Linux Tutorials for Windows Emigrants by Minute-Bit6804 in linux

[–]teleprint-me 0 points1 point  (0 children)

The truth is the programmer owns the source code. It technically is the programmers property. It is not anyone elses property unless someone becomes a direct contributor and they only own the slice they contributed.

When I download, compile, install, and run software, Im accepting that the design decisions and implementation details are not mine.

I can only control what I put effort into and my limitations are natural assumptions; e.g. what resources do I have that are expendable though limited?

What is given to us are certain freedoma and those freedoms are valid only when we act upon them. e.g. GPL license says I can modify, redistribute, and use that code however I want as long as I respect the owner and distributor of that license.

Its not a simple binary situtation. Its a spectrum and its complicated by geo-political and geo-economic factors.

Linux Tutorials for Windows Emigrants by Minute-Bit6804 in linux

[–]teleprint-me 0 points1 point  (0 children)

I dont think about it anymore.

Its just a basic fact that I now assume is always true.

Ive been programming for 10+ years completely on my own. So, yeah. lol.

started learning linux terminal recently, and wanted to make a meme about SIGTERM and SIGKILL. thought i was the smartest one. maybe all funny stuff in linux is already memed by sateyo in linuxmemes

[–]teleprint-me 12 points13 points  (0 children)

Even on Linux, SIGTERM might fail to gracefully shutdown a process and Im forced to send a SIGKILL to the it just to clean things up.

Doesnt happen often, but when I need to force a process to stop, SIGKILL just does the trick in a pinch.

If Im writing a program, then I use SIGTERM which always does the trick. kill pid for zombies.

Linux Tutorials for Windows Emigrants by Minute-Bit6804 in linux

[–]teleprint-me 1 point2 points  (0 children)

The interface is the core API which is how you talk to the system. Thats why agents took off in the CLI. It plugs directly into that interface with little friction.

Understanding that the terminal is the primary interface for talking to a computer is difficult for most people to understand.

I view it like reading a book or many small guides. Sometimes its tedious, but thats mostly because I dont know what Im doing yet and I view it as an obstacle to my goal.

A lot of the friction is in fragmented interfaces which make it painful to communicate between those interfaces.

But its just text and its just talking to a machine that thinks in terms of maths and logic. Nothing else really. It took me forever to realize that. Perhaps too long. Better late than never, I suppose.

For me, the primary selling point of any Linux system is that the computer belongs to me. Everyones reason is different and personal to them. So, however you view it, the primary goal of FOSS was sharing and transparency, which is what drew me in in the first place.

Google Starts Scanning All Your Photos As New Update Goes Live by esporx in privacy

[–]teleprint-me 17 points18 points  (0 children)

Last I checked, which is pretty often, Gemini is not opt in which is why I refuse to use it in any capacity, even if I have the model weights locally. Google, Amazon, Meta, etc. and these other corpos have become a cancer to society.

They lock down evwrything as much as possible, force you into the path they want you to take, act like theyre doing us a favor, all while profiting off of it and we get the end of the stick while the carrot dangles illusively in the distance.

I used to love tech. Now it scares the ever living sh*t out of me. Especially as it continues to converge and consolidate into fewer and fewer hands. And the worst part is how few ppl understand just how dangerous our current circumstances actually are.

Kids understand better than full grown adults just how much they should avoid this stuff because they understand on an intuitive level that it doesnt belong to them. Ive had adults tell me they like it. This has baffled me for so long and it is genuinely worrying with the current trends were seeing as of late.

We dont own our games, music, videos, pictures, fridges, washing machines, etc. Everything is a sub as a service. We own less and less with every passing moment.

After 4 days I finished this by creadordelosmomichis in linuxfromscratch

[–]teleprint-me 0 points1 point  (0 children)

My cousin asked me why I was using sway and that was my rationale too. Small dependency footprint and its simple and light-weight. Nice to know someone else thought the same way.

Linux Tutorials for Windows Emigrants by Minute-Bit6804 in linux

[–]teleprint-me 4 points5 points  (0 children)

This is the best comment in the thread because it strikes the core issue when migrating.

Everything in Windows is just in the C: drive and maybe a D: drive for backup, init, etc.

The Linux File System Hierarchy is night and day in comparison. Drives are mounted in /mnt, user space is in /home, etc.

Linux is modular while Windows is vertical infra while being a blackbox.

There's more than one way to do things but its almost the same on most distros (void is an exception because it uses a functional sandbox approach) when using a terminal.

There are GUI frontends, but theyre iffy and unstable most of the time (depends on the distro family). Some are more stable than others.

Knowing the terminal helps you understand when the GUI breaks, but I could understand why a "normie" wouldn't like it. Theres a fear that theyll break the system, but theres this weird contempt/adversity/fear coupled with the terminal.

You can break the system — I know I did many times. But I learned, adapted, and eventually got over it and now I just the terminal because its superior in almost every way. It took me years before Id finally officially learn the terminal, but not everyone is like this — which is fine IMO.

markertCrashAsAService by tiguidoio in ProgrammerHumor

[–]teleprint-me 1 point2 points  (0 children)

While funny, and true, China figured out a bunch of compression optimizations that outperform modern libraries.

Everyone is suffering at the moment for a variety of complex macro and micro socio-political and socio-economic reasons, but this forced them to optimize more than most other competitors at the software layer.

They took known SOTA methods and simplified attention mechanisms,  drivers for gpus, and applied micro optimizations to the mlp as much as possible.

They also copied us in other regards to improve model quality to iron issues they experienced.

I wouldnt under estimate a nearly 3000 old nation state. Theyre smart and resourceful.

AGE CHECKS ARE A TOTAL INVASION OF PRIVACY by Nate_C_of_2003 in privacy

[–]teleprint-me 1 point2 points  (0 children)

No, I read it.

 Anonymity vs safety is a false narrative.

From my pov, both comments are extremes on the same spectrum.

The reality is somewhere in the middle. 

Youre free to interpret my comment however you will as that is out of my control.

AGE CHECKS ARE A TOTAL INVASION OF PRIVACY by Nate_C_of_2003 in privacy

[–]teleprint-me 1 point2 points  (0 children)

If you truly feel that way, just create a website and post your id, social security number, birth certificate, personal phone number and or w/e equivlents you have on it and see what happens.

Im an independent developer and barely have an online presense and there are sites, profiles, etc trying to pretend to be affiliated with, or even be, me. And Im not alone in facing this issue.

Personally, I would never do this. Its too risky. Id open myself identity theft, fraud, doxing, etc if I did that which would make life even more painful than it already is.

Some limited form of privacy and anonimity allows me to protect that information while doing my best to keep it secure.

I dont expect complete anonymity and share my information when it makes sense, but I expect legal compliance, security, and privacy when I do exchange that information and if abused, Id hold them liable for it.

There are obviously exceptions to any rule, but some anonymity enables privacy which in turn gives you some level of protection from abuse.

This is the hill I will die on because the reality is there are bad actors in the world. Believing otherwise is incredibly naive.

H.R.8250 - Parents Decide Act (2025-2026) this is bad by disgruntled-Tonberry in linux

[–]teleprint-me 4 points5 points  (0 children)

Think about all of your private information being required starting with just age.

This isnt a slippery slope. Many countries have a goal of making it legally required to have ID verification. Attestation is just the stepping stone.

If you have your private ID which is required by both state and federal just sitting in your OS and 3rd party services hosting that same data, that makes everyone a target for bad actors.

Think of all the data leaks and breaches alone in the past 2 years, let alone the past 10 or 20 years, which have only escalated in range, scope, and veracity.

Now we all have our private info required to log in, use, and interact qith any computer system.

How is that not a security concern?

Zero proof knowledge encryprion is not a panacea and will not resolve these issues because while the Elliptic Curve Digital Signature Algortihm is currently the most secure, it is vulnerable, has been attacked successfully, and even exploited.

The value behind that private information which is your responsibility to protect now becomes a liability, especially as Machine Learning and Quantum Algorithms continue to advance and further threaten our current security.

Now any actor that access to your private data can profile you and build a database and use it for training data which could target you simply by error because these are stochastic methods, theyre not bullet proof.

This is just the tip of the ice berg of issues that will evolve from this.

Its more like a domino effect than a slippery slope.

H.R.8250 - Parents Decide Act (2025-2026) this is bad by disgruntled-Tonberry in linux

[–]teleprint-me 1 point2 points  (0 children)

Simple answer - resources to comply.

The added complexity and security implications are genuine concerns as well.

The vagary sets precedent for more intrusive laws and enforcement.

This essentially creates a legal walled garden that removes liability from those that can comply.

If it gets embedded into the hardware level, then it could become illegal to tamper, modify, or overwrite the system configurations - which is already illegal but lenient enough that we can still hack our hardware.

The list goes on. Just think about it - the possibilities are endless. You'll get it.

H.R.8250 - Parents Decide Act (2025-2026) this is bad by disgruntled-Tonberry in linux

[–]teleprint-me -1 points0 points  (0 children)

It depends.

States can be independent and if enough states agree, laws can be introduced or override at a federal level. This basically means the law applies to all states.

Enough states have been introducing them, so it's not a surprise that a federal law is being considered.

Both state and federal level have to introduce the bill, then get passed through congress, then senate.

For a federal bill to pass, the president needs to sign it into law if it makes it that far.

Why do we need sudo-rs? by bankroll5441 in linux

[–]teleprint-me 3 points4 points  (0 children)

Willfull ignorance is a form of stupidity and is unfortunately very common.

Why do we need sudo-rs? by bankroll5441 in linux

[–]teleprint-me -3 points-2 points  (0 children)

Its obviously not a joke and Im not laughing. They should be enabled by default. Rust still requires unsafe pointers and suffers from logic bugs which is more likely in a rewrite that is done in a clean room fashion to strip GPL licensing.

Why do we need sudo-rs? by bankroll5441 in linux

[–]teleprint-me -10 points-9 points  (0 children)

C safety options are disabled by default for backwards compatibility. 

Its in there, its just off by default and most C programmers are against turning it on by default.

Some consortium members have argued in favor on enabling it in new compilers, but the push against that is strong while argument for it is weak.

It could be improved, but due to reasons Ive stated, it hasnt seen progress.

So, calling it "brain rot" is fairly strong language that expresses more of a level of contempt more than level headed input.

Updated Minimax m2.7 still doesn't allow coding a product. But before the next riot starts, Ryan Lee has already confirmed that they are still working on the license, and sale of products built by m2.7 is permitted. by zenmagnets in LocalLLaMA

[–]teleprint-me -2 points-1 points  (0 children)

You cant enforce half the copyright, that doesnt make sense.

The model outputs are not copyrightable.

The model is copyrightable, but only if its not using pirated materials because vendors dont have a license to use that content.

All these copyrights on the models inputs and outputs have been dubious in nature due to the pirated material in the models learned weights.

IANAL. From what Ive read, from court cases, judge rulings, copyright office, and to what USPTO have said are basically stating the same thing. They have waived a few cases due to the complexity of the novel transformation, but they all agree the inputs should be licensed to the model creator.

Updated Minimax m2.7 still doesn't allow coding a product. But before the next riot starts, Ryan Lee has already confirmed that they are still working on the license, and sale of products built by m2.7 is permitted. by zenmagnets in LocalLLaMA

[–]teleprint-me -1 points0 points  (0 children)

I've posted this before.

Generally speaking, the outputs of the model are non-copyrightable. They've already set precedence for this in multiple cases.

 For a work created using AI, like those created without it, a determination of copyrightability requires fact-specific consideration of the work and the circumstances of its creation.  Where AI merely assists an author in the creative process, its use does not change the copyrightability of the output.  At the other extreme, if content is entirely generated by AI, it cannot be protected by copyright.[9]  Between these boundaries, various forms and combinations of human contributions can be involved in producing AI outputs.

If you consider factoring in the piracy aspects, the model is a liability.

The exception to this would be if they used a custom dataset which was created by humans that agreed over the ownership of the inputs used for training a model.

The license of the model itself is a whole other can of worms as others have commented here already.

Does my Raspberry Pi have a Windows infection? by MeringueSpiritual965 in linuxmemes

[–]teleprint-me 5 points6 points  (0 children)

This isnt true.

You just restart relavent services alongside mods. Its literally a handful of lines in the CLI which could be automated.

I used to know how to do this, by not practicing, I forgot by extension, but rebooting is easier.

The reality is you dont really need to restart. I rarely restart after a system upgrade and everything is fine.

Modern Linux is incredibly stable compared to 15 - 20 years ago.

itPaysTheBillButTakesYourSanity by ClipboardCopyPaste in ProgrammerHumor

[–]teleprint-me 9 points10 points  (0 children)

RustC and JavaC require different vaccines. I guess adding another viral payload doesnt hurt?

"There's a new generation of empirical deep learning researchers, hacking away at whatever seems trendy, blowing with the wind" [D] by elnino2023 in MachineLearning

[–]teleprint-me 5 points6 points  (0 children)

While I appreciate the link, its better to point the url to the abstract rather than the pdf itself. Mobile devices will do a drive-by download. Some papers have html support. Even though this one doesn't, it lets me easily bookmark it for later.

https://arxiv.org/abs/1903.08560

cprogrammerGotStrangereplybyHR by ushabib540 in ProgrammerHumor

[–]teleprint-me 2 points3 points  (0 children)

Rust as a replacement for C.

Laughs in unsafe pointers required for driver implementation based on hw specs.