FAA/NTSB
flight control software cover-up remediation
FAA FOIA
lsawsuit - District of Columbia avoidable.
End Monday October 27 14:09 https://prosefights2.org/irp2024/windscammers28.htm.
Start Monday July 7, 2025 08:26:
https://prosefights2.org/irp2023/windscammers27.htm.
7/27/24
Conduct unbecoming navy officer Admiral William H Payne Complaint.
7/19/24
EyeglassWorld reading glasses and and optometrist exam issues.
Unable to update above page. Updated page below.
https://prosefights2.org/irp2023/mvdnow4.htm
1/24/24.Kaneohe Poseiden P8A FOIA.
Vinson F-35C FOIA.
1/10/24.
liaison1. communication or cooperation which facilitates1/8/24.
a close working relationship between people or organizations.FOIA.GOV.12/2/23.
Department of Defense Department of the Navy
202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
policy.a course or principle of action adopted or proposed by a government, party, business, or individual.
11/25/23.bamboozle11/11/23.
fool or cheat (someone).certification11/10/23.
the action or process of providing someone or something with an official document attesting to a status or level of achievement.retaliation
the action of harming someone because they have harmed oneself; revenge.
11/9/23.nemesis11/7/23.
the inescapable agent of someone's or something's downfall.conpersuade (someone) to do or believe something, typically by use of a deception.
10/31/23conned
persuade (someone) to do or believe something, typically by use of a deception.
7/5/23Reprimand: "a rebuke, especially an official one.3/22/23.
Phone numbers issues.1-855-658-2676.3/21/23.
1-888-127-6445478.
Recording 2, 3, 4, 5, 6, 7, 8, 9.Phone message from US government?.3/20/23
Two forms of id?Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil
Good evening, Mr. Payne,
Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:
1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.
2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/
As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term FOIAonline (the correct site should appear as the top hit, and it will contain foiaonline.gov as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.
Regards,
Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer
Christopher.a.julka.civ@us.navy.mil
(703) 697-0031
From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address
Hello Mr Julka,
Alternate email address.
Sunday February 26, 2023 19:07
Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.
3/1/23F-18 Carrier break and landing!.12/25/22
,![]()
12/21/22.The statute of limitations for a FOIA claim is six years. However, a requester may refile their FOIA request to restart the statute of limitations.Feb 21, 201711/24/22.Airbus A220 autopilot warning. Full coverage.9/18/22
FAA wants pilots to be less dependent on computer autopilots.
4/3/22prosefights hacked. Again. :(
6000 lines of code vs 100 60 lines of code missing.
Hacking attempted recovery 4.6.22.
2/5/22.
__________________
5/01/22.
Linus Torvalds reveals the 'true' anniversary of Linux code.9/21/21.
US Navy software FOIA request.9/3/21.
Christopher Julka (703)-697-0031 DONFOIAPublicLiaison@navy.mil.8/24/21.
c/c++ wind turbine software use too?NTSB 8/20/21 phone message.
Tweet.
![]()
4/22/21.4/21/21.
No appeal possted yet. "(
Software tehnology? c/c++?Scary USS Gerald R. Ford - How Powerful is the CVN-78? US Navy's $13 Billion Aircraft Carrier.4/20/21.
Speed display disappear? Software issue?"(where's) my speed my speed"4/18/21.
4/17/21.
Transcript.Where is air speed?4/1921.4/16/21.
Rapid Descent and Crash into Water Atlas Air Inc. Flight 3591 Boeing 767-375BCF, N1217A.NTSB Ms Tamara Crawford phone conversation 4/16.4/1421.
We are Legion.
We do not forgive.
We do not forget.
Expect us.4/13/21. 'view' oly appeared starting today?
4/12/21.What computers? How many modules? Lines of code for each module?4/11/21
Tamara Crawford audio 4/9/21.
https://data.ntsb.gov/Docket?ProjectID=99013
4/19/21.4/10/21.
Poster attended book signing at Page One i Albuquerque.
Sunday, January 07, 2001 5:52 PM
Dear Friend,
we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.
With thanks
On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/
Wednesday, January 17, 2001 7:10 PM
Dear Friend,
A stand for Ahmad but why this question?
Iran Danesjoo Information Committee project reports. [1, 2 , 3].Swiss Radio International link fixed with irp2014 switch from malwarebytes.Admiral fornmer Navy Seal.
Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Another request?
Phone message attachment.
3/23/21.LIGHTWEIGHT OS FOR ANY PLATFORM.
3/20/21.
3/22/21 Attachments.
1
1
1
1
2/4/21.12/30/20.12/25/20.
R44jPT22f3d12/22/20. :( !!!
J210*9t765r^
12/22/20. :( !!12/21/20. :( !
J210*9t765r^
12/17/20. :(
12/16/20. Something wrong?12/15/10
12/14/20.
12/10/20.
12/8/20.
Tuesday December 8, 2020 14:43
http://www.prosefights.org/irp2020/windscammers13.htm#ntsbbryson
Hello Ms. Bryson,
This is an appeal of FOIA No. FOIA-2020-00406 denial.
Ms. Melba Moye wrote on September 14, 2020
appears inapplicable for denial because FOIA requested DATAFinal 3 minutes of Atlas Air #3591 Boeing 767:from
1 Names of all software modules executed.
2 Time of execution. Nanosecond accuracy, if possible.
3 Altitude of #3591 at time software module entered.NTSB chairman Sumwalt, Friday June 12, 2020 10:32.Ms. Moye's denial reason is unsupported.
Ms. Moye/Ms. Joy Gordon make legal attempt to deny my FOIAThese legal arguments should be addressed to a judge/jury in event I am unable to receive requested documents by
administrative means?
Since no legitimate reason for denial provided by Ms. Moye and Ms. Gordon exist, I ask that you grant appeal.
And have NTSB deliver requested documents.
Regards,
william harris payne.10/26/20 FAA FOIA lawsuit - District of Columbia..
12/9/20.
____https://dms.ntsb.gov/pubdms/.
https://www.ntsb.gov/_layouts/ntsb.aviation/index.aspx.
NTSB
AttN: Ms Sharon Bryson
Manager Director
490 L'Enfant Plaza SW
Washington, D.C. 20594
Chaff?
Boeing 787: A Financial Engineering Nightmare?.10/6/20.
____10/5/20.
Boeing 737 MAX: Turning A Crisis Into A Win.
Programming languages: Java founder James Gosling reveals more on Java and Android.
Liberal arts 'educated'?Linux 5 day course in focus because of 737 MAX and Raspberry Pi 4B.10/4/20
https://forums.linuxmint.com/viewtopic.php?t=294209
Programming languages: Java founder James Gosling reveals more on Java and Android.10/1/20.
Back again after deletion.
"Back in the early 1990s it was well understood that the number one source of security
vulnerabilities was just pointers, was just bugs, like 50% to 60% to 70% were bugs and the
vast majority of them were like buffer overflows.
Liam Tung.
why java michael barr.
At that stage, C an C++"absolutely owned the universe" and everything was being written in those languages.
The statistics in this article have been a part of software engineering for decades.
Back in 1990, they were a major pain point, and a major motivator behind many of the features
of Java.
James Gosling.
9/18/20.Unable to shrink email.9/14/20
:( ++
9/11/20
ntsb foia status message.8/11/20.
8 rings.____
Boeing 747s still get critical updates via floppy disks.
Which OSs support floppies?
This surprise Linux malware warning shows that hackers are changing their targets.
8/10/20.
FAA Dave Duff phone message 1 2. 8/01/20.8/7/20.
A declaratory judgment is a binding judgment from a court defining the
legal relationship between parties and their rights in a matter before the court.
Typically, a party will first send a cease and desist letter prior to seeking
declaratory judgment from a court.
Injunctive relief, also known as an injunction, is a remedy which
restrains a party from doing certain acts or requires a party to act in a certain way.
It is generally only available when there is no other remedy at law and
irreparable harm will result if the relief is not granted.
Where is Mark House?
206-231-2046 call audio.
7
* UNITED STATES DISTRICT COURT
| Monday October 27 18:39 End Monday October 27 14:09 https://prosefights2.org/irp2024/windscammers28.htm. Start Tuesday October 28 07:23 https://prosefights2.org/irp2023/windscammers29.htm. ___ Tech Chegg slashes 45% of workforce,___ Navajo Nation will spend $3 million on test of new tech for cleaning uranium mine waste. NextEra Energy partners with Google to restart Iowa nuclear plant. Google AI response. In considering the entire lifecycle, including mining and waste, nuclear power is significantly cleaner than fossil fuels but faces unique environmental challenges. Nuclear has extremely low greenhouse gas emissions but must deal with long-term radioactive waste, while fossil fuels have massive emissions and produce vast amounts of hazardous waste Lifecycle comparison: Nuclear vs. fossil fuels ... The waste cleanup difference ... Conclusion From a lifecycle perspective, fossil fuels are the "dirtier" source of electricity due to their immense output of atmospheric pollutants and greenhouse gases. While nuclear power has its own waste and mining challenges, the extremely high energy density of uranium means it has a smaller material footprint per unit of energy than fossil fuels and some renewables. The waste management for nuclear is a contained and regulated process, whereas the waste from fossil fuels contaminates the air, land, and water on a massive scale. It's insulting to read AI-generated blog posts (pabloecortez.com). ____ Google AI reponse ... NOT Google AI Overview! There are three primary reasons most big tech programmers do not decompose their software into components certifiable at the machine language level: cost and time, complexity, and tooling. While formal verification at the machine level is theoretically possible and used for highly critical systems, it is impractical and unnecessary for the vast majority of commercial software. Cost and time Formal verification of code at the machine level is a massively time-consuming and expensive process. Massive effort per line of code: Proving that machine code instructions behave exactly as intended requires immense manual effort. The time and resources needed for this kind of rigorous, mathematical proof are several times greater than the time it takes to write the code itself. For example, one military operating system project noted it took 3.3 times more effort to formally prove software correct than to develop it with traditional methods. Delay to market: In the highly competitive tech industry, speed to market is critical. The time required for full formal verification would delay product releases by months or years, an unacceptable trade-off for companies focused on rapid development and iteration. Diminishing returns: For most applications, the incredibly high cost of machine-level verification does not produce a proportional benefit. Agile and iterative development methods, combined with robust testing, provide a level of quality assurance that is "good enough" for the vast majority of commercial software and is far more cost-effective. Complexity Large-scale software is simply too complex for machine-level certification to be feasible. Difficulty of requirements: The first step in formal verification is creating a perfect, unambiguous, and complete specification of what the software is supposed to do. For big tech softwarelike a social media platform or a cloud servicethe requirements are constantly changing and are often ambiguous. Proving a program corresponds to an incomplete or incorrect understanding of requirements is pointless. Hardware and environment dependencies: Certifying machine language is not portable across different processors and hardware. A verification for an Intel x86 chip would not apply to an ARM chip in a mobile phone. Modern software runs across a vast array of constantly changing hardware and software dependencies, making machine-level verification an endless, unwieldy task. The oracle problem: Formal verification can prove that a program does what its specification says, but it cannot prove that the specification itself is correct or complete. If the initial requirements are flawed, the verified program will still be flawed. Abstraction and tooling Developers use high-level languages and abstraction to build large-scale software efficiently. Decomposing to the machine level would destroy this essential advantage. Abstraction is a necessity: Modern programming languages like Python, Java, or C++ abstract away the complex details of the underlying hardware. This allows programmers to focus on solving high-level problems rather than managing individual processor registers. Certifying at the machine level would force a return to this low-level, tedious, and error-prone style of programming. Lack of developer expertise: Few programmers have the necessary training in formal methods and predicate logic to be able to use the tools required for machine-level verification. It is a specialized, academic field, not a mainstream industry practice. Immature toolchain: The software tools for formal verification are still a topic of active academic research and are not yet user-friendly or mature enough for widespread "industrial adoption, especially for large codebases. This is in contrast to the robust and feature-rich toolchains that exist for high-level languages. Lack of developer expertise: Few programmers have the necessary training in formal methods and predicate logic to be able to use the tools required for machine-level verification. It is a specialized, academic field, not a mainstream industry practice. Immature toolchain: The software tools for formal verification are still a topic of active academic research and are not yet user-friendly or mature enough for widespread industrial adoption, especially for large codebases. This is in contrast to the robust and feature-rich toolchains that exist for high-level languages. Embedded systems: Simple systems with fixed, unambiguous requirements, such as a smart card or a small embedded device, can sometimes be formally verified. ____ is the x86 displacement signed and two' ____ Shocking map reveals where power-hungry __ ___ Everything you know about last week's AWS outage is wrong. ____
____
|
| ____ Oklo: The Current Valuation Seems Unsustainable.Try 1. |
Sunday October 26 `13:26
____what is a das for servers?
AI Overview
A Direct Attached Storage (DAS) for servers
is a storage device, like a hard drive or SSD,
that connects directly to a single server
through a physical cable, such as USB or
Thunderbolt. It provides storage that
is not on a network, making it
very fast, cost-effective, and easy to
manage for local data storage,
backups, and expanding a server's
capacity.
Key characteristics of DAS for servers.
Single-server access: It is primarily used
by the single server it is attached to,
unlike NAS which is designed to be
shared among multiple devices
on a network.
4 reasons a DAS is a great addition
to your Proxmox home server.
5 Lightweight Services You Can
Self-Host on a Raspberry Pi.
____Act Now Microsoft Issues Emergency____
Windows Update As Attacks Begin.
AI is about to supercharge cyberattacks.
what is the current cost estimate of the
aws internet outage?
AI Overview
Following a 15-hour outage on October 20, 2025,
estimates for the total cost of the Amazon Web
Services (AWS) internet outage vary significantly,
ranging from hundreds of millions to hundreds of
billions of dollars. The wide discrepancy is due to the
varying methods used to calculate the impact,
which includes lost revenue, productivity, and
reputational damage.
Cost estimate breakdowns
Total global economic impact: Some analysts
estimate the total financial impact of the
disruption will be in the billions or even hundreds
of billions of dollars. This includes lost productivity
for millions of workers and halted business
operations across various industries. For
instance, one estimate put the total collective
loss for global businesses at over $1.1 billion
for the 15-hour duration of the outage.
Cyber insurance industry estimate: A preliminary
loss estimate from cyber modeling firm
CyberCube falls between $38 million and
$581 million for the cyber insurance sector
alone. This does not cover the full economic
impact, as many companies discover that
their insurance coverage does not fully match
their operational risks during
Specific company estimates: Some reports
have broken down hourly losses for major
platforms and companies impacted by the outage:
Amazon: ~$72.8 million per hour
Snapchat: ~$612,000 per hour
Zoom: ~$533,000 per hour
Roblox: ~$411,000 per hour
Fortnite: ~$400,000 per hour
Healthcare industry estimate: The healthcare
sector was significantly impacted, with
one estimate showing a loss of
$62,500 per hour due to operational
disruptions like inaccessible patient
records and delayed procedures.
Factors complicating the cost analysis
Centralized risk: The widespread and
extensive impact of the outage was a stark
reminder of the "concentration risk" that
occurs when so many companies
depend on a single cloud provider and
region.
Reputational damage: The financial estimates
do not typically include the long-term
impact on a company's reputation and
customer trust. End users tend to
blame the business they interact with
rather than the underlying infrastructure
provider.
Insurance limitations: Many cyber insurance
policies have limitations or exclusions for
outages under a specific duration, leaving
some companies with significant
out-of-pocket losses.
Cascading failures: While the outage was
caused by a simple DNS error, the
widespread dependency on AWS led
to cascading failures across multiple
industries, including financial services,
gaming, and smart home devices.Microsoft's decision to axe Windows 10 is
driving Apple PC sales growth users
buy Macs instead of AI PCs despite
Microsofts push for Copilot+ PCs.____ The Rise of Renewable Energy.Try 6.
Stop These Things Weekly Round Up:
26 October 2025.
Friday October 24 16:37
____Spains Clean Energy Dilemma.
Big Tech's 'Golden Handcuffs' Have Become 'Silicon Handcuffs'.
Why Coheres ex-AI research lead is betting against the scaling race.
A single point of failure triggered the Amazon outage affecting
millions.
___Amazon says automation bug____
caused massive AWS outage.Seagate: A Momentum Investor's Goldmine____
In The Data Storage Revolution.
This $69 Seagate 2TB portable HDD is
an absolute steal for storage.
Amazons AWS Shows Signs of Weakness
as Competitors Charge Ahead.Ring founder describes 'tough day' of___
AWS outage: 'We got through it'.
what is the revision history of llvm?
AI Overview
The revision history of the LLVM project can
be divided into its foundational research phase,
its growth with Apple's involvement, and i
ts more recent transition to a regular,
time-based release cycle.
Early history (20002005)
2000: The LLVM project begins as a
research project at the University of
Illinois at Urbana-Champaign, led by
Chris Lattner and Vikram Adve. It was i
nitially conceived as a system for
dynamic compilation of both static
and dynamic programming languages.
The name was originally an
acronym for "Low-Level Virtual
Machine".
2003: The LLVM project releases
version 1.0, and development
continues under a permissive
open-source license from the
University of Illinois/NCSA.
Rise of Clang and Apple's
involvement (20052016)
2005: Apple hires Lattner and
establishes a team to work
on LLVM for use in its
development tools. This begins
a period of rapid development
and increased adoption for the
project.
2006: Lattner starts
the Clang project, a new
compiler frontend for C, C++,
and Objective-C, designed to
be more easily integrated with
development environments t
han GCC.
2009: Clang 1.0 is released
alongside LLVM 2.6.
2011: Apple integrates LLVM
as an essential part of Xcode 4.
The LLVM project officially
declares that "LLVM" is no
longer an acronym, but
rather a brand name for
its umbrella of technologies,
reflecting its evolution
beyond a virtual machine.
2012: Chris Lattner,
Vikram Adve, and Evan Cheng
receive the ACM Software
System Award for designing
and implementing LLVM.
2013: Sony begins using
LLVM's Clang in the software
development kit (SDK) for
its PlayStation 4 console.
2014: The LLVM Foundation
is established to provide
governance for the project.
Time-based release cycle
(2016present)
2016: After version 3.9,
the project abandons its
arbitrary major and minor
versioning scheme and
switches to a time-based
schedule with a new major
release every six months.
Under the new scheme,
every six-month release
increments the major
version number.
2019: With version 9.0.0,
the LLVM project relicenses
its code from the University
of Illinois/NCSA Open Source
License to the Apache 2.0
License with LLVM Exceptions.
Present: The LLVM project
continues to produce
biannual major releases.
For example, version
19.1.0 was released in
September 2024, and
version 21.1.0 was
released in August 2025.
Accessing detailed revision
information
For a complete, commit-by
-commit revision history,
developers use the LLVM
project's version control
system, which transitioned
from Subversion to Git.
The project's GitHub
repository offers the
most up-to-date
information on the
codebase's history.
For a non-comprehensive
list of changes in each
major release, the official
LLVM documentation
provides detailed release
notes.
AI Overview
LLVM originally stood for "Low Level
Virtual Machine," but it is no longer
an acronym. Today, LLVM refers
to a compiler infrastructure and
set of tools that can be used to
develop compilers for many
different programming languages.
Its modular design separates the
language-specific "frontend" from
the architecture-specific "backend,
" allowing them to be combined in
different ways.
What LLVM is and what it does
Compiler Infrastructure:
...
Intermediate Representation (IR):
...
Frontend:
...
Backend:
...
Optimization:
...
Modular desig:
how man lines of code in what language
is a llvm?
AI Overview
The LLVM project, a collection of modular
and reusable compiler and toolchain
technologies, is primarily written in C++.
Regarding the lines of code, LLVM is a
very large project. While the exact
number fluctuates with ongoing
development, it is generally
understood to consist of millions
of lines of code. For instance, reports
from early 2022 indicated the LLVM
mono repository contained over
23.85 million lines of code.
Other sources have estimated the
project to have around 12 million
lines of code across its various
components.
This significant codebase reflects
the breadth and depth of the LLVM
project, encompassing various
components like the LLVM
intermediate representation (IR),
optimizers, code generators, and
supporting tools.
AWS Outage Was Inevitable,
Says Former AWS, Google Exec.
Seagate 4TB Portable Hard Drive Hits
$0.02 per GB, the Cheapest Way to
Expand Xbox or PlayStation Storage Yet.
Show Off Your Linux Skills With
an Official Ubuntu Exam.
Linux Looks To Orphan Its ISDN Subsystem.
5 pitfalls of dual-booting Windows
and Linux that I wasnt prepared for.
CenterPoints AI-Fueled Houston
Boom Lifts Q3.How Hacked Card Shufflers Allegedly
Enabled a Mob-Fueled Poker Scam
That Rocked the NBA.
Try 2.
Thursday October 23 16:06
____Ranked: Nuclear Power Capacity_
by Country (2025).
What makes us so vulnerable to
cloud computing outages?.
Canonical Begins Snap'ing Up Silicon-Optimized
AI LLMs For Ubuntu Linux.
Inside the AWS outage: How one failure rippled across the global economy.
A new South Texas data center will
rely on untapped renewable energy.
___Cloud Storage Is Expensive. Here's a Much____
Cheaper Way to Back Up Your Photos and Videos.China releases 'UBIOS' standard to replace
UEFI Huawei-backed BIOS firmware
replacement charges China's domestic
computing goals.
LLVM Lands Some Long Overdue Tuning
Optimizations For AMD Zen 4.
The AI Bubble Wont Just Take Down the Stock
Market. It Will Hammer the U.S. Economy too.
AWS Goes AWOL: Are We Too Dependent on
the Cloud?.
A single DNS race condition brought Amazon's
cloud empire to its knees.
____The Long Tail of the AWS Outage.
Does Amazon Web Services cloud
data centers use linux?
AI Overview
Yes, Amazon Web Services (AWS)
data centers heavily use Linux. AWS
has its own Linux-based operating
system, Amazon Linux, and provides
a wide variety of other Linux
distributions through its services.
Amazon Linux: AWS develops and
maintains its own Linux operating
system, called Amazon Linux, to
provide a secure and high-
performance environment for
running cloud applications.
Support for other distributions:
AWS also offers many other
popular Linux distributions, such
as Red Hat Enterprise Linux,
Ubuntu, and Debian, through its
AWS Marketplace.
Linux's popularity: Linux is
widely used across major
cloud platforms like AWS,
Google Cloud, and Microsoft
Azure due to its versatility,
robustness, and open-source
nature.
Linux distributions in AWS Marketplace.
Cybersecurity expert offers blunt verdict
on AWS outage.
Amazons DNS problem knocked
out half the web, likely costing billions.
____NRC: Individual fell into 'reactor cavity'.Try 1.
at Palisades Nuclear Plant.
AI Overview
No new uranium mining projects are planned
on Navajo Nation lands in 2025 and 2026
due to the Diné Natural Resources
Protection Act, which bans all uranium
mining and processing. However, the
controversy surrounding uranium on the
Navajo Nation is ongoing in 2025, primarily
over the transportation of radioactive ore
across Navajo territory and the cleanup
of abandoned Cold War-era mine sites.
Uranium transport across the Navajo
Nation.
Controversial agreement: In January 2025,
the Navajo Nation reached an agreement
with Energy Fuels, a U.S.-based mineral
producer, to allow the transport of uranium
ore across Navajo land.
...
Community opposition:
...
Ongoing legal challenges:
...
Cleanup of abandoned mines
...
Remaining challenges: Despite these
efforts, hundreds of abandoned uranium
mines still pose environmental and health
risks to the Navajo people. The long-term
cleanup and health impacts remain a
potent issue for the Navajo Nation.
GE Vernova drops after mixed Q3 results,
warns of continued weakness in wind business.
Tuesday October 21 16:28
____AWS outage: Are we relying too much
on US big tech?.
AWS outage turned smart homes into dumb boxes
and sysadmins into therapists.
What caused the AWS outage - and why
did it make the internet fall apart?.
Global PPA Prices Shift Dramatically for
Solar and Wind.
Amazon delivery firms are bailing amid rising costs, meager profit.
Elizabeth Warren Blasts Amazon For Internet Meltdown,
Says 'If A Company Can Break The Entire Internet,
They Are Too Big'.
Uranium fuel arrives at Michigan nuclear
plant ahead of unprecedented restart.
Claude Code Creator: We Didn't Mean to Build It,
But It's Changed Everything.
____
Has gcc c machine code interfaces been
sabotaged to make gcc c less useful?
AI Overview
There is no credible evidence to suggest that
GCC's machine code interfaces have been
intentionally sabotaged. The idea that
deliberate flaws were introduced to make
the compiler "less useful" is speculative and
contradicts the nature of open-source
development, where security vulnerabilities
are typically exposed and fixed, not hidden.
The perception that GCC's inline assembly or
low-level interfaces are difficult or
unreliable likely stems from the complexity
of working directly with assembly
and the necessary trade-offs a high-level
compiler must make.
...
Security concerns and the open-source
process The idea of hidden sabotage runs
contrary to how vulnerabilities in GCC are
handled. As an open-source project, GCC's
security policy is public, and known
vulnerabilities are treated seriously and
patched, not intentionally left to cause issues.
Robustness, not sabotage: The complexity
and constraints of GCC's inline assembly exist
to create a robust and reliable bridge between
C code and the underlying assembly instructions,
not to make the interface unusable. They ensure
that the compiler's optimizations don't break the
specific requirements of the manual assembly code.
____who discovered two's complement
binary arithmetic?
AI Overview
John von Neumann is credited with suggesting
the use of two's complement binary
representation for electronic computers in
his 1945 report, though the method of
complements was a long-standing
technique used in decimal mechanical
calculators. The EDSAC, one of the first
stored-program computers, was the
first to use two's complement as
described in von Neumann's report.
...
Industry standard: Two's complement
became the dominant binary
representation in the computer
industry after being adopted by
the IBM System/360 in 1964.
____Microsoft: The future of work is here,____
thanks to Windows 11 and AI.
The Lambda Papers: When LISP
Got Turned Into A Microprocessor.A common error appeared to cause a
major AWS outage, bringing down
platforms from Reddit to Snapchat.
Today is when the Amazon brain
drain finally sent AWS down the spout.
Amazon Stock Restores AWS After
Global Outage But What Went Wrong?.
what is intel panther lake?
AI Overview
Panther Lake to have similar power
efficiency to Lunar Lake ... Intel
Panther Lake, officially the Intel
Core Ultra Series 3 processors, i
s the company's next-generation
client processor designed for PCs, l
aunching in January 2026. It is the
first client-system-on-a-chip (SoC)
built on Intel's new 18A
manufacturing process and aims to
improve performance and efficiency
by combining architectural strengths
from previous generations like Lunar
Lake and Arrow Lake. Key features
include enhanced built-in graphics,
AI capabilities, and new connectivity
options like Wi-Fi 7 and Bluetooth
6.0.
Performance and efficiency
,,,,
Availability Launch:
The Intel Core Ultra Series 3
processors will go on sale in
January 2026.
Variants: Intel has outlined several
variants, including
high-performance "X" models and
lower-power "U" models.
____Americas Energy Policy Is Running on Empty.
China Becomes Canadas Biggest Crude
Customer Thanks to Trans Mountain.
Try 1.
Monday October 20 15:43
____Major AWS Outage Hits Disney+, Reddit, Roku, More.____
AI Overview
It is not accurate to say that the chances of Amazon
going bankrupt because of AWS are increasing as of
October 19, 2025. This statement misrepresents the
relationship between the two, as AWS is a highly
profitable and essential part of Amazon's business.
Here is a breakdown of why AWS is not a threat to
Amazon's solvency:
...
Recent concerns are about growth rate, not bankruptcy
...
Amazon's overall financial position is strong
...
The October 20, 2025, outage
...
Managed expectations: While outages carry
financial risk, this event was viewed as
an operational challenge rather than a
threat to the company's long-term
financial health.
Coinbase, Robinhood down as Amazon
outage briefly cripples the internet.
SA Asks: What's the most attractive
nuclear energy stock right now?.
Massive Amazon outage takes down Venmo,
Snapchat, Alexa, Reddit and much of the
internet all the latest AWS updates live.
Microsoft Confirms Emergency Update For
Millions Of Windows Users.
Forth: The programming language that
writes itself (ratfactor.com).
Amazon Web Services reports new
connectivity issues following global internet.
outage.
AI Overview
Yes, many computer architectures,
sincluding those for x86 and
ARM processors, have a left shift with carry
instruction, often called a rotate left (ROL)
instruction. This instruction shifts all bits to
the left, with the bit shifted out of the most
significant position going into the carry flag
and the bit that was in the carry flag being
shifted into the least significant position.
How it works
...
x86 architecture:
...
ARM architecture:
:)
____Amazon says most cloud services restored____
after widespread outage.
Amazon finds fix for huge AWS internet blackout
that took out Reddit but Wordle and Apple
Music are down again live updates.
Amazon services showing 'signs of recovery'
after Snapchat and banks among sites hit by
major outage.
AI Overview
There is no single answer to whether large-capacity
on-premises memory is "better" than cloud storage,
as it depends on an organization's specific needs and
priorities. The right choice is a strategic business
decision that balances factors like cost, security,
performance, scalability, and control. Many
businesses now use a hybrid approach that
combines the benefits of both.
Cost comparison
...
Performance and reliability
...
Security and control
...
Scalability and accessibility
...
Choosing the right approach
...
Consider a hybrid approach if: You need a
balance of control and flexibility. Many
organizations store sensitive data
on-premises for control while using
the cloud for collaborative workloads,
backups, and scalability.
is it a good idea to keep cloud data backup
on inexpensive large-capacity local storage?
AI Overview
Yes, using inexpensive local storage for cloud
data backup is a good idea for a hybrid
approach, combining the cost-effectiveness
of local storage with the security of offsite
backup. You can use inexpensive large-
capacity local storage (like an external
hard drive) for fast, local backups, while
also using cloud storage for offsite
protection against physical disasters like
fire or theft. This strategy provides a
multi-layered backup solution for
comprehensive data protection.
Advantages of a hybrid approach
...
How to implement it
Amazon DNS outage breaks much
of the internet.
Epic Games down: AWS outage causes
request could not be completed.
A Raspberry Pi is a better addition to your TV
than a Chromecast.
Phased OutGoogle Confirms Bad News
For All 3 Billion Chrome Users.""
A cheap SanDisk memory card was just found
completely unscathed inside an underwater
camera found among OceanGate
submersible wreckage.OpenAIs embarrassing math.____Linux 6.18-rc2 Released: "rc2 is on the bigger side".
____
Chinas Wind Industry Seeks
Push to Double Capacity by 2030.
Restart of Huge Nuclear Power Plant
Faces Backlash in Japan.
DOE cancels more than $700M in
battery, manufacturing projects.
Try 2.
Saturday October 18 16:17
___China Is Totally Crushing Trumps____
Fossil Fuel Dream, With Agrivoltaics.
China Officials Try to Ease Global Concern
Over Rare Earth Curbs.
Container-sized batteries are powering
the next global energy revolution.
will layoffs in big tech continue despirte ai?
AI Overview
Yes, tech layoffs are likely to continue despite
AI because companies are restructuring to
prioritize AI development and automation,
which can lead to a reduction in roles for
some existing jobs. While AI is also creating
new jobs, particularly in areas like AI
development and cybersecurity, companies
are simultaneously using automation to
offset costs for AI investments and improve
profit margins.
Reasons for continued layoffs
...
How AI affects the job market.
____how many hardware platforms have a____
8 bit add with carry instruction?
AI Overview
It is impossible to provide an exact number of
hardware platforms that have an 8-bit "add
with carry" instruction, but a huge number of
them include this functionality. The instruction
is a standard feature for allowing multi-byte
arithmetic, a necessity on older 8-bit processors
and still common in modern architectures for
optimizing certain operations.
The functionality is found across a wide
range of hardware, from early microprocessors
to modern 64-bit CPUs, and is implemented
in two main ways:
do the risc-v instruction sets have an
add with carry instruction?
AI Overview
The base RISC-V instruction set architecture
(ISA) does not include a dedicated "add with
carry" instruction like adc found in some other
ISAs (e.g., x86). This is due to RISC-V's design
philosophy of avoiding a dedicated flags register,
which can simplify hardware design and
out-of-order execution.
To implement multi-word arithmetic (like adding
numbers larger than the native register width)
in RISC-V, you need to explicitly calculate and
handle the carry using a sequence of instructions.
This typically involves using a combination of:
Example of multi-word addition without a
dedicated adc instruction:Meta is hiring entry-level roles that pay up to___
$290,000 a year and require little prior experience.
Our Market Share Dropped From 95% to 0%,
Says NVIDIA CEO Jensen Huang in a Temporary
Goodbye to Chinas AI Market.Hacking A Banned Chinese Security Camera.____As Microsoft Forces Users to Ditch Windows 10, It Announces
That Its Also Turning Windows 11 into an AI-Controlled Monstrosity.
is islam math different from western math?
AI Overview
No, modern "Western" mathematics is not fundamentally different
because it was built upon and integrated the foundations established
by Islamic scholars. Instead, the distinction is that Islamic
mathematics from the 8th to 13th centuries was a crucial,
foundational period that contributed to the development of
modern mathematics, introducing key concepts like algebra
and the modern decimal system that are now considered
Western.
Key contributions of Islamic mathematics
...
he spread of knowledge
During Europe's "Dark Ages," Islamic scholars preserved,
translated, and expanded on ancient Greek and Indian
mathematical texts.
The practical nature of their innovations, particularly algebra,
led to the widespread adoption of these new methods in Europe.
This transfer of knowledge, aided by cultural exchanges like
trade and the translation of Arabic texts, was essential for
the growth of mathematics during the Renaissance and beyond.____ Try 2.China's Role in Africa's Green Energy Future.
Wednesday October 15 16:06
___Why big tech's nuclear plans could blow up.____
The Frothiest AI Bubble Is in Energy Stocks.
F5 Breach Exposes BIG-IP Source Code
Nation-State Hackers Behind Massive Intrusion.
Former Intel CEO drops curt 2-word verdict on AI.BlackRock, Nvidia-backed group strikes____
$40 billion AI data center deal.
what are google cloud issues?
AI Overview
Google Cloud has faced issues ranging from
major outages and security vulnerabilities
like misconfigured storage buckets and firewalls,
to performance problems like latency and
service-specific errors in areas like Cloud Run,
Compute Engine, and Cloud SQL. These issues
can stem from flawed updates, incorrect
user configuration, or broader infrastructure
challenges.
Security vulnerabilities
...
Performance and availability issues
The $400 Billion Bottleneck: Why AIs
Power Grab Is Stalling at the Turbine.
OKLO Stock To $75?.
...
Causes of outages and errors
....
How to find and resolve issues
what are aws issues?
AI Overview
AWS issues include service outages, network
disruptions, security vulnerabilities, and
user-related challenges like cost management
and misconfigurations. Major
outages are often caused by network
problems, software bugs, or infrastructure
failures, while security issues typically stem
from user errors in settings like S3 buckets
or IAM policies. Users also face challenges
with the complexity of managing costs,
planning for infrastructure, and understanding
the platform's advanced features.
Service availability and performance issues
...
User and management challenges
...
How to check for AWS issues.
PJMs market monitor urges FERC to
review Amazon data centers effect
on costs, reliability.
what are azure issues?
AI Overview
Azure issues include general challenges like
security concerns, cost management,
complexity, and vendor lock-in, as well as
more specific problems such as integration
issues, outages, and performance problems
with virtual machines, code, or other services.
There are also platform-specific issues, such
as failures with virtual machine boot-up or
RDP connections, which are documented
by Microsoft and can be managed through i
ts Azure Service Health tool.
Common Azure challenges
...
Specific technical issues
...
How to address Azure issues
Western Executives Shaken After Visiting China.Orange Pi 6 Plus CIX P1 SBC offers up to 64GB____
LPDDR5 memory, 45 TOPS of AI performance.____I am a programmer, not a rubber-stamp that
approves Copilot generated code (prahladyeri.github.io).
Radxa Orion O6N A smaller, cheaper 12-core
Armv9 Nano-ITX SBC based on CIX P1 (CD8160) SoC.UEFI Shell Flaws Let Hackers Disable Secure Boot on
Over 200,000 Laptops. ____
Try 4.
Tuesday October 14 16:31
___Opinion: Repealing the nuclear moratorium____
would be a costly mistake for Illinois.Why did containers happen? (buttondown.com/justincormack).____does freertos support usb 3.2 file access?
AI Overview
FreeRTOS does not natively support USB 3.2
file access, but it can be implemented by
combining several components. To achieve
USB file access on an embedded system
running FreeRTOS, you need to integrate a
USB Host stack and a file system driver.
The USB 3.2 standard primarily relates to
high-speed data transfer and is largely a
hardware-level specification, which is
abstracted by software layers.
Components required for USB file access.
____Data centers are booming. But there are__
big energy and environmental risks.
Warning: Our Stock Market Is Looking
Like a Bubble.BASICODE: A Bit Like Java, But From____
The 1980s.Hackers can steal 2FA codes and private
messages from Android phones.
Cyber-attacks rise by 50% in past year,
UK security agency says.
GM to take $1.6 billion charge
related to EV pullback.
who writes gm ev software?
AI Overview
GM writes its own EV software using a large
internal team of software engineers and by
hiring talent from major tech companies.
The company also partners with other
organizations to develop software
standards and relies on some embedded
software from third-party providers.
Key aspects of GM's in-house software
development include the Ultifi software
platform and contribution to
open-source projects.
GM's in-house software team.
CEO of $8 billion AI company says
its mind-boggling that people
think you can work 38 hours a week,
have work-life balance, and be
successful.
Try 2.
Monday October 13 17:33
____The Hidden Cost of Electrification____
in the United States.
Intel Faces CPU Market Share Losses And
Limited AI Integration, Analyst Flags.The DIY Cloud: How to Build Your Own Photo____
Storage and Ditch Subscriptions for Good.We will have a crash: Why Andrew Ross Sorkin____
thinks this market bubble will eventually pop.what are the main types of multitasking OS?____
AI Overview
Multitasking Operating System The two main
types of multitasking operating systems are
preemptive multitasking, where the OS
controls and interrupts processes to allocate
CPU time, and cooperative multitasking,
where processes voluntarily give up control
of the CPU. Most modern operating
systems, such as Windows, macOS, and
Linux, use preemptive multitasking, as it
provides a more stable and efficient user
experience.
Preemptive multitasking
...
Cooperative multitasking
...
Other related concepts
...
Multiprocessing: This involves using multiple
processors (CPUs) to perform tasks
simultaneously, as opposed to a single
processor handling multiple tasks
one after another through time-slicing.
OpenAI and Broadcom announce
strategic collaboration to deploy 10
gigawatts of OpenAI-designed AI
acceleratorsArduino has a new job selling chips for its____
new owner. Let's not pretend otherwise.
Gtting swallowed by a whale is a life-changing
event no matter what the whale says
is qualcomm using Big Tech llvm and clang
software technologies?
AI Overview
Yes, Qualcomm uses and significantly
contributes to the open-source LLVM
and Clang software technologies.
The company builds its own compiler,
the Snapdragon LLVM Compiler,
based on the open-source LLVM
framework.
Here is a breakdown of how Qualcomm
uses and interacts with these technologies:
...
Recruitment: The company openly
recruits LLVM Compiler Engineers
to help develop and enhance
components of the compiler for
its custom CPUs. These roles
involve working with the LLVM
toolchain for multiple platforms
and engaging with the
open-source community [cult?].
Paraguay the Silicon Valley of South America?.
Save Your USB-C Plugs From Oblivion.___
what is the optimum usb c powered hub input
voltage accurate to .1 volts to ensure at least
5 v at the outputs?
AI Overview
An externally powered USB-C hub is designed
to accept a higher voltage than the 5V it outputs,
as this is more efficient and allows for more power
to be delivered to devices. The hub's internal
electronics convert the input voltage to the
5V output required by standard USB devices,
with a maximum allowable voltage variation
of 0.25V on the 5V output line.
The optimal input voltage depends on the
hub's design, which uses an internal converter
to step the voltage down. This internal
conversion inherently accounts for
voltage drops caused by the cable and
the hub's own circuitry.
Power Delivery (PD) input
"Conclusion
To ensure a stable 5V output from a USB-C
powered hub, an input voltage higher than
5V is ideal because it provides a sufficient
buffer against voltage drop.
The most common and optimal input voltages
for a quality powered hub are 9V or 12V. An
input of 12.0V, specifically, would give the
internal circuitry plenty of overhead to convert
the voltage down to a stable 5V, accurately
maintaining it within the required $\pm$0.25V
range.Free software hasn't won (dorotac.eu).
Microsoft ironically blocks Windows 10 to 11
ISO upgrade as it breaks Media Creation Tool.
Programming in Assembly Is Brutal, Beautiful,
and Maybe Even a Path to Better AI.
No I don't want to turn on Windows Backup
with One Drive (idiallo.com).
____Why Energy Investors Are Doubling Down onTry 4.
Oil and Gas.
Oklo: Unresolved Capital, Licensing, And
Fuel Risks Potentially Signal Meltdown.
Stop These Things Weekly Round Up: 12 October 2025.
Sunday October 12 13:44
____are amd and nvidia creating their own
demand for ai chips?
AI Overview
Yes, both AMD and Nvidia are actively creating
and stimulating the demand for their AI chips,
rather than simply reacting to existing market
needs. They are using a multifaceted approach
that includes building essential software
ecosystems, pushing product innovation,
and entering into strategic partnerships with
major AI developers.
How Nvidia creates demand.
____What Would an AI Crash Look Like?.____
'We're kind of in a fragile state now': Why
the AI bubble might be about to burst
how to protect yourself.
Theres no such thing as a good bubble.
Small reactors, big problems: the
nuclear mirage behind AIs energy hype.
Who should pay to power Ohios
data center boom?.
AI datacenters in the US aren't 'running on coal'
but this dirty fuel has found favor for feeding
demand spikes due to increased gas prices.
Towns are saying no to AI data centers.
One got sued over it.
Own 10TB of Storage for Less Than
the Cost of a Year of iCloud.
AI Overview
iCloud is Apple's cloud service that securely
stores your data like photos, files, and
notes and keeps them synced across all
your Apple devices. It provides 5 GB of
free storage and is available on Apple
products, Windows, and through a
web browser at iCloud.com. You can
also upgrade to iCloud+ for more
storage and additional features.
What iCloud does.
AI Overview
Common iCloud issues include sign-in
problems, insufficient storage, and
syncing or settings discrepancies.
Other problems can be related to
server outages, software version
incompatibilities, or security concerns
regarding data protection.
Common iCloud issues.
Server outages: Like any online service,
iCloud can experience temporary
downtime due to server problems
or scheduled maintenance.
AI Overview
Yes, cloud systems have been and
continue to be targeted by hackers,
with major incidents like the 2024
AWS attack and the 2025 Oracle Cloud
breach affecting millions of users.
Common attack vectors include
misconfigured security settings,
compromised credentials, and
exploiting vulnerabilities in cloud
infrastructure. Organizations must
proactively secure their cloud
environments, and individual users
should take steps to protect their
own accounts.
Major recent incidents.Save Your USB-C Plugs From Oblivion.___
do adapters work well with usb c male plugs?
AI Overview
Yes, adapters work well with USB-C male plugs,
especially simple adapters like a female USB-A
to male USB-C adapter, but their functionality
depends on the adapter's specific design and the
device's capabilities. While they can provide a
convenient way to connect USB-A devices to
a USB-C port, keep in mind that some adapters
may be data-only or charge-only, and adapters
with the correct internal components are needed
for high-speed data transfer.
Things to consider.
AI Overview
Yes, a powered USB 3.2 hub can offer a significant
speed advantage with USB-C, but only if all
components in your setupincluding the hub,
cable, and connected devicesupport the faster
USB 3.2 standard. A powered hub also ensures
stable, high-speed performance by providing reliable
power to your devices.
Speed improvements with USB 3.2.
AI Overview
Some USB-C 3.2 powered hubs include an HDMI
port because they are more accurately called
docking stations, designed to expand a single
USB-C port into a comprehensive workstation.
This is possible because a single USB-C port can
be configured to carry multiple signals simultaneously,
including video (via DisplayPort or HDMI Alternate
Mode), high-speed data, and power. Therefore, i
nstead of just expanding data-only ports like a
basic hub, these "smart" hubs convert the
USB-C port to offer a variety of functions, such
as video output to an HDMI monitor, multiple USB-A
ports, and network connectivity, all through
one connection.
Video output through Alternate Mode:Australian Airline Says Hackers Leaked Data____
on Its Customers.One UIIf your Samsung device on the list,
you are the luckiest!.
One UISamsung One UI 8.5 Release Date,
.Eligible Devices, Features and Latest News.
Try 1.
Saturday October 11 15:57
_______2 Popular AI Stocks to Sell Before They Plunge____is linux part of big tech software?
40% and 67%, According to Select Wall Street Analysts.
AI Overview
Yes, big tech companies heavily rely on and
contribute to Linux, though it's an
open-source project not owned by a
single company. Google's Android is
built on the Linux kernel, and companies
like Amazon, Microsoft, and Meta use
Linux for their massive cloud infrastructure
and services. They also benefit by
developing products and services that
run on or support Linux.
Examples of big tech's use of Linux.
____
which freertos platforms have a dedicated usb c port?
AI Overview
Platforms with a dedicated USB-C port that support FreeRTOS
include developer boards from STMicroelectronics, Espressif,
and Infineon. The presence of a USB-C port is a feature of
the development board itself, while FreeRTOS compatibility
is determined by the microcontroller and its associated
software packages.
STMicroelectronics (STM32)
____
does any bananapi run freertos?
AI Overview
Linux is not threatened by FreeRTOS because
they serve different market niches and are
designed for fundamentally different hardware
and purposes. FreeRTOS is a minimalist
Real-Time Operating System (RTOS) for small,
resource-constrained microcontrollers,
while Linux is a full-featured, general-purpose
operating system for more powerful
microprocessors.
Fundamental differences.
AI Overview
Yes, certain Banana Pi boards can run FreeRTOS,
specifically those that include a dedicated
microcontroller unit (MCU) alongside their
more powerful application processor.
However, the most common single-board
computer (SBC) models of the Banana Pi
run Linux and are not typically used for FreeRTOS.
Banana Pi models that support FreeRTOS
BPI-Leaf-S3 (ESP32-S3):
does any bananapi run forth?
AI Overview
Yes, a Banana Pi can run Forth, particularly using a Linux distribution with a Forth interpreter. Since Banana Pi single-board computers use ARM processors, and Forth has been ported to many different processors, including ARM, it is completely feasible. How to run Forth on a Banana Pi
____'It's going to be really bad': Fears over___
AI bubble bursting grow in Silicon Valley.
AI Data Centers Are an Even Bigger
Disaster Than Previously Thought.
Your LLM Wont Stop Lying Any Time Soon.Linux Now Disabling TPM Bus Encryption By____
Default For Performance Reasons.""
GCC Patches Posted For C++26 SIMD Support.why is c++ notorious for using uncertified
software dependencies?
AI Overview
There is no evidence to suggest that C++ is
"notorious" for using uncertified dependencies.
The issue is not a flaw inherent to the C++
language but rather the ecosystem and tooling
surrounding it, which historically made dependency
management difficult and inconsistent. This led to
a decentralized approach where developers
managed dependencies manually, with
varying degrees of rigor.
The complexity stems from the fact that a
C++ dependency is not just code, but a
complex combination of source code, build
system files, and pre-compiled binaries that
must match the target environment.
Certification, such as ISO 26262 for
safety-critical systems, is an intense and
expensive process, which makes a globally
"certified" C++ ecosystem with a central
repository impractical.
Lack of a central package manager
...
Decentralized ecosystem:
...
No central authority:
...
A core challenge with C++ dependencies is
the issue of binary compatibility across
different environments.
Non-portable binaries:
...
...
Manual porting:
The cost of certification
Community [cult?] efforts to improve.____ ConfirmedThis is OceanX, the Chinese projectTry 1.
that promises to survive super typhoons like
Yagi and transform offshore wind energy forever.
Nevadas Lost Sunlight: What Esmeralda 7
Tells Us About Americas Energy Future.
Historic transfer of radioactive waste
to massive Eastern WA treatment plant.
Friday October 10 17:48
___
AI Overview
Dwight D. Eisenhower was inspired to build the
U.S. Interstate Highway System by his military
experiences observing the poor quality of
American roads and the efficiency of Germany's
autobahn.
Experiences during military service
____AI Bubble Warning: Financial Institutions____ Climate goals go up in smoke as US
Sound The Alarm.
This Is How the AI Bubble Bursts.
AI bubble? Bitcoin's high correlation to
Nvidia sparks 80% crash warning.
datacenters turn to coal. ____BenchVolt PD: USB PD Meets Benchtop____
Precision.Amazon takes shots at ChatGPT with Quick____
Suite - your new AI 'teammate' at work.
Linux Seeing First LED Driver Written In Rust.What Qualcomm's Arduino deal____
means for Raspberry Pi.
does qualcomm use llvm and clang?
AI Overview
Yes, Qualcomm uses both LLVM and Clang to
create custom toolchains, such as the
Snapdragon LLVM ARM Toolchain, for its
processors. They integrate, optimize, and
build upon the open-source LLVM and Clang
projects to develop their proprietary compilers
and tools for Snapdragon chipsets, as seen
in their official documentation and blog posts.
How Qualcomm uses LLVM and Clang.
are llvm and clang Big Tech software tools?
AI Overview
LLVM and Clang are not strictly "Big Tech"
software tools, but they are extensively
funded, developed, and used by major
technology companies. While originating
from an academic project, the compiler
infrastructure has evolved into a vital,
industry-standard component
maintained by a wide-ranging,
open-source community.
Academic origin and open-source foundation.
what are llvm and clang written in?
AI Overview
LLVM and Clang are primarily written in C++.
LLVM: The LLVM compiler infrastructure,
including its core components and backend,
is implemented in C++. Clang:
Clang, which serves as the frontend for C, C++,
Objective-C, and related languages within
the LLVM project, is also written in C++.
It makes extensive use of modern,
exception-free C++.
Hackers now use Velociraptor DFIR tool
in ransomware attacks.Data Centers Have Solved Their
Speed-to-Power Problem With
Natural Gas.____ Photos of open-pit coal mining in China.Try 1.
Why powering business is the real
lightbulb moment for Africa.
Oil Prices Set for Moderate Dip on Gaza Ceasefire.
Thursday October 9 16:02
____when did a multitasking os first appear on a pc?
AI Overview
The Commodore Amiga 1000, released in 1985, was the first
PC to offer preemptive multitasking, a method where the
operating system controls and coordinates how programs
share the central processing unit (CPU). This was a significant
advance over the cooperative multitasking found in other
early systems, such as the classic Mac OS and early
versions of Windows.
Before the Amiga's introduction, some computers
offered multitasking for more limited use cases:
1983: Concurrent CP/M-86
...
984: Sinclair QL
...
1987: OS/2 Jointly developed by Microsoft and IBM
...
The difference between cooperative and
preemptive multitasking
RISC-V set to announce 25% market penetration
open-standard ISA is ahead of schedule,
securing fast-growing silicon footprint.
____Elon Musk Opens a New LaptopWindows Demands
a Microsoft Account, and He Absolutely Refuses.
____Here is Panther Lake, Intels 2026 laptop
chip with next-gen graphics.
if new x86 hardware platform is used, thne does
a certified c compiler require recertification?
AI Overview
The short answer is yes, a certified C compiler
generally requires recertification or re-qualification
when used on a new or substantially different
hardware platform. The specific details depend
on the safety standards involved and the extent
of the hardware changes.
Here is a breakdown of why this is necessary:
1. Certification covers the entire toolchain
...
2. Compiler behavior is dependent on the target
...
3. Requirements from safety standards
...
4. Verification of object code
...
5. What "recertification" entails.
____Grid planners and experts on why markets
keep choosing renewables.
____Experts Say Theyre Seeing Blinking Warning____
Sign of AI Bubble.
Oracle Fears Add to Doubts About the A.I. Rally.
Azure outage blocks access to Microsoft 365
services, admin portals.
Cybercrime is afflicting big business. How
to lessen the pain.
Two things LLM coding agents are still bad at (kix.dev).GCC 16 Compiler Shifting To "Stage 3"
Development Next Month.
Data Centers Lit the Fuse on the
Next Nuclear Age.
____
upyOS modular MicroPython-based OS for
microcontrollers works with ESP32, RP2040, etc .
What is upyOS?
AI Overview
upyOS is a modular, lightweight, MicroPython-based
operating system designed for low-resource
microcontrollers like the ESP32 and Raspberry
Pi RP2040. It provides a Unix-like environment,
allowing developers to interact with the device
using familiar command-line tools.
Key features
Modular architecture:
...
Unix-like command-line interface (CLI):
...
Remote development:
...
Over-the-Air (OTA) updates:
...
Background execution:
...
Recovery mode:
...
Uses and target audience
The modular design allows developers to
avoid creating large, complex applications
from scratch by reusing existing system modules.
While this adds flexibility, it comes at the
cost of slightly lower performance and efficiency
compared to writing custom, low-level code.
What is upyOS written in, how many lines of
code, who funds?
AI Overview
upyOS is primarily written in Python and is a
modular operating system for microcontrollers.
Information on funding sources and an exact
lines of code count are not readily available.
____Renewable energy outpaces coal for electricityTry 1.
generation in historic first, report says.
Oil Tankers Jam Seas as Global Glut Builds.
Trumps major coal sales flop in Wyoming
and Montana.
Orsted to cut 2,000 jobs as Trumps offshore
wind battle continues.
Investor-owned utilities call for ending
overreliance on PJM capacity market.
Wednesday October 8 15:26
____do lllms use llvm and clang?
AI Overview
Yes, Large Language Models (LLMs) and other advanced
software projects often leverage components of the
LLVM (Low-Level Virtual Machine) project, including Clang.
LLVM is a collection of modular and reusable compiler and
toolchain technologies. It provides a robust infrastructure
for building compilers, optimizers, and code generation tools.
Clang is a C, C++, Objective-C, and Objective-C++
frontend for LLVM. It acts as a compiler for these
languages, translating source code into LLVM
Intermediate Representation (IR), which can then be
optimized and compiled into machine code by the
LLVM backend. Many sophisticated software systems,
including those that might incorporate or be influenced
by LLMs, benefit from the advanced compilation and
optimization capabilities offered by LLVM and Clang. For
example, systems requiring high-performance code
generation, or those that integrate with C/C++
components, often utilize Clang as their compiler
and rely on the LLVM infrastructure for optimization
and target-specific code generation.
Stephen Hawkings Warning About AI As Sora 2 Videos Go Viral.
____Broadcom's Big AI Move In Japan Could
Slash Data Center Power Use By Half.________
Trump Eyes New Round of
Clean Energy Cuts Worth Billions.
Base Power, a Battery-Focused Power Company,
Raises $1 Billion.Microsoft 365 outage blocks access to____
Teams, Exchange Online.
Amazon Caught Peddling AI Slop Version of
Cory Doctorow Thats So Ironic That We
Have to Go Outside and Stare at the
Sky for a Bit.
Hackers exploit auth bypass in Service
Finder WordPress theme.Tips For C Programming From Nic Barker.___The AI Bubble Is Here. Why You Can Still Play the Stocks.____
AI Power Boom Turns Nuclear Stocks Into the Markets New Obsession."
Gravity defying, single-day AI stock rallies are the latest bubble signa.
does the ELEGOO Presoldered Nano Boards with USB Cable Compatible
with Arduino IDE Microcontroller Mini Board ATmega+328P CH340 Chip
run freeertos?
AI Overview
Yes, the ELEGOO Presoldered Nano Board is fully compatible with
the Arduino IDE and can run freeertos, as Elegoo boards are
designed to be 100% compatible with official Arduino boards and
use the same programming environment. To use it with freeertos,
you would typically set up the Arduino IDE to recognize the board,
then write and compile your freeertos-based code within the IDE,
which is a common and straightforward process for this microcontroller.
Steps to Use the Board with freeertos.
does the ELEGOO Presoldered Nano Boards with USB Cable Compatible with Arduino
IDE Microcontroller Mini Board ATmega+328P CH340 Chip run fa forth?
AI Overview
Yes, the ELEGOO Presoldered Nano Board is fully compatible with the Arduino
IDE and runs with the ATmega328P and CH340 chip as described, meaning
you can use it with official Arduino software, sensors, and code. To use it,
you will need to download and install the CH340 USB driver and then, in
the Arduino IDE, select the "Arduino Uno" board and the correct COM
port.
Steps to use the ELEGOO Nano Board:
___
US Power Companies Aim to Spend
$1 Trillion Over Next Five Years. AI Power Boom ... Big Tech msm?
Experts issue warning on new factor driving up energy prices
for all Americans: 'Going to make things really. expensive'.Qualcomm acquires Arduino, introduces
Arduino UNO Q dual-brain SBC.
does qualcommise Big Tech software tecnologies?
AI Overview
Yes, Qualcomm uses and partners with Big Tech
companies on a wide range of software
technologies, especially for artificial intelligence
(AI), extended reality (XR), and automotive
applications. While Qualcomm develops its own
core software, it also deeply integrates its hardware
with software platforms and services from major
tech giants to build out broader tech ecosystems.
Key software collaborations with major tech companies include:
Microsoft
AI and PC Software:
...
Automotive AI:
,,,
Extended Reality (XR):
...
Enterprise Security:...
Android and Longevity:
Meta
Amazon
Nvidia
Data Center AI: Qualcomm has announced plans to
enable connections to Nvidia's GPUs and software
for its data center processors. This is a critical step
for any company entering the data center market,
given Nvidia's dominance in AI semiconductors.
____China to Build 11 New Oil Storage Sites in 2 Years.Try 3.
Tuesday October 7 16:26
____The Top 50 Countries by Central Bank Reserves.Arduino has just been acquired by Qualcomm, and
Arduino has just been acquired by Qualcomm,
and they're already launching a new product
that runs Linux.
they're already launching a new product that
runs Linux.
Qualcomm is buying Arduino, releases new Raspberry Pi-esque Arduino board.
wafer.space lets you design your custom silicon just for $7 per die (Crowdfunding).
Sub $7 CH32V317 board offers 10/100Mbps Ethernet
dual USB 2.0 Type-C, DVP interface..
Amazon: Various versions of CH32V317 development boards,
often sourced from Chinese vendors, can be found on Amazon.
____Qualcomm buys open-source electronics firm Arduino.____
Qualcomm acquires Arduino in surprising move
which puts it right on the edge and at the helm of a
33-million strong maker community.
Qualcomm Introduces The Arduino Uno Q Linux-Capable SBC.A Cloud Built for Python Data Scientists, Not Infrastructure Engineers.__Linux 6.18 Works Around An Intel Xeon 6 PCIe____
Performance Issue.
Python 3.14 Released With Performance
Improvements, Free-Threading & Zstd.
which c x66 compilers are certified?
AI Overview
Multiple compilers for the x86 architecture are certified
for use in safety-critical applications. The best choice
depends on the target application's specific safety
standard and integrity level.
Certified C compilers for x86.
Important considerations for compiler certification.
if new x86 hardware platform is used, thne does
a certified c compiler require recertification?
AI Overview
The short answer is yes, a certified C compiler
generally requires recertification or re-qualification
when used on a new or substantially different
hardware platform. The specific details depend
on the safety standards involved and the extent
of the hardware changes.
Here is a breakdown of why this is necessary:
1. Certification covers the entire toolchain
...
2. Compiler behavior is dependent on the target
...
3. Requirements from safety standards
...
4. Verification of object code
...
5. What "recertification" entails.Data center boom sparks sticker shock for PJM ratepayers.____what is the diff4rence between computer education
and computer brainwashing?
AI Overview
The fundamental difference between computer
education and computer brainwashing lies in their
intent and outcome. Computer education fosters
critical thinking, while brainwashing uses
computer technology to manipulate and i
mpose a predetermined conclusion.
Computer education
...
How to differentiate the two
Computer brainwashing
...
How to differentiate the two.
____Starlink is burning up one or two satellites
a day in Earths atmosphere.
why is Starlink is burning up one or two
satellites a day in earth's atmosphere?
AI Overview
Starlink satellites burn up in Earth's atmosphere daily
for several reasons, including controlled deorbiting
of aging satellites, removing faulty units, and the
natural effect of increased atmospheric drag caused
by solar activity. The frequent reentries are a
consequence of the rapid expansion and replacement
cycle of the Starlink constellation.
Controlled deorbiting of aging satellites
...
Retiring faulty satellites
...
Heightened solar activity
...
Scientific and environmental concerns
what is big tech mainstream media ai?
AI Overview "
Big Tech mainstream media AI" refers to the
complex and evolving relationship between
major technology corporations and traditional
news organizations, where AI acts as both a
tool and a point of tension. Big Tech uses AI
to influence the media landscape, and news
outlets use AI to reshape journalism, creating
ethical and operational challenges for both.
How Big Tech influences mainstream media with AI
...
Erosion of trust: The rise of AI in news has been
linked to a decline in public trust in the media. A
2025 Reuters Institute report found that while
awareness of AI news tools is high, there is a clear
"comfort gap" between human-led and AI-led news,
with most people being uncomfortable with news
made entirely by AI.
is "AI Overview Modern compilation toolchains like
LLVM and Clang" an example of Big Tech AI?
No Google AI response!
ccc
5 hidden mistakes that are ruining your OLED monitor.
____The Economics Of Renewables TheTry 3.
Bottom Line Is Often Hidden By Hyperbole.
Crude Traders Split on Whether the Glut Has Arrived.
Why Californias closed $2 billion solar plant is
not a signal of industry failure.
Renewables overtake coal as world's biggest
source of electricity.
Renewables overtake coal as world's
biggest source of electricity.
Monday October 6 18:35
____They Built a Giant That Floats: China Unveils the____
Worlds Largest Offshore Wind Turbine (and it
could power 4,000 homes at sea).
Company bids less than a penny per ton in
biggest US coal sale in over a decade.
Data center planned on 795 acres of farmland
in south Joliet, Illinois.Deloitte will refund Australian government___
for AI hallucination-filled report.does ubuntu ise linux 6.17?
AI Overview
Yes, the upcoming Ubuntu 25.10 ("Questing Quokka") will use the Linux kernel 6.17, which is expected to ship with the final release on October 9, 2025. Ubuntu 25.10 is built on the most recent in-development kernel release to ensure the latest hardware support and performance enhancements are included by default, even if the kernel is still in its release candidate phase at the time of the operating system's launch.
Here's why this is significant:.
____Elon Musk suffers mass exodus of employees____
across all 5 companies: 'The one constant
is how quickly he burns through deputies'.
Sam Altman Warns That AI Industry Is Due
for a Spectacular Implosion.
OpenAI signs a multi-billion dollar chips
deal with AMD and the stock skyrockets.
Microsoft CEO Satya Nadellas
confusion fix for Copilot leaves employees
laughing in townhall.
Oracle patches EBS zero-day exploited
in Clop data theft attacks.____
what is a computer centimeter?
No response from Google AI.
128 x 8 = 1,024 mm is corect answer.6 tiny self-hosting tools that save me hours every week. what is self-hosting?
AI Overview
Self-hosting is the practice of running your own applications
and services on your own hardware or rented servers, rather
than relying on external providers like Google or Microsoft.
This approach gives you greater control over your data, privacy,
and infrastructure, but also means you are responsible for
maintaining and securing the system yourself. Common
examples include hosting a personal cloud (like Nextcloud),
media server (like Jellyfin), or website on a personal computer
or a rented Virtual Private Server (VPS).
Key Aspects of Self-Hosting
...
How It Works
...
Who Is It For?.
Disrupting Car Production and Grocery Access,
Cyberattacks Upset British Life.
____I replaced my solar panels with wind power
generators at home - here's the verdict.
From bombs to glass: Hanford site can
now transform nuclear.
Germany outfitted half a million balconies
with solar panels (grist.org).
Try 4.
Sunday October 5 17:40
____This Is How the AI Bubble Will Pop.____
US and investors gambling on unproven
nuclear technology, warn experts.
Massive surge in scans targeting
Palo Alto Networks login portals.
Era of AI slop cleanup has begun.
Way past its prime: how did Amazon get so rubbish? (theguardian.com).
Personal data storage is an idea
whose time has come (muni.town).Microsoft admits these two Windows 11/10
features definitely slow your PC down. [these two Windows 11/10
features. Wgich two?]
Microsoft admits these two Windows 11/10 features
definitely slow your PC down.
5 Windows 11 services I disabled
to give my PC a performance boost.
4 Linux kernel tweaks I made that actually
improved performance updating linux kernel.
what is the most recent release of linus torvalds linux?
AI Overview
Linus Torvalds turns 50 today. Wish him best for all great ...
The most recent Linux kernel release is 6.17, announced
by Linus Torvalds on September 28, 2025. This release brings
significant CPU improvements, stability for Intel Panther Lake
Xe3 graphics, better performance on AMD mixed-core
processors, and EXT4 file system enhancements.
Key details of Linux 6.17:
is linus torvald losing control of Linux 6.17 because of
so many changes and other reasons?
AI Overview
Despite a couple of high-profile controversies
during the 6.17 merge window, Linus Torvalds
maintains ultimate control over the Linux kernel's
direction. Far from losing control, his actions
demonstrate his decisive authority in ensuring
quality and enforcing development practices. His
famously blunt rejection of late and low-quality
code for version 6.17 underscores his
uncompromising standards.
The main events that led to questions about
the 6.17 development cycle were not signs
of chaos, but rather results of Torvalds exercising
his power:
Rejection of the RISC-V pull request:
...
Removal of Bcachefs:
Why these incidents show Torvalds still has control
These two events highlight Torvalds' continued
and active control of the kernel development
process.
...
The broader context of kernel maintenance
The development process is designed to manage
the increasing complexity of the kernel, with
Torvalds overseeing a hierarchy of maintainers.
____$2B CALIFORNIA SOLAR PLANT TO SHUT DOWN
AFTER A DECADE FOR THE MOST FRUSTRATING. REASON.
14 years later, America will transform wind power
This state will be the epicenter of the project.
____Stop These Things Weekly Round Up: 5 October 2025.Try 1.
Friday October 10 :48
____The biggest sign of an AI bubble____
is starting to appear.
Inside JPMorgans Investment Bank,
Nuclear Hype Raises Concerns.
Why Amazon (AMZN) May Lose Its
Cloud Computing Crown.Clearing Cookies Won't Save You: Here's____ Tesla Delivers Record 497,099 EVs In Q3 On
the Hidden Way You're Being Tracked.
xpiring Tax Credits. TSLA Stock Reverses Lower.
does tesla use two versions of linux in its fsd vehicles?
AI Overview
While not two distinct versions of Linux, Tesla
FSD vehicles use a Linux-based system in a
dual-computer, redundant hardware
configuration. One customized Linux
distribution powers the in-car infotainment,
while the FSD computer's AI functions rely
on a tightly integrated software stack running
on a custom System-on-a-Chip (SoC).
Dual computer redundancy
...
Separate software stacks
...
Customization and open source
...
Upstream contributions: Tesla, in
collaboration with chipmakers like
Samsung, has been contributing
patches to the Linux kernel to
support their custom FSD hardware.
This demonstrates an ongoing
effort to maintain open-source
compliance and stay up-to-date.
Nuclear fusion, the holy grail of power,
was always 30 years awaynow its
a matter of when, not if, fusion
comes online to power AI.
Seed7: a programming language which
cares about maintainability.
what is seeed7?
AI Overview
Seed7 is an extensible, high-level,
general-purpose programming
language designed by Thomas Mertes
for portability and efficiency, compiling
to native machine code. Its primary
feature is the ability to extend the l
anguage itself by defining new syntax
elements and operators within libraries,
making it highly adaptable for specific
needs, such as creating Domain Specific
Languages (DSLs).
Key Features
Portability:
...
Efficiency:
...
Multiple Paradigms:
...
Portable APIs:
How it Works
Examples of Applications. ____Month Pentagon decrees warfighters
don't need 'frequent' cybersecurity training.
New data reveals incredible surge in key
energy sector: 'Crowding out coal-fired power'.
Try 1/
Thursday October 02 14:48
____Customers in 7 PJM states paid $4.4B for____
data center transmission in 2024: report.
Data centers primary reason for high PJM
capacity prices: market monitor.
Residents Shut Down Google Data Center
Before It Can Be Built.
AI Data Centers Use a Lot of Energy. You May Be Paying for It.
OpenAIs New Data Centers Will Draw More Power
Than the Entirety of New York City, Sam Altman Says.
Data Center Reality: Whispers From Data Center Alley.
o all computer language eventually eventually execute
machine code for a hardware platform?
AI Overview
Yes, all computer languages eventually result
in machine code execution on a hardware
platform. This is because the Central Processing
Unit (CPU) of a computer can only directly
understand and execute instructions written
in its native machine language, which is
essentially binary code. While high-level
programming languages like Python or
Java are not directly converted to
machine code in all cases, the underlying
mechanism that enables their execution
|still relies on machine code.
For example:
...
In all these scenarios, the final instructions
that the CPU processes are in machine code.
The difference lies in when and how this
translation or interpretation into machine
code occurs.
must software module certification be done
at both the source code and machine code levels?
AI Overview
In certain high-integrity, safety-critical
systems, software module certification
must be done at both the source code
and machine code levels. While source code
provides the human-readable logic, the
compilerwhich converts source code to
machine codeis a weak link that can
introduce errors. Evaluating both
ensures the final, executable code
matches the validated source code.
Standards requiring dual-level certification
...
Why both levels are necessary
...
The role of a certified compilerOpenZFS 2.4-rc2 Released With Linux 6.17____
Support, Bug Fixes.
Hackers say they have deleted children's
pictures and data after nursery attack backlash.The Case Against Generative AI.
____Signs Of A Renewable Energy Comeback In The US.Try 1.
Trump administration cancels nearly $8 billion in
climate funding to blue states: Vought.
DOE ends billions in clean-energy awards after Vought post.
DOEs reactor pilot: A turning point for US nuclear energy?.
Wednesday October 01 18:40
____New bug in classic Outlook can only____
be fixed via Microsoft support . [$s?]
AI Overview
Adolf Hitler used a Walther PPK 7.65mm pistol
to shoot himself in his bunker on April 30, 1945.
The 7.65mm cartridge is also known as .32 ACP.
AI Overview
The 9mm is a more powerful cartridge than the
.380 ACP, with a larger case and higher pressure,
resulting in greater muzzle energy and velocity.
The .380, however, offers lower recoil and a
smaller overall size, making it easier to carry
and a good choice for those with less hand
strength. While both cartridges use a bullet
diameter of .355 inches, the 9mm has a longer
case, allowing for more powder.
AI Overview
Gavrilo Princip used an FN Browning Model 1910
semi-automatic pistol chambered in .380 ACP to
assassinate Archduke Franz Ferdinand and his
wife Sophie.
Key details about the assassination and
the weapon:
...
The legacy: The assassination and the
cartridge used are infamous for having
triggered a series of events that led
directly to the outbreak of World War I.
New Yorkers Are Defacing This AI Startups
Million-Dollar Ad Campaign.
Google Cloud Layoffs Hit Employees As
Sales Reach Record Highs.
I self-host an NVR instead of relying on
cloud CCTV storage - here's how."I hope the AI bubble bursts soon. I need it____
to happen for my startup to succeed".
If AI is a bubble, the economy will pop with it.
Real Estate Data centers are a gold rush for
global real estate but can funding keep up?.
Data center on 431 acres in southeast Fort Worth
moving forward amid environmental concerns.____Linus Torvalds Lashes Out At
RISC-V Big Endian Plans.
No One Needs to Pay for Cloud Storage.
Here's How I Manage My Photos and Videos Without It.
4 Defiant Broadcom calls for tech to go back
where it belongs: On-premises.
5 Things You Should Never Keep In Cloud Storage.
is existence of so many different languages causing
questioning for necessity and cost reasons
outside the computing industry?
AI Overview
Yes, the existence of many different human
languages raises questions about their
necessity and cost outside of the computing
industry. This questioning is often balanced
against the immense cultural and
cognitive benefits of linguistic diversity.
Here is an overview of the challenges and
benefits associated with the multiplicity of
human languages.
Challenges and costs of language diversity
Economic costs:
...
Social and relational costs:
...
Arguments for the necessity and value of
language diversity
...
In conclusion, the questioning of linguistic
diversity often stems from the clear and
measurable economic and practical costs,
particularly in a globalized world. However,
this perspective often overlooks the profound,
long-term cultural, social, and cognitive benefits.
Arguments about the necessity of so many
languages are part of an ongoing debate between
the desire for global efficiency through
standardization and the desire to preserve
the richness and diversity of human culture.
who maintains sql?
AI Overview
SQL (Structured Query Language) as a standard
is maintained by ISO/IEC JTC 1, Information
technology, Subcommittee SC 32, Data
management and interchange. This international
body is responsible for developing and maintaining
the official SQL standard, which provides a common
set of syntax and features for relational database
management systems.
While the standard is maintained by ISO/IEC, specific
implementations and dialects of SQL are maintained
by the vendors and communities that develop them.
For example:
Microsoft:
...
...
The PostgreSQL Global Development Group:
...
Oracle:
6 things you need to know to untangle the
USB Power Delivery charging mess.Emily Blunt among Hollywood stars outraged over
'AI actor' Tilly Norwood.
____In a new era of climate disaster, a tiny, resilientTry 7.
mountain village in New Mexico is teaching the world how to adapt.
Substation Installed at Ørsteds New US
Offshore Wind Farm Wind Farm Update.
Point Beach Nuclear Powerplant Reactor Licenses Renewed.
US added more coal capacity than wind in July: FERC.
Exxon to cut 2,000 jobs in restructuring
hitting Canada and EU.
Monrday September 29 15:34
____Python: An Experienced Developers Grudging Guide____
To A Necessary Evil in the Age of AI.
AI Coding Is Massively Overhyped, Report .
Oracles $317B cloud revenue forecast, Nvidia to pay
$1.5B to rent back its own chips and steps back from
cloud effort to compete with AWS: key Cloud updates.
Meet the rich retired boomers who are now
ultra-frugal because they are scared of going
brokeeven after saving for decades.
This 2 TB PCIe 5.0 SSD with speeds up to
10,000 MB/s is only fractionally more than
its slower PCIe 4.0 equivalent right now.RISC-V With Linux 6.18 Brings Support
For MIPS Vendor Extensions.
____
Mini Laptop Needs Custom Kernel.____
Top 10 Local LLMs (2025): Context Windows,
VRAM Targets, and Licenses Compared.
how many lines of code does ) Meta Llama 3.1-8B contain?
AI Overview
It is not possible to provide a definitive number of lines
of code for Meta Llama 3.1-8B because large language
models like Llama are primarily defined by their vast
network of parameters, not a human-written
codebase.
Here's a breakdown of why this question is difficult to
answer and what metrics are relevant for understanding
the model:
how many lines of code does DeepSeek-R1-Distill-Qwen-7B
contain?
AI Overview
It is not possible to provide a specific number for the lines
of code in DeepSeek-R1-Distill-Qwen-7B for several reasons:
how many lines of code does Google Gemma 2-9B / 27B
contain?
AI Overview
It is not possible to quantify the exact number of lines
of code in Google's Gemma 2-9B and 27B models for
several key reasons:
are llms operated as a subscription service?
AI Overview
Yes, many large language models (LLMs) are operated
as a subscription service, though this is not the only
way to use them. The availability of both paid, proprietary
models and free, open-source models means users can
choose the option that best fits their needs for privacy,
cost, and control.
Proprietary subscription services
...
Hybrid approaches
Organizations often use a hybrid approach. This
combines both paid and open-source models.
For example, a company might use a
commercial LLM for general tasks. It could
use a fine-tuned, self-hosted open-source
model for highly specialized, domain-specific tasks.
do llms operated us cloud computing?
AI Overview
Yes, large language models (LLMs) heavily
rely on cloud computing for their operation.
The immense computational power needed
for both training and serving LLMs makes
cloud infrastructure, often provided by
major US-based companies, the most
practical and scalable solution.
The primary uses for LLMs on cloud
computing.
is cloud computing a subset of a data center?
AI Overview
No, cloud computing is not a subset of a data
center; rather, a data center is the physical
foundation that makes cloud computing possible.
A simpler way to think of the relationship is that the
"cloud" is the service, and a data center is the
physical facility that houses the hardware
which provides the service.
Cloud computing versus data center.
Can you trust cloud storage services in 2025?
My verdict after testing fan favorites.
$700M data center project coming to
Temple, raising hopes and questions.Medusa Ransomware Claims Comcast Data Breach,
Demands $1.2M.
JLR to resume some manufacturing in coming
days after cyber-attack.
____Everyone's left saying the same thing as $2,200,000,000Try 2.
solar farm in California desert is switched off for 'not
serving its purpose.
Sunrday September 28 10:52
____A zero-water, zero-emissions, off-grid AI data center sounds like____
science fiction, but it's actually real and already running.Stop Paying for Cloud Storage and
Carry 1TB in Your Pocket Instead.
Seagate Sells 1GB for 1 Cent, Now You Can Get Its 24TB
External Hard Drive for Pennies on the Dollar.
____Python developers are embracing type hints (pyrefly.org).
how many lines of code does python contain in which languages?
AI Overview
The core CPython interpreter, which is the most common
implementation of Python, is primarily written in C. This
allows Python to be highly portable and run on various
operating systems.
While the standard library that
comes with Python contains a significant amount of
Python code, the underlying interpreter itself is
largely written in C.
Regarding the number of lines of code, the entire Python
standard library is estimated to be around two-thirds of
a million lines of code, spread across thousands of files.
Individual Python projects can vary greatly in size, from
a few hundred lines for a small script to millions of lines
for large-scale applications. For example, some large
projects have been reported to contain hundreds of
thousands or even millions of lines of Python code.
Is python a bytecode technology?
AI Overview
Yes, Python utilizes bytecode as an intermediary
representation during its execution process.
When you run a Python program, the source code
is first compiled into bytecode, which is a low-level,
platform-independent set of instructions. This
bytecode is then executed by the Python Virtual
Machine (PVM). Here's a breakdown:
Source Code:
You write your Python program in a .py file.
Compilation to Bytecode: When you run the
program, the Python interpreter translates
the source code into bytecode. This bytecode
is typically saved in .pyc files within a
__pycache__ directory for faster loading in
subsequent runs.
Execution by PVM: The
Python Virtual Machine (PVM) then reads
and executes these bytecode instructions.
This process offers benefits such as portability
(bytecode can run on different platforms)
and performance optimization (skipping
the parsing and compilation steps on
subsequent runs).
____Are Rooftop Solar Panels the Solution toTry 2.
Americas Growing Energy Crisis?.
Saturday September 27 18:06
____
whe is sollar 10 awg hand crimler preferable
to a ratcheting crimper?
AI Overview
A 10 AWG solar hand crimper is preferable to a ratcheting
crimper for small, occasional jobs where budget and simplicity
are the primary concerns. However, for most solar
applications, a ratcheting crimper is the recommended
tool due to its reliability and superior crimp quality.
When a simple hand crimper is preferable
Why a ratcheting crimper is generally better.
____It was supposed to be a park. Instead, this property
in Taylor is being turned into a data center.
I tried Google Drive, OneDrive, Dropbox, and Nextcloud
for a month, and here's my verdict.
Trump has vowed to make coal king again. Hows it going?.
Linux 6.18 Landing Patch For Old AMD Bulldozer
CPUs With XOP Instruction Set.
____AMDs Newest Patent Brings a Gigantic Boost to Memory____
Performance By a Multi-Chip DRAM Approach;
Immensely Benefitting APUs As Well.Ubutu 25.10's Only Supported RISC-V Platform:____
QEMU Virtualization.
You can use a Raspberry Pi as a decent home server.stm engineer commented that it is necessary to implement____
64-bit arithmetic in hardware. Is that engineer correct?
AI Overview
That statement is generally correct for modern
computing systems, which require 64-bit hardware
to achieve optimal performance and address large
amounts of memory. While it is technically possible
to perform 64-bit arithmetic in software on a 32-bit
processor, doing so is far slower and less efficient.
The need for 64-bit hardware depends on the
application's performance and memory requirements.
Why 64-bit hardware is necessary
When hardware-level 64-bit support is not needed
In short, while a 64-bit hardware implementation is standard
for modern, high-performance systems and is necessary for
any application requiring more than 4GB of RAM, simpler
systems can still operate effectively without it. The "
STM engineer" is correct from the perspective of
modern, resource-intensive engineering tasks, but
not all computing requires this advanced capability.Prompt injection and a $5 domain trick
Salesforce Agentforce into leaking sales.____ Groundbreaking study shows how solar panels age after 30 years of use: ''Try 3.
It's an important message to the photovoltaic industry.
Higher Electricity Prices Arent All Good for Utilities.
Thursday September 25 07:54
____Microsoft forced to make Windows 10 extended
security updates truly free in Europe.
Two annoying Windows 11 bugs have finally been
fixed and it only took Microsoft a year.
How One Bad Password Ended a 158-Year-Old Business.
US Navy: I can't quit you, Azure.
How LLMs Work: Top 10 Executive-Level Questions.
____Best Buy Lays Off Geek Squad Team Members
Latest Job Cuts.
i____ US to convert retired coal mine into 350-megawattTry 3.
nuclear fusion power plant.
does commercial unclear fusion work yet?
AI Overview
What's fueling the commercial fusion hype? - Bulletin of
the ... No, commercial nuclear fusion does not work yet;
commercial-scale fusion power plants capable of producing
net energy are still a theoretical and technical challenge, with
most experts and public facilities expecting it to be decades away.
While many private companies and large international projects
like ITER are making progress and have achieved
breakthroughs like net energy gain in experimental
settings, significant hurdles remain, including sustained
reactions, tritium recycling, and building a commercially
viable system.
Why commercial fusion isn't here yet:
Is nuclear fusion for real this time? These utilities think so.
Windmill: China tests worlds first megawatt-level
airship to capture high winds.
Wednesday September 24 08:51
____DuckyPad Pro 20-key ESP32-S3 macropad supports
up to 3700+ macros using duckyScript language.
Top Programming Languages 2025.
____
who wrote the clang compiler abd how was it funded?____
AI Overview
The Clang compiler was primarily created by Chris Lattner,
who also initiated the LLVM compiler infrastructure project.
The funding for Clang and LLVM was significantly provided by
Apple Inc. Apple's interest stemmed from a desire to move
away from the GPL-licensed GCC compiler, which presented
licensing and integration challenges with Apple's development
tools and Objective-C focus. Apple hired Chris Lattner and heavily
sponsored the development of Clang and LLVM to serve as a
key component in their development stack, particularly for
Objective-C and later Swift.Open Source Infrastructure is Breaking Down Due to
Corporate Freeloading.
____Uranium Energy Corp Files Fiscal 2025 Annual Report..Try 3.
Tuesday September 23 07:55
____how many computer companies use____
open system boot architecture?.
AI Overview
It is impossible to provide an exact number of computer
companies that use open system boot architecture
because the term encompasses a wide range of
hardware and software components used across
different types of devices. While most companies rely
on a combination of open and proprietary technologies,
certain firms and specific product lines are known for
their commitment to open-source booting.
"Open
system boot architecture" can refer to several
different technologies:
...
The mixed reality of booting
The reality is that most hardware uses a combination
of open and proprietary code. A standard consumer PC,
for example, will use a proprietary UEFI implementation,
but it will almost always run an operating system that
uses an open-source bootloader like GRUB (for Linux)
or a proprietary one like the Windows Boot Manager.
In the broader computing landscape, the use of open
standards, like USB, is widespread, but a company's
architecture still often contains proprietary elements.
does apple use forth-base open source boot archiecture?
AI Overview
No, Apple does not use the "fourth-base open source boot
architecture". The search results indicate that Apple has its
own proprietary and highly secure boot process for its devices,
both for Apple silicon and Intel-based Macs. The name "
fourth-base" does not correspond to any known boot
architecture.
Apple's boot process uses these components:
does apple "fourth-base open source boot
architecture"use an interactiive assembler?. :)
does apple open source boot architecture use an
interactive assembler?
I Overview
Apple's modern open-source boot architecture, part
of the Darwin operating system, does not use an
interactive assembler for its normal boot process.
The bootloaders, including the open-source
components, are compiled from source code
using standard development tools, like the
LLVM toolchain, before being loaded.
While an interactive assembler is not part of the
standard boot architecture, here's a closer
look at the components and how they
operate.
Boot process and assemblers
,,,
Modern compilation toolchain: For Apple silicon (ARM64),
the LLVM Clang assemble ...
...
Legacy systems: Very old Apple systems, like the
Apple II, had a machine language monitor that included
a "mini-assembler" for interactively writing and testing
assembly code. This capability is from a different era of
computing and is not present in modern Mac or iOS
boot architectures.A drone flyover above Copenhagen Airport prompts
concerns that Russia was behind it.
...
____Electricity Markets Arent Working Anymore.Try 1.
Monday September 22 14:56
____
did the sun forth programmer's who wrote the boot software
use a forth assembler or a batch assembler?
AI Overview
The Forth boot software used on Sun workstations included its own
interactive assembler. This allowed for a highly flexible
development process where programmers could test and
assemble code "live" within the Forth environment, a
workflow that is distinct from using a traditional batch
assembler.
Here is how the Forth-based system worked:
ntegrated environment: Forth is a stack-oriented language
that functions as an interactive integrated development
environment (IDE). It blurs the line between the
language, the operating system, and the compiler.
Interactive development: This meant programmers
could define new "words" (functions) and test them i
mmediately. This included defining CODE words, which
are written in the target machine's
native assembly language.
pen Firmware (OBP): Sun's boot software, called
OpenBoot Prom (OBP) and later
Open Firmware, was based on Forth. It was not
a simple bootloader but a powerful environment with
a Forth interpreter. The "ok" prompt: This environment
was accessible to users at the "ok" prompt, allowing for
low-level diagnostic and debugging tasks. A user could
drop into the Forth interpreter and even write and
execute assembly code.
Close to the hardware: This interactive process
allowed developers to work very "close to the
metal," which is crucial for hardware development
and testing. Forth's design makes it great for
exploring and bringing up new hardware.
____A Major Trading Firm Has Open-Sourced The____
Latest Linux File-System: TernFS.EUs cyber agency blames ransomware as Euro
airport check-in chaos continues.
____Poland at a Crossroads: Nuclear Delays vs Renewable Success.Try 7.
Ranked: The Top Countries by Wind Power Capacity in 2024.
Grid line back on ryzen7 70o0U.
Missing jpgs.
Sunday September 21 16:39
____He got an entire country running on clean energy.
Can he do it again?.
____Fast and furious': H-1B workers
abroad race to US as Trump order
sparks dismay, confusion.
Try 3.
Post from $120 Asus N5000 4.64 GB running Windows 11,""Hotmetal with grid lines. :)
____
Saturrday September 29 15:40
____
is big tech the man behind the curtain in ai?
AI Overview
It is widely argued that Big Tech companies are the key
forces behind AI development, having amassed the
necessary resources, data, and talent to dominate
the AI ecosystem. Through significant financial
investments and strategic partnerships, these
companies exert immense influence, raising
concerns about market control, ethics, and
the future direction of the technology.
Major tech companies control the AI supply chain.
Companies like Microsoft, Google (Alphabet), Amazon,
and Meta influence the entire AI supply chain, from
infrastructure to applications. This gives them a
competitive advantage. ajor tech companies
control the AI supply chain. Companies like
Microsoft, Google (Alphabet), Amazon, and
Meta influence the entire AI supply chain, from
infrastructure to applications. This gives them
a competitive advantage.
Infrastructure: A few cloud providers control the
infrastructure for training and deploying large AI
models: Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud Platform. High costs
and vertical integration make it hard for
new companies to compete.
___Big Tech and finance companies are telling H-1B____
employees to get to the US in under 24 hours.
Big Tech companies, foreign governments
scramble after Trump slaps $100,000 fee on H-1B visas.
Microsoft announces " most powerful
data center" in latest billion-dollar AI spending splurge. ____Rust 1.90 Released With LLD Default On Linux
x86_64 While macOS x86_64 Demoted.Try 1.
Grid lines disappeared 6n ryen 7 5800HS.
Grid libnes on N60006/.
.
.
FriIday September 19 17:13
____Microsoft boosts Wisconsin data center spending to $7 billion.____
Utility company sparks outrage with proposal to pass
.$1.7 billion cost on to customers here's what's happening.
can ai be trusted?
AI Overview
AI can be trusted to a limited extent and only in specific
contexts, but it's crucial to understand its limitations and
potential risks, such as bias, inaccuracy, and lack of
explainability. Trust in AI is built through "trustworthy AI"
frameworks that emphasize characteristics like reliability,
transparency, accountability, and fairness. However,
achieving this requires ongoing development, rigorous
testing, and a conscious commitment from developers
and users to ensure AI is safe, responsible, and aligned
with human values.
Limitations and Risks:
Bias and Inaccuracy:
...
Opaque "Black Box"
...
Lack of Human Qualities:
...
Overconfidence:
AI Overview Yes,
"unrewarded genius is almost a proverb" is a statement
made by U.S. President Calvin Coolidge, and it functions
as a proverb by offering a timeless truth about the
importance of persistence and action to achieve success.
Coolidge's full quote, from his speech about the power of
persistence, explains that even genius is common among
unsuccessful people, and that only persistence and
determination can be truly omnipotent.
Analysis
of the quote:
"Unrewarded genius is almost a proverb": This phrase
itself uses the concept of a proverb to describe the
common outcome of unapplied talent. It highlights that
brilliance alone is not enough for success.
Context: Coolidge's point was that in the absence of
effort and persistence, great ideas and abilities often
remain unfulfilled and lead to nothing.
Core Message: The statement emphasizes that talent
is not a guarantee of success, and persistence is a
more crucial factor in achieving goals and solving problems.what did Java inverter mean by c and c++ absolutely owned the whole universe?
AI Overview
C and C++ were the ubiquitous, industry-standard languages.
They were used for everything from operating systems like
Unix to factory process-control systems, elevators, and video
equipment. There was no other realistic choice for systems-level
and embedded programming.
C and C++ were the ubiquitous, industry-standard languages.
They were used for everything from operating systems like
Unix to factory process-control systems, elevators, and video
equipment. There was no other realistic choice for
systems-level and embedded programming.
Developers were locked into the language. At the time, if
you were a programmer, you were most likely writing in
C or C++, and your entire toolchain, training, and
ecosystem were built around it.
The tools and languages were inadequate for the future.
Gosling's team had a vision for a world of networked
"smart" applianceswhat is now called the Internet of
Things (IoT). However, C and C++ were ill-suited for this,
suffering from issues like memory management problems
and a lack of portability.
The problems with C and C++ that Java aimed to solve
Gosling's team created Java not to replace C/C++,
but to address the specific problems they posed for a
new generation of networked devices.
....
o, while C and C++ had historically dominated all
programming, Java's design was a direct response
to their limitations for the future of networked and
9portable computing.
Try 1.
Hotmetal 6 running on on Asus ryzen 7 5800HS Windows 11 laptop ... in a motel,
Issued with 11. :(
Grid lines with Hotmetal. :)
html source code degugging required.
Thursday September 18 08:06
____Microsoft Warns 200 Million Windows Users____
Do Not Update Your PC.
do sbc vendors always implement their
interface software on windows 11?
AI Overview
No, Session Border Controller (SBC) vendors do
not always implement their interface software
on Windows 11. SBC management and interfaces
are accessible through a variety of platforms and
methods, including web-based graphical user
interfaces (GUIs), virtualized deployments,
and cloud-native solutions.
Common
approaches used by SBC vendors include:
While some vendors, particularly for specific
applications like automotive point-of-sale
systems, have offered Windows-based
management systems, this is not a
universal standard for enterprise or
carrier-grade SBCs. The industry has
largely moved toward more flexible
and scalable software and
cloud-based management solutions.why do solar companies appear yo go out of business fresquently?...
AI Overview
Solar companies appear to go out of business frequently due to a
combination of economic factors, such as high interest rates and
reduced incentives, alongside aggressive and unsustainable business
practices like poor sales tactics and outsourced installations that
prioritize short-term profit over long-term quality and customer
support. Intense competition, high operating costs, complex
regulations, and labor shortages also contribute to instability,
especially for smaller businesses struggling to adapt to market
shifts.
Economic Challenges
Rising Interest Rates:
...
Changes in Incentives:
Aggressive and Unsustainable Business Practices
Poor Sales Tactics:
...|
Outsourced and Poor-Quality Installations:
...
Focus on Short-Term Profits:
Industry-Specific Pressures
Intense Competition:
...
Complex Regulations and Policies:
Labor Shortages:
...
High Customer Expectations:____ GE Vernova turbine blade bent in half atTry 1.
Iberdrola wind farm.
Eversource faces financial risk over Trump
administrations offshore wind stop-work order: Fitch.
New Mexicos Billion-Dollar Oilfield Orphans.
Perovskite Solar Cell Crystals See The Invisible.
Proposed solar farm sparks heated opposition.
Microsoft turns to gas generators to keep
Mexico data center running.
Wednesday September 17 12:46
____
Windows 10 1909 Lenovo ryzen 5 550U processes jpgs correcty.
All charge/load controllers about $10.
Two thought to be broken ... but all configured correctly.
All have non-volitatile memory to preserve settable settings. :)__
Small 12 V 5 mAh battery useful for setup ... compared to 12 V 35 aAh huge battery oroginally used.
Blue wire nut connects 14 AWG to 19 AWG battery cable/conntecdtor.
____is it better from a cost and maintenance standpoint
just to use gcc c for both high-level assembler/machine
code than high-level and batch assembler in 2025?
AI Overview
Using C with inline GCC assembly is almost always
superior in terms of cost and maintenance compared
to using separate, full-fledged batch assembly in 2025.
The use of pure assembly is now limited to highly
specialized, low-level tasks where extreme performance
or direct hardware access is required, such as in some
parts of an operating system kernel or an
embedded bootloader.
Development cost
Faster development time:
mproved readability:
...
Increased portability:
Maintenance cost
...
Access to modern features:
...
Higher programmer productivity:
...
Easier to find developers:
...
obust tooling:
____which computer languages are also single
task interactive operating systems?
...
Compiler optimizations:
Hand-written vs. compiler-generated:
Targeted optimization:
When to use separate batch assembly.
AI Overview
No programming language is also a single-task interactive
operating system; instead, operating systems are built
using programming languages like C, C++, and
Assembly, which provide the low-level control
necessary to manage hardware and software
resources. While languages like Python, Java,
and JavaScript are used for various applications,
they are not operating systems themselves but
rather tools that run on top of an operating
system to perform tasks.
How Languages and Operating Systems Relate
In summary You cannot think of a programming
language as an operating system, but rather it
is a component used to create operating systems
and other software applications.
____
Samsung a23 cell phone camera recovered!
Windows 10 22H2 pggs still broken.
____
how can i best measure the voltage and current
output from a 100 w solar panel every minute?
AI Overview
To best measure the voltage and current of a solar panel
every minute, use a digital multimeter with a clamp
attachment for current and a specialized solar power
meter. First, connect the voltage leads in parallel to
the panel terminals, record the voltage, then set the
meter to measure DC current. For non-contact current
measurement, use a clamp meter. Repeat this process
every minute, ensuring the panel is exposed to
consistent sunlight.
Prepare Your Setup"......
...
3. Measure Current (A) :(
Load Conditions: Measuring open-circuit voltage
(no load) and short-circuit current provides a baseline,
but the actual power output under load will vary
with the connected load. :)
____what is The Safety Factor in engineering?____
AI Overview
In engineering, the safety factor is the ratio of a system's
maximum capacity to its expected load or demand,
quantifying how much stronger a component is than
it needs to be to ensure reliability and prevent failure
from unexpected events like material imperfections
or overloading. A safety factor greater than one
indicates that the design can withstand more load
than anticipated, ensuring structural integrity and
safety over the product's lifetime.
How it Works
Capacity vs. Demand:
Calculation:
Why It's Important
Uncertainty and Variation:
Longevity:
Factors Influencing the Safety Factor
Material Properties:
Application:
Environmental Conditions:
Importance of the Structure:Linux Patches Posted For Enabling The
Tenstorrent Blackhole SoC.
Oracle Releases Java 25.
which computer languages are supported by
large corporations?
AI Overview
Large corporations use a diverse portfolio of
programming languages based on the
application's specific needs, such as
performance, platform compatibility,
and scale. While no single language
dominates, Python, Java, and JavaScript
are consistently among the most popular.
Popular languages across industries
Python
Java
JavaScript and TypeScript
C#
C and C+
SQL
Go (Golang): Developed by Google
Rust:
Swift and Kotlin:
PHP:
The big picture
A large corporations technology stack is rarely
monolithic. It's common for a company to use
different languages and technologies across its
various teams and products. The choice of
language often depends on factors such as:
Legacy systems:____Google nukes 224 Android malware apps behind
massive ad fraud campaign.____ US in Talks to Set Up $5 Billion Fund forTry 1.
Critical Mineral Deals.
Pine Ridge Uranium Project Delivers Excellent
Initial Drill Results.
Al Gore on Chinas climate rise: I would not
have seen this coming.
The US Offshore Wind Industry Is Scheming
For A Comeback.
Generators Are Expensive. But Is Spending
Even More on an In.verter Model a
Better Investment?
Microsoft dsiruption plioy?
Tuesday September 16 18:57
____Consumer Reports asks Microsoft to keep supporting Windows 10.____
US Looks to Boost Uranium Reserves for Nuclear Power.
Which Countries Buy the Most U.S. Coal?.Off To The Races With ESP32 And EInk.____5 reasons high-end CPUs have become overkill in 2025.""
A.I.s Prophet of Doom Wants to Shut It All Down.
Open source Cloud Hypervisor adds (maybe
futile) no-AI-code policy.
how much power do esp32 processors draw?
AI Overview
Insight Into ESP32 Sleep Modes & Their Power Consumption
ESP32 power consumption varies significantly with operating
mode, from a few microamps (µA) in Deep Sleep to hundreds
of milliamps (mA) during active WiFi transmission, which is the
most power-intensive function. Active mode consumes
95240 mA, while Modem-Sleep mode uses 2068 mA,
and Deep Sleep can draw as little as 10 µA to 150 µA. To
optimize power, you should disable unused features and
utilize the ESP32's sleep modes.
Active Mode (WiFi/BLE active)
Deep Sleep Mode
Factors Affecting Power Draw
How to Optimize ESP32 Power Consumption.
AI-controlled drone swarms set to transform
combat on battlefield. ____Ubuntu 25.10's Rust Coreutils Transition Has____
Uncovered Performance Shortcomings.
Does computer programming[aka software
engineering] lead to a sedentary lifestyle?
AI Overview
Yes, computer programming and software engineering
are widely associated with a sedentary lifestyle. The
nature of the work requires long, focused hours
spent sitting at a computer, often with minimal
physical activity. However, a sedentary lifestyle
is not an inevitable outcome and can be
proactively mitigated.
Reasons for a sedentary lifestyle
Prolonged sitting:
...
Minimal physical activity:
...
intense focus:
...
Stress and poor eating habits:
....
rregular sleep patterns:
Associated health risks.
are software company investments risky?
AI Overview
Yes, investments in software companies are
inherently risky, though the level of risk varies
significantly depending on the company's stage,
competitive position, and financial health. For
instance, a small, early-stage SaaS startup is
much riskier than a large, established software
company like Microsoft or Oracle.
Risks common to all software companies
echnological obsolescence.
...
Cybersecurity threats.
...
Dependence on key talent.
...
Regulatory and compliance risks.
Higher risks for software startups.
Microsoft Raises Quarterly Dividend by 9.6%.
What do people actually use ChatGPT for? OpenAI
provides some numbers.
15 ransomware gangs go dark to enjoy '
golden parachutes'.____ Charted: Top Countries by Energy ConsumptionTry 1.
Per Capita in 2024.
Czech nuclear plant to add 213-foot monster
turbine generators with Mach 2 blades.
Offshore wind was supposed to save power-starved
New England. Trump blew up that plan.
Resized using Paint ... soft of.
Paint only allowed storing as .png.
Monday September 15 12:42
____
are reports that an increasing number of software
develpers are leaving the profession correct?
AI Overview
No, reports of a mass exodus of software developers
leaving the profession are largely incorrect, though
the tech job market has experienced significant volatility
since 2022. While high turnover rates are typical for the
industry, the narrative is more complex than a simple
"brain drain".
Many developers are not leaving the
industry entirely but are instead:
Pivoting to freelance or entrepreneurship
....
Shifting to a different career within the tech ecosystem
....
Seeking work in traditional non-tech industries
Industry downturn and AI disruption
Overhiring and layoffs
...
Artificial intelligence:
Burnout and workload:
Shift in work arrangements:
geism
Bias against older developers:
Long-term outlook and market adjustments
While the market has become more selective,
it is not collapsing. Projections from the Bureau
of Labor Statistics (BLS) still forecast a robust
long-term growth for software development
roles. The market is not declining so much
as it is rebalancing and evolving, favoring
different skills and levels of experience.
what are the causes of so many Ubuntu updates?
AI Overview
Ubuntu releases frequent updates to fix bugs, address
critical security vulnerabilities, and add support for new
hardware, driven by the open-source nature of many
software components and the coordination required to
package them into a cohesive operating system. The
system is designed to improve stability and safety,
incorporating phased updates to catch issues before
they affect all users and automatically installing
important security patches without interrupting the
user experience.
Reasons for Frequent Updates.
____What are data centers and why do they matter?.
In Australia, a data centre boom is built on vague
water plans.
CoreWeave, Nvidia sign $6.3 billion cloud
computing capacity order.
____Why does the arduino ide appear to work___
better with windows 11 than ubuntu?
AI Overview
The perception that the Arduino IDE "works
better" on Windows 11 than on Ubuntu is
primarily due to the underlying differences
between the two operating systems, p
articularly in how they handle user
permissions and drivers. While the IDE
software itself is nearly identical across
platforms, the out-of-the-box experience
on Windows is often smoother for
beginners because the OS manages
many of these requirements automatically.
Here are the specific reasons you might
experience better performance and reliability on Windows:
Driver and serial port handling
...
Installation process
...
Sandboxing and security
....
Conflicting software
...
Other minor issues.Linux 6.17-rc6 Released With VMSCAPE Mitigation,____
FLYDIGI APEX 5 Support & Fixes.
AI Overview
Linux Kernel 6.17 RC5 Released: What's New and
Linus ... There isn't a single entity "funding" a
specific Linux kernel release like 6.17-rc6; rather,
the Linux kernel is developed by a large community
of volunteers and corporate-sponsored developers.
Funding for the overall kernel project and its
stewardship is provided by the Linux Foundation,
which receives financial support from its
corporate members, but the specific development
of a new kernel version is funded by the various
companies that employ the developers
contributing to it, such as Google, Intel, and Red Hat.
How Linux Kernel Development is Funded
How a Release Gets "Funding"
There isn't a specific fundraising event for each
kernel version.
The development effort for Linux 6.17-rc6,
like all other versions, is a collaborative effort
where the contributions from developers
employed by many different companies and
volunteer contributors are integrated.
Long-term unemployment at post-pandemic
high, straining workers and economy.Retro X86 With 486Tang.___
what is a 486tang
AI Overview
A 486tang is a field-programmable gate array (FPGA)
project that brings the classic 486 PC experience to a
credit-card-sized board. The project is a port of the ao486
MiSTer core, adapted to run on the Sipeed Tang Console
138K FPGA.
Key features of the 486tang include:
Performance: It provides the computing power of roughly
a 486SX-20 processor, without the math coprocessor (FPU).
Operating system: It has solid compatibility with DOS 6.22
and can run era-appropriate applications like Turbo C and
MS Word for DOS.
Multimedia: The project includes VGA graphics and Sound
Blaster audio capabilities.
Storage: It emulates IDE storage, with disk access
provided via an SD card.
Gaming: It is well-suited for playing classic DOS games from
around 19921993 and earlier.
This retrocomputing project was made possible by porting
the ao486 core, which was originally developed for the
MiSTer platform, to a non-Altera FPGA for the first time.
It is a significant accomplishment in the world of
retrocomputing and FPGA development.OpenAI Realizes It Made a Terrible Mistake.
Rolling Stone owner Penske Media sues
Google over AI summaries.Try 1.
Sunday September 14 14 16:24
____I built a $5 ESP32-powered Wi-Fi scanner____
and honeypot in just a few hours.AI engineers are being deployed as consultants
and getting paid $900 per hour.
what is the difference between a software engineer
and and a computer programmer?
AI Overview
A computer programmer writes and modifies code to create
software programs, focusing on a specific aspect of the
development process, while a software engineer takes a
broader, higher-level approach, designing the overall
architecture, overseeing the entire software development
lifecycle (SDLC), and ensuring the final product meets both
technical and business requirements. Think of a
programmer as a skilled builder who constructs the
code from blueprints, and the software engineer as
the architect who designs those blueprints.
Computer Programmer
...
Software Engineer
62 Patches Posted For Stripping Classic Initrd Support
From The Linux Kernel.
TechnologyThe Worlds Largest Cloud Providers,
Ranked by Market Share.
Data centers will take up 90% of Georgia's new energy.
What happens to our bills?.
Intel Loses One Of Its USB4 / Thunderbolt
Linux Driver Maintainers.
What Is The Fourier Transform?.
____is time spent trying to deal with microsoft
windows 10 and 11 increasing?
AI Overview
User complaints and anecdotal evidence
suggest that the time users spend dealing with Windows
10 and 11 is increasing due to performance slowdowns,
persistent issues with updates, and unwanted feature
changes. However, reliable quantitative data is not
publicly available to confirm an overall increase.
Factors contributing to increased user effort include:
Performance degradation
...
ersistent update problems:
...
Interface and customization changes:
..
...
Privacy and telemetry concerns:
...
Hardware and software compatibility:
...
Increased bloatware:
Comparison to older versions
Compared to earlier versions like Windows 7,
users of Windows 10 and 11 appear to spend
more time dealing with system maintenance
and troubleshooting. Windows 7 required
fewer resources, featured less aggressive
data collection, and provided greater user
control over updates. This has created
a sense of increasing complexity and
required time investment for users on
newer Windows versions.
____what is the best way to measure power consumptio...
in a esp32 system?
AI Overview
The best way to measure ESP32 power consumption involves using
a specialized device like a Joulescope or Power Profiler Kit II, which
provide high-resolution, wide dynamic range measurements of
current and voltage. These tools can capture rapid changes in current,
such as during deep-sleep and wake-up transitions, and require a
PC to visualize the resulting waveforms. Alternatively, you can use
development boards with headers to connect a power measurement
device, or if measuring AC power, use a CT clamp with a transformer.
does an oramge pi zero 2w run freertos?
AI Overview
No, the Orange Pi Zero 2W doesn't run FreeRTOS out of the box,
as it's a full-featured Linux-based single-board computer running
operating systems like Android and Ubuntu, not a microcontroller
where FreeRTOS is typically used. You would need to port the
FreeRTOS kernel to the board's processor, which is a complex task
usually suited for smaller, cheaper devices like the Raspberry Pi Pico.
Why FreeRTOS isn't the standard OS for Orange Pi Zero 2W
When to consider FreeRTOS
Microcontrollers:
If your project requires deep control over hardware, low-level
task management, and precise timing, FreeRTOS is an
excellent choice for a microcontroller like the Raspberry Pi Pico.
Bare-Metal Development: For simple, time-critical tasks
where you want to avoid the complexity and resource usage
of a full operating system.
can i write to a usb flash drive using freertos?
AI Overview
Yes, you can write to a USB flash drive using FreeRTOS,
but it requires implementing a USB Host stack, a Mass
Storage Class (MSC) driver, and a FAT filesystem driver
on your microcontroller. You will then use the driver APIs
provided by the microcontroller's SDK (e.g., for STM32)
or a third-party library to mount the filesystem and
perform file operations like opening, writing, and
closing files on the USB device.
Key Components Needed.
can a esp32 system write to a usb flash drive?
AI Overview
Yes, certain ESP32 systems, specifically the ESP32-S2
and ESP32-S3 chips, can write to a USB flash drive.
This functionality requires the ESP32 to act as a USB host,
which the original ESP32 chip does not support.
Requirements for writing to a USB flash drive
ESP32-S2 or ESP32-S3 chip:
...
Mass Storage Class (MSC) support:
...
AT file system support:
Correct wiring and power:
...
USB device mode:
Both the ESP32-S2 and S3 can also be configured
to act as a USB device, appearing as a flash drive
to a computer. However, this is the reverse of
writing to a flash drive and requires different firmware.
____China running out of rubbish to burn as waste power goes into overdrive.
Stop These Things Weekly Round Up: 14 September 2025.
First sailing nuclear reactor in history unveiled
It will produce 800 MW over this sea.
Try 2.
Saturday September 13 18:38
___
what was ibm tss. did it suceed?
AI Overview
IBM developed multiple products called TSS over the years,
but the most well-known is the Time Sharing
System (TSS/360), an early operating system from
the 1960s.
TSS/360: The time-sharing operating system.
are all computer languages maintainable,
what is going to happen to them?
AI Overview
Programming languages are not all equally maintainable,
and none will truly disappear in the foreseeable future.
The language landscape constantly evolves, driven by
new needs and technologies, but vast amounts of
existing code ensure older languages remain in use.
Maintainability varies by language design.
have some speculate a mc4 connector a a ploy by the
solar industry to generate repair business?
AI Overview
It is a widely shared concern that some cheap or improperly
installed MC4 connectors are unreliable and can fail, potentially
leading to fires and requiring repair. However, the notion that
the original MC4 connectors are deliberately designed to fail
as a ploy for repair business is a speculative claim not supported
by the evidence. The technology is standardized for reliability
and safety when used correctly.
Evidence supporting the unreliability of cheap connectors.
____ESP32 Hosts Functional Minecraft Server.
This super sleek ESP32 weather station looks good on any desk.
____How to Spot Malicious Two-Factor Authentication Prompts___
Hackers can get past 2FA if you're not careful.US electric grids under pressure from energy-hungry
data centers are changing strategy.
____5,600 MW rise from the desert Four-reactor giantTry 1.
now shaping a nations grid.
rump Admin Moves to Sink Maryland Offshore
Wind Farm Approval.
Powered down: After 2 years some of Maines
electric school buses remain parked.
Hotmetal 6.0 disappeared 9/112/25 on Lenovo ryzen 7 4700U. running 10 222H2.
Grid previously disappeared on ryzen 5 5500u runing 10 1909.
is wiindows 10 working worse and worse an illusion?
AI Overview
Whether the perception of Windows 10 degrading over time
is an illusion is complicated, but for most users, it's a very
real phenomenon caused by an accumulation of software
and data, rather than the operating system itself intentionally
decaying. The feeling of a system getting slower is not
imaginary and results from a combination of software
and hardware factors.
Software causes.
lLenovo ryen 5 3500U grid.
Friday September 12 2025 19:39
____
EnergyRanked: Electricity Use Per Capita in____
Major Global Economies.CISA fired up to chart new vision for CVE program.
____5 projects you can do for much cheaper____
with an ESP32 than a Raspberry Pi.How the United States Is Undoing the Post-9/11 Security
Architecture That Has Kept It Safe.
____who bulds counterfeit esp32 systems?
AI Overview
Major companies in the consumer electronics and
IoT industries often purchase ESP32-based products
from original module manufacturers like Espressif,
as well as a range of third-party vendors and
distributors. However, counterfeit versions,
or products mislabeled as genuine, often
originate from sellers and factories on large
e-commerce platforms like Alibaba and
AliExpress.
I=It is important to differentiate between
three different types of ESP32 products
available on the market:
Genuine: Products sold by the original
manufacturer, Espressif Systems.
Clones: Boards manufactured by third-party
companies that legally license and use
genuine ESP32 chips. Examples of reputable
clone manufacturers include Adafruit and
SparkFun.
Counterfeits: Boards made to deliberately
mislead customers into believing they
are purchasing a genuine or officially
certified product.
How counterfeit and mislabeled boards
are created
...
How to identify potential counterfeits
...
Risks of using counterfeit ESP32 products.
why are counterfeit espo32 systems built?
AI Overview
Counterfeit ESP32 systems are built for two
primary reasons: to maximize profit
through deception and to exploit global
supply chain weaknesses. The
counterfeiting takes different forms,
from selling entirely fake boards to r
epackaging unofficial modules with false
markings.
Financial gain
...
Supply chain vulnerabilities
...
Consequences for buyers.
Windows 11s September patch secretly
deletes two programs. Heres why.
US warns of hidden radios in solar-powered
highway systems, EV chargers at risk
Linux 6.18 Will Further Complicate Non-GPL
Out-Of-Tree File-Systems.
OpenAI Execs Are Extremely Upset.
Huntress's 'hilarious' attacker surveillance
splits infosec community.
Intel talent bleed continues as Xeon chip architect
heads for the escape hatch.
GCC Rust Compiler Continues Quest To
Compile The Linux Kernel Crate.
does espressif;s es-idf use llvm?
AI Overview
Yes, Espressif's ESP-IDF uses LLVM, though not always
for the final compilation. Its specific use depends on the
development workflow, such as for advanced language
server features or specific chip architectures.
Here is a breakdown of how ESP-IDF incorporates LLVM:
For tooling and editor support
LLVM-based Language Server:
Static analysis with Clang-Tidy:
Xtensa architecture support:
Separate toolchains for different architectures:
For build systems.
We are entering a golden age of robotics startups
and not just because of AI.
VirtualBox 7.2.2 fixes TPM, Windows on ARM
issues, and more.
Oracle (ORCL) Lands Major NATO Cloud Partnership.
Claude AI just became the ultimate work companion,
and it might tempt me to switch from ChatGPT.
Google quantum chip that peeked into
parallel universe reveals exotic matter.
How much water will the $165 billion data center
near El Paso use? Developers unveil figures
ahead of Doña Ana commissioners vote.
___California may help solar bloom where water runs dry.Try 1.
China breaks ground on unprecedented project
that could reshape global energy: 'Missing puzzle piece.
U.S. Wind accuses Trump administration of using
"political pressure" to halt Maryland turbine project.
The World Is Going Electric, With Or Without Us.
Now Is The Time For Leadership.
Giant 250-foot wind turbine collapses as locals hear
'almighty crack' in night.
Chinas surge pushes global wind toward fastest
growth ever.
Thursday September 10 2025 16:02
____ls llvm complex and obfuscated?
AI Overview
LLVM itself is not inherently obfuscated, but it is a complex
and powerful compiler infrastructure. Its modular design
and use of an Intermediate Representation (IR) make it
an ideal foundation for creating code obfuscation tools,
such as the open-source Obfuscator-LLVM (O-LLVM).
Complexity in LLVM's design
Steep learning curve: It is a massive project with millions
of lines of code. Understanding the core concepts and
APIs, like the llvm::Value, llvm::Type, and
module-pass-function-basic block hierarchy, requires
significant effort.
____what is the float voltage for a 12V 5Ah Home Alarm Battery?
AI Overview
The float voltage for a typical 12V 5Ah sealed lead-acid (SLA)
battery, commonly used in home alarm systems, is between
13.5 and 13.8 volts.
Important details about this float voltage:
AI Overview
what should the discharge reconnect voltage beforr a 12V 5Ah
Home Alarm Battery?
For a 12V 5Ah sealed lead-acid (SLA) or absorbed glass
mat (AGM) home alarm battery, the discharge reconnect
voltage should be between 12.6V and 12.8V. This is the
voltage level at which the charging system should
recognize that the battery is no longer being discharged
and can safely begin to be recharged.
Recommended voltage levels.
AI Overview
For a standard 12V 5Ah sealed lead-acid (SLA) battery,
the discharge stop voltage, or low-voltage cutoff
(LVC), should be 10.5V under load to prevent
damage and maximize battery life. For better
battery health, a higher cutoff voltage is
recommended.
Voltage levels for a 12V SLA battery Fully Charged
(at rest): 12.6V to 12.8V.
50% Discharged (at rest):
Around 12.2V. Discharging past 50% significantly
shortens the battery's lifespan.
Nominal Cutoff (under load): 10.5V. This is the
standard minimum voltage for a 12V lead-acid battery.
Dropping below this level during use risks irreversible
damage (sulfation).
do digital multimeter measures voltages, even at millivolt levels,
better than amp measurements?
AI Overview
Yes, a digital multimeter (DMM) generally measures voltages,
especially at millivolt levels, more accurately and reliably than
it measures current. This is primarily because voltage
measurements are non-intrusive, while current
measurements are inherently intrusive and can significantly
alter the circuit's behavior.
Why voltage measurement is superior.
Why current measurement is problematic.
____Baguette S3 ESP32-S3 board gets the breadboard-friendly crown.___
65F02 Is An FPGA 6502 With A Need For Speed.
LLVM 21.1.1 Ships A Variety Of Compiler Fixes.
which 10 AWG copper wire has less resistance per foot; stranded or solid?
AI Ovrview
olid 10 AWG copper wire has slightly less resistance per foot
than stranded 10 AWG copper wire due to the small air gaps
between the strands in stranded wire, which reduce the
amount of copper in the same overall cross-section.
While stranded wire is more flexible and preferred for
applications involving movement, solid wire offers a
lower voltage drop over long runs due to its lower DC
resistance.
Why Solid Wire Has Less Resistance.
what percent do lawyers contribute to the GDP?
AI Overview
The legal profession contributes 1.7% to the global GDP,
or approximately $1.6 trillion annually, according to a 2024
study by the International Bar Association (IBA). This figure
includes revenues from legal services, associated tax
contributions, and economic benefits from support
industries. For the United States specifically, data
from the Federal Reserve Bank of St. Louis (FRED)
indicates the legal sector's contribution to U.S. GDP
was around 1.3% in the period leading up to 2023,
though this share can fluctuate.Dead Internet Theory Lives: One Out of Three of You Is a Bot.
Microsofts AI Chief Says Machine Consciousness Is an Illusion.
____Small Modular Reactors and the Big Questions of Cost & Waste.Lead-cooled nuclear reactors promise safe, reliable energy
for merchant vessels.
Try 1.
Unable to resie.
Right click on image resulted in 'view' option. Now it demands selection of 3D Paint, Notepad,
... or go to Microsoft store.
This is Windows 10 22H2.
why does wiindow 10 22h2 now not show view option when image
right clicked as of 9/10/25?
AI Overview
Recent updates to Windows 10 22H2, particularly those rolled
out in 2025, have caused changes and issues with the right-click
context menu, often removing or altering the default "View" or
"Preview" options for images. This is not an isolated problem, but
rather a known bug that Microsoft has addressed in recent months.
Known cause: The updated Photos app
The primary cause of this issue is a buggy update to the built-in
Microsoft Photos app. The bug affects the Photos shell extension,
which is responsible for adding the "Open" or "Preview" options
to the context menu. Instead of appearing correctly, the options
may disappear, move to an incorrect location in the menu,
or fail to work properly.
How to fix the issue
Here are several methods you can use to restore the correct
right-click functionality:
Method 1: Reset the Photos app This is the most effective
and direct solution for many users.
Navigate to Settings > Apps > Apps & features. Find Microsoft
Photos in the list of apps.
Click on the Photos entry and select Advanced options.
Scroll down and click the Reset button. This will terminate
the app and reset it to its default settings, which often
resolves the context menu bu
Method 2: Use the legacy Photos app If resetting the
app doesn't work, switching to the older Photos Legacy
app is another solution.
Download the Photos Legacy app from the Microsoft
Store. Once installed, right-click an image file and select
Open with >
Choose another app. Choose Photos Legacy and check
the box that says "Always use this app to open..." your image files.
Method 3: Restart Windows E
his can help if the context menu cache is corrupted.
Open the Task Manager by pressing Ctrl + Shift + Esc.
In the "Processes" tab, find Windows Explorer.
Right-click
on Windows Explorer and select Restart.
Method 4: Perform a system restore
If the issue began immediately after a specific
Windows Update and other fixes don't work, you
can roll your system back to a previous restore point.
Type "Create a restore point" in the Start Menu
search bar and open the app. Click on System
Restore.... Follow the wizard to select a restore
point from before the problematic update was
installed.
Wednesday September 10 2025 07:25
____FreeCAD Foray: From Brick To Shell.____what should a car traveler do if their cell phone dies on a trip?____
AI Overview 19
Tips to Keep Your Phone Battery Charged While Traveling
... If your cell phone dies on a car trip, you should find a
power source to charge your device, borrow a phone to
call for assistance or contact a friend, use a public phone
or a payphone if available, or seek help at a gas station,
store, or rest stop. Prepare for future trips by packing a
portable power bank, car charger, and spare cables to
avoid this issue.
Immediate Actions:
how is published amp hours for a battery for a battery computed?
AI Overview
Published Ampere-hour (Ah) for a battery is a standardized
measure of its charge capacity, calculated by multiplying
the current it can supply (in Amperes) by the duration
(in hours) it can sustain that current under specific test
conditions. The formula is Ah = Current (A) × Time (h).
Manufacturers perform these tests under controlled
conditions, but the actual capacity can vary depending
on factors like temperature and discharge rate, as
described by the Peukert Effect for lead-acid batteries.
How the Calculation Works.
how is published amp hours for a 12v rechargeable
battery for a battery computed?
AI Overview
To compute the published amp-hour (Ah) rating
of a 12V rechargeable battery, manufacturers
measure the battery's total capacity under
controlled discharge conditions. The result is
a theoretical figure that represents how
much current (in amps) the battery can
deliver over a specific period (in hours).
Standard calculation and C-rating:
which solar electricity systems use both
blocking and bypass diodes?
AI Overview
Solar Panel Diodes: A Simple Guide to Bypass
& Blocking Types Both blocking and bypass
diodes are used in systems connecting solar
panels in series with batteries or for arrays with
multiple strings, especially in off-grid and hybrid
systems. Bypass diodes are integrated into
panels to prevent localized shading from
drastically reducing output, while blocking
diodes, often installed in series with panel
strings or in combiner boxes, prevent batteries
from discharging back through the panels
at night or reverse current from other
strings from damaging a shaded panel.
Bypass Diodes
...
Blocking Diodes
...
Systems Using BothIntel Loses One Of Its NPU Driver Maintainers:
"Time To Let Someone Else Deal With The NPU Bugs".
AMD pushes back on Arm hype, says x86 processors
deliver on battery life and performance.
who sells counterfeit esp32 computer systems?
AI Overview
You cannot get a definitive list of who sells counterfeit
ESP32 computer systems, as this is an illegal activity
conducted by unauthorized and often anonymous
sellers. However, the primary sources for these
counterfeit and knockoff components are specific
e-commerce platforms and unvetted online
marketplaces, particularly those based in China.
Common sources of counterfeit ESP32 modules
AliExpress and Alibaba:
....
Unvetted independent brokers:
...
Third-party sellers on other e-commerce sites:
How to report a potential counterfeit.
Try 1.
Unable to resize.
samsung one ui a23 now only produces heic files on
download to windows 10 22h3.
AI Overview
A recent One UI update on your Samsung A23 likely
enabled the "High efficiency pictures" camera setting,
which automatically saves new photos in the HEIC format.
Your Windows 10 PC then downloads these files in their
original format, as Windows 10 version 22H3 is fully
compatible with HEIC files.
The issue is not with your computer converting files,
but with your phone now capturing them differently.
The easiest way to revert to JPEG is to disable the
high-efficiency setting on your Samsung phone.
__
There are several reasons you may be unable to deselect
HEIF on your Samsung phone's camera, including that
the option is grayed out or a related setting is overriding it.
Try the troubleshooting steps below to resolve the issue.
Tuesday September 9 2025 18:52
________does microsoft unit test windows 11 software
modules before release?
did microsoft adopt a strategy of letter users find bugs
in their windows software?"
AI Overview
Yes, Microsoft uses extensive testing, including unit testing,
for its Windows 11 software modules before release. Unit
testing is a fundamental and critical part of its overall software
development lifecycle, but it is just one component of a
much larger quality assurance process.
The multi-layered testing process for Windows.
AI Overview
Yes, Microsoft actively and strategically uses users to find
bugs in their Windows software through official, structured
programs, rather than relying only on customer complaints.
The two primary initiatives for this are the Windows Insider
Program and the Microsoft Bug Bounty Program.
Windows Insider Program.
Historical context and industry shift
Historically, it was common for tech companies to
reactively fix bugs based on customer complaints.
However, in the early 2000s, Microsoft adopted its
"Trustworthy Computing" initiative to focus on making
its software more reliable and secure from the start.
The programs that involve users and external
researchers are a modern evolution of that strategy.
They recognize that a massive, diverse user base
can test software in ways internal teams never
could, and that paying ethical hackers is an
effective way to improve security.
Despite this rigorous testing, bugs still appear in
released versions of Windows due to several factors:
Vast complexity: Windows is a massive and incredibly complex
operating system that must function on billions of devices with
an almost limitless number of hardware and software configurations.
External dependencies: The immense number of drivers and
third-party applications can lead to conflicts that are impossible
to predict or test for in a controlled environment.
Rapid release cadence: Microsoft's shift to a "Windows as a service"
model with more frequent updates means that new features are
delivered faster than in the past, increasing the potential for new issues.
Is c++ a good career choice in view of learning and adopters
maintenance costs?
AI Overview
Learning C++ can be a good career choice, but requires significant
effort due to its steep learning curve and high maintenance costs
for adopters. The career value depends on weighing these
complexities against the benefits of speed, control, and high
demand in specific niche industries.
Learning costs
....
Adopter (company) maintenance costs
...
C++ is a good career choice for those who are:
Driven by performance: Candidates for whom writing
fast, efficient code is a primary motivation.
Patient with the learning curve: Individuals who are
prepared for a long-term commitment to mastering a
complex language.
Interested in niche fields: Aspiring developers who want to
work on projects close to the hardware, such
as embedded systems or game engines.
C++ may not be the best choice for those who prefer faster
development cycles and want to work primarily on web or
mobile applications, where other languages may have lower
learning and maintenance costs.
Salesforce hit with class action lawsuit over
massive data breach affecting Farmers
Insurance customers.
KDE Plasma 6 On Wayland Can Work Fine On FreeBSD.how do i rollback ui one 9/7/25 which caused a23 camera download issue?____
AI Overview
While directly rolling back a system-wide One UI update is not
officially supported by Samsung and is difficult, you can address
the A23 camera download issue using official troubleshooting
methods. Downgrading the OS is a complex, risky process
that voids your warranty and will factory reset your phone.
For the camera download issue, start with these official, safer
solutions first.how does a digital voltmeter with inactivity____
shut off sensor when to shutoff and how is it restarted?
AI Overview
A digital voltmeter's inactivity shut-off feature is typically
a timer-based function in the internal microprocessor
that automatically turns the device off after a set period
of no button presses or rotary dial changes. This
conserves battery power and is often labeled "
Auto Power Off" (APO).
How the auto-shutoff works.ESP32 counterfeit devices technically exist,____
but that's not the full story.how many limes of code are there in Windows 11?
AI Overview
There is no single, definitive "line of code" count for
Windows 11 because the number is constantly changing,
and different sources use varying definitions of what
constitutes a "line of code". However, estimates based
on the Windows NT codebase, which is the
foundation for modern Windows, suggest a figure in
the tens of millions, with the Windows 10 codebase
being cited as approximately 50 million lines.
Factors making a precise count difficult:
Constant Evolution: [updates?]
Nova Launchers founder and sole developer has left.
____Nuclear startup Deep Fission goes public in a curious SPAC.Try 1.
EIA says solar module report no longer worth it.
Unable to downlooad pic to Lenovo 477U laptop
starting 9/8/25
Monday September 8 2025 15:04
____
which compiler is most commonly used for esp32 projects?
AI Overview
The compiler most commonly used for ESP32 projects is the GNU
Compiler Collection (GCC). It is the standard toolchain that comes
with the Espressif IoT Development Framework (ESP-IDF), which is
the official development platform for the ESP32.
You will encounter GCC
indirectly through one of the following development environments:
Espressif IDF: Espressif's official framework uses a GCC-based
toolchain to compile C and C++ code. This method provides
the most control over the device and is standard for professional
developers.
PlatformIO: This popular plugin for Visual Studio Code uses
GCC under the hood to compile code for various platforms,
including the ESP32. It offers a more advanced and feature-rich
development experience than the Arduino IDE.
Arduino IDE: The "esp32" board package for the Arduino
IDE uses the same GCC toolchain to compile your code.
This is the most common and user-friendly entry point for
hobbyists and beginners.
____The AI bubble fears are getting worse.____
Wall Street doesn't want to talk about it.can windows 11 be certified?___
AI Overview
Yes, Windows 11 can be certified, with different types of certifications
available including security certifications under the Common Criteria
program, hardware driver certifications through the Windows Hardware
Compatibility Program using the Hardware Lab Kit (HLK), and IT
professional certifications from Microsoft such as the Microsoft 365
Certified: Endpoint Administrator Associate. Software applications
can also be "certified" to work on Windows 11 by their respective
vendors, like Oracle and Esri. Types of Windows 11 CertificationsAI
Overview Yes, Windows 11 can be certified, with different types of
certifications available including security certifications under the
Common Criteria program, hardware driver certifications through
the Windows Hardware Compatibility Program using the Hardware
Lab Kit (HLK), and IT professional certifications from Microsoft such
as the Microsoft 365 Certified: Endpoint Administrator Associate.
Software applications can also be "certified" to work on Windows
11 by their respective vendors, like Oracle and Esri.
Types of Windows 11 Certifications
IT Professional Certifications
Microsoft Certifications:
Microsoft offers professional certifications
for IT professionals to validate their skills in managing Windows 11
environments, such as the Microsoft 365 Certified: Endpoint
Administrator Associate, which requires passing the MD-102
exam.
curity Certifications
Common Criteria: Windows 11 undergoes Common Criteria
certifications, which involve an independent evaluation of its
security functionality and assurance measures against specific
security Protection Profiles.
ardware Certifications
Windows Hardware Compatibility Program: Hardware
manufacturers use the Windows Hardware Lab Kit (HLK)
to test their drivers and systems for compatibility with
Windows 11. Successfully passing these tests allows a
product to be certified, indicating it should function
well with the operating system.
Software Application Certifications
Application Vendor Certifications: Independent software
vendors, such as Oracle and Esri, test and certify their
own applications to ensure they work correctly on
Windows 11.
does windows 11 contain all certified software modules?
AI Overview
No, Windows 11 does not contain all certified software
modules. Microsoft certifies its own software and
certain third-party components, but most applications
and drivers must be individually certified by their
respective developers to meet Windows 11's standards.
The idea is to maintain a secure and reliable
ecosystem, not to pre-install every possible certified
program.
=What is included
...
How third-party software is certified
...
What is not included
what is the most recent version of torbval linux?
AI Overview
The most recent mainline version of the Linux kernel is
Linux 6.17-rc5, a release candidate, with stable
versions like Linux 6.16.5 and others also available,
as of September 2025. You can find the latest
versions on the official Linux Kernel Archives
website.
Understanding the Versions.
does linus 6.17 contain certified software modules?
AI Overview
The upstream Linux kernel, including version 6.17,
does not contain certified software modules.
Certifications are applied to specific distributions of
Linux, such as Red Hat Enterprise Linux or SUSE
Linux Enterprise Server, and are not part of the
standard kernel from kernel.org.
Here's why certified modules aren't included in
the mainline Linux kernel:
...
n summary, if you need a Linux system with certified
software modules, you should use a supported
enterprise distribution like RHEL or SLES, rather
than relying on the upstream kernel version number.
Linux 6.18 To Introduce Support For Next-Gen
eUSB2V2 Web Cameras.
Linux 6.17-rc5 release is on track, but Torvalds calls out community [cult/]on wasteful habits.
do Ubuntu versions contain certified modules?
AI Overview
No, standard Ubuntu versions do not inherently
contain FIPS-certified modules; these modules
are provided through the Ubuntu Pro subscription,
which enables FIPS 140-2 or 140-3 validation for
the kernel and other cryptographic libraries. By default,
Ubuntu installs standard, non-certified packages;
however, users with an active Ubuntu Pro
subscription can enable the FIPS-certified modules
to meet regulatory and compliance requirements
for sensitive workloads.
How to get FIPS certified modules
FIPS (Federal Information Processing Standards):
...
In summary If you need FIPS certified modules
for your Ubuntu system, you must have an
Ubuntu Pro subscription and use the pro client
to install and enable the validated packages.You Didn't Get Phished You Onboarded the Attacker.
Delayed Security Patches for AOSP (Android Open
Source Project) (twitter.com/grapheneos).
Microsoft, Linode, warn of cloud latency spikes due to
Middle East submarine cable problems.
Try 6.
Sunday September 7 2025 15:35
___Godfather of AI says the technology will create
massive unemployment and send profits soaring
that is the capitalist system.
what is the name of Alexander the Great's horse?
AI Overview
Alexander the Great's horse was named Bucephalus.
The name is derived from Greek words for "ox-head"
and is believed to refer to a brand or scar on the horse's
thigh that resembled an ox's head. Bucephalus was a
famous black horse with a distinctive white star on
its forehead.
Key Facts about Bucephalus:
can a 1x programmer and manager using AI do as
good as a team of 10 programmers/managers?
AI Overview
A single programmer and manager using AI cannot reliably perform
as well as a team of 10 experienced professionals. While AI can
be a powerful force multiplier, boosting individual productivity
significantly, it lacks the human creativity, strategic thinking,
and collaborative skills that a high-performing team provides.
Where AI provides a significant boost.
The future is augmentation, not replacement Rather than
replacing a team, AI enhances the capabilities of individual
developers, allowing them to focus on higher-value, more
creative work. The most successful organizations will leverage
AI to amplify the output of their human teams, not reduce
their headcount. The 1x developer with AI is an
empowered contributor, but the team of 10 still has the
advantage of collective expertise, vision, and scale.
The New Math of Quantum Cryptography.
An Electrician's Warning: Don't Plug These 7
Dangerous Devices Into Extension Cords.
Scott Bakers Magnetic Bubble Memory Mega-Post.
what is the best procedure for torqing 1/16 inch wire connector saddle using 5.5mm open end wrench?
AI Overview
You cannot properly or safely torque a 1/16 inch wire connector saddle using a standard 5.5mm
open-end wrench. A torque wrench is the only tool that can apply the specific, consistent
pressure required for a secure connection.
Why an open-end wrench is not suitable.
AI Overview
Attempting to "torque" a 1/16 inch wire connected to a 10 AWG solid copper
wire with a 5.5mm wrench is based on a fundamental misunderstanding
of electrical connections and is an unsafe and incorrect procedure. There
is no scenario where this method should be used. A 1/16 inch wire is
roughly equivalent to 16 AWG wire.
Here is a breakdown of why this is incorrect and the proper, safe procedure
to follow instead:
Use cable clamp to attach 10 AWG to battery terminals work
why is it a good idea to keep a 'dead 12 volt rechargeable battery?.
AI Overview
A "dead" 12-volt rechargeable lead-acid battery is a valuable item
to keep for several reasons: its residual power can be used for
low-drain tasks, it may be possible to recondition, and it has
significant scrap value for recycling. Keeping it also prevents
environmental damage from toxic materials like lead and sulfuric acid.
[Dud Goggke AI overlook ... for tessting battery chargers.
Bad charger design may cause a fire?]
Arduino causing esp32 issues?
for what is a .ino file in arduino ide?
AI Overview
A .ino file in the Arduino IDE is a source code file, also called a "sketch,"
that contains a program written in a hybrid C/C++ language with
Arduino-specific functions. These files are the building blocks of Arduino
projects, defining the behavior of an Arduino board by providing commands
to control hardware. The Arduino IDE uses the .ino extension to identify these
files as Arduino sketches, which are then compiled into machine code for
the microcontroller to execute.
What's inside a .ino file?.
____Japan shocks the world Solar panelsTry 2
as strong as 20 nuclear reactors unveiled.
Saturday September 6 2025 14:26
____
how do i install forth on a ESP32-DevKitC-32E Development Board?.
AI Overview
To install Forth on an ESP32-DevKitC-32E, the most straightforward
method is to use ESP32forth with the Arduino IDE. ESP32forth is a
variant of eForth specifically designed for the ESP32 chip. It allows
you to use Forth's interactive, command-line interface over a serial
port, such as the one provided by your USB connection.
how do i download ESP32forth-7.0.7.3.zip,
https://eforth.storage.googleapis.com/releases/ESP32forth-7.0.7.3.zip
___Metric wrenched attived from Amazon 9/5/25.
what is the advantage of using a 5 mm open end wrench over a 7/32 inch wrench
for tightening 1/16 cable clamp?
AI Overview
For tightening a 1/16 cable clamp, a 5.5 mm wrench is a better fit than a
7/32 inch wrench, as it provides less clearance and a tighter grip. Using
the closer-fitting tool minimizes the risk of rounding the corners of the
fastener, which can strip and damage the nut.
Here is a breakdown of the differences:
____Radxa CM4 A Raspberry Pi CM4 replacement with____
Rockchip RK3576 Edge AI SoC, up to 16GB RAM.Anthropic Agrees to Pay Authors at Least
$1.5 Billion in AI Copyright Settlement.
Sam Altman Says He's Suddenly Worried Dead
Internet Theory Is Coming True.
Linus Torvalds Grows Frustrated Seeing
"Garbage" With "Link: " Tags In Git Commits.
New x86 Hardware Support & Device
Quirks Merged Ahead Of Linux 6.17-rc5.
is use of c++ in safety-critical apps risky?
AI Overview
The use of C++ in safety-critical applications carries
inherent risks primarily due to its memory-unsafe
nature and the potential for undefined or unspecified
behavior.
Reasons for Risk:
Manual Memory Management: C++ requires
developers to manually manage memory, which
can lead to common errors like buffer overflows,
use-after-free vulnerabilities, and memory leaks.
These can be exploited to compromise system i
ntegrity or stability.
Undefined and Unspecified Behavior: The C++
standard contains numerous instances of un
defined and unspecified behavior. This means that
certain code constructs can behave differently
depending on the compiler, operating system, or
hardware, making it difficult to ensure consistent
and predictable execution in safety-critical contexts.
Complexity of Features: While powerful, features
like multiple inheritance and complex template
metaprogramming can increase code complexity,
potentially introducing subtle bugs that are hard
to detect and debug.
Mitigation Strategies: Despite these risks, C++
is widely used in safety-critical domains like
automotive, aerospace, and medical devices.
This is achieved through rigorous mitigation strategies:
Strict Coding Guidelines and Standards: Adherence
to standards like MISRA C++ or JSF C++ helps to
subset the language, prohibiting dangerous features
and enforcing best practices to minimize the risk of
errors.
Static Analysis Tools: Utilizing static code analyzers
can help identify potential memory safety issues,
undefined behavior, and other coding standard violations
early in the development cycle.
Thorough Testing and Verification: Extensive testing,
including unit testing, integration testing, and
system-level testing, is crucial to ensure the software
behaves as expected under various condition
Formal Methods: In highly critical systems, formal
methods may be employed to mathematically
verify the cor
Use of Safer Constructs: Preferring safer C++
constructs like smart pointers over raw pointers,
using std::vector instead of raw arrays, and avoiding
manual memory allocation where possible can
significantly reduce memory-related risks.
In conclusion, while C++ presents risks in
safety-critical applications due to its design, these
risks can be managed and mitigated through
disciplined development practices, strict adherence
to coding standards, and comprehensive
verification processes.
who is dr c-h ting and what are his contributions
to nanocomputing?
AI Overview
Who is C.H. Ting?
Chen-Hanson Ting, who passed away in 2022,
was an American software engineer, teacher,
and prolific contributor to the Forth programming
community. He was a well-respected figure and a
mentor to many in the Forth Interest Group (FIG).
Ting spent his career in research and software
engineering, including positions at:
Lockheed Missile and Space Company
Maxtor Corporation
Applied Biosystems
Contributions to computing Although not related to
nanocomputing, his contributions to the field of
computing are significant and include:
eForth: He was known for designing and
developing the eForth computer language,
a version of Forth for educational purposes.
He implemented it on multiple microprocessors,
including Arduino, MSP430, and ARM.
FPGA processors: He authored several
Field-Programmable Gate Array (FPGA)-based
microprocessors, including the eP8, eP16,
eP24, and eP32, using the hardware
description language VHDL.
Mentor and leader: He served as Vice President
of the Forth Interest Group and was a
dedicated mentor and leader to the
worldwide Forth community.
Prolific author: He authored numerous
books and tutorials that documented his
work and programming philosophy, which
he made available through his company
Offete Enterprises.
Lifelong learner: His enthusiasm for
learning and teaching was a hallmark
of his career, and he regularly shared
his knowledge and inventions.____ House passes bill to up Montana coal miningTry 2.
on BLM land.
Friday September 5 2025 18:28
____Microsoft Goes Back to BASIC, Open-Sources.____
Bill Gates Code Simpler times.
AI Overview
For 100W panels under the same solar conditions, the back of
the less-efficient polycrystalline panel will likely register a higher
temperature than the monocrystalline one. This is because a
higher percentage of the absorbed solar energy is converted
into heat rather than electricity.
Here is a breakdown of why this occurs:
_____
_____
Vevor wind turbine video 8/26/25 video.
No visual damage to blades seen ... but heard several popping noises.
Blade peices of #2, 3, 4 found 8/27/25
freertos install on espressif attempted on Asus ryzen 7 5800HS running Windows 11.
:)
Not appearing the Arduino sketch librarry folder. :(
AI Overview
ESP-IDF (IoT Development Framework) is Espressif's official and open-source
software framework for developing applications on their ESP32, ESP32-S, and
ESP32-C series microcontrollers. It provides a comprehensive Software
Development Kit (SDK) with libraries, tools, and documentation for building
network-connected devices, including smart home products, industrial devices,
and more. Written in C/C++, ESP-IDF enables developers to create sophisticated,
feature-rich applications by simplifying the process of integrating wireless
communication (Wi-Fi, Bluetooth) and other system functionalities.
Key Features and Capabilities:
____
ESP32-H2-Zero mini Zigbee, Thread, and____
BLE USB-C board is based on ESP32-H2 RISC-V SoC.
Microsoft 365 Personal is now free for US college students for a year.Unrestrained Chinese Cyberattackers May
Have Stolen Data From Almost Every American.
New Mexico places $315 million bet on quantum tech.
Oklo Plans $1.7 Billion Center to Convert Nuclear Waste to Fuel.
Try 1.
Thursday September 4 2025 11:49
____
how do i install freertos on my ESP32-DevKitC-32E
using windows 11 and arduino ide?
AI Overview
Installing FreeRTOS on an ESP32-DevKitC-32E using
Windows 11 and the Arduino IDE primarily involves
setting up the Arduino IDE to support ESP32 boards, as
FreeRTOS is inherently integrated within the ESP-IDF
framework that the Arduino core for ESP32 uses.
Steps for Installation:
____
Amazon perks up as Anthropic partnership
drives data center buildout, Trainium ramp.
___Arduino Ubuntu IDE abandoned. Nothing applered to work to install freertos.
Windows 11 on $119 Asus N^)) 4.64 GB atttempts to installl freertos on a
Arduino Nano 33
Arm Cortex-M0+ microcontrollerArduio IDE Windows 11 interface different than Ubutntu.
:)
Linux Hardware Enablement Leader Hans de Goede Leaving Red Hat.
Linux 6.17 With EXT4 Showing Some Nice Performance Improvements.
what languages are used to implement llvm?
AI Overview
The LLVM compiler infrastructure project is primarily implemented
using C++. While the core of LLVM is C++, there are also instances
where C code is present, often due to specific environment constraints,
historical reasons, or the inclusion of third-party code. For automation,
build systems, and utility scripts within the LLVM project, Python
is the preferred and widely used language.
____Salesforce's weak quarterly revenue____
forecast signals lagging AI monetization.
why does salesforce accuse agentic ai
for 4.000 employee layoffs?
AI Overview
Salesforce did not accuse agentic AI for 4,000 employee layoffs,
but rather cited the technology as the reason for making the
customer support roles redundant. In September 2025,
CEO Marc Benioff stated that the company had reduced its
customer support workforce from 9,000 to 5,000
because its new AI agents, called "Agentforce," could handle
a significant portion of customer inquiries.
How Agentforce impacted the customer support workforce.
...
Reduced headcount:
...
Reduced headcount:
...
Role reallocation:
...
Lead generation:
The broader context of AI and layoffs
Salesforce's announcement is one of several instances
in the tech industry where AI is being tied to workforce
reductions. Other companies have also restructured
their workforce in response to advancements in AI:
How agentic AI works
Agentic AI systems, like Salesforce's Agentforce, are
an advanced form of AI that can act autonomously
to achieve complex goals with minimal human oversight.
They differ from basic generative AI by their ability to:
Reason and plan:
...
Act independently:
...
Learn and adapt:
Oracle lays off thousandsor moreglobally
amid rapid AI shifts.
More tech layoffs hit Seattle area this week.
ConocoPhillips Is Latest U.S. Oil Producer to
Announce Major Layoffs.
Unemployed graduates are flocking to this
business degree to stand out in the current
job market. Unlike most MBAs it requires
zero work experience.The Case For Pascal, 55 Years On.
who maintains the pascal language?
AI Overview
There isn't a single entity that "maintains" the original
Pascal language, which is now a historical standard.
However, the Free Pascal project actively maintains
and develops a widely used, modern open-source
implementation of Pascal and its Object Pascal dialect,
while Embarcadero Technologies maintains the
commercial Delphi product, which also uses a
dialect of Object Pascal.
The Free Pascal Project
...
Embarcadero Technologies
...
Niklaus Wirth
Restoring A Vintage Intel Prompt 80 8080 Microcomputer Trainer.
____Can offshore wind survive the Trump administration?.Try 2.
The Renewable Energy Smackdown Is Failing, Bigly.
These Blades Are Bigger Than The Eiffel Tower:
China Unveils Worlds Most Powerful Offshore
Wind Turbine At 26 Megawatts.
US gas power capacity set for big jump as
renewables growth slows.
Wednesday September 3 2025 19:34
____Exclusive: ConocoPhillips says it will cut workforce____
by 20-25%, shares fall.are linux distro buggy and largely maintained by volunteers?.
AI Overview
That characterization of Linux distributions is a significant oversimplification.
While some Linux distributions are maintained almost entirely by
volunteers and can have bugs, many popular distributions are
professionally developed and commercially supported. The stability
and maintenance model largely depend on the specific distribution.
Maintenance models vary.
...
Conclusion
The perception of Linux distros as universally "buggy" and maintained
by volunteers is inaccurate. The stability and maintenance model
vary widely depending on the distribution. When choosing a distro,
the crucial difference lies between those backed by major
corporations, which offer robust professional support, and
smaller, community-run projects that rely on voluntary efforts
and are more suited for advanced users.
____PJM stakeholders overwhelmingly pan____
proposal for data center interconnection.
Confirmed: America is in a serious jobs slump.
Why I Believe We're Entering The Biggest
Market Rotation In Decades.
AI Overview
People stop using Office 365 due to a combination of issues including:
the mandatory cloud-based model requiring internet access, a lack of
user-friendliness and unintuitive interfaces for core apps like Outlook and
Teams, perceived high costs for underutilized features, frustration with
frequent and sometimes confusing interface changes, insufficient privacy,
concerns about data collection, bugs and performance issues, and the
need to frequently update to stay supported.
Common Reasons for Discontinuing Office 365:
...
Alternatives to Consider:
LibreOffice:
Google Workspace:
Apache OpenOffice: [not listed by Google AI.]
Salesforce CEO Says Company Axed 4,000 Support Jobs Because of Agentic AI.
AI Overview
The relationship between "Agentic" and "Claude" is that Anthropic's Claude is a
large language model (LLM) that powers Agentic systems and tools offered by
the company. Agentic AI is a type of system with a high degree of autonomy,
and Anthropic has released several products and features based on its Claude
models that demonstrate and enable this capability.
Key components of the relationship.
Claude as the LLM backbone: Anthropic's family of Claude models, including
Opus, Sonnet, and Haiku, serve as the reasoning engine for agentic tasks.
Agentic systems rely on an LLM to interpret goals, formulate multi-step
plans, and generate actions to accomplish complex tasks.
...
Anthropic is now valued at $183 billion.
Who is winning in AIChina or America?.
Nvidia and Marvell shares fell after earnings.
Will Broadcoms stock fare better?.
4 Defiant Broadcom calls for tech to go back
where it belongs: On-premises.
Nvidia Stock to Crash to $100? This Bear Thinks So.
i is windows 11 a legal and maintenance financial
liability for microsoft?
AI Overview
Windows 11 represents a significant financial and
maintenance obligation for Microsoft, but its legal
liability to consumers is severely limited by its licensing
agreements. For enterprise customers, liability is
governed by specific contracts that may differ.
Financial and maintenance liability
Windows 11 is a long-term financial and maintenance
liability because Microsoft must:
Fund ongoing development:
...
Release regular security patches:
...
...
Provide technical support:
...
Plan for end-of-life:
Legal liability
For the average consumer, Microsoft's legal liability is
heavily restricted by its End User License Agreement
(EULA) and other service terms.
Standard EULA clauses include:
"AS IS" licensing:
...
Limited damages:
...
Class-action waivers:
Exceptions to liability limits:
ntentional misconduct:
...
Regional laws:
...
Gross negligence:
Enterprise vs. consumer liability
Legal liability for enterprise customers can
differ from that of a consumer:
Enterprise agreements:
...
hird-party providers:
The impact of the Salesloft Drift breach on
Cloudflare and our customers.
Palo Alto Networks, Zscaler customers impacted
by supply chain attacks.
Amazon disrupts Russian APT29 hackers targeting
Microsoft 365.
Zscaler, Palo Alto Networks Breached via Salesloft Drift.
is failure to use certified software modules in safety-critical
and business software gross negligence?
AI Overview
A failure to use certified software modules in
safety-critical and business software could be
considered gross negligence, but this is a
fact-specific determination made on a case-by-case
basis. Whether the failure meets the legal standard
for gross negligence depends on several factors,
including the context of the software, industry
standards, and the foreseeability of the
potential harm.
Key factors in determining gross negligence
...
Summary
The failure to use certified modules is not automatically
gross negligence, but it is a strong indicator of it in
safety-critical contexts where the standard of care is
exceptionally high. In less-critical business software, a
similar failure may amount to regular negligence or a
breach of contract, rather than the extreme recklessness
required for a gross negligence finding. Ultimately, the legal
determination hinges on the specific circumstances of the
failure, the foreseeability of the harm, and whether the
developer recklessly disregarded a clear safety protocol.why do prisions use electronic door locks?____
AI Overview
Jail Door Locks | Detention Swinging Door Locks Prisons
use electronic door locks for heightened security through
centralized control, reduced human error, and enhanced
safety features like remote operation and automatic
logging of access events. These tamper-resistant systems
allow staff to secure multiple areas quickly and efficiently,
preventing inmate breakouts, restricting access to
controlled zones, and minimizing the potential for violence
and tampering.
Key Reasons for Electronic Locks in Prisons.LLVM Clang 21 Compiler Helping Squeeze More
Performance On 5th Gen AMD EPYC "Turin".
____Tennessee Valley Authority signsTry 2.
agreement for 6 GW of small nuclear.
NuScale Power Partners with ENTRA1 for
SMR Projects.
White House Orders Agencies to Escalate
Fight Against Offshore Wind.
Tuesday September 2 2025 18:13
____must a true secure app be accountable
for every bit in a computer memory?
AI Overview
No, a secure application is not accountable for every bit
in a computer's memory. Modern computer security
is built on a layered model where the operating
system (OS) and hardware handle broad
memory protection, and secure applications
are responsible for protecting the data within
their own, isolated memory space.
Here's a breakdown of the roles and
responsibilities in memory security:
The operating system's role (isolating memory)
...
In conclusion, holding an application responsible
for every bit of memory is an impossible standard.
The correct measure of a secure app is its ability
to protect its data within the memory allocated
to it by a trusted OS, leveraging the system's
memory protection features and managing
ts data responsibly.
___The Sense And Nonsense Of Virtual Power Plants.____
did charles moore make a far greater contribution to
bug/malware-free software that ritchie and kernighan?
AI Overview
Evaluating Charles H. Moore against Dennis Ritchie and
Brian Kernighan regarding contributions to bug/malware-free
software is not a straightforward comparison, as their work
followed fundamentally different philosophies and had very
different scales of influence. Ritchie and Kernighan's work
on C and Unix laid the foundation for the vast majority of
modern software, including the operating systems that
run the internet. Moore's work on the Forth language
focused on creating highly efficient, simple, and extensible
code for niche applications like embedded systems and
microprocessors.
The premise that one made a "far greater contribution"
is subjective and dependent on the criteria for evaluation.
Comparative contributions to software quality
...
Conclusion
While Moore's Forth language provides a foundation
for writing exceptionally reliable, bug-resistant software
within specific domains, his overall contribution to
software development is not on the same scale
as Ritchie and Kernighan's.
Moore contributed a philosophy and toolset for
developing highly reliable software in specific,
high-stakes contexts. However, the scope of
this contribution is limited compared to the
pervasive nature of C and Unix.
itchie and Kernighan created the architecture
upon which the vast majority of modern software
is built. While C's low-level nature has introduced
countless vulnerabilities, the sheer volume and i
nfluence of the software built upon it make its i
mpact vastly larger, for both good and ill.
software" is "far greater" would be a
To suggest Moore's contribution to "bug/malware-free
misconception, as it minimizes the foundational
nature of C and Unix on which the modern
computing world was built. A more accurate
statement is that Moore's philosophy leads to
more inherently secure and robust code within its
application niche, while the C language's power
and flexibility, though more prone to bugs, have
had a far broader and more transformative
impact on computing as a whole.
____Microsoft readies Windows 11 25H2 while____
Windows 10 circles the drain.
Alibaba's Hong Kong shares rally 19% as
AI boom fuels cloud business growth.does Arduino Nano 33 run freertos?
AI Overview
No, the standard Arduino Nano 33 boards do not run FreeRTOS; :(
the Nano 33 IoT uses the NINA-W102 firmware, which is based
on Espressif's IoT Development Framework, while the Nano 33 BLE
is based on Mbed OS. FreeRTOS is an operating system and
scheduler that can be integrated with the Arduino framework on
certain boards, but it is not the default RTOS for the
Nano 33 family.
Why the Arduino Nano 33 doesn't run FreeRTOS by default:
does Arduino Nano 33 run a forth?
AI Overview
Yes, you can run a Forth interpreter on an Arduino Nano 33,
although it is not the default programming language. The
process is not as straightforward as writing standard Arduino
sketches and requires uploading a specialized Forth
firmware to the board.
The standard Arduino development environment uses
C++ and its own bootloader. To run Forth, you must
replace the default firmware with one that includes a
Forth interpreter.
A notable Forth project for the Arduino Nano family
A popular option for running Forth on the Nano is
nanoFORTH, an interactive, multi-tasking Forth interpreter.
Here are the key features of nanoFORTH:
what doses are available for the Arduino Nano 33?
AI Overview
The Arduino Nano 33 line of boards can be programmed
to run on several different operating systems, depending
on the specific model. The most common options are
Arm Mbed OS, FreeRTOS, and Zephyr, all of which are
Real-Time Operating Systems (RTOS) designed for
embedded devices. Standard Arduino sketches can
also be used without an OS. Arm Mbed OS.
Availability: The Arduino Nano 33 BLE and BLE Sense
boards are built upon Arm Mbed OS.
Key features: Mbed OS is a free, open-source embedded
operating system that was adopted by the official Arduino core
for the Nano 33 BLE. It provides real-time features and
supports complex applications, including a full Bluetooth
stack for the BLE board.
FreeRTOS Availability: :)
FreeRTOS is a popular RTOS that can be implemented on
the Arduino Nano 33 IoT through a special library.
how do i install and flash freertos on the arduino nano 33
using windows 11?
AI Overview
For the Arduino Nano 33 BLE, you do not install FreeRTOS
as a separate library; it is already integrated into the board's
core because the board runs on Arm® Mbed OS. This means
you can call FreeRTOS functions directly in your sketch without any
special installation. The Arduino framework handles the setup
automatically, running setup() and loop() inside their own
FreeRTOS tasks.
Prerequisites.
Select your board: Go to Tools > Board and select Arduino
Nano 33 BLE.
Select the port: Connect your Nano 33 BLE to your computer
via USB. Go to Tools > Port and select the correct COM port
for your board.
Upload the sketch: Click the Upload button (the right-arrow icon)
in the Arduino IDE. The IDE will compile your sketch and flash it
to the board.
Step 3: Verify the installation
Visual Confirmation: After the upload is complete, the built-in LED
on your Nano 33 BLE should begin to blink with a 1-second interval,
confirming that your FreeRTOS task is running as intended.
Serial Monitor: You can add Serial.begin(9600); to your setup() and
Serial.println("Task is running!"); to your myBlinkTask to see output
on the Serial Monitor. Open the Serial Monitor (Tools > Serial Monitor)
to confirm the task is executing.
AI Overview
There are no public, beginner-friendly instructions for installing
and flashing NanoForth on an Arduino Nano 33 using
Windows 11. NanoForth requires specialized tools and
expertise to flash the board's bootloader and firmware,
which is typically only performed by advanced users with
external hardware.
____Palo Alto Networks data breach exposes[unable to cooopy and paste 6.]
customer info, support cases.
how to i install flash forth on a Nano V3.0, Nano
Board ATmega328P?
AI Overview
Installing FlashForth on an Arduino Nano V3.0 with an
ATmega328P requires using a dedicated In-System
Programmer (ISP) to overwrite the existing Arduino
bootloader with the FlashForth image. You cannot use
the standard Arduino IDE upload process for this.
What you will need.
A Nano V3.0 ATmega328P (the target board).
how to i install freertos on a nano v3.0, nano board
atmega328p?
AI Overview
To install FreeRTOS on an Arduino Nano (ATmega328P),
download the Arduino IDE, then use the Library Manager
to search for and install the Arduino_FreeRTOS library by
Richard Barry. After installation, include the library in your
sketch using Sketch > Include Library to start using
FreeRTOS in your Arduino projects.
Here's a step-by-step guide:
1. Install the Arduino IDE: If you don't have it already,
download and install the Arduino IDE from the official
Arduino website.
2. Open the Library Manager: In the Arduino IDE, click
on the Tools menu. Select Manage Libraries... from the
dropdown menu. Alternatively, you can click on the
Library Manager icon in the toolbar.
3. Search for the FreeRTOS Library: In the search
bar of the Library Manager, type FreeRTOS. Look for
the library named Arduino_FreeRTOS or the one by
Richard Barry.
4. Install the Library: Select the desired FreeRTOS
library from the search results and click the Install button.
5. Include the Library in Your Sketch: Create a new
sketch or open an existing one. Go to Sketch > Include
Library to make sure the newly installed FreeRTOS
library is listed.
6. Begin Using FreeRTOS:
__
____The Venor wind turbine blades appeaar to be undamaged 8/26/25.____
Vevor blade damage caused at night durig or after 8/26/25?Hut 8 announces four data center projects____
totaling 1.5GW across US.Big tech has transformed the classroom and____
parents are right to be worried Velislava Hillman.A former Microsoft worker has been job-hunting'
for 9 months. He says it feels like companies are
'looking for Superman.
____It happened so fast: the shockingTry 6.
reality of indoor heat deaths in Arizona.
Californias offshore wind plans are terminally ill.
Economy & Environment Government & Politics With
gas crunch looming, Alaska utilities wont get
big wind before tax credits expire.
MIT professor makes startling prediction about
the future of US energy prices here's what
you need to know.
PJM faces possible long-term energy
emergency: DOE.
Monday September 1 2025 18:45
____
NASA Seeks Volunteers To Track Artemis II Mission.
is unix a cult?
AI Overview
The claim that Unix is a cult is a provocative exaggeration
used to describe the deeply committed, and sometimes
dogmatic, community that has formed around the Unix
philosophy. While it is not a cult in the traditional or harmful
sense, some aspects of Unix culture display cult-like
characteristics.
What is the Unix philosophy?.
why did linux destroy unix?
AI Overview
Linux did not "destroy" Unix in the sense of making it
completely obsolete, but it significantly impacted the
commercial Unix market and became the dominant
force in many areas where Unix previously reigned.
This shift can be attributed to several key factors:
Cost and Licensing:
...
Hardware Independence and Openness:
...
Community and Development Model:
...
Flexibility and Customization:
...
Market Dynamics and the Rise of x86:
While commercial Unix systems like AIX, HP-UX, and
Solaris still exist and are used in specific enterprise
environments, Linux's advantages in cost, openness,
and community-driven development led to its
ascendancy and widespread adoption, effectively
reshaping the landscape of the operating
system market.
what is a cult?
AI Overview
A cult is a group characterized by excessive, unquestioning
devotion to a charismatic leader or specific ideology, often
involving unusual or extreme beliefs and practices. These
groups frequently use psychological manipulation and
social pressure to control members, demanding
absolute loyalty and isolating them from the outside
world. While the term can refer to ancient religious
practices with negative connotations in popular usage,
in contemporary terms, it is often pejorative and
applied to groups engaging in questionable activities
or exhibiting harmful patterns of control and exploitation.
Key Characteristics.
___Unix Co-Creator Brian Kernighan on Rust,
Distros and NixOS.
is unix a mainframe mentality copier?
AI Overview
No, Unix is not a "mainframe mentality copier"; in fact,
its design principles were a reaction against the
complexity and monolithic approach of mainframe
operating systems like Multics. The two have
fundamentally different origins, philosophies, and
use cases, though they have influenced each
other over time.
Origins and foundational philosophies.
What to do with C++ modules? (nibblestew.blogspot.com).New Ubuntu Snapdragon X1E Concept ISO Published -____
Switches To Linux 6.17 Kernel.have large capacity us storage devices dimenished____
the need for cloud storage?
AI Overview
No, large-capacity local storage devices have not diminished
the need for cloud storage; rather, they serve different, often
complementary purposes. The rise of both has been driven
by the exponential growth of data, with many individuals
and businesses using a hybrid approach that combines both
local and cloud solutions.
Key differences between local and cloud storage.
why is Microsoft spending money on e C#, F#, .NET?
AI Overview
Microsoft continues to invest heavily in C#, F#,
and .NET because they are foundational to its
broader strategy of building a robust developer
ecosystem and driving revenue through its
Azure cloud platform. Rather than profiting directly
from the languages, Microsoft generates
revenue from the services and products used
to run the applications built with them,
primarily Azure.
Key reasons for continued investment
1. Fostering the Azure cloud ecosystem
...
2. Maintaining a competitive and relevant platform
...
3. Engaging the developer community
...
4. Supporting the enterprise market
...
nvestment strategies for each languageMore than 50% of Nvidias data center revenue comes____
from three customers $21.9 billion in sales
recorded from the unnamed companies.
Data centers will cause higher electricity prices,
study finds.
How the AI data center boom is breathing
new life into dirty, old coal plants.
what percentage of the us population uses ai?
AI Overview
Recent polling indicates that at least half of the US population
has used AI, with adoption rates varying dramatically
depending on the specific application. Many Americans use
AI regularly, often without realizing it.
Key findings from 20242025 polls
Nearly all Americans use AI products unknowingly. A 2025
Gallup and Telescope survey found that while only 36%
of Americans believe they used an AI product in the last week,
99% had used at least one of six common AI-enabled products.
These products include: Virtual assistants (like Alexa and Siri)
Virtual assistants (like Alexa and Siri)
Streaming services
Navigation apps
Social media platforms
Online shopping apps
Generative AI usage is significant but lower. Usage statistics
for generative AI tools like ChatGPT are lower than for
embedded AI. A May 2025 Pew Research Center survey found
that one-third of US adults have used an AI chatbot. An
earlier April 2024 Adobe survey reported that 53% of
Americans have used generative AI.Weather apps
Daily use is less common. According to a July 2025
AmeriSpeak report, only 14% of Americans use AI
daily for personal tasks.
Factors influencing AI adoption
Generational divide: Adoption rates are highest among
younger adults, with usage dropping significantly with age.
An Associated Press-NORC poll found 74% of adults under
30 use AI for information gathering at least occasionally,
versus just 20% of those 60 and older.
An October 2024 Gallup poll found 46% of adults aged
18 to 29 use AI weekly, compared to only 23% of
adults 65 and older.
Workplace adoption:
In the workplace, AI use is concentrated in certain
sectors and roles.
A June 2025 Gallup report found that AI use has nearly
doubled in the last two years, but primarily for white-collar
workers.
By 2025, 27% of white-collar employees report frequent
AI use, while use among production and front-line workers
remains low at 9%.
Gender and education: Men and individuals with higher
education levels are more likely to report using AI and
feel more knowledgeable about it.
The takeaway
The percentage of the US population using AI is
essentially 100% when considering common embedded
AI like spam filters, streaming recommendations, and
navigation apps. However, the percentage actively
using or even aware they are using more advanced,
explicit AI like chatbots is significantly lower,
representing just over half of the population.
Officials break ground on massive facility that will
transform power grid: 'Much more than a plan;
it is a reality'.
How Meta acheives 120kW a rack in 20kW
air-cooled data centers.U.S. And Allies Declare Salt Typhoon Hack A
National Defense Crisis.
Azure budget alerts go berserk after
Microsoft account migration misfire.
NASA Seeks Volunteers To Track Artemis II Mission.
____
The Venor blades may have experienced a structual failure
at very high speeds. :(
Blade number 1 identified.
Blades 1 and 5 okat?
2, 3, and 4 damaged?
Vevor charges battery ... does not drive load.
Solar can simultaneous charge battery and drive load. :)
The Trump Administrations Campaign AgainstTry 2.
Renewable Wind Reaches a New Phase.
How Batteries Are Reshaping the Global Energy System.
Sunday August 31 2025 19:19
____AI Is Golden or Not Rational: Wall Streets Battle With____
Which Road to Take.
Electricity Is Becoming Unbelievably Expensive as
the US Power Grid Decays Into Ruin.
A comp sci degree is no longer a job offer magnet.3 stunning ESP32 E Ink display projects you can____
make this weekend.Bcachefs Goes to "Externally Maintained" (lwn.net).____what is the tensile strength of a 10 AWG wire mc4 connector?
AI Overview
The tensile strength of an MC4 connector with a 10 AWG
wire is defined by two metrics: the force required to
separate a mated pair of connectors and the strength of
the cable-to-contact crimp.
Locking retaining force (mated connectors) The locking
force is the amount of pull required to separate a male
and female MC4 connector pair.
A rated MC4 connector has a typical retention force
of 50100 Newtons (N).
...
Standards for testing show a cable pull-out force
of at least 160 N for a quality connector.
...
For the most accurate specification, you should
always consult the datasheet provided by the
specific manufacturer of your MC4 connector.
To right ot wrenches.
1/16 inch wire clamp joining two 10 AWG wires end-to-end.
1/8 inch wire clamp joining two 10 AWG wire to stranded 9 AWG wire placed in camp saddle.
2 10 AWG wires jouined with 10 AWG wire nu leaving exposed wire on out side for testing>
Direct wire-to-wire contact opposed to mc4 inirect connection._______
can llm code run on premises hardware or is clould required?
AI Overview
Yes, LLM code can run on on-premises hardware, but the
technical requirements are demanding, and it depends
heavily on the size of the model. Running an LLM locally
offers benefits like enhanced privacy and control, while
cloud-based services provide scalability and ease of
use for a wider range of projects.
On-premises LLM requirements
On-premises LLM deployment, where the model runs on
local servers, is viable but requires significant upfront
investment and specialized infrastructure.
High-end GPUs:
LLMs rely on GPUs for their parallel processing power,
and the size of the model determines the required
VRAM (Video RAM).
Small (7B parameters): Require a minimum of 8 GB
of VRAM, possible on some consumer-grade cards
like an RTX 3060.
Medium (1330B parameters): Need 1224 GB+ of
VRAM, often requiring high-end consumer GPUs
(RTX 4090) or data center GPUs.
Large (70B+ parameters): Demand 40 GB+ of
VRAM and typically need expensive enterprise-grade
GPUs (like an NVIDIA A100 or H100), or multiple
GPUs working in parallel.
Sufficient RAM and fast storage: Systems need
enough RAM to load the model weights, with
32 GB or more recommended for medium and
large models. Fast NVMe SSDs are also essential
for loading model files efficiently.
echnical expertise: The organization must have
skilled IT staff to manage the complex setup,
including software, hardware optimization,
and ongoing maintenance.
On-premises vs. cloud deployment
The decision between on-premises and
cloud-based deployment depends on
your organization's priorities.
...
The growing appeal of hybrid approaches Many
businesses are adopting a hybrid approach,
combining the best of both worlds. They might
use cloud services for less sensitive or experimental
workloads, while running core, mission-critical
applications with sensitive data on-premises.
This strategy allows for a balance of flexibility,
security, and cost control.
1
2 AI Overview
PG&E does not shut down data centers by policy,
but data centers can be impacted by PG&E's Public
Safety Power Shutoffs (PSPS) (PSPS) events
designed to prevent wildfires during severe
weather. In 2019, PSPS events caused
significant data center and scientific research
shutdowns. More recently, California regulators
approved rules to speed up data center
connections to PG&E's grid, and PG&E is
proactively working to meet the 10 GW
power demand from new data centers
over the next decade.
Why Data Centers Might Be Shut Down.
3 cloud storage issues zdnet
AI Overview
ZDNet has reported issues with cloud storage
including unexpected high costs after unlimited
plans ended, problems with automatic file
syncing and conversion, and the potential for
security misconfigurations that expose data.
Other concerns involve unreliable access due to
cloud outages, users losing control of their
data as it's automatically uploaded, and the
overall expense of data management leading
to a need for strategic cost-cutting and
strategic planning.
Cost Issues
Reliability and Access Issues
Cloud Outages:
Security Concerns
Misconfigurations:
Lack of Control:
User Experience Issues
Synchronization Problems:
4 Defiant Broadcom calls for tech to go back
where it belongs: On-premises.Why China can build so quickly and America cant.
____Environment Work & the Economy Commentary Time toTry 4.
consider the community cost of offshore wind in Maryland.
Trump administration cancels $679 million for
offshore wind projects at ports.
Stop These Things Weekly Round Up: 31 August 2025.
Saturday August 30 2025 18:21
____Orsteds American Dream Becomes a Multi Billion-Dollar Nightmare.
____AI Overview____
Yes, for most 30A PWM solar charge controllers, you must
connect the battery to the controller first before connecting
the solar panels. Connecting a live solar panel to the
controller before the battery can power its internal
circuitry and may damage the unit, as the controller
needs the battery's voltage to operate correctly and
determine system settings.
Why the battery needs to be connected first.
AI Overview
Golf car batteries, particularly Lithium Iron Phosphate (LiFePO4) models,
are an excellent price/performance choice for solar applications due to
their high cycle life, deep discharge capability, and maintenance-free operation,
offering lower lifetime costs despite a higher upfront price compared to
traditional lead-acid batteries. While lead-acid batteries have a lower initial
cost, their shorter lifespan and limitations on discharge depth make them
less cost-effective for solar storage over time.
Benefits of Golf Cart Batteries for Solar.is gcc c or c++ best for a beginner?___
AI Overview
GCC (GNU Compiler Collection) is a compiler suite that
supports both C and C++, among other languages. It
is not a choice between GCC C or GCC C++; rather,
it is a choice between learning the C language or the
C++ language, both of which can be compiled using GCC.
For a beginner, the choice between C and C++
depends on learning goals and preferences:
Simplicity: C is a smaller, simpler language with fewer
features compared to C++. This can make it easier
to grasp fundamental programming concepts like
memory management, pointers, and data structures
without the added complexity of object-oriented
programming or advanced C++ features.
Low-level understanding: Learning C first can
provide a strong foundation in how computers
work at a lower level, which can be beneficial
for understanding performance and
system-level programming.
Use cases: C is widely used in embedded
systems,operating systems, and other areas
where direct hardware interaction and
performance are critical.
C++:
Features and Abstractions: C++ offers
many features and abstractions, such as
classes, objects, templates, and the
Standard Template Library (STL), which
can simplify complex tasks and
promote code reusability.
Modern Applications: C++ is extensively
used in game development,
large-scale software applications,
and systems requiring high performance
and sophisticated design patterns.
Object-Oriented Programming (OOP):
C++ supports OOP, a paradigm that
helps organize and manage complex
codebases, which is a valuable skill in
modern software development.
Recommendation:
For a deeper understanding of
fundamental concepts and system-level
programming: Starting with C can
provide a solid base before moving
on to C++.
For a quicker entry into modern
application development and
object-oriented programming: C++
can be a good starting point, as it
offers powerful features and is
widely used in various industries.
Ultimately, both C and C++ are
powerful languages, and the "best"
choice for a beginner depends on
individual learning style and career
aspirations. Many C++ resources
assume a basic understanding of
C concepts, so a solid foundation
in C can often make learning
C++ easier.
has malware been used to kill people?.
AI Overview
Yes, malware and other cyberattacks
have been linked to deaths, particularly
in the healthcare and critical infrastructure
sectors. While malware does not directly
kill people like a biological agent, it
can disrupt crucial, life-sustaining systems
and create conditions that lead to tragic
outcomes.
AI Overview
Yes, the NSA used compromised
Crypto AG ciphering machines to spy on
Iran as part of a joint CIA and German
intelligence operation. The program,
known as Operation Rubicon, allowed
U.S. and German intelligence agencies
to intercept and decipher the
communications of dozens of
countries for decades.
Key details about the spying on Iran:
Hans Bühler
Former sales representative of Crypto AG.
Google AI unable to find above Hans Buehler.180 degree 10 AWG wire connection using cable clamp.
Wire to wire direct contact. :)
mc4 connectors lack direct contact. :(
____Linus Torvalds Marks Bcachefs As Now
"Externally Maintained".
Btrfs Developer Josef Bacik Leaving Meta
& Stepping Back From Kernel Development.
Family of Microsoft employee who died warn
tech companies not to overwork workers.
Maisa AI gets $25M to fix enterprise AIs
95% failure rate.
____is ai a form of cloud computing?___
AI Overview
No, AI is not a form of cloud computing; rather,
it is a technology that is often powered by and
integrated with cloud computing, which provides
the necessary infrastructure, data storage,
and processing power for AI to operate
effectively at scale. AI also enhances cloud
services through automation and decision-
making capabilities.
How Cloud Computing Supports AI
Infrastructure:
Cloud providers offer the vast computing
resources (processing power and storage)
that AI models need to be trained and run.
Scalability:
Cloud platforms allow businesses to scale
their AI capabilities on-demand, paying
only for what they use, making AI
accessible without large upfront
hardware investments.
Accessibility:
Cloud-based AI services, known as AI as
a Service (AIaaS), provide access to pre-
built AI tools and models, allowing
companies to implement AI without
extensive development or in-house
expertise.
Data Processing:
The cloud's immense storage and
processing capabilities are essential
for AI systems to handle the large
datasets they require for training
and operation.
How AI Enhances Cloud Computing
Automation: . AI can automate tasks
within the cloud, such as resource
allocation, optimizing performance,
and managing infrastructure.
Intelligent Services:
AI adds intelligence to cloud services,
leading to innovations like
predictive analytics, personalized
recommendations (e.g., on Netflix),
and advanced cybersecurity solutions.
Improved Decision-Making: .
By analyzing data within the cloud,
AI helps businesses make more
informed decisions and drive automation.
In essence, AI and cloud computing
are synergistic technologies, with cloud
computing providing the foundation
and resources for AI, and AI, in turn,
making cloud services more powerful,
efficient, and intelligent.California tech startup once worth $1 billion___
shuts down.Tesla denied having fatal crash data until
a hacker found it.
____Trump admin cancels $679 million forTry 2.
offshore wind projects as attacks on
reeling industry continue.
The Unlikely Revival of Nuclear Batteries.
Vevor wind turbine blade fragments. :(
Old Solar Panels Built in the Early 1990s Are Still Going Strong After
30 Years at 80% Original Power And Thats a Big Deal for Our
Energy Future.
Friday August 29 2025 18:17
____Did Nvidia Just Pop an AI Bubble?____
Heres What the Market Says.
How I saved myself $1200 a year in cloud storage -
in 5 sobering steps.There's a Stunning Financial Problem____
With AI Data Centers.
Defiant Broadcom calls for tech to go back
where it belongs: On-premises.
AI Overview
Pure Storage provides all-flash data storage solutions,
including hardware, software, and cloud services, to
help businesses store, manage, and protect their data
more efficiently and cost-effectively. Their solutions cover
block, file, and object storage and are designed to
simplify data management across hybrid and
multi-cloud environments. The company's unique
Evergreen architecture offers non-disruptive upgrades
and a "storage-as-a-service" model, ensuring that
infrastructure evolves with a customer's needs without
requiring them to re-purchase hardware or migrate data.
Key Offerings:
Thirsty data centres boom in drought-hit Mexico.why do some mc5 racketing crimpers___
have a release buttonn?
AI Overview
For a ratcheting crimper, such as an MC5 model, a
release button serves as a manual override to open
the crimping jaws before a crimping cycle is complete.
This safety and convenience feature is essential for
correcting errors and preventing damage to the
tool or work materials.
Why a release button is necessary
Misaligned wire or terminal: If you start a crimp
and notice that the terminal or wire is misaligned,
you can use the release to open the jaws and
reposition the materials instead of forcing the
crimp or damaging the connector.
Stuck or jammed tool: If the crimper becomes
stuck due to a foreign object or a poorly placed
crimp, the manual release can be used to safely
disengage the mechanism and free the jaws.
Incorrect die selection: If you mistakenly start
a crimp with the wrong die for your terminal,
you can abort the process immediately to
avoid creating a faulty connection and
potentially breaking the tool.
Changing materials mid-crimp: In rare cases,
you may need to interrupt a crimp to swap
out a material. The release button allows you
to do this without having to complete the
full cycle.
AI Overview
An MC4 ratcheting crimper gets stuck primarily
because of incomplete crimping, over-crimping,
or trapped debris in the ratchet mechanism. Unlike
pliers, a ratcheting crimper must complete its full
cycle for the locking mechanism to release.
Common causes for a stuck crimper.Taco Bells AI drive-thru plan gets caught up
on trolls and glitches.
Who Was Pratik Pandey, Indian-Origin Engineer
Found Dead At Microsoft Office.
Meta pushes to release new Llama model
before 2026: report
____How much trouble is the worlds biggestTry 1.
offshore-wind developer in?.
US solar could pay tens of billions in duties
after Bidens AD/CVD moratorium ruled illegal.
Thursday August 28 2025 17:10
____
who maintains c++ compilers?
AI Overview
C++ compilers are maintained by various entities, primarily:
Open-source communities: Projects like GCC (GNU Compiler Collection)
and LLVM (which includes Clang) are maintained by large, collaborative
communities of developers worldwide. These projects are open-source
and freely available.
Commercial companies:
Many companies develop and maintain their own proprietary C++
compilers, often as part of a larger integrated development
environment (IDE) or for specific hardware platforms.
Examples include:
___what happened to old mainframe computer hardwares?
AI Overview.
Retired mainframe computer hardware is handled in several ways,
including being broken down for recycling, modernized and
repurposed, or preserved for historical purposes. Despite
popular belief, mainframes are not obsolete and continue to be
developed and used for intensive, large-scale computing tasks
by major corporations.
___Revo uninstaller used to delete Microsoft apps, incuding One Drive____
and Esge,
on $120 Asus N660 4/64 GB Windows 11 laptopo, then installing
Arduino IDE.
Edge did not work well with Google AI, we discovered.You, too, can make this ESP32 air quality monitor with an___
e-ink display, and it looks stylish to boot.
How I cut my monthly cloud storage bill in half - with 5
tough decisions.
I was storing 60TB in the cloud, but endless support
battles and rising costs forced me to rethink everything.
These five changes helped me save over $1200 a year.what languages are used in f-35 software by percent?____
AI Overview
Initial estimates from a decade ago suggested that F-35
software was primarily written in C and C++, with Ada
and Assembly making up smaller portions. However, this
breakdown is likely obsolete. While the specific percentages
for modern F-35 software are not publicly disclosed, the
aircraft is known to use C, C++, and Ada.
An unverified breakdown of the F-35's original software
languages, from a 2012 source, claimed the following
percentages:
C: 53%
C++: 35%
Assembly: 7%
Ada 83: 5%
Several factors suggest this decade-old breakdown is
no longer accurate for the F-35's current software.
C++ is now the predominant F-35 language in 2025, is this true?
AI Overview
No, it is inaccurate to say that C++ is the predominant
F-35 language in 2025. The F-35's complex software suite
was built over many years using multiple languages, and C
and C++ together form the majority of the code. In fact,
C was the single largest component in early analyses. Ada
was also incorporated through reuse of F-22 code.
Key facts about the F-35's software language use:Microsoft (MSFT) and IBM Warn about the____
Illusion of AI Consciousnes.Intel details everything that could go wrong____
with US taking a 10% stake.
Intel exec quits to run Analog Devices Oregon factory.
Why Intel investors have embraced an interventionist
White House.Oh goody, the 'first known AI-powered ransomware'
has been discovered and it 'may exfiltrate
data, encrypt it, or potentially destroy it'.
where do hackers learn how to hack?
AI Overview
Hackers, both malicious and ethical, learn through a variety
of paths, from formal education to self-taught online practice.
The most effective learning combines a strong theoretical
foundation with hands-on, practical experience.
Formal education
Computer Science and Cybersecurity Degrees: Many
universities offer degrees that cover essential topics
like networking, operating systems, and computer
programming.
Post-Graduate Programs: Master's degree and executive
education programs are also available for those looking
to specialize further.
Online courses and training platforms
These resources allow for flexible, self-paced learning
and offer structured, comprehensive training.
Coursera: Offers courses and certificates from universities
and companies like IBM and Johns Hopkins University.
dX: Features ethical hacking courses and master's
degrees from institutions like Harvard and Berkeley.
EC-Council: A well-known provider of industry-recognized
certifications like the Certified Ethical Hacker (CEH).
Udemy: Provides a wide variety of courses on
ethical hacking for all skill levels.
Hands-on practice and community challenges
To truly become a hacker, theory must be applied in
practice. These platforms and competitions offer legal
environments to test skills.
Capture The Flag (CTF) Challenges: Time-based
competitions where participants hack into systems
to find "flags" or hidden pieces of code.
ryHackMe: An online platform with structured
learning paths and virtual labs for practicing
cybersecurity skills in a browser.
Hack The Box: Offers a more advanced platform
with hacking challenges designed for aspiring and
professional security experts.
OverTheWire: A set of hacking wargames that
introduce participants to security concepts.
VulnHub: Provides virtual machines with
intentionally vulnerable applications for users
to practice their hacking skills.
Foundational skills
Regardless of the learning path, all hackers must
first master the fundamental building blocks
of technology.
Networking: An in-depth knowledge of how
networks function is crucial, including protocols,
routers, switches, and firewalls.
Operating Systems: Familiarity with multiple
operating systems, particularly Linux, is
essential, as it is a common tool for security
professionals.
Programming and Scripting: Skills in languages
like Python, JavaScript, and Bash allow for the
automation of tasks and the development of
custom tools.
Security Concepts: Understanding encryption,
security protocols, and common attack types
like social engineering is foundational.
Certifications and professional growth
Certifications provide credibility and can open up
job opportunities in the cybersecurity field.
Certified Ethical Hacker (CEH): A well-known
credential for aspiring ethical hackers.
Offensive Security Certified Professional (OSCP):
A highly respected, rigorous certification
that proves practical penetration testing skills.
CompTIA Security+: An entry-level certification
that demonstrates fundamental cybersecurity
knowledge.
Networking and Communities: Joining online
communities, attending conferences, and
following blogs are essential for staying
up-to-date in the rapidly evolving
cybersecurity landscape.
Cyberattack that crippled Nevada's systems reveals vulnerability of smaller
government agencies to hackers.
____Cadeler shrugs off US vessel concerns and vowsTry 1.
to help Orsted through 'sad situation'.
Wednesday August 27 2025 19:03
____Dangerous advice for software engineers (seangoedecke.com).____
NVIDIA Investors On Edge As AI Narrative Worth Trillions Of
Dollars At Stake: $260 Billion Stock Gyration Expected.
U.S. Nuclear Energy Drive to Spur Uranium Enrichment.Runs freertos claim.
Run freertos and a Forth claims/
____These 5 self-hosted services are overkill for my
home lab, but I use them anyway.
Greenboot Rust Rewrite Approved For Fedora 43.
AI Overview
The Greenboot Rust rewrite is a new, Rust-based version of the
Greenboot system health check framework, developed by Red Hat
engineers for Fedora Linux, that maintains the original functionality
but expands support to include bootc systems alongside the previous
rpm-ostree-based systems. The core purpose of Greenboot is to
perform automatic system health checks and enable rollback if an
update fails, and the new Rust version aims to provide a more reliable
and modern implementation for Fedora's IoT and other
container-focused systems.
What is Greenboot?
Greenboot is a framework that runs health checks during the
boot process of a system.
LLVM 21.1 Released With AMD GFX1250 Target,
Improved RISC-V, New C/C++ Features.
____US Intel (stratechery.com).____
NVIDIA Outlines GB10 SoC Architecture
at Hot Chips 2025.
Is the AI boom finally starting to slow down?.
The A.I. Spending Frenzy Is Propping Up the
Real Economy, Too.
The Era of AI-Generated Ransomware Has Arrived.what are options for 10AWG direct
wrire to wire connectors?
AI Overview
There are several reliable options for direct wire-to-wire
connectors for 10 AWG wires, ranging from push-in
to crimp-on types. The best choice depends on the
application, including whether the connection is in
a wet or dry location and whether you are using
solid or stranded wire.
AI Overview
No, issues with MC4 connectors do not account for most
solar system failures. While connector problems are a common
cause of electrical faults, poor installation, inverter issues, and
physical panel degradation are more frequent and widespread
causes of system underperformance and failure.
Why MC4
connectors are a notable failure point.
Conclusion.
While faulty MC4 connectors are a significant and often
preventable source of electrical issues and fire hazards, they
are part of a broader set of more common failure points. Major
system failures are more frequently linked to poor installation,
problems with the inverter, or physical degradation of the panels over time.
____Surging US electricity prices put TrumpTry 2.
pledge in jeopardy.
Aging Coal Plants Could Cost Americans Billions.
Canceled wind project puts thousands of jobs at risk.
Nuclear Energy Stock Up Over 900% in the Past 365 Days.
Tuesday August 26 2025 09:14
____1 Multitasking mainframe mentality.
2 Single task bremetal BASI/Forth mentality.
Nanocomputer implemenations.
___Pi Zero-sized Radxa Cubie A7Z SBC features Allwinner____
A733 Cortex-A76/A55 SoC, up to 16GB RAM, WiFi 6.
AI Overview
While the Radxa Cubie A7Z was listed on AliExpress and Arace, it is
currently out of stock on both platforms. As of late August 2025,
it appears the device was announced and briefly listed but may not
be widely available yet.
The following are primary vendors and platforms to monitor for
future availability:
__
Radxa Cubie A7Z. Next. Radxa Cubie A7Z. $20.00 Regular price Sale.
AI Overview
The Radxa Cubie A7Z does not officially run FreeRTOS, but instead
ships with full-fledged operating systems like Debian Linux and Android.
The Cubie A7Z features a powerful Allwinner A733 SoC, including an
ARM Cortex-A76/A55 CPU, which is far more powerful than the
microcontrollers that FreeRTOS is designed for.
However, the Allwinner A733 SoC includes a low-power
RISC-V E902 coprocessor specifically designed for real-time
tasks and low-power management. While Radxa does not advertise
official FreeRTOS support for this RISC-V core, it is a suitable
candidate for running a real-time OS. For advanced users and
developers, this provides an avenue for custom implementation.
Why the Cubie A7Z uses Linux instead of FreeRTOS The choice
of operating system depends on the hardware and intended
application.what is the difference between a hacker and a malwarian?____
AI Overview
There is no recognized word or role called a "malwarian." The term you
are likely looking for is malware author, which describes the person who
writes malicious software. The fundamental difference is that a hacker is
a person who exploits computer systems, while a malware author creates
the tools that hackers and other cybercriminals use.
Hacker
A hacker is an individual who explores and exploits computer systems
to gain unauthorized access. Their motivations can vary, ranging from
ethical security testing to malicious cybercrime.
...
Malware Author.
...
.Key differences summarized.Too Old, Too Uneducated: Aging Workers in Beijing Struggle
for Work.
How China became an innovation powerhouse.
____Solar Plus Battery Storage This Changes Everything.Try 1.
Does a mc4 connector work with 8 AWG wire?
AI Overview
Yes, it's possible to work with 8 AWG wire and MC4 connectors, but
you must use MC4 connectors specifically designed for 8 AWG wire,
not the standard ones for 10 AWG or smaller wires, as these may
overheat and cause a fire risk. You can also achieve compatibility
by using Amphenol H4 connectors (which are often compatible with
MC4s) or by using the wire directly into a device's combiner box
or a specialized adapter for larger gauge PV cables.
How to Make MC4s Work with 8 AWG Wire.
Monday August 25 2025 19:05
____does a green 10 AWG wire nut make a better electrical connection
than a mc4 connector?
AI Overview
An MC4 connector makes a significantly better and safer electrical
connection than a green 10 AWG wire nut for solar photovoltaic
(PV) applications. The two are designed for completely different
purposes and environmental conditions.
Feature MC4 Connector.
The risks of using a wire nut for solar connections
Using a wire nut in an outdoor solar application is a dangerous shortcut
that compromises the safety and efficiency of your system. Key
risks include:
Does 10 AWG in wire directly touch to the out wire with a mc4 connector?
AI Overview
No, a 10 AWG wire does not directly touch the "out" wire when an MC4
connector is used. The MC4 system uses male and female halves, which
each have their own internal metal contact that must be properly crimped
onto its respective wire. When the two halves are snapped together, the
metal contacts inside connect to each other, but the wires themselves
remain separate.
Here is a step-by-step breakdown of how the internal wiring works:
This entire process ensures that the electrical connection is made
between the insulated metal terminals, not between the raw wires.
The male and female plastic housings and the internal sealing
components provide protection and prevent accidental contact with the
circuit.
____An Enormous Data Center In Wyoming Will Consume
5x More Power Than The State's People. The Owner Remains A Mystery
____The air is hissing out of the overinflated AI balloon.____
Are tech giants getting nervous? They should be.
AI Overview
Cult Recruitment May Be More Prevalent Than You Thought ... A cult recruiter is
an individual who uses deception, manipulation, and persuasive techniques to
entice others into joining a cult. These recruiters often target individuals
during times of vulnerability, exploiting emotional needs for things like
belonging and purpose. They may use tactics like love bombing
(overwhelming new recruits with affection), mirroring interests
to build rapport, and using loaded language to create a sense of exclusivity,
all while obscuring the group's true nature and intentions.
How Cult Recruiters Operate Targeting Vulnerability:
Recruiters seek out individuals who are experiencing emotional hardships,
such as loss, loneliness, or a desire for meaning, according to Number
Analytics and HowStuffWorks.
Deception and Misrepresentation: They present the cult as something
benign, mainstream, or low-pressure to downplay its true nature.
Love Bombing: A common tactic is overwhelming potential recruits with
excessive affection, flattery, and attention to create an emotional bond
and a feeling of acceptance, notes Number Analytics.
Building Trust Through Rapport: Recruiters may mirror the interests,
values, and language of their targets to quickly establish a sense of
connection, according to Number Analytics.
Exploiting Emotional Needs: Recruiters appeal to the target's desire
for community, purpose, or love, promising to fulfill those needs
within the group.
Innocuous Invitations: The recruitment process often begins
with seemingly innocent gestures, like invitations to a dinner
or a social event, that are actually designed to draw the person
into the group's influence, says the University of Texas
Permian Basin.
Why People Are Susceptible Emotional Need:
A significant factor is the person's existing need for acceptance,
purpose, or community, which the recruiter effectively exploits.
Lack of Awareness:
Potential recruits are typically unaware of the manipulative tactics
being used or the true agenda of the group, according to HowStuffWorks.
What to Watch For
Unsolicited Affection: Be wary of sudden, overwhelming displays of
affection, praise, and attention.
Fast Pace: A significant red flag is when things move too fast,
with a sense of being rushed into a decision or commitment.
Secrecy and Control: Watch for an environment where
information is controlled, questions are discouraged, and
there's an excessive need to please the leaders, per Make
It Conscious. ________AI Overview____
For MC4 connectors and 10 AWG wire, the correct method is to strip
about 1/2 inch (12 mm) of insulation, insert the wire so the
insulation butts against the metal terminal, then crimp the metal terminal to
the wire. This ensures a secure, weatherproof, and safe connection.
Here is a breakdown of why this method is best and why the other
is incorrect.
AI Overview
In an MC4 strip 1/2 connector, the metal contact (or pin) is
crimped to the stripped wire conductor, but the insulation tabs
are not crimped. Instead, a watertight seal is created when the
connector is assembled and tightened. Crimping the pin to the wire,
Attaching the insulation tabs: :)
if use the 1/2 inch, crimp to the barrel, what shoud I do with the
pin insulator tabs?
AI Overview If you are crimping a pin connector to a wire using
a standard crimping tool, you use the insulation tabs to create
strain relief and secure the wire. Do not cut the insulation tabs off.
step process: Insulation tabs:
These tabs are located at the back of the connector and are
longer than the tabs for the bare wire. They are designed to
fold over and grip the wire's insulation, providing a crucial
strain relief.
Conductor tabs: These tabs are in front and are shorter.
They are crimped over the bare wire to establish the electrical
connection.
Why you shouldn't remove the insulation tabs
Removing the insulation tabs or simply crimping them down on
bare metal is a mistake that compromises the integrity of
your connection.
Creates strain relief: When you bend the tabs over the
wire's insulation, it prevents the wire from pulling out of the
terminal. Without this, any physical stress on the wire is
transferred directly to the electrical crimp, which can cause
it to fail.
Prevents shorts: The crimp on the insulation holds the wire
securely in place so that the electrical connection and the bare
conductor aren't exposed. This prevents accidental contact with
other terminals, which could cause a short circuit.
Protects the connection: The combination of a strong electrical
crimp and a solid strain-relief crimp creates a robust connection
that is resistant to vibration and movement.
How to use the insulation tabs properly Strip the wire correctly:
1. Strip only enough insulation to expose the bare wire that will
be gripped by the conductor tabs. The insulation itself should
extend into the area where the larger, rear tabs are.
2. Align the connector: Place the pin connector in the correct
die of your crimping tool, aligning the wire so that the bare
conductor is under the front tabs and the insulation is under
the back tabs.
3. Crimp twice: A proper crimp is a two-stage process.
Some tools have separate dies for the insulation and
conductor crimps, while others have a single die that does both.
First, crimp the front tabs down on the bare wire to establish
the electrical connection.
Second, crimp the rear tabs down on the wire's insulation
for strain relief.
Following these steps ensures your connection is not
only electrically sound but also mechanically durable and safe.
Linux is 34 years old today Linus Torvalds meekly announced this
free new OS in the comp.os.minix newsgroup on this day in 1991.
AI Overview
The ATmega328P uses a single-cycle AVR RISC instruction set,
which includes 131 powerful instructions executed in one
clock cycle for high performance at 1 MIPS per MHz. This
architecture includes 32 general-purpose working registers
directly connected to the ALU, enabling two registers to be
accessed simultaneously in a single instruction. The instruction
set supports various operations, including arithmetic, logical,
data transfer, and branching instructions, all optimized for
efficiency and low power consumption, as seen in devices
like the Arduino Uno.
Key characteristics of the ATmega328P instruction set:does arduino have a competitor to the____
expressif devkit esp32 boards?
AI Overview
Arduino has responded to the popularity and capabilities
of Espressif's ESP32 boards by incorporating ESP32
chips into some of their own official boards. While
not direct "competitors" in the sense of offering
identical alternatives to every specific Espressif
DevKit, these Arduino boards leverage the ESP32's
features, particularly its integrated Wi-Fi and
Bluetooth connectivity.
Examples of Arduino boards utilizing
ESP32 chips include:
Arduino UNO R4 WiFi: . This board integrates an
ESP32-S3 module, adding Wi-Fi and Bluetooth
capabilities to the familiar UNO form factor.
Arduino GIGA R1 WiFi: . A more powerful board
also featuring an ESP32-S3 module for wireless
connectivity, alongside a robust STM32H7
microcontroller.
Arduino Nano ESP32: . A compact board specifically
designed around the ESP32-S3, offering a smaller footprint
with integrated Wi-Fi and Bluetooth.
These boards allow users to benefit from the ESP32's
advanced features within the Arduino ecosystem,
including the widely used Arduino IDE and its extensive
library support. This provides an alternative for users
who prefer the Arduino brand and development
environment while seeking the wireless capabilities
of the ESP32.
does the arduino ano esp32 run freertos?
AI Overview
Yes, the Arduino Nano ESP32 does run FreeRTOS, as the
Arduino core for ESP32 is built on top of the Espressif IoT
Development Framework (ESP-IDF), which natively uses
FreeRTOS. You don't need to install FreeRTOS separately;
you can directly use its task management, scheduling, and i
nter-task communication features in your Arduino sketches.
How it works.
does the arduino ano esp32 run esp32forth?
AI Overview Yes, the Arduino Nano ESP32 can run ESP32-Forth.
Since the Arduino Nano ESP32 uses an ESP32-S3 microcontroller,
and the ESP32-Forth project was developed to run on the ESP32
platform, the Nano is fully compatible.
The process of getting ESP32-Forth to run on the
Arduino Nano ESP32 involves the following steps:
n: does the Nano V3.0, Nano Board ATmega328P run freertos?
AI Overview Yes, the Nano V3.0 with the ATmega328P can run FreeRTOS, though it has
significant memory constraints. A specialized, minimal version of FreeRTOS has been
ported to the ATmega328P microcontroller, and libraries are available through
the Arduino IDE.
How FreeRTOS is adapted for the ATmega328P.
does the e Nano V3.0 with the ATmega328P run a forth?
z
AI Overview
Yes, an Arduino Nano V3.0 (or a compatible e Nano V3.0) with
an ATmega328P can run a Forth interpreter, though it doesn't
come with one by default. The ATmega328P microcontroller i
s supported by several implementations of the Forth language.
To run Forth on your board, you will need to:This 1TB Dual-Sided Flash Drive Is a Solid____
Alternative to Cloud Storage.
Cloud storage can be convenient, but it often comes
with recurring fees, account limits, and the need
for a constant internet connection.
Seattle hopes to build its future in Oregons desert
or blackouts may follow.
WHAT IS AN SS USB PORT, AND WHAT ARE
THEY USED FOR?.Prompt engineering is collapsing GPT-5 just proved it.
____Try 1.
Sunday August 24 2025 18:08
____
ESP32 Sets Sail As A Modern Bus Pirate Powerhouse._______
Linux Malware Delivered via Malicious RAR Filenames
Evades Antivirus Detection.I built a $30 "Now Playing" display for my record____
player with an ESP32, and it looks great.
5 signs that self-hosting is not for you.
One of the best ways to dodge Windows 11's system r
equirements just got even better.Its Not Going to Slow Down: The Tech Stock
Everyone Is Watching This Week.
Mapped: Unemployment Rate By State in 2025.
William Payne · Fri
1 Are c++ projects now recognized as expensive?
2 And impossible to maintain without C++without c++ cult members employment?
Joe Zbiciak Joe Zbiciak · 15h Clearly you have an axe to grind. Please grind it elsewhere.
Try 1.