Hacker News new | past | comments | ask | show | jobs | submit | etskinner's comments login

There's a little bit of feedback: Each belt has a rotary encoder to track position, and the motors apply positive torque rather than positive position. This is in contrast to how stepper motors work on a 3d printer, for example.


Yes, they support either setup, vertical or horizontal


Why tune anyway? Isn't the job of speakers and earphones to reliably reproduce the sound that the person who produced the track wanted? The only tuning that should be done by default is to compensate for the form factor or the room, such that what the listener hears is exactly what the producer heard when making the track. Of course, give the user an equalizer with some presets they might want, but leave it up to the end user, not what the manufacturer thinks the user wants.


If you want to have different preferences, bookmarks, extensions etc. set for different profiles.

For example, I might want to allow 3rd party cookies on a work profile but not on a personal profile.


You only need a ham license for transmitting, not for working on radios or listening


From https://en.wikipedia.org/wiki/Ionizing_radiation :

>Exposure to ionizing radiation causes cell damage to living tissue and organ damage.

>Gamma rays, X-rays, and the higher energy ultraviolet part of the electromagnetic spectrum are ionizing radiation, whereas the lower energy ultraviolet, visible light, nearly all types of laser light, infrared, microwaves, and radio waves are non-ionizing radiation

In other words, the UV causes cancer because it's in the ionizing range of the spectrum. Radio waves don't because they're not.


Aren't UVA and UVB the low energy / non-ionizing parts of the UV spectrum?


You're right! But also, it's effectively the same as ionizing:

"UV-A and UV-B are technically non-ionizing, but all UV wavelengths can cause photochemical reactions that to some extent mimic ionization. For example, ultraviolet light, even in the non-ionizing range, can produce free radicals that induce cellular damage and can cause skin cancer."

https://radiation.ncdhhs.gov/NonIonizing/UVRad.htm#:~:text=U....


I'm not convinced, both android and iPhone have a feature that shows you when it's recording microphone or camera [1] [2]. Moreover, those things require app creators to request microphone and camera access.

If this happens, it's likely limited to when those indicators are lit. App creators need to get that permission from the OS and they can't override the light.

[1] https://support.google.com/android/answer/13532937?hl=en#:~:....

[2] https://www.asurion.com/connect/tech-tips/how-to-tell-what-a...


> There are things we can do now—things we need to do now, like video conferencing and real-time collaboration—that couldn’t be done with traditional desktop software.

This is not at all true. You could have desktop software with networking that could do things like real-time collaboration. In fact, that's exactly what happens now in Office; I can collaborate with others on a Word doc right in the desktop app. It's just not how it happened since we decided to focus on webapps instead


Bcachefs has this too


Really impressive that they got thru an entire develop, build, approval, and documentation process in just about 2 days. Not that any of those steps are extremely hard for this fix, but I'm always impressed when big corporations can move so fast


I sympathize with the engineers, QA, and everyone involved in getting this out.

I have to imagine it was a lot of long hours, and the testing was insane. The last thing I want to do is put this tool out and it somehow messes things up more.

But glad it’s out. Hopefully it helps with the remaining machines and with any that are being problematic.


They probably got an exemption to fast track the release because this is a critical issue. I wouldn't expect testing to be so thorough for a release in 2 days. The exemption is more likely.


I wrote and maintained a tool that was sent to users when something went wrong.

Man was I always afraid and stressed that the tool meant to help users when they were already having a failure was also having a failure.


Surveillance software is top priority of BigCo's nowadays. If they prove to be useful for governments they'll get softer antimonopoly measures.


To be fair, there isn't a whole lot of code there. I wouldn't be surprised if Microsoft had the WinPE generator written already for some other project.


Yeah, WinPE media tools have been around for years. Here is an article from 2021 (although it has been a thing long before then):

https://learn.microsoft.com/en-us/windows-hardware/manufactu...

Still, customizing the toolchain to fit this particular scenario and making sure it works, in two days, is commendable effort.


Actually they may not have a choice, since they have forced people to install their local windows with a Microsoft login, and tying bitlocker to this login, there is probably many situations out there that requires microsoft login supported winPE just to fix this


When their bottom line and head is at stake, what were they supposed to do?


They could say "third party kernel modules are installed at your own risk" and provide the usual level of business hours support. CrowdStrike fucked up and Microsoft is helping its customers recover from CrowdStrike's fuckup.


They made a special memory allocator for Windows 95 to avoid a crash caused by a bug in SimCity https://www.joelonsoftware.com/2000/05/24/strategy-letter-ii...

They are not only backward compatible or bug compatible. They are others-person-bug compatible. It's the only way to prevent users thinking about switching to another OS.


Reminds me of this famous post from Linus about being "bug-compatible".

https://lkml.org/lkml/2012/12/23/75


One thing I’ve never understood about “kernel never breaks user space”.. doesn’t that completely atrophy the kernel, preventing it from ever having big rewrites or architectural changes? What if an initial implantation was terrible, and there are 100x performance improvements to be had by doing a breaking change?


Implement a new API for the better route, isolate the terrible code as much as possible, notify the users, deprecate it, and remove it or move it to a userspace shim after enough years had past and almost everyone was off it?


That must be a pretty well-worn path by now.


If anything, then events like this makes decision makers rethink if they really should run Windows everywhere. Why does a flight schedule display has to run Windows, for example? It might not be their fuckup, but they will lose users too, for sure.


Same thing already happened on Linux, but it failed to make a big enough splash to make any headlines. Putting Windows at fault here is unfair.

https://www.newsbytesapp.com/news/science/before-affecting-w...


They recommend crowdstrike to customers. Now they are trying to at least skim some good will. Also bad a kernel module that can ruin the OS is partially their fault.


Microsoft competes directly CrowdStrike with Defender across multiple areas - I'm not sure they recommend them to customer over their own products at the cost of losing sales.

I don't think Microsoft is realistically in a position to forbid other companies from writing kernel level modules, from an antitrust standpoint I would think that would land them under investigation(s)


I also think Microsoft should be responsible, they gave the keys to sign the kernel driver so I expect that driver to at least be subject to regular testing and scrutiny not just when initial release was made.


They didn't "give the keys", they have a signing infrastructure that is meant to be used for validating organizational identity and origins of code. They have a quality checking system, but it's only required for certain levels of Microsoft backing. I think it used to be called the Windows Logo Program or something?


Signing is meant only to verify the identity of the organization producing the signed artifact.

It’s not meant to signify that it’s bug-free.


WHQL signifies it is tested and that driver is WHQL certified.


The issue was caused by a data file, Microsoft is not involved in signing or testing individual data files.


The actual issue was with the signed code reading the data files that the data file update just brought to surface.

But I don't think Microsoft verifies customer code, they might not even have access to it.


You are right Microsoft are not checking the 3rd party code itself they are only running a lot of tests on the compiled code.

There is a recent video now from a former Microsoft employee where he explains that those drivers that get WHQL certification are ran on test machines in stress conditions for some time, or at least that is how it used to be when he worked there.

Since that process is probably quite slow to be able to push update within a couple hours Crowdstrike just bypassed the QA testing by injecting their own data files into the driver.


I guess Microsoft testing lacks fuzzing, then—as does Crowdstrike's.


Microsoft does not “recommend CrowdStrike”. Microsoft actually sells its own competitor to CrowdStrike (Defender XDR).


That the OS needs a product like Crowdstrike in order to be safely used is also their fault.


> an entire develop, build, approval, and documentation process in just about 2 days

...on a weekend.


They are not claiming they built it themselves. This kind of tool could easily be an offshore job.


Probably not doing that with this incident. But FBI/NSA is probably involved.


> develop, build, approval, and documentation process

Under the immense pressures, I'm sure one or two of the usual steps were missed or reduced (perhaps this is what you were insinuating?)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: