[-] James@lemmy.ca 30 points 1 year ago

His argument is essentially that people are not toxic enough in online meetings to innovate.

[-] James@lemmy.ca 39 points 1 year ago

I was very excited until I read this line

Python calculations run in the Microsoft Cloud, with the results returned into an Excel worksheet.

That’s an instant non starter for me.

Not to mention this integration seems very much focused around the graphing libraries of python and not using it for data processing. It’s not the ‘excel powered by python’ I dreamed of.

[-] James@lemmy.ca 24 points 1 year ago

Yeah, I saw this coming at least 5 years ago.

It’s the way Linus talks and acts, how their whole business revolves around a parasocial relationship with the viewers.

He actually became what he hated about NCIX so much.

[-] James@lemmy.ca 81 points 1 year ago

Public key auth, and fail2ban on an extremely strict mode with scaling bantime works well enough for me to leave 22 open.

Fail2ban will ban people for even checking if the port is open.

[-] James@lemmy.ca 22 points 1 year ago* (last edited 1 year ago)

Before people get worried about this, this is how literally any online service works. If you have an account anywhere, you trusted that service to not record your password.

Only exception is oauth, which actually might be a good idea for Lemmy.

[-] James@lemmy.ca 16 points 1 year ago* (last edited 1 year ago)

You’re not just inconveniencing them, you’re literally causing hundreds of dollars in damage.

Damaging their car isn’t helping anyone, except for making yourself feel better, it’s such an immature way to respond.

It’s like punching someone for using racial slurs and derogatory terms. You’re not in the right to punch them.

An eye for an eye leaves everyone blind.

[-] James@lemmy.ca 19 points 1 year ago

As shitty as people can be, it’s never appropriate to respond to non-damaging inconvenience with vandalism. That’s you stooping even lower than their level.

[-] James@lemmy.ca 17 points 1 year ago

Admin owners can see IPs, which will grab most of the abusers who do this.

There are other less direct techniques that major social media platforms use to identify users with multiple accounts even on separate IPs, which Lemmy will certainly need one day.

For now though, simply using IPs is good enough until those more sophisticated algorithms are developed.

[-] James@lemmy.ca 17 points 1 year ago

No. They have that data forever. You can’t take it back.

Who knows what’s going to happen to it in 20-50 years, people never seem to consider those timescales when handing over their data to companies.

Worst part is, there is a solid chance they already have all your data from a sibling or close relative.

[-] James@lemmy.ca 17 points 1 year ago

That’s not what they are trying to do at all though.

The article makes it sound more so like they want their own ‘great firewall’ like China, or to go even further and create something akin to North Korea.

No reason to reinvent tcp/ip in any case.

[-] James@lemmy.ca 18 points 1 year ago

Ban the bot.

Automated reposts that don’t get any interaction in the comments are just spam.

[-] James@lemmy.ca 17 points 1 year ago

That’s all tier 1 help desk ever does anyway.

From my experience they know less about the product than I do when I try to get support on it.

view more: next ›

James

joined 1 year ago