[lang=en] That was the reason for twtxt-php =P
I tried using CLI tools but it was too hacky, I think.
More if we consider Jakobās Law, where we have prior expectations of a microblogging system.
A Web interface could be quite minimalistic and usable as well. (And mobile-friendly)
Iām using rss on a terminal (Termux) in my phone, itās more confortable read there articles and other stuff, but for posting on twtxt, I tried , I swear it, but itās too much, itās not practical, I have to assume that itās better in a website/app like this.
Yarn wins!
@Planet_Jabber_XMPP@feeds.twtxt.net
The benefits of blockchain implementation across multiple sectors are well-documented
WTF are you talking about? The only thing well-documented about āthe blockchainā is that it sucks and its primary use case is creating Ponzi schemes.
Erlang Solutions: Blockchain in Sustainable Programming
The benefits of blockchain implementation across multiple sectors are well-documented, but how can this decentralised solution be used to achieve more sustainable programming?
As the effects of the ongoing climate crisis continue to impact weather patterns and living conditions across the planet, we must continue to make every aspect of our lives, from transport and energy usage to all of our technology, greener and more sustain ⦠ā Read more
Iām having an Internet outage at the moment ⦠and now I canāt use valgrind
anymore, because it needs to fetch stuff from the net during startup. š
@movq@www.uninformativ.de @mckinley@twtxt.net I believe the resurgence in availability of municipal WiFi is largely driven by the surveillance capabilities it offers. Every person who has WiFi enabled on their phone can be tracked throughout the city as their phones ping various base stations; a lot of folks arenāt aware of just how much information can be slurped out of a phone that isnāt locked down just from its WiFi pings. I know this happens in Toronto, and I was familiar with a startup in Massachusetts that based its business model on this very concept. I can only assume itās widespread in the US if not throughout the Western world.
Moon
ā Read more
GnuCOBOL 3.2 Released After 2+ Years In Development
For those fond of the COBOL programming language and continuing to make use of it in new development efforts, GnuCOBOL 3.2 was released on Friday as the latest feature update for this 21+ year old free software effort around being an open-source COBOL implementation⦠ā Read more
Iāve only been using snac
/the fediverse for a few days and already Iāve had to mute somebody. I know I come on strongly with my opinions sometimes and some people donāt like that, but this person had already started going ad hominem (in my reading of it), and was using what felt to me like sketchy tactics to distract from the point I was trying to make and to shut down conversation. They were doing similar things to other people in the thread so rather than wait for it to get bad for me I just muted them. People get so weirdly defensive so fast when you disagree with something they said online. Not sure I fully understand that.
I just received this email and I have some questions:
Thisāemailāis fromāaātrustedāsĪæurce.
You received this abucci@bucci.onl because you have been disconnected from sending and receiving emails.
To continue using this email address we urge you to re-confirm if your account is still active on bucci.onl to officially unlock it to our default settings.
Re-confirm account (a link; removed)
ā» This process is very important to help us protect your internet and fight malicious activities.
Since I administer bucci.onl myself, Iām a little confused. I donāt recall disconnecting myself from sending and receiving emails. I donāt even know how you disconnect someone from that. I also have never created the email address this email appears to be coming from, but maybe I should trust it anyway since they told me itās a trusted source? Most puzzlingly, Iāve been sending and receiving emails just fine all morning, so I do not appear to be disconnected from anything? I want to help protect the internet and fight malicious activities, but what should I do??? š¤š¤š¤š¤š¤
@prologic@twtxt.net It was super useful if you needed to do the sorts of things it did. Iām pretty sad.
At its core was Sage, a computational mathematics system, and their own version of Jupyter notebooks. So, you could do all kinds of different math stuff in a notebook environment and share that with people. But on top of that, there was a chat system, a collaborative editing system, a course management system (so if you were teaching a class using it you could keep track of students, assignments, grades, that sort of thing), and a bunch of other stuff I never used. It all ran in a linux container with python/conda as a base, so you could also drop to a terminal, install stuff in the container, and run X11 applications in the same environment. I never taught a class with it but I used to use it semi-regularly to experiment with ideas.
TIL: You cannot use the work āfuckingā (to colloquially mean that was āfucking brilliantā, i.e: a compliant) on Discord servers š¤£
I used to be a big fan of a service called cocalc, which you could also self host. It was kind of an integrated math, data science, research, writing, and teaching platform.
I hadnāt run it in awhile, and when I checked in with it today I found their web site brags that cocalc is now āextensively integrated with ChatGPTā.
Which means I canāt use it anymore, and frankly anyone doing anything serious shouldnāt use it either. Very disappointing.
@prologic@twtxt.net I see what you mean about tldraw. I looked at their github repository and it seems like they are distributing it as an npm package for people who want to include a whiteboard in their Javascript-based frontend. I didnāt see a way to just launch the thing.
I have half a mind to write a little scala frontend that sets up one of these, since scalajs makes it very easy to use these Javascript web component things while making it look like youāre writing scala.
why am I not surprised?⦠https://uk.pcmag.com/ai/147757/elon-musk-will-train-his-ai-project-using-your-tweets
@abucci@anthony.buc.ci @prologic@twtxt.net neat.. I saw this one quite a while ago. it is strictly line of sight and blocked by walls or things. The use cases were to have it integrated in the lights in a room and provide super fast connections to devices in an office or coffee shop.
Why not just always use the second one?
@prologic@twtxt.net bummer, thatās a shame. I ask because I install the vast majority of my phone apps from f-droid these days, and only use Google Play Store when I have no other option. I know the Play Store will have more reach, but Iām guessing reach isnāt the highest priority right now.
hehe, I tryied it for like 2 minutes, a few friends are there⦠And I donāt like it at all. I donāt use Instagram for example, family and friends do, but I donāt like it either.
I donāt know, perhaps too much influencerās and clickbait content, rather than something appealing to me.
@prologic@twtxt.net I donāt know! Iāve never used itāonly came across it recently.
Question to all you Gophers out there: How do you deal with custom errors that include more information and different kinds of matching them?
I started with a simple var ErrPermissionNotAllowed = errors.New("permission not allowed")
. In my function I then wrap that using fmt.Errorf("%w: %v", ErrPermissionNotAllowed, failedPermissions)
. I can match this error using errors.Is(err, ErrPermissionNotAllowed)
. So far so good.
Now for display purposes Iād also like to access the individual permissions that could not be assigned. Parsing the error message is obviously not an option. So I thought, I create a custom error type, e.g. type PermissionNotAllowedError []Permission
and give it some func (e PermissionNotAllowedError) Error() string { return fmt.Sprintf("permission not allowed: %v", e) }
. My function would then return this error instead: PermissionNotAllowedError{failedPermissions}
At some layers I donāt care about the exact permissions that failed, but at others I do, at least when accessing them. A custom func (e PermissionNotAllowedError) Is(target err) bool
could match both the general ErrPermissionNotAllowed
as well as the PermissionNotAllowedError
. Same with As(ā¦)
. For testing purposes the PermissionNotAllowedError
would then also try to match the included permissions, so assertions in tests would work nicely. But having two different errors for different matching seems not very elegant at all.
Did you ever encounter this scenario before? How did you address this? Is my thinking flawed?
@marado@twtxt.net It canāt possibly be defensible, which to me always signals an attempt at a power grab. They never explicitly said āwe will use anything we scrape from the web to train our AIā beforeāthatās new. There is growing pushback against that practice, with numerous legal cases winding through the legal system right now. Some day those cases will be heard and decided on by judges. So theyāre trying to get out ahead of that, in my opinion, and cement their claims to this data before thereās a precedent set.
With Youtube testing a āthree strikes and youāre outā policy against people who use ad blockers, Iām also wondering whether Web 2.0 is effectively walled off and I should just give up on it entirely and look elsewhere for information and entertainment.
An official FBI document dated January 2021, obtained by the American association āProperty of Peopleā through the Freedom of Information Act.
This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (āPen Registerā) or connection data retention law (ā18 USC§2703ā). Here, in essence, is the information the FBI says it can retrieve:
Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.
Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).
Signal: date and time of account creation and date of last connection.
Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.
Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.
Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).
WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.
WhatsApp: the targeted personās basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (āPen Registerā); message content can be retrieved via iCloud backups.
Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.
TL;DR Signal is the messaging system that provides the least information to investigators.
been using the iphone for some days now, and I must say im impressed. I really like it. I will not buy android phone ever again.
@prologic@twtxt.net The hackathon project that I did recently used openai and embedded the response info into the prompt. So basically i would search for the top 3 most relevant search results to feed into the prompt and the AI would summarize to answer their question.
Also, what a douchebag using the title āDr.ā in his twitter handle. As a general rule, a white dude who isnāt a medical doctor putting āDr.ā in their social media title is a gigantic flashing red flag.
Home | Tabby This is actually pretty cool and useful. Just tried this on my Mac locally of course and it seems to have quite good utility. What would be interesting for me would be to train it on my code and many projects š
Letās be clear here. Daniel Penny allegedly choked a black man, Jordan Neely, to death on a subway car. Neely was being loud, but he was not physically threatening anybody and did not have a weapon. In any other context, this would be called āmurderā, at the very least, āmanslaughterā if one were being gracious. Because of the USās history, a white man murdering a black man in sight of the public is oftentimes, and rightfully, called a ālynchingā. It has a public, political purpose amounting to terrorism.
Daniel Penny was allowed to go free for awhile after this event. He is only now facing accountability, having been recently indicted (arrested and charged with a crime) as he should have been day of. And here is racist right-wing toadie Ben Shapiro saying that Daniel Pennyāthe white alleged killerāis the one being lynched. Not the black man who was allegedly murdered by Penny in view of the public, and who is now dead. Penny himself, who is still very much alive.
@prologic@twtxt.net, I donāt know how you go on defending Ben Shapiro, but in the context of US society, what Shapiro is saying is reprehensible and unacceptable. Heās a right-wing troll with disgusting, not to mention flat out stupid, opinions.
@movq@www.uninformativ.de If I understand it correctly, gtk4 renders using OpenGL. That means some of that RAM that appears to be allocated is actually some trick of the OpenGL driver so that it can map address in RAM space to the GPUās VRAM (depends a lot on your setup though).
What happens if you run it with GSK_RENDERER=cairo
set?
A GTK 4 application showing an empty window uses about 160 MB of RAM:
$ wget https://movq.de/v/138ab3e622/win.c
$ cc -Wall -Wextra -o win win.c $(pkg-config --cflags --libs gtk4)
$ ./win
It also takes several seconds to start on my machine because it is compiling shaders and initializing DRI (itās faster on the second run, unless you happen to lose ~/.cache/mesa_shader_cache/
). This might be a hint as to why itās using so much memory: Thereās obviously much more going on behind the scenes these days, not just a little bit of internal housekeeping and then creating a window.
Iceberg
ā Read more
I have used Linux for most my life, and it hat been my daily driver for nearly two decades now. I have been bugged recently how when I exit
the terminal buffer has not been cleared leaving whatever contents available to the next user to view.
a quick man zsh
I found the STARTUP/SHUTDOWN FILES, and then a quick search on resetting the termianl buffer led me to <esc>c
or printf "\033c"
.
In five minutes something which has bothered me for who knows how long was resolved. Just needed some motivation to figure it out.
Seems to me you could write a script that:
- Parses a StackOverflow question
- Runs it through an AI text generator
- Posts the output as a post on StackOverflow
and basically pollute the entire information ecosystem there in a matter of a few months? How long before some malicious actor does this? Maybe itās being done already š¤·
What an asinine, short-sighted decision. An astonishing number of companies are actively reducing headcount because their executives believe they can use this newfangled AI stuff to replace people. But, like the dot com boom and subsequent bust, many of the companies going this direction are going to face serious problems when the hypefest dies down and the reality of what this tech can and canāt do sinks in.
We really, really need to stop trusting important stuff to corporations. They are not tooled to last.
@movq@www.uninformativ.de wow. Iād trade crow sounds for car sounds, or jet sounds, or leaf blower sounds, or lawn mower sounds, orā¦..100% of the time.
As far as fighting the birds goes, maybe theyāre right, but probably itād be better to re-balance the ecosystem so that crows arenāt so dominant? At least there are things to try. When it comes to reducing how much air travel people use, it takes a terrorist attack or a pandemic to affect it.
āif you can find a way to solve a real problem effectively enough so that a billion people or more would want to use it twice a day you are bound to make a lot of money. much more money than if you were to build the next photo sharing app.ā - mo gawdat
@prologic@twtxt.net that would work if it was using shamirās secret sharing .. although i think its typically 3 of 5 so you get 3, one to the company, and one to the āthird partyā. so you can recover all you want.. but if the company or 3rd wants to they need one of your 3 to recover.
but still .. if they are providing them then whats the point of trusting they donāt have copies.
I came across the phrase ālong fuse, big bangā used to describe large-scale issues with tipping points facing humanity, like climate change, and it feels pretty apt.
@abucci@anthony.buc.ci buuuuut it show when winter!
In the time scale viewed from the planets perspective, the climate has changed many many times.. The issue is whether that change that will inevitability come is hospitable to us meat bags. Or if we are doomed to take part in the next mass extinction event.
I played with nlpodyssey/verbaflow: Neural Language Model for Go today a little bit todayā¦. First I had to download a ~2GB file (the model), then convert that to a format the program verbaflow
understands which came out to roughly ~5GB. Then I tried some of the samples in the README. My god, this this is so goddamn awfully slow its like watching paint dry š± All just to predict the next few tokens?! š³ I had a look at the resource utilisation as well as it was trying to do this āworkā, using 100% of 1.5 Cores and ~10GB of Memory š³ Who da fuq actually thinks any of this large language model (LLM) and neural network crap is actually any good or useful? š¤ Its just garbage š¤£
Debt Collectors Want To Use AI Chatbots To Hustle People For Money
Starting to get ugly already.
š Hello @ocakuvoe@anthony.buc.ci, welcome to Buccipod, a Yarn.social Pod! To get started you may want to check out the podās Discover feed to find users to follow and interact with. To follow new users, use the ⨠Follow
button on their profile page or use the Follow form and enter a Twtxt URL. You may also find other feeds of interest via Feeds. Welcome! š¤
Crystal Ball
ā Read more
š PDF improvements & More AI Options
Check out some great guides on how to create folder and tag systems, and how to use the Strange New Worlds & bookmarks plugin! ā Read more
@stigatle@yarn.stigatle.no @prologic@twtxt.net @eldersnake@we.loveprivacy.club I love VR too, and I wonder a lot whether it can help people with accessibility challenges, like low vision.
But Metaās approach from the beginning almost seemed like a joke? My first thought was āare they trolling us?ā Thereās open source metaverse software like Vircadia that looks better than Metaās demos (avatars have legs in Vircadia, ffs) and can already do virtual co-working. Vircadia developers hold their meetings within Vircadia, and there are virtual whiteboards and walls where you can run video feeds, calendars and web browsers. What is Meta spending all that money doing, if their visuals look so weak, and their co-working affordances arenāt there?
On top of that, Meta didnāt seem to put any kind of effort into moderating the content. There are already stories of bad things happening in Horizon Worlds, like gangs forming and harassing people off of it. Imagine what thatād look like if 1 billion people were using it the way Meta says they want.
Then, there are plenty of technical challenges left, like people feeling motion sickness or disoriented after using a headset for a long period of time. I havenāt heard announcements from Meta that theyāre working on these or have made any advances in these.
All around, it never sounded serious to me, despite how much money Meta seems to be throwing at it. For something with so much promise, and so many obvious challenges to attack first that Meta seems to be ignoring, what are they even doing?
Metaverse Could Contribute Up To 2.4% of US GDP By 2035, Study Shows
A study commissioned by Meta has found that the metaverse could contribute around 2.4% to U.S. annual GDP by 2035, equating to as much as $760 billion. Reuters reports: The concept of the metaverse includes augmented and virtual reality technologies that allow users to immerse themselves in a virtual world or overlay information digitally on ⦠ā Read more
Letās assume for a moment that an answer to a question would be met with so many words you donāt know what the answer was at all. Why? Why do this? Is this a stereotype of academics and philosophers? If so, itās not a very straight-forward way of thinking, let alone answering a simple question.
Well, I canāt know whatās in these peoplesā minds and hearts. Personally I think itās a way of dissembling, of sowing doubt, and of maintaining plausible deniability. The strategy is to persuade as many people as possible to change their minds, and then force the remaining people to accept the idea because they think too many other people believe it.
Letās say you want, for whatever reason, to get a lot of people to accept an idea that you know most people find horrible. The last thing you should do is express the idea clearly and concisely and repeat it over and over again. All youād accomplish is to cement peopleās resistance to you, and label yourself as a person who harbors horrible ideas that they donāt like. So you canāt do that.
What do you do instead? The entire field of ārhetoricā, dating back at least to Plato and Aristotle (400 years BC), is all about this. How to persuade people to accept your idea, even when they resist it. There are way too many techniques to summarize in a twt, but it seems almost obvious that you have to use more words and to use misleading or at least embellished or warped descriptions of things, because thatās the opposite of clearly and concisely expressing yourself, which would directly lead to people rejecting your idea.
Thatās how I think of it anyway.
@prologic@twtxt.net hmm, dunno about the recency of that line of thought. I suspect though that given his (recent or not) history, if someone directly asked him ādo you support rapeā he would not say ānoā, heād go on one of these rambling answers about property crime like he did in the video. Maybe Iām mind poisoned by being around academics my whole career, but that way of talking is how an academic gives you an answer they know will be unpopular. PhD = Piled Higher And Deeper, after all right? In other words, if he doesnāt say ānoā right away, heās saying āyesā, except with so many words thereās some uncertainty about whether he actually meant yes. And he damn well knows that, and thatās why I give him no slack.
There are people in academia who believe adult men should be able to have sex with children, legally, too. They use the same manner of talking about it that Peterson uses. We need to stop tolerating this, and draw hard red lines. No, thatās bad, no matter how many words you use to say it. No, donāt express doubts about it, because that provides justification and talking points to the people who actually carry out the acts.
@xuu@txt.sour.is LOL omfg.
This is the absurd logical endpoint of free market fundamentalism. āThe market will fix everything!ā Including, apparently, encroaching floodwater.
I do have to say though, after spending awhile looking at houses, that there are a crapton of homes for sale for very high prices (>$1 million) in coastal areas NASA is more or less telling us will be underwater in the next few decades. I donāt get how a house thatās going to be underwater soon is worth $1 million, but then Iām never been a free market fundamentalist either so 𤷠Maybe theyāre all watertight.
Commemorative Plaque
ā Read more