@joshavanier @tendigits @prahou since there's no docs for oekaki, here's a little video explaining how the bottom left icon works.
I'll get around to writing a guide soon, I promise.
@joshavanier @tendigits @prahou since there's no docs for oekaki, here's a little video explaining how the bottom left icon works. I'll get around to writing a guide soon, I promise. FLENG 16 has SDL bindings!! Uh oh. @DataPacRat I've just spent the better part of the day going through your website, I was looking for solresol resources and found a trove on it. Thank you so much for collecting all this stuff, I browsed around the other folders too and found tons of fascinating things. I was happy to see you were on here so I figured I'd send you my thanks! @neauoire I love that you found this! After discovering uxn and pouring over the bitwise and adjacent notes I started working on a “language” that encodes as 8bit bytes, that are also musical notation, and written language symbols. Certainly not a brand new concept, but I’m slowly working on my own tiny computer from it and it’s remarkable to see this! Would you mind sharing the source? @neauoire Two questions come to my mind: 1. Does R2D2 actually talk in Solresol? Friends brought us to their farm and refilled our stores with fresh purple foods. @neauoire i've been having sooo many plums as part of dinner recently, they're abundantly available here right now :3 Yann Tiersen is touring by sailboat. So cool, good for them @neauoire That's amazing. I have fantastic memories of small gigs at pubs in seaside towns in Brittany. Seeing Yann Tiersen like that would be magical. In the extremely unlikely case that you also need a 170 bytes long base64 encoder in your uxn project. So what do you all use for the github 2FA shit? It asks for a browser extension thing, is 1password what people use? edit: Okay, if desktop app, not an electron program.
Show previous comments
@neauoire Me? Oh not much. I've been mostly focused on my career lately 🙂💭🚗↩️↪️⤵️💥 Strange Loop Conf has a slack, I haven't used slack for years, I'll check it out. 503 error
Show previous comments
@neauoire there may be an unofficial irc on libera courtesy of @technomancy https://hey.hagelb.org/@technomancy/statuses/01H9GS50XFJSQSAYXWRGWK93HS Added option to change the brush strength in oekaki. A Simple Universal Logic Element and Cellular Automata for Reversible Computing https://www.cs.auckland.ac.nz/~cristian/UMCreadings/revcomputCA.pdf @neauoire Every invertible Boolean function is - necessarily - a permutation of its input bits over all argument cases. It follows that any such function can be described as a permutation index - which implies that, for example, any invertible 8-to-8 bit program can be described in 1683.996 bits. (see OEIS A000722) @neauoire in all of your research on reversible computing, have you found any evidence that reversible concepts can be applied to software to reduce energy usage on non-reversible hardware architectures? I’ve tried looking into this and have come up empty, but have not put as much time into it as you have. "The new GitHub requirement for all committing developers to have multi-factor authentication to _protect the software supply chain_ is where I’ve chosen to get off the bus.", by @ratfactor http://ratfactor.com/leaving-github
Show previous comments
@neauoire @boud @ratfactor 2FA makes GitHub (+ phone operators) a single point of trust; only GitHub will be able to (somewhat) authenticate changes made to repos, out-of-band. That’s not improving supply chain security. Allowing code authentication by anyone (including developers and the “consumers” GitHub cares about) requires something similar to what we did for Guix: https://doi.org/10.22152/programming-journal.org/2023/7/1 @neauoire @ratfactor I really don't like 2 or MFA mechanisms, but the one on GitHub actually works fine. I shall never put an sms forced required in any place, but I can have both a TOTP 2FA and a yubikey and can use either one that is available. If I don't have the yubikey around or have lost it I can still do things. And the TOTP codes are easy to backup, just put in the normal place where passwords are saved or in a dedicated app like Aegis. @neauoire Wait, what? > Protecting {...} consumers of the open source ecosystem, including large enterprises, from these types of attacks is the first and most critical step toward securing the supply chain. That's the whole point of signing commits and tags in the first place. If you have a proper GPG setup, it doesn't matter if you use a complex 2FA auth system, a simple FTP server with a suitecase password, or just swap stuff on some open mailing list like kernel devs. |
@neauoire @joshavanier @tendigits Layers! I get it.. though I do not yet know how to switch to gray paint..
I thought my inked dreams became reality with interlisp, then with noodle, and now here we are.
They say there is something fundamentally degenerate with falling in love with software. In the case of oekaki, I'll play the part.
Thank you. It's a pleasure to watch it grow.
@neauoire @joshavanier @prahou this is great and I'm sure a guide will be a helpful resource to have as well.
Thankfully it's super intuitive to figure out, so no barriers for anyone curious to try it out in the meantime.
@neauoire @joshavanier @tendigits @prahou
I've figured out what it does by looking at source... but i admit it got me confused