[-] JRepin@lemmy.ml 4 points 21 hours ago

Nope not yet, we can still fight it. We can help others figtht it like the Linux and other people in libre/free and opensource communities are. And the best way to fight it is to boycott using any platform or product that requires it and use good alternatives that resist it.

[-] JRepin@lemmy.ml 2 points 2 days ago* (last edited 2 days ago)

As far as I found out about this until now is that the X100 (normal cores) and A100 (AI core) are almost the same RISC-V cores, mainly only different in th RVV vector registers length spec VLEN (256 vs. 1024). The RISC-V Unprivileged specification in chapter 31.1.2. Implementation-defined Constant Parameters says this about cores with different VLENs:

The vector extension supports writing binary code that under certain constraints will execute portably on harts with different values for the VLEN parameter, provided the harts support the required element types and instructions.

NOTE: Code can be written that will expose differences in implementation parameters.

NOTE: In general, thread contexts with active vector state cannot be migrated during execution between harts that have any difference in VLEN or ELEN parameters.

So regarding this there may not be so much of a problem.

Another probably bigger problem is that the A100 cores are not really RVA23 compliant, since they do not support Hypervisor Extension: RVH 1.0 which is required by RVA23 and is only supported on normal X100 cores. But then again usual user-level code does not use the H extension instructions. So maybe even this might not be such a problem for most user-space code.

Anyways as things currently stand : the code only gets executed automaticaly and scheduled onto 8 X100 cores, A100 cores are ignored, even if it could also run on A100. If you are sure the code can run on A100, you must manualy move/execute them on A100 (and again they are confined to only the A100 cores).

Probably the Linux kernel and scheduling needs to get some upgraded logic to make it able to freeely move code among X100 and A100 in the future. And again it depends on how VLEN is treated, is it fixed in the code or can it dynamically acommodate depending on the core it is currently on.

Oh and A100 cores have support for vendor-specific SpacemiT IME (Integrated Matrix Extension) , which is based on some proposals for future RISC-V extension, but yeah nothing official yet. And looks like these are not supported on X100.

As for SIMD. RISC-V does not have anything official yet, since the normal and more general V vector extension should be used in most (if not all common) cases to replace the SIMD instructions. There are some good cases for SIMD way of ding things but yeah RISC-V has nothing official yet, they are working on a P Packed-SIMD extension that may be available sometime in the future. As far as I could see neither X100 nor A100 support any of these P instructions.

6
submitted 2 days ago by JRepin@lemmy.ml to c/riscv@lemmy.ml

One of the RISC-V SoCs we have been most looking forward to this year is the SpacemiT K3 that features the X100 RISC-V cores that are RVA23 compliant and among the first readily available RVA23 RISC-V platform for running on the likes of Ubuntu 26.04 LTS. In this article is a preview of some very early benchmarks of the SpacemiT K3 with the new Pico-ITX single board computer offering.

The SpacemiT K3 features eight X100 RISC-V cores as well as eight ultra-wide parallel AI computing A100 cores. The X100 cores clock up to 2.4GHz and are RVA23 profile compliant and largely associated as delivering similar performance to the Arm Cortex-A76 cores. The A100 AI cores support INT4 / INT8 / FP8 / FP16 / BF16 and rated for around 60 TOPS API performance. The A100 cores are also among the few RISC-V cores so far available that support RVV 1.0 vector processing.

The SpacemiT K3 Pico-ITX is an interesting little board that pairs the K3 SoC with 10Gb networking, UFS storage, dual M.2 expansion slots, USB Type-C with power delivery and 4K DisplayPort output, and dual channel LPDDR5-6400 memory with 16GB and 32GB configurations offered.

[-] JRepin@lemmy.ml 1 points 4 days ago

There is a UEFI Requirements section in the RISC-V Boot and Runtime Services Specification (BRS) specification. But this is optional and as far as I know most SBCs don't use it. So yeah because of poor mainline Linux kernel and other components (like SBI) upstreaming by RISC-V systemproviders it is still a sad case that often you need a system specific image. So yeah I think we will need to wait until RISC-V breaks more into PC-like and server space before BRS and similar specs get used more.

[-] JRepin@lemmy.ml 1 points 4 days ago

There is a UEFI Requirements section in the RISC-V Boot and Runtime Services Specification (BRS) specification. But this is optional and as far as I know most SBCs don't use it. So yeah because of poor mainline Linux kernel and other components (like SBI) upstreaming by RISC-V systemproviders it is still a sad case that often you need a system specific image. So yeah I think we will need to wait until RISC-V breaks more into PC-like and server space before BRS and similar specs get used more.

8
submitted 4 days ago by JRepin@lemmy.ml to c/android@lemmy.ml

cross-posted from: https://lemmy.ml/post/47499847

BayLibre is proud to announce a successful collaboration with SpacemiT to enable initial functionalities of Android 16 on the SpacemiT K1 (RISC-V RVA22 + RVV 1.0) System-on-Chip (SOC). This achievement marks a significant step toward validating and accelerating Android enablement on high-end RISC-V platforms.

The main objective of this project was to validate the feasibility of porting modern Android to recent, high-performance RISC-V platforms. Furthermore, this work serves as crucial preparation for Android enablement on upcoming RISC-V profile RVA23 SOCs, as much of the effort and code will be directly reusable.

11
submitted 4 days ago by JRepin@lemmy.ml to c/riscv@lemmy.ml

BayLibre is proud to announce a successful collaboration with SpacemiT to enable initial functionalities of Android 16 on the SpacemiT K1 (RISC-V RVA22 + RVV 1.0) System-on-Chip (SOC). This achievement marks a significant step toward validating and accelerating Android enablement on high-end RISC-V platforms.

The main objective of this project was to validate the feasibility of porting modern Android to recent, high-performance RISC-V platforms. Furthermore, this work serves as crucial preparation for Android enablement on upcoming RISC-V profile RVA23 SOCs, as much of the effort and code will be directly reusable.

9
submitted 1 week ago by JRepin@lemmy.ml to c/europe@lemmy.ml

cross-posted from: https://lemmy.ml/post/47263342

The investment will be used to strengthen the structural reliability and security of KDE's core infrastructure, including Plasma, KDE Linux, and the frameworks underlying its communication services.

29
submitted 1 week ago by JRepin@lemmy.ml to c/technology@lemmy.ml

cross-posted from: https://lemmy.ml/post/47263342

The investment will be used to strengthen the structural reliability and security of KDE's core infrastructure, including Plasma, KDE Linux, and the frameworks underlying its communication services.

21
submitted 1 week ago by JRepin@lemmy.ml to c/kde@lemmy.ml

cross-posted from: https://lemmy.ml/post/47263342

The investment will be used to strengthen the structural reliability and security of KDE's core infrastructure, including Plasma, KDE Linux, and the frameworks underlying its communication services.

74
submitted 1 week ago by JRepin@lemmy.ml to c/opensource@lemmy.ml

cross-posted from: https://lemmy.ml/post/47263342

The investment will be used to strengthen the structural reliability and security of KDE's core infrastructure, including Plasma, KDE Linux, and the frameworks underlying its communication services.

371
submitted 1 week ago by JRepin@lemmy.ml to c/linux@lemmy.ml

The investment will be used to strengthen the structural reliability and security of KDE's core infrastructure, including Plasma, KDE Linux, and the frameworks underlying its communication services.

5

cross-posted from: https://lemmy.ml/post/47263094

Current approaches to addressing deceptive design largely focus on visible interface manipulations, commonly referred to as "dark patterns". With the rise of generative AI, deception is becoming more difficult to spot and easier to live with, as it is quietly embedded in default settings, automated suggestions, and conversational interactions rather than discrete interface elements. These subtle, normalised forms of influence, which Simone Natale frames as "banal deception", shape everyday digital use and blur the line between AI-enabled assistance and manipulation.

This position paper explores banality as a lens through which to reason through deception in generative AI experiences, especially with chatbots. We explore what Natale describes as users' own involvement in their deception, and argue that this perspective could lead to future work for introducing friction to safeguard users from deception in generative AI interactions, such as empowering users through raising awareness, providing them with intervention tools, and regulatory or enforcement improvements. We present these concepts as points for discussion for the deceptive design scholarly community.

Full paper: PDF | HTML | TeX source

9
submitted 1 week ago by JRepin@lemmy.ml to c/technology@lemmy.ml

Current approaches to addressing deceptive design largely focus on visible interface manipulations, commonly referred to as "dark patterns". With the rise of generative AI, deception is becoming more difficult to spot and easier to live with, as it is quietly embedded in default settings, automated suggestions, and conversational interactions rather than discrete interface elements. These subtle, normalised forms of influence, which Simone Natale frames as "banal deception", shape everyday digital use and blur the line between AI-enabled assistance and manipulation.

This position paper explores banality as a lens through which to reason through deception in generative AI experiences, especially with chatbots. We explore what Natale describes as users' own involvement in their deception, and argue that this perspective could lead to future work for introducing friction to safeguard users from deception in generative AI interactions, such as empowering users through raising awareness, providing them with intervention tools, and regulatory or enforcement improvements. We present these concepts as points for discussion for the deceptive design scholarly community.

Full paper: PDF | HTML | TeX source

7
submitted 1 week ago by JRepin@lemmy.ml to c/europa@lemmy.world

cross-posted from: https://piefed.world/c/europe/p/1102854/european-union-surveillance-technology-sold-to-rights-violators

cross-posted from: https://piefed.world/c/tech/p/1102847/european-union-surveillance-technology-sold-to-rights-violators

Languages

54-Page Report “Looking the Other Way: EU Failure to Prevent Surveillance Exports to Rights Violators": HTML/OnlinePDF.

  • EU member states host many companies that produce dangerous surveillance technology that can be used to violate rights, the export of which necessitates robust controls.
  • The implementation and oversight of the EU regulatory framework governing export of surveillance technologies have serious flaws, resulting in the technology being sold to those who use it in violation of international human rights and humanitarian law.
  • The EU should tighten the controls requiring states to do greater human rights due diligence, block risky exports, and enforce the transparency and reporting requirements so they provide meaningful oversight and accountability.
30
submitted 1 week ago by JRepin@lemmy.ml to c/europe@feddit.org

cross-posted from: https://piefed.world/c/europe/p/1102854/european-union-surveillance-technology-sold-to-rights-violators

cross-posted from: https://piefed.world/c/tech/p/1102847/european-union-surveillance-technology-sold-to-rights-violators

Languages

54-Page Report “Looking the Other Way: EU Failure to Prevent Surveillance Exports to Rights Violators": HTML/OnlinePDF.

  • EU member states host many companies that produce dangerous surveillance technology that can be used to violate rights, the export of which necessitates robust controls.
  • The implementation and oversight of the EU regulatory framework governing export of surveillance technologies have serious flaws, resulting in the technology being sold to those who use it in violation of international human rights and humanitarian law.
  • The EU should tighten the controls requiring states to do greater human rights due diligence, block risky exports, and enforce the transparency and reporting requirements so they provide meaningful oversight and accountability.
[-] JRepin@lemmy.ml 71 points 2 years ago* (last edited 2 years ago)

Well and behind it is stealing other peoples' work (posts and comments, moderation and administration) and selling them as yours. The oldest capitalist criminal trick in the book: privatization AKA primitive accumulation AKA enclosure of the commons.

[-] JRepin@lemmy.ml 43 points 2 years ago* (last edited 2 years ago)

KDE Plasma on all my computers and also as desktop mode on Steam Deck. because it supports the latest technologies especially when it comes to graphics (HDR, VRR) also has best support for Wayland and multi-monitors. It looks great out of the box and it has a lot of features out of the box and I do not need to battle with adding some extensions that break with almost every update. KDE Plasma is also the most flexible desktop and I can set the workflow really to fit my desires and I can actually set many options and settings. And despite all these built-in features and configurability it still uses very few system resources and is very fast and smooth. Oh and the KDE community is one of the most welcoming I have met in FOSS world, and they listen to their users instead of the our way or the high way mentality I have so often encountered in GNOME for example. So yeah TLDR KDE Plasma is the one I like the most of all in the industry, even when compared to proprietary closed alternatives.

[-] JRepin@lemmy.ml 67 points 2 years ago

It would hurt this sociopath Bezos a lot more if people also canceled Amazon services en mass

[-] JRepin@lemmy.ml 96 points 2 years ago

It would hurt this sociopath Bezos a lot more if people also canceled Amazon services en mass

[-] JRepin@lemmy.ml 214 points 2 years ago

It would hurt this sociopath Bezos a lot more if people also canceled Amazon services en mass

[-] JRepin@lemmy.ml 49 points 2 years ago

Best to switch to Firefox anyways, or even better privacy enhanced LibreWolf

This project is a custom and independent version of Firefox, with the primary goals of privacy, security and user freedom. LibreWolf is designed to increase protection against tracking and fingerprinting techniques, while also including a few security improvements. This is achieved through our privacy and security oriented settings and patches. LibreWolf also aims to remove all the telemetry, data collection and annoyances, as well as disabling anti-freedom features like DRM.

[-] JRepin@lemmy.ml 39 points 2 years ago

And instead of the heaviest of sanctions imposed on genocidal Israel, some countries are even sending them more weapons. Leaders of all should imprisoned for war crimes and helping with warcrimes and crimes against humanity.

[-] JRepin@lemmy.ml 56 points 2 years ago* (last edited 2 years ago)

One way of greatly improving ROCm installation process would be to use the Open Build Service which allows to use the single spec file to produce packages for many supported GNU/Linux distributions and versions of them. I opened a feature request about this.

view more: next ›

JRepin

joined 2 years ago
MODERATOR OF