TechLich

joined 1 year ago
[–] TechLich@lemmy.world 3 points 15 hours ago* (last edited 15 hours ago)

Yep, and even when talking about living things it's not a clear distinction.

In biology, poison is a substance that causes harm when an organism is exposed to it. Venom is a poison that enters the body through a sting or bite. In a bunch of medical fields though, poisons only apply to toxins that are ingested or absorbed through the skin and that definition sometimes carries across to zoology.

Venomous creatures are poisonous by most definitions because venom is a poison. But if the distinction is useful in a medical or zoological context then they're not.

tldr: The pedantry of eg. correcting someone who says a snake is poisonous is totally pointless and mostly wrong.

[–] TechLich@lemmy.world 1 points 2 days ago

You forgot interrobang‽ The most important and incredulous reason for a compose key.

[–] TechLich@lemmy.world 42 points 1 week ago* (last edited 1 week ago) (3 children)

Hmmm...

That looks pretty paywally to me. That said, I'm all for people supporting independent media.

[–] TechLich@lemmy.world 25 points 2 weeks ago

This is called "semantic satiation" which are both pleasingly weird words now that I think about it...

[–] TechLich@lemmy.world 1 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

I don't think that's how it works? It's the client application that has the key for the end to end encryption, not the server. I don't think you need to trust the matrix server you use? I could be wrong, I don't know matrix particularly well.

[–] TechLich@lemmy.world 1 points 3 weeks ago

Yeah, that's fair enough, though I'm not sure it's very different from malicious instances creating normal user accounts?

You can see when users from an instance are all suspiciously voting the same way at the same time regardless of whether they are usernames or IDs.

There's lots of legitimate users that only vote but never post so doing it based on that doesn't seem very effective?

The second problem is solved using public key cryptography, the same way that you can't impersonate someone else's username to post comments. Votes and comments are digitally signed (There would need to be a different public key for voting to maintain pseudonymity though).

[–] TechLich@lemmy.world 12 points 3 weeks ago (3 children)

How about pseudonymous as a compromise? Votes could be publicly federated but tied to some uuid instead of the username. That way you still have the same anti spam ability (can see that a user upvoted these things from this instance at this time) but can't tie it directly to comments or actual user accounts without some extra osint.

It might be theoretically possible to correlate the uuids with an account's activity and dox the user in some cases, especially with some instances having a single user, but it would be very difficult or impossible to do on larger instances and would add an extra layer. Single user instances would be kind of impossible to make totally private anyway because they can be identified by instance.

[–] TechLich@lemmy.world 1 points 4 weeks ago

Yeah, I think you're right but the phrasing is a little weird for that. It makes it sound like the optimiser lets you avoid having to do a "hex dump" which would be somehow "fattening" for the program causing it to have worse performance. Might be the marketing people not knowing what they're talking about.

Although we did do a lot of printing code on dot matrix printers back in the day, it would usually be the source code itself, this is a post-pass optimiser. It ran after the COBOL compiler had already turned the human readable code into object code. Although printing out the optimised hex might save on paper as a backup solution, it probably wouldn't help with debugging.

[–] TechLich@lemmy.world 5 points 4 weeks ago (3 children)

"virtually eliminate fattening hex dumps"

What is a fattening hex dump in this context‽

[–] TechLich@lemmy.world 1 points 1 month ago

I'd add to this to say that redis as a key-value store often sits alongside a relational database like postgres etc. to act as a cache for it.

Basically, requests to be sent to the relational db (like postgres) get turned into a key and the results stored as a value in redis. Then when the same request comes through again, it can pull the results quickly out of the key-value store without having to search postgres by running a long SQL query again. There's a few different caching strategies to keep things up to date or have the cached data expire regularly, etc. but that's the gist of it.

Important to note that not all applications need something like that and not all queries would even benefit from it (postgres is pretty fast and can even do that kind of thing itself) but if there's a lot of users running the same slow query over and over, caching the results can help immensely.

[–] TechLich@lemmy.world 18 points 1 month ago

It does sound very strange. What kind of anti-China content would ever help a student's application process? Most of the application documents are about things like English language competency, visa requirements and prior qualifications, not political opinions.

[–] TechLich@lemmy.world 2 points 1 month ago

Ifnkovhgroghprm

 

Apparently as a result of terrorism according to Data. Brexit 2 Northern Ireland edition coming soon?

Memory Alpha page

view more: next ›