@stardreamer@lemmy.blahaj.zone avatar

stardreamer

@stardreamer@lemmy.blahaj.zone

This profile is from a federated server and may be incomplete. Browse more on the original instance.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I think we may be looking at these wrong. Yes there’s a visible throughput/latency improvement here but what about other factors? Power savings? Cache efficiency? CPU cycles saved for other co-running processes?

These are going to be pretty hard to measure without an x86_64 simulator. So I don’t fault them for not including such benches. But there might be more to the story here.

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

Why can’t y’all just make normal children’s food like chicken curry with rice? Stop putting so much sugar and corn syrup in everything.

If this continues we’ll have to retaliate: see how certain East Asian countries make pizzas and burgers and see how you like it! (PS: it was flatbread with corn and ham as the only toppings)

Oh and the original answer: since so many people have already answered soy sauce, I’d say chicken soup or pork broth.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Out of curiosity, what’s preventing someone from making a regulatory db similar to tzdb other than the lack of maintainers?

This seems like the perfect use case for something like this: ship with a reasonable default, then load a specific profile after init to further tweak PM. If regulations change you can just update a package instead of having to update the entire kernel.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Btw this is most likely a scam. This is the equivalent of asking for your name, DOB, and SSN on a random app you found (the ID contains both location and DOB). Even if you have an actual ID DO NOT FILL THIS OUT. Delete, purge, and move on.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Hush! Don’t point it out! Lure him into a corner and steal his time machine!

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

So let me get this straight, you want other people to work on a project that you yourself think is a hassle to maintain for free while also expecting the same level of professionalism of a 9to5 job?

Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form' (tech.slashdot.org)

Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

This is solving a problem we DO have, albeit in a different way. Email is ancient, the protocol allows you to self identify as whoever you want. Let’s say I send an email from the underworld (server ip address) claiming I’m Napoleon@france (user@domain), the only reason my email is rejected is because the recipient knows Napoleon resides on the server France, not underworld. This validation is mostly done via tricky DNS hacks and a huge part of it is built on top of Google’s infrastructure. If for some reason Google decides I’m not trustworthy, then it doesn’t matter if I’m actually sending Napoleon’s mail from France, it’s gonna be recognized as spam on most servers regardless.

A decentralized chain of trust could potentially replace Google + all these DNS hacks we have in place. No central authority gets to control who is legitimate or not. Of all the bs use cases of block chain I think this one doesn’t seem that bad. It’s building a decentralized chain of trust for an existing decentralized system (email), which is exactly what “block chain” was originally designed for.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

There are more places where bandwidth is a bottleneck now than 10 years ago.

NIC speeds have gone from 100Gbps to 800Gbps in the last few years while PCIe and DRAM speeds have nowhere increased that much. No way are you going to push all that data through to the CPU on time. Bandwidth is the bottleneck these days and will continue to be a huge issue for the foreseeable future.

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

Because anyone who works at the assembly level tends to think that the x86_64 ISA is garbage.

To be fair, aarch64 is also garbage. But it’s less smelly garbage.

That being said, I’m not expecting any of these CPUs to be hanging in the Sistine Chapel. So whatever works, I guess.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

+1 for fairmail. Never have I seen an app so functional yet so ugly at the same time.

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

Last time I checked, K-9 didn’t have OAUTH integration.

Granted, it’s been a few years, so that may have changed since then.

As much as I don’t like Gmail, I need it for work so it’s kinda important for productivity software to support that.

Edit: Nvm. Looks like they finally added OAUTH last year. Better late than never.

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

I grew up in a household where I was taught when cooking salty sweet dishes, you should add just enough sugar to the dish so that it tastes different but you can’t tell why. Otherwise you’ve added too much sugar.

You can definitely taste the sweet in Pineapple pizza…

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

Having one program (process) talk to another is dangerous. Think of a stranger trying to come over to me and deliver a message. There’s no way I can guarantee that he isn’t planning to stab me as soon as he sees me.

That’s why we have special mechanisms for programs talking to other programs. Instead of having the stranger deliver the message directly to me, our mutual friend Bob (IPC Library, binder in this case) acts as an intermediary. This way at least I can’t be “directly” stabbed.

What’s preventing the stranger from convincing Bob to stab me? Not much (except for Bob’s own ethics/programming)

To work around this, we have designed programming languages (rust) that don’t work if there’s a possibility of it being corrupted (I would add “at least superficially”, but that’s not the main topic here). Bob was trained by the CIA in anti-brainwashing techniques. It’s really hard to convince Bob to stab me. That’s why it’s such a big deal. We now have a way of delivering messages between two programs that is much safer than before.

The only problem is that the CIA anti-brainwashing techniques (rust) tend to make people slow. So we deliver messages less efficiently than before. Good news is in this case we managed to make Bob almost as fast as before, so we don’t lose our own much while gaining additional security. The people who checked on Bob even made sure to have Bob do the exact same thing as before when delivering messages (using RB Trees), hence this evidence is most likely credible.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Worked in IT, target disk mode is a life saver when you have to recover data from a laptop with a broken screen/keyboard/bad ribbon cable and don’t want to take apart something held together by glue.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I’m in academia and I can report that still nobody uses those.

For your own archiving, just use Zotero.

For writing papers, use bibtex.

All those citing websites are just scams for high school/undergrad students trying to find their footing. There is no reason they should exist.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Never “just” steam your veggies. Do a quick stirfry in oil with garlic then use the residual steam to finish it up!

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I might switch to it once bitwarden support comes out.

Worst case I lose my Google account. Which I only use for Android (no sync, no mail, no purchases)

Best case, Google no longer defaults to mobile 2fa and finally accepts i want to use totp every time.

Also, how would the biometrics requirement work if all im doing is storing the whole thing in a Bitwarden vault?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #