Project Roseline
Accurate and reliable knowledge of time is fundamental to cyber-physical systems for sensing, control, performance, and energy efficient integration of computing and communications. This simple...
View ArticleTelecom is 10 years behind wall street on time synchronization
This is an interesting paper, but Telecom has not yet come to grips with the problems and advantages of fast shared commodity ethernet interconnect. North American service providers are in the process...
View ArticleA claimed validated operating system.
The claim: we have demonstrated the comprehensive formal verification of the seL4 microkernel, with a complete proof chain from precise, formal statements of high-level security and safety properties...
View ArticleHow business works in the real world: Apple and GT and Beelzebub
GT Advanced declared bankruptcy and blamed Apple for its problems. Apple called GT Advanced’s story “defamatory”. I have no idea about the specifics in this case but I do know about big companies...
View ArticlePointers draft
Despite pedants, pointers are useful and interesting and if you don’t understand them, you don’t really get what’s going on in a computer. Think of memory as a function where is the set of non-negative...
View ArticleEinstein and Peer Review
From Time. Although when I posted this on twitter, I got a good response. @vyodaiken @vassalos the problem being that we all think that we are Einstein, where in reality we are the "erroneous"...
View ArticleSpace-X patents
Anderson: So what have all your creative people come up with, then? What’s different in your basic technology versus 50 years ago? Musk: I can’t tell you much. We have essentially no patents in SpaceX....
View ArticleGilbert and Sullivan’s innovative business model
From the Financial Times: (and you should buy a subscription) Piracy is a problem as old as the music industry itself. In Victorian times, it was illicitly copied sheet music that was the avowed enemy...
View ArticleIkea and RedHat
This is state of the art for systems software now – which is not all that impressive. Glantz explained that Ikea has more than 3,500 Red Hat Enterprise Linux (RHEL) servers deployed in Sweden and...
View ArticleThe OPM break-in was super-horrific
Hackers likely stole EVERY SINGLE background investigation form completed by OPM since 2000. Every single one. — Damian Paletta (@damianpaletta) July 9, 2015
View ArticleRight to private jet ski use while collecting disability
New York authorities said the warrants led to the indictments of firefighters, police officers, and civil servants on disability fraud charges. The Facebook data, which included user photos and...
View ArticleGerman banking
Germany has a complex banking system that provides a lot of support for SME manufacturing. The main strength of German economy is the so-called ‘Mittelstand’, a dense fabric of SMEs that manage to...
View ArticleSmart and dumb clients and the “so-called” Best Master Clock Algorithm in PTP...
The Best Master Clock (BMC) algorithm is a key part and key weakness of the PTP standard. The proposed enterprise profile for PTP calls it “the so-called ‘best master clock'” algorithm because it...
View ArticlePrimitive recursion over words
From: @book{Peter:1982:RFC:539249, author = {Peter, Roezsa}, title = {Recursive Functions in Computer Theory}, year = {1982}, isbn = {0470271957}, publisher = {Halsted Press}, address = {New York,...
View ArticleWhat does the UNIX file system do?
Unix, Linux, Windows and other operating systems and the world wide web all support file systems with the familiar path file names like "/home/snowden/travel/boardingpass.pdf" or...
View ArticleThe Enterprise Profile for PTP and TimeKeeper
One of the most interesting things we saw in the proposed IEEE 1588 enterprise profile was a bold suggestion on fault tolerance that looked familiar. Here’s FSMLabs press release from September 2011...
View ArticleAnnals of unintentional irony
Come back after a trip to see Marc Andreessen’s team of twitter posters complaining wryly about how government is so gosh durn big and citing experts like Milton Friedman. A difficulty of modern...
View ArticleRISC-V and Bloat
Went to UT today to listen to David Patterson speak about the open RISC instruction set architecture and processors he and his colleagues are developing. As a software developer, hearing about free...
View ArticleMiFID2 Timestamp regulations
There are a number of places in the new guidelines that increase the rigor required for timestamping data. One key part covers SI’s (systematic internalizers) who operate kind-of like private...
View Article