• 8 Posts
  • 58 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle
  • phase_change@sh.itjust.workstoSelfhosted@lemmy.worldPaid SSL vs Letsencrypt
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    2 months ago

    The person isn’t talking about automating being difficult for a hosted website. They’re talking about a third party system that doesn’t give you an easy way to automate, just a web gui for uploading a cert. For example, our WAP interface or our on-premise ERP don’t offer a way to automate. Sure, we could probably create code to automate it and run the risk it breaks after a vendor update. It’s easier to pay for a 12 month cert and do it manually.



  • Except it’s not that they are finding the expansion rate is different in some directions. Instead they have two completely different ways of calculating the rate of expansion. One uses the cosmic microwave background radiation left over from the Big Bang. The other uses Cepheid stars.

    The problem is that the Cepheid calculation is much higher than the CMB one. Both show the universe is expanding, but both give radically different number for that rate of expansion.

    So, it’s not that the expansion’s not spherical. It’s that we fundamentally don’t understand something to be able to nail down what that expansion rate is.



  • And the article content posted is just an excerpt. The rest of the article focuses on how AI can improve the efficiency of workers, not replace them.

    Ideally, you’ve got a learned individual using AI to process data more efficiently, but one that is smart enough to ignore or toss out the crap and knows to carefully review that output with a critical eye. I suspect the reality is that most of those individuals using AI will just pass it along uncritically.

    I’m less worried about employees scared of AI and more worried about employees and employers embracing AI without any skepticism.








  • As a guy responsible for a 1,000 employee O365 tenant, I’ve been watching this with concern.

    I don’t think I’m a target of state actors. I also don’t have any E5 licenses.

    I’m disturbed at the opaqueness of MS’ response. From what they have explained, it sounds like the bad actors could self-sign a valid token to access cloud resources. That’s obviously a huge concern. It also sounds like the bad actors only accessed Exchange Online resources. My understanding is they could have done more, if they had a valid token. I feel like the fact that they didn’t means something’s not yet public.

    I’m very disturbed by the fact that it sounds like I’d have no way to know this sort of breach was even occurring.

    Compared to decades ago, I have a generally positive view of MS and security. It bothers me that this breach was a month in before the US government notified MS of it. It also bothers me that MS hasn’t been terribly forthcoming about what happened. Likely, there’s no need to mention I’m bothered that I’m so deep into the O365 environment that I can’t pull out.




  • Isn’t the immediate call for censorship/defederation as soon as some views are challenged a bit too entitled?

    To some extent, YES, but I think it’s a bit more nuanced and comes down to where you draw that line. Everyone is going to draw it in a different place.

    I moderated an academic listserv with membership in 5 digits back before the html protocol even existed. That was huge for the time. And, as you would think, in academia at the time the idea of cronterversy, free speech, and engaging in items you disagreed with was pretty comprehensive. Even so, we still had to moderate, primarily for spam and obvious trolling as well as the occasional personal attacks.

    I was an active participant in Usenet in the 90’s. Usenet was federated servers hosting posts and comments from participants on that entire federation. I know a server admin could control what Usenet groups they carried. I have no idea what other levels of moderation were available. Discussions were definitely more freewheeling and challenging than you see today, but they also had a higher content level and a greater respect for intellectual argument, even in trolling. Again, I suspect that was because the bulk of the participants were coming from higher ed institutions.

    I was active in Internet forums when SCO sued IBM. There were active attacks on communities and successful attempts to splinter communities based in part on what side of the very question you are asking participants came down on. Again, though, there was a strong respect for intellectual engagement. And, I came down strongly with the same opinion you are expressing back then.

    I think that strong respect for engagement exists here in the fediverse, particularly when compared to something like FaceBook or Reddit. As the fediverse grows, I think that will go away.

    I don’t have much respect for low content trolling, for active attacks via brigading, for manipulation. I think the ability to upvote is important, but I also think the ability for bot accounts to manipulate that is a very difficult thing to combat, particularly in something as young as Lemmy that is experiencing exponential growth.

    I also have a much better awareness of how subtle that manipulation can be in influencing individuals and society, including my own views.

    I no longer have the absolutist attitude I once had. I agree with your own concerns about echo chambers, because that leads to its own manipulation of views and the splintering of society. However, I’m also more willing to support the idea of not providing a platform for some of the more odious content than my older self would have supported.

    I’m probably in a position to piss off nearly everyone. I disagree with your view that there should be almost no lines drawn, but I disagree with the majority that the lines should be drawn where they want it to be.



  • Does the GPL cover having to give redistribution rights to the exact same code used to replicate a certain build of a product?

    It does, and very explicitly and intentionally. What it doesn’t say is that you have to make that source code available publically, just that you have to make it available to those you give or sell the binary to.

    What Red Hat is doing is saying you have the full right to the code, and you have the right to redistribute the code. However, if you exercise that right, we’ll pull your license to our binaries and you lose access to code fixes.

    That’s probably legal under the GPL, though smarter people than me are arguing it isn’t. However, if those writing GPLv2 had thought of this type of attack at the time, I suspect it wouldn’t be legal under the GPL.



  • I believe you are correct. Any paying Red Hat customer consuming GPL code has the right to redistribute that code. What Red Hat seems to be suggesting is that if you exercise that right, they’ll cut you as a customer, and thus you no longer have access to bug fixes going forward.

    I suspect it’s legal under the GPL. I’m certain it violates the spirit of the GPL.


  • I am not a lawyer, but I have been a follower of FLOSS projects for a long time.

    Me too. I know what I’m suggesting is functionally impossible. I’m wondering if it could be done in compliance with the GPL.

    All of those contributors have done so using language that says GPLv2 or higher. Specifically says you can modify or redistribute under GPLv2 or later versions. So nothing stops the Linux Foundation from asking new contributors to contribute under the GPLv4 and then releasing the combined work of the new kernel under GPLv4.

    The old code would still be available under the GPLv2, but I suspect subsequent releases could be released under a later version and still comply with original contributions.

    Again, I know it won’t happen, just like I believe Red Hat’s behavior is within the rules of the GPL. I’d love to hear arguments as to how Red Hat is violating the GPL or reasons why the kernel couldn’t be released under GPLv3 or higher.