

I’ve been playing with systemd-nspawn for my containers recently, and I’ve been enjoying it!


I’ve been playing with systemd-nspawn for my containers recently, and I’ve been enjoying it!


Ironic that one of the biggest complaints about AI these days is that it’s stealing from artists, and the OP couldn’t even follow the CC-BY-NC license that xkcd is released under…


How does it compare to keycloak?


[D. Richard Hipp] designed SQLite in the spring of 2000 while working for General Dynamics on contract with the United States Navy.
Well today I learned!
Shit, that’s where my sex drive went. Can I have it back please?
I am aware. What processing is only possible in the cloud, and not locally?
Edit: My apologies, I didn’t realize you weren’t the same person I originally replied to. Please disregard!
Until homeomorphic encryption becomes a thing, cloud can’t be secure or private.
Why do you need homeomorphic encryption? Isn’t client-side encryption good enough for most use cases?


Mailing lists are pretty awesome. They’re like a decentralized forum. There are even good web UIs!
That said, submitting and reviewing patches over email suuucks.
I know it’s a joke, but why would a shapeshifter 350 years into the future on a planet 50 lightyears away be guilty of any of the same prejudices that our local cops are?


Here’s a language that does bash and Windows batch files: https://github.com/batsh-dev-team/Batsh
I haven’t used either tool, so I can’t recommend one over the other.
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.


That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
This doesn’t hold. Commit signature is a feature of git itself, even though the article chooses to focus on GitHub. And afaik github integration of signatures doesn’t break code hosting elsewhere, GH merely allows you to register your GPG signature with them so they’re able to validate the commits, but the author is still able to enroll the same GPG key to other hosts.
Not only that, but GitHub rewrites signatures on rebase (and sometimes on fast forward merge) with their own private key. Using signatures on GitHub is basically pointless.


There’s https://foundation.mozilla.org/en/privacynotincluded/ for privacy, at least.


https://en.wikipedia.org/wiki/Ares I think? Don’t understand the quotes though.


Should’ve been, “It was a mistake, in Heinzsight.”


That said, there are cases of players noticing emergent behaviour in games! For example: https://twitter.com/JoelBurgess/status/1428008041887281157
What advantage does it have over nspawn?