a reverse proxy these days is pretty much just a requirement of any dynamic service. they often run on the same host as the software
a reverse proxy these days is pretty much just a requirement of any dynamic service. they often run on the same host as the software
on a technicality, debts like this are not legally dischargable through bankruptcy
any efficiency gain outside a bottleneck doesn’t effect the end result at all: if you make things more efficient before the bottleneck, things just pile up before; if you make things more efficient after the bottleneck your resources are just waiting for work
in the context of storage, this means that if you don’t have hardware capable of using the data provided by the storage controller, or flash capable of feeding it then really there’s no point in having it
battery efficiency is of course cumulative, but as the author points out… meh; this is a drop in the ocean
until they lose a multi billion dollar mission because of conversion errors
carrot man in melbourne, australia
https://www.theguardian.com/australia-news/2023/nov/12/melbourne-fitzroy-carrot-man
well, there’s a schema description built into compliant graphql apis and a tool called graphiql that consumes that and provides exactly that api explorer that you’re looking for. many graphql backend frameworks embed graphiql
personally, i can’t stand either fluent or material either - the modern components and design language i keep coming back to is ant.design
anything skeuomorphic is just a huge waste of space - they add so much detail to the screen that has no function other than signaling “real world” application
he also hated non-skeuomorphic design, and yet here we are for the better in a world where we’ve moved on from that dated concept
just because he didn’t like something doesn’t make it wrong for apple to pursue
better a progressive republican that an extremist republican, and those are your choices. reality sucks; deal with it or be prepared for the consequences
i’d say that it’s a security vulnerability, but breach implies it’s been used
i don’t think you understand how IT works… there will always be vulnerabilities… even the NSA probably has vulnerabilities… when found, these vulnerabilities need to be patched. i’m sure they’ll get their devices back; they just need to implement a fix
none of this is perfect, but shit happens and all we can aim to do is minimise the damage when it does happen
definitely not what people are talking about when they say front end though
that’s not an alternative. i agree that’d be preferable, but given where the situation stands, what’s the concrete action to take to remedy the situation?
and the alternative is…?
it kinda doesn’t though… in fact it might be worse. say you take a common carbon credit scam: “protecting” forest that was never going to be cut down anyway
you pay $3 in carbon credit to cover a flight… that money from you as the consumer went to someone wealthy enough to set up that company to run that scam. they’re likely a multi millionaire
as a consumer who chose carbon credits, you’re probably making pretty reasonable choices elsewhere in life: trying to recycle, buy sustainably where you can, etc
the multi millionaire now has that money however. it’s been repeatedly shown that these kinds of people have an absolutely enormous carbon footprint (obligatory fuck that term and its associated “it’s your fault” marketing from big business) compared to us regular folk
worse than that even, if you’re immoral and don’t care about the environment enough to run a carbon credit scam, you’re sure as shit not going to be doing anything sustainable… this is the worst kind of person we’re dealing with: the coal rollers of the world
or, continue making coffee while asking it to remind you to buy milk instead of either stopping to tap or completely forgetting which are the only possible outcomes
that’s not what the quoted text says at all… let’s rephrase this:
much like how users of one lemmy service such as lemmy.world can still reply to users of another service such as kbin.social, users may still view content and interact with users on any other instance in bluesky
this doesn’t say that lemmy/kbin isn’t part of the fediverse. it takes no position on that fact, merely saying that the things conceptually work in a similar manner
peer to peer is an option too
then he’d have at least 1 kid that doesn’t hate him
it’s possible, but that would seem… odd… for such a large and tech-savvy instance. there’s a lot of reasons why this isn’t a good idea, and very few technical reasons why it is
my guess is that it’s less about obscuring server location for privacy reasons as is the implications in this thread, and more about handling changes cleanly or something like that - in which case, sure it obscures the server location but more that it makes the server “location” (or hardware, etc) irrelevant and fungible