Article note: Oh look, Broadcom, having just received regulatory approval to do so, has decided to squeeze their inherited VMWare customers hard enough that they'll hopefully fund open-source virtualization tooling so they can't get locked in again.
Article note: Huh. Apple who are even more locked in and locked down got away with theirs, but Google's visible collaboration with suppliers lost.
Three years after Fortnite-maker Epic Games sued Apple and Google for allegedly running illegal app store monopolies, Epic has a win. The jury in Epic v. Google has just delivered its verdict — and it found that Google turned its Google Play app store and Google Play Billing service into an illegal monopoly.
After just a few hours of deliberation, the jury unanimously answered yes to every question put before them — that Google has monopoly power in the Android app distribution markets and in-app billing services markets, that Google did anticompetitive things in those markets, and that Epic was injured by that behavior. They decided Google has an illegal tie between its Google Play app store and its Google Play Billing payment services,...
Article note: ... I ignored the first version of this story I saw because I assumed CAMM was about frequently talked about but rarely delivering "Content Addressable Memory" not "Compression Attached Memory." Overloaded acronym.
I see why vendors would like it now that I see a picture; it's thinner than SODIMM sockets and is a full-replacement-only upgrade.
Widespread adoption would at least be an improvement to soldered-in RAM.
Move over, SO-DIMM. A new type of memory module has been made official, and backers like Dell are hoping that it eventually replaces SO-DIMM (small outline dual in-line memory module) entirely.
This month, JEDEC, a semiconductor engineering trade organization, announced that it had published the JESD318: Compression Attached Memory Module (CAMM2) standard, as spotted by Tom's Hardware.
CAMM2 was originally introduced as CAMM via Dell, which has been pushing for standardization since it announced the technology at CES 2022. Dell released the only laptops with CAMM in 2022, the Dell Precision 7670 and 7770 workstations.
Article note: The thing I like about cowgol and a bunch of the related projects is they're headed toward self-hosting environments.
Simple self-hosting computers are - intellectually speaking - important for learning to reason about systems, and almost an extinct species except for actually historical systems.
Cowgol on Z80 running CP/M ties together everything needed to provide a Cowgol development environment (including C and assembler) on a Z80 running the CP/M operating system, making it easier to get up and running with a language aimed to be small, bootstrapped, and modern.
The Zilog Z80 was an 8-bit microprocessor common in embedded systems of the 1970s and 1980s, and CP/M was a contemporary mass-market operating system. As for Cowgol? It’s an Ada-inspired compiler toolchain and programming language aimed at very small systems, such as the Z80.
What’s different about Cowgol is that it is intended to be self-hosted on these small systems; Cowgol is written in itself, and is able to compile itself. Once one has compiled the compiler for a particular target architecture (for example, the Z80) one could then use that compiler on the target system to compile and run programs for itself.
Thankfully, there’s no need to start from scratch. The Cowgol on Z80 running CP/M repository (see the first link of this post) contains the pre-compiled binaries and guidance on using them.
Cowgol is still under development, but it works. It is a modern language well-suited to (very) small systems, and thanks to this project, getting it up and running on a Z80 running CP/M is about as easy as such things can get.
Article note: That is a supremely weird artifact. It was a set of libraries that ran on Windows 3.1 (or later 95) and used winmem32.dll to touch real memory, which provided (most of) the interfaces to run 386 a.out BSD binaries and a unix userland. From right in the 386BSD/BSDi Lawsuit 4.3BSD era, sort of before Linux and after Coherent or Xenix as low-cost x86 unix options.
It’s 1995 and I’ve been nearly two years in the professional workspace. OS/2 is the dominant workstation product, Netware servers rule the world, and the year of the Linux desktop is going to happen any moment now. If you weren’t running OS/2, you were probably running Windows 3.1, only very few people were using that Linux thing. What would have been the prefect OS at the time would have been NT with a competent POSIX subsystem, but since we were denied that, enter Hiroshi Oota with BSD on Windows.
Article note: They're getting close to understanding the stack well enough to run the ESP32 radios blob-less with all open source code. Not quite there, but it's really exciting progress, the blob has always been a little concerning on an otherwise nice and open platform.
Article note: Oh dang, I've tried it but thought RDT was diminishing-returns hipster voodoo. Apparently the science proves out, and the lesser static even measurably helps extraction.
Scientific inspiration can strike at any time. For Christopher Hendon, a computational materials chemist at the University of Oregon, inspiration struck at a local coffee bar where his lab holds regular coffee hours for the Eugene campus community—a fitting venue since Hendon's research specialties include investigating the scientific principles behind really good coffee. The regulars included two volcanologists, Josef Dufek and Joshua Méndez Harper, who noted striking similarities between the science of coffee and plumes of volcanic ash, magma, and water. Thus, an unusual collaboration was born.
“It’s sort of like the start of a joke—a volcanologist and a coffee expert walk into a bar and then come out with a paper,” said Méndez Harper, a volcanologist at Portland State University. “But I think there are a lot more opportunities for this sort of collaboration, and there’s a lot more to know about how coffee breaks, how it flows as particles, and how it interacts with water. These investigations may help resolve parallel issues in geophysics—whether it’s landslides, volcanic eruptions, or how water percolates through soil.”
The result is a new paper published in the journal Matter demonstrating how adding a single squirt of water to coffee beans before grinding can significantly reduce the static electric charge on the resulting grounds. This, in turn, reduces clumping during brewing, yielding less waste and the strong, consistent flow needed to produce a tasty cup of espresso. Good baristas already employ the water trick; it's known as the Ross droplet technique, per Hendon. But this is the first time scientists have rigorously tested that well-known hack and measured the actual charge on different types of coffee.
Article note: ...Some high schooler reverse engineered the iMessage protocol suite and these folks are making an interoperable product out of it.
It should be legally protected (reverse engineering for compatibility), but no doubt Apple is going to fuck with them.
Honestly, there are protocols worse than iMessage, it'd be nice if it was an open standard, getting back to widely-used chat platforms that are interoperable instead of vendor lock-in jails is really the social value.
In the past week, I have sent an iMessage to one friend from a command-line Python app and to another from a Pixel 3 Android phone.
Sending an iMessage without an Apple device isn't entirely new, but this way of doing it is. I didn't hand over my Apple credentials or log in with my Apple ID on a Mac server on some far-away rack. I put my primary SIM card in the Pixel, I installed Beeper Mini, and it sent a text message to register my number with Apple. I never gave Beeper Mini my Apple ID.
From then on, my iPhone-toting friends who sent messages to my Pixel 3 saw them as other-iPhone blue, not noticeably distracting green. We could all access the typing, delivered/read receipts, emoji reactions, and most other iPhone-to-iPhone message features. Even if I had no active Apple devices, it seems, I could have chosen to meet Apple users where they were and gain end-to-end encryption by doing so.