=== ANCHOR POEM ===
═════════════════════════════════════════════════════════════════──────────────────
 the main product that github offers is the assurance that the code displayed
 on your monitor is the same as the one running on your computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

=== SIMILARITY RANKED ===

--- #1 messages/1172 ---
════════════════════════════════════════════════════════════════════════════════───
 the danger is not that the LLM will generate poor, vulnerable, or malicious
 code.
 
 the concern is that someone else might inject something into the codebase that
 you're not reading.
                                                           ──┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════════──┘

--- #2 fediverse/5247 ---
════════════════════════════════════════════════════════════════════───────────────
 the hardest problem in computer science is figuring out why users do what they
 do.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #3 fediverse/2786 ---
══════════════════════════════════════════════════════─────────────────────────────
 the best way, I find, to be deserving of trust is to do the best that you can,
 and be honest when you cannot do more.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #4 fediverse/1221 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-883 
 
 either that or I might get lost in some C code we'll see how things develop
 >.>
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #5 fediverse/3407 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-1218 
 
 there's only a password so that if the zip archive is displaced from it's
 context it's harder to read.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #6 messages/488 ---
═══════════════════════════════════════════════════════────────────────────────────
 Look at the unique patterns in a programming language, and you will find
 within them a usecase.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #7 fediverse/3246 ---
═══════════════════════════════════════════════════════────────────────────────────
 the computer, fundamentally, cannot know who is logged into it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #8 fediverse/3123 ---
═══════════════════════════════════════════════════════────────────────────────────
 using linux requires constant maintenance and that's kind of unfair, actually.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #9 fediverse/1247 ---
═══════════════════════════════════════════════────────────────────────────────────
 so wait is there any guarantee that the "releases" on github actually have the
 same code as that which is in the repository? Or could they just... put their
 own binary, with it's own strange rules and vulnerabilities, or am I just
 fearmongering?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #10 fediverse/1310 ---
════════════════════════════════════════════════───────────────────────────────────
 that feeling when you type your password so fast that one hand is faster than
 the other and the letters get all jumbled and now you have to remake your ssh
 key -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #11 fediverse/4720 ---
═══════════════════════════════════════════════════════════════────────────────────
 @user-882 
 
 it's a security hole though
 
 yeah... there ya go...
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════───────────────────┘

--- #12 fediverse/4474 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1268 
 
 if you know how to program in C this is a good resource for building
 networking applications:
 
 https://beej.us/guide/bgnet/
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #13 fediverse/3912 ---
══════════════════════════════════════════════════════════─────────────────────────
 the quickest flaw in a novice's strategy is to act upon what is there, not
 upon what may yet be.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #14 fediverse/4109 ---
═══════════════════════════════════════════════════════════────────────────────────
 ┌──────────────────────┐
 │ CW: AI-mentioned     │
 └──────────────────────┘


 the internet is just AI these days, and if yours isn't then consider yourself
 lucky, but also know that those days are numbered.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #15 fediverse_boost/6017 ---
◀─[BOOST]
  
  Linux admins when they have to use Windows: :/                              
                                                                              
  Windows admins when they have to use Linux: :\                              
  
                                                            
 similar                        chronological                        different 
─▶

--- #16 fediverse/3020 ---
═══════════════════════════════════════════════════════────────────────────────────
 restaurant where the paper menu is fully featured but the QR code next to each
 item will show you a youtube video of it being prepared
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #17 messages/264 ---
════════════════════════════════════════════════───────────────────────────────────
 Don't write self documenting code! Force people to read the documentation so
 they know how to use it
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #18 messages/1212 ---
═════════════════════════════════════════════════════════════════════════════════──
 The gallow is more merciful than a lynching, but only just.
                                                           ─┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════════─┘

--- #19 fediverse/854 ---
══════════════════════════════════════════════─────────────────────────────────────
 the user knows more than the programmer
 
 [more/better]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #20 fediverse/1286 ---
════════════════════════════════════════════════───────────────────────────────────
 the fact that business types don't listen to the engineers and their "ethics"
 means they shouldn't be in charge of them.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘