2024-05-10 06:51:32
Adaptability and Homeostasis in the Game of Life interacting with the evolved Cellular Automata
Keisuke Suzuki, Takashi Ikegami
https://arxiv.org/abs/2405.05797
Adaptability and Homeostasis in the Game of Life interacting with the evolved Cellular Automata
Keisuke Suzuki, Takashi Ikegami
https://arxiv.org/abs/2405.05797
Adaptability and Homeostasis in the Game of Life interacting with the evolved Cellular Automata
Keisuke Suzuki, Takashi Ikegami
https://arxiv.org/abs/2405.05797
The Timekeeper: Win or Die 👁⏱🏃🏼
Dramatized horror thriller series | A four-episode horror/thriller audio drama that follows 17-year-old Charlie and his best friends, Gama and Zoe, as they’re pulled into a life and death version of a video game called 13 Keys.
1 seasons, 4 episodes as of Apr 26, 2023.
https://www.<…
Play #OfLifeAndLand - just released village sim from Swiss designer Marco Burri, in Early Access for Windows & Linux #GodotEngine #indiegames
I got "The Gunk" at some point as part of a bundle in the past - gave it a spin tonight on #SteamDeck - great googly moogly is this game a.) a MOOD and b.) bloody gorgeous
Can't believe I've let it sit so long in my #Steam backlog
Can definitely recommend!
What's Poppin' Penny? 👧🏾🐻💞
Dramatized kids & family adventure series | Total listening time: 2h 01m
Penny Wright is a curious preschooler living in a cozy multi-generational household filled with love, laughter, and learning. Penny’s life takes a magical turn when she finds a teddy bear in a box of her grandfather’s belon...
https://ashen.earth/wasm-game-of-life-2 - Pure Wasm Life 2: optimizing webassembly and canvas with WebGL.
Scientists create DVD-shaped disc that can hold more movies than you could see in your entire life;
It could be a game changer in data centers. They are able to produce a single 1.6-petabit disc in six minutes.
https://futurism.com/the-byte/dvd-shaped-disc-…
I tried to get back into playing my solo game, which turned into making a lot of random generators instead
I've started putting together a vaguely Cairn-y lifepath generator. This is the most work in progress work in progress I have ever shared:
https://perchance.org/lt8m69fg35
Black Book is an interesting #game. It's a kind of crossover between an RPG game, an adventure game and a card game (first one I've ever played). It's kinda fun, but more importantly, it's deeply immersed in eastern Slavic folklore.
One thing makes me wonder. Life in XIX. century must have been hard. People needed to work a lot just to survive. On top of that, they clearly had a very complex system of superstitions. I would find it hard to remember it all, let alone watch yourself at every turn not to anger some spirit…
You know how you almost never see an advanced chess game really played out? I mean, they play it out to the point where the inevitable loser sees their doom and resigns. The best (or, I guess, 2nd-best?) players see their doom well before beginners will. Some people even see the practice of grinding out an inevitable end-game as amateurish and rude.
Quite different in life. Once one notes that the remainder is doomed to be an unpleasant slide into the grave, people get all suicide-wat…
Attack Of The Things
Take on Galactoil, a comically dysfunctional intergalactic energy corporation, and its larger-than-life employees in a tactical-stealth game that fuses satisfying strategic gameplay and dark comedy in a quirky single-player story.
https://thealcat.itch.io/attack-of-the
I checked out the new Hollow Halls content update in Enshrouded this morning.
The first dungeon is absolutely BEAUTIFUL and huge. There is so much to explore. I made it through the first one and now need to head to the second one.
If you played Enshrouded, I strongly urge you to check out the content update as they made a ton of "quality of life" changes as well to the game.
#Enshrouded
A Membrane Computing Approach to the Generalized Nash Equilibrium
Alejandro Luque-Cerpa, Miguel A. Guti\'errez-Naranjo
https://arxiv.org/abs/2404.17671
🎶I'm the type of guy who will never settle down,
Where pretty girls are well, you know that I'm around,
I kiss 'em and I love 'em 'cause to me they're all the same,
I hug 'em and I squeeze 'em they don't even know my name,
They call me the wanderer yeah the wanderer,
I roam around around around🎶
#AIart
If you could play only one video game the rest of your life, what would it be?
#gaming
My current take on the #xz situation, not having read the actual source backdoor commits yet (thanks a lot #Github for hiding the evidence at this point...) besides reading what others have written about it (cf. #rustlang for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.
6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).
7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.
8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the #Debian #OpenPGP #web-of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.
9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.
H/T @… @… @… @… @…
A prime number "Game of Life": can floor($y \cdot p\#$) be prime for all $p$>=2?
Martin Raab
https://arxiv.org/abs/2403.17949 https://<…
It's 2024, and I still play a ton of Wolfenstein 3D every year. It's just a perfect game. My memory's not great though, and it's weird I STILL don't have much memorized even after playing these maps SO MANY times.
Right now I have the Xbox 360 version paused on my Series X in the living room and it's been sitting like that for a day or two, so Wolf 3D music is just quietly playing in the background. I realized I'm cool with this. My brain's always in Ca…
Played the Diceomancer demo and it's really interesting. The name is silly but when you hit the dice moment, you get it.
I haven't played a game where a core mechanic lets you mess with everything in it this fundamentally since Hack n Slash. The dice moment is incredible and worth grabbing the demo to avoid spoiling it -- it occurs early on (after a few battles). Art is really nice too. Love the player animation.
It’s such a joy that you can finally use the Delta emulator on iOS without extra work.
I’ve not played Tetris since I was a preteen and this score would have displeased my younger self. It doesn’t matter since I was grinning like a fool the whole time.
It’s great to relive parts of your life where you were just enjoying the moment!
#otherPeoplesBlogs
This is an interesting article about play testing. I probabl…
Hey everyone. I’m taking a bit of a social media break/vacation for a little while. It’s not fun anymore and I need to reassess what things I’m letting into my life, do a little soul searching, and some house cleaning.
Once I think I’m in a better spot, I’ll come back here and decide whether or not to continue this account. The internet is becoming a bad place and I just don’t want to be involved, so I shouldn’t play the game for a while.
Peace out homies.
My friend's fiance literally lives with him and spends every second of every day with him.
Yet, for some reason, whenever he spends a few minutes on a video game playing with his friend he's known for over 20 years (me) she gets jealous that they're not "spending time alone".
Like bruh. I literally have nobody else in my life to do anything with. If I had a girlfriend or anyone, id surely spend time with them too, but I don't.
I guess I'll just…
Top NFL Draft expert's latest mock suggests popular Cowboys pick isn't going to happen https://www.yardbarker.com/nfl/articles/top_nfl_draft_experts_latest_mock_suggests_popular_cowboy…
My current take on the #xz situation, not having read the actual source backdoor commits yet (thanks a lot #Github for hiding the evidence at this point...) besides reading what others have written about it (cf. #rustlang for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.
6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).
7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.
8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the #Debian #OpenPGP #web-of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.
9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.
H/T @… @… @… @… @…