I’ve made GDPR data requests before as an Australian. The companies just side with always complying with it rather than working out who is actually covered by the laws.
If you mean, by reporting statistics, you’re probably right. But men in general are widely used to physical abuse and are expected to take it. Granted, it is rarely significantly harmful and women use it as a way to reassure themselves that men are “in charge “ or whatever, but that doesn’t change the fact that it is vile behavior.
Men’s behavior is as much shaped by female expectations as the behavior of women is molded by men.
Like it or not, we’re in this together, and cooperation with mutual understanding and benefit is the only way forward. We can see what happens when this breaks down, as in sharia law. How do you think this ends if we ceaselessly demonize men? Shame has its limits, and they start where the violence begins.
Of -reported- incedents, 1 in 4 women report having been the victim of significant physical harm by an intimate partner, as do 1 in 7 men. Now if you consider the comparative likelihood of severe physical harm in M vs F and F vs M, and factor in the likelihood of reporting for women vs men, I think you can see that the rate is not at all what it seems at first glance.
(FWIW, despite the relative -frequency- of incidents , I do agree that the danger is greater to women just on the basis of the likelihood of harm in a MvF conflict.)
Reported incidence of psychological/emotional abuse are almost exactly at parity, with just under half of both sexes reporting abuse in their lifetime. Physical abuse prevalence in lesbian relationships is also much higher than either heterosexual or male-male relationships.
From this I would estimate that the willingness to act out in violence against a domestic partner is something close to evenly distributed among the sexes.
Collection of definitive data about subjects such as this is notoriously difficult, but reading between the lines both here and in violence among youth (m-m, f-f, m/f) seems to indicate that the predilection, if not the severity, of violence is relatively evenly distributed among.
I look at the page and leave without any clue as to what it actually does. Agents and AI are mentioned so I assume it might just be incoherent slop?
The person behind this boasts on Twitter, that they fired all their remote developers and used AI instead.
Judging by tweets, this project is 2-3 years in the making.
> Lix is a universal version control system that can diff any file format (.xlsx, .pdf, .docx, etc).
> Unlike Git's line-based diffs, Lix understands file structure. Lix sees price: 10 → 12 or cell B4: pending → shipped, not "line 4 changed" or "binary files differ".
How? I have a custom binary file format, how would Lix be able to interpret this?
> Lix adds a version control system on top of SQL databases that let's you query virtual tables like file, file_history, etc. via plain SQL. These table's are version controlled.
I don't see how an AI crawler is different from any others.
The simplest approach is to count the UA as risky or flag multiple 404 errors or HEAD requests, and block on that. Those are rules we already have out of the box.
It's open source, there's no pain in writing specific rules for rate limiting, thus my question.
Plus, we have developed a dashboard for manually choosing UA blocks based on name, but we're still not sure if this is something that would be really helpful for website operators.
I believe that if something is publicly available, it shouldn't be overprotected in most cases.
However, there are many advanced cases, such as crawlers that collect data for platform impersonation (for scams) or custom phishing attacks, or account brute-force attacks. In those cases, I use tirreno to understand traffic through different dimensions.
There is a noprocrast feature in your settings to specify how long you can stay on for a single session and the frequency at which you can view HN. Super helpful!
Don’t let me distract from this learning opportunity with my armchair expertise. There are a lot of articles out there for this exact topic, but here’s one that’s pretty good.
reply