Show newer

By the way, I'm using jwasm as assembler, jwlink as linker, and emu2 ( as emulator. JWasm and JWlink 's license is not approved by the FSF, but it is approved by the OSI.

Show thread

I think I'm mastering 8086 assembly. If you're wondering why am I writing code for that museum CPU, it's because 8086 is what we're being taught in this class.

Introducing: Avatar Maker avatars of me. It comes in three flavors: regular, queer and femme. Inkscape-tweaked for extra accuracy. Choose your favourite! I choose queer.

What I love about websites such as Minitube, iMyFone and such, is that they actually show you additional methods to do things that don't require their shitty proprietary software.


Hmm, this sounds pretty much like ADHD, and also sounds pretty much like me. Hey, likely ADHD person, we need to talk!

JetBrains Mono font looks suspiciously similar to Iosevka.

If you don't give dictators the power to use Telegram's code to enslave people, then you don't give people the power to use Telegram's code to fight and resist dictatorship. Durov, that's not a valid excuse. You need to free Telegram's server code if you really want freedom for the people.

Recently, Wayland session has been causing a lot less trouble than in KDE 5.22.5.

This joke applies to any country with an oppresive regime.

Show thread

China: in this country, there are two types of people: those who oppose the goverment and those who don't.

China: now there's only one.

Facebook PR response: “here at Facebook, our top priority is to make Instagram a safe space for everyone to interact, have fun and create meaningful relationships. Although here at Facebook we are aware of the consequences Instagram has over teenagers, we at Facebook also think Instagram has also been a positive force in people's lives.

Nonetheless, we at Facebook have created tools to help people protect from bullying, such as hiding likes in posts. We at Facebook are also working on improving our algorithm so that Instagram users get distracted from topics that might affect their mental health, as soon as we at Facebook detect they are looking at them repeatedly.

We at Facebook do that because all we care about here at Facebook is the happiness and well being of our Instagram users.

We at Facebook will find ways to hand researchers more detailed data on our research in ways that don't affect Instagram users' privacy.“

[3/?] []

Show thread

Meanwhile, internal PR discussion at Facebook goes: “shit, people are starting to think we don't care about people, which is true, but we must act as if we did. We won't fix any of that, because our money depends on making people feel bad about themselves so they buy stuff.

Hmm, how do we make people think we're doing things right? Think, think… the thing to hide likes! Yes! We know perfectly fine it didn't work, but it's all we've got, so let's use that. Also, let's kinda say Instagram is bad (because we can't deny it at this point), and justify its evil saying Instagram is also good.

Let's also say we will make tweaks to our algorithms so they are less harmful. We won't, but it will serve as a temporary distraction. They won't be able to prove it anyway, as long as we don't give our detailed proprietary top secret research data. If they keep asking for it, let's just say it will hurt people's privacy, as if we cared about that.”

[2/?] []

Show thread

Media: “Hey, Facebook, your products are making people feel bad about themselves, according to your own studies. This is #1001 reason why we think you're putting profit over people. What do you have to say about it?”

[1/?] []

Nevermind, I think someone in my class found what they actually mean. Pre-fetch is the preloading of instruction into a stack, also known as “pipelining“. The fetch cycle, or fetch-execute in the case of the 8086, is where the whole instruction cycle begins, the results of execution are stored and the cycle continues with the next instruction in the pipeline.

Show thread

Fedi people! Does anyone know what are the “pre-fetch” and “fetch” cycles on the Intel 8086 architecture exactly? I can't find resources where both are clearly separated. I'm starting to think my professor invented those terms to make us suffer.

It is urgent, this homework is for tomorrow, and I started doing it late. Boosts are appreciated.

Large companies' PR staff when caught undeniably doing evil things: “we reviewed our data and turns out we at [X evil corporation] have been doing [Y thing] for [Z time] indeed. We at [X] have not handled things properly. We at [X] will conduct an extensive internal investigation, so we at [X] can figure out ways to help improve [Y] situation; because at [X], our top priority is [Y] and we at [X] will work hard to make sure [Y] does not happen again.”

What they really mean: “shit, we've been caught, but we will pretend we didn't know about it and it was an accident, and make everyone think it will require a lot of work to fix things, even though they were intentional and we could easily stop doing them. People will soon forget about it and move on, and we won't fix shit because our real top priority is our reputation, money and power.”

I want to search for definitions on SaaS, PaaS and IaaS “cloud” services, and it's very difficult to find actual definitions that don't sound like sales pitches. Every site that “explains” what these things are, belongs to a ”cloud” provider that wants to convince you that the cloud is magic and will magically solve all of your problems.

Show older
Mastodon 🐘

Discover & explore Mastodon with no ads and no surveillance. Publish anything you want on Mastodon: links, pictures, text, audio & video.

All on a platform that is community-owned and ad-free.
Hosted by Stuxhost.