Wiz

joined 2 years ago
[–] [email protected] 1 points 16 hours ago
[–] [email protected] 2 points 19 hours ago (1 children)

Maybe you can try following the Starter Packs of subjects that you like?

https://fedidevs.com/starter-packs/

[–] [email protected] 3 points 20 hours ago (1 children)

You're obviously being paid by Big Lemmy

[–] [email protected] 11 points 21 hours ago

I just about got Onioned there.

[–] [email protected] 3 points 5 days ago

Yes, keeping tuition frozen for 10+ years, but employed Republican "starving the beast" strategies.

He froze employees' wages for years. Froze hiring. He combined departments and the leftover employees had to pick up extra work. Scaled back benefits. He privatized (outsourced) departments to out of state and out of country firms.

Purdue used to pay a little less than private industry, but had stellar benefits. Now it pays a little less than that, and has so-so benefits.

[–] [email protected] 2 points 5 days ago

The former paper towel budget has been slashed to half a sheet.

[–] [email protected] 1 points 6 days ago

Are tomatoes a fruit?

[–] [email protected] 2 points 1 week ago

Have you thought about incorporating yourself into a company? Apparently that solves all legal problems.

[–] [email protected] 5 points 1 week ago

We all know the right answer...

[–] [email protected] 3 points 1 week ago (4 children)
[–] [email protected] 2 points 1 week ago

I was thinking about growing potatoes this year!

[–] [email protected] 10 points 1 week ago

Lemmy and Mastodon are like "PBS" social media.

"This is brought to you by people like you."

 

Gödel's Loophole is a supposed "inner contradiction" in the Constitution of the United States which Austrian-American logician, mathematician, and analytic philosopher Kurt Gödel postulated in 1947. The loophole would permit the American democracy to be legally turned into a dictatorship. It has been called "one of the great unsolved problems of constitutional law" by F. E. Guerra-Pujol.

 

A Republican running for an Indiana House of Representatives seat was arrested early Monday morning on the eve of Election Day for commenting on a Facebook post made by someone who has a protective order against him, according to police.

GOP candidate Jim Schenke, who is running to unseat District 26 House Rep. Chris Campbell, was booked on a preliminary invasion of privacy charge at 6:10 a.m. Monday, according to the Tippecanoe County Sheriff’s Office. Records show he was released after paying a cash bond of $250.

 

Over the last two days users from the social media service Mastodon have started a campaign which has raised over $250,000 for VP Harris. User Heidi Li Feldman started the modest campaign on ActBlue two days ago, with a humble goal of one thousand dollars. She did it for the dual purpose of helping VP Harris, and raising awareness of the social media site.

She has blown by her original goal — and continues to have to move the goalposts, but in a good way...

From Heidi’s initial request:

I'm doing something I never thought I'd get to do again. I'm specifically fundraising for a woman to head the Democratic ticket and to be the next President of the United States. I want to do this with all of you here on #Mastodon, so I've created a fundraising page specifically for us: #MastodonForHarris.

We have the chance to save U.S. democracy and rule of law, to elect the first woman President of the United States, and to send TFG packing. By contributing to Kamala Harris's campaign via this portal, we can also encourage her to create a distinct presence on Mastodon, not mediated by Threads or any other social media provider.

Any amount donated will strengthen the #Mastodon platform as a venue for progressive political activism, as well as benefiting Kamala Harris.

 

As a project, Mastodon has operated under the umbrella of Mastodon GmbH, a German company that benefited from non-profit status with the German government. Despite all indications that they were doing everything right, Mastodon GmbH recently had its non-profit status revoked, resulting in the team to seek an alternative.

In the announcement, CEO and founder Eugen Rochko had this to say:

Our day to day operations are largely unaffected by this event, since Patreon does not presuppose non-profit status, and Patreon income does not count as donations. We have in fact not had to issue a single donation receipt since 2021.

Mastodon remains one of the only popular social platforms that operates out of the European Union, and Eugen desires to keep things that way. With that being said, this could be an interesting opportunity for the project: a presence in the United States may reduce friction in hiring employees there.

 

Zach Edey and his Purdue teammates are not leaving anything to chance. In the first two rounds of the 2024 NCAA Tournament, the Boilermakers have blown the doors off two overmatched opponents as they attempt to erase memories of last year's upset loss to No. 16 seed Fairleigh Dickinson. After thrashing Utah State on Sunday, Purdue is back in the Sweet 16.

Edey and Co. opened the tournament as the No. 1 seed in the Midwest Region, and hammered out a 78-50 win over Grambling. The All-American center was unstoppable in that contest, scoring 30 points and grabbing 21 rebounds. Purdue led 31-27 with 3:40 remaining in the half and decided to turn it on. The Boilermakers outscored the Tigers by 24 points the rest of the way.

 

A newly discovered vulnerability baked into Apple’s M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.

The flaw—a side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocols—can’t be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster.

view more: next ›