- 34 Posts
- 10 Comments
sebastiancarlos@lemmy.sdf.orgOPto
Linux@lemmy.ml•Systemd's Nuts and Bolts - A Visual Guide to Systemd
4·4 months agoYes, I do get paid. Sometimes considerably (for what tech writing can provide).
Indeed, writing tech articles on Medium has allowed me to get some extra income/free-time in between jobs, which I use to upskill myself and then share what I learn with the community (with some amount of friction regarding the paywall). This self-reinforcing loop is quite appealing to me, and - I would argue - aligns somewhat with my take on the Kantian categorical imperative.
For what it’s worth, I like the typesetting. Medium also has extremely good SEO, likely from some direct negotiation with search engines, I assume. Eventually I plan to move my tech writings to my own blog, with some sort of minimal ad system, no paywalls. Also, I usually unpaywall my tech articles after the window of high income dries up.
I updated the post to use the “friend link” which should allow you to read for free. (I didn’t realize you could edit the link on lemmy after publishing).
in which case I’d much rather pay directly to the authors.
All my stories have a link to my ko-fi at the end, but the income from that is significantly less than what I get from Medium directly.
Edit: Thanks @[email protected] for donating! Much appreciated!
sebastiancarlos@lemmy.sdf.orgOPto
Linux@lemmy.ml•Systemd's Nuts and Bolts - A Visual Guide to Systemd
1·4 months agoHmm, you must be Germænic or nordic. You know, places in which the soccer ball freezes during winter before the invention of frost resistant turf
sebastiancarlos@lemmy.sdf.orgOPto
Linux@lemmy.ml•Systemd's Nuts and Bolts - A Visual Guide to Systemd
1·4 months agoThanks bro, just doing my best to keep our kind employed and informed. Long live the machine whisperers
sebastiancarlos@lemmy.sdf.orgOPto
Linux@lemmy.ml•How To Become A Hacker: A Step-By-Step Guide
6·7 months agoEvery software system worth its salt should have safeguards against Nokia nunchuck attacks.
sebastiancarlos@lemmy.sdf.orgOPto
Linux@lemmy.ml•How To Become A Hacker: A Step-By-Step Guide
11·7 months agoYou probably have an extension which removes the “Friend link” query param from the URL
sebastiancarlos@lemmy.sdf.orgOPto
Linux@lemmy.ml•How To Become A Hacker: A Step-By-Step Guide
20·7 months agoThanks! I borrowed the open source katana bit from unix surrealism
sebastiancarlos@lemmy.sdf.orgOPto
Programmer Humor@lemmy.ml•Blur's "Boys And Girls" logic in Prolog.
4·10 months agoThis is a nice overview: CLPFD and CLPZ: Prolog Integer Arithmetic
sebastiancarlos@lemmy.sdf.orgOPto
Programmer Humor@lemmy.ml•The Christian and Traditional Family propaganda of Prolog examples
8·10 months agomother can be used in several ways. If both X and Y variables are uninitialized, then it looks for all mother relationships. If one of them is initialized, it looks for matching relationships. If both are initialized, it returns true if such a relationship exists.
sebastiancarlos@lemmy.sdf.orgOPto
Programmer Humor@lemmy.ml•The Christian and Traditional Family propaganda of Prolog examples
9·10 months agoDepends on how you want to define your domain knowledge.
The thing you need to define for sure is the predicate
mother/2(Which has arity 2, or in other words, two arguments). From then on, multiple options are available:- Take
mother(X, Y)as an “axiom”, and define mother terms for all elements:
mother(abel, eve). mother(isaac, sarah).- Derive
mother(X, Y)fromfemale(X)andparent(X, Y)terms.
mother(X, Y) :- parent(X, Y), female(Y).- Smash the institutional gender power structures and define only
parent/2terms instead ofmother/2andfather/2.
- Take





Thanks, one of your best