@Bsstahl@evan It's certainly doable, I'm thinking along the lines of Event Sourcing, but I'm curious: Are there any social-interaction-type things you have in mind? Like subscribing to tasks or todo-lists, commenting on items, etc.? Otherwise, essentially private-per-user, it's kind of hard to see the benefit over, say, a slightly fleshed out and secured REST-API a la http://www.todobackend.com/ :-P
@Bsstahl@evan Hm, not sure I *see* the advantage over a more direct plain-json + REST-with-HATEOAS model (but then that's always the question with rich metadata: is it worth it :-P), but, as I said, it's certainly viable and far from crazy. So I'd say: Go for it! The only way we get to find out for sure :-D
@evan@timoreilly Ah, the ebooks.com one claims so, will buy there and fingers crossed ;-) Thx for the response! Still odd from oreilly and I'd still want a print one :-P
Just noticed @evan's book on #ActivityPub is walled-garden digital only... That seems... odd? counter-intuitive? I mean, the fediverse is quite literally built on the opposite approach, no? Well, let's say I'd appreciate if enough people reached out to #oreilly (WTF, they don't even have an account? And @timoreilly has a *single* post?) for them to realize that a print run would be welcome :-) I for one don't own a kindle and I don't run closed-source apps either.
@evan For what it's worth: I think you worded it well. People are prone to vigorous knee-jerk reactions, and I can't blame 'em (Being prone to those myself, especially in areas where ethics are concerned) :-)
@Jeremiah "It’s reasonable for a business to know if their ad worked" No, it is not. In fact I don't even think being allowed to *make* ads in the first place is reasonable.
I admit I'm very curious to see what investigations on these exploding pagers will reveal. Being a ham radio operator I've tinkered with the innards of a couple from the '90s and there isn't much in there to make the battery explode; Now I wonder if they found a way to do it anyway; whether these were more modern (i.e. using more general purpose processors); Or if they managed to simply plant actual explosives...
@evan Qualified (Or rather: *technically*) no; Obviously "controlling territory" is a *thorny* issue (and I assume this is aimed at places like Costa Rica), but also remember that we usually classify ancient rome and greece as democracies (at least some periods), yet both had residents that could not vote (non-landowners, women, slaves...) and many countries today have residents that aren't citizens, e.g. refugees, EU-style freedom of movement, etc. and cannot vote either.
I'm thinking about setting up a #udev rule that triggers some actions when a given device is removed. For that I'd like a minimal #usb device/token, think "only vendorid and productid", no actual functionality (which could fail and cause issues, etc.). Does anyone have a source for something like that? It's obviously ridiculously niche and not at all cost-effective to manufacture...
@feld I know that *can* :-D The question is about making sure nothing automagic *can* try to load or even access any kernel module, e.g. it should not identify as a HID or storage, etc. For that it should ideally have a VID/PID combo that is reserved for that use (Essentially a Null-Implementation). I'm just curious whether someone actually makes such a thing, e.g. as a dongle, or has figured out a microcontroller with the absolute minimum of intelligence for it and published that finding.