

Oops, my mistake
Apology accepted. Have a great day!


Oops, my mistake
Apology accepted. Have a great day!


Read my prior post, I specifically SAID it was a model number.
You’re embarrassing yourself with your pedantry. You said 80486 didn’t exist. It did. Seriously, quit while you’re behind here.


Such a confident answer! And so incorrect too!



Honestly, we know where the root of this problem came from. Back in the 1990s Intel broke with convention of using ever increasing numeric model numbers
Intel didn’t like that other CPU manufacturers of x86 CPUs (AMD, Cyrix, IBM) could use the same numbering scheme. So Intel created “Pentium” because it could be copyrighted/trademarked so other companies couldn’t use it.


That’s my bad for not remembering AMD’s fucking atrocious nonstandard mobile chip naming schemes.
Atrocious compared to Intel? The first CPU with the name Core i7 was released in 2008, but Intel is still releasing a CPU named Core i7 as recently as 2023. They both suck, but in different ways.


I’m not sure we can use the “Windows x86 vs Windows ARM” analog for this new unit from Apple. MacOS Tahoe is a native ARM OS on both the high end and now this low end unit. With Windows its a completely different CPU architecture.
Apple has to know this is going to cannibalize its low end (8GB/256GB SSD) Macbook Air line. So will Apple discontinue the low config Air or is there some other differentiator that still makes the low config Air compelling?


If its the full macOS, I don’t think we can say that. That’s what makes this so interesting as it is a first of its kind.
Now, if it performs like a dog compared to an equivalent spec M3 or M4 Macbook Air, then we probably could call it a glorified tablet.


Especially when they’re using it as a defense to use racial slurs in a Wal-Mart on a Saturday afternoon.


Tried the same thing in Asahi but without macOS’ memory management and access to GPU acceleration, it just wasn’t feasible.
Thank you for sharing this result. I knew Asahi’s memory management wasn’t as robust (so I got a 24GB RAM M2 unit to overcome this).
For your macOS Ollama implementation are you able to leverage the NPU in the hardware (which I know is also unavailable so far in Asahi)?


This was my first question. This laptop looks like a really strange bird from the hardware point of view. It runs OSX (Tahoe), but uses an iPhone/iPad CPU (not an M1 or M2 CPUs that Asahi runs on today).


Powered by A18 Pro
Completing the MacBook Neo experience is macOS Tahoe
Woah, this is new! A version of Mac OSX running on a iPhone/iPad CPU.


What was once old is new again!


I mean good-ish in the lesser-evil type of thing. I don’t expect any of those to be 100% ethical but there are some that are a lot worse than others
Ethics are subjective. “Good-ish” to you may mean you’re fine if its trained on copyrighted works as long as it wasn’t done with electricity from diesel generators belching exhaust into the local Memphis atmosphere (I’m looking at you Grok). Llama doesn’t do the diesel generator thing, but its a product of Facebook corporation. So is that “good-ish” to you or not? I don’t know. That’s up to you.
It may not be fast, but your i3 laptop with 12GB of system RAM can absolutely run a local LLM. This is where that “performance/accuracy” question I raised comes in. It won’t be very fast, and you won’t be able to run the most common large models like GPT-5 etc. However, if your needs are light, light models exist. Give this a read


Depends on your definition of “good-ish”. Do you mean:
Running one locally on your own hardware would likely reach “good-ish” with some sacrifices against performance/accuracy (unless you’ve got a lot of expensive hardware to run very large models). As far as ethical origins, there are few small models trained on public domain/nonstolen content, but their functions are far more limited.


Someone see if “Micros|op” (with the pipe character) or “MicrosIop” (with a capital letter i) is also blocked.


There are some multi-user aspects to LORD (Legend of the Red Dragon). You can trade and communicate with other players through turn based messages (like mail). Additionally you can attack other players that are not staying at an inn, or be attacked yourself by other players (PvP). This is available in addition to the PvE content (leveling up to go after the Red Dragon).
Because its turn based, you can attack in your turns, and instantly see the outcome of the offline player. The computer plays their part in battle so you can choose to try to finish the battle or try to flee if you are getting your ass handed to you. As a defending player you’re not there for the battle so you log in you see the transcript of what happened along with your fate and that of the other named player. Its surprisingly exciting even reading it after the battle!


Lots of folks here are making good recommendations. Don’t forget some of the OG MUDs like Legend of the Red Dragon. There are quite a few internet accessible BBSes still running the classic game.
I like that it has an exhaustion component to the gameplay that only lets you do a few actions a day (that you can do in as short as 5 min if you want). This means you’ll never find yourself too deep in the game because you’ll have to wait until tomorrow for more turns. It also gives you something to look forward to the next day to see what happened in your absence between daily turns.


Hoping JTS that green cap and not the 4050 chip…
That green cap I think is a mylar capacitor and will cost you maybe 5 cents at retail (and .00001 cents in bulk).
That 4050 is also dirt cheap. Maybe 50 cents to $1 USD at retail. You’ll pay more in shipping costs than for the part. Today’s CMOS ICs are a bit more robust against static discharge than those made in the 1980s, but don’t risk it when you do the replacement. Make sure you use a grounding wrist strap or the like when you desolder the old 4050 and put in the new 4050, partially to protect the 4050 but really to protect that CPU which will probably cost you closer to $11-$20 (just a guess) to replace if it dies.


I’ve never worked on Atari consoles but you got me curious.
I did a Google search for schematics, not surprising, found many variants. So I don’t know if this one is your board, but here’s the schematic for one with some of my colored markup:

In working operation the Red arrow is apparently the “fire” button on the joystick and to activate the function, pressing the fire button ties Pin 6 to Pin 8 (blue arrow). Pin 6 is normally pulled down (to ground) by that circuit I have circled in dark red. Pin 8 has 5v+ generated by part I have circled in magenta. So pressing the button sends 5v+ first through that dark blue circled area which I think its doing some debouncing (cleaning up noise preventing accidental quick/up/down/up/down in the micro seconds of the fire button is pressed). If any of those capacitors or that diode is shorted, it would send 5v+ constantly “holding down” the fire button.
Assuming all of that is fine, the next area I’d look at would be that dark red circled area. This is where the pull down to ground comes from making sure pin 6 is low and the fire button is “off” or “not pressed” if any of this is floating, it could show up as “not ground” and the main IC would think the button is pressed.
Next would be the those 4050 ICs circled in green. These are CMOS buffers and CMOS ICs ARE EXTREMELY VULNERABLE TO STATIC DISCHARGE. Their job is just to take an input of some voltage and output a single clean digital signal of either 1 or 0. There is one buffer for each fire button (left and right joysticks).
Finally the fire button output of that 4050 buffer is delivered in to the main CPU that A201 TIA PAL (my schematic may be from a European model).
If you had this disassembled on a bench and had a voltmeter, you could get a good idea of where the problem is in about 10 minutes.
They could be blocking entire IP ranges. So they wouldn’t have to store specific IPs. I’m not in the hosting industry but I would imagine there are groups tracking the CIDR blocks (IP ranges) that VPN providers use for their exit nodes. If such a list exists, a host could simply subscribe to accept whatever updates occur to those lists and implement the block for them.