

Split meaning equal shares, or split as in each person pays for what they ordered?
Split meaning equal shares, or split as in each person pays for what they ordered?
Canadian checking in.
Biggest oddity to me is that the default for restaurants is one bill, and waiters get annoyed if you ask them to split it by person.
Like why would I want to either:
It’s complete insanity to me.
Two questions: are you still on Gentoo, and have you tried LFS?
It works okay for a while, but eventually it loses the plot. The storylines are usually pretty generic and washed out.
I run Gentoo as my main distro, and have for a couple years now. It’s a pretty stable rolling release (IMO more stable than Arch), and since you’re already an advanced user, the experience should be pretty rewarding!
The wiki is great, and the installation handbook is top notch.
You get to control exactly what features each package is compiled with, so no bloat at all.
KDE 6 just landed too!
Shit, that’s where my sex drive went. Can I have it back please?
Bah, real power users only need a magnet and a pin.
Linux is whatever the Linux Mark Institute says it is.
The risk of mis-ordering your layers is a security issue.
There are two ways to layer a VPN and tor:
In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.
In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.
Don’t mix tor plus VPN.
If you’re using tor browser without tor for some reason, carry on.
Eh, it’s also much easier to slap a client-side detector on because you can use generic detection methods. When you’re doing it server-side, you have to rely a lot on statistical analysis and it’s all game specific.
In the end you can, of course, reduce it all to not shelling out money, but there is some nuance too.
Using your shared libraries is always a good thing, no? Like your distro’s packages should always have the latest security fixes and such, while flatpaks require a separate upgrade path.
Access to your entire filesystem, however, I agree with you on.
Unpopular opinion: Gnome software is pretty solid, and if your computer usage patterns overlap with their design, it is quite a lovely DE. I’d rather have something that works well, even if it doesn’t do everything under the sun.
This requires an Apple iPhone XR or newer, as the face scan utilizes the TrueDepth sensor.
I’d rather take a plaster mold of my face than have to use a specific phone to order a VR headset.
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
Gentoo nerds represent!