Isn’t ctrl-m the “enter” equivalent?
Isn’t ctrl-m the “enter” equivalent?
I have never owned a computer with more than 8gb RAM.
does that mean that pipes will work backwards?
You know how the ending of LOST or Game of Thrones can bring up feelings in people? That’s how it was for me when Gnome 3 first came out. I had been using Gnome 2 for a few years and had a good workflow, and then suddenly, everything changed. Back then Gnome 3 was buggy and lacked a lot of things, which didn’t help. It also didn’t help that the devs took a “the problem is you” stance to all feedback. That said, I use Gnome now, and I like it, it took some years to mature and become good. But the feeling is still there sometimes.
I started reading about Meshtastic yesterday, and got an urge to set up a node even if (according to some maps) no one is near me. But then I started wondering, if I could reach another node, what could I do with that connection? What is it used for? Is it more about technically being able to send messages without an ISP. Do people use this for any real application?
Regular release distros do security updates, backported if needed. Rolling release means introducing unknown security bugs until they are found and fixed. To me, the whole dilemma between regular and rolling is do I want old bugs or new bugs? But the security bugs get fixed on both.
Open source is free for everyone, I think the objection is more about an american company being able to directly influence the decisions, operating under US jurisdiction, etc.
Kernel yes, but coreutils? It’s ls, sleep, who, pwd, and so on.
I know, but do they? Has big tech contributed to the code base significantly for coreutils specifically? sed and awk or ls has been the same as long as I remember, utf8 support has been added, but I doubt apple or google was behind that.
Do large tech companies contribute a lot to the GPL coreutils?
The way I understand it is that the security team supports releases for 5 years. If you are running an older version of ubuntu than that and want security backports, you need to get the extended support. The difference in Debian is that when a release is too old, the security team simply doesn’t backport security fixes. You can pay someone to do it, but it’s not a part of what Debian as a project does.
Found it in the classic The UNIX Programming Environment from 1984:
But then, this is for return, which technically isn’t “enter”, but nowadays they are sort of interpreted the same by programs?