Skip Navigation

Posts
11
Comments
196
Joined
2 yr. ago

  • You can always configure the garbage collection to reduce disk space usage, or manually run it.

  • Another NixOS user (and minor package maintainer, if it matters) here. Essentially, NixOS is actually rather simple to write a configuration file for a particular program once you get the knack for the nix language and learn how to workaround the sandboxing. I would actually consider it substantially less involved as compared to (for instance) creating your own Debian package.

    However, getting to this point will take a bit of effort, and this step is more or less obligatory to use software on NixOS, whereas it generally isn't (but still is a good idea) on other distributions.

  • If the streching is so small as to be unnoticable (and I agree it's pretty subtle) then I also don't really understand the benefit.

    Typically, the idea behind this sort of design is that it should be unnoticeable. The motivation is that, with other monospace fonts, the differences in character width, along with the inconsistent spacing and line thicknesses are both noticable and distracting. Some of this badness is avoidable, and this is what this font attempts.

    and yeah that height difference is really weird. That almost seems like a bug.

    I've been informed, (and had to double check because I didn't believe it,) that the two "i"s are actually the exact same height. The first looking larger than the second is an optical illusion. Font design is hard.

  • True, they are the exact same height. Holy optical illusion, Batman!

    I suppose this is part of what makes font design so difficult.

  • Here's your code example in the editor. I don't personally think the difference between the 'm's is super noticable. But what did strike me a lot more is the difference in height between the two 'i's in the first line. I think that difference is pretty bad.

  • The shittiest thing is that they're not actually good at it. We generally use compactness as a proxy for a gerrymandered district. However, you can effectively gerrymander using extremely compact districts. https://youtube.com/watch?v=Lq-Y7crQo44

    This is terrifying, and a strong reason to move to multimember districting.

  • Putting aside the misleading title...

    Because this writes to and then runs an executable file with a known name, this script should never be used on a multiuser system in a directory where another user has write permissions. It is vulnerable to a timing attack where the attacker copies an executable they want run with your permissions between this script creating the file and running it.

  • So long gay Balsa.

  • If you're looking for a text, a short web search turned up Clifford's D-Branes (TOC), it seems to be reasonably well reviewed. It is, of course, a graduate level text.

  • Did you know that this information can be easily googled, and you don't have to double down? A writable CD most typically contains between 650 and 700 MB of capacity.

  • For reference: South Carolina is about 60/40 with Republican advantage. They currently hold 6/7 house seats. In other words they hold 86% of the seats with 60% of the vote. This proposal would give them merely 70% of the seats with 60% of the vote. The closest split would be 4/7 which is 57% of the seats.

    There is one blue district in the state, which includes parts of both Columbia and Charleston. The rest of Columbia's and Charleston's populations are split among four other congressional districts.

  • Rereading the article, I honestly don't really consider SWERFs or TERFs to be feminists, and not even just in a rhetorical way. I didn't even mentally place them in the category of "people who could potentially be seen by others as feminists" when I read the article, which is why I was somewhat confused about the response. My bad.

  • I don't know whether or not feminist demonization of sex workers is widespread. I have heard of feminists who demonize sex work, because it can be exploitative and not everyone who engages in sex work is necessarily doing so completely of their own volition, in ways both similar and not so similar to regular work.

  • Both sides are bad, but they are not equivalent, and we indeed shouldn't flatten the landscape.

    In the interest of being constructive, what do you propose is the best way to voice this opinion off-handedly?

  • Or sometimes even just an array. The first time I thought I wanted to do this was 2003 and I was writing a perl script, and I was trying to loop through some sort of array, and write the outputs of some calculations to $val0 $val1 and so on, and I was neck deep into some horrible dark constructs like ${"val" . $i} before I actually realized that I really just wanted an array, you know, like the one I was already using.

    It took me forever to understand map (the metafunction).

  • You can likely inspect the traffic if you use Wireshark.

  • I think everyone else did as well. I know I have no fucking clue what you're driving at. Can you please be more explicit?

  • A wrapping script is a small text file that calls the program you want to call. For instance in Linux this would be something like:

     
        
    #!/bin/sh
    
    deluge -torrent $1
    
      

    You save it as deluge-wrapper.sh. Use chmod to enable the execution bit (chmod a+x deluge-wrapper.sh). And then point your browser at it.

    Be sure to doublecheck that running deluge in this way does open the torrent. You can test it in the command line. It might be --torrent or I might be misreading or misremembering the code from last night. Additionally, it might be deluge-gtk or something.

  • When you attempt to open a link in your browser it calls the executable you specify with the link URL as its first argument. Glancing at the deluge torrent source, it seems to want a different command line than the one the web browser provides. You can fix this using a small wrapping script.