“do it again, I wasn’t looking”

  • 0 Posts
  • 11 Comments
Joined 2 years ago
cake
Cake day: September 25th, 2023

help-circle


  • You’re remembering correctly, every other logic gate can be built from NAND gates, which is the foundation of this sort of minimal-instruction-set exercise. Beyond that, you need to be able to move data and change your program counter (jump, often conditionally). Then, if you want parity with modern instruction sets beyond just being turning complete, you need return and interrupt for control flow.



  • Bookmarking your comment so I can come back to it in a couple hours, if I hopefully remember to.

    But yes, almost. I don’t think the interrupt is necessary and the return isn’t under certain architectures. I have a doc on my computer somewhere where I was investigating what the absolute minimum was to make a turning complete machine and, to my recollection, there was only 4-6 instructions that were absolutely necessary. The ones I remember off the top of my head are NAND, MOV, JUMPIF, and then I believe I included NOP in accordance with some principle. RET and INT were convenience features in this design.




  • You know what’s ironic about all this is, as someone who has seen game dev pitches (not good ones), they arguably had their shit together more than most aspiring game devs. Looking back at the skeletals, ya know they actually may have had a chance of getting somewhere. They knew absolutely nothing about the technical side, but hardly any game devs actually do. They probably still stand a better chance today of developing this than some game studios asset-mashing in Unity or Unreal. That’s the true state of game dev.


  • yeah OP needs to provide this detail specifically as it changes everything.

    If the Ethernet jack was not on a desk, then it wasn’t there for them to use. If they unplugged a cable to make it accessible, that is unfortunately enough to be considered tampering.

    If an Ethernet jack was not expressly provided, unoccupied, at the technology access station then yes the access to Ethernet information facilities was unauthorized and illegitimate and could carry legal ramifications. Say what you want about proprietary wifi drivers, you get the access you are given and any attempts to gain further access without authorization are defined as intrusion attempts and will more likely than not be treated as such to some degree. Because honestly, the libraries aren’t funded enough to have great security and Ethernet security is harder than WiFi security in practice, despite the challenges being characterized by the same principles.


  • I’m not a lawyer, but under the definition of “Infrastructure” on page 5, they state that they will construe WhatsApp Infrastructure and Partner Infrastructure accordingly, which to my untrained eye is prima facie evidence to their acknowledgement that these are separate systems, at least one (the Partner’s) of which is not under their custodianship and not named as subject of the first stipulation you quoted. In other words “do not make it so WhatsApp’s own infrastructure would run GPL material” and potentially “do not send GPL material through our systems”

    The second one I interpret to mean “nothing with licenses that apply that runtime operation is copy left”