They’ve lost potential revenue, but that is not the same as if amazon would come to their house and had stolen their only rucksack prototype.
Potential revenue is not your property.
It still sucks though.
They’ve lost potential revenue, but that is not the same as if amazon would come to their house and had stolen their only rucksack prototype.
Potential revenue is not your property.
It still sucks though.
It works great for a closed group of people, all on one instance. Another data point that federation is hard.
Giving them access to Jellyfin is not fully “copying” a movie, it is just access to streaming (they can download, but that’s on them).
Overall, this makes little sense anymore and I feel that limiting data sharing is hard to conceptualize, let alone prevent with regulation.
All responses are saying “it is illegal”. But is it more illegal than pirating a movie for yourself only? Would it still be illegal if you would have paid for the movie? In that case it seems like lending the dvd to a friend…
Can you expand on this wild claim? The whole point of containers is isolation so what you are saying is that containers fail at that all the time?
That’s cool, post a link here when you’re done, I want to see what you cook up.
Good, we have been in a drought of js frameworks lately: https://dayssincelastjsframework.com/
Joking aside, that’s your selling feature?
It started as actual unpublished technical descriptions of underlying technology.
If they made that, they could also make it so one can pay 10x more for each additional icon.
So 10e for one, 100e for two, 1000e for three and so on.
This would allow us to recognise all people seeking attention by flashing money very easily. Bonus points if we are able to filter feeds by number of icons.
I wouldn’t say that Linux & Gimp are objectively better, but they sure are better in the long run, since you plop “gimp” into a nix configuration and never have to deal with installation and cracking.
I use rathole for this purpose. Works great, minimal, great performance.
Well, lemmy is a place for much more cultured audience. We can appreciate a good shitpost (that does also hold some water).
This is an overstatement, definitely. C is one of the few (mainstream) languages where memory safety vulnerabilities are even possible. So if you batch C and C++ together, they probably cover more than 90% of all the memory unsafe cove written in last 50 years, which is a strong implication that they will contribute to 90% of memory vulnerabilities.
All that said, memory vulnerabilities are about 65% of all high implact vulnerabilities on Chromium project[1] and about 70% of vulnerabilities at Microsoft [2].
You are not alone. This is the work git was built for.
There is a bit of benefit if you have code reviewed so separate commits are easier to review instaed of one -900 +1278 commit.
My house was built in 1939. Initial installation of ecectric cables consisted of a wire in a sleeve filled over with concrete. That was all replaced with proper tubing and isolation, but these few outlets do not have ground.
Wait what? What does that even mean? Is he their boss? Is he paying them? Does he mind control them?
I didn’t even notice the new actors, a testimony to how good they are!
Wait, but if you have, for example an HTTP API and you listen on a unix socket in for incoming requests, this is quite a lot of overhead in parsing HTTP headers. It is not much, but also cannot be the recommended solution on how to do network applications.
That’s a valid argument, but a very weak one. If we are not completely sure something is an improvement in all aspects are we just to dismiss it altogether?