Are you something else? What’s your work schedule?
Are you something else? What’s your work schedule?
I read it, and I read the messages from the devs. The communication issue I am trying to point is also highlighted in the comments: if the decision on merging a PR is uniquely dictated by financial benefits of IBM, ignoring the broader benefits of the community, the message is that red hat is looking for free labor and it is not really interested in anything else. Which is absolutely the case, as we all know, but writing it down after the recent events is another PR issue, as red hat justified controversial decisions on the lack of contributions from downstream.
The Italian dev tried to put it down as “we have to follow our service management processes that are messy, tedious and expensive” but he didn’t address the problems in the original message. The contributor himself felt like they asked his contribution just to reject it because of purely financial reasons without any additional details. It is a new PR incident
The Apparently is already patch on fedora… Just reporting other comments in this thread. But why do they accept contribution to centos of they don’t want patches that are not economically beneficial to the company? It is a pretty bad message written as this
I stopped recommending it. It is a pity, but there are alternatives
Why would they accept PR at all if they don’t have a robust testing process and approvals are dictated by customers needs?
The message as it is now to potential contributors is that their contribution in not welcome, unless its free labor to financially benefit only ibm.
Which is fair, but the message itself is a new PR issue for red hat
Thanks, it looks like privacy on internet is really a mirage
I am mainly thinking about matching navigation history with identifiable information… You are right, It’s a tricky thing…
I also wonder, if lemmy becomes a thing, with numbers in the same order of magnitude of reddit, if and how gdpr will affect server admins… Having a privacy anonymization tool built in by design might avoid headaches on the long term
I am thinking more of a Meta “threads” -like situation. Not necessarily malicious, just a different privacy expectations between user and provider
Thanks, makes sense
What if database entries are encrypted, so that a person cannot match email and username with the requests in the urls?
Users’ client create encryption key on client side. Would it make sense?
Thanks. It would be interesting to understand if some anonymization technique could technically be created, and eventually implemented in the future.
Because it looks a pretty dangerous situation, given what people discuss on social media nowadays…
Thanks for the clarification!
You are joking, but this is exactly what happens if you optimize accuracy of an algorithm to classify something when positive cases are very few. The algorithm will simply label everything as negative, and accuracy will be anyway extremely high!
Why are you so aggressive? Lack of sleep? I was just asking