• 0 Posts
  • 28 Comments
Joined 11 months ago
cake
Cake day: August 14th, 2023

help-circle
  • booly@sh.itjust.worksto196@lemmy.blahaj.zonerule
    link
    fedilink
    arrow-up
    7
    ·
    18 hours ago

    Self deprecation comes off wrong when it seems like the thing you’re criticizing is actually important, and that you actually believe it.

    So it’s funny when the audience knows you don’t believe it’s important, either because everyone agrees it’s not important (“I can’t sing on tune to save my life”) or if it’s a particular example that doesn’t matter (“I’m such a bad mom because [something inconsequential]),” or if it’s a topic that people can see isn’t important to you (jokes about being socially awkward, bad at your job, etc.).

    If you’re in one of those lanes, you can go pretty hard on yourself before it seems to go too far.



  • Wasteful of what, though?

    If a particular farm can produce 1000 kg of meat and 500kg of bones/other waste in a year by raising female meat chickens, would it be a waste to devote that farm to raising 500 kg of meat and 400 kg of bones from male egg chickens? In a sense, that’s a waste of the farm to produce half as much meat as it can produce through killing chicks.

    It’s a philosophical difference on what weight to assign to the lives of chicks, adult chickens, other resources including human labor, etc. The lazy shortcut is to maximize return on dollar investment with no regard for any of those moral, ethical, and philosophical considerations, and that’s what most of the industry does today, but even if you shift to a new moral framework you’ll need to decide how to weight those things.




  • Motorola Solutions is a dominant radio manufacturer in the government/first responder space, as well as major infrastructure providers. Yes, that means cops, but it also means firefighters, ambulances, trains, buses, airports, and any fleet of mobile service for mission critical stuff like electric utilities, telecom, and some aviation uses. Back in the day of trunk radio, it used to be common for taxis, too.

    Motorola sold its consumer mobile businesses (cell phones) in 2011 in a spinoff as “Motorola Mobility,” around the time it was shutting down and selling off pieces of its space/satellite businesses, but kept most of its other businesses. Today’s Motorola Solutions is the legal successor to the Motorola that invented the cell phone.





  • not meant to be consistent with the human eye.

    Even then, postprocessing is inevitable.

    As the white/gold versus blue/black dress debate showed, our perception of color is heavily influenced by context, and is more than just a simple algorithm of which rods and cone cells were activated while viewing an image.


  • Yeah, plenty of Gen Z memes still make me laugh. They’re just in different forms, including some video “templates” where you just slap some captions on characters in the same scene:

    • Starship troopers “I’m doing my part” montage interrupted with Tim Robinson “I didn’t do shit!”
    • Diary of a Wimpy Kid scene with kids auditioning from by singing Total Eclipse of the Heart, giving way to some kid who’s actually good.

    Are they really that different from some high quality gifs or deep fried memes from the late 2010’s, advice animals from the early 2010’s, demotivational posters or absurd flash animations from the 2000’s, or joke websites from the 90’s?

    People will always be funny, and some internet jokes will start fresh before being run into the ground. Remember the ones you like, and then forget the ones you don’t.



  • Almonds are a stone fruit, too. It’s just that the part we eat is inside the pit. Ever notice how almonds still in the shell kinda look like a peach pit?

    Peaches and plums used to be cherry sized, too (and cherries are stone fruits as well, but selective breeding got the fruit-to-pit ratio better for peaches/plums/apricots/nectarines).

    So some recipes call for processing cherry pits, and the flavor is pretty close to almond extract. Because almond extract is just bitter almonds processed in a similar way.




  • It basically varies from chip to chip, and program to program.

    Speculative execution is when a program hits some kind of branch (like an if-then statement) and the CPU just goes ahead and calculates as if it’s true, and progresses down that line until it learns “oh wait it was false, just scrub all that work I did so far down this branch.” So it really depends on what that specific chip was doing in that moment, for that specific program.

    It’s a very real performance boost for normal operations, but for cryptographic operations you want every function to perform in exactly the same amount of time, so that something outside that program can’t see how long it took and infer secret information.

    These timing/side channel attacks generally work like this: imagine you have a program that tests if variable X is a prime number, by testing if every number smaller than X can divide evenly, from 2 on to X. Well, the bigger X is, the longer that particular function will take. So if the function takes a really long time, you’ve got a pretty good idea of what X is. So if you have a separate program that isn’t allowed to read the value of X, but can watch another program operate on X, you might be able to learn bits of information about X.

    Patches for these vulnerabilities changes the software to make those programs/function in fixed time, but then you lose all the efficiency gains of being able to finish faster, when you slow the program down to the weakest link, so to speak.


  • This particular class of vulnerabilities, where modern processors try to predict what operations might come next and perform them before they’re actually needed, has been found in basically all modern CPUs/GPUs. Spectre/Meldown, Downfall, Retbleed, etc., are all a class of hardware vulnerabilities that can leak crypographic secrets. Patching them generally slows down performance considerably, because the actual hardware vulnerability can’t be fixed directly.

    It’s not even the first one for the Apple M-series chips. PACMAN was a vulnerability in M1 chips.

    Researchers will almost certainly continue to find these, in all major vendors’ CPUs.