There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

programmer_humor

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

simple , in Job interview vs job
@simple@lemmy.mywire.xyz avatar

The difference is, in the job interview you’re writing it from scratch yourself. On the job you have to take over from the guy who left 10 years ago and that button was designed in such a way that resizing it will add garbage data to all tables in the database and also send an email to all your customers telling them to switch providers.

kevincox , in Community Member++
@kevincox@lemmy.ml avatar

Only wimps use tape backup: real men just upload their important stuff on ftp, and let the rest of the world mirror it ;)

  • Torvalds, Linus
psilocybin , in rule

So a syntax highlighted comment

canpolat OP , in The Password Game
@canpolat@programming.dev avatar
ilobmirt , in Paid by the PostgreSQL gang
@ilobmirt@pawb.social avatar

The second frame with the second arm? 🤔 Almost didn’t catch that.

DeVoid , in Why yes, we do Agile

Corporate accounts payable, Nina speaking. JUST a moment.

Corporate accounts payable, Nina speaking. JUST a moment.

Corporate accounts payable, Nina speaking. JUST a moment.

infeeeee , in Unix rule

It would overflow to minus 2^31, as she says it’s signed, so not 1970 (that’s zero) but 1901 would follow: en.m.wikipedia.org/wiki/Year_2038_problem

ndotb , in Looking for FULL stack developer
@ndotb@programming.dev avatar

PREFERRED:

  • PhD in quantum cryptography
  • 3 years of janitorial services experience
  • Proof of current therapist
gkd , in >$ git blame
@gkd@lemmy.ml avatar

I wrote the bug

most_likely_bollocks , in Auth

It’s really not that hard. Authentication is about proving the identity of the subject e.g. logging in using information only known / in possession by the subject (password, mfa etc). Authorization is about establishing what permissions that identity has in a given context. E.g. is this identity allowed to create/read/update/delete these resources. Authorization is typically done through roles (RBAC) or more granulary through attributes (ABAC).

msage , in rule

Where’s my === gang at

CanadaPlus , in Robotics developers, startups, and resalers furiously shopping for new HID peripherals

That wasn’t the dumb part of that submersible. Game controllers are actually really good at what they do. The dumb part is that it was built like an airplane.

AI_toothbrush , in Fixed

People when they learn doubles and rounding exists

DarkDarkHouse , in Fixed
@DarkDarkHouse@lemmy.sdf.org avatar
Adda , in Never spend 6 minutes doing something by hand when…
@Adda@lemmy.ml avatar

Nevertheless, there is the one hidden advantage of this approach: You learn new things while trying to automate everything. Remember, that it is the journey that is important, not the destination ;)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines