When I debug a program, the first thing I do is to compile with "-O0", very nice to remove "-mrelax-all" as the default for -O0, because "-mrelax-all" increases both VM size and the file size.
UHG/Optum is just as bad...the M&A due diligence has never been decent, more of a checkmark than anything. There is a bad legacy of hiring unqualified people who are not even US citizens. The M&A should have caught the obvious control gaps, it didn't because it's a political mess with nothing but a bunch of people needing CISO or VP titles. With all the CISOs, VPs and Distinguished Engineers, any one of them or their teams should pull together a decent risk assessment for M&As.
Why is it that every time I read something like this my whole body feels itchy? Or when I read about lice I feel an urge to scratch my head? Like, is there a term for this? Some article?
They are an "alternative", they abandoned consumer market because they were unable to compete on technology and unwilling on price. Even Ukrainians dont want them and prefer DJI.
To this day, I still get random "Enter your password to continue using iCloud" push notifications on my iPhone with no relevant action to trigger such a notification.
My Apple ID uses a unique password, I keep a recovery key, I don't have its login credentials saved anywhere, and it's a dev account; so I have my LLC's DUNS number attached to it. My devices are the only ones listed in my settings portal.
I have no idea why I get these notifications, lol.
Actually an anecdote on switching, my father in law bought an iPhone in a pawn shop. It was logged in with someone else’s iCloud account. He just used that until he dropped dead. We had no idea until I had to clean his phone out. My mother doesn’t even know what iCloud is. Literally total ignorance must be the default for everyone these days.
I’ve done the random switch thing as well as a test case. But to Microsoft. It took me a day to export all photos from Photos.app and into OneDrive and that was with a Mac (105Gb). And of course you lose all the edits you did if you export the originals.
I was mistaken—yes it would be possible to upgrade to a 1TB NAND. I'm going to guess it wasn't cost-effective to source or it was hard to find an iCloud-locked/activation-locked 1TB iPhone 15 Pro/Pro Max motherboard.
A. Do hyper capitalism, assume mergers and acquisitions don't happen, consolidations never happens and that someone will be defiant of the law in the public interest at a crucial point
B. Change the law
It's important to note that AT&T was broken up and there once was many mobile carriers... They just bought each other up.
Instead of wishing on a hope and a dream that magic will happen, let's just change the law
React for example has a solid mathematical foundation and that's why it provides really good, clean abstractions. Spring is just a bunch of annotations and if you haven't done it for half of your life it really isn't clear why I have to write an empty! class that has 6 annotations on it, just to get the plumbing right for configuration. Smells like what I'm doing there should just be a function instead but maybe that's also partly Java being Java.
Yes it's very mature etc but at the end of the day it's just a collection of stuff that evolved over time. It's a framework written by developers, not mathematicians; a BeanPropertyRowMapper is likely something that happened on accident, react's algebraic effects are not.
Maybe it's not a fair comparison because react is super slim and spring (boot) is huge but yeah at the end of the day you have to work your way through endless baeldung tutorials to figure out which annotations to put onto your methods with no clear design. I also found asp.net easier to work with.
Reason it reminds me of jQuery is because it's everywhere. A coworker of mine just wrote some websocket code that should be really great and reusable but it uses spring annotations extensively so you can never use his code without spring. But it doesn't really matter because if he wants to reuse the code in another java project, spring will likely be there. And that's a level of hodgepodge that jQuery achieved back in the day too.
Guess what I want to say is that not all of web is "badly thought out" like the above poster insinuated.
Yeah keep your email provider and iCloud provider separate. For password management, use something like 1Password, and you got your main “identities” separated. In case of losing access to either of them, the impact will be relatively contained.
I think vbezhenar's point was simply that the recovery e-mail at a registrar should not depend on a domain managed by that same registrar. The registrar can update MX records.
Please don’t erase Martin Eberhard and Marc Tarpenning out of Tesla’s history. They were the ones with that idea of making EVs sexy and then Elon came along and slowly ‘manoeuvred’ them out. He wanted to be known as the founder.
He”s a good marketer, but not an ideas person or leader.
Look at the cyber truck, hyperloop, twitter and his crazy and damaging rants on twitter.
I tend to recommend that people ignore any recommendation to start with a specific Zachtronics game (unless they're getting the recommendation from someone who knows them personally). Different flavors of nerds seem to have vastly different preferences for the games, so it's probably much better to take a few minutes and check how interesting the core mechanic of each one is to you and pick based on that.
Personally I enjoy working with electronics and assembly, and that translated to me really liking TIS-100 and Shenzhen I/O. Meanwhile Opus Magnum wasn't anywhere near as interesting to me and felt like kind of a slog.
> Were you not precompiling your regex's in the older code? That would be a bug.
I never heard of this before. Perl has legendary fast regexen and I never heard of this feature. Does Java do it? I don't think so, and the regexes are fast enough in my experience. Can you name a language when regexen are precompiled?
The thing that scared me recently was two updates that gave me new encryption keys. At first I trusted apple and wrote down the new key. But I became suspicious after the second update and checked online. It seems like it's happening to others, so I used the recommended command-line tool to verify my new encryption key and it didn't verify. Apparently it works after disabling and enabling encryption, but
I'm just keeping it disabled for now.
cloud based, calling home, telemetry, video/radio surveillance, logistics exfiltration. Pretty much same arguments as in case of Chinese port cranes sending video feeds of sensitive shipments/port operations back to China, except on a global scale with high margin of deployments in security scenarios (police/fire/rescue/inspection/military).
One example is current Ukrainian situation. China gets a feed of who/where/how/what and how successful from supposedly civilian hardware.