I think handwriting is likely less similar hand-to-hand than you think. I'm right-handed and learning to handwrite Persian (a right-to-left language) gave me a lot of appreciation for the difficulty lefties experience in writing English - the tip of your pen tends to be at an angle where it digs into the paper rather than smoothly brushing against it, you drag your hand through the ink you've just written, etc. It seems probable that the muscle movements to guide a pen along a certain path with one hand are going to be quite different from those to guide it along the same path with the other hand, so much so that it's essentially a different skill.
This sort of thing has been likened to evaporative cooling[1]. From a collection of particles of varying temperature, you can allow the hottest ones to escape, and the average temperature of the remaining particles will be lower even if no individual particle has cooled.
Similarly, if people aren't restricted from being hostile and insulting on a certain instance, eventually the moderates who don't like being insulted seek a less hostile environment elsewhere - but since it's not the extremists that leave, the average of the remaining members becomes more extremist. You can start with free speech and wind up with Nazis depressingly easily.
A balance has to be struck to maintain a stable community. On one hand, enough dissent must be tolerated that you're not constantly retreating from the advancing frontier of forbidden expression. On the other, you have to be willing to expel the troublemakers before they drive off your moderate members. I think @freemo and the gang are doing a pretty good job here of striking that balance.
1: https://www.lesswrong.com/posts/ZQG9cwKbct2LtmL3p/evaporative-cooling-of-group-beliefs
You have to think through how it would scale. An image you post could appear in arbitrarily many people's timelines simultaneously due to federation. If several thousand Mastodon clients all of a sudden try to load the same image from the webserver, that's a big spike it would have to handle.
One alternative would be for the client's instance to make a local copy on the first request, and rewrite the url so its users don't have to keep going back to the original. You'd get only one hit per instance instead of per user, but then you're back to storing a local copy anyway, so what's the gain?
Thanks! I found Discord nearly unusable in a mobile browser, but the website itself is very nice. A suggestion: it might be worth linking from the Study Hall page to the official bookstores, which I find have content not present in the free repositories.
Solution
Sounds like you aren't implementing this line from the problem description : "When he returns, he notices that all Xmasium-atoms in the pot now are of the same type."
Solution
Let a, b, c be the count of each species in no particular order. Three operations exist:
1. a++; b--; c--
2. a--; b++; c--
3. a--; b--; c++
Note that a' = (b+c) either decreases by two or is unchanged. This implies two properties:
a' cannot change from odd to even.
a' cannot increase.
The surviving species at the end (a' = 0) has to be γ, since the others have odd initial a'. And no more than 29 can be of this type, limited by the initial a' of the α species.
The problem recently posted by @freemo reminded me of this one from my freshman analysis class in university.
I claim that, for all natural numbers N that are not perfect squares, √N is irrational. Determine, and prove, whether my claim is true or false.
Maybe you've seen it before, if not; I encourage you to have a go at solving it.
> For now, there's no way to thank you enough for the link to "How to Ask Questions the Smart Way."
I'm glad to help. Be sure to also thank its author if you find it useful.
> In a narrowly-focused context, you felt compelled to offer an opinion about questions I presented @freemo. I posted three questions about QOTO.
For the sake of clarity, I'd like to correct this. You posted a question about Quey, and what I offered was a rebuttal of your claim that you'd only asked about QOTO (a separate instance from Quey). I also hypothesised that your later questions were mistaken for duplicates on account of the excessive copied content.
> > Never assume you are entitled to an answer.
> This copied sentence is an axiom, yes?
Axioms are a subset of declarative (statement) sentences, as they have to have a truth value. "Never assume you are entitled to an answer" is instead an imperative (command) sentence, which doesn't have a truth value.
Its corresponding declarative sentence would be "You never assume you are entitled to an answer." This might or might not be true, but it isn't an axiom: we infer its truth or falsity from other evidence such as your behaviour.
Taking section 2 as an example, the statment "QOTO has daily backups" is likewise declarative but not axiomatic. You can find evidence of its truth in @freemo's statement that QOTO is in compliance with the covenant and that keeping daily backups is a provision of the covenant. As corroborating evidence, you could also read https://qoto.org/about/more which states that QOTO is "professionally hosted with nightly backups".
> Do you understand the point I'm trying to make?
If this is an accurate restatement of your point, then I understood it:
You believe @freemo's position as administrator entitles you to receive from him answers to your questions about QOTO.
> What do you think?
I disagree. His role makes it likely he would know the answer to your questions, and positions him as an appropriate person to ask. He's also explicitly welcomed your questions and tries to answer them well. However, that stops short of entitling you to answers, so it's inappropriate to complain about their timeliness or quality. Asking nicely for clarifications would be a better response if you are dissatisfied.
Further discussion
The case where a is an integer but not a natural number can be excluded because primes are a subset of the natural numbers. If a < 1, then p = a³ - 1 < 0 which contradicts p's primality.
Answer
Assume the opposite: some cube a³ = p + 1 for some natural number a ≠ 2 and prime p.
The difference of cubes formula shows that:
p = a³ - 1 = (a² + a + 1)(a - 1)
Both terms (a² + a + 1) and (a - 1) are integers. Since p is prime, it follows that exactly one of the two must be equal to unity.
The first possibility can be ruled out because a² + a + 1 = 1 has no solution in the natural numbers.
The second is impossible because a - 1 = 1 contradicts the assumption a ≠ 2.
> The core value of QOTO has to do with asking questions. Is that not precisely what I've done?
It certainly is a value, which is why it's important to do it well. May I suggest the following pointers for improvement: http://www.catb.org/~esr/faqs/smart-questions.html
In particular, note the following:
> Hasty-sounding questions get hasty answers, or none at all.
The lack of proofreading that led to you naming Sinblr and Quey in your questions here is the direct cause of the unsatisfactory response[1] you got.
> Being seen to invest effort in simplifying the question makes it more likely you'll get an answer.
Had you pruned your questions down by removing the copied content, it is likely they would not have been mistaken for duplicates.
> Never assume you are entitled to an answer.
Complaining that you are "shocked" and "astonished" at the answers you've been given, that you "regret" the lack of response to your inquiries, that you find the replies "evasive", etc. will be read as ingratitude for the effort others put in to assist you, for free.
As regards your other points:
> Please explain how you captured any part of the of the list you made.
I right-click the timestamp and copy link location (using the web interface) to get each link. Then I insert a bracketed number into my post, and add the link at the end with a label corresponding to the bracketed number.
> May I ask if the final word in the phrase "copypasta" or "copypaste"?
Copypasta. "Copy and paste" is a verb phrase, while "copypasta" is a colloquialism for the actual content that gets duplicated in this manner.
> I've only asked you about this Mastodon instance.
This is a blatant falsehood. The timeline shows you've asked @freemo about QOTO[1][2], Sinblr[3], and Quey[4]. Apparently this is from simply not caring enough to proofread but then you really shouldn't expect anyone else to care enough to respond.
You're doing the same thing on multiple servers, and I don't think they appreciate it any more than we do. Actually, I'm sure they don't, because I can see that you're annoying them[5][6][7][8].
> I see that you haven't responded to my explicit inquiries about §2 and §3 of the Mastodon Covenant.
It appears they were mistaken for duplicates[9]. Significant fractions of the posts are word-for-word identical to the one he *did* answer, which at best is unnecessary repetition and at worst looks like you are deliberately spamming the timeline with copypasta.
1: https://qoto.org/@chikara/103194932276826890
2: https://qoto.org/@chikara/103195262932811017
3: https://qoto.org/@chikara/103195116062133823
4: https://qoto.org/@chikara/103195372122680388
5: https://mastodon.social/@LuigiEsq/103195944949371362
6: https://mastodon.social/@LuigiEsq/103195917423951015
7: https://mastodon.social/@Gargron/103195477821454886
8: https://mastodon.social/@Gargron/103195533864216794
9: https://qoto.org/@freemo/103195203045899014
My thoughts on the matter, having read and considered the existing discussion but not replying to any particular part of it:
Enlisting a new mod for every language spoken here doesn't make sense. A monolingual server with five mods and a thousand users is very different from a server with five languages, each with two hundred users and one mod - each language may have a different rate of abuse, mods can't pick up one another's slack when they go on vacation, etc. Moreover, evaluating a foreign-language candidate's suitability is unlikely to be better than guesswork, and rogue mods can cause a lot of damage very quickly. I do not think you will find this an effective solution.
You might reason something like the following:
1. In order that other servers need not block us to avoid being spammed, and to improve the experience of our own users, all content posted here is moderated.
2. As discussed above, content in languages other than English cannot be practicably moderated here.
3. Therefore, the set of content posted here (which, by statement 1, *is* guaranteed moderated) must be disjoint from the set of content in languages other than English (which, by statement 2, *cannot be* guaranteed moderated).
Ergo, content posted here must be in English.
If you think that user-submitted translations on the honour system are suffucient to make content locally moderatable, you can amend statements 2 and 3 accordingly - but I tend to think that you shouldn't consider such posts actively moderated, because you rely on user reports to find out that someone's cheating.
The appropriate solution is *not* for QOTO to try to bodge together a Swiss-army-knife mod team that can moderate any content, but for users who post content that QOTO cannot moderate to use another server that can (or recruit their own moderators and start their own). Then we federate with them and everyone is happy.
I've seen this said a couple of times and don't fully understand it. What's the downside to letting them follow you, even assuming it's a malicious bot? It doesn't leak any information beyond what an unregistered third party can gain by looking at your profile in a web browser as I understand things.
On my part I allow a couple such followers, and it helped me get listed in the QOTO directory to get real followers. So there's an upside.
I can read French without much difficulty, which I've seen a lot in the federated timeline. It hasn't shown up here yet, but if that community establishes a presence on this instance feel free to reach out.
I'm also making progress at learning Farsi, which I see occasionally on the local timeline. Nothing's appeared offensive to me yet, but I'm not yet proficient enough to identify innuendos etc. that aren't outright insults.
Proof
@Zyxer
Given \(x^2 + y^2 = 4z + 3\) with \((w, x, y, z)\in\Bbb{N}\), \(x\) is odd if and only if \(y\) is even. This results from the observation that \(4z + 3\) must be odd and the fact that, if \(k^n\) contains a factor of two for \((k, n)\in\Bbb{N}\), a factor of two must also necessarily be present in \(k\). It is not possible, then, for \(y^x = x^w\) to be true, because one side of the equation is an odd integer while the other is an even integer.
I think you should distinguish better between encryption and authentication; they're separate operations. Encryption allows me to turn a given plaintext into a ciphertext, which can only be turned back into the plaintext by the keyholder. The purpose of encryption is to prevent anyone without the key from learning the plaintext, even if they are able to see the ciphertext. Authentication ("signing") allows me to verify that the keyholder was the sender. Its purpose is to prevent anyone without the key from forging a message that would appear to be from the keyholder.
For instance, if I wanted to send you a message using some asymmetric system, I would *sign* it with *my* *private* key, and *encrypt* it with *your* *public* key. We can be confident that only you can decrypt it with your private key, because no one else has your private key. When you check the signature against my public key, you can be confident that I sent it, because no one else has my private key.
I see a couple places in the text where this distinction is muddied. You claim in the intro that the two definitions are mostly equivalent, but the first covers encryption, while the second describes authentication. Later on, in the last sentence of "In Keys We Trust", you use the terms encrypt/decrypt when what you're actually describing is authentication.
The situation with private keys is more complicated than "how much of the cryptography world just below the surface operates." Symmetric encryption tends to be more efficient, so you'll see protocols that begin with a short asymmetric conversation to establish a symmetric key, or shared secret, which they use for the real conversation. This is a form of "key exchange," a term which is possibly misused in "Swordfish" (that whole sentence is difficult to understand).
Finally, I'd point out that passwords aren't a very good metaphor for cryptographic keys, and misunderstanding this could be potentially harmful to your target audience. You type in your literal password anytime you want to log in somewhere, but you should never send your raw private or symmetric key merely to prove identity, and sending your public key is insufficient to prove identity (the whole point is that it's public, i.e. lots of people have it). Instead, you sign something with the key, so that the recipient/eavesdropper doesn't have your actual key and can't impersonate you later on.
Octave solution
function sorted = snail(array)
if numel(array) <= 1
sorted = array;
else
sorted = [array(1, 1:(end-1)),...
array(1:(end-1), end)',...
array(end, end:-1:2),...
array(end:-1:2, 1)',...
snail(array(2:(end-1), 2:(end-1))) ]; end; end;