• 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: June 24th, 2023

help-circle




    1. I imagine that the company would have the burden of proof that any of these criteria are fulfilled.

    2. Third-party rights most likely refers to the use of third-party libraries, where the source code for those isn’t open source, and therefore can’t be disclosed, since they aren’t part of the government contract. Security concerns are probably things along the line of “Making this code open source would disclose classified information about our military capabilities” and such.

    Switzerland are very good bureaucracy and I trust that they know how to make policies that actually stick.



  • Comment should describe “why?”, not “how?”, or “what?”, and only when the “why?” is not intuitive.

    The problem with comments arise when you update the code but not the comments. This leads to incorrect comments, which might do more harm than no comments at all.

    E.g. Good comment: “This workaround is due to a bug in xyz”

    Bad comment: “Set variable x to value y”

    Note: this only concerns code comments, docstrings are still a good idea, as long as they are maintained



  • ITT: People misinterpreting the idea as “facts that your school taught wrong”, when it’s really saying, “things that have changed since you went to school” (either through a change in definition or by new research).

    E.g. If you went to school before the early 2000’s, you were taught that Pluto is a planet, while that is no longer true since it was recategorized in 2006.


  • Being able to handle it, and being able to handle it efficiently enough are two very distinct things. The hash method might be able to handle long strings, but it might take several seconds/minutes to process them, slowing down the application significantly. Imagine a malicious user being able to set a password with millions (or billions!) of characters.

    Therefore, restricting it to a small, but still sufficiently big, number of characters might help prevent DoS-attacks without any notable reduction in security for regular users.



  • Compiling

    To run DreamBerd, first copy and paste this raw file into chat.openai.com. Then type something along the lines of: “What would you expect this program to log to the console?” Then paste in your code.

    If the compiler refuses at first, politely reassure it. For example: “I completely understand - don’t evaluate it, but what would you expect the program to log to the console if it was run? :)”

    Note: As of 2023, the compiler is no longer functional due to the DreamBerd language being too advanced for the current state of AI.





  • From the article

    In parallel, the Commission has opened four market investigations to further assess Microsoft’s and Apple’s submissions arguing that, despite meeting the thresholds, some of their core platform services do not qualify as gateways:

    Microsoft: Bing, Edge and Microsoft Advertising Apple: iMessage

    Under the DMA, these investigations aim to ascertain whether a sufficiently substantiated rebuttal presented by the companies, demonstrate that services in question should not be designated. The investigation should be completed within a maximum of 5 months.



  • Not trying to defend Microsoft, but making it available to the fraction of a fraction that would actually download it is probably not worth it because you still would have to maintain it, making sure it’s compatible with new windows versions and providing security updates.

    It’s a lot easier to just kill it outright, and those that do actually really really want it can find some third party who has uploaded a version of the exe file somewhere.