Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)FT
Posts
1
Comments
194
Joined
11 mo. ago

  • An index is something like S&P 500 - a (weighted) collection of different stock. Instead of buying a single stock, you could replicate this index, by splitting your money across all of its stocks. That way your risk is somewhat reduced, as the failure of a single company will not wipe out your entire investment. But that would be a lot of effort, as you'd constantly have to buy and sell stocks to match the index. For that, there are index funds. These are just big funds with a lot of money, which they spread over many stocks to replicate an index. You, in turn, can then buy shares of that index fund. These are typically traded at an exchange as well, hence the name exchange traded fund (ETF). Investing in the right ETF allows you to invest into the economy as a whole, and reduces risk from individual stocks.

  • Correct, that's not a hole in the topological sense. A famous example is a coffee cup: the handle is a (through-) hole, but the inside of the cup is not. As such, the coffee cup is isomorphic (=identical in terms of their overall structure) to a donut.

  • What turns me off is software that insists on running with unreasonable privileges. Rootless podman containers are the way to go – you can decide the privileges of the user account running the container, and the container image is inspectable (and tweakable if you find something you don't like). And for the devs, maintaining (just) a container image is way less overhead than managing distribution-specific packages for 5 different package managers and dozens of distributions

  • That's true, but nothing does. Once someone receives a message, you have no control over what they do with it (regardless of communication channel, encryption, etc.). I read the comment above more like "instead of jumping through hoops to get around the spyware in your operating system, use an operating system that does not come with built-in spyware instead".