This reminds me of a great video about this sort of principle in reverse: https://youtu.be/wBBnfu8N_J0
This reminds me of a great video about this sort of principle in reverse: https://youtu.be/wBBnfu8N_J0
I enjoy OpenMW and I’m happy to host if you want, although my instance is basically just me and a few friends right now.
I’ve used a number of different Linux distros (including Debian) on laptops over the years. Although most recently my XPS 15 was running Arch.
*rate, comment, and subscribe
Gotta get those five stars
I think they’re lawful evil, more devils than demons.
In my experience I haven’t had an issue because usually the refactorings are small. If they’re not I just hop on a call with the person who wrote the MR and ask them to walk me through it.
In theory I’d like to have time to dedicate solely to code health, but that’s not quite the situation in basically any team I’ve been in.
You should refactor as needed as you go because refactoring cases are never gonna be prioritised.
There’s a markdown entry thing in the drop down menu that’ll convert your MD to their formatting.
The web is built on hot linking hypermedia. It is more fragile obviously, but it distributes the bandwidth and storage load. If nobody hotlinked, then small forum admins/Lemmy admins/etc. have considerably more cost to bear.
Rust is roughly similar to C in most of these benchmarks and beats it in a few: https://benchmarksgame-team.pages.debian.net/benchmarksgame/fastest/rust.html
Arguably when LLVM gets a bit better, Rust can be even faster than C because rust can be optimised in more places safely than C code can. The issue is that LLVM wasn’t written with that in mind, so some performance is left on the table.
Go, Java, and Nim (in most cases) are all memory safe but are generally slower than C or C++ due to the ways they achieve memory safety.
Rust’s memory safety approach is zero-cost performance wise, which makes it practical for low level, high throughput, and low latency applications.
That flag exists, it’s called unsafe
for if you need to tell the borrow checker to trust you or unwrap
if you don’t want to deal with handling errors on most ADTs.
You can always cast anything to an unmanaged pointer type and use it in unsafe code.
A crash is different to a SEGFAULT. I’d be very surprised to see a safe rust program segfault unless it was actively exploiting a compiler bug.
As a compiler developer this speaks to me on a deep level lol
((a, b) => a ?? b)();
const fn = (a, b) => a ?? b
They’re both free software licences (i.e. you can get the source code for for BSD licenced software and GPL licenced software that you’re using at no extra charge and modify it as you please). The GPL licence has an additional restriction for developers that says if you use any GPL code in your codebase, your entire codebase must also be GPL or some other compatible open source licence.
This means that if I made some code parses a file format and another developer includes that code in their program to support that file format, they’re now forced to licence their whole codebase with a similar licence to the GPL. If it was BSD then they would only have to mention that they used my BSD licenced code and include a copy of that licence. A user would then be able to go and see my original code that was used, but not the rest of that application’s code or any modifications that the application author made to my code. Because the GPL is too restrictive for most developers here, there’s a version of the GPL called the LGPL which is often used for code meant to be used by other programs which is closer to the BSD licence but additionally requires that if they modify your code, they must also share that modified code.
I usually use a licence in the middle called the MPL (Mozilla Public Licence), which is similar to the LGPL but has a few things I prefer and has the advantage for me of not being connected to the FSF and GNU project.
I didn’t make the meme, I saw it on twitter and thought it was funny in a self deprecating way.
It uses other signals too, like what other sites you’ve visited with that checkbox on it, what CloudFlare has seen your IP address doing in the past, etc.
The google one is able to see if you’re logged into a google account and take that into account.
There’s even a new variant of the Google captcha that is invisible and doesn’t even bother to show a checkbox.