phiresky@lemmy.world to Programmer Humor@lemmy.ml · 1 year agoHacking in 1980 vs Hacking in 2024lemmy.worldimagemessage-square115fedilinkarrow-up11.54Karrow-down117
arrow-up11.53Karrow-down1imageHacking in 1980 vs Hacking in 2024lemmy.worldphiresky@lemmy.world to Programmer Humor@lemmy.ml · 1 year agomessage-square115fedilink
minus-squaretowerful@programming.devlinkfedilinkarrow-up19·1 year agoThat’s why it’s containers… in containers It’s like wearing 2 helmets. If 1 helmet is good, imagine the protection of 2 helmets!
minus-squarePochoHipster@lemmy.mllinkfedilinkarrow-up9·1 year agoSo is running it on actual hardware basically rawdoggin?
minus-squarebobs_monkey@lemm.eelinkfedilinkarrow-up6·1 year agoWhat if those helmets are watermelon helmets
minus-squareDyskolos@lemmy.ziplinkfedilinkarrow-up2·1 year agoThen two would still be better than one 😉
That’s why it’s containers… in containers
It’s like wearing 2 helmets. If 1 helmet is good, imagine the protection of 2 helmets!
So is running it on actual hardware basically rawdoggin?
Wow what an analogy lol
What if those helmets are watermelon helmets
Then two would still be better than one 😉