On 7/4/19 2:41 PM, Mike Small wrote:
A co-worker was trying to take some of the elements from gmtime's return
value. He did something like the following:
$ perl -E'$,="\t";say gmtime[1..5]'
that is calling gmtime with the argument of [1..5] which is an arrayref.
so the arg to gmtime is some
A co-worker was trying to take some of the elements from gmtime's return
value. He did something like the following:
$ perl -E'$,="\t";say gmtime[1..5]'
8 32 12 31 7 2999416 1 243 0
I suggested he try something like this instead...
$ perl -E'$,="\t";say
dear all,
first of all, thank you for the respond of my inquiry. And then, there
is a few questions I would like to ask:
1. if someone takes your works and then he steals the credit by claiming
the work is his work instead of your work, what will you do?
2. if someone has a problem, he
Hi all,
On Sun, 7 Jul 2019 19:54:30 +1200
Kent Fredric wrote:
> > On 7/6/19 11:21 PM, Eko Budiharto wrote:
> > > it is a web application but it is on premise. The user is not honest.
> > > That's why I am trying to find a way to protect the source code like
> > > in java we can compile into
> On 7/6/19 11:21 PM, Eko Budiharto wrote:
> > it is a web application but it is on premise. The user is not honest.
> > That's why I am trying to find a way to protect the source code like
> > in java we can compile into java class and still can be run.
That's a false sense of securtiy. A