|
Survey of Rust programmers indicates they enjoy using the language but writing production-ready code is sometimes a struggle. Insert almost any other programming language in that headline and it works
OK, maybe not perl
|
|
|
|
|
IDEs are about typing shortcuts, and there are a limited number of things that they can show us and people who aren’t going to see the docs outside of the IDE are unlikely to look through all the options that a cramped dropdown offers them. All right, but apart from providing a common toolset, syntax checking, debugging, auto-completion, and resource management, what have IDEs ever done for us?
This rant brought to you by the 80s
|
|
|
|
|
Kent Sharkey wrote: All right, but apart from providing a common toolset, syntax checking, debugging, auto-completion, and resource management, what have IDEs ever done for us?
Brought peace.
GCS d--(d-) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
"Hi, I am an idiot. Here's an article explaining why."
|
|
|
|
|
Kent Sharkey wrote: All right, but apart from providing a common toolset, syntax checking, debugging, auto-completion, and resource management, what have IDEs ever done for us?
DRAM Industry Veterans: "They put my kids through college"
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
SQL doesn’t have an open source ecosystem of software libraries to tackle certain common use cases, and that work across popular SQL systems. SELECT new vulnerabilities FROM shared_library
|
|
|
|
|
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published a list of free cybersecurity services and tools to help organizations increase their security capabilities and better defend against cyberattacks. In case you've heard recently that there are security problems around
|
|
|
|
|
As the article only mentions it and it was not so trivial to find (at least not for me...)
The list can be found in Free Cybersecurity Services and Tools | CISA[^]
Actually interesting. I knew some tools, had heard of others and didn't know about many.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
A new study shows that organizations continued to take an inordinately long time to fix vulnerabilities and fixed fewer known issues in their environments last year than in 2020. On the bright side: job security!
|
|
|
|
|
As a company that has embraced Zero Trust ourselves and supports thousands of organizations around the globe on their Zero Trust journey, Microsoft fully supports the shift to Zero Trust architectures that the Cybersecurity EO urgently calls for. If you think I'm going to make a "US government" and "Zero trust" joke, you're mistaken
I'm only going to allude to it.
|
|
|
|
|
George Carlin: I have certain rules I live by. My first rule: I don't believe anything the government tells me. Nothing. Zero.
|
|
|
|
|
Robert A. Heinlein: “Love your country, but never trust its government.”
|
|
|
|
|
I have negative trust. Consider that trust embeds a somewhat temporal component.
positive trust: I will trust you in the future.
zero trust: I don't trust you now.
negative trust: I will never trust you in the future.
|
|
|
|
|
A behind-the-scenes peek into the machine learning framework powering new code scanning security alerts. It looks like you're trying to write a bug. Would you like help with that?
|
|
|
|
|
Back in 2009 I wrote a distributed system for RFID tracking.
And now in 2022, my Win 10 install flags the binaries as "dangerous programs that execute commands from an attacker." What utter nonsense.
And the bad part is that it doesn't offer the option of allowing the files to exist on the machine.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Windows 10 or the Windows defender?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Nelek wrote: Windows 10 or the Windows defender?
Well the alert comes from "Windows Security", so your guess is as good as mine.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Richard,
Richard Andrew x64 wrote: And the bad part is that it doesn't offer the option of allowing the files to exist on the machine. You can purchase an EV code-signing certificate and sign your executable to reduce the threat score. This would prevent the security warning you are seeing.
|
|
|
|
|
Thanks for the tip. But why did they remove the option to allow the threatening files? Isn't it my machine?
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Well,
Richard Andrew x64 wrote: Isn't it my machine? I'm not a lawyer so I won't try to interpret the license. I will point out that the first sentence in section 2-A of the (English) Retail agreement[^] is:
2. Installation and Use Rights.
a. License. The software is licensed, not sold.
Richard Andrew x64 wrote: But why did they remove the option to allow the threatening files? I don't know your situation well enough to respond. I don't have any problems running executables on my machine. On my personal machine I use the Windows Defender Cmdlet[^] to whitelist my development folders.
|
|
|
|
|
Randor wrote: . License. The software is licensed, not sold. Everybody knows that. But philosophically, the software is just a guest in my hardware house. I make the rules over what happens on my hardware.
This is why it's such a conundrum. Microsoft usurping that authority is infuriating, I'm sure you can agree.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Randor wrote: On my personal machine I use the Windows Defender Cmdlet[^] to whitelist my development folders. Cool... didn't know about that. Thank you
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
.NET 7 builds on the foundation established by .NET 6, which includes a unified set of base libraries, runtime, and SDK, a simplified development experience, and higher developer productivity. And so it begins again
Because I'm feeling all quoty today:
"The Wheel of Time turns, and Ages come and pass, leaving memories that become legend. Legend fades to myth, and even myth is long forgotten when the Age that gave it birth comes again."
|
|
|
|
|
SlashData's Developer Nation (formerly known was Developer Economics) is the leading research programme on mobile, desktop, industrial IoT, consumer electronics, embedded, third party app ecosystems, cloud, web, game, AR/VR and machine learning developers, as well as data scientists, tracking the developer experience across platforms, revenues, apps, languages, tools, APIs, segments, and regions. You are here
assuming you completed the survey, of course
|
|
|
|
|
The AI was trained on a simulator to shape the plasma held within a tokamak. "So that you will learn by experience that I do not tolerate interference, I will now detonate the nuclear warheads."
|
|
|
|