Yes, I’ve seen that argument against capitalism as a 4 panel comic in many forms over the past year on Lemmy but I can’t find it now.
I think even the Everett True Lemmy has had done it.
Yes, I’ve seen that argument against capitalism as a 4 panel comic in many forms over the past year on Lemmy but I can’t find it now.
I think even the Everett True Lemmy has had done it.
Simple != 35 minute video.
I’ve seen great arguments done in a 4 panel comic here on Lemmy.
It doesn’t waste their time. They are getting paid by the hour. As long as you are friendly it doesn’t hurt anyone to give a wrong phone number to get a discount.
“Law enforcement officers typically have fairly broad leeway to place someone in handcuffs during an interaction if they believe that it’s necessary to protect themselves from harm. In those cases, they can do so even if the person being handcuffed hasn’t been arrested.”
“When a search warrant is being executed”
Handcuffs do not mean an arrest.
Some people take tabs vs spaces too seriously.
Was he arrested? I don’t see follow up. It only says he was handcuffed which would be standard until they know what’s going on.
You don’t have to keep the sub. Pay $10, convert the files, unsubscribe.
Windows has hyperV VM manager built in.
You should know that many, if not all US “made” cameras are only rebranded Chinese cameras.
For example Amcrest of Texas is actually owned by the Chinese Foscam and sells rebranded Dahau cameras. Reolink is also Chinese. Even premium US companies like Ubiquity have their cameras made in China.
Any IP camera that supports the onvif standard. Chinese Dahau and Hisense have amazing image quality but do not trust them. Block their Mac address at your router and you’ll be fine.
I really like Power over Ethernet IP cameras because it’s one cable for power and data. If it’s only one camera you buy a POE injector so you plug in power where it’s convenient and run Ethernet (that also delivers power) to the camera. For multiple cameras, get a POE switch. On the software side, DWSpectrum, Frigate, or Shinobi for Linux. If you want it to work without any hassle, BlueIris for Windows is great.
The Dahau and Hisense cameras I’ve used have their own recording capabilities so you can get by without even a Linux PC running Network Video Recording software like I listed above.
I’d been hearing a lot about NixOS so I did a VM install. It wanted me to setup my own partitions manually without even giving preset sane defaults like I was back in 1994 installing Slackware.
Nope. My OS is a tool, not a lifestyle.
Bots don’t know what’s a real name or fake. They’ll get delirious_owl@gmail.com from a list and phish with it no different than if JohnSmith@gmail.com was on the list.
I have a Gmail for all important emails that’s my real name. I’m very careful to only use it for important things. I never use it for online orders of any sort.
Instead of having to do an Operating system setup with a cloud provider, maybe another cloud backup service would work. Something like Backblaze can receive your Google files. Then you can download from Backblaze at your leisure.
https://help.goodsync.com/hc/en-us/articles/115003419711-Backblaze-B2
Or use the filters by date to limit the amount of takeout data that’s created? Then repeat with different filters for the next chunk.
For instance you can’t write a regex that’ll relibly find the subject, object and verb in any english sentence
Identifying parts of speech isn’t a requirement of the word parse. That’s the linguistic definition. In computer science identifying tokens is parsing.
Parsing text is the reason regex was created!
Page 1, Chapter 1, “Mastering Regular Expressions”, Friedl, O’Reilly 1997.
" Introduction to Regular Expressions
Here’s the scenario: you’re given the job of checking the pages on a web server for doubled words (such as “this this”), a common problem with documents sub- ject to heavy editing. Your job is to create a solution that will:
Accept any number of files to check, report each line of each file that has doubled words, highlight (using standard ANSI escape sequences) each dou- bled word, and ensure that the source filename appears with each line in the report.
Work across lines, even finding situations where a word at the end of one line is repeated at the beginning of the next.
Find doubled words despite capitalization differences, such as with The the, as well as allow differing amounts of whitespace (spaces, tabs, new- lines, and the like) to lie between the words.
Find doubled words even when separated by HTML tags. HTML tags are for marking up text on World Wide Web pages, for example, to make a word bold: it is <b>very</b> very important
That’s certainly a tall order! But, it’s a real problem that needs to be solved. At one point while working on the manuscript for this book. I ran such a tool on what I’d written so far and was surprised at the way numerous doubled words had crept in. There are many programming languages one could use to solve the problem, but one with regular expression support can make the job substantially easier.
Regular expressions are the key to powerful, flexible, and efficient text processing. Regular expressions themselves, with a general pattern notation almost like a mini programming language, allow you to describe and parse text… With additional sup- port provided by the particular tool being used, regular expressions can add, remove, isolate, and generally fold, spindle, and mutilate all kinds of text and data.
Chapter 1: Introduction to Regular Expressions "
English isn’t a regular language either. So that means you can’t use regex to parse text. But everyone does anyway.
You might want to consider that backups only protect very old data from ransomware.
Ransomware works by getting on a machine and sitting for several months before activating. During that time, your data is encrypted but you don’t know because when you open a file, your computer decrypts it and shows you what you expect to see. So your backups are working but are saving files that will be lost once the ransom ware activates.
The only solution is to frequently manually verify the backup from a known safe computer. Years ago I looked for something to automate this but didn’t find it. (Something like a raspberry pi with no Internet that can only see the PC it’s testing, compares a known file, then touches the file so it gets backed up again.)