Show newer
robryk boosted

@robryk I thought so, that's the first thing I tried, but apparently you can't LIMIT a DELETE with postgresql!

robryk boosted

Another example: an identity team kept causing problems because they would conflate a user account and the actual human(s) using that account by calling them both "user".

After a week of me asking whether they were talking about user meaning "sack of meat" or "sack of bits", they did not have that problem any more.

Show thread

I've just learned (yay @ collecting random data) that when my machine is thrashing (because I put firefox in a memory-limited cgroup, it sometimes runs out of memory, and it doesn't realize this has happened, because the _system_ is not out of memory yet) the _GPU_ gets very hot (85degC). Huh?

Do Swiss courts really consider multiple unrelated charges against one fellow at the same time?

> Dem Beschuldigten wird vorgeworfen, vom betagten Geschädigten im Laufe mehrerer Jahre unter wahrheitswidrigen Angaben mehrfach Darlehen in der Höhe von insgesamt mehreren hundert Tausend Franken erhältlich gemacht zu haben. Weiter wird dem Beschuldigten vorgeworfen, einen Einzahlungsbeleg der Post abgeändert zu haben, um die Zahlung eines höheren Betrags vorzutäuschen. Zudem wird dem Beschuldigten vorgeworfen, auf der Autobahn rechts überholt zu haben sowie während der Pandemie gegen die Schutzmassnahmen verstossen zu haben, indem er eine Party organisiert habe.

-- gerichte-zh.ch/verhandlungen/o

(Translated summary: The accused is accused of defrauding an elderly person, falsification of documents to further that fraud, overtaking on the right on the highway, and organising a party during the time it was forbidden by pandemic-related restrictions.)

(Or did that fellow make a very weird appeal that somehow was relevant to all of them? I can't see a way to do so other than sovcitry.)

robryk boosted

The Furby source code is public and heavily commented. For example, it turns the microphone off when the motors are running.
archive.org/details/furby-sour

People who know me IRL usually know that I have a very wide definition of "manipulative". In that context, I find it hard to form an opinion on forum.effectivealtruism.org/po (tl;dr let's stop telling people not to mistreat fish, because that causes them to indirectly cause more fish suffering).

en.wikipedia.org/wiki/Amundsen

Things that my attention was drawn to:

The original site (for IGY) was built by a team led by a Lieutenant JG (one of the lowest officer ranks) of US Navy. That was a really interesting job (kb.osu.edu/bitstream/handle/18) for the fellow.

The description of the base when it was mostly within a dome reminds me vividly of places I read about in interactive fiction. Such places seemed to me to be somewhat... unrealistic? (see e.g. the tower that was used for atmospheric observations "and later contained a music room"), but apparently my intuition was very wrong.

The new station is on *adjustable* stilts, so that it can be raised as the snow level rises (well, not really "rises", but as the ground sinks while more snow gets accumulated).

I was really amused by the juxtaposition of content and form of the troubleshooting section of the US Navy Cookbook: maritime.org/doc/cookbook1945/

robryk boosted

When electronics importer Cara Leon goes missing, private investigator Sam Mujrif is hired by her sister to investigate. Cara is 8 times taller than Sam, but evidence soon points to players much smaller than either of them.

As Sam and his cross-scale colleagues pursue the case, it becomes apparent that Cara’s disappearance is linked to technology with the potential to reshape their whole society, and radically alter the balance of power between the scales.

gregegan.net/SCALE/SCALE.html

A friend was driving me back from new year's boardgames and on the way we've encountered a swan strolling on the roadway of a bridge. (The swan was alone, appeared completely fine, and was AFAICT fully adult: its body was ~1m tall, its head was at ~1.5m and its plumage was fully white.)

I was surprised in many ways:
- did the swan walk there or land there?
- is there some obvious reason why a swan would want to be on a bridge (my friend's hypothesis was that that swan might have been doing that semi-regularly and just been surprised by ~nonzero traffic at that time of night there)?
- do swans stroll? I don't recall seeing a swan more than a few meters away from water (other than a flying one).

robryk boosted

@ai@cawfee.club
Coherer - The first kind of radio wave detector ever invented in history. It's basically a loose metal contact, similar to a "cold" solder joint. After applying a voltage, even under 1 volt, the contact resistance drops from near-infinity to a hundred ohms or so. Later versions used a tube of loose metal particles. Now 100 years have passed and its exact physical mechanisms remained unexplained.

Coherence of particles by radio waves is an obscure phenomenon that is not well understood even today. Recent experiments with particle coherers seem to have confirmed the [micro-welding] hypothesis [...] so-called "imperfect contact" coherers is also not well understood, but may involve a kind of tunneling of charge carriers across an imperfect junction between conductors.

Exploding bridge-wire detonator - A safe detonator for high explosives and nuclear weapons. You basically discharge a capacitor bank to a tiny wire in microseconds, the high energy causes the wire to explode, achieving detonation. The exact step-by-step physical mechanism that causes the wire explosion is still not fully explained.

It is remarkable that 75 years later and after literally millions of EBW detonators have been fired, there is still uncertainty about how they actually work.

Look at the construction (and the proof in appendix) of public key encryption scheme out of witness encryption in eprint.iacr.org/2013/258.pdf

It uses witness encryption, where the only confidentiality guarantee is that "if you encrypt the plaintext in a way that does not admit decryption at all, there will be no way to recover the plaintext from ciphertext", to construct something that actually has standardish confidentiality guarantees by exploiting that this property must extend to cases that are computationally indistinguishable from ones where the assumption really holds.

robryk boosted

Things you can do with zero-knowledge: prove that you performed some algorithmic process correctly.

Things you can’t do: prove that you kept a secret.

This is an important point that really limits what we can do with the technology.

robryk boosted

Our electronics educational segment for today: U.S. Army Restricted Training Film: "Vacuum Tubes (The Triode)": 1943. - youtube.com/watch?v=acGXBJv6AT

Rereading a novel I got amused by:

> Wanaka’s rather grim smile could just be made out behind her mask. “Until we get a better idea,” she
gestured. “All hands, start thinking.”

robryk boosted

Hm~ thought experiment: how would the world look like if trademarks could only be owned by corporations[1] with a responsibility only towards upholding the trademark's reputation[2]?

[1] question of ownership unresolved (theoretically it should be immaterial)

[2] question of who has standing to argue that they're not fulfilling this duty also open

cc @TechConnectify @aredridel

robryk boosted

the sad reality of open source software development

In short: folks love the amazing decentralised encrypted comms utopia of Matrix. But organisations also love that they can use it without having to pay anyone to develop or maintain it. This is completely unsustainable, and Element is now literally unable to fund the entirety of the Matrix Foundation on behalf of everyone else - and has had to lay off some of the folks working on the core team as a result.

matrix.org/blog/2022/12/25/the

We define the rank of a matrix as the minimal number of rank-1 (i.e. of the form w^\dagger{}v) matrices that sum to it. I wonder what happens when we decide to optimize for something else: say, norm of type $foo over norms of type $bar over those matrices. Obvious candidates for $foo are L_{something}, for $bar are operator norms or Frobenius norm.

In particular, $foo=L_n and $bar=operator norm inherited from L_n seems potentially interesting (in particular for n=2).

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.