Just add a delay that pads it out the execute time to 10 seconds. O(1) ez.
Just add a delay that pads it out the execute time to 10 seconds. O(1) ez.
I reserve .elf for executables for other platforms, like microcontroller firmware.
Na let’s keep timezones, there useful for humans who generally want time to mean something, but lets ditch daylight savings time, all it does is make scheduling a massive pain twice a year, and messes up everyone’s sleep cycle. Without it, timezones would just be a fixed offset from another, minimizing trouble.
Don’t forget the loss of productivity in the hours before the meeting, spent worrying about it.
Hot take, C is better then C++. It really just has one unique footgun, pointers, which can be avoided most of the time. C++ has lots of (smart)pointer related footguns, each with their own rules.
pass otp. Works, more secure then SMS, open source.
Run the BIOS self tests.
Something’s definitely broken (TPM errors, self test errors, graphical artifacts), but I can’t tell what from the image. I would guess motherboard problems, or a subtly damaged CPU.
Could also be more then one problem in the case of over voltage (worst case consequence of PSU damage), or intermittent failure from under voltage (should be fixed with a new PSU).
Prevent subprocess from killing itself until finished.
Well first off, how nice/tolerant is your management? Do you have savings? Some companies can fire people over this stuff, other will just ignore it.
The easiest (and least likely to make anyone mad) solution would just be to bring in your own machine and use celular internet. This way your setup will be completly seperate from the company network, and they can hardly claim you were exposing them to malware or anything. On the other hand you might have problems accessing devices like printers without copying files back and forth (are USB drives allowed?).
This is actually how you should declare something that you will never change, but something might change externally, like an input pin or status register.
Writing to it might do something completely different or just crash, but you also don’t want the compiler getting creative with reads; You don’t want the compiler optimizing out a check for a button press because the “constant” value is never changed.
Make another account to see if a different user/email address gets a different URL, which would indicate that it is used to track users.
I don’t think so, unless the pirate left a calling card. If you want to make sure, just make the same sheet in pirated and non pirated versions, and compare the file. (They are zip archives, so that will let you see the raw XML)
I don’t think you could fit video on that microcontroller, even with the best compression. But some low memory and compute video compression for embedded devices would be nice.
I don’t know if writing a custom image compresson program and streaming graphics rendering code with worth saving a few bucks on parts.
I used it in a few microcontroller projects, let me get away with the cheaper 8 bit microcontroller with 64K of flash. The streaming decoding is real nice, because it can be read from flash and sent of to a display, without ever keeping it in ram. (4K!)
GNU is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX[Maximum call stack size exceeded]
Why does the tea project not have users claim ownership of GitHub profiles. That way it could be retroactively applied with no effort on the user or maintainer.
Security from what? Get a threat model.
A NAT will restrict connections from the internet, but won’t stop attacks from your local network. As your network grows, it might be a good idea to isolate shitty IOT devices (firmware is often full of holes), home internet and sensitive devices like cameras.
Of of the osmocom stuff is not in GitHub, which includes open source cellular network stacks, and assorted radio stuff like Rtl-sdr drivers.
Computers can really just do two things: copy data and do math. Anytime your your doing anything but copying data verbatim, there is math involved. Anytime your reformating, filtering or acting on data their will be some math involved.
Take displaying an image: you can’t just copy image data to the screen, because it could have a different resolution, or color space, or be compressed. In all of those cases, you will need to do a lot of math to get things to work right.
The exact math varies, in graphics, CAD or geospatial stuff, expect a lot of geometry. Any sort of statistics or classifier is going to involve a lot of linear algebra. Even simply storing data in s quickly accessable manner involves quite a bit of math.