Hacker Newsnew | past | comments | ask | show | jobs | submit | snazz's commentslogin

In his talk a few days ago, one of the main Asahi developers (Sven) shared that there is someone working on M3 support. There are screenshots of an M3 machine running Linux and playing DOOM at around 31:34 here: https://media.ccc.de/v/39c3-asahi-linux-porting-linux-to-app...

Sounds like the GPU architecture changed significantly with M3. With M4 and M5, the technique for efficiently reverse-engineering drivers using a hypervisor no longer works.


> In his talk a few days ago, one of the main Asahi developers (Sven) shared that there is someone working on M3 support.

Thanks, I guess I stand corrected.

> There are screenshots of an M3 machine running Linux and playing DOOM at around 31:34 here

That is encouraging! Still, there is no way for a normal to user to try to install it, unless something changed very recently.


If you “fling” the page, lift your fingers off, and then tap with two fingers, does the page come to a stop?

Just tested - it does indeed.

Defendants trying to exclude ALPR evidence often invoke Carpenter v. U.S. (or U.S. v. Jones, but that’s questionable because the majority decision is based on the trespass interpretation of the 4th Amendment rather than the Katz test). Judges have not generally agreed with defendants that ALPR (either the license plate capture itself or the database lookup) resembles the CSLI in Carpenter or the GPS tracker in Jones. A high enough density of Flock cameras may make the Carpenter-like arguments more compelling, though.


Yeah, I don't think capturing your license plate at a light falls afoul of Carpenter, but aggregating timestamped records of your license plate all over town to build a complete picture of your movements probably does.


It’s somewhat more complex than “NTFS is slow”. Here’s a good explanation: https://github.com/Microsoft/WSL/issues/873#issuecomment-425...

I’ve benchmarked deleting files (around ~65,000 small node_modules sort of files) and it takes 40 seconds through Explorer, 20 seconds with rd, and roughly a second inside WSL2 (cloned to the VM’s ext4 virtual hard drive).


What sorts of projects are you working on that use Itanium?


None, really. I just happened to get a copy of the manual and start idly reading it when my computer got stuck in a very long update-reboot cycle and I couldn't do anything other than read a physical book.


If you're interviewing for job at a company you're not familiar with, what are some good heuristics (and/or questions to ask) to politely get a sense of whether it's run by buzzword bingo enthusiasts?


If its tech and they want a 30-45 minute interview with live coding on something like hackerrank - especially if whatever brain teaser they've chosen has absolutely nothing to do with the field they operate in - I'd put the chances around 80%.


Easy. Is the interview process a dehumanizing process, or is it not a process at all and you are treated as a potential friend and colleague? Are they trying to sell you on the team and project or are they merely hazing their applicants? That will tell you more than any heuristic about the culture of working at this company.


If you ask how they handle hard problems they'll tell you about AI solving it soon


What product from 2006 did it come with? My understanding was that the Secure Enclave came out with the iPhone 5s in 2013 (still before 2014, so your point stands, I’m just curious).


Apple's own docs indicate the iPhone 5s was the first device with it as well: https://support.apple.com/guide/security/sec59b0b31ff/web


It’s similarly problematic but on a somewhat smaller scale and with fewer levels of nested dependencies.


I’m not sure this would be smaller scale? At least probably too early to tell?


I just mean fewer total packages and fewer maintainers. Linux libraries and packages don’t have the culture of making a package out of a single small function and importing it everywhere, which is part of the reason why NPM is a good case study in opportunities for supply chain attacks.


Yes but the distribution likely depends on it, making it wider spread even without the middleman dependencies.


For Apple specifically it's called "Sherlocking".


That one is a little different. That's when Apple clones your app into their OS as a core feature, thereby completely killing your market.

It usually implies Apple deliberately studied your specific app or replicated it based on details revealed in B2B licensing/acquisition meetings, similar to what MS pulled with Stacker back in the 90s.

https://thehustle.co/sherlocking-explained

https://en.wikipedia.org/wiki/Stac_Electronics


Don't even have to go back to the 90s, just recently Microsoft pulled that with AppGet.


Sherlocking is also considered a good thing nowadays. It acts to expand the market by bringing about awareness of such a feature.


Yeah the built-in way is not as good and featureful as dedicated app's but now more people are aware it's a thing and get the app.

Like sleep cycle app is only rising in popularity even though ios has bedtime now.


The option is still in Safari's View menu too, perhaps surprisingly!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: