Obviously she clicked "X" for "X"-treamly interested. Isn't that how everything works these days?
You can't fix stupid.
You can buy a cat, name it stupid, and get it fixed.
...sez the guy whose homepage is facebook.
Because of the sloping terrain and city codes regarding minimum foundation thicknesses, it ended up taking 96 80lbs bags
96 80lb bags would only cover 115 square feet at 6". And if it's a slope, it would have to be smaller than 10x10. Where do you live where they have building requirements for such a small shed? In AZ, you don't have to care at all until you go over 200 square feet.
It shows that there's an incline of purchase, not a descent.
I worked around the PHB doing something like this by telling him we'd written our own cloud software and were using it because it was more secure than what is currently available.
He doesn't talk to cloud guys, because we've already got a cloud provider (AFAHKT).
Yes, things like this really work in real life.
Probably the best variant of this I've seen was a friend who concatenated md5sums of various kernels he'd compiled into a string and printed them onto a dog tag which he kept on his person.
Based on something he knew about the machines location he started at a certain row and column and typed a certain number of characters off the tag.
I really don't like phones. They rarely bring good news.
In my case they don't die, I kill them. Specifically, I smash them. I break them into little tiny bits.
I don't do this out of anger. I do it for the joy of destroying the phone.
I really don't like phones.
The problem isn't that they would treat Charlie Shrem differently, the problem is Charlie Shrem doesn't have 2 billion dollars to give them.
I think we can all agree that it bears repeating- repetition is the key.
Additionally, try to focus on repetition. Repetition is the key.
I would argue that very few jobs are actually "good" for you.
But we can't all run around naked in the forest eating nuts and berries.
Quite the conundrum.
And how do you propose to know if any particular compiler or library is or isn't compromised?
Obviously you'd just write the compiler and libraries from scratch.
And we already know the name.