Incroyable que, plusieurs millénaires après qu’aucun utilisateur de l’akkadien ne soit parmis nous, on emploie un de leurs mots quasiment à l’identique.
Incroyable que, plusieurs millénaires après qu’aucun utilisateur de l’akkadien ne soit parmis nous, on emploie un de leurs mots quasiment à l’identique.
Perso j’ai toujours vu “hoot-hoot” pour les hiboux et chouettes. C’est la première fois que je lis “twit twoot” !
cacher does, but cache as in “cache-toi !” (go hide!) and “je me cache” (I’m hiding) are pronounced “cash”.
Besides, “correct” pronunciation in a different language is pretty meaningless. The word may have come from French but we’re speaking English, not French.
Also, it might not be a loan word so much as a legacy-of-foreigners-taking-over word (c.f. the Normand invasion of Britain), which doesn’t tend to help the language’s users care about respecting the “original” pronunciation. I’m not certain when exactly cachet entered English.
“dise-player, carder”
Ah, so this is probably some law trying to curb gambling-
“tenys player” wait, what? Were people betting on tennis matches back in the day or something?
Have you ever heard of the great oxidation event? https://en.m.wikipedia.org/wiki/Great_Oxidation_Event
Though I doubt the anaerobic bacteria was aware enough to be able to deny what was happening in the first place.
Every time I read about how we’re finding micro plastics in places we thought they couldn’t reach (blood-brain barrier recently) I think of the GOE.
Quel enfer!
Ca explique peut-être pourquoi je reçois 10 fois plus de spams et scams sur mon tel depuis 1 semaine ou deux.
Copie du texe du mail :
Information concernant vos données personnelles
Chère abonnée, Cher abonné,
Nous vous écrivons afin de vous informer que Free a été victime d’une cyberattaque ciblant un outil de gestion.
Cette attaque a entrainé un accès non autorisé à une partie des données personnelles associées à votre compte abonné : nom, prénom, adresses email et postale, date et lieu de naissance, numéro de téléphone, identifiant abonné et données contractuelles (type d’offre souscrite, date de souscription, abonnement actif ou non).
Aucun de vos mots de passe n’est concerné.
Toutes les mesures nécessaires ont été prises immédiatement pour mettre fin à cette attaque et renforcer la protection de nos systèmes d’information.
Cette attaque a été notifiée à la Commission nationale de l’informatique et des libertés (CNIL) et à l’Agence nationale de la sécurité des systèmes d’information (ANSSI). Une plainte pénale a également été déposée auprès du procureur de la République. L’auteur de ce délit s’expose à une peine de 5 ans d’emprisonnement et de 150 000 € d’amende.
Nous vous invitons à la plus grande vigilance face au risque d’emails, SMS ou appels frauduleux. Sachez que nos conseillers ne vous demanderont jamais vos mots de passe à l’oral.
En cas de suspicion ou de situation anormale, nous vous invitons à contacter le service officiel d’assistance aux victimes numériques sur : www.cybermalveillance.gouv.fr pour effectuer un signalement et faire valoir vos droits.
Nous regrettons sincèrement cette atteinte à la confidentialité de vos informations.
!unix_surrealism@lemmy.sdf.org pour de l’art surréaliste avec comme “sujet” la philosophie Unix opposée a la dystopie du logiciel corporate.
!historymemes@lemmy.world est une des seules commu’ «à memes» que je trouve réellement drôle.
Wow, I didn’t realize that C.S. Lewis was riffing off of 1 Corinthians: 13 when he wrote (emphasis mine)
When I was ten, I read fairy tales in secret and would have been ashamed if I had been found doing so. Now that I am fifty, I read them openly. When I became a man I put away childish things, including the fear of childishness and the desire to be very grown up.
To be fair, weren’t Valve the first company to do that? People were really annoyed at having to install steam just to play some Half-Life.
Of course, that was only 1 launcher, no launcher-in-launcher shenanigans back then.
Aside from echoing @SnotFlickerman@lemmy.blahaj.zone and Doctorow’s statements about unionizing, I am aware of a few others who are trying things that I’d describe as complimentary to unions.
This is a panel titled “Why hasn’t Open Source Won?” where several of the speakers attempt to sketch out a framework wherein a programmer would have more decision over how their code is used: https://youtu.be/k3eycjekIAk . I’ll admit, I’m not the most impressed with where they get to in the limited time they have. Nevertheless, I think it’s a useful angle of consideration to have in the tool belt.
This is an org/foundation that is trying to walk the walk with regards to governing tech democratically: https://nivenly.org/ I haven’t kept up with any recent developments of theirs.
“I need some more [input] sanitizer for my eczema script, the console is red and inflamed whenever I check it.”
Having just watched the lecture, the only classified info I can recognize is the capabilities of 80s era satellites.
Given that, I think it’s quite a shame that the whole thing is only now available. Rear Admiral Hopper seems to have been someone who deeply understood both computers and people. The prescriptions she gives regarding “systems of computers” and “management” vs “leadership”, to name just two, are spot-on. Her lecture is quite grounded in what I’d call “military thinking”, but that’s just because she’s in a room filled with people who are of that life. In my opinion, everything she talks about is applicable to communities and businesses.
The general gist of the entire ~90mins reminds me of Project Cybersyn in its perspective on how computers could serve society.
The idea is neat, and there is a certain precedent for the approach in .htaccess files and webserver path permissions.
Still, I worry about the added burden to keeping track of filenames when they get used as stringed keys in such a manner. More plainly: if I rename a file, I now have to go change every access declaration that mentions it. Sure, a quick grep
will probably do the trick. But I don’t see a way to have tooling automate any part of it, either.
The second season of Iron Blooded Orphans is a good follow-up to the first, and certainly contains the themes you’re looking for.
making sure everyone is okay.
Given the current state of the world, that would be progress.
Get off of .world if you want to see a difference.
The size of that instance almost guarantees these kinds of dynamics will emerge, especially on a website run by volunteers and paid for by donations.
Stop complaining to other users; go be the change you wish to see.
J’ai bossé sur un Lenovo Thinkpad T480 14 pouces pendant environ 4 ans. Les Thinkpad c’est une question de goût, mais aujourd’hui encore je trouve que ses 14 pouces étaient un équilibre presque-parfait entre la compacité d’un 13" et la « surface de travail » d’un 15".
J’ajouterai que l’expérience avec Linux dessus était vraiment top, 100% du matériel était reconnu et fonctionnait etc.
J’avais pu opter à l’achat pour une batterie amovible surdimensionnée (72Ah) qui, couplée à la batterie intérieure fixe (~24Ah) me donnait presque 2 journées de 8h d’autonomie.
Math underlies programming in a similar fashion to how physics underlies automobile driving. You don’t ever need to know about newton’s laws of motion to pass your driver’s license and never get a ticket until you die. At the same time, I will readily claim that any driver that doesn’t improve after learning about newton’s laws of motion had already internalized those laws through experience.
Math will help your intuition with how to tackle problems in programming. From finding a solution to anticipating how different constraints (notably time and memory) will affect which solutions are available to you, experience working on math problems - especially across different domains in math - will grease the wheels of your programmer mind.
Math on its own will probably not be enough (many great mathematicians are quite unskilled at programming). Just as driving a car is about much more than just the physics involved, there is a lot more to programming than just the math.