
The image of crypto as some sort of reel currency run by free spirits in hoodies is completely wiped out by this snapshot of old white guys in suits.
The image of crypto as some sort of reel currency run by free spirits in hoodies is completely wiped out by this snapshot of old white guys in suits.
They could have posted a link to a nonexistent pizza place.
Nothing says free speech better than banning certain topics.
Or maybe it is where you go to find cocks. IDK.
Because cocks like hens.
Aren’t most cities Democrat?
Good point. I think knowing where to draw that line comes with experience (and having to fix lots of other people’s code).
I would have liked some comments explaining the rules we are trying to enforce or a link to the product requirements for it. Changing the rules requirements is the most likely reason this code will ever be looked at again. The easier you can make it for someone to change them the better. Another reason to need to touch the code is if the user model changes. I suppose we might also want a different password hash or to store the password separately even a different outcome if the validation fails. Or maybe have different ruled for different user types. When building a function like this I think less about “ideals” and more about why someone might need to change what I just did and how can I make it easier for them.
I often use imagemagick (cli) for cropping, rotating, resizing, etc.
There are some monitoring tools which take a snapshot of the process table every few minutes. If you happen to run one of those, and your process happens to be running when the snapshots is taken you can catch it.
If this is a postgresql server and you have logging turned up with pids being logged, and the pin in question was a database process, you can probably find it in the database logs.
Gen AI is like super-autocorrector.
I bet if you cut it vertically the lights will go out.
Nothing about OpenAI is open-source. The name is a misdirection.
If you use my IP without my permission and profit it from it, then that is IP theft, whether or not you republish a plagiarized version.
Sometimes after upgrades, even minor ones, I find it useful to run analyze on all of the tables. I usually do analyze verbose;
so I can see which tables are getting analyzed. This will assess every table so the query planner can make better decisions about how to resolve queries. If the query planner is making bad decisions I/O and CPU will be high and query performance will be poor.
If those guys are supposed to be in uniform - no two are dressed the same. One guy didn’t tie his shoes, another’s jacket doesn’t fit. It is very sloppy and unprofessional looking.