Server indexes of places for newcomers to join can be instrumental for Fediverse adoption. However, sudden rule changes can leave some admins feeling pressure to change policies in order to remain listed.
But you’re giving Meta the same selling point, right? Join Threads and see all the same content. There’s no point in going elsewhere then. It kinda goes both ways.
Somewhat yes
I think Threads doesn’t need that selling point because of the other advantages that it has
I find that when X defederates with Y, and people want to see all the content, all else being equal they will pick Y. Usually that means that Y = “We are happy to have X, but they chose to leave”
We saw a bit of that last July for how some people picked Lemmy instances
when X defederates with Y, and people want to see all the content, all else being equal they will pick Y
Hmmm maybe? But I think that’s a misunderstanding from a lot of users. You don’t want to see all content, trust me. Defederating is not necessarily bad. In most cases, it’s healthy.
Same honestly. And if I ever ask a question that someone might think is a duplicate, I link to that question and say something like “I found X, but the answers here don’t reflect Y”.
Absolutely true, but it’s also more difficult to ask a good question when you don’t know anything about what you’re asking.
People who know a lot about a topic can ask very good questions about that topic.
The problem I see with most questions people post online is that they make too many assumptions that their audience will will magically understand the context of their question.
Good questions require relevant context.
Determining relevancy requires expertise.
Expertise comes from experience.
No matter how many questions you ask and answers you get you’ll never “understand” something until you do it.
Instead of asking questions like “How do I do X?” people should be asking “I’m trying to accomplish X, I’ve tried Y, but I’m encountering Z. How could I resolve this?”
I guess my rule is that you should never ask someone a question without first trying to answer it yourself.
I kinda feel like there’s very little overlap between distro fans and distro developers. Probably because distro devs tend to know all the dirty secrets of their distro.
You go on Reddit or wherever and it’s all “distro X is evil, use distro Y instead,” “No, Y is terrible! Use Z!” And then you sit at a table with a SuSE developer, a Fedora developer and an Ubuntu developer and the conversation is all “so how are you guys dealing with this issue?” “Oh, I think we came up with a great solution, I’ll share the patch set with you!” “Wonderful, thanks! By the way I opened up a merge request on your stuff because we figured out how to fix that namespaces issue.”
We all subjectively are more used to our scales, and what numbers mean “very hot” and “very cold” are very varied based on your physiology, adaptation to the climate and the relative humidity.
For water, however, freezing pretty bang on zero (slight variation due to pressure), and you get enough days below zero water of different amounts will start freezing. Which I’d argue is an objective benefit over Fahrenheit for weather. Water freezing at zero is a useful distinction.
Negative? Freezing. Looks great on a graph with an X axis for time and y for temp. To get the equivalent nice graph in Fahrenheit gotta put a line at whatever weird number lines up with freezing.
A random city which I thought may be dipping below zero. That’s interesting, there’s a line at freezing, almost like that’s useful or something.
Putting a line that’s not zero, look at what Fahrenheit needs to do to mimic a fraction of our power!
You comprehend ingredients and have enough of a grip on pronunciation rules to form basic statements you need on a day to day “en tarjeta” means (literally) “on card” and is a common way to ask to pay with a credit card “auga” is water and “sin gas” or “con gas” specifies flat or bubbly… “necesito un bolsa” - I need a bag… “Para aqui”/“Para llevar” are for here or to go… “Cuanto Cuesta X” - How much does X cost… “Donde son los aesos” - where are the bathrooms. “Queiro un cafe con leche de avena y dos fartóns” - I’d like a latte with oat milk and two fartóns (a light sweet pastry). That “ll” is pronounced like a “y” unless it’s catalan and you have a break dot like “paral•lel”. “Buena dia”/“Bon dia” - Good day. “Peligro” - danger.
That sort of basic shit - you’ll pick it up quickly. You won’t be able to talk about news and shit but you can do your daily shit.
A group of Korean researchers, known for its controversial claim of creating the room-temperature superconductor LK-99, has newly unveiled its discovery of a new superconductor.
When the variable name is the description that should be in the comments.
Idea: Comments that automattically populate the end of any line a given variable is invoked on, including spelling out formulas from that line. ie: float y=mx+b // (cartesian y value)=(slope)(cartesian x value)+(cartisian y-intercept)
“Duplicated” coments not actually in the file, but specified witt the creation of such variables and spread around by the code editor /IDE.
I write python in shell. Literally. I made a shell function file (pnk.lang) that prints correct python code. The capital letters in the shell function’s name, my Tkinter IDE turns into color as you see above. So I let the color (capital letter) abstract away indentation for my brain. The second letter is for category of python code according to me. Again using color to allow me to think. I dont like Python syntax. I looks ugly to me. So I made this tool to make coding colorful, succint and fun for me. It reduces my eye strain among many other personal benefits.
Moved to a new team, former boss was frustrating, to say the least. Great company on the whole. Maybe I’m an idiot?
Pinged tonight by my new manager, who is on PTO but kinda half-ass working anyway. Some shit, “When I get back.” Other shit, “Do this now.”
“Updated user account per his manager.”
“Told you not to touch that till I get back.”
“You updated the tracking sheet saying do this thing.”
Fuck me. I can’t keep up with conflicting verbal orders, ticket orders, Slack orders, and Jira orders. Am I supposed to provide a fucking timeline as to what was ordered at what date and time?!
“Also the list in that email, go ahead and make all of the users except $X and $Y as regular users.”
“Uh, no warning?”
“No need to update the sheet at this moment. I will deal with the people on the list when I am back.”
Done. And still working on it. Now I have no idea whether to continue.
EDIT!: Boss was wrong a fully apologized! He’s gotta stop half-assing being on PTO and trying to work anyway.
Everything you mentioned about the Tesla vehicle issues is largely inaccurate. It’s not your fault, because there’s been a ton of sensationalized stories and misinformation thrown out there about them. Full disclaimer: I do own a 2020 Tesla Model 3 and love it. It’s not a perfect vehicle by any means, but it’s a whole lot of car for what I paid, and it’s required almost no maintenance or attention from me over the past 4yrs beyond rotating and changing tires. I don’t like Elon Musk and think he’s a giant tool/lunatic in so many ways, but Tesla makes pretty damn solid cars despite him. I wish they’d get rid of him, though I bet he has a controlling/majority share unfortunately. I bought my Tesla before he became a huge raging asshole on public platforms, and that definitely contributes to hesitation at buying another in the future (though that’s several years out anyway).
The emergency door release in the front doors on a Tesla is a simple latch mechanism easily accessible right underneath the digital button door handle. It’s actually so easy to access that it’s extremely common for people new to the vehicles to pull that manual release instead of using the button to open the door. This is true for all Model 3 and Model Y vehicles, and newer Model X and Model S vehicles. On older Model S and X vehicles that have the pull handles, the manual release is the same as the digital release. It’s only the rear passenger doors that have more obscure manual releases, presumably so children can’t bypass the child lock easily. That process varies by model, but none of them require any door panel disassembly. You can see most of the methods in this video. It’d be nice if this process were more standardized across models, though, and it could be made more clear for any passengers not familiar with the car they’re in for sure.
The glass isn’t anything different from what every other auto manufacturer is using on vehicles. Glass used in car doors is tempered and will completely shatter into thousands of tiny, mostly harmless pieces upon precise impact on a point, but will resist shattering from blunt hits. More “luxury” vehicles use laminated glass on the doors that does not immediately fully shatter even from precise pointed hits, but once a small shatter has been created, the glass can then be pushed out/in relatively easily. See the link above again, as they also go over this.
All of the newer models do still have a manual shifter, but it’s definitely not traditional (none of their shifters have been fully traditional in the first place, though). They’re now all P/N/D/R buttons, either up near the rear view mirror or down on the center console. The preferred method of shifting on these newer models, however, is using the touch screen - but it’s probably not how you’re thinking. The side of the touch screen closest to the driver has a dedicated area when pressing the brake pedal while in park and always active when driving that you just swipe up or down on to switch between drive and reverse manually. I’ve never experienced this personally, as my Model 3 is an older one with a steering wheel stalk to shift. Owners of these do generally say they very quickly get used to it, the gesture rapidly becoming natural to them. I can definitely understand hesitation about it though, which is why there are still the physical controls in addition to this. The predictive shifting is a setting that can be disabled, and any user input always takes priority even when it is enabled. I’ve heard it also works rather well from other owners, but again, I have no personal experience.
In terms of general overall safety, Tesla’s vehicles have consistently been scored as some of the safest vehicles to drive in the world by the NHTSA and other safety organizations. See their latest NHTSA-rated model for an example. You are more likely to survive a collision and other incidents (and more likely to remain unharmed) in any of the Teslas than most other vehicles on the road. They’ve been highly rated for pedestrian safety as well. (Note: dunno where the Cybertruck sits in all this, as it’s brand new and is an entirely different class of vehicle from their previous, being a full-size pickup truck. I don’t think they’ve been fully rated by any organization yet.) Tesla actually publishes their incident rates quarterly, and they can be seen here.
They said “they’re probably one of those privacy weirdos”, which is different.
I value privacy and am conscious of it, more so than the average user. I choose, willingly and knowingly, to use certain services that damage my privacy in exchange for their services.
The “privacy weirdos” are the people who see that statement and go “well you shouldn’t ever be using service x because it’s not secure you stupid dipshit! Just use service y, it’s FOSS and has half the features but it respects privacy so it’s better in every way!”
Dunno how the person got “I’m a privacy nut” from “ads aren’t good for journalism” tho, that doesn’t track
Physics prevents this from being cooked anything other than inconsistently.
As the fins rise and spread out, the amount of moisture that can dissipate can be plotted on a curve with the bottom of the potato always representing the least amount of moisture dissipation, and the outer part at the top always having the most.
And it gets more complicated because as the potato curves on each axis it becomes thinner on the edges so there’s a gradient in moisture dissipation there too.
In a practical sense this means that every X, Y, Z point on this potato is cooked different. Some points will be perfect but by definition it means other points will not and cannot be perfect. And other points must be awful.
There is a fundamental flaw in this design, which changing the temperature or cooking duration cannot solve.
Sun first contacted the 64-year-old woman in February and claimed to be “Mark Cooper”, an agent with “the office of the inspector general, Federal Trade Commission”, according to court documents, the Washington Post reported.
I don’t know via which mechanism the contact occurred, but I have to say that if it was via phone, the fact that we don’t have any real sort of authentication system for phones is once again rearing its head. There have been a lot of high-profile examples of people getting tricked via phone, including people who are going to be in a relatively-good-position to avoid fake communications. Consider the case where Navalny tricked one of his would-be FSB assassins into believing that he was with the FSB and confessing on record – that was an intelligence agent working in an extremely-sensitive area who probably was trained in a set of procedures and they can still get clobbered. And a number of politicians with entire organizations devoted to ensuring their security have been phone-pranked…and God knows how many have been tricked into exposing information, where it never became a news story. How is a random senior citizen going to know what can be trusted, be familiar with the existence of Caller ID spoofing? And then there’s deepfakes complicating the issue. The situation with phones is an outright dumpster fire. We actually have the computational hardware at each end today to be able to legitimately do end-to-end authentication and have trusted hardware to do things like app purchases and we still don’t have authenticated calls. It’s ridiculous.
Then there’s postal mail. Pretty much no authentication system in place. Anyone can slap an official-looking letter in an envelope.
For email, we have a few authentication systems (X.509 certs for companies, PGP certs by individuals), but they aren’t widely-used outside of organizations.
Of the contact mechanisms that are widely-used, only on the Web do we have an actual, widely-deployed authentication system…and there are some kind of egregious ways to game that. People often use search engines to reach given sites; people can do things like place ads for scam sites, or just try to game the search engine’s ranking criteria. The only thing that one gets even if one is using a TLS-secured connection and if the user understands how to check for that is a guarantee that the domain name in a browser’s URL bar is associated with the given organization and that the fields in the certificate – if they know how to check this and actually do, which I have never seen a user do and is inconvenient in a browser – also match. There is no standard mechanism for various organization using domains; governments might use a .com from a company they have a contract with, official government sites may live at various locations in various places, etc.
Realistically, unless a Web browser gives some kind of sane, reasonably-non-gameable heuristic for “is this probably not some random fly-by-night organization”, I suspect that even on the Web, even in the situation where the best authentication mechanisms exist, a typical person can be gamed.
I remember, years back, talking with a guy – studying computer science at a prestigious university, probably in a vastly-better position to make security calls than most people out there – about how vulnerable people are to attacks that trick them. I said that I was pretty sure that pretty much anyone was vulnerable; he was convinced that if people were careful, it wouldn’t be a problem. I said that I was pretty sure that I could break into his computer. Thirty minutes later – and remember, this is at target with domain expertise who has been warned within the hour that he’s likely to be attacked – I sent him a link to a file via, I think, ICQ. He clicked on it. It opened a Minesweeper game. The file had been of the form:
A lot of spaces in there, with a “.exe” hanging off the end.
At the time, the ICQ client would simply open a file locally, using Windows’ database which used a filename extension to determine how to act on a file. The ICQ client didn’t try and restrict the list of file types that could be opened, and at the time, it was possible to make a filename so long that the client wouldn’t display the last bit.
I’d just grabbed the Windows Minesweeper binary as the quickest thing to hand, and I told him what it was, but had it been a malicious program that – for example – had a malicious payload and then opened an image, I doubt that a typical person would have been aware.
That particular attack isn’t noteworthy – and various types of software packages have aimed to defend against that class of attacks – so much as the fact that I think that it really illustrates how unrealistic it is to expect the average Joe to “patch over” the security problems in software and hardware out there via rigorous behavior. If someone who has domain expertise and has immediate forewarning and where the attacker just had a few minutes to think up an attack can’t deal with it, how realistic is it to expect anyone to do so?
In the US, sometimes organizations ask for some sort of secret information, like one’s Social Security number or mother’s maiden name or name of one’s first school or one’s first pet. First of all, some of those are not terribly-difficult to get ahold of anyway – birth records are accessible to public, and it may not be too hard to figure out someone’s first school or the like from looking back to see where someone or their parents were at a given point in time. But even in addition to that, various organizations don’t coordinate and restrict which ones can use a given secret. So if Organization X is trying to ensure that their users are authenticated, maybe they ask for their mother’s maiden name. Organization Y does the same. But that secret can’t be revoked and may be shared across multiple organizations. Say that Organization X’s computer system gets compromised…now someone has the secret required to get into the person’s account at Organization Y.
I remember one time that I’d lost some authentication data to get into a stock broker account at a company. I didn’t have enough to get in via the phone or the Web…but each exposed and required a different set of information, so that using information provided by one was sufficient to get into the other: clearly, the portion of the organization dealing with phones and the portion dealing with the Web weren’t coordinating in how they did things. And that was a major stockbroker, where access to the account could mean access to millions of dollars, and correlation across their own authentication systems, somewhere where I would expect each side to be checked. It was horrifying.
And that’s even before the fact that most organizations permit password resets if someone can get into someone’s email, which is not always the best-secured thing in the world.
Organizations have tried to use SIM cards as a form of authentication, for lack of a better route. But then you’ve got SIM-swapping attacks.
What I’m saying is that security is just horrendous on most systems from the standpoint of a regular user.
You do need the human to have some sort of understanding of a system to use it securely, but what we do today is kind of foist on the user all kind of ill-defined expectations that are constantly changing and probably unrealistic.
What I think would need to be done for things to pass muster is to give people a set of maybe five simple rules, make sure that they’re taught to everyone, from school on up, and as long as they follow those rules, they can’t be tricked as to identity…and if software or hardware permits for them to be tricked, even if they’re following those rules, then it’s a bug in the software or hardware.
Even some of the better heuristics are pretty limited. “Don’t trust incoming phone calls”…okay, fine. But if my bank sends me a piece of postal mail and it says “call this number”…do I do that? Because anyone can drop a letter in an envelope on an official-looking letterhead. And financial institutions that I’ve dealt with have contacted me via phone, and certainly sent me mail telling me to call them at a given number.
People should be able to use phones or to use email or to get a letter or to use the Web and reasonably trust that the organizations they are communicating with are actually who they say they are. The situation today is just embarrassingly bad.
We shouldn’t have had this story about the detective in a wig because it shouldn’t have been possible to pose to the victim as a government agent in the first place, shouldn’t have even gotten to the place where the police were having to try to fix the problem.
As I started to work with Lemmy and understand how it is implements the distribution of content through the federation, I became in favor of having separate instances for topics and people. This would help reduce a lot of the political conflicts and avoid issues of people in one instance getting detached from larger communities because some.people in instance X don’t like some people from in instance Y.
Also, I wouldn’t want to have my “main” identity defined by or attached to any of my interests.
Lastly, I am sure that the people behind fanatics.social have good intentions, but the instance is still on 0.18.4 and it doesn’t inspire a lot of confidence.
Even toddlers learn to speak first by babbling, and only later to converse and communicate with someone rather than talk at them. Some technological platforms have even evolved to facilitate that - like instead of “^This” and “I also choose this guy’s wife”, what about emoji reactions that do not extend the length that you have to scroll through to find the next substantive comment? Except that - this is the enshittification part - when ads can be placed in-between comments, or even someone hopes that they could be in the future, or more likely they want to purposefully obscure the signal so that “x number of comments appear on this post”, rather than “x number of comments + y number of emoji reactions”, that works against their profit model. (and yeah, there was “awards”, but who even used those, plus they just were not… good, especially for this purpose)
About both that and being combative: fwiw, we all are that way - the good thing is that some of us are honest about it, which gives hope for change.:-) But we all will have bad days when we are cranky and especially when we feel “attacked” we feel the need to strike back, and the feelings at least are not wrong, just how we handle them may not be so productive.
So I get you - I am the same way, though fortunately less and less over time. Leaving Reddit truly has helped me leave a lot of that behind. Over there that is just the “expectation” that people encourage you to do, but the culture is better here.:-)
Setting aside the usual arguments on the anti- and pro-AI art debate and the nature of creativity itself, perhaps the negative reaction that the Redditor encountered is part of a sea change in opinion among many people that think corporate AI platforms are exploitive and extractive in nature because their datasets rely on...
Thats an unfair comparison. Were not talking about “painters” or “illustrators” but using the very general term “artist”
I literally started by saying i agree that just asking sm premade like bing to generate x with y isnt making art.
But there can be deep creative processes involved in getting an ai to generate just right and any actual professionals i do know use AI will more often then not use photoshop edits as parts of their process. The ai is a tool.
If you are intentionally using creative process to create an imagined output then you are by dictionary definition an artist.
Stable diffusion is also much more a technology then a product, anyone with a decent gpu can train their own models and many people have. Using someone elses models is no different then using someone else’s brushes in a painting program because what counts is what you do with it, which often involves alot more then just typing in a prompt.
If you want some examples of the creative freedom and complexity one can get just search for “comfyui workflow”
In your sport example, if you managed to step for step guide and train a basic robot (so not a toy preconfigured to play sports)into properly playing sports you wouldn’t perse fit the dictionary for an athlete but you having the knowledge to do this could create a reasonable assumption that you are. Otherwise i would say amateur-engineer could also apply because you probably need to know a lot about how the robot joints function. At the very least i would call you an artist because it would take a lot of creative trial and error to pull off.
Well that’s very interesting for me personally to think about. Thanks for bringing this up.
I always really enjoyed programming but i hated being a developer.
Ive always loved making art but objectively suck at painting, not great at drawing while i am pretty good with computers, i’ve long realized i can use that to scratch my creative itch as opposed to traditional tools. I have dabbled in 3d modeling, scripting, creating custom theming, general indie game development but my real long time dream is opening a workshop where i reconfigure old hardware into cool looking contraptions operating silly programs that serve no practical use besides inspiring joy.
When i worked as a developer i was assigned a task and told to program x or y within z limits and standards. I had no creative freedom and really hated that job for that reason.
i guess when it comes to how i work with ai its fair to compare it to being a programmer much more then a conventional painter, it definitely taps into my technical insight on a similar level, but it does much more then scripting scratch my very real itch to create things.
On principle I’ve always been very openminded to what art can be, a literal toilet can be art so i also considered that the thoughts of a philosopher are art. Writing is art, cooking can be art, Video games are art.
Its absolutely ok to make distinctions yourself, if art is anything at all it is subjective but i hope you can see that following my logic i don’t see why my creative projects wouldn’t count towards the definition.
Walt Disney Co on Friday said that remarks by activist investor Nelson Peltz criticizing the company for making movies dominated by female and Black actors is evidence that he shouldn’t be on Disney’s board....
The Disney philosophy, at this point, is that people who have been unrepresented for years will take issue towards efforts that are not strictly made with inclusivity in mind and those who have been represented will accept it as progress, then the small few who take issue with “wokeness” will watch it because “it’s Disney”
Their gamble is paying off because lets face it, 90% of the world with a TV screen has grown up with Disney.
So while you might disagree with Disney’s take on X, Y or Z, that fucking mouse is so engrained on us that we will accept whatever bullshit they put forward
I have many services running on my server and about half of them use postgres. As long as I installed them manually I would always create a new database and reuse the same postgres instance for each service, which seems to me quite logical. The least amount of overhead, fast boot, etc....
Cybersecurity communities too, there was one guy on [The Other Site] I saw awhile back who, whenever somebody asked a question about what they should do to secure X or Y or if Z security product was better than V because they just did general IT, would always default to something along the lines of “If you don’t know, don’t bother its above you and you should shell out $$$ to an actual firm otherwise you’ll be shelling out $$$$ to another firm to clean up your mess”
Surprise surprise, when I googled his username (The fact I was even able to do this isnt a great sign for a “security professional” IMO lmao) he actually owned one of those “Databreach Triage” firms…yea…I’m sure there was no conflict of interest whatsoever lmaoo
Fedi Garden to Instance Admins: "Block Threads to Remain Listed" (wedistribute.org)
Server indexes of places for newcomers to join can be instrumental for Fediverse adoption. However, sudden rule changes can leave some admins feeling pressure to change policies in order to remain listed.
I just ask my problem bro...chill.... (lemmy.world)
I just ask my problem bro...chill.... (lemmy.world)
hell yeah mint (lemmy.world)
Handy temperature conversion scale. (lemmy.world)
Canada’s population hits 41M months after breaking 40M threshold (globalnews.ca)
Nine months after reaching a population of 40 million, Canada has cracked a new threshold....
Korean researchers unveil new superconductor PCPOSOS [PbxCux(P(OySy)4)601.Sz, x = 3 ~ 6, y+z = 0.3~0.4] and said they will publish the synthesis method for PCPOSOS on arXiv an onlinepreprint repositry (www.koreatimes.co.kr)
A group of Korean researchers, known for its controversial claim of creating the room-temperature superconductor LK-99, has newly unveiled its discovery of a new superconductor.
Aaargh....my eyes......my eyes...... (lemmy.world)
Aaargh....my eyes......my eyes...... (lemmy.world)
Performance Review time
Finally had my performance review with my boss. (It’s about a month late and I’m the last one on the team to get it.)...
First Human Patient to Receive a Neuralink Brain Implant Used it to Stay Up All Night Playing Civilization 6 (www.ign.com)
CSS Humor
https://lemmy.world/pictrs/image/899e92cd-9299-4067-9ccb-534fe8be4d01.jpeg
Twelve years after the death of Steve Jobs, the cracks are starting to appear at Apple (www.notebookcheck.net)
World of Warcraft's Subscriber Numbers and Trends From 2016 to 2024 Revealed (www.icy-veins.com)
Dead Internet Theory is Correct in More Ways Than One (lemmy.world)
Kill me now.
I made a Hassleback potato. Visually appealing but it wasn't worth the effort. (lemmy.world)
Detective wore wig and posed as victim to catch US scammer who stole gold bars (www.theguardian.com)
News, hightlights and commentary about NBA (nba.space)
Lemmy Babies of the Rexodus - it's been 9 months, how has Lemmy changed you?
What are the other 6 Ds? (lemmy.world)
Redditors Vent and Complain When People Mock Their "AI Art" (futurism.com)
Setting aside the usual arguments on the anti- and pro-AI art debate and the nature of creativity itself, perhaps the negative reaction that the Redditor encountered is part of a sea change in opinion among many people that think corporate AI platforms are exploitive and extractive in nature because their datasets rely on...
'Why do I need an all-Black cast?' Disney criticizes Peltz remarks (www.reuters.com)
Walt Disney Co on Friday said that remarks by activist investor Nelson Peltz criticizing the company for making movies dominated by female and Black actors is evidence that he shouldn’t be on Disney’s board....
Are you reusing one postgres instance for all services?
I have many services running on my server and about half of them use postgres. As long as I installed them manually I would always create a new database and reuse the same postgres instance for each service, which seems to me quite logical. The least amount of overhead, fast boot, etc....