[-] James@lemmy.ca 26 points 1 year ago

His argument is essentially that people are not toxic enough in online meetings to innovate.

[-] James@lemmy.ca 39 points 1 year ago

I was very excited until I read this line

Python calculations run in the Microsoft Cloud, with the results returned into an Excel worksheet.

That’s an instant non starter for me.

Not to mention this integration seems very much focused around the graphing libraries of python and not using it for data processing. It’s not the ‘excel powered by python’ I dreamed of.

[-] James@lemmy.ca 16 points 1 year ago* (last edited 1 year ago)

I mostly agree with you, the internet must change, and it’s changing for the good with these non-profit decentralized networks like Lemmy.

These companies abused the internet too much and it’s hit a breaking point. People are taking the power back. I look forward to a user-owned internet again where the content I see is not entirely controlled by corporate interests.

I think these websites will genuinely die within the next decade. There’s just never been decentralized social media(of this kind) to compete with them before.

[-] James@lemmy.ca 20 points 1 year ago

Yeah, I saw this coming at least 5 years ago.

It’s the way Linus talks and acts, how their whole business revolves around a parasocial relationship with the viewers.

He actually became what he hated about NCIX so much.

[-] James@lemmy.ca 79 points 1 year ago

Public key auth, and fail2ban on an extremely strict mode with scaling bantime works well enough for me to leave 22 open.

Fail2ban will ban people for even checking if the port is open.

[-] James@lemmy.ca 22 points 1 year ago* (last edited 1 year ago)

Before people get worried about this, this is how literally any online service works. If you have an account anywhere, you trusted that service to not record your password.

Only exception is oauth, which actually might be a good idea for Lemmy.

[-] James@lemmy.ca 13 points 1 year ago* (last edited 1 year ago)

You want descriptive answers? Make a descriptive question.

It can be as simple as 'what is "x" and why?'

[-] James@lemmy.ca 15 points 1 year ago

Admin owners can see IPs, which will grab most of the abusers who do this.

There are other less direct techniques that major social media platforms use to identify users with multiple accounts even on separate IPs, which Lemmy will certainly need one day.

For now though, simply using IPs is good enough until those more sophisticated algorithms are developed.

[-] James@lemmy.ca 17 points 1 year ago

No. They have that data forever. You can’t take it back.

Who knows what’s going to happen to it in 20-50 years, people never seem to consider those timescales when handing over their data to companies.

Worst part is, there is a solid chance they already have all your data from a sibling or close relative.

[-] James@lemmy.ca 20 points 1 year ago

That’s not what they are trying to do at all though.

The article makes it sound more so like they want their own ‘great firewall’ like China, or to go even further and create something akin to North Korea.

No reason to reinvent tcp/ip in any case.

[-] James@lemmy.ca 16 points 1 year ago

Ban the bot.

Automated reposts that don’t get any interaction in the comments are just spam.

[-] James@lemmy.ca 16 points 1 year ago

That’s all tier 1 help desk ever does anyway.

From my experience they know less about the product than I do when I try to get support on it.

view more: next ›

James

joined 1 year ago