I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.

  • 0 Posts
  • 858 Comments
Joined 3 years ago
cake
Cake day: June 29th, 2023

help-circle
  • Are you sure it was dot pitch and not dot clock?

    Dot pitch on a crt might make the image look bad (trying to draw onto the shadow mask) but I doubt it would damage it.

    Setting an invalid dot clock could damage some crts. But most of the modern (read from mid 90s on) would just go to the power save mode when they got a clock they couldn’t use. The warning did still remain on the xfree86 configuration guides though.

    Showing my age perhaps.







  • I think my question on all this would be whether this would ultimately cause problems in terms of data integrity.

    Currently most amplifiers for digital information are going to capture the information in the light, probably strip off any modulation to get to the raw data. Then re-modulate that using a new emitter.

    The advantages of doing this over just amplifying the original light signal are the same reason switches/routers are store and forward (or at least decode to binary and re-modulate). When you decode the data from the modulated signal and then reproduce it, you are removing any noise that was present and reproducing a clean signal again.

    If you just amplify light (or electrical) signals “as-is”, then you generally add noise every time you do this reducing the SNR a small amount. After enough times the signal will become non-recoverable.

    So I guess my question is, does the process also have the same issue of an ultimate limit in how often you can re-transmit the signal without degradation.


  • Pretty sure this was made clear in the article but… I’ll outline the little I know on the subject as a complete layman.

    Currently we have been able to use quantum effects to create single runs of fibre that cannot be intercepted. That is, if the data is intercepted by any known means the receiver will be able to detect this.

    The shortcoming of this method, is that of course when you need to amplify the signal, that’s generally a “store and forward” operation and thus would also break this system’s detection. You could I guess perform the same operation wherever it is amplified, but it’s then another point in which monitoring could happen. If you want 1 trusted sender, 1 trusted receiver and nothing in between, this is a problem.

    What this article is saying, is they have found a way to amplify the information without ever “reading” it. Therefore keeping the data integrity showing as “unseen” (for want of a better word). As such this will allow “secure” (I guess?) fibre runs of greater distances in the future.

    Now the article does go into some detail about how this works and why. But, for the basic aspect of why this is a good and useful thing. This is pretty much what you need to know.










  • Yep, same. Well I actually remember finding the best ways to copy a game on a tape error free first. Some, without protection you could just save back to tape for a digital reproduction (and this also allowed tape to disk conversion). Actually those with non destructive copy protection could kinda be copied too if you knew a little Z80 ASM. Others, you needed to copy tape to tape and hope the quality turned out OK.

    But yes, then bringing your box of copied disks (Amiga in my case) into school and swapping with your friends was the way to go.