Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
0
Comments
984
Joined
3 yr. ago

  • I've always opened it with "terminal".Terminal is a program, and it can do WSL, powershell and batch. It has tabs and other modern features.

    Pretty sure CMD only does batch

  • EndeavourOS is nice. I've been using it for 10 months.Only issue I had was that my windows dual boot messed up the booting. Plenty of tutorials about fixing it tho, so wasn't too hard

  • I'm amazed it's France before Germany.But I'm also so happy that this is happening.The greatest war in history and all the horrors behind it should never be forgotten/hidden/suppressed/rewritten.Everyone commited atrocities in that war. Nobody is without stain.Document it all, and make it all widely available

  • I clean my windshield if someone is too close behind.The wind always carries some spray over the top and hits their car and they have to wipe their windshield.It might seem petty, but seems to trigger something subconscious that makes them back off a bit.It always seems to work

  • a high-risk warning from the UK’s NHS England Digital.

    Huh, I didn't think the NHS would be doing security research like this

  • The majority of Europe survives.Although their sockets are recessed.

  • Are they actually free?Are we maybe misunderstanding YouTube... A company?

  • I doubt it.Tripping over a cable is as likely to damage the socket as it is to rip the cable out of the plug.Any appliance that increases risk by being unplugged should probably not be using a consumer connection...

    I think the 3 pin layout caused a lot of headaches, and the integrated fuse required a user-servicable plug.So it would have to be a split-shell design of some type, where the appliance cable would have to be cable-gripped to the same part as the plug/socket pins.Thus, a bottom-entry (heh) cable grip and a removable back plate that can only be unscrewed when it's unplugged.This was all in a time of bakelite. Plastic wasn't flexible.

    But no, I think tripping over an early bakelite g-type (I think it's officially a g-type) plug cable would likely shatter the plug and pull the pins out of the socket... If it didn't also damage the socket.

  • Heck yeh! Great work.I think most critique has been covered.

    I consider too-many-indentations to be a code smell.Not actually an issue, but maybe there is....

    There is nothing wrong with your code, and no reason to change it (beyond error catching as you have discovered). It runs, is easy to follow, and doesn't over-complicate.

    I like descriptive function names and early returns (ie, throw or return on all the conditions that means this function shouldn't continue, then process the parameters to return a result).This could massively clean up what's going on.There could be a "getUserCommand()" that returns the desired number, or 0 if it's invalid.If the returned value is 0, then break.If the returned value is 6, then print values; then break.Otherwise we know the value should be 1-5.

    You could use an Enum to define the choices.This way, the print lines and the conditional tests can both reference the enum. It also removes "magic numbers" (IE values that appear in code with no explanation).In something simple like this, it doesn't really matter. But it improves IDE awareness (helping language servers suggest code/errors/fixes). And Makes the code SOO much more descriptive (Ie "choice == 3" becomes "choice == Choices.Product").

  • No, the cable comes out perpendicular to the pins (ie parallel to the wall).Which pretty much guarantees foot-pain orientation

  • This is big data.Like, people have talked about big data, people think they know what big data is.Big data is the kinda thing that lets target know a shopper is likely pregnant then act on that information.

    The difference is that a company has leveraged this against a different kind of public information - physical information (licence plates, in this case) - and developed and deployed the tech to gather the relations of that public information (alpr/anpr cameras), and has made it commercially viable (selling a useful analysis of that big data to police).

    Maybe they sprinkle in some AI to help with pattern recognition instead of having to rely on data scientists to do their wizardry. Maybe that's what makes this finally viable. Replace the expensive analysis with AI stuff.

    But there is nothing new new here.Alpr/anpr has been used to track cars for ages.On the small scale, making sure people pay for parking/tolls/speeding/congestion-zones.On the medium scale is just logging that data, and letting LEA query it (with a warrant?) to track a vehicle.This is now on the "big-data" scale. This is matching patterns against events and drawing conclusions.

  • Haha, same.Had a dual tuner pcie card.Had a great library of recorded movies, had it all set up to rip DVDs, photos were backed up to it and a slideshow album was set as the screensaver.I just missed the netflix integration, and there was never any decent replacement for that unfortunately.It was glorious.

  • Windows media center was really really good for live TV.

  • Yeh, bath/shower ones seem affordable.But for a standalone sink, they seem to be significantly more.

  • Ah, I missed that part of the conversation

  • Pretty sure the largest structures on the ISS is a toss-up between the thermal radiators and the solar panels.

    So massive expense to generate power and massive expense to dissipate the waste heat. You know, that waste heat that is already causing water issues near data centers on earth in an environment that we have had centuries of experience working in.

    Elon is tripping balls again

  • If that threat actor is building the technology, then yeh any threat actor could.

    The concern is the unknown unknowns inside the tech that might be controlled by said threat actors. So you can take all the precautions and add in resilience, but if it's all from the same threat actor then all that is moot.

    So the resilience and precautions comes from buying from multiple sources. Even developing our own production for it so what's inside can be known and regulated securely

  • You sure it's not WhatsApp that's link-shortening?

  • That sounds like a fantastic contribution to the fediverse.

    Sounds like suspicious behaviour. So removing and even tracking that kinda crap would be some great tooling!

    Perhaps an addition would be something that notifies people that interact with the deleted post/user to let them know of the deleted accounts behaviour.