What do the exclamation points mean?
What do the exclamation points mean?
Two of the “questions” are just statements
Unpaid Open Source developers will have trouble fulfilling increasing government requirements, for example the EU Cyber Security Act.
Emerging companies like Tidelift, which pay developers, will solve the current problems of Open Source.
Open Source Software follows the Open Source Definition, while Free Software follows the Free Software Definition.
They have heavy overlap, one is not a subset of the other, and they are similarly restrictive, just shepherded by different groups. I’m sure there are licences that satisfy one but not the other, but they would have to be few and far between; just reading through each it’s not obvious how one could satisfy only one definition.
If I read that right, the normal way. It’s not a special lock, just the normal lock screen. The use case seems to be addressing the idea of your phone being snatched while unlocked, and then attempted brute forcing into apps with sensitive data pin/biometric locks
What thing called turtle are you referring to?
These guys are Canadian and I’ve always thought their tech seemed really creative and novel
How about MNT Reform or it’s Pocket little brother?
They get you
They do NOT get you
Did you… try?
I can’t help you but I’m fascinated by your door now. Does this door/lock have a name? How did you end up with such an elaborate mechanism?
Scrum that’s not adapted to your needs isn’t scrum.
The entire suite of new TLDs was dumb as a bag of rocks, but dot zip really takes the cake
Ironic slang is just slang that hasn’t grown up yet.
IMO there are exceptionally few cases where it is acceptable for a QR code to not be immediately adjacent to a textual representation of the same content.
What plugins can you recommend?
I think the only markdown plugin I’ve used was for table alignment.
I’ve used 3 unrelated baby cams and junked them all because not one was remotely usable, never mind reliable.
That was a decade ago, but we had pretty solid ip cameras a decade ago.
After reading that whole article I feel no more enlightened.
They mentioned secure boot, is secure boot part of the exploit or does the exploit invalidate secure boot?
He’s not naked, he’s wearing glasses