![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
This requires an Apple iPhone XR or newer, as the face scan utilizes the TrueDepth sensor.
I’d rather take a plaster mold of my face than have to use a specific phone to order a VR headset.
This requires an Apple iPhone XR or newer, as the face scan utilizes the TrueDepth sensor.
I’d rather take a plaster mold of my face than have to use a specific phone to order a VR headset.
Moving back to a city!
Ey, congratulations!
Here’s a language that does bash and Windows batch files: https://github.com/batsh-dev-team/Batsh
I haven’t used either tool, so I can’t recommend one over the other.
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
I’d like Gentoo ebuilds to run in a fully isolated namespace/container with only the dependencies explicitly enabled by portage configuration. Something like a mix of nix but with the ebuild syntax.
You use cards for offline authentication (bars/festivals/etc.), and use a different process for online authentication.
Proving someone has the physical card in their possession (which is what a reader does) isn’t really useful for proving identity when you can’t also check the picture.
Yes, this. Don’t put your whole home directory in git.
Pine and BeagleBoard have some decent options, but they’ll always be more expensive than rpi because of the economy of scale.
Basshunter, obviously.
This doesn’t hold. Commit signature is a feature of git itself, even though the article chooses to focus on GitHub. And afaik github integration of signatures doesn’t break code hosting elsewhere, GH merely allows you to register your GPG signature with them so they’re able to validate the commits, but the author is still able to enroll the same GPG key to other hosts.
Not only that, but GitHub rewrites signatures on rebase (and sometimes on fast forward merge) with their own private key. Using signatures on GitHub is basically pointless.
Chiming in to also recommend Gentoo. It’s a pretty stable rolling release distro, with access to pretty new packages when necessary.
Snaps just aren’t ready yet.
“fucking” for fucks sake.