Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Actions speak louder than words.

Uncategorized
85 68 1

Gli ultimi otto messaggi ricevuti dalla Federazione
  • @markhurst imagine being the kid picked for this picture

    read more

  • @skua @markhurst There are lots of confounding variables other than laptops and tablets, yet we always see articles like this and almost never on the other factors. Yeah, a lot of this predates Covid, but there is a general lack of willingness to even consider or acknowledge the effects of this disease on children and the culpability that schools, school boards and society at large have in not making every effort to reduce exposure in an environment they are forced into.

    read more

  • @markhurst Tablets were supposed to complement textbooks, not replace them entirely!
    read more

  • @skua @markhurst Show me graphs of Maine's classroom teacher to student ratios for the last fifteen years. Show me teacher pay and average educational achievement. Show me child poverty rates. Show me data on kids needing food assistance and whether they are getting it. Show me vaccination rates.

    read more

  • @markhurst Brainrot is real.

    read more

  • @Infoseepage @markhurst
    "Fortune reported in 2017 that Maine’s public school test scores had not improved in the 15 years the state had implemented its technology initiative."

    Test scores not improving in Maine for 15 years prior to 2017 is hard to attribute to the neuro-disruptive effects of COVID-19.

    read more

  • How the Intel 8087 FPU Knows Which Instructions to Execute

    An interesting detail about the Intel 8087 floating point processor (FPU) is that it’s a co-processor that shares a bus with the 8086 or 8088 CPU and system memory, which means that somehow both the CPU and FPU need to know which instructions are intended for the FPU. Key to this are eight so-called ESCAPE opcodes that are assigned to the co-processor, as explained in a recent article by [Ken Shirriff].

    The 8087 thus waits to see whether it sees these opcodes, but since it doesn’t have access to the CPU’s registers, sharing data has to occur via system memory. The address for this is calculated by the CPU and read from by the CPU, with this address registered by the FPU and stores for later use in its BIU register. From there the instruction can be fully decoded and executed.

    This decoding is mostly done by the microcode engine, with conditional instructions like cos featuring circuitry that sprawls all over the IC. Explained in the article is how the microcode engine even knows how to begin this decoding process, considering the complexity of these instructions. The biggest limitation at the time was that even a 2 kB ROM was already quite large, which resulted in the 8087 using only 22 microcode entry points, using a combination of logic gates and PLAs to fully implement the entire ROM.

    Only some instructions are directly implemented in hardware at the bus interface (BIU), which means that a lot depends on this microcode engine and the ROM for things to work half-way efficiently. This need to solve problems like e.g. fetching constants resulted in a similarly complex-but-transistor-saving approach for such cases.

    Even if the 8087 architecture is convoluted and the ISA not well-regarded today, you absolutely have to respect the sheer engineering skills and out-of-the-box thinking of the 8087 project’s engineers.

    hackaday.com/2026/02/21/how-th…

    read more

  • @markhurst

    Illustrates the utter stupidity of the Trump administration, pure evil…

    read more
Post suggeriti
  • 0 Votes
    8 Posts
    39 Views
    @77nn @oblomov I recently got a router/gateway to a new ISP. They have intentionally nerfed the web interface to force your user of a phone 'cr'app. I managed to re- enable the main login with their 'cr'app, yet the latest update nerfed other pages.IMO this is just enshittification.
  • 0 Votes
    1 Posts
    8 Views
    L'ultimo TechDispatch esplora le sfide della privacy dei portafogli di identità digitaleIl #GarantePrivacy europeo (GEPD) ha pubblicato il suo ultimo TechDispatch , una serie di articoli che forniscono analisi dettagliate su nuove tecnologie e tendenze. Questo numero si concentra sui Digital Identity Wallet (DIW) e su come possiamo garantire che rimangano conformi ai principi di protezione dei dati.(segui l'account @privacypride per avere gli ultimi aggiornamenti sulla #privacy e la gestione dei dati personali)Un DIW consente agli utenti di archiviare in modo sicuro dati di identità e credenziali in un repository digitale, consentendo l'accesso ai servizi sia nel mondo fisico che in quello digitale. Intitolata "Il percorso verso un approccio di protezione dei dati by design e by default", la nuova pubblicazione è una lettura essenziale per decisori politici e professionisti che desiderano garantire che lo sviluppo di DIW, come il futuro Portafoglio Europeo di Identità Digitale (EUDIW) , aderisca ai principi di Privacy by Design e by Default.Per saperne di più sulle raccomandazioni del GEPD per un quadro normativo sull'identità digitale sicuro e rispettoso della privacy,edps.europa.eu/data-protection…
  • 0 Votes
    1 Posts
    5 Views
    Latest comic: Mr. and Mrs. Perkins' Holiday Stroll#holidays #authoritarianism #cartoon #comic #privacy #surveillance
  • 0 Votes
    1 Posts
    6 Views
    Ogni giorno parliamo di progresso, tecnologia e futuro. Ma sapete chi è il signore sulla destra?Scopri di più su Claude Shannon nell'articolo di Carlo Denza: https://www.redhotcyber.com/post/shannon-padre-della-crittografia-e-fondatore-dellera-dellinformazione/#redhotcyber #storia #informatica #it #web #ai #hacking #privacy #cybersecurity #Innovazione #Tecnologia #StoriaDellaTecnologia #Riconoscimento #Pionieri #Innovazione #Informatica #PionieriDigitali