Re: How much?
Just go back to running your Doom clone under emacs, and leave the big boys play.
53 posts • joined 17 May 2017
This one hit particularly close for me. I was a SysAdmin at the same period, with the same infamous combo of Windows 3.1/TCP WInSocks stack/Eudora Lite. Throw a bunch of axious Unversity professors/researchers in the mix, and you have a nice cocktail of endless summonings-to-the-desk.
I even recall one of the researchers told me he started lowering the mail check interval incrementally "to see how far he could go before things went wrong". Ah, the joys of the scientific method.
I started my IT career in my early 20s, back at the second half of the 90s, as an internship at the Dean's office in my local University. I studied Physics there, and distributed my day between the Novel Netware over a coax bus and the various courses I was taking. At the time I also enjoyed sport climbing and MTB. So in the warmer months, I used to drop by the Uni with dreadlocks on my head, a black The Prodigy tank top, camo cargo shorts, Shimano SPD sandals, a backpack with studying material, a climbing harness, rope, etc. The professors at my courses didn't pay much attention to me, but knocking on an emeritus researcher door to fix their internet connection looking like that usually caused a look of disdain.
My usual answer was "I get it, you don't consider my look appropriate for the job I'm doing, but guess what: the faster I fix your mess, the sooner I'll leave. And if you don't ever need to see me again, you can take that as a measure of how well skilled I am!"
Brian's piece fails to address something extra: the hackers bribed their way into Twitter's infrastructure. Motherboard was in touch with a couple of folks involved in the hacking and they acknowledged paying some staff to get access to the necessary systems.
No SIM swapping happened, at least in that version of the story.
The piece about this at Ars techinca says the miscreants gained access by paying some Twitter staff:
Sorry, that's second hand info, the first source to those affirmations are at Motherboard:
This Chauvin guy had already been involved in at least another 4 previous minority killings by the Police force. Her wife also waited until he was detained to fill in her divorce papers. The guy has a tendency to inflict justice by his own hand, and that is not compatible with the definition of police, not in Minnesota nor anywhere else. Police upholds the law, it doesn't impart justice. That's why we have a justice system.
See, that's the issue. You're basically describing patriarchy here. And you are a victim of it, as many of us. You are being forced to adopt a certain dress code, dictated by someone who thinks a "proper man" should wear this or that. Excepting the women from said dress code could be based on chauvinism ("women aren't as professional/committed/essential as men, so they can dress less professionally", or "women can have a relaxed dress code because they adorn the workplace, while men should project an image of professionalism").
Sadly it didn't explain why no on had ever bothered to program R2D2 to speak a human language.
The basic premise of the Star Wars universe is that in order for you to communicate with a different species, you must understand its language, but not necessarily need to speak it, since your physiology might prevent it. So it kinda makes everyone a polyglot. It isn't any different with R2s, they are service androids and need to speak to machines, not humans.
3POs exist because the speaking apparatus for any given two races might be so different that an interpreter would make communication more fluid, and as a protocol droids they tend to filter out any rudeness in the speech.
As the title says, I tried to walk with my T470, a cup of latte on top of it on my right hand and a plate of croissants on my left hand from the kitchen to my home office, only to trip three steps away from my desk.
Turns out those little draining holes at the bottom of the keyboard are no match for a hot cup of freshly ground, freshly brewed, whole milk latte.
Not my brightest day I reckon.
Cutting some slack to Franco is the same as cutting it to Pinochet. They were both fascist bastards who used the "red menace" moniker to massacre the opposition. So they made a couple cheap buildings for the poor. Surprise! So did Hitler. The summary judgements carried on a lot or rural towns, where the Guardia Civil deciced the fate of common people in the same way the Inquisition did several centuries ago were a cabal display of the brutality of the Spanish fascist party. And Primo de Rivera should be expelled off the same premises where Franco's remains were held. To a dirty pigpen if possible.
On the topic of the identification of those buried in unnamed massive graves around the country, the process has led to a big healing and retribution process here in Argentina. I believe it should be an integral part of the process there in Spain too. It'll help the future generations to put in context the amount of brutality displayed by the Falanges.
No amount of attribution could compensate stealing 90% of someone's paper to build yours. Citation and reproduction must amount to a tiny fraction of a paper to be considered publishable. This guy just copies eveything and calls himself a self-taught genius.
On a different -but related- matter, if you look at his twitter most of the comments by asshats defending him are from Indian Youtuber wannabes. They are the ones calling him "senpai" "sensei" and so on. This guys is clearly "inspiring" them not to progress in ML, but in building a bullcrap career.
It was all due to the earlier versions of W95 calling it "trash can". Buto somebody up top heard recycling was cool and trendy, so they renamed it to "recycle bin". That kinda steered the users into thinking it didn't store the stuff you'd dispose of, but that you'd use for something else.
This doesn't excuse Microsoft from being the evil lizard people form the center of the Earth. This just tell you they are more dumb than evil, given the lousy development/programming ethics they embrace. Half their vulnerabilities rise from outdated IDEs, outdated/vulnerable libraries, non-corrected programming issues and other stuff.
Back in the day we finished a Windows PlateSpin migration with ~20 thumbdrives and one (large at the time) 240GB carry disk HDD. They were shipped in a single box via UPS from Atlanta to Rochester because the white collars didn't want to pay the extra cash for a decent network link.
When one of the folks went to the DC door to pick them up and got up to our war room, we all heard he dropped something as he crossed the door. A good ~45 seconds of silence followed, until he picked up the power source for the arcane external disk enclosure and said "Now I'm worth 16 million dollars, eh?" as that was the price of the migration/hosting contract.
I have been using dns66 for over a year now. Works great, and you can customize the block/exclusion list, or even add your own DNS servers. The only thing missing from it it's secure connection to DNS servers over HTTPS/TLS. Last time I checked there were a few folks on Github asking the developer to implement it.
Biting the hand that feeds IT © 1998–2020