Fuck, now I have to say fuck ten time to balance out the five censored fucks in this fucking post. Fuck this fucking noise, you’re allowed to say fuck on the fucking internet for fuck’s sake. Fuck.
This requires an Apple iPhone XR or newer, as the face scan utilizes the TrueDepth sensor.
I’d rather take a plaster mold of my face than have to use a specific phone to order a VR headset.
Why would the gift card be for the hospital? Could have been a prepaid credit card just as easily.
I know it’s a joke, but why would a shapeshifter 350 years into the future on a planet 50 lightyears away be guilty of any of the same prejudices that our local cops are?
Moving back to a city!
Ey, congratulations!
I’m going to say fuck twice every time I see it censored. Fuck.
Here’s a language that does bash and Windows batch files: https://github.com/batsh-dev-team/Batsh
I haven’t used either tool, so I can’t recommend one over the other.
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I mean, if you’re making a railgun, maybe superconducting magnets would be useful tech to have 🤔
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Corrupted initramfs?
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
I’d like Gentoo ebuilds to run in a fully isolated namespace/container with only the dependencies explicitly enabled by portage configuration. Something like a mix of nix but with the ebuild syntax.
Unpopular opinion: Gnome software is pretty solid, and if your computer usage patterns overlap with their design, it is quite a lovely DE. I’d rather have something that works well, even if it doesn’t do everything under the sun.