Shit, that’s where my sex drive went. Can I have it back please?
Shit, that’s where my sex drive went. Can I have it back please?
You don’t need reproducible builds. You can get by if you trust whoever compiled it, like your distro’s maintainers or the pidgin developers.
Copyleft means: “if you modify the program and share it, you also have to include the source code for your modifications.”
The owner of the copyright (usually the developers or their employer) can still change the license later.
I am aware. What processing is only possible in the cloud, and not locally?
Edit: My apologies, I didn’t realize you weren’t the same person I originally replied to. Please disregard!
Until homeomorphic encryption becomes a thing, cloud can’t be secure or private.
Why do you need homeomorphic encryption? Isn’t client-side encryption good enough for most use cases?
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
The real interesting debate is between ((f) 1)
and f()(1)
.
It used to be AGPL, now it’s SSPL.
In the sense that a CD player learns new music when you insert a disc, yes.
Bloody hell, why did the designer print the new UI mockup?
Pft, only five hours… Try compiling Gnome on a Pentium Silver.
source
Well today I learned!