Show newer

One day I hope ML technology advances to the point that I can describe a shirt and find out if someone is selling something like it.

@mjgardner @icing actually, being liberal in accepting things is not a good idea either. If it violates the protocol, eject, close, kill, abort. At once. That leads to better code and protocols in the longer run.

Do I know anyone who's worked on budgeting infrastructure projects (physical infrastructure like roads and buildings, not software) who would be open to chatting with me for a short time and answering some questions about terminology used in that context?

Today's my last day at Google 🥲

I'm taking some time off to focus on my family, personal health, and to work on my bots.

If anyone knows of a role that'll fit me, I'll appreciate the intro! 😊

#funemployed

@tewalds That would break backwards compatibility in a much more subtle way, and create a situation where its difficult to tell whether or not you are in compliance. You wouldn't be able to just grep for uses of `utcnow`, and we would have no way of warning you that at some point your code will break.

There's also no easy way to "opt-in" to the new behavior like there is with just not using `utcnow` and `utcfromtimestamp`.

It is better to remove these entirely.

It's relatively easy to make a drop-in replacement for these, but also we're deprecating them because they're conceptually the wrong thing to do, so it's best to migrate to using aware datetimes if possible: blog.ganssle.io/articles/2019/

Show thread

`datetime.utcnow` and `datetime.utcfromtimestamp` will be deprecated in 3.12: github.com/python/cpython/issu

If you maintain a package, now is probably a good time to grep your source code for `utcnow` and `utcfromtimestamp` to get out ahead of the deprecation warnings. 📅🕐

@JakubKuczys In this situation I am fine with using system pip because it's a docker container, the whole system is basically one big virtual environment.

@cnx @acdha Yes, but the way it works is that you create a dm-crypt partition seeded from `/dev/urandom`, then you mount it and fill it with 0s. The encryption translates the 0s into random bytes.

Here are the instructions I usually use: wiki.archlinux.org/title/Dm-cr

@acdha Yeah, this is an empty drive that I'm about to encrypt. Filling it with random data is the first step, which I may be cargo culting, but IIRC the idea is that it prevents leaking the amount of data on the drive or something.

@acdha Just in time for the second drive to arrive so I can start on that one. 😅

@acdha Hah, good call, I had *just* remembered that I usually do... something with block sizes when I saw this.

Speed is still trending down so maybe not a steady state yet, but looks like maybe a 4-5x speedup, so this might be done in only 16 or so hours!

`$ sudo dd if=/dev/zero of=/dev/mapper/to_be_wiped status=progress`
`59001459200 bytes (59 GB, 55 GiB) copied, 904 s, 65.3 MB/s`

65 MB/s, nice, nice. At this rate it's only going to take.... 3 days to wipe this 16TB drive.

```
Step 5/7 : RUN python3 -m pip install .
```
```
---> Running in 31b96e802fdb
/usr/bin/python3: No module named pip
```

Hmm.. So also ships a crippled thing that is not when you `dnf install python3`.

I was hoping that that was a reasonable alternative to Debian/Ubuntu ☹

@coveragepy Oh in the issue I guess you mention you just do line-wise regex matching.

@coveragepy How bulletproof of a solution do you want here?

Do you already have some model of the structure of the code or the context of a given method definition?

Solutions needed: Is it possible for coverage.py to automatically exclude Protocols from measurement?

github.com/nedbat/coveragepy/i

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.