Pinned ping

testimonial Show more

New shoes! It's a miracle they had them in my size, I'm a US women's 13...

This is an ultrasimple risc core based on Ben Eater's design which I'm mostly implementing to learn about pipelining

Working on my CPU design... Got my first instruction microcoded!!

Just one more overdue task! And I cna't do it in the physical location I'm in! Aaaah!

I propose a personal challenge for 2019. Nothing major, but it might give you a little bit of perspective.

In 2019, try your best to avoid as much media as possible that is based on IPs created before, say, your date of birth. (For me, that would include “Star Wars” as well as Marvel and DC films.) Also try to avoid reboots, remakes, and “rebakes” (remakes disguised as reboots).

#FindNewStories and give them a chance. 👍

Almost - almost almost _almost_ - done with all my overdue tasks.

I'll get the hang of this Taskwarrior thing eventually...

software service ethics Show more

You all make me feel warm inside, and maybe allay my despair for a minute.

Thanks.

For once in my life I managed to get my homework and actual work to an acceptable state with an hour or so left in my evening.

Time to make some progress on figuring out what the fuck I'm doign with my time

Finally ordered a Pinebook 11 inch. I'm hoping to run Android on it so my partner can have a working computer with decent battery life and no Apple bullshit.

as somebody who worked in the aftermarket repair industry

legit fuck this, if you have to get a mac buy an older used model from somebody.

if you need the best, apple aint even selling it to you anyway, build a hackintosh.

your attachment to macOS is being used, its being exploited, you have no control or say over your own device

If even Google is unable to keep a product safe, then basically every developer team on this problem must be considered incapable of doing so.

Avoid sharing data of even mild importance on the web when possible. Check for known prior security problems of a service vendor. Do not connect accounts. Never re-use passwords. Use a password manager. Use it to prune your accounts and identities on a yearly basis.

Currently, 0.78% of all Steam users play on Linux. That certainly isn't much, but it was at 0.59% last August.

The uptick is due to a big update to Steam Play, also known as Proton, which is their compatibility software designed to let Linux users play Windows games without having to actually boot up a full copy of Windows.

This shows there's a real interest in Linux gaming and a lot of people are just waiting to be able to play their favorite games on it.
store.steampowered.com/hwsurve

Boss makes a dollar
I make a dime
That's why I put into practice ideas from the OSS Simple Sabotage Field Manual

archive.org/details/SimpleSabo

trans mh experiences, boost explicitly ok Show more

Politicians regularly ask for backdoors to encryption. This poses a severe threat to online security in general: tutanota.com/blog/posts/why-a-

#Fight4Privacy #No2Backdoors

Show more
Cybrespace

cybrespace: the social hub of the information superhighway

jack in to the mastodon fediverse today and surf the dataflow through our cybrepunk, slightly glitchy web portal