![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
US Army logistics catalogs are organized this way. “Cookies, oatmeal” instead of “Oatmeal cookies” because it’s a lot easier to find what you need an a giant alphabetical list.
I’m an electrical engineer living in Los Angeles, CA.
US Army logistics catalogs are organized this way. “Cookies, oatmeal” instead of “Oatmeal cookies” because it’s a lot easier to find what you need an a giant alphabetical list.
Hook those coffins up to generators for infinite free electricity.
That’s weird, the watermark says, “I have altered the deal. Pray I do not alter it further.”
It’s a matter of trust. This is just the latest in a long and increasing train of Microsoft abusing their market power. They have proven, time and again, that they cannot be trusted.
Anyone who tries to pull an “I have altered the deal, pray I do not alter it further” gets a lifetime boycott.
I didn’t know about that. At my company, the head of HR (3.5x average salary) recently told everyone, “If you want a higher salary, go work at [rival company].” This was onstage in front of ~150 people.
Never ever ever store passwords in the database. Salted hash only. It’s fixed length even if the password is a gigabyte long.
My head canon is that Tony Stark has a superpower: everything he builds works the first time.
If it’s really complicated, like an entirely new Iron Man suit, then it might malfunction once in an amusing way. Then he tightens a screw and it’s perfect. It never fails outright or bricks itself.
In my experience, this is not how hardware or software development goes. I want this power so much.
Cowsay should be installed by default on every distro.
This post is horrifying, not funny.
[Citation needed]
Every reverse-engineering study I’ve read has been about the apps built in top of the Google API, not the Google binaries. Here’s one, and here’s another, and neither paints a flattering picture.
Maybe it’s possible to build a perfect implementation, but that is not what we got.
You know what does work? Masks and vaccines. Phone-based tracking was a dangerous waste of time.
The Google system allegedly shares hashes of a ID-number salted with a rotating timestamp over BLE. But it’s also a closed-source binary. Can you or anyone else actually inspect its implementation? Can you really guarantee it doesn’t have even the smallest design flaws?
This technology is exceptionally dangerous. There is very little difference between these two scenarios:
It’s voluntary (for now). It’s allegedly secure (for now). But did anyone actually benefit from this complicated system? All I see are downsides.
Q, the guy from Star Trek?
Good riddance. It’s a totalitarian privacy nightmare that never functioned as advertised.
Similar systems were widely deployed in Singapore, on the premise it would only be used to fight COVID. Then to no one’s surprise, law enforcement started it using for criminal investigations.
Once they’re built, governments cannot resist abusing such systems.
That’s literally just a torpedo.
Cowsay is a vital program. I’ve never understood why it isn’t installed by default in every distro.
But why does it need to run in the cloud?
CBOR for life, down with JSON.