Why compromise? Use 1-bit IP addresses.
The last Windows that had any MS-DOS in it was Windows ME, a quarter of a century ago. Everything since then has run on the NT kernel.
My favorite Windows drag-and-drop feature is that if ever I drag a file over the left pane of Explorer on its way to another window, the whole thing freezes up for a minute or so. I think it’s polling all the network drives just in case I might decide to drop it there, and since my NAS is turned off (it broke) it just waits until the connection times out. Of course in traditional Microsoft style this locks up the UI thread. I have to remember to drag everything off to the right and then go around.
Naming different things identically is a thing Microsoft loves to do. I still keep opening Teams or Teams instead of Teams. And I think there are at least three things on my PC called Copilot, and they haven’t even released Copilot yet.
I guess they say it each time they’re caught not prioritizing security. Then back to management as usual, prioritizing bullshit new features and marketing over security and bug fixes.
Asked if the men in the water had shown any signs of hostility toward Israeli forces, he told CBS News: “They were fishermen. They were fishing.”
When asked about the incident, which Elder first reported in an Instagram post, the Israel Defense Forces asked for an exact location and said it was looking into the claim.
Another day, another war crime. I can’t imagine the anger and helplessness these families must feel, seeing these assholes kill their loved ones for no reason other than their genocidal hatred and enjoyment of killing.
I think the main take on this is to learn the lesson that it is not safe to install random software you come across online. Is this lesson new, though?
I think people often have a vaguely formed assumption that plugins are somehow sandboxed and less dangerous. But that all depends on the software hosting the plugin. There was a recent issue with a KDE theme wiping a user’s files which brought this to light. We can’t assume plugins or themes are any less dangerous than random executables.
Why does it have a picture of Google’s CEO?
The fans will lap it up and all those Apple YouTubers will gush about how Apple’s new invention is the best invention ever. Apple has the advantage of owning a cult.
You just don’t want to do it regularly. It was an issue for a brief time when SSDs were new, but modern operating systems are smart enough to exclude SSDs from scheduled defrags.
I’ve been programming for almost 25 years and I’d still rather see too many comments than too few. A dogmatic obsession with avoiding comments screams “noob” just as much as crummy “add 1 to x” comments. If something is complex or non-obvious I want a note explaining why it’s there and what it’s supposed to do. This can make all the difference when you’re reviewing code that doesn’t actually do what the comment says it should.
Why not put the “why” in a comment and save people the job of dredging through old commits and tickets to figure out what the code is for? I’d thank someone for saving me the hassle.
Presumably they factored Hamas not willingly handing over the hostages into their planning. If their contingency plan for meeting resistance was just to bomb areas full of civilians until they could get out, it still shows a lack of regard for Palestinian lives.
All malicious extensions detected by the researchers were responsibly reported to Microsoft for removal. However, as of writing this, the vast majority remains available for download via the VSCode Marketplace.
Ah, the Microsoft tradition of always having the wrong priorities.
Because they’ll add it to the list of coercively and deceptively worded questions they force you to answer before you can use a WIndows account, phrase it so as to sound useful and harmless, and have a big friendly “Sounds great!” button and a tiny “No thanks, I prefer my life to be shit” link.
That’s what the article says. It seemed a little better than the usual clickbait because they got that out of the way early.
The article describes how the characteristics of this signal don’t match any of the current models for neutron stars or white dwarfs. So quite possibly, but the question is how.
On the other hand you can just call wherever you end up the destination, and no one can prove you wrong. 100% success rate.
I wouldn’t expect it to benchmark well, but it’s good that they’re making this available so developers can explore RISC-V on a good quality platform.