Same here, I was getting frustrated thinking, I had to root my phone or smth. and then a simple force close helped.
Same here, I was getting frustrated thinking, I had to root my phone or smth. and then a simple force close helped.
All good points. I will address them in a later version.
The Cargo.lock thing is weird though, but apparently the builtin .gitignore of codeberg/forgejo has Cargo.lock in it.
Weird, I had not had this name already. Might rename it to yarcp (yet another remote copy). Thanks for the heads up.
deleted by creator
deleted by creator
deleted by creator
Shouldn’t that be:
DELETE FROM real_influencers WHERE name = 'Simon Riggs';
… Thanks. This looks super useful.
Edit: After posting I realized.that this sounds super sarcastic, which it wasn’t. This does look useful and I was already looking for smth. like that.
Although I mainly use InvokeAI
Yes, right. We could completely erase one third of exploitable vulnerabilities (by your numbers) only by switching to modern languages.
There is no good argument against that. Why wait for C or C++ to try and implement get another weird “solution” for those problems? (That no one uses then anyway)
First off, cause you are programming under windows, a lot of things will be harder for you. As seen on your problems with Python.
Most Linux installs have it right from the get-go and everything else is as simple. So giving directions for developers on other platforms might be much easier than what you had to go through. (Maybe use WSL?)
Let’s get to your real question:
How does one organize dependencies in a way easy for new contributors?
Since you will use Python, I will use that as example.
Most languages have a way to automagically import dependencies. Python has the requirements.txt file. Installing dependencies is then really easy. It is also a widely known way to do that, has lots of explanation online etc. so seasoned pythoneers will know what to do and younglings will get to know a good standard right away.
Bonus tip: If you don’t have a GUI library yet, maybe also search for game engines. They provide all the necessary tools as well, oftentimes have good GUI add-ins and are (mostly) for all mayor platforms.
You are right in that it isn’t (or shouldn’t be) part of the parsing, but the program has to check the blacklist even if it’s in a database.
GPL
That’s why I like fish, which shows matching commands you executed, so that you can easily redo them.
sudo usermod -a cdrom
Forgot the -G
and wasn’t sudo anymore…
I did recover eventually, but it was not nice.
source
is a bash shell built-in command that executes the content of the file passed as argument, in the current shell.
~/.bash_history
contains all the commands you ever executed in bash (the default shell in most Linux systems)
As a software developer who only has business customers, let me tell you the following:
No matter how foolproof your system might seem. It never truly is. There is always some idiot (sometimes with a degree) who just can’t understand/use it.
But they could still try and mostly succeed. They just don’t want to.
What’s your working environment like?
We’ve recently moved to a more “hip” location. We used to have personal desks, but now we have this “pick whatever spot is avaiable” open area. I dislike it a lot.
Lol. Same.
Nice “interview” with funny insights. As former ABAP-programmer (SAP systems) I see lots of familiarities.
The incognito mode start page literally tells you this. I do not know, how this is news.