https://fokus.cool/2025/11/25/i-dont-care-how-well-your-ai-works.html
AI systems being egregiously resource intensive is not a side effect — it’s the point.
And someone commented on that with:
I’m fascinated by the take about the resource usage being an advantage to the AI bros.
They’ve created software that cannot (practically) be replicated as open source software / free software, because there is no community of people with sufficient hardware / data sets. It will inherently always be a centralized technology.
Fascinating and scary.
“Computação e o ensino superior artístico português: currículos e práticas nos cursos de graduação públicos”
“Computing and the Portuguese higher arts education: curricula and practices in public undergraduate programs”
https://www.scielo.br/j/ep/a/dmVzQzqPXTjdPn7dBFtsvnw/?lang=pt
@movq@www.uninformativ.de Gemini liked your opinion very much. Here is how it countered:
1. The User Perspective (Untrustworthiness)The criticism of AI as untrustworthy is a problem of misapplication, not capability.
- AI as a Force Multiplier: AI should be treated as a high-speed drafting and brainstorming tool, not an authority. For experts, it offers an immense speed gain, shifting the work from slow manual creation to fast critical editing and verification.
- The Rise of AI Literacy: Users must develop a new skill—AI literacy—to critically evaluate and verify AI’s probabilistic output. This skill, along with improving citation features in AI tools, mitigates the “gaslighting” effect.
The fear of skill loss is based on a misunderstanding of how technology changes the nature of work; it’s skill evolution, not erosion.
- Shifting Focus to High-Level Skills: Just as the calculator shifted focus from manual math to complex problem-solving, AI shifts the focus from writing boilerplate code to architectural design and prompt engineering. It handles repetitive tasks, freeing humans for creative and complex challenges.
- Accessibility and Empowerment: AI serves as a powerful democratizing tool, offering personalized tutoring and automation to people who lack deep expertise. While dependency is a risk, this accessibility empowers a wider segment of the population previously limited by skill barriers.
The legal and technical flaws are issues of governance and ethical practice, not reasons to reject the core technology.
- Need for Better Bot Governance: Destructive scraping is a failure of ethical web behavior and can be solved with better bot identification, rate limits, and protocols (like enhanced
robots.txt). The solution is to demand digital citizenship from AI companies, not to stop AI development.
Erlang Solutions: Expert Insights from Our Latest Webinars
The Erlang Solutions team has been creating webinars that share knowledge, spark ideas, and celebrate the BEAM community. Each one offers a chance to explore new tools, hear fresh perspectives, and learn from the people building scalable and reliable systems every day.
If you haven’t tuned in yet, here’s a look at some of our recent sessions, full of practical insights and new thinking shaping the future of the BEAM.
**SAF … ⌘ Read morePython Says Discriminatory DEI Policies More Important Than $1.5 Million Dollars
The Python Software Foundation has turned down a $1.5 Million Dollar grant from the US government, as it would require them to cease discriminatory Diversity, Equity, & Inclusion practices. ⌘ Read more
The XMPP Standards Foundation: Towards Secure and Interoperable Healthcare Chat
Supporting the development of the Dutch NTA 7532 standard with lessons from international practice
The XMPP Standards Foundation (XSF) is an independent, non-profit organization that promotes and advances open standards for real-time communication and collaboration. The XSF oversees the development of extensions to the Extensible Messaging and Presence Protocol (XMPP) and fost … ⌘ Read more
Salesforce defends security practices after Qantas hack
Hackers used AI-powered voice phishing to trick employees into granting database access. ⌘ Read more
FFUF Mastery: The Ultimate Web Fuzzing Guide
Practical techniques, wordlists, and templates to fuzz every layer of a web app.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ffuf-mastery-the-ultimate-web-fuzzing-guide-f7755c396b92?source= … ⌘ Read more
Sustainable practices could cut food-related emissions in half
Food systems make up roughly 30% of total greenhouse gas emissions globally. But transforming them could cut these emissions by more than half, according to a report released Oct. 3 from a commission of global experts from more than 35 countries across six continents. ⌘ Read more
Getting Hands-On with Kerbrute: Practical AD Enumeration & Attack Tactics ⌘ Read more
‘It’s a human rights tragedy’: Aged care facility inappropriately restrained residents
A South Australian government aged care home, which looks after 23 people with dementia or complex disabilities, inappropriately used lap belts and other mechanical restraints to stop falls and control residents’ behaviour, the ABC can reveal. ⌘ Read more
High-speed onion mist: Cutting technique and blade sharpness affect droplet spray, study shows
A new discovery about how cutting onions ejects pungent aerosols up to two-thirds of a meter into the air has led to practical advice for reducing the spray: Cut onions slowly with a sharpened blade or coat an onion in oil before cutting. ⌘ Read more
Vimscript Best Practices ⌘ Read more
Yae Miko practicing her dick riding skills (Melowh)[Genshin Impact] ⌘ Read more
Terasic Announces Starter Kit Featuring RISC-V Nios V Processor and Software Bundle
Terasic has introduced the Atum Nios V Starter Kit, a feature-rich evaluation platform designed to accelerate development with Altera’s Nios V processor. The kit is aimed at embedded engineers, system developers, and educators looking for a practical way to explore RISC-V–based designs on the Agilex 3 FPGA platform. According to Terasic’s announcement, the kit is […] ⌘ Read more
Making yogurt with ants revives a creative fermentation process
Researchers recreated a nearly forgotten yogurt recipe that once was common across the Balkans and Turkey—using ants. Reporting in iScience on October 3, the team shows that bacteria, acids, and enzymes in ants can kickstart the fermentation process that turns milk into yogurt. The work highlights how traditional practices can inspire new approaches to food science and even add creativity to the dinner table. ⌘ Read more
url metadata field unequivocally treated as the canon feed url when calculating hashes, or are they ignored if they're not at least proper urls? do you just tolerate it if they're impersonating someone else's feed, or pointing to something that isn't even a feed at all?
@zvava@twtxt.net My clients trusts the first url field it finds. If there is none, it uses the URL that I’m using for fetching the feed.
No validation, no logging.
In practice, I’ve not seen issues with people messing with this field. (What I do see, of course, is broken threads when people do legitimate edits that change the hash.)
I don’t see a way how anyone can impersonate anybody else this way. 🤔 Sure, you could use my URL in your url field, but then what? You will still show up as zvava in my client or, if you also change your nick field, as movq (zvava).
@bender@twtxt.net Absolutely. My computer science teacher was really great and in a lot of aspects very similar. Especially combining the theoretical and practical parts. He’s also the main reason I ended up where I am today. I’m very grateful to him. Mr. Burger, however, takes this on a whole new level.
@lyse@lyse.isobeef.org that’s an amazing way to teach, and one many old school (I remember my father telling me “schools need to teach both theoretical and practical skills!”) people will agree with. The fact that graduates need to learn on the job after they graduate exemplifies the importance of hands on.
@movq@www.uninformativ.de Yeah, we’ve seen how this plays out in practice 🤣 @dce@hashnix.club My advice, do what @movq@www.uninformativ.de has hinted at and don’t change the 1st # url = field in your feed. I’m not sure if you had already, but the first url field is kind of important in your feed as it is used as the “Hashing URI” for threading.
Practical study material OSWP Part 3: WEP Walkthrough ⌘ Read more
Practical study material OSWP Part 2: WPA2-MGT Walkthrough ⌘ Read more
Practical study material OSWP Part 1: WPA2-PSK Walkthrough ⌘ Read more
Victoria is in the grip of drought, but what’s different about this one?
Victorian Country Hour host Warwick Long reflects on how farmers focus on mental health, modern farming practices and climate change preparation. ⌘ Read more
Queensland shark control plan goes against government commissioned advice
The KPMG report stresses that while “traditional measures” are still required, the program needs to transition away from “environmentally harmful practices”, such as drumlines and mesh nets. ⌘ Read more
Victoria’s Liberals struggles with compromise as infighting continues
So much of politics is the art of compromise. It’s an art form the Victorian Liberals are unwilling to practice as the party once again rips itself apart over the fate of former leader John Pesutto. ⌘ Read more
Part 3: How to Become a Pentester in 2025:Practical Practice: Labs & CTFs ⌘ Read more
Doctors flee Trump’s America: ‘It’s no longer safe or sane to practice here’
Brett Kelman, Kaiser Family Foundation Health News - Kaiseer Family Foundation | Raw Story
_Stephan: It is not only that the Republicans and Trump are trying to terminate the healthcare of millions of Americans. All of this dismantlement of the medical system in the U.S. is also causing a significant number of physicians to just leave the country, as this article describes. … ⌘ Read more
How to Adjust Font Smoothing in macOS Sequoia & macOS Sonoma
Font Smoothing is a longstanding feature in MacOS that aims to make rendered screen text more legible, and it works by subtly blending the edges of display fonts with the background by using anti-aliasing. The idea is to reduce the jaggedness of screen text, but in practice nowadays it basically makes screen fonts on the … [Read More](https://osxdaily.com/2025/06/04/how-adjust-font-smoothing-macos-sequoia-sonoma-v … ⌘ Read more
[$] The importance of free software to science
Free software plays a critical role in science, both in research and in
disseminating it. Aspects of software freedom are directly relevant to
simulation, analysis, document preparation and preservation, security,
reproducibility, and usability. Free software brings practical and specific
advantages, beyond just its ideological roots, to science, while
proprietary software comes with equally specific risks. As a practicing
scientist, I would like to help others—scientists or not—see the … ⌘ Read more
Requirement for professional carpet cleaning at end of lease invalid, ruling finds
Renters in Tasmania are not required to have their carpets professionally cleaned at the end of their lease “as a matter of general practice”, the Residential Tenancy Commissioner has ruled. ⌘ Read more
10 Iconic “Temporary” Structures That Still Stand Today
Some of the world’s most iconic structures were never meant to stick around. Built for the World’s Fairs, quick fixes, or temporary exhibitions, these buildings were supposed to be dismantled or demolished after serving their short-term purpose. But fate—and sometimes public opinion—had other plans. Whether due to popularity, practicality, or sheer indifference, these “temporary” constructions […]
The post [10 Iconic “Temp … ⌘ Read more
[$] Glibc project revisits infrastructure security
The GNU C Library
(glibc) is the core C library for most Linux distributions, so it is a
crucial part of the open-source ecosystem—and an attractive
target for any attackers looking to carry out supply-chain
attacks. With that being the case, securing the project’s
infrastructure using industry best practices and improving the
security of its development practices are a frequent topic among glibc
developers. A recent discussion suggests that improveme … ⌘ Read more
Beyond best practices: Using OWASP ASVS to bake security into your delivery pipeline for 2025
How to turn a community-driven checklist into a living part of your SDLC.
[Cont … ⌘ Read more
Xi Jinping’s plan to beat America at AI
China’s leaders believe they can outwit American cash and capitalism with a focus on practical applications. ⌘ Read more
Agent mode 101: All about GitHub Copilot’s powerful mode
A full look at agent mode in GitHub Copilot, including what it can do, when to use it, and best practices.
The post Agent mode 101: All about GitHub Copilot’s powerful mode appeared first on The GitHub Blog. ⌘ Read more
CNCF Shares Schedule for Open Observability Summit North America, Gears Up for Inaugural Event
The event will unite observability leaders, developers, and end users to drive progress in observability tools and best practices SAN FRANCISCO, Calif., May 22, 2025 — The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems… ⌘ Read more
$1 Million Tax Payer Grant for “Gender Inclusive Open Source”
A cancelled grant, worth a million bucks, for Oregon State University to create “best practices for fixing gender-bias bugs”. ⌘ Read more
10 Normal Items You Didn’t Know Were Once Part of Burial Rituals
We tend to think of everyday objects—pillows, perfumes, makeup—as inventions born from comfort, beauty, or practicality. But dig through the layers of history, and you’ll find that some of these now-ordinary items have surprising ties to ancient burial rites, funerary customs, or corpse preparation. To be clear: not all of these items were originally invented […]
The post [10 Normal Items You Didn’t Know … ⌘ Read more
Mastering SQL Injection Recon: Step-by-Step Guide for Bug Bounty Hunters
A practical guide to uncovering SQL injection flaws using automation, payloads and deep reconnaissance techniques.
[Continue reading … ⌘ Read more
Strengthening Web service security with Apache2: Best practices for 2025
Keeping your Apache2 web services safe: What you need to know this year
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more
5 Linux Commands You’ve Probably Never Heard Of
In this article, I will show you five Linux commands you’ve probably never heard of. They’re simple, practical, and designed to make your…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c … ⌘ Read more
10 Evil Religions in Fiction
Religion is a source of comfort and conscience. As people look to their respective gods for guidance, their conclusions inform their values, drive their actions, and give meaning to events. However, that pattern isn’t always a good thing, as some religious practices aren’t so righteous. An ignoble doctrine could be a cheap excuse to set […]
The post 10 Evil Religions in Fiction appeared first on [Listverse](h … ⌘ Read more
** Collaboration is a scary word **
I like programming partially because it’s a practice I can, with appropriate to unhealthy application of effort, usually accomplish something at least proximal to my intention.
This isn’t true for visual art, nor music. Lately I’ve been feeling like the little games and toys I wanna make are sorta hampered by my total inability to make stuff I find aesthetically appealing…so…I’ve been thinking about collaboration. Which is a scary word because, you know, other people and all, but I figured I’d … ⌘ Read more
Building a Secure Home Network in 2025: Practical Tips ⌘ Read more
Securing Apache2 + PHP: Practical guide for safer web hosting
A practical security checklist to harden your Apache2 + PHP stack and protect your web applications from common vulnerabilities.
[Continue reading on InfoSec Write-ups »](https:// … ⌘ Read more
Secure your Python applications: Best practices for developers
Practical security tips every Python developer should know — from dependency safety to protecting against injection attacks and securing…
[Continue reading on InfoSec Write … ⌘ Read more
@prologic@twtxt.net Absolutely! It is essential to practice and deepen every art 😄
Copilot ask, edit, and agent modes: What they do and when to use them
An introduction to the three distinct modes of GitHub Copilot and a practical guide for integrating them effectively into your workflow.
The post Copilot ask, edit, and agent modes: What they do and when to use them appeared first on The GitHub Blog. ⌘ Read more
@andros@twtxt.andros.dev You know, I’d really love to see how/if location-based addressing works in practice. I might fork jenny to judy and run both things in parallel for a while … 🤔
Erlang Solutions: Reduce, Reuse… Refactor: Clearer Elixir with the Enum Module
“When an operation cannot be expressed by any of the functions in the Enum module, developers will most likely resort to reduce/3.”
From the docs for Enum.reduce/3
In many Elixir applications, I find
Enum.reduceis used frequently.Enum.reducecan do anything, but that doesn’t mean it should. In many cases, otherEnumfunctions are more readable, practically as fast, and easier … ⌘ Read more
CNCF Announces OpenObservabilityCon North America to Accelerate Open Source Innovation and Tame Infrastructure Complexity
New event will convene observability leaders, developers, and end users to advance open source observability tools and practices SAN FRANCISCO, April 22, 2025 — The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud… ⌘ Read more
Exploring GitHub CLI: How to interact with GitHub’s GraphQL API endpoint
Discover practical tips and tricks for forming effective GraphQL queries and mutations.
The post Exploring GitHub CLI: How to interact with GitHub’s GraphQL API endpoint appeared first on The GitHub Blog. ⌘ Read more
Cracking the code: How to wow the acceptance committee at your next tech event
Want to speak at a tech conference? These four practical tips will help your session proposal stand out—and land you on the stage.
The post Cracking the code: How to wow the acceptance committee at your next tech event appeared fi … ⌘ Read more
GitHub for Beginners: Security best practices with GitHub Copilot
Learn how to leverage GitHub Copilot to make your code more secure.
The post GitHub for Beginners: Security best practices with GitHub Copilot appeared first on The GitHub Blog. ⌘ Read more
There’s one way you can make your super more secure
Super funds are attractive targets for hackers, and recent attacks on funds have put the sector’s security practices under the microscope. ⌘ Read more
Run Gemma 3 with Docker Model Runner: Fully Local GenAI Developer Experience
Explore how to run Gemma 3 models locally using Docker Model Runner, alongside a Comment Processing System as a practical case study. ⌘ Read more
Topaz Tz170 J484 Development Kit with 256 Mbit x32 LPDDR4 at 1.6 Gbps & MIPI D-PHY
The Topaz Tz170 J484 Development Kit is a compact platform for evaluating and prototyping with the Efinix Tz170 FPGA. It integrates onboard memory, configurable I/O, and a preloaded reference design, providing a practical setup for testing and demonstration across a range of FPGA applications. The development kit is built around the Tz170 FPGA, which uses […] ⌘ Read more
10 Crazy Cultural Practices from Deep History
Culture includes everything we do, believe, and have done to us. Culture comprises everything humanity has achieved and learned. Looking back into the deep past, we can better appreciate how our civilization has evolved over the vast sweep of millennia. Some of the following findings stretch back to the dawn of humanity itself, while others […]
The post [10 Crazy Cultural Practices from Deep History](https://listverse.com/2025/04/03/10-craz … ⌘ Read more
Wow, this is a nice way to practice internationalization for our systems
https://i18n-puzzles.com
Open Policy Agent: Best Practices for a Secure Deployment
Thanks to its performance and adaptability, Open Policy Agent (OPA) is a common choice for managing policy-as-code. Nonetheless, security flaws can develop if OPA is abused or improperly designed, much as with any tool handling important… ⌘ Read more
Bit of an update, there is now a general licence for all my stuff:
“Unless projects are accompanied by a different license, Creative Commons apply (“BY-NC-ND” for all art featuring the Canine mascot and “BY-NC” for everything else).”
It’s even included on my website, where most of the demand for a clear licence originated from:

In practice this changes nothing, as I was never enforcing anything more than this anyway and given permission for other use too. Now it’s just official that this is the baseline, of what can be done, without having to ask for permission first.
10 Pharmaceutical Scandals That Will Leave You Fuming
When large amounts of money are involved, companies have proven to do whatever it takes to protect their profits, even if It’s unethical and illegal. The pharmaceutical industry is no stranger to illegal practices and scandals involving shady businesses, leading to more money. Some of the largest drug companies have faced backlash for price hikes, […]
The post [10 Pharmaceutical Scandals That Will Leave You Fuming](https://l … ⌘ Read more
Automating NIS2 Compliance in Kubernetes with Kyverno: A Practical Guide
2025 is the year when NIS2 measures will start to bite. Is your platform team ready for the challenge? This post gives a brief overview of NIS2 in the context of platform engineering. Then it gives… ⌘ Read more
Full exposure: A practical approach to handling sensitive data leaks
Treating exposures as full and complete can help you respond more effectively to focus on what truly matters: securing systems, protecting sensitive data, and maintaining the trust of stakeholders.
The post Full exposure: A practical approach to handling sensitive data leaks appeared first on [The GitHu … ⌘ Read more
10 Male Characters Played by Women
Casting can be counterintuitive. Studios often hire male actors for female characters and vice versa. Such decisions aren’t that unusual, especially in this age of gender-swapping established stories. For better or worse, they’re a fairly common practice nowadays, meaning they no longer draw the widespread attention they once did. Ironically, it’s the less overt examples […]
The post [10 Male Characters Played by Women](https://listverse.com/2025/03/09/10-male-c … ⌘ Read more
10 Everyday Fashion Items That Were Originally Designed for War
History has a funny way of taking battlefield necessities and turning them into fashion statements. Some of the most stylish and essential pieces in our wardrobes started with a much more practical and sometimes downright deadly purpose. From keeping soldiers warm to ensuring they had room for extra ammo (or snacks, as we now use […]
The post [10 Everyday Fashion Items That Were Originally Designed for Wa … ⌘ Read more
Aligning Language Practices for KubeCon + CloudNativeCon Japan and KubeCon + CloudNativeCon China
The global cloud native community thrives on diversity and collaboration, bringing together contributors, users, and enthusiasts worldwide. As we continue to grow and expand, we are committed to creating an inclusive and effective environment for learning… ⌘ Read more
Apple Shareholders Vote to Continue Illegal DEI Practices
“Apple may need to make DEl changes in the future as the legal landscape evolves,” says Apple CEO Tim Cook. ⌘ Read more
Announcing the Kubernetes “Shift Down” Security Paper
The CNCF Kubernetes Policy Working group (WG) has just released the Shift Down Security paper to help educate the community about how organizations can leverage cloud native security best practices to address key business risks and… ⌘ Read more
10 Classic American Songs That Started in Minstrelsy
In the early 1800s, Americans used to enjoy minstrel shows. Essentially, watching white men dance and sing their hearts out—while wearing blackface and mocking African Americans. This practice continued into the 19th century, even being seen in Hollywood films and on TV. Minstrel shows have been called the first truly American form of theater. While […]
The post [10 Classic American Songs That Started in Minstrelsy](https://li … ⌘ Read more
10 Famous Movie Villains Inspired by Real People
The best movie villains affect more than just the film’s protagonist. They practically jump out of the screen and live in our nightmares. The only thing we call fall back on is that old comfort many of us learned when we were young, “It’s only a movie.” But time and time again, we’re reminded that […]
The post [10 Famous Movie Villains Inspired by Real People](https://listverse.com/2025/02/22/10-famous-movie-villains-inspired-by-real- … ⌘ Read more
Short summary of Project2025 and Trump’s plans for the US:
Abolish the Federal Reserve
Why? To end what is seen as an unelected, centralized body that exerts too much influence over the economy and monetary policy, replacing it with a more transparent, market-driven approach.Implement a national consumption tax
Why? To replace the current federal income tax system, simplify taxation, and increase government revenue through a broader base that includes all consumers.Lower corporate tax rates
Why? To promote business growth, increase investment, and stimulate job creation by reducing the financial burden on companies.Deregulate environmental policies
Why? To reduce government intervention in the economy, particularly in energy and natural resources sectors, and to foster a more business-friendly environment.Restrict abortion access
Why? To align with conservative pro-life values and overturn or limit abortion rights, seeking to restrict the practice at a federal level.Dismantle LGBTQ+ protections
Why? To roll back protections viewed as promoting LGBTQ+ rights in areas like employment and education, in line with traditional family values.Eliminate diversity, equity, and inclusion (DEI) programs
Why? To end policies that are seen as divisive and to promote a merit-based system that prioritizes individual achievements over group identity.Enforce stricter immigration policies, including mass deportations and detentions
Why? To prioritize border security, reduce illegal immigration, and enforce existing laws more aggressively, as part of a broader strategy to safeguard U.S. sovereignty.Eliminate the Department of Education
Why? To reduce federal control over education and shift responsibilities back to local governments and private sectors, arguing that education decisions should be made closer to the community level.Restructure the Department of Justice
Why? To ensure the department aligns more closely with the administration’s priorities, potentially reducing its scope or focus on areas like civil rights in favor of law-and-order policies.Appoint political loyalists to key federal positions
Why? To ensure that government agencies are headed by individuals who are committed to advancing the administration’s policies, and to reduce the influence of career bureaucrats.Develop training programs for appointees to execute reforms effectively
Why? To ensure that political appointees are equipped with the knowledge and skills necessary to implement the proposed changes quickly and effectively.Provide a 180-day transition plan with immediate executive orders
Why? To ensure that the incoming administration can swiftly implement its agenda and make major changes early in its term without delay.
Do y’all agree with any/all/some of these poliices? Hmmm 🤔
KubeCon + CloudNativeCon Europe 2025 co-located event deep dive: OpenTofu Day Europe
Chair: Sebastian StadilApril 1, 2025 London OpenTofu Day is the best place to connect with the OpenTofu community. It’s a fantastic place to talk shop with other infrastructure or platform engineers, trade stories, discuss best practices,… ⌘ Read more
Top 10 Strangest Things Done with Hearts Throughout History
Hearts can be seen everywhere when Valentine’s Day rolls around—from romantic cards adorned with hearts to heart-shaped chocolates and candies filling stores. But throughout history, humans have also done some strange (and less saccharine!) things with actual hearts, such as in the organ, not the symbol. Below, you’ll find a few morbidly fascinating funerary practices, […]
The post [Top 10 Strangest Things Done w … ⌘ Read more
another one would be to allow changing public keys over time (as it may be a good practice [0]). A syntax like the following could help to know what public key you used to encrypt the message, and which private key the client should use to decrypt it:
!<nick url> <encrypted_message> <public_key_hash_7_chars>
Also I’d remove support for storing the message as hex, only allowing base64 (more compact, aiming for a minimalistic spec, etc.)
Unlocking Efficiency with Docker for AI and Cloud-Native Development
Learn how Docker helps you deliver secure, efficient applications by providing consistent environments and building on best practices that let you discover and resolve issues earlier in the software development life cycle (SDLC). ⌘ Read more
10 Book Adaptations You Forgot About
Books are an excellent source of inspiration for filmmakers. If they take a literary classic and adapt it to the screen, they practically guarantee the project’s success. After all, the story already works on the page, so all the screenwriters have to do is translate it. Doing so will put the movie, TV show, or […]
The post 10 Book Adaptations You Forgot About appeared first on [Listvers … ⌘ Read more
@prologic@twtxt.net YEAH it’s so cool!!! i was thinking about trying it as sorta practice for golang lol
i recorded my first camcorder video!!!! it’s just me practicing guitar after sooo long of not playing it. my acoustic, to be specific (well, it’s an electric acoustic thing but i can play it without plugging it in lol, i do have a stratocaster though). it’s capped at ~30 minutes because i used one mini DVD for it and decided i wasn’t gonna use another one to extend the run time. so yeah. it was super fun! i hope i can share it soon, i’m ripping the disc with make MKV right now, then i’ll re-encode to a web friendly format, and upload to my site and hope that works well
American doctors hate the health care system almost as much as you do
Dylan Scott, Staff Writer - Vox
_Stephan: I recently talked with a friend of mine who is also one of my doctors and he told me how bad the hassle of being a physician trying to practice in the American illness profit system has become. Another of my physicians told me her group practice was sold to Optum, and she is now an employee, and not very happy about it. My wife goes to two do … ⌘ Read more
10 Ridiculous Riffs on Robin Hood
Robin Hood is practically synonymous with heroism. In the face of oppression in medieval England, this folk figure stands up to the malicious Sheriff of Nottingham and the malevolent Prince John. His example helps rally the commoners into a formidable fighting force. Together with his band of outlaws, Robin takes from the rich and gives […]
The post 10 Ridiculous Riffs on Robin Hood appeared firs … ⌘ Read more
One benefit with bluesky is your username is also a website. And not a clunky URL with slashes and such. I wish twtxt adopted that. I have advocated for webfinger to for twtxt to let us do something like it with usernames. Nostr has something like it
By default the bsky.social urls all redirect to their feeds like: hmpxvt.bsky.social
Many custom urls will redirect to some kind of linktree or just their feed cwebonline.com or la.bonne.petite.sour.is or if you are a major outlet just to your web presence like https://theonion.com or https://netflix.com
Its just good SEO practice
Do all nostr addresses take you to the person if typed into a browser? That is the secret sauce.
No having to go to some random page first. no accounts. no apps to install. just direct to the person.
One benefit with bluesky is your username is also a website. And not a clunky URL with slashes and such. I wish twtxt adopted that. I have advocated for webfinger to for twtxt to let us do something like it with usernames. Nostr has something like it
By default the bsky.social urls all redirect to their feeds like: hmpxvt.bsky.social
Many custom urls will redirect to some kind of linktree or just their feed cwebonline.com or la.bonne.petite.sour.is or if you are a major outlet just to your web presence like https://theonion.com or https://netflix.com
Its just good SEO practice
Do all nostr addresses take you to the person if typed into a browser? That is the secret sauce.
No having to go to some random page first. no accounts. no apps to install. just direct to the person.
How to generate unit tests with GitHub Copilot: Tips and examples
Learn how to generate unit tests with GitHub Copilot and get specific examples, a tutorial, and best practices.
The post How to generate unit tests with GitHub Copilot: Tips and examples appeared first on The GitHub Blog. ⌘ Read more
The future of customer service is here, and it’s making customers miserable
Emily Stewart, Senior Correspondent - msn | Business Insider
Stephan: Another AI problem. I have personally experienced this problem, have you? Not with insurance, but with medical group practices, setting up appointments. I think this trend is going to get much worse.
… ⌘ Read moreGeorgia Fires Entire Maternal Mortality Panel After Reporting on Abortion Ban Deaths
Jessica Corbett, Senior Editor - Common Dreams
_Stephan: If you look at the news coming out of the Red states what you see is the healthcare available to women is becoming more and more precarious. Here is the latest from Georgia. But what I am particularly seeing are four trends: First, OB/GYNs are leaving Republican-controlled Red states, practicing pr … ⌘ Read more
How Fastly used Kubernetes to scale our platform engineering practice
Member post originally published on Fastly’s blog by Hannah Aubry About five years ago, Fastly had a problem with scale. No, not our network. Fastly’s network continues to scale effortlessly, including recently breezing past a 353… ⌘ Read more
CNCF Launches Technology Landscape Radar, Reference Architectures to Address Gaps in Cloud Native Ecosystem
CNCF’s End User Technical Advisory Board has compiled new materials to promote best practices and simplify the adoption of cloud native technologies SALT LAKE CITY, Utah – KubeCon + CloudNativeCon North America – November 14, 2024… ⌘ Read more
Apple Faces Epic Games-Style China Lawsuit Over App Store Practices
A Chinese court has agreed to hear a lawsuit against Apple from Beijing Bodyreader, a developer seeking around $420,000 in damages after their children’s posture correction app was removed from the App Store in 2020.
_[Bloomberg](https://www.bloomberg.com/news/articles/2024-11-12/apple-fights-fortnite-like-china-lawsuit-ov … ⌘ Read more
KubeCon + CloudNativeCon North America 2024 co-located event deep dive: Kubernetes on Edge
Co-chairs: Tina Tsou and Mars Toktonaliev November 12, 2024 Salt Lake City, Utah Kubernetes on Edge Day demonstrates edge computing is here, and it’s powered by Kubernetes. We’re showcasing real-world use cases, best practices, and cutting-edge… ⌘ Read more
Diversity, inclusion, and belonging at GitHub in 2024
From advancing ethical AI practices to expanding open source learning for developers in Africa, discover how we’ve fostered diversity, inclusion, and belonging this year.
The post Diversity, inclusion, and belonging at GitHub in 2024 appeared first on The GitHub Blog. ⌘ Read more
Docker at Cloud Expo Asia: GenAI, Security, and New Innovations
At Cloud Expo Asia 2024, Docker showcased its latest innovations in AI integration, security best practices, and product updates, highlighting how containers empower GenAI workflows and enable efficient, secure software development. ⌘ Read more