[-] chamomile@furry.engineer 7 points 4 months ago

@KillingAndKindess @alyaza B&J's have always been quite principled and outspoken about it - they're also staunch critics of the US prison industrial complex.

[-] chamomile@furry.engineer 4 points 5 months ago* (last edited 5 months ago)

@SorteKanin

This also explains why evaporation cools down (like when you sweat): the molecules with the highest temperature are the ones evaporating, so the average temperature decreases as those high-temperature molecules leave the system. Only the relatively colder molecules are left behind - thus it cools as a whole.

The main principle at work here is the enthalpy of vaporization. When matter changes state, there is an associated amount of energy that is absorbed or released - in the case of vaporization, energy must be absorbed. So when sweat forms on your skin and evaporates, it absorbs heat energy from your body in order to undergo that state change.

For water, the energy involved here is remarkably high, much higher than the energy stored by a few degrees difference in temperature. For example, if you wanted to boil off 1kg of water, it would take about 300 kJ to bring the temperature up to boiling from room temperature and over 2000 kJ to boil it all into steam.

[-] chamomile@furry.engineer 7 points 6 months ago

@fossilesque Don't forget those of us in the back row because we slept in and got there late!

[-] chamomile@furry.engineer 9 points 7 months ago* (last edited 7 months ago)

@Gaywallet I have a couple thoughts on this:

  1. This seems like a way that device attestation could worm its way further into our devices. Right now Google is trying to watermark AI-generated photos as AI, but you could easily go the other way - if a photo hasn't been manipulated, it's signed with a key that is locked down to device attestation. What, your phone is rooted? That's kinda suspicious - how am I supposed to know your photos are real?

  2. Short of that, though, I suspect that the most likely consequence of this is the videos will start being increasingly seen as necessary for true proof, since those are harder to fake - for now, at least. And of course, there will be a lot more misinformation on the internet, especially in the short term while awareness of this catches up.

[-] chamomile@furry.engineer 9 points 7 months ago

@HawlSera I do recognize that tomboys, buff women, etc are worth representing, (and we should push for their inclusion) but that's not what I'm talking about - I mean people who look like "men" but use pronouns other than he/him.

[-] chamomile@furry.engineer 3 points 7 months ago

@chloyster @alyaza I had no idea the series was developed by Humongous! That studio made so many good games that I'm nostalgic for.

[-] chamomile@furry.engineer 5 points 7 months ago* (last edited 7 months ago)

@snow_bunny Nah, it was Sonos. Which, I guess the app ecosystem is their whole thing - but I didn't know that at the time. I just wanted a basic sound bar, and the reviews didn't really mention that all that extra fluff was mandatory.

In retrospect Sonos sucks for a lot of other reasons too, so I guess it was a bullet dodged.

[-] chamomile@furry.engineer 6 points 7 months ago

@SPAUZPiMP @scarabic Oh wow, did he literally say "irreducible complexity?" That is SO blatant lol.

[-] chamomile@furry.engineer 6 points 7 months ago

@theangriestbird

“Tim Walz is a weird radical liberal,” the MAGA War Room account posted on X, formerly Twitter. “What could be weirder than signing a bill requiring schools to stock tampons in boys' bathrooms?”

It's so funny watching conservatives attempt to turn the"weird" thing around.

[-] chamomile@furry.engineer 5 points 8 months ago

@WoahWoah Not to be the obnoxious didact in the room but I do feel compelled to point out that vegetables/herbs soaked in oil at room temp are generally not a good idea unless you like botulism poisoning: https://extension.oregonstate.edu/food/preservation/herbs-vegetables-oil-sp-50-701

Just for anyone who's not aware! Honestly, immediately shitting yourself was not even close to the worst possible outcome lol.

[-] chamomile@furry.engineer 6 points 10 months ago

@kid TL;DR: If you have a secret variable in your CI/CD pipeline and it's written to a file that subsequently gets artifacted, anyone who can access that artifact can also read your secret variable.

Feels like a "no shit" moment but I guess I can see how someone could make this mistake in a more complicated setup than the example in the blog.

[-] chamomile@furry.engineer 7 points 1 year ago* (last edited 1 year ago)

@agressivelyPassive @technom That's a self-fulfilling prophecy, IMO. Well-structured commit histories with clear descriptions can be a godsend for spelunking through old code and trying to work out why a change was made. That is the actual point, after all - the Linux kernel project, which is what git was originally built to manage, is fastidious about this. Most projects don't need that level of hygiene, but they can still benefit from taking lessons from it.

To that end, sure, git can be arcane at the best of times and a lot of the tools aren't strictly necessary, but they're very useful for managing that history.

view more: ‹ prev next ›

chamomile

joined 2 years ago