Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Dependency
getify
getify
(thread)There's a fair bit of (unintended) complexity that arises from moving to the "extremes" of modularization, as both ESM and component-oriented frontend frameworks tend to encourage... For one, we experience
Read more
jay • CHECK PINNED
jaybloom_
pardon? whoever is writing the storyline and is choosing to not include niki — why?? she has done so well contributing her parts to the lore. it was her character
Read more
Lyman Stone 石來民
lymanstoneky
Low-wage work is great for getting somebody from 75% of poverty to 150% but a person who's never been above 150% FPL by age 35 is extreeeeeemly unlikely to climb
Read more
Colin Mills
OxSoc
In 50 years time a PhD student writing about the decline of state capacity will use as a case study the inability of the state to collect every 10 years
Read more
Breya
TheBlackLayers
Polyamory is not better than monogamy. Positioning it as such can be dangerous. However, a lot of cishet men are deeply threaten by it because it leaves room for cishet
Read more
Sarah 🍓
SarahJ_Berry
THREAD: I’ve done a lot of interviews about low traffic neighbourhoods over the past few weeks.The most common question I get asked is how do you know this will work?
Read more
HLJ ✊🏿✊🏾✊🏽 || Steph
Hotliquidjello
Lots to consider! It's a big continent, with latitudes ranging from tropical-equatorial, to more temperate.Indigenous subsistence would have varied across settlements (or nomadic groups), before intercultural communication and exchange,
Read more
Jonathan David Smith
_JonathanSmith
1/3I often struggle with feelings of inadequacy (a proper estimation IMO) as a pastor. - I am often not the smartest one in the room.- I am usually not the
Read more
Beau Nouvelle
BeauNouvelle
My tips for faster builds:- Precompile your dependencies.- Use fewer dependencies. (your project doesn't need 6 networking libraries)- Split your app into pre-built modules.- Make use of public/private/final.- Delete unused
Read more
Chris M
chrismerkel
0. I was asked yesterday how an org could protect SCM/build env against attack in an assumed breach scenario. Not perfect or exhaustive advice, but here are things I've done
Read more
SeekCindy
SeekCindy
Some people during the healing journey will be called to put down the sacred herb (marijuana), whilst others on their healing journey will be called to pick up the herb.
Read more
joeldavis
Dick71224996
THREAD ON THE STRATEGIC LOGIC BEHIND THE GLOBALIST-CHINESE ALLIANCE:Firstly, it must be recognized that Power is always a complimentary synthesis of two main processes, sabotage and dependency. Power sabotages vectors
Read more
Ian Cooper
ICooper
So there was some kerfuffle about layers last week. Let's break it down a little. First, let’s talk about modules: modules exploit information hiding by putting implementation behind clause grained
Read more
elliott • VOTED!!! @thesis prepro time
birblings
portland maine ppl if tomorrow someone goes through the line and says “if you’re not registered come with me and skip the line!” STAY FUCKING PUT. DO NOT GO WITH
Read more
Pratham 👨💻🚀
Prathkum
Everything you need to know about useEffect hook of ReactA beginner's guideThread If you're familiar with class components then you might know that we have various lifecycle methods but in
Read more
Taivo Pungas
taivopungas
Thread: if data is the source code of AI, what tools could we steal from the Software 1.0 world?Here are 10 examples. I'll mostly be using an image classification example
Read more
‹
1
2
3
4
5
6
7
8
...
24
25
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree