I specifically want to run "python", rather subcommands for some other command, since I often I want to pass in arguments to the python interpreter itself, along with my script.
For context, Major Paeta Hess-von Kruedener emailed [1] days before saying that Hezbollah were using his positions and the IDF was being forced to fire on them out of "tactical necessity". This isn't as clear-cut as you're attempting to paint it.
A senior UN official, asked about the information contained in Maj. Hess-von Kruedener's e-mail concerning Hezbollah presence in the vicinity of the Khiam base, denied the world body had been caught in a contradiction.
"At the time, there had been no Hezbollah activity reported in the area," he said. "So it was quite clear they were not going after other targets; that, for whatever reason, our position was being fired upon.
"Whether or not they thought they were going after something else, we don't know. The fact was, we told them where we were. They knew where we were. The position was clearly marked, and they pounded the hell out of us."
---
This part states the area was being bombed prior to reports of Hezbollah activity in the area, so yes - the confusion will muddy it.
Nonetheless, he had recently reported IDF war crimes - and the IDF at minimum coincidentally was responsible for killing him; with this seemingly contradictory statement by a senior UN official.
I can imagine soon - within the next year or so - that business emails will simply be AI talking to AI. Especially with Microsoft pushing their copilot into Office and Outlook.
You'll need to email someone so you'll fire up Outlook with its new Clippy AI and tell it the recipient and write 2 or 3 bullet points of what you want it to include. Your AI will write the email, including the greeting and all the pleasantries ("hope this email finds you well", etc) with a wordy 3 or 4 paragraphs of text, including a healthy amount of business-speak.
Your recipient will then have an email land in their inbox and probably have their AI read the email and automatically summarise those 3 or 4 paragraphs of text into 3 or 4 bullet points that the recipient then sees in their inbox.
If you want to stick with using `pip` over any of the newer tools that build on top of it (Poetry - my favourite, pdm, pipenv, rye, ...) the simplest way I used in the past was to use a `requirements.human.txt` to set my dependencies, then install them in a venv and do `pip freeze > requirements.txt` to lock all of the transitive dependencies.
An Xbox was ordered that's classed as a "high value" item so requires a OTP being given to the driver to release the package.
The package was hand delivered to the customer when the customer provided the OTP, but it turns out the contents of the package were swapped out with junk.
Can you clarify what you mean by "this"? Being able to copy the trades of politicians or politicians making trades that are almost instantly profitable?
Why in the world would somebody be complaining about the first one? Obviously the second one is a long standing, often talked about issue and is what they mean. Don't play dumb.
I'm asking for clarification because whilst there's a strong argument that politicians are performing insider trading (which as you say is widely regarded as something that should be stopped), if an amateur can copy those trades and make a 20% profit on them, what's stopping hedge funds from doing the same and millions or billions from what is basically second-degree insider trading?
I was asking if they are also suggesting that this second-degree insider trading be stopped somehow?
1. Are you saying something is wrong with amateurs making 20%?
2. If an amateur could do it, hedge funds, HFT firms, etc have definitely been doing it for longer than them and have taken away and arbitrage opportunities.
3. It very likely might be that the one month lead that the politicians have make their trades profitable, while anybody copying them will be unprofitable due to those same politicians decisions
Poetry is an all-in-one tool that does dependency management using `pyproject.toml` files and its own `poetry.lock` files, as well as package building, virtualenv management, and also has hooks for entrypoints and scripts.
It's rather a useful tool and I'm personally using it for dependency management and packing for all my projects moving forwards, though for venvs I'm using `pyenv` and the `pyenv-virtualenv` plugin.
Once you figure out your workflow it can be quite nice, but it's figuring it out that's a huge mess in Python at the minute. Hopefully PEP 582 (Python local packages directory) solves it a bit...
> the attacker obtained a valid administrative session token from _after_ any MFA would've been completed
But you can lock session tokens to specific IPs or user agents. I've implemented similar in the past for a B2B admin-panel, and whilst there were the occasional false positive with browsers updating in the middle of a session (incrementing the user agents version number) and people's IP changing if they switched networks (or in one instance, a badly configured office network that randomly routed through 2 proxy servers with different outbound IP addresses) which then made it demand MFA again, it was fairly rare and didn't attract too many complaints.
> In 2018, Airbnb began its migration to a service-oriented architecture, as the Ruby on Rails “monorail” started becoming hard to maintain and was a single point of failure.
A monolithic codebase doesn't have to be deployed as a single artifact to be a single point of failure.
There's nothing stopping you from deploying a monolith application across a distributed number of machines in a highly available manner, including making machines favour some types of work (e.g. web workers and background job workers). Nor is there anything stopping you from performing blue-green deployments or A/B testing if you want to interpret single point of failure as a bug is deployed to all machines simultaneously and affects your entire application.