None of them…
ssh-keygen -t ecdsa -b 384
Then get it signed and use the certificate.
None of them…
ssh-keygen -t ecdsa -b 384
Then get it signed and use the certificate.
SSH certificates are where its at.
XML is a superior format to Json or yaml or any of those other trendy formats around today. It’s the hill I’m willing to die on because I’m right.
I’m no expert in JSON, but don’t you lose the ability to filter it before your application receives it all? If you had a reasonable amount of data then in SQL you can add WHERE clause and cut down what you get back so you could end up processing a lot less data than in your JSON example, even with the duplicated top table data. Plus if you’re sensible you can ensure you’re not bringing back more fields than you need.
Just add AND 1=2
to any query for incredible performance gains
XML is all round better than Json.
A few people need to get off their horses and come up with and agree to IPv4². It’s exactly the same as IPv4 except there’s 2 more octets of address space - 48bits for addresses*. Job done. You’d see wide spread adoption in under 2 years and then we can forget about it all and move on with our lives safe from the clutches of IPv6.
I don’t give a crap that doesn’t neatly fit into 32 or 64 bit architectures. It’s more than doable at plenty fast speed and it keeps everything manageable.
Volatile means that the value should be read each time its accessed. It can’t be cached in a register or the read be otherwise assumed and optimized away or the instructions around its access be reordered.
Absolute amateur
If your views aren’t nested joins on views on views on views with group bys with wildcard text matching are you even trying to enter hell?
While technically true, that’s also one of the worst ‘features’ of the language and I personally consider it a bug in the language. Use two lines and make it clear and correct.
I always read it right to left and it seems to make sense to me.
I just wouldn’t do that.
The fact it’s a pointer is part of the type, not part of the variable name. So int* p
is the way.
One 6, one 8 all of that applies. If you can’t manage to control device access at a basic level, I feel sorry for you.