

You can watch the end of the episode on HeTrumpedUs.com, I don’t think the article gives it enough credit for the thing they pulled.
I would have never guessed they get this aired, they are really not giving any fucks.


You can watch the end of the episode on HeTrumpedUs.com, I don’t think the article gives it enough credit for the thing they pulled.
I would have never guessed they get this aired, they are really not giving any fucks.
Floating point rounding issues are basic comp science issues. Hopefully nobody thinks that those are JavaScript quirks.
For efficiency you should you GOTO, so you can join trees that end up in same position.
Like those create your own adventures books.
I did chmod -R 666 / when I started playing with Linux in 1999. It did not end well.
Sudo didn’t really exist back then, you ran things as root like real men. /s
D365 ain’t really even that bad. It is just model driven power platform app. It is actually quite expandable, you can code it with plain javascript or more complex components on React. Backend is OData which is quite flexible.
Old Dynamics AX and onprem CRM were shit shows.
Visual Studio debugger is still best thing ever. It is strange how much poorer vscode’s debugger is compared to visual studio.


60k is single json file


You can track by just keeping list of all positions and movement direction, if two are same, it means that it is in a loop.


I am using same solution, and getting right count with test input, but the actual input gives too many.
Annoying, and really hard to debug. I made renderer to visualize, but unable to find the bug.
One misunderstanding was that I counted same walls twice, because the result should not count same added wall twice if it has same x,y.


He’s is having affair with her


You can add IPS to port to add some security checking, but yes, in general port is never secure or unsecure.


Everybody knew were the ship was, because at that time star link usage by area was shown publicly. There was map online that showed all clients online.


I have been using Windows for 30 years and Linux for 25 years (debian since 99’). I really would not bash (pun intended) windows users so much, there is place for both of them.


Coral Acceletor is only needed if you run setup that does not have GPU or enough CPU. Spare laptop usually has enough power to handle AI detection, but RasPi doesn’t. I run mine in CPU at rack server.
Cameras own detections are limited in my experience, and it is much harder to integrate to anything else, like HomeAssistant for notification & automation


HomeAssistant + Frigate combo is just plain awesome. You can leverage the automations of HA through Frigate’s AI detection, so you get things like notifications.


I really don’t mind that they hide the button to enable installs from .APK when they are being directly downloaded. It has been in my opinion very bad idea from the beginning that it shows that, it has enabled multiple malwares in android. Non-technical people should not have easy way to install things, even with big warnings, because people ignore warnings.
If google removes the ability to install non-store apps all together, then that day I will stop using Android.


Business & Industry uses over 75% of electricity in Ireland. Residential energy usage really is not that much, in any country in the world.
Same with CO2, almost all of it is created by industries.


CrowdStrike Falcon is XDR product, there is hundreds of similar products available.
The role of XDR is to detect and block if some bad actor is trying to do something malicious in the machine. Old school virus signature detection is not enough anymore, you need pattern detection from network communication/DNS queries etc.
When corporation has thousands of devices to monitor the OS each of those devices Is not relevant. You need to detect if some random user logs to some Linux info display thousand kilometers away, and starts scanning the network.
Because the detection and response, needs to happen near realtime, for example Incase of cryptolockers, where all devices are encrypted within seconds, the software blocking this needs kernel level access.
I work in critical infrastructure as IT, but luckily we did not use falcon


Issue is not just on servers, but endpoints also. Servers are something that you can relatively easily fix, because they are either virtualized or physically in same location.
But endpoints you might have thousand physical locations, and IT need to visit all of them (POS, info/commercial displays, IoT sensors etc.).
Good luck trying to find industrial stuff that supports IPv6, hell most of it is still serial.
I have legit heard that serial is security mechanism because it cannot communicate long distance like ethernet.
Of course you can do IPv6 magic that hides IPv6 from the end device, but nobody understands how that magic works.