FAA/NTSB flight control software cover-up remediation
FAA FOIA lsawsuit - District of Columbia avoidable.

First posted
Friday March 24, 2023 20:08
Updat
Monday October 27 14:09

End Monday October 27 14:09 https://prosefights2.org/irp2024/windscammers28.htm.

Start Monday July 7, 2025 08:26: https://prosefights2.org/irp2023/windscammers27.htm.


7/27/24
Conduct unbecoming navy officer Admiral William H Payne Complaint.


7/19/24

EyeglassWorld reading glasses and and optometrist exam issues.

Unable to update above page. Updated page below.

https://prosefights2.org/irp2023/mvdnow4.htm

1/24/24.
Kaneohe Poseiden P8A FOIA.



Vinson F-35C FOIA.


1/10/24.

liaison
1. communication or cooperation which facilitates
a close working relationship between people or organizations.
1/8/24.
FOIA.GOV.
Department of Defense Department of the Navy

202-685-0412
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil

Chief of Naval Operations, DNS-36
2000 Navy Pentagon
Washington, DC 20350-2000
usn.ncr.dns.mbx.don-foia-pa@us.navy.mil
12/2/23.

policy.
a course or principle of action adopted or proposed by a government, party, business, or individual.

11/25/23.
bamboozle

fool or cheat (someone).
11/11/23.
certification

the action or process of providing someone or something with an official document attesting to a status or level of achievement.
11/10/23.
retaliation

the action of harming someone because they have harmed oneself; revenge.

11/9/23.
nemesis
the inescapable agent of someone's or something's downfall.
11/7/23.
con
persuade (someone) to do or believe something, typically by use of a deception.

10/31/23
conned

persuade (someone) to do or believe something, typically by use of a deception.

7/5/23
Reprimand: "a rebuke, especially an official one.
3/22/23.

Phone numbers issues.
1-855-658-2676.
1-888-127-6445478.

Recording 2, 3, 4, 5, 6, 7, 8, 9.
3/21/23.
Phone message from US government?.

Two forms of id?
3/20/23
Feb 27, 2023. 4:41?PM (2 days ago)
to me, DONFOIAPublicLiaison@navy.mil

Good evening, Mr. Payne,

Per our phone conversation, I recommend that you consider the following as points of contact possibly relevant to your concern of ensuring the safety of the avionics of the F-35:

1. The U.S Naval Safety Command, which conducts investigations of naval aviation mishaps. Quarterdeck: 757-444-3520. To report a mishap (or in this case, possibly, a potential mishap), Staff Duty Officer: 757-444-3520v ext. 7017.

2. The U.S. Fleet Cyber Command/ U.S. Tenth Fleet, 9800 Savage Road, Suite 6586, Fort Mead, Md 20755. To send them a message, go to https://www.fcc.navy.mil/Contact-Us/

As to making a request of the Department of the Navy under the Freedom of Information Act (FOIA), the main way to do so is to use FOIAonline. This is a website that you can find simply by searching the internet for the term “FOIAonline” (the correct site should appear as the top hit, and it will contain “foiaonline.gov” as part of the URL). FOIAonline is intended to be easy to use by the public; nevertheless, if you have any further questions or concerns, do not hesitate to let me know.

Regards,

Christopher Julka
Freedom of Information Act
Policy Coordinator & Public Liaison
Department of the Navy
Office of the Chief Information Officer

Christopher.a.julka.civ@us.navy.mil

(703) 697-0031

From: william payne
Sent: Monday, February 27, 2023 1:12 PM
To: DONFOIAPublicLiaison@navy.mil
Subject: [URL Verdict: Unknown][Non-DoD Source] bill payne alternate email address

Hello Mr Julka,
Alternate email address.

Sunday February 26, 2023 19:07

Module sizes, updates, costs?
Department of the Navy Christopher Julka 2/24/23 phone message.




3/1/23
F-18 Carrier break and landing!.





12/25/22

,

12/21/22.
The statute of limitations for a FOIA claim is six years. However, a requester may refile their FOIA request to restart the statute of limitations.Feb 21, 2017
11/24/22.
Airbus A220 autopilot warning. Full coverage.

FAA wants pilots to be less dependent on computer autopilots.
9/18/22


4/3/22
prosefights hacked. Again. :(

6000 lines of code vs 100 60 lines of code missing.


Hacking attempted recovery 4.6.22.

2/5/22.





__________________




5/01/22.
Linus Torvalds reveals the 'true' anniversary of Linux code.







9/21/21.
US Navy software FOIA request.






9/3/21.
Christopher Julka (703)-697-0031 DONFOIAPublicLiaison@navy.mil.
8/24/21.

c/c++ wind turbine software use too?
NTSB 8/20/21 phone message.





Tweet.











4/22/21.




No appeal possted yet. "(
4/21/21.

Software tehnology? c/c++?
Scary USS Gerald R. Ford - How Powerful is the CVN-78? US Navy's $13 Billion Aircraft Carrier.
4/20/21.

Speed display disappear? Software issue?
"(where's) my speed my speed"











4/18/21.




Transcript.
4/17/21.
Where is air speed?
4/1921.










Rapid Descent and Crash into Water Atlas Air Inc. Flight 3591 Boeing 767-375BCF, N1217A.
4/16/21.
NTSB Ms Tamara Crawford phone conversation 4/16.

We are Legion.
We do not forgive.
We do not forget.
Expect us.
4/1421.

4/13/21. 'view' oly appeared starting today?

4/12/21.
What computers? How many modules? Lines of code for each module?







Tamara Crawford audio 4/9/21.
4/11/21





https://data.ntsb.gov/Docket?ProjectID=99013


4/19/21.




Poster attended book signing at Page One i Albuquerque.





Sunday, January 07, 2001 5:52 PM
Dear Friend,

we saw some of these documents http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
but we would like your commentary about what happened and all circumstances so
we can post it on our website but as well as a report to the mailing lists.

With thanks

On behalf of SMCCDI A. Zoubin ( Information Committee) http://www.iran-daneshjoo.org/

Wednesday, January 17, 2001 7:10 PM

Dear Friend,

A stand for Ahmad but why this question?

Iran Danesjoo Information Committee project reports. [1, 2 , 3].
Swiss Radio International link fixed with irp2014 switch from malwarebytes.

Tape traveled from Zurich to Baltimore Sun and Lassez Faire City Times ... with intermediate stop.
Admiral fornmer Navy Seal.


Another request?
4/10/21.


Phone message attachment.


3/23/21.
LIGHTWEIGHT OS FOR ANY PLATFORM.








3/20/21.


3/22/21 Attachments.











1

1



1

1











2/4/21.
12/30/20.


R44jPT22f3d
12/25/20.
12/22/20. :( !!!


J210*9t765r^

12/22/20. :( !!


J210*9t765r^
12/21/20. :( !


12/17/20. :(


12/16/20. Something wrong?
12/15/10


12/14/20.


12/10/20.














12/8/20.
Tuesday December 8, 2020 14:43

http://www.prosefights.org/irp2020/windscammers13.htm#ntsbbryson

Hello Ms. Bryson,

This is an appeal of FOIA No. FOIA-2020-00406 denial.

Ms. Melba Moye wrote on September 14, 2020

appears inapplicable for denial because FOIA requested DATA
Final 3 minutes of Atlas Air #3591 Boeing 767:
1 Names of all software modules executed.
2 Time of execution. Nanosecond accuracy, if possible.
3 Altitude of #3591 at time software module entered.
from
NTSB chairman Sumwalt, Friday June 12, 2020 10:32.
Ms. Moye's denial reason is unsupported.

Ms. Moye/Ms. Joy Gordon make legal attempt to deny my FOIA
These legal arguments should be addressed to a judge/jury in event I am unable to receive requested documents by
administrative means?

Since no legitimate reason for denial provided by Ms. Moye and Ms. Gordon exist, I ask that you grant appeal.

And have NTSB deliver requested documents.

Regards,
william harris payne.

12/9/20.








____
https://dms.ntsb.gov/pubdms/.

https://www.ntsb.gov/_layouts/ntsb.aviation/index.aspx.

NTSB
AttN: Ms Sharon Bryson
Manager Director
490 L'Enfant Plaza SW
Washington, D.C. 20594

Chaff?





10/26/20 FAA FOIA lawsuit - District of Columbia..
Boeing 787: A Financial Engineering Nightmare?.



10/6/20.
____

Boeing 737 MAX: Turning A Crisis Into A Win.





Programming languages: Java founder James Gosling reveals more on Java and Android.
10/5/20.

Liberal arts 'educated'?


https://forums.linuxmint.com/viewtopic.php?t=294209





Linux 5 day course in focus because of 737 MAX and Raspberry Pi 4B.10/4/20
Programming languages: Java founder James Gosling reveals more on Java and Android.

Back again after deletion.



"Back in the early 1990s it was well understood that the number one source of security
vulnerabilities was just pointers, was just bugs, like 50% to 60% to 70% were bugs and the
vast majority of them were like buffer overflows.

Liam Tung.

why java michael barr.
10/1/20.







At that stage, C an C++"absolutely owned the universe" and everything was being written in those languages.





The statistics in this article have been a part of software engineering for decades.
Back in 1990, they were a major pain point, and a major motivator behind many of the features
of Java.

James Gosling.



9/18/20.
Unable to shrink email.





:( ++



9/14/20


9/11/20
ntsb foia status message.
8 rings.
8/11/20.



Boeing 747s still get critical updates via floppy disks.







Which OSs support floppies?







____
This surprise Linux malware warning shows that hackers are changing their targets.



8/10/20.
FAA Dave Duff phone message 1 2. 8/01/20.









A declaratory judgment is a binding judgment from a court defining the
legal relationship between parties and their rights in a matter before the court.
Typically, a party will first send a cease and desist letter prior to seeking
declaratory judgment from a court.

Injunctive relief, also known as an injunction, is a remedy which
restrains a party from doing certain acts or requires a party to act in a certain way.
It is generally only available when there is no other remedy at law and
irreparable harm will result if the relief is not granted.
8/7/20.

Where is Mark House?


206-231-2046 call audio.



7

*
                      UNITED STATES DISTRICT COURT
                         

FAA/NSTB FOIAs
Boeing 737 MAX, Atlas Air #3591 767-375 1992
software certification?

Thursday April 25, 2019 15:38
Updated
Friday May 31, 2019 16:45
3/7/23


New Mexico
Energy, Minerals & Natural Resources Department
nformation request

First posted
Monday June 22, 2020 13:10
Updated
Friday October 23, 2020 09:27

Notes
Monday October 27 18:39

End Monday October 27 14:09 https://prosefights2.org/irp2024/windscammers28.htm.

Start Tuesday October 28 07:23 https://prosefights2.org/irp2023/windscammers29.htm.

___
Tech Chegg slashes 45% of workforce,
blames ‘new realities of AI
’.
___
Navajo Nation will spend $3 million on
test of new tech for cleaning
uranium mine waste
.

NextEra Energy partners with Google to
restart Iowa nuclear plant
.

Google AI response.

In considering the entire lifecycle,
including mining and waste, nuclear
power is significantly cleaner than
fossil fuels but faces unique
environmental challenges.
Nuclear has extremely low
greenhouse gas emissions
but must deal with long-term
radioactive waste, while
fossil fuels have massive
emissions and produce vast
amounts of hazardous
waste

Lifecycle comparison: Nuclear vs. fossil fuels
...
The waste cleanup difference
...
Conclusion From a lifecycle perspective,
fossil fuels are the "dirtier" source of
electricity due to their immense
output of atmospheric pollutants
and greenhouse gases. While
nuclear power has its own waste
and mining challenges, the
extremely high energy density
of uranium means it has a
smaller material footprint
per unit of energy than fossil
fuels and some renewables.
The waste management for
nuclear is a contained and
regulated process, whereas
the waste from fossil fuels
contaminates the air, land,
and water on a massive scale.

It's insulting to read AI-generated
blog posts (pabloecortez.com)
.


____
Google AI reponse ... NOT Google AI Overview!

There are three primary reasons most big tech
programmers do not decompose their software
into components certifiable at the machine
language level: cost and time, complexity,
and tooling. While formal verification at
the machine level is theoretically possible
and used for highly critical systems, it is
impractical and unnecessary for the vast
majority of commercial software.

Cost and time

Formal verification of code at the
machine level is a massively
time-consuming and expensive
process. Massive effort per line
of code: Proving that machine
code instructions behave
exactly as intended requires
immense manual effort. The
time and resources needed
for this kind of rigorous,
mathematical proof are
several times greater
than the time it takes
to write the code itself.
For example, one military
operating system project
noted it took 3.3 times
more effort to formally
prove software correct
than to develop it with
traditional methods.

Delay to market: In the
highly competitive tech
industry, speed to market
is critical. The time required
for full formal verification
would delay product releases
by months or years, an
unacceptable trade-off
for companies focused
on rapid development
and iteration.

Diminishing returns: For
most applications, the
incredibly high cost of
machine-level verification
does not produce a
proportional benefit.
Agile and iterative
development methods,
combined with robust
testing, provide a level
of quality assurance that
is "good enough" for the
vast majority of commercial
software and is far more
cost-effective.

Complexity

Large-scale software is simply
too complex for
machine-level certification
to be feasible. Difficulty of
requirements: The first
step in formal verification
is creating a perfect,
unambiguous, and complete
specification of what the
software is supposed to
do. For big tech
software—like a social
media platform or a
cloud service—the
requirements are
constantly changing
and are often ambiguous.
Proving a program
corresponds to an
incomplete or incorrect
understanding of
requirements is pointless.

Hardware and environment
dependencies:

Certifying machine language is
not portable across different
processors and hardware. A
verification for an Intel x86
chip would not apply to an
ARM chip in a mobile phone.
Modern software runs across
a vast array of constantly
changing hardware and
software dependencies,

making machine-level
verification an endless,
unwieldy task.

The oracle problem: Formal
verification can prove that
a program does what its
specification says, but it
cannot prove that the
specification itself is correct
or complete. If the initial
requirements are flawed,
the verified program will
still be flawed.

Abstraction and tooling

Developers use high-level
languages and abstraction
to build large-scale software
efficiently. Decomposing to
the machine level would
destroy this essential
advantage. Abstraction
is a necessity: Modern
programming languages
like Python, Java, or C++
abstract away the complex
details of the underlying
hardware. This allows
programmers to focus
on solving high-level
problems rather than
managing individual
processor registers.
Certifying at the machine
level would force a return
to this low-level, tedious,
and error-prone style of
programming.

Lack of developer expertise:

Few programmers have the
necessary training in formal
methods and predicate logic
to be able to use the tools
required for machine-level
verification. It is a specialized,
academic field, not a
mainstream industry practice.

Immature toolchain:

The software tools for formal
verification are still a topic of
active academic research and
are not yet user-friendly or
mature enough for widespread
"industrial adoption, especially
for large codebases. This is in
contrast to the robust and
feature-rich toolchains that
exist for high-level languages.

Lack of developer expertise:

Few programmers have the necessary
training in formal methods and
predicate logic to be able to use
the tools required for machine-level
verification. It is a specialized,
academic field, not a mainstream
industry practice. Immature
toolchain: The software tools
for formal verification are still a
topic of active academic research
and are not yet user-friendly or
mature enough for widespread
industrial adoption, especially for
large codebases. This is in
contrast to the robust and
feature-rich toolchains that
exist for high-level languages.

Embedded systems: Simple
systems with fixed,
unambiguous requirements,
such as a smart card or a
small embedded device, can
sometimes be formally verified.
____
is the x86 displacement signed and two'
s complement?

AI Overview

Yes, x86 displacement is signed and uses two's
complement representation. This allows it to
represent both positive and negative offsets,
which are added to a base address to form
an effective memory address.

Signed: The
displacement is treated as a signed integer,
which means it can be positive or negative.

Two's Complement: Negative values
are represented using two's complement,
the standard binary format for signed
integers, according to Stack Overflow
and notes.shichao.io.

Addressing: When an instruction is
executed, the signed displacement
is sign-extended to 64 bits (in 64-bit
modes) and then added to the base
address to calculate the final
memory address.

____
Amazon plans to cut up to 30,000 office jobs - Reuters.

____
Shocking map reveals where power-hungry
data centers could spark next public health
disaster in the US
.

In a first, a data center is using a big
battery to get online faster
.

NorthWestern plans ‘large load’ tariff
for Montana data centers
.

AI Is the Bubble to Burst Them All.

__

As Vibe Coding Fades, Woz Offers
Production-Ready Alternative
.

what is woz?

AI Overview

The acronym WOZ or nickname "Woz" can
refer to several different things depending
on the context. The most common uses
are as a nickname for Apple co-founder
Steve Wozniak or an abbreviation for
a real estate valuation system in the
Netherlands.

Steve "Woz" Wozniak.

___
Everything you know about last week's AWS outage is wrong.
    AI wasn't the cause, and multi-cloud is for
    rubes
[a country bumpkin.]

were software complexity and obfuscation
issues with the aws internet outage?


AI Overview

Yes, software complexity was a key factor in
the Amazon Web Services (AWS) outage in
October 2025, according to AWS's own
post-mortem analysis. While obfuscation was
not explicitly cited as an issue, the complexity
of the automated systems led to a cascading
series of failures that were difficult to
diagnose and repair.

Complexity and automation created a
cascading failure
...
Competing automated fixes:
...
Difficulty of remediation...
Obfuscation via proprietary systems...
This kind of software complexity is a
recognized challenge in modern,
highly automated infrastructure. As
systems become more automated
to improve reliability, they
introduce new, rarer, but
potentially more severe failure
modes that are difficult to
predict and troubleshoot.

Ranked: U.S. States With the
Highest Homelessness Rates
.

fwhat is the percentage of computer
programmers in the homeless
population?

AI Overview [AI overview in search
engine mode, not AI mode?]

There is no reliable public data on the
percentage of computer programmers
within the homeless population.
Detailed surveys on homelessness
generally focus on demographics
such as age, gender, and race, as
well as broader employment
status, but do not track specific,
high-skilled professions like
computer programming.

Here's why this data is difficult to
obtain and what is known
about employment among
people experiencing homelessness:
...
Anecdotal evidence: While there
are rare anecdotal accounts
of individuals with programming
skills experiencing homelessness,
these do not represent a
measurable trend. These
stories are more common in
online forums and personal
blogs than in large-scale
studies.

Dive deeper in AI mode. :)

Exclusive: US Department of Energy
forms $1 billion supercomputer and
AI partnership with AMD
.

is cloud computing being blamed for the
aws internet outage?

AI Overview

During the October 2025 outage, Amazon Web
Services (AWS) itself identified a rare software
bug within its own internal systems as the
cause. However, some critics are using the
incident to highlight broader issues related
to the high concentration of cloud computing
providers and the over-reliance on a single
one.

What caused the AWS outage:
...
How the outage prompted criticism
of cloud computing:
...
Staffing concerns:
...
In summary, while a specific AWS
software error was the direct cause,
critics are using the event to warn
about the risks of concentrating
so much of the internet's
infrastructure in the hands
of a few dominant cloud computing providers.

Seagate 20TB HDD Priced Like Peanuts,
Amazon Bottoms Out at $0.01 per GB
.

3 Self-Hosted Alternatives to
Google Photos
.

____

Ken Thompson Recalls Unix’s Rowdy, Lock-Picking Origins.

why didn't unix succeed?

AI Overview

Unix didn't "fail" but rather lost its dominance in
the desktop market to alternatives like Windows
and later to open-source systems like Linux due
to factors like complexity, cost, and licensing i
ssues, while still thriving in servers, embedded
systems, and influencing modern OSes like
macOS and iOS. The commercial versions
became expensive and fractured, and it was
poorly suited for the average user's needs,
especially compared to the more user-
friendly graphical interfaces that emerged.

Factors for its decline.
...
Where Unix succeeded and persists.


what are maintennce issues with unix?

AI Overview

Common Unix maintenance issues include
disk space and file system corruption,
running out of inodes, misconfigurations,
and outdated software that can lead
to security vulnerabilities. Other
problems can arise from hardware
failures, network connectivity issues,
and incorrect service management or
patching.

Microsoft's voice-activated Copilot will
go the same way as Cortana
.

____

Hackers steal Discord accounts with
RedTiger-based infostealer
.

Gmail Passwords Confirmed As Part
Of 183 Million Account Data Leak
.

 
____
Oklo: The Current Valuation Seems Unsustainable.

The SMR Surge: Nuclear’s Quiet Comeback
Is Now A Commercial Race
.

Fermi signs nuclear deals to power
Texas data centers; stock gains
.

IEA Chief Warns of a Buyer’s Revolution
in LNG Markets
.

Trump’s 'Nuclear Renaissance' opens
U.S. doors to Korean nuclear builders
.

Wind PPA prices rising faster than solar
under Trump administration
.
Try 1.

Sunday October 26 `13:26
____
what is a das for servers?

AI Overview

A Direct Attached Storage (DAS) for servers
is a storage device, like a hard drive or SSD,
that connects directly to a single server
through a physical cable, such as USB or
Thunderbolt. It provides storage that
is not on a network, making it
very fast, cost-effective, and easy to
manage for local data storage,
backups, and expanding a server's
capacity.

Key characteristics of DAS for servers.

Single-server access: It is primarily used
by the single server it is attached to,
unlike NAS which is designed to be
shared among multiple devices
on a network.

4 reasons a DAS is a great addition
to your Proxmox home server
.

5 Lightweight Services You Can
Self-Host on a Raspberry Pi.

____
Act Now — Microsoft Issues Emergency
Windows Update As Attacks Begin
.

AI is about to supercharge cyberattacks.

what is the current cost estimate of the
aws internet outage?

AI Overview

Following a 15-hour outage on October 20, 2025,
estimates for the total cost of the Amazon Web
Services (AWS) internet outage vary significantly,
ranging from hundreds of millions to hundreds of
billions of dollars. The wide discrepancy is due to the
varying methods used to calculate the impact,
which includes lost revenue, productivity, and
reputational damage.

Cost estimate breakdowns

Total global economic impact: Some analysts
estimate the total financial impact of the
disruption will be in the billions or even hundreds
of billions of dollars. This includes lost productivity
for millions of workers and halted business
operations across various industries. For
instance, one estimate put the total collective
loss for global businesses at over $1.1 billion
for the 15-hour duration of the outage.

Cyber insurance industry estimate: A preliminary
loss estimate from cyber modeling firm
CyberCube falls between $38 million and
$581 million for the cyber insurance sector
alone. This does not cover the full economic
impact, as many companies discover that
their insurance coverage does not fully match
their operational risks during

Specific company estimates: Some reports
have broken down hourly losses for major
platforms and companies impacted by the outage:

Amazon: ~$72.8 million per hour

Snapchat: ~$612,000 per hour

Zoom: ~$533,000 per hour

Roblox: ~$411,000 per hour

Fortnite: ~$400,000 per hour

Healthcare industry estimate: The healthcare
sector was significantly impacted, with
one estimate showing a loss of
$62,500 per hour due to operational
disruptions like inaccessible patient
records and delayed procedures.

Factors complicating the cost analysis

Centralized risk: The widespread and
extensive impact of the outage was a stark
reminder of the "concentration risk" that
occurs when so many companies
depend on a single cloud provider and
region.

Reputational damage: The financial estimates
do not typically include the long-term
impact on a company's reputation and
customer trust. End users tend to
blame the business they interact with
rather than the underlying infrastructure
provider.

Insurance limitations: Many cyber insurance
policies have limitations or exclusions for
outages under a specific duration, leaving
some companies with significant
out-of-pocket losses.

Cascading failures: While the outage was
caused by a simple DNS error, the
widespread dependency on AWS led
to cascading failures across multiple
industries, including financial services,
gaming, and smart home devices.
____
Microsoft's decision to axe Windows 10 is
driving Apple PC sales growth — users
buy Macs instead of AI PCs despite
Microsoft’s push for Copilot+ PCs
.
 ____
The Rise of Renewable Energy.

Stop These Things’ Weekly Round Up:
26 October 2025
.
Try 6.

Saturiday October 25 10:22
____
$35 Orange Pi 4 Pro – An Allwinner
A733 Edge AI SBC with up to 16GB LPDDR5, WiFi 6
.

Orange Pi 4 Pro.

RISC-V Exceeding Expectations in AI,
China Deployment
.
____
How a tiny bug spiraled into a massive
outage that took down the internet
.

NuScale: Danger Signs On Meltdown
Of Speculative Froth
.

You Have No Idea How Screwed
OpenAI Actually Is
.
____
Oracle set to receive $38bn debt package
for data center projects - report
.

Bloomberg.com Bank of England Probes
Data Center Lending Amid AI Bubble Fears
.
 
____
Tesla announces production of a
new solar panel in the US
.

ERCOT Increasingly Meets Rising
Demand with Solar, Wind, & Batteries
.

what are the advantages./disadvantages
of 1 roof-top solar/battery systems,
2 balcony systems and
3 ground-level systems?
.

Southeast Utah uranium mine to have
groundbreaking ceremony Nov. 6
.
    while Navajos continue to grapple with
    the legacy of uranium mining on their land.
Try 1.

Friday October 24 16:37
____
Spain’s Clean Energy Dilemma.



Big Tech's 'Golden Handcuffs' Have Become 'Silicon Handcuffs'.

Why Cohere’s ex-AI research lead is betting against the scaling race.

A single point of failure triggered the Amazon outage affecting
millions
.

___
Amazon says automation bug
caused massive AWS outage
.
____
Seagate: A Momentum Investor's Goldmine
In The Data Storage Revolution
.

This $69 Seagate 2TB portable HDD is
an absolute steal for storage
.

Amazon’s AWS Shows Signs of Weakness
as Competitors Charge Ahead
.
____
Ring founder describes 'tough day' of
AWS outage: 'We got through it'
.

what is the revision history of llvm?

AI Overview

The revision history of the LLVM project can
be divided into its foundational research phase,
its growth with Apple's involvement, and i
ts more recent transition to a regular,
time-based release cycle.

Early history (2000–2005)

2000: The LLVM project begins as a
research project at the University of
Illinois at Urbana-Champaign, led by
Chris Lattner and Vikram Adve. It was i
nitially conceived as a system for
dynamic compilation of both static
and dynamic programming languages.
The name was originally an
acronym for "Low-Level Virtual
Machine".

2003: The LLVM project releases
version 1.0, and development
continues under a permissive
open-source license from the
University of Illinois/NCSA.

Rise of Clang and Apple's
involvement (2005–2016)

2005: Apple hires Lattner and
establishes a team to work
on LLVM for use in its
development tools. This begins
a period of rapid development
and increased adoption for the
project.

2006: Lattner starts
the Clang project, a new
compiler frontend for C, C++,
and Objective-C, designed to
be more easily integrated with
development environments t
han GCC.

2009: Clang 1.0 is released
alongside LLVM 2.6.

2011: Apple integrates LLVM
as an essential part of Xcode 4.
The LLVM project officially
declares that "LLVM" is no
longer an acronym, but
rather a brand name for
its umbrella of technologies,
reflecting its evolution
beyond a virtual machine.

2012: Chris Lattner,
Vikram Adve, and Evan Cheng
receive the ACM Software
System Award for designing
and implementing LLVM.

2013: Sony begins using
LLVM's Clang in the software
development kit (SDK) for
its PlayStation 4 console.

2014: The LLVM Foundation
is established to provide
governance for the project.

Time-based release cycle
(2016–present)

2016: After version 3.9,
the project abandons its

arbitrary major and minor
versioning scheme and
switches to a time-based
schedule with a new major
release every six months.
Under the new scheme,
every six-month release
increments the major
version number.

2019: With version 9.0.0,
the LLVM project relicenses
its code from the University
of Illinois/NCSA Open Source
License to the Apache 2.0

License with LLVM Exceptions.

Present: The LLVM project
continues to produce
biannual major releases.
For example, version
19.1.0 was released in
September 2024, and
version 21.1.0 was
released in August 2025.

Accessing detailed revision
information

For a complete, commit-by
-commit revision history,
developers use the LLVM
project's version control
system, which transitioned
from Subversion to Git.
The project's GitHub
repository offers the
most up-to-date
information on the
codebase's history.

For a non-comprehensive
list of changes in each
major release, the official
LLVM documentation
provides detailed release
notes.

AI Overview

LLVM originally stood for "Low Level
Virtual Machine," but it is no longer
an acronym. Today, LLVM refers
to a compiler infrastructure and
set of tools that can be used to
develop compilers for many
different programming languages.
Its modular design separates the
language-specific "frontend" from
the architecture-specific "backend,
" allowing them to be combined in
different ways.

What LLVM is and what it does

Compiler Infrastructure:
...
Intermediate Representation (IR):
...
Frontend:
...
Backend:
...
Optimization:
...
Modular desig:

how man lines of code in what language
is a llvm?

AI Overview

The LLVM project, a collection of modular
and reusable compiler and toolchain
technologies, is primarily written in C++.
Regarding the lines of code, LLVM is a
very large project. While the exact
number fluctuates with ongoing
development, it is generally
understood to consist of millions
of lines of code. For instance, reports
from early 2022 indicated the LLVM
mono repository contained over
23.85 million lines of code.
Other sources have estimated the
project to have around 12 million
lines of code across its various
components.

This significant codebase reflects
the breadth and depth of the LLVM
project, encompassing various
components like the LLVM
intermediate representation (IR),
optimizers, code generators, and
supporting tools.

AWS Outage Was ‘Inevitable,’
Says Former AWS, Google Exec
.

Seagate 4TB Portable Hard Drive Hits
$0.02 per GB, the Cheapest Way to
Expand Xbox or PlayStation Storage Yet
.

Show Off Your Linux Skills With
an Official Ubuntu Exam
.

Linux Looks To Orphan Its ISDN Subsystem.

5 pitfalls of dual-booting Windows
and Linux that I wasn’t prepared for
.

CenterPoint’s AI-Fueled Houston
Boom Lifts Q3
.
___
How Hacked Card Shufflers Allegedly
Enabled a Mob-Fueled Poker Scam
That Rocked the NBA
.
 
Try 2.

Thursday October 23 16:06
____
Ranked: Nuclear Power Capacity
by Country (2025)
.

What makes us so vulnerable to
cloud computing outages?
.



Canonical Begins Snap'ing Up Silicon-Optimized
AI LLMs For Ubuntu Linux
.
_

Inside the AWS outage: How one failure rippled across the global economy.

A new South Texas data center will
rely on untapped renewable energy
.

___
Cloud Storage Is Expensive. Here's a Much
Cheaper Way to Back Up Your Photos and Videos
.
____
China releases 'UBIOS' standard to replace
UEFI — Huawei-backed BIOS firmware
replacement charges China's domestic
computing goals
.

LLVM Lands Some Long Overdue Tuning
Optimizations For AMD Zen 4
.

The AI Bubble Won’t Just Take Down the Stock
Market. It Will Hammer the U.S. Economy too
.

AWS Goes AWOL: Are We Too Dependent on
the Cloud?
.

A single DNS race condition brought Amazon's
cloud empire to its knees
.

____
The Long Tail of the AWS Outage.

Does Amazon Web Services cloud
data centers use linux?

AI Overview

Yes, Amazon Web Services (AWS)
data centers heavily use Linux. AWS
has its own Linux-based operating
system, Amazon Linux, and provides
a wide variety of other Linux
distributions through its services.

Amazon Linux: AWS develops and
maintains its own Linux operating
system, called Amazon Linux, to
provide a secure and high-
performance environment for
running cloud applications.

Support for other distributions:
AWS also offers many other
popular Linux distributions, such
as Red Hat Enterprise Linux,
Ubuntu, and Debian, through its
AWS Marketplace.

Linux's popularity: Linux is
widely used across major
cloud platforms like AWS,
Google Cloud, and Microsoft
Azure due to its versatility,
robustness, and open-source
nature.

Linux distributions in AWS Marketplace.

Cybersecurity expert offers blunt verdict
on AWS outage
.

Amazon’s DNS problem knocked
out half the web, likely costing billions
.

 
____
NRC: Individual fell into 'reactor cavity'
at Palisades Nuclear Plant
.

AI Overview

No new uranium mining projects are planned
on Navajo Nation lands in 2025 and 2026
due to the Diné Natural Resources
Protection Act, which bans all uranium
mining and processing. However, the
controversy surrounding uranium on the
Navajo Nation is ongoing in 2025, primarily
over the transportation of radioactive ore
across Navajo territory and the cleanup
of abandoned Cold War-era mine sites.

Uranium transport across the Navajo
Nation.

Controversial agreement: In January 2025,
the Navajo Nation reached an agreement
with Energy Fuels, a U.S.-based mineral
producer, to allow the transport of uranium
ore across Navajo land.
...
Community opposition:
...
Ongoing legal challenges:
...
Cleanup of abandoned mines
...
Remaining challenges: Despite these
efforts, hundreds of abandoned uranium
mines still pose environmental and health
risks to the Navajo people. The long-term
cleanup and health impacts remain a
potent issue for the Navajo Nation.

GE Vernova drops after mixed Q3 results,
warns of continued weakness in wind business
.
.Try 1.

Wednesday October 22 17:29
___
Intel Nova Lake Support Merged For
GCC 16 Compiler
.

AWS Outage That Took Down Internet
Came After Amazon Fired Tons of
Workers in Favor of AI
.

Meta's Alexandr Wang on why the
AI team just laid off 600 workers
.
____
AWS’ 15-Hour Outage: 5 Big AI, DNS, EC2 And
Data Center Keys To Know
.
    From the cause and resolution of AWS’
    massive outage to whether AI had a
    potential impact, here are five big
    things you     need to know about
    AWS global outage that
    affected millions.

You thought Monday’s internet outage was bad?
Just wait
.

Linux 6.19 To Enable Networking For The EIC7700
SoC Powering The SiFive Premier P550
.

AI Overview

There are so many versions of Linux because
its open-source nature allows for customization,
leading to many different "distributions"
(distros) tailored to specific needs, philosophies,
or user preferences. This results in a wide variety
of choices, from user-friendly systems for beginners
to highly specialized ones for servers, developers,
or security professionals.

Key reasons for the multitude of distros.

Meta Plans to Cut 600 Jobs at A.I. Superintelligence Labs.

An Amazon Outage Nearly Took Out The Whole Internet.
Here’s Just How Big It Was
.

Amazon's Outage Is A Blessing In Disguise.

Iranian hackers targeted over 100 govt orgs
with Phoenix backdoor
.
____
World’s Cheapest ARM Debugger
Is Actually RISC-V
.

____
Did an OpenAI cofounder just pop the AI bubble?
‘The models are not there’
.

Inside Oklo: the $20bn nuclear start-up
without any revenue
.

How Recent Developments Are Rewriting the
Story for NuScale Power
.

The 9 weirdest things that happened during
Amazon's huge AWS outage
.

Data centers turn to commercial aircraft jet
engines bolted onto trailers as AI power
crunch bites — cast-off turbines generate
up to 48 MW of electricity apiece
.

Auto giant Volkswagen warns of output
stoppages amid Nexperia chip disruption
.

Replacing a $3000/mo Heroku bill with
a $55/mo server (disco.cloud)
.

These smart beds began roasting
their owners during AWS outage
.


____
How One Pipeline Turned Canada Into a
Global Energy Power
.

Inside the Hidden Oil Glut.

Energy Independence with Home Batteries.

NERC president warns of ‘five-alarm fire’
for grid reliability
.
Try 3.

Tuesday October 21 16:28
____
AWS outage: Are we relying too much
on US big tech?
.

AWS outage turned smart homes into dumb boxes
– and sysadmins into therapists
.

What caused the AWS outage - and why
did it make the internet fall apart?
.

Global PPA Prices Shift Dramatically for
Solar and Wind
.



Amazon delivery firms are bailing amid rising costs, meager profit.

Elizabeth Warren Blasts Amazon For Internet Meltdown,
Says 'If A Company Can Break The Entire Internet,
They Are Too Big'
.

Uranium fuel arrives at Michigan nuclear
plant ahead of unprecedented restart
.

Claude Code Creator: We Didn't Mean to Build It,
But It's Changed Everything
.

____
Has gcc c machine code interfaces been
sabotaged to make gcc c less useful?


AI Overview

There is no credible evidence to suggest that
GCC's machine code interfaces have been
intentionally sabotaged. The idea that
deliberate flaws were introduced to make
the compiler "less useful" is speculative and
contradicts the nature of open-source
development, where security vulnerabilities
are typically exposed and fixed, not hidden.

The perception that GCC's inline assembly or
low-level interfaces are difficult or
unreliable likely stems from the complexity
of working directly with assembly
and the necessary trade-offs a high-level
compiler must make.
...
Security concerns and the open-source
process The idea of hidden sabotage runs
contrary to how vulnerabilities in GCC are
handled. As an open-source project, GCC's
security policy is public, and known
vulnerabilities are treated seriously and
patched, not intentionally left to cause issues.

Robustness, not sabotage: The complexity
and constraints of GCC's inline assembly exist
to create a robust and reliable bridge between
C code and the underlying assembly instructions,
not to make the interface unusable. They ensure
that the compiler's optimizations don't break the
specific requirements of the manual assembly code.



____
who discovered two's complement
binary arithmetic?


AI Overview

John von Neumann is credited with suggesting
the use of two's complement binary
representation for electronic computers in
his 1945 report, though the method of
complements was a long-standing
technique used in decimal mechanical
calculators. The EDSAC, one of the first
stored-program computers, was the
first to use two's complement as
described in von Neumann's report.
...
Industry standard: Two's complement
became the dominant binary
representation in the computer
industry after being adopted by
the IBM System/360 in 1964.



____
Microsoft: The future of work is here,
thanks to Windows 11 and AI
.

The Lambda Papers: When LISP
Got Turned Into A Microprocessor
.

____
A common error appeared to cause a
major AWS outage, bringing down
platforms from Reddit to Snapchat
.

Today is when the Amazon brain
drain finally sent AWS down the spout
.

Amazon Stock Restores AWS After
Global Outage — But What Went Wrong?
.

what is intel panther lake?

AI Overview

Panther Lake to have similar power
efficiency to Lunar Lake ... Intel
Panther Lake, officially the Intel
Core Ultra Series 3 processors, i
s the company's next-generation
client processor designed for PCs, l
aunching in January 2026. It is the
first client-system-on-a-chip (SoC)
built on Intel's new 18A
manufacturing process and aims to
improve performance and efficiency
by combining architectural strengths
from previous generations like Lunar
Lake and Arrow Lake. Key features
include enhanced built-in graphics,
AI capabilities, and new connectivity
options like Wi-Fi 7 and Bluetooth
6.0.

Performance and efficiency
,,,,
Availability Launch:

The Intel Core Ultra Series 3
processors will go on sale in
January 2026.

Variants: Intel has outlined several
variants, including
high-performance "X" models and
lower-power "U" models.

 
____
America’s Energy Policy Is Running on Empty.

China Becomes Canada’s Biggest Crude
Customer Thanks to Trans Mountain
.

Try 1.

Monday October 20 15:43
____
Major AWS Outage Hits Disney+, Reddit, Roku, More.



AI Overview

It is not accurate to say that the chances of Amazon
going bankrupt because of AWS are increasing as of
October 19, 2025. This statement misrepresents the
relationship between the two, as AWS is a highly
profitable and essential part of Amazon's business.

Here is a breakdown of why AWS is not a threat to
Amazon's solvency:
...
Recent concerns are about growth rate, not bankruptcy
...
Amazon's overall financial position is strong
...
The October 20, 2025, outage

...
Managed expectations: While outages carry
financial risk, this event was viewed as
an operational challenge rather than a
threat to the company's long-term
financial health.

Coinbase, Robinhood down as Amazon
outage briefly cripples the internet
.

SA Asks: What's the most attractive
nuclear energy stock right now?
.

Massive Amazon outage takes down Venmo,
Snapchat, Alexa, Reddit and much of the
internet – all the latest AWS updates live
.

Microsoft Confirms Emergency Update For
Millions Of Windows Users
.

Forth: The programming language that
writes itself (ratfactor.com)
.

Amazon Web Services reports new
connectivity issues following global internet.
outage
.
____
AI Overview

Yes, many computer architectures,
sincluding those for x86 and
ARM processors, have a left shift with carry
instruction, often called a rotate left (ROL)
instruction. This instruction shifts all bits to
the left, with the bit shifted out of the most
significant position going into the carry flag
and the bit that was in the carry flag being
shifted into the least significant position.

How it works
...
x86 architecture:
...
ARM architecture:
:)

____
Amazon says most cloud services restored
after widespread outage
.

Amazon finds fix for huge AWS internet blackout
that took out Reddit but Wordle and Apple
Music are down again — live updates
.

Amazon services showing 'signs of recovery'
after Snapchat and banks among sites hit by
major outage
.

AI Overview

There is no single answer to whether large-capacity
on-premises memory is "better" than cloud storage,
as it depends on an organization's specific needs and
priorities. The right choice is a strategic business
decision that balances factors like cost, security,
performance, scalability, and control. Many
businesses now use a hybrid approach that
combines the benefits of both.

Cost comparison
...
Performance and reliability
...
Security and control
...
Scalability and accessibility
...
Choosing the right approach
...

Consider a hybrid approach if: You need a
balance of control and flexibility. Many
organizations store sensitive data
on-premises for control while using
the cloud for collaborative workloads,
backups, and scalability.

is it a good idea to keep cloud data backup
on inexpensive large-capacity local storage?


AI Overview

Yes, using inexpensive local storage for cloud
data backup is a good idea for a hybrid
approach, combining the cost-effectiveness
of local storage with the security of offsite
backup. You can use inexpensive large-
capacity local storage (like an external
hard drive) for fast, local backups, while
also using cloud storage for offsite
protection against physical disasters like
fire or theft. This strategy provides a
multi-layered backup solution for
comprehensive data protection.

Advantages of a hybrid approach
...
How to implement it

Amazon DNS outage breaks much
of the internet
.

Epic Games down: AWS outage causes
“request could not be completed”
.

A Raspberry Pi is a better addition to your TV
than a Chromecast
.

Phased Out’—Google Confirms Bad News
For All 3 Billion Chrome Users
.""

A cheap SanDisk memory card was just found
completely unscathed inside an underwater
camera found among OceanGate
submersible wreckage.
____
OpenAI’s ‘embarrassing’ math.
____
Linux 6.18-rc2 Released: "rc2 is on the bigger side".

____
China’s Wind Industry Seeks
Push to Double Capacity by 2030
.

Restart of Huge Nuclear Power Plant
Faces Backlash in Japan
.

DOE cancels more than $700M in
battery, manufacturing projects
.

Try 2.

Sunday October 19 16:52
____
MoneyFrom Harvard to Stanford:
The Tuition Costs of the Top 10 Colleges
.

Why this analyst says the AI bubble is
17 times bigger than the dot-com bust
.

JLCPCB Locking Accounts, Mentions
“Risky IP Addresses, Activities”
.
____
Oracle declines on concerns about
fulfilling AI cloud demand
.

4 containers I recommend for
self-hosting beginners
.

IDEs we had 30 years ago and lost (2023).

Qualcomm Buys Arduino, and the
Open-Source Community Is Skeptical
.

____
BitLocker reportedly auto-locks users'
backup drives, causing loss of 3TB of
valuable data — Windows automatic
disk encryption can permanently lock
your drives
.

China accuses US of cyberattack on
national time center
.

New .NET CAPI Backdoor Targets Russian
Auto and E-Commerce Firms via Phishing ZIPs
.
____
Bit-banged 100 MBit/s Ethernet
Transmission On Raspberry Pi Pico
.
____
New Code Merged For Linux 6.18 To Address
Linus Torvalds' Rust Formatting Critique
.



____
Europe’s Aging Grids Buckle Under
Renewable Energy Demands
.
Try 4.
 

Saturday October 18 16:17
___
China Is Totally Crushing Trump’s
Fossil Fuel Dream, With Agrivoltaics
.

China Officials Try to Ease Global Concern
Over Rare Earth Curbs
.

Container-sized batteries are powering
the next global energy revolution
.
____

will layoffs in big tech continue despirte ai?

AI Overview

Yes, tech layoffs are likely to continue despite
AI because companies are restructuring to
prioritize AI development and automation,
which can lead to a reduction in roles for
some existing jobs. While AI is also creating
new jobs, particularly in areas like AI
development and cybersecurity, companies
are simultaneously using automation to
offset costs for AI investments and improve
profit margins.

Reasons for continued layoffs
...
How AI affects the job market.
____
how many hardware platforms have a
8 bit add with carry instruction?

AI Overview

It is impossible to provide an exact number of
hardware platforms that have an 8-bit "add
with carry" instruction, but a huge number of
them include this functionality. The instruction
is a standard feature for allowing multi-byte
arithmetic, a necessity on older 8-bit processors
and still common in modern architectures for
optimizing certain operations.

The functionality is found across a wide
range of hardware, from early microprocessors
to modern 64-bit CPUs, and is implemented
in two main ways
:

do the risc-v instruction sets have an
add with carry instruction?

AI Overview

The base RISC-V instruction set architecture
(ISA) does not include a dedicated "add with
carry" instruction like adc found in some other
ISAs (e.g., x86). This is due to RISC-V's design
philosophy of avoiding a dedicated flags register,
which can simplify hardware design and
out-of-order execution.

To implement multi-word arithmetic (like adding
numbers larger than the native register width)
in RISC-V, you need to explicitly calculate and
handle the carry using a sequence of instructions.
This typically involves using a combination of
:

Example of multi-word addition without a
dedicated adc instruction:
____
Meta is hiring entry-level roles that pay up to
$290,000 a year and require little prior experience
.

Our Market Share Dropped From 95% to 0%,”
Says NVIDIA CEO Jensen Huang in a ‘Temporary
Goodbye’ to China’s AI Market
.
___
Hacking A Banned Chinese Security Camera.
____
As Microsoft Forces Users to Ditch Windows 10, It Announces
That It’s Also Turning Windows 11 into an AI-Controlled Monstrosity
.

is islam math different from western math?

AI Overview

No, modern "Western" mathematics is not fundamentally different
because it was built upon and integrated the foundations established
by Islamic scholars. Instead, the distinction is that Islamic
mathematics from the 8th to 13th centuries was a crucial,
foundational period that contributed to the development of
modern mathematics, introducing key concepts like algebra
and the modern decimal system that are now considered
Western.

Key contributions of Islamic mathematics
...
he spread of knowledge

During Europe's "Dark Ages," Islamic scholars preserved,
translated, and expanded on ancient Greek and Indian
mathematical texts.

The practical nature of their innovations, particularly algebra,
led to the widespread adoption of these new methods in Europe.

This transfer of knowledge, aided by cultural exchanges like
trade and the translation of Arabic texts, was essential for
the growth of mathematics during the Renaissance and beyond.
 ____
China's Role in Africa's Green Energy Future.
Try 2.

Friday October 17 09:24
____
Google’s open-source, RISC-V-based Coral NPU is
integrated into Synaptics SL2610 Edge AI SoCs
.
____
Bitcoin, Ethereum Prices Tumble. Cryptos
Plunge Toward 3-Month Lows
.

This ‘Will Be Brutal’—Bitcoin Suddenly Goes
Into Free Fall As Price Crash Panic Wipes
$600 Billion From Crypto
.
 
____
Nuclear Stocks Sell Off After U.S. Army
Launches Microreactor Program
.
Try 4.

Thursday October 16 16:56
____
US hyperscalers to guzzle
22% more grid juice by end of 2025
.

Oracle Stock (ORCL) Jumps after
Confirming Cloud Deal with Meta
.

Texas agricultural company slashes
over 100 jobs, closes facility
.
____
Raspberry Pi OS, LMDE, Peppermint OS
join the Debian 13 club
.

AI Overview

Linux Mint is a derivative of Ubuntu, so the
two are very similar "under the hood,"
with the primary differences lying in the
default desktop environments, software
packaging philosophies, and development
models. For many users, the choice
comes down to personal preference
for the user interface.
____
AI Data Centers, Desperate for Electricity,
Are Building Their Own Power Plants
.

The city that draws the line’: one Arizona
community’s fight against a huge datacenter
.

Amazon provides vision of its new nuclear site.s

____
$4 Shrike-lite FPGA board combines 1120
LUTs Renesas ForgeFPGA with Raspberry
Pi RP2040 MCU
.
____
MANGO is the new FAANG.

AI Bubble May Burst — Wiping Out
$40 Trillion From Nasdaq. Here’s What To Do
.


Villainous hackers jam busy US road with
50 self-driving cabs in IRL cyber attack
echoing a chilling dystopian film
/
____
Retiring Windows 10 and Microsoft's move
towards a surveillance state (scottrlarson.com)
.

Prospects Dim for Denmark’s Renewable
Energy Star
.
____
 
____
Netherlands' renewables drive putting
pressure on its power grid.
Try 3.

Wednesday October 15 16:06
___
Why big tech's nuclear plans could blow up.

The Frothiest AI Bubble Is in Energy Stocks.

F5 Breach Exposes BIG-IP Source Code —
Nation-State Hackers Behind Massive Intrusion
.

Former Intel CEO drops curt 2-word verdict on AI.
____
BlackRock, Nvidia-backed group strikes
$40 billion AI data center deal
.

what are google cloud issues?

AI Overview

Google Cloud has faced issues ranging from
major outages and security vulnerabilities
like misconfigured storage buckets and firewalls,
to performance problems like latency and
service-specific errors in areas like Cloud Run,
Compute Engine, and Cloud SQL. These issues
can stem from flawed updates, incorrect
user configuration, or broader infrastructure
challenges.

Security vulnerabilities
...
Performance and availability issues

The $400 Billion Bottleneck: Why AI’s
Power Grab Is Stalling at the Turbine
.

OKLO Stock To $75?.
...
Causes of outages and errors
....
How to find and resolve issues

what are aws issues?

AI Overview

AWS issues include service outages, network
disruptions, security vulnerabilities, and
user-related challenges like cost management
and misconfigurations. Major
outages
are often caused by network
problems, software bugs, or infrastructure
failures, while security issues typically stem
from user errors in settings like S3 buckets
or IAM policies. Users also face challenges
with the complexity of managing costs,
planning for infrastructure, and understanding
the platform's advanced features.

Service availability and performance issues
...
User and management challenges
...
How to check for AWS issues.

PJM’s market monitor urges FERC to
review Amazon data center’s effect
on costs, reliability
.

what are azure issues?

AI Overview

Azure issues include general challenges like
security concerns, cost management,
complexity, and vendor lock-in, as well as
more specific problems such as integration
issues, outages, and performance problems
with virtual machines, code, or other services.
There are also platform-specific issues, such
as failures with virtual machine boot-up or
RDP connections, which are documented
by Microsoft and can be managed through i
ts Azure Service Health tool.

Common Azure challenges
...
Specific technical issues
...
How to address Azure issues




Western Executives Shaken After Visiting China.
____
Orange Pi 6 Plus – CIX P1 SBC offers up to 64GB
LPDDR5 memory, 45 TOPS of AI performance
.
____
I am a programmer, not a rubber-stamp that
approves Copilot generated code (prahladyeri.github.io)
.

Radxa Orion O6N – A smaller, cheaper 12-core
Armv9 Nano-ITX SBC based on CIX P1 (CD8160) SoC
.
____
UEFI Shell Flaws Let Hackers Disable Secure Boot on
Over 200,000 Laptops
. ____
 
Try 4.

Tuesday October 14 16:31
___
Opinion: Repealing the nuclear moratorium
would be a costly mistake for Illinois
.
____
Why did containers happen? (buttondown.com/justincormack).
____
does freertos support usb 3.2 file access?

AI Overview

FreeRTOS does not natively support USB 3.2
file access, but it can be implemented by
combining several components. To achieve
USB file access on an embedded system
running FreeRTOS, you need to integrate a
USB Host stack and a file system driver.
The USB 3.2 standard primarily relates to
high-speed data transfer and is largely a
hardware-level specification, which is
abstracted by software layers.

Components required for USB file access.

____
Data centers are booming. But there are
big energy and environmental risks
.

Warning: Our Stock Market Is Looking
Like a Bubble
.
__
BASICODE: A Bit Like Java, But From
The 1980s
.

____
Hackers can steal 2FA codes and private
messages from Android phones
.

Cyber-attacks rise by 50% in past year,
UK security agency says
.

GM to take $1.6 billion charge
related to EV pullback
.

who writes gm ev software?

AI Overview

GM writes its own EV software using a large
internal team of software engineers and by
hiring talent from major tech companies.
The company also partners with other
organizations to develop software
standards and relies on some embedded
software from third-party providers.
Key aspects of GM's in-house software
development include the Ultifi software
platform and contribution to
open-source projects.

GM's in-house software team.

CEO of $8 billion AI company says
it’s ‘mind-boggling’ that people
think you can work 38 hours a week,
have work-life balance, and be
successful
.
 
Try 2.

Monday October 13 17:33

____
The Hidden Cost of Electrification
in the United States
.

Intel Faces CPU Market Share Losses And
Limited AI Integration, Analyst Flags
.
____
The DIY Cloud: How to Build Your Own Photo
Storage and Ditch Subscriptions for Good
.
____
We will have a crash’: Why Andrew Ross Sorkin
thinks this market bubble will eventually pop
.
____
what are the main types of multitasking OS?

AI Overview

Multitasking Operating System The two main
types of multitasking operating systems are
preemptive multitasking, where the OS
controls and interrupts processes to allocate
CPU time, and cooperative multitasking,
where processes voluntarily give up control
of the CPU. Most modern operating
systems, such as Windows, macOS, and
Linux, use preemptive multitasking, as it
provides a more stable and efficient user
experience.

Preemptive multitasking
...
Cooperative multitasking
...
Other related concepts
...
Multiprocessing: This involves using multiple
processors (CPUs) to perform tasks
simultaneously, as opposed to a single
processor handling multiple tasks
one after another through time-slicing
.

OpenAI and Broadcom announce
strategic collaboration to deploy 10
gigawatts of OpenAI-designed AI
accelerators
____
Arduino has a new job selling chips for its
new owner. Let's not pretend otherwise
.
    Gtting swallowed by a whale is a life-changing
    event no matter what the whale says

is qualcomm using Big Tech llvm and clang
software technologies?

AI Overview

Yes, Qualcomm uses and significantly
contributes to the open-source LLVM
and Clang software technologies.
The company builds its own compiler,
the Snapdragon LLVM Compiler,
based on the open-source LLVM
framework.

Here is a breakdown of how Qualcomm
uses and interacts with these technologies:
...
Recruitment: The company openly
recruits LLVM Compiler Engineers
to help develop and enhance
components of the compiler for
its custom CPUs. These roles
involve working with the LLVM
toolchain for multiple platforms
and engaging with the
open-source community [cult?].



Paraguay – the Silicon Valley of South America?.
____
Save Your USB-C Plugs From Oblivion.



what is the optimum usb c powered hub input
voltage accurate to .1 volts to ensure at least
5 v at the outputs?


AI Overview

An externally powered USB-C hub is designed
to accept a higher voltage than the 5V it outputs,
as this is more efficient and allows for more power
to be delivered to devices. The hub's internal
electronics convert the input voltage to the
5V output required by standard USB devices,
with a maximum allowable voltage variation
of 0.25V on the 5V output line.

The optimal input voltage depends on the
hub's design, which uses an internal converter
to step the voltage down. This internal
conversion inherently accounts for
voltage drops caused by the cable and
the hub's own circuitry.

Power Delivery (PD) input

"Conclusion

To ensure a stable 5V output from a USB-C
powered hub, an input voltage higher than
5V is ideal because it provides a sufficient
buffer against voltage drop.

The most common and optimal input voltages
for a quality powered hub are 9V or 12V. An
input of 12.0V, specifically, would give the
internal circuitry plenty of overhead to convert
the voltage down to a stable 5V, accurately
maintaining it within the required $\pm$0.25V
range.
___
Free software hasn't won (dorotac.eu).

Microsoft ironically blocks Windows 10 to 11
ISO upgrade as it breaks Media Creation Tool
.

Programming in Assembly Is Brutal, Beautiful,
and Maybe Even a Path to Better AI
.

No I don't want to turn on Windows Backup
with One Drive (idiallo.com)
.
 
____
Why Energy Investors Are Doubling Down on
Oil and Gas
.

Oklo: Unresolved Capital, Licensing, And
Fuel Risks Potentially Signal Meltdown
.




Stop These Things’ Weekly Round Up: 12 October 2025.
Try 4.

Sunday October 12 13:44
____
are amd and nvidia creating their own
demand for ai chips?

AI Overview

Yes, both AMD and Nvidia are actively creating
and stimulating the demand for their AI chips,
rather than simply reacting to existing market
needs. They are using a multifaceted approach
that includes building essential software
ecosystems, pushing product innovation,
and entering into strategic partnerships with
major AI developers.

How Nvidia creates demand.

____
What Would an AI Crash Look Like?.

'We're kind of in a fragile state now': Why
the AI bubble might be about to burst
— how to protect yourself
.

There’s no such thing as a ‘good’ bubble.

Small reactors, big problems: the
nuclear mirage behind AI’s energy hype
.

Who should pay to power Ohio’s
data center boom?
.

AI datacenters in the US aren't 'running on coal' —
but this dirty fuel has found favor for feeding
demand spikes due to increased gas prices
.

Towns are saying no to AI data centers.
One got sued over it
.

Own 10TB of Storage for Less Than
the Cost of a Year of iCloud
.

AI Overview

iCloud is Apple's cloud service that securely
stores your data like photos, files, and
notes and keeps them synced across all
your Apple devices. It provides 5 GB of
free storage and is available on Apple
products, Windows, and through a
web browser at iCloud.com. You can
also upgrade to iCloud+ for more
storage and additional features.

What iCloud does.

AI Overview

Common iCloud issues include sign-in
problems, insufficient storage, and
syncing or settings discrepancies.
Other problems can be related to
server outages, software version
incompatibilities, or security concerns
regarding data protection.

Common iCloud issues.

Server outages: Like any online service,
iCloud can experience temporary
downtime due to server problems
or scheduled maintenance.

AI Overview

Yes, cloud systems have been and
continue to be targeted by hackers,
with major incidents like the 2024
AWS attack and the 2025 Oracle Cloud
breach affecting millions of users.
Common attack vectors include
misconfigured security settings,
compromised credentials, and
exploiting vulnerabilities in cloud
infrastructure. Organizations must
proactively secure their cloud
environments, and individual users
should take steps to protect their
own accounts.

Major recent incidents.
____
Save Your USB-C Plugs From Oblivion.



do adapters work well with usb c male plugs?

AI Overview

Yes, adapters work well with USB-C male plugs,
especially simple adapters like a female USB-A
to male USB-C adapter, but their functionality
depends on the adapter's specific design and the
device's capabilities. While they can provide a
convenient way to connect USB-A devices to
a USB-C port, keep in mind that some adapters
may be data-only or charge-only, and adapters
with the correct internal components are needed
for high-speed data transfer.

Things to consider.


AI Overview

Yes, a powered USB 3.2 hub can offer a significant
speed advantage with USB-C, but only if all
components in your setup—including the hub,
cable, and connected device—support the faster
USB 3.2 standard. A powered hub also ensures
stable, high-speed performance by providing reliable
power to your devices.

Speed improvements with USB 3.2.

AI Overview

Some USB-C 3.2 powered hubs include an HDMI
port because they are more accurately called
docking stations, designed to expand a single
USB-C port into a comprehensive workstation.
This is possible because a single USB-C port can
be configured to carry multiple signals simultaneously,
including video (via DisplayPort or HDMI Alternate
Mode), high-speed data, and power. Therefore, i
nstead of just expanding data-only ports like a
basic hub, these "smart" hubs convert the
USB-C port to offer a variety of functions, such
as video output to an HDMI monitor, multiple USB-A
ports, and network connectivity, all through
one connection.

Video output through Alternate Mode:
___
Australian Airline Says Hackers Leaked Data
on Its Customers
.
____
One UIIf your Samsung device on the list,
you are the luckiest!
.

One UISamsung One UI 8.5 – Release Date,
.Eligible Devices, Features and Latest News
.
 
Try 1.

Saturday October 11 15:57
_______
2 Popular AI Stocks to Sell Before They Plunge
40% and 67%, According to Select Wall Street Analysts
.
____is linux part of big tech software?

AI Overview

Yes, big tech companies heavily rely on and
contribute to Linux, though it's an
open-source project not owned by a
single company. Google's Android is
built on the Linux kernel, and companies
like Amazon, Microsoft, and Meta use
Linux for their massive cloud infrastructure
and services. They also benefit by
developing products and services that
run on or support Linux.

Examples of big tech's use of Linux.
____
which freertos platforms have a dedicated usb c port?

AI Overview

Platforms with a dedicated USB-C port that support FreeRTOS
include developer boards from STMicroelectronics, Espressif,
and Infineon. The presence of a USB-C port is a feature of
the development board itself, while FreeRTOS compatibility
is determined by the microcontroller and its associated
software packages.

STMicroelectronics (STM32)
____

does any bananapi run freertos?

AI Overview

Linux is not threatened by FreeRTOS because
they serve different market niches and are
designed for fundamentally different hardware
and purposes. FreeRTOS is a minimalist
Real-Time Operating System (RTOS) for small,
resource-constrained microcontrollers,
while Linux is a full-featured, general-purpose
operating system for more powerful
microprocessors.

Fundamental differences.

AI Overview

Yes, certain Banana Pi boards can run FreeRTOS,
specifically those that include a dedicated
microcontroller unit (MCU) alongside their
more powerful application processor.
However, the most common single-board
computer (SBC) models of the Banana Pi
run Linux and are not typically used for FreeRTOS.

Banana Pi models that support FreeRTOS

BPI-Leaf-S3 (ESP32-S3):

does any bananapi run forth?

AI Overview

Yes, a Banana Pi can run Forth, particularly using a Linux distribution with a Forth interpreter. Since Banana Pi single-board computers use ARM processors, and Forth has been ported to many different processors, including ARM, it is completely feasible. How to run Forth on a Banana Pi
____
'It's going to be really bad': Fears over
AI bubble bursting grow in Silicon Valley
.

AI Data Centers Are an Even Bigger
Disaster Than Previously Thought
.

Your LLM Won’t Stop Lying Any Time Soon.

___
Linux Now Disabling TPM Bus Encryption By
Default For Performance Reasons
.""

GCC Patches Posted For C++26 SIMD Support.
____
why is c++ notorious for using uncertified
software dependencies?

AI Overview

There is no evidence to suggest that C++ is
"notorious" for using uncertified dependencies.
The issue is not a flaw inherent to the C++
language but rather the ecosystem and tooling
surrounding it, which historically made dependency
management difficult and inconsistent. This led to
a decentralized approach where developers
managed dependencies manually, with
varying degrees of rigor.

The complexity stems from the fact that a
C++ dependency is not just code, but a
complex combination of source code, build
system files, and pre-compiled binaries that
must match the target environment.
Certification, such as ISO 26262 for
safety-critical systems, is an intense and
expensive process, which makes a globally
"certified" C++ ecosystem with a central
repository impractical.

Lack of a central package manager
...
Decentralized ecosystem:
...
No central authority:
...
A core challenge with C++ dependencies is
the issue of binary compatibility across
different environments.

Non-portable binaries:
...
...
Manual porting:

The cost of certification

Community [cult?] efforts to improve.
 ____
Confirmed—This is OceanX, the Chinese project
that promises to survive super typhoons like
Yagi and transform offshore wind energy forever
.

Nevada’s Lost Sunlight: What Esmeralda 7
Tells Us About America’s Energy Future
.

Historic’ transfer of radioactive waste
to massive Eastern WA treatment plant
.
Try 1.

Friday October 10 17:48

___
AI Overview

Dwight D. Eisenhower was inspired to build the
U.S. Interstate Highway System by his military
experiences observing the poor quality of
American roads and the efficiency of Germany's
autobahn
.

Experiences during military service
____
AI Bubble Warning: Financial Institutions
Sound The Alarm
.

This Is How the AI Bubble Bursts.

AI bubble? Bitcoin's high correlation to
Nvidia sparks 80% crash warning
.
____ Climate goals go up in smoke as US
datacenters turn to coal
. ____
BenchVolt PD: USB PD Meets Benchtop
Precision
.
____
Amazon takes shots at ChatGPT with Quick
Suite - your new AI 'teammate' at work
.

Linux Seeing First LED Driver Written In Rust.
____
What Qualcomm's Arduino deal
means for Raspberry Pi
.

does qualcomm use llvm and clang?

AI Overview

Yes, Qualcomm uses both LLVM and Clang to
create custom toolchains, such as the
Snapdragon LLVM ARM Toolchain, for its
processors. They integrate, optimize, and
build upon the open-source LLVM and Clang
projects to develop their proprietary compilers
and tools for Snapdragon chipsets, as seen
in their official documentation and blog posts.

How Qualcomm uses LLVM and Clang.

are llvm and clang Big Tech software tools?

AI Overview

LLVM and Clang are not strictly "Big Tech"
software tools, but they are extensively
funded, developed, and used by major
technology companies. While originating
from an academic project, the compiler
infrastructure has evolved into a vital,
industry-standard component
maintained by a wide-ranging,
open-source community.

Academic origin and open-source foundation.


what are llvm and clang written in?

AI Overview

LLVM and Clang are primarily written in C++.

LLVM: The LLVM compiler infrastructure,
including its core components and backend,
is implemented in C++. Clang:

Clang, which serves as the frontend for C, C++,
Objective-C, and related languages within
the LLVM project, is also written in C++.
It makes extensive use of modern,
exception-free C++.

Hackers now use Velociraptor DFIR tool
in ransomware attacks
.
____
Data Centers Have Solved Their
Speed-to-Power Problem — With
Natural Gas
.
 ____
Photos of open-pit coal mining in China.

Why powering business is the real
lightbulb moment for Africa
.

Oil Prices Set for Moderate Dip on Gaza Ceasefire.
Try 1.

Thursday October 9 16:02
____
when did a multitasking os first appear on a pc?

AI Overview

The Commodore Amiga 1000, released in 1985, was the first
PC to offer preemptive multitasking, a method where the
operating system controls and coordinates how programs
share the central processing unit (CPU). This was a significant
advance over the cooperative multitasking found in other
early systems, such as the classic Mac OS and early
versions of Windows.

Before the Amiga's introduction, some computers
offered multitasking for more limited use cases:

1983: Concurrent CP/M-86
...
984: Sinclair QL
...
1987: OS/2 Jointly developed by Microsoft and IBM
...
The difference between cooperative and
preemptive multitasking

RISC-V set to announce 25% market penetration
— open-standard ISA is ahead of schedule,
securing fast-growing silicon footprint
.
____
Elon Musk Opens a New Laptop—Windows Demands
a Microsoft Account, and He Absolutely Refuses
.

____
Here is Panther Lake, Intel’s 2026 laptop
chip with next-gen graphics
.

if new x86 hardware platform is used, thne does
a certified c compiler require recertification?

AI Overview

The short answer is yes, a certified C compiler
generally requires recertification or re-qualification
when used on a new or substantially different
hardware platform. The specific details depend
on the safety standards involved and the extent
of the hardware changes.

Here is a breakdown of why this is necessary:
1. Certification covers the entire toolchain
...
2. Compiler behavior is dependent on the target
...
3. Requirements from safety standards
...

4. Verification of object code
...
5. What "recertification" entails.

____
Grid planners and experts on why markets
keep choosing renewables
.

____
Experts Say They’re Seeing Blinking Warning
Sign of AI Bubble
.

Oracle Fears Add to Doubts About the A.I. Rally.

Azure outage blocks access to Microsoft 365
services, admin portals
.

Cybercrime is afflicting big business. How
to lessen the pain
.

Two things LLM coding agents are still bad at (kix.dev).
____
GCC 16 Compiler Shifting To "Stage 3"
Development Next Month
.

Data Centers Lit the Fuse on the
Next Nuclear Age
.

____
upyOS modular MicroPython-based OS for
microcontrollers works with ESP32, RP2040, etc…
.

What is upyOS?

AI Overview

upyOS is a modular, lightweight, MicroPython-based
operating system designed for low-resource
microcontrollers like the ESP32 and Raspberry
Pi RP2040. It provides a Unix-like environment,
allowing developers to interact with the device
using familiar command-line tools.

Key features
Modular architecture:
...
Unix-like command-line interface (CLI):
...
Remote development:
...
Over-the-Air (OTA) updates:
...
Background execution:
...
Recovery mode:
...
Uses and target audience

The modular design allows developers to
avoid creating large, complex applications
from scratch by reusing existing system modules.
While this adds flexibility, it comes at the
cost of slightly lower performance and efficiency
compared to writing custom, low-level code.


What is upyOS written in, how many lines of
code, who funds?


AI Overview

upyOS is primarily written in Python and is a
modular operating system for microcontrollers.
Information on funding sources and an exact
lines of code count are not readily available.
 
____
Renewable energy outpaces coal for electricity
generation in historic first, report says
.

Oil Tankers Jam Seas as Global Glut Builds.

Trump’s major coal sales flop in Wyoming
and Montana
.

Orsted to cut 2,000 jobs as Trump’s offshore
wind battle continues
.

Investor-owned utilities call for ending
‘overreliance’ on PJM capacity market
.
Try 1.

Wednesday October 8 15:26
____
do lllms use llvm and clang?

AI Overview

Yes, Large Language Models (LLMs) and other advanced
software projects often leverage components of the
LLVM (Low-Level Virtual Machine) project, including Clang.
LLVM is a collection of modular and reusable compiler and
toolchain technologies. It provides a robust infrastructure
for building compilers, optimizers, and code generation tools.

Clang is a C, C++, Objective-C, and Objective-C++
frontend for LLVM. It acts as a compiler for these
languages, translating source code into LLVM
Intermediate Representation (IR), which can then be
optimized and compiled into machine code by the
LLVM backend. Many sophisticated software systems,
including those that might incorporate or be influenced
by LLMs, benefit from the advanced compilation and
optimization capabilities offered by LLVM and Clang. For
example, systems requiring high-performance code
generation, or those that integrate with C/C++
components, often utilize Clang as their compiler
and rely on the LLVM infrastructure for optimization
and target-specific code generation.



Stephen Hawking’s Warning About AI As Sora 2 Videos Go Viral.


____
Broadcom's Big AI Move In Japan Could
Slash Data Center Power Use By Half
.
____
Trump Eyes New Round of
Clean Energy Cuts Worth Billions
.

Base Power, a Battery-Focused Power Company,
Raises $1 Billion
.
____
Microsoft 365 outage blocks access to
Teams, Exchange Online
.

Amazon Caught Peddling AI Slop Version of
Cory Doctorow That’s So Ironic That We
Have to Go Outside and Stare at the
Sky for a Bit
.

Hackers exploit auth bypass in Service
Finder WordPress theme
.
____
Tips For C Programming From Nic Barker.

___
The AI Bubble Is Here. Why You Can Still Play the Stocks.

AI Power Boom Turns Nuclear Stocks Into the Market’s New Obsession."

Gravity defying, single-day AI stock rallies are the latest bubble signa.



does the ELEGOO Presoldered Nano Boards with USB Cable Compatible
with Arduino IDE Microcontroller Mini Board ATmega+328P CH340 Chip
run freeertos?

AI Overview

Yes, the ELEGOO Presoldered Nano Board is fully compatible with
the Arduino IDE and can run freeertos, as Elegoo boards are
designed to be 100% compatible with official Arduino boards and
use the same programming environment. To use it with freeertos,
you would typically set up the Arduino IDE to recognize the board,
then write and compile your freeertos-based code within the IDE,
which is a common and straightforward process for this microcontroller.

Steps to Use the Board with freeertos.



does the ELEGOO Presoldered Nano Boards with USB Cable Compatible with Arduino
IDE Microcontroller Mini Board ATmega+328P CH340 Chip run fa forth?

AI Overview

Yes, the ELEGOO Presoldered Nano Board is fully compatible with the Arduino
IDE and runs with the ATmega328P and CH340 chip as described, meaning
you can use it with official Arduino software, sensors, and code. To use it,
you will need to download and install the CH340 USB driver and then, in
the Arduino IDE, select the "Arduino Uno" board and the correct COM
port.

Steps to use the ELEGOO Nano Board:
____


US Power Companies Aim to Spend
$1 Trillion Over Next Five Years
. AI Power Boom ... Big Tech msm?

Experts issue warning on new factor driving up energy prices
for all Americans: 'Going to make things really. expensive'
.
___
Qualcomm acquires Arduino, introduces
Arduino UNO Q “dual-brain” SBC
.

does qualcommise Big Tech software tecnologies?

AI Overview

Yes, Qualcomm uses and partners with Big Tech
companies on a wide range of software
technologies, especially for artificial intelligence
(AI), extended reality (XR), and automotive
applications. While Qualcomm develops its own
core software, it also deeply integrates its hardware
with software platforms and services from major
tech giants to build out broader tech ecosystems.

Key software collaborations with major tech companies include:

Microsoft

AI and PC Software:
...
Automotive AI:
,,,
Extended Reality (XR):
...
Enterprise Security:...
Android and Longevity:


Meta

Amazon

Nvidia

Data Center AI: Qualcomm has announced plans to
enable connections to Nvidia's GPUs and software
for its data center processors. This is a critical step
for any company entering the data center market,
given Nvidia's dominance in AI semiconductors.
 
____
China to Build 11 New Oil Storage Sites in 2 Years.
Try 3.

Tuesday October 7 16:26
____
The Top 50 Countries by Central Bank Reserves.

Arduino has just been acquired by Qualcomm,
and they're already launching a new product
that runs Linux
.
Arduino has just been acquired by Qualcomm, and
they're already launching a new product that
runs Linux
.



Qualcomm is buying Arduino, releases new Raspberry Pi-esque Arduino board.

wafer.space lets you design your custom silicon just for $7 per die (Crowdfunding).

Sub $7 CH32V317 board offers 10/100Mbps Ethernet
dual USB 2.0 Type-C, DVP interface.
.


Amazon: Various versions of CH32V317 development boards,
often sourced from Chinese vendors, can be found on Amazon.
____
Qualcomm buys open-source electronics firm Arduino.

Qualcomm acquires Arduino in surprising move
which puts it right on the edge and at the helm of a
33-million strong maker community
.

Qualcomm Introduces The Arduino Uno Q Linux-Capable SBC.

____
A Cloud Built for Python Data Scientists, Not Infrastructure Engineers.
__
Linux 6.18 Works Around An Intel Xeon 6 PCIe
Performance Issue
.

Python 3.14 Released With Performance
Improvements, Free-Threading & Zstd
.

which c x66 compilers are certified?

AI Overview

Multiple compilers for the x86 architecture are certified
for use in safety-critical applications. The best choice
depends on the target application's specific safety
standard and integrity level.

Certified C compilers for x86.

Important considerations for compiler certification.


if new x86 hardware platform is used, thne does
a certified c compiler require recertification?

AI Overview

The short answer is yes, a certified C compiler
generally requires recertification or re-qualification
when used on a new or substantially different
hardware platform. The specific details depend
on the safety standards involved and the extent
of the hardware changes.

Here is a breakdown of why this is necessary:
1. Certification covers the entire toolchain
...
2. Compiler behavior is dependent on the target
...
3. Requirements from safety standards
...

4. Verification of object code
...
5. What "recertification" entails.
____
Data center boom sparks sticker shock for PJM ratepayers.
____
what is the diff4rence between computer education
and computer brainwashing?

AI Overview

The fundamental difference between computer
education and computer brainwashing lies in their
intent and outcome. Computer education fosters
critical thinking, while brainwashing uses
computer technology to manipulate and i
mpose a predetermined conclusion.

Computer education
...
How to differentiate the two
Computer brainwashing
...
How to differentiate the two.

____
Starlink is burning up one or two satellites
a day in Earth’s atmosphere
.

why is Starlink is burning up one or two
satellites a day in earth's atmosphere?


AI Overview

Starlink satellites burn up in Earth's atmosphere daily
for several reasons, including controlled deorbiting
of aging satellites, removing faulty units, and the
natural effect of increased atmospheric drag caused
by solar activity. The frequent reentries are a
consequence of the rapid expansion and replacement
cycle of the Starlink constellation.

Controlled deorbiting of aging satellites
...
Retiring faulty satellites
...
Heightened solar activity
...
Scientific and environmental concerns


what is big tech mainstream media ai?

AI Overview "

Big Tech mainstream media AI" refers to the
complex and evolving relationship between
major technology corporations and traditional
news organizations, where AI acts as both a
tool and a point of tension. Big Tech uses AI
to influence the media landscape, and news
outlets use AI to reshape journalism, creating
ethical and operational challenges for both.

How Big Tech influences mainstream media with AI
...
Erosion of trust: The rise of AI in news has been
linked to a decline in public trust in the media. A
2025 Reuters Institute report found that while
awareness of AI news tools is high, there is a clear
"comfort gap" between human-led and AI-led news,
with most people being uncomfortable with news
made entirely by AI.

is "AI Overview Modern compilation toolchains like
LLVM and Clang" an example of Big Tech AI?

No Google AI response!

ccc

5 hidden mistakes that are ruining your OLED monitor.

 
____
The Economics Of Renewables — The
Bottom Line Is Often Hidden By Hyperbole
.

Crude Traders Split on Whether the Glut Has Arrived.

Why California’s closed $2 billion solar plant is
not a signal of industry failure
.

Renewables overtake coal as world's biggest
source of electricity
.

Renewables overtake coal as world's
biggest source of electricity
.
Try 3.

Monday October 6 18:35
____
They Built a Giant That Floats”: China Unveils the
World’s Largest Offshore Wind Turbine (and it
could power 4,000 homes at sea)
.

Company bids less than a penny per ton in
biggest US coal sale in over a decade
.

Data center planned on 795 acres of farmland
in south Joliet, Illinois
.
____
Deloitte will refund Australian government
for AI hallucination-filled report
.
___
does ubuntu ise linux 6.17?

AI Overview

Yes, the upcoming Ubuntu 25.10 ("Questing Quokka") will use the Linux kernel 6.17, which is expected to ship with the final release on October 9, 2025. Ubuntu 25.10 is built on the most recent in-development kernel release to ensure the latest hardware support and performance enhancements are included by default, even if the kernel is still in its release candidate phase at the time of the operating system's launch.

Here's why this is significant:.

____
Elon Musk suffers mass exodus of employees
across all 5 companies: 'The one constant
… is how quickly he burns through deputies'
.

Sam Altman Warns That AI Industry Is Due
for a Spectacular Implosion
.

OpenAI signs a multi-billion dollar chips
deal with AMD — and the stock skyrockets
.

Microsoft CEO Satya Nadella’s ‘
confusion fix’ for Copilot leaves employees
laughing in townhall
.

Oracle patches EBS zero-day exploited
in Clop data theft attacks
.
____


what is a computer centimeter?

No response from Google AI.

128 x 8 = 1,024 mm is corect answer.
____
6 tiny self-hosting tools that save me hours every week. what is self-hosting?

AI Overview

Self-hosting is the practice of running your own applications
and services on your own hardware or rented servers, rather
than relying on external providers like Google or Microsoft.
This approach gives you greater control over your data, privacy,
and infrastructure, but also means you are responsible for
maintaining and securing the system yourself. Common
examples include hosting a personal cloud (like Nextcloud),
media server (like Jellyfin), or website on a personal computer
or a rented Virtual Private Server (VPS).

Key Aspects of Self-Hosting
...
How It Works
...
Who Is It For?.

Disrupting Car Production and Grocery Access,
Cyberattacks Upset British Life
.
 
____
I replaced my solar panels with wind power
generators at home - here's the verdict
.

From bombs to glass: Hanford site can
now transform nuclear
.

Germany outfitted half a million balconies
with solar panels (grist.org)
.

Try 4.

Sunday October 5 17:40
____
This Is How the AI Bubble Will Pop.

US and investors gambling on unproven
nuclear technology, warn experts
.

Massive surge in scans targeting
Palo Alto Networks login portals
.

Era of AI slop cleanup has begun.

Way past its prime: how did Amazon get so rubbish? (theguardian.com).

Personal data storage is an idea
whose time has come (muni.town)
.
____
Microsoft admits these two Windows 11/10
features definitely slow your PC down.
[these two Windows 11/10
features. Wgich two?]

Microsoft admits these two Windows 11/10 features
definitely slow your PC down
.

5 Windows 11 services I disabled
to give my PC a performance boost
.

4 Linux kernel tweaks I made that actually
improved performance updating linux kernel
.

what is the most recent release of linus torvalds linux?

AI Overview

Linus Torvalds turns 50 today. Wish him best for all great ...
The most recent Linux kernel release is 6.17, announced
by Linus Torvalds on September 28, 2025. This release brings
significant CPU improvements, stability for Intel Panther Lake
Xe3 graphics, better performance on AMD mixed-core
processors, and EXT4 file system enhancements.

Key details of Linux 6.17:

is linus torvald losing control of Linux 6.17 because of
so many changes and other reasons?

AI Overview

Despite a couple of high-profile controversies
during the 6.17 merge window, Linus Torvalds
maintains ultimate control over the Linux kernel's
direction. Far from losing control, his actions
demonstrate his decisive authority in ensuring
quality and enforcing development practices. His
famously blunt rejection of late and low-quality
code for version 6.17 underscores his
uncompromising standards.

The main events that led to questions about
the 6.17 development cycle were not signs
of chaos, but rather results of Torvalds exercising
his power:

Rejection of the RISC-V pull request:
...
Removal of Bcachefs:

Why these incidents show Torvalds still has control

These two events highlight Torvalds' continued
and active control of the kernel development
process.
...
The broader context of kernel maintenance

The development process is designed to manage
the increasing complexity of the kernel, with
Torvalds overseeing a hierarchy of maintainers.
 
____
$2B CALIFORNIA SOLAR PLANT TO SHUT DOWN
AFTER A DECADE FOR THE MOST FRUSTRATING. REASON
.

14 years later, America will transform wind power —
This state will be the epicenter of the project
.

____
Stop These Things’ Weekly Round Up: 5 October 2025.
Try 1.


Saturday October 4 17:27
____
Red Flag’: Analysts Sound Major Alarms
As AI Bubble Now ‘Bigger’ Than Subprime
.
____
Hackaday Podcast Episode 340: The Best
Programming Language, Space Surgery,
And Hacking Two 3D Printers Into One
.

How Do The Normal People Survive?.

Skip the Monthly Cloud Fees: There's a
Better Way to Store Your Photos and Videos
.

____
Cory Doctorow Says the AI Industry Is About to Collapse.
____
As Microsoft lays off thousands and jacks up
Game Pass prices, former FTC chair says I
told you so: The Activision-Blizzard buyout is
'harming both gamers and developers
.

Intel NPU Linux Driver 1.24 Released.

____
Scanning Activity on Palo Alto Networks
Portals Jump 500% in One Day
.

do users run safety-critical apps es palo alto networks?

AI Overview

Yes, users in critical sectors like manufacturing, energy,
and healthcare run safety-critical applications
with security from Palo Alto Networks. Palo Alto
Networks offers specialized solutions for Operational
Technology (OT) and critical infrastructure to ensure
the security and operational uptime of these sensitive
environments.

Here is a breakdown of how Palo Alto Networks
supports safety-critical environments
:

Support for Operational Technology (OT)
...
Compliance and integration with industry standards
...
Protection for various application types.

New "Cavalry Werewolf" Attack Hits Russian
Agencies with FoalShell and StallionRAT
.

____
State Fair of Texas addresses affordability
concerns after social media backlash
.

____
Popular app Rufus improves Windows 11 25H2
ISO install after users found issues
.

Windows 11’s annual ’25H2' update
arrives, and it’s a weird one
.

____
Wall Street Warns of Nuclear Tech Bubble.
Try 3.
 

Friday October 10 :48
____
The biggest sign of an AI bubble
is starting to appear
.

Inside JPMorgan’s Investment Bank,
Nuclear Hype Raises Concerns
.

Why Amazon (AMZN) May Lose Its
Cloud Computing Crown
.
____
Clearing Cookies Won't Save You: Here's
the Hidden Way You're Being Tracked
.
____ Tesla Delivers Record 497,099 EVs In Q3 On
xpiring Tax Credits. TSLA Stock Reverses Lower
.

does tesla use two versions of linux in its fsd vehicles?

AI Overview

While not two distinct versions of Linux, Tesla
FSD vehicles use a Linux-based system in a
dual-computer, redundant hardware
configuration. One customized Linux
distribution powers the in-car infotainment,
while the FSD computer's AI functions rely
on a tightly integrated software stack running
on a custom System-on-a-Chip (SoC).

Dual computer redundancy
...
Separate software stacks
...
Customization and open source
...
Upstream contributions: Tesla, in
collaboration with chipmakers like
Samsung, has been contributing
patches to the Linux kernel to
support their custom FSD hardware.
This demonstrates an ongoing
effort to maintain open-source
compliance and stay up-to-date.

Nuclear fusion, the ‘holy grail’ of power,
was always 30 years away—now it’s
a matter of when, not if, fusion
comes online to power AI
.

Seed7: a programming language which
cares about maintainability
.

what is seeed7?

AI Overview

Seed7 is an extensible, high-level,
general-purpose programming
language designed by Thomas Mertes
for portability and efficiency, compiling
to native machine code. Its primary
feature is the ability to extend the l
anguage itself by defining new syntax
elements and operators within libraries,
making it highly adaptable for specific
needs, such as creating Domain Specific
Languages (DSLs).

Key Features

Portability:
...
Efficiency:
...
Multiple Paradigms:

...
Portable APIs:

How it Works

Examples of Applications. ____
Month Pentagon decrees warfighters
don't need 'frequent' cybersecurity training
.

New data reveals incredible surge in key
energy sector: 'Crowding out coal-fired power'
.
 
Try 1/

Thursday October 02 14:48
____
Customers in 7 PJM states paid $4.4B for
data center transmission in 2024: report
.

Data centers ‘primary reason’ for high PJM
capacity prices: market monitor
.

Residents Shut Down Google Data Center
Before It Can Be Built
.

AI Data Centers Use a Lot of Energy. You May Be Paying for It.

OpenAI’s New Data Centers Will Draw More Power
Than the Entirety of New York City, Sam Altman Says
.

Data Center Reality: Whispers From Data Center Alley.

____



o all computer language eventually eventually execute
machine code for a hardware platform?

AI Overview

Yes, all computer languages eventually result
in machine code execution on a hardware
platform. This is because the Central Processing
Unit (CPU) of a computer can only directly
understand and execute instructions written
in its native machine language, which is
essentially binary code. While high-level
programming languages like Python or
Java are not directly converted to
machine code in all cases, the underlying
mechanism that enables their execution
|still relies on machine code.

For example:
...
In all these scenarios, the final instructions
that the CPU processes are in machine code.
The difference lies in when and how this
translation or interpretation into machine
code occurs
.


must software module certification be done
at both the source code and machine code levels?

AI Overview

In certain high-integrity, safety-critical
systems, software module certification
must be done at both the source code
and machine code levels. While source code
provides the human-readable logic, the
compiler—which converts source code to
machine code—is a weak link that can
introduce errors. Evaluating both
ensures the final, executable code
matches the validated source code.

Standards requiring dual-level certification
...
Why both levels are necessary
...
The role of a certified compiler
OpenZFS 2.4-rc2 Released With Linux 6.17
Support, Bug Fixes
.

Hackers say they have deleted children's
pictures and data after nursery attack backlash
.
____
The Case Against Generative AI.
 
____
Signs Of A Renewable Energy Comeback In The US.

Trump administration cancels nearly $8 billion in
climate funding to blue states: Vought
.

DOE ends billions in clean-energy awards after Vought post.

DOE’s reactor pilot: A turning point for US nuclear energy?.
Try 1.

Wednesday October 01 18:40
____
New bug in classic Outlook can only
be fixed via Microsoft support
. [$s?]

AI Overview

Adolf Hitler used a Walther PPK 7.65mm pistol
to shoot himself in his bunker on April 30, 1945.
The 7.65mm cartridge is also known as .32 ACP.

AI Overview

The 9mm is a more powerful cartridge than the
.380 ACP, with a larger case and higher pressure,
resulting in greater muzzle energy and velocity.
The .380, however, offers lower recoil and a
smaller overall size, making it easier to carry
and a good choice for those with less hand
strength. While both cartridges use a bullet
diameter of .355 inches, the 9mm has a longer
case, allowing for more powder.

AI Overview

Gavrilo Princip used an FN Browning Model 1910
semi-automatic pistol chambered in .380 ACP to
assassinate Archduke Franz Ferdinand and his
wife Sophie.
Key details about the assassination and
the weapon
:
...
The legacy: The assassination and the
cartridge used are infamous for having
triggered a series of events that led
directly to the outbreak of World War I.

New Yorkers Are Defacing This AI Startup’s
Million-Dollar Ad Campaign
.

Google Cloud Layoffs Hit Employees As
Sales Reach Record Highs
.

I self-host an NVR instead of relying on
cloud CCTV storage - here's how
.
____
"I hope the AI bubble bursts soon. I need it
to happen for my startup to succeed"
.

If AI is a bubble, the economy will pop with it.

Real Estate Data centers are a gold rush for
global real estate — but can funding keep up?
.

Data center on 431 acres in southeast Fort Worth
moving forward amid environmental concerns
.
____
Linus Torvalds Lashes Out At
RISC-V Big Endian Plans
.

No One Needs to Pay for Cloud Storage.
Here's How I Manage My Photos and Videos Without It
.

4 Defiant Broadcom calls for tech to go back
where it belongs: On-premises
.

5 Things You Should Never Keep In Cloud Storage.

is existence of so many different languages causing
questioning for necessity and cost reasons
outside the computing industry?

AI Overview

Yes, the existence of many different human
languages raises questions about their
necessity and cost outside of the computing
industry. This questioning is often balanced
against the immense cultural and
cognitive benefits of linguistic diversity.

Here is an overview of the challenges and
benefits associated with the multiplicity of
human languages.

Challenges and costs of language diversity

Economic costs:
...
Social and relational costs:
...
Arguments for the necessity and value of
language diversity
...
In conclusion, the questioning of linguistic
diversity often stems from the clear and
measurable economic and practical costs,
particularly in a globalized world. However,
this perspective often overlooks the profound,
long-term cultural, social, and cognitive benefits.
Arguments about the necessity of so many
languages are part of an ongoing debate between
the desire for global efficiency through
standardization and the desire to preserve
the richness and diversity of human culture.

who maintains sql?

AI Overview

SQL (Structured Query Language) as a standard
is maintained by ISO/IEC JTC 1, Information
technology, Subcommittee SC 32, Data
management and interchange. This international
body is responsible for developing and maintaining
the official SQL standard, which provides a common
set of syntax and features for relational database
management systems.

While the standard is maintained by ISO/IEC, specific
implementations and dialects of SQL are maintained
by the vendors and communities that develop them.

For example:

Microsoft:
...
...
The PostgreSQL Global Development Group:
...
Oracle:

6 things you need to know to untangle the
USB Power Delivery charging mess
.
____
Emily Blunt among Hollywood stars outraged over
'AI actor' Tilly Norwood
.
 
____
In a new era of climate disaster, a tiny, resilient
mountain village in New Mexico is teaching the world how to adapt
.

Substation Installed at Ørsted’s New US
Offshore Wind Farm Wind Farm Update
.

Point Beach Nuclear Powerplant Reactor Licenses Renewed.

US added more coal capacity than wind in July: FERC.

Exxon to cut 2,000 jobs in restructuring
hitting Canada and EU
.
Try 7.

Tuesday September 30 16:35
____
Ranked: Gas Prices Around the World.

No One Needs to Pay for Cloud Storage.
Here's How I Manage My Photos and Videos Without It
.

Energy Department Selects Four Companies
for Advanced Nuclear Fuel Line Pilot Projects
.

Citing ‘AI Arms Race,’ Trump Administration
Announces Efforts to Rekindle US Coal Industry
.

Crusoe's Abilene data center campus officially
live, serving Oracle and OpenAI's Stargate
.

China starts construction of the Solar Great Wall —
100 GW desert belt is rewriting the grid
.


Livermore, Alameda lose new $1 billion nuclear
fusion site to Albuquerque
.
Ask Hackaday: What’s The Top Programming
Language Of 2025
.

EvilAI Malware Masquerades as AI Tools to
Infiltrate Global Organizations
.
____
There is a huge pool of exceptional junior engineers (workweave.dev).

Microsoft’s new Security Store is like an app store for cybersecurity.



Microsoft has lost its way.



Meet oLLM: A Lightweight Python Library that brings
100K-Context LLM Inference to 8 GB Consumer
GPUs via SSD Offload—No Quantization Required
.

Oracle's GraalVM To Shift Focus To Non-Java
Languages Like Python & JavaScript
.



____
Energy grid researchers make startling discovery after
studying blackouts across America: 'The magnitude ... was shocking
.

“Wind Turbines Kill Each Other’s Power”: Wake Effect Cuts
Efficiency 20% While Offshore Farms Create 124 Mile Dead Zones Forever
.
Try 4.

Monrday September 29 15:34
____
Python: An Experienced Developer’s Grudging Guide
To A Necessary Evil in the Age of AI
.

AI Coding Is Massively Overhyped, Report .

Oracle’s $317B cloud revenue forecast, Nvidia to pay
$1.5B to rent back its own chips and steps back from
cloud effort to compete with AWS: key Cloud
updates.

Meet the rich retired boomers who are now
ultra-frugal because they are scared of going
broke—even after saving for decades
.

This 2 TB PCIe 5.0 SSD with speeds up to
10,000 MB/s is only fractionally more than
its slower PCIe 4.0 equivalent right now
.
____
RISC-V With Linux 6.18 Brings Support
For MIPS Vendor Extensions
.

____
Mini Laptop Needs Custom Kernel.

Top 10 Local LLMs (2025): Context Windows,
VRAM Targets, and Licenses Compared
.

how many lines of code does ) Meta Llama 3.1-8B contain?

AI Overview

It is not possible to provide a definitive number of lines
of code for Meta Llama 3.1-8B because large language
models like Llama are primarily defined by their vast
network of parameters, not a human-written
codebase.

Here's a breakdown of why this question is difficult to
answer and what metrics are relevant for understanding
the model
:

how many lines of code does DeepSeek-R1-Distill-Qwen-7B
contain?

AI Overview

It is not possible to provide a specific number for the lines
of code in DeepSeek-R1-Distill-Qwen-7B for several reasons
:

how many lines of code does Google Gemma 2-9B / 27B
contain?

AI Overview

It is not possible to quantify the exact number of lines
of code in Google's Gemma 2-9B and 27B models for
several key reasons
:

are llms operated as a subscription service?

AI Overview

Yes, many large language models (LLMs) are operated
as a subscription service, though this is not the only
way to use them. The availability of both paid, proprietary
models and free, open-source models means users can
choose the option that best fits their needs for privacy,
cost, and control.

Proprietary subscription services

...
Hybrid approaches

Organizations often use a hybrid approach. This
combines both paid and open-source models.
For example, a company might use a
commercial LLM for general tasks. It could
use a fine-tuned, self-hosted open-source
model for highly specialized, domain-specific tasks.

do llms operated us cloud computing?

AI Overview

Yes, large language models (LLMs) heavily
rely on cloud computing for their operation.
The immense computational power needed
for both training and serving LLMs makes
cloud infrastructure, often provided by
major US-based companies, the most
practical and scalable solution.

The primary uses for LLMs on cloud
computing
.

is cloud computing a subset of a data center?

AI Overview

No, cloud computing is not a subset of a data
center; rather, a data center is the physical
foundation that makes cloud computing possible.
A simpler way to think of the relationship is that the
"cloud" is the service, and a data center is the
physical facility that houses the hardware
which provides the service.

Cloud computing versus data center.

Can you trust cloud storage services in 2025?
My verdict after testing fan favorites
.

$700M data center project coming to
Temple, raising hopes and questions
.
____
Medusa Ransomware Claims Comcast Data Breach,
Demands $1.2M
.

JLR to resume some manufacturing in coming
days after cyber-attack
.


____
Everyone's left saying the same thing as $2,200,000,000
solar farm in California desert is switched off for 'not
serving its purpose
.
Try 2.



Sunrday September 28 10:52
____
A zero-water, zero-emissions, off-grid AI data center sounds like
science fiction, but it's actually real and already running
.
____
Stop Paying for Cloud Storage and
Carry 1TB in Your Pocket Instead
.

Seagate Sells 1GB for 1 Cent, Now You Can Get Its 24TB
External Hard Drive for Pennies on the Dollar
.

____
Python developers are embracing type hints (pyrefly.org).

how many lines of code does python contain in which languages?

AI Overview

The core CPython interpreter, which is the most common
implementation of Python, is primarily written in C. This
allows Python to be highly portable and run on various
operating systems.

While the standard library that
comes with Python contains a significant amount of
Python code, the underlying interpreter itself is
largely written in C.

Regarding the number of lines of code, the entire Python
standard library is estimated to be around two-thirds of
a million lines of code, spread across thousands of files.
Individual Python projects can vary greatly in size, from
a few hundred lines for a small script to millions of lines
for large-scale applications. For example, some large
projects have been reported to contain hundreds of
thousands or even millions of lines of Python code.

Is python a bytecode technology?

AI Overview

Yes, Python utilizes bytecode as an intermediary
representation during its execution process.
When you run a Python program, the source code
is first compiled into bytecode, which is a low-level,
platform-independent set of instructions. This
bytecode is then executed by the Python Virtual
Machine (PVM). Here's a breakdown:

Source Code:

You write your Python program in a .py file.

Compilation to Bytecode: When you run the
program, the Python interpreter translates
the source code into bytecode. This bytecode
is typically saved in .pyc files within a
__pycache__ directory for faster loading in
subsequent runs.

Execution by PVM: The
Python Virtual Machine (PVM) then reads
and executes these bytecode instructions.

This process offers benefits such as portability
(bytecode can run on different platforms)
and performance optimization (skipping
the parsing and compilation steps on
subsequent runs).
 
____
Are Rooftop Solar Panels the Solution to
America’s Growing Energy Crisis?
.
Try 2.

Saturday September 27 18:06
____
whe is sollar 10 awg hand crimler preferable
to a ratcheting crimper?

AI Overview

A 10 AWG solar hand crimper is preferable to a ratcheting
crimper for small, occasional jobs where budget and simplicity
are the primary concerns. However, for most solar
applications, a ratcheting crimper is the recommended
tool due to its reliability and superior crimp quality.

When a simple hand crimper is preferable

Why a ratcheting crimper is generally better.

____
It was supposed to be a park. Instead, this property
in Taylor is being turned into a data center
.

I tried Google Drive, OneDrive, Dropbox, and Nextcloud
for a month, and here's my verdict
.



Trump has vowed to make coal king again. How’s it going?.


Linux 6.18 Landing Patch For Old AMD Bulldozer
CPUs With XOP Instruction Set
.
____
AMD’s Newest Patent Brings a Gigantic Boost to Memory
Performance By a Multi-Chip DRAM Approach;
Immensely Benefitting APUs As Well
.
____
Ubutu 25.10's Only Supported RISC-V Platform:
QEMU Virtualization
.

You can use a Raspberry Pi as a decent home server.
____
stm engineer commented that it is necessary to implement
64-bit arithmetic in hardware. Is that engineer correct?


AI Overview

That statement is generally correct for modern
computing systems, which require 64-bit hardware
to achieve optimal performance and address large
amounts of memory. While it is technically possible
to perform 64-bit arithmetic in software on a 32-bit
processor, doing so is far slower and less efficient.
The need for 64-bit hardware depends on the
application's performance and memory requirements.

Why 64-bit hardware is necessary

When hardware-level 64-bit support is not needed

In short, while a 64-bit hardware implementation is standard
for modern, high-performance systems and is necessary for
any application requiring more than 4GB of RAM, simpler
systems can still operate effectively without it. The "
STM engineer" is correct from the perspective of
modern, resource-intensive engineering tasks, but
not all computing requires this advanced capability.
____
Prompt injection – and a $5 domain – trick
Salesforce Agentforce into leaking sales
.
 ____
Groundbreaking study shows how solar panels age after 30 years of use: '
It's an important message to the photovoltaic industry
.

Higher Electricity Prices Aren’t All Good for Utilities.
'Try 3.

Frriday September 26 19:06
____
Is "Modern compilation toolchain: , the LLVM Clang assemble ..."
technologies as attempt by Big Tech to force programmers to use AI?
.

AI Overview

Modern compilation toolchains like LLVM and Clang are not
an attempt by Big Tech to force programmers to use AI.
They are modular, open-source technologies that have
been foundational to compiler development for decades
and are widely used across the software industry. The
recent integration of AI is aimed at enhancing existing
tools, not replacing programmers.

LLVM, Clang, and AI's role

The actual pressure for developers to use AI

In summary, the LLVM toolchain itself is a mature compiler
technology. While it provides a flexible framework that allows
for integrating AI to improve performance, it is not an attempt
to force programmers to use AI. The push for AI adoption
comes instead from management directives promoting the
use of AI-powered code-generation assistants and other
similar products.




____
Mark Zuckerberg and Alexandr Wang reveal
new Meta product to chorus of disdain
.
____
Detecting Surveillance Cameras With The ESP32.
____
4 tiny single-board computers that outclass the Raspberry Pi.
___
Data centers should be ready to bring
their own power, Wright says
.



Researchers Just Found Something Extremely Alarming About AI’s Power Usage.



Data centers are thirsty for Texas’ water, but state planners
don’t know how much they will need
.

California lawmakers wanted to get tough on data centers.
Here’s what survived
.

Amazon Web Services CEO Matt Garman has a 'warning' for
employees: "The first and very most important thing
we've got to do is...
.

BWXT looks to build nuclear fuel fabrication facility in Campbell County.

OpenAI, Oracle announce data center in Doña Ana County is part of $500 billion project.

How to Back Up Your Google Photos Library to a Hard Drive.
___
SF tech giant Salesforce hit with 14 lawsuits in
rapid succession
. SD tecg guabt = ?]

Ubuntu 25.10's Move To Rust Coreutils Is Causing
Major Breakage For Some Executables
.

Bcachefs goes DKMS after Torvalds' kernel banishment.

SpaceX Dragon huffs, puffs... and fizzles out as
NASA aborts ISS boost
.
 

Try 2.

Thursday September 25 07:54
____
Microsoft forced to make Windows 10 extended
security updates truly free in Europe
.

Two annoying Windows 11 bugs have finally been
fixed – and it only took Microsoft a year
.

How One Bad Password Ended a 158-Year-Old Business.

US Navy: I can't quit you, Azure.

How LLMs Work: Top 10 Executive-Level Questions.

____
Best Buy Lays Off Geek Squad Team Members
Latest Job Cuts
.

i
____
US to convert retired coal mine into 350-megawatt
nuclear fusion power plant
.

does commercial unclear fusion work yet?

AI Overview

What's fueling the commercial fusion hype? - Bulletin of
the ... No, commercial nuclear fusion does not work yet;
commercial-scale fusion power plants capable of producing
net energy are still a theoretical and technical challenge, with
most experts and public facilities expecting it to be decades away.
While many private companies and large international projects
like ITER are making progress and have achieved
breakthroughs like net energy gain in experimental
settings, significant hurdles remain, including sustained
reactions, tritium recycling, and building a commercially
viable system.

Why commercial fusion isn't here yet:

Is nuclear fusion for real this time? These utilities think so.

Windmill’: China tests world’s first megawatt-level
airship to capture high winds
.

Try 3.

Wednesday September 24 08:51
____
DuckyPad Pro 20-key ESP32-S3 macropad supports
up to 3700+ macros using duckyScript language
.

Top Programming Languages 2025.

____
who wrote the clang compiler abd how was it funded?

AI Overview

The Clang compiler was primarily created by Chris Lattner,
who also initiated the LLVM compiler infrastructure project.
The funding for Clang and LLVM was significantly provided by
Apple Inc. Apple's interest stemmed from a desire to move
away from the GPL-licensed GCC compiler, which presented
licensing and integration challenges with Apple's development
tools and Objective-C focus. Apple hired Chris Lattner and heavily
sponsored the development of Clang and LLVM to serve as a
key component in their development stack, particularly for
Objective-C and later Swift.
____
Open Source Infrastructure is Breaking Down Due to
Corporate Freeloading
.
 
____
Uranium Energy Corp Files Fiscal 2025 Annual Report.
.Try 3.

Tuesday September 23 07:55

____
how many computer companies use
open system boot architecture?.

AI Overview

It is impossible to provide an exact number of computer
companies that use open system boot architecture
because the term encompasses a wide range of
hardware and software components used across
different types of devices. While most companies rely
on a combination of open and proprietary technologies,
certain firms and specific product lines are known for
their commitment to open-source booting.

"Open
system boot architecture" can refer to several
different technologies
:
...
The mixed reality of booting

The reality is that most hardware uses a combination
of open and proprietary code. A standard consumer PC,
for example, will use a proprietary UEFI implementation,
but it will almost always run an operating system that
uses an open-source bootloader like GRUB (for Linux)
or a proprietary one like the Windows Boot Manager.
In the broader computing landscape, the use of open
standards, like USB, is widespread, but a company's
architecture still often contains proprietary elements.


does apple use forth-base open source boot archiecture?

AI Overview

No, Apple does not use the "fourth-base open source boot
architecture". The search results indicate that Apple has its
own proprietary and highly secure boot process for its devices,
both for Apple silicon and Intel-based Macs. The name "
fourth-base" does not correspond to any known boot
architecture.

Apple's boot process uses these components:

does apple "fourth-base open source boot
architecture"use an interactiive assembler?
. :)


does apple open source boot architecture use an
interactive assembler?

I Overview

Apple's modern open-source boot architecture, part
of the Darwin operating system, does not use an
interactive assembler for its normal boot process.
The bootloaders, including the open-source
components, are compiled from source code
using standard development tools, like the
LLVM toolchain, before being loaded.

While an interactive assembler is not part of the
standard boot architecture, here's a closer
look at the components and how they
operate.

Boot process and assemblers
,,,
Modern compilation toolchain: For Apple silicon (ARM64),
the LLVM Clang assemble
...
...

Legacy systems: Very old Apple systems, like the
Apple II, had a machine language monitor that included
a "mini-assembler" for interactively writing and testing
assembly code. This capability is from a different era of
computing and is not present in modern Mac or iOS
boot architectures.
____
A drone flyover above Copenhagen Airport prompts
concerns that Russia was behind it.

...
 
____
Electricity Markets Aren’t Working Anymore.
Try 1.

Monday September 22 14:56
____
did the sun forth programmer's who wrote the boot software
use a forth assembler or a batch assembler?

AI Overview

The Forth boot software used on Sun workstations included its own
interactive assembler. This allowed for a highly flexible
development process where programmers could test and
assemble code "live" within the Forth environment, a
workflow that is distinct from using a traditional batch
assembler.

Here is how the Forth-based system worked:

ntegrated environment: Forth is a stack-oriented language
that functions as an interactive integrated development
environment (IDE). It blurs the line between the
language, the operating system, and the compiler.

Interactive development: This meant programmers
could define new "words" (functions) and test them i
mmediately. This included defining CODE words, which
are written in the target machine's
native assembly language.

pen Firmware (OBP): Sun's boot software, called
OpenBoot Prom (OBP) and later

Open Firmware, was based on Forth. It was not
a simple bootloader but a powerful environment with
a Forth interpreter. The "ok" prompt: This environment
was accessible to users at the "ok" prompt, allowing for
low-level diagnostic and debugging tasks. A user could
drop into the Forth interpreter and even write and
execute assembly code.

Close to the hardware: This interactive process
allowed developers to work very "close to the
metal," which is crucial for hardware development
and testing. Forth's design makes it great for
exploring and bringing up new hardware.

____
A Major Trading Firm Has Open-Sourced The
Latest Linux File-System: TernFS
.
____
EU’s cyber agency blames ransomware as Euro
airport check-in chaos continues
.

____
Poland at a Crossroads: Nuclear Delays vs Renewable Success.

Ranked: The Top Countries by Wind Power Capacity in 2024.
Try 7.

Grid line back on ryzen7 70o0U.

Missing jpgs.

Sunday September 21 16:39
____
He got an entire country running on clean energy.
Can he do it again?
.

____
Fast and furious': H-1B workers
abroad race to US as Trump order
sparks dismay, confusion
.

 

Try 3.

Post from $120 Asus N5000 4.64 GB running Windows 11,""Hotmetal with grid lines. :)

____


Saturrday September 29 15:40
____
is big tech the man behind the curtain in ai?


AI Overview

It is widely argued that Big Tech companies are the key
forces behind AI development, having amassed the
necessary resources, data, and talent to dominate
the AI ecosystem. Through significant financial
investments and strategic partnerships, these
companies exert immense influence, raising
concerns about market control, ethics, and
the future direction of the technology.

Major tech companies control the AI supply chain.
Companies like Microsoft, Google (Alphabet), Amazon,
and Meta influence the entire AI supply chain, from
infrastructure to applications. This gives them a
competitive advantage. ajor tech companies
control the AI supply chain. Companies like
Microsoft, Google (Alphabet), Amazon, and
Meta influence the entire AI supply chain, from
infrastructure to applications. This gives them
a competitive advantage.

Infrastructure: A few cloud providers control the
infrastructure for training and deploying large AI
models: Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud Platform. High costs
and vertical integration make it hard for
new companies to compete.


___
Big Tech and finance companies are telling H-1B
employees to get to the US in under 24 hours
.

Big Tech companies, foreign governments
scramble after Trump slaps $100,000 fee on H-1B visas
.
____

Microsoft announces " most powerful
data center" in latest billion-dollar AI spending splurge
. ____
Rust 1.90 Released With LLD Default On Linux
x86_64 While macOS x86_64 Demoted
.
Try 1.

Grid lines disappeared 6n ryen 7 5800HS.

Grid libnes on N60006/.

.


.

FriIday September 19 17:13
____
Microsoft boosts Wisconsin data center spending to $7 billion.

Utility company sparks outrage with proposal to pass
.$1.7 billion cost on to customers — here's what's happening
.

can ai be trusted?

AI Overview

AI can be trusted to a limited extent and only in specific
contexts, but it's crucial to understand its limitations and
potential risks, such as bias, inaccuracy, and lack of
explainability. Trust in AI is built through "trustworthy AI"
frameworks that emphasize characteristics like reliability,
transparency, accountability, and fairness. However,
achieving this requires ongoing development, rigorous
testing, and a conscious commitment from developers
and users to ensure AI is safe, responsible, and aligned
with human values.

Limitations and Risks:

Bias and Inaccuracy:
...
Opaque "Black Box"
...
Lack of Human Qualities:
...
Overconfidence:

AI Overview Yes,

"unrewarded genius is almost a proverb" is a statement
made by U.S. President Calvin Coolidge, and it functions
as a proverb by offering a timeless truth about the
importance of persistence and action to achieve success.
Coolidge's full quote, from his speech about the power of
persistence, explains that even genius is common among
unsuccessful people, and that only persistence and
determination can be truly omnipotent.

Analysis
of the quote:

"Unrewarded genius is almost a proverb": This phrase
itself uses the concept of a proverb to describe the
common outcome of unapplied talent. It highlights that
brilliance alone is not enough for success.

Context: Coolidge's point was that in the absence of
effort and persistence, great ideas and abilities often
remain unfulfilled and lead to nothing.

Core Message: The statement emphasizes that talent
is not a guarantee of success, and persistence is a
more crucial factor in achieving goals and solving problems.
____
what did Java inverter mean by c and c++ absolutely owned the whole universe?

AI Overview

C and C++ were the ubiquitous, industry-standard languages.
They were used for everything from operating systems like
Unix to factory process-control systems, elevators, and video
equipment. There was no other realistic choice for systems-level
and embedded programming.

C and C++ were the ubiquitous, industry-standard languages.
They were used for everything from operating systems like
Unix to factory process-control systems, elevators, and video
equipment. There was no other realistic choice for
systems-level and embedded programming.

Developers were locked into the language. At the time, if
you were a programmer, you were most likely writing in
C or C++, and your entire toolchain, training, and
ecosystem were built around it.

The tools and languages were inadequate for the future.
Gosling's team had a vision for a world of networked
"smart" appliances—what is now called the Internet of
Things (IoT). However, C and C++ were ill-suited for this,
suffering from issues like memory management problems
and a lack of portability.

The problems with C and C++ that Java aimed to solve
Gosling's team created Java not to replace C/C++,
but to address the specific problems they posed for a
new generation of networked devices.
....
o, while C and C++ had historically dominated all
programming, Java's design was a direct response
to their limitations for the future of networked and
9portable computing.


Tr
y 1.


Hotmetal 6 running on on Asus ryzen 7 5800HS Windows 11 laptop ... in a motel,

Issued with 11. :(

Grid lines with Hotmetal. :)

html source code degugging required.





Thursday September 18 08:06
____
Microsoft Warns 200 Million Windows Users
—Do Not Update Your PC
.

do sbc vendors always implement their
interface software on windows 11?

AI Overview

No, Session Border Controller (SBC) vendors do
not always implement their interface software
on Windows 11. SBC management and interfaces
are accessible through a variety of platforms and
methods, including web-based graphical user
interfaces (GUIs), virtualized deployments,
and cloud-native solutions.

Common
approaches used by SBC vendors include:

While some vendors, particularly for specific
applications like automotive point-of-sale
systems, have offered Windows-based
management systems, this is not a
universal standard for enterprise or
carrier-grade SBCs. The industry has
largely moved toward more flexible
and scalable software and
cloud-based management solutions.
____
why do solar companies appear yo go out of business fresquently?

AI Overview

Solar companies appear to go out of business frequently due to a
combination of economic factors, such as high interest rates and
reduced incentives, alongside aggressive and unsustainable business
practices like poor sales tactics and outsourced installations that
prioritize short-term profit over long-term quality and customer
support. Intense competition, high operating costs, complex
regulations, and labor shortages also contribute to instability,
especially for smaller businesses struggling to adapt to market
shifts.

Economic Challenges
Rising Interest Rates:
...
Changes in Incentives:

Aggressive and Unsustainable Business Practices

Poor Sales Tactics:
...|
Outsourced and Poor-Quality Installations:
...
Focus on Short-Term Profits:

Industry-Specific Pressures

Intense Competition:
...
Complex Regulations and Policies:
...
Labor Shortages:
...
High Customer Expectations:
____
GE Vernova turbine blade bent in half at
Iberdrola wind farm
.

Eversource faces financial risk over Trump
administration’s offshore wind stop-work order: Fitch
.

New Mexico’s Billion-Dollar Oilfield Orphans.

Perovskite Solar Cell Crystals See The Invisible.

Proposed solar farm sparks heated opposition.

Microsoft turns to gas generators to keep
Mexico data center running
.
Try 1.

Wednesday September 17 12:46

____

Windows 10 1909 Lenovo ryzen 5 550U processes jpgs correcty.

All charge/load controllers about $10.

Two thought to be broken ... but all configured correctly.

All have non-volitatile memory to preserve settable settings. :)__



Small 12 V 5 mAh battery useful for setup ... compared to 12 V 35 aAh huge battery oroginally used.

Blue wire nut connects 14 AWG to 19 AWG battery cable/conntecdtor.




____
is it better from a cost and maintenance standpoint
just to use gcc c for both high-level assembler/machine
code than high-level and batch assembler in 2025?

AI Overview

Using C with inline GCC assembly is almost always
superior in terms of cost and maintenance compared
to using separate, full-fledged batch assembly in 2025.
The use of pure assembly is now limited to highly
specialized, low-level tasks where extreme performance
or direct hardware access is required, such as in some
parts of an operating system kernel or an
embedded bootloader.

Development cost

Faster development time:
mproved readability:
...
Increased portability:
Maintenance cost
...
Access to modern features:

...
Higher programmer productivity:
...
Easier to find developers:
...
obust tooling:

____
which computer languages are also single
task interactive operating systems?
...
Compiler optimizations:

Hand-written vs. compiler-generated:

Targeted optimization:

When to use separate batch assembly.



AI Overview

No programming language is also a single-task interactive
operating system; instead, operating systems are built
using programming languages like C, C++, and
Assembly, which provide the low-level control
necessary to manage hardware and software
resources. While languages like Python, Java,
and JavaScript are used for various applications,
they are not operating systems themselves but
rather tools that run on top of an operating
system to perform tasks.

How Languages and Operating Systems Relate

In summary You cannot think of a programming
language as an operating system, but rather it
is a component used to create operating systems
and other software applications.


____

Samsung a23 cell phone camera recovered!

Windows 10 22H2 pggs still broken.
____


how can i best measure the voltage and current
output from a 100 w solar panel every minute?

AI Overview

To best measure the voltage and current of a solar panel
every minute, use a digital multimeter with a clamp
attachment for current and a specialized solar power
meter. First, connect the voltage leads in parallel to
the panel terminals, record the voltage, then set the
meter to measure DC current. For non-contact current
measurement, use a clamp meter. Repeat this process
every minute, ensuring the panel is exposed to
consistent sunlight.

Prepare Your Setup"......
...
3. Measure Current (A) :(


Load Conditions: Measuring open-circuit voltage
(no load) and short-circuit current provides a baseline,
but the actual power output under load will vary
with the connected load. :)

____
what is The Safety Factor in engineering?

AI Overview

In engineering, the safety factor is the ratio of a system's
maximum capacity to its expected load or demand,
quantifying how much stronger a component is than
it needs to be to ensure reliability and prevent failure
from unexpected events like material imperfections
or overloading. A safety factor greater than one
indicates that the design can withstand more load
than anticipated, ensuring structural integrity and
safety over the product's lifetime.

How it Works

Capacity vs. Demand:

Calculation:

Why It's Important

Uncertainty and Variation:

Longevity:

Factors Influencing the Safety Factor

Material Properties:

Application:

Environmental Conditions:

Importance of the Structure:
____
Linux Patches Posted For Enabling The
Tenstorrent Blackhole SoC
.

Oracle Releases Java 25.

which computer languages are supported by
large corporations?

AI Overview

Large corporations use a diverse portfolio of
programming languages based on the
application's specific needs, such as
performance, platform compatibility,
and scale. While no single language
dominates, Python, Java, and JavaScript
are consistently among the most popular.

Popular languages across industries

Python

Java

JavaScript and TypeScript

C#

C and C+

SQL

Go (Golang): Developed by Google

Rust:

Swift and Kotlin:

PHP:

The big picture

A large corporation’s technology stack is rarely
monolithic. It's common for a company to use
different languages and technologies across its
various teams and products. The choice of
language often depends on factors such as:

Legacy systems:____
Google nukes 224 Android malware apps behind
massive ad fraud campaign
.
____
US in Talks to Set Up $5 Billion Fund for
Critical Mineral Deals
.

Pine Ridge Uranium Project Delivers Excellent
Initial Drill Results
.

Al Gore on China’s climate rise: ‘I would not

have seen this coming’
.

The US Offshore Wind Industry Is Scheming
For A Comeback
.

Generators Are Expensive. But Is Spending
Even More on an In.verter Model a
Better Investment?
Try 1.


Microsoft dsiruption plioy?

Tuesday September 16 18:57
____
Consumer Reports asks Microsoft to keep supporting Windows 10.

US Looks to Boost Uranium Reserves for Nuclear Power.

Which Countries Buy the Most U.S. Coal?.
____
Off To The Races With ESP32 And EInk.
____
5 reasons high-end CPUs have become overkill in 2025.

""

A.I.’s Prophet of Doom Wants to Shut It All Down.

Open source Cloud Hypervisor adds (maybe
futile) no-AI-code policy
.

how much power do esp32 processors draw?

AI Overview

Insight Into ESP32 Sleep Modes & Their Power Consumption
ESP32 power consumption varies significantly with operating
mode, from a few microamps (µA) in Deep Sleep to hundreds
of milliamps (mA) during active WiFi transmission, which is the
most power-intensive function. Active mode consumes
95–240 mA, while Modem-Sleep mode uses 20–68 mA,
and Deep Sleep can draw as little as 10 µA to 150 µA. To
optimize power, you should disable unused features and
utilize the ESP32's sleep modes.

Active Mode (WiFi/BLE active)

Deep Sleep Mode

Factors Affecting Power Draw

How to Optimize ESP32 Power Consumption.

AI-controlled drone swarms set to transform
combat on battlefield
. ____
Ubuntu 25.10's Rust Coreutils Transition Has
Uncovered Performance Shortcomings
.
____

Does computer programming[aka software
engineering] lead to a sedentary lifestyle?

AI Overview

Yes, computer programming and software engineering
are widely associated with a sedentary lifestyle. The
nature of the work requires long, focused hours
spent sitting at a computer, often with minimal
physical activity. However, a sedentary lifestyle
is not an inevitable outcome and can be
proactively mitigated.

Reasons for a sedentary lifestyle
Prolonged sitting:
...
Minimal physical activity:
...
intense focus:
...
Stress and poor eating habits:
....
rregular sleep patterns:

Associated health risks.


are software company investments risky?

AI Overview

Yes, investments in software companies are
inherently risky, though the level of risk varies
significantly depending on the company's stage,
competitive position, and financial health. For
instance, a small, early-stage SaaS startup is
much riskier than a large, established software
company like Microsoft or Oracle.

Risks common to all software companies

echnological obsolescence.
...
Cybersecurity threats.
...
Dependence on key talent.
...
Regulatory and compliance risks.

Higher risks for software startups.

Microsoft Raises Quarterly Dividend by 9.6%.

What do people actually use ChatGPT for? OpenAI
provides some numbers
.

15 ransomware gangs ‘go dark’ to enjoy '
golden parachutes'
.

____
Charted: Top Countries by Energy Consumption
Per Capita in 2024
.

Czech nuclear plant to add 213-foot monster
turbine generators with Mach 2 blades
.

Offshore wind was supposed to save power-starved
New England. Trump blew up that plan
.
Try 1.


Resized using Paint ... soft of.
Paint only allowed storing as .png.
Monday September 15 12:42
____
are reports that an increasing number of software
develpers are leaving the profession correct?

AI Overview

No, reports of a mass exodus of software developers
leaving the profession are largely incorrect, though
the tech job market has experienced significant volatility
since 2022. While high turnover rates are typical for the
industry, the narrative is more complex than a simple
"brain drain".

Many developers are not leaving the
industry entirely but are instead:

Pivoting to freelance or entrepreneurship
....
Shifting to a different career within the tech ecosystem
....
Seeking work in traditional non-tech industries

Industry downturn and AI disruption

Overhiring and layoffs
...

Artificial intelligence:

Burnout and workload:
Shift in work arrangements:

geism

Bias against older developers:

Long-term outlook and market adjustments

While the market has become more selective,
it is not collapsing. Projections from the Bureau
of Labor Statistics (BLS) still forecast a robust
long-term growth for software development
roles. The market is not declining so much
as it is rebalancing and evolving, favoring
different skills and levels of experience.


what are the causes of so many Ubuntu updates?

AI Overview

Ubuntu releases frequent updates to fix bugs, address
critical security vulnerabilities, and add support for new
hardware, driven by the open-source nature of many
software components and the coordination required to
package them into a cohesive operating system. The
system is designed to improve stability and safety,
incorporating phased updates to catch issues before
they affect all users and automatically installing
important security patches without interrupting the
user experience.

Reasons for Frequent Updates.
____
What are data centers and why do they matter?.

In Australia, a data centre boom is built on vague
water plans
.

CoreWeave, Nvidia sign $6.3 billion cloud
computing capacity order
.

____
Why does the arduino ide appear to work
better with windows 11 than ubuntu?

AI Overview

The perception that the Arduino IDE "works
better" on Windows 11 than on Ubuntu is
primarily due to the underlying differences
between the two operating systems, p
articularly in how they handle user
permissions and drivers. While the IDE
software itself is nearly identical across
platforms, the out-of-the-box experience
on Windows is often smoother for
beginners because the OS manages
many of these requirements automatically.

Here are the specific reasons you might
experience better performance and reliability on Windows
:

Driver and serial port handling
...
Installation process
...
Sandboxing and security
....
Conflicting software
...
Other minor issues.
___
Linux 6.17-rc6 Released With VMSCAPE Mitigation,
FLYDIGI APEX 5 Support & Fixes
.

AI Overview

Linux Kernel 6.17 RC5 Released: What's New and
Linus ... There isn't a single entity "funding" a
specific Linux kernel release like 6.17-rc6; rather,
the Linux kernel is developed by a large community
of volunteers and corporate-sponsored developers.
Funding for the overall kernel project and its
stewardship is provided by the Linux Foundation,
which receives financial support from its
corporate members, but the specific development
of a new kernel version is funded by the various
companies that employ the developers
contributing to it, such as Google, Intel, and Red Hat.

How Linux Kernel Development is Funded

How a Release Gets "Funding"

There isn't a specific fundraising event for each
kernel version.

The development effort for Linux 6.17-rc6,
like all other versions, is a collaborative effort
where the contributions from developers
employed by many different companies and
volunteer contributors are integrated.

Long-term unemployment at post-pandemic
high, straining workers and economy
.
____
Retro X86 With 486Tang.

what is a 486tang

AI Overview

A 486tang is a field-programmable gate array (FPGA)
project that brings the classic 486 PC experience to a

credit-card-sized board. The project is a port of the ao486
MiSTer core, adapted to run on the Sipeed Tang Console
138K FPGA.

Key features of the 486tang include:

Performance: It provides the computing power of roughly
a 486SX-20 processor, without the math coprocessor (FPU).

Operating system: It has solid compatibility with DOS 6.22
and can run era-appropriate applications like Turbo C and
MS Word for DOS.

Multimedia: The project includes VGA graphics and Sound
Blaster audio capabilities.

Storage: It emulates IDE storage, with disk access
provided via an SD card.

Gaming: It is well-suited for playing classic DOS games from
around 1992–1993 and earlier.

This retrocomputing project was made possible by porting
the ao486 core, which was originally developed for the
MiSTer platform, to a non-Altera FPGA for the first time.
It is a significant accomplishment in the world of
retrocomputing and FPGA development.
___
OpenAI Realizes It Made a Terrible Mistake.

Rolling Stone owner Penske Media sues
Google over AI summaries
.


Try 1.


Sunday September 14 14 16:24
____
I built a $5 ESP32-powered Wi-Fi scanner
and honeypot in just a few hours
.
____
AI engineers are being deployed as consultants
and getting paid $900 per hour
.

what is the difference between a software engineer
and and a computer programmer?


AI Overview

A computer programmer writes and modifies code to create
software programs, focusing on a specific aspect of the
development process, while a software engineer takes a
broader, higher-level approach, designing the overall
architecture, overseeing the entire software development
lifecycle (SDLC), and ensuring the final product meets both
technical and business requirements. Think of a
programmer as a skilled builder who constructs the
code from blueprints, and the software engineer as
the architect who designs those blueprints.

Computer Programmer
...
Software Engineer

62 Patches Posted For Stripping Classic Initrd Support
From The Linux Kernel
.

TechnologyThe World’s Largest Cloud Providers,
Ranked by Market Share
.

Data centers will take up 90% of Georgia's new energy.
What happens to our bills?
.

Intel Loses One Of Its USB4 / Thunderbolt
Linux Driver Maintainers
.

What Is The Fourier Transform?.


____
is time spent trying to deal with microsoft
windows 10 and 11 increasing?

AI Overview
User complaints and anecdotal evidence
suggest that the time users spend dealing with Windows
10 and 11 is increasing due to performance slowdowns,
persistent issues with updates, and unwanted feature
changes. However, reliable quantitative data is not
publicly available to confirm an overall increase.

Factors contributing to increased user effort include:
Performance degradation
...
ersistent update problems:
...
Interface and customization changes:
..
...
Privacy and telemetry concerns:
...
Hardware and software compatibility:
...
Increased bloatware:

Comparison to older versions

Compared to earlier versions like Windows 7,
users of Windows 10 and 11 appear to spend
more time dealing with system maintenance
and troubleshooting. Windows 7 required
fewer resources, featured less aggressive
data collection, and provided greater user
control over updates. This has created
a sense of increasing complexity and
required time investment for users on
newer Windows versions.


____
what is the best way to measure power consumptio
in a esp32 system?


AI Overview

The best way to measure ESP32 power consumption involves using
a specialized device like a Joulescope or Power Profiler Kit II, which
provide high-resolution, wide dynamic range measurements of
current and voltage. These tools can capture rapid changes in current,
such as during deep-sleep and wake-up transitions, and require a
PC to visualize the resulting waveforms. Alternatively, you can use
development boards with headers to connect a power measurement
device, or if measuring AC power, use a CT clamp with a transformer.


does an oramge pi zero 2w run freertos?

AI Overview

No, the Orange Pi Zero 2W doesn't run FreeRTOS out of the box,
as it's a full-featured Linux-based single-board computer running
operating systems like Android and Ubuntu, not a microcontroller
where FreeRTOS is typically used. You would need to port the
FreeRTOS kernel to the board's processor, which is a complex task
usually suited for smaller, cheaper devices like the Raspberry Pi Pico.

Why FreeRTOS isn't the standard OS for Orange Pi Zero 2W

When to consider FreeRTOS

Microcontrollers:

If your project requires deep control over hardware, low-level
task management, and precise timing, FreeRTOS is an
excellent choice for a microcontroller like the Raspberry Pi Pico.

Bare-Metal Development: For simple, time-critical tasks
where you want to avoid the complexity and resource usage
of a full operating system.


can i write to a usb flash drive using freertos?

AI Overview

Yes, you can write to a USB flash drive using FreeRTOS,
but it requires implementing a USB Host stack, a Mass
Storage Class (MSC) driver, and a FAT filesystem driver
on your microcontroller. You will then use the driver APIs
provided by the microcontroller's SDK (e.g., for STM32)
or a third-party library to mount the filesystem and
perform file operations like opening, writing, and
closing files on the USB device.

Key Components Needed.

can a esp32 system write to a usb flash drive?

AI Overview

Yes, certain ESP32 systems, specifically the ESP32-S2
and ESP32-S3 chips, can write to a USB flash drive.
This functionality requires the ESP32 to act as a USB host,
which the original ESP32 chip does not support.

Requirements for writing to a USB flash drive

ESP32-S2 or ESP32-S3 chip:
...
Mass Storage Class (MSC) support:
...
AT file system support:
...
Correct wiring and power:
...
USB device mode:

Both the ESP32-S2 and S3 can also be configured
to act as a USB device, appearing as a flash drive
to a computer. However, this is the reverse of
writing to a flash drive and requires different firmware.



____
China running out of rubbish to burn as waste power goes into overdrive.

Stop These Things’ Weekly Round Up: 14 September 2025.

First sailing nuclear reactor in history unveiled —
It will produce 800 MW over this sea
.


Try 2.
Saturday September 13 18:38

___

what was ibm tss. did it suceed?

AI Overview

IBM developed multiple products called TSS over the years,
but the most well-known is the Time Sharing
System (TSS/360), an early operating system from
the 1960s.

TSS/360: The time-sharing operating system.


are all computer languages maintainable,
what is going to happen to them?

AI Overview

Programming languages are not all equally maintainable,
and none will truly disappear in the foreseeable future.
The language landscape constantly evolves, driven by
new needs and technologies, but vast amounts of
existing code ensure older languages remain in use.

Maintainability varies by language design.

have some speculate a mc4 connector a a ploy by the
solar industry to generate repair business?

AI Overview

It is a widely shared concern that some cheap or improperly
installed MC4 connectors are unreliable and can fail, potentially
leading to fires and requiring repair. However, the notion that
the original MC4 connectors are deliberately designed to fail
as a ploy for repair business is a speculative claim not supported
by the evidence. The technology is standardized for reliability
and safety when used correctly.

Evidence supporting the unreliability of cheap connectors.
____
ESP32 Hosts Functional Minecraft Server.



This super sleek ESP32 weather station looks good on any desk.

____
How to Spot Malicious Two-Factor Authentication Prompts
Hackers can get past 2FA if you're not careful
.
___
US electric grids under pressure from energy-hungry
data centers are changing strategy
.


____
5,600 MW rise from the desert — Four-reactor giant
now shaping a nation’s grid
.

rump Admin Moves to Sink Maryland Offshore
Wind Farm Approval
.

Powered down: After 2 years some of Maine’s
electric school buses remain parked
.
Try 1.


Hotmetal 6.0 disappeared 9/112/25 on Lenovo ryzen 7 4700U. running 10 222H2.

Grid previously disappeared on ryzen 5 5500u runing 10 1909.

is wiindows 10 working worse and worse an illusion?

AI Overview

Whether the perception of Windows 10 degrading over time
is an illusion is complicated, but for most users, it's a very
real phenomenon caused by an accumulation of software
and data, rather than the operating system itself intentionally
decaying. The feeling of a system getting slower is not
imaginary and results from a combination of software
and hardware factors.

Software causes.



lLenovo ryen 5 3500U grid.


Friday September 12 2025 19:39
____
EnergyRanked: Electricity Use Per Capita in
Major Global Economies
.
____
CISA ‘fired up’ to chart new vision for CVE program.


____
5 projects you can do for much cheaper
with an ESP32 than a Raspberry Pi
.


____
How the United States Is Undoing the Post-9/11 Security
Architecture That Has Kept It Safe
.




____
who bulds counterfeit esp32 systems?

AI Overview

Major companies in the consumer electronics and
IoT industries often purchase ESP32-based products
from original module manufacturers like Espressif,
as well as a range of third-party vendors and
distributors. However, counterfeit versions,
or products mislabeled as genuine, often
originate from sellers and factories on large
e-commerce platforms like Alibaba and
AliExpress.

I=It is important to differentiate between
three different types of ESP32 products
available on the market:

Genuine: Products sold by the original
manufacturer, Espressif Systems.

Clones: Boards manufactured by third-party
companies that legally license and use
genuine ESP32 chips. Examples of reputable
clone manufacturers include Adafruit and
SparkFun.

Counterfeits: Boards made to deliberately
mislead customers into believing they
are purchasing a genuine or officially
certified product.

How counterfeit and mislabeled boards

are created
...
How to identify potential counterfeits
...
Risks of using counterfeit ESP32 products.


why are counterfeit espo32 systems built?

AI Overview

Counterfeit ESP32 systems are built for two
primary reasons: to maximize profit
through deception and to exploit global
supply chain weaknesses. The
counterfeiting takes different forms,
from selling entirely fake boards to r
epackaging unofficial modules with false
markings.

Financial gain
...
Supply chain vulnerabilities
...
Consequences for buyers.

Windows 11’s September patch secretly
deletes two programs. Here’s why
.

US warns of hidden radios in solar-powered
highway systems, EV chargers at risk



Linux 6.18 Will Further Complicate Non-GPL
Out-Of-Tree File-Systems
.

OpenAI Execs Are Extremely Upset.

Huntress's 'hilarious' attacker surveillance
splits infosec community
.

Intel talent bleed continues as Xeon chip architect
heads for the escape hatch
.

GCC Rust Compiler Continues Quest To
Compile The Linux Kernel Crate
.

does espressif;s es-idf use llvm?

AI Overview

Yes, Espressif's ESP-IDF uses LLVM, though not always
for the final compilation. Its specific use depends on the
development workflow, such as for advanced language
server features or specific chip architectures.

Here is a breakdown of how ESP-IDF incorporates LLVM:

For tooling and editor support

LLVM-based Language Server:

Static analysis with Clang-Tidy:

Xtensa architecture support:

Separate toolchains for different architectures:


For build systems.

We are entering a golden age of robotics startups —
and not just because of AI
.

VirtualBox 7.2.2 fixes TPM, Windows on ARM
issues, and more
.


Oracle (ORCL) Lands Major NATO Cloud Partnership.

Claude AI just became the ultimate work companion,
and it might tempt me to switch from ChatGPT
.

Google quantum chip that peeked into ‘
parallel universe’ reveals exotic matter
.

How much water will the $165 billion data center
near El Paso use? Developers unveil figures
ahead of Doña Ana commissioners vote
.
 
___
California may help solar bloom where water runs dry.

China breaks ground on unprecedented project
that could reshape global energy: 'Missing puzzle piece
.

U.S. Wind accuses Trump administration of using
"political pressure" to halt Maryland turbine project.

The World Is Going Electric, With Or Without Us.
Now Is The Time For Leadership
.

Giant 250-foot wind turbine collapses as locals hear
'almighty crack' in night
.

China’s surge pushes global wind toward fastest
growth ever
.
Try 1.

Thursday September 10 2025 16:02
____
ls llvm complex and obfuscated?

AI Overview

LLVM itself is not inherently obfuscated, but it is a complex
and powerful compiler infrastructure. Its modular design
and use of an Intermediate Representation (IR) make it
an ideal foundation for creating code obfuscation tools,
such as the open-source Obfuscator-LLVM (O-LLVM).

Complexity in LLVM's design

Steep learning curve: It is a massive project with millions
of lines of code
. Understanding the core concepts and
APIs, like the llvm::Value, llvm::Type, and
module-pass-function-basic block hierarchy, requires
significant effort.

____
what is the float voltage for a 12V 5Ah Home Alarm Battery?

AI Overview

The float voltage for a typical 12V 5Ah sealed lead-acid (SLA)
battery, commonly used in home alarm systems, is between
13.5 and 13.8 volts.

Important details about this float voltage:
AI Overview

what should the discharge reconnect voltage beforr a 12V 5Ah
Home Alarm Battery?

For a 12V 5Ah sealed lead-acid (SLA) or absorbed glass
mat (AGM) home alarm battery, the discharge reconnect
voltage should be between 12.6V and 12.8V. This is the
voltage level at which the charging system should
recognize that the battery is no longer being discharged
and can safely begin to be recharged.

Recommended voltage levels.

AI Overview

For a standard 12V 5Ah sealed lead-acid (SLA) battery,
the discharge stop voltage, or low-voltage cutoff
(LVC), should be 10.5V under load to prevent
damage and maximize battery life. For better
battery health, a higher cutoff voltage is
recommended.

Voltage levels for a 12V SLA battery Fully Charged
(at rest): 12.6V to 12.8V.
50% Discharged (at rest):
Around 12.2V. Discharging past 50% significantly
shortens the battery's lifespan.

Nominal Cutoff (under load): 10.5V. This is the
standard minimum voltage for a 12V lead-acid battery.
Dropping below this level during use risks irreversible
damage (sulfation).

do digital multimeter measures voltages, even at millivolt levels,
better than amp measurements?

AI Overview

Yes, a digital multimeter (DMM) generally measures voltages,
especially at millivolt levels, more accurately and reliably than
it measures current. This is primarily because voltage
measurements are non-intrusive, while current
measurements are inherently intrusive and can significantly
alter the circuit's behavior.

Why voltage measurement is superior.

Why current measurement is problematic.



____
Baguette S3 ESP32-S3 board gets the breadboard-friendly crown.

65F02 Is An FPGA 6502 With A Need For Speed.

LLVM 21.1.1 Ships A Variety Of Compiler Fixes.

which 10 AWG copper wire has less resistance per foot; stranded or solid?

AI Ovrview

olid 10 AWG copper wire has slightly less resistance per foot
than stranded 10 AWG copper wire due to the small air gaps
between the strands in stranded wire, which reduce the
amount of copper in the same overall cross-section.
While stranded wire is more flexible and preferred for
applications involving movement, solid wire offers a
lower voltage drop over long runs due to its lower DC
resistance.

Why Solid Wire Has Less Resistance.

what percent do lawyers contribute to the GDP?

AI Overview

The legal profession contributes 1.7% to the global GDP,
or approximately $1.6 trillion annually, according to a 2024
study by the International Bar Association (IBA). This figure
includes revenues from legal services, associated tax
contributions, and economic benefits from support
industries. For the United States specifically, data
from the Federal Reserve Bank of St. Louis (FRED)
indicates the legal sector's contribution to U.S. GDP
was around 1.3% in the period leading up to 2023,
though this share can fluctuate.
___
Dead Internet Theory Lives: One Out of Three of You Is a Bot.

Microsoft’s AI Chief Says Machine Consciousness Is an ‘Illusion’.
 
____
Small Modular Reactors and the Big Questions of Cost & Waste.

Lead-cooled nuclear reactors promise safe, reliable energy
for merchant vessels
.
Try 1.


Unable to resie.

Right click on image resulted in 'view' option. Now it demands selection of 3D Paint, Notepad,
... or go to Microsoft store.

This is Windows 10 22H2.

why does wiindow 10 22h2 now not show view option when image
right clicked as of 9/10/25?

AI Overview

Recent updates to Windows 10 22H2, particularly those rolled
out in 2025, have caused changes and issues with the right-click
context menu, often removing or altering the default "View" or
"Preview" options for images. This is not an isolated problem, but
rather a known bug that Microsoft has addressed in recent months.

Known cause: The updated Photos app

The primary cause of this issue is a buggy update to the built-in
Microsoft Photos app. The bug affects the Photos shell extension,
which is responsible for adding the "Open" or "Preview" options
to the context menu. Instead of appearing correctly, the options
may disappear, move to an incorrect location in the menu,
or fail to work properly.

How to fix the issue

Here are several methods you can use to restore the correct
right-click functionality
:

Method 1: Reset the Photos app This is the most effective
and direct solution for many users.

Navigate to Settings > Apps > Apps & features. Find Microsoft
Photos in the list of apps.

Click on the Photos entry and select Advanced options.

Scroll down and click the Reset button. This will terminate
the app and reset it to its default settings, which often
resolves the context menu bu

Method 2: Use the legacy Photos app If resetting the
app doesn't work, switching to the older Photos Legacy
app is another solution.

Download the Photos Legacy app from the Microsoft
Store. Once installed, right-click an image file and select
Open with >

Choose another app. Choose Photos Legacy and check
the box that says "Always use this app to open..." your image files.


Method 3: Restart Windows E

his can help if the context menu cache is corrupted.

Open the Task Manager by pressing Ctrl + Shift + Esc.

In the "Processes" tab, find Windows Explorer.

Right-click
on Windows Explorer and select Restart.

Method 4: Perform a system restore

If the issue began immediately after a specific
Windows Update and other fixes don't work, you
can roll your system back to a previous restore point.

Type "Create a restore point" in the Start Menu
search bar and open the app. Click on System
Restore.... Follow the wizard to select a restore
point from before the problematic update was
installed.


Wednesday September 10 2025 07:25
____
FreeCAD Foray: From Brick To Shell.
____
what should a car traveler do if their cell phone dies on a trip?

AI Overview 19

Tips to Keep Your Phone Battery Charged While Traveling
... If your cell phone dies on a car trip, you should find a
power source to charge your device, borrow a phone to
call for assistance or contact a friend, use a public phone
or a payphone if available, or seek help at a gas station,
store, or rest stop. Prepare for future trips by packing a
portable power bank, car charger, and spare cables to
avoid this issue.

Immediate Actions:

how is published amp hours for a battery for a battery computed?

AI Overview

Published Ampere-hour (Ah) for a battery is a standardized
measure of its charge capacity, calculated by multiplying
the current it can supply (in Amperes) by the duration
(in hours) it can sustain that current under specific test
conditions. The formula is Ah = Current (A) × Time (h).
Manufacturers perform these tests under controlled
conditions, but the actual capacity can vary depending
on factors like temperature and discharge rate, as
described by the Peukert Effect for lead-acid batteries.

How the Calculation Works.

how is published amp hours for a 12v rechargeable
battery for a battery computed?

AI Overview

To compute the published amp-hour (Ah) rating
of a 12V rechargeable battery, manufacturers
measure the battery's total capacity under
controlled discharge conditions. The result is
a theoretical figure that represents how
much current (in amps) the battery can
deliver over a specific period (in hours).

Standard calculation and C-rating:


which solar electricity systems use both
blocking and bypass diodes?


AI Overview

Solar Panel Diodes: A Simple Guide to Bypass
& Blocking Types Both blocking and bypass
diodes are used in systems connecting solar
panels in series with batteries or for arrays with
multiple strings, especially in off-grid and hybrid
systems. Bypass diodes are integrated into
panels to prevent localized shading from
drastically reducing output, while blocking
diodes, often installed in series with panel
strings or in combiner boxes, prevent batteries
from discharging back through the panels
at night or reverse current from other
strings from damaging a shaded panel.

Bypass Diodes
...
Blocking Diodes
...
Systems Using Both
____
Intel Loses One Of Its NPU Driver Maintainers:
"Time To Let Someone Else Deal With The NPU Bugs"
.

AMD pushes back on Arm hype, says x86 processors
deliver on battery life and performance
.


who sells counterfeit esp32 computer systems?

AI Overview

You cannot get a definitive list of who sells counterfeit
ESP32 computer systems, as this is an illegal activity
conducted by unauthorized and often anonymous
sellers. However, the primary sources for these
counterfeit and knockoff components are specific
e-commerce platforms and unvetted online
marketplaces, particularly those based in China.

Common sources of counterfeit ESP32 modules

AliExpress and Alibaba:
....
Unvetted independent brokers:
...
Third-party sellers on other e-commerce sites:

How to report a potential counterfeit.

 
Try 1.

Unable to resize.

samsung one ui a23 now only produces heic files on
download to windows 10 22h3
.

AI Overview

A recent One UI update on your Samsung A23 likely
enabled the "High efficiency pictures" camera setting,
which automatically saves new photos in the HEIC format.
Your Windows 10 PC then downloads these files in their
original format, as Windows 10 version 22H3 is fully
compatible with HEIC files.

The issue is not with your computer converting files,
but with your phone now capturing them differently.

The easiest way to revert to JPEG is to disable the
high-efficiency setting on your Samsung phone.
__

There are several reasons you may be unable to deselect
HEIF on your Samsung phone's camera, including that
the option is grayed out or a related setting is overriding it.
Try the troubleshooting steps below to resolve the issue.



Tuesday September 9 2025 18:52
____
does microsoft unit test windows 11 software
modules before release?

did microsoft adopt a strategy of letter users find bugs
in their windows software?"

AI Overview

Yes, Microsoft uses extensive testing, including unit testing,
for its Windows 11 software modules before release. Unit
testing is a fundamental and critical part of its overall software
development lifecycle, but it is just one component of a
much larger quality assurance process.

The multi-layered testing process for Windows.

AI Overview

Yes, Microsoft actively and strategically uses users to find
bugs in their Windows software through official, structured
programs, rather than relying only on customer complaints.
The two primary initiatives for this are the Windows Insider
Program and the Microsoft Bug Bounty Program.

Windows Insider Program.

Historical context and industry shift

Historically, it was common for tech companies to
reactively fix bugs based on customer complaints.
However, in the early 2000s, Microsoft adopted its
"Trustworthy Computing" initiative to focus on making
its software more reliable and secure from the start.
The programs that involve users and external
researchers are a modern evolution of that strategy.
They recognize that a massive, diverse user base
can test software in ways internal teams never
could, and that paying ethical hackers is an
effective way to improve security.


Despite this rigorous testing, bugs still appear in
released versions of Windows due to several factors:

Vast complexity: Windows is a massive and incredibly complex
operating system that must function on billions of devices with
an almost limitless number of hardware and software configurations.

External dependencies: The immense number of drivers and
third-party applications can lead to conflicts that are impossible
to predict or test for in a controlled environment.

Rapid release cadence: Microsoft's shift to a "Windows as a service"
model with more frequent updates means that new features are
delivered faster than in the past, increasing the potential for new issues.


Is c++ a good career choice in view of learning and adopters
maintenance costs?

AI Overview

Learning C++ can be a good career choice, but requires significant
effort due to its steep learning curve and high maintenance costs
for adopters. The career value depends on weighing these
complexities against the benefits of speed, control, and high
demand in specific niche industries.

Learning costs
....
Adopter (company) maintenance costs
...
C++ is a good career choice for those who are:

Driven by performance: Candidates for whom writing
fast, efficient code is a primary motivation.

Patient with the learning curve: Individuals who are
prepared for a long-term commitment to mastering a
complex language.

Interested in niche fields: Aspiring developers who want to
work on projects close to the hardware, such
as embedded systems or game engines.

C++ may not be the best choice for those who prefer faster
development cycles and want to work primarily on web or
mobile applications, where other languages may have lower
learning and maintenance costs.

Salesforce hit with class action lawsuit over
massive data breach affecting Farmers
Insurance customers
.



KDE Plasma 6 On Wayland Can Work Fine On FreeBSD.
____
how do i rollback ui one 9/7/25 which caused a23 camera download issue?

AI Overview

While directly rolling back a system-wide One UI update is not
officially supported by Samsung and is difficult, you can address
the A23 camera download issue using official troubleshooting
methods. Downgrading the OS is a complex, risky process
that voids your warranty and will factory reset your phone.

For the camera download issue, start with these official, safer
solutions first
.
____
how does a digital voltmeter with inactivity
shut off sensor when to shutoff and how is it restarted?

AI Overview

A digital voltmeter's inactivity shut-off feature is typically
a timer-based function in the internal microprocessor
that automatically turns the device off after a set period
of no button presses or rotary dial changes. This
conserves battery power and is often labeled "
Auto Power Off" (APO).

How the auto-shutoff works.
____
ESP32 counterfeit devices technically exist,
but that's not the full stor
y.
____
how many limes of code are there in Windows 11?

AI Overview

There is no single, definitive "line of code" count for
Windows 11 because the number is constantly changing,
and different sources use varying definitions of what
constitutes a "line of code". However, estimates based
on the Windows NT codebase, which is the
foundation for modern Windows, suggest a figure in
the tens of millions, with the Windows 10 codebase
being cited as approximately 50 million lines.

Factors making a precise count difficult:

Constant Evolution: [updates?]

Nova Launcher’s founder and sole developer has left.
 
____
Nuclear startup Deep Fission goes public in a curious SPAC.

EIA says solar module report no longer worth it.
Try 1.


Unable to downlooad pic to Lenovo 477U laptop
starting 9/8/25




Monday September 8 2025 15:04
____
which compiler is most commonly used for esp32 projects?

AI Overview

The compiler most commonly used for ESP32 projects is the GNU
Compiler Collection (GCC). It is the standard toolchain that comes
with the Espressif IoT Development Framework (ESP-IDF), which is
the official development platform for the ESP32.

You will encounter GCC
indirectly through one of the following development environments:

Espressif IDF: Espressif's official framework uses a GCC-based
toolchain to compile C and C++ code. This method provides
the most control over the device and is standard for professional
developers.

PlatformIO: This popular plugin for Visual Studio Code uses
GCC under the hood to compile code for various platforms,
including the ESP32. It offers a more advanced and feature-rich
development experience than the Arduino IDE.

Arduino IDE: The "esp32" board package for the Arduino
IDE uses the same GCC toolchain to compile your code.
This is the most common and user-friendly entry point for
hobbyists and beginners.
____
The AI bubble fears are getting worse.
Wall Street doesn't want to talk about it
.
____
can windows 11 be certified?

AI Overview

Yes, Windows 11 can be certified, with different types of certifications
available including security certifications under the Common Criteria
program, hardware driver certifications through the Windows Hardware
Compatibility Program using the Hardware Lab Kit (HLK), and IT
professional certifications from Microsoft such as the Microsoft 365
Certified: Endpoint Administrator Associate. Software applications
can also be "certified" to work on Windows 11 by their respective
vendors, like Oracle and Esri. Types of Windows 11 CertificationsAI
Overview Yes, Windows 11 can be certified, with different types of
certifications available including security certifications under the
Common Criteria program, hardware driver certifications through
the Windows Hardware Compatibility Program using the Hardware
Lab Kit (HLK), and IT professional certifications from Microsoft such
as the Microsoft 365 Certified: Endpoint Administrator Associate.
Software applications can also be "certified" to work on Windows
11 by their respective vendors, like Oracle and Esri.

Types of Windows 11 Certifications

IT Professional Certifications

Microsoft Certifications:

Microsoft offers professional certifications
for IT professionals to validate their skills in managing Windows 11
environments, such as the Microsoft 365 Certified: Endpoint
Administrator Associate, which requires passing the MD-102
exam.

curity Certifications

Common Criteria: Windows 11 undergoes Common Criteria
certifications, which involve an independent evaluation of its
security functionality and assurance measures against specific
security Protection Profiles.

ardware Certifications

Windows Hardware Compatibility Program: Hardware
manufacturers use the Windows Hardware Lab Kit (HLK)
to test their drivers and systems for compatibility with
Windows 11. Successfully passing these tests allows a
product to be certified, indicating it should function
well with the operating system.

Software Application Certifications

Application Vendor Certifications: Independent software
vendors, such as Oracle and Esri, test and certify their
own applications to ensure they work correctly on
Windows 11.

does windows 11 contain all certified software modules?

AI Overview

No, Windows 11 does not contain all certified software
modules. Microsoft certifies its own software and
certain third-party components, but most applications
and drivers must be individually certified by their
respective developers to meet Windows 11's standards.
The idea is to maintain a secure and reliable
ecosystem, not to pre-install every possible certified
program.

=What is included
...
How third-party software is certified
...
What is not included


what is the most recent version of torbval linux?

AI Overview

The most recent mainline version of the Linux kernel is
Linux 6.17-rc5, a release candidate, with stable
versions like Linux 6.16.5 and others also available,
as of September 2025. You can find the latest
versions on the official Linux Kernel Archives
website.

Understanding the Versions.


does linus 6.17 contain certified software modules?

AI Overview

The upstream Linux kernel, including version 6.17,
does not contain certified software modules.
Certifications are applied to specific distributions of
Linux, such as Red Hat Enterprise Linux or SUSE
Linux Enterprise Server, and are not part of the
standard kernel from kernel.org.

Here's why certified modules aren't included in
the mainline Linux kernel
:
...
n summary, if you need a Linux system with certified
software modules, you should use a supported
enterprise distribution like RHEL or SLES, rather
than relying on the upstream kernel version number.

Linux 6.18 To Introduce Support For Next-Gen
eUSB2V2 Web Cameras
.



Linux 6.17-rc5 release is on track, but Torvalds calls out community [cult/]on wasteful habits
.

do Ubuntu versions contain certified modules?

AI Overview

No, standard Ubuntu versions do not inherently
contain FIPS-certified modules; these modules
are provided through the Ubuntu Pro subscription,
which enables FIPS 140-2 or 140-3 validation for
the kernel and other cryptographic libraries. By default,
Ubuntu installs standard, non-certified packages;
however, users with an active Ubuntu Pro
subscription can enable the FIPS-certified modules
to meet regulatory and compliance requirements
for sensitive workloads.

How to get FIPS certified modules

FIPS (Federal Information Processing Standards):
...
In summary If you need FIPS certified modules
for your Ubuntu system, you must have an
Ubuntu Pro subscription and use the pro client
to install and enable the validated packages.
___
You Didn't Get Phished — You Onboarded the Attacker.

Delayed Security Patches for AOSP (Android Open
Source Project) (twitter.com/grapheneos)
.

Microsoft, Linode, warn of cloud latency spikes due to
Middle East submarine cable problems
.
 
Try 6.


Sunday September 7 2025 15:35
___
Godfather of AI’ says the technology will create
massive unemployment and send profits soaring
— ‘that is the capitalist system’
.

what is the name of Alexander the Great's horse?

AI Overview

Alexander the Great's horse was named Bucephalus.
The name is derived from Greek words for "ox-head"
and is believed to refer to a brand or scar on the horse's
thigh that resembled an ox's head. Bucephalus was a
famous black horse with a distinctive white star on
its forehead.

Key Facts about Bucephalus:

can a 1x programmer and manager using AI do as
good as a team of 10 programmers/managers?

AI Overview

A single programmer and manager using AI cannot reliably perform
as well as a team of 10 experienced professionals. While AI can
be a powerful force multiplier, boosting individual productivity
significantly, it lacks the human creativity, strategic thinking,
and collaborative skills that a high-performing team provides.

Where AI provides a significant boost.

The future is augmentation, not replacement Rather than
replacing a team, AI enhances the capabilities of individual
developers, allowing them to focus on higher-value, more
creative work. The most successful organizations will leverage
AI to amplify the output of their human teams, not reduce
their headcount. The 1x developer with AI is an
empowered contributor, but the team of 10 still has the
advantage of collective expertise, vision, and scale.

The New Math of Quantum Cryptography.


An Electrician's Warning: Don't Plug These 7
Dangerous Devices Into Extension Cords
.

Scott Baker’s Magnetic Bubble Memory Mega-Post.



what is the best procedure for torqing 1/16 inch wire connector saddle using 5.5mm open end wrench?

AI Overview

You cannot properly or safely torque a 1/16 inch wire connector saddle using a standard 5.5mm
open-end wrench. A torque wrench is the only tool that can apply the specific, consistent
pressure required for a secure connection.

Why an open-end wrench is not suitable.

AI Overview

Attempting to "torque" a 1/16 inch wire connected to a 10 AWG solid copper
wire with a 5.5mm wrench is based on a fundamental misunderstanding
of electrical connections and is an unsafe and incorrect procedure. There
is no scenario where this method should be used. A 1/16 inch wire is
roughly equivalent to 16 AWG wire.

Here is a breakdown of why this is incorrect and the proper, safe procedure
to follow instead:

Use cable clamp to attach 10 AWG to battery terminals work



why is it a good idea to keep a 'dead 12 volt rechargeable battery?.

AI Overview

A "dead" 12-volt rechargeable lead-acid battery is a valuable item
to keep for several reasons: its residual power can be used for
low-drain tasks, it may be possible to recondition, and it has
significant scrap value for recycling. Keeping it also prevents
environmental damage from toxic materials like lead and sulfuric acid.

[Dud Goggke AI overlook ... for tessting battery chargers.

Bad charger design may cause a fire?]

Arduino causing esp32 issues?



for what is a .ino file in arduino ide?

AI Overview

A .ino file in the Arduino IDE is a source code file, also called a "sketch,"
that contains a program written in a hybrid C/C++ language with
Arduino-specific functions. These files are the building blocks of Arduino
projects, defining the behavior of an Arduino board by providing commands
to control hardware. The Arduino IDE uses the .ino extension to identify these
files as Arduino sketches, which are then compiled into machine code for
the microcontroller to execute.

What's inside a .ino file?.





 
____
Japan shocks the world — Solar panels
as strong as 20 nuclear reactors unveiled
.
Try 2

Saturday September 6 2025 14:26
____

how do i install forth on a ESP32-DevKitC-32E Development Board?.

AI Overview

To install Forth on an ESP32-DevKitC-32E, the most straightforward
method is to use ESP32forth with the Arduino IDE. ESP32forth is a
variant of eForth specifically designed for the ESP32 chip. It allows
you to use Forth's interactive, command-line interface over a serial
port, such as the one provided by your USB connection.

how do i download ESP32forth-7.0.7.3.zip,
https://eforth.storage.googleapis.com/releases/ESP32forth-7.0.7.3.zip

___
Metric wrenched attived from Amazon 9/5/25.



what is the advantage of using a 5 mm open end wrench over a 7/32 inch wrench
for tightening 1/16 cable clamp?

AI Overview

For tightening a 1/16 cable clamp, a 5.5 mm wrench is a better fit than a
7/32 inch wrench, as it provides less clearance and a tighter grip. Using
the closer-fitting tool minimizes the risk of rounding the corners of the
fastener, which can strip and damage the nut.

Here is a breakdown of the differences:

____
Radxa CM4 – A Raspberry Pi CM4 replacement with
Rockchip RK3576 Edge AI SoC, up to 16GB RAM
.
____
Anthropic Agrees to Pay Authors at Least
$1.5 Billion in AI Copyright Settlement
.

Sam Altman Says He's Suddenly Worried Dead
Internet Theory Is Coming True
.

Linus Torvalds Grows Frustrated Seeing
"Garbage" With "Link: " Tags In Git Commits
.

New x86 Hardware Support & Device
Quirks Merged Ahead Of Linux 6.17-rc5
.

is use of c++ in safety-critical apps risky?

AI Overview

The use of C++ in safety-critical applications carries
inherent risks primarily due to its memory-unsafe
nature and the potential for undefined or unspecified
behavior.

Reasons for Risk:

Manual Memory Management: C++ requires
developers to manually manage memory, which
can lead to common errors like buffer overflows,
use-after-free vulnerabilities, and memory leaks.
These can be exploited to compromise system i
ntegrity or stability.

Undefined and Unspecified Behavior: The C++
standard contains numerous instances of un
defined and unspecified behavior. This means that
certain code constructs can behave differently
depending on the compiler, operating system, or
hardware, making it difficult to ensure consistent
and predictable execution in safety-critical contexts.

Complexity of Features: While powerful, features
like multiple inheritance and complex template
metaprogramming can increase code complexity,
potentially introducing subtle bugs that are hard
to detect and debug.

Mitigation Strategies: Despite these risks, C++
is widely used in safety-critical domains like
automotive, aerospace, and medical devices.
This is achieved through rigorous mitigation strategies:

Strict Coding Guidelines and Standards: Adherence
to standards like MISRA C++ or JSF C++ helps to
subset the language, prohibiting dangerous features
and enforcing best practices to minimize the risk of
errors.

Static Analysis Tools: Utilizing static code analyzers
can help identify potential memory safety issues,
undefined behavior, and other coding standard violations
early in the development cycle.

Thorough Testing and Verification: Extensive testing,
including unit testing, integration testing, and
system-level testing, is crucial to ensure the software
behaves as expected under various condition

Formal Methods: In highly critical systems, formal
methods may be employed to mathematically
verify the cor

Use of Safer Constructs: Preferring safer C++
constructs like smart pointers over raw pointers,
using std::vector instead of raw arrays, and avoiding
manual memory allocation where possible can
significantly reduce memory-related risks.

In conclusion, while C++ presents risks in
safety-critical applications due to its design, these
risks can be managed and mitigated through
disciplined development practices, strict adherence
to coding standards, and comprehensive
verification processes.



who is dr c-h ting and what are his contributions
to nanocomputing?

AI Overview

Who is C.H. Ting?

Chen-Hanson Ting, who passed away in 2022,
was an American software engineer, teacher,
and prolific contributor to the Forth programming
community. He was a well-respected figure and a
mentor to many in the Forth Interest Group (FIG).

Ting spent his career in research and software
engineering, including positions at:

Lockheed Missile and Space Company

Maxtor Corporation

Applied Biosystems


Contributions to computing Although not related to
nanocomputing, his contributions to the field of
computing are significant and include:

eForth: He was known for designing and
developing the eForth computer language,
a version of Forth for educational purposes.
He implemented it on multiple microprocessors,
including Arduino, MSP430, and ARM.

FPGA processors: He authored several
Field-Programmable Gate Array (FPGA)-based
microprocessors, including the eP8, eP16,
eP24, and eP32, using the hardware
description language VHDL.

Mentor and leader: He served as Vice President
of the Forth Interest Group and was a
dedicated mentor and leader to the
worldwide Forth community.

Prolific author: He authored numerous
books and tutorials that documented his
work and programming philosophy, which
he made available through his company
Offete Enterprises.

Lifelong learner: His enthusiasm for
learning and teaching was a hallmark
of his career, and he regularly shared
his knowledge and inventions.
 ____
House passes bill to up Montana coal mining
on BLM land
.
Try 2.

Friday September 5 2025 18:28

____
Microsoft Goes Back to BASIC, Open-Sources
Bill Gates’ Code Simpler times
.
.____


AI Overview

For 100W panels under the same solar conditions, the back of
the less-efficient polycrystalline panel will likely register a higher
temperature than the monocrystalline one. This is because a
higher percentage of the absorbed solar energy is converted
into heat rather than electricity.

Here is a breakdown of why this occurs:
_____

Vevor wind turbine video 8/26/25 video.

No visual damage to blades seen ... but heard several popping noises.

Blade peices of #2, 3, 4 found 8/27/25
_____
freertos install on espressif attempted on Asus ryzen 7 5800HS running Windows 11.

:)







Not appearing the Arduino sketch librarry folder. :(

AI Overview

ESP-IDF (IoT Development Framework) is Espressif's official and open-source
software framework for developing applications on their ESP32, ESP32-S, and
ESP32-C series microcontrollers. It provides a comprehensive Software
Development Kit (SDK) with libraries, tools, and documentation for building
network-connected devices, including smart home products, industrial devices,
and more. Written in C/C++, ESP-IDF enables developers to create sophisticated,
feature-rich applications by simplifying the process of integrating wireless
communication (Wi-Fi, Bluetooth) and other system functionalities.

Key Features and Capabilities:

____
ESP32-H2-Zero mini Zigbee, Thread, and
BLE USB-C board is based on ESP32-H2 RISC-V SoC
.



Microsoft 365 Personal is now free for US college students for a year.
____
Unrestrained’ Chinese Cyberattackers May
Have Stolen Data From Almost Every American
.

New Mexico places $315 million bet on quantum tech.

Oklo Plans $1.7 Billion Center to Convert Nuclear Waste to Fuel.
 
Try 1.

Thursday September 4 2025 11:49
____

how do i install freertos on my ESP32-DevKitC-32E
using windows 11 and arduino ide?

AI Overview

Installing FreeRTOS on an ESP32-DevKitC-32E using
Windows 11 and the Arduino IDE primarily involves
setting up the Arduino IDE to support ESP32 boards, as
FreeRTOS is inherently integrated within the ESP-IDF
framework that the Arduino core for ESP32 uses.

Steps for Installation:
____

Amazon perks up as Anthropic partnership
drives data center buildout, Trainium ramp
.

___
Arduino Ubuntu IDE abandoned. Nothing applered to work to install freertos.

Windows 11 on $119 Asus N^)) 4.64 GB atttempts to installl freertos on a
Arduino Nano 33
Arm Cortex-M0+ microcontrollerArduio IDE Windows 11 interface different than Ubutntu.



:)

Linux Hardware Enablement Leader Hans de Goede Leaving Red Hat.

Linux 6.17 With EXT4 Showing Some Nice Performance Improvements.

what languages are used to implement llvm?

AI Overview

The LLVM compiler infrastructure project is primarily implemented
using C++. While the core of LLVM is C++, there are also instances
where C code is present, often due to specific environment constraints,
historical reasons, or the inclusion of third-party code. For automation,
build systems, and utility scripts within the LLVM project, Python
is the preferred and widely used language.

____
Salesforce's weak quarterly revenue
forecast signals lagging AI monetization
.

why does salesforce accuse agentic ai
for 4.000 employee layoffs?

AI Overview

Salesforce did not accuse agentic AI for 4,000 employee layoffs,
but rather cited the technology as the reason for making the
customer support roles redundant. In September 2025,
CEO Marc Benioff stated that the company had reduced its
customer support workforce from 9,000 to 5,000
because its new AI agents, called "Agentforce," could handle
a significant portion of customer inquiries.

How Agentforce impacted the customer support workforce.
...
Reduced headcount:
...

Reduced headcount:
...
Role reallocation:
...
Lead generation:
The broader context of AI and layoffs

Salesforce's announcement is one of several instances
in the tech industry where AI is being tied to workforce
reductions. Other companies have also restructured
their workforce in response to advancements in AI:

How agentic AI works

Agentic AI systems, like Salesforce's Agentforce, are
an advanced form of AI that can act autonomously
to achieve complex goals with minimal human oversight.
They differ from basic generative AI by their ability to:

Reason and plan:
...
Act independently:
...
Learn and adapt:

Oracle lays off thousands—or more—globally
amid rapid AI shifts
.

More tech layoffs hit Seattle area this week.

ConocoPhillips Is Latest U.S. Oil Producer to
Announce Major Layoffs
.

Unemployed graduates are flocking to this
business degree to stand out in the current
job market. Unlike most MBAs it requires
zero work experience
.
____
The Case For Pascal, 55 Years On.

who maintains the pascal language?

AI Overview

There isn't a single entity that "maintains" the original
Pascal language, which is now a historical standard.
However, the Free Pascal project actively maintains
and develops a widely used, modern open-source
implementation of Pascal and its Object Pascal dialect,
while Embarcadero Technologies maintains the
commercial Delphi product, which also uses a
dialect of Object Pascal.

The Free Pascal Project
...
Embarcadero Technologies
...
Niklaus Wirth






Restoring A Vintage Intel Prompt 80 8080 Microcomputer Trainer.




 
____
Can offshore wind survive the Trump administration?.

The Renewable Energy Smackdown Is Failing, Bigly.

These Blades Are Bigger Than The Eiffel Tower”:
China Unveils World’s Most Powerful Offshore
Wind Turbine At 26 Megawatts
.

US gas power capacity set for big jump as
renewables growth slows
.
Try 2.

Wednesday September 3 2025 19:34
____
Exclusive: ConocoPhillips says it will cut workforce
by 20-25%, shares fall
.
____
are linux distro buggy and largely maintained by volunteers?.

AI Overview

That characterization of Linux distributions is a significant oversimplification.
While some Linux distributions are maintained almost entirely by
volunteers and can have bugs, many popular distributions are
professionally developed and commercially supported. The stability
and maintenance model largely depend on the specific distribution.

Maintenance models vary.
...

Conclusion
The perception of Linux distros as universally "buggy" and maintained
by volunteers is inaccurate. The stability and maintenance model
vary widely depending on the distribution. When choosing a distro,
the crucial difference lies between those backed by major
corporations, which offer robust professional support, and
smaller, community-run projects that rely on voluntary efforts
and are more suited for advanced users.

____
PJM stakeholders overwhelmingly pan
proposal for data center interconnection
.

Confirmed: America is in a serious jobs slump.

Why I Believe We're Entering The Biggest
Market Rotation In Decades
.



AI Overview

People stop using Office 365 due to a combination of issues including:
the mandatory cloud-based model requiring internet access, a lack of
user-friendliness and unintuitive interfaces for core apps like Outlook and
Teams, perceived high costs for underutilized features, frustration with
frequent and sometimes confusing interface changes, insufficient privacy,
concerns about data collection, bugs and performance issues, and the
need to frequently update to stay supported.

Common Reasons for Discontinuing Office 365:
...
Alternatives to Consider:

LibreOffice:

Google Workspace:

Apache OpenOffice: [not listed by Google AI.]



Salesforce CEO Says Company Axed 4,000 Support Jobs Because of Agentic AI.

AI Overview

The relationship between "Agentic" and "Claude" is that Anthropic's Claude is a
large language model (LLM) that powers Agentic systems and tools offered by
the company. Agentic AI is a type of system with a high degree of autonomy,
and Anthropic has released several products and features based on its Claude
models that demonstrate and enable this capability.

Key components of the relationship.

Claude as the LLM backbone: Anthropic's family of Claude models, including
Opus, Sonnet, and Haiku, serve as the reasoning engine for agentic tasks.
Agentic systems rely on an LLM to interpret goals, formulate multi-step
plans, and generate actions to accomplish complex tasks.
...

Anthropic is now valued at $183 billion.

Who is winning in AI—China or America?.



Nvidia and Marvell shares fell after earnings.
Will Broadcom’s stock fare better?
.

4 Defiant Broadcom calls for tech to go back
where it belongs: On-premises
.

Nvidia Stock to Crash to $100? This Bear Thinks So.

i is windows 11 a legal and maintenance financial
liability for microsoft?

AI Overview

Windows 11 represents a significant financial and
maintenance obligation for Microsoft, but its legal
liability to consumers is severely limited by its licensing
agreements. For enterprise customers, liability is
governed by specific contracts that may differ.

Financial and maintenance liability

Windows 11 is a long-term financial and maintenance
liability because Microsoft must
:

Fund ongoing development:
...
Release regular security patches:
...
...
Provide technical support:
...
Plan for end-of-life:

Legal liability

For the average consumer, Microsoft's legal liability is
heavily restricted by its End User License Agreement
(EULA) and other service terms.

Standard EULA clauses include:

"AS IS" licensing:
...
Limited damages:
...
Class-action waivers:

Exceptions to liability limits:

ntentional misconduct:
...
Regional laws:
...
Gross negligence:
Enterprise vs. consumer liability

Legal liability for enterprise customers can
differ from that of a consumer:

Enterprise agreements:
...
hird-party providers:

The impact of the Salesloft Drift breach on
Cloudflare and our customers
.

Palo Alto Networks, Zscaler customers impacted
by supply chain attacks
.

Amazon disrupts Russian APT29 hackers targeting
Microsoft 365
.

Zscaler, Palo Alto Networks Breached via Salesloft Drift.

is failure to use certified software modules in safety-critical
and business software gross negligence?

AI Overview

A failure to use certified software modules in
safety-critical and business software could be
considered gross negligence, but this is a
fact-specific determination made on a case-by-case
basis. Whether the failure meets the legal standard
for gross negligence depends on several factors,
including the context of the software, industry
standards, and the foreseeability of the
potential harm.

Key factors in determining gross negligence
...
Summary

The failure to use certified modules is not automatically
gross negligence, but it is a strong indicator of it in
safety-critical contexts where the standard of care is
exceptionally high. In less-critical business software, a
similar failure may amount to regular negligence or a
breach of contract, rather than the extreme recklessness
required for a gross negligence finding. Ultimately, the legal
determination hinges on the specific circumstances of the
failure, the foreseeability of the harm, and whether the
developer recklessly disregarded a clear safety protocol.

____
why do prisions use electronic door locks?

AI Overview

Jail Door Locks | Detention Swinging Door Locks Prisons
use electronic door locks for heightened security through
centralized control, reduced human error, and enhanced
safety features like remote operation and automatic
logging of access events. These tamper-resistant systems
allow staff to secure multiple areas quickly and efficiently,
preventing inmate breakouts, restricting access to
controlled zones, and minimizing the potential for violence
and tampering.

Key Reasons for Electronic Locks in Prisons.
____
LLVM Clang 21 Compiler Helping Squeeze More
Performance On 5th Gen AMD EPYC "Turin"
.
 
____
Tennessee Valley Authority signs
agreement for 6 GW of small nuclear
.

NuScale Power Partners with ENTRA1 for
SMR Projects
.

White House Orders Agencies to Escalate
Fight Against Offshore Wind
.
Try 2.

Tuesday September 2 2025 18:13
____
must a true secure app be accountable
for every bit in a computer memory?

AI Overview

No, a secure application is not accountable for every bit
in a computer's memory. Modern computer security
is built on a layered model where the operating
system (OS) and hardware handle broad
memory protection, and secure applications
are responsible for protecting the data within
their own, isolated memory space.

Here's a breakdown of the roles and
responsibilities in memory security:

The operating system's role (isolating memory)
...
In conclusion, holding an application responsible
for every bit of memory is an impossible standard.
The correct measure of a secure app is its ability
to protect its data within the memory allocated
to it by a trusted OS, leveraging the system's
memory protection features and managing

ts data responsibly.

___
The Sense And Nonsense Of Virtual Power Plants.
____

did charles moore make a far greater contribution to
bug/malware-free software that ritchie and kernighan?

AI Overview

Evaluating Charles H. Moore against Dennis Ritchie and
Brian Kernighan regarding contributions to bug/malware-free
software is not a straightforward comparison, as their work
followed fundamentally different philosophies and had very
different scales of influence. Ritchie and Kernighan's work
on C and Unix laid the foundation for the vast majority of
modern software, including the operating systems that
run the internet. Moore's work on the Forth language
focused on creating highly efficient, simple, and extensible
code for niche applications like embedded systems and
microprocessors.

The premise that one made a "far greater contribution"
is subjective and dependent on the criteria for evaluation.

Comparative contributions to software quality

...

Conclusion

While Moore's Forth language provides a foundation
for writing exceptionally reliable, bug-resistant software
within specific domains, his overall contribution to
software development is not on the same scale
as Ritchie and Kernighan's.

Moore contributed a philosophy and toolset for
developing highly reliable software in specific,
high-stakes contexts. However, the scope of
this contribution is limited compared to the
pervasive nature of C and Unix.

itchie and Kernighan created the architecture
upon which the vast majority of modern software
is built. While C's low-level nature has introduced
countless vulnerabilities, the sheer volume and i
nfluence of the software built upon it make its i
mpact vastly larger, for both good and ill.

software" is "far greater" would be a
To suggest Moore's contribution to "bug/malware-free
misconception, as it minimizes the foundational
nature of C and Unix on which the modern
computing world was built. A more accurate
statement is that Moore's philosophy leads to
more inherently secure and robust code within its
application niche, while the C language's power
and flexibility, though more prone to bugs, have
had a far broader and more transformative
impact on computing as a whole.
____
Microsoft readies Windows 11 25H2 while
Windows 10 circles the drain
.

Alibaba's Hong Kong shares rally 19% as
AI boom fuels cloud business growth
.
____
does Arduino Nano 33 run freertos?


AI Overview

No, the standard Arduino Nano 33 boards do not run FreeRTOS; :(
the Nano 33 IoT uses the NINA-W102 firmware, which is based
on Espressif's IoT Development Framework, while the Nano 33 BLE
is based on Mbed OS. FreeRTOS is an operating system and
scheduler that can be integrated with the Arduino framework on
certain boards, but it is not the default RTOS for the
Nano 33 family.

Why the Arduino Nano 33 doesn't run FreeRTOS by default:


does Arduino Nano 33 run a forth?

AI Overview

Yes, you can run a Forth interpreter on an Arduino Nano 33,
although it is not the default programming language. The
process is not as straightforward as writing standard Arduino
sketches and requires uploading a specialized Forth
firmware to the board.

The standard Arduino development environment uses
C++ and its own bootloader. To run Forth, you must
replace the default firmware with one that includes a
Forth interpreter.

A notable Forth project for the Arduino Nano family
A popular option for running Forth on the Nano is
nanoFORTH, an interactive, multi-tasking Forth interpreter.

Here are the key features of nanoFORTH:


what doses are available for the Arduino Nano 33?

AI Overview

The Arduino Nano 33 line of boards can be programmed
to run on several different operating systems, depending
on the specific model. The most common options are
Arm Mbed OS, FreeRTOS, and Zephyr, all of which are
Real-Time Operating Systems (RTOS) designed for
embedded devices. Standard Arduino sketches can
also be used without an OS. Arm Mbed OS.

Availability: The Arduino Nano 33 BLE and BLE Sense
boards are built upon Arm Mbed OS.

Key features: Mbed OS is a free, open-source embedded
operating system that was adopted by the official Arduino core
for the Nano 33 BLE. It provides real-time features and
supports complex applications, including a full Bluetooth
stack for the BLE board.

FreeRTOS Availability: :)

FreeRTOS is a popular RTOS that can be implemented on
the Arduino Nano 33 IoT through a special library.

how do i install and flash freertos on the arduino nano 33
using windows 11?

AI Overview

For the Arduino Nano 33 BLE, you do not install FreeRTOS
as a separate library; it is already integrated into the board's
core because the board runs on Arm® Mbed™ OS. This means
you can call FreeRTOS functions directly in your sketch without any
special installation. The Arduino framework handles the setup
automatically, running setup() and loop() inside their own
FreeRTOS tasks.

Prerequisites.

Select your board: Go to Tools > Board and select Arduino
Nano 33 BLE.

Select the port: Connect your Nano 33 BLE to your computer
via USB. Go to Tools > Port and select the correct COM port
for your board.

Upload the sketch: Click the Upload button (the right-arrow icon)
in the Arduino IDE. The IDE will compile your sketch and flash it
to the board.

Step 3: Verify the installation

Visual Confirmation: After the upload is complete, the built-in LED
on your Nano 33 BLE should begin to blink with a 1-second interval,
confirming that your FreeRTOS task is running as intended.

Serial Monitor: You can add Serial.begin(9600); to your setup() and
Serial.println("Task is running!"); to your myBlinkTask to see output
on the Serial Monitor. Open the Serial Monitor (Tools > Serial Monitor)
to confirm the task is executing.


AI Overview

There are no public, beginner-friendly instructions for installing
and flashing NanoForth on an Arduino Nano 33 using
Windows 11. NanoForth requires specialized tools and
expertise to flash the board's bootloader and firmware,
which is typically only performed by advanced users with
external hardware.
____
Palo Alto Networks data breach exposes
customer info, support cases
.


how to i install flash forth on a Nano V3.0, Nano
Board ATmega328P?

AI Overview

Installing FlashForth on an Arduino Nano V3.0 with an
ATmega328P requires using a dedicated In-System
Programmer (ISP) to overwrite the existing Arduino
bootloader with the FlashForth image. You cannot use
the standard Arduino IDE upload process for this.

What you will need.

A Nano V3.0 ATmega328P (the target board).


how to i install freertos on a nano v3.0, nano board
atmega328p?

AI Overview

To install FreeRTOS on an Arduino Nano (ATmega328P),
download the Arduino IDE, then use the Library Manager
to search for and install the Arduino_FreeRTOS library by
Richard Barry. After installation, include the library in your
sketch using Sketch > Include Library to start using
FreeRTOS in your Arduino projects.

Here's a step-by-step guide:

1. Install the Arduino IDE: If you don't have it already,
download and install the Arduino IDE from the official
Arduino website.

2. Open the Library Manager: In the Arduino IDE, click
on the Tools menu. Select Manage Libraries... from the
dropdown menu. Alternatively, you can click on the
Library Manager icon in the toolbar.

3. Search for the FreeRTOS Library: In the search
bar of the Library Manager, type FreeRTOS. Look for
the library named Arduino_FreeRTOS or the one by
Richard Barry.

4. Install the Library: Select the desired FreeRTOS
library from the search results and click the Install button.

5. Include the Library in Your Sketch: Create a new
sketch or open an existing one. Go to Sketch > Include
Library to make sure the newly installed FreeRTOS
library is listed.

6. Begin Using FreeRTOS:
[unable to cooopy and paste 6.]


__
____
The Venor wind turbine blades appeaar to be undamaged 8/26/25.



Vevor blade damage caused at night durig or after 8/26/25?
____
Hut 8 announces four data center projects
totaling 1.5GW across US
.
____
Big tech has transformed the classroom – and
parents are right to be worried Velislava Hillman
.
____
A former Microsoft worker has been job-hunting
for 9 months. He says it feels like companies are
'looking for Superman
.
'

 
____
It happened so fast’: the shocking
reality of indoor heat deaths in Arizona
.

California’s offshore wind plans are terminally ill.

Economy & Environment Government & Politics With
gas crunch looming, Alaska utilities won’t get
big wind before tax credits expire
.

MIT professor makes startling prediction about
the future of US energy prices — here's what
you need to know
.

PJM faces possible long-term ‘energy
emergency’: DOE
.
Try 6.


Monday September 1 2025 18:45
____

NASA Seeks Volunteers To Track Artemis II Mission.

is unix a cult?

AI Overview

The claim that Unix is a cult is a provocative exaggeration
used to describe the deeply committed, and sometimes
dogmatic, community that has formed around the Unix
philosophy. While it is not a cult in the traditional or harmful
sense, some aspects of Unix culture display cult-like
characteristics.

What is the Unix philosophy?.

why did linux destroy unix?

AI Overview

Linux did not "destroy" Unix in the sense of making it
completely obsolete, but it significantly impacted the
commercial Unix market and became the dominant
force in many areas where Unix previously reigned.
This shift can be attributed to several key factors:

Cost and Licensing:
...
Hardware Independence and Openness:
...
Community and Development Model:
...
Flexibility and Customization:
...
Market Dynamics and the Rise of x86:

While commercial Unix systems like AIX, HP-UX, and
Solaris still exist and are used in specific enterprise
environments, Linux's advantages in cost, openness,
and community-driven development led to its
ascendancy and widespread adoption, effectively
reshaping the landscape of the operating
system market.

what is a cult?

AI Overview

A cult is a group characterized by excessive, unquestioning
devotion to a charismatic leader or specific ideology, often
involving unusual or extreme beliefs and practices. These
groups frequently use psychological manipulation and
social pressure to control members, demanding
absolute loyalty and isolating them from the outside
world. While the term can refer to ancient religious
practices with negative connotations in popular usage,
in contemporary terms, it is often pejorative and
applied to groups engaging in questionable activities
or exhibiting harmful patterns of control and exploitation.

Key Characteristics.

___
Unix Co-Creator Brian Kernighan on Rust,
Distros and NixOS
.

is unix a mainframe mentality copier?

AI Overview

No, Unix is not a "mainframe mentality copier"; in fact,
its design principles were a reaction against the
complexity and monolithic approach of mainframe
operating systems like Multics. The two have
fundamentally different origins, philosophies, and
use cases, though they have influenced each
other over time.

Origins and foundational philosophies.

What to do with C++ modules? (nibblestew.blogspot.com).
New Ubuntu Snapdragon X1E Concept ISO Published -
Switches To Linux 6.17 Kernel
.
____
have large capacity us storage devices dimenished
the need for cloud storage?

AI Overview

No, large-capacity local storage devices have not diminished
the need for cloud storage; rather, they serve different, often
complementary purposes. The rise of both has been driven
by the exponential growth of data, with many individuals
and businesses using a hybrid approach that combines both
local and cloud solutions.

Key differences between local and cloud storage.

why is Microsoft spending money on e C#, F#, .NET?

AI Overview

Microsoft continues to invest heavily in C#, F#,
and .NET because they are foundational to its
broader strategy of building a robust developer
ecosystem and driving revenue through its
Azure cloud platform. Rather than profiting directly
from the languages, Microsoft generates
revenue from the services and products used
to run the applications built with them,
primarily Azure.

Key reasons for continued investment

1. Fostering the Azure cloud ecosystem
...
2. Maintaining a competitive and relevant platform
...
3. Engaging the developer community
...
4. Supporting the enterprise market
...
nvestment strategies for each language
____
More than 50% of Nvidia’s data center revenue comes
from three customers — $21.9 billion in sales
recorded from the unnamed companies
.

Data centers will cause higher electricity prices,
study finds
.

How the AI data center boom is breathing
new life into dirty, old coal plants
.

what percentage of the us population uses ai?

AI Overview

Recent polling indicates that at least half of the US population
has used AI, with adoption rates varying dramatically
depending on the specific application. Many Americans use
AI regularly, often without realizing it.

Key findings from 2024–2025 polls

Nearly all Americans use AI products unknowingly. A 2025
Gallup and Telescope survey found that while only 36%
of Americans believe they used an AI product in the last week,
99% had used at least one of six common AI-enabled products.
These products include: Virtual assistants (like Alexa and Siri)

Virtual assistants (like Alexa and Siri)

Streaming services

Navigation apps

Social media platforms

Online shopping apps

Generative AI usage is significant but lower. Usage statistics
for generative AI tools like ChatGPT are lower than for
embedded AI. A May 2025 Pew Research Center survey found
that one-third of US adults have used an AI chatbot. An
earlier April 2024 Adobe survey reported that 53% of
Americans have used generative AI.Weather apps

Daily use is less common. According to a July 2025
AmeriSpeak report, only 14% of Americans use AI
daily for personal tasks.

Factors influencing AI adoption

Generational divide: Adoption rates are highest among
younger adults, with usage dropping significantly with age.

An Associated Press-NORC poll found 74% of adults under
30 use AI for information gathering at least occasionally,
versus just 20% of those 60 and older.

An October 2024 Gallup poll found 46% of adults aged
18 to 29 use AI weekly, compared to only 23% of
adults 65 and older.

Workplace adoption:

In the workplace, AI use is concentrated in certain
sectors and roles.

A June 2025 Gallup report found that AI use has nearly
doubled in the last two years, but primarily for white-collar
workers.

By 2025, 27% of white-collar employees report frequent
AI use, while use among production and front-line workers
remains low at 9%.

Gender and education: Men and individuals with higher
education levels are more likely to report using AI and
feel more knowledgeable about it.

The takeaway

The percentage of the US population using AI is
essentially 100% when considering common embedded
AI like spam filters, streaming recommendations, and
navigation apps. However, the percentage actively
using or even aware they are using more advanced,
explicit AI like chatbots is significantly lower,
representing just over half of the population.

Officials break ground on massive facility that will
transform power grid: 'Much more than a plan;
it is a reality'
.

How Meta acheives 120kW a rack in 20kW
air-cooled data centers
.
____
U.S. And Allies Declare Salt Typhoon Hack A
National Defense Crisis
.

Azure budget alerts go berserk after
Microsoft account migration misfire
.

NASA Seeks Volunteers To Track Artemis II Mission.

 

____

The Venor blades may have experienced a structual failure
at very high speeds. :(



Blade number 1 identified.



Blades 1 and 5 okat?

2, 3, and 4 damaged?



Vevor charges battery ... does not drive load.



Solar can simultaneous charge battery and drive load. :)

The Trump Administration’s Campaign Against
Renewable Wind Reaches a New Phase
.

How Batteries Are Reshaping the Global Energy System.
Try 2.

Sunday August 31 2025 19:19
____
AI Is Golden or ‘Not Rational’: Wall Street’s Battle With
Which Road to Take
.

Electricity Is Becoming Unbelievably Expensive as
the US Power Grid Decays Into Ruin
.

A comp sci degree is no longer a job offer magnet.
____
3 stunning ESP32 E Ink display projects you can
make this weekend
.

____
Bcachefs Goes to "Externally Maintained" (lwn.net).
____
what is the tensile strength of a 10 AWG wire mc4 connector?

AI Overview

The tensile strength of an MC4 connector with a 10 AWG
wire is defined by two metrics: the force required to
separate a mated pair of connectors and the strength of
the cable-to-contact crimp.

Locking retaining force (mated connectors) The locking
force is the amount of pull required to separate a male
and female MC4 connector pair.

A rated MC4 connector has a typical retention force
of 50–100 Newtons (N).
...
Standards for testing show a cable pull-out force
of at least 160 N for a quality connector.

...
For the most accurate specification, you should
always consult the datasheet provided by the
specific manufacturer of your MC4 connector.

To right ot wrenches.

1/16 inch wire clamp joining two 10 AWG wires end-to-end.

1/8 inch wire clamp joining two 10 AWG wire to stranded 9 AWG wire placed in camp saddle.

2 10 AWG wires jouined with 10 AWG wire nu leaving exposed wire on out side for testing>





Direct wire-to-wire contact opposed to mc4 inirect connection.
____

can llm code run on premises hardware or is clould required?

AI Overview

Yes, LLM code can run on on-premises hardware, but the
technical requirements are demanding, and it depends
heavily on the size of the model. Running an LLM locally
offers benefits like enhanced privacy and control, while
cloud-based services provide scalability and ease of
use for a wider range of projects.

On-premises LLM requirements

On-premises LLM deployment, where the model runs on
local servers, is viable but requires significant upfront
investment and specialized infrastructure.

High-end GPUs:

LLMs rely on GPUs for their parallel processing power,
and the size of the model determines the required
VRAM (Video RAM).

Small (7B parameters): Require a minimum of 8 GB
of VRAM, possible on some consumer-grade cards
like an RTX 3060.

Medium (13–30B parameters): Need 12–24 GB+ of
VRAM, often requiring high-end consumer GPUs
(RTX 4090) or data center GPUs.

Large (70B+ parameters): Demand 40 GB+ of
VRAM and typically need expensive enterprise-grade
GPUs (like an NVIDIA A100 or H100), or multiple
GPUs working in parallel.

Sufficient RAM and fast storage: Systems need
enough RAM to load the model weights, with
32 GB or more recommended for medium and
large models. Fast NVMe SSDs are also essential
for loading model files efficiently.

echnical expertise: The organization must have
skilled IT staff to manage the complex setup,
including software, hardware optimization,
and ongoing maintenance.

On-premises vs. cloud deployment

The decision between on-premises and
cloud-based deployment depends on
your organization's priorities.
...
The growing appeal of hybrid approaches Many
businesses are adopting a hybrid approach,
combining the best of both worlds. They might
use cloud services for less sensitive or experimental
workloads, while running core, mission-critical
applications with sensitive data on-premises.
This strategy allows for a balance of flexibility,
security, and cost control.

1

2 AI Overview

PG&E does not shut down data centers by policy,
but data centers can be impacted by PG&E's Public
Safety Power Shutoffs (PSPS) (PSPS) events
designed to prevent wildfires during severe
weather. In 2019, PSPS events caused
significant data center and scientific research
shutdowns. More recently, California regulators
approved rules to speed up data center
connections to PG&E's grid, and PG&E is
proactively working to meet the 10 GW
power demand from new data centers
over the next decade.

Why Data Centers Might Be Shut Down.

3 cloud storage issues zdnet


AI Overview

ZDNet has reported issues with cloud storage
including unexpected high costs after unlimited
plans ended, problems with automatic file
syncing and conversion, and the potential for
security misconfigurations that expose data.
Other concerns involve unreliable access due to
cloud outages, users losing control of their
data as it's automatically uploaded, and the
overall expense of data management leading
to a need for strategic cost-cutting and
strategic planning.

Cost Issues

Reliability and Access Issues

Cloud Outages:

Security Concerns

Misconfigurations:

Lack of Control:

User Experience Issues

Synchronization Problems:


4 Defiant Broadcom calls for tech to go back
where it belongs: On-premises
.
___
Why China can build so quickly and America can’t.


____
Environment Work & the Economy Commentary Time to
consider the community cost of offshore wind in Maryland
.

Trump administration cancels $679 million for
offshore wind projects at ports
.

Stop These Things’ Weekly Round Up: 31 August 2025.
Try 4.

Saturday August 30 2025 18:21
____
Orsted’s American Dream Becomes a Multi Billion-Dollar Nightmare.

____
AI Overview

Yes, for most 30A PWM solar charge controllers, you must
connect the battery to the controller first before connecting
the solar panels. Connecting a live solar panel to the
controller before the battery can power its internal
circuitry and may damage the unit, as the controller
needs the battery's voltage to operate correctly and
determine system settings.

Why the battery needs to be connected first.



AI Overview

Golf car batteries, particularly Lithium Iron Phosphate (LiFePO4) models,
are an excellent price/performance choice for solar applications due to
their high cycle life, deep discharge capability, and maintenance-free operation,
offering lower lifetime costs despite a higher upfront price compared to
traditional lead-acid batteries. While lead-acid batteries have a lower initial
cost, their shorter lifespan and limitations on discharge depth make them
less cost-effective for solar storage over time.

Benefits of Golf Cart Batteries for Solar.
____
is gcc c or c++ best for a beginner?

AI Overview

GCC (GNU Compiler Collection) is a compiler suite that
supports both C and C++, among other languages. It
is not a choice between GCC C or GCC C++; rather,
it is a choice between learning the C language or the
C++ language, both of which can be compiled using GCC.

For a beginner, the choice between C and C++
depends on learning goals and preferences:

Simplicity: C is a smaller, simpler language with fewer
features compared to C++. This can make it easier
to grasp fundamental programming concepts like
memory management, pointers, and data structures
without the added complexity of object-oriented
programming or advanced C++ features.

Low-level understanding: Learning C first can
provide a strong foundation in how computers
work at a lower level, which can be beneficial
for understanding performance and
system-level programming.

Use cases: C is widely used in embedded
systems,operating systems, and other areas
where direct hardware interaction and
performance are critical.

C++:

Features and Abstractions: C++ offers
many features and abstractions, such as
classes, objects, templates, and the
Standard Template Library (STL), which
can simplify complex tasks and
promote code reusability.

Modern Applications: C++ is extensively
used in game development,
large-scale software applications,
and systems requiring high performance
and sophisticated design patterns.

Object-Oriented Programming (OOP):
C++ supports OOP, a paradigm that
helps organize and manage complex
codebases, which is a valuable skill in
modern software development.

Recommendation:

For a deeper understanding of
fundamental concepts and system-level
programming: Starting with C can
provide a solid base before moving
on to C++.

For a quicker entry into modern
application development and
object-oriented programming: C++
can be a good starting point, as it
offers powerful features and is
widely used in various industries.

Ultimately, both C and C++ are
powerful languages, and the "best"
choice for a beginner depends on
individual learning style and career
aspirations. Many C++ resources
assume a basic understanding of
C concepts, so a solid foundation
in C can often make learning
C++ easier.

has malware been used to kill people?.

AI Overview

Yes, malware and other cyberattacks
have been linked to deaths, particularly
in the healthcare and critical infrastructure
sectors. While malware does not directly
kill people like a biological agent, it
can disrupt crucial, life-sustaining systems
and create conditions that lead to tragic
outcomes.

AI Overview

Yes, the NSA used compromised
Crypto AG ciphering machines to spy on
Iran as part of a joint CIA and German
intelligence operation. The program,
known as Operation Rubicon, allowed
U.S. and German intelligence agencies
to intercept and decipher the
communications of dozens of
countries for decades.

Key details about the spying on Iran:

Hans Bühler
Former sales representative of Crypto AG
.

Google AI unable to find above Hans Buehler.

___
180 degree 10 AWG wire connection using cable clamp.

Wire to wire direct contact. :)







mc4 connectors lack direct contact. :(

____
Linus Torvalds Marks Bcachefs As Now
"Externally Maintained"
.

Btrfs Developer Josef Bacik Leaving Meta
& Stepping Back From Kernel Development
.

Family of Microsoft employee who died warn
tech companies not to overwork workers
.

Maisa AI gets $25M to fix enterprise AI’s
95% failure rate
.

____
is ai a form of cloud computing?

AI Overview

No, AI is not a form of cloud computing; rather,
it is a technology that is often powered by and
integrated with cloud computing, which provides
the necessary infrastructure, data storage,
and processing power for AI to operate
effectively at scale. AI also enhances cloud
services through automation and decision-
making capabilities.

How Cloud Computing Supports AI

Infrastructure:

Cloud providers offer the vast computing
resources (processing power and storage)
that AI models need to be trained and run.

Scalability:

Cloud platforms allow businesses to scale
their AI capabilities on-demand, paying
only for what they use, making AI
accessible without large upfront
hardware investments.

Accessibility:

Cloud-based AI services, known as AI as
a Service (AIaaS), provide access to pre-
built AI tools and models, allowing
companies to implement AI without
extensive development or in-house
expertise.

Data Processing:

The cloud's immense storage and
processing capabilities are essential
for AI systems to handle the large
datasets they require for training
and operation.

How AI Enhances Cloud Computing

Automation: . AI can automate tasks
within the cloud, such as resource
allocation, optimizing performance,
and managing infrastructure.

Intelligent Services:

AI adds intelligence to cloud services,
leading to innovations like
predictive analytics, personalized
recommendations (e.g., on Netflix),
and advanced cybersecurity solutions.

Improved Decision-Making: .

By analyzing data within the cloud,
AI helps businesses make more
informed decisions and drive automation.

In essence, AI and cloud computing
are synergistic technologies, with cloud
computing providing the foundation
and resources for AI, and AI, in turn,
making cloud services more powerful,
efficient, and intelligent.
___
California tech startup once worth $1 billion
shuts down
.
___
Tesla denied having fatal crash data until
a hacker found it
.
 
____
Trump admin cancels $679 million for
offshore wind projects as attacks on
reeling industry continue
.

The Unlikely Revival of Nuclear Batteries.

Vevor wind turbine blade fragments. :(



Old Solar Panels Built in the Early 1990s Are Still Going Strong After
30 Years at 80% Original Power — And That’s a Big Deal for Our
Energy Future
.
Try 2.

Friday August 29 2025 18:17
____
Did Nvidia Just Pop an AI Bubble?
Here’s What the Market Says
.

How I saved myself $1200 a year in cloud storage -
in 5 sobering steps
.
____
There's a Stunning Financial Problem
With AI Data Centers
.

Defiant Broadcom calls for tech to go back
where it belongs: On-premises
.

AI Overview

Pure Storage provides all-flash data storage solutions,
including hardware, software, and cloud services, to
help businesses store, manage, and protect their data
more efficiently and cost-effectively. Their solutions cover
block, file, and object storage and are designed to
simplify data management across hybrid and
multi-cloud environments. The company's unique
Evergreen architecture offers non-disruptive upgrades
and a "storage-as-a-service" model, ensuring that
infrastructure evolves with a customer's needs without
requiring them to re-purchase hardware or migrate data.

Key Offerings:

Thirsty data centres boom in drought-hit Mexico.
____
why do some mc5 racketing crimpers
have a release buttonn?

AI Overview

For a ratcheting crimper, such as an MC5 model, a
release button serves as a manual override to open
the crimping jaws before a crimping cycle is complete.
This safety and convenience feature is essential for
correcting errors and preventing damage to the
tool or work materials.

Why a release button is necessary

Misaligned wire or terminal: If you start a crimp
and notice that the terminal or wire is misaligned,
you can use the release to open the jaws and
reposition the materials instead of forcing the
crimp or damaging the connector.

Stuck or jammed tool: If the crimper becomes
stuck due to a foreign object or a poorly placed
crimp, the manual release can be used to safely
disengage the mechanism and free the jaws.

Incorrect die selection: If you mistakenly start
a crimp with the wrong die for your terminal,
you can abort the process immediately to
avoid creating a faulty connection and
potentially breaking the tool.

Changing materials mid-crimp: In rare cases,
you may need to interrupt a crimp to swap
out a material. The release button allows you
to do this without having to complete the
full cycle.



AI Overview

An MC4 ratcheting crimper gets stuck primarily
because of incomplete crimping, over-crimping,
or trapped debris in the ratchet mechanism. Unlike
pliers, a ratcheting crimper must complete its full
cycle for the locking mechanism to release.

Common causes for a stuck crimper.
___
Taco Bell’s AI drive-thru plan gets caught up
on trolls and glitches
.

Who Was Pratik Pandey, Indian-Origin Engineer
Found Dead At Microsoft Office
.

Meta pushes to release new Llama model
before 2026
: report


____
How much trouble is the world’s biggest
offshore-wind developer in?
.

US solar could pay ‘tens of billions’ in duties
after Biden’s AD/CVD moratorium ruled illegal
.
Try 1.


Thursday August 28 2025 17:10
____

who maintains c++ compilers?

AI Overview

C++ compilers are maintained by various entities, primarily:

Open-source communities: Projects like GCC (GNU Compiler Collection)
and LLVM (which includes Clang) are maintained by large, collaborative
communities of developers worldwide. These projects are open-source
and freely available.

Commercial companies:

Many companies develop and maintain their own proprietary C++
compilers, often as part of a larger integrated development
environment (IDE) or for specific hardware platforms.

Examples include:



___
what happened to old mainframe computer hardwares?

AI Overview.

Retired mainframe computer hardware is handled in several ways,
including being broken down for recycling, modernized and
repurposed, or preserved for historical purposes. Despite
popular belief, mainframes are not obsolete and continue to be
developed and used for intensive, large-scale computing tasks
by major corporations.



___
Revo uninstaller used to delete Microsoft apps, incuding One Drive
and Esge,
on $120 Asus N660 4/64 GB Windows 11 laptopo, then installing
Arduino IDE.



Edge did not work well with Google AI, we discovered.
____
You, too, can make this ESP32 air quality monitor with an
e-ink display, and it looks stylish to boot
.

How I cut my monthly cloud storage bill in half - with 5
tough decisions
.   
    I was storing 60TB in the cloud, but endless support
    battles and rising costs forced me to rethink everything.
    These five changes helped me save over $1200 a year.
___
what languages are used in f-35 software by percent?

AI Overview

Initial estimates from a decade ago suggested that F-35
software was primarily written in C and C++, with Ada
and Assembly making up smaller portions. However, this
breakdown is likely obsolete. While the specific percentages
for modern F-35 software are not publicly disclosed, the
aircraft is known to use C, C++, and Ada.

An unverified breakdown of the F-35's original software
languages, from a 2012 source, claimed the following
percentages:

C: 53%

C++: 35%

Assembly: 7%

Ada 83: 5%

Several factors suggest this decade-old breakdown is
no longer accurate for the F-35's current software
.

C++ is now the predominant F-35 language in 2025, is this true?

AI Overview

No, it is inaccurate to say that C++ is the predominant
F-35 language in 2025. The F-35's complex software suite
was built over many years using multiple languages, and C
and C++ together form the majority of the code. In fact,
C was the single largest component in early analyses. Ada
was also incorporated through reuse of F-22 code.

Key facts about the F-35's software language use:
____
Microsoft (MSFT) and IBM Warn about the
Illusion of AI Consciousnes
.
____
Intel details everything that could go wrong
with US taking a 10% stake
.

Intel exec quits to run Analog Devices’ Oregon factory.

Why Intel investors have embraced an interventionist
White House
.
____
Oh goody, the 'first known AI-powered ransomware'
has been discovered and it 'may exfiltrate
data, encrypt it, or potentially destroy it
'.

where do hackers learn how to hack?

AI Overview

Hackers, both malicious and ethical, learn through a variety
of paths, from formal education to self-taught online practice.
The most effective learning combines a strong theoretical
foundation with hands-on, practical experience.

Formal education

Computer Science and Cybersecurity Degrees: Many
universities offer degrees that cover essential topics
like networking, operating systems, and computer
programming.

Post-Graduate Programs: Master's degree and executive
education programs are also available for those looking
to specialize further.

Online courses and training platforms

These resources allow for flexible, self-paced learning
and offer structured, comprehensive training.

Coursera: Offers courses and certificates from universities
and companies like IBM and Johns Hopkins University.

dX: Features ethical hacking courses and master's
degrees from institutions like Harvard and Berkeley.

EC-Council: A well-known provider of industry-recognized
certifications like the Certified Ethical Hacker (CEH).

Udemy: Provides a wide variety of courses on
ethical hacking for all skill levels.

Hands-on practice and community challenges

To truly become a hacker, theory must be applied in
practice. These platforms and competitions offer legal
environments to test skills.

Capture The Flag (CTF) Challenges: Time-based
competitions where participants hack into systems
to find "flags" or hidden pieces of code.

ryHackMe: An online platform with structured
learning paths and virtual labs for practicing
cybersecurity skills in a browser.

Hack The Box: Offers a more advanced platform
with hacking challenges designed for aspiring and
professional security experts.

OverTheWire: A set of hacking wargames that
introduce participants to security concepts.

VulnHub: Provides virtual machines with
intentionally vulnerable applications for users
to practice their hacking skills.

Foundational skills

Regardless of the learning path, all hackers must
first master the fundamental building blocks
of technology.

Networking: An in-depth knowledge of how
networks function is crucial, including protocols,
routers, switches, and firewalls.

Operating Systems: Familiarity with multiple
operating systems, particularly Linux, is
essential, as it is a common tool for security
professionals.

Programming and Scripting: Skills in languages
like Python, JavaScript, and Bash allow for the
automation of tasks and the development of
custom tools.

Security Concepts: Understanding encryption,
security protocols, and common attack types
like social engineering is foundational.

Certifications and professional growth

Certifications provide credibility and can open up
job opportunities in the cybersecurity field.

Certified Ethical Hacker (CEH): A well-known
credential for aspiring ethical hackers.

Offensive Security Certified Professional (OSCP):
A highly respected, rigorous certification
that proves practical penetration testing skills.

CompTIA Security+: An entry-level certification
that demonstrates fundamental cybersecurity
knowledge.

Networking and Communities: Joining online
communities, attending conferences, and
following blogs are essential for staying
up-to-date in the rapidly evolving
cybersecurity landscape.



Cyberattack that crippled Nevada's systems reveals vulnerability of smaller
government agencies to hackers
.
 
____
Cadeler shrugs off US vessel concerns and vows
to help Orsted through 'sad situation'
.
Try 1.

Wednesday August 27 2025 19:03
____
Dangerous advice for software engineers (seangoedecke.com).

NVIDIA Investors On Edge As AI Narrative Worth Trillions Of
Dollars At Stake: $260 Billion Stock Gyration Expected
.

U.S. Nuclear Energy Drive to Spur Uranium Enrichment.
____
Runs freertos claim.




Run freertos and a Forth claims/


____
These 5 self-hosted services are overkill for my
home lab, but I use them anyway
.

Greenboot Rust Rewrite Approved For Fedora 43.

AI Overview

The Greenboot Rust rewrite is a new, Rust-based version of the
Greenboot system health check framework, developed by Red Hat
engineers for Fedora Linux, that maintains the original functionality
but expands support to include bootc systems alongside the previous
rpm-ostree-based systems. The core purpose of Greenboot is to
perform automatic system health checks and enable rollback if an
update fails, and the new Rust version aims to provide a more reliable
and modern implementation for Fedora's IoT and other
container-focused systems.

What is Greenboot?

Greenboot is a framework that runs health checks during the
boot process of a system.

LLVM 21.1 Released With AMD GFX1250 Target,
Improved RISC-V, New C/C++ Features
.

____
US Intel (stratechery.com).

NVIDIA Outlines GB10 SoC Architecture
at Hot Chips 2025
.

Is the AI boom finally starting to slow down?.

The A.I. Spending Frenzy Is Propping Up the
Real Economy, Too
.

The Era of AI-Generated Ransomware Has Arrived.
____
what are options for 10AWG direct
wrire to wire connectors?

AI Overview

There are several reliable options for direct wire-to-wire
connectors for 10 AWG wires, ranging from push-in
to crimp-on types. The best choice depends on the
application, including whether the connection is in
a wet or dry location and whether you are using
solid or stranded wire.

AI Overview

No, issues with MC4 connectors do not account for most
solar system failures. While connector problems are a common
cause of electrical faults, poor installation, inverter issues, and
physical panel degradation are more frequent and widespread
causes of system underperformance and failure.

Why MC4
connectors are a notable failure point.

Conclusion.

While faulty MC4 connectors are a significant and often
preventable source of electrical issues and fire hazards, they
are part of a broader set of more common failure points. Major
system failures are more frequently linked to poor installation,
problems with the inverter, or physical degradation of the panels over time.

 
____
Surging US electricity prices put Trump
pledge in jeopardy
.

Aging Coal Plants Could Cost Americans Billions.

Canceled wind project puts thousands of jobs at risk.

Nuclear Energy Stock Up Over 900% in the Past 365 Days.
Try 2.

Tuesday August 26 2025 09:14
____
1 Multitasking mainframe mentality.

2 Single task bremetal BASI/Forth mentality.

Nanocomputer implemenations.

___
Pi Zero-sized Radxa Cubie A7Z SBC features Allwinner
A733 Cortex-A76/A55 SoC, up to 16GB RAM, WiFi 6
.

AI Overview

While the Radxa Cubie A7Z was listed on AliExpress and Arace, it is
currently out of stock on both platforms. As of late August 2025,
it appears the device was announced and briefly listed but may not
be widely available yet.

The following are primary vendors and platforms to monitor for
future availability
:

__

Radxa Cubie A7Z. Next. Radxa Cubie A7Z. $20.00 Regular price Sale.

AI Overview

The Radxa Cubie A7Z does not officially run FreeRTOS, but instead
ships with full-fledged operating systems like Debian Linux and Android.
The Cubie A7Z features a powerful Allwinner A733 SoC, including an
ARM Cortex-A76/A55 CPU, which is far more powerful than the
microcontrollers that FreeRTOS is designed for.

However, the Allwinner A733 SoC includes a low-power
RISC-V E902 coprocessor specifically designed for real-time
tasks and low-power management. While Radxa does not advertise
official FreeRTOS support for this RISC-V core, it is a suitable
candidate for running a real-time OS. For advanced users and
developers, this provides an avenue for custom implementation.

Why the Cubie A7Z uses Linux instead of FreeRTOS The choice
of operating system depends on the hardware and intended
application.
____
what is the difference between a hacker and a malwarian?

AI Overview

There is no recognized word or role called a "malwarian." The term you
are likely looking for is malware author, which describes the person who
writes malicious software. The fundamental difference is that a hacker is
a person who exploits computer systems, while a malware author creates
the tools that hackers and other cybercriminals use.

Hacker

A hacker is an individual who explores and exploits computer systems
to gain unauthorized access. Their motivations can vary, ranging from
ethical security testing to malicious cybercrime.
...
Malware Author.
...
.Key differences summarized.
____
Too Old, Too Uneducated: Aging Workers in Beijing Struggle
for Work
.

How China became an innovation powerhouse.
 
____
Solar Plus Battery Storage — This Changes Everything.

Does a mc4 connector work with 8 AWG wire?

AI Overview

Yes, it's possible to work with 8 AWG wire and MC4 connectors, but
you must use MC4 connectors specifically designed for 8 AWG wire,
not the standard ones for 10 AWG or smaller wires, as these may
overheat and cause a fire risk. You can also achieve compatibility
by using Amphenol H4 connectors (which are often compatible with
MC4s) or by using the wire directly into a device's combiner box
or a specialized adapter for larger gauge PV cables.

How to Make MC4s Work with 8 AWG Wire.
Try 1.

 Monday August 25 2025 19:05
____
does a green 10 AWG wire nut make a better electrical connection
than a mc4 connector?

AI Overview
An MC4 connector makes a significantly better and safer electrical
connection than a green 10 AWG wire nut for solar photovoltaic
(PV) applications. The two are designed for completely different
purposes and environmental conditions.

Feature MC4 Connector.

The risks of using a wire nut for solar connections

Using a wire nut in an outdoor solar application is a dangerous shortcut
that compromises the safety and efficiency of your system. Key
risks include
:

Does 10 AWG in wire directly touch to the out wire with a mc4 connector?

AI Overview

No, a 10 AWG wire does not directly touch the "out" wire when an MC4
connector is used. The MC4 system uses male and female halves, which
each have their own internal metal contact that must be properly crimped
onto its respective wire. When the two halves are snapped together, the
metal contacts inside connect to each other, but the wires themselves
remain separate.

Here is a step-by-step breakdown of how the internal wiring works:

This entire process ensures that the electrical connection is made
between the insulated metal terminals, not between the raw wires.
The male and female plastic housings and the internal sealing
components provide protection and prevent accidental contact with the
circuit.

____
An Enormous Data Center In Wyoming Will Consume
5x More Power Than The State's People. The Owner Remains A Mystery

____
The air is hissing out of the overinflated AI balloon.
    Are tech giants getting nervous? They should be.
____

AI Overview

Cult Recruitment May Be More Prevalent Than You Thought ... A cult recruiter is
an individual who uses deception, manipulation, and persuasive techniques to
entice others into joining a cult. These recruiters often target individuals
during times of vulnerability, exploiting emotional needs for things like
belonging and purpose. They may use tactics like love bombing
(overwhelming new recruits with affection), mirroring interests
to build rapport, and using loaded language to create a sense of exclusivity,
all while obscuring the group's true nature and intentions.

How Cult Recruiters Operate Targeting Vulnerability:

Recruiters seek out individuals who are experiencing emotional hardships,
such as loss, loneliness, or a desire for meaning, according to Number
Analytics and HowStuffWorks.

Deception and Misrepresentation: They present the cult as something
benign, mainstream, or low-pressure to downplay its true nature.

Love Bombing: A common tactic is overwhelming potential recruits with
excessive affection, flattery, and attention to create an emotional bond
and a feeling of acceptance, notes Number Analytics.

Building Trust Through Rapport: Recruiters may mirror the interests,
values, and language of their targets to quickly establish a sense of
connection, according to Number Analytics.

Exploiting Emotional Needs: Recruiters appeal to the target's desire
for community, purpose, or love, promising to fulfill those needs
within the group.

Innocuous Invitations: The recruitment process often begins
with seemingly innocent gestures, like invitations to a dinner
or a social event, that are actually designed to draw the person
into the group's influence, says the University of Texas
Permian Basin.

Why People Are Susceptible Emotional Need:

A significant factor is the person's existing need for acceptance,
purpose, or community, which the recruiter effectively exploits.

Lack of Awareness:

Potential recruits are typically unaware of the manipulative tactics
being used or the true agenda of the group, according to HowStuffWorks.

What to Watch For

Unsolicited Affection: Be wary of sudden, overwhelming displays of
affection, praise, and attention.

Fast Pace: A significant red flag is when things move too fast,
with a sense of being rushed into a decision or commitment.

Secrecy and Control: Watch for an environment where
information is controlled, questions are discouraged, and
there's an excessive need to please the leaders, per Make
It Conscious. ____
AI Overview

For MC4 connectors and 10 AWG wire, the correct method is to strip
about 1/2 inch (12 mm) of insulation, insert the wire so the
insulation butts against the metal terminal, then crimp the metal terminal to
the wire. This ensures a secure, weatherproof, and safe connection.

Here is a breakdown of why this method is best and why the other
is incorrect
.

AI Overview

In an MC4 strip 1/2 connector, the metal contact (or pin) is
crimped to the stripped wire conductor, but the insulation tabs
are not crimped. Instead, a watertight seal is created when the
connector is assembled and tightened. Crimping the pin to the wire,

Attaching the insulation tabs: :)

if use the 1/2 inch, crimp to the barrel, what shoud I do with the
pin insulator tabs?

AI Overview If you are crimping a pin connector to a wire using
a standard crimping tool, you use the insulation tabs to create
strain relief and secure the wire. Do not cut the insulation tabs off.

step process: Insulation tabs:

These tabs are located at the back of the connector and are
longer than the tabs for the bare wire. They are designed to
fold over and grip the wire's insulation, providing a crucial
strain relief.

Conductor tabs: These tabs are in front and are shorter.
They are crimped over the bare wire to establish the electrical
connection.

Why you shouldn't remove the insulation tabs

Removing the insulation tabs or simply crimping them down on
bare metal is a mistake that compromises the integrity of
your connection.

Creates strain relief: When you bend the tabs over the
wire's insulation, it prevents the wire from pulling out of the
terminal. Without this, any physical stress on the wire is
transferred directly to the electrical crimp, which can cause
it to fail.

Prevents shorts: The crimp on the insulation holds the wire
securely in place so that the electrical connection and the bare
conductor aren't exposed. This prevents accidental contact with
other terminals, which could cause a short circuit.

Protects the connection: The combination of a strong electrical
crimp and a solid strain-relief crimp creates a robust connection
that is resistant to vibration and movement.

How to use the insulation tabs properly Strip the wire correctly:

1. Strip only enough insulation to expose the bare wire that will
be gripped by the conductor tabs. The insulation itself should
extend into the area where the larger, rear tabs are.

2. Align the connector: Place the pin connector in the correct
die of your crimping tool, aligning the wire so that the bare
conductor is under the front tabs and the insulation is under
the back tabs.

3. Crimp twice: A proper crimp is a two-stage process.
Some tools have separate dies for the insulation and
conductor crimps, while others have a single die that does both.

First, crimp the front tabs down on the bare wire to establish
the electrical connection.

Second, crimp the rear tabs down on the wire's insulation
for strain relief.

Following these steps ensures your connection is not
only electrically sound but also mechanically durable and safe.

Linux is 34 years old today — Linus Torvalds meekly announced this
free new OS in the comp.os.minix newsgroup on this day in 1991
.

____
AI Overview

The ATmega328P uses a single-cycle AVR RISC instruction set,
which includes 131 powerful instructions executed in one
clock cycle for high performance at 1 MIPS per MHz. This
architecture includes 32 general-purpose working registers
directly connected to the ALU, enabling two registers to be
accessed simultaneously in a single instruction. The instruction
set supports various operations, including arithmetic, logical,
data transfer, and branching instructions, all optimized for
efficiency and low power consumption, as seen in devices
like the Arduino Uno.

Key characteristics of the ATmega328P instruction set:
____
does arduino have a competitor to the
expressif devkit esp32 boards?

AI Overview

Arduino has responded to the popularity and capabilities
of Espressif's ESP32 boards by incorporating ESP32
chips into some of their own official boards. While
not direct "competitors" in the sense of offering
identical alternatives to every specific Espressif
DevKit, these Arduino boards leverage the ESP32's
features, particularly its integrated Wi-Fi and
Bluetooth connectivity.

Examples of Arduino boards utilizing
ESP32 chips include:

Arduino UNO R4 WiFi: . This board integrates an
ESP32-S3 module, adding Wi-Fi and Bluetooth
capabilities to the familiar UNO form factor.

Arduino GIGA R1 WiFi: . A more powerful board
also featuring an ESP32-S3 module for wireless
connectivity, alongside a robust STM32H7
microcontroller.

Arduino Nano ESP32: . A compact board specifically
designed around the ESP32-S3, offering a smaller footprint
with integrated Wi-Fi and Bluetooth.

These boards allow users to benefit from the ESP32's
advanced features within the Arduino ecosystem,
including the widely used Arduino IDE and its extensive
library support. This provides an alternative for users
who prefer the Arduino brand and development
environment while seeking the wireless capabilities
of the ESP32.



does the arduino ano esp32 run freertos?

AI Overview

Yes, the Arduino Nano ESP32 does run FreeRTOS, as the
Arduino core for ESP32 is built on top of the Espressif IoT
Development Framework (ESP-IDF), which natively uses
FreeRTOS. You don't need to install FreeRTOS separately;
you can directly use its task management, scheduling, and i
nter-task communication features in your Arduino sketches.

How it works.

does the arduino ano esp32 run esp32forth?

AI Overview Yes, the Arduino Nano ESP32 can run ESP32-Forth.
Since the Arduino Nano ESP32 uses an ESP32-S3 microcontroller,
and the ESP32-Forth project was developed to run on the ESP32
platform, the Nano is fully compatible.

The process of getting ESP32-Forth to run on the
Arduino Nano ESP32 involves the following steps
:



n: does the Nano V3.0, Nano Board ATmega328P run freertos?

AI Overview Yes, the Nano V3.0 with the ATmega328P can run FreeRTOS, though it has
significant memory constraints. A specialized, minimal version of FreeRTOS has been
ported to the ATmega328P microcontroller, and libraries are available through
the Arduino IDE.

How FreeRTOS is adapted for the ATmega328P.

does the e Nano V3.0 with the ATmega328P run a forth?

z
AI Overview

Yes, an Arduino Nano V3.0 (or a compatible e Nano V3.0) with
an ATmega328P can run a Forth interpreter, though it doesn't
come with one by default. The ATmega328P microcontroller i
s supported by several implementations of the Forth language.

To run Forth on your board, you will need to:


____
This 1TB Dual-Sided Flash Drive Is a Solid
Alternative to Cloud Storage
.
    Cloud storage can be convenient, but it often comes
    with recurring fees, account limits, and the need
    for a constant internet connection.

Seattle hopes to build its future in Oregon’s desert
— or blackouts may follow
.

WHAT IS AN SS USB PORT, AND WHAT ARE
THEY USED FOR
?.
____
Prompt engineering is collapsing – GPT-5 just proved it.
 

____






Try 1.

Sunday August 24 2025 18:08
____
ESP32 Sets Sail As A Modern Bus Pirate Powerhouse.
___
Linux Malware Delivered via Malicious RAR Filenames
Evades Antivirus Detection
.
____
I built a $30 "Now Playing" display for my record
player with an ESP32, and it looks great
.

5 signs that self-hosting is not for you.


One of the best ways to dodge Windows 11's system r
equirements just got even better
.
____
It’s Not Going to Slow Down’: The Tech Stock
Everyone Is Watching This Week
.

Mapped: Unemployment Rate By State in 2025.

William Payne · Fri
1 Are c++ projects now recognized as expensive?
2 And impossible to maintain without C++without c++ cult members employment?

Joe Zbiciak Joe Zbiciak · 15h Clearly you have an axe to grind. Please grind it elsewhere.


 
Try 1.

Poater.