

I think he maintained git at its inception for like 6 months and then passed it off to someone else, but I could be completely mistaken.
I think he maintained git at its inception for like 6 months and then passed it off to someone else, but I could be completely mistaken.
Sometimes our internal CI tools break and I can’t build either. I think GitHub actions syntax is actually valid in forgejo as well so I don’t really think it’s a problem.
If all they needed was the features of a scientific calculator they would have used their calculator app, it’s pretty clear based on context they’re saying they needed access to a graphing calculator for coursework.
Wabbitemu is an emulator for ti84 and similar graphing calculators
It’s a pretty standard tool to assist with learning any math beyond algebra, and was a requirement in both my uni and high school classes. I’m fortunate enough to have gone to a high school where there were plenty of calculators provided by the school, but the major exams like the SAT and whatnot did not provide one and would also not have allowed phones.
Nope, the wabbit emu is for replacing a TI graphing calculator which is north of ~$150 in the US. Still cheaper than a phone, but only a third or so the price of my daily driver at the time of purchase.
Remember to take your Claritin before starting a sync play session
I also use the KDE spin of Fedora fwiw
I’m curious what distro you use. I put my partner on fedora, she’s not very techy, and generally speaking she doesn’t really have any issues doing the day to day stuff. The biggest pain point was switching to Firefox and getting its worse profile system to work, but that was not a necessary change just a choice.
As much as I want the user base to grow so companies feel obligated to support the platform, I don’t really personally want to support many people re-learning how to use their computers
I don’t want to be an asshole but after checking a couple of those out they all appear to be post-authorization vulnerabilities? Like sure if you’re just passing out credentials to your jellyfin instance someone could use the device log upload to wreck your container, but shouldn’t most people be more worried about vulnerabilities that have surface for unauthorized attackers?