But your case is wrong anyways because i <= INT_MAX
will always be true, by definition. By your argument <
is actually better because it is consistent from < 0
to iterate 0 times to < INT_MAX
to iterate the maximum number of times. INT_MAX + 1
is the problem, not <
which is the standard to write for loops and the standard for a reason.
- 6 Posts
- 326 Comments
Actually I would pick GIMP.
- Says what it is, an image editor.
- No popups and random interruptions.
- Not only AI editing examples which makes me thing the tool is AI only.
- An overview of the variety of major features it has rather than just AI editing.
- Links to helpful documentation rather than endless marketing pages that say nothing.
Really think only thing I would like to see is some screenshots and examples of using the tool, rather than just info on what it does. But the Photoshop page barely has this, just a few examples of the AI tools.
Huh?
I’ve used Vim for a decade and I would be offended if it made any noise.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Is Firefox still the recommended browser of choice here?English20·3 months agoI still recommend it. I’m not fully happy with the situation but for now I consider it my best option.
- I consider Chromium-based browsers out of the question as they give too much power to Google. This is already showing to be a problem with new APIs and “features” that Google is pushing into the web platform and the bigger the market share gets the more control they have.
- Web browsers are the biggest attack surface that most people have. Displaying untrusted webpages and running untrusted code is incredibly difficult and vulnerabilities are regularly discovered. I don’t yet know a Firefox fork that I trust enough to reliably respond to security vulnerabilities quickly and correctly.
So for now I am staying with raw Firefox. Not to mention that as a disto-built Firefox I have some insulation from Mozilla’s ToS. But I am very much considering some of the forks, especially the ones that are very light with patches and are mostly configuration tweaks.
kevincox@lemmy.mlto Technology@beehaw.org•Apple unveils new Mac Studio, the most powerful Mac ever2·3 months agoIs the limit 2 VMs or two macOS VMs? I thought it was technically a “licensing” restriction.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•PSA/HOWTO: Avoid fake mkv torrents. Avoid getting hackedEnglish1·3 months agoWine will mount your root folder as a Windows drive by default. So if the malware is scanning all connected drives and encrypting/uploading them you still have a problem.
kevincox@lemmy.mlto Linux@programming.dev•Firefox 137 To Support HEVC/H.265 Video Playback On Linux With VA-API30·3 months agoThis was intentional. The goal was to discourage the adoption of non-free codecs. They were partially successful, now AV1 is very widely supported (basically only older iThings that don’t have hardware decoding support don’t support it) which is a huge win because anyone can now deliver video on the web without needing a license to a proprietary codec. I would consider this fact alone a huge benefit and worth them holding other browsers asses to the flame.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Finally got a copyright warning from ISP - ReminderEnglish2·3 months agoOops, I linked the wrong one and got fooled because the most recent post is actually open again.
[email protected] is more active. (Although not bustling either)
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Finally got a copyright warning from ISP - ReminderEnglish1·3 months ago[email protected] is active enough.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Finally got a copyright warning from ISP - ReminderEnglish3·3 months agoYeah, public trackers definitely raise your chance of a notice by at least an order of magnitude. New content also tends to be more noisy than old content. I also found a drop by selecting “require encryption” although I can’t imagine why it would help (IIUC most of these scanners just connect to everyone in the swarm, not sniff random internet traffic.
kevincox@lemmy.mlto Selfhosted@lemmy.world•Which reverse proxy do you use/recommend?English4·3 months agoI’ve been using nginx forever. It works, I can do almost everything I want, even if more complex things sometimes require some contortions. I’m not sure I would pick it again if starting from scratch, but I have no problems that are worth switching for.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Broken mp4 files?English7·3 months agoThe most likely situation is that the torrent isn’t good. I would also force a recheck of the torrent to double-check that the files on your disk haven’t been corrupted. But if that file is still saying “0 B” remaining (don’t just look at 100% as it may be rounded) after the recheck then I would bet pretty good money on a broken torrent. If this is a public tracker it is fairly common.
However even if it is broken you may be able to play by using a different players. Different apps can skip over different forms of corruption, so you may get lucky.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Why is the IPTV scene such a toxic shit hole?English18·3 months agoIf you don’t need to watch Jeopardy live it is pretty readily available via torrents. Probably in better quality and without ads.
Sports are much harder to find. There are trackers but they are much harder to get into and I can’t attest to the completeness (I’m not really into sports) and watching it live is probably more relevant.
kevincox@lemmy.mlto Mildly Infuriating@lemmy.world•New Youtube Web Update Requires HTML5 CanvasEnglish1·3 months agoIt would be wasteful to upload the full size image only to throw most of it away. JPEG compression is very cheap, especially at low resolutions (I assume that image search uses a pretty low-resolution source image). Doing it this way is actually what I would do for best user experience. (Not saying that they aren’t doing other malicious things, but doing the resizing on the client is actually a good idea)
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Port forwarding and VPNEnglish22·3 months agoThe main issue is accepting incoming connections. When you are behind a NAT (as most VPNs are for IPv4) you need some solution (such as port-forwarding) to make your torrent client connectable. This causes a number of issues when torrenting.
- When someone starts a download they will try to connect to the seeders. If the seeders are not connectable this will fail.
- As a fallback when the seeders notice the leachers they will try to connect to them. If the leacher also isn’t connectable this will also fail.
If neither party is connectable the download can’t happen, so you may fail to get content that you want.
This is extra relevant if you are on private trackers where seeding is tracked, has direct value and is competitive. If you are not connectable every new downloader will immediately connect to the connectable seeders and finish the download before your client even knows that they exist. (reannounces for seeders can be very infrequent, such as hourly, so it will take an average of 30min for you to notice a new seeder and try to connect to them). This makes it very difficult to acquire much upload unless there are very few other seeders.
NAT is evil, all hail IPv6.
It would be nice if there was a shortcut to go “back to previous site”. Because on one hand using back to navigate around map moves is often very convenient, but sometimes I want to go to the site before the map. Having a two-level history with page and site would be super useful.
This is a case of the streetlight effect. Evaluating the skills needed to do the job is very difficult in an interview setting, so most of the focus going on evaluating skills that are easy to evaluate in an interview (such as people skills).
It isn’t wrong, as all else being equal it is still better to hire the person with better skills that you can measure but obviously is not a strong evaluation of candidate quality.
#1 items should be backups. (Well maybe #2 so that you have something to back up, but don’t delete the source data until the backups are running.)
You need offsite backups, and ideally multiple locations.
Closed-source software that sends home tons of information about your system without consent. All communication accessible to a VC funded company that has huge pressure to make as much money as possible.
poweroff
orshutdown
will work on almost every distro. Even systemd ones (they are usually symlinks but doesn’t really matter because they work).