Maybe have a look at this video from 1987. After sidelining Steve, John Sculley came up with the term PDA and intended to evolve that vision as the mission of Apple, beginning with the breakthrough Apple Newton that ran on DEC's revolutionary StrongARM chip (that was based on ARM's IP that Apple co-developed).
https://youtu.be/umJsITGzXd0 (I cannot find any of the old ATG videos featuring Agent Pierre online which was the same concept only shorter, less boring and funny.)
PS: One of the first things Steve did upon returning to Apple after a decade was to reciprocate by KILLLING OFF Sculley's baby (Apple Newton). As far as its replacement (iPad) that reportedly was developed (but not released) before iPhone, it really has always been a dumpster fire software wise (but the same can't really be said of the iPhone variant, which was brilliant for a phone form factor, at least for a while there), not because Apple didn't have capability to do a tablet right, but because of Apple's INTERNAL POLITICS (like https://youtu.be/J7al_Gpolb8?t=2286]) FWIW, I sense now that Apple is finally about to unify macOS and i{Pad}OS for its upcoming generation of devices and shift to multi-modal UX, getting us back to Sculley's original PDA vision.
Counterpoint the iPad has been brilliant with it’s software and implementation and that is the reason it essentially has the tablet market to itself, is the only tablet with a third-party ecosystem, and it continues to grow.
The original PDA wasn’t a mniaturized laptop or desktop, it was a new device category and the iPhone is the current flagship for that, not the iPad.
..was totally expecting this article to be written in Chinese, because it is an active attack vector being used to infiltrate western IT infrastructure by pre-loading spyware into the boot loaders, then clicked the article and the link opened to Cyrillic characters. Of course, APT29 is doing this too, but their agents aren't thought to be in the supply chain, so they have to infect the products after installation (using traditional hacking techniques). Look at how Intel ME and AMD PSP work and presume that something similar is in the latest Allwinner, Rockchip, Alibaba, and Nuclei, etc.. chips. To the Chinese, this seems fair because "the other Party" is doing it. Not arguing that it isn't, just that most customers have their head in the sand denying it is happening (even using them in IPKVMs!)
There was also a Western paper on embedding hidden circuits (and thus functionality/ISAs) into CPUs and activating them in the field (after deployment) by executing a sequence of opcodes resulting in something akin to blowing a fuse on the processor die, thereby making the circuits invisible (to even a microscope) until activated. Those secret opcodes could then disable the chip or jump into a block of secret microcode and alter the program counter to behave in a non-standard manner so we might not easily be able to see what's happening, even if we knew to look. One still would have to deliver that secret sequence of opcodes to trigger such a stealth mode...that could be done via microcode/firmware updates from the manufacturer's website or an OS update, or similar techniques. Interestingly, an unexpected iteration of Chinese SoCs began flooding the markets just as the rest of the World was sustaining a "chip shortage" in a timeframe perfectly aligned with what would have been required to implement such a system after that paper was published.
Air-gapping the customer's devices during installation (to prevent the activation opcode sequence) might not work either. Many Chinese SoCs are used as embedded peripherals simply to add WiFi, Bluetooth and Thread capabilities onto existing designs via a simple UART or doorbell interconnect. This makes it too easy for these Chinese SoCs to also be listening for a Morse-code-like activation signal on a low-frequency band, triggering the backdoor to open (enabling a more conventional remote code execution port or logic debugger exposed via WiFi or BLE for example, or causing malfunction or damage to what's on the GPIO or UART pins). Such low-frequencies could be disguised (think Blue Whale signals) so they might be sent slowly over great distances (or even from floating weather balloons or low earth orbit) without drawing too much suspicion. https://youtu.be/E-gbYjLd93g
Almost positive 'ol Bessent has by now warned Trump that there is an issue with the AI queens breaking 1930s securities reform laws. Last week's stock market and crypto moves have all but sealed the fate of the Bozo No Bozos. They will take down the people involved with the funky purchase orders quietly, except inside of the closed door meetings where they get handled. https://youtu.be/y_z9W_N5Drg
Only theoretically at this point, though they will tend to speak confidently enough about such untested capabilities so as to cause millions in investment losses to others. One would think a hardware manufacturer that's teetering on the abyss would go full out and implement a vLLM interface (maybe a folder of local models that can be downloaded as components in the Xcode-way and also a router too), but their NIH mentality has them tripping over their own Graydey's. There is nothing special about Apple Silicon except the head start they had and that they're squandering.
Nope, it's 100% about building the stock valuation of SpaceX for an IPO in the face of significant risk from a cold war its CEO started on X with the U.S. federal government and increasing competition from Blue Origin, Quinfan and Guowang. DOD will play Bedrock vs Grok until there is feature parity and then make a decision not based on the features.
Disclaimer: Not an Elon hater, but far from a sycophant, similar to how I felt about Steve Jobs for 40+ years.
Exactly, this is about attaching the AI hype bubble to all of his dealings before he offloads with an IPO (that still leaves him with 75% of the stock).
I mean, some people show up to the blow out party three years after it ended, sure. That they're still talking about it 33 years later gives you an indication of what the main event must have been like https://youtu.be/_QST1ZAJ29o
It isn’t a duplicate- that’s a Flagged article on a political website. I posted a mainstream media article that extracts the salient points and was broadcast to over a billion people around the world.
Can’t even imagine what kind of social media influence that DOGE sycophants have on The Hacker News. Makes it tough to post a mainstream account of USDOJ confirming DOGE workers probably have stolen copies of SSA data thru unknown CloudFlare (tunnels) and a recent interview where the founder of DOGE muses about prison.
The SSA database itself is just too valuable ..if what USDOJ says is True, then it is almost a certainty that the data is already vectorized allowing it to be used for a lot more than “voter roll” verification.
Hacker News may have emboldened many to cross the line .. Here they hang on to those that they aspire to be until one day https://youtu.be/wWpvNTIrQdI
https://youtu.be/umJsITGzXd0 (I cannot find any of the old ATG videos featuring Agent Pierre online which was the same concept only shorter, less boring and funny.)
PS: One of the first things Steve did upon returning to Apple after a decade was to reciprocate by KILLLING OFF Sculley's baby (Apple Newton). As far as its replacement (iPad) that reportedly was developed (but not released) before iPhone, it really has always been a dumpster fire software wise (but the same can't really be said of the iPhone variant, which was brilliant for a phone form factor, at least for a while there), not because Apple didn't have capability to do a tablet right, but because of Apple's INTERNAL POLITICS (like https://youtu.be/J7al_Gpolb8?t=2286]) FWIW, I sense now that Apple is finally about to unify macOS and i{Pad}OS for its upcoming generation of devices and shift to multi-modal UX, getting us back to Sculley's original PDA vision.
reply