![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
It’s alright. I use both their desktop backup service and B2 extensively. Their desktop client and web interface is very basic and a bit rough, you don’t buy their service for the well-developed UI. The service works as advertised though.
It’s alright. I use both their desktop backup service and B2 extensively. Their desktop client and web interface is very basic and a bit rough, you don’t buy their service for the well-developed UI. The service works as advertised though.
The headache comes up when multiple third party repositories start conflicting with each other
Which is traditionally why you needed the distro to package your software…
So, only passwords, right? Not associated with usernames?
I wonder how accurate it is though. What did the artist base it on?
Is it me? I see no real difference between 80% of these styles.
They can exercise those rights by serving their full sentence.
Please point out the actual transphobia? You can’t just use that word willy-nilly.
It’s absolutely fine, it was mildly annoying the first two times and now in glad I don’t have to hold the cap while drinking.
So you’re always behind, patching up small bits of code that don’t comply with your guidelines, while letting big changes with, by deduction, worse code quality through?
You don’t quite understand. One of the major drawbacks of UUIDs over monotonically increasing id’s is the lack of ability to sort them. Not just for manual querying, but for index operations, caching, data locality etc.
It’s very handy and is a big part of the reason why Twitter developed Snowflake IDs, which are basically like UUIDs v6 and v7.
The UUIDs specs are quite easy to understand and definitely not “enterprisey”.
They chose “version” because they are just that, versions. Improvements over the original design that benefit from new insights and technological improvements. We’re lucky they had the foresight to include a version number in the spec.
A lot of people in this thread who don’t fully understand how UUIDs work…
I understand, but keep in mind it could be an innocent user whose phone is taken over by malware, better be safe than sorry.
What a weird set of events. It’s not even clear what was actually used as infection method.
I wonder what they consider deprecated.
No it’s not, what a weird take. If I publish my art online for enthusiasts to see it’s not automatically licensed to everyone to distribute. If I specifically want to forbid entities I have huge ethical issues with (such as Google, OpenAI et. al.) from scraping and transforming my work, I should be able to.
See also: the XKCD spin on it
Depends on why you want to hide your server ip, what’s your use case? Is it to protect against DDOS?
Cloudflare is evil, but is there any other party you would trust to share everything with?
That’s not true. The way their streaming works is basically a Playlist of shorter fragments. They can easily insert their own fragments without obvious visual tells if they don’t alter other elements of the page to indicate that an ad is playing.
That is patently false. It was developed to help develop the Linux kernel, which famously has multiple decentralized repositories managed by different maintainers.
The fact that most companies use it in a way you describe, with only one central repository, does not mean that git is not distributed.