Hacker Newsnew | past | comments | ask | show | jobs | submit | pabs3's commentslogin

Vegans are just as disconnected, especially when they eat things grown in vats. What brings connection is to have a garden and kill and eat the animals and vegetables they grow there.

The point is that you're not relegating another sentient being's life to lower than that of your own. You refuse to accept the torture and murder of another species.

In doing so, you dramatically expand your empathy and understanding of what it is to be a living thing, and hence you gain an inner connection to nature and animals that is hard to describe. At least that's my personal experience.


Missing the GitHub link.

Currently being saved by ArchiveTeam:

https://wiki.archiveteam.org/index.php/Typepad


Will they be targeting outsourcing next?

You used to also be able to get the opposite; one Linux kernel with a unified userspace distributed across a cluster.

https://sourceforge.net/projects/kerrighed/


That's cool! Similar is the idea of running a single large VM across multiple hosts. There have been several iterations of that idea, the latest being a presentation at this year's KVM Forum: GiantVM: A Many-to-one Virtualization System Built Atop the QEMU/KVM Hypervisor - Songtao Xue, Xiong Tianlei, Muliang Shou https://kvm-forum.qemu.org/2025/

I wonder if modern numa-aware software could take advantage of this if the Linux APIs report the correct topology.

Debian is kind of like that, except packages broken by upgrades are mostly just removed.

I've been using it for so many years, and now it makes complete sense now that you mentioned that! THanks!

Eventually, yes I guess. But long before that the breaker and breakee both are notified, and the breakage hopefully is fixed. As it should be.

I would hope the other aspirational software distribution systems (pip, npm, et al) ALSO do that, but according to this article, I guess they don't? Not shocked , to be honest


But how would that work?

Say I have software written that runs just fine, but has not been updated to the latest runtime of Python or Node (as per your example). Perhaps a dependency I use has a broken recent version, but the old version I use works fine. You remove the package, now it breaks my software. This would effectively make it so that all libraries / dependencies that are "abandoned" by the author or inactive, would be deleted, which then results in all the software that used them to also break.

Unless I misunderstood something?


KDE is more stable than GNOME, because gnome-shell kills all apps when it dies due to GPU driver bugs or whatever. Qt/KDE has some more crash resilience going on. Not as good as Arcan, but I've never had my session go away since recent KDE6 versions.

https://arcan-fe.com/2017/12/24/crash-resilient-wayland-comp...


No questions, just some rough edges to report; infinite clipboard history would be nice, notifications search/sorting would be nice, notifications panel gets slow with hundreds of notifications (from IRC bots) when dragging the scrollbar, notifications panel icons could be removable or made smaller or just have one per app.

Thanks to all the KDE devs for their work.

Something I use a lot on xfce4 is the Alt-F11 shortcut (it toggles) that maximises a window over the bottom bar and removes the title bar.

In this way, with LibreOffice or say Inkscape I get the application menus at the top and the applications controls at the bottom of the screen. No hotspots - nothing pops up.

On Fedora's live KDE iso I can use the window control menu to supress the title bar on a maximised window and I can hide the bottom bar but its a faff requiring multiple steps.


Not the person you asked, but maybe open Issues somewhere for that?

Not sure how welcome feature requests and bugs non-standard use-cases issues are. Time is limited here too.

Wonder if there are any QBasic projects still out there.

Windows 10

mTLS aka TLS client certs seems like the way to go.

How is a client cert not another glorified static password? It would have been stolen from repo secrets the same way.

You don't store them in repos on disk, but in a HSM so they can't be stolen, and then you protect signing access to them based on service/process information.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: