It’s not. PHP used to use the function length as hash buckets, so by having evenly distributed lengths the execution time was faster. No idea where GP came up with that.
It’s not. PHP used to use the function length as hash buckets, so by having evenly distributed lengths the execution time was faster. No idea where GP came up with that.
“What is this? A cross-over episode?”
I once had to go on a longer medical leave, couple of months. In preparation, I documented everything - pages upon pages answering all questions in easily searchable formats. For more than a month, any questions I got were answered with links to specific sections in the documentation, so people would know where to find everything. I put the links everywhere, in total there were at least 200 links to various sections of the documentation throughout all our communication mediums, as well as all information repositories.
After I came back from leave, most of the things I was responsible for were turned off. When I asked why, the response was “we didn’t find your documentation”.
I no longer care whether things keep working.
That would be a worthwhile idea if any evidence pointed towards it (e.g. any public documentation about legal communications).
Without any evidence, it’s a useless accusation for an explanation that:
I can accuse you of any number of horrible things, and I’d have the same amount of evidence you have for your accusation. What would this add to the discussion?
Then tell me: what else could the reason be? Why make people deliberately think you’re stupid? What’s the advantage?
And yes, this is a thing that happens literally to thousands of people every day. Almost everyone has a “I didn’t make backups” story. Humans aren’t born perfect - they make mistakes and learn from them. How many doctoral theses do you think are lost every day due to missing backups? Or how much art, how much data in general?
Instead of assuming some evil genius agenda hiding behind their stupid stated reason, you could just try to accept that people make mistakes. But you surely don’t ever make any, so why would anyone else?
They told you their reason: they were inexperienced. Why do you assume they must be lying, and hiding another reason?
“We lost access to the source code because we didn’t use VCS or make backups”
“Well, it would be rude to think they’re not smart enough to make a backup[…]”
No, what’s rude is assuming that people are lying to you without good reason.
To be fair, it’s really fun to work on that kind of animation. At least 50x more fun than debugging problems in your business logic.
Then I guess my laptop is just a fancy boat.
Nah, only actual string data is stored as text. Everything else is stored as binary: https://www.sqlite.org/fileformat.html#record_format
The file also isn’t written sequentially, it’s stored in blocks (pages), where sometimes later data can be inserted in the middle (e.g. when data was deleted).
That was pretty much my experience with most of MacOS - you have to pay for many basic features, and pray that the tools have been updated to work on current OS versions.
And what would be the advantage? It wouldn’t be routable through legacy systems, and you’d run out of addresses in a couple of years again.
Just as a warning, the macvlan stuff isn’t well documented and seems to have hard limits. I worked with it a couple of years ago and had to eventually read a lot of Docker code to figure some stuff out, and the host was only able to successfully set up 4 macvlan networks at a time - the fifth (and any following ones) were never reachable, even though I used the same scripts as for all other ones.
Things might have improved in the meantime.
Those were their first tests, of course there is a high chance they won’t run on all system configurations (especially since things like WINE comparability were likely detailed later). You should try artifacts built with the current version of the format (3 IIRC) if you want to give it a fair shot.
I just tried the current redbean build on Linux AMD64, and everything worked as expected (both launching directly, and through sh
). Which examples did you specifically try? Which sh
version do you use (I have 5.2.26(1)-release (x86_64-redhat-linux-gnu)
)?
The cosmopolitan
README has a section on the WINE thing, if you want to try and get it running.
No, it also works for ARM - you can even build a fat binary with an ARM -> x86 translation layer, i.e. one binary for both architectures!
What would it do? Delete all memories of a childs parents from their brain, making them think they’ve been orphans all along?
Alternatively a depressingly realistic look at the consequences of war for non-participating children, couched in the veneer of an 80s Sci-Fi movie.
I like “orphanize” - one of those things that shouldn’t be a word, but is!
No. Security through obscurity is bad security, but it’s still an additional layer. And since there’s literally no way to 100% ensure that a machine is being controlled by a human, there’s literally no other way except saying “fuck it” and not doing any security at all.