Ironically making them more corrosion resistant, by doing so…
Ironically making them more corrosion resistant, by doing so…
That McCloud looks like the “smarter every day” guy with a mullet
“So then after my feature was developed, all of those unit tests didn’t work any more. I deleted them.”
it’s just removed unit tests that didn’t work any more…
First things first: Your team needs a coding style.
Also: With git reflog ignore-revs you can filter commits that only adapt the style.
And while we’re at it, check out the -C -C -C flag for git blame. https://git-scm.com/docs/git-blame#Documentation/git-blame.txt--Cltnumgt
The problem is, you don’t know if it’ll bounce till you try.
The missile knows where it is at all times. It knows this because it knows where it isn’t. By subtracting where it is from where it isn’t, or where it isn’t from where it is (whichever is greater), it obtains a difference, or deviation. The guidance subsystem uses deviations to generate corrective commands to drive the missile from a position where it is to a position where it isn’t, and arriving at a position where it wasn’t, it now is. Consequently, the position where it is, is now the position that it wasn’t, and it follows that the position that it was, is now the position that it isn’t. In the event that the position that it is in is not the position that it wasn’t, the system has acquired a variation, the variation being the difference between where the missile is, and where it wasn’t. If variation is considered to be a significant factor, it too may be corrected by the GEA. However, the missile must also know where it was. The missile guidance computer scenario works as follows. Because a variation has modified some of the information the missile has obtained, it is not sure just where it is. However, it is sure where it isn’t, within reason, and it knows where it was. It now subtracts where it should be from where it wasn’t, or vice-versa, and by differentiating this from the algebraic sum of where it shouldn’t be, and where it was, it is able to obtain the deviation and its variation, which is called error.
So, fucked up public transport is a necessity?
You don’t know why you don’t ask women if they’re pregnant?
Reddit is great for watching communities being radicalized. Wehther they do it themselves or they get a psyops push is up to everyone’s guess but I’ve watched it several times.
SRS: Started out as a community pointing out misoginy and racism, ended up as a very weird hate group. I didn’t watch it that closely, only saw the result.
some tumbler centered sub i followed, I forgot the name: same story, started quite light hearted, making fun of stupid shit said by kids on tumbler, turned into a right wing hategroup. This one I witnessed. They ran out of material quick, started posting lame shit but now they gave it their own, made up context in the comments. After a while, people who pointed out obvious satire got downvoted.
Go to a random political sub and bring a well researched fact they don’t happen to agree with. Be as polite as you can be. See what happens.
Sacrifice? Tf you on about?
Guy can’t pronounce his own name, ffs!
When they sacked Clarkson for hitting a producer, I was like: But he also punched Morgan, shouldn’t he, like, get one free for that?
I only ever use those sites if i really disliked a movie but can’t figure out why.
As a way to select a movie they’re really pointless, I think a system that matches tastes of people and recommends movies based on that would be more promising.
Sure does! But nothing will happen, you’re essentially a 100% safe running pump and dump schemes as long as you only rip off poor people.
Check out Coffeezilla’s yt channel, there’s loads of obvious fraudsters out there, nothing ever happens to them.
Gute Frage. Bürger erpressen, damit sie auf ihre Rechte verzichten klingt zwar nicht legal, aber wer weiß…
Deutsche Bahn tried it with that reasoning. They’re currently being sued by digitalcourage.org and I’m confident they’ll lose.
We have test-phishing mails sent by our IT-Sec team on a regular basis. There’s usually an obvious one and a better made one. First round 10% clicked the obv. one, 99% the good one.
We had a lot of trainings after that.
Last year the numbers went down to 5% and 80%.
If your security concept relies on both of these numbers being zero, you’re an incompetent hack trying to shift the blame on end users instead of doing your job.