

Should have used three spreadsheets. Excel tends to run slowly when a spreadsheet has more than a million cells in it.
Should have used three spreadsheets. Excel tends to run slowly when a spreadsheet has more than a million cells in it.
There was no mention of over-the-air exploit, so eh.
Anyway, having direct unprivileged R/W access to platform memory is indeed a security hole, no matter the vendor.
It is not. ESP32 is an embedded chip with less than one megabyte of RAM. It cannot run apps or load websites with any malicious code, it only runs the firmware that you flash on it, nothing else, and of course your firmware has full access to every chip feature. If your firmware has a security hole, it’s not the chip’s fault.
Nope, the whole {variable/regex/replacement}
syntax
Tech companies spend effort on a FOSS project when either it’s their main product, or when they have no choice, it’s licensed under GPL and there are no BSD or Apache-licensed alternatives. Contributions are usually done by individual employees in their after-hours time, and most managers see it as directly benefitting their competition.
Other companies provide nothing, so it’s definitely better than average.
Nah, the kids I know learned C just fine. C is simple, C is all you need for writing kernel drivers, pointers are not that hard if you explain them well, it just feels really pedestrian compared to Python or Typescript.
It’s ultimately a question of money. Older guys with software engineering degrees and fancy salaries can spend their weekends doing free community service in the form of open-source development. Younger people have to worry about job and rent and bills, they simply don’t have that kind of free time.
Add to that the growing complexity of the software. Something that could be done by an university student before, like writing an OS from scratch, won’t be nearly as useful as it would in the '90-s, because it was already done before, now you have multiple OSes to choose from. And joining an existing software project is hit-or-miss, some are inclusive and some are an old boy club where you need to know the secret rules.
In Lua all arrays are just dictionaries with integer keys, a[0] will work just fine. It’s just that all built-in functions will expect arrays that start with index 1.
You can actually use / as a path separator on Windows in functions like fopen(), because it supports some ancient version of POSIX standard.
Jumping from loose-typed language to strict-typed language will be hard.
It’s also a matter of your general programming experience. Once you write, like, ten thousand lines of meaningful code in Python, learning C# should take you a month or two at most, you’ll know most programming concepts and algorithms intrinsically, and the rest is just learning syntax.
I think your videocard is about to die.
I have switched from XTerm to Konsole only a year ago.
It’s just C++ without templates. So whatever element you want to put into std::list, it must virtually inherit std::list::value_type. And of course there will be a macro-based list monstrosity inside Boost.
In Russia, bad hackers are promoted to infantry. They also cannot make a decent living elsewhere, because they are conscripted and cannot leave the country.
Donations are not sustainable. Many open-source projects tried them, and the only thing they can cover are server costs or conferences, developers are still working for free on their own time.
it’s used to verify that OpenGL ES2 works onn your system. It’s the variant of 3D graphics drivers that is used on smartphones. Many apps nowadays write their GFX frontend with GLES2 so it uses the same code on phones and PCs, and if they compile the app to run in the web browser, WebGL is also based on GLES2.
Nah, it will end up simply as “John” in the database. You need “John%sDoe” to crash C software with unsafe printf() calls, and even then it’s better to use several “%s”
The security issue is very likely scenario. If you’re in Russia, you can go to jail at any moment on totally bogus charges. It is very easy for FSB to pressure some random kernel maintainer into adding hard to detect backdoor into their code, it will be XZ situation all over again.
That’s because the article that started the whole argument tried very hard to present an expected behavior for embedded chips as a security hole.