Megaphone appears to be a Spotify advertising platform for podcasts. https://megaphone.spotify.com/
Megaphone appears to be a Spotify advertising platform for podcasts. https://megaphone.spotify.com/
Give us a link to the rss feed and let’s investigate. I’m not experiencing this.
The standard agrees with you that and
are equal to
#if defined
and #if !defined
, but your example does not make much sense the me.
#if
only takes constant expressions which can be evaluated at translation time. It can’t compare strings.
Automatic Content Recognition (ACR) [42] is widely used for second-party tracking in smart TVs. As shown in Figure 1, ACR periodically captures frames (and/or audio), builds a fingerprint of the content, and then shares it with an ACR server for matching it against a database of known content (e.g., movies, ads, live feed). When the fingerprint matches, ACR server can determine exactly what piece of content is being watched on the smart TV.
It’s a pillar of democracy to protect the autonomy of the people.
It is a human right…
Yes and no. Sometimes a NUL terminated string allow you to make the simplest algorithms. Apart from NUL terminated strings I use structs with a buffer pointer and length or one with a start and an end pointer when that makes the implementation simpler. NULL terminated arrays are also often an efficient way to make your algorithms simple. Go for the data representation that allow you to make the simplest algorithms.
What are your expectations for the software? I assume it’s not enough to use a group chat and tell people where you are, but from the description you’ve given that would be my suggestion.
The other commenters in this thread seems to be giving you good advice and moral support, so I’m just going to give my input which comes from a perspective that’s a bit different.
Sometimes especially when the options we have are contrary to our beliefs, we have to consider if we really need to be a part of it. Sometimes the burden is the smartphone itself. I don’t use smartphones and I couldn’t be happier, somehow my life didn’t end. The last one I had was the N900 and even though it was a pretty cool pocketcomputer, I guess it’s now been around 10 years since I last had a smartphone. I don’t miss it and especially not when I see other people who have one. It’s scary so addictive it seems to be. Pen and paper for data sharing and just calling people can accomplish many tasks.
Old people with bad eyesight also need banking, so I’d hope theres a bank out there who don’t require a smartphone. In my country banks use the national id for authentication and you can get a TOTP keychain for the 2FA instead of an app, perhabs similar options exist.
Anyway, I hope you find something that works for you. Life is a process.
From what I read these articles talk about post infection use of OpenNIC tlds. Anyway it was just a suggestion, it’s always a good idea to only use DNS servers you trust :)
I don’t understand how that would be a security risk to you. Even if I understood what the threat vector was, it would be very inefficient to use an OpenNIC tld to spread malware as you only target 0.0001% (random very low number) of internet users.
Did you ironically preserve the utm_source parameter?
How?
There’s plenty to add from OpenNIC and you get access to some addition TLDs as a bonus ;)
I use the addon Redirector for rewriting urls to youtube etc. to private alternatives. I guess you can use it to rewrite startpage queries.
I agree and the requirement for an exact placement of attribution is not very friendly to derivate works either. I don’t think that section 7 of AGPL allow adding anything other than the exact terms in section 7 and it has a clause that allow removing non-permissive additions to the AGPL, but I’ve sent an e-mail to FSF asking what their position is. I would be very concerned picking AGPL as a license for my projects, if section 7 allow adding clauses like that. Anyhow the clauses were added in this commit, so anything prior to 7.3.0 is normal AGPL.
There is no free and open source version of Only Office. It fakes that it is licensed with AGPL, but they have added the following to the license, which in effect completely forbid you to redistribute it. It can be said to be Source Available.
The interactive user interfaces in modified source and object code versions of ONLYOFFICE must display Appropriate Legal Notices, as required under Section 5 of the GNU AGPL version 3.
Pursuant to Section 7 § 3(b) of the GNU AGPL you must retain the original ONLYOFFICE logo in the upper left corner of the user interface when distributing the software.
Pursuant to Section 7 § 3(e) we decline to grant you any rights under trademark law for use of our trademarks.
https://raw.githubusercontent.com/ONLYOFFICE/DesktopEditors/master/LICENSE
You need to use a dmix PCM for you card as output.
If you type aplay -L | grep dmix
it’ll show you a list of dmix devices. You can set one as the default if you create a file named .asoundrc
in your homefolder with the content:
pcm.!default {
type plug
slave.pcm "dmix:CARD=Set,DEV=0"
}
You of course replace the value of slave.pcm with your desired card name. I just gave one of mine as an example. The above default configuration also takes care of automatic conversion, via the plug
pcm, for different samplerates and formats to the settings the hardware is set up to use. Every program that use ALSA for output will read the above file, but you need to restart a program for changes to take effect.
If you enjoy audio production I’m sure you’ll find some good use for Jack, but for audio mixing all you need is to use an ALSA dmix pcm for output.
A solution I’ve used for the glibc problem, is to build on an older distribution in a chroot. There is also this project which might be of use to pick a specific version of glibc. The project README also explain how to do it manually.
As for distribution, I prefer something like makeself.sh, that installs to either ~/.local/ or if it is to be installed system-wide to /usr/local or /opt. The concept is just a small shell script appended with a compressed archive, it is easy to modify and even create by hand using standard tools like cat. This is a method widely used by native Linux games.
If the mail is sent unencrypted the admin can read it. What I have is a script that encrypt incoming e-mail with the users key, so that they are stored encrypted on the harddrive. That at least protect against an intruder reading past e-mails. I use a Perl script written by Mike Cardwell for that.
Another service you might like to have for your users is WKD/WKS, so that senders clients can automatically fetch the public key for your users.