

I’m sure Tesla shareholders are happy to hear he’s picked up another side project.
I’m sure Tesla shareholders are happy to hear he’s picked up another side project.
One obstacle all third parties face in the US is party-line voting, which favors the dominant parties.
On possible outcome is that he puts a lot of money into making third party candidates more viable, like efforts to ban party-line voting or supporting ranked choice voting. So, you could vote for the America Party candidate and then if they don’t have a majority ñ, you vote could roll over to the Dem or GOP candidate of your choice, reducing your risk of voting third party.
These changes would help Libertarian, Green and other parties as well. More choice for voters!
As long you give them a good life before you murder them and eat them, that changes everything.
The same way that pigs are food and dogs are not. Cognitive dissonance.
Snorting tea, coffee and broccoli would be less popular too.
Years ago there was a voice to text transcription service sold as automated that worked by people listening to your voicemails and typing them out.
It’s grow lamps simulating full sun brightness in a windowless room.
It appears to have the display functionality of swaybar, the default dock of Sway.
No, you can’t prevent open source software being mirrored, nor can you can compel citizens and companies of other countries to stop working on it.
Must be completely unrelated.
In 2004, Munich, Germany led the creation of LiMux and switched the city to that from Windows.
In 2017 they reverted to Windows.
In 2020 they re-asserted the intent to switch to open source.
What’s old is new again.
This was downvoted, but is a good question.
If your account is compromised, the shell init code could be modified to install a keylogger to discover the root password. That’s correct.
Still, that capture doesn’t happen instantly. On a personal server, it could be months until the owner logs in next. On a corporate machines, there may be daily scans for signs of intrusion, malware, etc. Either way, the attacker has been slowed down and there is a chance they won’t succeed in a timeframe that’s useful to them.
It’s perhaps like a locking a bike: with right tool and enough time, a thief can steal the bike. Sometimes slowing them down sufficiently is enough to win.
I have a kid about that age interested in games. There was definitely interest in social pressure to switch to Windows for gaming for the bigger selection and what friends were playing.
My experience with systemd has been the opposite. Thanks to systemd, many core tools have consistent names and CLI behaviors.
Before systemd I used sysVinit, upstart and various other tools.
I’m glad systemd alternatives exist as part of a diverse Linux ecosystem but I haven’t had a compelling reason to not use systemd.
It uses layers, the same way a phone keyboard has a separate layer for numbers and symbols. Holding down one of the three thumb keys on either side activates a new layer. Since you can use your thumb and fingers at the same time, there’s no lose in typing speed. Indeed, the layout puts numbers and symbols closer to the home row on a layer than using a physical number number.
For all symbols, you would have needed a shift-modifier to access those before. With this design, the symbols are closer but use a layer switch key instead of a shift key to access them.
Everyone who uses a phone keyboard has learned a new compact keyboard layout. It’s not so hard.
What mailing list features do you need?
uutils is not distro-specific.
Yes, we are waiting for the CrowdStrike aha moment where the industry learns the hard way that anticheat with root privileges was a dangerous idea not worth the risks.
And: Fish implements aliases as scripts! When you use alias —save, fish creates as script with a function in it.
The Big Beautiful Bill also bundled a bunch of unrelated things, and that still got GOP votes.