• 0 Posts
  • 104 Comments
Joined 10 months ago
cake
Cake day: June 23rd, 2024

help-circle





  • Do programmers actually like bash?

    I’m not a programmer and I really don’t like bash. Not because I don’t like shell. In fact I do like fish as a shell. But bash always feels super weird. Unfortunately that’s kind of the compatibility baseline on Linux (I don’t think any relevant system needs strict sh compatibility). But better bash’s weird arrays than none at all, plus process substitution is handy.



  • I only had Windows 8 on a notebook that I bought and wanted to give it a try again, however I switched the machine over once I learned that it couldn’t be updated to 8.1 through normal updates, but that you had to use the store, because they were really trying to push the store. Also my NAS used NFS back then, which my home edition of Windows didn’t support, I think you need professional.

    These two things pushed me to migrate the notebook as well












  • Well, not really. Twitter was his own private property that he bought with borrowed money secured against his Tesla shares. xAI on the other hand is financed by investors whose money he used to bail himself out at a price he made up himself since Twitter is no longer publicly traded. So this is, in my opinion, misuse of investor funds; the picture would be true if xAI used how own money to do this, but no.

    On one hand,I think this is serious fraud. On the other, my understanding for anyone investing into his companies is very limited, there are so many red flags on so many levels.


  • But it’s geared for the convenience and privacy of the average user not military security.

    Military security (or military grade whatever) is a buzzword that makes sense in some contexts. In a lot of them, it doesn’t.

    For example, for a lot of military-grade products you can have assumptions that are not always given for a platform that messenger operate on. Like that the device is always stored in a secure location. That it’s administered by trained personnel. That the device operator has received training on proper usage etc. In fact, a lot of military systems probably couldn’t be operated securely in a John Doe context b because of environmental security requirements. In that regard, messengers have to be more secure.