Details
Joined devRant on 10/23/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
There's an extension for this, GL_KHR_debug. You register a callback and the driver will call it for each error it encounters.
-
@Root they could be storing hashes of all 1 character variations of your password.
-
You may want to know that iptables is deprecated, superceded by nftables.
-
At that point I'd ask myself: why even bother with names? Give everyone a UUID.
-
Segmentation Fault
-
Why not just ignore them? It's their time to waste.
-
Funny. We actually did exactly this at our workplace.
-
Consider the syscall instruction instead of int $0x80. The latter is slower and provided for compatibility reasons only.
-
An usual sight in many CI setups. Got to build those containers in isolation.
-
GTK+
-
@silverstar I could, but I still use their services.
-
Scaleway is full of odd little things. For example, my credit card expired and they're still successfully charging it a year later.
-
Email addresses are not parsable by regular expressions. Please never even try, it has long been proven to be impossible.
-
An autonomous vehicle wouldn't get itself into this situation to begin with. No decision need be made.
-
You know that it is possible to download everything on Wikipedia, officially. There is no need for scraping.
https://en.wikipedia.org/wiki/... -
Check out the Meson build system.
-
This is a new feature in the 1999 update of the C specification (C99), called designated initializers.
-
Dvorak users use two hands for this key combination.
-
@misiman What QA?
-
Interesting fact: bcrypt, a popular password hashing algorithm, has a limit of 72 characters.
-
Setup individual virtual machines with USB passthrough.
-
This is why you should have tests. :)
-
Learn both. There's something to like in each.
-
Look up "Privacy Extension for Stateless Address Autoconfiguration in IPv6".
It is enabled by default in Android and involves periodically cycling between new semi-randomly generated addresses within a given /64 subnet. -
This is not even guaranteed to fail since optimizing compilers will just remove that block of code.
Integer division by zero is undefined behaviour. Compilers will assume undefined behaviour can never happen, thus they assume the pool can never overflow, thus convincing themselves that the conditional is dead code and remove it. -
DeepBlue
-
This looks like the equivalent of a computer made with vacuum tubes, before transistors were invented.
Just waiting for that one breakthrough. :) -
Reminds me of elections. Why do people keep voting for the same nonsense over and over again?
-
Yes, it is legal. Any software license that restricts what you can use the software for is in any way whatsoever is a proprietary software license! No exceptions. See the Open Source Definition.
Whether software is open source or proprietary has nothing to do with the ethicality of what you do with said software. Do what you want with he tools that work best for you. -
@gitpush Don't think of tests as an optional supplement that can be tacked on afterwards.
Try taking a stab at practicing test-drive development (TDD). While you may feel that TDD slows you down at first, that will quickly change as you get used to these new practices. Before you'll know it, writing code with tests will become both easier and faster than without tests.
If you're into books, I recommend reading Working Effectively with Legacy Code by Michael Feathers.