

Since it’s IBM sponsored/supported they probably didn’t want to tell the reader that you can simulate a quantum computer on classical hardware. So no need to use their service to use “the real” thing.


Since it’s IBM sponsored/supported they probably didn’t want to tell the reader that you can simulate a quantum computer on classical hardware. So no need to use their service to use “the real” thing.
I think with flatpak it’s fine nowadays. So I have the stable base Debian, but most applications are flatpak and for dev work I use containers or nix anyways.
Debian has proprietary software via opt-in through the non-free repository. However the Nvidia driver is horribly outdated so I had to install them directly. But now it works decently well. But my 1070TI is on borrowed time now no matter the OS 🥲


It works great for technical constructs. E.g. A Button is a UI element. But for anything business logic related, yeah it’ll suck.


For many of these, WebAssembly is critical to either their entire product or a major feature.
But I think this alone is not very convincing. We don’t yet see major websites entirely built with webassembly-based frameworks.
Why should it be necessary to build things only in wasm for the web? JS is a really good language for building frontends. There is a reason why lots of companies prefer building native applications with React. People always complain about framework bloat with JS, but then we want to hype up shipping huge wasm binaries? Just for basic interaction in a UI?
Wasm is doing great, inside and outside the browser. But it won’t replace JS because there’s no reason to do so.


Beyond that, in reality you would write logger.info() in both 99% of the time.


Others mentioned good points but don’t really capture the scale or techniques. A high volume DDoS may even overwhelm the network equipment, so simply saturating the network with garbage traffic. On the smaller scale, a server has limited resources to handle connections. So in the most extreme case, you simple run out of memory to store all the incoming requests. More likely you exhaust a thread pool or run out of connection handles. This “breaks” the server as it may not have resources left to recover to a working state even after the attack has stopped.
As for techniques, DDoS don’t just spam genuine requests. Usually the requests are malformed to have the worst impact on the servers. For example you only send the connection request without completing the full handshake. Now the server has to wait until the connection times out which consumes resources for a potentially long time.


A recent Scott Manly video about radiation in space https://m.youtube.com/watch?v=DJcbevbBzsc.

This devalues the currency making it harder to import things and if no one buys your exports you’ll have a very very sad economy. Printing money is possible but has very serious repercussions if you just yolo.


Debian is what you get if “dad getting off the couch noise” was a Linux distro.
https://socially.drinkingatmy.computer/objects/4df5b6b4-102f-4854-8721-480d56380e0c


I know you are talking about a TV show, but most of what we were told about the hymen is a myth https://www.bbc.com/future/article/20220419-how-the-hymen-myth-destroys-lives
TL;DR: “virginity” and the state of the hymen are not really related. Bleeding or pain during intercourse is also not usually due to the hymen, but lack of lubrication or forcefulness of the penetration.


I disagree. You are right that through federation and open source you can create your instance if another instance is a nazi bar. But now you open your new bar. Should you buy chairs from the nazis for your bar? Is it not a problem if the nazis are the only ones producing chairs?
That is to me the analogy with lemmy. Yes I don’t have to be on .ml. But I don’t want to sit on the transphobic, genocide denier built chair either.
Technology and society don’t exist in separate spheres and we should always consider them together.
So go with piefed if you can. I haven’t had any complaints since I switched :)


Now I can’t speak for a availability or how you can get insurance to pay for it in the US. I mean you don’t even have to have insurance in the US?
But most of your other points are BS my guy…
If you financially or through some other means cannot do it, sure. But most of the western world has decent access. So go to therapy. Women manage somehow.


Not sure if it’s very different in the US, but at least in Europe a lot more women use to opportunity to go to therapy compared to men. I.e. there is space if you look for it.
And for your second point, psychology is a science. Not without flaw, just like any other science. But it certainly works, especially if the patient puts in the work.
Hm TIL, fair enough. Thanks.
But chaining still seems harder than CommandA | ForEach-Object { DoSomethingWith $_ } | CommandB
I take PowerShell ForEach-Object any day over the unholy contraptions of awk, xargs and friends in bash.


Sanest lew lew clip


Never heard of it. Why do you need an app to download wallpapers in the first place?
In the comments they clarify that is mostly targeted at servers and IoT first. In the enterprise world attestation is absolutely needed. And on personal devices? I’d be very happy if I had a secure boot chain for full disk encryption working out of the box. At least for portable devices…