[-] mox@lemmy.sdf.org 2 points 11 hours ago

!business@lemmy.world

[-] mox@lemmy.sdf.org 1 points 13 hours ago* (last edited 13 hours ago)

You can select the text that's over that background to make reading easier. Most of the article is below it, so you should be fine after a couple taps of Page Down.

Or use Firefox reader view, which cleans it right up. :)

[-] mox@lemmy.sdf.org 19 points 13 hours ago* (last edited 11 hours ago)

The archive link:

  • Doesn't have a tracker.
  • Works with scripts disabled (good privacy & security practice).
  • Will still be useful when nytimes.com eventually disables your gift ID or takes the article down.
[-] mox@lemmy.sdf.org 15 points 1 day ago* (last edited 1 day ago)

Oh? Was China recently granted arrest jurisdiction in the UK and Canada?

Or are they actually talking about abduction, which AFAIK is still illegal in both countries and would be a violation of their sovereignty?

[-] mox@lemmy.sdf.org 2 points 2 days ago* (last edited 2 days ago)

They seem to have returned to it recently. Total redesign of power play. Thargoid war with titan battles (basically massive multiplayer raids). New ships. New frame shift drives. Colonisation coming soon.

[-] mox@lemmy.sdf.org 24 points 2 days ago

One can argue that any programming is computer science,

One could argue that, but I think it would be a weak argument.

Keeping within the subcategory of software, I think of computer science as the theoretical side and programming as the practical side. The same distinction is sometimes made in other fields, like physics.

Seems to me that the author saw a show written by people with a narrow and shallow understanding of the field. For better or for worse, it happens on TV all the time. If he wants to demonstrate a widespread disconnect in the software community, there are probably better examples out there.

[-] mox@lemmy.sdf.org 2 points 2 days ago

Are the model and textures stock Skyrim, or were mods involved? If the latter, are you going to share which ones?

[-] mox@lemmy.sdf.org 9 points 2 days ago

My approach with companies that do this: Contact them, explain that I will not be giving them any money due to this aggressive anti-privacy practice, and take my business elsewhere.

[-] mox@lemmy.sdf.org 10 points 3 days ago

I think this is an important angle for bosses, investors, and legislators to digest. If they were made to understand the impact on profits and economy, they might not be so eager to push employees into work conditions that spread the disease.

[-] mox@lemmy.sdf.org 30 points 4 days ago

Facebook/Meta (the owners of Instagram) have been extorting phone numbers and IDs from people for years. They don't target everyone all at once, but a few hundred here, a few hundred there. I don't know if they do it for all new accounts, but the practice is definitely not new.

This is one of the many reasons why I stopped using their services.

132

cross-posted from: https://beehaw.org/post/17683690

Archived version

Download study (pdf)

GitHub, the de-facto platform for open-source software development, provides a set of social-media-like features to signal high-quality repositories. Among them, the star count is the most widely used popularity signal, but it is also at risk of being artificially inflated (i.e., faked), decreasing its value as a decision-making signal and posing a security risk to all GitHub users.

A recent paper by Cornell University published on Arxiv, the researchers present a systematic, global, and longitudinal measurement study of fake stars in GitHub: StarScout, a scalable tool able to detect anomalous starring behaviors (i.e., low activity and lockstep) across the entire GitHub metadata.

Analyzing the data collected using StarScout, they find that:

(1) fake-star-related activities have rapidly surged since 2024

(2) the user profile characteristics of fake stargazers are not distinct from average GitHub users, but many of them have highly abnormal activity patterns

(3) the majority of fake stars are used to promote short-lived malware repositories masquerading as pirating software, game cheats, or cryptocurrency bots

(4) some repositories may have acquired fake stars for growth hacking, but fake stars only have a promotion effect in the short term (i.e., less than two months) and become a burden in the long term.

The study has implications for platform moderators, open-source practitioners, and supply chain security researchers.

106
submitted 5 days ago by mox@lemmy.sdf.org to c/news@lemmy.world
39
submitted 1 week ago* (last edited 1 week ago) by mox@lemmy.sdf.org to c/programming@programming.dev
98
67
submitted 2 weeks ago by mox@lemmy.sdf.org to c/news@lemmy.world
27
submitted 2 weeks ago by mox@lemmy.sdf.org to c/news@lemmy.world
606
submitted 2 weeks ago by mox@lemmy.sdf.org to c/world@lemmy.world
94
submitted 2 weeks ago by mox@lemmy.sdf.org to c/games@lemmy.world
51
submitted 3 weeks ago by mox@lemmy.sdf.org to c/games@lemmy.world
26
156
submitted 1 month ago by mox@lemmy.sdf.org to c/news@lemmy.world
56
submitted 1 month ago by mox@lemmy.sdf.org to c/foss@beehaw.org
view more: next ›

mox

joined 10 months ago