I’m a technical kinda guy, doing technical kinda stuff.

  • 0 Posts
  • 144 Comments
Joined 1 year ago
cake
Cake day: September 27th, 2023

help-circle
  • You can get smart meters in Aus now with time of use metering. What needs to happen now is that those meters get a simple, non-cloud-connected way to let your appliances know when is a good time to start up.

    So for hard wired devices like your hot water heater or your pool pump you could have a simple relay-like device in your fusebox that can be set to “turn on below X cents per kWh” and it will switch them as needed.

    Your air conditioner could have a linked IR remote that turns it on early in the day of power is cheap and chills the house for the afternoon heat or runs it a bit cooler than usual if it is already running.

    Your fridge or freezer could have an “extra chill” setting.

    Your washing machine and dryer could have simple “start now” “pause now” interfaces and they could just operate during the day whenever.

    All this could be done with some newer version of the X10 protocol, and it would be great to get something like that standardised and widespread.


  • What I’m asking is how tf did text messages and whatever in the walkie talkies ignite a spark strong enough to ignite the PETN?

    Pager with firmware that activates an output on date/time X/Y and triggers an ignition signal. That signal is sent o an actual detonator in the device, which sets off the explosive.

    Radio with DTMF receiver that activates an output when, for example, touchtone 4 is received over the air, or alternatively if the radio has GPS, another date/time activation via firmware.

    Both of these things are relatively trivial for a nation-state to pull off.

    So yes, in both cases it’s possible that faulty devices are still around. However, if all the rest of your group has had exploding pagers and radios, most people in the same group would have dropped their still-working pager or radio into a bucket of water by now. There’s probably a few, and they’re probably being carefully taken apart right now to see how it was done.

    Afaik such an idea was nonsense previously.

    It’s not nonsense, it just takes planning and resources. And now that people know it is possible, buying and using any sort of equipment for your group without having the nagging concern there might be a bomb in it is impossible. And that’s a pretty powerful limiter.




  • Blu-Ray USB drive and M-Discs is about the best you can get at present. Keep the drive unplugged when not in use, it’ll probably last 10-20 years in storage.

    Seeing as there hasn’t been much advance past Blu-ray, keep an eye out for something useful to replace it in the future, or at least get another drive when you notice them becoming scarce.



  • I’ve got photos in Flickr dating from 1999 onwards. Ten thousand or so of them, and a couple of the early ones are now corrupted.

    But they are my “other backup” for Google photos so I don’t mind too much. I also have a USB Blu-ray drive at home that I use to periodically burn M-Discs that I hand out to a few relatives.

    That’s about as good as I can conveniently do for backup, and it’s probably better than the single-point-of-failure box of negatives that my parents have in their cupboard.




  • I don’t think there’s anything commercially available that can do it.

    However, as an experiment, you could:

    • Get a group of photos from a burst shot
    • Encode them as individual frames using a modern video codec using, eg VLC.
    • See what kind of file size you get with the resulting video output.
    • See what artifacts are introduced when you play with encoder settings.

    You could probably/eventually script this kind of operation if you have software that can automatically identify and group images.



  • Most times what I get when asking it coding questions is a half-baked response that has a logic error or five in it.

    Once I query it about one of those errors it replies with, “You’re right, X should be Y because of (technical reason Z). Here’s the updated code that fixes it”.

    It will then give me some code that does actually work, but does dumb things, like recalculating complex but static values inside a loop. When I ask if there’s any performance improvements it can do, suddenly it’s full of helpful ways to improve the code that can make it run 10 to 100 times faster and fix those issues. Apparently if I want performant code, I have to explicitly ask for it.

    For some things it will offer solutions that don’t solve the issue that I raise, no matter how many different ways I phrase the issue and try and coax it towards a solution. At that point, it basically can’t, and it gets bogged down to minor alterations that don’t really achieve anything.

    Sometimes when it hits that point I can say “start again, and use (this methodology)” and it will suddenly hit upon a solution that’s workable.

    So basically, right now it’s good for regurgitating some statistically plausible information that can be further refined with a couple of good questions from your side.

    Of course, for that to work you have to know the domain you’re working in fairly well already otherwise you’re shit out of luck.




  • Excuse me, “UXers” is not the preferred term any more. You should be using “HXers”, as per the article.

    In my opinion, replacing “users” with “humans” feels wrong in much the same way as when incels replace “women” with “females”.

    They are reducing the accuracy of the description. All users of computers can generally be assumed to be human. All humans cannot generally be assumed to also be users.


  • Dave.@aussie.zonetoLinux@lemmy.mlCompanies that use desktop Linux
    link
    fedilink
    arrow-up
    39
    arrow-down
    1
    ·
    1 month ago

    how the IT team tries to justify being locked into Microsoft, and then telling me I could potentially become a point of vulnerability

    Because they can manage and control all the windows PCs , pushing updates automatically, restricting what users can do locally and on the network, they have monitoring tools and whatever antivirus and antimalware tools they have, and are able to easily manage and deploy/remove software and associated group licensing and so on and so forth.

    Meanwhile you’re a single user of unknown (to them) capabilities that they now have to trust with the rest of their system, basically.

    The first rule of corporate IT is, “control what’s on your network”. Your PC is their concern still, but they have no effective control over it. That’s why they’re being a bit of a pain in the ass about it.


  • True. Hence my caveat of “most cards”. If it’s got LEDs on the port, it’s quite likely to signal which speed it is at with those LEDs.

    I haven’t yet come across a gigabit card that won’t do 10Mbit (edit: switches are a different matter) but sometimes I’ve come across cards that fail to negotiate speeds correctly, eg trying for gigabit when they only actually have a 4 wire connection that can support 100Mbit. Forcing the card to the “correct” speed makes them work.


  • Me: “This binary file is merely an approximate mathematical and statistical transform of the complainant’s “Deadpool 3”, your honour. If you care to glance through a few A4 pages of the binary representation of both items, you can clearly see that there is no direct copying involved, thus, no copyright claim can be upheld.”

    Result: $250k fine, two years community service in anti piracy groups.

    NVIDIA: “Each copyrighted work was ingested and a statistical model was generated that leverages that information for our own profit. We have no intention of compensating copyright owners for their information.”

    Result: Oh you! Get out of here, you scamp! Ruffles hair


  • Dave.@aussie.zonetoProgrammer Humor@lemmy.mlStop
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    1 month ago

    There was a series of books in the '80s where a systems programmer gets pulled through a portal into your typical magical world, good vs evil, etc.

    They subsequently look at the magical spells in use and realise they can apply Good Systems Programming Practices™ to them. And thus, with their knowledge of subroutines and parallel processing, they amplify their tiny innate magical abilities up to become a Pretty Good Magician™. So while all the rest of the magicians basically have to construct their spells to execute in a linear fashion, they’re making magical subroutines and utility functions and spawning recursive spells without halting checks and generally causing havoc.

    It’s quite a good allegory for modern times, where a select few build all the magic and the rest just have useful artefacts they use on a day to day basis with no idea how they work