XR?
Zykino
I'm with the others: fd
default syntax is easier to remember.
And for the interactive search I'm using skim
. With it I cd
to the dir I want and Alt t
to trigger fuzzy finding. There are also bindings to search for dir or in the history. The neat part is that results are inserted as is in the command line, no need to xargs or copy them. It also make the history look like I always know where the files I want are when in reality they are just fuzzy-found
First time I hear about checked exceptions. How do you use them ? Are you forced to handle them explicitly ? Is the handling checked at compile time ?
- Is a modern language with a good build system (It's like night and day compared to CMake)
Meson exists ... as do others.
But they are not the default option. And your new job may not use them.
- And I just like how the language works (errors as values etc.)
Fair enough; though why? What's wrong with exceptions?
Exceptions is a non standard exit point. And by "non standard" I'm not talking about the language but about its surprise appearance not specified in the prototype. Calling double foo();
you don't know if you should try/catch it, against which exceptions, is it an internal function that may throw 10 level deep ?
By contrast fn foo() -> Result<f64, Error>
in rRst tell you the function may fail. You can inspect the error type if you want to handle it. But the true power of Result in Rust (and Option) is that you have a lot of ergonomic ways to handle the bad case and you are forced to plan for it so you cannot use a bad value thinking it's good:
foo().unwrap()
panic in case of error (see alsoexpect
)foo().unwrap_or_default()
to ignore the error and continue the happy path with 0.0foo().unwrap_or(13.37)
to use your defaultfoo()?
to return with the error and let the parent handle it, maybe
I'm using helix with arrows. On a standard layout its not so great, but on my main keyboard I have a layer with arrow keys near hjkl. So I can use that on all software even on my BÉPO (DVORAC like) layout.
From the article's own summary.
False Load Output Prediction and Speculative Load Address Prediction allow for data leaks without malware infection
But I guess "IA summary" did its best ¯\_(ツ)_/¯
Why should I use a sudo alternative?
-g
is not documented, what does it do?
Note: this made me discover topless (SFW) and its Caveat section.
From your example, I have a hard time inferring what is it doing.
neither strictly nor strictly typed.
I think one of them should be "strongly", but I understood your point.
Thinking back, I don't have the doc easily accessible (on phone), but I think the C API state the type you want to read. Like get_int(smt, VALUE_INDEX, …)
, so at least in the C API, most of this should not be visible. Maybe only the SELECT 1 = '1'
part (or others comparaison fully done in the SQL string)?
Source can be destroyed. An alternative screenshoot backup/proof is good measure. Especially in web its better to not depend on an outside server.
Like if they close (or some billionaire buy them and requires an account for everything), your content becomes worthless.