cultural reviewer and dabbler in stylistic premonitions
CBOR uses variable-sized length prefixes. Strings zero to 23 bytes long require just one byte of overhead, after that it becomes two bytes for strings up to length 255, and 3 bytes of overhead for strings up to 65535. Above that, it requires 5 bytes of overhead, which is probably enough for strings up to at least a few hundred GB, though I didn’t test that far.
$ python -c 'import cbor; overhead=0; print({ length:overhead for length in range(65537) if overhead < (overhead:=len(cbor.dumps("a"*length))-length) })'
{0: 1, 24: 2, 256: 3, 65536: 5}
Upload bandwidth doesn’t magically turn into download bandwidth
Actually, it does. Various Cable and DSL standards involve splitting up a big (eg, measured in MHz) band of the spectrum into many small (eg, around 4 or 8 kHz wide) channels which are each used unidirectionally. By allocating more of these channels to one direction, it is possible to (literally) devote more band width - both the kinds measured in kilohertz and megabits - to one of the directions than is possible in a symmetric configuration.
Of course, since the combined up and down maximum throughput configured to be allowed for most plans is nowhere near the limit of what is physically available, the cynical answer that it is actually just capitalism doing value-based pricing to maximize revenue is also a correct explanation.
the guy speaking off camera in the linked 3min 30s of the video is Ted Ts’o, according to this report about the session.
i regret to inform you there is another startup literally pitching that: https://fortune.com/2023/11/30/lucid-dream-startup-prophetic-headset-prepare-meetings-while-sleeping/
This just crossed my radar again and… it turns out this startup is not only into non-invasive EEG electrodes: the founder of it self-trepanated last year 😬
I edited the post to add two links.
That pin can be found for $30 or $35 on on ebay here and here, where it is described as being from the 80s and as an “employee pin”.
I was thinking that this might have been something aimed specifically at technology buyers in US schools in the 80s or 90s, to whom Apple offered substantial institutional discounts in a (relatively successful) effort to dominate that sector. However searching the phrase “does more costs less” i found this TV spot advertising the Quadra 605 which at $1000 was the cheapest computer Apple sold when it was introduced in October 1993 (and allegedly cheaper than something else they refer to as “PC Leading Brand” 😂). That system was sold under the LC and Performa brands up to 1996, but it was only sold as a Quadra until October 1994, so, to answer OP’s question: that slogan was in use at least sometime in that year.
That isn’t Twitter at all, it’s BlueSky with its “composable moderation”.
That particular incorrect label is in my screenshot because I am subscribed to this “XBlock Screenshot Labeller” someone runs, which is kind of goofy but something I currently have enabled and configured so that I have to click on screenshots-or-false-positives before they are displayed.
You can read more about how labels work in bluesky’s docs.
ip -br a
(-br
is short for -brief
and makes ip
’s addr
, link
, and neigh
commands “Print only basic information in a tabular format for better readability.”)
Yeah, I also used to run qmail and first knew of djb as the apparently only person capable of implementing network protocols in C without any exploitable bugs :)
But, he was actually doing historically important cryptography work even back then: https://en.wikipedia.org/wiki/Bernstein_v._United_States (and since has gone on to co-invent several cryptographic primitives which are now ubiquitous internet standards).
as the mod of this community i feel inclined to mention here that I posted a comment about this last month in another community, in reply to a previous post OP made about it: https://lemmy.ml/comment/12562836
it’s been nearly four years since he stopped being involved with it, fyi.
he wouldn’t be able to inject backdoors even if he wanted to, since the source code is open
Jia Tan has entered the chat
See also Section 7.3 and Appendix C (and the BADA55 Crypto paper that the email in Appendix C refers to).
To answer your question: yes, YTA 🤦
Also, I’m deleting this post per asklemmy rule 3.