![](https://lemmy.dbzer0.com/pictrs/image/ae344618-4fe5-4686-b683-c344d3cf6b12.jpeg)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
Yup, the lab could tell a difference!
Awesome!
Yup, the lab could tell a difference!
Awesome!
The amount of heat reflected/absorbed between the two sides is trivially small.
Your particular choice of wording here makes me very curious: Do you mean that there really was a measurable difference (which was trivially small)?
If that’s the case you should update Wiktionary which currently claims that they’re synonyms: https://en.wiktionary.org/wiki/resume#Noun
I myself spend a disproportionate amount of my free time debugging open source software (and filing bug reports and patches).
FWIW, this is not normal or expected, most users get their notifications more or less instantaneously. Maybe knowing this might help you search for information about whatever it may be that prevents this from working for you.
The Line messaging app is ridiculously popular in Japan, to the point where people sometimes are genuinely confused by someone trying to explain that they don’t have Line on their phone:
You might find this project interesting:
As already mentioned several times, selfhosting a mail server is not recommended unless you’re particularly interested in hosting a mail server, but with that said, you might find this project interesting:
I’m pretty sure that forgetting and allowing are two very different things.
Kaizers Orchestra
That seems like a perfectly reasonable thing to do, very different from allowing “notifications and messages to disrupt their sleep”.
Some even allow notifications and messages to disrupt their sleep.
WTF is wrong with people!?
The developer said he forgot that his secret keys were in the repository.
If you have your secret keys in your repository you’ve already fucked up, long before you accidentally make that repository public.
However sometimes people don’t realize which community they are in and they just look at the title.
Guilty as charged. After reading the title it didn’t even cross my mind that it could possibly refer to anything other than mobile apps so I saw no reason whatsoever to look at what community it was posted in as the app I came to think of as a good recommendation is cross platform.
When I finally learned about Pocket just a few years ago it surprised me greatly that I didn’t know about it before and now I use it daily:
I would like to suggest that anyone who in the year 2024 insists on you communicating with them by fax can’t be trusted and your best solution is therefore to stay away.
In general, no. Most malware that runs its own process simply uses some name intended to make you not notice it. But it is possible, in Linux just as in every other operating system that ever existed, to imagine that some unusually sophisticated malware manages to exploit some unknown vulnerability to gain full control of the kernel and then all bets are off, then it would be able to do anything.
By banning the use of expensive bread-slicing machines,
So they didn’t actually try banning sliced bread.
I like this.