This is slightly misleading. The Kansas flag, for example, does have human toes hidden by dirt rather than shoes (or shoes if we do not assume the farmer is standing in the plowed rut). I question the selection methodology. Since there are readily visible hooves on the KS flag as well as hidden human toes, should we assume that all of the yellow states also have human toes hidden? We can’t because of, for example, California, which has bear toes and no human.
No other company will contribute to LXD now. This is 100% a Canonical tool. Were the big clouds looking at deploying LXD so Canonical tried to block them?
Yen said Proton might move the feature to a public blockchain
I’m not interested until it’s public. Additionally, building out the chain then dropping it to rebuild a new public one is rewriting history, which violates the whole “immutable” part of “immutable ledger.”
I’m not really seeing much in the way of cybersecurity tools in this thread. These are all FOSS and usable without extra cost (although some have paid upgrades)
You’re very focused on religion and seem to be missing all of the points about logic.
not saying that … pretty agnostic
Cool, we’re on the same page.
If someone makes a claim… it needs… evidence
This is problematic without a rigorous definition of evidence. I’m assuming you mean something along the lines of repeatable and independently verifiable since you won’t take a claim at face value. If you’re going to rigorously define evidence, you’re going to need to create a system that can’t contradict itself. Per your quotes, either there is a ball in my hand or there isn’t.
This is called a consistent system. We agree on a set of axioms that we will achieve results from. If we have a consistent system and build a bunch of results on top of that, eventually we’ll run into things that are true but we cannot prove. We know this because of a famous result I’ve already mentioned. In other words, we must take central results on faith. A common one that, several decades ago, was met with ridicule because it was “so illogical” mathematicians had “suspend reality in order for it to make any sense” is the axiom of choice.
In other words, you can’t use logic and reason to say those that believe in religion are idiots because you have just as much proof as they do (just faith) if we accept the basic axioms that drive our logical system.
doesn’t exist because it doesn’t exist… isn’t circular logic
You’re conflating a tautology with circular reasoning. Circular reasoning boils down to “A because B; B because A;” and you’ve said “A because A” without any support for A. The lack of something in your hand is not necessary and sufficient to prove the ball’s existence. The only claim we can make is that your hand is empty.
Here is a metaphysical claim for you to chew on: it is possible to know whether or not it is possible to prove a claim.
If you want more grimdark and it has to be fantasy, check out Warhammer horror especially the vampire Genevieve. If you’re okay with grimdark science military science fiction, a good chunk of the Warhammer 40k and Horus Heresy lines will fit your bill.
I feel like Hobb is much lighter. For whatever reason I always think of Tad Williams and the Dragonborn Chair as connected to Hobb. I suspect it’s from the Legends anthology but they were only together in Legends II with a different Hobb trilogy setting and Otherland for Williams. Both are great starting points to find authors that have huge bodies of work that could hook you. They were how I found George RR Martin back in the early aughties.
So you’re lumping this resource into a bucket with other resources that were malicious but you have no direct connection from this resource to harm you claim it causes? You’re saying a dev using this list to allow people to download free content but prune emails to save his bounce rate is doing bad things and needs to convert their FOSS use-case to yours?
Who gets to decide? You didn’t answer that and in the interest of good faith I’ll pull that one down as the important one since it follows from the argument I feel you’re making.
… which gives a timing attack and the ability for bad actors to impersonate someone. I agree with you that, once public, this is a good idea. You cannot convince me that this is a good idea if done privately because there is no way to trust but verify, especially in the highly sensitive contexts they want trust in.
If it’s not public, I won’t trust it. You trust it blindly because it’s in beta. We’re not going to come to an agreement over these mutually exclusive positions.
While I primarily use streaming services, I almost always still buy albums on Bandcamp for the day when I need to go back to running my own music. You can save up for a Bandcamp Friday when more goes to the artist. Bandcamp has been the best place for music for awhile. Best to get in before Songtradr continues the destruction Epic started.
All of this continues to go past you. You want to attack the metaphysical for its belief system yet you completely miss when you make the same logical leaps for yours. How can insurance companies prove something? Why are they right? If a court makes a decision, is that the correct one? Prove it. Only you can’t use logic or anything that comes from logical systems because, based on your attacks on religion, you’re not allowed to use the faith to prove the faith.
He added a midquel, Port of Shadows, in 2018, and there are some really good shorts you can find in his Best of collections that are also recent. I’ve found a lot of folks who read them back when have missed these!
I feel like this is a great rec because The Witcher is pretty grimdark and Cook is a grimdark progenitor. Good pick!
This is really dependent on whether or not you want to interact with mounted volumes. In a production setting, containers are ephemeral and should essentially never be touched. Data is abstracted into stores like a database or object storage. If you’re interacting with mounted volumes, it’s usually through a different layer of abstraction like Kibana reading Elastic indices. In a self-hosted setting, you might be sidestepping dependency hell on a local system by containerizing. Data is often tightly coupled to the local filesystem. It is much easier to match the container user to the desired local user to avoid constant sudo calls.
I had to check the community before responding. Since we’re talking self-hosted, your advice is largely overkill.
You’ve ignored my questions attempting to flesh out your point and refuse to link this specific list to anything bad. I don’t think you understand good or bad faith. Good luck with that!