Yeah Raspi even sells a keyboard formfactor and there was a Raspi laptop made from 3D printable casing and basic peripherals (screen, keyboard with mouse nub) for it. A cheap quasi-open source laptop at the time.
Ouch. I sympathize, having gone through similar hoops with Renesas. We buy a hardware product from them and try to develop on it but they won't share more than a few superficial datasheets with us. And I know they have way more manuals / datasheets because they'll sometimes drip the info to me when I ask specific questions, but they won't just give us them so we can do it ourselves.
This is a common business model sadly where the seller wants the buyer to buy an additional support contract for any actual firmware development.
Ok I read this article but I don't see how it connects to LLMs as he puts forth at the start. Is he saying we have not yet reached the phase where someone will reverse engineer LLMs to figure out what is actually going on with these strange new beasts?
Very fun article for graphic design fans, but the author not only used ChatGPT to write the post but they did not include a single link anywhere to anything they mention.
" In the last five years VC Investment in defense startups has gone from zero to $20 billion/year. "
Really? No investment in weapons startups 5 years ago? Not even by the CIA-backed VC firms or other SoCal weapons manufacturer networks?
"High-performance supercomputers are used for large-scale fault injection, emulating entire flight timelines where catastrophic hardware failures are introduced to see if the software can successfully ‘fail silent’ and recover."
I assume this means they are using a digital twin simulation inside the HPC?
Yes, they leveraged Intel Simics and many other tools like Matlab etc. to have "Digital Twin" simulations.
The extensive use of simulators and emulators has been particularly critical, enabling parallel design and development workflows to compensate for the incredibly expensive and long-lead times of hardware.
So this helped with bottlenecks in development too.
basically every app is a tab. this is how I run i3wm. full screen tabbed layout. smaller modal windows still appear in their normal smaller windows in front of the current full screen app.
This is why users need to have an american router, chinese router, and russian router, all wired in series. That way no one spy branch has full backdoor access through the chain ;-)
How would that work? Backdoors usually go the other way: malware calls home. How can the first router in the chain differentiate TLS backdoor traffic from the 3rd router (the one with access to your LAN) from legitimate traffic from LAN?
reply