• 0 Posts
  • 72 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle

  • When using the English word ‘floor’ counting ground floor as ‘first floor’ makes sense – ground level still has a floor and it is the first one, but it is still counted differently in different English-speaking countries. Other languages (at least Polish) have separate word for ‘non-ground level of the building’ so those are counted.

    In Polish we have the word ‘parter’ for the ground floor (lowest non-basement level of the building) and ‘piętro’ for any level above it. So it is: (‘piwnica’ (basement), ) ‘parter’, ‘1 piętro’, ‘2 piętro’… This makes complete sense… but I still remember it being confusing when I was a kid. A ‘floor’ (the bottom of a room) is ‘podłoga’.

    So, answering the question: there are three ‘podłogas’ under the second ‘piętro’ here.



  • Also not a fan of #16 since it sounds to me like forced labour for the poor

    That is how actually that worked in some (if not all) communist countries. No unemployment, but people (mostly those ‘undesirable’ for various reasons) would be sent to hard work in bad conditions, which would often cost their health or life. The other side of the coin was: everybody had a job and little fear of losing it, so people rarely treated the work seriously enough. There were factories full of workers, but so inefficient, that nothing was produced in sufficient demand. People had money, but little to buy with it.






  • As long as we are not paying for the services the service providers will do what they can to show us ads and frankly… rightly so.

    The problem is there is no other established way for paying for services. One that would be widely use and fair. Current state of things is ‘we say it is free, but we will get the money from advertisers or by selling your data’. Yes, some people are often able to avoid some of the ads and privacy loss, but that means the service gets no money from those people, so the service is built and being run for the rest of users – those who cannot install ad-blockers or who don’t care or don’t know how to care about their privacy. This is one of the reasons of enshitification – any ‘free’ service needs to be only as good as required to keep the users who watch ads and give away their data. Catering any more conscious user is just a cost.

    When enough of people will be using ad-block then the ad-block will stop working on many sites or the sites will disappear or become paid service. No one will provide commercial services for free and not everything can be a public service founded by a government or a community. I am not even talking about ‘corporate profits’ – even in the worst corporations there are normal people working and they should be paid for their work. Whether they are paid fairly and whether the corporate profits aren’t too big is another topic…


  • Slightly off-topic rant:

    I hate how the ‘VPN’ term has been took over by companies selling services using VPN technology.

    VPN was initially ‘Virtual Private Network’ – used to securely connect own (as belonging to an organization or person) devices over a public network. Like securely connecting bank branches. Or allowing employee connect to a company network. And VPN are still used that way. They are secure and provide the privacy needed.

    Now when people say ‘VPN’ they often mean a service where they use VPN software (initially designed for the use case mentioned above) to connect to the public interned via some third-party. This is not a ‘private network’ any more. It just changes who you need to trust with you network activity. And changes how others may see you (breaking other trust).

    When you cannot trust your ISP and your local authorities those ‘VPNs’ can be useful. But I have more trust to my ISP I have a contract with and my country legal system than in some exotic company in some tax haven or other country that our consumer protections or GDPR obligations won’t reach.

    Back to the topic:
    I do not believe that all VPN services are owned/funded by governments, but some may be. I don’t have much reason to trust them, they are doing it for money and not necessarily only the money their customers pay them. In fact I trust my government more that some random very foreign company.



  • It probably seems extra complexity for you, if your language does not use it. For native speakers it is just natural and not using it would be at least weird.

    We could ask the same question about articles . Those ‘the’ and ‘a’, why use them? It only makes English language harder to use! ‘Apple is apple’ why add another meaningless word?

    Of course after learning and using English for years I see the meaning of ‘a’ and ‘the’ and thy feel quite natural for me to (though sometimes they still make little sense to me – all the fights whether ‘The’ can be used with some proper name or not). The point is: a lot of features of a foreign language will fill alien and unnecessary.

    Maybe more on topic, that is how/why gendered words work in Polish: noun gender is usually linked to how it ends (but do not confuse that with suffixes of grammatical cases). Virtually all Polish women names end with ‘a’, so any other noun ending in ‘a’ sounds feminine and would be used in similar way. And sometimes it just ‘rhymes’ – like in ‘to jabkło’ (‘this apple’ – neuter), ‘ta gruszka’ (‘this pear’ – feminine), ‘ten banan’ (‘this banana’ – masculine). Of course thing get much more complicated than that (like in every language, just in different parts of the language).

    People were just talking in the way that it was convenient for them. And thousands years later scholars called this feature of particular set of languages ‘gender’ because words used seem to be related to genders.




  • Jajcus@kbin.socialtolinuxmemes@lemmy.worldHtop too
    link
    fedilink
    arrow-up
    81
    ·
    9 months ago

    Well behaving programs give control back to the kernel as soon as they are done with what they are doing. If they don’t the control is forcefully taken away after some assigned time.

    It looks something like this:

    Something happens – e.g. a key is pressed – a process waiting for this event is woken up and gets e.g. 100ms to do it stuff. If it can handle the key press in 50ms, kernel notes it used 50 ms of CPU time and can give control to another process waiting for an event or busy with other work. If the key press triggered long computation the process won’t be done in 100ms, the kernel notes it used 100ms of CPU time and gives control to other processes with pending events or busy with other work.
    After one second the kernel may have noted:

    Process A: used 50ms, then nothing, then 100ms, another 100ms and another 100ms
    Process B: was constantly busy doing something, so it got allocated 6 * 100ms in that one second
    Process C: just got one event and handled it in 50ms
    Process D: was not waken at all

    So total of 1000ms was used – the CPU was 100% busy
    Of that 60% was process B, 35% process A and 5% process C.

    And then that information is read from the kernel by top and displayed.

    How does the OS even yank the CPU away from the currently running process?

    Interrupts. CPU has means triggering and interrupt at a specific time. Interrupt means that CPU stops what it is doing and runs selected piece of kernel code. This piece of kernel code can save the current state of user process execution and do something else or restore saved execution of another process.


  • If your browser or your OS insist on only trusting $1000 certificate, blocking access to most of the internet, then change the browser or OS. There is no grand authority telling which root certificates can be trusted. Yes, Google or Apple could scam their users this way if they wish to, but it would not make much sense for them. People would use something else.




  • Have you ever worked with a computer with modern general-purpose OS like Linux and no RTC? It sucks. It is not strictly necessary, you can live without it, but you need workarounds for basic stuff timestamps in log files or in the file system. At least for a minute until NTP connection is established, but may be longer when internet connection is not available. And when routers are rebooted most often? When troubleshooting broken internet connection. This is also the time when properly timestamped logs could be useful.

    And battery backed RTC is cheap. It doesn’t fit on a Raspberry Pi board, but can easily fit into a router case. No excuse for omitting it.