• 1 Post
  • 202 Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle
  • We expect to see Wi-Fi devices able to detect the distance to other devices that are nearby, not only the distance, but what is the direction to those devices, with the ability to become a sensor to detect distance, to detect the presence of people, to detect gestures," Cordeiro claimed.

    “Essentially what we are doing is that we’re going to be able to make devices be context aware, aware of their surroundings, and that’s going to enable and open up the ability for new applications to be developed,” he added.

    Yay. Granular tracking. Exactly what we were asking for with a WIFI protocol.






  • When I use it, I use it to create single functions that have known inputs and outputs.

    If absolutely needed, I use it to refactor old shitty scripts that need to look better and be used by someone else.

    I always do a line-by-line analysis of what the AI is suggesting.

    Any time I have leveraged AI to build out a full script with all desired functions all at once, I end up deleting most of the generated code. Context and “reasoning” can actually ruin the result I am trying to achieve. (Some models just love to add command line switch handling for no reason. That can fundamental change how an app is structured and not always desired.)


  • Apps are somewhat buggy right now. My shokz will partially disconnect after the first song and exercise audibles are non-existent. (The audio mutes, but the watch still responds to play/pause button presses. This could be just an issue with the shokz app being confused for the time being.)

    No difference in GPS connect time from the pixel watch 3, which has been historically buggy at times.

    But yeah, random glitches all over the place. It’s tolerable enough and would expect app updates to fix most of them.









  • Good luck with that, I suppose. Botnets can have thousands, if not hundreds of thousands of infected hosts that will endlessly scan everything on the interwebs. Many of those infected hosts are behind NAT’s and your abuse form would be the equivalent of reporting an entire region for a single scan.

    But hey! Change the world, amirite?



  • I don’t want to go so far as to tell you how to think, but as long as we are talking about how to visualize IP addresses, you may want to check out subnets and subnet masking.

    The notation of IP addresses starts to make sense when you think about the early days of TCP/IP when all IP addresses were public and NAT’ing wasn’t really required yet. Basically, there needed to be ways for networks to filter traffic by IP blocks that were applicable. (It was [in part] a precursor to collision avoidance, but absolutely not the full story.) We still use addressing and masking today, but it’s more obvious when it’s local. (Like in data centers, where it’s super practical to mask off a block of addresses for a row or rack of servers.)

    To your point, yeah. IP addresses are probably more comparable to the Dewey Decimal System rather than actual numbers and thinking of them as strings is probably easier.