ARM boot technology going up a notch

ARM boot technology going up a notch

------------------------------------

ARM chips are constantly evolving. So no two ARMs are really alike - always someone has added some extra lines of VHDL code to add some more functions.

The latest SoC feature an impressive array of functions such as multiple cores, graphics accelerations, LCD controller, HDMI interface, USB, USB OTH, SDCard, ethernet, camera interface, SATA interface, RS232, ADC, sound, memory management unit, DMA, SPI, CAN, RS232, Real time clock, etc, and ALL ON ONE CHIP!!

The point being, the chip can connect to a lot of devices with minimal add on chips and components.

Notice the list includes a dedicated SDCard 2.0 interface that allows the ARM chip to directly read an SDCard. Some of these ARM chips have gone one step further and also have extra pins to tell them to BOOT FROM SDCARD!!!!

That changes everything!!!

For the average embedded techie who creates products from thin air, the way to program up an ARM is very expensive - they have to buy a JTAG debugger and a commercial compiler that works with that JTAG debugger to be able to do anything useful. Or he can wait a few months to years for someone in open source to catch up with the new chip with open source OpenOCD JTAG debugger and Eclipse.

But, if now he can flick a pin high on the chip and allow it to boot from SDCard, the whole game is changed!!!! All the needs to know is the start address where the ARM chip will seek out when it tries to boot from SDCAard, and then he/she can place their code in that local location on the SDCard to boot up Linux or Android without ever touching a JTAG debugger!!!

If the person is reasonably good with programming and porting, he won't need to single step the CPU to debug it and therefore do away with the JTAG debugger and the expensive compiler altogether. He can go get gcc and Eclipse to write his software for the ARM, configure up the drivers so that the drivers know where the ARM hardware peripherals are, compile once, copy the image to the SDCard and hey presto, he has a working Linux computer in days!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I can hardly believe this revolution!

With this technique, ARM manufacturers can now get their SoC to market with Linux faster than sub-contracting companies can make a JTAG debugger and a dedicated compiler for the new ARM chip because that takes weeks. Linux and gcc (which normally has the ARM chip family covered anyway) can be configured to generate code and boot the new ARM chip in days!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Reply to
7
Loading thread data ...

JTAG debuggers are available for less than $50, or you can make them yourself. (More expensive devices have higher speeds and more functions, of course.) The most popular ARM toolchain is free (though again you can pay for more features, more support, etc., if you want).

It is not a matter of "waiting for months or years" - support from OpenOCD and gcc normally arrives long before the chips.

And while booting from an SDCard may be a new feature, microcontrollers and processors have supported multiple boot modes for decades. People who actually /work/ with these sorts of devices (as electronics developers and low-level programmers) have been happily booting from UARTs, Ethernet, CAN, SPI, QSPI, NAND flash, NOR flash, and a variety of other devices and data stores in addition to JTAG.

Built-in boot rom support for SDCard is nothing revolutionary or dramatic. It's a nice feature to have, but that's it.

Reply to
David Brown

Not virgin devices. Some kind of software has to be put in somewhere to allow the devices to boot from UART, ethernet, CAN, etc.

It is revolutionary - not many have it with the booting features enabled on virgin chips leaving the factory. Reading the forums, I only come across second hand info that the A10 and may be some TI/NXP chips as having it. The tech specs seem to be a closely guarded secret so still hunting for details. Why they are hiding the info I don't understand because all it does is hold back the sale of their own chips!!

Hower chips with built in SDCard boot which can be enabled by setting a pin high on a chip changes everything because previously you had to have a JTAG debugger and program the internal boot rom with the boot loader code which can hold you back for months if you are new to a chip. Now you don't need a JTAG debugger to program the chip with a boot loader. A working gdb (if needed), an SCdard and gcc/Eclipse is all that you need to have Linux running on it without touching any of the internal flash. That must be a massive revolution in chip design.

The closest equivalent is ROM cartridges - but that is not nearly the same as booting off an industry standard and widely supported SDCard with gigabytes of storage.

Reply to
7

I imagine you have never had experience of using microcontrollers. Yes, you have to have software to support booting from these devices - just as you need software to support booting from an SDCard. It is known as a "boot rom", and comes ready-programmed by the manufacturer. It is /exactly/ the same principle whether it boots from SDCard or any other source.

Many do. All large microcontrollers have boot rom, as do a fair proportion of SOCs. Traditionally, processors do not have boot rom on the chip itself - but all cards will have a boot device (usually NOR flash), and all manufacturers will program this as part of the manufacturing process.

The A10 is a processor core, not a chip. It has no boot rom of any kind

- the issue does not make sense for a core.

Most TI and NXP chips have boot roms, as do most chips from other manufacturers.

No, they are not "closely guarded secrets". For some chips, the manufacturers only sell to a few specific customers, and the datasheets are only available by contacting the company directly (Broadcom is like that). Since you can't buy their chips (unless you are ordering hundreds of thousands), you don't need the specs. For other chips that are easily available (such as from TI and NXP), the specs and boot details are easily available by looking on their websites.

They don't hide the info - you just don't know what you are looking for.

Again - you have no idea what you are talking about, and SDCard boot support does not "change everything".

You can't program rom with a debugger, and you wouldn't need to because the rom is pre-programmed.

Boot rom support for an SDCard is nice. But it is not something you would use in development - of preference, you would boot over Ethernet.

For working with low-level development, your usual procedure is to get a flexible bootloader (such as uboot) into flash (probably using a jtag debugger, since they cost peanuts and no one doing low-level development would be without one - but possibly using a UART bootloader from the devices boot rom if that is more convenient). You use this bootloader to load the Linux kernel from a TFTP server, and mount root using NFS.

No developer who valued his time would muck around with copying programs onto an SDCard for development - Ethernet is far faster, and far more convenient.

Reply to
David Brown

manufacturers.

the

an

Aha, You have met "7". "7" makes nanobots that can morph into solar powered space gliders. He was also "european inventor of the year" and has designed and implemented a real time transaction manager using Gambas and mySQL which is capable of processing all the worlds financial transactions in real time on a 486. He's a genius. So be careful with the back chat.....

NO, you guessed right.

He's a total idiot.

Reply to
Hadro

Flash - most controllers have it - and they can boot from that once the software has been researched and developed and put in. Boot ROM - many controller can have it and contains the code developed for or by the customer again after R&D. That is common practice since whenever.

The next bit is different: Manufacturer puts in boot rom into SoC and sets aside a pin to allow it boot from SDCard and put in code into boot rom as part of a documented feature of the SoC. All their chips are sold with this feature - not custom chips or specially crafted one offs. So now you can boot the chip as part of its documented behavior, by setting one of its pin high and force it to boot from SDCard.

That is a big revolution. Now you can boot Linux directly off the SDCard without needing a JTAG debugger.

?

You would need a booted environment capable of running gdb and that must surely be best if an SDCard can boot, and then start up ethernet and then you can go in there through ethernet.

If you make spanking a new card from scratch and solder this new CPU to brand new card, this boot pin and boot by SDCard is revolutionary because your Linux on SDCard can be scripted to do just that and be ready for incoming ethernet connections without a JTAG device in sight.

Reply to
7

Aha have you met Sorel's disciple Hadron quack?

Yep!

Hardon quack - the dumbest troll working the newsgroups for troll money on behalf of Burson-Marstelar.

Sorel's Burson-Marstelar runs a vast factory manufacturing internet abuse.

If police raided Sorel's internet abuse factories where disciple Hardon quack works his guts off to scream abuse at usenet users who use Linux to please his master Sorel, then they would be compelled by law to take names and addresses of all present, confiscate all computers and servers, and contact all victims of internet abuse and then charge abusers with criminal offenses as outraged victims of organized internet abuse for money press charges.

From what I hear these criminals from PR companies like Sorel's Burson-Marstelar now graduate and sneak into charities to DELIBERATELY siphon money into Sorel's off shored companies. The Sorel empire is cracking under the weight of 100,000 disciples to feed.

Interpol/FBI where are you when you are needed?

Trolling is an Industry in USA

------------------------------

Hiring trolls is ignorant.

Most US politicians and businesses are so corrupt and reliant to the point of addiction on trolls and trolling and so they fund it all illegally through charities because funding through charities is untraceable through loopholes in US law.

The US politicians, embassy staff and anyone else falling for it like Spanish government should know that the US trolls ordering embassies to this kind of work have no mandate for these kinds of activities.

Just rich companies that have bank rolled teams of asstroturfers to create fake support and certainly no mandate. Companies like Eedleman also run fake survey companies and delete everything except outlying data to fake their reports to add legitimacy to their trolling campaigns.

There is NO MANDATE when fake asstroturfers are driving the agenda.

The situation is so bad, it has spread into the military. No one now knows who drives what agenda because there is no traceability.

The fscking military, politicians, enviro nuts, music mafia, using asstroturfing technology need the riot act read to them.

The situation is so incomprehensible that the US has been declared falsely that it is the most charitable nation in the world when at the same time 3 million US families are living in shelter, and most of that charity money is fake money being diverted from corporations into the coffers of asstroturfing and PR companies. What would you do if you were forced into a shelter and all your charity money was stolen from your charity? You are down and they still want to steal YOUR CHARITY MONEY?!?? Thats right you would tell them NEVER and tell them fsck off in no uncertain terms and get the law changed to make it a criminal offense to steal charity money or spend it on anything other than 100% certified peer revied charity without kickbacks, without creative accounting and without morally unjust criminal behavior within the charity system.

Most of the money funneled through charities never make it to charitable causes in the USA. It is stolen by politicians and pressure groups to cover up their fake funding routes for asstroturfing. They are used to it so we got to get over it?

No thanks!!!!

Not a single politician, embassy staff or military has a mandate for one single political agenda because no one knows who is funding who and who's agenda is real and whose agenda is fake. Every signature collected is one more fake signature for a mandate written out by asstroturfers.

Asstroturfing through charities undermines society, and all the nations dealing with US and it must stop because no one in US has any legitimate mandates for any of this activity any more.

If they have it, then should display their mandate with pride, and show where the support had come from and if any of it is through charities, then the whole mandate is faked because charity status is being abused to hide funding routes for corporate asstroturfing.

Asstroturfer offerings

----------------------

I've just read the contents of the fbo.gov solicitation RTB220610

The US government wants asstroturfers and with it sophisticated asstroturfing technology to drown out democratic free speech, and then hide from those whom it seeks to victimize.

It was point no.3 that caught my eye:

0003- Static IP Address Management

What that means is the same as what I've been saying for a while about doofi, flatcake and clog are true.

They are not individuals but a whole asstroturfing team behind each sock puppet.

There isn't enough memory between the sock operators to know or remember what had been said earlier so you know the conversations are being typed out by multiple individuals impersonating each other. It was notable gaffs by the goofy doofy sock that first gave it away.

The asstroturfing teams had already gone into government and offered them consulting services about what technology and asstroturfing practices were out there for fbo.gov to decide what they will purchase in solicitation RTB220610. Burson-Marstelar won the contract performing all the activities required in the solicitation with fantastic usenet software tools for targeting individuals and trolling 24/7 and all built in outsourced India.

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

formatting link
Solicitation Number: RTB220610 Notice Type: Sources Sought Synopsis: Added: 2010-06-22 13:42:52Jun 22, 2010 1:42 pm Modified: 2010-06-22 14:07:11Jun 22, 2010 2:07 pmTrack Changes

0001- Online Persona Management Service.

50 User Licenses, 10 Personas per user. Software will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.

0002- Secure Virtual Private Network (VPN).

1 each VPN provides the ability for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user s IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, may provide traffic mixing, blending the user s traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. Anonymizer Enterprise Chameleon or equal

0003- Static IP Address Management.

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

50 each Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

0004- Virtual Private Servers,

CONUS. 1 each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal

0005- Virtual Private Servers, OCONUS.

8 Each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal

0006- Remote Access Secure Virtual Private Network.

1 each Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination, the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.

Contracting Office Address: 2606 Brown Pelican Ave. MacDill AFB, Florida 33621-5000 United States Place of Performance: Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq. MacDill AFB , Florida 33679 United States Primary Point of Contact.: Russell Beasley, Contracting Officer snipped-for-privacy@macdill.af.mil Phone: (813) 828-4729 Fax: (813) 828-5111

Reply to
7

Yes. He's a complete idiot which is why all of the "advocates" call him Mr. President. It's supposed to bother the trolls if they take the biggest dumbass moron they can find and elevate the idiot to "president."

If the 7-tard had half a brain he wouldn't be gloating over his $50k salary that he's finally making at age fifty-something. His employer also considers him to be somewhat retarded.

--
"I use Linux and open source tools for my every day job.
Around $1100 per week."

7-tard. Drooling over the burger-flipping salary he makes with Linux.
Sun, 22 Apr 2012
Message-ID:
Reply to
Ezekiel

Most /microcontrollers/ have flash (there is no strict definition of a microcontroller - but flash is pretty much a "must have" feature of modern microcontrollers). Some SOCs have flash, but many do not. No processors have flash.

But virtually all processors are capable of booting directly from NOR flash - it does not need any sort of software or ROM in the device, just some default settings for the bus controller and the boot controller. Booting from NAND, SPI or QSPI flash is a little more difficult, and /may/ require a simple program in boot ROM, or may be handled directly in hardware by the flash controller.

Common practice is that is it developed by the manufacturer, not the customer. A customer will only be involved in the development of the boot rom code if they are getting their own specialised or customised chip.

This is /exactly/ the same as is done for booting from SPI flash, UARTs, Ethernet, CAN, USB, etc., etc. It is not a revolution in any way - it is the same system as has always been used.

I don't know whether you are totally ignorant of current practices, or just a sucker for whatever marketing exaggerations you read, but you are clearly out of your depth talking about these things.

You are talking from a viewpoint of zero experience and zero knowledge, and apparently have difficulty with basic reading comprehension.

You use a low-level bootloader (such as a rom-based UART bootloader) or a jtag interface to get a Ethernet-capable bootloader into flash. Then the processor will boot from that flash bootloader, load the kernel by TFTP, and off you go. Everything else is accessed from your server (or workstation) via NFS (or samba, if you prefer).

There is no need to put an SDCard in your PC, copy files over, move the card physically to your test board, re-boot from the card, test your program - and then repeat the whole process for every change and re-compile. You work directly.

I'm sure there /are/ developers that have come up with a more convoluted and time-consuming method than TFTP and NFS over Ethernet, such as using USB sticks or SDCards, but that is not something a knowledgeable developer would do.

It is not revolutionary, because no one has had a problem with this before. There are several methods that are as good or better than using an SDCard in many cases - using JTAG (I don't know what you've got against it - it is fast, flexible and cheap), using pre-programmed flash (the standard for large production runs, and by far the fastest method), using UART boot mode (easy for small production runs), using plug-in SPI cards (easy for small and medium runs), or using chips that have more advanced boot modes. SDCard booting from rom gives another option - but it is just one more of many options.

Reply to
David Brown

I imagine you have never had experience of using microcontrollers.

... you just don't know what you are looking for.

Again - you have no idea what you are talking about,

No developer who valued his time would muck around with copying programs onto an SDCard for development

I don't know whether you are totally ignorant of current practices,

You are talking from a viewpoint of zero experience and zero knowledge, and apparently have difficulty with basic reading comprehension.

Please ignore the idiot troll calling himself "7". Everybody else realizes he's a clueless idiot and ignores his nonsense. My sig summarizes the complete fraud this "genius" really is. (It's laughable but some in c.o.l.a. think he's a "genius")

--
"I've done for example SQL optimization and the reason I could do it better 
than the best high level experts can do was because I think in hex and bits 
and byte movements.... If you know the assembler in detail, you would know 
what "select * from employees" would translate into assembler and how 
different and yet similar that would be from "select name from employees"

Babbling idiot "7"
March 7, 2012
Reply to
Ezekiel

You are an absolutely fscked up stupid troll infecting newsgroups.

I await anxiously for you to name a couple of off the shelf chips with clearly downloadable datasheets that clearly proves each of your point - SPI flash, UARTs, ethernet, CAN, USB, etc..etc booting without purchasing a JTAG debugger to program in the boot loader.

Reply to
7

Disciple of Sorel Ezekiel and Hadron are trolling buddies operated by the same sock operator?

Didn't know that!

Sorel's Burson-Marstelar runs a vast factory manufacturing internet abuse.

If police raided Sorel's internet abuse factories where disciple Ezekiel works his guts off to scream abuse at usenet users who use Linux to please his master Sorel, then they would be compelled by law to take names and addresses of all present, confiscate all computers and servers, and contact all victims of internet abuse and then charge abusers with criminal offenses as outraged victims of organized internet abuse for money press charges.

From what I hear these criminals from PR companies like Sorel's Burson-Marstelar now graduate and sneak into charities to DELIBERATELY siphon money into Sorel's off shored companies. The Sorel empire is cracking under the weight of 100,000 disciples to feed.

Interpol/FBI where are you when you are needed?

Trolling is an Industry in USA

------------------------------

Hiring trolls is ignorant.

Most US politicians and businesses are so corrupt and reliant to the point of addiction on trolls and trolling and so they fund it all illegally through charities because funding through charities is untraceable through loopholes in US law.

The US politicians, embassy staff and anyone else falling for it like Spanish government should know that the US trolls ordering embassies to this kind of work have no mandate for these kinds of activities.

Just rich companies that have bank rolled teams of asstroturfers to create fake support and certainly no mandate. Companies like Eedleman also run fake survey companies and delete everything except outlying data to fake their reports to add legitimacy to their trolling campaigns.

There is NO MANDATE when fake asstroturfers are driving the agenda.

The situation is so bad, it has spread into the military. No one now knows who drives what agenda because there is no traceability.

The fscking military, politicians, enviro nuts, music mafia, using asstroturfing technology need the riot act read to them.

The situation is so incomprehensible that the US has been declared falsely that it is the most charitable nation in the world when at the same time 3 million US families are living in shelter, and most of that charity money is fake money being diverted from corporations into the coffers of asstroturfing and PR companies. What would you do if you were forced into a shelter and all your charity money was stolen from your charity? You are down and they still want to steal YOUR CHARITY MONEY?!?? Thats right you would tell them NEVER and tell them fsck off in no uncertain terms and get the law changed to make it a criminal offense to steal charity money or spend it on anything other than 100% certified peer revied charity without kickbacks, without creative accounting and without morally unjust criminal behavior within the charity system.

Most of the money funneled through charities never make it to charitable causes in the USA. It is stolen by politicians and pressure groups to cover up their fake funding routes for asstroturfing. They are used to it so we got to get over it?

No thanks!!!!

Not a single politician, embassy staff or military has a mandate for one single political agenda because no one knows who is funding who and who's agenda is real and whose agenda is fake. Every signature collected is one more fake signature for a mandate written out by asstroturfers.

Asstroturfing through charities undermines society, and all the nations dealing with US and it must stop because no one in US has any legitimate mandates for any of this activity any more.

If they have it, then should display their mandate with pride, and show where the support had come from and if any of it is through charities, then the whole mandate is faked because charity status is being abused to hide funding routes for corporate asstroturfing.

Asstroturfer offerings

----------------------

I've just read the contents of the fbo.gov solicitation RTB220610

The US government wants asstroturfers and with it sophisticated asstroturfing technology to drown out democratic free speech, and then hide from those whom it seeks to victimize.

It was point no.3 that caught my eye:

0003- Static IP Address Management

What that means is the same as what I've been saying for a while about doofi, flatcake and clog are true.

They are not individuals but a whole asstroturfing team behind each sock puppet.

There isn't enough memory between the sock operators to know or remember what had been said earlier so you know the conversations are being typed out by multiple individuals impersonating each other. It was notable gaffs by the goofy doofy sock that first gave it away.

The asstroturfing teams had already gone into government and offered them consulting services about what technology and asstroturfing practices were out there for fbo.gov to decide what they will purchase in solicitation RTB220610. Burson-Marstelar won the contract performing all the activities required in the solicitation with fantastic usenet software tools for targeting individuals and trolling 24/7 and all built in outsourced India.

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

formatting link
Solicitation Number: RTB220610 Notice Type: Sources Sought Synopsis: Added: 2010-06-22 13:42:52Jun 22, 2010 1:42 pm Modified: 2010-06-22 14:07:11Jun 22, 2010 2:07 pmTrack Changes

0001- Online Persona Management Service.

50 User Licenses, 10 Personas per user. Software will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.

0002- Secure Virtual Private Network (VPN).

1 each VPN provides the ability for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user s IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, may provide traffic mixing, blending the user s traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. Anonymizer Enterprise Chameleon or equal

0003- Static IP Address Management.

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

50 each Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

0004- Virtual Private Servers,

CONUS. 1 each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal

0005- Virtual Private Servers, OCONUS.

8 Each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal

0006- Remote Access Secure Virtual Private Network.

1 each Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination, the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.

Contracting Office Address: 2606 Brown Pelican Ave. MacDill AFB, Florida 33621-5000 United States Place of Performance: Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq. MacDill AFB , Florida 33679 United States Primary Point of Contact.: Russell Beasley, Contracting Officer snipped-for-privacy@macdill.af.mil Phone: (813) 828-4729 Fax: (813) 828-5111

Reply to
7

Well read it again fool!

Sorel's Burson-Marstelar runs a vast factory manufacturing internet abuse.

If police raided Sorel's internet abuse factories where disciple Ezekiel works his guts off to scream abuse at usenet users who use Linux to please his master Sorel, then they would be compelled by law to take names and addresses of all present, confiscate all computers and servers, and contact all victims of internet abuse and then charge abusers with criminal offenses as outraged victims of organized internet abuse for money press charges.

From what I hear these criminals from PR companies like Sorel's Burson-Marstelar now graduate and sneak into charities to DELIBERATELY siphon money into Sorel's off shored companies. The Sorel empire is cracking under the weight of 100,000 disciples to feed.

Interpol/FBI where are you when you are needed?

Trolling is an Industry in USA

------------------------------

Hiring trolls is ignorant.

Most US politicians and businesses are so corrupt and reliant to the point of addiction on trolls and trolling and so they fund it all illegally through charities because funding through charities is untraceable through loopholes in US law.

The US politicians, embassy staff and anyone else falling for it like Spanish government should know that the US trolls ordering embassies to this kind of work have no mandate for these kinds of activities.

Just rich companies that have bank rolled teams of asstroturfers to create fake support and certainly no mandate. Companies like Eedleman also run fake survey companies and delete everything except outlying data to fake their reports to add legitimacy to their trolling campaigns.

There is NO MANDATE when fake asstroturfers are driving the agenda.

The situation is so bad, it has spread into the military. No one now knows who drives what agenda because there is no traceability.

The fscking military, politicians, enviro nuts, music mafia, using asstroturfing technology need the riot act read to them.

The situation is so incomprehensible that the US has been declared falsely that it is the most charitable nation in the world when at the same time 3 million US families are living in shelter, and most of that charity money is fake money being diverted from corporations into the coffers of asstroturfing and PR companies. What would you do if you were forced into a shelter and all your charity money was stolen from your charity? You are down and they still want to steal YOUR CHARITY MONEY?!?? Thats right you would tell them NEVER and tell them fsck off in no uncertain terms and get the law changed to make it a criminal offense to steal charity money or spend it on anything other than 100% certified peer revied charity without kickbacks, without creative accounting and without morally unjust criminal behavior within the charity system.

Most of the money funneled through charities never make it to charitable causes in the USA. It is stolen by politicians and pressure groups to cover up their fake funding routes for asstroturfing. They are used to it so we got to get over it?

No thanks!!!!

Not a single politician, embassy staff or military has a mandate for one single political agenda because no one knows who is funding who and who's agenda is real and whose agenda is fake. Every signature collected is one more fake signature for a mandate written out by asstroturfers.

Asstroturfing through charities undermines society, and all the nations dealing with US and it must stop because no one in US has any legitimate mandates for any of this activity any more.

If they have it, then should display their mandate with pride, and show where the support had come from and if any of it is through charities, then the whole mandate is faked because charity status is being abused to hide funding routes for corporate asstroturfing.

Asstroturfer offerings

----------------------

I've just read the contents of the fbo.gov solicitation RTB220610

The US government wants asstroturfers and with it sophisticated asstroturfing technology to drown out democratic free speech, and then hide from those whom it seeks to victimize.

It was point no.3 that caught my eye:

0003- Static IP Address Management

What that means is the same as what I've been saying for a while about doofi, flatcake and clog are true.

They are not individuals but a whole asstroturfing team behind each sock puppet.

There isn't enough memory between the sock operators to know or remember what had been said earlier so you know the conversations are being typed out by multiple individuals impersonating each other. It was notable gaffs by the goofy doofy sock that first gave it away.

The asstroturfing teams had already gone into government and offered them consulting services about what technology and asstroturfing practices were out there for fbo.gov to decide what they will purchase in solicitation RTB220610. Burson-Marstelar won the contract performing all the activities required in the solicitation with fantastic usenet software tools for targeting individuals and trolling 24/7 and all built in outsourced India.

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

formatting link
Solicitation Number: RTB220610 Notice Type: Sources Sought Synopsis: Added: 2010-06-22 13:42:52Jun 22, 2010 1:42 pm Modified: 2010-06-22 14:07:11Jun 22, 2010 2:07 pmTrack Changes

0001- Online Persona Management Service.

50 User Licenses, 10 Personas per user. Software will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.

0002- Secure Virtual Private Network (VPN).

1 each VPN provides the ability for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user s IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, may provide traffic mixing, blending the user s traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. Anonymizer Enterprise Chameleon or equal

0003- Static IP Address Management.

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

50 each Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

0004- Virtual Private Servers,

CONUS. 1 each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal

0005- Virtual Private Servers, OCONUS.

8 Each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal

0006- Remote Access Secure Virtual Private Network.

1 each Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination, the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.

Contracting Office Address: 2606 Brown Pelican Ave. MacDill AFB, Florida 33621-5000 United States Place of Performance: Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq. MacDill AFB , Florida 33679 United States Primary Point of Contact.: Russell Beasley, Contracting Officer snipped-for-privacy@macdill.af.mil Phone: (813) 828-4729 Fax: (813) 828-5111

Reply to
7

I'll give you one example - the TI OMAP 3515. This is an Arm Cortex-A8 device that has been available for nearly 3 years.

You can find the technical reference manual quickly and simply from the TI web site.

Boot options are "execute in place" memory (typically NOR flash), DiskOnChip, NAND flash of various types, Uart, USB and - wait for it - booting directly from MMC cards or SD flash cards.

So not only is booting from an SD card /not/ any sort of revolution, it is not even new.

That was just the first example I looked at. If you want to find other chips, look them up yourself - or arrange a consultancy contract with my employer.

Reply to
David Brown

Sometimes I think that with patience and logical argument, it is possible to teach posters like 7 a little. I know it's naïve, and it doesn't seem to have worked very well here, but I can't resist trying on occasion. I also can't help thinking that other people might read the posts, or find them out-of-context on google, and if no one corrected the OP, people might think he was correct.

Reply to
David Brown

At least he's not a filthy lying Wintroll, spewing idiocy and lies in a Linux advocacy group, like you and your pals, "Ezekiel".

--
"So sentient human beings should have their freedom restricted so that
some bits on a disk somewhere (source code) can have freedom instead."
-  trolling fsckwit "Ezekiel", attacking the GPL
Reply to
chrisv

Oh lord, he's back like clockwork and it goes on and on with him.

Reply to
Big Steel

Salute,

I apologize for may-be-intrusion-and-off-topic, but I intentionally want to ask a question which may be considered as bitching (pardon my French).

The Q is: Why so many lines of previous replies need to be included in the next reply?

I mean, some posters (doesn't matter who at a moment, but I am sure s/he will recognize him/herself), for a reply worth of a a few lines ***always*** include all previous posts/replies sometimes worth of hundered(s) of lines of text? Precisely, in this thread, a certain poster included 84 lines of text of all previous thread for a partial reply worth of 4 lines, along with many unnecessary lines for all other partial answers.

Who reads all that previous-reply-text stuff, anyways?

I assume than anyone capable of posting a post in this so-much specific group is a person with experience in both EE as well as network-specific social skills, as well as a person who admire effective articulation and concise writing skills.

I have no intention to pun anyone, just wondering is anyone sometimes irritated with all those included lines of text of previous replies?

StoneThrower

formatting link

Reply to
Stonethrower

[...]
[...]

Various high end SoC parts have been able to do that for years.

Yup.

"7" is a classic net.kook...

--
Grant Edwards               grant.b.edwards        Yow! I've got a COUSIN
                                  at               who works in the GARMENT
                              gmail.com            DISTRICT ...
Reply to
Grant Edwards

Yea, I remember when I first started reading Usenet. :) That must have been almost 25 years ago. That was back before "The Internet". Our news server had a bank of modems and we still used uucp for e-mail transport.

It's also sort of fun...

--
Grant Edwards               grant.b.edwards        Yow! And furthermore,
                                  at               my bowling average is
                              gmail.com            unimpeachable!!!
Reply to
Grant Edwards

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.