Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_csNE_bot@mastoxiv.page
2024-05-10 06:51:32

Adaptability and Homeostasis in the Game of Life interacting with the evolved Cellular Automata
Keisuke Suzuki, Takashi Ikegami
arxiv.org/abs/2405.05797

@arXiv_csNE_bot@mastoxiv.page
2024-05-10 06:51:32

Adaptability and Homeostasis in the Game of Life interacting with the evolved Cellular Automata
Keisuke Suzuki, Takashi Ikegami
arxiv.org/abs/2405.05797

@theendupdates@podvibes.co
2024-05-07 21:50:16

The Timekeeper: Win or Die 👁⏱🏃🏼
Dramatized horror thriller series | A four-episode horror/thriller audio drama that follows 17-year-old Charlie and his best friends, Gama and Zoe, as they’re pulled into a life and death version of a video game called 13 Keys.
1 seasons, 4 episodes as of Apr 26, 2023.
<…

@loleg@fosstodon.org
2024-04-06 16:01:04

Play #OfLifeAndLand - just released village sim from Swiss designer Marco Burri, in Early Access for Windows & Linux #GodotEngine #indiegames

Screenshot of a game with low poly houses and trees, a video stream of two people playing
@mikeymikey@hachyderm.io
2024-04-05 06:52:46

I got "The Gunk" at some point as part of a bundle in the past - gave it a spin tonight on #SteamDeck - great googly moogly is this game a.) a MOOD and b.) bloody gorgeous
Can't believe I've let it sit so long in my #Steam backlog
Can definitely recommend!

@theendupdates@podvibes.co
2024-05-07 03:39:06

What's Poppin' Penny? 👧🏾🐻💞
Dramatized kids & family adventure series | Total listening time: 2h 01m
Penny Wright is a curious preschooler living in a cozy multi-generational household filled with love, laughter, and learning. Penny’s life takes a magical turn when she finds a teddy bear in a box of her grandfather’s belon...

@fanf@mendeddrum.org
2024-03-29 11:42:03

ashen.earth/wasm-game-of-life- - Pure Wasm Life 2: optimizing webassembly and canvas with WebGL.

@ubuntourist@mastodon.social
2024-02-29 12:47:25

Scientists create DVD-shaped disc that can hold more movies than you could see in your entire life;
It could be a game changer in data centers. They are able to produce a single 1.6-petabit disc in six minutes.
futurism.com/the-byte/dvd-shap

@seedling@dice.camp
2024-04-04 06:34:53

I tried to get back into playing my solo game, which turned into making a lot of random generators instead
I've started putting together a vaguely Cairn-y lifepath generator. This is the most work in progress work in progress I have ever shared:
perchance.org/lt8m69fg35

@mgorny@social.treehouse.systems
2024-03-24 20:37:58

Black Book is an interesting #game. It's a kind of crossover between an RPG game, an adventure game and a card game (first one I've ever played). It's kinda fun, but more importantly, it's deeply immersed in eastern Slavic folklore.
One thing makes me wonder. Life in XIX. century must have been hard. People needed to work a lot just to survive. On top of that, they clearly had a very complex system of superstitions. I would find it hard to remember it all, let alone watch yourself at every turn not to anger some spirit…

@kennysmith@mstdn.social
2024-03-05 14:37:34

Mike Oliver was a good one
al.com/news/2024/03/mike-olive

@grumpybozo@toad.social
2024-03-01 19:10:57

You know how you almost never see an advanced chess game really played out? I mean, they play it out to the point where the inevitable loser sees their doom and resigns. The best (or, I guess, 2nd-best?) players see their doom well before beginners will. Some people even see the practice of grinding out an inevitable end-game as amateurish and rude.
Quite different in life. Once one notes that the remainder is doomed to be an unpleasant slide into the grave, people get all suicide-wat…

@freegames@mastodon.pnpde.social
2024-03-30 08:00:03

Attack Of The Things
Take on Galactoil, a comically dysfunctional intergalactic energy corporation, and its larger-than-life employees in a tactical-stealth game that fuses satisfying strategic gameplay and dark comedy in a quirky single-player story.
thealcat.itch.io/attack-of-the

@cliffwade@allthingstech.social
2024-03-27 13:11:27

I checked out the new Hollow Halls content update in Enshrouded this morning.
The first dungeon is absolutely BEAUTIFUL and huge. There is so much to explore. I made it through the first one and now need to head to the second one.
If you played Enshrouded, I strongly urge you to check out the content update as they made a ton of "quality of life" changes as well to the game.
#Enshrouded

Banner image for the videogame Enshrouded.
@gatewayy@mastodon.gatewayy.net
2024-02-19 20:01:14

I meant o post this Saturday, but my life is a little bit out of sorts as I adjust to my new life circumstances. I was a real nail bitter of a game and I was not sure we would win. It all came down to the last half of the fourth quarter. Wow, what a finish! 😅

Screenshot of the game between Missouri State University and Valparaiso University.
@arXiv_csGT_bot@mastoxiv.page
2024-04-30 06:49:54

A Membrane Computing Approach to the Generalized Nash Equilibrium
Alejandro Luque-Cerpa, Miguel A. Guti\'errez-Naranjo
arxiv.org/abs/2404.17671

@beaware@social.beaware.live
2024-03-16 06:23:18

🎶I'm the type of guy who will never settle down,
Where pretty girls are well, you know that I'm around,
I kiss 'em and I love 'em 'cause to me they're all the same,
I hug 'em and I squeeze 'em they don't even know my name,
They call me the wanderer yeah the wanderer,
I roam around around around🎶
#AIart

A scene reminiscent of the post-apocalyptic world from the video game series “Fallout.” A male character, presumably a Vault Dweller given the iconic blue jumpsuit and the life support gear on his back, walks away from the viewer alongside a dog. They are moving through a desolate landscape with dilapidated buildings, electrical poles, and a dusty road. In the sky, a futuristic aircraft emits smoke as it flies past a rocket with the American flag, suggesting an alternative reality with advanced…
@90scraig@pb.craignt.com
2024-03-20 13:36:09

If you could play only one video game the rest of your life, what would it be?
#gaming

@rene_mobile@infosec.exchange
2024-03-30 21:58:50

My current take on the #xz situation, not having read the actual source backdoor commits yet (thanks a lot #Github for hiding the evidence at this point...) besides reading what others have written about it (cf. #rustlang for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.
6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).
7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.
8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the #Debian #OpenPGP #web-of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.
9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.
H/T @… @… @… @… @…

@arXiv_mathGM_bot@mastoxiv.page
2024-03-28 07:14:53

A prime number "Game of Life": can floor($y \cdot p\#$) be prime for all $p$>=2?
Martin Raab
arxiv.org/abs/2403.17949 <…

@jake4480@c.im
2024-02-11 17:15:08

It's 2024, and I still play a ton of Wolfenstein 3D every year. It's just a perfect game. My memory's not great though, and it's weird I STILL don't have much memorized even after playing these maps SO MANY times.
Right now I have the Xbox 360 version paused on my Series X in the living room and it's been sitting like that for a day or two, so Wolf 3D music is just quietly playing in the background. I realized I'm cool with this. My brain's always in Ca…

Wolfenstein 3D screenshot at 1% life. I died as soon as I opened the next door. 🤣
@idbrii@mastodon.gamedev.place
2024-02-11 08:02:53

Played the Diceomancer demo and it's really interesting. The name is silly but when you hit the dice moment, you get it.
I haven't played a game where a core mechanic lets you mess with everything in it this fundamentally since Hack n Slash. The dice moment is incredible and worth grabbing the demo to avoid spoiling it -- it occurs early on (after a few battles). Art is really nice too. Love the player animation.

Screenshot from Steam showing playing a block card which has an animation of pulling out a shield.

The player faces a crow in a landscape of rolling hills.
@gatewayy@mastodon.gatewayy.net
2024-04-22 04:10:37

It’s such a joy that you can finally use the Delta emulator on iOS without extra work.
I’ve not played Tetris since I was a preteen and this score would have displeased my younger self. It doesn’t matter since I was grinning like a fool the whole time.
It’s great to relive parts of your life where you were just enjoying the moment!

Screenshot of a classic Tetris game over screen in the Delta emulator app, displaying "GAME OVER" in the center, with "PLEASE TRY AGAIN" beneath it. On the right, the score is shown as 20079, at level 8 with 81 lines completed.
@seedling@dice.camp
2024-03-21 15:54:01

#otherPeoplesBlogs
This is an interesting article about play testing. I probabl…

@teamtuck@social.linux.pizza
2024-02-12 03:28:06

Hey everyone. I’m taking a bit of a social media break/vacation for a little while. It’s not fun anymore and I need to reassess what things I’m letting into my life, do a little soul searching, and some house cleaning.
Once I think I’m in a better spot, I’ll come back here and decide whether or not to continue this account. The internet is becoming a bad place and I just don’t want to be involved, so I shouldn’t play the game for a while.
Peace out homies.

@beaware@social.beaware.live
2024-02-19 01:41:46

My friend's fiance literally lives with him and spends every second of every day with him.
Yet, for some reason, whenever he spends a few minutes on a video game playing with his friend he's known for over 20 years (me) she gets jealous that they're not "spending time alone".
Like bruh. I literally have nobody else in my life to do anything with. If I had a girlfriend or anyone, id surely spend time with them too, but I don't.
I guess I'll just…

@cowboys@darktundra.xyz
2024-04-10 14:59:42

Top NFL Draft expert's latest mock suggests popular Cowboys pick isn't going to happen yardbarker.com/nfl/articles/to

@rene_mobile@infosec.exchange
2024-03-30 21:58:50

My current take on the #xz situation, not having read the actual source backdoor commits yet (thanks a lot #Github for hiding the evidence at this point...) besides reading what others have written about it (cf. #rustlang for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.
6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).
7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.
8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the #Debian #OpenPGP #web-of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.
9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.
H/T @… @… @… @… @…