I can’t force anyone to uncensor a post, but I can be annoying in the comments if they don’t.
I can’t force anyone to uncensor a post, but I can be annoying in the comments if they don’t.
At this rate, my entire comment history is just going to be mini freakouts about fucking cunts censoring “fucking cunt” on the internet. We’re allowed to be dicks here. Talking about dicks is fine.
Don’t bend over backwards to make this space advertiser friendly. Be weird!
Unpopular opinion: Gnome software is pretty solid, and if your computer usage patterns overlap with their design, it is quite a lovely DE. I’d rather have something that works well, even if it doesn’t do everything under the sun.
“fucking” for fucks sake.
This requires an Apple iPhone XR or newer, as the face scan utilizes the TrueDepth sensor.
I’d rather take a plaster mold of my face than have to use a specific phone to order a VR headset.
Moving back to a city!
Ey, congratulations!
Here’s a language that does bash and Windows batch files: https://github.com/batsh-dev-team/Batsh
I haven’t used either tool, so I can’t recommend one over the other.
Why do people censor fuck or other profanity on the internet? I don’t get it, and until now, I’ve been too afraid to ask.
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I mean, if you’re making a railgun, maybe superconducting magnets would be useful tech to have 🤔
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Corrupted initramfs?
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
Because the person creating the image didn’t take the time to optimize the image. It’s probably just a PNG or a JPEG, which is way overkill for representing a NES frame.
Other commenters have mentioned that the NES has 56 colors and uses tiles to draw the frame. If you took the same approach (maybe embedding a GIF tile in an SVG), you could cut down the size of the modern image significantly.