![](https://lemmy.world/pictrs/image/f242f4b2-7782-48c9-8594-05882e557e7e.png)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
Also the strip stops midway through as Waterfall was an invented thing just for a paper. And during your UP work you actually had the customer put in that input and hence it was like in this cartoon strip.
The strength of life to face oneself has been made manifest. The persona Carighan has appeared.
Also the strip stops midway through as Waterfall was an invented thing just for a paper. And during your UP work you actually had the customer put in that input and hence it was like in this cartoon strip.
Because it keeps being crossposted everywhere. Sadly.
Yeah, parts of this article feel like they’ve been written by a GenAI. Which… might have been the point, I suppose.
Of course, it’s going to be difficult to find a modern application where each individually deployed component isn’t at least 7MB of compiled source (and 50-200MB of container), compared to this single 7MB war
that contained everything.
Ah, Whitaker is a good example. I mean of snake oil. The guy is snake oil, and probably paid by Better help or something.
Yep, same here. Willow was my big TV crush back then. She even won against Dana Scully.
Every search you make, email you send, text message, voice chat, location, and most likely the conversations you have in your own home are monitored and stored in a database for whoever knows how long (probably forever).
This is most likely incidental.
As in, to successfully show text messages to people, somewhere at the ISP, someone has to have a database that shows what messages were sent off from which tower and need to be routed where. Maybe they’re retained for a while for re-send reasons, too. Yeah.
But the point is, that’s not the same reason why your home address is retained at the motor license department.
We humans love to see patterns in things, but we do so even when none exist, as our brains want to desperately simplify information to save space, essentially. But we should not let that fool us into thinking the world is simpler than it actually is: We have a host of reasons to retain data, and this existed long, long, loooong before digital databases. And for good reason. After all, if it cannot be verified that you are you in context X, the state can hardly offer you service Y or protection Z (such as those are in the US in particular, granted).
Your city has to know who you are and where you live. Your motor dep needs to know which license belongs to whom and is attached to which vehicle. Amazon needs to know where to send your parcels. Your phone provider needs to know which phone belongs to which number in their network and where it is right now. Etc, etc, etc. They all do so for individual reasons.
Maybe. But feeling bored would be an amazing feeling for a change.
C16. Ugh I’m old.
In modern times it’s important to keep in mind that the stiffness can be different independent of the type of filling.
That is, I’d pick filling primarily by allergies, and then by personal preference. They all feel marginally~moderately different, and some you’ll just associate with “nicer”. For me personally that’s memory foam, for example.
Then independent of that, pick a stiffnes and, importantly, a shape that works for you. I sleep worlds better on a very stuff shaped pillow that perfectly matches my neck size and length.
Not really, but apologies. The USA are just one country, after all, chances would be OP is from elsewhere.
Depending on where you live, therapy can be a prescription. And obviously then it doesn’t cost you money to go there.
Oh thank you! I was thinking of that but absolutely could not recall the name when making the OP.
Definitely, each room and mission seems to be dedicated purpose-built puzzle rooms.
Rock and stone! ⛏️
This really looks fantastic. Quite a lot of new things.
Yeah but that’s a wholly different attack, and oodles more complex to pull off. Doable, sure. But it’s absolutely not the same thing as phishing for a valid 2FA code that is generated user-side.
And don’t get me wrong, both are overall very security. But there is a case to be made for push auth.
Yeah but legally it’s a bit more iffy once something gets breached and then it turns out that no, private phones are not covered by the stuff you signed for work security (because they usually cannot be, rather most written stuff explicitly forbids people from using their private phones for stuff like this, even in company who expect workers to do it).
This is depressingly accurate. 😓