[D. Richard Hipp] designed SQLite in the spring of 2000 while working for General Dynamics on contract with the United States Navy.
Well today I learned!
[D. Richard Hipp] designed SQLite in the spring of 2000 while working for General Dynamics on contract with the United States Navy.
Well today I learned!
That’s “Chemical X” which is fine.
Cocaine. Jesus fuck. I’m not particularly angry with you, OP, just at the trend of advertiser friendly self-censoring that’s making its way into the fediverse.
There’s a loud subculture of furries who insist sex is shameful and something to apologize for.
Which book?
“No, in fact Tolkien said the exact opposite. Jews are based on dwarves.”
See how that works when you don’t actually provide a source? To be honest, I have no idea if Tolkien based the races of Middle Earth on human peoples, and would’ve liked to learn if he did. But instead of actually teaching me something, I’m left here with intellectual blue balls, so thank you for a wonderful start to Locktober.
Shit, that’s where my sex drive went. Can I have it back please?
This looks like O(n)
, because you don’t include constants when calculating Big-O. It’s still ~26 times slower than the implementation without the inner loop.
This looks like O(n^2)
because of the sub
.
I was right the first time. sub
is “substring” and not “substitute”.
Mailing lists are pretty awesome. They’re like a decentralized forum. There are even good web UIs!
That said, submitting and reviewing patches over email suuucks.
The term you’re confusing with meme is image macro.
Here’s a language that does bash and Windows batch files: https://github.com/batsh-dev-team/Batsh
I haven’t used either tool, so I can’t recommend one over the other.
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
This doesn’t hold. Commit signature is a feature of git itself, even though the article chooses to focus on GitHub. And afaik github integration of signatures doesn’t break code hosting elsewhere, GH merely allows you to register your GPG signature with them so they’re able to validate the commits, but the author is still able to enroll the same GPG key to other hosts.
Not only that, but GitHub rewrites signatures on rebase (and sometimes on fast forward merge) with their own private key. Using signatures on GitHub is basically pointless.
How likely is it that your home and work are 20 minutes away from train stations because your region prioritizes cars?
The real interesting debate is between ((f) 1)
and f()(1)
.
Yeah, that feels like a really weird choice.