That's because they are being "replaced", in a sense!
When an industry doubles every 5 years like web dev was for a long time, that by the mathematical definition means that the average developer has 5 years or less experience. Sure, the old guard eventually get to 10 or 15 years of experience, but they're simply outnumbered by an exponentially growing influx of total neophytes.
Hence the childish attitude and behaviour with everything to do with JavaScript.
And so, it seems, is everything else. Perhaps, this commentary adds no value — just old man yells at cloud stuff.
https://github.com/npm/npm/pull/4016#issuecomment-76316744
https://news.ycombinator.com/item?id=38645969
https://github.com/npm/cli/commit/5a3b345d6d5d175ea9ec967364...
If you know of a DNS update which allows for per-minute updates for free, I'll happily move to it.
I was 92kg when I started on liraglutide (I was doing GLP-1 agonists before it was cool!) and 67% of muscle mass (61kg). I'm now at 69kg and 82% of muscle mass (56kg). I'm doing weight and resistance training twice a week, in addition to aerobic training.
One nice thing, while muscles don't become more massive, they for sure become more pronounced and visible with weight loss.
But some incompetent entrepreneurs and a shabby LA law firm tried to win at a patent trolling. The outcome is hilarious only because I am not paying Cloudflare's lawyers.
It’s easy to create the aggregate input device, go to the Audio MIDI Setup app, in the audio window click the plus in the bottom right and choose “new aggregate device”, then tick MacBook Microphone on the right. Then to System Preferences > Sound > Input and assign this new “virtual” device as your input device. (You can rename it if you want)
Now your Mac will automatically switch audio output source as usual, but the input remains locked to the microphone so you don’t get this annoying problem.
In this model, hosts don’t need any direct internet connectivity or access to public DNS. All outbound traffic is forced through the proxy, giving you full control over where each host is allowed to connect.
It’s not painless: you must maintain a whitelist of allowed URLs and HTTP methods, distribute a trusted CA certificate, and ensure all software is configured to use the proxy.