I will never forgive JSON for not allowing commas after the last element in a list.
I will never forgive JSON for not allowing commas after the last element in a list.
I don’t have a Fedora workstation in front of me right now, but it memory serves me right there’s a “default applications” or similar menu in Gnome’s settings.
Not an entomologist, but I’m thinking terrestrial flatworm - with the white belly perhaps microplana terrestris?
My decision tree roughly follows these steps:
I used to also prioritize GoG because it was largely DRM-free, but the Luna partnership is putting doubt on that.
Yeah, you’d have a LoadBalancer service for Traefik which gets assigned a VIP outside the cluster.
virtual IP addresses
Yeah, metallb.
The container is reproducible. Container configuration is in version control. That leaves you with the volumes mounted into the container, which you back up like any other disk.
It’s not that Seagate improved (which it may have), it’s more that WD has noticeably declined. It’s not a race to the bottom (yet), but there’s effectively no competition any more, so they aren’t incentivised to improve quality.
I think there’s a mistake, I can’t fit “neovim” into 8 across.
Yeah, I can sleep through a fever, but I’ll wake up every few minutes if I can’t breathe through my nose.
Figure out the uid/gid (numeric) for the user in lxc, then change the data permissions to those.
Since FF 6 and 7 have already been mentioned, I’m going to give a honorable mention to Shining Force.
They’ve been shitty for a long time, with a history of refusing RMA, damaging items during RMA, selling clearly damaged/used items as new, etc. This is just another turd on the pile.
Use -m
and limit the build job’s memory so it doesn’t kill the docker daemon.
Do I read these top to bottom or clockwise?
It’s not free of risk (regional datacenter outage, account termination), but for a lot of companies the above are acceptable risks compared to the cost of managing this yourself.
The number of users connecting their PC forfeit directly to the modem or purposefully disabling all protections because they’re too lazy is higher than you think.
Icelandian.
So TCP ACK is the backwash?
I don’t know if it’s still the case, but in my experience (years ago) PGP messed with the proper rendering of HTTP email bodies.
From a security standpoint also, the signature confirming that the email is from your is a double edged sword: Yes, your contacts get to verify that it’s you, but you’re also losing plausible deniability (privacy).