I just wanted to say ‘well done’ for going over what you said, realizing how it could be interpreted adversely, and admitting it. Not enough people are willing to do that, so well done!
I just wanted to say ‘well done’ for going over what you said, realizing how it could be interpreted adversely, and admitting it. Not enough people are willing to do that, so well done!
I reckon it won’t be long before we can just replace these sorts of inages with a short prompt and just have an AI generate the image on demand. We can swap bandwidth usage for energy usage instead. I’m not sure that’s a good trade, but with the way the internet is going that just makes it more likely to happen.
I was going to roll my eyes at another “is this loss?” comment and move on, but then I looked at the strip again, and yes ot is. How did it get everywhere like this?
We could save so much bandwidth by replacing all loss graphics with the string “122L” and a short explanation of the specific circumstances.
NaevaTheRat? You’re not really a rat are you? You’re a Drop Bear. This is exactly the sort of thing a Drop Bear would post to entice more victims people to come to Australia.
Seriously though it’s a country I’d love to visit one day.
Hackers aren’t the only way to meddle in an election, just the easiest to categorize and deal with.
Depending on what sort of shirt it is, could you considered sewing an interesting patch over the area? Take a sort of ‘visible mending’ approach? That way it just becomes one more memory associated with the shirt.
If you enjoy spicy foods (not necessarily hot, but richly flavoured) have a look at Indian cuisine. If you dodge the dishes that are more westernised most things are made with vegetables, and delicious. There’s a lot of variation between regions, so there should be plenty to keep you interested.
The sound waves are focused onto the tumor, so they only have enough energy to damage tissue there, and not anywhere else.
Think about focusing the sun’s rays through a magnifying glass; they’re only concentrated enough to burn at a very small area. The focused ultrasound is similar, although they’re probably using some form of phased array to get the equivalent effect.
Just adding another voice agreeing that I just want to block instance posts, not comments from their users.
If people really don’t want to see anything from an instance then they should join an instance that is bit federated with the one in question.
If blocking all users from an instance does get implemented I believe it should be separate to blocking posts as they’re very different use cases.
I only use CLI access over SSH to manage servers. Using a GUI is painful, especially working remotely. Even wjen I had to deal with windows servers I’d setup an SSH server on it and use powershell.
Ideally you don’t even access the server manually over that, but use a management system like Ansible or Puppet to configure and manage it.
If you enjoy writing documentation, creating tests or handling packaging there is any number of open source projects out there that would love your help. If you see a project that interests you at all, get stuck in!
I prefer lugnuts with boiling oil if I’m out and about.
Unfortunately there doesn’t seem to be a way to link to a filtered set of reviews on the play store, but If you go to the store, find the app, go to the reviews and filter by 1 star you’ll see them. Some of them just don’t understand how the app works, as you say, but there are a number that are harder to ignore. The thing ism if it is acting as a pseudo VPN, it could easily leak when the OS suspends it (for power saving, switching network modes or the like). Honestly, I haven’t tested it, it doesn’t do what I need (I’m on another VPN a lot of the time), and I wouldn’t trust it very far myself, but if it does what you need, that’s what matters.
I suspect the issue people have is that it is not possible for the average user to confirm that a block like that is working 100%. Seen as google control the OS they can just route their traffic around a block like that if they wish. Sending the data over 4g would mean you don’t even see it on your network traffic logs. There are a number of reviews suggesting it intermittently lets aupposedly blocked traffic through too, but the biggest issue maybe the way it works. As far as I can see, it acts as a VPN, but that means it won’t work well with other VPNs, which is another way the traffic can leak. Basically, installing an app like that doesn’t degoogle your phone at all, it just makes you feel like you’ve stopped your data leaking.
If you actually want to buy a significant quantity of a product like that from overseas (which I’m assuming because you mention a ship load) you’ll need to find and contact an appropriate supplier and agree terms, which will probably involve them supplying the goods ‘free on board’ meaning they’ll deliver to a port or ship and it’s your responsibility from there. Then you need to contact a shipping company to arrange the actual transport. You’ll also need to liaise with the customs departments of both the source and destination countries to get the paperwork in order. If you can find an importer in your target country, you might be able to agree terms with them and have them handle all of that. Then you’ve judt got to get it from the port to where you need it.
I don’t see any HTML when I look at that comment from Lemmy, but kbin seems to make a real mess of rendering code blocks. Basically that bit had a few lines of code they could yse to do what they wanted.
If you’re on Linux exiftool can get the creation date for you: exiftool -p '$CreateDate' -d '%Y-%m-%d' FILENAME
, and you could run tgat in a loop over your files, something like:
mkdir -p out
for f in *.jpg
do
createdate=$(exiftool -p '$CreateDate' -d '%Y-%m-%d' "${f}")
cp -p "${f}" "out/${createdate} - ${f}"
done
Obviously don’t justbgo running code some stranger just posted on the internet, especially as I haven’t tested it, but that should copy images from the current directory to a subdirectory called ‘out’ with the correct filenames.
I like it, this is clearly very enterprisey and solution focused, but I would like to suggest a couple of amendments if I may?
Namespaces We should make full use of namespaces. Make the structural tags be in a language specific namespace (to be referenced in every function spec, obviously) but change the in an out params to use the parameter name as the tag, namespaced to the function they’re for, with a
type
attribute.In memory message queues Have all function invocations be marshaled as xml documents posted to an in memory message queue. Said documents should use a schema that validates the structure and a function specific schema to validate the types of arguments being passed. Namespace everything.
I reckon we could power a medium sided country if we could generate energy from the programmers despair.