It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: MykeNukem
originally posted by: Havamal
Sorry. My expertise is with larger and more complex computer systems. I always considered windows as a "toy" system for home users. Still is.
windows, at is base, is very primitive. Compare to IBM systems in th 1960s and they are just getting to a virtual machine. iBM 360 1964.
Ahem. But let the kids have fun with their toys.
You realize anyone can just run Hercules and emulate an IBM 360 OS which is Public Domain now at thosands of times the speed , right?
Can the IBM 360 emulate Windows? No, of course not.
The more I'm hearing the "experts" in this thread talk, the more I'm realizing they're not experts.
originally posted by: MykeNukem
originally posted by: Havamal
Sorry. My expertise is with larger and more complex computer systems. I always considered windows as a "toy" system for home users. Still is.
windows, at is base, is very primitive. Compare to IBM systems in th 1960s and they are just getting to a virtual machine. iBM 360 1964.
Ahem. But let the kids have fun with their toys.
You realize anyone can just run Hercules and emulate an IBM 360 OS which is Public Domain now at thosands of times the speed , right?
Can the IBM 360 emulate Windows? No, of course not.
The more I'm hearing the "experts" in this thread talk, the more I'm realizing they're not experts.
originally posted by: MykeNukem
a reply to: Gothmog
Here's a situation off the top of my head:
Could a packet sniffer be setup to retrieve TPM stack API packets and therefore the "key", which would enable you to spoof a piece of hardware and deliver a payload, taking over the complete machine?
Just a thought...
OP: thoughts on this?
originally posted by: Gothmog
originally posted by: MykeNukem
a reply to: Gothmog
Here's a situation off the top of my head:
Could a packet sniffer be setup to retrieve TPM stack API packets and therefore the "key", which would enable you to spoof a piece of hardware and deliver a payload, taking over the complete machine?
Just a thought...
OP: thoughts on this?
Both Spectre and Meltdown may have been able to .
Yet , they are both protected from by hardware and software mow . (and were acknowledged in the 80s by the way)
originally posted by: Gothmog
originally posted by: dug88
a reply to: Gothmog
How about some references for any of your claims. I posted plenty for mine. You have zero.
You are in minus territory .
You take a bunch of facts and imagination and come to a conclusion .
originally posted by: MykeNukem
originally posted by: Gothmog
originally posted by: MykeNukem
a reply to: Gothmog
Here's a situation off the top of my head:
Could a packet sniffer be setup to retrieve TPM stack API packets and therefore the "key", which would enable you to spoof a piece of hardware and deliver a payload, taking over the complete machine?
Just a thought...
OP: thoughts on this?
Both Spectre and Meltdown may have been able to .
Yet , they are both protected from by hardware and software mow . (and were acknowledged in the 80s by the way)
They were acknowledged in the 80s pertaining to what?
TPM?
ok then.
Like I said, you guys liike to flex, but when the rubber meets the road it's all ad homs.
lmao.
originally posted by: Gothmog
originally posted by: MykeNukem
originally posted by: Gothmog
originally posted by: MykeNukem
a reply to: Gothmog
Here's a situation off the top of my head:
Could a packet sniffer be setup to retrieve TPM stack API packets and therefore the "key", which would enable you to spoof a piece of hardware and deliver a payload, taking over the complete machine?
Just a thought...
OP: thoughts on this?
Both Spectre and Meltdown may have been able to .
Yet , they are both protected from by hardware and software mow . (and were acknowledged in the 80s by the way)
They were acknowledged in the 80s pertaining to what?
TPM?
ok then.
Like I said, you guys liike to flex, but when the rubber meets the road it's all ad homs.
lmao.
As being exploitable (memory side addressing)
TPM does not have anything to do with it .
Nor does it have anything to do with drivers.
I don't know about flexing .
I am trying to educate , to Deny Ignorance .
originally posted by: chr0naut
a reply to: dug88
All those old programming languages, and many old programs still work. In fact, the modern frameworks and languages still execute the same old code underneath, for the most part. It's all still there, and all still available to those who want to write programs with it.
The thing is, way back then they also used far fewer resources and had simpler interfaces. But, at some stage 640 kilobytes of RAM, with a text only interface no longer cut it. So they have been incorporating new ideas and technologies as they do, and now we have graphical functions and operating systems that you can work in by manipulating little pictures on screen.
Most of the time, the stuff is monetized. They want to get paid. It's that simple.
But even the most complex of current computational tasks can still be described in terms of a Turing machine. And some would say that things such as graphical interfaces and modular code have vastly simplified complex tasks for the majority of users.
People are writing highly graphical games with no traditional computer programming background. So, I would argue that the 'universality' of computer platforms is converging, and well and truly alive.
originally posted by: MykeNukem
originally posted by: chr0naut
a reply to: dug88
All those old programming languages, and many old programs still work. In fact, the modern frameworks and languages still execute the same old code underneath, for the most part. It's all still there, and all still available to those who want to write programs with it.
The thing is, way back then they also used far fewer resources and had simpler interfaces. But, at some stage 640 kilobytes of RAM, with a text only interface no longer cut it. So they have been incorporating new ideas and technologies as they do, and now we have graphical functions and operating systems that you can work in by manipulating little pictures on screen.
Most of the time, the stuff is monetized. They want to get paid. It's that simple.
But even the most complex of current computational tasks can still be described in terms of a Turing machine. And some would say that things such as graphical interfaces and modular code have vastly simplified complex tasks for the majority of users.
People are writing highly graphical games with no traditional computer programming background. So, I would argue that the 'universality' of computer platforms is converging, and well and truly alive.
Heh, we agree for once.
Turing and Boolean Logic rules the day.
BloatWare.
With handy API's for interconnectivity and Tx on the IOT.
It's a good thing and a bad thing. Dangit.
originally posted by: chr0naut
originally posted by: MykeNukem
originally posted by: chr0naut
a reply to: dug88
All those old programming languages, and many old programs still work. In fact, the modern frameworks and languages still execute the same old code underneath, for the most part. It's all still there, and all still available to those who want to write programs with it.
The thing is, way back then they also used far fewer resources and had simpler interfaces. But, at some stage 640 kilobytes of RAM, with a text only interface no longer cut it. So they have been incorporating new ideas and technologies as they do, and now we have graphical functions and operating systems that you can work in by manipulating little pictures on screen.
Most of the time, the stuff is monetized. They want to get paid. It's that simple.
But even the most complex of current computational tasks can still be described in terms of a Turing machine. And some would say that things such as graphical interfaces and modular code have vastly simplified complex tasks for the majority of users.
People are writing highly graphical games with no traditional computer programming background. So, I would argue that the 'universality' of computer platforms is converging, and well and truly alive.
Heh, we agree for once.
Turing and Boolean Logic rules the day.
BloatWare.
With handy API's for interconnectivity and Tx on the IOT.
It's a good thing and a bad thing. Dangit.
Bigiron is useful if you have teams of sysprogs and devops. But there is something to be said about those consumer 'toys'. Just look at all the newer tiny compute devices like tablets, phones and etc. Look at the richness of function in the dumbest of devices. There is a lot there.
Sometimes, it is the 'right tool for the job' and some disconnected and archaic mainframe (and the vast majority still are a bit archaic) is not the answer to getting a weather app on your smartphone.
With the birth of quantum computing, I imagine everyone will turn back to big-iron for a while, but hybrid and handheld are where the users will be, increasingly.
It is a commercial inevitability.