also the person apparently spent 2 million dollars to find the number. and the money is probably from stock compensation from nvidia
also the person apparently spent 2 million dollars to find the number. and the money is probably from stock compensation from nvidia
that does happen to be one of the defining characteristics of mersenne primes.
And searching for mersenne primes happens to be the easiest known way to find extremely large prime numbers (via the Special Number Field Sieve I believe)
Looks like the image I found cropped out the signature, seems to be jeremykaye.tumblr.com
deleted by creator
Garbage collection is still allowed, and technically JIT languages are still compiled so it really isn’t that restrictive
every single language (except Vlang of course) is memory safe if you program it perfectly.
Very, very few humans are capable of doing that, especially with C.
to be honest, 80% of their customers probably don’t even know what an emulator is and don’t follow news about nintendo
yeah, someone butchered an article and now it’s getting echoed like a broken telephone. Really it seems that qualcomm wants to buy intel’s “PC design department”, not the whole company (and even that seems very uncertain)
the credits for concord list 2000 employees. It was also in development for 6 years (I would guess it probably suffered “development hell”)
https://www.mobygames.com/game/229488/concord/credits/playstation-5/
fairly sure hezbollah has more than 2800 members
to be even more pedantic, if we follow the relevant official RFCs for http (formerly 2616, but now 7230-7235 which have relevant changes), a 403 can substitute for a 401, but a 401 has specific requirements:
The server generating a 401 response MUST send a WWW-Authenticate header field (Section 4.1) containing at least one challenge applicable to the target resource.
(the old 2616 said 403 must not respond with a request for authentication but the new versions don’t seem to mention that)
with another OS nix is not going to be “in control” so it’s probably more limited. I’m not sure how common using nix is outside of nixos.
also I’ll point out that many other linux distros I think recommend doing a full system backup even immediately after installation, the “grep history” thing is not very stable as eg. apt installing a package today will default to the newest version, which didn’t exist 1 year ago when you last executed that same command.
with nixos, the states of all the config files are collected into the nix configuration which you can modify manually. And if there’s something that can’t be handled through that, I think the common solution is to isolate the “dirty” environment into a vm or some other sort of container that I think comes with nixos
(and there’s always going to be “data” which isn’t part of the “configuration” … which can just be used as a configuration for individual applications)
assuming you have never used anything except apt commands to change the state of your system. (and are fine with doings superfluous changes eg. apt install foo && apt remove foo)
90% of them were so bored
the remaining 10% however
it’s replicable and “atomic”, which for a well-designed modern package manager shouldn’t be that noticable of a difference, but when it’s applied to an operating system a la nixos, you can (at least in theory) copy your centralized exact configuration to another computer and get an OS that behaves exactly the same and has all the same packages. And backup the system state with only a few dozen kilobytes of config files instead of having to backup the entire hard drive (well, assuming the online infrastructure needed to build it in the first place continues to work as expected), and probably rollback a bad change much easier
Rules of thumb can be very useful for a relatively inexperienced programmer, and once you understand why they exist you can choose to ignore them when they would get in the way. Clean Code is totally unhinged though
Trying to beat up someone holding a machete may not be the brightest idea