.gitattributes can invoke Word on windows to diff versions, and there are plenty of open source scripts that can do it if you don’t have a copy of Word (or Windows) lying around.
But Word is like shit for papers. Use LaTeX instead.
Older C compilers would truncate a variable name if it was too long, so VeryLongGlobalConstantInsideALibraryInSeconds
might accidentally collide with VeryLongGlobalConstantInsideALibraryInMinutes
.
Legend says that they used to do it after a single letter with Dennis declaring “26 variables ought to be enough for anyone”.
Red circles are deprecated in favor of teal because of accessibility requirement WIP.DOnotUSE.14.g.2025.v0.
They started from XML. There’s nowhere to go but up but spring managed to fuck even that up.
FactoryStrategyFactoryFactoryObserverInterface
Friends don’t let friends use Java 😜
Whoosh
Seriously though, spring configurations are written in XML and you create variables, call functions, and have control flow. Effectively turning XML into a horrible twisted shadow of a programming language.
All in the name of “configurability” through dependency injection.
XML is the second worst programming language ever created by humans
Centrifuges spin really fast, so you need to balance out the things they’re spinning, otherwise it can fall catastrophically.
Stick everything on one side and it will effectively explode.
TCP Selective Ack is very much a thing, but it does take extra memory so lots of TCP stacks exclude it or disable it by default.
TCP was never designed with wifi in mind. TCP retransmission was only ever meant to handle drops due to congestion, not lossy links.
Tmux is a wonderful complement to mosh. Together you get persistence even when your local client loses power (speaking from experience)
I worked with mosh for years to connect to servers on other continents. It was impossible to work otherwise. It only has two small warts: forwarding, and jump hosts.
The second is fixable/ish with an overlay network, but that isn’t always an option if you don’t control the network. I tried to solve this with socat but wasn’t able to configure it correctly - something about the socket reuse flag was very unhappy.
If you really want to maximize your impact, check if your employer or professional association have donation matching for various large charities.
There are obviously many more charities - these are two that I believe have the highest chances of actually reaching civilians in Gaza and not being diverted.
Also that in order to exploit this it requires an active man in the middle. Which requires any of the following:
Almost all of those have decent mitigations like 801.x and BGP monitoring. The best mitigation is that you can just change your client config to disable those ciphersuites though.
So to be clear: you didn’t laugh?