![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/c47230a8-134c-4dc9-89e8-75c6ea875d36.png)
the other stuff isn’t too wild either.
the other stuff isn’t too wild either.
how does it compare to yt-dlp?
Most Adobe tools don’t have any good free alternatives even for home use.
inkscape is on a level with illustrator (maybe even better)
for drawing: try krita
if you want to pay money (much much less than for adobe): Affinity is on a level with fotoshop
the goldberg-steamcrack supports multiplayer. https://gitlab.com/Mr_Goldberg/goldberg_emulator
I only tested it in lan, and it works great. Not sure if it works online, too. You may need hamachi.
And of course: online multiplayer with randos is probably not worth it, as others have pointed out. On one hands it’s probably a bitch to set up. On the other cheating is probably rampant.
who does the gene therapie work?
Do they inject mrna (like with the covid vaccine) or is there more going on?
the article is a little light on the technical details.
they were lied to by the landparasite
can’t you sue the landlord for false advertising in burgerland?
it’s safe to assume there are similar issues in closed source. A big part of the snowden leaks was about how NSA could access lots of data at will. It wouldn’t surprise me if they also could execute code.
Also there is stuxnet. But I am not sure, if there were intentional backdoors, or only some “natural occuring” RCE.
These are not the only two knee surgeries that exist, by any stretch.
If I was talking about every single kind of knee surgery, I would have said so.
This should be the end of it, but you went on and constructed a personal attack from your faulty assumptions. I think that merrits some more “defense” on my part.
When there is a statement without an explicit quantifier, the quantifier becomes ambiguous. Assuming the all-quantifier in this case was your personal decision. Since you construct an insulting argument from this faulty and intentional assumption, I can only assume malice. If the ambiguity was a problem, you could have simple asked. Or better yet: Do what everyone else did and click the link. If you still thought, the ambiguity was an issue, you could have just pointed it out, instead of making an insult out of it.
Please don’t spread medical misinformation
Tell that to someone who actually spreads medical misinformation. Not only was my joke correct, I even provided a credible source, which is far beyond what you can expect from a comment on a shitposting community.
it’s not helpful
the information, that many knee-surgeries only work through placebo-effect is very helpful. In fact my simplified and sensational (and true) claim probably made many people click on the link, which helped spread the message even further.
Also I think it sets a good example to provide sources for all interesting claims, even if it is on a shitposting sub.
yes, sure. But I would have counted those as “regular magic”.
The best knee-surgery meme is knee-surgery itself.
i.e. knee-surgery is fun, but it is not usefull.
is stateless possible without kubernetes? (and without vendor lock in?)
GP said:
RE: Containers, even if you DO go that route, do you really need Kubernetes, which will come at an additional monetary and also maintenance cost? The likely answer at least initially is a big fat “no”.
I agree, that good cloud engineers can save costs in the cloud. But I also think good non-cloud engineers, can save much much more.
When you are rewriting your entire stack to leverage cloud performance, you could probably spend a similar effort for a rewrite that increases regular performance by a similar factor.
RE: Containers, even if you DO go that route…
I was under the impression, that stateless stuff without containers requires a strong vendor login (aws lambda, google functions, azure function). Are you saying, I could do stateless without vendor-lockin and without containers and without kubernetes? This is news to me. Please point me to some resources
what does “get surprised on their own call” mean?
I’m no security expert and the sensible thing to do is using a library instead of taking a class.
Counterpoint: “not knowing your libraries” + “blind trust in the maintainer” will give you stuff like this: https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in
(the thread itself is worth a read. But also very impressive is the list of big players who fell for exactly this mentality)
offtopic: what is the significance of the reblogger in the screenshot? like, why didn’t they leave the top third of the picture in?
how to make a good standard:
step 1: copy from DIN
https://en.wikipedia.org/wiki/ISO_216#History