• 0 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: November 10th, 2023

help-circle

  • No. It’s not a magic invisibility field inside. It’s a magic object that works only on living “intelligent” creatures. It also doesn’t work the same on different races. Only humans (hobbits are a subtype of human in Tolkiens lore) turn invisible. And because it’s magic it also turns their clothing etc invisible. So either Frodo and his poop is invisible or nothing is.













  • The thing that confused me when first learning about docker was, that everybody compares it to a virtual machine. It’s not. Containers dont virtualize anything. They take a (single) process from the host OS and separate that into its own environment. All system calls, memory access, file writes etc are still handled by the same os (same kernel). However the process is separated both on the file system and process level. It can’t see other processes outside of the container and it also doesn’t see the real filesystem. It sees a filesystem provided by the container. This also means it sees different file and user permissions. When you run a alpine Linux docker container on an Ubuntu system, the container only containes the (few) files for alpine but no Linux kernel no desktop environment. A process inside that container only sees the alpine files and not the Ubuntu files. It also means all containers see a filesystem independent of each other and can use libraries and dependencies of different versions (they are only files after all).

    For administration it makes running complex services easy. You define how to setup that service (what base Linux distro to use, what packages to install, what commands to run, and how to start the process). You can then be save to assume the setup of that service did not interfere with the setup of any other service. “Service 1 needs a certain system wide config changed? Service 2 needs that config in the default state? And both need a different version of the same library?” In containers you can have all at the same time because they each see a different version of the same config and library.

    And all this is provided by the kernel itself. All docker does is provide an “easy” way to create and manage containers but could could do all of that using chroot, runc and a few other.

    As a note, containers usually don’t come with systemd as they don’t need an init system. You would run the service directly inside the container and then use systemd outside the container to make sure the container is started/restarted, or just docker as it can already do that.

    I found a great article demystifying containers recently



  • groet@feddit.detoScience Memes@mander.xyzHatzegopteryx
    link
    fedilink
    English
    arrow-up
    12
    ·
    8 months ago

    The stomach isn’t like a big cave with a pool af acid in it. It is compacted by muscles around it so if you are swallowed whole, you would have to fight against those muscles to even be able to move at all. If your arms are above your head it’s likely you would die before you are able to move them to your hips to draw your knives. If they are at your hips, good look moving the knives to point outwards. Also the stomache is lined with thick mucous to protect it from sharp objects… Also it’s completely dark and disorienting.

    It’s almost certainly you’d drown, suffocate and get crushed VERY quickly after getting swallowed alive.


  • groet@feddit.detoFirefox@lemmy.mlWhy I use Firefox
    link
    fedilink
    arrow-up
    4
    ·
    9 months ago

    Chrome doesn’t care about closing html tags. If they are mising the document is invalid but chrome will render it anyway and just add the closing tag where it thinks it should be.

    At the other end, Firefox goes beyond the standard and will block certain connections that should be allowed by the fetch standard (the setting to disable that is called enhanced tracking protection).

    So chrome allows things things it shouldn’t while Firefox blocks some it shouldn’t


  • They sometimes buy keys using stolen credit cards. When the fraud is found out, the banks will request the money from the developer. They in turn often don’t have a way to lock the fraudulent key, so it remains valid.

    The costs for the initial bank transfer, plus the time invested in returning the money to the credit card holder are payed by the developer.

    The key reseller has a 100% profit margin, the customer has a valid and cheap game key, and the developer actually lost time and money.


  • groet@feddit.deto196@lemmy.blahaj.zonebactirule
    link
    fedilink
    arrow-up
    22
    ·
    9 months ago

    The cells of your body are part of you. They share the same DNA and descend from the same cell (the fertilized egg) and depend on each other to stay alive. However there are more gut bacteria inside of you than there are cells of yourself (they are a lot smaller than human cells). And they are not related to you. So you could reincarnate as a gut bacteria of somebody else


  • Repeat after me:

    “Current AI is not a knowledge tool. It MUST NOT be used to get information about any topic!”

    If your child is learning Scottish history from AI, you failed as a teacher/parent. This isn’t even about bias, just about what an AI model is. It’s not even supposed to be correct, that’s not what it is for. It is for appearing as correct as the things it has been trained on. And as long as there are two opinions in the training data, the AI will gladly make up a third.