|
In Venice, Italy, and surroundings, "mona" is a dialect word commonly used for "vag*na". Hence "Monaspace" sounds a nice place for bored guys.
Aside that, warm welcome for another useful font!
|
|
|
|
|
When engineers start out in their careers, finding a niche and excelling in it is all-important That's where they're tall, but have a really wide head
|
|
|
|
|
Or you dress like Dorothy, Blanche and Rose. Those girls had bigger shoulder pads than Bo Jackson.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
I’m begging you for the benefit of everyone, don’t be STUPID.
|
|
|
|
|
"Should develop"?
Because a non-dev knows more about programming than I do.
Yah, you should develop some skills, that's what the article is about. Written by someone who mastered none.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
A class action filed in a US federal court in San Jose, California, states that Intel was informed about the Downfall vulnerability in 2018, but the company didn't fix the issue in its processors and the flaw was independently rediscovered in 2023. Oh, you meant *that* flaw
|
|
|
|
|
can slow CPU performance by as much as 50% for certain "ordinary computing tasks,"
Let's be honest here, ordinary code is not full of gather instructions. How often have you even seen _mm256_i32gather_epi32 , let alone chosen deliberately to write it yourself? And yes, some compilers (not MSVC) may generate gathers even if you didn't write them, under some circumstances, not very often (and this was a mistake to ever do).
Gather was always, and still is, slow on AMD CPUs. For much more than 99% of the buyers, that is not a consideration. Even as a programmer you probably never noticed.
|
|
|
|
|
An error as small as a single flipped memory bit is all it takes to expose a private key. Nothing to PANIC! PANIC! TIME TO PANIC!
"The vulnerability occurs when there are errors during the signature generation that takes place when a client and server are establishing a connection. It affects only keys using the RSA cryptographic algorithm, which the researchers found in roughly a third of the SSH signatures they examined. That translates to roughly 1 billion signatures out of the 3.2 billion signatures examined. Of the roughly 1 billion RSA signatures, about one in a million exposed the private key of the host." <- You don't want to be that one in a million kinda guy
|
|
|
|
|
Gates said he sees a future where you "simply tell your device, in everyday language, what you want to do." Especially if it kills off all us meatbags
|
|
|
|
|
He assumes we know what we want to do
|
|
|
|
|
I don't know about you, but I want to make money.
|
|
|
|
|
bill gates is so rich he himself has become an ai
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
In the past few years I have been noticing an unsettling trend - software engineers are eager to use exotic “planet-scale” databases for pretty rudimentary problems, while at the same time not having a good grasp of the very powerful relational database engine they are likely already using, let alone understanding the technology’s more advanced and useful capabilities. You need to know which end is the handle
|
|
|
|
|
Reading and writing files is very common, just like other forms of I/O. I, O. I, O. It's all you need to know.
|
|
|
|
|
I. O., I. O., it's off to work we go!
|
|
|
|
|
"Microsoft steals access data" - When the well-known German IT portal "Heise Online" uses such drastic words in its headline, then something is up. "Gentlemen do not read each other's mail."
Yeah, I probably use that quote too much, but I think it's especially appropriate here.
|
|
|
|
|
Well, then to make up for using the quote too much, you must think up a blurb that surpasses it in depth and breadth!
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
This is very underhanded by Microsoft. I'm going to spread this link to everyone I know.
Microsoft might be getting called on the carpet soon.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Kent Sharkey wrote: Yeah, I probably use that quote too much You could always go with another overused classic for this case: MS: "All you base are belong to us!"
|
|
|
|
|
A tool bag that gave astronauts the slip during a spacewalk at the International Space Station is surprisingly bright and can be seen with binoculars. And that one had her favourite wrench in it
|
|
|
|
|
Good enough code is a nice middle ground between implementing a feature fast and maintaining the code quality. It's good enough, smart enough, and dog gone it, people like that code
Caution: It does contain a word that offends some people.
|
|
|
|
|
What word is that? "Quality"
To err is human to really elephant it up you need a computer
|
|
|
|
|
It’s a gadget designed for interacting with large language models, not apps, and for talking instead of typing. But it’s not yet entirely clear what you’re supposed to use it for. "One to beam up"
|
|
|
|
|
Do you ever read code and find it hard to understand? You may be experiencing cognitive load! Wash all code for 30 seconds, and rinse thoroughly before compiling
Just keep singing Happy Birthday while writing code for timing purposes
|
|
|
|
|
Microsoft’s GitHub subsidiary has a new Copilot Enterprise tier that can help developers work with their employers’ internal code, for $39 per person per month. And I'm sure it doesn't share that with *anyone else*
|
|
|
|
|
Organizer Yuga Labs is ‘aware of the eye-related issues’ and trying to ‘find the potential root causes.’ I lost all that money, and all I got was severe eye burn
and maybe a T-shirt?
|
|
|
|