2
llamatr0n 2 points ago +2 / -0

"embedded" - it's a web api call in win12

1
llamatr0n 1 point ago +1 / -0

Why do you only post screenshots of summaries of news on Yahoo?

It's is it because you don't want people to read primary sources for themselves

2
llamatr0n 2 points ago +2 / -0

M1, M2 & M3 have been very succesful, partly because they include similar functions. There is an advantage in using the CPU because it can share main memory. NVIDIA are using VRAM as market segmentation. 24Gb VRAM is the most you'll find on desktop GPUs.

Intel tried before with Larabee, which was the project of the current CEO and he sees it as a mis-step it was not followed through as it might have competed with NVIDIA in that space.

Your chip already has lots of specialist functions you don't use. BCD functions for example.

Do you do a lot of AES encryption? Your CPU has dedicated instructions for it.

Your x87/MMX registers are there but are not used in x64 mode, along with including saving/restoring of segment registers on the stack, saving/restoring of all registers (PUSHA/POPA), decimal arithmetic, BOUND and INTO instructions, and "far" jumps and calls with immediate operands.

Do you run in 32bit protected mode much? How about 16-bit protected mode ?

2
llamatr0n 2 points ago +2 / -0

go on then, show me how that has anything to do with Multiply-Accumulate units

Intel's Neural Processing Unit (NPU) is a specialized hardware component designed to accelerate AI workloads. It consists of four main components:

  1. Global Control: This is a crossbar that works alongside a memory mapping unit (MMU) and Direct Memory Access (DMA).
  2. Scratchpad RAM: A small, fast memory used for temporary storage of calculations.
  3. Two Neural Compute Engines (NCEs): Each NCE contains a programmable Digital Signal Processor (DSP) and an inference pipeline.

The inference pipeline is the main resource for number crunching. It contains a MAC (Multiply-Accumulate) array, which is a set of logic components that accelerate matrix multiplication and convolution operations. These operations are fundamental to many AI and machine learning algorithms. The MAC array supports INT8 and FP16 data types and can perform up to 2,048 MAC operations per cycle.

In addition to the MAC array, the inference pipeline includes fixed-function hardware for data conversion and array activation. Each NCE also contains two Very Long Instruction Word (VLIW) programmable DSPs that support a wide range of data types.

The NPU is designed to be up to 8 times more power-efficient at performing an AI workload than if the same task were handled by the integrated GPU or CPU cores. This efficiency is one of the reasons why Intel developed the NPU instead of simply deploying XMX accelerators on the integrated GPU coupled with GFNI and DLBoost on the Compute tile[1].

Citations:
[1] https://www.techpowerup.com/review/intel-meteor-lake-technical-deep-dive/4.html
[2] https://www.theverge.com/2023/12/14/23998215/intel-core-ultra-cpu-specs-availability

1
llamatr0n 1 point ago +1 / -0

MS is just rolling out CoPilot to Office so your data ags are garbage

2
llamatr0n 2 points ago +2 / -0

No, I don't ever remember a CPU having a BIOS backdoor. CPUs do not have a BIOS. The BIOS is part of the motherboard.

BIOS backdoors have been for recovering the machine after the admin password for the BIOS is lost. Phoenix, AMI, Award, Dell and Compaq have all been guilty of that - with simple passwords too. But these all required physical access to the machine.

The most nefarious, however, was DEITYBOUNCE from the NSA installed via Malware but only on Dell PowerEdge 1850/2850/1950/2950 RAID server series.

I suppose you are thinking about the Intel Management Engine and AMD's Platform Security Processor (PSP) but again, not part of the CPU but part of the motherboard.

1
llamatr0n 1 point ago +1 / -0

that $0.001T really hits home

1
llamatr0n 1 point ago +2 / -1

She was so raped she withdrew the case 4 DAYS BEFORE ELECTION DAY despite the threat to kill her for revealing it.

and https://www.courtlistener.com/docket/4524664/idb/doe-v-trump/

Date Filed: Sept. 30, 2016

Date Terminated: Nov. 4, 2016

NOTICE OF VOLUNTARY DISMISSAL Pursuant to Rule 41(a)(1)(A)(i) of the Federal Rules of Civil Procedure, the plaintiff(s) and or their counsel(s), hereby give notice that the above-captioned action is voluntarily dismissed, against the defendant(s) All Defendants. Document filed by Jane Doe.

1
llamatr0n 1 point ago +1 / -0

It means someone is trying to pull up the ladder and legislate / regulate chatbots so the competition has to spend spend spend on "safety" before bringing their product to the public

"we have an arch pursuader" - publishes papers to pursaude you

3
llamatr0n 3 points ago +3 / -0

while it's fun, it is mostly meaningless

you can push it in the direction you want and make it generate text that agrees with you unless it is on the specific no-no list, even more so when you have a destination in mind and drop in "oh yeah, what about THIS"

1
llamatr0n 1 point ago +1 / -0

PKVI asked me to be challenging to him and I am happy to oblige

3
llamatr0n 3 points ago +3 / -0

here's what I found out:

Bitcoin futures contracts are similar to gold futures contracts in the sense that they are both financial derivatives that allow investors to speculate on the future price of the underlying asset (Bitcoin or gold) without needing to own the asset itself[1][2][4].

However, it's important to note that futures contracts do not represent ownership in the underlying asset. Instead, they represent a contractual obligation to buy or sell the asset at a predetermined price at a specific future date. Therefore, while the issuance of futures contracts can increase the number of financial claims on the underlying asset, it does not dilute the value of the asset in the same way that issuing new shares dilutes the value of existing shares in a company[1][2][4].

In other words, while the issuance of Bitcoin or gold futures contracts can affect the market perception and price of the underlying asset, it does not directly affect the value of existing Bitcoins or gold. This is because each Bitcoin or ounce of gold remains distinct and does not confer ownership or claim on any other Bitcoin or ounce of gold, whereas shareholders in a company have a claim on the company's total assets and earnings[1][2][4].

Citations:
[1] https://www.linkedin.com/pulse/investing-gold-wealthyhood-invest
[2] https://www.bullionvault.co.uk/gold-guide/gold-futures
[3] https://www.gold.org/sites/default/files/documents/gold-investment-research/liquidity_in_the_global_gold_market.pdf
[4] https://www.kraken.com/features/futures/bitcoin-gold
[5] https://sprott.com/insights/sprott-gold-report-gold-vs-gold-stocks-an-unresolved-incongruity/

5
llamatr0n 5 points ago +5 / -0

futures contracts are considered dilution

5
llamatr0n 5 points ago +5 / -0

Of course it can.

or here, buy some bitcoin futures contracts

https://www.coinbase.com/en-gb/advanced-trade/crypto-futures

or short it another way

https://www.investopedia.com/news/short-bitcoin/

4
llamatr0n 4 points ago +4 / -0

$71,746,229,772 in crypto has been lost to hacks, scams, fraud, and other disasters since January 1, 2021.

https://web3isgoinggreat.com/charts/top

0
llamatr0n 0 points ago +2 / -2

"TIL" liar, you just wanted to repost something

1
llamatr0n 1 point ago +1 / -0

Passwords are not a shitty defense. The vast majority of password cracking is done by social engineering.

you are talking utter bollocks, the vast majority of password cracking is done via breaches

Podesta's emails were gathered by phishing

VK Data Breach: Russian social media site VK was hacked, exposing 93 million names, phone numbers, email addresses, and plain text passwords.

FriendFinder Network Breach: Attack vector Cracked password. Websites like Adult Friend Finder, Penthouse.com, Cams.com, iCams.com, and Stripshow.com were affected. Most of the passwords were protected only by the weak SHA-1 hashing algorithm, which meant that 99% of them had been cracked by the time LeakedSource.com published its analysis.

MySpace Data Breach: In June 2013, around 360 million MySpace accounts were compromised by a Russian hacker. The incident was not publicly disclosed until 2016.

LastPass Data Breach: Hackers compromised the laptop of a LastPass DevOps engineer to gain access to customer personal data, potentially impacting 30 million of LastPass’ users.

Plex Data Breach: Streaming platform Plex suffered a data breach impacting most of its users, approximately 20 million. The compromised information included usernames, email addresses, and passwords.

North Face Data Breach: Roughly 200,000 North Face accounts were compromised in a credential stuffing attack. These accounts included full names, purchase histories, billing addresses, shipping addresses, phone numbers, account holders' genders, and XPLR Pass reward records.

0
llamatr0n 0 points ago +1 / -1

passwords a quite a shitty defence

Duo.com, the 2FA scheme Instagram and GitHub uses, and you can use on your own website, does not connect your phone to your account (in the knows your number, IMEI or location sense).

But you managed to shoehorn CBDC into it again

2
llamatr0n 2 points ago +2 / -0

raw, raw, raw, raw, cooked and processed

furry, furry, furry, furry, fur on head only - shaped into a "style"

wild, wild, wild, wild, domesticated fruits / vegetables / animals

uncultured, uncultured, uncultured, uncultured, shares info through speech song and writing

4
llamatr0n 4 points ago +4 / -0

0.002 mW/m² is the EMF power density of Bluetooth

view more: ‹ Prev Next ›