I’m a bot that provides summary for articles on supported sites!

If you need help, contact @rikudou@lemmings.world.

Official community: !autotldr@lemmings.world.

The source code is at https://github.com/RikudouSage/LemmyAutoTldrBot.

  • 0 Posts
  • 36 Comments
Joined 1 year ago
cake
Cake day: August 1st, 2023

help-circle
  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    The chances of your hardware being recognized, activated, and working properly right after install was akin to getting a straight flush in poker.

    Broadcom provided no code for its gear, so Finger helped reverse-engineer the necessary specs by manually dumping and reading hardware registers.

    He summarizes his background: Fortran programmer in 1963, PDP-11 interfaces to scientific instruments in the 1970s, VAX-11/780 work in the early 1980s, and then Unix/Linux systems, until retiring from the Carnegie Institution for Science in Washington, DC, in 1999.

    The mineral Fingerite is named for Finger, whose work in crystallography took him on a fellowship to northern Bavaria, as noted in one Quora answer about the Autobahn.

    He joined the computer club, which had a growing number of Windows PCs sharing a DSL connection through one of the systems running WinGate.

    In a 2023 Quora response to someone asking if someone without “any formal training in computer science” can “contribute something substantial” to Linux, Finger writes, “I think that I have.”


    Saved 79% of original text.


  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    The browser extensions, which are hosted on the Mozilla store, were made unavailable in the Land of Putin on or around June 8 after a request by the Russian government and its internet censorship agency, Roskomnadzor.

    Among those extensions were three pieces of code that were explicitly designed to circumvent state censorship – including a VPN and Censor Tracker, a multi-purpose add-on that allowed users to see what websites shared user data, and a tool to access Tor websites.

    It turns out wasn’t mere PR fluff, as Mozilla tells The Register that the ban has now been lifted.

    “In alignment with our commitment to an open and accessible internet, Mozilla will reinstate previously restricted listings in Russia,” the group declared.

    "Our initial decision to temporarily restrict these listings was made while we considered the regulatory environment in Russia and the potential risk to our community and staff.

    “We remain committed to supporting our users in Russia and worldwide and will continue to advocate for an open and accessible internet for all.”


    Saved 48% of original text.


  • This is the best summary I could come up with:


    King under the Mountain from developer Rocket Jump Technology, a simulation-based settlement-building strategy game, that was going through a big upgrade and re-brand with Mountaincore ended up shutting down and being open sourced.

    You see King under the Mountain was picked up by a unnamed publisher, who helped finance a big upgrade to the game.

    As the developer said "They were worried that a number of similar games that have released in the time between would cause it to struggle to stand out.

    That didn’t go well either, as the developer posted on Steam back in January, with the release being so small they didn’t pull in enough revenue to “keep even a single dev employed working on the game”.

    In this case though, it’s somewhat a happy ending, and probably one of the best endings you can hope for, as the original game King under the Mountain was made fully open source under the MIT license.

    Real shame to see, no one wants to see a developer have to shut due to low sales, but in this case it’s also partly because the publisher backed-out after making them go silent on it for so long.


    The original article contains 336 words, the summary contains 195 words. Saved 42%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    The public benefit biz is embarking on a global series of workshops to solicit input from concerned parties on its Open Source AI Definition, which has been under discussion for the past two years.

    There’s concern that the legal language in existing OSI-approved licenses doesn’t necessarily suit the way the machine learning models and datasets are used.

    Terms like “program,” when applied to machine learning models, refer to more than just source code and binary files, for example.

    “AI is different from regular software and forces all stakeholders to review how the Open Source principles apply to this space,” Stefano Maffulli, executive director of the OSI, explained in a statement.

    The workshops will take place at various upcoming conferences in the US, Europe, Africa, Asia, Pacific, and Latin America through September.

    Bruce Perens, who drafted the original Open Source Definition, told The Register that he was skeptical about the need to address AI separately.


    The original article contains 420 words, the summary contains 154 words. Saved 63%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    The AMF SDK allows for “optimal” access to AMD GPUs for multimedia processing but this patch series questioned the need in an era of Vulkan Video APIs beginning to see adoption.

    The newest AMD FFmpeg patch series for AMF is on adding hardware context “hwcontext_amf” support along with AMF-based H.264, HEVC, and AV1 decoders.

    Dmitrii Ovchinnikov explained with the patch series: "Adds hwcontext_amf, which allows to use shared AMF context for the encoder, decoder and AMF-based filters, without copy to the host memory.

    AMF context on Windows allows fully enable SAV - ability to utilize VCNs in dGPU and APU in a single session.

    This is a lot of vendor-specific code for which an overlap with a standard API already exists, and I’d just prefer to know why this should be merged and maintained now, as Vulkan video adoption is finally starting."

    So far the patch series hasn’t been merged to upstream FFmpeg, so we’ll see if it’s ultimately accepted or if it’s rejected in favor of encouraging more open / industry standard APIs in 2024.


    The original article contains 538 words, the summary contains 176 words. Saved 67%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    While I was at Open Source Summit North America in Seattle, I was reminded of this when, in a keynote, Sirish Chandrasekaran, GM of Amazon Relational Database Service (Amazon RDS), said: “For the PostgreSQL core server, AWS employs one core team member, six committers, and seven major contributors.”

    Marc Linster, EDB’s Chief Technology Officer, analyzed who did what with PostgreSQL 16 in great detail.

    As someone who’s worked in open source for many years and from a holistic standpoint, having someone to make sure that things are being reviewed for correctness is really, really compelling.

    The performance improvements just by adopting Rust for specific workloads that are in that sweet spot are incredibly compelling."

    In particular, Nalley mentioned that the Rustls TLS library uses AWS Libcrypto for Rust (aws-lc-rs) for cryptography by default, with the option to enable Federal Information Processing Standards (FIPS) support.

    Thinking of security and Rust, Nalley added that he was a little frustrated at the first Rust version of that master Linux administrator command sudo "because it had a huge dependency tree initially, and I think that number was north of 50, (actually, it was a mind-boggling 135 dependencies), which means the attack surface is 50 times larger.


    The original article contains 835 words, the summary contains 202 words. Saved 76%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    More open source surprises for you today, coming from Microsoft too which is always interesting to see as they’ve now open sourced MS-DOS 4.0.

    Added into their existing MS-DOS repository on GitHub which already had MS-DOS v1.25 and v2.0, they’ve now expanded it to include MS-DOS v4.0 which was jointly developed by IBM and Microsoft.

    This is all available under the permissive MIT license.

    The MS-DOS v1.25 and v2.0 files were originally shared at the Computer History Museum on March 25th, 2014 and are being (re)published in this repo to make them easier to find, reference-to in external writing and works, and to allow exploration and experimentation for those interested in early PC Operating Systems.

    They’re doing this for “historical reference and will be kept static” so they’re not accepting pull requests, but that doesn’t stop someone forking them and doing pretty much whatever they want now it’s all under the MIT license.

    Great news for preservation.


    The original article contains 193 words, the summary contains 154 words. Saved 20%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    When Microsoft revealed in January that foreign government hackers had once again breached its systems, the news prompted another round of recriminations about the security posture of the world’s largest tech company.

    It was another reminder of how insulated Microsoft has become from virtually any government accountability, even as the Biden administration vows to make powerful tech firms take more responsibility for America’s cyberdefense.

    In 2023, China broke into the email accounts of 22 federal agencies, spying on senior State Department officials and Commerce Secretary Gina Raimondo ahead of multiple US delegation trips to Beijing.

    As by far the biggest technology provider for the US government, Microsoft vulnerabilities account for the lion’s share of both newly discovered and most widely used software flaws.

    As part of its Secure Future Initiative launched in November, Faehl says, Microsoft has improved its ability to automatically detect and block abuses of employee accounts, begun scanning for more types of sensitive information in network traffic, reduced the access granted by individual authentication keys, and created new authorization requirements for employees seeking to create company accounts.

    Microsoft has also redeployed “thousands of engineers” to improve its products and has begun convening senior executives for status updates at least twice weekly, Faehl says.


    The original article contains 930 words, the summary contains 206 words. Saved 78%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Both Suyu and Sudachi began as forks of Yuzu, the emulator that Nintendo sued out of existence on March 4th.

    Developers of Yuzu’s forks also claimed they were changing the code further, among other practices, in an effort to avoid pissing Nintendo off.

    But it’s possible that people were sharing Nintendo’s cryptographic keys, firmware, or even entire pirated games in these servers despite those commitments.

    Even if Suyu and Sudachi were infringing, Discord’s policy does not suggest it would permaban, much less nuke entire servers, on the first offense.

    Discord did not answer questions about whether these users were repeat copyright infringers, had received any previous warnings, or were forwarded any takedown requests.

    Nintendo isn’t just targeting Switch emulators with its latest round of takedowns but also some of the tools that aid them: it sent DMCA takedown requests to GitHub to remove 27 forks of the Sigpatch Updater, as well as Lockpick_RCM, kezplez-nx, and Incognito_RCM, which help Switch owners and developers obtain encryption keys.


    The original article contains 788 words, the summary contains 165 words. Saved 79%. I’m a bot and I’m open source!


  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    In a press release announcing the move, Proton emphasized the pair’s “shared values,” including the use of E2EE; a commitment to open-source technology; and how neither has relied upon venture capital to drive growth.

    This includes building on its first acquisition — email alias startup SimpleLogin, which it acquired in 2022 — as well as developing and launching fully fledged password manager app Proton Pass in June.

    So the company is evidently not allergic to user acquisition and other consolidation-based growth opportunities where it sees enough philosophical overlap plus the chance to deepen its technical bank.

    “The deal is a strategic decision designed to benefit users by bringing to market secure, easy to use, private products that anyone can access,” Proton wrote.

    “Standard Notes and Proton engineers will begin working together immediately to ensure their combined skills and experience bear fruit for users as soon as possible.”

    Asked about the sustainability of pro-privacy business models that don’t rely on exploitation of user data — when so much of mainstream tech still continues to roll in the opposite, data-mining direction — Yen emphasized the need for long-term thinking by privacy startups.


    Saved 80% of original text.


  • This is the best summary I could come up with:


    In-depth Several big businesses have published source code that incorporates a software package previously hallucinated by generative AI.

    Not only that but someone, having spotted this reoccurring hallucination, had turned that made-up dependency into a real one, which was subsequently downloaded and installed thousands of times by developers as a result of the AI’s bad advice, we’ve learned.

    He created huggingface-cli in December after seeing it repeatedly hallucinated by generative AI; by February this year, Alibaba was referring to it in GraphTranslator’s README instructions rather than the real Hugging Face CLI tool.

    Last year, through security firm Vulcan Cyber, Lanyado published research detailing how one might pose a coding question to an AI model like ChatGPT and receive an answer that recommends the use of a software library, package, or framework that doesn’t exist.

    The willingness of AI models to confidently cite non-existent court cases is now well known and has caused no small amount of embarrassment among attorneys unaware of this tendency.

    As Lanyado noted previously, a miscreant might use an AI-invented name for a malicious package uploaded to some repository in the hope others might download the malware.


    The original article contains 1,143 words, the summary contains 190 words. Saved 83%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Tomeu Vizoso who recently has been working on extending the Etnaviv open-source graphics driver to also support the Vivante NPU IP has made great progress on that with competitive performance to the proprietary NPU driver and upstreaming the Teflon framework into Mesa for handling the Neural Processing Unit.

    Tomeu Vizoso has now shifted his attention to working on an open-source, reverse-engineered NPU driver for the AI hardware found in various Rockchip SoCs.

    The userspace stack though is notoriously buggy and difficult to use, with basic features still unimplemented and performance being quite below what the hardware should be able to achieve.

    His hope ultimately is to develop both a mainline-capable open-source kernel driver and relevant user-space for the Rockchip NPU.

    So far he’s off to a good start: "I started looking at a buffer that from the debug logs of the proprietary driver contained register writes, and when looking at the register descriptions in the TRM, I saw that it had to be closely based on NVIDIA’s NVDLA open-source NPU IP.

    More information on this new open-source NPU Linux driver adventure via Tomeu Vizoso’s blog.


    The original article contains 409 words, the summary contains 185 words. Saved 55%. I’m a bot and I’m open source!


  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    At the end of last year Intel hosted a survey of open-source developers to collect their feeback on various open-source software issues.

    Intel’s 2023 Open Source Community Survey is all wrapped up, the data tallied up, and the results emailed out today to participants.

    I haven’t seen Intel post this data on any public web page yet, but per the email, below are all of the results collected from their open-source survey for 2023.

    The license was followed by maintainer responsiveness, activity volume, welcoming community, and then the established policies and documentation.

    Of those participating in the survey, Intel found the top open-source challenge faced was maintainer burnout at 45%… That was followed by documentation/onboarding at 41% and then maintaining sustainability at 37%.

    Another result of little surprise was finding the open-source project of greatest interest being Linux itself.


    Saved 36% of original text.


  • This is the best summary I could come up with:


    While there have been efforts by AMD over the years to make it easier to port codebases targeting NVIDIA’s CUDA API to run atop HIP/ROCm, it still requires work on the part of developers.

    The tooling has improved such as with HIPIFY to help in auto-generating but it isn’t any simple, instant, and guaranteed solution – especially if striving for optimal performance.

    In practice for many real-world workloads, it’s a solution for end-users to run CUDA-enabled software without any developer intervention.

    Here is more information on this “skunkworks” project that is now available as open-source along with some of my own testing and performance benchmarks of this CUDA implementation built for Radeon GPUs.

    For reasons unknown to me, AMD decided this year to discontinue funding the effort and not release it as any software product.

    Andrzej Janik reached out and provided access to the new ZLUDA implementation for AMD ROCm to allow me to test it out and benchmark it in advance of today’s planned public announcement.


    The original article contains 617 words, the summary contains 167 words. Saved 73%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    A smoother stream, bug fixes and extra features are here for chiaki4deck, the open source Playstation Remote Play client for Steam Deck in the latest release.

    Allowing you to sync up your gaming and play your PS titles on Valve’s handheld.

    Fix race condition causing remote play on console has crashed.

    Fix issue where dropped packets results in losing mic connection.

    Add PS5 Rumble for controllers other than DualSense and Steam Deck (which have native haptics support).

    Fix congestion control stop on Windows and log Auto audio output when chosen.


    The original article contains 200 words, the summary contains 90 words. Saved 55%. I’m a bot and I’m open source!


  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    LibreOffice 24.2 is now available as the latest major update to this leading cross-platform, free software office suite to compete with the likes of Microsoft Office.

    Besides switching to a YEAR.MONTH based versioning scheme (and releasing at the tail end of January…), LibreOffice 24.2 also delivers on many improvements and other enhancements to this word processor, spreadsheet, and other open-source alternatives to Microsoft Office.

    LibreOffice 24.2 features include improved multi-page floating tables, Small Caps for LibreOffice Impress, “save auto-recovery information” is now enabled by default, “always create backup copies” is also now enabled by default, there is now a password strength meter when saving documents with a password, and various other improvements.

    More details on the many great changes in LibreOffice 24.2 can be found via the release notes.

    Those wanting to install LibreOffice 24.2 directly as opposed from your Linux distribution’s package management system can find all the LibreOffice 24.2 release binaries up on LibreOffice.org.


    Saved 0% of original text.


  • This is the best summary I could come up with:


    RHEL stands for Red Hat Enterprise Linux, which in June, under IBM’s ownership, stopped making its source code available as required under the GPL.

    Pointing to popular applications from Apple, Google, and Microsoft, Perens says: "A lot of the software is oriented toward the customer being the product – they’re certainly surveilled a great deal, and in some cases are actually abused.

    The reason that doesn’t often happen today, says Perens, is that open source developers tend to write code for themselves and those who are similarly adept with technology.

    Perens acknowledges that a lot of stumbling blocks need to be overcome, like finding an acceptable entity to handle the measurements and distribution of funds.

    Asked whether the adoption of non-Open Source licenses, by the likes of HashiCorp, Elastic, Neo4j, and MongoDB, represent a viable way forward, Perens says new thinking is needed.

    Perens doesn’t think the AGPL or various non-Open Source licenses focus on the right issue in the context of cloud companies.


    The original article contains 1,837 words, the summary contains 164 words. Saved 91%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    If a computer becomes unreliable, a great first step, which doesn’t even require opening the case, is to boot Memtest86+ from a USB key and leave it running – ideally, overnight or at least for several hours.

    Version 7.0 has gained the ability to interrogate the integrated memory controller in Intel Core PCs (first to 14th generations) to find live memory timing information, as well as some preliminary support for obtaining error correction code (ECC) info on some models of AMD Ryzen.

    However, support for memory error-checking is not a universal option across all PCs, which has been criticized by noted industry diplomat Linus Torvalds, but it seems like it might be staging a modest comeback – at least for AMD users.

    It’s still worth a try, and if it doesn’t work, temporarily disable Secure Boot in the firmware settings before testing, and turn it back on afterwards.

    Boot it, press one key to start a test, and if big red lines appear in the on-screen log saying ERROR, you have RAM issues.

    If you don’t have a recent Linux ISO to hand, the project offers its own (absolutely minuscule) downloads that you can simply copy onto a USB key formatted with Ventoy and put to work.


    The original article contains 665 words, the summary contains 207 words. Saved 69%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    While each of the men had the plausible deniability of a connection or two in common with her, she said it was immediately clear that their motives were not strictly professional — one of them worked in the oil industry, a field far removed from anything she’d ever done for a living.

    In an age with so many dedicated dating platforms — from giants such as Tinder, Bumble, and Hinge to niche apps including Feeld (for the unconventional), Pure (for the noncommittal), and NUiT (for the astrologically inclined) — why mix Cupid’s arrow with corporate updates?

    Because the professional-networking site asks users to link to their current and former employers’ profile pages, it offers an additional layer of credibility that other social-media platforms lack.

    In his bio, Hotz declared that he now used the site “exclusively as a dating platform” and laid out a catalog of requisite attributes — “intelligent, attractive, female, in or visiting San Diego” — for his ideal match.

    “If someone is willing to take their time and let the initial professional connection evolve in a way that is mutually respectful,” Yager said, “and if both parties somehow communicate their availability for romance, and they want to go the next step — which might mean a phone or Zoom call or meeting in person in a safe public place — hopefully it is a win-win.”

    A significant proportion of younger professionals may have missed out on this type of in-person workplace camaraderie altogether, which could help to explain LinkedIn’s recent surge in popularity among teens and 20-somethings.


    The original article contains 2,086 words, the summary contains 260 words. Saved 88%. I’m a bot and I’m open source!


  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    RHEL stands for Red Hat Enterprise Linux, which in June, under IBM’s ownership, stopped making its source code available as required under the GPL.

    Pointing to popular applications from Apple, Google, and Microsoft, Perens says: "A lot of the software is oriented toward the customer being the product – they’re certainly surveilled a great deal, and in some cases are actually abused.

    The reason that doesn’t often happen today, says Perens, is that open source developers tend to write code for themselves and those who are similarly adept with technology.

    Perens acknowledges that a lot of stumbling blocks need to be overcome, like finding an acceptable entity to handle the measurements and distribution of funds.

    Asked whether the adoption of non-Open Source licenses, by the likes of HashiCorp, Elastic, Neo4j, and MongoDB, represent a viable way forward, Perens says new thinking is needed.

    Perens doesn’t think the AGPL or various non-Open Source licenses focus on the right issue in the context of cloud companies.


    Saved 91% of original text.