• 0 Posts
  • 93 Comments
Joined 2 years ago
cake
Cake day: July 5th, 2023

help-circle


  • The Walkman and other tape players were so much superior to CD players for portability and convenience. Batteries lasted a lot longer for portable tape players than for CD players. Tapes could be remixed easily so you could bring a specific playlist (or 2 or 3) with you. Tapes were much more resilient than CDs. The superior audio quality of CDs didn’t matter as much when you were using 1980’s era headphones. Or, even if you were using a boombox, the spinning of a disc was still susceptible to bumps or movement causing skips, and the higher speed motor and more complex audio processing drained batteries much faster. And back then, rechargeable batteries weren’t really a thing, so people were just burning through regular single use alkaline batteries.

    It wasn’t until the 90’s that decent skip protection, a few generations of miniaturization and improved battery life, and improved headphones made portable CDs competitive with portable tapes.

    At the same time, cars started to get CD players, but a typical person doesn’t buy a new car every year, so it took a few years for the overall number of cars to start having a decent number of CD players.



  • Yeah, from what I remember of what Web 2.0 was, it was services that could be interactive in the browser window, without loading a whole new page each time the user submitted information through HTTP POST. “Ajax” was a hot buzzword among web/tech companies.

    Flickr was mind blowing in that you could edit photo captions and titles without navigating away from the page. Gmail could refresh the inbox without reloading the sidebar. Google maps was impressive in that you could drag the map around and zoom within the window, while it fetched the graphical elements necessary on demand.

    Or maybe web 2.0 included the ability to implement states in the stateless HTTP protocol. You could log into a page and it would only show you the new/unread items for you personally, rather than showing literally every visitor the exact same thing for the exact same URL.

    Social networking became possible with Web 2.0 technologies, but I wouldn’t define Web 2.0 as inherently social. User interactions with a service was the core, and whether the service connected user to user through that service’s design was kinda beside the point.


  • Yeah, you’re describing an algorithm that incorporates data about the user’s previous likes. I’m saying that any decent user experience will include prioritization and weight of different posts, on a user by user basis, so the provider has no choice but to put together a ranking/recommendation algorithm that does more than simply sorts all available elements in chronological order.






  • Windows is the first thing I can think of that used the word “application” in that way, I think even back before Windows could be considered an OS (and had a dependency on MS-DOS). Back then, the Windows API referred to the Application Programming Interface.

    Here’s a Windows 3.1 programming guide from 1992 that freely refers to programs as applications:

    Common dialog boxes make it easier for you to develop applications for the Microsoft Windows operating system. A common dialog box is a dialog box that an application displays by calling a single function rather than by creating a dialog box procedure and a resource file containing a dialog box template.



  • Some people actively desire this kind of algorithm because they find it easier to find content they like this way.

    Raw chronological order tends to overweight the frequent posters. If you follow someone who posts 10 times a day, and 99 people who post once a week, your feed will be dominated by 1% of the users representing 40% of the posts you see.

    One simple algorithm that is almost always better for user experiences is to retrieve the most recent X posts from each of the followed accounts and then sort that by chronological order. Once you’re doing that, though, you’re probably thinking about ways to optimize the experience in other ways. What should the value of X be? Do you want to hide posts the user has already seen, unless there’s been a lot of comment/followup activity? Do you want to prioritize posts in which the user was specifically tagged in a comment? Or the post itself? If so, how much?

    It’s a non-trivial problem that would require thoughtful design, even for a zero advertising, zero profit motive service.


  • Some people struggle with the difference between arguing about descriptive statements, about what things are, and arguing about normative statements, about what things should be. And these topics are nuanced.

    Decompiling to learn functionality is fair use (because like I said in my previous comment, functionality can’t be copyrighted), but actually using and redistributing code (whether the original source code, the compiled binary derived from the source code, or decompiled code derived from the binary) is pretty risky from a legal standpoint. I’d advise against trying to build a business around the practice.


  • Yeah, that’s why all the IBM clones had to write their BIOS firmware in clean room implementations of new software that implemented the same functionality as IBM’s own documentation described.

    Functionality can’t be copyrighted, but code can be. So the easiest way to prove that you made something without the copyrighted code is to mimic the functionality through your own implementation, not by transforming the existing copyrighted code, through decompilation or anything like that.


  • Was that in 2000? My own vague memory was that Linux started picking up some steam in the early 2000’s and then branched out to a new audience shortly after Firefox and Ubuntu hit the scene around 2004, and actually saw some adoption when Windows XP’s poor security and Windows Vista’s poor hardware support started breaking things.

    So depending on the year, you could both be right.




  • Honestly, this is an easy way to share files with non-technical people in the outside world, too. Just open up a port for that very specific purpose, send the link to your friend, watch the one file get downloaded, and then close the port and turn off the http server.

    It’s technically not very secure, so it’s a bad idea to leave that unattended, but you can always encrypt a zip file to send it and let that file level encryption kinda make up for lack of network level encryption. And as a one-off thing, you should close up your firewall/port forwarding when you’re done.