Oh See Paren Left Brace Whatmark
For loads of alternatives, see the Jargon File
Oh See Paren Left Brace Whatmark
For loads of alternatives, see the Jargon File
Gonna have to disagree with #3 - stopping Vim is not necessary for this. There’s the builtin :!
command.
Don’t forget /auto, for things that get automatically mounted when you first access them (autofs)
Slow down there - you’re making some rather large assumptions about why they have guns. Sure, some people have guns for “self defense” (some for valid reasons, others because racism). Others have them for hunting. Sometimes they’re inherited and have sentimental value.
Edit: Also, kids aren’t the only reason not to keep them loaded. Keeping guns and ammo separately secured introduces enough of a delay to reduce the risk of suicide, for example.
Pornography is
close tofull sex work
FTFY
That would be true for competent web developers. Unfortunately, those are a vanishingly small subset.
Not completely ignoring - I assume that was the swipe about “only engages in genocide reluctantly” was about.
Myself, I agree with you that we haven’t seen much sign of that reluctance.
Nah. This has happened with every major corporate antivirus product. Multiple times. And the top IT people advising on purchasing decisions know this.
Little Bunny Foo Foo, I don’t wanna see you …
Once it’s extracted, someone’s going to get that lithium. After the coup Elon vocally supported failed, that someone won’t be him.
The context is that the original version of the keyboard didn’t have the q a and z keys on the right side at all. QMK and similar keyboard firmwares have features that let a key send one code when tapped and a different code when held or pressed, and even another when double tapped.
The keyboard designer made themself a keyboard where ESC, Tab, and Shift keys were set up to send q, a, and z on a quick tap, and got so many comments on multiple videos asking how they could possibly use a keyboard missing three letters that they made another keyboard with the three cockeyed keys added on the right as a joke.
Favorite would be a highly customized zsh.
fizsh (not fish) is what I actually end up using, as I can’t be bothered to copy that config around and retune it for each machine. Gives me the syntactic sugar of zsh with common default options on by default, an OK default prompt, and doesn’t break POSIX assumptions like fish. Also Installs quickly from the package manager without needing to run through the zsh setup each time - unlike oh-my-zsh. And if I still need customization, all the zsh options are still there.
And that assumes no second hand
Exactly.
Depends on the cat. Surely true for a bonded pair like this, but I had one cat who for the remaining ~10 years of her life never got past the grudging acceptance stage when we adopted a second, then a third. That second cat reacted similarly when another cat joined the household years later.
Having known multiple trans people and heard them talk about the arguments for and against early disclosure: Fear.
They may not be public about their status, and fear exposure to family or coworkers seeing their public profile.
They may fear harassment from transphobes. This could range from DM accusations of pedophilia to religious screeds to doxxing to death threats.
They may be trying to avoid “chasers.” There are some people for whom a trans body (particularly a transfem body) is a fetish, who don’t actually care about the person inside. Plenty of transpeople don’t appreciate that kind of attention.
Fear of rejection. They may believe that nobody will respond if they’re open about not being cis.
Also two less fear-related (and less common) possibilities:
Ideology. To some people, specifying “transman” or “transwoman” reinforces a social distinction they find invalidating or don’t accept. How many profiles have you seen that specify themselves as “cisman” or “ciswoman”? For these people, it’s a way of rejecting cisgender normativity.
Maybe they just aren’t ready to talk about their genitals yet, or have their first conversation be about their surgical plans or history. Not only can get really repetitive having that be the first conversation with every single match, it means they don’t get any of the information they’re looking for about a potential partner until much later in the process and have to invest a lot of their own time up front. Just like you want the salient information you care about early on, so do they.
Something I haven’t seen mentioned yet - who is the company’s HIPAA “Compliance Officer”? If it’s anyone other than your boss, you could document the situation to them in an e-mail. If you want to be slick about it, ask them if there is “still any compliance need to keep the replacement machine ready or if it would be OK to repurpose it, given [your boss’s name here]'s decision not to move forward with the upgrade.” They’re on the hook for compliance violations, so they’ll likely see to it.
I would also suggest making a habit from now on of documenting verbal conversations that result in actionable decisions in short e-mails to the other party: " To recap our discussion, [bullet point list]"
You can excuse this as being for your own reference so you don’t forget any to-do items or so that they can correct any misunderstanding on your part, but it makes for a fantastic CYA if that ever becomes necessary. For really important items likely to bite someone later, print a paper copy if you don’t fully own and control the machine AND the e-mail local archive. Only bring those out if absolutely necessary, as in when SOMEBODY will be fired or you’re about to be legally scapegoated. They’ll save your butt once, but it will probably be time to start looking for another job because the boss will think either that you should have pushed harder earlier to fix the issue or be worried about their inability to scapegoat you in the future.
The fact that you already confiscated them. Since we’re talking hypotheticals though, you could confiscate those assets at the border. Or set up international treaties with a look-back provision.
Not true.
He can’t prevent anyone that received the code under the GPL from using (and distributing it) under the old license. He also can’t relicense code that he received under the GPL only under the new license.
If he receives a new license from the other contributors to distribute under a more restrictive license, he can do that because he has a dual license to the code and is not relying on the GPL for his right to distribute.