Do you get output if you use that exact tail
command without the grep
pipe?
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
Do you get output if you use that exact tail
command without the grep
pipe?
I read that you’re manually tagging them, so your process can be whatever you want to do.
For example, you can leave the images in their current folder structure and create a separate folder structure with symbolic links to an image, so in the character folder would be symbolic links to all the images like that. They also don’t have to be unique, an image can be in multiple categories.
Alternatively you can use a spreadsheet and generate lists there.
Finally there are plenty of photo album applications that allow you to tag images.
Aww … shucks … giggle
True, the employee(s) here need to be across every aspect of the business, including cleaning the toilet and talking to CEOs and CIOs, not to mention do the accounts, chase debtors and write code whilst maintaining a sense of humour and getting enough sleep.
Yeah. I jumped through these hoops too and it created a company page for my company, with one employee, me, just so I could read someone else’s review on a different company.
Of course, now there’s a company page for my company that I don’t appear to be able to delete.
You could use a cron job to grep through the file and reformat the output into a webpage, markdown, or plain-text file.
Bruce Perens is currently working on a new licensing model called Post Open requiring that business with sufficient revenue to pay up.
In my opinion it’s criminal just how often this happens. Big business making obscene profit off the back of volunteer work like yours and many others across the OSS community.
Is it just me who is sceptical about anything new from Intel at the moment?
Mind you, this is not the first time that this feeling has existed, there was a standing joke amongst IT professionals in the mid 1990s that the sticker “Intel Inside” was actually a warning label, referencing the Pentium FDIV bug.
If wishing made it so.
On Android every single browser links the system font size to the web font size. This does not guarantee that the font is readable on web, just that when you make the system font bigger, the web font size (mostly) increases.
The system font size is used everywhere, on every UI element in every app, not only the web, on the home screen, the keyboard, etc. etc.
I don’t want a bigger system font, because it reduces what’s visible on the screen and fundamentally it doesn’t actually fix the web.
The Google Message app is currently the only one that allows you to pinch zoom and increase/decrease the font size.
Finally, on desktop you can use Ctrl +/- to change the font size. That’s what I want mobile pinch zoom to use.
As for zooming in on an image, on desktop, the Ctrl +/- also (depending on the stylesheet) will change the image size. If you need more, you can open the image in a new tab and use Ctrl +/- to zoom. All of this could work exactly the same as on a mobile phone with pinch zoom.
As I said, if wishing made it so.
Does this mean that they also fixed this on mobile, so pinch zoom changes the font size, rather than the whole page that forces you to scroll in two directions to read larger text?
And many of them are heading to BlueSky…
My first recommendation is to become familiar with one flavour of Linux. Debian is a solid choice and it will give you a good understanding of how a great many derivatives operate.
The command line is a tool to get things done, it’s not an end to itself. Some things are easier to do with a GUI, many things are easier to do with the command line interface or CLI.
Many Linux tools are tiny things that take an input, process it and produce an output. You can string these commands together to achieve things that are complex with a GUI.
Manipulation of text is a big part of this. Converting things, extracting or filtering data, counting words
For example, how many times do you use the words “just” and “simply” in the articles you write?
grep -oiwE "just|simple" *.txt | sort | uniq -c
That checks all the text files in a directory for the occurrence of either word and shows you how many occurred and what capitalisation they used.
In other words, learning to use the CLI is about solving problems, one by one, until you don’t have to look things up before you understand why or how it works.
I understand your point. I’m not sure that you understood mine.
Let’s say that we do as you say. To issue the signature, the Government would need to verify your identity, which as you point out, they already can. Here’s the kicker. After verification, the signature is now linked to those same details in their systems. This makes them a massive target. One that they are ill-equiped to deal with.
That’s why I am not a fan of this idea.
Do you really trust a Government to keep your data secure?
How is such a card anything other than a universal identification card, which can then be stored by all and sundry as “proof”, right until one of them gets hacked and your card needs replacing … everywhere.
I think I’ll pass.
A bank should not need to store your passport and driving licence after you’ve opened the account.
It should never have to phone you to verify your identity.
It should not use a random mobile phone number to send an SMS request to confirm a credit card transaction.
Each of those things are security theatre and actually make the whole system less secure.
As for 2FA, it should not be SMS based and it should be when you login, not when you transfer funds between your own accounts as the OP mentioned.
It’s interesting that you’re getting downvoted. There’s plenty of evidence that things are getting worse in this field, not the least of it caused by ignorant policymakers who are hellbent on protecting their arse by being seen to be doing something, anything.
Then there’s the ambulance chasers who amplify the fear factor up to eleven just so they can justify their retainers.
Finally, there’s Microsoft who in my opinion shows the whole world, time and again, how not to do security whilst all the while preaching to its victims, uh, customers, what “best practice” looks like, whilst chanting"Do as I say, not as I do".
Security is about education above all else. The vast majority of breaches start by social engineering, getting a target to inadvertently install something or reveal something that gives an attacker a toehold into a system. It might be an unexpected PDF, a clicked link, a weak password, or personal information retrieved from someone who has no business storing your passport and driving licence on a system.
If you can stomach the consequences…
Easy fix, hit cancel.