

New hires are often worse than useless. The effort that experienced developers spend assisting them is more than it would take those developers to do the work themselves.
New hires are often worse than useless. The effort that experienced developers spend assisting them is more than it would take those developers to do the work themselves.
If you are running an AC, you might be able modify it to reduce the humidity.
AC units naturally dehumidify (as TC points out, they are essentially the same thing as traditional dehumidifiers). However, the amount of moisture they pull out is mostly related to how long they are running, not how cold they can get. This means that if you have an overpowered AC, you get less dehumidifying effect because the AC is on less.
Some ACs let you reduce their power, which will increase their duty cycle and increase the amount of water they pull out of the air. It also helps improve their lifespan as they need to cycle less.
The Westbank is part of Israel. Various parties have their own motivations for pretending otherwise. But the facts on the ground are a one state reality. And that singular state is an Apartheid one.
How do you get the folder?
The trick with initramfs and initrd is that the kernel does not read them into memory. By the time the kernel boots, they are already in memory. This let’s you move a lot of initializing logic out of the kernel and into userspace. In some sense, this just moves the problem to the bootloader. But the bootloader already has to load the kernel, so that is no real loss.
This is also incredibly useful for stateless VMs. You do not need to futz around with virtual drives. Just put everything you need into a CPIO archive, then pass that and and your kernel into QEMU (or your emulator of choice) and it will just work.
My big complaint with Wayland is that the ecosystem has not really developed an effective standardization process.
With web browsers, you would get browsers doing their own thing; then copying each other’s thing, then writing down a standard for that thing, then all switch to the standard.
With Wayland, you get: https://wayland.app/protocols/ For as old as Wayland is, there are 5 standard protocol extensions (plus some updates to the core protocol). A bunch sitting in the standardization pipeline. Then a whole bunch of redundant protocols because each compositor is just doing their own thing without even attempting to standardize.
It doesn’t help that one of the major compositor (Gnome/Mutter) has essentially abandoned Wayland for everything beyond the core capabilities in favor of offering additional functionality over a separate DBus interface.
The problem in Gaza is not a lack of money; or even a lack of food. It is the regional superpower using its overwhelming military support to block food entry and distribution. While explicitly blocking all organizations with a history and track record of successful aid provisioning in challenging war zones. Then replacing it with their own potenkin aid agency as members of their senior leadership talk openly about using starvation as a weapon of war.
Even in the most charitable reading, donations like this do nothing to help on net. Assuming it is not an outright scam, you are just giving this one family some of the limited supply of food in Gaza. That means that you are depriving someone else in Gaza that food; because you did not actually introduce more food; and, one way or another, that food was going to get eaten.
Adding more money to the equation does help fund the gangs running the food black market. I don’t mean to imply that such gangs are responsible for the crisis (they are not), or even that they are inherently bad (in a well run system, profit oriented local groups providing last mile distribution can be helpful). But, in this case, they are at best neutral.
If by “Nazi”, you mean the ~8 million registered members of the Nazi party, then to a first approximation, we left them alone.
And what is the EU going to do about it? Governing bodies can declare extraterritorial laws all they want, but they are meaningless unless they have a way to enforce them.
Russia’s invasion didn’t help, but hasn’t seemed to trigger major proliferation concerns. In particular, Ukraine has no given any indication of pursuing nuclear development as a result. Indeed, doing so would put their much needed military aid at risk. All indications is that other countries that feel threatened by Russia are making similar calculations.
In contrast, Iran pursuing a nuclear strategy is very much on the table. We’ve established that their ability for conventional self defense is woefully inadequate; their proxy network has been severely degraded; and their prospect for a diplomatic solution has been repeatedly undermined.
If Iran does get nukes, that could be a catalyst for others in the region to do so as well.
This has been solved for over a decade. Include a linter and static analysis stage in the build pipeline. No code review until the checkbox goes green (or the developer has a specific argument for why a particular finding is a false positive)
Because ethnonationalism is a coherent ideology.
I’m don’t know any ultra-Orthodox but do have several friends/family that keep kosher, and all of them are satisfied with just keeping two sets of dishes (although some just have one set and are satisfied that washing them count).
The disposable dishes, cooking in foil, and such comes up when they visit someone like me who does not maintain a kosher kitchen (and even then, only one family actualy cares enough; but, as I said, they are not ultra Orthodox)
Tolerance, inclusivity, and integration.
To put this into perspective, the legal fact that “everyone”[0] is welcome in a given public school was not established until 1954 with Brown v Board of Education. And segregationists lost there mind over this.
In 1957, president Eisenhower had the 101st airborne division invade Little Rock High School, after Arkansas deployed it’s national guard to block black students from entering.
[0] In terms of race. Restricting access to schools based on home address remains common, and has ended being used as a way to effectively segregate schools without violating Brown.
If you are building a static system, SELinux is amazing. You need a few lines of policy per application to label things appropriately, then you can see what accesses programs made and decide if you want to allow them or not.
Taking a full Linux system and adding a locked down SELinux policy can be done in less than a week. If you are starting with an SELinux enabled system and just want to lock down your application, it can be done in less than a day.
Once you know what you are doing, there is also a pretty powerful policy analysis tool that lets you see what a given domain can do; including transitive things like “domain sandbox_t can launch a program in Domain vim_t, which can write a file in Domain sshd_config_t, which can be read by domain sshd_t” which may indicate that your sandbox has a hole allowing it to compromise your sshd configuration. Although, to be fair, doing this level of analysis is not simple, even with the tooling. And you very quickly notice issues that are inherent in how Linux works.
The problem with SELinux comes when you try applying it to general purpose systems, because you do not know ahead of time what the user will want to do. To be effective, policy needs to be written for the specific system it will be running on.
An example I like to use is Android. Android makes great use of SELinux, and is a general purpose system. But the SELinux policy itself does not protect the general purpose Android system. It protects the special purpose system that is the Android runtime. All apps run with the same policy that says things like “cannot access the filesystem at all, unless given access by the Android runtime”, then the actual security policy users see is all implemented in use space by Android. SElinux is just a means of preventing apps from bypassing the Android permission system.
Also, AppArmor might not exist without SELinux.
When the NSA first implemented SELinux, they did so directly, but were not able to get that merged into mainline because there was concern that SELinux was not the correct solution.
What they ended up doing was creating the Linux Security Modules (LSM) framework, which is just a bunch of hooks in the kernel that a module can implement. SELinux was then rewritten as LSM module. This allowed other solutions like AppArmor to be implemented without any invasive work; they could just plug into the same system SELinux used.
Some time later, the ability to run multiple LSMs at once was added.
Incidentally, Linux capabilities are also implemented as an LSM.
Volatility has always been built into investing, including index funds.
If retirement is a long way away, then this is a non event. If retirement is close and your 401k was in a target date fund, you are heavily invested in bonds at this point, precisely to deal with this sort of situation.
If you are close to retirement, and heavily weighed to tech heavy indecies, then this will probably delay your retirement a few years. If you’re already retired and so invested, you may have a problem.
In fairness to the PA, Palestine has an approximately 0% chance of winning a war against Israel. And an approximately 100% chance of them getting blown to pieces if they ever had an attack successful enough for Israel to fully mobilize against them (see Gaza).
Their most likely to succeed strategy would be pursuing victory through the Israeli court system (which was relatively on their side, leading to the attempted “court reform” power grab that was the political story in Israel prior to October 7). Their next best bet would be Israeli politics moving away from the current right wing nationalist coalition.
That is not to say that any of the above is easy, or likely to succeed. But at least it has a plausible chance. And, if it fails, that failure still leaves them better off than a war against Israel.
They haven’t finished step 2 yet. Hamas is only releasing 3 hostages a week during phase 1. Male Israeli soldiers are not scheduled for release until phase 2.
Under current law, you would need to kill 22 people before replacements can be appointed. Possibly less if some of them are not constitutionally eligible to be president; but if it ever got to that point, I suspect we would ignore that provision.
Pulling this off is made even more difficult by both the heightened security given to everyone in the line of succession; and the fact that under our continuity of government plans, those people are deliberately never all in the same place at the same time.
Anything that could accomplish a full decapitation strike would likely require marshall law anyway, and would likely make the conditions for an election difficult.