Details
-
AboutStudent, Coding as a hobby
-
LocationGermany
Joined devRant on 4/29/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
What you are doing isn't a fully implemented scrum. The user Stories shouldn't be longer than a one day task. Otherwise they need to be split into multiple stories before sprint planning. Additionally there should be a priority list for the stories to do. You work according to that list and PM can only put the leftover tasks into the next sprint again. They should not have been started in the first place.
And PM is not a regular participant in daily meetings, only if asked for by the team. -
@lopu if in a hierarchy of /mnt/a/b/ you hardlink /mnt/a/b/a to /mnt/a you have a loop in your filesystem. The files /mnt/a/b/file.dat and /mnt/a/b/a/b/file.dat should now be the same, but haff different links and such are different files, despite having the same hardlink destination on the drive.
Additionally, if you delete the hardlink to /mnt/a you have a loop with existing hardlinks which you can't access again. Still, it is not free memory, since each file/folder is hardlinked by at least another folder. -
@metamourge can you think of an equivalent to hardlinks of a cow filesystem?
-
@lopu hardlinks to directories don't work to prevent file system loops.
-
Is it USB 3? Otherwise, why even bother with Wifi6?
-
@kescherRant for helpdesk people Skype is not unusual. Especially if the company is full Microsoft on Office Services.
-
I also had (actually, still have, but usually it's too stressful) a time when I did concentrated work best at night. No one disturbed me and time did not matter. Depending on my previous sleep cycle I would still get up as usual and add some sleep around 3pm.
-
I tried it on a current Ubuntu system and it doesn't work.
-
@Voxera what's the security risk there?
-
If sudo is now owned by you, you should be able to own it back to root.
-
DNS being unencrypted is usually not that worse as it sounds. An attacker has to be in your local network or in your ISPs network, if you use their DNS server. If he is, unencrypted DNS is a rather small problem.
-
Doesn't sound like Twitter's fault to me.
-
I learn by doing. Tutorial Videos might be nice but they often teach tings I do not need for a specific use case. Additionally I prefer text over Video, since I can easily work through it at my own speed. I think I have the ability, and I value much more, to understand the abstract idea behind things and code. I don't learn code by heart, but concepts and Google the code needed if necessary.
-
@Katakompe I like the AMD part in your comment
-
You know, how this Socket works?
-
I personally think the basic functions of a website should work without Javascript. For anything relevant to security you can't use it. And those Frameworks are mostly big and slow.
-
Give him your Code in Python. This will at least help with the indentation.
-
Use another arduino to flash the first one.
Or pull the reset pin to ground while connecting. -
My Laptop has exactly this resolution. Its old though.
-
It is very nice. I don't like the floating Dock at the bottom though. It always looks like mirrored from Mac OS.
-
It's a tool, you can use to Build/Create neuronal networks.
-
It's pretty nice if you only have to enter numbers without much text.
-
Deezer. Best Browser Version imho
-
Why is that?