![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/c0ed0a36-2496-4b4d-ac77-7d2fd7f2b5b7.png)
That’s not legal serialized json, in the context of how any lib in Java (that I’m aware of) would either parse or render it.
Ignore me, I misremembered, sorry about that.
That’s not legal serialized json, in the context of how any lib in Java (that I’m aware of) would either parse or render it.
Ignore me, I misremembered, sorry about that.
Worst is when someone fucked up the DB time configs at some point and you have datetimes in a column that fall during the “nonexistent” hour in which clocks skip ahead for DST, and you have to figure out what the fuck actually happened there, and where in the data pipeline tz data was either added or stripped (sometimes it’s both, and sometimes it’s not just once), and undo the timestamp fuckery.
Source: did that this week. Was not super awesome.
I’m gonna keep deadnaming his company for as long as he keeps deadnaming his kid
deleted by creator
Reading between the lines, sounds like he’s pissed about being called out for being a Putin apologist and following Russia’s party line on Ukraine.
You’re not going to shame people into disowning their morality. This isn’t a fight you’re going to win.
Glory to you, and your house dry rub!
In addition to what everyone else has said: internships.
You’ll understand a bit more about how to play the corporate tech game, and there’s an absolute fuckload of stuff that school just straight up does not touch on. Also, it’s a great way to start off your network. Also also, since “entry level” jobs commonly have “required” experience, you can say that you’ve got a year or two experience with a straight face (and not be bullshitting about it, because you do at that point).
In point of fact, the alphabet agencies have for years now adopted a “capture now/read later” approach to encrypted traffic they consider to be suspect. “Later” is code for “after we’ve got cost-effective and scalable quantum compute that can break traditional encryption”. So if you haven’t been keeping up with bleeding-edge quantum-resistant cryptography when generating and using your own keys, you’re probably going to have your traffic read by an NSA analyst (or more likely, some sort of NN-based “terrorist detector”) at some point.
I don’t think it’s feasible to blacklist posts about Intel in computer science related communities, to be perfectly blunt.
I gotta be honest: it’s deeply frustrating and dismaying that Intel is tied up with Israel, but the fact remains that, as technical professionals, it is literally impossible to avoid Intel, because enterprise customers don’t really care about that BDS list. Ignoring technical innovations from Intel - one of the leading CPU manufacturers since CPUs became a thing - is only going to kneecap your own knowledge and expertise.
100% CYA, but also, follow the letter of the law. If you are disciplined - or face retaliation - for following documented processes, you bring it to his boss and HR.
Because the Zuck was like
right, so we’ve got this huge captive audience. If we copy Craigslist and add like 1% more functionality, we can steal that whole market, and also have a decent shot at taking a bunch of the eBay (et al) market share too
Yes, and it is the correct number of zeros to use. I find it helps to put things into scope. “Trillion” is an abstract magnitude to most people. Writing it out numerically makes it clear how absolutely enormous the number is.
Lemmy by fucking MILES.
Hey remember that one time where the country’s credit rating got downgraded due to political idiocy?
Pepperidge Farm remembers.
Two things:
Neat!
Also, the full disclosure of association/potential bias is absolutely appreciated. 🍻
It seems to be populated exclusively by people (or these days LLMs?) who have had MS customer interaction training, but simultaneously have no grasp of reading compression.