Hacker Newsnew | past | comments | ask | show | jobs | submit | BobbyTables2's commentslogin

Reminds me of the part in National Lampoon’s Vegas Vacation when Clark Griswold goes to the 3rd rate casino and starts betting on weird things.

An emulated x86 atomic instruction wouldn’t need to use atomic instructions on ARM.

Why not?

They don’t have to match.

As an example, what about a divide instruction. A machine without an FPU can emulate a machine that has one. It will legitimately have to run hundreds/thousands of instructions to emulate a single divide instruction, it will certainly take longer.

Thats OK, just means the emulation is slower doing that than something like add that the host has a native instruction for. In ‘emulator time’ you still only ran one instruction. That world is still consistent.


? That's not how Windows on ARM emulation works. It uses dynamic JIT translation from x86 to ARM. When the compiler sees, e.g., lock add [mem], reg presumably it'll emit a ldadd, but that will have different semantics if the operand is misaligned.

You mean the locking would be done in software?

It’s funny that even cloud hosting and such didn’t drive more responsible resource usage.

We could easily have 10x-100x more utilization of cloud servers if the software was leaner.

Imagine a single server hosting 10000 VDI instances concurrently with high performance. Sounds insane but Windows, Word, Excel were usable on a 16MHz 386 with 2MB RAM and 20-40MB storage.

Systems today are literally 10000X as powerful (without even getting into the CPU architecture and cache improvements).


If you’re using Fedora or Ubuntu, there may be some bumps.

Use Debian or AlmaLinux and the ride is smoother.


The beauty of it all is one doesn’t even have to invent a solution… they only have to invent a “problem” to be pitched for VC funding.

Only semi-conscientious companies will even KNOW they were compromised.

Suspect the rest are either not even looking and/or the attackers removed all their traces before anyone could possibly see.

When was the last time YOU inspected the authorization logs in systemd or the event log in Windows on your personal computer…

In Windows Defender we trust…


Isn’t there a recycle bin?

Apple has something similar. One has to delete out of the hidden deleted items area — unless they want to wait a full month!


Does this mean a Windows PC associated with a Microsoft account will scan images accessible on mapped file shares?

In that case, our test infrastructure belongs in the Louvre…

10 years for the buyer or the manufacturer?

So it’s back to as before in 10 years?


The second to last sentence I copied over talks about after 10yrs, basically saying they have to provide the knowhow to 3rd party tool makers and repair technicians, and that this settlement makes that more certain. (as I read it)

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: