I share the same frustration trying to replicate an environment. I’m glad I can avoid it these days, the community needs a way out of the conda lock-in.
I share the same frustration trying to replicate an environment. I’m glad I can avoid it these days, the community needs a way out of the conda lock-in.
they do, just use project management commands like uv
+ { add
, remove
, sync
, lock
, run
}
it already has dep groups; e.g.
uv add --optional staging pytest
then
uv sync --extra staging
to install / uninstall packages accordingly.
They have a --dev
shorthand for dev dependencies, but it seems the dependency group PEP is not final, so there isn’t a standardized way of doing this yet.
I get the meaning of restricted, but I don’t think this makes sense here. My list of restricted apps has apps with small but non-zero data; so why is the list implying that restricted apps have no data used.
but modal editing is exactly what I don’t like about vim
I knew she was cheating on me
I’d rather inhale toxic sheets at work or stare at excel fumes all day
burnout is a serious issue
C was my first language some 18y ago, and I wouldn’t recommend it to anyone starting today. If anything, learning C is a great way to teach why, maybe, we shouldn’t be using it to build customer applications, web servers, and whatnot.
Keep your gold, I’ll stick to sane error messages, memory management, a packaging system, and a dozen other things that actually make working on multiple projects somewhat doable and not a constant fight against seg faults.
that’s one way to swing the pendulum all the way back to the 1970s
These things are the other way around. The older something is, the more likely it is to find a bunch of questionable choices, spaghetti code, and security holes.
The questions I have surround the “since 2012” bit. FB exists since 2004, so what happened in 2012? Was it a data dump, a careless logger, system migration, or something else?
beat meat to it
hunter 2
unhackable
You probably don’t have to write to specific broswers. Just stick to the baseline and you’re golden. Optionally use a headless chrome for e2e testing to be sure.
As someone learning Rust, I’ll say that I appreciate the “advice” at the top because cloning is often tempting to use but - even though that’s usually okay - it doesn’t help one to practice the rust-specific ways of handling scope, ownership, and borrowing.
an email for a receiver that doesn’t exist, more often than not, goes back to the sender after e.g. 72h. That’s by design.
I’ll admit that in 10 years using git, I don’t think I’ve ever used reflog once.
IME they usually proxy and/or prefetch images for caching instead of blocking them. Only spam content is blocked by default.
tldr
uv is still faster with a cold cache
and uv does have dep groups
about the second problem, there’s an issue open on writing a migration guide, but migrating manually is not too difficult.