Weaponized… sounds dangerous…
Weaponized… sounds dangerous…
What does full CMYK allow you to do that RGB editing doesn’t? (Genuinly curious)
IIUC pingora is not standalone, but a set of rust crates? Should be already supported by nixpkgs through rust builders.
Didn’t get a single reqeust, so this had less impact than expected. Thought there was more old rusty companies looking for a non-retired engineer.
I wanted to see what the COBOL job market looked like. So I learned the superficial basics of COBOL in a day or two, just so I wouldn’t be a complete fraud when I put it into my linkedin profile as a skill to see what happens.
They got suspended sentences. The author of the article didn’t do their research (probably an LLM anyway).
I thought it was pretty funny.
The courts, probably. That’s what they are for.
Can anyone explain the “professional developers” percentages to me?
What’s the threat model here? I can think of no DNS shennanigans that would not be detectable through the authentication mechainsms in TLS (chain-of-trust). Not having to trust network infrastructure is exactly what TLS is for.
What is it that you’re doing that is still not using some form of authenticated encryption? Almost everything is https, ssh, almost all mailservers have tls support, irc does have tls support… What’s left that needs to be encrypted by a VPN?
How do you know?
I’m not sure I agree that Void is a bottom type. If so, void-functions would never be able to return/terminate. Java’s void is probably more of a unit type.
What were the reasons?
*Every Swiss male has to enter the military unless unable or unwilling to.
No Swiss person has to enter the military.
I’d also like to see proof of the first claim. Germany’s Grundgesetz Art. 20 (4) gives the right to oppose but doesn’t require it.