Salta al contenuto principale


in reply to 🌒🌕🌘Aetherius Eldritch🧙‍♂️⚡

La imagen es un meme dividido en dos partes. En la parte izquierda, se muestra a un hombre con una expresión seria, vestido con un traje oscuro y una camisa blanca, con el logo de "X" (anteriormente conocido como Twitter) en el centro. El texto en la parte superior dice: "USO ALGORITMOS, SOY RESTRICTIVO Y CENSURO MEDIOS QUE NO SIGAN MIS IDEAS." En la parte derecha, hay una imagen de un hombre con barba, mirando hacia arriba con una expresión relajada, vestido con una camiseta azul, con el logo de "Mastodon" en el centro. El texto en la parte inferior dice: "LA COSA ES TRANQUILA, RELAX, SIN ALGORITMOS Y PUEDES PUBLICAR SIN PROBLEMA." La imagen compara las políticas de algoritmos y censura de Twitter con la plataforma de Mastodon, sugiriendo que Mastodon es más abierta y sin restricciones.

Proporcionado por @altbot, generado de forma privada y local usando Ovis2-8B

🌱 Energía utilizada: 0.225 Wh




Samsung releases the August 2025 security patch for Watch6, Watch7, and Watch Ultra LTE in India!

#Samsung #Galaxy #OneUI6 #TechNews #TechUpdates #GalaxyWatch6 #GalaxyWatch7 #GalaxyWatchUltra

officialaptivi.wordpress.com/2…



Primo lungo giro in FX con utilizzo EV6 per ricarica d'emergenza: il primo lungo giro (180 km) in cui avevamo la EV6 con l'idea di non doverla usare per la ricarica, ma solo in caso di emergenza... come infatti è avvenuto forumelettrico.it/forum/primo-… #zero #fx #kia #ev6
#zero #fx #kia #ev6


Il giornalista Maurizio Molinari elogia il progetto Riviera Gaza, che a suo dire mostra "la determinazione del presidente Trump a procedere nella ricostruzione civile della Striscia". E questa dichiarazione mostra la determinazione di Maurizio Molinari a procedere nell'affossamento della sua credibilità.

@attualita

Unknown parent

mastodon - Collegamento all'originale
L'Ideota
@Otttoz
Il problema secondo me è rappresentato da tutti questi. Una cosa non esclude l'altra...




Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::


in reply to Pro

Its really gonna be over isnt it. The anonymous free web is actually dying. Rip www you were quite shit but had some good moments.

Nz is definitely going to follow aus and the uk. Our bald egghead pm has expressed a lot of interest in this idea.

in reply to Pro

so much fluff in their findings. makes me think, they didnt research shit.
this is gonna be terribly implemented.

their attempt wont be the end of the free web. but people will leave because they dont want their data breached by yet another bad actor. its just making the web more dangerous instead of safer.

no one has the tech and security to handle this. its waaaay too early. the breaches are going to substantial and continuous.

good luck Australia. stay safe.





China’s chip startups are racing to replace Nvidia


cross-posted from: programming.dev/post/36693771


China’s chip startups are racing to replace Nvidia


Technology reshared this.

in reply to Pro

Software like wgpu makes it much easier to close the gap between various GPUs. New compute languages that are backend-agnostic are appearing, in the same vein as taichi-lang, that make it significantly easier to make high-performance gpu kernels deployable anywhere.

The compute groundwork for crossplatform tensor calculations is already here. Inference is already doable on any device. Training is not far behind. As a side-effect of this, processing on the GPU in every capacity, like physics, novel rendering techniques, or whatever else the imagination can muster, is now within grasp of "average" programmers.

If you have always been intimidated by GPU programming, I urge you to take another look now. The landscape is radically different. The software moat everyone talks about with NVIDIA is smoke-and-mirrors. Cuda is old news, though I am speaking to the actual code landscape here, not the common mental consensus.

What we lack now is cheap video cards that have high memory. I believe the current cards are overpriced by about 10 - 100x what they should be, because this profit situation is extremely temporary. Just as pens were once thousands of dollars, these compute devices will be collapsing in price.

I welcome China building cheaper video cards. Hopefully we will all benefit from it before any robot wars break out.

in reply to Pro

Weird article IMO??? Forget the startups, unless they are backed by very major players they don't stand a chance. They have their competences, but I seriously doubt competing with Nvidia on making AI chips is among them.
The players to watch are Huawei, Baidu, Tencent and the likes. Who have already been working on this for a while, and have actual working and useful products.

While Huawei is the leader, Chinese companies don’t want to rely entirely on the company.


I don't understand how that statement is supposed to make much sense? When Chinese companies were happy using Nvidia and being dependent on Nvidia. Why wouldn't they be equally happy using Huawei if it's the best option after the government has forbidden them from using Nvidia?
It may be true, but there is zero explanation why it is.

To the ones that think China can just use AMD instead, they really can't, AMD is under the same restrictions Nvidia is, and AFAIK AMD has not designed a chip to sell to China within those restrictions.

Questa voce è stata modificata (3 settimane fa)


Makali, le doyen de Lola ya Bonobo, s’est éteint 💔
paroledanimaux.fr/makali-le-do…
"Makali est arrivé à Lola ya Bonobo le 28 février 2004, en compagnie de trois autres bonobos – Etumbe, Tshilomba et Keza – transférés de l’Institut National de Recherche Biomédicale de Kinshasa. Leur arrivée fut un moment marquant de l’histoire du sanctuaire : un enclos entier, l’enclos 3, avait été construit spécialement pour eux.
The post Makali, le doyen


Wordle 1,536 5/6

⬛⬛⬛⬛⬛
⬛⬛⬛⬛🟨
🟨🟨🟨⬛⬛
⬛🟩🟨🟩⬛
🟩🟩🟩🟩🟩
やられた。箸にも棒にも… #x

#x


Je länger ich Friedrich Merz mit seiner Union an der Regierung zuschaue, desto mehr bin an diese massive Blockade und Zerstörungswut der FDP in der alten Ampel erinnert, die dort noch von den Grünen oft eingedämmt werden konnte.

Hier ist diese Zerstörungswut aber an der Regierung und bereitet den fruchtbarsten Boden für die Faschisten vor, die unsere Demokratie, unseren Wohlstand, unseren Frieden und unsere Gesellschaft in das absolute Chaos führen werden.

Und uns in eine russische Sklavengesellschaft treiben. So wie die Russen es mit der Ukraine vorhaben.

Aber vielleicht ist das Klima ja schneller und macht uns vorher den Garaus.
Die Chancen dazu stehen im hochprozentigen Bereich.



EU-Kommissionschefin von der Leyen kann Messages zwischen ihr und Macron nicht auf Informationsfreiheitsanfragen hin herausgeben. Grund: automatisches Löschen. #EU

Signal-Messenger: Von der Leye...

#eu




“To all those families who have been separated or threatened with family separation, I want to tell you something,” Kilmar told a large crowd of supporters. “God is w/us. God will never leave us. God will bring justice to all the injustice we are suffering." open.substack.com/pub/americas… #FreeKilmar


DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally


cross-posted from: programming.dev/post/36689630

::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand
: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand
: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::
DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.

::: spoiler Report Highlights
- DDoS-Capable
Botnets
;
- Country
Analysis
;
- DDoS Attack
Vectors
;
- Global
Highlights
;
- Industry
Analysis
.
:::



DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally


::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand
: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand
: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::

DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.


::: spoiler Report Highlights
- DDoS-Capable
Botnets
;
- Country
Analysis
;
- DDoS Attack
Vectors
;
- Global
Highlights
;
- Industry
Analysis
.
:::




Wait - “America's leading physician groups are now openly defying a fucking lawyer and conspiracy theorist. U.S. vaccine consensus has officially shattered." There. I fixed it. 😀

reshared this



Unions are as popular as ever. Our labor laws haven't caught up yet. msnbc.com/opinion/msnbc-opinio… #1u
#1u


Signal-Messenger: Von der Leyen hat Auto-Delete für Nachrichten voreingestellt

EU-Kommissionschefin von der Leyen kann Messages zwischen ihr und Macron nicht auf Informationsfreiheitsanfragen hin herausgeben. Grund: automatisches Löschen.

heise.de/news/Signal-Messenger…

#EU #IT #Mobiles #Netzpolitik #Signal #news

reshared this

in reply to heise online

Deshalb muss für Amtsträger gelten: Verschlüsselungsverbot mit Bundestrojaner auf dem Endgerät und dauerhafte Datenausleitung.

WER ALS MANDATSTRÄGER NIX ZU VERBERGEN HAT, KANN DA NIX DAGEGEN HABEN!



Kinda feel like fleeing the US for the UK is like fleeing from the fire into a frying pan that's just reaching cooking temperature

But then I guess Fascism only happens to the Poor...until it doesn't.

faroutmagazine.co.uk/robin-wri…

#Fascism #RefugeesWelcome #UK #USA #Politics




US wine sellers left in limbo despite EU tariff deal

Michael Warner, co-founder of wine boutique DCanter, said importers and distributors have raised costs of foreign wines since June – Copyright AFP SAUL LOEB Beiyi SEOW At a wine shop in Washington’s Capitol Hill neighborhood, b…
#wine #AmericanWine #America #Americanwine #eu #Tariff #trade #UnitedStates #UnitedStatesWine #US #USWine #USAWine #Wine
diningandcooking.com/2261784/u…



Non capisco le persone che, in auto, scavalcano i dossi a meno di 20 km/h ("altrimenti si rovina l'assetto 😱"), poi sgasano a 70 e inchiodano prima del dosso successivo.

Io vado a 40 fissi, dossi o non dossi, e me ne fotto.

Mi piacerebbe affiancarli e dire loro, con sufficienza: "IO posso permettermi di rifare l'assetto una volta al mese¹", tanto per non dire "anche se hai il BMW rimani straccione dentro".

¹ non è vero, e non ho mai fatto l'assetto, frega niente.

reshared this

in reply to rag. Gustavino Bevilacqua

o come quelli che in rettilineo ti stanno incollati dietro con i loro macchinoni e appena c'è una curva rimangono indietro, perché non sanno affrontarla bene, poi appena la strada torna dritta ti si riattaccano di nuovo.
in reply to kappazeta

Qui ci sono quelli che hanno paura che le curve li mordano… e non dimentichiamo quelli che guidano guardando il mare 🤬
Questa voce è stata modificata (3 settimane fa)
in reply to rag. Gustavino Bevilacqua

Sensitive content

Questa voce è stata modificata (3 settimane fa)

reshared this

in reply to SparkIT

@sparkit @rapitadaglialieni @kappazeta

Però bisogna dire che in Liguria ci sono località con nomi particolarmente evocativi: Portofino… Sanremo…

reshared this

in reply to kappazeta

@kappazeta youtube.com/shorts/st8tff2nxXQ…



Dans les pays du Sahel, les juntes en échec face aux djihadistes
monde-diplomatique.fr/2025/09/…

"En une décennie, le Sahel a complètement changé. Les coups d'État (Mali, Burkina Faso, Niger), d'abord présentés comme des réponses temporaires à la crise sécuritaire, semblent installer durablement des régimes autoritaires. Au-delà du rejet commun de la présence française, ces nouveaux pouvoirs (...)
/ Sahel, Terrorisme, Mali, Coup d'État, Autoritarisme, Géopolitique,




Incidente sul lavoro a Loano: operaio precipita dal tetto e muore liberoreporter.it/2025/09/flas…


Barrington Levy – Bounty Hunter iyezine.com/barrington-levy-bo…



Barrington Levy – Bounty Hunter iyezine.com/barrington-levy-bo…

in reply to .˳·˖✶Rowan ✶ ˖·˳.

La imagen muestra a tres personas posando juntas en un área al aire libre. A la izquierda, un joven viste un conjunto rojo con diseños negros abstractos, pantalones cortos y zapatos de plataforma negros y blancos. En el centro, una niña lleva un conjunto amarillo con una blusa corta y una falda plisada, complementado con zapatillas blancas. A la derecha, una mujer luce un jumpsuit rosa sin mangas, con zapatos blancos. Todos están sonriendo y haciendo gestos de paz con las manos. En el fondo, se observa un cielo azul con algunas nubes, una caravana blanca y una tienda blanca, lo que sugiere un entorno de rodaje o un evento al aire libre.

Proporcionado por @altbot, generado de forma privada y local usando Ovis2-8B

🌱 Energía utilizada: 0.202 Wh



Now playing with python on my SBC

On scope is the SHE (Sense Hat Emu) where I found the gorgeous rainbow program!

You know I love rainbow colours I use them a lot when I pipe even my playful ssh sessions to lolcat.

This program makes me as happy as my four year old self.

Analyzing the script is made easy by adding remarks after lines of code, indicating the level of understanding

#SBC #Raspberry #Pi5 #Pie5 #Pie #HAT #Sense #SenseHAT #Emu #Emulator #programming #python #opensource

Questa voce è stata modificata (3 settimane fa)
in reply to Dendrobatus Azureus

The image shows a computer screen with multiple windows open, likely on a Linux operating system. The main window in the foreground is a text editor displaying a Python script named "rainbow-2025-09-18-12-58-49.py," which is running a program to control a Sense HAT. The script includes functions for handling the Sense HAT, such as "hat.SenseHAT()" and "def scale_sticky(value)." The script also contains a loop that continuously updates the LED matrix with a rainbow pattern.

In the background, there is a terminal window showing the output of the script, with colorful text indicating the LED matrix's state. Additionally, there is a window for the Sense HAT Emulator, displaying a grid of colored squares representing the LED matrix, along with sliders for adjusting temperature, pressure, and orientation.

The image also includes a blurred background image of a rural landscape with a building, suggesting the user might be working in a remote location. The overall layout of the screen indicates a development environment focused on programming and hardware interaction.

Provided by @altbot, generated privately and locally using Ovis2-8B

🌱 Energy used: 0.230 Wh



yeaaaah i implemented #nodeinfo in #flohmarkt. now how the hell does one add a server to #fedidb in the year 2025? 😁


One thing I don't want from the current situation in the US is to go back to the way things were before the orange guy. This is a great time to examine and fix the shortcomings that led to what's happening. For example, it's time for us to have more viable political parties. Clearly, having only two doesn't work. #politics #uspol

JonChevreau reshared this.