No centrally planed economy has managed that before.
FLOSS virtualization hacker, occasional brewer
No centrally planed economy has managed that before.
Now you can install uboot and get a property uefi implementation it shouldn’t take too long: https://social.treehouse.systems/@cas/113539953511804908
I need to check the driver situation but I don’t think there was anything particularly windows only on the SoC.
There is a very large corpus of FLOSS software out there serving everything from individual itches to whole industries. Any project that is important to someone’s bottom line is likely to have paid developers working on it but often alongside hobbyists.
The project I predominately work on is about 90% paid developers but from lots of different companies and organisations. Practically though the developers don’t care about the affiliation of the other developers they work with but the ideas and patches they bring to the project.
I just want to buy home automation gadgets that don’t need a bloody cloud account to work.
I think car automation peaked at adaptive cruise control. It’s a simple tractable problem that’s generally well confined and improves the drivers ability to concentrate on other road risks.
For portability Vulkan is the way (it also gets you GPU compute for free without needing vendor libraries). That said the ruttabaga encapsulation is useful for things like Wayland over virtio-gpu which is useful for some use cases.
I should note for even closer to native performance you want virtio-gpu with native context. Patches for that are currently being reviewed on the mailing list: https://patchew.org/QEMU/[email protected]/
It depends what they want to do. They can fork and take on the burden of maintaining the whole tree in which case good luck with that, linux is too much of a fire hose to enable a 3rd party to assemble something similar making different choices about what they merge. Otherwise they can maintain a re-based fork that tracks the Torvalds tree and then congratulations you’ve just invented a feature tree that can do contribution with extra steps.
I don’t think algorithms themselves are to blame but what they are tuned for. While engagement/eyeball hours for the adserver is the prime metric the quality of experience will be subservient to it. If the algorithms could better measure your mood and stimulation levels and maximise for that the effect would be less toxic. Ideally if it realised you were just mindlessly consuming it could suggest maybe you’ve done enough today and to try something else. But that I fear that is not something the owners of the various ecosystems want.
So this is like extending mastodon replies into your blog post, but with more syndication options?
I met a man who’s focus was on making ASIC fabrication accessible to students and hobbyists. The audacity of the ambition made me smile and the fact they have succeeded using an open source workflow made me happy.
In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern “Trusted Computing” like platforms include verified boot chains so even if you extract the certificate you couldn’t use it because you also need to sign the boot chain to ensure no code has been altered.
Absolutely - modern pirates are extracting the digital streams with the DRM removed. However they closely guard the methods of operation because once the exploits or compromised keys are known they can be revoked and they have to start cracking again. They likely have hardware with reverse engineered firmware which won’t honour key revocation but still needs to be kept upto date with recent-ish keys.
For example the Blu-Ray encryption protocols are well enough known you can get things working if you have the volume keys. However getting hold of them is tricky and you have to be careful your Blu-Ray doesn’t read a disk that revokes the old keys.
For streaming things are a little easier because if you get the right side of the DRM you can simply copy the stream. However things like HDCP and moving DRM into secure enclaves are trying to ensure that the decryption process cannot be watched from the outside. I’m sure their are compromised HDCP devices but again once their keys get leaked they will no longer be able to accept a digital stream of data (or may negotiate down to a sub-HD rate).
I remember programming the VCR when VHS was first a thing and I’m definitely not nostalgic for it. It was the best most people could afford at the time but it certainly wasn’t good.
When did people get nostalgic for the crappy analogue definition that was VHS? What’s next betamax special editions?
Church of England? They are pretty vanilla and low key in my experience.
As I understand it is to operate the defensive missile battery they have just shipped.
They are pretty focused on reducing the cost of launches by aggressively re-using components that would normally crash into the sea. Previous launches landed on floating sea platforms but yesterday’s heavy was so big it needed a more stable landing zone. So after boosting the Star Liner the rocket returned down the trajectory it had followed up and then hovered briefly before being caught by two pincers on the very launch pad it had left five minutes before. That’s pretty cool.
Is it worth raising an issue with the project? Also enable logging to see if there are any clues as to why a rescan is being done?
If you license a design from someone you’ll still be paying something. Sure there are also free implementations but they are aimed at microcontrollers, you won’t get any server class chips for free.