tal

joined 2 years ago
[–] tal@lemmy.today 0 points 1 hour ago

I have a KitchenAid hand mixer that's been fine. If you're happy with your KitchenAid stand mixer, seems that it might be reasonable to get the hand mixer version. I mean, you've already got a picture of one posted.

Note that I'm assuming that "variable speed" here translates to "discrete number of speeds in a given set of increments", and not some "continuous-variable speed where you can just move a slider" thing.

[–] tal@lemmy.today 1 points 1 hour ago* (last edited 1 hour ago) (1 children)

so I figured that using pipewire to co-ordinate this would be the easiest way forward, except it turns out that it’s a (GUI) user space process, which doesn’t make sense on a server with no GUI users.

I'm not entirely sure what you mean by "(GUI) user space process", but if it's that it's a systemd user process (e.g. it shows up when you run $ systemctl --user status pipewire rather than $ systemctl status pipewire, which appears to be the case on my system, where there's one instance running per user session), then you probably can run it as a systemwide process, where there's just one always-running process for the whole system. IIRC, PulseAudio could run in both modes. I don't know if you have concerns about security on access to your mic or something, but that could be something to look into.

searches

Sounds like it's doable. Not endorsing this particular project, which I've never seen before, but it looks like it's possible:

https://github.com/iddo/pipewire-system

PipeWire System-wide Daemon Package (Arch Linux)

This package configures PipeWire, WirePlumber, and PipeWire-Pulse to run as a single system-wide daemon as the root user. This setup is optimized for headless media servers, HTPCs, or multi-user audio environments.

[–] tal@lemmy.today 1 points 2 hours ago

every hardware website I’ve checked so far, either don’t have any mini pcs, nucs or similar, or they have zero information about the hardware.

Well, if they give you the manufacturer and model number, you should be able to look them up with the manufacturer.

[–] tal@lemmy.today 2 points 4 hours ago* (last edited 4 hours ago)

https://en.wikipedia.org/wiki/Deus_vult

Robert the Monk, who re-wrote the Gesta Francorum c. 1120, added an account of the speech of Pope Urban II at the Council of Clermont in 1095, of which he was an eyewitness. The speech climaxes in Urban's call for orthodoxy, reform, and submission to the Church. Robert records that the pope asked Western Christians, poor and rich, to come to the aid of the Greeks in the East:

When Pope Urban had said these and very many similar things in his urbane discourse, he so influenced to one purpose the desires of all who were present, that they cried out, 'It is the will of God! It is the will of God!' When the venerable Roman pontiff heard that, with eyes uplifted to heaven he gave thanks to God and, with his hand commanding silence, said: Most beloved brethren, today is manifest in you what the Lord says in the Gospel, "Where two or three are gathered together in my name there am I in the midst of them." Unless the Lord God had been present in your spirits, all of you would not have uttered the same cry. For, although the cry issued from numerous mouths, yet the origin of the cry was one. Therefore I say to you that God, who implanted this in your breasts, has drawn it forth from you. Let this then be your war-cry in combats, because this word is given to you by God. When an armed attack is made upon the enemy, let this one cry be raised by all the soldiers of God: It is the will of God! It is the will of God![18]

I'm not saying that I approve of Hegseth's deus vult tattoo, but I would point out that it's quoting one of your predecessors.

[–] tal@lemmy.today 2 points 4 hours ago

https://en.wikipedia.org/wiki/Problem_of_evil

The problem of evil, also known as the problem of suffering, is the philosophical question of how to reconcile the existence of evil and suffering with the notion of an omnipotent, omnibenevolent, and omniscient God.[1][2][3][4]

[–] tal@lemmy.today 2 points 10 hours ago* (last edited 10 hours ago) (1 children)

In the second series, there’s a broader type of magic, and Merlin uses it to deal with his problems.

Yeah, that's also a good point. What bugged me was in part was something common to fiction, where each story tends to get "bigger" and higher stakes, and at the end of the series plot, the universe winds up at stake. But...there's another issue in that Merlin's magic is far more versatile. It makes for something of a deus ex machina, where the author can pull some new magic mechanism out of a hat to resolve issues or advance the plot, and I didn't like that as much as the much-more-limited toolbox that Corwin had.

Like, to have a good story, one has to have conflict to resolve. If you're Superman, that conflict pretty much has to resolve around Kryptonite or something like that. It limits the kinds of conflicts that the story can do. If you can only shadow-walk, as with Corwin


certainly a potent ability


but can only do so with physical movement and a set of landmarks that you can see and so forth, there are ways in which it can be restricted. But if you can, say, call up an intelligent portal virtually anywhere that's near-omniscient and can transport things anywhere, well, that alone kind of limits the sort of things that you can run into that are real challenges to overcome. And that's just one of the tools in Merlin's toolbox.

Also, at least for the first half of the second series, Merlin is naive and easily manipulated

Yeah...though to be fair, if the comparison is Corwin...a lot of the first book is just talking about how able he is to deal with situations and be cunning and see through intrigue even under extreme handicaps, like his damaged memory and with almost no information about what's going on. That's a high bar to follow.

[–] tal@lemmy.today 2 points 12 hours ago (3 children)

I’m currently rereading the Amber Chronicles, by Roger Zelazny, and it’s like that. Arguably, it’s two stories of five books each, although there’s a thread from the first five that continues in the second. It’s a wonderful series, especially the first five.

I'd love to have a new Amber Chronicles.

I liked the earlier books the most, the ones that focused on Corwin, where the scale tended to be kept smaller, not universe-shattering stuff, but felt that the whole thing was a fun read.

[–] tal@lemmy.today 6 points 12 hours ago (2 children)

But the first book ended POORLY

I can think of a few series that had books where I really enjoyed the first books, but felt that the series went downhill over time. The Dune Chronicles


I really liked the first book, but the later books just got progressively worse, in my opinion. Or Hitchhiker's Guide to the Galaxy.

But I can't think of any series where I had a bad first book and then the thing progressively got better.

Granted, that may be selection bias


maybe I just never complete a series if the first book is bad.

[–] tal@lemmy.today 3 points 15 hours ago

https://en.wikipedia.org/wiki/Legality_of_incest

United Kingdom: Illegal

Prohibited Relationships:

  • Parent, grandparent, child, grandchild
  • Brother, sister, half-brother, half-sister
  • Uncle or aunt (by blood)
  • Nephew or niece

United States: legal (only 2 states: Rhode Island and New Jersey) / No Illegal (other 48 states, but in Ohio, only incest between parent and child or grandparent and grandchild is illegal, incest between siblings is legal)

Prohibited Relationships:

  • Varies by state

https://worldpopulationreview.com/state-rankings/incest-laws-by-state

In Rhode Island, the age of consent is 16 years old.

pulls up Rhode Island's official tourism website

https://www.visitrhodeisland.com/things-to-do/family-fun/

Family Fun -> Family Vacations In Rhode Island

Rhode Island is an ideal family vacation destination.

gives meaningful look

[–] tal@lemmy.today 11 points 17 hours ago* (last edited 17 hours ago) (1 children)

For purchases that can be deferred without it being too painful, it's probably a good idea on purely financial grounds, since some of purchases now are going to go towards taxation, paying tariffs. Trump's earlier tariffs were overturned by the courts, but now courts are looking at the new, global, 10% tariff. Assuming that a future administration will roll back tariffs (or, I suppose, if courts overturn this and later attempts by the present administration at imposing tariffs) the same money would go further then.

[–] tal@lemmy.today 12 points 18 hours ago

OP, I think that you should probably flag the post as NSFW.

 

Internet Protocol is the protocol underlying all Internet communications, what lets a packet of information get from one computer on the Internet to another.

Since the beginning of the Internet, Internet Protocol has permitted Computer A to send a packet of information to Computer B, regardless of whether Computer B wants that packet or not. Once Computer B receives the packet, it can decide to discard it or not.

The problem is that Computer B also only has so much bandwidth available to it, and if someone can acquire control over sufficient computers that can act as Computer A, then they can overwhelm Computer B's bandwidth by having all of these computers send packets of data to Computer B; this is a distributed denial-of-service (DDoS) attack.

Any software running on a computer


a game, pretty much any sort of malware, whatever


normally has enough permission to send information to Computer B. In general, it hasn't been terribly hard for people to acquire enough computers to perform such a DDoS attack.

There have been, in the past, various routes to try to mitigate this. If Computer B was on a home network or on a business's local network, then they could ask their Internet service provider to stop sending traffic from a given address to them. This wasn't ideal in that even some small Internet service providers could be overwhelmed, and trying to filter out good traffic from bad wasn't necessarily a trivial task, especially for an ISP that didn't really specialize in this sort of thing.

As far as I can tell, the current norm in 2026 for dealing with DDoSes is basically "use CloudFlare".

CloudFlare is a large American Content Delivery Network (CDN) company


that is, it has servers in locations around the world that keep identical copies of data, and when a user of a website requests, say, an image for some website using the CDN, instead of the image being returned from a given single fixed server somewhere in the world, they use several tricks to arrange for that content to be provided from a server they control near the user. This sort of thing has generally helped to keep load on international datalinks low (e.g. a user in Australia doesn't need to touch the submarine cables out of Australia if an Australian CloudFlare server already has the image on a website that they want to see) and to keep them more-responsive for users.

However, CDNs also have a certain level of privacy implications. Large ones can monitor a lot of Internet traffic, see traffic from a user spanning many websites, as so much traffic is routed through them. The original idea behind the Internet was that it would work by having many small organizations that talked to each other in a distributed fashion, rather than having one large company basically monitor and address traffic issues Internet-wide.

A CDN is also a position to cut off traffic from an abusive user relatively-close to the source. A request is routed to its server (relatively near the flooding machine), and so a CDN can choose to simply not forward it. CloudFlare has decided to specialize in this DDoS resistance service, and has become very popular. My understanding


I have not used CloudFlare myself


is that they also have a very low barrier to start using them, see it as a way to start small websites out and then later be a path-of-least-resistance to later provide commercial services to them.

Now, I have no technical issue with CloudFlare, and as far as I know, they've conducted themselves appropriately. They solve a real problem, which is not a trivial problem to solve, not as the Internet is structured in 2026.

But.

If DDoSes are a problem that pretty much everyone has to be concerned about and the answer simply becomes "use CloudFlare", that's routing an awful lot of Internet traffic through CloudFlare. That's handing CloudFlare an awful lot of information about what's happening on the Internet, and giving it a lot of leverage. Certainly the Internet's creators did not envision the idea of there basically being an "Internet, Incorporated" that was responsible for dealing with these sort of administrative issues.

We could, theoretically, have an Internet that solves the DDoS problem without use of such centralized companies. It could be that a host on the Internet could have control over who sends it traffic to a much greater degree than it does today, have some mechanism to let Computer B say "I don't want to get traffic from this Computer A for some period of time", and have routers block this traffic as far back as possible.

This is not a trivial problem. For one, determining that a DDoS is underway and identifying which machines are problematic is something of a specialized task. Software would have to do that, be capable of doing that.

For another, currently there is little security at the Internet Protocol layer, where this sort of thing would need to happen. A host would need to have a way to identify itself as authoritative, responsible for the IP address in question. One doesn't want some Computer C to blacklist traffic from Computer A to Computer B.

For another, many routers are relatively limited as computers. They are not equipped to maintain a terribly-large table of Computer A, Computer B pairs to blacklist.

However, if something like this does not happen, then my expectation is that we will continue to gradually drift down the path to having a large company controlling much of the traffic on the Internet, simply because we don't have another great way to deal with a technical limitation inherent to Internet Protocol.

This has become somewhat-more important recently, because various parties who would like to train AIs have been running badly-written Web spiders to aggressively scrape website content for their training corpus, often trying to hide that they are a single party to avoid being blocked. This has acted in many cases as a de facto distributed denial of service attack on many websites, so we've had software like Anubis, whose mascot you may have seen on an increasing number of websites, be deployed, in an attempt to try to identify and block these:

We've had some instances on the Threadiverse get overwhelmed and become almost unusable under load in recent months from such aggressive Web spiders trying to scrape content. A number of Threadiverse instances disabled their previously-public access and require users to get accounts to view content as a way of mitigating this. In many cases, blocking traffic at the instance is sufficient, because even though the AI web spiders are aggressive, they aren't sufficiently so to flood a website's Internet connection if it simply doesn't respond to them; something like CloudFlare or Internet Protocol-level support for mitigating DDoS attacks isn't necessarily required. But it does bring the DDoS issue, something that has always been an issue for the Internet, back to prominent light again in a new way.

It would also solve some other problems. CloudFlare is appropriate for websites, but not all Internet activity is over HTTPS. DoS attacks have happened for a long time


IRC users with disputes (IRC traditionally exposing user IP addresses) would flood each other, for example, and it'd be nice to have a general solution to the problem that isn't limited to HTTPS.

It could also potentially mitigate DoS attacks more-effectively than do CDNs, since it'd permit pushing a blacklist request further up the network than a CDN datacenter, up to an ISP level.

Thoughts?

 

Starlink updated its Global Privacy Policy on January 15, according to the Starlink website. The policy includes new details stating that unless a user opts out, Starlink data may be used “to train our machine learning or artificial intelligence models” and could be shared with the company’s service providers and “third-party collaborators,” without providing further details.

view more: next ›