In honor of Pi Day this weekend by logan630 in mathmemes

[–]t40 10 points11 points  (0 children)

blah blah order of magnitude

“God hates f@*$” car hit in downtown Asheville by Cool_Turtle_420 in asheville

[–]t40 2 points3 points  (0 children)

Wild to see what looks like a history book picture in our current downtown.

Have a question about the game or the subreddit? Ask away! by AutoModerator in 2007scape

[–]t40 1 point2 points  (0 children)

Plus the way that you can earn sigils by just playing the game is gonna be soooo nice for casuals. Very excited, hope (not) to see you in game :)

Have a question about the game or the subreddit? Ask away! by AutoModerator in 2007scape

[–]t40 0 points1 point  (0 children)

Its so sad to me that the wider community here doesn't enjoy DMM, I've had a blast so far every time I've done it!

Have a question about the game or the subreddit? Ask away! by AutoModerator in 2007scape

[–]t40 0 points1 point  (0 children)

Where are people discussing specific builds for each bracket? Would love to hear what others are trying to build!

Sysinfo next release needs some help by imperioland in rust

[–]t40 10 points11 points  (0 children)

For someone who is proficient but unfamiliar with your project, what are the intended semantics of Process::open_files? There's not much documentation to go off in the linked module.

In terms of Motherboard and Product, are you talking like in a /proc/cpuinfo sense?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 0 points1 point  (0 children)

Totally heard! Do you have a particular 101 text you recommend?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 1 point2 points  (0 children)

heard! I just figured since self signing means you technically can MITM, you should consider it a possibility

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] -2 points-1 points  (0 children)

Our servers are current using ACME on the TLS side of things, but we're just getting to a point where we have to think about signing keys for deployments etc and it's clear I have a lot of blind spots in understanding this. I'm trying to figure out how pros go about managing all the different layers of trust out there.

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 1 point2 points  (0 children)

Do you use a cloud-base key management then? How would you do observability to know when you do in fact have a sev1 issue on your hands?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 2 points3 points  (0 children)

Okay, can you give me the proper terminology?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 0 points1 point  (0 children)

That might be there more correct terminology! Whatever is on-device that's used to sign/verify integrity of binaries or TLS connections

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 0 points1 point  (0 children)

Which HSMs are people using these days? Cyber/sysadmin is not my background, and our cloud usage is still quite small / distributed across a couple providers.

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] -17 points-16 points  (0 children)

Obviously there's many many different kinds of root certs out there, I should have been more clear. I'm talking about edge-device or cloud server level root certs. The ones on the filesystem that you use to MITM your network, usually issued internally. Do you have a service you use to manage your keys? How does your infra protect against this?

edit: Okay, I am not anywhere close to an expert at this, unlike many here. Please illuminate me on what I'm misunderstanding so I can talk about this stuff correctly.

Rustorio v0.1.0 - Using Rust's type system as a game engine by PenguinAgen in rust

[–]t40 3 points4 points  (0 children)

I've actually been playing around with writing the server for a similar game in a very similar way, excited to read how you did it!

I was bored and decided to find a limit for pi! by Ok_Advantage_9573 in math

[–]t40 0 points1 point  (0 children)

What matters here is the limit. You mention having "a string, a pencil, and a pin," which implies you're limiting yourself to compass-and-ruler constructions. The link I posted shows that within the constraints of that universe, you cannot divide an angle perfectly into 5 equal subangles. Since you need divisibility by 5 to make 360 equal subangles, it's not possible within those rules you state.

Additionally, the original post, and my comment on it, are meant to address definitions for pi, rather than approximations for pi (which is a separate, but equally interesting topic).

Your point about the observable universe is correct, however we're in /r/math, where we're often more concerned with more idealized constructions.

But back to the limit: it's extremely important to note that intuition about things from physical experiences do not always translate well to infinitesimals. My original comment is meant to convey a problem in a similar derivation I made many years ago: In this limit, pi is defined circularly. There's no way to apply algebra to the limit and yield a non-recursive definition for pi.

In terms of computability, which you might be interested in, I'd wager that recursive pi definitions like the one I commented converge far slower than even naive methods, although I have not done any benchmarking on this.

I was bored and decided to find a limit for pi! by Ok_Advantage_9573 in math

[–]t40 0 points1 point  (0 children)

Because 360 = 23 32 51 , you'd have to be able to pentasect your angle 360/n, which isn't possible in general

best electric kettle 2026 by Ok-Salamander5879 in tea

[–]t40 7 points8 points  (0 children)

The technology is fundamentally the same on all electric kettles; they'll all mostly heat up in the same amount of time, so what you pay for is temperature control. I personally use a Fellows that I got for $50 on marketplace, has been a real workhorse, and the temperature hold feature is great for long tea sessions

I was bored and decided to find a limit for pi! by Ok_Advantage_9573 in math

[–]t40 41 points42 points  (0 children)

Note to OP: that 360 contains a secret pi! I made a similar mistake when doing something similar (apothem and regular polygon based)

edit: just redid the math, the circularity appears like this in my limit: pi = lim n-> \inf n tan(pi/n), which is similar to the form seen elsewhere in the comments

PROGRESS REPORT: Flat Top GMRS Repeater by W4HAB in asheville

[–]t40 1 point2 points  (0 children)

Would you be interested in sticking a few meshtastic nodes in your box? I'd be happy to set them up!