They don’t ban your account, they ban your switch. If your switch is caught, it won’t be able to use any Nintendo services ever again. But your account would still work on other devices.
I blow hot air.
They don’t ban your account, they ban your switch. If your switch is caught, it won’t be able to use any Nintendo services ever again. But your account would still work on other devices.
You probably already know this, or are talking about another language, but JavaScript is inherently single threaded, so unless you’re running blocking I/O in parallel, you won’t actually see any performance boost. Service workers get their own thread though.
There are services that’ll sell you a brand-new modded oled switch for less than £500. It’s not exactly rare, any switch can be modded and a modchip is better than the OG joycon exploit since modchips are untethered.
Grep is as high power as vim and emacs??? In what universe?
Zoning to prohibit people from living on 99% of the land so that the population is dense enough to fully benefit from public transit? Lots of states don’t even have a true city at all. Should those be zoned as national parks?
Edit: I think I missed the point. You’re talking about just city zoning. Still, not a magical fix and would likely require moving lots of people and demolishing/building buildings and infrastructure. However, it’s more realistic than zoming everyone out of the midwest.
Yes, it depends on where the roads and rails are built and how direct their paths are.
The people in the meme are at about Seattle and NYC, which is a little over 3k miles apart (by car). You’d need to be going 250mph for the entire 12 hours to make that distance. A quick google search says that the maximum operating speed of a bullet train is 200mph, but tests have been conducted at 275mph.
So, you’d need to go non-stop at 125% max speed to make the trip in 12 hours. Even if you went at 275mph, realistically you’d make a lot of stops along the way, which is going to make the average speed a lot lower. Trains are great, but the US is really big.
Bonus fact: a non-stop flight from Seattle to NYC takes about 5.5 hours.
Ah, that makes sense. I was thinking more like a mini-m&m tube.
I’m having a hard time envisioning the flexibility required to make that work. It couldn’t have been both at the ends at the same time? Also, did this kid just get naked in front of everyone at their party? To each their own, I guess.
Thanks for your hard work!
If you want a decentralized search, set up a DHT crawler and build a db of millions of torrents in a week or two. If you want anonymity/legal protection, use a trusted VPN. I’m not sure I’d trust a random independent tor-like implementation, especially when the real tor is slow and has imperfect anonymity.
Oh, it’s drag-and-drop only with no keyboard support whatsoever. Changing a variable is hidden beneath 12 menus, and it uses a proprietary IDE that locks up after every click. Looks great in screenshots though!
You can 100% fire all your developers!*
*As long as your business users have loads of free time and the skillset of developers.
Is DDOSing really a problem anymore? Any CDN worth their salt should handle even massive DDOS attacks no problem.
Just buy our vendor’s/partner’s SaaS solution and all of this magically goes away!
Plenty of comments hurt my brain trying to comprehend how utterly stupid they are, but I don’t think there’s anything an anonymous stranger could say that would hurt my feelings, that kinda stuff needs to be personal.
This article is actually pretty awesome! Definitely taking some notes for when my role requires management.
All these answers read like they’re written for comp sci students rather than a general audience. Let me give an ELI5 (more like ELI12) a shot.
Ports are just numbers. They aren’t physical pathways or doors or windows or anything like that. A better analogy is a street address, like an apartment number. Your IP address identifies your computer (apartment building), and the port identifies the program on the computer (the apartment). When a program needs to talk to the internet, which is very similar to sending a letter, it hands a packet/letter to your computer and your computer assigns the program a port number. It then puts that number on the return address of the letter so that the recipient knows where to send the response. The computer remembers that port number is associated with that program, so when it gets an incoming letter with that number, it gives it to the program. After the program is done talking to the internet, the computer frees the port up to be used by another program.
Ports are “closed” when there is no program associated with them. Any incoming letters are ignored because they have nowhere to go.
Ports are “open” when they’re associated with a program. This happens automatically when programs send outgoing letters, or you can manually open (or “forward”) ports by telling your computer/router what the port should be associated with and that it shouldn’t use the port for something else.
ELI5 over.
The internet is networks on top of networks on top of networks, so your computer will have an IP and assign a port number, then your router will remember that and change the address on the letter to its own IP with a different port number, then that process repeats a few more times until eventually it reaches its destination. You don’t have to deal much with your computer’s internal network, but occasionally you have to deal with your router’s by opening/forwarding a port because it has a NAT that has to deal with all of the devices on your network. Forwarding the port just tells your router to always send incoming letters with that port number to a specific device.
Could be worse, mine have started saying “the MVP must be feature complete and 100% bug free” but there’s a 0% chance there’s enough budget for that.
� is used to represent an invalid character, so it makes sense that it’d appear often when bad data is being rendered (or good data is being rendered improperly).