Clearly you should install Edit.
- 0 Posts
- 65 Comments
You can though?
mySet.values().map(mappingFunc)
will create a new iterator transformed by the mapping function.
I’m currently on a crusade against lodash where I work.
The former.
I had an intermediate not understand how to read a pipe-delimited text file.
vithigar@lemmy.cato Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish6·2 months agoJellyfin has some security issues that, depending on who you ask, are either critical vulnerabilities that make it completely unsafe to expose to the Internet or largely unconcerning for regular users.
vithigar@lemmy.cato Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish41·2 months agoI had exactly the same experience, at about the same time. Had been hearing good things about Plex so decided to try it out. Immediately noped out when it required me to create an account with them. Similar to you I looked around and found it to be a relatively new change.
Frankly baffling to me that anyone with the wherewithal to self-host was okay with it.
There’s an edge case where you want the guys in balaclavas to show up.
vithigar@lemmy.cato Programmer Humor@programming.dev•Does this exist anywhere outside of C++?4·2 months agoC# also has verbatim strings, in which you can just put a literal newline.
string foo = @"This string has a line break!";
My mistake then, it’s more vulnerable then I initially thought. I also don’t think it’s secure even if that weren’t true, just that it’s not worse than single factor passwords (which you also shouldn’t use of security is a concern).
If the fact that a 128-bit value when sent to your server can retrieve a single piece of media or user info then I have real bad news about what you can do with a typically much shorter password.
Is it ideal that you can retrieve streams or user info from Jellyfin if you know the ID of the entity you’re looking for? No, obviously not. But you need to authenticate to get those IDs in the first place, and there are fewer bits of entropy in most people’s passwords than there are in UUIDs.
Being able to get streams unauthenticated by guessing the correct UUID is arguably still better security than using passwords without 2FA.
You stated the reason yourself. Those are different values and matching in a case-insensitive manner is more work under the hood.
vithigar@lemmy.cato Programmer Humor@programming.dev•Guide to software developer job advertisements5·4 months agomust know Java, go, JavaScript, Ruby, Python, or rust
Depending on the division you ended up in at the company I work you might need one or more of MSSQL, MySQL, PostgreSQL, C#, TypeScript, JavaScript, PHP, Ruby, VB.NET, Terraform, Groovyscript, or PowerBuilder.
It would be a subset of “urban commercial”, right? Somewhere in the range of half to three-quarters of it?
vithigar@lemmy.cato Selfhosted@lemmy.world•which softwares can I self host without public IP?English31·4 months agoOP doesn’t seem to have responded, so no, but that’s not the fault of the question.
vithigar@lemmy.cato Selfhosted@lemmy.world•which softwares can I self host without public IP?English71·4 months agoBecause of the XY problem. The problem OP is stating may not actually be the source of the issues OP is experiencing.
Finding out what OP is trying to do will better inform a solution and may make the stated problem irrelevant.
Tell that to the person who implemented Tetris in Postgresql.
vithigar@lemmy.cato Programmer Humor@programming.dev•every worthwhile link on how to implement your own squeeblerizer is dead and approximately 40% archived21·5 months agoFor what it’s worth, in that specific example at least JSON parsing has been available as part of the base .NET libraries since .NET 3.
i
is still a value type, that never changes. Which highlights another issue I have with the explanation as provided. Using the word “reference” in a confusing way. Anonymous methods capture their enclosing scope, soi
simply remains in-scope for all calls to those functions, and all those functions share the same enclosing scope. It never changes from being a value type.
Yep, recent blog post about it:
https://devblogs.microsoft.com/commandline/edit-is-now-open-source/