@myTerminal A c compiler compiling assembly that runs a javascript compiler that powers an engine that runs the javascript that implements typescript (which compiles down to JavaScript) as well as implementing a browser viewport that processes HTML and CSS down into a graphic rendering of, what effectively is a textarea with some coloring.

All to edit some text.

Progress! 😎

To extend this thought: what I care about is that everyone who uses a program has the Four Freedoms. If you're not running the program, I don't care.

I do not insist that you publish your code online, and I do not insist you distribute it at no cost.

generally we've been finding out
moving along towards making the execution of software routines observable & clearer is better.

we work to make the machine evince it's own rightful tale of itself.

"The new dot com bubble is here: it’s called online advertising" by Jesse Frederik and Maurits Martijn thecorrespondent.com/100/the-n

Really interesting, eye-opening piece. I think the one thing missing is: if eBay stopped buying the "ebay" keyword from Google, sure they'd still be the #1 organic search result. But then wouldn't some competitor (Amazon, Overstock, etc.) immediately buy that same keyword? It's just a tax that every company has to pay Google to secure their spot at the top.

What QUIC says about Google and the Internet 

What QUIC says about Google and the Internet 

Oh Javascript... the hello world exercise from exercism.io just installed 701 packages.. x.x

~/exercism/javascript/hello-world$ npm install

added 701 packages from 383 contributors and audited 20019 packages in 24.503s
found 63 low severity vulnerabilities
run `npm audit fix` to fix them, or `npm audit` for details

`drm_agp_unbind` looks up the memory in the allocated linked-list, and (if similarly compile-time enabled) calls a bridge driver method, and removes it from the bound linked-list. All of which also happens upon freeing this memory.

Fin, for now.

But one question: why's Accelerated Graphics Protocol treated specially by Direct Rendering Media?

`drm_agp_free` looks the memory up in that linked list, unbinds it if necessary (which, if C macro enabled, calls the appropriate bridge method & removes it from a linked-list), removes it from that linked-list, and frees it both on the GPU (via a choice of 5 bridge methods or done CPU-side, if similarly C macro enabled) and the CPU (via kfree).

`drm_agp_bind` looks up the memory in the allocated linked-list, (if enabled) calls some bridge driver methods, and adds it to a bound linked-list.

`drm_agp_release` verifies that the device has been acquired, atomically decrements that use count, and unsets that acquired flag.

`drm_agp_enable` sets some properties & calls a method on the bridge's driver.

`drm_agp_info` copies version, mode, aperture, memory, and device identifier infos from the device's `agp->agp_info` structure over into a passed-in pointer.

`drm_agp_alloc` allocates from the GPU's RAM (check memsizes, call 3 methods, or CPU allocate) and tracks this in a linked list.

The FidoNet chapter from BBS: The Documentary (2004) is I think required viewing for fediverse admins.

Bulletin board services (BBSes) were pre-web online communities with forums, mail, games, etc. FidoNet was/is basically a volunteer-run federation layer that let BBSes communicate with each other.

The video talks about FidoNet's growing pains, especially around governance & a mismatch between what users wanted and what the sysops felt was required to maintain the net.


To continue my overview of Linux's Direct Rendering Media (DRM)'s IOCtls, I'll now cover the IOCtls for handling Accelerated Graphics Port (AGP) devices.

`drm_agp_acquire` atomically increments the usecount on global or device property (the accessor function can be hotswapped), upon verifying the device's `agp->acquired` property, after which it ensures the device has been assigned a `agp->bridge` property.


@codesections You can send HTTP-based REST API requests using an app named Postman. You can automate that to test the response and then perform other actions you might need. The physical button then could be a mouse button.

Several years ago a product was available for Mac computers that was called "The Button". It could be tapped, dialed, and nudged. Something like that might suit your needs.

@Wolf480pl I've tended, strongly, to revert to using the Internet and Web as they were originally envisioned: as media and channels for information access, but not direct transaction. I've *always* limited the encroachment of my personal life to online (some exceptions, but few).

The implications of Gmail and Facebook struck me as strongly negative from the start. Society has come to depend on them.

It was the Russians who hacked Podesta's email. It was Google's Gmail who let them in.

Reminder: my position is that open source is a necessity on the client, & an ideal on the server. Though ideally there wouldn't be any servers, though I doubt we'd get there any time soon.

Rather what matters for servers to me is whether they're running federated open standards. Because then I'm allowed to run my own modified version of it, or a compatible alternative, on my own hardware if I want.

@Wolf480pl Mind, the relationship between privacy, authentication, and encryption / cryptography, is complex. I don't pretend to understand it, but I've been thinking about it for years.

(Including an exchange with @danyork, I think on Ello, possibly here, that I haven't been able to track down.)

If "privacy" is "the ability to define and enforce limits on the spread of personal information", then knowing _who_ you are sharing with, and enforcing that constraint, matters. Which means identity.

On the Internet, nobody cares whether you're a dog, what your government thinks is your real name, or what degree you hold.

All that matters is that the Morpheus I'm talking to right now is the same Morpheus I was talking to yesterday.

Or at least that's how it was when I first started using the Internet 10+ years ago. Before socnets. Before real name policies. Before phone number verification. Before smartphones.

TIL: you can call read(2) and write(2) with size=0 to query the file for errors with actually reading or writing.

Ok, but social choice functions are good for voting on any kind of alternatives, not just electing representatives.

Of course, it's better to arrive at consensus by means of arguments, but that's not always possible.

I thought that since they have score voting in polls, they're probably already using some vote counting method like Borda, and if so, why not implement a few state-of-the-art ones?

Show more

For people who care about, support, or build Free, Libre, and Open Source Software (FLOSS).