If a ceiling fan is on one of my boys will hide under chairs and couches and basically just skirt around from cover to cover. I think he thinks it is a bird.
If a ceiling fan is on one of my boys will hide under chairs and couches and basically just skirt around from cover to cover. I think he thinks it is a bird.
I also don’t mind if they are “selling” nothing, or just a supporter icon. As long as they are transparent that that is all you are getting.
I’m struggling to see how this actually made money. Because presumably the customer is paying for the delivery (as well as the food that was never ordered). So the fraudsters would just be paying themselves in a complicated way. My best guess is one of the following:
This article really keeps getting better and better.
poweroff
or shutdown
will work on almost every distro. Even systemd ones (they are usually symlinks but doesn’t really matter because they work).
They want to make money off of services, every service they offer requires a Microsoft account to purchase and use. Everyone that they force to make an account during setup is one step closer to paying for a Microsoft service.
There are obviously tradeoffs (less sales of these versions of windows and some users pushed away from Windows altogether among others), but the motivation is clear.
Just looking at the numbers, they are spending $5G and losing $1G. Their subscriptions are growing. So if they grow another 25% they are making money. (Ignoring infrastructure costs which are most likely a tiny fraction of per-user revenue.) They also just launched an Android app. So I think their story is looking pretty good. Not even considering that it raises the value of Apple TV hardware, their other devices and gives them more lock-in for customers in general that seems like a great investment they made.
But your case is wrong anyways because i <= INT_MAX
will always be true, by definition. By your argument <
is actually better because it is consistent from < 0
to iterate 0 times to < INT_MAX
to iterate the maximum number of times. INT_MAX + 1
is the problem, not <
which is the standard to write for loops and the standard for a reason.
Actually I would pick GIMP.
Really think only thing I would like to see is some screenshots and examples of using the tool, rather than just info on what it does. But the Photoshop page barely has this, just a few examples of the AI tools.
Is the limit 2 VMs or two macOS VMs? I thought it was technically a “licensing” restriction.
For .config
it isn’t as important to me, but putting things that can be re-created in .cache
(well the proper environment variable that defaults to .cache
) is very nice because I don’t need to back up all of that junk.
But it wouldn’t be unreasonable to put something like .config
in a git repo, and storing full history for large and frequently changing files is a waste of space if they aren’t really “config”.
It’s definitely an option. It will do the things that you want (as long as your phone is online, but that is the same for any other solution).
sending Signal messages with it would be less secure
Yes, this is because Beeper converts the Signal protocol to the Matrix protocol and vice versa. In order to do this it needs to access the messages. So it needs to decrypt the messages, then re-encrypt them on the other side. This means that the bridge (in this case operated by Beeper) has access to your messages. This is often referred to as “end-to-bridge” encryption, as it isn’t end-to-end anymore.
This is going to be true of any bridge you use that is hosted by a third party. You are always adding one additional trusted party into your communication.
the recommended bridge instructions sends me over to Beeper, since I don’t have my own server
Yes, to practically operate a bridge you need your own Matrix server. This is because the bridge will create a new Matrix user for every remote participant (every phone number you communicate with in this case). Doing this with regular mechanisms would be difficult (as signup is likely restricted in some ways) and inefficient (as each account would need to be checked for new messages separately). Beeper runs their own homeserver so that they can operate their bridges. However Beeper’s bridges are only available to users on the same homeserver (this is not a protocol limitation, just their choice). So in order to use their bridges you need to make an account with them (which you can, it is free IIUC). Beeper also offers custom clients which have special features for interacting with their bridges (for example making it easier to start a conversation with a new phone number).
The alternative would be to run your own server and bridge (or hire someone to it on your behalf).
This was intentional. The goal was to discourage the adoption of non-free codecs. They were partially successful, now AV1 is very widely supported (basically only older iThings that don’t have hardware decoding support don’t support it) which is a huge win because anyone can now deliver video on the web without needing a license to a proprietary codec. I would consider this fact alone a huge benefit and worth them holding other browsers asses to the flame.
Firefox on iPhone isn’t Firefox in the way that matters here. All iOS browsers are forced to use Safari’s rendering engine. iOS alternate browsers are just different UI and things like bookmark management on top of Safari.
I’ve been using nginx forever. It works, I can do almost everything I want, even if more complex things sometimes require some contortions. I’m not sure I would pick it again if starting from scratch, but I have no problems that are worth switching for.
Why fail when you can just do the wrong thing “successfully”?
Nice. There were a few comics that I followed on Twitter due to lack of them posting other places. But it is nice to know that if I find another account that I am actually interested in I will be able to get a feed.
This is my strategy. If I can’t bank on the website I find a new bank.
It is mostly about giving users tools to do moderation. So managers of communities can effectively apply policies and make it easy for people to share moderation decisions so that the work can be shared among communities that trust each other’s moderation decisions.
If the bottom can be seen at all that is completely unacceptable.