spent Christmas Day tramping #TeRerengaWairua and am honestly just curious if this social is more / less hostile to non-square aspect ratios
Go on, you know you want to waste your afternoon…
Here's a Xerox Star emulator!
The Xerox Star (https://en.wikipedia.org/wiki/Xerox_Star) was the commercial evolution of the Alto with a proper GUI, a mouse, Lisp , SmallTalk :flan_wink, and was a commercial disaster or close enough
Reading this paper for the third time now, and it really is a masterclass in taxonomic rigour. https://arxiv.org/pdf/1811.05441.pdf
I really want to learn more about thermal x fault injection attacks, but the research I‘ve found falls between ‘propagation delay increases by 3-5x (depending on voltage) between 25°C and 100°C,’ and ‘Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis’ https://eprint.iacr.org/2014/782.pdf
Noticed the other day that the US Secretary of Homeland Security said some pretty crazy things earlier this month.¹
When physical safety of natural persons ranks behind dollar amounts, then ‘cybersecurity’ is about the accumulation and protection of capital.
Also that ‘re-rise of the nation state’ stuff is 🍌🍌
@qxn In the same vein: the history of Silicon Graphics and their graphics workstations. All had accelerated graphics and, therefore, pretty amazing chipsets.
@qxn Also, come to think of it, you should look at the design of the Intel i860 “supercomputer on a chip” as it carries within it the seeds for some particular design concepts which were then developed further in GPUs. In particular note the “limited VLIW”.
If you find anything there’s also Evans & Sutherland with their graphical magic. I still have and cherish an E&S graphics card (dual full-length PCI) for my Digital PWS600au which pumps OpenGL in 3D at amazing speeds.
Via @qxn here's Microsoft's "A call for principle-based international agreements to govern law enforcement access to data":
It is actually eminently reasonable which might come as a surprise.
Key points in the attached image.
The complete PDF expanding on the principles: https://blogs.microsoft.com/uploads/prod/sites/5/2018/09/SIX-PRINCIPLES-for-Law-enforcement-access-to-data.pdf
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!