I haven’t posted anything here in a while, so to kick off 2016, here is a leaked photo of a Core i9 engineering sample. In late 2009 the Gulftown prototypes were still known as Core i9. During 2010 Intel branded the retail hexa-core chips Core i7 Extreme, the same as the Bloomfield quad-core chips.
Early Intel processor roadmaps and tech journalists sometimes referenced these chips as “Core i9” too:
The reasons? The good yield and clock speeds are obvious, and so is the benefit of selling high-end, high-margin parts earlier. After all, the initial Core i9 XE series desktop Gulftowns and “Westmere-EP” dual processor workstation and server Gulftowns will most likely sell in the $600 to $1,600 price range, if they follow the present LGA1366 CPUs. There will be no equivalent of the cheap Core i7 920 here this time, as the simpler LGA1156 CPUs have taken the mainstream role, even in Xeon UP servers.
Here’s a boot screen for Windows Neptune I made in April. You can use it by replacing the stock Neptune boot screen in NTOSKRNL.exe with resource hacker. I believe I setup the colour palette so green is the progress bar colour. I’ve had to use a PNG for the preview (It’s a WordPress platform limitation) but the BMP can be found here: http://imgur.com/nkqAc31
UPDATE: I’ve fixed the imgur link to show an updated bitmap which doesn’t show corruption when resource hacked into NTOSKRNL.exe and NTKRNLMP.exe. The original bitmap I shared was a prototype with corruption in it’s rendering due to a broken colour palette.
Back in 2012 I was playing around with overclocking my MSI Pro266TD Master-LR motherboard with two Pentium 3-S Tualatin 1.4GHz (SL6BY). It is running a custom BIOS which enables large hard drive support, obtained from a computer forum years ago. Although the BIOS allows FSB adjustments up to 166MHz (stock 133MHz), there is no voltage adjustment options.
Back in those days I was unaware I could bump up the CPU V-Core with a thin piece of copper wire wrapped around a couple of the VID pins. Instead, I could only get the computer to boot at the maximum 166MHz FSB setting about 10% of the time – otherwise it wouldn’t post at all.
Yesterday I noticed one of the Terminal Servers (Windows Server 2008 R2) I monitor was experiencing high disk queue length (essentially the hard disk was being thrashed) by the ten-or-so users logged on. CPU and memory utilisation were in normal ranges – in fact: there was plenty of memory to spare.
The extra memory available was due to a recent upgrade because the client was running out of memory, causing extra disk paging and slowing down the entire terminal server. Originally I wanted to suggest an SSD upgrade for their hard disk RAID1 array, but decided with the following approach instead.
I set the page file size from system managed (which was 16GB-24GB of memory) to a set size of 4GB. I chose this size rather than something smaller like 1GB because the users frequently run QuickBooks, large Excel spread sheets, a large Access database and large PDF files in Adobe Reader. The users also run the usual, modern, gluttonous web browsers.
After a reboot I observed almost no disk thrashing and the hard disk queue length was reduced tenfold. What I’d done was force the system to use more of its memory it had available. A colleague of mine has since implemented this “trick” on another client’s terminal server with success.
This concludes my brief support article. If this article has helped you, please let me know in the comments section below.
Recently I had to deal with a situation where a network engineer had mistakenly right clicked on a user mailbox in the Exchange 2013 EAC (Exchange Admin Center) and chosen disable. This seemed to hide the mailbox. The mailbox couldn’t be found through Advanced Search and was essentially missing by all means. In actual fact, doing this queues the mailbox for deletion.
Fortunately there’s a default retention period of 30 days. If you’ve accidentally disabled a mailbox (as it’s kind of mislabeled), follow these steps to correct the issue:
In the EAC, navigate to Recipients > Mailboxes.
Click More , and then click Connect a mailbox.
A list of mailboxes that are disconnected on the selected Exchange server in your Exchange organization will be displayed. This list of disconnected mailboxes includes disabled mailboxes, deleted mailboxes, and soft-deleted mailboxes.
Click the deleted mailbox that you want to connect a user to, and then click Connect.
In the window that asks if you’re sure that you want to connect the mailbox, click Yes.
A list of user accounts that aren’t mail-enabled is displayed.
Click the user that you want to connect the deleted mailbox to, and then click OK.
Exchange will connect the deleted mailbox to the user account that you selected.
By default Exchange will prompt you to attach the mailbox to the user account it was deleted from. I believe it will only do this if another mailbox hasn’t since been attached so it’s still available for selection.
If this article has helped you, please let me know in the comments section below. This concludes my brief support article.
This is how NSA total access was built into Microsoft Windows. First, a little background on the topic:
On the 24th of August 1996, Microsoft released “Detroit” – more commonly known as Windows 95 B or Windows 95 OSR2 (OEM Service Release 2). This updated version of Windows 95 contained a host of exciting new features not present in the original release (Codename Chicago) a year earlier.
Windows 95 B ran atop the updated version of MS-DOS 7.1 and included DirectX 2.0a, DriveSpace 3 and controversially integrated Internet Explorer version 3.0 into the operating system. In the original release of Windows 95 A, Internet Explorer was entirely absent but the end user could install it at their peril.
Windows 95 B also drastically improved hardware support. The FAT32 file system allowed for larger hard disks, partitions and file sizes than the original FAT file system did. Infrared connectivity between laptops and FireWire connections to digital imaging devices was now possible. Continue reading →
According to science, the laws of physics dictating the interaction between all the energy and matter in the universe are set in stone. If we assume this to be correct, there is no randomness in the universe, only an unpredictable timeline set into motion by the big bang.
Every subatomic particle is following a predetermined path through time and space, as the laws of physics state they must.
At no level is any object or event outside the influence of these laws. Everything that has ever existed or will exist is ultimately inevitable.
The laws of physics govern the subatomic particles of atoms in chemistry. Molecules in chemistry govern evolution and behaviour in biology. Are we humans simply conscious pawns played by the physical laws? Are we without free will?
This is a deep subject with many philosophical arguments. One thing is for sure though; some series of events has led to the creation of this blog and brought you here to read it.