the complex playbook it’s using to get it
.

Tech Workers Are in Deep, Deep Trouble.

OpenAI asked Trump administration to expand
Chips Act tax credit to cover data centers
.
____
Microsoft's lack of quality control is out of control.



why is high-level software disassembly important
for software certification and portability?


AI Overview

High-level software disassembly is important for
software certification and portability because it

allows engineers to verify the software's actual
behavior against its requirements and to adapt
the software for different environments without
access to the original source code.

Importance for Software Certification

Software certification for safety-critical

systems (e.g., as in the avionics standard
DO-178C or automotive standard
ISO 26262) requires rigorous verification
and validation processes. High-level
disassembly provides a representation
that is crucial for:

Verification and Validation (V&V): It enables
detailed static and dynamic analysis of the
executable code to ensure it meets all
safety and functional requirements. This
is particularly important

Ensuring Traceability: Certification standards
demand a clear, documented link
(traceability) between high-level
requirements, design, code, and test
cases. High-level disassembly
helps establish this traceability by
converting machine code into a more
understandable form, allowing
engineers to follow the program's
logic and data flow to its source
requirements.

Independent Review and Auditing:
An understandable, high-level
disassembled representation allows
for independent code reviews and
audits by certification authorities
(like the FAA or EASA) to confirm
compliance with rigorous safety
standards.

Malware Analysis and Security
Vetting: In some cases,
disassembly is used to analyze
third-party or legacy binaries
for vulnerabilities or malicious
behavior, which is a key part
of security certification
processes.

Gap Analysis: It helps identify any
deviations between the compiled
binary and the intended high-level
design or source code, which might
be introduced by complex compiler
optimizations or undocumented
behavior.

Importance for Software Portability

Portability refers to the ease with
which software can be adapted
to run on different hardware
platforms or operating systems.
High-level disassembly aids this
process by:


Understanding Undocumented
Functionality: For legacy
software where source code or
documentation is missing, high-level
disassembly enables engineers to
understand the software's internal
workings, algorithms, and data
formats.

Platform Migration and Adaptation:
By understanding the program logic
from the disassembled code,
developers can re-implement or
adapt the software's functionality
for a new target platform. This
helps in modernizing systems
without rebuilding from scratch.

Identifying Dependencies:
Disassembly helps in extracting
information like library calls and
system interactions, which is
vital for identifying platform-
specific dependencies that
might hinder portability.

Optimizing for New Architectures:
Analyzing the disassembled
code can reveal performance
bottlenecks or architectural
assumptions of the original
system, allowing developers
to optimize the software for
the new environment.
____
Sam Altman backs away from OpenAI's statements
about possible U.S. gov't AI industry bailouts —
company continues to lobby for financial support
from the industry
.
.

____
Couple loses $180,000 from retirement
savings after accounts hacked
.

Norway’s $2.1 Trillion Oil Fund
Seeks Renewables Deals in U.S
.

Op-Ed: Japan’s Offshore Wind Dream Hits
a Wall — Can Industry Reform Save It?
.
Try 1.

Friday November 7 17:58 
____
Solar-powered PV PI HAT delivers continuous
off-grid operation for Raspberry Pi projects
.

Solar-powered PV PI HAT delivers continuous off-grid operation for Raspberry Pi projects
____
Amazon takes low-cost e-commerce
service global
.

LLMs Add Safety Risks To Physical AI.



whiich bif tecompanies use low-level virtual machine [llvm] technology?

AI Overview

Major companies that use LLVM technology include Apple,
Google, NVIDIA, Qualcomm, and Intel. These companies
leverage the LLVM compiler infrastructure for various
products and development tools, such as Apple's macOS
and iOS, NVIDIA's CUDA compiler, and Intel's C++ compiler.
Other companies like AMD and Sony also use LLVM for their
own products, like Sony's PlayStation 4 SDK and
AMD's C/C++ compiler.
____
Hundreds of thousands of tech workers
are in trouble, new report shows
.

You should write an agent (fly.io).

Sam Altman says OpenAI has $20B ARR and
about $1.4 trillion in data center commitments
.

Rideshare giant moves 200 Macs
out of the cloud, saves $2.4 million
.
____
x86 adc and rcl instructions cause what performance
decrement compared to x86 processors?

AI Overview

On modern x86 processors, the performance
decrement associated with the ADC and RCL i
nstructions is primarily due to the serial
dependency chain they create through the
single, shared Carry Flag (CF), which limits
the CPU's ability to use out-of-order execution.
This makes them less efficient for large,
parallelizable operations compared to other
methods.

ADC (Add with Carry)
...
RCL (Rotate through Carry Left)
...
In summary, the performance "decrement"
is relative to the potential parallelism of
modern x86 processors. While
the instructions themselves may have
a low latency, the dependency on a
single, shared flag forces serial
execution, which can be a bottleneck in
code that could otherwise run in parallel.



where can i find a working example of RCL (Rotate through Carry Left) for a
risc-v platforms witten in gcc c with disassembly?


AI Overview The

RISC-V instruction set does not have a single, dedicated
instruction for "rotate through carry" (RCL) like some
other architectures (e.g., x86). The carry flag is not
an implicitly accessed part of the general instruction set
in the same way. The operation must be implemented i
n C using standard bitwise operations, and the compiler
will generate the necessary sequence of RISC-V
instructions.

Here is a C function that implements a single-byte
(8-bit) rotate through carry left, along with the
expected RISC-V assembly output (using GCC and
a typical RV32I or RV64I target). C Code
Implementation


...
GCC C with Disassembly Example



____
Plug-In Solar Power Could Be Coming to
a Balcony Near You
.

Blade breaks off wind turbine, falls into Mass.
Try 1.

Thursday November 6 19:11
____
What the last gas boom (and bust) says
about today’s rush to build
.

Microsoft's $392 Billion Cloud Backlog
Could Be a Hidden Goldmine
.

What should countries do with their
nuclear waste?
.

Challenger job-cut report sparks
selloff amid absence of government data
.

How Energy Providers Can Capitalize
on Data Center Growth
.
____
AI Overview

To find a working RISC-V simple C program using
the GCC C compiler with disassembly, follow
these steps: Install the RISC-V GNU
Toolchain. This toolchain includes the
GCC compiler for RISC-V, objdump for
disassembly, and other essential tools.
You can either compile it from source
or use pre-built binaries if available for
your operating system.""

Ciode:
____
Amazon down for thousands of users in the US.
_
Countdown To Pi 1 Loss Of Support,
Activated
.

Why is Software Support Such a Big Issue in
the Computer Industries? Software support
is a critical issue in the computer industry
due to its direct impact on business
operations and customer trust.
Neglecting software support can lead to
operational failures, operational
disruptions, and financial losses. For
instance, British Airways experienced a
major computer system failure due to
inadequate maintenance, which resulted
in system downtime and financial penalties.
Similarly, the WannaCry ransomware
attack highlighted the importance of
regular software updates and security
patches to prevent cyberattacks.
Inconsistent IT support can also lead
to major IT failures, security risks,
and lost productivity. Therefore,
prioritizing software support is
essential for maintaining a secure
and competitive environment in
the digital age.
____
where can i find a working example of single
byte add with carry for a risc-v processor
written in high-level c using the gcc compiler?

AI Overview

A direct single-byte add-with-carry instruction
is not explicitly present in the base RISC-V
instruction set architecture (ISA). Unlike some
other architectures, RISC-V handles carry
flags more implicitly through the use of
specific instructions and careful programming.

However, you can achieve the equivalent
functionality of a single-byte add with carry
in high-level C using the GCC compiler for
RISC-V by simulating the carry behavior.

Here is a working example:




Explanation:

add_with_carry function: This function
takes two 8-bit unsigned integers (a,
b) and a pointer to an 8-bit unsigned i
nteger (carry_inout) which serves as
both the input carry and the output carry.

uint16_t sum = (uint16_t)a + b +
*carry_inout;: The addition is
performed using uint16_t to
ensure that any carry generated
during the sum of a, b, and the
carry_inout is captured.

return (uint8_t)sum;: The
function returns the lower
8 bits of the sum, effectively
giving the result of the single-byte
addition.

This approach effectively
simulates the behavior of an "add
with carry" operation in C, which
GCC will then compile into the
appropriate RISC-V instructions
(likely involving standard add
instructions and conditional
branches to manage the carry).

____
Will quantum be bigger than AI?.

Meta is earning a fortune on a deluge of
fraudulent ads, documents show
.

Microsoft CEO drops blunt truth on AI.

The Big Short Guy Just Bet $1 Billion
That the AI Bubble Pops
.

The 5 FREE Must-Read Books for
Every LLM Engineer
.

IBM’s CEO admits Gen Z’s hiring nightmare is
real—but after promising to hire more. grads,
he’s laying off thousands of workers
.

Anxious about AI job cuts? How white-collar
workers can protect themselves - starting now
.

US layoffs for October surge to two-decade
high, Challenger data shows
.
____
Azure stumbles in Western Europe, Microsoft
blames 'thermal event'Azure stumbles in
Western Europe, Microsoft blames 'thermal event
.'
 ____
Why this little-known metric will decide
the value of future energy resources
.

LNG Freight Rates Surge By 50% As
Europe Races To Refill Inventories
.
.Try 3,

‘Bragawatt++‘Bragawatt


Wednesday November 5 07:28
____
does the x8r RCL do a keft shift with carry
rotated into he lsb position and mub into a carry?

AI Overview

Yes, the x86 RCL (Rotate through Carry Left)
instruction works exactly as described:

It
performs a left shift of all bits in the
destination operand.

The previous
value of the Carry Flag (CF) is rotated
into the least significant bit (LSB)
position of the destination operand.


The most significant bit (MSB) of
the original operand is moved into
the Carry Flag (CF).

This mechanism allows for
multi-word shifts and
rotations by using the Carry
Flag as an extension of the
data being manipulated.

does the risc-v have an instruction
which does the same thing as an
x86 instruction?

AI Overview

No, a single RISC-V instruction does
not do the same thing as a single x86
instruction because the architectures
are fundamentally different: x86 uses
a Complex Instruction Set Computing
(CISC) design with many complex,
multi-byte instructions, while RISC-V
uses a Reduced Instruction Set
Computing (RISC) design with simple,
fixed-length instructions. An x86
instruction that performs a
complex operation (like loading,
operating, and storing) would be
broken down into several simpler,
separate RISC-V instructions (load,
compute, and store).

CISC (x86): One x86 instruction
can perform a complex operation,
such as loading a value from
memory, adding it to a register,
and storing the result back in
memory.

RISC (RISC-V): A similar task
on a RISC-V processor would
require multiple simple
instructions. For example, one
instruction would load the
value from memory,
another would perform
the addition, and a third
would store the result.

Efficiency: While this means
more instructions are
needed, the RISC-V
instructions are simpler,
faster, and can be
overlapped and pipelined
by the processor more
efficiently, according to
Quora.

do ai reponses fvor cisc orver risc?

AI Overview

Cisco heavily uses AI in its products
and solutions, but this is primarily
built on x86 and ARM architectures,
not RISC-V. Cisco does not currently
offer AI-specific products or general
AI responses "over" RISC-V
architecture in any major capacity.

Cisco's AI Strategy and Architecture

RISC-V's Role:
...
In summary, Cisco is a major player in
AI-driven networking and security,
but its hardware architecture for
these solutions is primarily based
on x86 and ARM, not RISC-V.



____
Word Raspian reason for putchse, :)




____
IBM to cut thousands of jobs in fourth
quarter amid software focus
.

ibm 8,00 laid-off employees located
in which countries?

AI Overview

IBM's recent job cuts, often cited around
the figure of 8,000 roles, are part of a
global "workforce rebalancing" strategy
with major impacts in the United States
and a significant shift of roles towards
India and other South-East Asian
countries.

Key locations and details regarding
the layoffs:

United States: A substantial number
of the job cuts have occurred in the
U.S., including specific locations like
Raleigh, North Carolina; New
York;
Dallas, Texas; and California.
Reports have suggested that "
as many as 9,000 U.S. jobs could
be cut or offshored as part of
the restructuring.


India and Southeast Asia: The
layoffs are closely tied to a
strategic move to relocate
jobs to countries with lower
labor costs, such as India
and the Philippines, where
the company is actively hiring.

Europe (in the past): A
separate round of layoffs
in late 2020 targeted around
8,000 staff in Europe, with
significant numbers in the
UK, Ireland, Germany,
France, Italy, Denmark,
Finland, Norway, and
Sweden.

Russia: IBM also wound
down its business in Russia
and laid off several hundred
employees due to the war
in Ukraine and escalating
sanctions.

The recent 8,000 job cuts
are largely focused on
back-office functions,
particularly Human
Resources (HR), with
the company leveraging
AI and automation in
these areas. Despite
the cuts in some divisions,
IBM has emphasized
that it is hiring in higher-growth
areas like software
development, consulting,
and AI services, and that
overall U.S. employment
is expected to remain
largely unchanged
year-over-year.

does ibm use llvm as its primary ai tool?

AI Overview

No, IBM does not use LLVM as its
primary AI tool. IBM's primary AI
platform is called watsonx, a
comprehensive portfolio of AI
products designed for
enterprise-scale AI
development and
deployment. IBM does,
however, incorporate LLVM
into its compiler strategy.

IBM's Use of LLVM
...
In summary, LLVM is a
foundational compiler
technology that helps
optimize software
performance on IBM
hardware, including
for AI workloads,
but the primary AI
development and
deployment platform
offered by IBM is watsonx.



AMD Contributes BFloat16 Support
To LLVM's SPIR-V Target
.
____
I took all my projects off the cloud, saving
thousands of dollars (rameerez.com)
.
 
____
How nuclear waste could fuel
a clean energy revolution
.
Try 1.

Tuesday November 4 14:30
____

where is there a working example of a
single byte add with carry risc-v emulation
using the clang c compiler?

AI Overview

RISC-V's base instruction set does not include
a dedicated "add with carry" (ADC) instruction
like some other architectures (e.g., ARM).
Multi-word addition with carry in RISC-V is
typically implemented by performing a
standard ADD and then checking for an
overflow to determine the carry, which is
then added to the next higher word.

While there isn't a single, universally
recognized "working example" of a
single-byte add with carry emulation
in RISC-V using Clang, the concept
can be demonstrated by implementing
a multi-byte addition in C and compiling i
t with Clang for a RISC-V target.

Here is a conceptual example of
how you might perform a single-
byte add with carry in C, which
would then be compiled by Clang
for a RISC-V target
:

where is there a working example
of a single byte add with carry
risc-v emulation using the clang
c compilerusing inline assembler?
...
This C code snippet demonstrates
the logic, which a compiler like
Clang would then translate into
a series of standard RISC-V
instructions
.

where is there a working example of
a single byte add with carry risc-v
emulation using the gcc c
compilerusing inline assembler?

AI Overview

Finding a complete, working
example of single-byte
add-with-carry RISC-V
emulation using GCC C
inline assembly might
require searching through
specific embedded system
projects or academic
resources, as it's a very
specialized use case.
However, the general approach
involves understanding the
RISC-V instruction set and
how to integrate assembly into
C using GCC's extended inline
assembly. General Approach and

Key Elements:

where is there a working example of
a single byte add with carry risc-v
emulation using the clang c
compilerusing inline assembler
andd disassembler of the code
? :)
...
Pure C Implementation (Recommended
for RISC-V) Since RISC-V has no
condition flags, a pure C
implementation is typically more
efficient and portable, as the
compiler can optimize it into the
most efficient sequence of
non-ADC instructions.




____
Microsoft Stock (NASDAQ:MSFT) Slips as it
Discovers it Has More Chips Than Electricitty
.

IBM'S 8,000 LAYOFFS REVEAL THE HARSH
REALITY OF THE AI REVOLUTION
.

____
Google Cloud suspended customer's account
three times, for three different reasons
.

is the WSJ right "The future is in wafers.
Data centers will be the size of a box,
not vast energy-hogging structures.?

AI Overview

The WSJ's statement, from a recent opinion piece,
argues that the future of computing is shifting to
highly dense and efficient microchips, leading to a
future where data centers may be smaller, but it
is a speculative claim. While technological
advancements are leading to more powerful
chips and the potential for smaller, more
efficient hardware, the massive and growing
demand for data and AI processing suggests
that large, energy-intensive data centers are
likely to remain essential, with a parallel focus
on increasing energy efficiency rather than
a complete shift to smaller physical footprints.

The argument for smaller data centers: The
WSJ article's opinion is based on the idea that
advancements in microchip technology are
creating "hyperscale" computers that are vastly
more powerful and efficient. This means a
large amount of processing can be done
in a much smaller physical space, even a "box".

he counter-argument: Growing demand:
Despite advancements, the total demand
for data storage and processing, especially
driven by AI, is exploding. A report from S&P
Global Ratings forecasts a significant increase
in data center capacity.

Energy efficiency focus: The current trend
is not just about making data centers
smaller but also about making them more
sustainable. This involves using renewable
energy sources and improving cooling
technologies, rather than a complete
replacement of large facilities with
smaller ones.

Complexity of AI: AI requires massive
datasets and processing power. While
chips get more powerful, the sheer scale
of the tasks means that even smaller,
more efficient hardware would still need
to be deployed at a massive scale.

Conclusion: The WSJ's statement is a
provocative opinion on a future possibility,
but it is likely an oversimplification of a
more complex reality. A more probable
future is one where data centers are
both more powerful and more efficient,
possibly utilizing smaller components,
but still requiring significant physical space
to meet the ever-growing demand for
data processing.

AI Overview

The quote, "The future is in wafers. Data
centers will be the size of a box, not
vast energy-hogging structures,"
appeared as part of a Wall Street
Journal (WSJ) Opinion column titled
"The Microchip Era Is About to End,"
authored by George Gilder. Whether
the assertion is "right" is a matter of
expert debate and depends on future
technological adoption, but it reflects
a real, ongoing trend toward increased
integration and efficiency in computing
hardware. Context of the Claim
...
In summary, the WSJ column presents
a bold, forward-looking perspective
rooted in emerging technology. While
the vision of "box-sized" data centers
is technically plausible for certain
applications and aligns with the
need for increased efficiency, it is
not yet the dominant industry standard,
and the timeline for such a widespread
transformation is speculative.

MPLX and MARA to collaborate on
integrated power generation, data
centers in West Texas
.

Analysis-Amazon's $38 billion OpenAI
deal shows it is no longer an AI laggard
.

What are Amazon’s layoffs really about?
    The company cited AI as a reason
    for letting 14,000 corporate workers
    go, but is that the whole story?
____
Web Development In… Pascal?.

____
Energy Transition Stalls 10 Years After Paris Agreement.
Try 2.

Monday November 3 15:41
____
LLMs show a “highly unreliable” capacity
to describe their own internal processes
.

The Microchip Era Is About to End.
    The future is in wafers. Data centers
    will be the size of a box, not vast
    energy-hogging structures.

NextEra aims to restart Iowa nuclear
"plant by early 2029
.

GCC 16 Lands Improved Memmove
Behavior For x86/x86_64 CPUs
.

What OpenAI and other LLMs must do before
building their ad businesses
.

Pi Zero Powers A Little Indoor Rover.

NuScale: Low Return For High Risk.

Windows 11 won't show any ads if
you disable these settings
.

4 ways my self-hosted services
made me more productive
.

do self-hosted services pose a threat to
web hosting companies?

AI Overview

Self-hosted services do not directly pose
a threat to professional web hosting
companies because self-hosting is an
alternative that bypasses the need for
a host entirely for the individual or
company choosing to self-host.
However, self-hosting presents
significant security, reliability, and
maintenance challenges for the user,
making it a niche solution that does
not threaten the overall business
model of professional hosting,
which provides a service many
businesses cannot or choose not
to manage themselves.

How self-hosting is different
from using a web host
.
...
How self-hosting is different from
using a web host.
____
Over 1,00,000 job cuts rattle tech industry in 2025:
Amazon, Meta, Google, Intel lay off thousands of employees
.
____
do the risc-v instruction sets have an
add with carry instruction?

AI Overview

The base RISC-V instruction set architecture
(ISA) does not include a dedicated "add with
carry" instruction like adc found in some other
ISAs (e.g., x86). This is due to RISC-V's design
philosophy of avoiding a dedicated flags register,
which can simplify hardware design and
out-of-order execution.

To implement multi-word arithmetic (like adding
numbers larger than the native register width)
in RISC-V, you need to explicitly calculate and
handle the carry using a sequence of instructions.
This typically involves using a combination of
:

Example of multi-word addition without a
dedicated adc instruction:


example of multi-word addition without a
dedicated adc instruction:

AI Overview

Multi-word addition without a dedicated "add
with carry" (ADC) instruction requires manually
managing the carry flag. This is typically done
by performing a standard addition and then
checking for overflow to determine if a carry
needs to be propagated to the next higher-order
word.

Consider adding two 64-bit numbers using
32-bit registers, where num1_high,
num1_low and num2_high, num2_low
represent the high and low 32-bit words
of the two numbers, and result_high,
result_low store the result.



...
This method effectively replicates the behavior of an
ADC instruction by explicitly checking and
propagating the carry flag through conditional
jumps and increment operations
.


is there an example of risc-v adc using the
clang compiler and llvm?

AI Overview

Examples of using Clang and LLVM to
target RISC-V are available, including
those demonstrating specific instruction
set extensions. While general examples
of compiling C/C++ code for RISC-V
using Clang are common, finding a specific
example demonstrating the use of an
Analog-to-Digital Converter (ADC) from
a hardware perspective, directly within
a C/C++ code snippet compiled by
Clang/LLVM for RISC-V, is less common
and depends heavily on the specific
RISC-V platform and its peripheral
access methods.

General RISC-V Clang/LLVM Usage:
...
This C code would then be compiled
for the RISC-V target using Clang
as shown above. The specific register s
definitions and interaction methods
would be provided in the documentation
or header files for the particular
RISC-V platform being used.

RadeonSI ACO vs. LLVM Backends
For AMD Strix Halo
.
____
is Big Tech msm?

AI Overview "

Big Tech MSM" is a colloquial or critical term
combining "Big Tech" (the largest and most i
nfluential technology companies) with the
acronym "MSM," which stands for "mainstream
media".

The combined term is used to refer to the
perceived alignment, influence, or control
that major technology companies (like
Google, Meta, Apple, Amazon, and
Microsoft) have over traditional,
large-scale media outlets and
the flow of information.

Meaning in Context

Big Tech: Refers to technology giants
such as Alphabet (Google), Amazon,
Apple, Meta (Facebook), and Microsoft,
"known for their immense market
capitalization and influence over
the internet, economy, and society.

MSM (Mainstream Media): Refers
to large, established news
organizations and media networks
(e.g., major television networks,
newspapers) that reach a broad
audience and generally reflect
prevailing currents of thought.

The phrase "Big Tech MSM"
typically appears in political or
social commentary, suggesting
that traditional media outlets
are either influenced by,
controlled by, or work in
concert with Big Tech
companies, particularly
regarding content moderation,
the presentation of news,
and the shaping of public
discourse. This term often
implies a critique of a
perceived concentration of
power in these entities.

Alphabet is increasingly launching
“moonshot” projects as
independent companies
— here’s why
.

Why Chevron Is A Smart Buy Outside
Of Big Tech
.

is chevron largely responsible for
uranium pollution on Navajo lands?

AI Overview

Chevron is a responsible party for
specific instances of uranium p
ollution on Navajo lands, but it
is not largely or solely responsible
for the overall contamination,
which resulted from the activities
of numerous private companies
and the U.S. government over
several decades.

Chevron's Role
...
In summary, while Chevron is a
legally recognized responsible
party for a specific mine site and
is involved in its remediation, the
broader issue of uranium pollution
on Navajo lands is a massive,
multi-faceted problem with many
different companies and federal
agencies bearing responsibility.
____
Snap out of it: Canonical on Flatpak friction,
Core Desktop, and the future of Ubuntu
.

where do Canonical software developers
and maintainers come from?

AI Overview

Canonical software developers and maintainers
come from all over the world, reflecting the
company's global, remote-first work model and
diverse hiring practices. The company employs
staff in over 70 countries, with a team of
over 1,200 colleagues from more than 80
different nationalities. This approach is
supported by remote work, with most
colleagues working from home and
meeting in person a few times a year.

Global presence:
...
Diverse hiring:
...
Team meetings: To foster collaboration,
the company organizes in-person meetings
two to four times a year for teams to align
on strategy.
 ____
Why the World’s Coal
Addiction Won’t End Anytime Soon
.

The era of ‘free’ excess
renewable energy is over
.
Try 1.

Sunday November 2 11:26

____
Oracle’s cloud strategy an increasingly risky bet.
____
Building A DIY Ryzen-Based PC!.
____
Linux Kernel Ported To WebAssembly -
Demo
Lets You Run It In Your Web Browser
.

who Linux Kernel Ported To WebAssembly?

AI Overview

The Linux kernel has been ported to WebAssembly
by open-source developer Joel Severin. This
project, known as WasmLinux, allows the
Linux kernel to run within WASM-capable
web browsers, demonstrating the
potential of WebAssembly for running
operating system components in a web
environment.

This port is a technology
demo and aims to showcase the
possibilities
of running a native Linux kernel
and userland (like BusyBox with
musl libc) directly in WebAssembly,
without relying on emulators for
existing CPU architectures.

Debian's APT Will Soon Begin Requiring Rust:
Debian Ports Need To Adapt Or Be Sunset
.

AI researchers ’embodied’ an LLM into a robot
– and it started channeling Robin William
s.

AMD’s latest Adrenalin driver update drops Windows
10 from release notes, but the company says
support continues
.
 
____
PG&E avoids ‘big bets’ as data center demand softens.

The end of the rip-off economy.
     From finance and medicine to used cars,
     artificial intelligence is radically improving market efficiency
.

Could the internet go offline? Inside the fragile system
holding the modern world together.
Try 3.


Based on a true story, "Letters from Iwo Jima" is
simply one of the most astounding war movies
.

Saturday November 1 14:26
____
Rising energy prices put AI
and data centers in the crosshairs
.

Maryland Leads Multistate Push to Shield
Consumers from New Data Center Costs
.

Michael Burry Issues ‘Bubble’ Warning after
Two-Year Hiatus – Is He Shorting the Market?
.

New Warning As Microsoft Windows Attacks
Confirmed
— No Fix Available.

Another European agency shifts off Big Tech,
as digital sovereignty movement gains steam
.

Charter shares fall after losing more internet
subs than expected, Q3 results miss
.
____
ESP32JTAG – An open-source wireless JTAG
and logic analyzer (Crowdfunding
.
____



can a issue with rufus or balenaetcher be fixed
by a programmer?

AI Overview

Yes, a programmer can fix issues with Rufus or
BalenaEtcher by addressing the underlying code,
as these programs are open-source projects
where developers can contribute fixes. Users
can also resolve issues by using a
programmer-recommended workaround,
such as resetting the USB drive with a
different tool or adjusting the Rufus settings
before flashing with BalenaEtcher.

Programmer-level fixes.____
Big Tech has gone industrial.
____
AI browsers are here, and they're
already being hacked
.
____
is a c++ compiler build using a yacc?

AI Overview

It is possible to use Yacc (or its GNU equivalent,
Bison) as a component in building a C++
compiler, particularly for the parsing phase.
Yacc is a parser generator that takes a
grammar specification and produces a
parser in C or C++. This parser is
responsible for analyzing the token
stream generated by a lexical analyzer
(often created with Lex or Flex) and
determining the hierarchical structure
of the program based on the
language's grammar rules.

However, modern C++ compilers,
such as GCC and Clang, typically
do not rely solely on Yacc or similar
parser generators for their primary
parsing logic. While early versions of
GCC did use a Yacc-based parser,
it was later replaced with a
hand-built recursive descent parser.
Clang also utilizes a hand-built
recursive descent parser. This
shift is primarily due to
considerations like ease of
maintenance, the ability to
generate more meaningful
syntax error messages, and
the complexities of the C++
grammar, which can be
challenging to fully express
and manage with traditional
LALR(1) parser generators
like Yacc.

Therefore, while Yacc can
be a valuable tool for
building parsers for subsets
of C++ or for specific
components within a larger
compiler, it is not the
exclusive or even the
dominant method
employed in the
construction of
full-fledged,
production-grade C++
compilers today.

which is better of usb power 20awg
soild or stranded?

AI Overview

For a 20AWG USB power cable,
stranded wire is generally better
because of its flexibility, which is crucial
for a cable that is likely to be moved
or bent frequently. Stranded wire can
withstand repeated flexing without
breaking, making it more durable
for applications like charging cables,
even though solid wire has slightly
better conductivity for long, static runs.

Stranded wire (Recommended for
most USB cables)
.



 
____
Farmers fight an 'extension cord' for data centers.
Try 1.

Friday October 31 16:51
____
What’s Scarier Than a Haunted House? An AI Data Center.

Oklo Shares Dropped 30% in Just One Week.

Can we talk about the rude installers not asking
for installation locations?
.

Trump's big nuclear reactor push raises
safety concerns
.

I built an encrypted self-hosted file sync tool for
my home, and it's so much better than
a cloud service
.

Anthropic Research Shows How LLMs Perceive Text.

Canonical CEO says no to IPO in
current volatile market
.
____
AMD Windows Driver Changes For RX
5000/6000 Series Won't Impact Linux Users
.
[Certified?]

CISA: High-severity Linux flaw now
exploited by ransomware gangs
.
____
Data storage firms Western Digital,
Seagate soar on AI-driven demand spike
.
[On-premises spike?]
____
does linux 5.17 and 18 use llvm?
AI Overview

Linux kernel versions 5.17 and 5.18 do not use LLVM
by default, but they can be successfully compiled
using the LLVM/Clang toolchain as an alternative
to the traditional GCC compiler.

Key points:

GCC is the default: The GNU C Compiler (GCC) has
long been, and remains, the default and officially
recommended compiler for building the mainline
Linux kernel.

LLVM support is mature and optional: Ongoing
development work through the "ClangBuiltLinux"
project has made it possible to compile the
kernel with Clang/LLVM for several years. LLVM
support in kernels 5.17 and 5.18 was mature,
with distributions like Android and ChromeOS
already using Clang-built kernels at that time.

Explicitly enabled: To use LLVM, users must
explicitly configure the build process by
setting environment variables like LLVM=1
or CC=clang when running make. Linux 5.18
introduced more flexible handling for the LLVM
environment variable, making it easier to
specify LLVM installations outside of the
system's PATH.

Benefits: Using LLVM offers benefits such as
improved link-time optimization (LTO)
support and better security hardening features.

Free software scares normal people (danieldelaney.net).


are llvm ad clang free?

AI Overview

Yes, LLVM and Clang are completely free. They are
released as open-source software under the
permissive Apache License 2.0 with LLVM
Exceptions (prior to version 9.0.0 they used
the University of Illinois/NCSA Open Source
License, which was also a permissive license).

Key aspects of their freeness include:


do an universities teeach llvm and clang?

AI Overview

Yes, several universities incorporate the
LLVM and Clang infrastructure into their
computer science and engineering
curricula, particularly in courses on
compiler design and advanced
systems software.

Examples include:

Cornell University
...

ohns Hopkins University (EP)
...
The University of Illinois at Urbana-Champaign
...
Eötvös Loránd University, Budapest
...
Universities like the University of Utah
...
In these programs, students gain practical
experience by writing compiler passes,
using LLVM's intermediate representation (IR),
and leveraging Clang's front-end capabilities
for static analysis and code generation.
The use of LLVM/Clang in academic
settings is common due to their modular
design and use in both commercial and
research projects.

Microsoft CEO Satya Nadella says Bill Gates
told him his big bet on OpenAI would be a flop: ‘
Yeah, you’re going to burn this billion dollars’
.
____
The AI bubble has reached its ‘fried chicken’ phase.

Another European agency shifts off Big Tech,
as digital sovereignty movement gains steam
Another European agency shifts off Big Tech,
as digital sovereignty movement gains steam
.

Seagate Q3: Build-To-Order Strategy Is Playing Out.
__
Amazon says it didn’t cut 14,000 people because
of money. It cut them because of ‘culture’
.

_


____
We put the best portable power stations to
the test - and these 3 provide the most power
.

The World’s Secret Electricity Superusers Revealed.
Try 2.
 

Thursday October 30 17:48
____
Meta Stock Slides as AI Ambitions
Collide with Soaring Costs
.

Meta to issue bonds worth up to $30 billion.

Yikes! Windows 11 can lock you out of your
files. Here’s how to avoid the nightmare
.

Is Xbox Down? Huge Azure Server Outage
Causes Issues Across Microsoft Services
.

What to do after a layoff.
____

Hello World In C Without Linking In Libraries.




where should those who wish to leave
Big Tech look for work?

AI Overview

Ex-Big Tech employees can apply their skills
in startups, established non-tech companies,
consulting, and government agencies,
depending on their desired work
environment and priorities.

Startups
...
Established non-tech industries
...
Government and public sector
...
Entrepreneurship and contracting
...
Transitioning to non-coding roles



____ Posting issues 10/30/25.
AWS was not down, but the Microsoft outage
made it seem like it was — here’s what went
down yesterday
.

Microsoft seemingly just revealed that
OpenAI lost $11.5B last quarter
.

Microsoft investigating access issues with
M365 Cloud and Office.com
.

A Dormant Nuclear Plant in Iowa Is Poised
to Power Google’s Energy Needs
.

Explosion of data centers causes planning
struggles for Texas power grid
.

Why We Don't Know AI's True Energy Impact.

Why Sodium-Ion Batteries Are
Terrible For Solar Storage
.

Renewable Energy in the USA: Stupid
is as Stupid Does
.
____
Ubuntu Announces Architecture Variants: Ubuntu
25.10 Gets x86_64-v3 Packages
.

5 simple yet ingenious services
every user should self-host
.
____
Tens of thousands of layoffs are being blamed
on AI. What are companies actually getting?
.

Our devices work for Big Tech, not us.

Azure's bad night fuels fresh calls for cloud
diversification in Europe
.

Too Much of a Good Thing: Solar Overloads
Europe’s Electricity System
.
____
What awg wire should be used to connect usb gnd and 5 volts?

AI Overview

For connecting USB 5V and ground, the recommended
AWG depends on the application, with 24 AWG to
28 AWG being common for standard USB cables.
For higher current applications like fast charging
or long distances, thicker wires are better, with
24 AWG for more current or 20 AWG for
even higher currents and minimal voltage drop,
say this Quora post.

For standard connections
...
18 AWG: A good choice for applications that require
more power, such as adding USB ports to a car,
as it offers a good balance of current capacity
and ease of use
.

10 Cent Microcontroller Makes Tracker Music.
____

The AI boom isn't going anywhere.

GOOGL, META, MSFT: Big Tech Fuels AI Boom
with Aggressive Capital Spending
.

Windows 11 Will Start Triggering Proactive
Memory Diagnostics At Reboot To Find
Memory-Related Bugs
.

Amazon Denies That AWS Just Went
Down Again After Mass Layoffa
.

Microsoft Says Azure Recovery Underway
After Major Outage; AWS Says Services
Operating Normally (UPDATED
.


____
The Microsoft Azure Outage Shows the
Harsh Reality of Cloud Failures
.

does ai use cloud computing?

AI Overview

Yes, AI heavily relies on cloud computing to function,
as cloud platforms provide the massive storage and
processing power needed for AI models to be trained
and deployed. This symbiotic relationship allows
organizations to use AI tools for tasks like data
analysis, recommendation engines, and
automation without the need for expensive,
on-premises hardware. Cloud providers offer
services for building, training, and running AI
models, making advanced AI accessible to a
wider range of businesses.

How they work together.


ai use Large Language Models [LLM]?

AI Overview

Yes, AI uses Large Language Models (LLMs)
as a core component, particularly in
applications that involve understanding
and generating human-like text. LLMs are
advanced AI systems trained on vast
amounts of data that enable them to
perform tasks like summarizing text,
translating languages, answering
questions, and creating content.

A type of AI: LLM is a specific type
of artificial intelligence, not separate
from it. It is a deep learning model
built on a neural network architecture,
most commonly a transformer model.

...


are LLMs implement with Low Level virtual
machine [LLVM] software?

AI Overview

Large Language Models (LLMs) are
not implemented with LLVM software
in the sense that LLVM is the
underlying execution environment
for the LLM itself. LLMs are typically
implemented using deep learning
frameworks like PyTorch or
TensorFlow, which then run on
hardware like GPUs.

However, there is a relationship
between LLMs and LLVM,
particularly in the context of
code optimization and understanding:
...
In essence, LLMs are not built on top
of LLVM, but rather, LLVM can be
a target for LLM-driven optimization
and analysis, and LLMs can be
trained to understand and work
with code that is processed
by LLVM.
 
____
Battery Factories Show Trump Can’t
Stop Clean Energy — He Can Only Slow It
.
Try 1.

Wednesday October 29 18:04

____
The Microsoft Azure Outage Shows the
Harsh Reality of Cloud Failures

____
Is AWS down? Live updates as Amazon
disputes outage and users disagree
.

Websites disabled in Microsoft global
outage come back
.

____
AI Overview

Raspberry Pi-approved power supplies like those from
CanaKit output 5.3 volts at no load to compensate
for voltage drop under a full power draw. The slightly
higher open-circuit voltage ensures that the Raspberry
Pi receives a stable 5.0-5.1V, even when drawing high
current through its power cable.

Here is a breakdown of why this is necessary: :)++


____
Amazon Web Services’ US-EAST-1 region in
trouble again, with EC2 and container services impacted
.



Nvidia Stock Rockets after CEO’s Surprise $500B
AI Order Reveal
.

Seagate signals 16% revenue growth target for Q2 2026
while expanding HAMR drive rollout
.



Are sodium-ion batteries finally ready to compete with lithium?.

AWS to bare metal two years later: Answering your
questions about leaving AWS (oneuptime.com)
.


Amazon Invests $11 Billion in New AI Data Hub
to Power AWS and Anthropic
.

Why Do Some Open-Source Apps Get Multiple
Updates Every Day?
.

GM lays off more than 1,700 at
sites in Michigan, Ohio, citing EV challenges
.
____
AMD XDNA Linux Driver Preps For
New Ryzen AI "NPU3A" Revision
.
 ____
Ubuntu’s Kernel Vulnerability Let Attackers Escalate
Privileges and Gain Root Access
.
____
NextEra has ordered major items for Duane
Arnold nuclear restart, CEO tells Reuters
.

Westinghouse is claiming a nuclear
deal would see $80B of new reactors
.

The Exponential Rise of Global Solar Power.
Try 4.

Tuesday October 28 13:36
____
what is yacc?

AI Overview

Yacc, which stands for "Yet Another Compiler Compiler,"
is a tool for generating parsers based on a formal
grammar specification. It takes a grammar and
creates a parser, a component of a compiler, that
can interpret the syntax of a programming language
or other structured input. Yacc typically produces
C or C++ code for the parser, and modern Linux
distributions often use Bison, a compatible
replacement.

How it works.



____
Broadcom: OpenAI Deal Changes Everything -
Custom AI Leader More Compelling (Upgrade)
.



NextEra Energy partners with Google to restart Iowa nuclear plant.

Why AI Breaks Bad.

The Age of Extraction by Tim Wu — an urgent,
pessimistic take on the dominance of big tech






Electricity Demand Soars in U.S. Tech Hubs, but Price Shock Yet to Come.








____
Pentagon moves to fire civilian personnel with ‘speed and conviction’.

____
Intel's revolutionary 54-year-old 4004 chip
was the world's first programmable
microchip — 2,300-transistor
10,000nm processor exposed
.

59 Patches Allow Finally Building Glibc
With LLVM's Clang Compiler
.

how man lines of code in what language is a llvm?

AI Overview

The LLVM project, a collection of modular
and reusable compiler and toolchain
technologies, is primarily written in C++.
Regarding the lines ofZ Zcode, LLVM is a
very large project. While the exact
number fluctuates with ongoing
development, it is generally
understood to consist of millions
of lines of code. For instance,
reports from early 2022 indicated
the LLVM mono repository contained
over 23.85 million lines of code.
Other sources have estimated
the project to have around
12 million lines of code across
its various components.

Making A Virtual Machine Look
Like Real Hardware To Malware
.
____
Amazon lays off thousands of corporate
workers as it spends big on AI
.

AI energy push drives more nuclear restarts.


___
OpenRazer 3.11 Released With Linux Driver
Support For Newer Razer Devices.
[Driver writing and maintenance cost issues?]
.
____
The perfect AWS storm has blown over,
but the climate is only getting worse
.
____

what are the high and low limits for usb voltage?

AI Overview

The low limit for standard USB voltage is between
4.4V and 4.75V, while the high limit is 5.25V.
Newer USB Power Delivery (USB PD)
standards, particularly with a Type-C
connector, can provide much higher
voltages up to 48V for faster charging,
and the initial voltage for a
non-communicating device is 5V
at 1A.

Standard USB voltage.


why do many nanocomputer sbc include a
usb cable with their board?

AI Overview

Many single-board nanocomputers, such
as the Raspberry Pi, include a USB cable
primarily to provide a reliable and
straightforward method for powering
the device. This practice addresses
two key issues: it ensures the user
has a compatible power source and
prevents problems caused by using
inadequate third-party cables.

Why the included USB cable is important

Ensures proper power delivery:
...
Simplifies manufacturing and packaging:
...
Handles advanced power needs (for USB-C):
...
Offers dual functionality:

5 Raspberry Pi tools that turn any NAS i
nto a smart media powerhouse.

____
Oracle Reaches Hyperscaler Heights
With $300 Billion Bet On AI: Analyst
.

IBM Cloud stops signing and seeking new
customers for its VMware service
.

Ask HN: Is AWS down again?.
____
Amazon to Cut 14,000 White-Collar Jobs.

Meta Tells Employees Their Jobs Are
Being Automated
.
 ____
Mitsubishi Power CEO Sees Gas Turbine
Orders Rising 20% in 2025
.

Soaring electricity bills squeeze households
as utilities hike rates
.

$80 billion strategic partnership for U.S. nuclear.

++

China Dives in on the World’s First Wind-Powered Undersea Data Center.
Try 2.

Poster. Hacker Bragawatt