• 0 Posts
  • 102 Comments
Joined 5 months ago
cake
Cake day: June 6th, 2024

help-circle



  • The reason you do stuff in a venv is to isolate that environment from other python projects on your system, so one Python project doesn’t break another. I use Docker for similar reasons for a lot of non-Python projects.

    A lot of Python projects involve specific versions of libraries, because things break. I’ve had similar issues with non-Python projects. I’m not sure I’d say Python is particularly worse about it.

    There are tools in place that can make the sharing of Python projects incredibly easy and portable and consistent, but I only ever see the best maintained projects using them unfortunately.







  • I don’t believe everything on the internet is a lie (although of course I don’t believe everything on the internet is true either). You have to read it and judge for yourself.

    In the case of getting medical advice, there is an inherent bias to finding anecdotes on the internet. The people who post are going to be the people who have something to say. That’s going to be either people who had a life changing positive experience, or who have something to complain about. The middle-ground experience is underrepresented.

    However, there is value in anecdotes. The doctor can tell you high likely a given side effect might be, but people on the internet might have a better description of what that experience is like.

    I try to take in as much information as I can when I am making an informed decision, including things like asking my doctor, finding anecdotes on the internet, and finding actual scientific papers.




  • What I don’t understand about this thread:

    Each Gmail has its own calendar attached to it. My Phone’s calendar app supports multiple independent calendars displayed at the same time.

    Why not use your work email to make a work calendar and a personal email to make a personal calendar? You can see both but your boss only sees the work one. That doesn’t seem unreasonable to me?







  • So two things that are not accounted for here:

    1. This covers only brute force attacks, meaning you try every different combination. Shor’s Algorithm exploits patterns in RSA keys and is much, much more efficient than brute force.
    2. There actually is an algorithm (Grover’s search algorithm) that can speed up brute force search. However, this speedup is only quadratic, so brute forcing something like a 256 bit key is still infeasible. The discrepancy is quantum information doesn’t flow the same way that classical information does. A related concept is the idea of reversible classical computing: this derivation relies on the assumption that you change set a bit, thereby erasing the information of what that bit was before. If your operation doesn’t erase that information (e.g. if it’s specifically a bit flip, you know what the original bit was, it’s the opposite), then this argument about the minimum required energy falls apart. Most operations in a quantum computer are inherently reversible.