FYI the person with enough money to donate $300,000 to a programming language foundation is the founder of HashiCorp.
Data Science
FYI the person with enough money to donate $300,000 to a programming language foundation is the founder of HashiCorp.
If each lemmy instance has only a partial dataset
You can stop saying if. It is nearly certain that any instance only has a partial dataset in the same way that a search engine only indexes a partial dataset of every web page.
If this is the case: what happens if a bad actor subscribes to all communities of all servers?
There are bots that were built to do exactly that. I wouldn’t call them bad actors unless the instance owner prohibited such actions.
Perhaps the following rewording of your last sentence would be easier for readers to follow along:
With a lack of precision, 1/3 might become 0.33333333. When evaluating the expression 1/3 + 1/3 + 1/3, using 0.33333333 as an approximate representation of 1/3 will return a result of 0.99999999, instead of the correct answer of 1.
That link didn’t work for me.
That’s an entry point into programming that’s not for everyone. It seems like the poster is looking for something more hands on and pragmatic rather than technical and academic.
Or The Odin Project if you don’t want to cover Python in the curriculum and just stick to JavaScript.
https://www.theodinproject.com/
(The Odin Project also has an option for Ruby along with JavaScript)
A git commit is a snapshot. The node-based tree structure is an artifact of recording pointers to other snapshots and labeling snapshots with a branch name.
I think they’re using it strictly in Tiling mode and are using directional switching. I generally work with only one window visible so I’m not sure how much I’m going to like COSMIC where that workflow seems not to be the primary focus. But it is only in alpha and I’m not actually going to give it a real try until it becomes the default in Pop!_OS. I Hope it’s not too big an adjustment for me.
I was just guessing based on the SwapWindow name. That you copied definition doesn’t help me understand what it’s supposed to do.
I’m surprised that [Super] + [Tab]
and [Alt] + [Tab]
aren’t exactly what you’re looking for because System(WindowSwitcher)
seems like the name of something that would do exactly what you’re after.
I haven’t installed COSMIC, so I can’t test it all out myself right now. But it feels like something that should exist as you described.
Maybe [
? ] + x
See:
https://github.com/pop-os/cosmic-comp/blob/master/data/keybindings.ron
He made up hypothetical scenarios that nobody asked about, and then denigrated Rust by attacking the scenarios he came up with.
This seems to be the textbook description of a strawman argument.
It’s also a microkernel and intentional not POSIX compliant (but it’s close to compliant). I like the project, but it’s very experimental on purpose, so we should set our expectations accordingly. I’d love to see it become a success, but it may not be or it may only be successful in a smaller niche than the current Linux ecosystem.
That said, it seems very open to new contributors. I hope more people can help it along.
That’s a nice addition for those that want security over convenience. I wonder why it took them 11 years after this was written to add it.
Some key quotes from the article:
It’s perfectly reasonable for a consumer cloud storage provider to design a system that emphasizes recoverability over security. Apple’s customers are far more likely to lose their password/iPhone than they are to be the subject of a National Security Letter or data breach (hopefully, anyway).
I wish that companies like Apple could just come right out and warn their users: ‘We have access to all your data, we do bulk-encrypt it, but it’s still available to us and to law enforcement whenever necessary’.
So what is the alternative?
Well, for a consumer-focused system, maybe there really isn’t one. Ultimately people back up their data because they’re afraid of losing their devices, which cuts against the idea of storing encryption keys inside of devices.
You could take the PGP approach and back up your decryption keys to some other location (your PC, for example, or a USB stick). But this hasn’t proven extremely popular with the general public, because it’s awkward — and sometimes insecure.
Alternatively, you could use a password to derive the encryption/decryption keys. This approach works fine if your users pick decent passwords (although they mostly won’t), and if they promise not to forget them. But of course, the convenience of Apple’s “iForgot” service indicates that Apple isn’t banking on users remembering their passwords. So that’s probably out too.
This is a consistent problem for me
Good info! Thanks!
I wonder if Deno will expand compatibility further
I’m going to give this a try. Thanks for working on it!
Scrum lends itself to procedural nonsense. It’s rarely implemented in a way that improves project management.
It seems there’s room for both