GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Vertigo #$FF (vertigo@hackers.town)

  1. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Sunday, 16-Jul-2023 16:57:55 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • clacke

    @clacke I am OK with this.

    In conversation Sunday, 16-Jul-2023 16:57:55 JST from hackers.town permalink
  2. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Sunday, 16-Jul-2023 09:49:47 JST Vertigo #$FF Vertigo #$FF

    I miss fuzzy logic.

    In conversation Sunday, 16-Jul-2023 09:49:47 JST from hackers.town permalink
  3. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Sunday, 28-May-2023 14:15:11 JST Vertigo #$FF Vertigo #$FF
    • Csepp ?
    • theruran 🌐🏴
    • Sergey Bugaev
    • WimⓂ️
    • Janneke

    @csepp @wim_v12e @bugaevc @theruran @janneke In the case of the Lattice iCE40 parts, the programming flash is the same device as what a soft-core processor would boot from. So, it actually does have access to its own bitstream.

    If the bitstream is programmed to treat the flash as ROM, then I don't think it would be backdoored without physical access. (This is why my Kestrel Computer Project mandated that the flash be treated as ROM, not as reprogrammable flash). But, if programming capability is provided, and the hardware doesn't bounds check, then it's conceivable that a new bitstream can be injected with bad-actor hardware.

    Depending on the new hardware injected, it might evade detection by most end-users. The gate count required to exfiltrate data is relatively small (e.g. a wait-state generator that modulates its wait state count depending on data in a simple shift register).

    In conversation Sunday, 28-May-2023 14:15:11 JST from hackers.town permalink
  4. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Sunday, 28-May-2023 14:09:52 JST Vertigo #$FF Vertigo #$FF
    • theruran 🌐🏴
    • Sergey Bugaev
    • Janneke

    @bugaevc @theruran @janneke I have ideas on how to handle hardware interfaces.

    I tried to realize this before with my Kestrel Computer Project. But, zero people showed any willingness to help, because it was still kinda sorta too abstract. Or, maybe I was just too nostalgic (the idea was to "revert progress" and develop a neo-retro platform from which we could once again move forward from).

    One of my core ideas was to standardize (memory-mapped) I/O register interfaces for a wide variety of peripheral classes using an I/O fabric like (or even forking) RapidIO, kind of like how the most sophisticated video cards of today still support true-blue VGA emulation. I reject the idea that it's "impossible" to achieve with other classes of peripherals. UUIDs would have been used to identify device classes and revisions to a specific binary interface.

    But, that project is dead now due to (1) nobody willing to help out, and (2) me burning out.

    In conversation Sunday, 28-May-2023 14:09:52 JST from hackers.town permalink
  5. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Sunday, 30-Apr-2023 10:38:45 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Csepp ?
    • tech? no! man, see...

    @technomancy @csepp

    but now the status quo has caught up on basically everything but notation and macros

    Rust macros have made significant strides at solving that problem; but, even before then, PL/I had a macro system that was similarly capable.

    In conversation Sunday, 30-Apr-2023 10:38:45 JST from gnusocial.jp permalink
  6. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Friday, 21-Apr-2023 02:07:49 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • requiem ?‍☠️

    @requiem That is when you hold an all-hands meeting, citing specific sequences of code and the impacts that code has had on your time and ability to deliver on your deliverables, and the economic impact to the company. Make sure to emphasize the economics. Managers love dollars and hours.

    Then, stipulate a new rule: he who uses Copilot fixes Copilot's shit. Using git blame or your VCS's equivalent functionality, it ought to be possible to determine who injected the defect. Halt the build pipeline until it's fixed.

    This will get people's attention very quickly.

    In conversation Friday, 21-Apr-2023 02:07:49 JST from hackers.town permalink
  7. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Friday, 21-Apr-2023 02:06:55 JST Vertigo #$FF Vertigo #$FF
    • requiem ?‍☠️
    • Riley S. Faelan

    @riley @Satsuma @requiem AD&D -- Advanced Dunning and Debugging.

    In conversation Friday, 21-Apr-2023 02:06:55 JST from hackers.town permalink
  8. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Thursday, 09-Mar-2023 18:53:08 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Jens Finkhäuser
    • Julia Evans
    • Palin

    @jens @b0rk @palin According to ISO standards, an octet is explicitly defined to always be eight bits.

    I'd love to know the context in which "a-group-of-eight" (octet) isn't. ;)

    (Brought to you by the same people who made December the 12th month.)

    In conversation Thursday, 09-Mar-2023 18:53:08 JST from hackers.town permalink
  9. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Thursday, 09-Mar-2023 18:46:44 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Julia Evans
    • Palin

    @b0rk @palin For the same reason we talk about "digits" in decimal numbers.

    A "bit" in a binary (base-2) number can be 0 or 1.

    An "triad" in an octal (base-8) number can be 0, 1, 2, ..., 6, or 7.

    A "digit" in a decimal (base-10) number can be 0, 1, 2, ..., 8, or 9.

    A "quartet" or "nybble" in a hex (base-16) number can be 0, 1, 2, ..., E, or F. Nybble is "half a byte," making it something of a joke.

    An alternative name for what we call a "byte" today is, as you'd probably guess, "octet."

    Basically, these terms are ways of communicating two pieces of information at the same time: that you're talking about a single digit in some numerical base of some kind, and what the base actually is.

    In conversation Thursday, 09-Mar-2023 18:46:44 JST from hackers.town permalink

    Attachments



  10. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Thursday, 09-Mar-2023 18:43:55 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • lippard✅:donor:
    • Julia Evans
    • chx

    @chx @jks @lippard @b0rk That said, Wikipedia is correct on this matter.

    In conversation Thursday, 09-Mar-2023 18:43:55 JST from hackers.town permalink
  11. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Thursday, 09-Mar-2023 18:42:55 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Julia Evans
    • Advent of Computing
    • Toby Jaffey 🏳️‍🌈

    @adventofcomputing @tobyjaffey @b0rk We do, though. See this document by the 8086's inventor, Steve Morse.

    Intel Microprocessors: 8008 to 8086 - SteveMorse.org https://stevemorse.org/8086history/8086history.pdf

    In conversation Thursday, 09-Mar-2023 18:42:55 JST from hackers.town permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: stevemorse.org
      One-Step Webpages by Stephen P. Morse
      Stephen P. Morse's One-Step tools for finding immigration records, census records, vital records, and for dealing with calendars, maps, foreign alphabets, and numerous other applications.

  12. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Thursday, 09-Mar-2023 16:41:37 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Robin
    • Julia Evans
    • Palin

    @eythian @b0rk @palin The disk encoding uses "group coded recording", or GCR, on the disk surface. These are 5-bit codes with certain properties useful for magnetic media. Of the possible 32 binary values that have these properties, only 16 are valid. Hence, each five bit group records a single nybble.

    If you copied a disk one group at a time, you could overcome some copy protection schemes that rely upon invalid group representations.

    Software that focused on copying disks this way are called nybblers because they focus on copying data one group at a time, in effect performing error correction at the individual group (hence, nybble) level.

    In conversation Thursday, 09-Mar-2023 16:41:37 JST from gnusocial.jp permalink
  13. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Monday, 20-Feb-2023 14:03:38 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Sean T. McBeth ?
    • David Gerard

    @seanmcbeth @davidgerard They relied heavily on such medieval techniques as maintaining customer support staff, user surveys, keeping an eye on outside support channels, etc.

    But, we are in the renny-seance period now, so companies are better than that. All hail Big Data. Don't forget to rub Big Table's belly for good luck.

    In conversation Monday, 20-Feb-2023 14:03:38 JST from hackers.town permalink
  14. Embed this notice
    Vertigo #$FF (vertigo@hackers.town)'s status on Wednesday, 02-Nov-2022 00:28:19 JST Vertigo #$FF Vertigo #$FF
    in reply to
    • Teryl's Tales of Whim~

    I opened the door and quickly slipped inside. Unlike outside, the library was quiet, with only one attendant behind the information desk, and one other person was reading a set of books off in a corner.

    I approached the desk, carrying a duffle bag that was every bit as drenched as I was. Once there, my white cat jumped out onto the counter.

    "I'm sorry, but we don't allow pets in this library. You'll have to leave it outside."

    "Forgive me, that's not a pet. She is my familiar," I reply quietly but somewhat laden with indignation.

    The librarian took a moment longer to ponder the feline. "You a warlock?"

    "I am."

    "Aren't the familiars of witches and warlocks supposed to be black?"

    "Yes; but, I ran out of ink while writing an article for the university."

    "... And?"

    "Well, I cast a spell to refill my ink well, and I needed to get the black color from somewhere!" The cat hissed and growled at me. "She still hasn't forgiven me for that. That's actually why we're here."

    @Teryl_Pacieco
    #TootFic #Microfiction

    In conversation Wednesday, 02-Nov-2022 00:28:19 JST from hackers.town permalink

User actions

    Vertigo #$FF

    Vertigo #$FF

    HW: #KestrelComputerProject #Kestrel3 #vdc2 #vdcII #fpga.SW: #Forth, Common #Lisp, #Python, #Asm, #APL, #J, #Rust.Creator of the VIBE screen editor, Kestrel computers, and most recent project: ROSE. My code likely runs on your harddrives.#nobot

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          15374
          Member since
          31 Oct 2022
          Notices
          14
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.