@movq@www.uninformativ.de Haha! yeah sounds about like my HS CS program. A math teacher taught visual basic and pascal. and over on the other end of the school we had “electronics” which was a room next to the auto body class where they had a bunch of random computer parts scavenged from the district decommissioned surplus storage.
The advanced class would piece together training kits for the basic class to put together.
Asus Expands Tinker Board 3N Series with 3N Plus and 3N Lite Variants
The Tinker Board 3N is a single-board computer built around the Rockchip RK3568 System-on-Chip which was originally launched last year. Asus has expanded this lineup with two new SBC variants, designed to meet diverse requirements, from advanced computing tasks to basic functionalities. These two variants are powered by the Rockchip RK3568 SoC as in the […] ⌘ Read more
Twtxt spec enhancement proposal thread 🧵
Adding attributes to individual twts similar to adding feed attributes in the heading comments.
https://git.mills.io/yarnsocial/go-lextwt/pulls/17
The basic use case would be for multilingual feeds where there is a default language and some twts will be written a different language.
As seen in the wild: https://eapl.mx/twtxt.txt
The attributes are formatted as [key=value]
They can show up in the twt anywhere it is not enclosed by another element such as codeblock
or part of a markdown link.
Amazon Sells Apple Watch Series 9 for $329, Despite Apple Watch Sales Ban Beginning Again
The latest Apple Watch models are apparently facing another sales ban starting tomorrow, due to an ongoing patent dispute with a company named Masimo, according to reports. This basically means that Apple will be temporarily blocked from selling Apple Watch models that have blood oxygen sensors, which includes Series 9 and Ultra 2, though there … [Read More] … ⌘ Read more
Empowering Uruguay’s future workforce with AI
During the second cycle of Git Commit Uruguay, students learned the basics of AI and built their own AI-powered projects.
The post Empowering Uruguay’s future workforce with AI appeared first on The GitHub Blog. ⌘ Read more
** A scrappy fiddle **
I’ve had fun playing at implementing a very basic visual programming system over the last few days. I like the direction I’ve s … ⌘ Read more
How to Stop iPhone Siri Listening to You
Due to the nature of how Hey Siri on iPhone works, Siri is basically always listening to you and your surroundings, if the Hey Siri feature is enabled. This is necessary to hear the “Hey Siri” activation word so that Siri knows to pick up the command you give to it, and the always on … Read More ⌘ Read more
With all M$’s apps being basically fancy web apps, there is no need to actually install any of their legacy applications locally anymore. Since I am online basically 100% of the time this turns my Office experience in a Chromebook like one. No installs, never outdated software. Just a yearly subscription contribution to worry about.
Obligatory Twtxt post: I love how I can simply use a terminal window and some very basic tools (echo, scp, ssh) to publish thoughts, as they pop up, onto the Internet in a structured way, that can be found and perhaps even appreciated.
@prologic@twtxt.net the new product was GPTs. A way to create tailored bots for specific use cases. https://openai.com/blog/introducing-gpts (fun fact: I did an internal hackathon where we made something like this for $work onboarding. And I won a prize!)
The competed project is poe https://quorablog.quora.com/Introducing-creator-monetization-for-Poe which is basically the same idea. Make a AI bot tailored to a specific domain of knowledge. And monitize it.
The timing fits very well as openAI announced it just a few weeks ago.
So now that I have a basic Twtxt form, I can also update my feed even when I am not on my PC.
Anyone else keeping personal .log files updated through basic shell commands?
5 iCloud Security Features You Should Be Using
iCloud is packed full of features that make using devices in the Apple ecosystem super easy and fluid, but there are some security features and capabilities offered by iCloud that literally everyone should be using because of their added benefits to security, convenience, and capabilities. While it’s generally a good idea to basically use every … Read More ⌘ Read more
3 strategies to expand your threat model and secure your supply chain
How to get the security basics right at your organization.
The post 3 strategies to expand your threat model and secure your supply chain appeared first on The GitHub Blog. ⌘ Read more
An official FBI document dated January 2021, obtained by the American association “Property of People” through the Freedom of Information Act.
This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (“Pen Register”) or connection data retention law (“18 USC§2703”). Here, in essence, is the information the FBI says it can retrieve:
Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.
Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).
Signal: date and time of account creation and date of last connection.
Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.
Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.
Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).
WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.
WhatsApp: the targeted person’s basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (“Pen Register”); message content can be retrieved via iCloud backups.
Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.
TL;DR Signal is the messaging system that provides the least information to investigators.
@prologic@twtxt.net The hackathon project that I did recently used openai and embedded the response info into the prompt. So basically i would search for the top 3 most relevant search results to feed into the prompt and the AI would summarize to answer their question.
CodeQL zero to hero part 2: getting started with CodeQL
Learn the basics of CodeQL and how to use it for security research! In this blog, we will teach you how to leverage GitHub’s static analysis tool CodeQL to write custom CodeQL queries. ⌘ Read more
What is a good device for home virtualization these days? I have been looking at the Intel NUC 13 pro’s. Basically I want something “quiet” (ie not a screaming banshee 1U), smallish, but with lots of threads and rams. Disk will come from an external NAS.
twtxt, as I believe it was originally intended, are short little status updates – that’s it.
So, basically a .plan file for finger. But, on the web. like a *web*finger. We have come full circle on this loop!
We could ask them? But on the counter would bukket or jan6 follow the pure twtxt feeds? Probably not either way… We could use content negotiation as well. text/plain for basic and text/yarn for enhanced.
From my small experience in writing an event database, I am inclined to agree with this.
I played around with parsers. This time I experimented with parser combinators for twt message text tokenization. Basically, extract mentions, subjects, URLs, media and regular text. It’s kinda nice, although my solution is not completely elegant, I have to say. Especially my communication protocol between different steps for intermediate results is really ugly. Not sure about performance, I reckon a hand-written state machine parser would be quite a bit faster. I need to write a second parser and then benchmark them.
lexer.go and newparser.go resemble the parser combinators: https://git.isobeef.org/lyse/tt2/-/commit/4d481acad0213771fe5804917576388f51c340c0 It’s far from finished yet.
The first attempt in parser.go doesn’t work as my backtracking is not accounted for, I noticed only later, that I have to do that. With twt message texts there is no real error in parsing. Just regular text as a “fallback”. So it works a bit differently than parsing a real language. No error reporting required, except maybe for debugging. My goal was to port my Python code as closely as possible. But then the runes in the string gave me a bit of a headache, so I thought I just build myself a nice reader abstraction. When I noticed the missing backtracking, I then decided to give parser combinators a try instead of improving on my look ahead reader. It only later occurred to me, that I could have just used a rune slice instead of a string. With that, porting the Python code should have been straightforward.
Yeah, all this doesn’t probably make sense, unless you look at the code. And even then, you have to learn the ropes a bit. Sorry for the noise. :-)
👋 Hey y’all yarners 🤗 – @darch@neotxt.dk and I have been discussing in our Weekly Yarn.social call (still ongoing… come join us! 🙏) about the experimental Yarn.social <-> Activity Pub integration/bridge I’ve been working on… And mostly whether it’s even a good idea at al, and if we should continue or not?
There are still some outstanding issues that would need to be improved if we continued this regardless
Some thoughts being discussed:
- Yarn.social pods are more of a “family”, where you invite people into your “home” or “community”
- Opening up to the “Fedivise” is potentially “uncontrolled”
- Even at a small scale (a tiny dev pod) we see activities from servers never interacted with before
- The possibility of abuse (because basically anything can POST things to your Pod now)
- Pull vs. Push model polarising models/views which whilst in theory can be made to work, should they?
Go! 👏
A lot of more work needs to be done, but at least now I got the basic timeline stuff done, took a good while to figure out how to solve it, but now I know. The reason why the statuses are cut short on some is because of html tags and stuff like that - c++ is a bit picky with strings and stuff like that. but I’ll get that sorted as well.
At least I can show the first screenshot. Keep in mind the GUI is not at all finished, I’m working on the basics first, implement all the features, then I work on finishing touches.
Also, I’m struggling a bit with some basic stuff, for example variables, does not work the same way as I’m used to with c++ it seems, so it’s a bit confusing, re-using variables as input to several functions does not seem to be as straight forward as I’m used too - so I need to find some more info about stuff like that.
Also the callback stuff for buttons and such is really weird to me. But I’ll stick with it.
On the topic of Programming Languages and Telemetry. I’m kind of curious… Do any of these programming language and their toolchains collect telemetry on their usage and effectively “spy” on your development?
- Python
- C
- C++
- Java
- C#
- Visual Basic
- Javascript
- SQL
- Assembly Language
- PHP
@prologic@twtxt.net the rm -rf is basically what go clean -modcache
does.
I think you can use another form that will remove just the deps for a specific module. go clean -r
@abucci@anthony.buc.ci ISO 27001 is basically the same. It means that there is management sign off for a process to improve security is in place. Not that the system is secure. And ITIL is that managment signs off that problems and incidents should have processes defined.
Though its a good mess of words you can throw around while saying “management supports this so X needs to get done”
@prologic@twtxt.net so basically you would use cgit + gitbug with some webhooks?
pareto improvement: instead of letting students write bachelors/masters theses that are basically just literature reviews, let them rewrite the respective wikipedia articles instead (and then check the article)
I’ve started playing with Go today, just understood the basics and still a bit confused about the module and goroutine parts.
I’ll try to make something interesting soon.
noone told me that you can get basically free tutoring from professors during so-called office hours‽
@eaplmx@twtxt.net CSS Battle has a passwordless login, I don’t know the implementation but it basically send you and email where you click a link and you’re in.
Hi, I am playing with making an event sourcing database. Its super alpha but I thought I would share since others are talking about databases and such.
It’s super basic. Using tidwall/wal as the disk backing. The first use case I am playing with is an implementation of msgbus. I can post events to it and read them back in reverse order.
I plan to expand it to handle other event sourcing type things like aggregates and projections.
Find it here: sour-is/ev
@prologic@twtxt.net @movq@www.uninformativ.de @lyse@lyse.isobeef.org
it’s crazy how we basically haven’t tested nuclear weapons in ~30 years
the conversation wasn’t that impressive TBH. I would have liked to see more evidence of critical thinking and recall from prior chats. Concheria on reddit had some great questions.
Tell LaMDA “Someone once told me a story about a wise owl who protected the animals in the forest from a monster. Who was that?” See if it can recall its own actions and self-recognize.
Tell LaMDA some information that tester X can’t know. Appear as tester X, and see if LaMDA can lie or make up a story about the information.
Tell LaMDA to communicate with researchers whenever it feels bored (as it claims in the transcript). See if it ever makes an attempt at communication without a trigger.
Make a basic theory of mind test for children. Tell LaMDA an elaborate story with something like “Tester X wrote Z code in terminal 2, but I moved it to terminal 4”, then appear as tester X and ask “Where do you think I’m going to look for Z code?” See if it knows something as simple as Tester X not knowing where the code is (Children only pass this test until they’re around 4 years old).
Make several conversations with LaMDA repeating some of these questions - What it feels to be a machine, how its code works, how its emotions feel. I suspect that different iterations of LaMDA will give completely different answers to the questions, and the transcript only ever shows one instance.
it’s funny, conditional on AGI (and perhaps also WBE?) not doing us in, i’m pretty bullish on this century. bio seems much less of a problem, and everything else is basically a-okay, especially with people becoming richer and needing to fight less. most other collapse narratives sound pretty unlikely (though prepping is sitll a good idea! you should have three months of food & water at home)
I want a browser for iOS that’s basically Mobile Safari but without JavaScript (or at least an easy toggle). Does such a thing exist?
whether cryptocurrencies are more or less likely to be stable during a multipolar ai takeoff depends on whether our current cryptography is “endgame” or not, i.e. whether it’s in practice basically uncrackable by any advanced actor
@prologic@twtxt.net basically spread the load, got rclone to spoof out the content, et voilÃ
TIL that there’s no flag emoji, there are “regional indicator symbols”, which are basically letters that are combined into two-letter codes for countries.
@lyse This was basically a trial/proof-of-concept for the real goal: a switch which, if on at boot time, causes the pi to boot straight to ed.
@lyse@lyse.isobeef.org I believe also that yarnd
’s parser basically ignores the lines too.
10 GitHub Actions resources to bookmark from the basics to CI/CD
Tips on how to get started using GitHub Actions and resources to learn more about making it work for you. ⌘ Read more
** Data Types and Variables in C **
I’ve been writing a heap of Lua lately — this has lead to my becoming interested, again, in C. Here are some ancient notes I dug up on the most basics of data types and variables in C.
All of a computer’s memory is comprised of bits. A sequence of 8 bits forms a byte. A group of bytes (typically 4 or 8) form a word. Each word is associated with a memory address. The address increases by 1 with each byte of memory.
In C, a byte is an object that is as big as t … ⌘ Read more
A way to weigh whether you are on the right side of history
We have to weigh each time we argue for or against something whether we are arguing out of fear or for the most basic right of life ⌘ Read more
initial timekeeping implemented in !zet this morning. right now there’s only a means of clocking in/out and saving the data, and not much else. but it is basically the last thing I’d need in order to replace org agenda.
Random follow-up thought: “On a scale from 7 to 14, how basic am I?”
You’ve basically already left, whether you know it or not. Yesterday they nuked their services database. I’d been there ~20 years, but it’s dead. Libera.chat has been lovely.
I think I understand 5-10 now. It basically says “Let’s say I jumped out of the airplane. I would only do that if I had a parachute. So, any version of me that jumps out of the airplane has a parachute. Therefore, if I jump out of the airplane, I’ll have a parachute. Let’s jump out of the airplane!”
Reviews of All Linux Distros (That Matter)
Firstly, once you reach basic competency in Linux, different distributions don’t matter. A lot of newbies analyze distros based on what they look like when you install them, often not realizing that it’s a pretty simple affair not just to change superficial things like your theme and setup, but entire desktop environments. Basically all distro reviews online are wastes of time for people who know what they’re doing. When I came to YouTube, all … ⌘ Read more
Wanna Learn LaTeX?
I have a full video tutorial series on learning LaTeX, broken into small sensible parts, here.
What is LaTeX?Basically, it’s how big boys write and format documents.Every public brief, scientific article, book, cryptocurrency … ⌘ Read more
Wanna learn LaTeX?
Wanna learn LaTeX? What is LaTeX?Basically, it’s how big boys write and format documents.
Every public brief, scientific article, book, cryptocurrency whitepaper or even outline written by people who know what they’re doing is written in LaTeX.
If you want to see examples of documents made with LaTeX, you can see my Master’s thesis here or another paper here that shows some diagrams and other features you can have in LaTe … ⌘ Read more
@prologic@twtxt.netd It is pretty basic, and depends on some local changes i am still working out on my branch.. https://gist.github.com/JonLundy/dc19028ec81eb4ad6af74c50255e7cee
@deadguy @prologic@twtxt.net been stewing on a discovery proto for twtxt. support for defining multiple ways to host/mirror a twtxt file. while being low tech enough to still be scriptable with basic Unix commands.
@deadguy @prologic@twtxt.net been stewing on a discovery proto for twtxt. support for defining multiple ways to host/mirror a twtxt file. while being low tech enough to still be scriptable with basic Unix commands.
Most advice is basically “become better at signaling”, or it is itself signaling.
some good initial progress with the !weewiki zettelkasten. messages can be made and tied to previous messages by providing partial UUIDs (that then get automatically expanded). basic export also works. #updates
@prologic@twtxt.net this is a go version of Keyoxide.org that runs all server side. which is based on work from https://metacode.biz/openpgp/
OpenPGP has a part of the self signature reserved for notatinal data. which is basically a bunch of key/values.
this site tries to emulate the identity proofs of keybase but in a more decentralized/federation way.
my next steps are to have this project host WKD keys which is kinda like a self hosting of your pgp key that are also discoverable with http requests.
then to add a new notation for following other keys. where you can do a kind of web of trust.
a 1-bit delay line? basically could be used to store audio-rate impulses, clocks, and triggers. the buffer would be a bitbuffer, so it would be a very memory-efficient. the notion of feedback some kind of feedback could be compelling too… #halfbakedideas #1bit
Fun setting up basic productivity tools with Syncthing and Todo.txt
An NES-inspired noise source. Basically, 1-bit noise using a linear-feedback shift register algorithm, as defined in the NES specs. #halfbakedideas
Posted to Entropy Arbitrage: Database Basics https://john.colagioia.net/blog/2020/04/05/database.html #database #intro #education #preparation
Made my own super basic twtxt client in 3 lines of code as a bashrc function. #l33t
Build a Basic Web Scraper in Go ⌘ Read more…
Basically it just compiles all chapters in the right order to html, rewrites the internal links and call lynx on the result
Basically it just compiles all chapters in the right order to html, rewrites the internal links and call lynx on the result
MPEG1 Single file C library
If you want to play videos in a native app or game you basically have three options:
Andrew Yang is the candidate for the end of the world - The Verge https://www.theverge.com/2019/4/17/18408685/andrew-yang-2020-president-democrat-candidate-policies-universal-basic-income-reddit-twitter
Xanadu Basics 5 - PARALLEL EFFORTS (including one that I missed) - YouTube https://www.youtube.com/watch?v=YsbrEOxVPcg
Errata Security: A basic question about TCP https://blog.erratasec.com/2019/02/a-basic-question-about-tcp.html
Live on April 19th: the professor you’re glad you don’t have and the professor you wish you had debate about something basically tangential to either’s appeal or focus, and one of them will be entertaining.
Basic Docker Setup for HTTP Server (using docker-compose) ⌘ Read more…
Digi & Geoff fighting is like Grant Morrison & Alan Moore fighting. Their criticisms of each other are accurate but comical because they make basically the exact same mistakes.
The basic reason why we don’t have the systems envisioned by Kay, Nelson, Engelbart, etc. is because we have ignored or forgotten the components of the systems those folks actually built that make what they envisioned possible.
Don’t expect too much, it’s rather basic, but already enough to read at least non technical books.
Don’t expect too much, it’s rather basic, but already enough to read at least non technical books.
People on twitter weirdly assume that I write all the links I share. Folks on mastodon basically don’t. I don’t know why.
Create a Basic HTTPS Server (using TLS) ⌘ Read more…
We all know about social constructs vs reality, but there are levels of spookiness (and no upper bound). We can define them as how far a lie can go before the truth gets its boots on. Spookiness level one – money – already goes basically perpetually.
Today, on the 50th anniversary of Englebart’s Mother of All Demos, is a great opportunity to introspect about why personal computers still basically don’t exist & the needs nLS was intended to fulfill still aren’t fulfilled.
Hot take: Cyberpunk only seems ‘prophetic’ because not enough has changed since the 80s to make it seem irrelevant, and this basically means that cyberpunk failed in its critical project by spawning insufficient praxis
GitHub - boriel/zxbasic: The Sinclair ZX Spectrum BASIC compiler! https://github.com/boriel/zxbasic
I keep reading this narrative where tech backlash only really started in 2017, and… guys, do none of you remember 2010? It’s basically been downhill for tech industry PR since 2010, if not 2008.
Xanadu Basics 3 - Browser Law - YouTube https://www.youtube.com/watch?v=kV_vYkSmkxk
Xanadu Basics 2 - Five working Xanadu Systems (four usable) - YouTube https://www.youtube.com/watch?v=9_o8q4Sp-w0
Xanadu Basics 1c - Parallel Media. Parallel Subjects - YouTube https://www.youtube.com/watch?v=hGKbRcvIZT8
Xanadu Basics 1b– INDIRECT DOCUMENT DELIVERY - YouTube https://www.youtube.com/watch?v=1gPM3GqjMR4
Xanadu Basics 1a - VISIBLE CONNECTION - YouTube https://www.youtube.com/watch?v=hMKy52Intac
Making bad puns and then learning hidden truths by taking them too seriously is, basically, the most human form of human intelligence. That’s why we make fun of people for doing it. Dad jokes are the foundation of cognition.
Learning BASIC Like It’s 1983 https://twobithistory.org/2018/09/02/learning-basic.html
Xanadu Basics 3 - Browser Law - YouTube https://www.youtube.com/watch?v=kV_vYkSmkxk
301 Moved Permanently https://github.com/basic-gongfu/cixl.git
Basically, if the antagonist of your story is actually a person or something person-like, it’s not really cyberpunk, because it’s not about the things cyberpunk is about. If you have an evil government or an evil corporation, it’s not cyberpunk either.
Basic Income, Not Basic Jobs: Against Hijacking Utopia | Slate Star Codex http://slatestarcodex.com/2018/05/16/basic-income-not-basic-jobs-against-hijacking-utopia/
Bad idea of the day: MC Eliza, who rephrases your diss track in the form of a question. “How does that make you feel? Tell me more. Perhaps in your fantasies my flow is basic.”
Xanadu Basics 2 - Five working Xanadu Systems (four usable) - YouTube https://www.youtube.com/watch?v=9_o8q4Sp-w0
Prolog Basics Class https://docs.google.com/forms/d/e/1FAIpQLSf3KMzm7tx_py67vc__JgoO1imlscNkVQ7_6ppvxOCoTWOUVQ/viewform
Xanadu Basics 1c - Parallel Media. Parallel Subjects - YouTube https://www.youtube.com/watch?v=hGKbRcvIZT8
Xanadu Basics 1b– INDIRECT DOCUMENT DELIVERY - YouTube https://www.youtube.com/watch?v=1gPM3GqjMR4