ARM boot technology going up a notch

Do you have a question? Post it now! No Registration Necessary

Translate This Thread From English to

Threaded View
ARM boot technology going up a notch
------------------------------------

ARM chips are constantly evolving.
So no two ARMs are really alike - always someone has added some
extra lines of VHDL code to add some more functions.

The latest SoC feature an impressive array of functions
such as multiple cores, graphics accelerations, LCD controller,
HDMI interface, USB, USB OTH, SDCard, ethernet, camera interface,
SATA interface, RS232, ADC, sound, memory management unit,
DMA, SPI, CAN, RS232, Real time clock, etc, and ALL ON ONE CHIP!!

The point being, the chip can connect to a lot of devices
with minimal add on chips and components.

Notice the list includes a dedicated SDCard 2.0 interface
that allows the ARM chip to directly read an SDCard.
Some of these ARM chips have gone one step further
and also have extra pins to tell them to BOOT FROM SDCARD!!!!

That changes everything!!!

For the average embedded techie who creates products from thin air,
the way to program up an ARM is very expensive - they have
to buy a JTAG debugger and a commercial compiler that
works with that JTAG debugger to be able to do anything
useful. Or he can wait a few months to years for someone
in open source to catch up with the new chip with
open source OpenOCD JTAG debugger and Eclipse.

But, if now he can flick a pin high on the chip
and allow it to boot from SDCard, the whole game is changed!!!!
All the needs to know is the start address where the ARM
chip will seek out when it tries to boot from SDCAard, and then he/she
can place their code in that local location on the SDCard
to boot up Linux or Android without ever touching a JTAG debugger!!!

If the person is reasonably good with programming
and porting, he won't need to single step the CPU to debug
it and therefore do away with the JTAG debugger and the
expensive compiler altogether. He can go get gcc and Eclipse to write
his software for the ARM, configure up the drivers
so that the drivers know where the ARM hardware peripherals
are, compile once, copy the image to the SDCard
and hey presto, he has a working Linux computer
in days!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I can hardly believe this revolution!

With this technique, ARM manufacturers can now get
their SoC to market with Linux faster than
sub-contracting companies can make a JTAG debugger and a
dedicated compiler for the new ARM chip because that takes
weeks. Linux and gcc (which normally has the ARM chip family
covered anyway) can be configured to generate code and boot
the new ARM chip in days!!!!!!!!!!!!!!!!!!!!!!!!!!!!!



Re: ARM boot technology going up a notch
Quoted text here. Click to load it

JTAG debuggers are available for less than $50, or you can make them
yourself.  (More expensive devices have higher speeds and more
functions, of course.)  The most popular ARM toolchain is free (though
again you can pay for more features, more support, etc., if you want).

It is not a matter of "waiting for months or years" - support from
OpenOCD and gcc normally arrives long before the chips.

And while booting from an SDCard may be a new feature, microcontrollers
and processors have supported multiple boot modes for decades.  People
who actually /work/ with these sorts of devices (as electronics
developers and low-level programmers) have been happily booting from
UARTs, Ethernet, CAN, SPI, QSPI, NAND flash, NOR flash, and a variety of
other devices and data stores in addition to JTAG.

Built-in boot rom support for SDCard is nothing revolutionary or
dramatic.  It's a nice feature to have, but that's it.

Re: ARM boot technology going up a notch

Quoted text here. Click to load it

Not virgin devices. Some kind of software has to be put in somewhere
to allow the devices to boot from UART, ethernet, CAN, etc.

Quoted text here. Click to load it

It is revolutionary - not many have it with the booting features
enabled on virgin chips leaving the factory.
Reading the forums, I only come across second hand info
that the A10 and may be some TI/NXP chips as having it.
The tech specs seem to be a closely guarded
secret so still hunting for details.
Why they are hiding the info I don't understand because
all it does is hold back the sale of their own chips!!

Hower chips with built in SDCard boot
which can be enabled by setting a pin high on a chip
changes everything because
previously you had to have a JTAG debugger and program the
internal boot rom with the boot loader code
which can hold you back for months if you are new to a chip.
Now you don't need a JTAG debugger to program the chip with
a boot loader. A working gdb (if needed), an SCdard
and gcc/Eclipse is all that you need to have Linux running
on it without touching any of the internal flash.
That must be a massive revolution in chip design.

The closest equivalent is ROM cartridges - but that is not
nearly the same as booting off an industry standard
and widely supported SDCard with gigabytes of storage.


Re: ARM boot technology going up a notch
Quoted text here. Click to load it

I imagine you have never had experience of using microcontrollers.  Yes,
you have to have software to support booting from these devices - just
as you need software to support booting from an SDCard.  It is known as
a "boot rom", and comes ready-programmed by the manufacturer.  It is
/exactly/ the same principle whether it boots from SDCard or any other
source.

Quoted text here. Click to load it

Many do.  All large microcontrollers have boot rom, as do a fair
proportion of SOCs.  Traditionally, processors do not have boot rom on
the chip itself - but all cards will have a boot device (usually NOR
flash), and all manufacturers will program this as part of the
manufacturing process.

Quoted text here. Click to load it

The A10 is a processor core, not a chip.  It has no boot rom of any kind
- the issue does not make sense for a core.

Most TI and NXP chips have boot roms, as do most chips from other
manufacturers.

Quoted text here. Click to load it

No, they are not "closely guarded secrets".  For some chips, the
manufacturers only sell to a few specific customers, and the datasheets
are only available by contacting the company directly (Broadcom is like
that).  Since you can't buy their chips (unless you are ordering
hundreds of thousands), you don't need the specs.  For other chips that
are easily available (such as from TI and NXP), the specs and boot
details are easily available by looking on their websites.

Quoted text here. Click to load it

They don't hide the info - you just don't know what you are looking for.

Quoted text here. Click to load it

Again - you have no idea what you are talking about, and SDCard boot
support does not "change everything".

Quoted text here. Click to load it

You can't program rom with a debugger, and you wouldn't need to because
the rom is pre-programmed.

Quoted text here. Click to load it

Boot rom support for an SDCard is nice.  But it is not something you
would use in development - of preference, you would boot over Ethernet.

For working with low-level development, your usual procedure is to get a
flexible bootloader (such as uboot) into flash (probably using a jtag
debugger, since they cost peanuts and no one doing low-level development
would be without one - but possibly using a UART bootloader from the
devices boot rom if that is more convenient).  You use this bootloader
to load the Linux kernel from a TFTP server, and mount root using NFS.

No developer who valued his time would muck around with copying programs
onto an SDCard for development - Ethernet is far faster, and far more
convenient.


Quoted text here. Click to load it


Re: ARM boot technology going up a notch

Quoted text here. Click to load it
manufacturers.
Quoted text here. Click to load it
the
Quoted text here. Click to load it
an
Quoted text here. Click to load it

Aha, You have met "7". "7" makes nanobots that can morph into solar
powered space gliders. He was also "european inventor of the year" and
has designed and implemented a real time transaction manager using
Gambas and mySQL which is capable of processing all the worlds financial
transactions in real time on a 486. He's a genius. So be careful with
the back chat.....

NO, you guessed right.

He's a total idiot.
 

Re: ARM boot technology going up a notch


Quoted text here. Click to load it

Aha have you met Sorel's disciple Hadron quack?
 
Quoted text here. Click to load it

Yep!

Hardon quack - the dumbest troll working the newsgroups for troll money on
behalf of Burson-Marstelar.

Sorel's Burson-Marstelar runs a vast factory manufacturing internet abuse.

If police raided Sorel's internet abuse factories where disciple
Hardon quack works his guts off to scream abuse at usenet users
who use Linux to please his master Sorel, then they would be compelled
by law to take names and addresses of all present, confiscate
all computers and servers, and  contact all victims of internet abuse
and then charge abusers with criminal offenses
as outraged victims of organized internet abuse for money press charges.

From what I hear these criminals from PR companies
like Sorel's Burson-Marstelar now graduate and sneak into charities
to DELIBERATELY siphon money into Sorel's off shored companies.
The Sorel empire is cracking under the weight of 100,000 disciples to feed.

Interpol/FBI where are you when you are needed?


Trolling is an Industry in USA
------------------------------

Hiring trolls is ignorant.

Most US politicians and businesses
are so corrupt and reliant to the point of addiction
on trolls and trolling and so they fund it all illegally
through charities because
funding through charities is untraceable
through loopholes in US law.

The US politicians, embassy staff and anyone else falling for it like
Spanish government should know that the US trolls
ordering embassies to this kind of work
have no mandate for these kinds of activities.

Just rich companies that have bank rolled teams of asstroturfers
to create fake support and certainly no mandate.
Companies like Eedleman also run fake survey companies
and delete everything except outlying data to fake their reports
to add legitimacy to their trolling campaigns.

There is NO MANDATE when fake asstroturfers are driving
the agenda.

The situation is so bad, it has spread into the military.
No one now knows who drives what agenda because
there is no traceability.

The fscking military, politicians, enviro nuts, music mafia,
using asstroturfing technology need the riot act read to them.

The situation is so incomprehensible that
the US has been declared falsely that it is the most charitable nation in
the world when at the same time 3 million US families
are living in shelter, and most of that charity money is fake
money being diverted from corporations into the coffers of asstroturfing
and PR companies. What would you do if you were
forced into a shelter and all your charity
money was stolen from your charity?
You are down and they still want to steal YOUR CHARITY MONEY?!??
Thats right you would tell them NEVER and tell
them fsck off in no uncertain terms and get the law changed
to make it a criminal offense to steal charity money
or spend it on anything other than 100% certified peer revied charity
without kickbacks, without creative accounting and
without morally unjust criminal behavior within
the charity system.

Most of the money funneled through
charities never make it to charitable causes in the USA.
It is stolen by politicians and pressure groups to cover
up their fake funding routes for asstroturfing.
They are used to it so we got to get over it?

No thanks!!!!

Not a single politician, embassy staff or military has a
mandate for one single political agenda because no one
knows who is funding who and who's agenda is real
and whose agenda is fake. Every signature collected
is one more fake signature for a mandate written out by
asstroturfers.

Asstroturfing through charities undermines society,
and all the nations dealing with US
and it must stop because no one in US has any legitimate
mandates for any of this activity any more.

If they have it, then should display their mandate
with pride, and show where the support had come from
and if any of it is through charities, then the
whole mandate is faked because charity status is being
abused to hide funding routes for corporate asstroturfing.



Asstroturfer offerings
----------------------


I've just read the contents of the fbo.gov solicitation RTB220610

The US government wants asstroturfers and with it sophisticated
asstroturfing technology to drown out democratic free speech,
and then hide from those whom it seeks to victimize.

It was point no.3 that caught my eye:
0003- Static IP Address Management

What that means is the same as what I've been saying for a while about
doofi, flatcake and clog are true.

They are not individuals but a whole asstroturfing team
behind each sock puppet.

There isn't enough memory between the sock operators to know
or remember what had been said earlier so you know the
conversations are being typed out by multiple individuals
impersonating each other.
It was notable gaffs by the goofy doofy sock that first gave it away.

The asstroturfing teams had already gone into government and offered them
consulting services about what technology and asstroturfing
practices were out there for fbo.gov to decide what they will
purchase in solicitation RTB220610. Burson-Marstelar
won the contract performing all the activities
required in the solicitation with fantastic usenet software
tools for targeting individuals and trolling 24/7
and all built in outsourced India.


:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D



https://www.fbo.gov/index?s=opportunity&mode=form&id=d88e9d660336be91552fe8c1a51bacb2&tab=core&_cview=1
 
Solicitation Number: RTB220610
Notice Type: Sources Sought
Synopsis: Added: 2010-06-22 13:42:52Jun 22, 2010 1:42 pm
Modified: 2010-06-22  14:07:11Jun 22, 2010 2:07 pmTrack Changes

0001- Online Persona Management Service.

50 User Licenses, 10 Personas per user. Software will
allow 10 personas per user, replete with background,
history, supporting details, and cyber presences
that are technically, culturally and geographically
consistent. Individual applications will enable an
operator to exercise a number of different online
persons from the same workstation and without fear
of being discovered by sophisticated adversaries.
Personas must be able to appear to originate in
nearly any part of the world and can interact through
conventional online services and social media platforms.
The service includes a user friendly application
environment to maximize the user's situational
awareness by displaying real-time local information.

 
0002- Secure Virtual Private Network (VPN).

1 each VPN provides the ability for users to
daily and automatically obtain
randomly selected IP addresses through
which they can access the internet. The daily
rotation of the user s IP address prevents compromise
during observation of likely or targeted web sites
or services, while hiding the existence of the
operation. In addition, may provide traffic mixing,
blending the user s traffic with traffic from multitudes
of users from outside the organization. This traffic
blending provides excellent cover and powerful deniability.
Anonymizer Enterprise Chameleon or equal

 
0003- Static IP Address Management.


:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D


50 each Licence protects the identity of government
agencies and enterprise organizations. Enables organizations
to manage their persistent online personas by assigning
static IP addresses to each persona. Individuals
can perform static impersonations, which allow
them to look like the same person over time. Also allows
organizations that frequent same site/service often to
easily switch IP addresses to look like ordinary
users as opposed to one organization.
Anonymizer IP Mapper License or equal

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

 
0004- Virtual Private Servers,

CONUS. 1 each Provides CONUS or OCONUS points of
presence locations that are setup for each customer
based on the geographic area of operations the
customer is operating within and which allow a
customer?s online persona(s) to appear to originate
from. Ability to provide virtual private servers that
are procured using commercial hosting centers around
the world and which are established anonymously. Once
procured, the geosite is incorporated into the network
and integrated within the customers environment and
ready for use by the customer. Unless specifically
designated as shared, locations are dedicated for use
by each customer and never shared among other customers.
Anonymizer Annual Dedicated CONUS Light Geosite or equal

 
0005- Virtual Private Servers, OCONUS.

8 Each Provides CONUS or OCONUS points of presence
locations that are setup for each customer based on
the geographic area of operations the customer is
operating within and which allow a customer?s
online persona(s) to appear to
originate from. Ability to provide virtual private
servers that are procured using commercial hosting
centers around the world and which are established
anonymously. Once procured, the geosite is incorporated
into the network and integrated within the customers
environment and ready for use by the customer. Unless
specifically designated as shared, locations are dedicated
for use by each customer and never shared among other
customers. Anonymizer Annual Dedicated OCONUS Light
Geosite or equal

 
0006- Remote Access Secure Virtual Private Network.

1 each Secure Operating Environment provides a reliable
and protected computing environment from which to stage
and conduct operations. Every session uses a clean
Virtual Machine (VM) image. The solution is accessed
through sets of Virtual Private Network (VPN) devices
located at each Customer facility. The fully-managed
VDI (Virtual Desktop Infrastructure) is an environment
that allows users remote access from their desktop into
a VM. Upon session termination, the VM is deleted and
any virus, worm, or malicious software that the user
inadvertently downloaded is destroyed. Anonymizer
Virtual Desktop  Infrastructure (VDI) Solution or equal.


Contracting Office Address:
 2606 Brown Pelican Ave.
 MacDill AFB, Florida 33621-5000
 United States
 Place of Performance:
 Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq.
 MacDill AFB , Florida 33679
 United States
 
Primary Point of Contact.:
 Russell Beasley,
 Contracting Officer
  snipped-for-privacy@macdill.af.mil
 Phone: (813) 828-4729
 Fax: (813) 828-5111


Re: ARM boot technology going up a notch
Quoted text here. Click to load it

Yes. He's a complete idiot which is why all of the "advocates" call him Mr.
President.  It's supposed to bother the trolls if they take the biggest
dumbass moron they can find and elevate the idiot to "president."

If the 7-tard had half a brain he wouldn't be gloating over his $50k salary
that he's finally making at age fifty-something. His employer also considers
him to be somewhat retarded.

--
"I use Linux and open source tools for my every day job.
Around $1100 per week."

We've slightly trimmed the long signature. Click to see the full one.
Re: ARM boot technology going up a notch

Quoted text here. Click to load it

Flash - most controllers have it - and they can boot from that once
the software has been researched and developed and put in.
Boot ROM - many controller can have it and contains the code
developed for or by the customer again after R&D.
That is common practice since whenever.

The next bit is different: Manufacturer puts in boot rom into SoC and
sets aside a pin to allow it boot from SDCard and put in code into
boot rom as part of a documented feature of the SoC.
All their chips are sold with this feature - not custom chips
or specially crafted one offs. So now you can boot
the chip as part of its documented behavior, by setting
one of its pin high and force it to boot from SDCard.

That is a big revolution.
Now you can boot Linux directly off the SDCard
without needing a JTAG debugger.


Quoted text here. Click to load it

?

You would need a booted environment capable of running gdb
and that must surely be best if an SDCard can boot,
and then start up ethernet and then you can go in there through ethernet.

If you make spanking a new card from scratch
and solder this new CPU to brand new card, this boot pin and boot
by SDCard is revolutionary because your Linux on
SDCard can be scripted to do just that and be ready for
incoming ethernet connections without a JTAG device in sight.


Quoted text here. Click to load it


Re: ARM boot technology going up a notch
Quoted text here. Click to load it

Most /microcontrollers/ have flash (there is no strict definition of a
microcontroller - but flash is pretty much a "must have" feature of
modern microcontrollers).  Some SOCs have flash, but many do not.  No
processors have flash.

But virtually all processors are capable of booting directly from NOR
flash - it does not need any sort of software or ROM in the device, just
some default settings for the bus controller and the boot controller.
Booting from NAND, SPI or QSPI flash is a little more difficult, and
/may/ require a simple program in boot ROM, or may be handled directly
in hardware by the flash controller.

Quoted text here. Click to load it

Common practice is that is it developed by the manufacturer, not the
customer.  A customer will only be involved in the development of the
boot rom code if they are getting their own specialised or customised chip.

Quoted text here. Click to load it

This is /exactly/ the same as is done for booting from SPI flash, UARTs,
Ethernet, CAN, USB, etc., etc.  It is not a revolution in any way - it
is the same system as has always been used.

I don't know whether you are totally ignorant of current practices, or
just a sucker for whatever marketing exaggerations you read, but you are
clearly out of your depth talking about these things.

Quoted text here. Click to load it

You are talking from a viewpoint of zero experience and zero knowledge,
and apparently have difficulty with basic reading comprehension.

You  use a low-level bootloader (such as a rom-based UART bootloader) or
a jtag interface to get a Ethernet-capable bootloader into flash.  Then
the processor will boot from that flash bootloader, load the kernel by
TFTP, and off you go.  Everything else is accessed from your server (or
workstation) via NFS (or samba, if you prefer).

There is no need to put an SDCard in your PC, copy files over, move the
card physically to your test board, re-boot from the card, test your
program - and then repeat the whole process for every change and
re-compile.  You work directly.

I'm sure there /are/ developers that have come up with a more convoluted
and time-consuming method than TFTP and NFS over Ethernet, such as using
USB sticks or SDCards, but that is not something a knowledgeable
developer would do.

Quoted text here. Click to load it

It is not revolutionary, because no one has had a problem with this
before.  There are several methods that are as good or better than using
an SDCard in many cases - using JTAG (I don't know what you've got
against it - it is fast, flexible and cheap), using pre-programmed flash
(the standard for large production runs, and by far the fastest method),
using UART boot mode (easy for small production runs), using plug-in SPI
cards (easy for small and medium runs), or using chips that have more
advanced boot modes.  SDCard booting from rom gives another option - but
it is just one more of many options.

Quoted text here. Click to load it


Re: ARM boot technology going up a notch
Quoted text here. Click to load it


<quote>
I imagine you have never had experience of using microcontrollers.

... you just don't know what you are looking for.

Again - you have no idea what you are talking about,

No developer who valued his time would muck around with
copying programs onto an SDCard for development

I don't know whether you are totally ignorant of current practices,

You are talking from a viewpoint of zero experience and zero knowledge,
and apparently have difficulty with basic reading comprehension.
</quote>


Please ignore the idiot troll calling himself  "7". Everybody else realizes
he's a clueless idiot and ignores his nonsense. My sig  summarizes the
complete fraud this "genius" really is. (It's laughable but some in c.o.l.a.
think he's a "genius")


--
"I've done for example SQL optimization and the reason I could do it better
than the best high level experts can do was because I think in hex and bits
We've slightly trimmed the long signature. Click to see the full one.
Re: ARM boot technology going up a notch


Quoted text here. Click to load it

Disciple of Sorel Ezekiel and Hadron are trolling buddies
operated by the same sock operator?

Didn't know that!


Sorel's Burson-Marstelar runs a vast factory manufacturing internet abuse.

If police raided Sorel's internet abuse factories where disciple
Ezekiel works his guts off to scream abuse at usenet users
who use Linux to please his master Sorel, then they would be compelled
by law to take names and addresses of all present, confiscate
all computers and servers, and  contact all victims of internet abuse
and then charge abusers with criminal offenses
as outraged victims of organized internet abuse for money press charges.

From what I hear these criminals from PR companies
like Sorel's Burson-Marstelar now graduate and sneak into charities
to DELIBERATELY siphon money into Sorel's off shored companies.
The Sorel empire is cracking under the weight of 100,000 disciples to feed.

Interpol/FBI where are you when you are needed?


Trolling is an Industry in USA
------------------------------

Hiring trolls is ignorant.

Most US politicians and businesses
are so corrupt and reliant to the point of addiction
on trolls and trolling and so they fund it all illegally
through charities because
funding through charities is untraceable
through loopholes in US law.

The US politicians, embassy staff and anyone else falling for it like
Spanish government should know that the US trolls
ordering embassies to this kind of work
have no mandate for these kinds of activities.

Just rich companies that have bank rolled teams of asstroturfers
to create fake support and certainly no mandate.
Companies like Eedleman also run fake survey companies
and delete everything except outlying data to fake their reports
to add legitimacy to their trolling campaigns.

There is NO MANDATE when fake asstroturfers are driving
the agenda.

The situation is so bad, it has spread into the military.
No one now knows who drives what agenda because
there is no traceability.

The fscking military, politicians, enviro nuts, music mafia,
using asstroturfing technology need the riot act read to them.

The situation is so incomprehensible that
the US has been declared falsely that it is the most charitable nation in
the world when at the same time 3 million US families
are living in shelter, and most of that charity money is fake
money being diverted from corporations into the coffers of asstroturfing
and PR companies. What would you do if you were
forced into a shelter and all your charity
money was stolen from your charity?
You are down and they still want to steal YOUR CHARITY MONEY?!??
Thats right you would tell them NEVER and tell
them fsck off in no uncertain terms and get the law changed
to make it a criminal offense to steal charity money
or spend it on anything other than 100% certified peer revied charity
without kickbacks, without creative accounting and
without morally unjust criminal behavior within
the charity system.

Most of the money funneled through
charities never make it to charitable causes in the USA.
It is stolen by politicians and pressure groups to cover
up their fake funding routes for asstroturfing.
They are used to it so we got to get over it?

No thanks!!!!

Not a single politician, embassy staff or military has a
mandate for one single political agenda because no one
knows who is funding who and who's agenda is real
and whose agenda is fake. Every signature collected
is one more fake signature for a mandate written out by
asstroturfers.

Asstroturfing through charities undermines society,
and all the nations dealing with US
and it must stop because no one in US has any legitimate
mandates for any of this activity any more.

If they have it, then should display their mandate
with pride, and show where the support had come from
and if any of it is through charities, then the
whole mandate is faked because charity status is being
abused to hide funding routes for corporate asstroturfing.



Asstroturfer offerings
----------------------


I've just read the contents of the fbo.gov solicitation RTB220610

The US government wants asstroturfers and with it sophisticated
asstroturfing technology to drown out democratic free speech,
and then hide from those whom it seeks to victimize.

It was point no.3 that caught my eye:
0003- Static IP Address Management

What that means is the same as what I've been saying for a while about
doofi, flatcake and clog are true.

They are not individuals but a whole asstroturfing team
behind each sock puppet.

There isn't enough memory between the sock operators to know
or remember what had been said earlier so you know the
conversations are being typed out by multiple individuals
impersonating each other.
It was notable gaffs by the goofy doofy sock that first gave it away.

The asstroturfing teams had already gone into government and offered them
consulting services about what technology and asstroturfing
practices were out there for fbo.gov to decide what they will
purchase in solicitation RTB220610. Burson-Marstelar
won the contract performing all the activities
required in the solicitation with fantastic usenet software
tools for targeting individuals and trolling 24/7
and all built in outsourced India.


:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D



https://www.fbo.gov/index?s=opportunity&mode=form&id=d88e9d660336be91552fe8c1a51bacb2&tab=core&_cview=1
 
Solicitation Number: RTB220610
Notice Type: Sources Sought
Synopsis: Added: 2010-06-22 13:42:52Jun 22, 2010 1:42 pm
Modified: 2010-06-22  14:07:11Jun 22, 2010 2:07 pmTrack Changes

0001- Online Persona Management Service.

50 User Licenses, 10 Personas per user. Software will
allow 10 personas per user, replete with background,
history, supporting details, and cyber presences
that are technically, culturally and geographically
consistent. Individual applications will enable an
operator to exercise a number of different online
persons from the same workstation and without fear
of being discovered by sophisticated adversaries.
Personas must be able to appear to originate in
nearly any part of the world and can interact through
conventional online services and social media platforms.
The service includes a user friendly application
environment to maximize the user's situational
awareness by displaying real-time local information.

 
0002- Secure Virtual Private Network (VPN).

1 each VPN provides the ability for users to
daily and automatically obtain
randomly selected IP addresses through
which they can access the internet. The daily
rotation of the user s IP address prevents compromise
during observation of likely or targeted web sites
or services, while hiding the existence of the
operation. In addition, may provide traffic mixing,
blending the user s traffic with traffic from multitudes
of users from outside the organization. This traffic
blending provides excellent cover and powerful deniability.
Anonymizer Enterprise Chameleon or equal

 
0003- Static IP Address Management.


:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D


50 each Licence protects the identity of government
agencies and enterprise organizations. Enables organizations
to manage their persistent online personas by assigning
static IP addresses to each persona. Individuals
can perform static impersonations, which allow
them to look like the same person over time. Also allows
organizations that frequent same site/service often to
easily switch IP addresses to look like ordinary
users as opposed to one organization.
Anonymizer IP Mapper License or equal

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

 
0004- Virtual Private Servers,

CONUS. 1 each Provides CONUS or OCONUS points of
presence locations that are setup for each customer
based on the geographic area of operations the
customer is operating within and which allow a
customer?s online persona(s) to appear to originate
from. Ability to provide virtual private servers that
are procured using commercial hosting centers around
the world and which are established anonymously. Once
procured, the geosite is incorporated into the network
and integrated within the customers environment and
ready for use by the customer. Unless specifically
designated as shared, locations are dedicated for use
by each customer and never shared among other customers.
Anonymizer Annual Dedicated CONUS Light Geosite or equal

 
0005- Virtual Private Servers, OCONUS.

8 Each Provides CONUS or OCONUS points of presence
locations that are setup for each customer based on
the geographic area of operations the customer is
operating within and which allow a customer?s
online persona(s) to appear to
originate from. Ability to provide virtual private
servers that are procured using commercial hosting
centers around the world and which are established
anonymously. Once procured, the geosite is incorporated
into the network and integrated within the customers
environment and ready for use by the customer. Unless
specifically designated as shared, locations are dedicated
for use by each customer and never shared among other
customers. Anonymizer Annual Dedicated OCONUS Light
Geosite or equal

 
0006- Remote Access Secure Virtual Private Network.

1 each Secure Operating Environment provides a reliable
and protected computing environment from which to stage
and conduct operations. Every session uses a clean
Virtual Machine (VM) image. The solution is accessed
through sets of Virtual Private Network (VPN) devices
located at each Customer facility. The fully-managed
VDI (Virtual Desktop Infrastructure) is an environment
that allows users remote access from their desktop into
a VM. Upon session termination, the VM is deleted and
any virus, worm, or malicious software that the user
inadvertently downloaded is destroyed. Anonymizer
Virtual Desktop  Infrastructure (VDI) Solution or equal.


Contracting Office Address:
 2606 Brown Pelican Ave.
 MacDill AFB, Florida 33621-5000
 United States
 Place of Performance:
 Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq.
 MacDill AFB , Florida 33679
 United States
 
Primary Point of Contact.:
 Russell Beasley,
 Contracting Officer
  snipped-for-privacy@macdill.af.mil
 Phone: (813) 828-4729
 Fax: (813) 828-5111


Re: ARM boot technology going up a notch


Quoted text here. Click to load it


Well read it again fool!


Sorel's Burson-Marstelar runs a vast factory manufacturing internet abuse.

If police raided Sorel's internet abuse factories where disciple
Ezekiel works his guts off to scream abuse at usenet users
who use Linux to please his master Sorel, then they would be compelled
by law to take names and addresses of all present, confiscate
all computers and servers, and  contact all victims of internet abuse
and then charge abusers with criminal offenses
as outraged victims of organized internet abuse for money press charges.

From what I hear these criminals from PR companies
like Sorel's Burson-Marstelar now graduate and sneak into charities
to DELIBERATELY siphon money into Sorel's off shored companies.
The Sorel empire is cracking under the weight of 100,000 disciples to feed.

Interpol/FBI where are you when you are needed?


Trolling is an Industry in USA
------------------------------

Hiring trolls is ignorant.

Most US politicians and businesses
are so corrupt and reliant to the point of addiction
on trolls and trolling and so they fund it all illegally
through charities because
funding through charities is untraceable
through loopholes in US law.

The US politicians, embassy staff and anyone else falling for it like
Spanish government should know that the US trolls
ordering embassies to this kind of work
have no mandate for these kinds of activities.

Just rich companies that have bank rolled teams of asstroturfers
to create fake support and certainly no mandate.
Companies like Eedleman also run fake survey companies
and delete everything except outlying data to fake their reports
to add legitimacy to their trolling campaigns.

There is NO MANDATE when fake asstroturfers are driving
the agenda.

The situation is so bad, it has spread into the military.
No one now knows who drives what agenda because
there is no traceability.

The fscking military, politicians, enviro nuts, music mafia,
using asstroturfing technology need the riot act read to them.

The situation is so incomprehensible that
the US has been declared falsely that it is the most charitable nation in
the world when at the same time 3 million US families
are living in shelter, and most of that charity money is fake
money being diverted from corporations into the coffers of asstroturfing
and PR companies. What would you do if you were
forced into a shelter and all your charity
money was stolen from your charity?
You are down and they still want to steal YOUR CHARITY MONEY?!??
Thats right you would tell them NEVER and tell
them fsck off in no uncertain terms and get the law changed
to make it a criminal offense to steal charity money
or spend it on anything other than 100% certified peer revied charity
without kickbacks, without creative accounting and
without morally unjust criminal behavior within
the charity system.

Most of the money funneled through
charities never make it to charitable causes in the USA.
It is stolen by politicians and pressure groups to cover
up their fake funding routes for asstroturfing.
They are used to it so we got to get over it?

No thanks!!!!

Not a single politician, embassy staff or military has a
mandate for one single political agenda because no one
knows who is funding who and who's agenda is real
and whose agenda is fake. Every signature collected
is one more fake signature for a mandate written out by
asstroturfers.

Asstroturfing through charities undermines society,
and all the nations dealing with US
and it must stop because no one in US has any legitimate
mandates for any of this activity any more.

If they have it, then should display their mandate
with pride, and show where the support had come from
and if any of it is through charities, then the
whole mandate is faked because charity status is being
abused to hide funding routes for corporate asstroturfing.



Asstroturfer offerings
----------------------


I've just read the contents of the fbo.gov solicitation RTB220610

The US government wants asstroturfers and with it sophisticated
asstroturfing technology to drown out democratic free speech,
and then hide from those whom it seeks to victimize.

It was point no.3 that caught my eye:
0003- Static IP Address Management

What that means is the same as what I've been saying for a while about
doofi, flatcake and clog are true.

They are not individuals but a whole asstroturfing team
behind each sock puppet.

There isn't enough memory between the sock operators to know
or remember what had been said earlier so you know the
conversations are being typed out by multiple individuals
impersonating each other.
It was notable gaffs by the goofy doofy sock that first gave it away.

The asstroturfing teams had already gone into government and offered them
consulting services about what technology and asstroturfing
practices were out there for fbo.gov to decide what they will
purchase in solicitation RTB220610. Burson-Marstelar
won the contract performing all the activities
required in the solicitation with fantastic usenet software
tools for targeting individuals and trolling 24/7
and all built in outsourced India.


:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D



https://www.fbo.gov/index?s=opportunity&mode=form&id=d88e9d660336be91552fe8c1a51bacb2&tab=core&_cview=1
 
Solicitation Number: RTB220610
Notice Type: Sources Sought
Synopsis: Added: 2010-06-22 13:42:52Jun 22, 2010 1:42 pm
Modified: 2010-06-22  14:07:11Jun 22, 2010 2:07 pmTrack Changes

0001- Online Persona Management Service.

50 User Licenses, 10 Personas per user. Software will
allow 10 personas per user, replete with background,
history, supporting details, and cyber presences
that are technically, culturally and geographically
consistent. Individual applications will enable an
operator to exercise a number of different online
persons from the same workstation and without fear
of being discovered by sophisticated adversaries.
Personas must be able to appear to originate in
nearly any part of the world and can interact through
conventional online services and social media platforms.
The service includes a user friendly application
environment to maximize the user's situational
awareness by displaying real-time local information.

 
0002- Secure Virtual Private Network (VPN).

1 each VPN provides the ability for users to
daily and automatically obtain
randomly selected IP addresses through
which they can access the internet. The daily
rotation of the user s IP address prevents compromise
during observation of likely or targeted web sites
or services, while hiding the existence of the
operation. In addition, may provide traffic mixing,
blending the user s traffic with traffic from multitudes
of users from outside the organization. This traffic
blending provides excellent cover and powerful deniability.
Anonymizer Enterprise Chameleon or equal

 
0003- Static IP Address Management.


:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D


50 each Licence protects the identity of government
agencies and enterprise organizations. Enables organizations
to manage their persistent online personas by assigning
static IP addresses to each persona. Individuals
can perform static impersonations, which allow
them to look like the same person over time. Also allows
organizations that frequent same site/service often to
easily switch IP addresses to look like ordinary
users as opposed to one organization.
Anonymizer IP Mapper License or equal

:-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D :-D

 
0004- Virtual Private Servers,

CONUS. 1 each Provides CONUS or OCONUS points of
presence locations that are setup for each customer
based on the geographic area of operations the
customer is operating within and which allow a
customer?s online persona(s) to appear to originate
from. Ability to provide virtual private servers that
are procured using commercial hosting centers around
the world and which are established anonymously. Once
procured, the geosite is incorporated into the network
and integrated within the customers environment and
ready for use by the customer. Unless specifically
designated as shared, locations are dedicated for use
by each customer and never shared among other customers.
Anonymizer Annual Dedicated CONUS Light Geosite or equal

 
0005- Virtual Private Servers, OCONUS.

8 Each Provides CONUS or OCONUS points of presence
locations that are setup for each customer based on
the geographic area of operations the customer is
operating within and which allow a customer?s
online persona(s) to appear to
originate from. Ability to provide virtual private
servers that are procured using commercial hosting
centers around the world and which are established
anonymously. Once procured, the geosite is incorporated
into the network and integrated within the customers
environment and ready for use by the customer. Unless
specifically designated as shared, locations are dedicated
for use by each customer and never shared among other
customers. Anonymizer Annual Dedicated OCONUS Light
Geosite or equal

 
0006- Remote Access Secure Virtual Private Network.

1 each Secure Operating Environment provides a reliable
and protected computing environment from which to stage
and conduct operations. Every session uses a clean
Virtual Machine (VM) image. The solution is accessed
through sets of Virtual Private Network (VPN) devices
located at each Customer facility. The fully-managed
VDI (Virtual Desktop Infrastructure) is an environment
that allows users remote access from their desktop into
a VM. Upon session termination, the VM is deleted and
any virus, worm, or malicious software that the user
inadvertently downloaded is destroyed. Anonymizer
Virtual Desktop  Infrastructure (VDI) Solution or equal.


Contracting Office Address:
 2606 Brown Pelican Ave.
 MacDill AFB, Florida 33621-5000
 United States
 Place of Performance:
 Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq.
 MacDill AFB , Florida 33679
 United States
 
Primary Point of Contact.:
 Russell Beasley,
 Contracting Officer
  snipped-for-privacy@macdill.af.mil
 Phone: (813) 828-4729
 Fax: (813) 828-5111


Re: ARM boot technology going up a notch
Quoted text here. Click to load it

Sometimes I think that with patience and logical argument, it is
possible to teach posters like 7 a little.  I know it's na´ve, and it
doesn't seem to have worked very well here, but I can't resist trying on
occasion.  I also can't help thinking that other people might read the
posts, or find them out-of-context on google, and if no one corrected
the OP, people might think he was correct.


Re: ARM boot technology going up a notch

Quoted text here. Click to load it

Yea, I remember when I first started reading Usenet. :) That must have
been almost 25 years ago.  That was back before "The Internet".  Our
news server had a bank of modems and we still used uucp for e-mail
transport.

Quoted text here. Click to load it

It's also sort of fun...

--
Grant Edwards               grant.b.edwards        Yow! And furthermore,
                                  at               my bowling average is
We've slightly trimmed the long signature. Click to see the full one.
Re: ARM boot technology going up a notch
Quoted text here. Click to load it

I'm a slow learner (I've only been using Usenet for 20 years).

Quoted text here. Click to load it

You spotted my true motives :-)  Normally I try to be polite, but
sometimes there is great pleasure in insulting someone who deserves it.

Re: ARM boot technology going up a notch

Quoted text here. Click to load it

At least he's not a filthy lying Wintroll, spewing idiocy and lies in
a Linux advocacy group, like you and your pals, "Ezekiel".

--
"So sentient human beings should have their freedom restricted so that
some bits on a disk somewhere (source code) can have freedom instead."
We've slightly trimmed the long signature. Click to see the full one.
Re: ARM boot technology going up a notch
Quoted text here. Click to load it

Oh lord, he's back like clockwork and it goes on and on with him.

Re: ARM boot technology going up a notch

Quoted text here. Click to load it


You are an absolutely fscked up stupid troll infecting newsgroups.

I await anxiously for you to name a couple of off the shelf chips
with clearly downloadable datasheets that clearly proves
each of your point - SPI flash, UARTs, ethernet, CAN, USB, etc..etc
booting without purchasing a JTAG debugger to program
in the boot loader.



Quoted text here. Click to load it


Re: ARM boot technology going up a notch
Quoted text here. Click to load it

I'll give you one example - the TI OMAP 3515.  This is an Arm Cortex-A8
device that has been available for nearly 3 years.

You can find the technical reference manual quickly and simply from the
TI web site.

Boot options are "execute in place" memory (typically NOR flash),
DiskOnChip, NAND flash of various types, Uart, USB and - wait for it -
booting directly from MMC cards or SD flash cards.

So not only is booting from an SD card /not/ any sort of revolution, it
is not even new.

That was just the first example I looked at.  If you want to find other
chips, look them up yourself - or arrange a consultancy contract with my
employer.



Re: ARM boot technology going up a notch

Quoted text here. Click to load it

Which is nothing as CPUs have been around for decades.

Quoted text here. Click to load it


So you learned to read my post!!!
 Date: Sunday 05 August 2012 13:06:23
 ++++++++++
 It is revolutionary - not many have it with the booting features
 enabled on virgin chips leaving the factory.
 Reading the forums, I only come across second hand info
 that the A10 and may be some TI/NXP chips as having it.
 The tech specs seem to be a closely guarded
 secret so still hunting for details.
 Why they are hiding the info I don't understand because
 all it does is hold back the sale of their own chips!!


As I told you it hardly common except in a very rare
set of CPUs. Outliers like high priced $40 SoCs like TI OMAP 3515
or CPUs with software written to it by third parties don't count towards
creating a revolution.
But low priced, high feature SoC costing $10 and readily
available like A10 are sporting it which is why
it is such a big big revolution.

It puts Linux within the reach of anyone with soldering
capability to boot Linux without having to buy a JTAG
programmer.



Site Timeline