|
Yes 42 comes from Douglas Adams.
I said works "sort of" because of this - I need to actually alpha blend the BMPs for each letter because they're overlapping and wiping each other out with certain letters. Watch:
i.
.i. M@o .i.
. i :M@@@ o@@: :M@@@.
o@ i@@ o@@@@@ i@@M Vi :M@@@@@i
.@@@ M@@@ V@@@@Mi :@@@. M@i o@@VM@@@.
V@V: M@@@o o@@@@V .@@@o V@@. V@M.:@@@o
V@@@M o@@@@o @@@M i@@V V@i i@@@M
.@@@@. i@@@@V M@@@. :@@@: o@: V@@@@.
:@@@V .@@@@M V@@@i .@@@V @..M@@@@:
@@@M @@@@@. i@@@@V@@@@@. :@o@@@@V
i V@@@V i@@@@i .@@@@@@@@@@V @@@@@M
.@ V@@@V M@@@M .o i@@@@Vi@@@@. o@@@@@M.
V@ V@@@ .@@@@. M@ VVi i@@@o .@@@@oo@@
:@@ i@@@ o@@@V V@. @@@@. M@@@V o@@
@@@ .@@@@ M@@@i :@@i i@@@V o@@@@iM@@:
o@@@ i@@@@: @@@@MV@@i V@@@. .@@@@@@@V
:@@@@ o@@@@@i @@@@@@@i M@@V :@@@@@M:
M@@@@ .V@@@@@V. i@@@@M: :@M M@@Mi
V@@@@..M@@@@@o. :ooi .i:
o@@@@: .@@Mo:
@@@@o
See how the "j" is obscured? It's still a work in progress.
Real programmers use butterflies
|
|
|
|
|
Brilliant. Thank you. I will update it when you have refined it in the future.
i.
.i. M@o .i.
. i :M@@@ o@@: :M@@@.
o@ i@@ o@@@@@ i@@M Vi :M@@@@@i
.@@@ M@@@ V@@@@Mi :@@@. M@i o@@VM@@@.
V@V: M@@@o o@@@@V .@@@o V@@. V@M.:@@@o
V@@@M o@@@@o @@@M i@@V V@i i@@@M
.@@@@. i@@@@V M@@@. :@@@: o@: V@@@@.
:@@@V .@@@@M V@@@i .@@@V @..M@@@@:
@@@M @@@@@. i@@@@V@@@@@. :@o@@@@V
i V@@@V i@@@@i .@@@@@@@@@@V @@@@@M
.@ V@@@V M@@@M .o i@@@@Vi@@@@. o@@@@@M.
V@ V@@@ .@@@@. M@ VVi i@@@o .@@@@oo@@
:@@ i@@@ o@@@V V@. @@@@. M@@@V o@@
@@@ .@@@@ M@@@i :@@i i@@@V o@@@@iM@@:
o@@@ i@@@@: @@@@MV@@i V@@@. .@@@@@@@V
:@@@@ o@@@@@i @@@@@@@i M@@V :@@@@@M:
M@@@@ .V@@@@@V. i@@@@M: :@M M@@Mi
V@@@@..M@@@@@o. :ooi .i:
o@@@@: .@@Mo:
@@@@o
Signature created by honey the codewitch
|
|
|
|
|
It's going to take me a bit. I've got a lot to do before I tackle that rendering issue. I have to retool the loading code to work in a constrained memory environment, and since it changes the footprint of it, I have to then change the rendering code to work with it, after which I can fix the rendering issues. It might be a week or even two. This code is hairy.
Real programmers use butterflies
|
|
|
|
|
Not just rendering but kerning the letters as well?
- I would love to change the world, but they won’t give me the source code.
|
|
|
|
|
I actually seem to be kerning properly. That's what's causing the bitmap overlap problem.
Real programmers use butterflies
|
|
|
|
|
Transgress before endless joy, that could be a record. (6)
|
|
|
|
|
Single ?
"I didn't mention the bats - he'd see them soon enough" - Hunter S Thompson - RIP
|
|
|
|
|
Well, that was quick!
Transgress - SIN
Endless joy - GLE(E)
Could be a record - SINGLE
YAUM
|
|
|
|
|
|
|
*splat*
Real programmers use butterflies
|
|
|
|
|
The most important thing about agile, is to says that you use it during job interview!
|
|
|
|
|
I guess they noticed that was happening almost everywhere... so they decided to give it a catchy name.
|
|
|
|
|
Nah, that has too much process to be agile.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Not to forget too few meetings...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Welcome to Agile Club. The first rule of Agile Club is: you do not talk about Agile Club.
The second rule of Agile Club is: you DO NOT talk about Agile Club!
Third rule of Agile Club: if someone yells “stop!”, goes limp, or taps out, the sprint is over.
Fourth rule: only two guys to an sprint.
Fifth rule: one sprint at a time, fellas.
Sixth rule: the sprints are bare knuckle. No shirt, no shoes, no weapons.
Seventh rule: sprints will go on as long as they have to.
And the eighth and final rule: if this is your first time at Agile Club, you have to sprint.
|
|
|
|
|
this is by far too organized for a sprint.
To err is human to really elephant it up you need a computer
|
|
|
|
|
Well, from the video I can see that they've made quite a bit of progress in the implementation aspects.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
|
So She got an email this morning from a scumbag informing her that he used some vulnerability to infiltrate her machine and he has all kinds of embarrassing files that he will publish unless She pays $1600 in Bitcoin within 2 days.
Of course it's a scam. She has nothing compromising on her machine, not even a camera. He claims to be watching her through her (non-existent) camera.
He gave his Bitcoin wallet for the payment, which made me think: If you have a criminal element's bitcoin wallet, is it possible to hack into it and drain the contents? What do you think? Just asking for a friend!
Get me coffee and no one gets hurt!
modified 8-Jul-21 11:55am.
|
|
|
|
|
No you cannot. That is why anyone can share it, without risk. You can google for it and see who else has met the same elephanter.
"If we don't change direction, we'll end up where we're going"
|
|
|
|
|
megaadam wrote: No you cannot. Technically, yes you can. Anything can be hacked. Anything.
|
|
|
|
|
DevParty wrote: Anything can be hacked. Anything. Given sufficient computing power and time.
The key word there is sufficient. What might be sufficient could be a computer built as a Dyson sphere, powered by capturing the entire energy output of a star, running for billions of years.
Software Zen: delete this;
|
|
|
|
|
Or much faster with a little bit of luck.
|
|
|
|
|
You know how that would end. That monstrosity would need most of its resources to manage itself, leaving not much for any task.
I have lived with several Zen masters - all of them were cats.
His last invention was an evil Lasagna. It didn't kill anyone, and it actually tasted pretty good.
|
|
|
|