SGI's HW also had ccNUMA (cache-coherent Non-Uniform Memory Access), which, given the latencies possible in systems _physically_ spanning entire rooms, was quite a feat.
The IRIX OS even had functionality to migrate kobs and theor working memory closer to each other to lower the latency of access.
We see echoes of this when companies like high-frequency traders pay attention to motherboard layouts and co-locate and pin the PTS (proprietary trading systems) processes to specific cores based on which DIMMs are on which side of the memory controller.
```you should know the Uvalde school shooter was a minor but he managed to buy the guns legally from a gun shop on credit!```
That does not appear to be true. The investagiom reporting shows that the shooter bought the guns after he turned 18 - the legal age to purchase them (long guns, aka rifles - different from pistols) in the state of Texas.
Buying things on credit seems like a reasonable way to do business in general - are you suggesting that all deadly weapons should be sold for cash to increase the difficulty of legally acquiring them and so lowering the frequency of mass shootings?
In my country, no firearm can be issued to any civilian (certainly not a minor), without verification and license from police.
In Texas, there is no minimum age for purchasing ammunition beyond federal limits, no requirement for an ammunition seller to keep a record of the purchaser, and no specific license to buy or sell ammunition, according to the Giffords Law Center.
Salvador Ramos, the Uvalde school shooter, legally purchased two AR platform rifles Ramos got his guns legally through Oasis Outback, a Uvalde sporting goods store and federal firearms licensee, according to published reports. He also purchased hundreds of rounds of ammunition, on his 18th birthday.
I know the USA has a bad habit of buying things on credit, but firearms & ammo should never be allowed to be purchased on credit. Let it be purchased only after a verification and license from police, and only via debit card or bank transaction with proper legal paper trail, not credit or cash. And any firearm and ammo purchase should be ratified with local police, so they know if someone is making a suspicious purchase.
```… the pipe was so fast, you could only pcap if you had a SCSI hard drive!```
This is why NSA asked for (and got from SGI) a guranteed rate I/O API - to make sure that whstever the signal intelkigence platform sensors captured could be written to storage.
(Not disagreeing that this is a dupe), but this is The Verge's coverage of Lumafield's findings.
Not sure if there is any additional value in the re-coverage, though it does feel like the message is important enough to be spread, and I suspect there is more readers of The Verge than the original source.
Would your signal eminate from the drones, or a dedicated platform?
Against the drones, that would be difficult to prevent, but the limitations imposed by the transmitter gear (size, weight, inverse square law of area being jammed) would probably limit the impact.
The dedicated platform would be located via signal strength analysis and likely physically destroyed.
It feels like we have disparate mental models for what is happening.
Mine was that the noise generation was part of the adversary's actions (as is the presence of the drones themselves).
Are you suggesting that the noise (+encrypted data) is part of the airport's standard procedures, and authorized users pick out (and decrypt) the data, and everything else (like Command & Control) of adversarial devices is overwhelmed by the overall noise?
Distributing (and controlling) the necessary decryption seems like a helaciously difficult challenge for general/commercial aviation. Who are the authorized recievers of the ebcrypted data? How do we revoke access as time goes on? How do we handle normal key rotation (so that the adversary can't have unlimited time to crack/bruteforce the current keys)?
(Not my core field, so this is SWAG-ish): There is also a separate but equally important problem of signal vs noise - isolating the signal for decryption. Doable, but fairly costly to implement, and far more brittle than I suspect would be acceptable.
Huh. So, making cell site simulators be more useful than just for doing wholesale surveillance?
Wonder if the goal is as wholesome (tool for rescue) as it seems, or there is some sort of commodization of this sort of tools being done, and so should not be subject to any special restrictions or regulation.
In the US, the terminology tends to split into "fired" (implies "for valid reasons") vs "laid off" (implies "position was terminsted, this was not about the employee or their qualities and performance").
In the UK "fired" would mean the same, "laid off" off would mean the same, "made redundant" also means the same and more clearly, with emphasis on the position no longer existing. "Sacked" means about the same as fired.
(This is a bit of a continuation of what `whiteandnerdy` posted in a different comment) - the distributed trust model seems to assume that the governments won't cooperate to seize different necessary distributed things across borders. I am reasonably sure that this is not an assumption which holds true - plenty of multi-national raids on criminals happen (and classifying people who hold decryption bits to stuff governments want as being criminals is a fairly trivial task).
> If you stop making progress, start back at step 1 because iCloud Drive frequently gets stalled for some reason or another
It feels utterly wrong that there is not an Event Log entry (I am not an iCloud user, so cannot easily check) or some other, better log in place.
The snide cynic in me wants to reach for the whole "Apple does not expose this sort of detailed data to the user", but for backups, that seems important enough for that to not be the case?
The IRIX OS even had functionality to migrate kobs and theor working memory closer to each other to lower the latency of access.
We see echoes of this when companies like high-frequency traders pay attention to motherboard layouts and co-locate and pin the PTS (proprietary trading systems) processes to specific cores based on which DIMMs are on which side of the memory controller.