Esc > E > S > Q
Esc > E > S > Q
I’ve found on my android phone that the bitwarden prompt comes up more reliably if I tap on the password field instead of the username field.
Is generative AI going to be the calculator of the future? Seems probable, but I don’t know of course.
For important emails I always draft the message before adding the recipient’s email address. Then, I review it before finally adding in the email and hitting send.
I mean, it IS freely available. I’m pretty sure many (all?) of these paid apps get their data from NOAA and NWS.
I’ve found that bitwarden pops up more consistently if I select the password field instead of the username field.
Most people do not know who Satoshi is.
Not really a concern for home use if it’s not networked. If it is networked, make sure you at least have it behind your firewall, disable any remote access/remote printing features, and ideally update the firmware as well.
This is the integrated search on the home screen of my android (pixel). For a lot of mobile phone users, it’s the fastest way to search something. I can just Google search directly from the home screen instead of opening up a browser.
What a sweet lil baby 😻
Not sure what they’re referring to, but there are a number of warnings when you install an APK and you have to enable a setting to allow you to install an APK. It’s not challenging or restrictive, but a user who is unfamiliar might be discouraged from installing an app this way after seeing the warnings.
That’s just left over from the original comic: https://www.gocomics.com/calvinandhobbes/1990/06/05
I have used Excel to make tags from a table before. Usually just for one off stuff and before I was very familiar with JavaScript.
E.g. if you have a table of 100 urls you could use excel to easily turn them into a
tags using the various text formulas like concat.
It’s probably never the best tool for the job but sometimes I’ll do stuff in Excel just because I’m very familiar with it.
To clarify I am not a programmer by trade lol
Ada is a feminine name. The Ada language is named after Ada Lovelace.
The good news is, a lot of old secrets won’t really matter anymore by the time we have quantum computers that can break the encryption. There will obviously be a big impact on information that was encrypted just before we get a working quantum computer that can crack modern crypto.
In cryptography discussions, I feel like we’re usually implying (or even saying out loud) that the encryption is secure for a sufficient amount of time and computer power. Perhaps people outside of cryptography don’t know it, but I think there is a reasonable expectation that encrypted communications could be decrypted at some point in the future. We just hope it’s sufficiently far enough away (or difficult enough) to not be a problem.
Honestly as soon as we get some good post-quantum crypto, we’ll probably want to switch over to it asap, even if good quantum computers are still far out, just to help alleviate some of this problem. Of course, I imagine we’re still going to be finding new things once the technology is real and being used. Let’s hope the post-quantum cryptography algorithms we come up with actually are strong against a sufficiently large quantum computer.
Sounds like a lot of work. I have no idea how heavy a ship’s anchor is, but I imagine it would be hard to throw any significant distance.
I was gonna say, I’m pretty sure I’ve seen this exact website before
At least we have font-family: sans-serif;
Nice, that’s a good point! I didn’t think of that.
In case anyone is wondering, this is from Signs (2002).