RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
TLDR: the paper introduces the use of a Repository Planning Graph to overcome the planning and consistency problems that have prevented LLMs from generating complete, complex software projects.The graph allows reliably generating codebases 3.9x larger at 36K lines of code with far more correct pass rate at 69.7% compared to mere 33.9% before. Replacing ambiguous natural language with a structured graph allows the LLM to plan and execute long-horizon tasks reliably and at scale.
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
Large language models excel at function- and file-level code generation, yet generating complete repositories from scratch remains a fundamental challenge.arXiv.org
Israel’s future in Uefa could come to a head before World Cup qualifiers
Uefa could decide as early as next week whether to suspend Israel from its competitions, with the governing body facing growing pressure from inside and outside the game.
Reports on Thursday, initially in the Times, suggested a vote that would determine Israel’s participation in World Cup qualifying and that of Maccabi Tel Aviv in the Europa League could be held by Uefa’s executive committee before the international break begins on 6 October.
Israel’s future in Uefa could come to a head before World Cup qualifiers
Uefa could decide as early as next week whether to suspend Israel and its club teams from its competitionsPaul MacInnes (The Guardian)
Proper way to setup fstab and crypttab for encrypted /boot partition?
When I moved to Coreboot, I also elected to encrypt my /boot partition, which is decrypted by the GRUB payload of Coreboot. I mostly worked on this by trial-and-error, which resulted in the workflow:
- GRUB unlocks
/boot - Keyfile in
/bootopens/ - Partition for
/bootis listed in/etc/crypttab, with another keyfile to unlock/bootagain from within Linux /bootis mounted via/etc/fstab
Steps 3 and 4 always seemed inelegant to me, but after doing systemd-analyze, I realized how much those steps consume when booting (9 sec).
My questions:
- After GRUB unlocks
/bootand boots into Linux proper, is there any way to access/bootwithout unlocking again? - Are the keys discarded when initramfs hands off to the main Linux system?
- If GRUB supports encrypted
/boot, was there a 'correct' way to set it up? - Or am I left with mounting
/bootmanually for kernel updates if I want to avoid steps 3 and 4?
Migrant Detainees Shot in Attack at Dallas ICE Facility
Migrant Detainees Among Those Killed, Injured in Dallas ICE Shooting
Multiple individuals were shot at an ICE facility in Dallas, with the Department of Homeland Security reporting migrants were among those injured.Nikki McCann Ramirez (Rolling Stone)
copymyjalopy likes this.
Pretty Guardian Sailor Moon - Atto 10, l'incontro con la Luna
Anche il capitolo 10 del manga di Sailor Moon, come inevitabilmente sospettavo, offre degli spunti di riflessione interessanti, anche se questo è...
Tosse persistente? Sicuro che hai bisogno di una medicina?
Tosse Persistente? Forse Caffè e Miele Battono il Cortisone! Uno Studio Sorprendente dall'Iran
Oggi voglio parlarvi di un argomento che molti conoscono fin troppo bene: quella tosse persistente che non vuole proprio andar via dopo un ...Giuliano (Blogger)
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
TLDR: the paper introduces the use of a Repository Planning Graph to overcome the planning and consistency problems that have prevented LLMs from generating complete, complex software projects.
The graph allows reliably generating codebases 3.9x larger at 36K lines of code with far more correct pass rate at 69.7% compared to mere 33.9% before. Replacing ambiguous natural language with a structured graph allows the LLM to plan and execute long-horizon tasks reliably and at scale.
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
Large language models excel at function- and file-level code generation, yet generating complete repositories from scratch remains a fundamental challenge.arXiv.org
Technology reshared this.
Fedora 43 Release Date and New Features
Fedora 43 Release Date and New Features
A close look at the new features coming in Fedora 43.Sourav Rudra (It's FOSS News)
I prefer metric for anything I do, despite living in the US.
My coffee recipe is in mL.
I use g and mL while cooking.
Metric is the superior system.
Hegseth orders rare, urgent meeting of hundreds of generals, admirals
Time for everyone to take the Trump loyalty pledge that supercedes the Constitution. Those who don't kneel will be replaced ASAP.
Hegseth Orders Rare, Urgent Meeting of Hundreds of Generals and Admirals
copymyjalopy likes this.
Let It Begin — The Real Fights Are Finally Coming Into View
Let It Begin — The Real Fights Are Finally Coming Into View
I have a growing sense of optimism about the political situation in the United States. But it’s not necessarily because I’m more confident about the outcomes…Josh Marshall (TPM - Talking Points Memo)
copymyjalopy likes this.
Adding/removing "pinned statuses" to an actor
Mastodon has a concept called "featured statuses", which is a special collection attached to a Person actor.
docs.joinmastodon.org/spec/act…
It wasn't readily know how this collection is updated and federated (not without code achaeology), but claire@social.sitedethib.com recently shared some additional info :smiley:
- The actor itself will issue an
Addactivity targeting the collection with the status inobject. - This activity is sent to all followers of the actor.
- No activity is sent if the actor has no remote followers.
- A
Removeis sent when a pinned post is unpinned.
This is what the Add looks like:
{
"@context": "https://www.w3.org/ns/activitystreams",
"type": "Add",
"actor": "https://example.org/users/testUser",
"target": "https://example.org/users/testUser/collections/featured",
"object": "https://example.org/users/testUser/statuses/115266412340579560"
}The corresponding
Remove is identical except for type, which is of course, Remove.ActivityPub - Mastodon documentation
A decentralized social networking protocol based upon the ActivityStreams 2.0 data format and JSON-LD.docs.joinmastodon.org
Fitik likes this.
just small circles 🕊 reshared this.
Since we're sharing our phone setups now, I might as well join in
First one is from my personal profile and the second one is from ny work profile.
I need Instagram for our class group chat and Discord for communicating with my friends.
- A Lemmy client
- It's easier to use
- Look it up
- Contacts app.
If AI Was Really Used to Censor ‘Together’ in China, It Represents a Potentially Terrifying Future
But people in China certainly seem to think this is an example of AI. China Digital Times reports that it wasn’t just the same-sex image that was altered, but the distributor did also cut out some straight sex scenes from the film... As one user implies, the AI is a more sophisticated and “terrifying” form of censorship because smart viewers have figured out ways to get around obvious censorship or can tell the difference, but that’s much harder with AI. Here’s a smattering of some of the comments, sarcasm implied on the last one:...in the future, we won’t even be able to tell if we’re watching the original film or not.
...This is nauseating because it not only interferes with the integrity of the plot, it disrespects the sexual orientation of the actors....
...Awesome! Next, let’s use one-click AI to re-release “Brokeback Mountain,” “God’s Own Country,” “Lan Yu,” and “Happy Together” as “restored” hetero romances...
AI Censorship of 'Together' in China Makes a Subplot Make No Sense
A scene showing a gay wedding in the movie 'Together' was censored in China using AI, but it makes a big chunk of the movie nonsensical.Brian Welk (IndieWire)
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Microsoft has terminated the Israeli military’s access to technology it used to operate a powerful surveillance system that collected millions of Palestinian civilian phone calls made each day in Gaza and the West Bank, the Guardian can reveal.
Microsoft told Israeli officials late last week that Unit 8200, the military’s elite spy agency, had violated the company’s terms of service by storing the vast trove of surveillance data in its Azure cloud platform, sources familiar with the situation said.
The decision to cut off Unit 8200’s ability to use some of its technology results directly from an investigation published by the Guardian last month. It revealed how Azure was being used to store and process the trove of Palestinian communications in a mass surveillance programme.
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Exclusive: Tech firm ends military unit’s access to AI and data services after Guardian reveals secret spy projectHarry Davies (The Guardian)
Oklahoma Threatens Public Schools' Accreditation Unless They Set Up Turning Point USA Chapters | Common Dreams
Ryan Walters, the state’s superintendent of public instruction, released a video address on Tuesday saying that “every Oklahoma high school will have a Turning Point USA chapter.”
“For far too long we have seen radical leftists with the teachers unions dominate classrooms and push woke indoctrination on our kids,” Walters said in the video posted to social media.
The state-mandated chapters of “Club America,” Turning Point’s high school program, will ensure students “understand American greatness” while enabling them to “engage in civic dialogue and have that open discussion,” said Walters.
Oklahoma Threatens Public Schools' Accreditation Unless They Set Up Turning Point USA Chapters
State school superintendent Ryan Walters said public high schools across the state must partner with late activist Charlie Kirk's organization to counter "woke indoctrination."julia-conley (Common Dreams)
Sarkozy condannato a 5 anni per il caso dei fondi libici: “Dormirò in carcere, ma a testa alta”
Un terremoto politico-giudiziario scuote la Francia: Nicolas Sarkozy, ex presidente della Repubblica, è stato condannato a cinque anni di reclusione per associazione a delinquere nell’ambito del processo sui presunti finanziamenti libici alla campagna elettorale del 2007.
Si tratta di una sentenza senza precedenti nella storia della Quinta Repubblica, che pone per la prima volta un ex capo di Stato francese a rischio di una lunga detenzione.
LEGGI L'ARTICOLO: Sarkozy condannato a 5 anni per il caso dei fondi libici: “Dormirò in carcere, ma a testa alta”
Sarkozy condannato a 5 anni per fondi libici: “Dormirò in carcere, ma a testa alta”
Nicolas Sarkozy condannato a 5 anni per associazione a delinquere nel caso dei fondi libici. Tre anni da scontare in carcere.Redazione (Atom Heart Magazine)
A New Lawsuit Alleges the Gun Industry Exploited Firearm Owners’ Data for Political Gain
Two major law firms accused the National Shooting Sports Foundation this week of violating the privacy rights of millions of gun owners by running a decades-long program that sent their information to political operatives without consent.
The allegations in a lawsuit filed Monday in federal court by Keller Rohrback of Seattle and Motley Rice of Connecticut closely mirror the findings of a ProPublica investigation that detailed the secret program operated by the gun industry’s largest trade group.
The 24-page complaint asks the court for approval of class-action status and requests financial damages against the NSSF, claiming the gun industry lobbyist enriched itself by exploiting valuable gun buyer information for political gain. It features the accounts of two gun owners, Daniel Cocanour and Dale Rimkus, both of whom assert they purchased rifles, pistols and handguns from the 1990s through the mid-2010s.
Gun Industry Group Violated Firearm Owners’ Rights, Lawsuit Alleges
The federal court complaint filed this week closely mirrors the findings of a ProPublica investigation that detailed a decades-long secret program operated by the gun industry’s largest trade group.ProPublica
What is happening? [UPDATE - SOLVED - HUGE DDoS Attack]
techradar.com/pro/security/clo…
Cloudflare says it has (once again) blocked the largest-ever DDoS attack in history
The 40-second, 22.2Tbps, attack was fast and furiousWayne Williams (TechRadar)
Amazon agrees to pay $2.5bn over claims it tricked Prime customers
Amazon has agreed to pay $2.5bn (£1.9bn) to resolve claims brought by the US government that it tricked millions of people into enrolling as Prime members and made it difficult to cancel.
A total of $1.5bn will go to refunds for customers that were duped into signing up for the service, according to the proposed settlement announced by Federal Trade Commission (FTC).
The deal came just a few days after trial began before a jury in Seattle. It marks a major victory for the FTC, yielding the largest ever civil penalty secured by the agency.
Amazon, which did not admit or deny the allegations, did not immediately respond to a request for comment.
Amazon agrees to pay $2.5bn over claims it tricked Prime customers
Roughly 35 million people in the US could be eligible for refunds, according to the government.Natalie Sherman (BBC News)
Live updates: OMB tells agencies to draft mass firing plans ahead of potential shutdown
In a memo released Wednesday night, the Office of Management and Budget said agencies should consider a reduction in force for federal programs whose funding would lapse next week, is not otherwise funded and is “not consistent with the President’s priorities.” That would be a much more aggressive step than in previous shutdowns, when federal workers not deemed essential were furloughed but returned to their jobs once Congress approved government spending.
A reduction in force would not only lay off employees but eliminate their positions, which would trigger yet another massive upheaval in a federal workforce that has already faced major rounds of cuts this year due to efforts from the Department of Government Efficiency and elsewhere in the Trump administration.
adhocfungus likes this.
U.S. Threatens to Bar Foreigners Over Remarks About Charlie Kirk
U.S. officials say they will pull visas and deport people who trivialize Charlie Kirk’s murder, part of intensifying scrutiny of visa applicants’ views.
Best practises for URL linking in sidebar
Hi,
I moderate/curate a few communities on Piefed.world:
- !strategy_games@piefed.world
- !turnbasedstrategy@piefed.world
- !space_games@piefed.world
I have a sidebar with links to other gaming focused communities.
Currently, the sidebar includes links using the following format:
Text Description - [!]community_name@instance
What would be the best way to make "Text Description" a direct link. I don't want to use the direct/absolute URL links since it would be instance specific. Is there a way to make the "[!]community_name@instance" the URL linked to the Text Description?
I am looking to make the sidebar less verbose. Best option is something that offers transparent compatibility across Lemmy/Piefed/Mbin.
Would I use something like
[Adventure Games](!adventuregames@retrolemmy.com)
I believe the format above doesn't work well (I could be wrong I asked about this more than a year ago).
Cheers
I am using the 2nd example format you're showing but with the url for my wiki I'm starting on c/PoliticalCartoons and it seems to be working well enough so far.
And, the tags tag was broken. Looks like word clouds were updated! TIL
The !strategy_games@piefed.world (no square brackets needed) notation should work on both lemmy and piefed. I am not sure about mbin. Last time I checked, this didn't work, but that was a while ago.
The markdown link notation [text](https://piefed.world/c/strategy_games) won't be instance-agnostic in the same way. I don't believe there is a way to link in an instance-agnostic way while changing the text of the link.
By instance-agnostic I mean that users on other instances will be taken to the community on their own instance rather than the home instance. As an example, you, as a piefed.social user, if you clicked on !anime@ani.social, then you are taken to that community, but on piefed.social. If a user on lemmy.world clicked that link, they would be taken to that community on lemmy.world.
Without that notation, if I just made a standard markdown-formatted link:
- anime@ani.social - written as
[anime@ani.social](https://ani.social/c/anime)
...then users of other instances would always just be taken to the ani.social instance instead of staying on their own.
So am I correct in understanding that the notation [Adventure Games](!adventuregames@retrolemmy.com) wouldn't work? A markdown URL link that refers not to a URL, but to markdown notation for threadiverse non-absolute links.
I am looking to make link where the text is "Strategy Games" but the link is not a URL, but a non-absolute link that sends you to the community via your own instance.
I am OK with the current format (e.g. used in !strategy_games@piefed.world), but I prefer a cleaner non-absolute link that works in a transparent manner.
So am I correct in understanding that the notation [Adventure Games](!adventuregames@retrolemmy.com) wouldn’t work?
Correct. The markdown syntax of [text](url) doesn't work in a way that keeps people on their own instances. Also, when the part in the () is not a fully qualified url, you can get unpredictable behavior and it might behave differently for different fediverse software. Testing it now, it looks like piefed falls back on assuming it is a pointing to a post(?) but ends up just 404'ing.
It is currently not possible to customize the text of links intended to keep people on their own instances. However, I actually think that the notation you are presenting here makes a lot of sense. It might not be fully compliant with the commonmark markdown spec, but the fediverse breaks that in its own ways plenty of other places. I have done a lot of the work on the piefed markdown_to_html translation, so I might see if this could sneak into a future release. No idea if there would be buy-in from lemmy/mbin though.
Thank you for the clarification.
I do think it does make sense to support this style outlined in context of the Threadiverse. On top of that, a fallback absolute URL would also be great, albeit this is outside my pay grade. 😀
Apple demands EU repeal the Digital Markets Act
cross-posted from: lazysoci.al/post/34675903
like this
Why is Britain being sued for the Israel-Palestine crisis?
Why is Britain being sued for the Israel-Palestine crisis?
A group of Palestinians is suing Britain for what it calls “a century of oppression”.Al Jazeera
Apple demands EU repeal the Digital Markets Act
Apple demands EU repeal the Digital Markets Act
“DMA compliance is not optional, it’s an obligation,” the EU reminds Apple.Financial Times (Ars Technica)
adhocfungus likes this.
The Grotesque Legacy of Music as Property (33mins Video)
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
like this
In major backtracking move, Microsoft makes Windows 10 extended security updates free for users in the EEA
Major backtrack as Microsoft makes Windows 10 extended security updates FREE for an extra year — but only in certain markets
In a major move, Microsoft is making access to Windows 10's extended support updates free for regions in the European Economic Area. No Microsoft Account or cloud backup required.Zac Bowden (Windows Central)
copymyjalopy likes this.
Basket - Protocollo Biglietto Nominativo - Un abbonamento in due per la Fortitudo.
Con la stagione 2025/2026 è entrato in vigore il famigerato Protocollo, molto contestato dalle frange più calde dei tifosi, sull'obbligo di biglietti nominativi. La motivazione, o scusa per alcuni, è di poter verificare che eventuali soggetti colpiti da Daspo o potenzialmente "problematici" vengano esclusi dal poter accedere alle partite.
Oggi scopro che la Fortitudo Bologna consente di cedere la possibilità di assistere a una partita, a ogni abbonato.
Basta recarsi sul sito della società, scaricare il modulo, riempirlo, stamparlo e poi portarlo con sé, ovviamente con un documento di identità valido.
Tutto bene? Probabilmente sì; tuttavia ci vedo la possibilità di far entrare i soggetti non ben accetti, se i controlli non sono ferrei.
Teniamo conto che gli addetti alla sicurezza non hanno (?) la possibilità di verificare sulla relativa piattaforma, se il sostituto sia soggetto a qualche limitazione all'ingresso, almeno non in tempo reale.
A oggi è l'unico caso di cui sia venuto a conoscenza. Se altre società applicano lo stesso metodo o simili, sarei grato delle segnalazioni.
#UnoBasket #Mastobasket #FediBasket #Basketball #Basket #UnoBasket
Disposizioni per l'ingresso al PalaDozza per la stagione 2025/26. Abbonamento/biglietto, documento di identità ed eventuale cambio nominativo - Fortitudo
Fortitudo Pallacanestro comunica quelle che saranno disposizioni logistiche valide per l’intera stagione 2025/26 (in occasione delle partite che si giocheranno al PalaDozza) e che tutti gli spettatori saranno tassativamente tenuti a rispettare.ufficiostampa@fortitudobologna.it (Fortitudo)
Civility Is a Fantasy
After encouraging podcast listeners of the recently deceased Charlie Kirk to become online vigilantes in search of anyone “celebrating” Mr. Kirk’s death, Vice President JD Vance said last week: “We don’t believe in political violence, but we do believe in civility. And there is no civility in the celebration of political assassination.”
Vance was doing what conservatives often do — conjuring up people so his followers have someone specific to foment against. This brand of demagoguery is incredibly dangerous, because when informally deputized vigilantes realize that few real enemies exist, they accept any substitute. They direct their manufactured ire toward innocent people, marginalized groups and, eventually, each other.
Civility is the mode of engagement that is often demanded in political discourse; it is the price of admission to important political conversation, its adherents would have us believe; no civility, no service. But civility — this idea that there is a perfect, polite way to communicate about sociopolitical differences — is a fantasy...
disperazione pomeridiana, di stampo rigirante, accidentalmente universitario.
Oggi mi sentivo un po’ vecchia, un po’ marcita, un po’ persa, per quanto assolutamente mai meno magica (anche perché stavolta non ho dimenticato pezzi a casa per uscire, quindi bene)… e perché però? Boh, perché nonostante le nuove cose ci sono comunque sempre soltanto io e me, ed i momenti veramente epici sono limitati, […]
Memecoins Are Coming to the Stock Market
For the first time, US residents can now invest in memecoins through traditional brokerages. Trading will only get stranger from here.
https://www.wired.com/story/memecoins-are-coming-to-the-stock-market/
adhocfungus likes this.
Kami doesn't like this.
In Cisgiordania i coloni stanno cercando di prendersi tutto
In Cisgiordania i coloni stanno cercando di prendersi tutto
Abbiamo assistito a una loro incursione in una casa palestinese: sono sempre più frequenti, producono un effetto storico, e le autorità israeliane stanno sempre dalla stessa parteIl Post
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Microsoft has terminated the Israeli military's access to technology it used to operate a powerful surveillance system that collected millions of Palestinian civilian phone calls made each day in Gaza and the West Bank, the Guardian can reveal.Microsoft told Israeli officials late last week that Unit 8200, the military's elite spy agency, had violated the company's terms of service by storing the vast trove of surveillance data in its Azure cloud platform, sources familiar with the situation said.
The decision to cut off Unit 8200's ability to use some of its technology results directly from an investigation published by the Guardian last month. It revealed how Azure was being used to store and process the trove of Palestinian communications in a mass surveillance programme.
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Exclusive: Tech firm ends military unit’s access to AI and data services after Guardian reveals secret spy projectHarry Davies (The Guardian)
thisisbutaname likes this.
Neon, the No. 2 social app on the Apple App Store, pays users to record their phone calls and sells data to AI firms
A new call recording app is gaining traction for offering to pay users for voice data from calls, which is sold to AI companies.
Iran calls restrictions on its diplomats attending UNGA session in New York a new low of US animosity
The US has prevented Iranian diplomats from going anywhere beyond the perimeters of UN headquarters and buying anything from the wholesale club stores in New York city, calling the measure a part of its unilateral sanctions regime.
Archived version: archive.is/newest/peoplesdispa…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
National strike in Ecuador met with heavy repression
The elimination of the diesel subsidy has sparked multiple protests across the country. President Noboa defends the decision and aims to change the country's entire legal framework.
Archived version: archive.is/newest/peoplesdispa…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
New document leak exposes US ordering diplomats to use pro-genocide script
Documents leaked to Ken Klippenstein show Trump team ordered US diplomats to dismiss any mention of Israel's genocide in Gaza as propaganda
tla
in reply to monovergent • • •monovergent
in reply to tla • • •deadcade
in reply to monovergent • • •No. The "unlocking" of an encrypted partition is nothing more than setting up decryption. GRUB performs this for itself, loads the files it needs, and then runs the kernel. Since GRUB is not Linux, the decryption process is implemented differently, and there is no way to "hand over" the "unlocked" partition.
As the
fsininitramfssuggests, it is a separate filesystem, loaded in ram when initializing the system. This might contain key files, which can be used by the kernel to decrypt partitions during boot. After booting (pivoting root), the keyfiles are unloaded, like the rest of initramfs (afaik, though I can't directly find a source on this rn). (Simplified explanation) The actual keys are actively used by the kernel for decryption, and are not unloaded or "discarded", these are kept in memory.Besides where you source your rootfs key from (in your case a file in
/boot), the process you described is effectively how encrypted/bootsetups work with GRUB.Encryption is only as strong as the weakest link in the chain. If you want to encrypt your drive solely so a stolen laptop doesn't leak any data, the setup you have is perfectly acceptable (though for that, encrypted
/bootis not necessary). For other threat models, having your rootfs key (presumably LUKS2) inside your encrypted/bootcould significantly decrease security, as GRUB (afaik) only supports LUKS1.Yes, although you could create a hook for your package manager to mount
/booton kernel or initramfs regeneration. Generally, this is less reliable than automounting on startup, as that ensures any change to/bootis always made to the boot partition, not accidentally to a directory om your rootfs, even outside the package manager.If you require it, there are "more secure" ways of booting than GRUB with encrypted
/boot, like UKIs with secure boot (custom keys). If you only want to ensure a stolen laptop doesn't leak data, encrypted/bootis a hassle not worth setting up (besides the learning process itself).monovergent
in reply to deadcade • • •