Not about design patterns, but about making preparations: https://github.com/potatoqualitee/eol-dr
Not about design patterns, but about making preparations: https://github.com/potatoqualitee/eol-dr
Grindr faces massive fine for “allegedly” “sharing” “sensitive” “user” “data”.
It’s that, plus “notifications can disrupt your sleep.”
“A much greater issue [than the blue light] is likely to be the content viewed,” says Peirson. “Reading work emails relating to impending deadlines is clearly going to cause anxiety, and anxiety is strongly related to insomnia.”
That actually makes a lot of sense. I never even second guessed how tedious all the parsing is. But then, as others have said here, as soon as the task at hand reaches a level of complexity beyond grepping, piping and so on I just very naturally move to Python.
On a different note, there are ways to teach bash json. I recall seeing a hacker conference talk on it some time ago, but didn’t pay close attention.
Mh, it probably depends a lot where you’re coming from. I don’t need Powershell or have a reason to learn it in my daily work, and I mostly use WSL to access Linux shells everywhere else. And on top of that, I don’t understand why Powershell needs a completely different command set to basically every other shell. It’s a biased take, but I have not had an interaction with Powershell that I liked, nor have I seen a feature that made me want to look into it more.
What’s the killer feature, would you say? Care giving me the fanboy-pitch?
edit. Oh and I forgot, the tab completion in Powershell is so incredibly dumb. I never ever in my life want to cycle through all items in a path, and much less have it be case insensitive. Come to think of it, this might be the origin of most of my disdain. ;)
WSL has changed the game pretty significantly, don’t you agree? It’s not perfect, but allows me to stay firm in my resolve never to learn powershell.
It’s not my Github, but I think you’d do something like print and store in a safe place your trusted party has access to. My SO has my Keepass password stored in their password safe and theoretically knows (and hopefully will recall when the need arises) how to find my Keepass file, for example.
In short, it’s trust. And then there’s the fact that they would never voluntarily touch this stuff anyway. 😅