![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
I hate that it’s only open source on the surface, but besides clion or a highly customised vim setup, I don’t think anything comes close to it.
I hate that it’s only open source on the surface, but besides clion or a highly customised vim setup, I don’t think anything comes close to it.
Remove the pills on her tongue and this is your typical porn-shoot picture. Lucky you I guess for not seeing that.
The answers to your comments are depressing. Good luck with everything!
You seriously can’t see how this is sexualizing women?
Linux is already a popular and viable desktop OS - for its target audience.
The downvote comes from you implying people cannot dev in Linux when its the platform of choice for this workload.
Now surely the user experience could be polished, but advanced users are at this point used to the workflow, and basic ones will stick to Windows out of inertia no matter what. Therefore the incentive for improving this kind of things is extremely low.
Why?
Small landlords are the cheapest IME, and often act like they are doing you a favour. Big ones are cold, but at least treat people like customers rather than janitors
The left has answers to those problems, but implementing the solutions requires more work than reopening Dachau and banning contraception. I’ve never talked to those imaginary non-racists who vote FN/AfD; all the ones I’ve talked to want the dirty foreigners out, but they are all too stupid to see that our economies are reliant on them. There’s no plan for the “after the purge”, never.
Heavily depends on what you do and how big you are
The day your machine is compromised is also the day ALL your passwords get stolen.
But it doesn’t list them does it? With e.g. zsh I can have the list of flags alongside their explanation, which is not the case with PS I think? I think even bash has it on more recent distros (not entirely sure)
I agree, but are you then implying that the windows explorer file search is good? Have you ever used anything else?
I’m not sure you’re understanding the argument: you cannot monitor closed source, therefore, you have at least as many eyes looking at my random crap on github as you do on the random crap some companies are doing.
Of course there are (or there can be) fully secure systems. The problems come when you assume something is.
Ugh, TIL zscaler actually does more than just send my PII to the USA without my consent.
You think this is easier to use than grep?
Windows has some kind of built-in VPN feature that auto starts and will otherwise not give you any network access. Add on top of that some corporate firewall and you basically can’t sneeze around your laptop without IT knowing.
Can I forward your comment to my IT team? Because they’ve done worse than that already :(
Multi bits models exist because thats how computers work, but there’s been a lot of work to use e.g. fixed point over floating for things like FPGAs, or with shorter integer types, and often results are more than good enough.
It is