Ya know, if there was an actual "don't be evil" tech company, they'd probably get a lot of great people, looking for a place to safely home their great ideas & novel tech.
@demofox I think the only way to do it is to form non-profits and crowd fund things. Tech for pure good is not going to be as profitable as a purely profit motivated company, so I think this is the only way.
Thinking about what to make for a (gpu centric) game/art jam at work.
I think I want to make an fps that runs in shaders. Might be cool to have roguelike unlocks with each run.
Unsure how I'd do enemies, and exp tells me this scope might already be too large, even if I do the most minimum implementation haha 😂
@demofox I think I'd try to combine it: What you see is what you play. I am sure the gameplay would mostly be tied to triggers,, but I am not 100% sure. My idea didn't go much further, yet. :)
Ok so my friend sent me a code for ghosts of tsushima and I got sucked into it. RIP stardew valley. Wow it is such a great game. It's like a more grown up, more violent Zelda game.
@demofox Indeed! And they have a few great gdc talks. There's a good one on their grass which I really want to reimplement and then extend with blade-accurate grass cutting. Imagine swinging your katana around a grassy field, bits flying everywhere, and after the fight you see the history of the battle written in chaotic crop circles.
For some reason people are talking about homomorphic encryption.
In game dev, for deterministic simulations like you see in RTSs, you can prevent write cheats by ensuring that the hash of the deterministic sim state matches across players.
You can't easily prevent read cheats though - being able to see the entire map when you shouldn't eyc.
Homomorphic encryption is a way to prevent read cheats.
Fyi!
Last I checked, fully homomorphic encryption was much too slow to use in game dev. There are partially homomorphic encryption schemes though, where you have a subset of operations you can do, vs FHE which can do any operation.
@demofox
Just to make sure you didn't overlook Jeremy Kun's recent-ish posts about low degree polynomial approximation in order to make use of FHE (Fully Homomorphic Encryption)
Does anyone know of any code laying around the net that distributes points on a mesh in a blue noise distribution?
A student intern i work with is looking for this. It's tempting to write it, but im also kinda swamped :X
Mitchell's best candidate would work well here, and would give a sequence instead of a set (use the first N of M total points, for any N), but what makes it more than a 1 hour task is the mesh connectivity, and multiple paths through triangles to the same points that you need to calculate distance between.
Hey software license knowledgeable friends. We recently put code out for a paper that is BSD licensed.
What would happen if some other company forked it and made a bunch of changes/ improvements?
Would it still be copyright EA in the license on their fork? And it'd have to stay BSD right?
Ty, random curiosity :) https://github.com/electronicarts/fastnoise/blob/main/LICENSE.txt
@pkhuong whats the "patent grant for using the licensed software"?
Like if the company patents the work, the license implies that they are free to use the patent as well?
@demofox@pkhuong the wording is such that if a patent troll contributes to an aparche2 licensed project, they automatically grant the right to use any relevant patents to the project. It is meant to help mitigate against a kind of legal trojan horse essentially.
So linkedin as a social media platform... I feel like if I speak my true thoughts as a promethean anarchist, that is going to be detrimental.
And I cannot stand seeing all the people I know to be useless getting prestigious positions.
Mastodon friends, I live for the toots.
@demofox I signed up for linked in once about 14 years ago because a girl I met at a party gave me her linked in handle when I tried to ask her out. I didn't know what linked in was, and deleted my account some time after that.
@demofox I think the thing that motivated me to delete my defunct linked in account was getting a never ending deluge of spam to join sent to my work email despite already having an account
Ok so the internet is the epitome of cache invalidation problems (f5 and dns), and the challenge of naming things (urls). Are there significant off by one errors? :P