Why 10, 20, 30, 40, 50 instead of 1, 2, 3, 4, 5?
Why 10, 20, 30, 40, 50 instead of 1, 2, 3, 4, 5?
Having been to a total eclipse before, it’s really extremely obvious when it’s time and when it’s no longer time. It’s very different from partial eclipses. You can easily feel the sudden lack of actual sunlight.
Edit: adding on, I’m pretty sure if you keep the glasses on during the actual eclipse you’ll see almost nothing, because the outer fringes of the sun still exposed aren’t bright enough to show through those lenses.
Backblaze personal is $9 a month or $99 a year for unlimited backup. The first result on Amazon for a 4tb HDD is $85. Building a NAS costs the same as 2.5 years of this cloud backup for the drives alone, and doesn’t actually give you a backup at all. The costs scale even more poorly if you need to store more than your 8tb.
Not if you’re mainly interested in counting multiples of pi.
“A base is usually a whole number bigger than 1, although non-integer bases are also mathematically possible.”
I don’t think there’s any technical reason we can’t count in base pi
Don’t a lot of issues come back to learned helplessness? I’m in a good place right now, and I do what I can, but I also feel so disenfranchised in the US political system that it all feels completely pointless.
I think someone else said what it actually is in another comment. It’s functionally identical 90℅ of the time for me anyway,and I use CLI and vim on it.
Everywhere I’ve worked, you have a Windows/Mac for emails, and then either use WSL, develop on console in Mac since it’s Linux, or most commonly have a dedicated Linux box or workstation.
I’m starting to see people using VSCode more these days though.
I didn’t realize just how siloed my perspective may be haha, I appreciate the statistics. I’ll agree that cyber security is a concern in general, and honestly everyone I know in industry has at least a moderate knowledge of basic cyber security concepts. Even in embedded, processes are evolving for safety critical code.
… You know not all development is Internet connected right? I’m in embedded, so maybe it’s a bit of a siloed perspective, but most of our programs aren’t exposed to any realistic attack surfaces. Even with IoT stuff, it’s not like you need to harden your motor drivers or sensor drivers. The parts that are exposed to the network or other surfaces do need to be hardened, but I’d say 90+% of the people I’ve worked with have never had to worry about that.
Caveat on my own example, motor drivers should not allow self damaging behavior, but that’s more of setting API or internal limits as a normal part of software design to protect from mistakes, not attacks.
My take was that they’re talking more about a script kiddy mindset?
I love designing good software architecture, and like you said, my object diagrams should be simple and clear to implement, and work as long as they’re implemented correctly.
But you still need knowledge of what’s going on inside those objects to design the architecture in the first place. Each of those bricks is custom made by us to suit the needs of the current project, and the way they come together needs to make sense mathematically to avoid performance pitfalls.
I was gonna say, the OP here sounds perfectly good at computers. Most people either have so little knowledge they can’t even start on solving their printer problem no matter what, or don’t have the problem solving mindset needed to search for and try different things until they find the actual solution.
There’s a reason why specific knowledge beyond the basic concepts is rarely a hard requirement in software. The learning and problem solving abilities are way more important.
I greatly enjoyed the movie, especially how real it felt as a goodbye from Miyazaki. But I do think it was a bit disjointed, and the first half of the plot wasn’t as well done.
Try this one, I found it easier to at least think I understand what it’s talking about: https://www.quantum-munich.de/119947/Negative-Absolute-Temperatures
Basic attempt at eli16: Temperatures are defined by entropy, rather than kinetic motion like we’re used to thinking. In certain constrained systems, it’s possible to create a situation where there is a maximum energy state, and saturating the particles in the system such that they’re all close to that state creates a situation where the entropy starts decreasing (the system is less disordered since all particles are at the same maximum energy). That state where the entropy is decreasing is where negative temperatures exist.
End attempt. Disclaimer, I’m probably wrong, having spent just a few minutes skimming these two articles and trying to summarize what I understood.
… Okay, I just tried Stract, and its results are… Mostly not helpful.
My understanding is that Kagi makes an effort to tell you how they anonymize your search so they can’t tie it back to your account afterwards, whereas Searx is more dependent solely on the goodwill of whoever is hosting the instance. Both are good faith dependent in the end, but one has a profit motive for keeping that faith.
Edit: I hope Stract gets there and takes off one day, but today doesn’t seem to be that day for me.
Honestly nothing has changed since the OG tpb days, you can even still use tpb. BitTorrent should be replaced with qBitTorrent or something I think, I haven’t exactly changed my client in years. You have more choices of VPNs now if you care about that I guess. Some of the other old good trackers are defunct, but I think Reddit still has an actively maintained wiki of good public trackers…
I assumed they misunderstood how a 4 1/2 year master’s program works, since the masters part is technically only half a year on paper. But I don’t think that necessarily makes sense in context…
A quick search says Phobos orbits 3700 miles, aka 6000km, above the surface of Mars. A few thousand of either is in fact, correct.
Look up how HLS (HTTP Live Streaming) works. They just need to generate a personalized playlist for each person which points at things already hosted on CDN, and insert the ads where they want in the literal text file that your video player reads from to serve you the video.
I don’t know much about it, but it looks like there’s specific tags designed for dynamic ad insertion. Idk if YouTube plans to use them in this case though, if they want it to be undetectable to the client.