[-] drspod@lemmy.ml -2 points 4 hours ago

Enjoy being mediocre.

[-] drspod@lemmy.ml 1 points 9 hours ago

On a technical blog post by a software company about the details of solving an algorithmic complexity problem?

Careless, and showing that the author does not understand technical communication, where precision is of great importance.

[-] drspod@lemmy.ml 16 points 13 hours ago

Marketing departments love to make a huge deal out of this kind of thing, because they only see the big number improvement and don't really understand that this was just some dev's Wednesday afternoon.

[-] drspod@lemmy.ml 8 points 13 hours ago

They make the same mistake further down the article:

However, the implementation of the command suffered from poor scalability related to reference count, creating a performance bottleneck. As repositories accumulated more references, processing time increased exponentially.

This article writer really loves bullet point lists, too. 🤨

[-] drspod@lemmy.ml 3 points 1 day ago

Are you new to hackaday? This is 90% of their articles.

I don't mind it - they're bringing news about interesting things that makers are doing, and most of the time those makers have made videos about their process, so it makes sense to include it.

[-] drspod@lemmy.ml 1 points 1 day ago

There is nothing to be “weary” of

I checked, and OP actually spelt "wary" correctly.

[-] drspod@lemmy.ml 8 points 2 days ago

No rice

We don't use that term in this community, see rule 7

[-] drspod@lemmy.ml 105 points 3 days ago

Just be patient for the inevitable uBlockOrigin update that will fix it.

[-] drspod@lemmy.ml 1 points 3 days ago

It might be worth asking for advice in !fediverse@lemmy.world

[-] drspod@lemmy.ml 12 points 4 days ago

@Scirocco@lemm.ee @sag@lemm.ee Any plans on moving this community to another instance?

[-] drspod@lemmy.ml 9 points 6 days ago

maybe it's finished

11
submitted 1 month ago by drspod@lemmy.ml to c/gaming@beehaw.org

From the video description:

The Deepest Games are DUMB. How is it possible that this generation of game developers, who are clearly articulate and educated, be so obsessed with the idea of creating deep meaningful games, and yet consistently produce games that are shallow and automated? Also, why does it seem impossible for the depth of the games of the past to be re-created? There clearly isn't any technological barrier, so what is the problem?

One of the major problems that I discuss in today's video is the obsession modern developers have with making smart games and being perceived as these masters of human psychology and technology. Where this stems from is hard to know for sure, but there is clearly a trend of developers being able to find the areas of their game that contain the potential for depth, and then systematically eliminating them. Ironically a lot of these areas are labeled as "outdated" but what I think developers and reviewers really mean to say is dumb. No one would argue pixel art is outdated. No one would argue that Mario 3 and their favorite Super Nintendo games are outdated. What they mean is that these games are presenting the player true punishment and no smartly devised system to go around the punishment.

114
submitted 2 months ago* (last edited 2 months ago) by drspod@lemmy.ml to c/programming@programming.dev

Edit 2025-04-09 16:42Z - article was updated with a tenth package (Prettier - Code)

A set of ten VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer for Monero.

ExtensionTotal researcher Yuval Ronen has uncovered ten VSCode extensions published on Microsoft's portal on April 4, 2025.

The package names are:

  1. Prettier - Code for VSCode (by prettier) - 486K installs
  2. Discord Rich Presence for VS Code (by Mark H) - 189K installs
  3. Rojo – Roblox Studio Sync (by evaera) - 117K installs
  4. Solidity Compiler (by VSCode Developer) - 1.3K installs
  5. Claude AI (by Mark H)
  6. Golang Compiler (by Mark H)
  7. ChatGPT Agent for VSCode (by Mark H)
  8. HTML Obfuscator (by Mark H)
  9. Python Obfuscator for VSCode (by Mark H)
  10. Rust Compiler for VSCode (by Mark H)
13
submitted 2 months ago* (last edited 2 months ago) by drspod@lemmy.ml to c/cybersecurity@sh.itjust.works

Edit 2025-04-09 16:42Z - article was updated with a tenth package (Prettier - Code)

A set of ten VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer for Monero.

ExtensionTotal researcher Yuval Ronen has uncovered ten VSCode extensions published on Microsoft's portal on April 4, 2025.

The package names are:

  1. Prettier - Code for VSCode (by prettier) - 486K installs
  2. Discord Rich Presence for VS Code (by Mark H) - 189K installs
  3. Rojo – Roblox Studio Sync (by evaera) - 117K installs
  4. Solidity Compiler (by VSCode Developer) - 1.3K installs
  5. Claude AI (by Mark H)
  6. Golang Compiler (by Mark H)
  7. ChatGPT Agent for VSCode (by Mark H)
  8. HTML Obfuscator (by Mark H)
  9. Python Obfuscator for VSCode (by Mark H)
  10. Rust Compiler for VSCode (by Mark H)
61
R(ul)esign (lemmy.ml)
submitted 4 months ago by drspod@lemmy.ml to c/196@lemmy.blahaj.zone

AMAB

3
submitted 4 months ago* (last edited 4 months ago) by drspod@lemmy.ml to c/technology@lemmy.world

This is a moving story about a cafe in Japan that allows house-bound people to join in with society and find a purpose, using remotely operated robotic avatars.

10
submitted 4 months ago by drspod@lemmy.ml to c/linux@lemmy.ml

I had never heard of Absolute Linux, but the rest of this article has some interesting musings on lightweight distros that I thought would make for good discussion here.

130
submitted 4 months ago by drspod@lemmy.ml to c/linux@lemmy.ml

If you want to go straight to the original write-up, it's here: https://eieio.games/blog/bad-apple-with-regex-in-vim/

16
submitted 5 months ago by drspod@lemmy.ml to c/cassettefuturism@lemm.ee
42
submitted 6 months ago* (last edited 6 months ago) by drspod@lemmy.ml to c/cassettefuturism@lemm.ee

Great craftsmanship from this maker and the end result is impressive.

If you want to skip the construction process and just see the end result, skip ahead to 41:20.

21
submitted 7 months ago* (last edited 7 months ago) by drspod@lemmy.ml to c/lemmy_support@lemmy.ml

Edit: this appears to be fixed now: https://lemmy.ml/post/22203615/14801411

All images in posts on lemmy.ml are currently being resized to 256px on the longest dimension (width/height), even if they are image posts, not intended to be just article thumbnails.

Is this an intentional change? It makes text in images illegible and means that I have to view the original post to see the original image on every image post.

If this is a deliberate space-saving measure, could it be tuned for a little better usability? For example, increasing the maximum size of image when the post is an image post (as opposed to a web link that generates a thumbnail) and setting a size threshold to trigger resize (ie. most small images could be left alone).

Some examples from my feed:

23
submitted 7 months ago by drspod@lemmy.ml to c/privacy@lemmy.ml
35
submitted 9 months ago* (last edited 9 months ago) by drspod@lemmy.ml to c/programming@programming.dev

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

view more: next ›

drspod

joined 3 years ago