POPULARITY
W niniejszym odcinku wnikliwie analizuję jedną z kluczowych kwestii w technologicznym świecie - doskonale znaną architekturę x86 z coraz śmielej wkraczającymi układami ARM. Czy Apple Silicon oraz Qualcomm Snapdragon X rzeczywiście zmienią świat pecetów jaki aktualnie znamy? Jak rysuje się przyszłość ARM na Windowsie w kontekście układów Qualcomm? W materiale omawiam różnice między RISC a CISC, kompatybilność oprogramowania oraz kluczowe aspekty wydajności i energooszczędności. Jeżeli chcesz zrozumieć, dlaczego ARM nie zawsze działa tak świetnie na Windows, jak na macOS, i co czeka nas w najbliższych latach jest to odcinek dla Ciebie!
Corinne Fisher talks about Infowars in a tizzy over a prophetic preacher, the culture being solidly in the toilet upon the release of Roseanne's new rap album, a look at the 100 executive orders Trump promised for day one of his second term in office, what the change in the oval office means for immigration, a deeper look at the Gaza ceasefire deal, stories from people on the ground in the warzone and so much more!Original Air Date: 01/22/25You can watch Without A Country LIVE every Wednesday at 9PM on our YouTube Channel at https://www.youtube.com/channel/UCjP3oJVS_BEgGXOPcVzlpVw!**PLEASE SUBSCRIBE, RATE & REVIEW ON iTUNES & SUBSCRIBE TO OUR YOUTUBE CHANNEL**Link To The Brand New Patreon!https://patreon.com/WithoutACountry?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLinkThis week Corinne takes a look at the dog blood banks in California that keep dogs under lock and key as constant donors. WHERE YOU CAN ANNOY US:Corinne Fisher:Twitter: https://twitter.com/PhilanthropyGalInstagram: https://www.instagram.com/philanthropygalExecutive Producer: Mike HarringtonInstagram: https://www.instagram.com/themharrington/Twitter: https://twitter.com/TheMHarringtonTheme Song By Free VicesWebsite https://www.freevices.com/Apple Music https://music.apple.com/us/artist/free-vices/1475846774Spotify https://open.spotify.com/artist/3fUw9W8zIj6RbibZN2b3kP?si=N8KzuFkvQXSnaejeDqVpIg&nd=1&dlsi=533dddc8672f46f0SoundCloud https://on.soundcloud.com/5sceVeUFADVBJr4P7YouTube https://youtube.com/channel/UCOsgEoQ2-czvD8eWctnxAAw?si=SL1RULNWVuJb8AONInstagram http://instagram.com/free_vicesInauguration Specialhttps://www.infowars.com/posts/on-the-edge-of-inauguration-prophecyEnemy of the State: Culturehttps://www.youtube.com/watch?v=nb7fAEQaJwEPATREONDictator Hannah PendergrassCapitalist Pigs Chris Bi-Polar& my CutiesTikTokCreating A Problemhttps://www.npr.org/2020/08/06/900019185/trump-signs-executive-order-that-will-effectively-ban-use-of-tiktok-in-the-u-shttps://en.wikipedia.org/wiki/Donald_Trump–TikTok_controversyTo Then Later Solve Ithttps://www.reuters.com/technology/tiktok-goes-dark-us-users-trump-says-save-tiktok-2025-01-19/https://www.404media.co/a-tiktok-ban-is-a-gift-to-meta-and-instagram/FOX HEADLINE: Trump saves TikTok day before he's sworn-in as company makes pro-America promiseChicago Mass Deportationhttps://www.newsweek.com/donald-trump-chicago-mass-deportation-raids-ice-2017343100 Executive Ordershttps://www.usatoday.com/story/news/politics/elections/2025/01/19/trump-executive-order-actions-inauguration-president/77692342007/Immigrationhttps://www.washingtonpost.com/immigration/2025/01/19/trump-immigration-agenda-second-term/Trump Ceasefire Dealhttps://hp.taboola.com/nexstar-thehill/log/3/click?pi=%2F&ri=68720c7ab32ace83784124a978fd69c6&sd=v2_403227012e1e04d326ecab4acf2d7bea_db527f3b-5842-4997-b8ac-4ae917c155df-tuctc7b9fd1_1737309625_1737309626_CIi3jgYQw91eGJW35P3HMiABKAQw4QE4kaQOQNWmD0jZiNcDUPUDWABgyR1o9-7K0baSyaqAAXABgAEA&ui=db527f3b-5842-4997-b8ac-4ae917c155df-tuctc7b9fd1&ii=~~V1~~-686814218563389356~~bl_Zi4AKFfKWVgJjR86JtQ&it=text&pt=home&li=rbox-h2v&sig=695a133fb003a9ae6982c55ba35f90ec8c7cc1098d38&vi=1737309625237<i=trecs-pa-feed-test2_var2&r=702&tvi2=17893&tvi48=-48&tvi50=18402&tvi62=21123&ppb=CIsC&cpb=ElMyMDI1MDExNy04X2IxLVBSLTc5OTMxLURFVi0xNzc0NjktdmVyaWZ5LWRsdC1hbmQtbmItaW4tcGEtaW5qZWN0ZWQtY2FyZC0xZWQ4ZDY0OTU1OBjB1dvTBiCc__________8BKhl1cy50YWJvb2xhc3luZGljYXRpb24uY29tMgh0cmMxMDYxMTiAAkCRpA5I1aYPUNmI1wNY9QNjCPgVENQqGCJkYwjMZxDliwEYAmRjCNcWENUfGCNkYwjSAxDgBhgIZGMI8IwBEKKxARgJZGMIn40BEJGyARgKZGMIpCcQijUYL2RjCND__________wEQ0P__________ARgwZGMI3G8Q4o8BGDJkYwjs__________8BEOz__________wEYFGRjCJYUEJccGBhkYwiohQEQ7qgBGDpkYwj_RhDolQEYHWRjCKyBARCDpQEYPmRjCPQUEJ4dGB9kcgwqCbrCpicZcwAAAAB4AYABpm-IAczDxgGQAReYAfPB5P3HMtsBCjh5LThZdWtOSkZHMnVJTzZDWDM5d1R4RHhITXl2V19HWjB5dzVtTUx4MzRtM0ZGSzFqbGFRLS0tQRAB3AE&cv=20250117-8_b1-PR-79931-DEV-177469-verify-dlt-and-nb-in-pa-injected-card-1ed8d649558&route=US%3AUS%3AV&pc=1&url=https%3A%2F%2Fthehill.com%2Fhomenews%2Fadministration%2F5094053-waltz-we-are-going-to-have-a-reagan-moment-with-trump-ceasefire-deal%2F%3Ftbref%3DhpCeasefire What's Happeninghttps://www.npr.org/2025/01/19/g-s1-43571/ceasefire-goes-into-effect-in-gazaSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Get to know behind the scenes of our Member Services team and our Registration and League Compliance Director! In this next episode of Chats with Jacks, we will get an inside look on their day-to-day tasks, communication goals, and learn about the benefits of the PlayMetrics app. You can watch the full episode on our YouTube channel.This video features: - Terina Cullen, Director of Member Services- Brittany Brown, Member Services Director of Boys and Girls National Programs- Brian Martinez, Members Services Program Director of the Mooresville and Matthews locations- Debbie Brooks, Director of Registration and League Compliance- Horacio Velasco, Member Services Program Director of York County and Gaston County- Allan Bornkamp, Member Services Program Director for North Mecklenburg Learn more about Independence Soccer Follow us on social media
Listen to Charlotte Independence Soccer Club's CEO, Thomas Finlay, and Director of Soccer, Neil Roberts, engage in an informative discussion about communication. Get a deeper understanding of our Communication Protocols, Let Us Play policy, 24-hour policy, and more! Watch the full episode on our YouTube channel.Learn more about our Communication Protocol Learn more about Independence Soccer Follow us on social media
Join Barry Slagle, Director of Recreation, and John Tart, Director of the Youth Academy, as they discuss our Recreation and Youth Academy programs in this episode of Chats with Jacks.Barry and John delve into the specifics of each program, including information about coaches, training styles, age groups, and more.Registration for Spring 2025 Recreation Soccer will be opening soon.Recreation Soccer, https://www.independencesoccer.club/recreationYouth Academy, https://www.independencesoccer.club/youth-academy Learn more about Independence Soccer Follow us on social media
Lo scorso 23 settembre, in occasione del centenario dello Scautismo a Gravina di Puglia, comune della città metropolitana di Bari, si è tenuto il dialogo sul tema il metodo scout come esercizio di libertà.Hanno partecipato (con un messaggio audio da remoto) il cardinale Arrigo Miglio (il ruolo della Chiesa nell'educazione scout: libertà, comunità e valori cristiani) e, in presenza, Antonia Chiara Scardicchio (Professoressa Associata di Pedagogia Generale e Sociale presso l'Università di Bari Aldo Moro - lo Scautismo come risorsa educativa e sociale nel tempo della speranza), Francesco Scoppola (Presidente Agesci - Agesci ed associazionismo: educare alla libertà ed alla cittadinanza attiva) e Roberto Cociancich (già Presidente del CISC, capo Agesci - istituzioni e metodo scout: collaborare per l'educazione dei giovani cittadini e degli adulti).
Sem sombra de dúvidas essa Computex pode ter mudado o Desktop para sempre, ao apresentar diversos modelos de laptops que serão agraciados com os novos processadores Snapdragon X Elite da Qualcomm que foram apresentados na feira. Neste episódio do Diocast exploramos o universo dos processadores ARM para desktops, abrindo as portas para um mundo de possibilidades. Hoje, vamos aprofundar um pouco mais nesse assunto, desvendando os mistérios das arquiteturas RISC e CISC. Estas novidades trazem de volta uma briga antiga no mercado de tecnologia, no centro dessa história épica estão dois titãs: RISC (Reduced Instruction Set Computer) e CISC (Complex Instruction Set Computer). Estas que são as arquiteturas-base para os principais processadores usados atualmente, cada um com seus pontos fortes e fracos. O RISC, mestre da agilidade, se destaca por sua elegância e eficiência. Com um conjunto de instruções enxuto e preciso, ele executa cada comando com maestria, gastando menos energia e gerando menos calor. Essa filosofia o torna ideal para dispositivos móveis e embarcados, onde o consumo de bateria e o tamanho compacto são cruciais. Já o CISC, um mago veterano, impressiona com seu arsenal de instruções complexas e versáteis. Capaz de realizar diversas operações com um único comando, ele oferece um código mais conciso e facilita a vida do programador. No entanto, esse poder vem com um preço: maior consumo de energia e mais calor gerado. Perfeito para desktops e servidores, onde a performance bruta reina suprema. E é nesse cenário que os novos processadores Snapdragon X Elite surgem como um sopro de inovação. Unindo o melhor dos dois mundos, eles prometem revolucionar o mundo dos desktops com uma performance épica, eficiência energética de última geração e compatibilidade com uma vasta gama de softwares. Realmente, essa Computex pode ter mudado o Desktop para sempre. --- Deixe seu comentário, ele pode ser lido no próximo programa. https://diolinux.com.br/podcast/essa-computex-mudou-o-desktop.html --- Send in a voice message: https://podcasters.spotify.com/pod/show/diolinux/message
This week, The Brightest Conversation in Hamilton Radio welcomes none other than Keanin Loomis to the show. There's a really decent chance that you know his name as he's been involved with the Ontario Chamber of Commerce as well as the opponent of Andrea Horwath in Hamilton's last mayoral election. Now that approximately a year and a half has passed since that election, Scott wants to get Keanin's take on what's happened so far, what Hamilton and its residents need from City Council as well as what his new position is at the Canadian Institute of Steel Construction, the importance of Father's Day and more. Guest: Keanin Loomis, President & CEO, Canadian Institute of Steel Construction & former mayoral candidate
Nieves Concostrina nos habla del empeño del CISC por poseer los supuestos restos que había de San Isidoro en León.Ya puedes escuchar Polvo eres, exclusivo en Podimo: https://go.podimo.com/es/polvoeres
Nieves Concostrina nos habla del empeño del CISC por poseer los supuestos restos que había de San Isidoro en León.Ya puedes escuchar Polvo eres, exclusivo en Podimo: https://go.podimo.com/es/polvoeres
Nieves Concostrina nos habla del empeño del CISC por poseer los supuestos restos que había de San Isidoro en León.Ya puedes escuchar Polvo eres, exclusivo en Podimo: https://go.podimo.com/es/polvoeres
El Consejo Superior de Investigaciones Científicas (CSIC) es la 7 institución científica más importante del mundo. es una de nuestras joyas. Sólo el año pasado se publicaron más de 15.000 trabajos científicos asociados a este centro. Hemos tenido en La Rosa de los Vientos a la presidenta desde 2022. Un auténtico hito para nuestro programa, en donde nos hablar de uno de los últimos proyectos del CISC: el programa "cazabulos".
Speaker CFPs and Sponsor Guides are now available for AIE World's Fair — join us on June 25-27 for the biggest AI Engineer conference of 2024!Soumith Chintala needs no introduction in the ML world — his insights are incredibly accessible across Twitter, LinkedIn, podcasts, and conference talks (in this pod we'll assume you'll have caught up on the History of PyTorch pod from last year and cover different topics). He's well known as the creator of PyTorch, but he's more broadly the Engineering Lead on AI Infra, PyTorch, and Generative AI at Meta.Soumith was one of the earliest supporters of Latent Space (and more recently AI News), and we were overjoyed to catch up with him on his latest SF visit for a braindump of the latest AI topics, reactions to some of our past guests, and why Open Source AI is personally so important to him.Life in the GPU-Rich LaneBack in January, Zuck went on Instagram to announce their GPU wealth: by the end of 2024, Meta will have 350k H100s. By adding all their GPU clusters, you'd get to 600k H100-equivalents of compute. At FP16 precision, that's ~1,200,000 PFLOPS. If we used George Hotz's (previous guest!) "Person of Compute" measure, Meta now has 60k humans of compute in their clusters. Occasionally we get glimpses into the GPU-rich life; on a recent ThursdAI chat, swyx prompted PaLM tech lead Yi Tay to write down what he missed most from Google, and he commented that UL2 20B was trained by accidentally leaving the training job running for a month, because hardware failures are so rare in Google.Meta AI's Epic LLM RunBefore Llama broke the internet, Meta released an open source LLM in May 2022, OPT-175B, which was notable for how “open” it was - right down to the logbook! They used only 16 NVIDIA V100 GPUs and Soumith agrees that, with hindsight, it was likely under-trained for its parameter size.In Feb 2023 (pre Latent Space pod), Llama was released, with a 7B version trained on 1T tokens alongside 65B and 33B versions trained on 1.4T tokens. The Llama authors included Guillaume Lample and Timothée Lacroix, who went on to start Mistral.July 2023 was Llama2 time (which we covered!): 3 model sizes, 7B, 13B, and 70B, all trained on 2T tokens. The three models accounted for a grand total of 3,311,616 GPU hours for all pre-training work. CodeLlama followed shortly after, a fine-tune of Llama2 specifically focused on code generation use cases. The family had models in the 7B, 13B, 34B, and 70B size, all trained with 500B extra tokens of code and code-related data, except for 70B which is trained on 1T.All of this on top of other open sourced models like Segment Anything (one of our early hits!), Detectron, Detectron 2, DensePose, and Seamless, and in one year, Meta transformed from a company people made fun of for its “metaverse” investments to one of the key players in the AI landscape and its stock has almost tripled since (about $830B in market value created in the past year).Why Open Source AIThe obvious question is why Meta would spend hundreds of millions on its AI efforts and then release them for free. Zuck has addressed this in public statements:But for Soumith, the motivation is even more personal:“I'm irrationally interested in open source. I think open source has that fundamental way to distribute opportunity in a way that is very powerful. Like, I grew up in India… And knowledge was very centralized, but I saw that evolution of knowledge slowly getting decentralized. And that ended up helping me learn quicker and faster for like zero dollars. And I think that was a strong reason why I ended up where I am. So like that, like the open source side of things, I always push regardless of like what I get paid for, like I think I would do that as a passion project on the side……I think at a fundamental level, the most beneficial value of open source is that you make the distribution to be very wide. It's just available with no friction and people can do transformative things in a way that's very accessible. Maybe it's open source, but it has a commercial license and I'm a student in India. I don't care about the license. I just don't even understand the license. But like the fact that I can use it and do something with it is very transformative to me……Like, okay, I again always go back to like I'm a student in India with no money. What is my accessibility to any of these closed source models? At some scale I have to pay money. That makes it a non-starter and stuff. And there's also the control issue: I strongly believe if you want human aligned AI, you want all humans to give feedback. And you want all humans to have access to that technology in the first place. And I actually have seen, living in New York, whenever I come to Silicon Valley, I see a different cultural bubble.We like the way Soumith put it last year: Closed AI “rate-limits against people's imaginations and needs”!What It Takes For Open Source AI to WinHowever Soumith doesn't think Open Source will simply win by popular demand. There is a tremendous coordination problem with the decentralized nature of the open source AI development right now: nobody is collecting the valuable human feedback in the way that OpenAI or Midjourney are doing.“Open source in general always has a coordination problem. If there's a vertically integrated provider with more resources, they will just be better coordinated than open source. And so now open source has to figure out how to have coordinated benefits. And the reason you want coordinated benefits is because these models are getting better based on human feedback. And if you see with open source models, like if you go to the /r/localllama subreddit, like there's so many variations of models that are being produced from, say, Nous research. I mean, like there's like so many variations built by so many people. And one common theme is they're all using these fine-tuning or human preferences datasets that are very limited and they're not sufficiently diverse. And you look at the other side, say front-ends like Oobabooga or like Hugging Chat or Ollama, they don't really have feedback buttons. All the people using all these front-ends, they probably want to give feedback, but there's no way for them to give feedback… So we're just losing all of this feedback. Maybe open source models are being as used as GPT is at this point in like all kinds of, in a very fragmented way, like in aggregate all the open source models together are probably being used as much as GPT is, maybe close to that. But the amount of feedback that is driving back into the open source ecosystem is like negligible, maybe less than 1% of like the usage. So I think like some, like the blueprint here I think is you'd want someone to create a sinkhole for the feedback… I think if we do that, if that actually happens, I think that probably has a real chance of the open source models having a runaway effect against OpenAI, I think like there's a clear chance we can take at truly winning open source.”If you're working on solving open source coordination, please get in touch!Show Notes* Soumith Chintala Twitter* History of PyTorch episode on Gradient Podcast* The Llama Ecosystem* Apple's MLX* Neural ODEs (Ordinary Differential Equations)* AlphaGo* LMSys arena* Dan Pink's "Drive"* Robotics projects:* Dobb-E* OK Robot* Yann LeCun* Yangqing Jia of Lepton AI* Ed Catmull* George Hotz on Latent Space* Chris Lattner on Latent Space* Guillaume Lample* Yannic Kilcher of OpenAssistant* LMSys* Alex Atallah of OpenRouter* Carlo Sferrazza's 3D tactile research* Alex Wiltschko of Osmo* Tangent by Alex Wiltschko* Lerrel Pinto - RoboticsTimestamps* [00:00:00] Introductions* [00:00:51] Extrinsic vs Intrinsic Success* [00:02:40] Importance of Open Source and Its Impact* [00:03:46] PyTorch vs TinyGrad* [00:08:33] Why PyTorch is the Switzerland of frameworks* [00:10:27] Modular's Mojo + PyTorch?* [00:13:32] PyTorch vs Apple's MLX* [00:16:27] FAIR / PyTorch Alumni* [00:18:50] How can AI inference providers differentiate?* [00:21:41] How to build good benchmarks and learnings from AnyScale's* [00:25:28] Most interesting unexplored ideas* [00:28:18] What people get wrong about synthetic data* [00:35:57] Meta AI's evolution* [00:38:42] How do you allocate 600,000 GPUs?* [00:42:05] Even the GPU Rich are GPU Poor* [00:47:31] Meta's MTIA silicon* [00:50:09] Why we need open source* [00:59:00] Open source's coordination problem for feedback gathering* [01:08:59] Beyond text generation* [01:15:37] Osmo and the Future of Smell Recognition TechnologyTranscriptAlessio [00:00:00]: Hey everyone, welcome to the Latent Space podcast. This is Alessio, partner and CTO in residence at Decibel Partners, and I'm joined by my co-host Swyx, founder of Smol AI.Swyx [00:00:15]: Hey, and today we have in the studio Soumith Chintala, welcome.Soumith [00:00:17]: Thanks for having me.Swyx [00:00:18]: On one of your rare visits from New York where you live. You got your start in computer vision at NYU with Yann LeCun. That was a very fortuitous start. I was actually listening to your interview on the Gradient podcast. So if people want to know more about the history of Soumith, history of PyTorch, they can go to that podcast. We won't spend that much time there, but I just was marveling at your luck, or I don't know if it's your luck or your drive to find AI early and then find the right quality mentor because I guess Yan really sort of introduced you to that world.Soumith [00:00:51]: Yeah, I think you're talking about extrinsic success, right? A lot of people just have drive to do things that they think is fun, and a lot of those things might or might not be extrinsically perceived as good and successful. I think I just happened to like something that is now one of the coolest things in the world or whatever. But if I happen, the first thing I tried to become was a 3D VFX artist, and I was really interested in doing that, but I turned out to be very bad at it. So I ended up not doing that further. But even if I was good at that, whatever, and I ended up going down that path, I probably would have been equally happy. It's just like maybe like the perception of, oh, is this person successful or not might be different. I think like after a baseline, like your happiness is probably more correlated with your intrinsic stuff.Swyx [00:01:44]: Yes. I think Dan Pink has this book on drive that I often refer to about the power of intrinsic motivation versus extrinsic and how long extrinsic lasts. It's not very long at all. But anyway, now you are an investor in Runway, so in a way you're working on VFX. Yes.Soumith [00:02:01]: I mean, in a very convoluted way.Swyx [00:02:03]: It reminds me of Ed Catmull. I don't know if you guys know, but he actually tried to become an animator in his early years and failed or didn't get accepted by Disney and then went and created Pixar and then got bought by Disney and created Toy Story. So you joined Facebook in 2014 and eventually became a creator and maintainer of PyTorch. And there's this long story there you can refer to on the gradient. I think maybe people don't know that you also involved in more sort of hardware and cluster decision affair. And we can dive into more details there because we're all about hardware this month. Yeah. And then finally, I don't know what else, like what else should people know about you on a personal side or professional side?Soumith [00:02:40]: I think open source is definitely a big passion of mine and probably forms a little bit of my identity at this point. I'm irrationally interested in open source. I think open source has that fundamental way to distribute opportunity in a way that is very powerful. Like, I grew up in India. I didn't have internet for a while. In college, actually, I didn't have internet except for GPRS or whatever. And knowledge was very centralized, but I saw that evolution of knowledge slowly getting decentralized. And that ended up helping me learn quicker and faster for zero dollars. And I think that was a strong reason why I ended up where I am. So the open source side of things, I always push regardless of what I get paid for, like I think I would do that as a passion project on the side.Swyx [00:03:35]: Yeah, that's wonderful. Well, we'll talk about the challenges as well that open source has, open models versus closed models. Maybe you want to touch a little bit on PyTorch before we move on to the sort of Meta AI in general.PyTorch vs Tinygrad tradeoffsAlessio [00:03:46]: Yeah, we kind of touched on PyTorch in a lot of episodes. So we had George Hotz from TinyGrad. He called PyTorch a CISC and TinyGrad a RISC. I would love to get your thoughts on PyTorch design direction as far as, I know you talk a lot about kind of having a happy path to start with and then making complexity hidden away but then available to the end user. One of the things that George mentioned is I think you have like 250 primitive operators in PyTorch, I think TinyGrad is four. So how do you think about some of the learnings that maybe he's going to run into that you already had in the past seven, eight years almost of running PyTorch?Soumith [00:04:24]: Yeah, I think there's different models here, but I think it's two different models that people generally start with. Either they go like, I have a grand vision and I'm going to build a giant system that achieves this grand vision and maybe one is super feature complete or whatever. Or other people say they will get incrementally ambitious, right? And they say, oh, we'll start with something simple and then we'll slowly layer out complexity in a way that optimally applies Huffman coding or whatever. Like where the density of users are and what they're using, I would want to keep it in the easy, happy path and where the more niche advanced use cases, I'll still want people to try them, but they need to take additional frictional steps. George, I think just like we started with PyTorch, George started with the incrementally ambitious thing. I remember TinyGrad used to be, like we would be limited to a thousand lines of code and I think now it's at 5,000. So I think there is no real magic to which why PyTorch has the kind of complexity. I think it's probably partly necessitated and partly because we built with the technology available under us at that time, PyTorch is like 190,000 lines of code or something at this point. I think if you had to rewrite it, we would probably think about ways to rewrite it in a vastly simplified way for sure. But a lot of that complexity comes from the fact that in a very simple, explainable way, you have memory hierarchies. You have CPU has three levels of caches and then you have DRAM and SSD and then you have network. Similarly, GPU has several levels of memory and then you have different levels of network hierarchies, NVLink plus InfiniBand or Rocky or something like that, right? And the way the flops are available on your hardware, they are available in a certain way and your computation is in a certain way and you have to retrofit your computation onto both the memory hierarchy and like the flops available. When you're doing this, it is actually a fairly hard mathematical problem to do this setup, like you find the optimal thing. And finding the optimal thing is, what is optimal depends on the input variables themselves. So like, okay, what is the shape of your input tensors and what is the operation you're trying to do and various things like that. Finding that optimal configuration and writing it down in code is not the same for every input configuration you have. Like for example, just as the shape of the tensors change, let's say you have three input tensors into a Sparstar product or something like that. The shape of each of these input tensors will vastly change how you do this optimally placing this operation onto the hardware in a way that will get you maximal throughput. So a lot of our complexity comes from writing out hundreds of configurations for each single PyTorch operator and templatizing these things and symbolically generating the final CUDA code or CPU code. There's no way to avoid it because mathematically we haven't found symbolic ways to do this that also keep compile time near zero. You can write a very simple framework, but then you also should be willing to eat the long compile time. So if searching for that optimal performance at runtime, but that's the trade off. There's no, like, I don't think unless we have great breakthroughs George's vision is achievable, he should be thinking about a narrower problem such as I'm only going to make this for work for self-driving car connets or I'm only going to make this work for LLM transformers of the llama style. Like if you start narrowing the problem down, you can make a vastly simpler framework. But if you don't, if you need the generality to power all of the AI research that is happening and keep zero compile time and in all these other factors, I think it's not easy to avoid the complexity.Pytorch vs MojoAlessio [00:08:33]: That's interesting. And we kind of touched on this with Chris Lattner when he was on the podcast. If you think about frameworks, they have the model target. They have the hardware target. They have different things to think about. He mentioned when he was at Google, TensorFlow trying to be optimized to make TPUs go brr, you know, and go as fast. I think George is trying to make especially AMD stack be better than ROCm. How come PyTorch has been such as Switzerland versus just making Meta hardware go brr?Soumith [00:09:00]: First, Meta is not in the business of selling hardware. Meta is not in the business of cloud compute. The way Meta thinks about funding PyTorch is we're funding it because it's net good for Meta to fund PyTorch because PyTorch has become a standard and a big open source project. And generally it gives us a timeline edge. It gives us leverage and all that within our own work. So why is PyTorch more of a Switzerland rather than being opinionated? I think the way we think about it is not in terms of Switzerland or not. We actually the way we articulate it to all hardware vendors and software vendors and all who come to us being we want to build a backend in core for PyTorch and ship it by default is we just only look at our user side of things. Like if users are using a particular piece of hardware, then we want to support it. We very much don't want to king make the hardware side of things. So as the MacBooks have GPUs and as that stuff started getting increasingly interesting, we pushed Apple to push some engineers and work on the NPS support and we spend significant time from Meta funded engineers on that as well because a lot of people are using the Apple GPUs and there's demand. So we kind of mostly look at it from the demand side. We never look at it from like oh which hardware should we start taking opinions on.Swyx [00:10:27]: Is there a future in which, because Mojo or Modular Mojo is kind of a superset of Python, is there a future in which PyTorch might use Mojo features optionally?Soumith [00:10:36]: I think it depends on how well integrated it is into the Python ecosystem. So if Mojo is like a pip install and it's readily available and users feel like they can use Mojo so smoothly within their workflows in a way that just is low friction, we would definitely look into that. Like in the same way PyTorch now depends on Triton, OpenAI Triton, and we never had a conversation that was like huh, that's like a dependency. Should we just build a Triton of our own or should we use Triton? It almost doesn't, like those conversations don't really come up for us. The conversations are more well does Triton have 10,000 dependencies and is it hard to install? We almost don't look at these things from a strategic leverage point of view. We look at these things from a user experience point of view, like is it easy to install? Is it smoothly integrated and does it give enough benefits for us to start depending on it? If so, yeah, we should consider it. That's how we think about it.Swyx [00:11:37]: You're inclusive by default as long as it meets the minimum bar of, yeah, but like maybe I phrased it wrongly. Maybe it's more like what problems would you look to solve that you have right now?Soumith [00:11:48]: I think it depends on what problems Mojo will be useful at.Swyx [00:11:52]: Mainly a performance pitch, some amount of cross compiling pitch.Soumith [00:11:56]: Yeah, I think the performance pitch for Mojo was like, we're going to be performant even if you have a lot of custom stuff, you're going to write arbitrary custom things and we will be performant. And that value proposition is not clear to us from the PyTorch side to consider it for PyTorch. So PyTorch, it's actually not 250 operators, it's like a thousand operators. PyTorch exposes about a thousand operators and people kind of write their ideas in the thousand operators of PyTorch. Mojo is like, well, maybe it's okay to completely sidestep those thousand operators of PyTorch and just write it in a more natural form. Just write raw Python, write for loops or whatever, right? So from the consideration of how do we intersect PyTorch with Mojo, I can see one use case where you have custom stuff for some parts of your program, but mostly it's PyTorch. And so we can probably figure out how to make it easier for say Torch.compile to smoothly also consume Mojo subgraphs and like, you know, the interoperability being actually usable, that I think is valuable. But Mojo as a fundamental front end would be replacing PyTorch, not augmenting PyTorch. So in that sense, I don't see a synergy in more deeply integrating Mojo.Pytorch vs MLXSwyx [00:13:21]: So call out to Mojo whenever they have written something in Mojo and there's some performance related thing going on. And then since you mentioned Apple, what should people think of PyTorch versus MLX?Soumith [00:13:32]: I mean, MLX is early and I know the folks well, Ani used to work at FAIR and I used to chat with him all the time. He used to be based out of New York as well. The way I think about MLX is that MLX is specialized for Apple right now. It has a happy path because it's defined its product in a narrow way. At some point MLX either says we will only be supporting Apple and we will just focus on enabling, you know, there's a framework if you use your MacBook, but once you like go server side or whatever, that's not my problem and I don't care. For MLS, it enters like the server side set of things as well. Like one of these two things will happen, right? If the first thing will happen, like MLX's overall addressable market will be small, but it probably do well within that addressable market. If it enters the second phase, they're going to run into all the same complexities that we have to deal with. They will not have any magic wand and they will have more complex work to do. They probably wouldn't be able to move as fast.Swyx [00:14:44]: Like having to deal with distributed compute?Soumith [00:14:48]: Distributed, NVIDIA and AMD GPUs, like just like having a generalization of the concept of a backend, how they treat compilation with plus overheads. Right now they're deeply assumed like the whole NPS graph thing. So they need to think about all these additional things if they end up expanding onto the server side and they'll probably build something like PyTorch as well, right? Like eventually that's where it will land. And I think there they will kind of fail on the lack of differentiation. Like it wouldn't be obvious to people why they would want to use it.Swyx [00:15:24]: I mean, there are some cloud companies offering M1 and M2 chips on servers. I feel like it might be interesting for Apple to pursue that market, but it's not their core strength.Soumith [00:15:33]: Yeah. If Apple can figure out their interconnect story, maybe, like then it can become a thing.Swyx [00:15:40]: Honestly, that's more interesting than the cars. Yes.Soumith [00:15:43]: I think the moat that NVIDIA has right now, I feel is that they have the interconnect that no one else has, like AMD GPUs are pretty good. I'm sure there's various silicon that is not bad at all, but the interconnect, like NVLink is uniquely awesome. I'm sure the other hardware providers are working on it, but-Swyx [00:16:04]: I feel like when you say it's uniquely awesome, you have some appreciation of it that the rest of us don't. I mean, the rest of us just like, you know, we hear marketing lines, but what do you mean when you say NVIDIA is very good at networking? Obviously they made the acquisition maybe like 15 years ago.Soumith [00:16:15]: Just the bandwidth it offers and the latency it offers. I mean, TPUs also have a good interconnect, but you can't buy them. So you have to go to Google to use it.PyTorch MafiaAlessio [00:16:27]: Who are some of the other FAIR PyTorch alumni that are building cool companies? I know you have Fireworks AI, Lightning AI, Lepton, and Yangqing, you knew since college when he was building Coffee?Soumith [00:16:40]: Yeah, so Yangqing and I used to be framework rivals, PyTorch, I mean, we were all a very small close-knit community back then. Caffe, Torch, Theano, Chainer, Keras, various frameworks. I mean, it used to be more like 20 frameworks. I can't remember all the names. CCV by Liu Liu, who is also based out of SF. And I would actually like, you know, one of the ways it was interesting is you went into the framework guts and saw if someone wrote their own convolution kernel or they were just copying someone else's. There were four or five convolution kernels that were unique and interesting. There was one from this guy out of Russia, I forgot the name, but I remembered who was awesome enough to have written their own kernel. And at some point there, I built out these benchmarks called ConNet benchmarks. They're just benchmarking all the convolution kernels that are available at that time. It hilariously became big enough that at that time AI was getting important, but not important enough that industrial strength players came in to do these kinds of benchmarking and standardization. Like we have MLPerf today. So a lot of the startups were using ConNet benchmarks in their pitch decks as like, oh, you know, on ConNet benchmarks, this is how we fare, so you should fund us. I remember Nirvana actually was at the top of the pack because Scott Gray wrote amazingly fast convolution kernels at that time. Very interesting, but separate times. But to answer your question, Alessio, I think mainly Lepton, Fireworks are the two most obvious ones, but I'm sure the fingerprints are a lot wider. They're just people who worked within the PyTorch Cafe2 cohort of things and now end up at various other places.Swyx [00:18:50]: I think as a, both as an investor and a people looking to build on top of their services, it's a uncomfortable slash like, I don't know what I don't know pitch. Because I've met Yang Tsing and I've met Lin Chao. Yeah, I've met these folks and they're like, you know, we are deep in the PyTorch ecosystem and we serve billions of inferences a day or whatever at Facebook and now we can do it for you. And I'm like, okay, that's great. Like, what should I be wary of or cautious of when these things happen? Because I'm like, obviously this experience is extremely powerful and valuable. I just don't know what I don't know. Like, what should people know about like these sort of new inference as a service companies?Soumith [00:19:32]: I think at that point you would be investing in them for their expertise of one kind. So if they've been at a large company, but they've been doing amazing work, you would be thinking about it as what these people bring to the table is that they're really good at like GPU programming or understanding the complexity of serving models once it hits a certain scale. You know, various expertise like from the infra and AI and GPUs point of view. What you would obviously want to figure out is whether their understanding of the external markets is clear, whether they know and understand how to think about running a business, understanding how to be disciplined about making money or, you know, various things like that.Swyx [00:20:23]: Maybe I'll put it like, actually I will de-emphasize the investing bit and just more as a potential customer. Oh, okay. Like, it's more okay, you know, you have PyTorch gods, of course. Like, what else should I know?Soumith [00:20:37]: I mean, I would not care about who's building something. If I'm trying to be a customer, I would care about whether...Swyx [00:20:44]: Benchmarks.Soumith [00:20:44]: Yeah, I use it and it's usability and reliability and speed, right?Swyx [00:20:51]: Quality as well.Soumith [00:20:51]: Yeah, if someone from some random unknown place came to me and say, user stuff is great. Like, and I have the bandwidth, I probably will give it a shot. And if it turns out to be great, like I'll just use it.Benchmark dramaSwyx [00:21:07]: Okay, great. And then maybe one more thing about benchmarks, since we already brought it up and you brought up Confident Benchmarks. There was some recent drama around AnyScale. AnyScale released their own benchmarks and obviously they look great on their own benchmarks, but maybe didn't give the other... I feel there are two lines of criticism. One, which is they didn't test some apples for apples on the kind of endpoints that the other providers, that they are competitors with, on their benchmarks and that is due diligence baseline. And then the second would be more just optimizing for the right thing. You had some commentary on it. I'll just kind of let you riff.Soumith [00:21:41]: Yeah, I mean, in summary, basically my criticism of that was AnyScale built these benchmarks for end users to just understand what they should pick, right? And that's a very good thing to do. I think what they didn't do a good job of is give that end user a full understanding of what they should pick. Like they just gave them a very narrow slice of understanding. I think they just gave them latency numbers and that's not sufficient, right? You need to understand your total cost of ownership at some reasonable scale. Not oh, one API call is one cent, but a thousand API calls are 10 cents. Like people can misprice to cheat on those benchmarks. So you want to understand, okay, like how much is it going to cost me if I actually subscribe to you and do like a million API calls a month or something? And then you want to understand the latency and reliability, not just from one call you made, but an aggregate of calls you've made over several various times of the day and times of the week. And the nature of the workloads, is it just some generic single paragraph that you're sending that is cashable? Or is it like testing of real world workload? I think that kind of rigor, like in presenting that benchmark wasn't there. It was a much more narrow sliver of what should have been a good benchmark. That was my main criticism. And I'm pretty sure if before they released it, they showed it to their other stakeholders who would be caring about this benchmark because they are present in it, they would have easily just pointed out these gaps. And I think they didn't do that and they just released it. So I think those were the two main criticisms. I think they were fair and Robert took it well.Swyx [00:23:40]: And he took it very well. And we'll have him on at some point and we'll discuss it. But I think it's important for, I think the market being maturing enough that people start caring and competing on these kinds of things means that we need to establish what best practice is because otherwise everyone's going to play dirty.Soumith [00:23:55]: Yeah, absolutely. My view of the LLM inference market in general is that it's the laundromat model. Like the margins are going to drive down towards the bare minimum. It's going to be all kinds of arbitrage between how much you can get the hardware for and then how much you sell the API and how much latency your customers are willing to let go. You need to figure out how to squeeze your margins. Like what is your unique thing here? Like I think Together and Fireworks and all these people are trying to build some faster CUDA kernels and faster, you know, hardware kernels in general. But those modes only last for a month or two. These ideas quickly propagate.Swyx [00:24:38]: Even if they're not published?Soumith [00:24:39]: Even if they're not published, the idea space is small. So even if they're not published, the discovery rate is going to be pretty high. It's not like we're talking about a combinatorial thing that is really large. You're talking about Llama style LLM models. And we're going to beat those to death on a few different hardware SKUs, right? Like it's not even we have a huge diversity of hardware you're going to aim to run it on. Now when you have such a narrow problem and you have a lot of people working on it, the rate at which these ideas are going to get figured out is going to be pretty rapid.Swyx [00:25:15]: Is it a standard bag of tricks? Like the standard one that I know of is, you know, fusing operators and-Soumith [00:25:22]: Yeah, it's the standard bag of tricks on figuring out how to improve your memory bandwidth and all that, yeah.Alessio [00:25:28]: Any ideas instead of things that are not being beaten to death that people should be paying more attention to?Novel PyTorch ApplicationsSwyx [00:25:34]: One thing I was like, you know, you have a thousand operators, right? Like what's the most interesting usage of PyTorch that you're seeing maybe outside of this little bubble?Soumith [00:25:41]: So PyTorch, it's very interesting and scary at the same time, but basically it's used in a lot of exotic ways, like from the ML angle, what kind of models are being built? And you get all the way from state-based models and all of these things to stuff nth order differentiable models, like neural ODEs and stuff like that. I think there's one set of interestingness factor from the ML side of things. And then there's the other set of interesting factor from the applications point of view. It's used in Mars Rover simulations, to drug discovery, to Tesla cars. And there's a huge diversity of applications in which it is used. So in terms of the most interesting application side of things, I think I'm scared at how many interesting things that are also very critical and really important it is used in. I think the scariest was when I went to visit CERN at some point and they said they were using PyTorch and they were using GANs at the same time for particle physics research. And I was scared more about the fact that they were using GANs than they were using PyTorch, because at that time I was a researcher focusing on GANs. But the diversity is probably the most interesting. How many different things it is being used in. I think that's the most interesting to me from the applications perspective. From the models perspective, I think I've seen a lot of them. Like the really interesting ones to me are where we're starting to combine search and symbolic stuff with differentiable models, like the whole AlphaGo style models is one example. And then I think we're attempting to do it for LLMs as well, with various reward models and search. I mean, I don't think PyTorch is being used in this, but the whole alpha geometry thing was interesting because again, it's an example of combining the symbolic models with the gradient based ones. But there are stuff like alpha geometry that PyTorch is used at, especially when you intersect biology and chemistry with ML. In those areas, you want stronger guarantees on the output. So yeah, maybe from the ML side, those things to me are very interesting right now.Swyx [00:28:03]: Yeah. People are very excited about the alpha geometry thing. And it's kind of like, for me, it's theoretical. It's great. You can solve some Olympia questions. I'm not sure how to make that bridge over into the real world applications, but I'm sure people smarter than me will figure it out.Synthetic Data vs Symbolic ModelsSoumith [00:28:18]: Let me give you an example of it. You know how the whole thing about synthetic data will be the next rage in LLMs is a thing?Swyx [00:28:27]: Already is a rage.Soumith [00:28:28]: Which I think is fairly misplaced in how people perceive it. People think synthetic data is some kind of magic wand that you wave and it's going to be amazing. Synthetic data is useful in neural networks right now because we as humans have figured out a bunch of symbolic models of the world or made up certain symbolic models because of human innate biases. So we've figured out how to ground particle physics in a 30 parameter model. And it's just very hard to compute as in it takes a lot of flops to compute, but it only has 30 parameters or so. I mean, I'm not a physics expert, but it's a very low rank model. We built mathematics as a field that basically is very low rank. Language, a deep understanding of language, like the whole syntactic parse trees and just understanding how language can be broken down and into a formal symbolism is something that we figured out. So we basically as humans have accumulated all this knowledge on these subjects, either synthetic, we created those subjects in our heads, or we grounded some real world phenomenon into a set of symbols. But we haven't figured out how to teach neural networks symbolic world models directly. The only way we have to teach them is generating a bunch of inputs and outputs and gradient dissenting over them. So in areas where we have the symbolic models and we need to teach all the knowledge we have that is better encoded in the symbolic models, what we're doing is we're generating a bunch of synthetic data, a bunch of input output pairs, and then giving that to the neural network and asking it to learn the same thing that we already have a better low rank model of in gradient descent in a much more over-parameterized way. Outside of this, like where we don't have good symbolic models, like synthetic data obviously doesn't make any sense. So synthetic data is not a magic wand where it'll work in all cases in every case or whatever. It's just where we as humans already have good symbolic models off. We need to impart that knowledge to neural networks and we figured out the synthetic data is a vehicle to impart this knowledge to. So, but people, because maybe they don't know enough about synthetic data as a notion, but they hear, you know, the next wave of data revolution is synthetic data. They think it's some kind of magic where we just create a bunch of random data somehow. They don't think about how, and then they think that's just a revolution. And I think that's maybe a gap in understanding most people have in this hype cycle.Swyx [00:31:23]: Yeah, well, it's a relatively new concept, so. Oh, there's two more that I'll put in front of you and then you can see what you respond. One is, you know, I have this joke that it's, you know, it's only synthetic data if it's from the Mistral region of France, otherwise it's just a sparkling distillation, which is what news research is doing. Like they're distilling GPT-4 by creating synthetic data from GPT-4, creating mock textbooks inspired by Phi 2 and then fine tuning open source models like Llama. And so I don't know, I mean, I think that's, should we call that synthetic data? Should we call it something else? I don't know.Soumith [00:31:57]: Yeah, I mean, the outputs of LLMs, are they synthetic data? They probably are, but I think it depends on the goal you have. If your goal is you're creating synthetic data with the goal of trying to distill GPT-4's superiority into another model, I guess you can call it synthetic data, but it also feels like disingenuous because your goal is I need to copy the behavior of GPT-4 and-Swyx [00:32:25]: It's also not just behavior, but data set. So I've often thought of this as data set washing. Like you need one model at the top of the chain, you know, unnamed French company that has that, you know, makes a model that has all the data in it that we don't know where it's from, but it's open source, hey, and then we distill from that and it's great. To be fair, they also use larger models as judges for preference ranking, right? So that is, I think, a very, very accepted use of synthetic.Soumith [00:32:53]: Correct. I think it's a very interesting time where we don't really have good social models of what is acceptable depending on how many bits of information you use from someone else, right? It's like, okay, you use one bit. Is that okay? Yeah, let's accept it to be okay. Okay, what about if you use 20 bits? Is that okay? I don't know. What if you use 200 bits? I don't think we as society have ever been in this conundrum where we have to be like, where is the boundary of copyright or where is the boundary of socially accepted understanding of copying someone else? We haven't been tested this mathematically before,Swyx [00:33:38]: in my opinion. Whether it's transformative use. Yes. So yeah, I think this New York Times opening eye case is gonna go to the Supreme Court and we'll have to decide it because I think we never had to deal with it before. And then finally, for synthetic data, the thing that I'm personally exploring is solving this great stark paradigm difference between rag and fine tuning, where you can kind of create synthetic data off of your retrieved documents and then fine tune on that. That's kind of synthetic. All you need is variation or diversity of samples for you to fine tune on. And then you can fine tune new knowledge into your model. I don't know if you've seen that as a direction for synthetic data.Soumith [00:34:13]: I think you're basically trying to, what you're doing is you're saying, well, language, I know how to parametrize language to an extent. And I need to teach my model variations of this input data so that it's resilient or invariant to language uses of that data.Swyx [00:34:32]: Yeah, it doesn't overfit on the wrong source documents.Soumith [00:34:33]: So I think that's 100% synthetic. You understand, the key is you create variations of your documents and you know how to do that because you have a symbolic model or like some implicit symbolic model of language.Swyx [00:34:48]: Okay.Alessio [00:34:49]: Do you think the issue with symbolic models is just the architecture of the language models that we're building? I think maybe the thing that people grasp is the inability of transformers to deal with numbers because of the tokenizer. Is it a fundamental issue there too? And do you see alternative architectures that will be better with symbolic understanding?Soumith [00:35:09]: I am not sure if it's a fundamental issue or not. I think we just don't understand transformers enough. I don't even mean transformers as an architecture. I mean the use of transformers today, like combining the tokenizer and transformers and the dynamics of training, when you show math heavy questions versus not. I don't have a good calibration of whether I know the answer or not. I, you know, there's common criticisms that are, you know, transformers will just fail at X. But then when you scale them up to sufficient scale, they actually don't fail at that X. I think there's this entire subfield where they're trying to figure out these answers called like the science of deep learning or something. So we'll get to know more. I don't know the answer.Meta AI and Llama 2/3Swyx [00:35:57]: Got it. Let's touch a little bit on just Meta AI and you know, stuff that's going on there. Maybe, I don't know how deeply you're personally involved in it, but you're our first guest with Meta AI, which is really fantastic. And Llama 1 was, you know, you are such a believer in open source. Llama 1 was more or less the real breakthrough in open source AI. The most interesting thing for us covering on this, in this podcast was the death of Chinchilla, as people say. Any interesting insights there around the scaling models for open source models or smaller models or whatever that design decision was when you guys were doing it?Soumith [00:36:31]: So Llama 1 was Guillaume Lample and team. There was OPT before, which I think I'm also very proud of because we bridged the gap in understanding of how complex it is to train these models to the world. Like until then, no one really in gory detail published.Swyx [00:36:50]: The logs.Soumith [00:36:51]: Yeah. Like, why is it complex? And everyone says, oh, it's complex. But no one really talked about why it's complex. I think OPT was cool.Swyx [00:37:02]: I met Susan and she's very, very outspoken. Yeah.Soumith [00:37:05]: We probably, I think, didn't train it for long enough, right? That's kind of obvious in retrospect.Swyx [00:37:12]: For a 175B. Yeah. You trained it according to Chinchilla at the time or?Soumith [00:37:17]: I can't remember the details, but I think it's a commonly held belief at this point that if we trained OPT longer, it would actually end up being better. Llama 1, I think, was Guillaume Lample and team Guillaume is fantastic and went on to build Mistral. I wasn't too involved in that side of things. So I don't know what you're asking me, which is how did they think about scaling loss and all of that? Llama 2, I was more closely involved in. I helped them a reasonable amount with their infrastructure needs and stuff. And Llama 2, I think, was more like, let's get to the evolution. At that point, we kind of understood what we were missing from the industry's understanding of LLMs. And we needed more data and we needed more to train the models for longer. And we made, I think, a few tweaks to the architecture and we scaled up more. And that was Llama 2. I think Llama 2, you can think of it as after Guillaume left, the team kind of rebuilt their muscle around Llama 2. And Hugo, I think, who's the first author is fantastic. And I think he did play a reasonable big role in Llama 1 as well.Soumith [00:38:35]: And he overlaps between Llama 1 and 2. So in Llama 3, obviously, hopefully, it'll be awesome.Alessio [00:38:42]: Just one question on Llama 2, and then we'll try and fish Llama 3 spoilers out of you. In the Llama 2 paper, the loss curves of the 34 and 70B parameter, they still seem kind of steep. Like they could go lower. How, from an infrastructure level, how do you allocate resources? Could they have just gone longer or were you just, hey, this is all the GPUs that we can burn and let's just move on to Llama 3 and then make that one better?Soumith [00:39:07]: Instead of answering specifically about that Llama 2 situation or whatever, I'll tell you how we think about things. Generally, we're, I mean, Mark really is some numbers, right?Swyx [00:39:20]: So let's cite those things again. All I remember is like 600K GPUs.Soumith [00:39:24]: That is by the end of this year and 600K H100 equivalents. With 250K H100s, including all of our other GPU or accelerator stuff, it would be 600-and-something-K aggregate capacity.Swyx [00:39:38]: That's a lot of GPUs.Soumith [00:39:39]: We'll talk about that separately. But the way we think about it is we have a train of models, right? Llama 1, 2, 3, 4. And we have a bunch of GPUs. I don't think we're short of GPUs. Like-Swyx [00:39:54]: Yeah, no, I wouldn't say so. Yeah, so it's all a matter of time.Soumith [00:39:56]: I think time is the biggest bottleneck. It's like, when do you stop training the previous one and when do you start training the next one? And how do you make those decisions? The data, do you have net new data, better clean data for the next one in a way that it's not worth really focusing on the previous one? It's just a standard iterative product. You're like, when is the iPhone 1? When do you start working on iPhone 2? Where is the iPhone? And so on, right? So mostly the considerations are time and generation, rather than GPUs, in my opinion.Alessio [00:40:31]: So one of the things with the scaling loss, like Chinchilla is optimal to balance training and inference costs. I think at Meta's scale, you would rather pay a lot more maybe at training and then save on inference. How do you think about that from infrastructure perspective? I think in your tweet, you say you can try and guess on like how we're using these GPUs. Can you just give people a bit of understanding? It's like, because I've already seen a lot of VCs say, Llama 3 has been trained on 600,000 GPUs and that's obviously not true, I'm sure. How do you allocate between the research, FAIR and the Llama training, the inference on Instagram suggestions that get me to scroll, like AI-generated stickers on WhatsApp and all of that?Soumith [00:41:11]: Yeah, we haven't talked about any of this publicly, but as a broad stroke, it's like how we would allocate resources of any other kinds at any company. You run a VC portfolio, how do you allocate your investments between different companies or whatever? You kind of make various trade-offs and you kind of decide, should I invest in this project or this other project, or how much should I invest in this project? It's very much a zero sum of trade-offs. And it also comes into play, how are your clusters configured, like overall, what you can fit of what size and what cluster and so on. So broadly, there's no magic sauce here. I mean, I think the details would add more spice, but also wouldn't add more understanding. It's just gonna be like, oh, okay, I mean, this looks like they just think about this as I would normally do.Alessio [00:42:05]: So even the GPU rich run through the same struggles of having to decide where to allocate things.Soumith [00:42:11]: Yeah, I mean, at some point I forgot who said it, but you kind of fit your models to the amount of compute you have. If you don't have enough compute, you figure out how to make do with smaller models. But no one as of today, I think would feel like they have enough compute. I don't think I've heard any company within the AI space be like, oh yeah, like we feel like we have sufficient compute and we couldn't have done better. So that conversation, I don't think I've heard from any of my friends at other companies.EleutherSwyx [00:42:47]: Stella from Eleuther sometimes says that because she has a lot of donated compute. She's trying to put it to interesting uses, but for some reason she's decided to stop making large models.Soumith [00:42:57]: I mean, that's a cool, high conviction opinion that might pay out.Swyx [00:43:01]: Why?Soumith [00:43:02]: I mean, she's taking a path that most people don't care to take about in this climate and she probably will have very differentiated ideas. I mean, think about the correlation of ideas in AI right now. It's so bad, right? So everyone's fighting for the same pie. In some weird sense, that's partly why I don't really directly work on LLMs. I used to do image models and stuff and I actually stopped doing GANs because GANs were getting so hot that I didn't have any calibration of whether my work would be useful or not because, oh yeah, someone else did the same thing you did. It's like, there's so much to do, I don't understand why I need to fight for the same pie. So I think Stella's decision is very smart.Making BetsAlessio [00:43:53]: And how do you reconcile that with how we started the discussion about intrinsic versus extrinsic kind of like accomplishment or success? How should people think about that especially when they're doing a PhD or early in their career? I think in Europe, I walked through a lot of the posters and whatnot, there seems to be mode collapse in a way in the research, a lot of people working on the same things. Is it worth for a PhD to not take a bet on something that is maybe not as interesting just because of funding and visibility and whatnot? Or yeah, what suggestions would you give?Soumith [00:44:28]: I think there's a baseline level of compatibility you need to have with the field. Basically, you need to figure out if you will get paid enough to eat, right? Like whatever reasonable normal lifestyle you want to have as a baseline. So you at least have to pick a problem within the neighborhood of fundable. Like you wouldn't wanna be doing something so obscure that people are like, I don't know, like you can work on it.Swyx [00:44:59]: Would a limit on fundability, I'm just observing something like three months of compute, right? That's the top line, that's the like max that you can spend on any one project.Soumith [00:45:09]: But like, I think that's very ill specified, like how much compute, right? I think that the notion of fundability is broader. It's more like, hey, are these family of models within the acceptable set of, you're not crazy or something, right? Even something like neural or DS, which is a very boundary pushing thing or states-based models or whatever. Like all of these things I think are still in fundable territory. When you're talking about, I'm gonna do one of the neuromorphic models and then apply image classification to them or something, then it becomes a bit questionable. Again, it depends on your motivation. Maybe if you're a neuroscientist, it actually is feasible. But if you're an AI engineer, like the audience of these podcasts, then it's more questionable. The way I think about it is, you need to figure out how you can be in the baseline level of fundability just so that you can just live. And then after that, really focus on intrinsic motivation and depends on your strengths, like how you can play to your strengths and your interests at the same time. Like I try to look at a bunch of ideas that are interesting to me, but also try to play to my strengths. I'm not gonna go work on theoretical ML. I'm interested in it, but when I want to work on something like that, I try to partner with someone who is actually a good theoretical ML person and see if I actually have any value to provide. And if they think I do, then I come in. So I think you'd want to find that intersection of ideas you like, and that also play to your strengths. And I'd go from there. Everything else, like actually finding extrinsic success and all of that, I think is the way I think about it is like somewhat immaterial. When you're talking about building ecosystems and stuff, slightly different considerations come into play, but that's a different conversation.Swyx [00:47:06]: We're gonna pivot a little bit to just talking about open source AI. But one more thing I wanted to establish for Meta is this 600K number, just kind of rounding out the discussion, that's for all Meta. So including your own inference needs, right? It's not just about training.Soumith [00:47:19]: It's gonna be the number in our data centers for all of Meta, yeah.Swyx [00:47:23]: Yeah, so there's a decent amount of workload serving Facebook and Instagram and whatever. And then is there interest in like your own hardware?MTIASoumith [00:47:31]: We already talked about our own hardware. It's called MTIA. Our own silicon, I think we've even showed the standard photograph of you holding the chip that doesn't work. Like as in the chip that you basically just get like-Swyx [00:47:51]: As a test, right?Soumith [00:47:52]: Yeah, a test chip or whatever. So we are working on our silicon and we'll probably talk more about it when the time is right, but-Swyx [00:48:00]: Like what gaps do you have that the market doesn't offer?Soumith [00:48:04]: Okay, I mean, this is easy to answer. So basically, remember how I told you about there's this memory hierarchy and like sweet spots and all of that? Fundamentally, when you build a hardware, you make it general enough that a wide set of customers and a wide set of workloads can use it effectively while trying to get the maximum level of performance they can. The more specialized you make the chip, the more hardware efficient it's going to be, the more power efficient it's gonna be, the more easier it's going to be to find the software, like the kernel's right to just map that one or two workloads to that hardware and so on. So it's pretty well understood across the industry that if you have a sufficiently large volume, enough workload, you can specialize it and get some efficiency gains, like power gains and so on. So the way you can think about everyone building, every large company building silicon, I think a bunch of the other large companies are building their own silicon as well, is they, each large company has a sufficient enough set of verticalized workloads that can be specialized that have a pattern to them that say a more generic accelerator like an NVIDIA or an AMD GPU does not exploit. So there is some level of power efficiency that you're leaving on the table by not exploiting that. And you have sufficient scale and you have sufficient forecasted stability that those workloads will exist in the same form, that it's worth spending the time to build out a chip to exploit that sweet spot. Like obviously something like this is only useful if you hit a certain scale and that your forecasted prediction of those kind of workloads being in the same kind of specializable exploitable way is true. So yeah, that's why we're building our own chips.Swyx [00:50:08]: Awesome.Open Source AIAlessio [00:50:09]: Yeah, I know we've been talking a lot on a lot of different topics and going back to open source, you had a very good tweet. You said that a single company's closed source effort rate limits against people's imaginations and needs. How do you think about all the impact that some of the Meta AI work in open source has been doing and maybe directions of the whole open source AI space?Soumith [00:50:32]: Yeah, in general, I think first, I think it's worth talking about this in terms of open and not just open source, because like with the whole notion of model weights, no one even knows what source means for these things. But just for the discussion, when I say open source, you can assume it's just I'm talking about open. And then there's the whole notion of licensing and all that, commercial, non-commercial, commercial with clauses and all that. I think at a fundamental level, the most benefited value of open source is that you make the distribution to be very wide. It's just available with no friction and people can do transformative things in a way that's very accessible. Maybe it's open source, but it has a commercial license and I'm a student in India. I don't care about the license. I just don't even understand the license. But like the fact that I can use it and do something with it is very transformative to me. Like I got this thing in a very accessible way. And then it's various degrees, right? And then if it's open source, but it's actually a commercial license, then a lot of companies are gonna benefit from gaining value that they didn't previously have, that they maybe had to pay a closed source company for it. So open source is just a very interesting tool that you can use in various ways. So there's, again, two kinds of open source. One is some large company doing a lot of work and then open sourcing it. And that kind of effort is not really feasible by say a band of volunteers doing it the same way. So there's both a capital and operational expenditure that the large company just decided to ignore and give it away to the world for some benefits of some kind. They're not as tangible as direct revenue. So in that part, Meta has been doing incredibly good things. They fund a huge amount of the PyTorch development. They've open sourced Llama and those family of models and several other fairly transformative projects. FICE is one, Segment Anything, Detectron, Detectron 2. Dense Pose. I mean, it's-Swyx [00:52:52]: Seamless. Yeah, seamless.Soumith [00:52:53]: Like it's just the list is so long that we're not gonna cover. So I think Meta comes into that category where we spend a lot of CapEx and OpEx and we have a high talent density of great AI people and we open our stuff. And the thesis for that, I remember when FAIR was started, the common thing was like, wait, why would Meta wanna start a open AI lab? Like what exactly is a benefit from a commercial perspective? And for then the thesis was very simple. It was AI is currently rate limiting Meta's ability to do things. Our ability to build various product integrations, moderation, various other factors. Like AI was the limiting factor and we just wanted AI to advance more and we didn't care if the IP of the AI was uniquely in our possession or not. However the field advances, that accelerates Meta's ability to build a better product. So we just built an open AI lab and we said, if this helps accelerate the progress of AI, that's strictly great for us. But very easy, rational, right? Still the same to a large extent with the Llama stuff. And it's the same values, but the argument, it's a bit more nuanced. And then there's a second kind of open source, which is, oh, we built this project, nights and weekends and we're very smart people and we open sourced it and then we built a community around it. This is the Linux kernel and various software projects like that. So I think about open source, like both of these things being beneficial and both of these things being different. They're different and beneficial in their own ways. The second one is really useful when there's an active arbitrage to be done. If someone's not really looking at a particular space because it's not commercially viable or whatever, like a band of volunteers can just coordinate online and do something and then make that happen. And that's great.Open Source LLMsI wanna cover a little bit about open source LLMs maybe. So open source LLMs have been very interesting because I think we were trending towards an increase in open source in AI from 2010 all the way to 2017 or something. Like where more and more pressure within the community was to open source their stuff so that their methods and stuff get adopted. And then the LLMs revolution kind of took the opposite effect OpenAI stopped open sourcing their stuff and DeepMind kind of didn't, like all the other cloud and all these other providers, they didn't open source their stuff. And it was not good in the sense that first science done in isolation probably will just form its own bubble where people believe their own b******t or whatever. So there's that problem. And then there was the other problem which was the accessibility part. Like, okay, I again always go back to I'm a student in India with no money. What is my accessibility to any of these closers models? At some scale I have to pay money. That makes it a non-starter and stuff. And there's also the control thing. I strongly believe if you want human aligned stuff, you want all humans to give feedback. And you want all humans to have access to that technology in the first place. And I actually have seen, living in New York, whenever I come to Silicon Valley, I see a different cultural bubble. Like all the friends I hang out with talk about some random thing like Dyson Spheres or whatever, that's a thing. And most of the world doesn't know or care about any of this stuff. It's definitely a bubble and bubbles can form very easily. And when you make a lot of decisions because you're in a bubble, they're probably not globally optimal decisions. So I think open source, the distribution of open source powers a certain kind of non-falsifiability that I think is very important. I think on the open source models, like it's going great in the fact that LoRa I think came out of the necessity of open source models needing to be fine-tunable in some way. Yeah, and I think DPO also came out of the academic open source side of things. So do any of the closed source labs, did any of them already have LoRa or DPO internally? Maybe, but that does not advance humanity in any way. It advances some companies probability of doing the winner takes all that I talked about earlier in the podcast.Open Source and TrustI don't know, it just feels fundamentally good. Like when people try to, you know, people are like, well, what are the ways in which it is not okay? I find most of these arguments, and this might be a little controversial, but I find a lot of arguments based on whether closed source models are safer or open source models are safer very much related to what kind of culture they grew up in, what kind of society they grew up in. If they grew up in a society that they trusted, then I think they take the closed source argument. And if they grew up in a society that they couldn't trust, where the norm was that you didn't trust your government, obviously it's corrupt or whatever, then I think the open source argument is what they take. I think there's a deep connection to like people's innate biases from their childhood and their trust in society and governmental aspects that push them towards one opinion or the other. And I'm definitely in the camp of open source is definitely going to actually have better outcomes for society. Closed source to me just means that centralization of power, which, you know, is really hard to trust. So I think it's going well
A Ciscónál is halmokba rakják a felmondó leveleket Bitport 2024-02-12 08:05:00 Infotech CISCO A hálózati óriás idén már a sokadik technológiai cég, ahol jelentős mennyiségű dolgozó elküldésével igyekeznek optimalizálni az üzleti eredményeket. Amerika egyszer ágyúból lőtt ki egy atombombát Telex 2024-02-12 05:01:15 Tudomány A hidegháború nukleáris tüzérségi lövegét, Atomic Annie-t hamar leszerelték, de utána is okozott izgalmakat. Mesterséges intelligencia segíthet a magyar betegellátásban PCW 2024-02-12 07:33:28 Infotech Mesterséges intelligencia Hazai fejlesztésű AI-ra támaszkodhatnak a kardiológusok és a mentőorvosok közös munkájuk során. Telekommunikációs szolgáltatással újít a Revolut Igényesférfi.hu 2024-02-12 11:08:08 Infotech London Revolut A londoni székhelyű pénzügyi technológiai vállalat az első pénzügyi szolgáltató lesz a szigetországban, amely telekommunikációs ajánlatokat is kínál. A Buckingham-palota kiakadt, miután az MI hamis könyveket írt Károlyról ITBusiness 2024-02-12 11:02:33 Mobiltech Mesterséges intelligencia Anglia Rákbetegség Amazon A Buckingham-palota III. Károly angol uralkodó rákbetegségéről szóló "tolakodó és érzéketlen" könyvek ellen emelt szót, amelyeket állítólag mesterséges intelligencia írt. A palota közölte, hogy jogi csoportja vizsgálja azt a jelentést, amely szerint az Amazonon számos olyan könyvet árulnak, amelyekben hamis állításokat tesznek a király állapotáról. Ősi időkapszulát találtak egy mocsárban 24.hu 2024-02-12 09:00:16 Tudomány Anglia Egy angliai tőzeglápban gyűjtöttek be több ezer éves növényi és állati maradványokat. Felfedezés: A Nap belseje másként forog, mint a külső rétege Tudás.hu 2024-02-12 15:33:16 Tudomány Svédország Világűr Alapítvány Svéd Akadémia A csillagászati Crafoord-díjat 2024-ben három csillagásznak ítélte oda a Svéd Királyi Tudományos Akadémia és a Crafoord Alapítvány olyan új asztroszeizmológiai módszerek kifejlesztéséért, amelyek segítenek feltárni a Nap és más csillagok belsejének titkait – olvasható a csillagaszat.hu hírportálon. Az 1980-ban alapított, 6 millió svéd koronával (cs Fake volt a Nothing Phone (2a) múlt héten megjelent rendere Android Portál 2024-02-12 14:37:20 Mobiltech Telefon Okostelefon Múlt hétfőn láttunk egy feltételezett rendert a Nothing Phone (2a) készülékről, a @OnLeaks jóvoltából. Kiderült, hogy a render nem a közelgő Nothing Phone (2a), hanem egy soha meg nem jelent Nothing okostelefonról készült. Ezért tűnik a render olyan meggyőzőnek. Evan Blass (aka @evleaks) kezdetben megkérdőjelezte a rendert, mivel nem volt értelme a Bedugják a centrifugába a magyar űrhajósokat First Class 2024-02-12 14:03:24 Tudomány USA A magyar űrhajósprogram négy űrhajósjelöltje hamarosan az Egyesült Államokba utazik, ahol az egyik legfontosabb kiképzés vár rájuk. Nemsokára a kísérleteket is elkezdik betanulni. Extrém kitörést produkált egy napszerű, fiatal csillag 400 fényévre tőlünk Csillagászat 2024-02-12 14:22:53 Tudomány Egy fiatal csillag extrém erősségű kitörést produkált, amitől néhány órára több százszorosára fényesedett. A felfedezés betekintést nyújt a fiatal, napszerű csillagok életének korai szakaszába, és abba, hogy milyen hatással vannak újszülött bolygóik fejlődésére. A Smithsonian Asztrofizikai Obszervatórium (SAO) kutatóinak vezetésével egy kutatócsopo Milliókat bukhatnak a cégek a mesterséges intelligencia miatt Piac és Profit 2024-02-12 12:01:00 Infotech Mesterséges intelligencia Ma már szinte a mindennapok része a mesterséges intelligencia (MI), amelyet egyre szélesebb körben alkalmaznak. Ezzel párhuzamosan azonban mind hangosabban kongatják a vészharangokat is, miszerint nem árt vigyázni az új technológiával. Utánajártunk, milyen hátulütői lehetnek az MI használatának a cégek márkaépítésével kapcsolatban. A Kreml és Elon Musk egy emberként tagadja az ukrán hírszerzés vádjait Portfolio 2024-02-12 14:02:00 Külföld Ukrajna Moszkva Titkosszolgálat Elon Musk Kreml A Kreml hétfőn tagadta azt az ukrán állítást, hogy az orosz haderő használná az Elon Musk-féle Starlink-rendszert a megszállt ukrán területeken – írja a Reuters. A Siemens arra vállalkozik, hogy összeköti a digitális és a valódi világot Szakmát Szerzek 2024-02-12 01:05:00 Karrier Mesterséges intelligencia Innováció Siemens Az ipar 4.0 következő lépcsőfoka az ipari metaverzum, amely új időszámítást jelenthet a gyártás számára is. Az ennek kapcsán várható munkaerőpiaci változásokról és az innovációs környezetről is kérdeztük Jeránek Tamást, a Siemens Zrt. vezérigazgatóját. Ma sokan beszélnek a mesterséges intelligenciáról. Az iparban milyen alkalmazási lehetőségei vann A további adásainkat keresd a podcast.hirstart.hu oldalunkon.
A Ciscónál is halmokba rakják a felmondó leveleket Bitport 2024-02-12 08:05:00 Infotech CISCO A hálózati óriás idén már a sokadik technológiai cég, ahol jelentős mennyiségű dolgozó elküldésével igyekeznek optimalizálni az üzleti eredményeket. Amerika egyszer ágyúból lőtt ki egy atombombát Telex 2024-02-12 05:01:15 Tudomány A hidegháború nukleáris tüzérségi lövegét, Atomic Annie-t hamar leszerelték, de utána is okozott izgalmakat. Mesterséges intelligencia segíthet a magyar betegellátásban PCW 2024-02-12 07:33:28 Infotech Mesterséges intelligencia Hazai fejlesztésű AI-ra támaszkodhatnak a kardiológusok és a mentőorvosok közös munkájuk során. Telekommunikációs szolgáltatással újít a Revolut Igényesférfi.hu 2024-02-12 11:08:08 Infotech London Revolut A londoni székhelyű pénzügyi technológiai vállalat az első pénzügyi szolgáltató lesz a szigetországban, amely telekommunikációs ajánlatokat is kínál. A Buckingham-palota kiakadt, miután az MI hamis könyveket írt Károlyról ITBusiness 2024-02-12 11:02:33 Mobiltech Mesterséges intelligencia Anglia Rákbetegség Amazon A Buckingham-palota III. Károly angol uralkodó rákbetegségéről szóló "tolakodó és érzéketlen" könyvek ellen emelt szót, amelyeket állítólag mesterséges intelligencia írt. A palota közölte, hogy jogi csoportja vizsgálja azt a jelentést, amely szerint az Amazonon számos olyan könyvet árulnak, amelyekben hamis állításokat tesznek a király állapotáról. Ősi időkapszulát találtak egy mocsárban 24.hu 2024-02-12 09:00:16 Tudomány Anglia Egy angliai tőzeglápban gyűjtöttek be több ezer éves növényi és állati maradványokat. Felfedezés: A Nap belseje másként forog, mint a külső rétege Tudás.hu 2024-02-12 15:33:16 Tudomány Svédország Világűr Alapítvány Svéd Akadémia A csillagászati Crafoord-díjat 2024-ben három csillagásznak ítélte oda a Svéd Királyi Tudományos Akadémia és a Crafoord Alapítvány olyan új asztroszeizmológiai módszerek kifejlesztéséért, amelyek segítenek feltárni a Nap és más csillagok belsejének titkait – olvasható a csillagaszat.hu hírportálon. Az 1980-ban alapított, 6 millió svéd koronával (cs Fake volt a Nothing Phone (2a) múlt héten megjelent rendere Android Portál 2024-02-12 14:37:20 Mobiltech Telefon Okostelefon Múlt hétfőn láttunk egy feltételezett rendert a Nothing Phone (2a) készülékről, a @OnLeaks jóvoltából. Kiderült, hogy a render nem a közelgő Nothing Phone (2a), hanem egy soha meg nem jelent Nothing okostelefonról készült. Ezért tűnik a render olyan meggyőzőnek. Evan Blass (aka @evleaks) kezdetben megkérdőjelezte a rendert, mivel nem volt értelme a Bedugják a centrifugába a magyar űrhajósokat First Class 2024-02-12 14:03:24 Tudomány USA A magyar űrhajósprogram négy űrhajósjelöltje hamarosan az Egyesült Államokba utazik, ahol az egyik legfontosabb kiképzés vár rájuk. Nemsokára a kísérleteket is elkezdik betanulni. Extrém kitörést produkált egy napszerű, fiatal csillag 400 fényévre tőlünk Csillagászat 2024-02-12 14:22:53 Tudomány Egy fiatal csillag extrém erősségű kitörést produkált, amitől néhány órára több százszorosára fényesedett. A felfedezés betekintést nyújt a fiatal, napszerű csillagok életének korai szakaszába, és abba, hogy milyen hatással vannak újszülött bolygóik fejlődésére. A Smithsonian Asztrofizikai Obszervatórium (SAO) kutatóinak vezetésével egy kutatócsopo Milliókat bukhatnak a cégek a mesterséges intelligencia miatt Piac és Profit 2024-02-12 12:01:00 Infotech Mesterséges intelligencia Ma már szinte a mindennapok része a mesterséges intelligencia (MI), amelyet egyre szélesebb körben alkalmaznak. Ezzel párhuzamosan azonban mind hangosabban kongatják a vészharangokat is, miszerint nem árt vigyázni az új technológiával. Utánajártunk, milyen hátulütői lehetnek az MI használatának a cégek márkaépítésével kapcsolatban. A Kreml és Elon Musk egy emberként tagadja az ukrán hírszerzés vádjait Portfolio 2024-02-12 14:02:00 Külföld Ukrajna Moszkva Titkosszolgálat Elon Musk Kreml A Kreml hétfőn tagadta azt az ukrán állítást, hogy az orosz haderő használná az Elon Musk-féle Starlink-rendszert a megszállt ukrán területeken – írja a Reuters. A Siemens arra vállalkozik, hogy összeköti a digitális és a valódi világot Szakmát Szerzek 2024-02-12 01:05:00 Karrier Mesterséges intelligencia Innováció Siemens Az ipar 4.0 következő lépcsőfoka az ipari metaverzum, amely új időszámítást jelenthet a gyártás számára is. Az ennek kapcsán várható munkaerőpiaci változásokról és az innovációs környezetről is kérdeztük Jeránek Tamást, a Siemens Zrt. vezérigazgatóját. Ma sokan beszélnek a mesterséges intelligenciáról. Az iparban milyen alkalmazási lehetőségei vann A további adásainkat keresd a podcast.hirstart.hu oldalunkon.
Escucha ahora 'La tarde' de 18 a 19 'La Tarde' es un programa presentado por Pilar Cisneros y Fernando de Haro (30/01/2024) - 18h¡Gente, gente! Nos despedimos en nuestra última hora con los siguientes contenidos: - El futuro de lo que comemos, a debate en Madrid Fusión. Hablamos con Marta Rivera que es profesora del CISC en INGENIO (CSIC-UPV) y con David Lacasa, socio de Lantern y experto gastronómico.- Series TV: Como cada martes repasamos con Javier García Arevalillo, el experto en series de La Tarde, sus recomendaciones para esta semana, donde hoy nos ha recomendado "Beef". Escucha ahora 'La Tarde', de 18 a 19 horas. 'La Tarde' es un programa presentado por Pilar Cisneros y Fernando de Haro que se emite en COPE, de lunes a viernes, de 16 a 19 horas, con 498.000 oyentes diarios, según el último EGM. A lo largo de sus tres horas de duración, "La Tarde" ofrece otra visión, más humana y reposada, de la actualidad, en busca de historias cercanas, de la cara real de las noticias; periodismo de carne y hueso.En "La Tarde" también hay hueco para los testimonios, los sucesos y los detalles más relevantes y a veces invisibles de todo lo que nos rodea. Esta temporada, Pilar y Fernando seguirán cautivando a la ‘gente gente' acompañados de los escritores Daniel Gascón y Lorenzo...
On this episode of The Construction Record Podcast™, digital media editor Warren Frey speaks with Soloway Wright LLP partner Dan Leduc about prompt payment in Ontario and elsewhere in Canada. Leduc said prompt payment is not working the way it should, largely because of contractors not being proactive in pursuing payment. He attributed some of the reticence to traditional relationships, corporate culture and the role of the pandemic in slowing down payments since little work was getting done at the time in comparison to pre-pandemic activity. He advocated for streamlining the invoicing process and acceleration of certification and reminded contractors attending his talk at the recent Canadian Institute for Steel Construction's annual conference in Toronto that if an owner does not provide notice explaining a delay in payment within the prompt payment parameters, adjudication is an option. We also have headlines from the Daily Commercial News and Journal of Commerce including Angela Gismondi's story about how the long-delayed Eginton Crosstown LRT was expected to provide an opening date on September 27 but Metrolinx CEO Phil Verster instead said he can't commit to a solid timeline until issues with the system are ratified. The project began in 2011 and has experienced significant delays since. DCN staff writer Don Wall's also has an article about a sobering session this week held by the Royal Architectural Institute of Canada to commemorate the National Day for Truth and Reconciliation which is held Sept. 30.The session looked at the role of architecture in oppression of Indigenous Canadians over the centuries. Shannon Moneo has a story about Mining Association of Canada president and CEO Pierre Gratton's recent remarks at the Greater Vancouver Board of Trade earlier in the month reminding attendees that with the world in the midst of an energy transition, huge quantities of minerals and metals will be needed. From the west, Warren has a story about clean energy tax credits and how different parts of the industry are split on the use of wage requirements. Progressive Contractors Association of Canada president Paul de Jong said his organization supports the credits, a wage rate requirement gives him pause, and Canadian Labour Congress president Bea Bruske said labour supports the wage conditions as they will protect workers as Canada's energy economy shifts into a carbon-free future. You can listen to The Construction Record on the Daily Commercial News and Journal of Commerce websites as well as on Apple Podcasts, Spotify and Amazon Music's podcast section. Our previous interview with Ball Construction president Jason Ball about the company's 100th anniversary is here. Thanks for listening. DCN-JOC News Services No firm end date for Eglinton Crosstown LRT as defects and deficiencies persist RAIC reflects on dark days during Truth and Reconciliation sessions Canada needs to build more mines now: MAC president Clean energy tax credits garner support, but a split on wage requirements B.C. releases housing targets for 10 municipalities Prompt payment evolving but still has room to grow: CISC speaker
Want to help define the AI Engineer stack? Have opinions on the top tools, communities and builders? We're collaborating with friends at Amplify to launch the first State of AI Engineering survey! Please fill it out (and tell your friends)!If AI is so important, why is its software so bad?This was the motivating question for Chris Lattner as he reconnected with his product counterpart on Tensorflow, Tim Davis, and started working on a modular solution to the problem of sprawling, monolithic, fragmented platforms in AI development. They announced a $30m seed in 2022 and, following their successful double launch of Modular/Mojo
Una chiacchierata fra Stella in Alto Mare (a.k.a. paolo@webradioscout.org) e Marco De Nardi (incaricato nazionale all'Internazionale per Agesci) di ritorno dal Jamboree 2023 in Corea del Sud, con un "occhio" particolare, ma non esclusivo, all'esperienza della "tenda cattolica" della CISC.Buon ascolto!---Sito web della CISC (Conferenza Internazionale dello Scautismo Cattolico):https://www.cics.org/?lang=enSito web del contingente italiano al Jamboree '23https://www.jamboree.it/2023/Sito web internazionale del Jamboree '23https://www.2023wsjkorea.org/eng/index.jamboree
We are now launching our dedicated new YouTube and Twitter! Any help in amplifying our podcast would be greatly appreciated, and of course, tell your friends! Notable followon discussions collected on Twitter, Reddit, Reddit, Reddit, HN, and HN. Please don't obsess too much over the GPT4 discussion as it is mostly rumor; we spent much more time on tinybox/tinygrad on which George is the foremost authority!We are excited to share the world's first interview with George Hotz on the tiny corp!If you don't know George, he was the first person to unlock the iPhone, jailbreak the PS3, went on to start Comma.ai, and briefly “interned” at the Elon Musk-run Twitter. Tinycorp is the company behind the deep learning framework tinygrad, as well as the recently announced tinybox, a new $15,000 “luxury AI computer” aimed at local model training and inference, aka your “personal compute cluster”:* 738 FP16 TFLOPS* 144 GB GPU RAM* 5.76 TB/s RAM bandwidth* 30 GB/s model load bandwidth (big llama loads in around 4 seconds)* AMD EPYC CPU* 1600W (one 120V outlet)* Runs 65B FP16 LLaMA out of the box (using tinygrad, subject to software development risks)(In the episode, we also talked about the future of the tinybox as the intelligence center of every home that will help run models, at-home robots, and more. Make sure to check the timestamps
Join me for a conversation with Dr. Sarah Sydlowski as we dig deeper into why cochlear implants are NOT the last resort for patients with the expanding criteria. In this conversation, we discuss the current referral guideline and walk through a case study to help dispel some of the common misconceptions about referrals. Dr. Sarah Sydlowski, AuD, PhD, MBA, ABA Certified, CISC, is the Audiology Director of the Hearing Implant Program, Audiology Innovation, and Strategic Partnerships Director, and Associate Chief Improvement Officer at the Cleveland Clinic in Cleveland, Ohio. Her clinical and research interests include implantable hearing devices, optimization of practice efficiency, and developing innovative clinical delivery models. Dr. Sydlowski is the past president of the American Academy of Audiology and the Ohio Academy of Audiology. She has also served on many other boards and taskforce for AAA and the American Cochlear Implant Alliance. She is currently the co-chair of the newly formed Hearing Health Collaborative charged with developing a blueprint for changing the landscape of hearing healthcare. To reach out to Dr. Sydlowski you can email at sydlows@ccf.org For more information about the Hearing Health Collaborative: https://adulthearing.com/hearing-health-collaborative/ You can listen to this episode wherever you stream podcasts and at www.3cdigitalmedianetwork.com/empowear-audiology-podcast
Building a strong and inclusive community requires expanding our services to support all newcomers and to meet the evolving needs of those we serve, overcoming challenges with resilience. In this episode, we have Michael Itti, Executive Director of the Chinese Information and Service Center (CISC Seattle) in Seattle, Washington join us for a discussion on the evolution of social profits and adapting to changing environments. Michael shares how CISC Seattle has expanded its services to support all new immigrants, and the challenges they've faced during the current pandemic. He also discusses how he's brought together a coalition of organizations and the board to meet the needs of their community. Michael generously shares valuable insights and advice for anyone building organizations that serve their community. Tune in now and learn from Michael's experience and leadership in the social profit sector.
Fasilitas bagi pasien kanker di Indonesia masih terbatas dan belum dapat menjangkau seluruh masyarakat. Berdasarkan data Badan Pengelola Jaminan Sosial (BPJS) Kesehatan, di seluruh Indonesia hanya terdapat 714 unit rumah sakit dengan sarana kemoterapi, 507 unit RS dengan onkologi board, dan 35 RS dengan sarana radioterapi. Padahal kasus baru kanker di Indonesia berdasarkan data Globocan hampir 400ribu kasus pada 2020. Keprihatinan akan persoalan ini yang dituangkan menjadi tema Hari Kanker Sedunia 2023 yaitu "Close The Care Gap" atau "Tutup Kesenjangan Perawatan". Menurut Kementerian Kesehatan RI tema ini sebagai upaya menutup semua kesenjangan yang terjadi dalam penanggulangan kanker. Di Ruang Publik KBR pagi ini akan kita dengarkan seperti apa kisah para penyintas kanker dalam mendapatkan pengobatan dan seperti apa kehidupan mereka sebagai penyintas kanker. Ada dua narasumber yang tergabung dalam Cancer Information and Support Center Association (CISC). Ada Ibu Valencia Maria, Ketua 2 CISC dan Ketua Panitia World Cancer Day CISC dan Ibu Lindawati Gunawan, Ketua 3 CISC. *Kami ingin mendengar saran dan komentar kamu terkait podcast yang baru saja kamu simak, melalui surel ke podcast@kbrprime.id
Di Indonesia, kanker paru-paru masih menjadi kanker dengan kasus kematian tertinggi. Menurut laporan Global Burden of Cancer Study (Globocan) tahun 2020, kasus kematian pada kanker paru-paru di Indonesia mencapai 31 ribu orang atau 13,2 persen dari total kematian kanker. Menurut Badan kesehatan dunia (WHO) merokok merupakan faktor risiko utama penyebab kanker di Indonesia. Sedangkan di dunia, kebiasaan merokok menyumbangkan 20 persen kematian akibat kanker dan 70 persen kematian akibat kanker paru-paru. Bagaimana mendeteksi sejak dini gejala kanker paru-paru? Apa tantangan dalam pengobatannya? Di Ruang Publik KBR akan kita bahas soal ini bersama dr. Wily Pandu Ariawan, Sp.P., SMF Paru RS Kanker Dharmais dan Menteria Butar Butar, Survivor kanker paru dari CISC. *Kami ingin mendengar saran dan komentar kamu terkait podcast yang baru saja kamu simak, melalui surel ke podcast@kbrprime.id ke podcast@kbrprime.id
Tune in for a replay of The Six Five Summit's #Cloud #Infrastructure Spotlight Keynote with Balaji Baktha, Founder and CEO, Ventana Micro Systems Ventana was founded to deliver the highest performance RISC-V CPUs competitive with the best-in-class data center offerings. The company seeks to address the needs of high growth markets such as cloud, enterprise data center, 5G, edge compute, AI/ML, automotive, and client applications, 5G, infrastructure, edge compute, client, and data center. In this session, Balaji sits down with Patrick Moorhead to explore how Ventana combines the extensibility of RISC-V with chiplet technology to create customer-driven innovation for best-in-class solutions for the data center. They start off with a discussion on how hardware/software codesign is creating customer pull for the RISC-V ecosystem in the data center market. They then dive into how chiplets based on open standard interfaces allow customers to create right-sized composable SoC solutions quickly and at a lower cost. #sixfivesummit #sixfivesummitreplay #risc #cisc #chips #ventanamicrosystems #balajibaktha #danielnewman #patrickmoorhead The Six Five Summit is a 100% virtual, on-demand event designed to help you stay on top of the latest developments and trends in digital transformation brought to you by Futurum Research and Moor Insights & Strategy. With 12 tracks and over 70 pre-recorded video sessions, The Six Five Summit showcases an exciting lineup of leading technology experts whose insights will help prepare you for what's now and what's next in digital transformation as you continue to scale and pivot for the future. You will hear cutting-edge insights on business agility, technology-powered transformation, and thoughts on strategies to ensure business continuity and resilience, along with what's ahead for the future of the workplace. More about The Six Five Summit: https://thesixfivesummit.com/
This episode of the Construction Record Podcast digital media editor Warren Frey has two sets of interviews from the Canadian Institute of Steel Construction's Canadian Steel Conference, held this year in downtown Vancouver. The first interview is with Dan Leduc, a partner with the Norton Rose Fulbright law firm all about prompt payment and the progress in some provinces and lack of progress in others in both introducing and enacting prompt payment legislation, along with some of the consequences of the new regulations for the construction industry. The second interview is with Glotman Simpson principal Anthony El-Araj and Canam engineer Dario Espi-Fournier about 410 West Georgia, a striking office tower in downtown Vancouver that looks like a series of stacked cubes and combined concrete and steel in what was a complex and challenging project. You can listen to The Construction Record on the Daily Commercial News and Journal of Commerce websites as well as on Apple Podcasts, Spotify and Amazon Music's podcast, and you can hear our previous podcast with Moon World Resorts co-founder Michael Henderson about a new resort project that aims to build a massively ambitious structure that brings space tourism down to earth here. Thanks for listening. DCN-JOC News Services
Kanker merupakan salah satu masalah kesehatan terbesar di Indonesia dan menjadi penyebab kematian tertinggi kedua setelah penyakit kardiovaskuler. Global Burden of Cancer Study (Globocan) dari World Health Organization (WHO) mencatat, total kasus kanker di Indonesia pada 2020 mencapai lebih dari 396 ribu kasus dan total kematian sekira duapertiga dari jumlah kasus. Di Indonesia, kanker Limfoma Non-Hodgkin berada di posisi ketujuh kasus kanker terbesar dengan jumlah kasus lebih dari 16 ribu. Kanker Limfoma ini adalah kanker yang menyerang sistem getah bening. Bagaimana mengenali gejala kanker ini dan pegobatannya? Di Ruang Publik KBR pagi ini akan kita bahas Kanker Limfoma ini Bersama dengan Prof. Dr. dr. Noorwati Sutandyo, SpPD, K- HOM FINASIM, Staf Medik Fungsional RS Kanker Dharmais dan Agnes Emmy Pudjiastuti, Survivor Limfoma (kanker kelenjar getah bening) dari CISC. *Kami ingin mendengar saran dan komentar kamu terkait podcast yang baru saja kamu simak, melalui surel ke podcast@kbrprime.id
M1 Mac はなぜ速いのか? CPUとメモリが近距離一体型になっており、データの転送速度が速いから RISC だから CISC よりずっと速いんだ!みたいな話ではない 低消費電力ではあるが、Intel も低消費電力に取り組みつつある これから、大ARM時代がくるのか? スマホはだいたいARMなので、もう来ているといえば来ている PC市場全体でみれば M1 Mac のシェアはしれている。すべてが ARM になる世界線は無さそう むしろ RISC-V の時代はワンチャンあるのかもしれん じゃあ、俺達はどうすれば.... 素直に M1 で快適な開発生活を楽しもう などという話をつらつらとしています。
Today we are speaking to Kelly Flanders and Nicola Hauk, the two captains for CISC's W League team. Kelly is a 2018 graduate of Appalachian State and Nicola is a rising junior that is transferring this summer from Delta State to the University of Nebraska. We speak about the benefits of playing different positions and the different opportunities that the W league is able to provide current and future players. More information on our new W League team can be found on our website: https://www.charlotteindependence.com/ Recorded: Wednesday, May 25th, 2022.Music: "Day Trips" by KetsaFrom the Free Music ArchiveCC BY NC
En abril del año pasado, la ONG Cruelty Free International y Carlota Saorsa denunciaban y difundían imágenes sobre lo que calificaron como “crueldad extrema” que vivían los animales en los laboratorios. Continúa la polémica por las prácticas del laboratorio de experimentación animal Vivotecnia con beagles y, por ello, charlamos con Lluis Montoliu, biólogo del CISC, sobre el maltrato y la experimentación científica con animales. Haca una década que se aprobó la Agenda Digital que fijaba objetivos de conectividad. En Fuentepelayo (Segovia) están hartos de la mala conexión a internet en su pueblo que no les permite tener los mismos servicios que cualquier habitante que una ciudad. José Antonio López ha hecho una tesis sobre la implementación de la agenda digital y nos cuenta sus resultados.
IT Durable : le CPU Historiquement, il existe deux types d'architecture CPU : le CISC et le RISC. Apparues toutes les deux entre les années 60 et 70s, elles se distinguent par leurs approches : Le CISC : pour Complex Instruction, Set Computer considère que le CPU doit disposer d'un maximum d'instructions possible pour répondre à l'ensemble des besoins des développeurs (et des applications). Le RISC : pour Reduced Instruction Set Computer considère que le CPU doit disposer d'un nombre réduit d'instructions et que c'est au développeur (aujourd'hui au compilateur) de les combiner pour répondre à l'ensemble des besoins. Les deux architectures ont leurs promoteurs et détracteurs en fonction de l'angle d'analyse, mais à l'heure où la consommation énergétique devient un sujet majeur, les cartes semblent être sur le point d'être rabattues.
Sources de fatigue et de transformation du corps, grossesse et accouchement ne sont pas de tout repos pour les femmes. C'est pourquoi, dans certains pays, comme la Chine, on leur réserve une période de repos spéciale, appelée le "mois d'or".Des précautions à prendre après l'accouchementDepuis la plus haute Antiquité, la médecine chinoise recommande aux femmes de prendre certaines précautions après l'accouchement. Dans l'ensemble, elles s'y soumettent de bonne grâce, quelle que soit leur place dans la société.D'après cette tradition, en effet, des efforts indus, une alimentation inappropriée ou des soucis trop prenants pourraient provoquer des troubles de santé susceptibles de se manifester sur le long terme.Ils ne créeraient pas non plus les conditions propices à l'allaitement et aux relations étroites qui doivent s'établir entre la mer et l'enfant.Des conseils très précisC'est pour éviter tous ces problèmes que les femmes, en Chine, mais aussi au Mexique ou en Inde, sont invitées à se reposer durant le "mois d'or".Elles se laissent alors dorloter par leurs mères ou leurs belles-mères. Les efforts physiques et le travail intensif sont proscrits. De même, elles doivent privilégier certains aliments : des mets servis bien chauds, riches en fer et en protéines.Elles doivent éviter l'alcool et le thé, comme aussi les aliments froids ou trop épicés. Le froid n'est pas seulement à craindre dans l'alimentation; après l'accouchement, en effet, il faut se protéger contre les températures basses et éviter l'eau froide, même pour faire la vaisselle.Durant le "mois d'or", il faut également fuir les situations tendues et toutes les sources de stress. Cette période doit être un moment de calme et de détente.La tradition chinoise fourmille de conseils très précis : durant cette période, une femme ne doit pas se laver les cheveux ou mettre un chapeau. Quant aux douches ou aux bains, ils ne sont pas conseillés.Mais le mois d'or, désormais connu en Occident, a su s'adapter à son époque. Les femmes profitent aujourd'hui de ce temps de repos pour s'adonner au yoga postnatal ou faire des exercices de rééducation du périnée. See acast.com/privacy for privacy and opt-out information.
Deux A et un E discutent des nouvelles de l'été et de la rentrée. #JDK17 #scala #Kotlin #spring6 #dockerdesktop #fitdesk et encore d'autres sujets. Enregistré le 10 septembre 2022 Téléchargement de l'épisode LesCastCodeurs-Episode–263.mp3 News Langages Au revoir AdopOpenJDK, bonjour Adoptium Eclipse Temurin runtimes pour la partie JDK Grosse test suite License oracle (que Adopt OpenJDK avait perdu) Plus de OpenJ9 ni GraalVM (Oracle recule) mais IBM a Rapatrié OpenJ9 sous le nom IBM Semurin Nouvelles API (backward compatibles ?) Les anciens builds ne seront pas migrés Une interview des architectes Java Java longevity: stability (not removing things), readability, ecosystem' well defined stable interfaces (JVM etc) Nouvelles fonctionnalités : qu'est que qui ne peut être fait en dehors de la plateforme Rendre Java plus extensible (Valhalla) Bloque en Java 8 Perds argent (meilleure mémoire, performance, temps de démarrage, pauses 2ms G1 etc Sécurité Loom Réactive programming pour mieux utiliser le,hardware Mais opposé à certains designs de la JVM (error report, débug, flight recorder) Loom résout le même problème mais en harmonie avec la JVM Api familières Next Vallalah , panama Tail call recursion Etc Article en passant sur l'utilisation du foreign API avec libsodium juste une mention Quoi de neuf dans Scala 3 Scala 3.0.1 Syntaxe given simplifiée (pas de with) @experimental Scala 3.1 Experimental safer exception (checked exceptions mais sans les ennuis) Warnings de compilation plus configurable Multiversal equality (des classes différentes qui peuvent être égales) Kotlin a 10 ans annoncé en 2011, 1.0 en 2016, default Android en 2017 pas theorique, problemes pragmatiques multi plateforme encore experimental, on prend notre temps ajoutent features dans le core lib plus lentement que Java prochains 10 ans: multiplatforme, langage reste relevant, reactive programming et immuabilité du front vers le back Librairies Spring 6 / SpringBoot 3 annoncé à SpringOne Java 17 et plus Intègre Spring Native Tomcat 10 min Jakarta 9 avec cassage de packages Q4 2022 Spring 5.3 et SpringBoot 2.7 seront en maintenance open source entendue Autre lien Quarkus 2.2 et 2.1 2.2 Solidification (utilisabilite, doc, corriger problèmes) Mongodb service binding RESTEasy Réactive automatiquement choisi le thread bloquant ou non bloquant Plus facile quand on vient de RESTEasy Classic Détails ici 2.1 Dev services pour keycloak SQLServer réactive a son extension Kotlin 1.5 Blog post expliquant les nouvelles modularités de quarkus platform Micronaut 3 est sorti RxJava n'est plus un dépendance transitive (choix du moteur réactive streams) Utilisent Reactor en dessous Les annotations ne sont plus héritées par défaut Support Jakarta lifecycle annotations, Jakarta inject Injection qualifiée par le generic des arguments Filtres servers plus consistant (appelés une seule fois) @Introspected ne rajoute plus les metadonnes pour GraalVM, utiliser @ReflectiveAccess Ajout des resources passe du compile time au build time donc utilisez les plugins maven de Micronaut ou faite le vous même Quelques autres breaking changes OpenRewrite règles changent le code pour migrer pour vous Infrastructure Comment debugger son script Ansible --step In-line logging Ansible-lint Ansible-console Ansible debugger Cloud Apple nous protégeras des photos pedophiles mais en ouvrant une brèche sur la sécurité de ses téléphones Une analyse techniques Il y a deux choses distinctes Détecter les images d'une base de donnée pedophile avec du hash sur le téléphone et en alertant quand trop'sonr flaggues positive (avec check humain) Ça s'appuie sur iCloud photo car sur leur cloud mais pas un filtre serveur Base de donnée Baked dans chaque iOS NeuralHash Hash résiste au ré cadrage et autres ajustement de photos Threshold secret sharing Au bout de n rapports remontés, on a capacité à reconstituer la clef de chiffrement Et un troisième mécanisme pour éviter de montrer qu'elles photos intéressent Apple Quid d'une puissance étrangère qui veut rajouter des photos de discidents? Apple dit on n'acceptera pas Où attaque sur le neural hash Détection de nudité et demande si l'nfznt veut voir avec alerte aux parents Ils se donnent quelques mois de retravail au final AWS a 15 ans demarre avec une region, un seul type d'instance et tout ephemère (pas de block storage) peu de feature et peu de details initialement prix a l'heure initialement qui etait innovant Data La guerre de la recherche - Les clients Elastic Search ne seront pas compatible avec OpenSearch Elastic vs AWS - Clash numéro ? Dans ce dernier épisode, Elastic rajoute des controles dans ses APIs clientes pour ne se connecter qu'a ses propres clusters et empêcher de les utiliser avec opensearch. Risques d'incompatibilité Manque de chance ce changement bloque aussi l'utilisation de la version OSS d'elastic-search. De son coté AWS promet de faire son possible pour fournir des drivers qui resteront compatibles Elasticsearch 7.10.2 (la version à partir de laquelle ils ont forké) et OpenSearch Bref la guerre continue … Outillage AtomicJar release TestContainers 1.16 https://www.atomicjar.com/2021/07/testcontainers–1–16–0-release/ Test Containers 1.16.0 est la première release faite par AtomicJar, la société créée par les fondateurs du projet. Meilleure compatibilité Apple M1 Couche de transport utilise Apache HTTP Client 5 au lieu de OKHTTP pour éviter la malediction Kotlin Meilleure stabilité et compatibilité sur Windows pour process natifs Windows et WSL 2 docker.host peut etre configuré dans $HOME/.testcontainers.properties Aussi Support Podman amélioré récemment Docker introduit un nouveau système d'abonnement avec Docker Business et différents niveaux: perso, pro, entreprise etc donc pour les boites de plus de 250 personnes ou qui font 10 millions, tu dois payer pour Docker Desktop Des articles paraissent listant les alternatives à Docker Desktop Sur l'impact macOS How Docker broke in half Les différentes manières de déclarer les dépendances dans son projet Gradle En particulier, les différences entre api, implementation, runtimeOnly, compileOnly, compileOnlyApi Avec des exemples concrets pour bien illustre ces différents scopes. Gradle regroupe les dépendances dans des ensembles appelés des “configurations”. Ces configurations définissent le classpath lors de la compilation, ou le classpath pour le runtime lorsque votre code s'exécute. Gradle définit 3 types de configuration : api, implementation et runtimeOnly La configuration “api” est utilisée pour le classpath compilation et runtime et est exposé aux consommateurs de l'API aussi pour le classpath de compilation et runtime La configuration “implementation” est utilisée pour le classpath de compilation et runtime, mais est exposée pour le consommateur de l'API que pour le classpath au runtime La configuration “runtimeOnly” n'est utilisée que pour le classpath au runtime La configuration “compileOnly” est utilisée pour le classpath de compilation, mais n'est pas exposée pour les consommateurs Enfin la configuration “compileOnlyApi” est utilisée pour le classpath de compliation et est exposée au consommateurs à la compilation de leur code quand les metadata Gradle sont utilisées Méthodologies Opinion sur Googlespeak et les pratiques anti concurrentielles Certains dont l'auteur voient Google utiliser Google search pour placer hautement leur propres services alternatifs. Google flight etc Et les Googlers avec qui il interagissait trouvait ça « absurde » de penser ça. Chercher un hôtel Étude montre que Google offre 41% de sa première page à ses propres propriétés (inclus direct answers ) Direct answer est mis rapide pour l'utilisateur mais prend le contenu 3rd party ( Wikipedia, IMDb etc) et nous fait rester sur une page Google. Googlespeak d'après Orwell. Si le langage ne permet pas d'exprimer , on ne pense pas aux choses. Pas dominant mais succès. Pas barrière à l'entrée , marché, effet réseau qui sont taboo dans un contexte de tension antitrust Encourage à réfréner sa communication écrite. Comme beaucoup de sociétés américaines à cause du processus de discovery Market share -> user preference Apple et epic ont levés des doc similaires mais Apple n'était pas gardé dans sa comm interne. Autour de l'app store. Google dans ses formation mention non monopoly car beaucoup de compétiteurs. Et se defini en termes très large et donc avec de la compétition. (Dans la pub et dans la recuperation d'information. Ils ne font pas d'analyse de marchés (sur les marchés dominants) quand demandés par le congrès. 65% des recherches n'entraînent pas un clic sur un site externe - valeur réfutée par Google C'est une réaction à la judiciarusarion de la vie des entreprises. Loi, société et organisation Matt Asay quitte AWS et reflecte sur l'open source chez AWS pleins de petites equipes et pas de décisions top down en tous cas pas pour open source Un langage specifique a Amazon pour convaincre Les Leadership Principles tendent à ne pas investir dans les elements side de type open source et quand on a deux pizza team, peut on contribuer sans se sentir trop contraint en temps si c'est une équipe de 12 sur 200 equipes ca ne m'étonnes pas trop
Deux A et un E discutent des nouvelles de l'été et de la rentrée. #JDK17 #scala #Kotlin #spring6 #dockerdesktop #fitdesk et encore d'autres sujets. Enregistré le 10 septembre 2021 Téléchargement de l'épisode [LesCastCodeurs-Episode-263.mp3](https://traffic.libsyn.com/lescastcodeurs/LesCastCodeurs-Episode-263.mp3) ## News ### Langages [Au revoir AdopOpenJDK, bonjour Adoptium](https://blog.adoptopenjdk.net/2021/08/goodbye-adoptopenjdk-hello-adoptium/) * Eclipse Temurin runtimes pour la partie JDK * Grosse test suite * License oracle (que Adopt OpenJDK avait perdu) * Plus de OpenJ9 ni GraalVM (Oracle recule) mais IBM a [Rapatrié OpenJ9 sous le nom IBM Semurin](https://developer.ibm.com/languages/java/semeru-runtimes/) * Nouvelles API (backward compatibles ?) * Les anciens builds ne seront pas migrés [Une interview des architectes Java](https://blogs.oracle.com/javamagazine/java-architects-loom-panama-valhalla?source=:em:nw:mt::::RC_WWMK200429P00043C0036:NSL400176960) * Java longevity: stability (not removing things), readability, ecosystem' well defined stable interfaces (JVM etc) * Nouvelles fonctionnalités : qu'est que qui ne peut être fait en dehors de la plateforme * Rendre Java plus extensible (Valhalla) * Bloque en Java 8 * Perds argent (meilleure mémoire, performance, temps de démarrage, pauses 2ms G1 etc * Sécurité * Loom * Réactive programming pour mieux utiliser le,hardware * Mais opposé à certains designs de la JVM (error report, débug, flight recorder) * Loom résout le même problème mais en harmonie avec la JVM * Api familières * Next * Vallalah , panama * Tail call recursion * Etc [Article en passant sur l'utilisation du foreign API avec libsodium](https://blog.arkey.fr/2021/09/04/a-practical-look-at-jep-412-in-jdk17-with-libsodium/) * juste une mention [Quoi de neuf dans Scala 3](https://medium.com/scala-3/scala-3-whats-changed-since-scala-3-0-0-be0830c059f5) * Scala 3.0.1 * Syntaxe given simplifiée (pas de with) * `@experimental` * Scala 3.1 * Experimental safer exception (checked exceptions mais sans les ennuis) * Warnings de compilation plus configurable * Multiversal equality (des classes différentes qui peuvent être égales) [Kotlin a 10 ans](https://www.infoq.com/articles/kotlin-ten-years-qa/?utm_campaign=infoq_content&utm_source=twitter&utm_medium=feed&utm_term=mobile) * annoncé en 2011, 1.0 en 2016, default Android en 2017 * pas theorique, problemes pragmatiques * multi plateforme encore experimental, on prend notre temps * ajoutent features dans le core lib plus lentement que Java * prochains 10 ans: multiplatforme, langage reste relevant, reactive programming et immuabilité du front vers le back ### Librairies [Spring 6 / SpringBoot 3 annoncé à SpringOne](https://twitter.com/mraible/status/1433072410182357000?s=21) * Java 17 et plus * Intègre Spring Native * Tomcat 10 min * Jakarta 9 avec cassage de packages * Q4 2022 * Spring 5.3 et SpringBoot 2.7 seront en maintenance open source entendue * [Autre lien](https://spring.io/blog/2021/09/02/a-java-17-and-jakarta-ee-9-baseline-for-spring-framework-6) [Quarkus 2.2 et 2.1](http://quarkus.io/blog/quarkus-2-2-1-final-released/) * 2.2 Solidification (utilisabilite, doc, corriger problèmes) * Mongodb service binding * RESTEasy Réactive automatiquement choisi le thread bloquant ou non bloquant * Plus facile quand on vient de RESTEasy Classic * [Détails ici](https://quarkus.io/blog/resteasy-reactive-smart-dispatch/) * 2.1 * Dev services pour keycloak * SQLServer réactive a son extension * Kotlin 1.5 * [Blog post expliquant les nouvelles modularités de quarkus platform](http://quarkus.io/blog/quarkus-2x-platform-quarkiverse-registry/) [Micronaut 3 est sorti](https://micronaut.io/2021/08/18/micronaut-framework-3-released/) * RxJava n'est plus un dépendance transitive (choix du moteur réactive streams) * Utilisent Reactor en dessous * Les annotations ne sont plus héritées par défaut * Support Jakarta lifecycle annotations, Jakarta inject * Injection qualifiée par le generic des arguments * Filtres servers plus consistant (appelés une seule fois) * `@Introspected` ne rajoute plus les metadonnes pour GraalVM, utiliser `@ReflectiveAccess` * Ajout des resources passe du compile time au build time donc utilisez les plugins maven de Micronaut ou faite le vous même * Quelques autres breaking changes * OpenRewrite règles changent le code pour migrer pour vous ### Infrastructure [Comment debugger son script Ansible](https://zwischenzugs.com/2021/08/27/five-ansible-techniques-i-wish-id-known-earlier/) * `--step` * In-line logging * Ansible-lint * Ansible-console * Ansible debugger ### Cloud [Apple nous protégeras des photos pedophiles mais en ouvrant une brèche sur la sécurité de ses téléphones ](https://www.apple.com/child-safety/) * [Une analyse techniques](https://twitter.com/MathisHammel/status/1425523073806110720) * Il y a deux choses distinctes * Détecter les images d'une base de donnée pedophile avec du hash sur le téléphone et en alertant quand trop'sonr flaggues positive (avec check humain) * Ça s'appuie sur iCloud photo car sur leur cloud mais pas un filtre serveur * Base de donnée Baked dans chaque iOS * NeuralHash * Hash résiste au ré cadrage et autres ajustement de photos * Threshold secret sharing * Au bout de n rapports remontés, on a capacité à reconstituer la clef de chiffrement * Et un troisième mécanisme pour éviter de montrer qu'elles photos intéressent Apple * Quid d'une puissance étrangère qui veut rajouter des photos de discidents? * Apple dit on n'acceptera pas * Où attaque sur le neural hash * Détection de nudité et demande si l'nfznt veut voir avec alerte aux parents * Ils se donnent quelques mois de retravail au final [AWS a 15 ans](https://aws.amazon.com/fr/blogs/aws/happy-15th-birthday-amazon-ec2/) * demarre avec une region, un seul type d'instance et tout ephemère (pas de block storage) * peu de feature et peu de details initialement * prix a l'heure initialement qui etait innovant ### Data [La guerre de la recherche - Les clients Elastic Search ne seront pas compatible avec OpenSearch](https://thenewstack.io/this-week-in-programming-the-elasticsearch-saga-continues/) * Elastic vs AWS - Clash numéro ? Dans ce dernier épisode, Elastic rajoute des controles dans ses APIs clientes pour ne se connecter qu'a ses propres clusters et empêcher de les utiliser avec opensearch. * Risques d'incompatibilité * Manque de chance ce changement bloque aussi l'utilisation de la version OSS d'elastic-search. * De son coté AWS promet de faire son possible pour fournir des drivers qui resteront compatibles Elasticsearch 7.10.2 (la version à partir de laquelle ils ont forké) et OpenSearch * Bref la guerre continue ... ### Outillage [AtomicJar release TestContainers 1.16](https://www.atomicjar.com/2021/07/testcontainers-1-16-0-release/) * https://www.atomicjar.com/2021/07/testcontainers-1-16-0-release/ Test Containers 1.16.0 est la première release faite par AtomicJar, la société créée par les fondateurs du projet. * Meilleure compatibilité Apple M1 * Couche de transport utilise Apache HTTP Client 5 au lieu de OKHTTP pour éviter la malediction Kotlin * Meilleure stabilité et compatibilité sur Windows pour process natifs Windows et WSL 2 * docker.host peut etre configuré dans $HOME/.testcontainers.properties * Aussi Support Podman amélioré récemment [Docker introduit un nouveau système d'abonnement avec Docker Business et différents niveaux: perso, pro, entreprise etc](https://www.docker.com/blog/updating-product-subscriptions/) * donc pour les boites de plus de 250 personnes ou qui font 10 millions, tu dois payer pour Docker Desktop * [Des articles paraissent listant les alternatives à Docker Desktop](https://matt-rickard.com/docker-desktop-alternatives/) * [Sur l'impact macOS](https://twitter.com/idriss_neumann/status/1432943504485986305) * [How Docker broke in half](https://www.infoworld.com/article/3632142/how-docker-broke-in-half.html) [Les différentes manières de déclarer les dépendances dans son projet Gradle](https://medium.com/agorapulse-stories/gradle-configurations-explained-4b9608dd5e35) * En particulier, les différences entre api, implementation, runtimeOnly, compileOnly, compileOnlyApi Avec des exemples concrets pour bien illustre ces différents scopes. * Gradle regroupe les dépendances dans des ensembles appelés des “configurations”. Ces configurations définissent le classpath lors de la compilation, ou le classpath pour le runtime lorsque votre code s'exécute. * Gradle définit 3 types de configuration : api, implementation et runtimeOnly * La configuration “api” est utilisée pour le classpath compilation et runtime et est exposé aux consommateurs de l'API aussi pour le classpath de compilation et runtime * La configuration “implementation” est utilisée pour le classpath de compilation et runtime, mais est exposée pour le consommateur de l'API que pour le classpath au runtime * La configuration “runtimeOnly” n'est utilisée que pour le classpath au runtime * La configuration “compileOnly” est utilisée pour le classpath de compilation, mais n'est pas exposée pour les consommateurs * Enfin la configuration “compileOnlyApi” est utilisée pour le classpath de compliation et est exposée au consommateurs à la compilation de leur code quand les metadata Gradle sont utilisées ### Méthodologies [Opinion sur Googlespeak et les pratiques anti concurrentielles](https://zyppy.com/googlespeak/) * Certains dont l'auteur voient Google utiliser Google search pour placer hautement leur propres services alternatifs. Google flight etc * Et les Googlers avec qui il interagissait trouvait ça « absurde » de penser ça. * Chercher un hôtel * Étude montre que Google offre 41% de sa première page à ses propres propriétés (inclus direct answers ) * Direct answer est mis rapide pour l'utilisateur mais prend le contenu 3rd party ( Wikipedia, IMDb etc) et nous fait rester sur une page Google. * Googlespeak d'après Orwell. Si le langage ne permet pas d'exprimer , on ne pense pas aux choses. * Pas dominant mais succès. Pas barrière à l'entrée , marché, effet réseau qui sont taboo dans un contexte de tension antitrust * Encourage à réfréner sa communication écrite. * Comme beaucoup de sociétés américaines à cause du processus de discovery * Market share -> user preference * Apple et epic ont levés des doc similaires mais Apple n'était pas gardé dans sa comm interne. Autour de l'app store. * Google dans ses formation mention non monopoly car beaucoup de compétiteurs. Et se defini en termes très large et donc avec de la compétition. (Dans la pub et dans la recuperation d'information. * Ils ne font pas d'analyse de marchés (sur les marchés dominants) quand demandés par le congrès. * 65% des recherches n'entraînent pas un clic sur un site externe - valeur réfutée par Google * C'est une réaction à la judiciarusarion de la vie des entreprises. ### Loi, société et organisation [Matt Asay quitte AWS et reflecte sur l'open source chez AWS](https://www.infoworld.com/article/3631376/what-you-dont-know-about-working-with-aws.html) * pleins de petites equipes et pas de décisions top down * en tous cas pas pour open source * Un langage specifique a Amazon pour convaincre * Les Leadership Principles tendent à ne pas investir dans les elements side de type open source * et quand on a deux pizza team, peut on contribuer sans se sentir trop contraint en temps * si c'est une équipe de 12 sur 200 equipes ca ne m'étonnes pas trop ???? [L'Open Source au secours du développeur (et de l'architecte) ?](https://philippart-s.github.io/blog/articles/dev/oss-for-developer/), un retour d'expérience très personnel mais instructif pour ceux qui souhaiteraient se lancer ... * Pourquoi l'Open Source ? * Par où commencer ? * Le choix du premier projet pour sa première contribution? (Le syndrome de l'imposteur) * La première contribution * Rythme de travail ## Outils de l'épisode [Fit Desk](https://thefitdesk.com) * Antonio passe au [Fit Desk](https://thefitdesk.com) pour travailler en pédalant * Promis, il écrira un blog dans 4/6 mois avec du feedback ## Rubrique débutant [RISC vs CISC](https://medium.com/swlh/what-does-risc-and-cisc-mean-in-2020-7b4d42c9a9de) * CISC roi quand la mémoire est chère, on crée des instructions haut niveau plus complexes * RISC paye en mémoire mais simplifie la chaîne de travail (instructions de taille fixe) * RISC plus d'opérations et donc de CPU clock mais pipelining possible * RISC compensé par plus de registers et par la compression d'instructions set * register mémoire interne CPU de taille fixe * CISC fait du hardware hyper threading * RISC philosophiquement fait travailler les compilateurs beaucoup plus mais on ne code plus en assembleur ## Conférences Crowdcast sur devfest Lille et CloudNord par Emmanuel Demey [Pas de Devoxx Belgique en 2021](https://twitter.com/stephan007/status/1432254876436815874?s=21) ## Nous contacter Soutenez Les Cast Codeurs sur Patreon [Faire un crowdcast ou une crowdquestion](https://lescastcodeurs.com/crowdcasting/) Contactez-nous via twitter sur le groupe Google ou sur le site web
Chelsea mengalami naik turun musim lalu dan siap menghadapi musim ini ! Bagaimana review dan previewnya ? Kok bisa pede Jorginho menang ? Langsung saja dengarkan obrolan @darmakkusuma dengan bintang tamu spesialnya yaitu Mas Hadist ketua Chelsea Indo Supporter Club Jakarta
Entrevistamos a la corresponsal Ángeles Espinosa tras su llegada a Kabul, tenemos La Ventana de los números y hablamos con una investigadora del CISC sobre la posibilidad conseguir tratamientos que acaben con el envejecimiento celular
I processori ARM sono oggi diffusissimi e contribuiscono a far funzionare i milioni di dispositivi che usiamo quotidianamente. Ma questa famiglia di processori è nata quasi per caso e ha persino rischiato di non vedere mai la luce.I link dell'episodio di oggi:How an obscure British PC maker invented ARM and changed the world - https://arstechnica.com/features/2020/12/how-an-obscure-british-pc-maker-invented-arm-and-changed-the-world/ RISC vs CISC - https://cs.stanford.edu/people/eroberts/courses/soco/projects/risc/risccisc/ ------------------------------------------Sito ufficiale di Pensieri in codice - https://pensieriincodice.it Per sostenere il progetto:Compra su Amazon* - https://amzn.to/2MGITWk Lista dei desideri - https://pensieriincodice.it/360s8Kx Attrezzatura:Shure Microfono Podcast USB MV7* - https://amzn.to/3862ZRf * Link affiliato: il costo di un qualsiasi acquisto non sarà maggiore per te, ma Amazon mi girerà una piccola parte del ricavato. I miei progetti social:Pensieri in codice - https://pensieriincodice.it Canale Twitch - https://valeriogalano.it/twitch Daredevel blog - https://valeriogalano.it/daredevel Newsletter - https://valeriogalano.it/newsletter Per essere aggiornati sulle novità:Canale Telegram - https://pensieriincodice.it/canaletelegram Profilo Instagram - https://valeriogalano.it/instagram Profilo Twitter - https://valeriogalano.it/twitter Per partecipare alla discussione:Gruppo Telegram - http://bit.ly/joinPicTelegram Servizi professionali:Lezioni private su Docety - https://valeriogalano.it/docety Consulenza professionale - https://valeriogalano.it Crediti:Voce intro - Costanza Martina VitaleMusica - Kubbi - Up In My JamMusica - Light-foot - Moldy Lotion
I processori ARM sono oggi diffusissimi e contribuiscono a far funzionare i milioni di dispositivi che usiamo quotidianamente. Ma questa famiglia di processori è nata quasi per caso e ha persino rischiato di non vedere mai la luce. I link dell’episodio di oggi: How an obscure British PC maker invented ARM and changed the world - https://arstechnica.com/features/2020/12/how-an-obscure-british-pc-maker-invented-arm-and-changed-the-world/ RISC vs CISC - https://cs.stanford.edu/people/eroberts/courses/soco/projects/risc/risccisc/ —————————————— Sito ufficiale di Pensieri in codice - https://pensieriincodice.it Attrezzatura: Shure Microfono Podcast USB MV7* - https://amzn.to/3862ZRf Link affiliato: il costo di un qualsiasi acquisto non sarà maggiore per te, ma Amazon mi girerà una piccola parte del ricavato. I miei progetti social: Pensieri in codice - https://pensieriincodice.it Canale Twitch - https://valeriogalano.it/twitch Daredevel blog - https://valeriogalano.it/daredevel Newsletter - https://valeriogalano.it/newsletter Per essere aggiornati sulle novità: Canale Telegram - https://pensieriincodice.it/canaletelegram Profilo Instagram - https://valeriogalano.it/instagram Profilo Twitter - https://valeriogalano.it/twitter Per partecipare alla discussione: Gruppo Telegram - http://bit.ly/joinPicTelegram Servizi professionali: Lezioni private su Docety - https://valeriogalano.it/docety Consulenza professionale - https://valeriogalano.it Sostieni il progetto Sostieni tramite Satispay Sostieni tramite Revolut Sostieni tramite PayPal Sostieni utilizzando i link affiliati di Pensieri in codice: Amazon, Todoist, ProtonMail, ProtonVPN, Satispay Partner GrUSP (Codice sconto per tutti gli eventi: community_PIC) Schrödinger Hat Crediti Montaggio - Daniele Galano - https://www.instagram.com/daniele_galano/ Voce intro - Costanza Martina Vitale Musica - Kubbi - Up In My Jam Musica - Light-foot - Moldy Lotion Cover e trascrizione - Francesco Zubani
Linh wonders what Apple silicon is, and Dimitri tries his best to explain it… slowly… Errata: Taiwan Semiconductor Manufacturing Company (TSMC) Complex Instruction Set Computer (CISC) Reduced Instruction Set Computer (RISC)
✘ Werbung: https://www.Whisky.de/shop/ Von der Computergemeinde fast nicht bemerkt, vollzieht sich gerade eine disruptive Unterbrechung in der CPU-Entwicklung. Jeder aus der Informationstechnologie kennt das empirische Moore'sche Gesetz, das die Verdopplung der #Prozessorleistung alle 2 Jahre beschreibt. Doch dieses Gesetz nach #Moore ist nicht umfassend. Es gibt Bereiche, die schneller laufen als andere. Und das führt in naher Zukunft zur Disruption, weil der #Energieverbrauch der Prozessoren um mehr als eine Zehnerpotenz abnimmt. Doku Faichild ► https://youtu.be/DCbRZGDV-ws Doko Intel ► https://youtu.be/JH2nXMv6yZI Ray Kurzweil ► https://youtu.be/5Ma33-ibjHs Chromebooks ► https://youtu.be/nor5BOJUY8M
RISC vs. CISC: Ist der uralte Streit um die bessere Prozessor-Befehlssatzarchitektur wirklich beendet? Folge 2021/5 des Podcasts Bit-Rauschen.
A pure celebration of geekdom and nerd squads. As I said to my daughter just before recording this: "I'm like a super geekazoid, huh?" Her answer: "Yeah you are." Aha! Someone agrees with me! This episode stays in the technical domain. There's a lot to talk about in the world of computers and the components that enable them. We will be going from a discussion of Raspberry Pi to the Apple M1 creating a mighty hunger for some Apple Pie.I received a parcel from across the pond today. It contained a Raspberry Pi Pico, the new $4 programmable microprocessor, arriving from the England. The Pi Pico intrigues me because I have already thought of some cool projects to use them for. One of the projects is a sweet Valentine's oriented couple's project: to merge my sweetie Sue's hobby (arts and crafts) with my geeky creations to create something interesting and fun. Now I just have to implement at least part of it by Valentine's day because I think this is a clever, unique, interesting way to bring our leisure hobbies together. How much more (super geek) romantic could something be? I am not joking about this either.I had already been in the middle of several Raspberry Pi projects using Pi Zero W, several Pi 3bs, and a Pi 4/4GB RAM. The image for this episode shows some of the Pi boards, my soldering workstation, and peripheral components such as a hi quality camera, sound cards and synthesizers, a breadboard and other cool nerd toys. If you look closely, there's a yellow CD case from Symantec C++, a product I worked on while working at Symantec in the early 1990s. It's there as a reminder and behind it are some Jibo robots. I "stage" my work areas to always include something inspirational whether a book, product, picture, guitar, piece of some product from my 40 years as a maker, or pictures of puppies.Many products are mentioned. None paid or asked for placement. This remains an non-monetized, unbiased, rant-oriented podcast series. But at the end I hint that one of the companies should consider sponsoring me in some way based on the plans I have to do business with them.Music is just some pre-Super Bowl snippets from a 45 minute, high gain, loud, experimental jam. It was like driving a Mustang Cobra with 600 Horsepower on the verge of losing its grip on the pavement. This is why we love tubes. The responsiveness and added harmonic content is delicious and oh so satisfying. Apologies to Ms Sue. I played super duper loud pushing all 4 tubes in the recording chain to their limits and letting the Tele bridge pickup work it's magic. Played on Liz The Firecracker (2020 Squier by Fender Affinity Tele with special upgrades) through Blackstar Studio 10 KT88 with new Genalex Gold Lion tubes for both the 12AX7 preamp and KT88 power amp. Another Gold Lion in the SM57's signal chain pointed two inches off center of the Celestion, and an Electro Harmonix 12AX7 LPS in the Rode NT5 room mics signal chain. All tubes hand selected and modern Russian-made reissues of the classic British tubes.Blah, blah, blah. My intros are longer than the episodes!
Der Computerprozessor-Markt ist gerade ziemlich aufgeregt: Grund ist Apples «M1»-Chip. Wir sprechen unter anderem mit einem ehemaligen Intel-Mitarbeiter um die Frage zu klären, ob sich der führende Chiphersteller nun warm anziehen muss. Der Podcast im Überblick: (00:00:38) Feedback: Relais, dritte Runde (00:03:51) Befeuert Apples «M1»-Chip den Kampf RISC versus CISC? (00:20:07) Gumpen! Mit «Sackboy: A big adventure» (00:25:52) Gamestop: Wir ordnen ein - zusammen mit Wirtschaftsredaktor Samuel Emch
Der Computerprozessor-Markt ist gerade ziemlich aufgeregt: Grund ist Apples «M1»-Chip. Wir sprechen unter anderem mit einem ehemaligen Intel-Mitarbeiter um die Frage zu klären, ob sich der führende Chiphersteller nun warm anziehen muss. Der Podcast im Überblick: (00:00:38) Feedback: Relais, dritte Runde (00:03:51) Befeuert Apples «M1»-Chip den Kampf RISC versus CISC? (00:20:07) Gumpen! Mit «Sackboy: A big adventure» (00:25:52) Gamestop: Wir ordnen ein - zusammen mit Wirtschaftsredaktor Samuel Emch
Der Computerprozessor-Markt ist gerade ziemlich aufgeregt: Grund ist Apples «M1»-Chip. Wir sprechen unter anderem mit einem ehemaligen Intel-Mitarbeiter um die Frage zu klären, ob sich der führende Chiphersteller nun warm anziehen muss. Der Podcast im Überblick: (00:00:38) Feedback: Relais, dritte Runde (00:03:51) Befeuert Apples «M1»-Chip den Kampf RISC versus CISC? (00:20:07) Gumpen! Mit «Sackboy: A big adventure» (00:25:52) Gamestop: Wir ordnen ein - zusammen mit Wirtschaftsredaktor Samuel Emch
Today's podcast is a conversation with Pat White. Pat is the Futsal Director and Camp director for Charlotte Independence Soccer Club. Pat is also a former 10+ year indoor and outdoor soccer pro as well as a former member of the US Futsal National Team. More information on CISC's Spring Camp programming can be found on our website: Charlotte Independence SC - powered by Oasys Sports (independencesoccer.club).More information CISC's Spring Futsal programming can also be found on our website: Charlotte Independence SC - powered by Oasys Sports (independencesoccer.club).You can reach out to Pat directly at patw@independencesoccer.club. Recorded: Tuesday, February 2nd, 2021.Music: "Day Trips" by KetsaFrom the Free Music ArchiveCC BY NC
Let's oversimplify something in the computing world. Which is what you have to do when writing about history. You have to put your blinders on so you can get to the heart of a given topic without overcomplicating the story being told. And in the evolution of technology we can't mention all of the advances that lead to each subsequent evolution. It's wonderful and frustrating all at the same time. And that value judgement of what goes in and what doesn't can be tough. Let's start with the fact that there are two main types of processors in our devices. There's the x86 chipset developed by Intel and AMD and then there's the RISC-based processors, which are ARM and for the old school people, also include PowerPC and SPARC. Today we're going to set aside the x86 chipset that was dominant for so long and focus on how the RISC and so ARM family emerged. First, let's think about what the main difference is between ARM and x86. RISC and so ARM chips have a focus on reducing the number of instructions required to perform a task to as few as possible, and so RISC stands for Reduced Instruction Set Computing. Intel, other than the Atom series chips, with the x86 chips has focused on high performance and high throughput. Big and fast, no matter how much power and cooling is necessary. The ARM processor requires simpler instructions which means there's less logic and so more instructions are required to perform certain logical operations. This increases memory and can increase the amount of time to complete an execution, which ARM developers address with techniques like pipelining, or instruction-level parallelism on a processor. Seymour Cray came up with this to split up instructions so each core or processor handles a different one and so Star, Amdahl and then ARM implemented it as well. The X86 chips are Complex Instruction Set Computing chips, or CISC. Those will do larger, more complicated tasks, like computing floating point integers or memory searches, on the chip. That often requires more consistent and larger amounts of power. ARM chips are built for low power. The reduced complexity of operations is one reason but also it's in the design philosophy. This means less heat syncs and often accounting for less consistent streams of power. This 130 watt x86 vs 5 watt ARM can mean slightly lower clock speeds but the chips can cost more as people will spend less in heat syncs and power supplies. This also makes the ARM excellent for mobile devices. The inexpensive MOS 6502 chips helped revolutionize the personal computing industry in 1975, finding their way into the Apple II and a number of early computers. They were RISC-like but CISC-like as well. They took some of the instruction set architecture family from the IBM System/360 through to the PDP, General Nova, Intel 8080, Zylog, and so after the emergence of Windows, the Intel finally captured the personal computing market and the x86 flourished. But the RISC architecture actually goes back to the ACE, developed in 1946 by Alan Turing. It wasn't until the 1970s that Carver Mead from Caltech and Lynn Conway from Xerox PARC saw that the number of transistors was going to plateau on chips while workloads on chips were growing exponentially. ARPA and other agencies needed more and more instructions, so they instigated what we now refer to as the VLSI project, a DARPA program initiated by Bob Kahn to push into the 32-bit world. They would provide funding to different universities, including Stanford and the University of North Carolina. Out of those projects, we saw the Geometry Engine, which led to a number of computer aided design, or CAD efforts, to aid in chip design. Those workstations, when linked together, evolved into tools used on the Stanford University Network, or SUN, which would effectively spin out of Stanford as Sun Microsystems. And across the bay at Berkeley we got a standardized Unix implementation that could use the tools being developed in Berkely Software Distribution, or BSD, which would eventually become the operating system used by Sun, SGI, and now OpenBSD and other variants. And the efforts from the VLSI project led to Berkely RISC in 1980 and Stanford MIPS as well as the multi chip wafer.The leader of that Berkeley RISC project was David Patterson who still serves as vice chair of the RISC-V Foundation. The chips would add more and more registers but with less specializations. This led to the need for more memory. But UC Berkeley students shipped a faster ship than was otherwise on the market in 1981. And the RISC II was usually double or triple the speed of the Motorola 68000. That led to the Sun SPARC and DEC Alpha. There was another company paying attention to what was happening in the RISC project: Acorn Computers. They had been looking into using the 6502 processor until they came across the scholarly works coming out of Berkeley about their RISC project. Sophie Wilson and Steve Furber from Acorn then got to work building an instruction set for the Acorn RISC Machine, or ARM for short. They had the first ARM working by 1985, which they used to build the Acorn Archimedes. The ARM2 would be faster than the Intel 80286 and by 1990, Apple was looking for a chip for the Apple Newton. A new company called Advanced RISC Machines or Arm would be founded, and from there they grew, with Apple being a shareholder through the 90s. By 1992, they were up to the ARM6 and the ARM610 was used for the Newton. DEC licensed the ARM architecture to develop the StrongARMSelling chips to other companies. Acorn would be broken up in 1998 and parts sold off, but ARM would live on until acquired by Softbank for $32 billion in 2016. Softbank is currently in acquisition talks to sell ARM to Nvidia for $40 billion. Meanwhile, John Cocke at IBM had been working on the RISC concepts since 1975 for embedded systems and by 1982 moved on to start developing their own 32-bit RISC chips. This led to the POWER instruction set which they shipped in 1990 as the RISC System/6000, or as we called them at the time, the RS/6000. They scaled that down to the Power PC and in 1991 forged an alliance with Motorola and Apple. DEC designed the Alpha. It seemed as though the computer industry was Microsoft and Intel vs the rest of the world, using a RISC architecture. But by 2004 the alliance between Apple, Motorola, and IBM began to unravel and by 2006 Apple moved the Mac to an Intel processor. But something was changing in computing. Apple shipped the iPod back in 2001, effectively ushering in the era of mobile devices. By 2007, Apple released the first iPhone, which shipped with a Samsung ARM. You see, the interesting thing about ARM is they don't fab chips, like Intel - they license technology and designs. Apple licensed the Cortex-A8 from ARM for the iPhone 3GS by 2009 but had an ambitious lineup of tablets and phones in the pipeline. And so in 2010 did something new: they made their own system on a chip, or SoC. Continuing to license some ARM technology, Apple pushed on, getting between 800MHz to 1 GHz out of the chip and using it to power the iPhone 4, the first iPad, and the long overdue second-generation Apple TV. The next year came the A5, used in the iPad 2 and first iPad Mini, then the A6 at 1.3 GHz for the iPhone 5, the A7 for the iPhone 5s, iPad Air. That was the first 64-bit consumer SoC. In 2014, Apple released the A8 processor for the iPhone 6, which came in speeds ranging from 1.1GHz to the 1.5 GHz chip in the 4th generation Apple TV. By 2015, Apple was up to the A9, which clocked in at 1.85 GHz for the iPhone 6s. Then we got the A10 in 2016, the A11 in 2017, the A12 in 2018, A13 in 2019, A14 in 2020 with neural engines, 4 GPUs, and 11.8 billion transistors compared to the 30,000 in the original ARM. And it's not just Apple. Samsung has been on a similar tear, firing up the Exynos line in 2011 and continuing to license the ARM up to Cortex-A55 with similar features to the Apple chips, namely used on the Samsung Galaxy A21. And the Snapdragon. And the Broadcoms. In fact, the Broadcom SoC was used in the Raspberry Pi (developed in association with Broadcom) in 2012. The 5 models of the Pi helped bring on a mobile and IoT revolution. And so nearly every mobile device now ships with an ARM chip as do many a device we place around our homes so our digital assistants can help run our lives. Over 100 billion ARM processors have been produced, well over 10 for every human on the planet. And the number is about to grow even more rapidly. Apple surprised many by announcing they were leaving Intel to design their own chips for the Mac. Given that the PowerPC chips were RISC, the ARM chips in the mobile devices are RISC, and the history Apple has with the platform, it's no surprise that Apple is going back that direction with the M1, Apple's first system on a chip for a Mac. And the new MacBook Pro screams. Even software running in Rosetta 2 on my M1 MacBook is faster than on my Intel MacBook. And at 16 billion transistors, with an 8 core GPU and a 16 core neural engine, I'm sure developers are hard at work developing the M3 on these new devices (since you know, I assume the M2 is done by now). What's crazy is, I haven't felt like Intel had a competitor other than AMD in the CPU space since Apple switched from the PowerPC. Actually, those weren't great days. I haven't felt that way since I realized no one but me had a DEC Alpha or when I took the SPARC off my desk so I could play Civilization finally. And this revolution has been a constant stream of evolutions, 40 years in the making. It started with an ARPA grant, but various evolutions from there died out. And so really, it all started with Sophie Wilson. She helped give us the BBC Micro and the ARM. She was part of the move to Element 14 from Acorn Computers and then ended up at Broadcom when they bought the company in 2000 and continues to act as the Director of IC Design. We can definitely thank ARPA for sprinkling funds around prominent universities to get us past 10,000 transistors on a chip. Given that chips continue to proceed at such a lightning pace, I can't imagine where we'll be at in another 40 years. But we owe her (and her coworkers at Acorn and the team at VLSI, now NXP Semiconductors) for their hard work and innovations.
Jan in Uroš se tokrat spustita v globine novega procesorja M1, ki ga je Apple predstavil v novih modelih Mac Mini, MacBook Air in MacBook Pro. Naroči se: Maja je na twitterju @majchi8, Jan je @th0r in Uroš @uros_m. Apgrejd je preprosto @Apgrejd. Mrežo Apparatus lahko podpreš tudi osebno. Zapiski: Apple Mac CISC vs. RISC, Gary Explains ARM vs. x86, Gary […]
Det stora kanelbullsbaket - ingen minns en fegis Alla har en ny Mac mini - vissa efter en viss mängd … bryderi … med UPS. Vad tycker vi? Bygger de på ren voodoo? Kommer någon annan att kunna komma ikapp? Och vem kommer att köpa en Intel-PC så länge Apples maskiner håller en ledning som denna? Hey! eldar e-post Kontotrötthet. Det har blivit så enkelt att handla på nätet så varför har inte alla butiker en “gästinloggning” där man inte behöver skapa konto för att handla, eller får ett konto skapat automatiskt åt sig för att man vill handla en jävla kabel? Film och TV The Crown, fjärde säsongen: Herregud vad bra, vackert och jobbigt. Alex Rider, första säsongen: Inte alls illa. Underhållande och lagom spännande. Länkar Mac mini med M1 - Jockes test för Datormagazin Kernel extension Railroads! Pirates! Senaste Talk show Många plugins för musik samtidigt Grubers text om M1-macarna MKBHD-videon om M1-Macbook pro CISC-arkitektur RISC-arkitektur Surface RT Holedown Full throttle remastered Whale trail Writeroom Instacast Morocco Front and center Homebrew Jekyll arch-kommandot i terminalen Hey! eldar mejl Brutal legend Enpass The crown - fjärde säsongen Alex Rider Margret Thatcher Gillian Anderson Hindenburg youtube-dl Björeman. Melin. Åhs. Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-235-en-bombmatta-av-p%C3%A4rlsocker.html.
Det stora kanelbullsbaket - ingen minns en fegis Alla har en ny Mac mini - vissa efter en viss mängd … bryderi … med UPS. Vad tycker vi? Bygger de på ren voodoo? Kommer någon annan att kunna komma ikapp? Och vem kommer att köpa en Intel-PC så länge Apples maskiner håller en ledning som denna? Hey! eldar e-post Kontotrötthet. Det har blivit så enkelt att handla på nätet så varför har inte alla butiker en “gästinloggning” där man inte behöver skapa konto för att handla, eller får ett konto skapat automatiskt åt sig för att man vill handla en jävla kabel? Film och TV The Crown, fjärde säsongen: Herregud vad bra, vackert och jobbigt. Alex Rider, första säsongen: Inte alls illa. Underhållande och lagom spännande. Länkar Mac mini med M1 - Jockes test för Datormagazin Kernel extension Railroads! Pirates! Senaste Talk show Många plugins för musik samtidigt Grubers text om M1-macarna MKBHD-videon om M1-Macbook pro CISC-arkitektur RISC-arkitektur Surface RT Holedown Full throttle remastered Whale trail Writeroom Instacast Morocco Front and center Homebrew Jekyll arch-kommandot i terminalen Hey! eldar mejl Brutal legend Enpass The crown - fjärde säsongen Alex Rider Margret Thatcher Gillian Anderson Hindenburg youtube-dl Två nördar - en podcast. Fredrik Björeman, Joacim Melin diskuterar allt som gör livet värt att leva. Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-235-en-bombmatta-av-pa%CC%88rlsocker.html.
Hakuro Matusda さんをゲストに迎えて、M1チップ、CPUの歴史、MacBook Air, PS5 などについて話しました。 Show Notes Apple Events - November 2020 Apple brings back the PC guy to boast about M1 performance Apple Announces The Apple Silicon M1: Ditching x86 - What to Expect, Based on A14 ノイマン型コンピュータ RISC vs. CISC Rebuild: 108: John Bull's Instruction Set (hak) IA-64 Explainer: What Is Chip Binning? MacBook Air with M1 chip beats 16-inch MacBook Pro performance in benchmark test How Apple Silicon on a M1 Mac changes monitor support and what you can connect Mac users couldn’t launch apps this afternoon after Apple verification server issue Does Apple really log every app you run? A technical look macOS 10.15: Slow by Design AMD announces AMD Radeon™ RX 6000 Series graphics cards Sony gives your PS4 a second life: slinging a PS5 to another room of your house Hillbilly Elegy | Netflix The Latest Covid Vaccine Results, Deciphered AIの遺電子 Blue Age 望郷太郎(3) で、シリコンバレーでいくら稼げるのか(Part 8) Glassdoor Levels.fyi
Welcome! This week I am spending a bit of time discussing Bitcoin and other crypto-currency and their tie to Ransomware and a couple of things the Feds are doing from the IRS to DOJ. Then we go into the Gig Economy and thru the ramifications of CA Prop 22 and More so listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: The feds just seized Silk Road’s $1 billion Stash of bitcoin Uber and Lyft in driving seat to remake US labor laws The One Critical Element to Hardening Your Employees' Mobile Security Ransom Payment No Guarantee Against Doxxing Connected cars must be open to third parties, say Massachusetts voters Tracking Down the Web Trackers Apple develops an alternative to Google search San Diego’s spying streetlights stuck switched “on,” despite a directive Paying ransomware demands could land you in hot water with the feds Windows 10 machines running on ARM will be able to emulate x64 apps soon 'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness Rise in Remote MacOS Workers Driving Cybersecurity 'Rethink' A Guide to the NIST Cybersecurity Framework --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] The silk road is back in the news as a billion dollars was just taken from their account. We're going to talk about mobile security, ransom payments, and doxing. And of course, a whole lot more as you listen right now. Hi, everybody, of course, Craig Peterson here. Thanks for spending a little time with me today. We have a bunch to get to. I think one of the most interesting articles, what kind of start with this week because this is a very big deal. We're talking about something called cryptocurrency, and I'm going to go into that a little bit. So for those of you who already know, just maybe there's something you'll learn from this little part of the discussion and then we'll get into Bitcoin more specifically. Then the secret service, what they have been doing to track down some of these illegal operators and also how this is really affecting ransomware. Those two, by the way, are just tied tightly together, Bitcoin and ransomware. So I'll explain why that is as well. Cryptocurrency has been around for quite a while now. There's a concept behind cryptocurrency and it's the most important concept of all, frankly, when it comes to cryptocurrency and that is you have to use advanced to mathematics in order to prove that you have found a Bitcoin. Time was you'd go out and go gold mining. Heck people are still doing it today. all over New England. It isn't just the Yukon or Alaska or Australia, et cetera. They're doing it right here. And they have proof that they found something that's very hard to find because they have a little piece of gold or maybe a nugget or maybe something that's like a huge nugget man. I saw a picture of one out of Australia that was absolutely incredible. Takes a few people to carry this thing. That is proof, isn't it? You can take that to the bank, ultimately. You sell it to a gold dealer who gives you cash. That you can then take to a bank. Then the bank account information is used to prove that you can buy something. You give someone a credit card, it runs a little check. Hey, are we going to let this guy buy it? Or a debit card? Hey, does he have enough money in the bank? So along with that pathway, you have something that is real. That's hard and that's the gold that was mined out of the ground. Then it very quickly becomes something that's frankly, unreal. Time was our currency was backed by gold and then it was backed by silver. Now it's backed by the full faith and credit of the United States government. not quite the same thing, is it? So we're dealing with money that isn't all that real, the United States agreed to not manipulate its currency. We became what's called the petrodollar. All petroleum products, particularly crude oil are sold on international exchanges using the US dollar. China is trying to change that. Russia's tried to change that. They're actually both going to change it by using a cryptocurrency. At least that's their plan. The idea behind cryptocurrency is that your money, isn't real either, right? You sure you've got a piece of paper, but it's not backed by anything other than the acceptance of it by somebody else. If you walk into Starbucks and you drop down a quarter for your coffee. Yeah, I know it's not a quarter used to be a dime. I remember it was a dime for a cup of coffee, not at Starbucks, but you dropped down your money. Okay. Your $10 bill for a cup of coffee at Starbucks, they'll take it because they know they can take that $10 and they can use it to pay an employee and that employee will accept it and then they can use that to buy whatever it is that they need. It's how it works. With Bitcoin, they're saying what's the difference? You have a Bitcoin. It's not real. Ultimately represents something that is real, but how is there a difference between accepting a Bitcoin and accepting a $5 bill? What is the difference between those two or that $10 bill that you put down at Starbucks? In both cases, we're talking about something that represents the ability to trade. That's really what it boils down to. Our currencies represent the ability to trade. Remember way back when, before I was born that a standard wage was considered a dollar a day. So people would be making money at a rate of a dollar a day. I remember that song, old country song. I sold my soul to the company's store and they made enough money just basically yet buy in to pay the company for the room and board and everything else they had. Interesting times, not fun, that's for sure for many people caught up in it. When you dig down behind Bitcoin, once you ultimately find at the root, was a computer that spent a lot of time and money to solve this massive mathematical equation. That's the basics of how that works. That's what Bitcoin mining is. Right now, it costs more to mine a Bitcoin. In most areas, then it costs for the electricity to run it and the hardware to buy it. There are computers that are purpose made. Just to create these Bitcoins, just to find them just to mine them. If you're sitting at home thinking, wow, I should get into a cryptocurrency and I'll just go ahead and mine it on my computer, that's really fun. It's a fun thing to think about. But in reality, you are not going to be able to justify it. You'd be better off to go and buy some gold or another precious metal. So that's how cryptocurrency has, how Bitcoin, that's how all of these really begin is just with the computer, trying to solve an incredibly complex math problem that can take weeks or months for it to solve. For those of you that want to dig a little bit more, basically, it's using prime numbers. You might remember messing with those in school. I remember, I wrote a program to determine prime numbers a long time ago. 45 plus years ago, I guess it was, and it was fun because I learned a lot about prime numbers back then. But we're dealing with multi-thousand digit numbers in some of these cases, just huge numbers, far too hard for you or I to deal with and that's why I take so incredibly long. Now we know how the value was started and that was with somebody running a computer finding that Bitcoin and putting it on the market. Now, normally when you're looking at market and market volatility, markets are supply and demand based except for government interference. We certainly have a lot of that in the United States. We do not have a completely free market system, not even close. The free market says I had to dig this hole and in order to dig that hole, I had to have a big backhoe. Before that, I had to have a bucket or maybe some other heavy equipment to move all of the earth out of the way, the bulldozers, et cetera. Then I had to run that through some sort of a wash plant and all of these things cost me money. So basically it costs me whatever it might be, a hundred bucks, in order to find this piece of gold, and then that hundred bucks now that it costs him to do it is the basis for the value of that piece of gold. Obviously, I'm not using real numbers, but just simple numbers to give you an idea of how cryptocurrency works. So it's a hundred bucks for me to get that piece of gold out of the ground. Then that piece of gold is taken and goes to some form of a distributor. So I'm going to sell that piece of gold to somebody that's going to melt it down. They're going to assay it and say, yeah, this is a hundred percent pure gold, and then they'll sell it to someone and then they'll sell it to someone and then they'll sell it to a jeweler who then takes it and makes jewelry. Every time along there they're adding stuff onto it. But the basic value of gold is based on how hard it is to get and how many people want to get their hands on it. The law of supply and demand. You've seen that over the years, it's been true forever. Really? That's how human trade works. Capitalism, in reality, is just the ability of strangers to trade with each other is just an incredible concept. What we're talking about here with the cryptocurrency is much the same thing. The value of cryptocurrency goes up and down a lot. Right now, one Bitcoin is worth about 15,000, almost $16,000 per bitcoin. We'll talk about that. What is Bitcoin? How can I even buy it? Pizza for the silly things were 16 grand, right? It's like taking a bar of gold to buy a pizza. How do you do that? How do you deal with that? So we'll get into that, and then we'll get into how the tie between cryptocurrencies, particularly Bitcoin, and the criminal underground. That tie is extremely tight and what that means to you. It is tied directly into the value of Bitcoin. Right now the basis is it costs me 16 grand to mine, a Bitcoin. Therefore that's where I'm going to sell it for, of course, there are profit and everything else that you put into that $16,000 number. We've got a lot more to get to today. We're going to talk about this billion dollars, which is, that's a real piece of money here that the feds just seized. Right now talking about Bitcoin. What's the value of it? How is it tied into criminal enterprises and what's going on with the FBI seizure this week? Bitcoin's value has been going up and down. I just pulled up during the break, a chart showing me the value of Bitcoin over the last 12 months. It has been just crazy. going back years it was worth a dollar. I think the Bitcoin purchase was for a pizza, which is really interesting when you get right down to it. The guy says, Oh yeah, what the heck, take some Bitcoin for it. Okay. here we go. May 22nd, 2010 Lasso Lowe made the first real-world transaction by buying two pizzas in Jacksonville, Florida for 10,000 Bitcoin. 10,000 Bitcoin. So let me do a little bit of math here. Let me pull it up here. Today's price is about $15,750,000. So he bought it. Two pizzas for the value today, Bitcoin of $157 million. That's actually pretty simple math, $157 million. Okay, that was 10 years ago. The first Bitcoin purchase. So it has gone up pretty dramatically in price. I think the highest price for one Bitcoin was $17,900. It was almost $18,000 and then it's dropped down. It has gone up and it has gone down quite a bit over the years. It seems to have had a few really hard drop-offs when it hit about 14,000. Right now it is above that. So I'm not giving investment advice here, right? That's not what I do. We're talking about the technology that's behind some of this stuff, but one Bitcoin then. Is too much for a pizza, right? So he paid 10,000 Bitcoin for his first pizza. That's really cool, but, ah, today where it's another word, the Bitcoin was worth just a fraction of a cent each back then. Today you can't buy a pizza for one Bitcoin. So Bitcoin was designed to be chopped up so you can purchase and you can sell them at a fraction of a Bitcoin. That's how these transactions are happening. Now there's a lot of technology we won't get into that's behind all of this and how the transactions work and having a wallet, a Bitcoin wallet, and how the encryption works and how all of these logs work. The audits, basically the journals that are kept as accountants and how a majority of these have to vote and say that particular transaction was worthwhile. The fact that every Bitcoin transaction is not only stored but is stored on thousands of computers worldwide. Okay. There's a whole lot to that, but let's get into the practical side. If you are a bad guy. If you are a thief. If you're into extortion. If you're doing any of those things, how do you do it without the government noticing? In reality, it's impossible when you get right down to it. Nothing is completely anonymous and nothing ever will be most likely, completely anonymous. But they still do it anyway, because, in reality, they, the FBI or the secret service or whoever's investigating has to be interested enough in you and what you're doing in order to track you down. If they are interested enough, they will track you down. It really is that simple. Enter a convicted criminal by the name of Ross Ulbricht Ross was running something online, a website called the silk road. It was what's known as the dark web. If you've listened to the show long enough, the history of the dark web and that it was founded by the US government. In fact, the dark web is still maintained by the government. I'm pretty sure it's still the Navy that actually keeps the dark web online. The thinking was we have the dark web. It's difficult for people to track us here on the dark web and if we use something like Bitcoin, one of these cryptocurrencies for payment, then we are really going to be a lot safer. Then they added one more thing to the mix called a tumbler. And the idea with the tumbler is that if I'm buying something from you using Bitcoin, my wallet shows that I transferred the Bitcoin to you. All of these verification mechanisms that are in place around the world also know about our little transaction, everybody knows. The secrecy is based on the concept of a Swiss bank account. When with that Swiss bank account, you have a number and obviously you have a name, but it is kept rather anonymous. The same, thing's true with your wallet. You have a number, it's a big number to a hexadecimal number. It is a number that you can use and you can trade with. You've got a problem because, ultimately, someone looking at these logs who knows who you are or who I am or wants to figure out who either one of us is probably can. And once they know that they can now verify that you indeed are the person who made that purchase. So these tumblers will take that transaction instead of me transferring Bitcoin directly to you, the Bitcoin gets transferred to another wallet. Then from that wallet to another wallet and from that wallet to another wallet and from that wallet to a number of another wallet. Now is much more difficult to trace it because I did not have a transaction directly with you. Who is in the middle? That's where things start getting really difficult. But as Russ Ulbricht found out, it is not untraceable. He is behind bars with two life sentences plus 40 years. What they were doing on the silk road is buying and selling pretty much anything you can think of. You could get any hard drug that you wanted there, you could get fake IDs, anything, really, anything, even services that you might want to buy. There are thousands of dealers on the silk road. Over a hundred thousand buyers, according to the civil complaint that was filed on Thursday this week. Last week, actually, the document said that silk road generated a revenue of over 9.5 million Bitcoins and collected commissions from these sales of more than 600,000 Bitcoin. Absolutely amazing. Now you might wonder, okay. Maybe I can buy a pizza with Bitcoin or something elicit with Bitcoin, but how can I use it in the normal world while there are places that will allow you to convert Bitcoin into real dollars and vice versa? In fact, many businesses have bought Bitcoin for one reason and one reason in particular. That reason is insurance. They have bought Bitcoin in case they get ransomware. They just want it to sit in there, to use to pay ransoms. We'll talk more about that. We're turning into the Bitcoin hour, I guess today. we are talking a lot about it right now because it's one of the top questions I get asked. The IRS is saying that they may put a question on your tax return next year, about cryptocurrency specifically Bitcoin. So what's that all about? And by the way, the IRS had a hand in this conviction too. Your listening to Craig Peterson. We just mentioned, gentlemen, I don't know if he's a gentleman, by the name of Ross Ulbricht and he is behind bars for life. He was buying and selling on the. A website called the silk road. In fact, he was the guy running it, according to his conviction and two life terms, plus 40 years seems like a long time. In other words, he's not getting out. The internal revenue service had gotten involved with this as well because you are supposed to pay taxes on any money you earn. That is a very big deal when you're talking about potentially many millions of dollars. So let's figure this out. I'm going to say, some 9.5 million. So 9 million, 500,000. There we go, Bitcoin. What do we want to say? Let's say the average value of that Bitcoins over time, there was about $5,000 apiece. Okay. So let's see times 5,000, Oh wow. That's a big number. It comes back to 47 billion. There you go. $500 million dollars. Almost $50 billion. That's just really rough back of the envelope math. We have no idea. So that's a lot of money to be running through a website. Then the commission that he made on all of those sales is said to have been more than 600,000 Bitcoin. So again, 600,000 times let's say an average price of $5,000 per Bitcoin. So that's saying he probably made about $3 billion gross anyways, on these collected commissions. That is amazing. The IRS criminal investigation arm worked with the FBI to investigate what was happening here as well as, by the way, the secret service. I got a briefing on this from the secret service and these numbers are just staggering, but here's the problem. The guy was sentenced a few years ago. 2015 he was prosecuted successfully. where did all of his money go? His money was sitting there in Bitcoin, in an unencrypted wallet, because part of the idea behind your Bitcoin wallet is there are passcodes and nobody can get at that your wallet information unless they have the passcode. So they might know what your wallet number is, which they did. The secret service and the IRS knew his wallet number, but how can they get at that Bitcoin and the money it represents? They did. This is like something really from one of these, TV shows that I don't watch right there. What is it? NCU? The crime investigator unit CIU or whatever it is on TV. I can't watch those because there's so much stuff they get wrong technically, and I just start screaming at the TV. It's one of those things. What they found is that the wallet hadn't been used in five years. They found that just last week, people who've been watching his Bitcoin wallet number, found that they were about 70,000 Bitcoins transferred from the wallet. So people knew something was going on. Then we ended up having a confirmation. The feds had admitted that it was them. They had gone ahead and they had a hacker get into it. So here's a quote straight from the feds. That was an ARS Technica this week, according to the investigation, individual X was able to hack into silk road and gain unauthorized and illegal access and thereby steal the illicit cryptocurrency from silk road and move it into wallets and individual X controlled. According to the investigation, Ulbricht became aware of individual X's online identity and threatened individual X for the return of the cryptocurrency to Ulbricht. So Ulbricht had his cryptocurrency stolen, which by the way, is if you are dealing with Bitcoin, that is very common, not that it's stolen. It does get stolen and it's not uncommon. It's very common for the bad guys to try and hack into your Bitcoin wallet. That's part of the reason they install key loggers so they can see what the password is to your wallet. So apparently that unknown hacker did not return or spend the Bitcoin, but on Tuesday they signed consent and agreement to forfeiture with the US attorney's office in San Francisco and agreed to turn over the funds to the government. Very complex here. There are a lot of links that the Silkroad founder took to really obfuscate the transfer of the funds. There's tons of forensic expertise that was involved and they eventually unraveled the true origins of Bitcoin. It is absolutely amazing. Earlier this year they used a third-party Bitcoin attribution company to analyze the transactions that had gone through the silk road. They zeroed in on 54 trends and actions, the transferred 70,000 Bitcoins to two specific wallets. I said earlier, by the way, that it was hex, it isn't hex. It's mixed upper lower case. characters as well as numbers. And, so it's a base. What is it? 26, 40, 60 something. The Bitcoin is valued at about $354,000 at the time. I don't know about you. I find this stuff absolutely fascinating. There's a lot of details on how it was all done and they got the money back. So with a cryptocurrency, you're not completely anonymous. As the founder of the silk road finds out. You end up with criminal organizations trying to use it all the time. Just having and using Bitcoin can raise a red flag that you might be part of a criminal organization. So you got to watch that okay. In addition to that, The IRS is looking to find what it is you have made with your Bitcoin transactions because almost certainly those are taxable transactions. If you've made money off of Bitcoin. Now you'd have to talk to your accountant about writing off money that you lost when you sold Bitcoin after it had dropped. I do not own any Bitcoin. I don't. I played with this years ago and I created a wallet. I started doing some mining, trying to just get to know this, so I'm familiar with this. I've done it. I haven't played with it for a long time. If you have made money on Bitcoin and you sold those Bitcoin, or even if you transferred Bitcoin and the profits as Bitcoin, you all money to the IRS. Now the feds have their hands on almost a billion dollars worth of Bitcoin, just from this one guy. that's it for Bitcoin for today. We're going to talk about Uber and Lyft and how they're in the driver's seat right now to maybe remake labor laws in about two or three dozen States almost right away. Are you, or maybe somebody driving for Uber or Lyft, or maybe you've been thinking about it? There are a lot of problems nationwide when it comes to employee status. We're going to talk about the gig economy right now. Hey, thanks for joining me, everybody. You are listening to Craig Peterson. Hey, Uber and Lyft are two companies that I'm sure you've heard of. If you heard about the general category here, it's called the gig economy. The gig economy is where you have people doing small things for you or your business. That's a gig. So during this election season, for instance, I turned somebody on to a site called Fiverr, F I V E R R.com, which is a great site. I've used it many times. I turned them on saying that because they wanted a cartoon drawn there is no better place than to go to Fiverr. Find somebody who has a style you like, and then hire them. It used to be five bucks apiece, nowadays not so much, it could be 20, it could be a hundred, but it is inexpensive. When you hire somebody to do that as a contractor, there are rules and regulations to determine. If you are an employee versus an independent contractor, there are a lot of rules on all of this, including filing 1099s. But can you decide whether or not they are a contractor? So let's look at the rules here. I'm on the IRS website right now and they have some basic categories. So number one, behavioral control, workers, and employee, when the business has the right to direct and control the work performed by the worker. Even if that right is not exercised. Then they give some reasons for behavioral control, like the types of instructions given, when and where to work, the tools to use the degree of instruction. I think the big one is training to work on how to do the job, because frankly, even if you're hiring somebody to do something for you, that takes an hour. You have control over their behavior. But how about an Uber driver or Lyft driver? Are you telling them where to go? Duh, of course, you are. are you telling them, Hey, don't take that road because the Westside highway so busy this time of day, of course, you are? It looks like they might be employees but under behavioral control. Next step financial control. Does the business have a right to direct or control the financial and business aspects of the worker's job, such as significant investment in the equipment they're using unreimbursed expenses, independent contractors, and more likely to incur unreimbursed expenses than employees? there you go. Okay. So no that Uber Lyft driver, that person making the cartoon, I don't have any financial control over their equipment. Relationship. How do the worker and the business perceive their interaction with each other in written contracts? Or describe the relationship? Even if the worker has a contract that says they are a contractor does not mean that they aren't a contractor. By the way, if you're not withholding the taxes and paying them as an employee, and then they don't pay their taxes and the IRS comes coming after somebody they're coming after you as well for all of those that you did not pay taxes on. Then it goes into the consequences of misclassifying an employee goes on. So there are people who could maybe they're an employee, maybe their contractor, but with Uber and Lyft, California decided to put it on the ballot because both Uber and Lyft were saying, we're pulling out of California. California has a state income tax and they want to collect that income tax. Plus California, we're saying, Oh, we care about the drivers. Maybe they do. Maybe they don't. I'm a little jaded on that.I might say because I had a couple of companies out in California, way back in the day. So the California voters had it on the ballot just here. What a week ago? A little more than a week ago, maybe two almost now isn't it. They decided to let Uber and other gig economy companies continue to treat the workers as independent contractors. That is a very big deal. Because now what's happened because of this overwhelming approval of proposition 22, these companies are now exempt from a new employment law that was passed last year in California. So what goes out the window here the well minimum rate of pay, healthcare provisions, et cetera. And by the way, They still can get this minimum pay and healthcare provisions. Okay. They can still get it. It's still mandated out there, but it's absolutely just phenomenal. Apparently, the law that was passed last year was started because these gig people can really cut the cost of something and other people just weren't liking it. Frankly, gig companies also outspent the opposition by a ratio of $10 to $1, which is amazing. 10 to one on. Trying to get this proposition to pass. So it's a very big deal. And what it means is in California, these gig workers are independent contractors, but there's a couple of dozen states that are looking at this, including to our South, or maybe the state you're listening in. If you're listening down in mass right now, but South of where I am. In Massachusetts, the state attorney general has sued Uber and Lyft over worker classification. And this, of course, is going to have nothing to do with what happened in California right now. There are other States who are looking into this right now and you'll be just totally surprised. They're all left-wing States. I'm sure. I hope you were sitting down, New York, Oregon, Washington state, New Jersey, and Illinois. Okay. so we'll see what happens here. The companies have tried to make a good with the unions. Unions, pretty upset about this, good articles. So you might want to look it up online. Now I want to, before this hour is up, talk about ransom payments. I have mentioned before on the show that the department of justice now looks at people and businesses, paying ransomware as supporting terrorist operations. Did you realize that it's like sending money off to Osama Bin Laden, back in the day? Because if you do pay a ransom, the odds are very good that it is going to a terrorist organization. Oh, okay. It could be Iran. Are they terrorists? No, but they do support terrorism, according to the state department. Is Russia terrorist. no, but are they attacking us? Is this okay? Is there an attack of the United States, a terrorist attack? This is bringing up all kinds of really interesting points. One of them is based on arrests that were made about three weeks ago where some hackers were arrested on charges of terrorism. It is affecting insurance as well. I've mentioned before that we can pass on to our clients a million dollars worth of insurance underwritten by Lloyd's of London. Very big deal. But when you dig into all of these different types of insurance policies, we're finding that insurance companies are not paying out on cyber insurance claims, they'll go in and they'll say, you were supposed to do this, that, and the other thing. You didn't do it, so we're not paying. We've seen some massive lawsuits that have been brought by very big, very powerful companies that did not go anywhere, because again they were not following best practices in the industry. So this is now another arrow in the quiver, the insurance companies to say. Wait a minute, you arrested hackers who were trying to put ransomware on machines and did in many cases and charged a ransom. You charge them with terrorism. Therefore, the federal government has acknowledged that hacking is a form of terrorism. Isn't that kind of a big deal now. So it's an act of terrorism. Therefore we don't have to payout. It's just if your home gets bombed during a war, You don't get compensation from the insurance company, and ransomware victims now that pay these bad guys to keep the bad guys from releasing data that they stole from these ransomware victims are finding out that data that was stolen is being released anyways. So here's, what's going on. You get ransomware on your machine. Time was everything's encrypted and you get this nice big red and warning label and you pay your ransom. They give you a key and you have a 50% chance that they are in fact, going to get your data back for you. Nowadays, it has changed in a big way where they will gain control of your computer. They will poke around on your computer. Often an actual person poking around on your computer. They will see if it looks interesting. If it does, they will spread laterally within your company. We call that East-West spread and they'll find documents that are of interest and they will download them from your network, all without your knowledge and once they have them, they'll decide what they're going to charge you as a ransom. So many of these companies, the bad guys. Yeah. They have companies, will ransom your machines by encrypting everything, and the same pay the ransom, get your documents back. Then what'll happen is they will come back to you, maybe under the guise of a different, bad guy, hacker group. They'll come back to you and say, if you don't pay this other ransom, we're going to release all your documents, and you're going to lose your business. Yeah, how's that for change? So paying a ransom is no guarantee against them releasing your files. Hey, we've been talking about how computers are everywhere. What can we expect from our computerized cars? What can we expect from computers? Intel has had a monopoly with Microsoft called the Wintel monopoly. So if you missed part of today's show. Make sure you double-check and also make sure you are on my newsletter list. I'm surprised here how every week I get questions from people and it's great. That's it. I love to help. I was asked when I was about 19 to read this little book and to also to fill out a form that said what I wanted on my headstone. That's it heady question to ask somebody at 19 years of age, but I said that this was pretty short and sweet. I said, "he helped others." Just those three words, because that's what I always wanted to do. That's what I always enjoyed doing. You can probably tell that's why I'm doing what I'm doing right now is to help people stop the bad guys and to make their lives a little bit better in the process, right? That's the whole goal. That's the hope anyway. If you need a little help, all you have to do is reach out. Be glad to help you out. Just email me M E at Craig Peterson dot com. Or if you're on my email list, you'll get all of my weekly articles, everything I talked about here on the show, as well as my during the week little emails that I send out with videos that I've been doing. I've been putting more together. Didn't get any out this week I had planned to, but I probably will get them out next week. I was able to make a couple of this week and we'll queue them up for the coming week, but you'll get all of that. So just go to. Craig peterson.com/subscribe. You'll find everything there. As part of all of that of course, you will also be getting information about the training that I do. I do all kinds of free pieces of training and webinars, and I've got all kinds of reports. One of the most popular ones lately has been my self-audit kit. It's a little tool kit that you can use to audit, your business and see if you are compliant. It's just a PDF that you can take from the email that I send you. If you ask for it, all you have to do is ask for an audit kit, put that in the subject line, and email me@craigpeterson.com and we'll get you going. So I've had a few people who have this week said, Hey, can you help me out? What do I do? I help them out and It turns out when I'm helping them out, they're not even on my email list. So I'll start there. If you're wondering where to start, how to get up to speed a little bit, right? You don't have to know all of this stuff like the back of your hand, but you do have to have the basic understanding. Just go online. And a signup Craig peterson.com/subscribe would love to have you there. Even when we get into ice station zebra weather here coming up in not so long, unfortunately, in the Northeast. When you're thinking about your computer and what to buy. There are a lot of choices. Of course, the big ones nowadays are a little different than they were just a few years ago. Or a couple of years ago, you used to say, am I going to get a Windows computer, or am I going to get a Mac now? I think there's a third choice that's really useful for most people, depends on what you're doing. If what you do is some web browsing, some email, and also might do a couple of things with some video and pictures and organizing you really should look at the third option. Which is a tablet of some sort and that is your iPad. Of course, the number one in the market, these things last a long time. They retain their value. So their higher introductory price isn't really a bad thing. And they're also not that much more expensive when you get right down to it and consider the resale value of them. So have a look at the tablet, but that's really one of the three major choices also today when you're deciding that you might not be aware of it, but you are also deciding what kind of processor you're going to be using. There is a lot of work that's been done going on arm processors. What they are called A R M. I started working with this class of processor, also known as RISC, which is reduced instruction set processors, many years ago, back in the nineties. I think it was when I first started working with RISC machines. But the big difference here is that these are not Intel chips that are in the iPads that are in or our iPhones, they aren't Intel or AMD processors that are in your Android phones or Android tablet. They're all using something that's called ARM architecture. This used to be called advanced RISC machine acorn risk machine. They've been around a while, but ARM is a different type of processor entirely than Intel. the basic Intel design is to try and get as much done with one instruction as possible. So for instance, if you and I decided to meet up for Dunkin donuts, I might say, okay, so we're going to go to the Duncan's on Elm Street, but the one that's South of the main street, and I'll meet you there at about 11 o'clock. And then I gave you some of the directions on how to get to the town, et cetera. And so we meet at dunks and to have a good old time. That would be a RISC architecture, which has reduced instructions. So you can tell it, okay, you get to take a right turn here, take a left turn there. In the computing world, it would be, you have to add this and divide that and then add these and divide those and subtract this. Now to compare my little dunk story. What you end up doing with an Intel processor or what's called a CISC processor, which is a complex instruction set, is we've already been to dunks before that dunks in fact, so all I have to say is I'll meet you at dunks. Usual time. There's nothing else I have to say. So behind all of that is the process of getting into your car, driving down to dunks the right town, the right street, the right dunks, and maybe even ordering. So in a CISC processor, it would try and do all of those things with one instruction. The idea is, let's make it simple for the programmer. So all of the programmers have to do, if the programmer wants to multiply too, double-precision floating-point numbers, the programmer that if he's just dealing with machine-level only has to have one instruction. Now those instructions take up multiple cycles. We can. Get into all the details, but I think I've already got some people glazing over. But these new ARM processors are designed to be blindingly fast is what matters. We can teach a processor how to add, and if we spend our time figuring out how to get that processor to add faster. We end up with ultimately faster chip and that's the theory behind risk or reduced instruction set computers, and it has taken off like wildfire. So you have things like the iPad pro now with an arm chip that's in there designed by Apple. Now they took the basic license with the basic ARM architecture and they've advanced it quite a bit. In fact, but that Ipad processor now is faster than most laptop processors made by Intel or AMD. That is an impressive feat. So when we're looking a little bit forward, we're no longer looking at machines that are just running an Intel instruction set. We're not just going to see, in other words, the Intel and AMD inside stickers on the outside of the computer. Windows 10 machines running on ARM processors are out already. Apple has announced arm based laptops that will be available very soon. In fact, there is a scheduled press conference. I think it's next week by Apple, the 15th. Give or take. Don't hold me to that one, but they're going to have a, probably an announcement of the iPhone 12 and maybe some delivery dates for these new ARM-based laptops. So these laptops are expected to last all day. Really all day. 12 hours worth of working with them, using them. They're expected to be just as fast or faster in some cases as the Intel chips are. So ARM is where things are going. We already have the Microsoft updated surface pro X. That was just announced about two weeks ago, which is ARM-based. We've gotten macs now coming out their ARM base. In fact, I think they're going to have two of them before the end of the year. Both Apple and Microsoft are providing support for x86 apps. So what that means is the programs that you have bought that are designed to run on an Intel architecture will run on these ARM chips. Now, as a rule, it's only the 64-bit processes that are going to work. The 32-bit processes, if you haven't upgraded your software to 64 bits yet you're gonna have to upgrade it before you can do the ARM migration. We're going to see less expensive computers. Arm chips are much cheaper as a whole than Intel. Intel chips are insanely high priced. They are also going to be way more battery efficient. So if you're looking for a new computer. Visual studio code has been updated optimized for windows 10 on ARM. We're going to see more and more of the applications coming out. And it won't be long, a couple of years now, you will have a hard time finding some of the Intel-based software that's out there. "it won't happen to me." That's our next topic. We've got companies who are investing a lot of money to upgrade the technology, to develop security processes, boost it. Staff yet studies are showing that they're overlooking the biggest piece of the puzzle. What is the problem? Employee apathy has been a problem for many businesses for a very long time. Nowadays, employee apathy is causing problems on the cybersecurity front. As we've talked about so many times, cybersecurity is absolutely critical. For any business or businesses are being attacked sometimes hundreds of times, a minute, a second, even believe it or not. Some of these websites come under attack and if we're not paying close attention, we're in trouble. So a lot of companies have decided while they need to boost their it staff. They've got to get some spending in on some of the hardware that's going to make the life. Better. And I am cheering them on. I think both of those are great ideas, but the bottom line problem is there are million-plus open cyber security IT jobs. So as a business, odds are excellent that you won't be able to find the type of person that you need. Isn't that a shame? But I've got some good news for you here. You can upgrade the technology that's going to help. But if you upgrade the technology, make sure you're moving towards, what's called a single pane of glass. You don't want a whole bunch of point solutions. You want something that monitors everything. Pulls all of that knowledge together uses some machine learning and some artificial intelligence and from all of that automatically shuts down attacks, whether they're internal or external, that's what you're looking for. There are some vendors that have various things out there. If you sell to the federal government within three years, you're going to have to meet these new requirements, the CMMC requirements, level three, four, level five, which are substantial. You cannot do it yourself, you have to bring in a cybersecurity expert. Who's going to work with your team and help you develop a plan. I think that's really great, really important, but here's where the good news comes in. You spent an astronomical amount of money to upgrade this technology and get all of these processes in place and you brought in this consultant, who's going to help you out. You boosted your IT staff. But studies are starting to indicate that a lot of these businesses are overlooking the biggest piece of the puzzle, which is their employees. Most of these successful attacks nowadays are better than 60%, it depends on how you're scoring this, but most of the attacks these days come in through your employees. That means that you clicked on a link. One of your employees clicked on a link. If you are a home user, it's exactly the same thing. The bad guys are getting you because you did something that you should not have done. Just go have a look online. If you haven't already make sure you go to have I been poned.com. Poned is spelled PWNED Have a look at it there online and try and see if your email address and passwords that you've been using have already been compromised. Have already been stolen. I bet they have, almost everybody has. Do you know what to do about that? This is part of the audit kit that I'll send to you. If you ask for that. Kind of goes through this and a whole lot of other stuff. But checking to see if your data has been stolen, because now is they use that to trick people. So they know that you go to a particular website that you use a particular email address or password. They might've been able to get into one of these social networks and figure out who your friends are. They go and take that information. Now a computer can do this. They just mine it from a website like LinkedIn, find out who the managers in the company are. And then they send off some emails that look very convincing, and those convincing emails get them to click. That could be the end of it. Because you are going somewhere, you shouldn't go and they're going to trick you into doing something. Knowledge really is the best weapon when it comes to cybersecurity. A lot of companies have started raising awareness among employees. I have some training that we can provide as well. That is very good. It's all video training and it's all tracked. We buy these licenses in big bundles. If you are a small company contact me and I'll see if I can't just sneak you into one of these bundles. Just email me @craigpeterson.com in the subject line, put something like training, bundle, or something. You need to find training for your employees and their training programs need to explain the risk of phishing scams. Those they're the big ones. That's how most of the ransomware it gets into businesses is phishing scams. That's how ransomware gets down to your computers. You also need to have simulations that clarify the steps you need to take when faced with a suspicious email. Again, if you want, I can point you to a free site that Google has on some phishing training and it's really quite good. It walks you through and shows you what the emails might look like and if you want to click or not. But there's a lot of different types of training programs. You've got to make sure that everybody inside your organization or in your, family is educated about cybersecurity. What do you do when you get an email that you suspect might be a phishing email? They need to know that this needs to be forwarded to IT, or perhaps they just tell IT, Hey, it's in my mailbox, if IT has access to their mailbox, so IT can look at it and verify it. You need to have really good email filters, not the type that comes by default with a Microsoft Windows 365 subscription, but something that flags all of this looks for phishing scams, and blocks them. There's been a ton of studies now that are showing that there is a greater awareness of cybersecurity dangers, but the bottom-line problem is that employees are still showing a lax attitude when it comes to practicing even the most basic of cybersecurity prevention methods. TrendMicro, who is a cybersecurity company. We tend to not use their stuff because it's just not as good. But TrendMicro is reporting that despite 72% of employees claim to have gained better cybersecurity awareness during the pandemic 56% still admitted to using a non-work application on a company device. Now that can be extremely dangerous. 66% admitted uploading corporate data to that application. This includes by the way, things like using just regular versions of Dropbox. Do you share files from the office and home? Dropbox does have versions that are all that have all kinds of compliance considerations that do give you security. But by default, the stuff a home user does not get the security you need. They're doing all of this even knowing that their behavior represents a security risk. And I think it boils right down to, it's not going to happen to me. Just apathy and denial. So same thing I've seen, being a security guy for the last 30 years, I've seen over and over, apathy and denial. Don't let it happen to them. By the way, about 50% believe that they could be hacked no matter what protective measures are taken. 43% took the polar opposite. They didn't take the threat seriously at all. 43% didn't believe they could be hacked. We're going to talk about Mac OS is driving cybersecurity rethink. By the way to follow up on that last segment. So Millennials and Generation Z are terrible with security. They keep reusing passwords. They accept connections with strangers. Most of the time. If that's not believable, I don't know what it is. They've grown up in this world of share everything with everyone. What does it matter? Don't worry about it. Yeah. I guess that's the way it goes. Right? Kids these days. Which generation hasn't said that in the past? We were just talking about millennials, generation Z, and the whole, it won't happen to me, employee apathy and we've got to stop that. Even within ourselves, right? We're all employees in some way or another. What does that mean? It means we've got to pay attention. We've' got to pay a lot of attention and that isn't just true in the windows world. Remember we've got to pay attention to our network. You should be upgrading the firmware on your switches, definitely upgrading the software and firmware in your firewalls and in your routers, et cetera. Keep that all up to date. Even as a home user, you've got a switch or more than one. You've got a router. You've got a firewall in many cases that equipment is provided by your ISP internet service provider. If you've got a Comcast line or a FairPoint, whatever, it might be coming into your home, they're providing you with some of that equipment and you know what their top priority is not your security. I know. Shocker. Their top priority is something else. I don't know, but it sure isn't security. What I advise most people to do is basically remove their equipment or have them turn off what's called network address translation. Turn off the firewall and put your own firewall in place. I was on the phone with a lady that had been listening to me for years, and I was helping her out. In fact, we were doing a little security audit because she ran a small business there in her home. I think she was an accountant if I remember right. She had her computer hooked up directly to the internet. She kind of misunderstood what I was saying. I want to make clear what I'm saying here. People should still have a firewall. You still need a router, but you're almost always better off getting a semi-professional piece of hardware. The prosumer side, if you will, something like the Cisco GO hardware and put that in place instead of having the equipment that your ISP is giving you. We've got to keep all of this stuff up to date. Many of us think that Macs are invulnerable, Apple Macintoshes, or Apple iOS devices, like our iPhones and iPads. In many ways they are. They have not been hit as hard as the Windows devices out there. One of the main reasons is they're not as popular. That's what so many people that use Windows say you don't get hit because you're just not as popular. There is some truth to that. However, the main reason is that they are designed from the beginning with security in mind, unlike Windows, that security was an absolute afterthought for the whole thing Don't tell me that it's because of age. Okay. I can hear it right now. People say, well, Mac is much, much newer than Microsoft Windows. Microsoft didn't have to deal with all of this way back when. How I respond to that is, yeah. Microsoft didn't have to deal with it way back when because it wasn't connected to a network and your viruses were coming in via floppy desk. Right? They really were. In fact, the first one came in by researchers. The operating system that Apple uses is much, much, much older than windows and goes back to the late 1960s, early 1970s. So you can't give me that, it is just that they didn't care. They didn't care to consider security at all. Which is something that's still one of my soapbox subjects, if you will. Security matters. When we are talking about your Macs, you still have to consider security on a Mac. It's a little different on a Mac. You're probably want to turn on some things. Like the windows comes with the firewall turned on however it has all of its services wide open. They're all available for anybody to attach to. That's why we have our windows hardening course that goes through, what do you turn off? How do you turn it off? What should you have in the windows firewall? Now the Mac side, all of these services turned off by default, which is way more secure. If they're not there to attack, they're not going to be compromised. Right. They can't even be attacked the first place. So I like that strategy, but you might want to turn on your firewall on your Mac anyways. There are some really neat little features and functions in it. But the amount of malware that's attacking Apple Macintoshes, nowadays, is twice as much as it used to be. We've got these work from home people. We've got IT professionals within the companies, just scrambling to make it so that these people who are working from home can keep working from home. It's likely a permanent thing. It's going to be happening for a long time. But these incidents of malware on the Mac is pretty limited in reality. The malware on a Mac is unlikely to be any sort of ransomware or software that particularly steals things like your Excel files or your Word docs on a Mac, I should say it is much more likely to be outerwear. It's much more likely to be. Adware or some other unwanted programs and that's, what's rising pretty fast on Macs. Mac-based companies are being concerned here about cyber security issues. They are paying more attention to them. They're windows based counterparts have had to deal with a lot of this stuff for a long time because they were targets. So we've got to divide the Mac really into two pieces, just like any other computer. You've got the operating system with its control over things like the network, et cetera. Then you have the programs or applications, right? That is running on that device. So you want to keep both of them secure. The applications that are running on your device, Apple's done a much, much better job of sandboxing them. Making them so that they're less dangerous. The latest release, in fact, Catalina had a lot of security stuff built into that. Microsoft and Windows 10 added a lot more security. So that's all really, really good. Now, if you have to maintain a network of Macs, we like IBM software. They have some great software for managing Macs, but if you want something that's inexpensive and very usable to configure Macs and control the software on them. Have look at JAMF, J A M F. They just had their user's conference this last weekend. They were talking about how the landscape has changed over on the Mac side. All right. We've got one more segment left today and I'm going to talk about these cybersecurity frameworks. What should you be using? If you are a business or a home user, what are those checkboxes that you absolutely have to have to use? You might've heard about cybersecurity frameworks? Well, the one that's most in use right now is the NIST cybersecurity framework that helps guide you through the process of securing your business or even securing your home. That's our topic. It's a great time to be out on the road and kind of checking in. We've got security threats that have been growing quite literally. Exponentially. They are really making a lot of money by extorting it from us, stealing it from us. It's nothing but frustration to us. It's never been more important to put together an effective cybersecurity risk management policy. That's true if you're a home user and you've got yourself and your spouse and a kid or two in the home. Have a policy and put it together. That's where NIST comes in handy. NIST is the National Institute of standards and technology they've been around a long time. They've been involved in cryptography. These are the guys and gals that give us accurate clocks. In fact, we run two clocks here that we have for our clients, which are hyper-accurate. It's crazy it down to the millionth of a second. It's just amazing. That's who NIST is. They've put all these standards together for a very, very long time, but just before March, this year, It was reported that about 46 percent of businesses had suffered cyber attacks in 2019. That was up 10% from the year before. Of course, we've all been worried about the Wuhan virus, people getting COVID-19, it is a problem. The biggest part of the problem is everybody's worried about it. Nobody wants to go to work. They don't want to go out to a restaurant. They don't want to do any of these things. You as a business owner are worried about how do you keep your business doors open? How do you provide services to the customers you have when your employees won't come in or cooperate or were paid more to stay at home than they would be to come back to work. I get it right. I know I'm in the same boat. Well, because of that we just have not been paying attention to some of the things we should be doing. One of the main ways that business people can measure their preparedness and their progress in managing cyber security-related risks, is to use the cybersecurity framework that is developed by NIST. It is a great framework. It provides you with different levels. The higher-end, the framework that is used by military contractors. Nowadays, we've been helping businesses conform to what's called NIST 800-171 and 800-53 High, which are both important and cybersecurity standards. So if you really, really, really need to be secure, are those are the ones you're going to be going with. Right now, no matter how much security you need I really would recommend you checking it out. I can send you information on the NIST framework. I have a little flow chart. I can send you to help to figure out what part of the framework should you be complying with. It also helps you figure out if you by law need to be complying with parts of the framework. It will really help you. It's well thought out. It's going to make you way more efficient as you try and put together and execute your cyber risk management policy. Remember cyber risk, isn't just for the software that you're running, or the systems you're running. It's the people, it includes some physical security as well. Now President Trump has been very concerned about it. I'm sure you've heard about it in the news. As he's talked about problems with TicTok and with Huawei and some of these other manufacturers out there. Huawei is a huge problem. Just absolutely huge. One of these days I can give you the backstory on that, but how they completely destroyed one of the world leaders in telecommunications technology by stealing everything they had. Yeah. It's a very sad story company you may have heard of, founded over a hundred years ago. They're non-regulatory but they do publish guides that are used in regulations. So have a look at them, keep an eye on them. They have to help federal agencies as well. Meet the requirements is something called the federal information security management act called FISMA and that relates to the protection of government information and assets. So if you are a contractor to the federal government, pretty much any agency, you have physical requirements. So think about that. Who do you sell things to? When you're also dealing with the federal government they look at everything that you're doing and say, are you making something special for us? If you are, there are more and higher standards that you have to meet as well. It just goes on and on, but this framework was created by NIST ratified by Congress in 2014. It's used by over 30% of businesses in the US and will probably be used by 50% of businesses in the US this year. So if you're not using them you might want to have a look at them. It's big companies like JP Morgan, Chase, Microsoft, Boeing, and Intel who meet a much higher standard than most businesses need to meet. For a lot of businesses all you need to meet is what's called the CMMC one standard. You'll find that at NIST as well. And there are much higher levels than that up to level five, which is just, wow. All of the stuff that you have to keep secured looks like military level or better, frankly security. There are other overseas companies that are using it too, by the way in England, in Japan, Canada, many of them. I'm looking at the framework right now. The basic framework is to identify, protect, detect, respond, and recover. Those are the main parts of it. That's you have to do as a business in order to stay in business in this day and age, they get into it in a lot more detail. They also have different tiers for different tiers that you can get involved in. Then subcategories. I have all of this framework as part of our audit kit that I'll send out to anybody that asks for it that's a listener. All you have to do is send an email to me, M E @craigpeterson.com, and then the subject line, just say audit kit and I'll get back to you. I'll email that off to it's a big PDF. You can also go to NIST in the online world and find what they have for you. Just go to NIST, N I S T.gov, The National Institute of Standards and Technology, and you'll see right there, cybersecurity framework, it's got all of the stuff there. You can learn more here if you want. If you're new to the framework they've got online learning. They are really working hard to try and secure businesses and other organizations here in the U S and as I said used worldwide. It's hyper, hyper important. It's the same framework that we rely on in order to protect our information and protect our customer's information. So NIST, N I S T.gov, check it out. If you missed it today, you're going to want to check out the podcast. Now you can find the podcast on any of your favorite podcasting platforms. It is such a different world. Isn't it? We started out today talking about our cars. Our cars now are basically big mechanical devices ever so complex with computers, controlling them. But the cars of tomorrow that are being built by Tesla and other companies, those cars are absolutely amazing as well, but they're frankly, more computer than they are mechanical car. So what should we expect from these cars? I'm talking about longevity here. We expect a quarter-million miles from our cars today. Some of these electric vehicles may go half a million or even a million miles in the future. When they do that, can we expect that? Our computers get operating system updates and upgrades, for what five years give or take? If you have an Android phone, you're lucky if you get two years' worth of updates. Don't use Android, people. It's just not secure. How about our cars? How long should we expect updates for the firmware in our cars? So that's what we talked about first, today. Ring has a new security camera that is absolutely cool. It's called the always home cam. I talked about it earlier. It is a drone that flies around inside your house and ties into other Ring equipment. I think it's absolutely phenomenal and it's not quite out yet, but I'll let you know more about that. If you get ransomware and you pay the ransom, the feds are saying now that you are supporting terrorist organizations. You might want to be careful because they are starting to knock on doors, and there's jail time behind some of these things. So watch it when it comes ransomware and a whole lot more as well. So make sure you visit me online. Go to Craig peterson.com/subscribe. It's very important that you do that and do that now. So you'll get my weekly newsletter. I've got some special gifts, including security, reboot stuff that I'll send to you right away. Craig peterson.com/subscribe. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Nuevo programa con invitados En este caso contamos con la colaboración de Carmen Campos. Estudió Biotecnología en Sevilla y actualmente se encuentra en Madrid desarrollando labores de investigación en el CISC. Hablaremos de Contagio, La isla de las almas perdidas, El origen del planeta de los simios, Gattaca, Despertares y Aniquilación. Solo peliculones oigan!
Craig discusses the new firmware architecture being used in the newer computers and laptops and why this architecture is preferred. For more tech tips, news, and updates, visit - CraigPeterson.com --- Right To Repair Or A Fight For Survival? Ring’s latest security camera is a drone that flies around inside your house Malware Attacks Declined But Became More Evasive in Q2 Elon Musk reveals plans to slash electric battery costs, build $25,000 Tesla Paying ransomware demands could land you in hot water with the feds Windows 10 machines running on ARM will be able to emulate x64 apps soon 'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness Rise in Remote MacOS Workers Driving Cybersecurity 'Rethink' A Guide to the NIST Cybersecurity Framework --- Automated Machine-Generated Transcript: Hey, we've been talking about how computers are everywhere. What can we expect from our computerized cars? What can we expect from computers? Intel has had a monopoly with Microsoft called the Wintel monopoly. Hi everybody. You're listening to Craig Peterson. So if you missed part of today's show. Make sure you double-check and also make sure you are on my newsletter list. I'm surprised here how every week I get questions from people and it's great. That's it. I love to help. I was asked when I was about 19 to read this little book and to also to fill out a form that said what I wanted on my headstone. That's it heady question to ask somebody at 19 years of age, but I said that this was pretty short and sweet. I said, "he helped others." Just those three words, because that's what I always wanted to do. That's what I always enjoyed doing. You can probably tell that's why I'm doing what I'm doing right now is to help people stop the bad guys and to make their lives a little bit better in the process, right? That's the whole goal. That's the hope anyway. If you need a little help, all you have to do is reach out. Be glad to help you out. Just email me M E at Craig Peterson dot com. Or if you're on my email list, you'll get all of my weekly articles, everything I talked about here on the show, as well as my during the week little emails that I send out with videos that I've been doing. I've been putting more together. Didn't get any out this week I had planned to, but I probably will get them out next week. I was able to make a couple of this week and we'll queue them up for the coming week, but you'll get all of that. So just go to. Craig peterson.com/subscribe. You'll find everything there. As part of all of that of course, you will also be getting information about the training that I do. I do all kinds of free training and webinars, and I've got all kinds of reports. One of the most popular ones lately has been my self-audit kit. It's a little tool kit that you can use to audit it, your business and see if you are compliant. It's just a PDF that you can take from the email that I send you. If you ask for it, all you have to do is ask for an audit kit, put that in the subject line, and email me@craigpeterson.com and we'll get you going. So I've had a few people who have this week said, Hey, can you help me out? What do I do? I help them out. It turns out when I'm helping them out, they're not even on my email list. So I'll start there. If you're wondering where to start, how to get up to speed a little bit, right? You don't have to know all of this stuff like the back of your hand, but you do have to have the basic understanding. Just go online. And a sign-up Craig peterson.com/subscribe would love to have you there. Even when we get into the ice station zebra weather here coming up in not so long, unfortunately, in the Northeast. When you're thinking about your computer and what to buy. There are a lot of choices. Of course, the big ones nowadays are a little different than they were just a few years ago. Or a couple of years ago, you used to say, am I going to get a Windows computer, or am I going to get a Mac now? I think there's a third choice that's really useful for most people, depends on what you're doing. If what you do is some web browsing, some email, and also might do a couple of things with some video and pictures and organizing you really should look at the third option. Which is a tablet of some sort and that is your iPad. Of course, the number one in the market, these things last a long time. They retain their value. So their higher introductory price isn't really a bad thing. And they're also not that much more expensive when you get right down to it and consider the resale value of them. So have a look at the tablet, but that's really one of the three major choices also today when you're deciding that you might not be aware of it, but you are also deciding what kind of processor you're going to be using. There is a lot of work that's been done going on arm processors. What they are called A R M. I started working with this class of processor, also known as RISC, which is reduced instruction set processors, many years ago, back in the nineties. I think it was when I first started working with RISC machines. But the big difference here is that these are not Intel chips that are in the iPads that are in or our iPhones, they aren't Intel or AMD processors that are in your Android phones or Android tablet. They're all using something that's called ARM architecture. This used to be called advanced risc machine acorn risk machine. They've been around a while, but ARM is a different type of processor entirely then Intel. the basic Intel design is to try and get as much done with one instruction as possible. So for instance, if you and I decided to meet up at a Dunkin donuts, I might say, okay, so we're going to go to the Duncan's on Elm Street, but the one that's South of Main Street, and I'll meet you there at about 11 o'clock. And then I gave you some of the directions on how to get to the town, et cetera. And so we meet at dunks and to have a good old time. That would be a RISC architecture, which has reduced instructions. So you can tell it, okay, you get to take a right turn here, take a left turn there. In the computing world, it would be, you have to add this and divide that and then add these and divide those and subtract this. Now to compare my little dunk story. What you end up doing with an Intel processor or what's called a CISC processor, which is a complex instruction set, is we've already been to dunks before that dunks in fact, so all I have to say is I'll meet you at dunks. Usual time. There's nothing else I have to say. So behind all of that is the process of getting into your car, driving down to dunks the right town, the right street, the right dunks, and maybe even ordering. So in a CISC processor, it would try and do all of those things with one instruction. The idea is, let's make it simple for the programmer. So all of the programmers have to do if the programmer wants to multiply two double-precision floating-point numbers, the programmer that if he's just dealing with machine-level only has to have one instruction. Now those instructions take up multiple cycles. We can. Get into all the details, but I think I've already got some people glazing over. But these new ARM processors are designed to be blindingly fast is what matters. We can teach a processor how to add, and if we spend our time figuring out how to get that processor to add faster. We end up with ultimately faster chip and that's the theory behind risk or reduced instruction set computers, and it has taken off like wildfire. So you have things like the iPad pro now with an arm chip that's in there designed by Apple. Now they took the basic license with the basic ARM architecture and they've advanced it quite a bit. In fact, but that Ipad processor now is faster than most laptop processors made by Intel or AMD. That is an impressive feat. So when we're looking a little bit forward, we're no longer looking at machines that are just running an Intel instruction set. We're not just going to see, in other words, the Intel and AMD inside stickers on the outside of the computer. Windows 10 machines running on ARM processors are out already. Apple has announced arm based laptops that will be available very soon. In fact, there is a scheduled press conference. I think it's next week by Apple, the 15th. Give or take. Don't hold me to that one, but they're going to have a, probably an announcement of the iPhone 12 and maybe some delivery dates for these new ARM-based laptops. So these laptops are expected to last all day. Really all day. 12 hours worth of working with them, using them. They're expected to be just as fast or faster in some cases as the Intel chips are. So ARM is where things are going. We already have the Microsoft updated surface pro X. That was just announced about two weeks ago, which is ARM-based. We've gotten macs now coming out with their ARM-based versions. In fact, I think they're going to have two of them before the end of the year. Both Apple and Microsoft are providing support for x86 apps. So what that means is the programs that you have bought that are designed to run on an Intel architecture will run on these ARM chips. Now, as a rule, it's only the 64-bit processes that are going to work. The 32-bit processes, if you haven't upgraded your software to 64 bits yet you're gonna have to upgrade it before you can do the ARM migration. We're going to see less expensive computers. Arm chips are much cheaper as a whole than Intel. Intel chips are insanely high priced. They are also going to be way more battery efficient. So if you're looking for a new computer. Visual studio code has been updated optimized for windows 10 on ARM. We're going to see more and more of the applications coming out. And it won't be long, a couple of years now, you will have a hard time finding some of the Intel-based software that's out there. Hey, you're listening to Craig Peterson. Stick around. Cause we'll be right back and "it won't happen to me." That's our next topic. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
— Puedes enviarme tus comentarios a través de los siguientes canales: * Puedes unirte al grupo de oyentes en Telegram en http://t.me/sobre_la_marcha * A través de Twitter: https://twitter.com/gvisoc * A través de mensajes directos en Telegram (sólo mensajes de texto
Gesichtserkennung ist ein Rassist. Führende Unternehmen erkennen die Probleme mit Bilderkennung und künstlicher Intelligenz in der Praxis. Das wird mit der 5G Killeranwendung "Videoüberwachung" noch schlimmer. Was basteln wir gerade? Bilderkennung lokal mit HQ-Kamera und Wechselobjektiv. Acorn Archimedes wieder zum Leben erweckt. Von RISC und CISC zu ARM. Apple goes back to the roots. In die Sicherheitslücke geschaut. UPnP CallStranger - Ruf nach dem Fremden Was ist das Problem? Was kann passieren? Wie geht das überhaupt? Was kann ich dagegen tun? Zuletzt noch ein Hinweis auf den 34C3 und die Atomwaffenkontrollen. Immer wieder gefälschte CPU.
In this episode, we speak to the girls and boys college recruiting directors for CISC.Greg Ashton is our girl's college recruiting director and a former college coach at Trinity University and Davidson College. Phil Hindson is our boy's college recruiting director and a former college coach at Winthrop, Clemson, UNC Pembroke, and a second stint at Winthrop University. We talk about finding the right college and why it is important. What can players do during the dead period? What's so important about June 15th going into your Junior year of high school and what college coaches are looking for when they come to watch you play. Recorded: Monday, March 30th, 2020.30% off all Summer Camps when you register by April 15th, 2020. $50 off our Boys and Girls College Combine in June when you register by April 15th, 2020.Music: "Day Trips" by KetsaFrom the Free Music ArchiveCC BY NC
In our inaugural episode we speak with Bradley Morrison who is a former Men's College soccer coach and currently our club's Boys ECNL North Director. We talk about our whole part whole training methodology, our player evaluation methodology (PIMS), and what you can do at home during this suspension of play.Recorded: Monday, March 30th, 2020.30% off all Summer Camps when you register by April 15th, 2020. $50 off our Boys and Girls College Combine in June when you register by April 15th, 2020.Music: "Day Trips" by KetsaFrom the Free Music ArchiveCC BY NC
Welcome to Hardware Addicts, a proud member of the Destination Linux Network. Hardware Addicts is the podcast that focuses on the physical components that powers our technology world. In this episode, we’re going to cover the wonderful world of ARM processors and their unstoppable dominance in the market. A new 80 core processor that’s making Intel and AMD shiver… we’re going to help you understand how to distinguish the specs of an ARM processor in our brain filler and in this week’s Camera Corner, Wendy will be answering some listener camera questions. All this and more coming up. Quick Links: Ryan = https://dasgeekcommunity.com Michael = https://tuxdigital.com Wendy = https://destinationlinux.network Want to Support the Show? Destination Linux Network Store = https://destinationlinux.network/store Want to follow the show and hosts on social media? You can find all of our social accounts at https://hardwareaddicts.org/hosts
Trumfovali jsme se „třiosmšestkami“, pak „penťáky“ a nakonec se přidávali na stranu AMD nebo Intelu v přetahovačkách o to, jaké procesory jsou výkonnější. Zatímco pro hráče byl model procesoru dělící čárou mezi „zahraju si“ a „tohle nespustím,“ inženýři soutěžili o co největší počet tranzistorů. Z toho herní vývojáři a hráči benefitovali a Michal vám popíše, jak vypadal závod mezi Motorolou, Intelem, Zilogem, Fairchildem a dalšími, kteří dnes už neexistují. Začneme kolem roku 1971 a v první část povídání uzavřeme roku 1995. Michal je ale důkladný historik a novinář. Proto neočekávejte jen chronologické vyjmenování procesorů, ale především úvod do jejich možností, architektur RISC, OISC, ZISC a CISC a vysvětlí, jak se to celé programuje. Stojí to za poslech! Kde všude najdete podcasty Retro Nation? Anchor Spotify Apple Podcasts Google Podcasts Overcasts Pocket Casts Radio Public RSS Anchoru pro vaše podcastové aplikace RSS Patreonu pro vaše podcastové aplikace O podcastech Retro Nation Wolfcast je série ohlédnutí za historickým hardwarem i hrami. Novinář a spisovatel Michal Rybka se sbírání historického hardwaru a informací o jeho vývoji věnuje celoživotně. Michal je kurátorem Alza Muzea a spolupracovníkem PCTuning.cz. Wolfcast vychází 2x měsíčně. Pravidelně se střídá s Retro Notami od hudebního publicisty Jardy Konáše. Jednoduše řečeno: 2x měsíčně vychází Retro noty, 2x měsíčně Wolfcast. Nové i starší podcasty najdete na výše uvedených odkazech vždy v pondělí. Podcasty a další obsah RetroNation.cz můžeme natáčet kvůli podpoře od komunity na Patreonu. Děkujeme vám za ni! Jakékoliv dotazy a připomínky pište na email retronationrulez@gmail.com
The Construction Record Podcast – Episode 62: new Ontario think tank, Women in Trades via Aecon and LIUNA, Calgary office to residence conversions, and steel and labour controversies in B.C. This week on The Construction Record Podcast, Daily Commercial News and Journal of Commerce national managing editor Vince Versace takes a look at Grant Cameron's recent article about a new think tank called the Ontario Construction Consortium, as well as DCN staff writer Angela Gismondi's story about a new skilled trades initiative from the federal government. DCN staff writer Don Wall has a story about a Women In Trades program run by Aecon and LIUNA. Vince also has a tease about a new podcasting partnership we'll be talking about more in a couple of weeks, so watch this space! Journal of Commerce digital media editor Warren Frey and staff writer Russell Hixson also take a look at some of the news out of western Canada, including Russell's story about a Calgary company converting unused office space into residence and ongoing controversy as employers withdraw from the workers' compensation review process in B.C. Warren also has some stories on the go including Canadian Institute of Steel Construction CEO Ed Whalen's rebuke of the Canadian government for granting full duty remissions on fabricated steel destined for B.C. liquified natural gas (LNG) projects. We also have an interview with Valiant America CEO Eamonn O'Kane discussing the differences in building and retrofitting cannabis facilities in the northeastern United States compared to Canada's landscape, where cannabis is legal on a federal level. JOC News Service New advisory committee to promote skilled trades Aecon, LIUNA join forces on Women in Trades program The OCC — Ontario construction's new think-tank Workers' compensation review an opportunity to restore benefits: Unions Strategic Group finds opportunity in empty offices CISC rails against LNG steel component duty relief
Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're able to be prepared for the innovations of the future! Todays episode is on Digital Equipment Corporation, or DEC. DEC was based in Maynard Massachusetts and a major player in the computer industry from the 1950s through the 1990s. They made computers, software, and things that hooked into computers. My first real computer was a DEC Alpha. And it would be over a decade before I used 64-bit technology again. DEC was started in 1957 by Ken Olsen, Stan Olsen, and Harlan Anderson of the MIT Lincoln Laboratory using a $70,000 loan because they could sell smaller machines than the big mainframes to users where output and realtime operation were more important than performance. Technology was changing so fast and there were so few standards for computers that investors avoided them. So they decided to first ship modules, or transistors that could be put on circuit boards and then ship systems. They were given funds and spent the next few years building a module business to fund a computer business. IBM was always focused on big customers. In the 1960s, this gave little DEC the chance to hit the smaller customers with their PDP-8, the first successful mini-computer, at the time setting customers back around $18,500. The “Straight-8” as it was known was designed by Edson de Castro and was about the size of a refrigerator, weighing in at 250 pounds. This was the first time a company could get a computer for less than $20k and DEC sold over 300,000 of them! The next year came the 8/s. No, that's not an iPhone model. It only set customers back $10k. Just imagine the sales team shows up at your company talking about the discrete transistors, the transistor-transistor logic, or TTL. And it wouldn't bankrupt you like that IBM. The sales pitch writes itself. Sign me up! What really sold these though, was the value engineering. They were simpler. Sure, programming was a little harder, and more code. Sure, sometimes that caused the code to overflow the memory. But at the cost savings, you could hire another programmer! The rise of the compiler kinda' made that a negligible issue anyway. The CPU had only four 12-bit registers. But it could run programs using the FORTRAN compiler anruntime, or DECs FOCAL interpreter. Or later you could use PAL-III Assembly, BASIC, or DIBOL. DEC also did a good job of energizing their user base. The Digital Equipment Corporation User Society was created in 1961 by Edward Fredkin and was subsidized by DEC. Here users could trade source code and documentation, with two DECUS US symposia per year - and there people would actually trade code and later tapes. It would later merge with HP and other groups during the merger era and is alive today as the Connect User Group Community, with over 70,000 members! It is still independent today. The User Society was an important aspect of the rise of DEC and of the development of technology and software for mini computers. The feeling of togetherness through mutual support helped keep the costs of vendor support down while also making people feel like they weren't alone in the world. It's also important as part of the history of free software, something we'll talk about in more depth in a later episode. The PDP continued to gain in popularity until 1977, when the VAX came along. The VAX brought with it the virtual address extension for which it derives its name. This was really the advent of on-demand paged virtual memory, although that had been initially adopted by Prime Computer without the same level of commercial success. This was a true 32-bit CISC, or Complex Instruction Set Computer. It ran Digital's VAX/VMS which would later be called OpenVMS; although some would run BSD on it, which maintained VAX support until 2016. This thing set standards in 1970s computing. You know Millions of instructions per second (MIPS) - the VAX was the benchmark. The performance was on par with the IBM System/360. The team at DEC was iterating through chips at a fast rate. Over the next 20 years, they got so good that Soviet engineers bought them just to try and reverse engineer the chips. In fact it got to the point that “when you care enough to steal the very best” was etched into microprocessor die. DEC sold another 400,000 of the VAX. They must have felt on top of the world when they took the #2 computer company spot! DEC was the first computer company with a website, launching dec.com in 85. The DEC Western Research Library started to build a RISC chip called Titan in 1982, meant to run Unix. Alan Kotok and Dave Orbits started designing a 64-bit chip to run VMS (maybe to run Spacewar faster). Two other chips, HR-32 and CASCADE were being designed in 1984. And Prism began in 1985. With all of these independent development efforts, turf wars stifled the ability to execute. By 1988, DEC canceled the projects. By then Sun had SPARC, and were nipping at the heels. Something else was happening. DEC made mini-computers. Those were smaller than mainframes. But microcomputers showed up in the 1980s with he first IBM PC shipping in 1981. But by the early 90s they too were 32-bit. DEC was under the gun to bring the world into 64-bit. The DEC Alpha started at about the same time (if not in the same meeting as the termination of the Prism project. It would not be released in 1992 and while it was a great advancement in computing, it came into a red ocean where there were vendors competing to set the standard of the computers used at every level of the industry. The old chips could have been used to build microcomputers and at a time when IBM was coming into the business market for desktop computers and starting to own it, DEC stayed true to the microcomputer business. Meanwhile Sun was growing, open architectures were becoming standard (if not standardized), and IBM was still a formidable beast in the larger markets. The hubris. Yes, DEC had some of the best tech in the market. But they'd gotten away from value engineering the solutions customers wanted. Sales slumped through the 1990s. Linus Torvalds wrote Linux on a DEC Alpha in the mid-late 90s. Alpha chips would work with Windows and other operating systems but were very expensive. X86 chips from Intel were quickly starting to own the market (creating the term Wintel). Suddenly DEC wasn't an industry leader. When you've been through those demoralizing times at a company, it's hard to get out of a rut. Talent leaves. Great minds in computing like Radia Perlman. She invented Spanning Tree Protocol. Did I mention that DEC played a key role in making ethernet viable. They also invented clustering. More brain drain - Jim Grey (he probably invented half the database terms you use), Leslie Lamport (who wrote LaTex), Alan Eustace (who would go on to become the Senior VP of Engineering and then Senior VP of Knowledge at Google), Ike Nassi (chief scientist at SAP), Jim Keller (who designed Apple's A4/A5), and many, many others. Fingers point in every direction. Leadership comes and goes. By 2002 it was clear that a change was needed. DEC was acquired by Compaq in the largest merger in the computer industry at the time, in part to get the overseas markets that DEC was well entrenched in. Compaq started to cave from too many mergers that couldn't be wrangled into an actual vision. So they later merged with HP in 2002, continuing to make PDP, VAX, and Alpha servers. The compiler division was sold to Intel, and DEC goes down as a footnote in history. Innovative ideas are critical to a company surviving after the buying tornadoes. Strong leaders must reign in territorialism, turf wars and infighting in favor of actually shipping products. And those should be products customers want. Maybe even products you value engineered to meet them where they're at as DEC did in their early days.
Hola Mundo!!: . Bienvenidos al último podcast (de momento) de microprocesadores... en el explico como se aprovechan los errores de fabricación, y también explico la tecnología BIG LITTLE, y para acabar, planteo varias dudas, cuestiones, hipótesis habituales a la hora de comparar microprocesadores. . Para comparar micros CISC: https://www.cpubenchmark.net/ Para comparar micros RISC: http://www.antutu.com/en/ranking/rank1.htm . Mi web: https://unosycerospatxi.wordpress.com . Un Saludo!
Hola Mundo! . Pues bien, aquí tenéis el primer episodio sobre los microprocesadores... lo que quiero contaros, no se si me costará uno o dos episodios más... ya que la idea es explicar lo que considero 'fundamental' de cara a entender superficialmente este componente tan fundamental. . En este primer episodio explico los conceptos RISC y CISC, las Generaciones, los SOCKETs, los Cores o Núcleos, y el Multi Hilo. . En próximos episodios ampliaré algunos detalles. Espero que os guste esta nueva temporada.
In IT we know that the only constant is change. And for the most part, that's OK. What is difficult is when standards or processes are framed as immutable, and THEN they change. How do we adjust when the company spends $5million on a data center expansion, and then moves everything to the cloud 2 years later? Or when Windows abandons the GUI and goes to CLI, while Cisco moves away from IOS commands and on to GUI and API-driven interfaces? Does our religious/ethical/moral background help (or hinder) us from accepting and adapting to these moments in our work as IT pros? In this episode Kate, Josh, and Leon try to unpack the question and formulate some answers. Listen or read the transcript below. Leon: 00:00 Hey everyone. It's Leon. Before we start this episode, I wanted to let you know about a book I wrote. It's called The Four Questions Every Monitoring Engineer is Asked", and if you like this podcast, you're going to love this book. It combines 30 years of insight into the world of IT with wisdom gleaned from Torah, Talmud, and Passover. You can read more about it including where you can get a digital or print copy over on adatosystems.com. Thanks! Kate: 00:25 Welcome to our podcast where we talk about the interesting, frustrating and inspiring experience we have as people with strongly held religious views working in corporate IT. We're not here to preach or teach you our religion (or lack thereof). We're here to explore ways we make our career as IT professionals mesh - or at least not conflict - with our religious life. This is Technically Religious. Leon: 00:49 Last week, the Church of Jesus Christ of Latter Day Saints made an announcement which sent shock waves through the Mormon community and tremors throughout many other religious communities as well. We'll get into the details about that in a minute. But it caused us here at Technically Religious to think about how supposedly immutable truths, whether we're talking about replacing Latin with English during mass or Microsoft's adoption of open source, affect us and how we deal with those changes. Joining the conversation today is Kate Asaff Kate: 01:17 Hello. Leon: 01:18 And Josh Biggley. Josh: 01:20 Yeah, it's still cold in Canada! Leon: 01:23 and I'm Leon Adato and it's slightly warmer here in Cleveland. So Josh, do us a favor and run us down just the main points of the announcement from last week. Josh: 01:34 Sure. So this announcement was made in early April, and in order to understand it, we have to go all the way back to November, 2015, and maybe even a little further. So the Organization of the Mormon Church, or the LDS church, or the Church of Jesus Christ of Latter Day Saints, is such that it's a top down organization. So the President, or prophet, of the church, he makes a declaration, often he has to get his two counselors and the other 12 men that sit on the quorum of the 12 apostles. And then those 15 men make these proclamations. So in November of 2015, the church released a policy internally, that was leaked, and then they had to address it publicly, that said that any child who had parents who were of the same gender, so you're in a same sex-relationship or a same-gender relationship or if you are trans-gendered - first, they were now labeled apostates. And that's really heavy language within any religious community. There's one thing to have transgressed, but there's another thing to be considered an apostate. And then in addition to them being an apostate, they also said that no child whose primary residence was with those same sex couples could receive any ordinances within the church. So that spans the entire gamut of: You could not be blessed as an infant within the church; to: you couldn't be baptized; to: if you were in the church - there are certain things that you that you undertake within Mormonism, you know, if you're a boy at the age of 12 (and now the age of 11) you can receive the priesthood - just things that you can't do, many of those rites of passage. So last week, and of course we're recording this in the early days of April, so last week the church came out and said, "Hey, that policy that was put into place in November of 2015? We're going to change that policy. And we're going to make it so that now if you are the child of an LGBTQ family, you can be baptized as an infant, you can be blessed within the church, under the understanding that of course the church is going to reach out to you and, throughout your lifetime because you are now officially a member of the church, once you're, once you're blessed and in the LDS church. That's a huge change because leadership within the church and members at large - admittedly myself prior to my transition away from Mormonism - defended that policy with a couple of talking points. First and foremost that the prophet, he specifies what is the will of God. He speaks for God. He's God's mouthpiece on earth. And second that this was an act of kindness, because we didn't want to - as a church - we didn't want to have people, with their children attending the Mormon church where the Mormon church was teaching that their parents were apostates. And then having to go home to their parents and say, "Hey mom and dad...", sorry... I got... hey, look at that. "Hey Mom and mom, dad and dad." Or "Hey, mom and dad, you know, dad and dad or mom and mom. You're an apostate." Or "You know, we think that you should be excommunicated." And all those horrible things that go along with that. So yeah, that's um, that was huge. I was pretty... I'll admit I was pretty pissed off on Thursday. Not because I disagree with the change that children should be allowed to join whatever church they want to regardless of their parents. I was just pissed off because lots of people put a lot of time and effort into setting aside their personal views and trying to make it so that they align with what they were being told from the top of the church. And then the church went, "Hey, by the way, we're going to change." Leon: 05:36 Right. And you'd actually mentioned in an earlier episode when we talked about opposing as you follow, you said that that was one of the things that caused you and your family to move away from the Mormon church for a while. And then you came back and you suffered censure and a bunch of other things for those views. So you directly experienced some of that just for expressing an opinion. Josh: 05:58 Yeah. And that actually goes back pretty far in my marriage. That goes back probably 15 years ago when that particular experience happened. I mean, just to give some context and then, and I know that we want to talk about this as a foundation for IT. And I think there's a great parallel. And Leon, thanks for calling it out. Harold B. Lee, who was the president of the church from July of 1972 until his death in December of 1973, he said this: "You may not like what comes from the authority of the Church. It may contradict your political views. It may contradict your social views. It may interfere with some of your social life. But if you listen to these things, as if from the mouth of the Lord himself, with patience and faith, the promise is that 'the gates of hell shall not prevail against you; yea, and the Lord God will disperse the powers of darkness from before you, and cause the heavens to shake for your good, and his name's glory." So, you know, pretty powerful language from the LDS church. Fortunately in IT, apart from Mac users, right Kate? Nobody thinks that their salvation from any of their other platforms. Leon: 07:09 I think actually, yeah, there is actually a Mac airbook that blocks the gates of hell. Kate: 07:14 It's actually an iPad. Leon: 07:18 Oh, of course. It would be. And that, with making a little bit of lighthearted humor is where I actually want to go, which is the IT aspects of that. But before we dig too far into that can we think - the three of us - can we think of any other analogs in religions that may have been that same kind of thing? Again, I'm not talking about the fact that things change. I'm talking about things that were supposedly immutable, or somewhat permanent, and then the group, the organization sort of pivoted away from it. And, and I brought up one which was the change from the Catholic mass from Latin to English, which you know, happened I think in the seventies, if I remember correctly? I could be wrong because I don't pay very much attention to that kind of stuff. But I remember that it caused quite a bit of a stir, Josh: 08:13 Yeah, the ordination of women in the United Methodist Church, which happened well before I was born back in the mid fifties is an interesting one. Again, linking it to Mormonism. A woman named Kate Kelly founded an organization called Ordain Women. She's a lawyer and an activist and she was excommunicated by the LDS church in June, 2014. So everyone kind of waits for the day in which women will be ordained within the Mormon church or within the the LDS church. I don't know if it's going to happen, but we certainly see that adopted. And that's a huge thing, right? Because traditionally, you know, as far back as tradition goes religions tended to be very patriarchal. Where, you know, men were the heads, the household, they were the heads of the church. And so for the United Methodist to allow women to be ordained officially, even though it had been doing it for a long time, unofficially. That was huge. Kate: 09:04 It kinda reminds me in the 90's when the Catholic Church decided to start allowing girls to be altar servers. I remember there was a cardinal in Boston who had saw these girls serving and before the proclamation came from the Vatican, the story I heard was that he told the congregation, "Get these girls out of here." He didn't want to see them serving and that it was something, obviously 20 years later it has stuck with me Leon: 09:34 With religion you have things that really are dogmatic. Sometimes we throw that word around somewhat flippantly but religion actually is dogmatic. It has, you know, strictures or rules that are, at least in the eyes of it, internally immutable. And so you've got that. But pivoting to the IT piece, I want to talk a little bit about, about that. What are some of those changes? It's not going to change and then it does and you have to suddenly cope with it. What are some of the ones that we've either heard about or experienced ourselves? Kate: 10:08 Well since you guys were poking fun of me a little bit earlier as being a devoted Apple fan girl I will bring up the 2006 when Apple changed from Motorola to Intel processors. That was a huge thing for the Apple community and you know, many of us had spent years structuring these complex arguments as to why RISC processors are better than CISC processors and you know, insisting that megahertz and gigahertz aren't true measures of processing power. And then all of a sudden, like everything for us was just blown away overnight. Now Macs were Intel based and we kind of had to let go of, you know, our are sworn allegiance to the Motorola chipset. Leon: 10:56 That's, I'm going to say funny, not funny ha ha, but I just had, I would never have expected that to be overwhelming to a community. But I can see that the way that you describe it, I can absolutely understand that you had an emotional investment in a particular hardware standard. Josh: 11:16 Yeah. Well, I think that functional workspace, right? You know, Kate, you talked about defending the position of you know, RISC processors. That's why it's good. That's why it's the thing that makes Apple as awesome as it is. And we all go through that. You know, I've been in the industry long enough that I remember walking into data centers and seeing literally big metal, there were mainframes sitting on the data center floor. The idea that we would virtualize? It blew people's minds and I was like, I thought that was a great idea. Let's virtualize, let's get density. I will admit to being a little slower to adopt a shift to cloud because it, it put in place some barriers to entry for me. When I started my career, I loved the idea of networking, although I'm not a networking engineer, but I loved the idea that you could plug in cables and lights would start blinking and things just work. You know, there was, there was a command line and I actually, I had a reputation for asking questions in class, like "How do you do that from the command line?" But it got beaten out of me. I was that guy. But it got beaten out of me because Windows was the thing, Windows and at the time, a Netware were the platforms for for server managers and that's where I was headed. We've made this swing to having to code, and I don't code, but everything is code now. Networking is code, storage code, servers are code, everything is code. I'm made a very firm stance early in my career that I didn't want to code because I wasn't good at it. I'm still not good at it. I feel like I'm fumbling with 14 hands tied behind my back. I don't know what the analogy is. I just feel dumb. I feel like I'm the guy smashing his face on his keyboard trying to make things work anytime I code. So I get it. Those shifts are hard, and they're not hard because we don't, I don't want to accept the shift to cloud. It's hard because it makes me address other deficiencies in myself that I don't know that I'm 100% ready to address. Speaker 1: 13:24 And I think that that's actually a good point is that the change, the changes themselves may not be so troublesome, but they address either inadequacies or perceived inadequacies in ourselves and we don't like that. We don't always like to have a mirror held up to it. Sometimes I think it's not that though. So given a quintessential example, and I think many of us in IT have experienced this, where on Monday the business says, "Hey, you know, this event is occurring," whether it's a merger or an acquisition or whatever it is, "but don't worry, nothing's going to change for you. Everything's going to be just fine." And then Friday, metaphorically, they say, "Oh, by the way, we're shutting down the location" or "You're being let go" or you know, "We're moving this entire department to merge with this other department" or whatever it is. And, whether it happens in days or weeks or months, "You first told me nothing was going to change. And then it did." And that's the part that I think a lot of us have a hard time coping with. Don't tell me that it's not going to change when you know full well that it is. Enough times in business, things change and everyone says, oh yeah, we had no way of knowing that was going to happen. Those changes are unpredictable and so you just deal with them. But when it's clearly predictable, that's the part I think that is more difficult for us in IT to deal with. And I think that's the whole point of vendors offering what's known as LTS, Long Term Support, for something, like "We promise we're not going to pull the rug out from under you for x years." Josh: 15:09 I want to make sure that we understand or at least that we agree that IT is not religion. Religion is not IT. There's certainly some overlap and are dogmatic beliefs on both sides of of the row. But I tweeted earlier today and I'm going to read it, "A gentle reminder that you are more than your nationality, favorite sports team, political party, or religious ideology. Be more than the sum of your parts. Be better than your weakest part. Be human." And I think that that applies to IT as well. You might have been the person who was responsible for gateway computers, probably cause you liked cows. I don't know. Just because that is what you've always done doesn't mean it's what you always need to do. You are more than capable of transitioning and learning something new. And a coworker of mine, Zach, if you're listening, shout out, he will, he will admit that I am not a great scripter, but I'm also more than capable of being taught how to be an okay scripter, you know? Under his tutelage, I've become kind of useful with powershell and I have even remotely built some shell scripts recently. So it's possible you can be something more than what you thought you always were. And that is really a beautiful thing, both in IT and in humanity. Leon: 16:31 And I've written about that in the past. And I probably will again in response to this podcast about that's actually not what you are. You might be, you know, a Cisco IOS command line jockey. You might be, you know, you might know everything there is to know about the Apple platform, whatever it is, but that's not actually what makes you a great IT professional. What makes you a great IT professional is your sensibilities. The fact that you understand how networking works, how hardware reacts with software, how architecture and design and you know an idea converts itself and moves through the pipeline into an actual product. Those are the things that make you a great IT practitioner and those things will persist even when the foundational platform - software or hardware - change. But again, just to drive it back again, the point is that, you know, we know things change, but when we are told something is not going to change and then it does, what do we do about that? So my question does our perspective, our outlook, whether it's religious or philosophical, whether it's moral or ethical, does that make it easier or harder to deal with? Kinds of events that you know, we promise it won't change it than it does. On the one hand, I could see someone saying that if you are heavily religious, you come from a strongly dogmatic frame of view, then you carry with you baggage of what "forever" means. And when a vendor or my employer says "It's never going to change, we are standardizing on x," and then they change. That can feel like a betrayal because I brought along, "No, no wait, you said the f word, "forever", so you know that means something to me and you just broke your promise." That could be much harder than somebody who might not have, like I said, that baggage coming along with it. I don't know what, what's your take on that? Kate: 18:36 We talked about this a little bit before, but what I found was interesting about that question was that as an atheist, I obviously have a somewhat fluid view of, you know, how the world works and how things are. I am also, technology-wise the quintessential early adopter. I'm the first day that it's available. I will consume it, upgraded, download it, in any way that I can get the new stuff. I'm on board. Josh: 19:03 So I think that that makes you Kate an IT relativist. There's this great thing within Mormonism about moral relativism and how it's such a bad thing, which that is a whole different discussion, but I think that the very best IT practitioners are those who can balance a bit of that. Conservativis... can't say that word... Conservativism plus that moral relativism within IT that you see the changes, you're willing to bring them in, but you do it in a way that requires that you parse them through your personal and your community experience and then say, "Yes, that's something we actually want to bring in to our enterprise. We're willing to adopt it." You need to know about it so that you can also say to someone who has read a shiny brochure or seen a vendor pitch about how amazing a product is and say, "Nope actually that's not something that we want to do and here's why." And being able to speak to a multitude of points. I think makes us great IT practitioners, if you are just that sole sourced individual who only knows about one technology, you're going to find yourself in some IT challenges. I've got a great friend, who coincidentally is also ex Mormon and his name is also Josh. Interesting point. It's interesting for me to listen to him talk about his challenges within his career. He's a great DBA. He is actually not just a DBA, but he designs databases and he's worked on a bunch of different areas and he has really struggled because he thinks that he's only in that data space. And I want to say to him, "Hey Josh," which is a little weird cause I'm calling my name, "Hey Josh, you need to understand that you're better than what you think that you are because first, you're willing to look at your career and figure out the parts that are really useful for you and you know where your weaknesses are." That, for me, is the big part. Are we willing to look at what we're doing today and understand both its strengths and weaknesses and then leverage the strengths and minimize the weaknesses by adopting other technologies? It would be kind of like me saying, "Hey, Mormonism is still really awesome," - which I do think. There are some wonderful things about Mormonism, but I also am willing to adopt some ideologies from Judaism. Thank you Leon. And I'm also willing and very open to adopting that moral relativism that comes along with atheism and other non traditional religious beliefs." Leon: 21:36 I definitely think, Kate, that we have a new topic idea on the horizon, which is whether or not being staunchly religious makes you more or less likely to be an early adopter of technology. I think as an IT person, I really want to solve that problem because I like new technology and I would hate to think that I'm predisposed as an Orthodox Jew to like not want to do the things. Of course I could be an outlier. I could. So Josh, to your point, I think that that IT is not like religion in the sense that no matter how strongly a vendor or an organization says that something is never going to change, it's gonna. Right? Yeah. I mean we just know that that's the nature of IT, is that things are going to change and probably sooner rather than later when you look at the long game. However, I think one of the things that makes this issue, you know - "It's not going to change," and then it does - similar in both religious and IT contexts is what we as people hope and expect from that event. Which is, I think, that whoever's making the change needs to be transparent about it. I think they need to be intellectually honest about it. And they need to be consistent about it. And what I mean by those things is that they need to say that "This change is happening. We saw it coming, even if we couldn't tell you at the time, but we're telling you now that we knew it was coming. We just had to," you know, whatever it was, the merger was coming, but we couldn't say anything because blah, blah, blah, legal, blah, blah, blah, Wall Street, whatever. Right? Um, it needs to be intellectually honest. We're doing this because it supports our brand values. It supports our corporate goals. It, you know, whatever. And it needs to be consistent. And I think most of all, if people were hurt by that first statement, this is the way it is. "This is the way it's always going to be." And then it changes. And people were hurt. You know, an example that happened a couple of jobs back for me: $5 million investment in a data center, building it out, putting tons of hardware in there, and then they moved to the cloud. What are you kidding me? Like, we just bought all this stuff and the company did say, "We know we hired a lot of you for your depth expertise in on-premises data center operations. And now we're asking, you - we're in fact demanding - that you move to a cloud based model. We know that some of you are going to be upset by this. Some of you may want to leave. We're going to support you in whatever decision you make, but this is the direction we're going. That kind of statement makes it a lot easier to accept the, "We never will... Oops. We are" kind of thing. And I think just to tie it back to our opening topic. I would hope, although I'm not in the community, but I would hope that a statement is made to the families that were hurt within the Mormon community for, you know, the years of being called, you know, apostates and all that stuff, and say "We're really sorry about this and we're going to do what we can to make it better." I would hope that that statement would be forthcoming. I guess time is going to tell. Josh: 24:55 Time will absolutely will. Unfortunately Mormonism does not have a history of apologizing. The unfortunate reality of some of the current leadership has come out specifically and said that the church does not ask for, nor does it offer apologies. Kate: 25:12 A long, long time ago I worked for MCI Worldcom and, if you recall, it is now Verizon business. It was sold to Verizon about 18 months after the CEO promised all of the employees that he was not looking to sell the company. MCI is also a huge company. It had definitely been in the works. So your comment about honesty really struck home with me. Nobody likes to be blindsided by change, but even more, nobody likes to be lied to about it. Josh: 25:45 Thanks for making time for us this week. To hear more of Technically Religious, visit our website, technicallyreligious.com, where you can find our other episodes, leave us ideas for future discussions and connect with us on social media. Kate: 25:59 To paraphrase and old Greek guy, "the only constant in IT is change."
Episodio speciale crossover di Natale! Crossover PB-TP-SH-SN - Mac con ARM? - ParliamoneIn ordine alfabetico:- Alex Raccuglia di Techno Pillz;- Davide Gatti di Survival Hacking;- Francesco Tucci di Pillole di Bit e Geekcookies;- Roberto Marin di SNAP - Architettura imperfetta;Tutti insieme per lo speciale di Natale, per parlare del (probabile?) futuro dei MAC, con eventuali processori ARM.In ogni caso, ci trovate qui:Alex Raccuglia:http://www.alexraccuglia.nethttp://ulti.media/techno-pillz/Davide Gatti:http://www.survivalhacking.itFrancesco Tucci:http://www.iltucci.com/blog/http://www.pilloledib.ithttps://www.geekcooki.esRoberto Marin:https://marchdotnet.wordpress.comhttp://www.studioemme2.ithttps://twitter.com/ArchitecdaySostenete Runtime Radio:http://runtimeradio.it/ancheio/Riot su Telegram:https://t.me/technopillzriot
Episodio speciale crossover di natale Crossover PB-TP-SH-SN - Mac con ARM ? - ParliamoneIn ordine alfabetico:Alex Raccuglia di Techno PillzDavide Gatti di Survival HackingFrancesco Tucci di Pillole di Bit e GeekcookiesRoberto Marin di SNAP Architettura imperfettaTutti insieme per lo speciale di Natale, per parlare del (probabile?) futuro dei MAC, con eventuali processori ARM.Ad ogni ci trovate qui:Francesco Tuccihttp://www.pilloledib.itAlex Raccuglia, Davide Gatti e Roberto Marinhttps://t.me/technopillzriothttp://www.survivalhacking.ithttp://ulti.media/techno-pillz/Sostenete Runtime Radio:http://runtimeradio.it/ancheio/Sostenete Survival Hackinghttps://www.paypal.me/SurvivalHacking
In ordine alfabetico:Alex Raccuglia di Techno PillzDavide Gatti di Survival HackingFrancesco Tucci di Pillole di Bit e GeekcookiesRoberto Marin di SNAP Architettura imperfettaTutti insieme per lo speciale di Natale, per parlare del (probabile?) futuro dei MAC, con eventuali processori ARM.Ad ogni ci trovate qui:Francesco Tuccihttp://www.pilloledib.itAlex Raccuglia, Davide Gatti e Roberto Marinhttps://t.me/technopillzriothttp://www.survivalhacking.ithttp://ulti.media/techno-pillz/Sostenete Runtime Radio:http://runtimeradio.it/ancheio/Sostenete Survival Hackinghttps://www.paypal.me/SurvivalHacking
Episodio speciale crossover di natale Crossover PB-TP-SH-SN - Mac con ARM ? - ParliamoneIn ordine alfabetico:Alex Raccuglia di Techno PillzDavide Gatti di Survival HackingFrancesco Tucci di Pillole di Bit e GeekcookiesRoberto Marin di SNAP Architettura imperfettaTutti insieme per lo speciale di Natale, per parlare del (probabile?) futuro dei MAC, con eventuali processori ARM.Ad ogni ci trovate qui:Francesco Tuccihttp://www.pilloledib.itAlex Raccuglia, Davide Gatti e Roberto Marinhttps://t.me/technopillzriothttp://www.survivalhacking.ithttp://ulti.media/techno-pillz/Sostenete Runtime Radio:http://runtimeradio.it/ancheio/Sostenete Survival Hackinghttps://www.paypal.me/SurvivalHacking
Episodio speciale crossover di Natale! Crossover PB-TP-SH-SN - Mac con ARM? - ParliamoneIn ordine alfabetico:- Alex Raccuglia di Techno Pillz;- Davide Gatti di Survival Hacking;- Francesco Tucci di Pillole di Bit e Geekcookies;- Roberto Marin di SNAP - Architettura imperfetta;Tutti insieme per lo speciale di Natale, per parlare del (probabile?) futuro dei MAC, con eventuali processori ARM.In ogni caso, ci trovate qui:Alex Raccuglia:http://www.alexraccuglia.nethttp://ulti.media/techno-pillz/Davide Gatti:http://www.survivalhacking.itFrancesco Tucci:http://www.iltucci.com/blog/http://www.pilloledib.ithttps://www.geekcooki.esRoberto Marin:https://marchdotnet.wordpress.comhttp://www.studioemme2.ithttps://twitter.com/ArchitecdaySostenete Runtime Radio:http://runtimeradio.it/ancheio/Riot su Telegram:https://t.me/technopillzriot
In ordine alfabetico:Alex Raccuglia di Techno PillzDavide Gatti di Survival HackingFrancesco Tucci di Pillole di Bit e GeekcookiesRoberto Marin di SNAP Architettura imperfettaTutti insieme per lo speciale di Natale, per parlare del (probabile?) futuro dei MAC, con eventuali processori ARM.Ad ogni ci trovate qui:Francesco Tuccihttp://www.pilloledib.itAlex Raccuglia, Davide Gatti e Roberto Marinhttps://t.me/technopillzriothttp://www.survivalhacking.ithttp://ulti.media/techno-pillz/Sostenete Runtime Radio:http://runtimeradio.it/ancheio/Sostenete Survival Hackinghttps://www.paypal.me/SurvivalHacking
Pere Estupinyà y Javier Sampedro repasan la actualidad científica de la semana. Además, Carmen Fernández, doctora en Química, y Nuria Campillo, científica del CISC, nos hablan sobre el proceso de elaboración e investigación de medicamentos
That Old Pod is honored to have Phil Bosua join this week's show where he discusses his experience as an entrepreneur and inventor. Conversation covers a bit of Phil's backstory, a look into his accomplishments with LIFX and a look to his future with the 100 year bulb project. Discussion touches on the the future of Internet of Things and the underlaying philosophies which should govern these devices. Show Notes:LIFX lifespanLED lifespan (20-50,000 hours)405 nm LEDs inactivate bacterial pathogensExamples of the laser pens as described by PhilHow 405 nm appearsPhosphor film over bulb allows it to appear whiteOther researchers have investigated methods more similar to Lucio’s conceptPhil Bosua Bloomberg ProfileI was unable to find anything of Propeller on the web, although there is a new band from Sydney (not Melbourne) of the same nameMalcolm Gladwell’s 10k hoursValue of thinking about something else before making decisionsWhat is a bounce down?Reasons why you may bounce down frequentlyWhat is a compiler?Hue light bulbsHue app interface (iOS version is very similar)Home App interfacePhotoshop color selectorLIFX Interface2015 update to LIFX interfaceCurrent LIFX app linkLucio’s example of Mac OS dock magnificationColor psychology and it’s impact on moodPod with Cillian discussing the future of Internet of Things (IoT) (iTunes)Phil seems to be directly quoting me from this pod with Dexter (iTunes)Little snitchWhat is Unix?What is the Linux kernel?Why Unix is so comparatively secureWhat is firmware?Brief video explaining microcontrollers Example of how cheap full computers are gettingBrief history of ARMExplaining ARM (RISC) vs x86 (CISC)Wireless A/B/G/N explainedWhat is an OLED?Sustainable plasticsCost of CPU performance (measured in number of transistors) over time costQualcomm lawsuitsWhat is distributed processing?Xgrid functionality in OS X, now a free download as part of Mac OS ServerAmazon S3Some more details about Amazon S3Keyshot rendering softwareRGBW (red, green, blue, white) spectrumComparing hue and LIFXLux Lumens850-1200 lumens compared to standard bulb industryKickstarterPebblePebble Kickstarter successLIFX Kickstarter successSequoia CapitalPhil Bosua LinkedInTwitterFacebookMany thanks to Kenan Block for setting up this interview
CISC seminar led by PhD Students, named - Paul Driscoll, Alan Msosa, Kristen Schaubhut and Helen Rand. The seminar was entitled "Digital Intimacies"
Det svåra hundranittiosjätte avsnittet går i uppföljningens tecken. Vi inleder med lite pulversnack, till lunch istället för frysmatlådor. Efter det något om Tobias vertikala mus och hans arbetande i Linux på heltid. Har någon tips på ett bra programmerbart “extratangentbord” att ha för sina egna genvägar? Tipsa oss gärna! Sedan börjar vi prata om processorernas inverkan på kompileringshastighet och hamnar snabbt oväntat långt ner i hårdvarustapeln för att förklara vad som händer och hur. Vi avslutar med lite uppföljning kring själva podden: för er som haft problem att hoppa i podden när ni lyssnar är det förhoppningsvis fixat från och med förra avsnittet. Ett stort tack till Cloudnet som sponsrar vår VPS! Har du kommentarer, frågor eller tips? Vi är @kodsnack, @tobiashieta, @iskrig och @bjoreman på Twitter, har en sida på Facebook och epostas på info@kodsnack.se om du vill skriva längre. Vi läser allt som skickas. Gillar du Kodsnack får du hemskt gärna recensera oss i iTunes! Länkar Joyl… förlåt, Jimmy Joy Queal Fredrik har åsikter om shakers, och pulvermat Queals forumtråd med shaker-feedback Twennybar Vertical mouse 4 Bettertouchtool och att ställa in touchbar med det LLDB Razer orbweaver Optimustangentborden - med en skärm under varje tangent Sweden CPP - C++-meetup i Stockholm Stockholm Google developer meetup Gävle developer meetup - kom om du är i närheten! Volkswagen - får dina tester att gå igenom i CI-systemet, tack @ollegz! Volkswagen fuskade i miljötester Länkare Cache line Thin LTO Tack @vrutberg för frågan om kärnor och kompilering! Hyper-threading Mikroinstruktioner RISC - reduced instruction set computing CISC - complex instruction set computing @csholmq Pocket casts Variabel bitrate Overcast, Marco Arment och ATP Audacity Titlar En stjärna i nörd-checkboken Alla specialtangenter till LLDB i huvudet Inte ett ordentligt jobb om man inte är fiende med QA En kompilator per core, om inte lite till Det finns vissa länkare som är trådade (Ofta) ganska bisarra saker man försöker optimera I 9,9 fall av 10 Fånigt att jag inte lärde mig assembler istället Komplicerade saker som händer i en CPU Ett varv på klockan Innan du kan hoppa på nästa instruktion Någonting ingen vet längre En sväng i klockan Påverkar nästan ingen i dagsläget
TCW Podcast Episode 017 - The British 8-Bit ComputerMarket: Hardware We discuss the early 8-bit computer hardware market in Britain, and the unique circumstances of the era before it was ended by the coming of 16 bit computers. Kids React to Old Computers: https://www.youtube.com/watch?v=PF7EpEnglgk Old school Graphics Part I Commodore 64 & Nintendo: https://www.youtube.com/watch?v=Tfh0ytz8S0k Uridium C64: https://www.youtube.com/watch?v=ks5-Zq6XAN4 Uridium ZX Spectrum:https://www.youtube.com/watch?v=CgyxpqL8T3Q RISC vs CISC: https://www.youtube.com/watch?v=mDrUkjOVtAU New episodes on the1st and 15th of every month! TCWEmail: tcwpodcast@gmail.com Twitter:@tcwpodcast Alex's Blog: http://videogamehistorian.wordpress.com Intro Music: Josh Woodward - Airplane Mode - Music - "Airplane Mode" by Josh Woodward. Free download:http://joshwoodward.com/song/AirplaneMode Outro Music: RolemMusic - Bacterial Love - http://freemusicarchive.org/music/Rolemusic/Pop_Singles_Compilation_2014/01_rolemusic_-_bacterial_love Copyright: Attribution: http://creativecommons.org/licenses/by/4.0/
We've reached peak "Br[i|y]an" this week when we invited our friend Brian Engle on to discuss what his organization does. Brian is the Executive Director of the Retail Cyber Intelligence Sharing Center. "Created by retailers in response to the increased number and sophistication of attacks against the industry, the R-CISC provides another tool in retailers’ arsenal against cyber criminals by sharing leading practices and threat intelligence in a safe and secure way." -- R-CISC website To learn more, visit https://r-cisc.org/ We discussed with Brian a bit of the history of the #R-CISC, and why his organization was brought into being. We ask Brian "How do you get companies who make billions of dollars a year to trust another competitor enough to share that they might have been compromised?" "And how do you keep the information sharing generic enough to not out a competitor by name, but still be actionable enough to spur members to do something to protect themselves?" Other links: Veris framework Mr. Boettcher mentions: http://veriscommunity.net/ TAXII protocol: https://taxiiproject.github.io/ STIX https://stixproject.github.io/ https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order-promoting-private-sector-cybersecurity-information-shari https://www.paloaltonetworks.com/company/press/2015/palo-alto-networks-joins-the-retail-cyber-intelligence-sharing-center-in-newly-launched-associate-member-program.html http://www.darkreading.com/cloud/r-cisc-the-retail-cyber-intelligence-sharing-center-signs-strategic-agreement-with-fs-isac-to-leverage-services-and-technologies-for-growth/d/d-id/1320363 Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security using Patreon: https://www.patreon.com/bds_podcast RSS FEED: http://www.brakeingsecurity.com/rss Direct Download: http://traffic.libsyn.com/brakeingsecurity/2016-009-brian_engle_rcisc_information_sharing.mp3 On #Twitter: @brakesec @boettcherpwned @bryanbrake #Facebook: https://www.facebook.com/BrakeingDownSec/ #Tumblr: http://brakeingdownsecurity.tumblr.com/ Google Play Store: https://play.google.com/music/podcasts/portal/#p:id=playpodcast/series&a=100584969 Player.FM : https://player.fm/series/brakeing-down-security-podcast Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582/ iTunes: https://itunes.apple.com/us/podcast/2016-009-brian-engle-information/id799131292?i=364002695&mt=2 #actionable, #brian, #engle, #cissp, #cpes, #data, #financial, #infections, #isac, #malware, #podcast, #rcisc, #retail, #security, #infosec, #threat #intelligence Photo of Brian Engle courtesy of https://r-cisc.org **I (Bryan) apologize for the audio. I did what I could to clean it up. Seriously don't know what happened to screw it up that badly. I can only imagine it was bandwidth issues on my Skype connection**
En este capitulo vamos a dar un repaso a la vida del microcontrolador. Veremos qué diferencias hay con un microprocesador y el recorrido que ha tenido hasta llegar a los microcontroladores que tenemos en nuestras placas de Arduino. Hace unos días, publicamos un articulo llamado "La vida antes de Arduino", en este articulo también damos un repaso a los microprocesadores y los microcontroladores antes de la llegada de Arduino pero en este capitulo vamos a ver un poco más en detalle a los microcontroladores.Pero como siempre, si quieres contactar con nosotros lo puedes hacer de diferentes maneras, a través del formulario de contacto, en el e-mail info@programarfacil.com, en Twitter (@programarfacilc) o en Facebook. También puedes mantenerte al día a través de la lista de distribución.Microprocesador vs MicrocontroladorUn micropocesador es un chip encargado de realizar operaciones complejas a partir de unas instrucciones que solemos llamar programa y unos datos de entrada y salida. Para procesar estos datos y almacenarlos necesitamos conectarlo a través del bus del sistema a la memoria RAM y a los dispositivos de E/S a través de la placa base. Están compuestos por registros, unidad de control, ALU y unidad de cálculo en coma flotante. Es el que mas conocemos todos, el que miramos cuando vamos a comprar un PC (i5, i7, AMD Athlon…)En cambio un en un microcontrolador tenemos en el mismo chip todo lo anterior, pero además también tenemos en el mismo chip la memoria, las E/S, …. y el programa que vamos a ejecutar. Estos chips están pensados para un propósito en particular, le programamos el código que queremos que ejecute y se dedica a realizar ese conjunto de tareas finito, en cambio un microprocesador esta pensado para un propósito general, es decir para ir ejecutando distintos programas.Tal vez, lo menos conocido es el microcontrolador, sin embargo nos rodea a cada instante. Ahora mismo es seguro que tengáis uno cerca ya que los puedes encontrar en un mando a distancia, en las llaves del coche, en un frigorífico, en la lavadora y así en un sin fin de aparatos. Si todas estas características, a demás le añadimos que los microcontroladores son mucho más baratos que los microprocesadores se convierten en un elemento esencial para el IoT.Los microcontrolador PICSon una familia de microcontroladores con arquitectura RISC fabricados por Microchip Technology, aunque los primeros microcontroladores no fueron estos sino los basados en la arquitectura CISC por Texas Instruments en 1972.Programación de un PICPara pasarle el código de un ordenador a este microcontrolador necesitamos un dispositivo llamado programador. El programador es un dispositivo electrónico que configura las memorias de los microcontroladores. Se comunica con el ordenador a través del puerto serie o paralelo. El programador genera los voltajes necesarios para la programación. Actualmente se pueden programar directamente en el circuito de destino.En la web de Microchip tenéis programadores y software para programar estos chips. Los lenguajes típicos son C, Basic y Pascal, aunque son bastantes difícil de programar, mezclan lenguaje C a bajo nivel con lenguaje ensambladorPICAXEEstos PICs fueron una revolución en su dia, ya que integraban un firmware preprogramado con un intérprete de BASIC, lo que facilito mucho la programación. Otra mejora que introdujo es poder conectar directamente por el puerto serie a nuestro PC y así elimino la necesidad de un programador.Placa Parallax BASIC StampFue el siguiente avance en este mundo, también se programa en BASIC y esta placa ya se va pareciendo más a nuestro Arduino ya que tiene la misma filosofía de ir añadiendo shields.Los inicios de ArduinoEn la época en la que se creo Arduino, sobre 2015, los programadores de PICs utilizaban la placa anterior (BASIC Stamp) y como cuenta su fundador Massimo Banzi quisieron crear una placa accesible para todo el mundo debido a que la BASIC Stamp costaba sobre los 100$ y su dificultosa programación la hacia poco apetecible.Con estas premisas comenzaron a desarrollar una placa que fuera bastante más barata, con una plataforma accesible y que fuera fácil de programar. Así crearon Arduino, nombre que se inspiraron de un bar donde Massimo pasaba largas horas y se llamaba "Bar di re Arduino (Bar del rey Arduino, un rey Italiano sobre el año 1000).Como ya sabéis, el fuerte de Arduino es su entorno de programación y los múltiples entornos que han ido saliendo con Scracth for Arduino que nos facilita adentrarnos en este mundo desde el minuto cero.Y llego GenuinoComo podéis comprobar en la web de Arduino, ahora las placas que venden en Europa se llaman Genuino y fuera de Europa se siguen llamando Arduino. A mediados de 2015 comenzaron fue cuando comenzaron a llamarse en Europa Arduino y extrañados por este cambio de marca nos pusimos a buscar información y aunque no encontramos información oficial descubrimos lo siguiente:Uno de los fundadores, Gianluca Martino, era el encargado de la producción y este registro por si mismo la marca en Italia. La producción la realizaba la empresa Italiana SmartProjects y esta le pagaba a la fundación Arduino los derechos por producción a través de Gianluca.Por algún motivo que se desconoce, la relación de Gianluca con el resto de fundadores se rompió y este vendió los derechos de la marca Arduino a la empresa que las producía dejando por tanto de percibir los derechos por producción la comunidad de Arduino.Esta empresa a pasado a llamarse Arduino slr y continúan vendiendo las placas de Arduino con esa marca. Asi es que las placas que actualmente se vendan como "Arduino made in Italy" pertenecen a esta empresa. Sin embargo esta empresa no tiene los derechos de la marca fuera de Europa por eso las placas de la comunidad fuera de Europa se siguen llamando Arduino.Parece ser que toda esta historia esta en los tribunales para ver a quien pertenece realmente la marca pero hasta que no se resuelva esta es la situación actual. Por otro lado, esta empresa ha creado la web arduino.org que es una copia de la wed de la comunidad Arduino.ccLos microcontroladores de Arduino, Atmel La mayoría de placas de Arduino llevan microcontroladores Atmel (AVR). Aunque estos microcontroladores tiene su propia arquitectura se basan en la arquitectura RISC al igual que los antes mencionados PICs.La empresa se fundo en 1984 e inicialmente comenzó a construir memorias compitiendo contra el gigante Intel. Siempre han destacado por el bajo consumo de sus componentes y un alto rendimiento y en 1994 es cuando entra en el mercado de los microcontroladores introduciendo por primera ver memoria flash. A partir de ese año ya fueron sacando sucesivamente su gama de microcontroladores AT que encontramos en la placa de Arduino.ATmega8: El primero que se utilizó para ArduinoCPU: 8-bit AVRFlash (Kbytes): 8 KbytesOpera a 4.5V - 5.5VFrecuencia (16 MHz)ATmega328: El que tiene la placa Arduino UNOCPU: 8-bit AVRFlash (Kbytes): 32 KbytesOpera a 4.5V - 5.5VMayor frecuencia (20MHz)Más E/SAtmel SAM W25: El que utiliza la placa MKR1000CPU: 32 BitsWIFI ( WPA/WPA2)256KB embedded Flash and 32KB SRAMFrecuencia 48 MHzOpera 2.7 to 3.6VMicros IntelPero no solo encontramos microcontroladores Atmel en las placas de Arduino, por ejemplo en la placa Arduino 101 tenemos uno de Intel:Microcontrolador Intel Curie:CPU : 32 BitsBluetoothOpera a 3.3VFrecuencia 32 MHzMemoria Flash 196KBSRAM 24KBIntel Galileo - Intel Edison Placas de desarrollo compatibles con Arduino.Intel también apuesta por el código abiertoIntel Edison enfocado a wereables, PC del tamaño de un tarjeta SDEl recurso del diaATmel Studio 7Con este IDE no solo podrás programar los microcontroladores de ATmel, también podrás programar otros PIC o tu placa de Arduino. Este entorno de desarrollo incluye herramientas para los proyectos más codiciosos que te propongas. Utiliza C/C++ o ensamblador para programar el microcontrolador y te permite importar tus proyectos creados con el IDE de Arduino para poder pasar a un nivel superior. Entre los múltiples plugins que incorpora destacamos el espacio de trabajo basado en la nube donde se puede compartir y realizar un seguimiento de código de tu equipo y el visualizador en tiempo de ejecución, en que mediante un potente visualizador de datos nos proporciona con una vista de osciloscopio las mediciones de nuestras entradas. Muchas gracias a todos por los comentarios y valoraciones que nos hacéis en iVoox, iTunes y en Spreaker, nos dan mucho ánimo para seguir con este proyecto.
It is often assumed that the advancement of technology will give rise to solutions for all of humankind's problems. With the rise of smart phones and wearable technology we are now able to track everything about ourselves, from our health and biological functions to our work, exercise, sleep and eating habits. Soon technology will go even further in its integration in every facet of our lives. Everything about us will be recorded, saved and made available to us anywhere at any time. Long gone will be the days of waiting in line to vote, instead selections will be made instantly on your phone or computer. Crime prevention will not need people, but will be left to complex algorithms that predict who, where and when crime will occur. Newspapers will be fully customized to each individual reader's views and preferences. Some say this is the way of the future and the path to an efficient, transparent and perfect society. One of today's most respected cyber-philosophers, Evgeny Morozov, takes a different view. While technology can improve our lives, it is not a panacea for all our problems, and the blind acceptance of the technological elimination of the frictions, opacity, ambiguity and imperfection inherent in human life poses a serious threat to society and the democracy we cherish. Speaker: Evgeny Morozov, Contributing Editor, The New Republic Moderator: Andrew Woods, Cybersecurity Fellow, CISC, Stanford University
Onderwerpen: Facebook/Whatsapp, iTunes 11, iTunes gift cards, 61 jaar oude computer, Hypercritical over RISC vs. CISC, popSLATE, PHP Frameworks en aanverwante zaken, plannen van James Bond schurken, Coursera, Alexander Klöpping en Universiteit van Nederland, Karma en Wietse’s gadget oplossing. Grote dank aan de vrienden van Appels en Peren: Soundcloud voor de bandbreedte, Nozzman voor het coverartwork en Clublime voor de introjingle. Alle links uit de aflevering Facebook Messenger Android app zonder Facebook account iTunes gift card scanning 61 jaar oude computer wordt weer aangezet Javascript simulation Hypercritical aflevering 94 - Shrink, Shrink, Shrink popSLATE - Tweedescherm voor je iPhone Symfony PHP Framework PHP The Right Way Ask an Economist: Which Bond Villain Plan Would Have Worked (and Which Not)? Coursera Alexander Klöpping begint universiteit Karma Alle links en informatie over de podcast vind je op appelsenperenshow.nl
John Siracusa and Dan Benjamin revisit the topic of voting technology, then discuss the possibility of Apple using ARM processors instead of Intel processors in its Macs: RISC vs. CISC, process nodes, the x86 burden, and…sewing machines.
Duke & Jordan Ltd have carried out a study for the JISC this year into using shared services to deliver corporate information systems in FE and HE across the UK. The interest in shared services stems from Whitehall's Gershon Report.
Speaker:John Waldman Description:What made the location of a city desirable in the past was certainly based on accessibility to water. It is no coincidence that most large cities are--or were--port cities. But today, this same proximity to water is perhaps a cause for concern. We certainly have seen the consequences of such urbanization during both the Tsunami and of course Katrina. But what is the real potential threat of rising tides to New York City? Join the CUNY Institute for Sustainable Cities and Queens College in welcoming Andrew Revkin of The New York Times, in discussion with a host of Queens College experts to discuss these important issues.
Speaker:Nick Coch Description:What made the location of a city desirable in the past was certainly based on accessibility to water. It is no coincidence that most large cities are--or were--port cities. But today, this same proximity to water is perhaps a cause for concern. We certainly have seen the consequences of such urbanization during both the Tsunami and of course Katrina. But what is the real potential threat of rising tides to New York City? Join the CUNY Institute for Sustainable Cities and Queens College in welcoming Andrew Revkin of The New York Times, in discussion with a host of Queens College experts to discuss these important issues.
Speaker:Stephen Pekar Description:What made the location of a city desirable in the past was certainly based on accessibility to water. It is no coincidence that most large cities are--or were--port cities. But today, this same proximity to water is perhaps a cause for concern. We certainly have seen the consequences of such urbanization during both the Tsunami and of course Katrina. But what is the real potential threat of rising tides to New York City? Join the CUNY Institute for Sustainable Cities and Queens College in welcoming Andrew Revkin of The New York Times, in discussion with a host of Queens College experts to discuss these important issues.
Speaker:George Hendrey Description:What made the location of a city desirable in the past was certainly based on accessibility to water. It is no coincidence that most large cities are--or were--port cities. But today, this same proximity to water is perhaps a cause for concern. We certainly have seen the consequences of such urbanization during both the Tsunami and of course Katrina. But what is the real potential threat of rising tides to New York City? Join the CUNY Institute for Sustainable Cities and Queens College in welcoming Andrew Revkin of The New York Times, in discussion with a host of Queens College experts to discuss these important issues.
Speaker:Andy Revkin Description:What made the location of a city desirable in the past was certainly based on accessibility to water. It is no coincidence that most large cities are--or were--port cities. But today, this same proximity to water is perhaps a cause for concern. We certainly have seen the consequences of such urbanization during both the Tsunami and of course Katrina. But what is the real potential threat of rising tides to New York City? Join the CUNY Institute for Sustainable Cities and Queens College in welcoming Andrew Revkin of The New York Times, in discussion with a host of Queens College experts to discuss these important issues.