@mlinksva

252 Followers
194 Following
803 Posts
parasite→scavenger→compost; toots/boosts are calls for refutation; modern reconstructions based on partial and skeletal remains Q6847682
English Wikipediahttps://en.wikipedia.org/wiki/User:Mike_Linksvayer
GitHubhttps://github.com/mlinksva
Threadshttps://threads.net/@mlinksva

> oddly delightful world

Unintended typo, but every word is its own world(s) indeed.

Organigram[me] https://en.wiktionary.org/wiki/organigramme and https://en.wikipedia.org/wiki/Organigram (redirects to Organizational chart). How did I not know this oddly delightful world TIL now?
organigramme - Wiktionary, the free dictionary

Wiktionary

Looked in spam folder today and the subject "APC Based manuscript submissions" caught my eye.

I'm not in the journal publishing space so I've not seen such outreach before but I'd guess it might be common. Nor am I in the want to/must publish somewhere that looks like an academic journal space so as to be spammed by Article Processing Charge collector journals/businesses (though won't be surprised if I see such everywhere starting now).

RE: https://social.coop/@mako/116277827341287780

Wiktionary as the hero is the least taboo topic in the world for me. Infotaining papers, recommended to all.

I had intended to post the above when it was first March 14 AoE but I was off (early) by an hour, in addition to being late by 7 minutes. Anyway the hour I'm leaving this comment is within the first hour of March 14 in Kiritimati.

While now it feels like a long wait, onward to March 14, 15926.

The time will pi by.

RE: https://mastodon.social/@gvwilson/116194035929260912

Elegant and laudable post. I rate it 99. For 100, the word "tax". However, I'm not complaining as despite taxation/pricing of scarcity and pollution including cognitive (eg ads) being no-brainer ingredients, people in some combination hate, reject, and are ignorant of them (both taxes and prices), i.e., "still don’t know how to make it happen."

@oldguycrusty @GitHubSecurityLab not brute force; kind of a subtle javascript promises usage bug https://github.blog/security/how-to-scan-for-vulnerabilities-with-github-security-labs-open-source-ai-powered-framework/#h-signing I'm pretty sure this is the fix https://github.com/RocketChat/Rocket.Chat/pull/38118/files#diff-02105acda1e5f89d9d8350266e9323bc8a92566fd96b91905bddd3b3af8e929bR18 ... the login with any password was to a supporting microservice not the main app, presumably that's how it had not been noticed in at least the 4 years since the microservice was split out (based on skimming git blame).

(I just happened to have read the post, may've misunderstood myself, take with grain of salt!)

How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework

GitHub Security Lab Taskflow Agent is very effective at finding Auth Bypasses, IDORs, Token Leaks, and other high-impact vulnerabilities.

The GitHub Blog

Reminded of this thread by Modular posting a "Senior Open Source Community Engineer" role https://www.modular.com/company/career-post?am9icG9zdDon6uIm3EDCAer6e0t4GByV&gh_jid=am9icG9zdDon6uIm3EDCAer6e0t4GByV

They have also reiterated many times a commitment to open source the compiler in 2026...looking forward to it.

Careers Post

A high-performance inference engine to build, optimize, and deploy AI apps fast. Run open models, scale across GPUs, and tap into CPU+GPU performance with Mojo.

@davidzipper very exciting, congratulations. Love the title which my mind auto-expands to "The [High] Price of [Free] Traffic"!