Just to be clear, I prefer the good old corrupt politician over PDF files
๐ค8
https://vt.tiktok.com/ZSmUpTqdK/
๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐
๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐
How much do you guys spend on AI agents per month?
Just for coding, not API integration, not embeddings, not media generation, only on coding agents.
As a Junie'er vibe coder, I need to know the healthy range.
Just for coding, not API integration, not embeddings, not media generation, only on coding agents.
As a Junie'er vibe coder, I need to know the healthy range.
So we are arresting princes now? ๐คฃ ๐คฃ ๐คฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐4
Samson Endale ๐ช๐น
* former prince
He should be called Prince Pedo ๐คฃ ๐คฃ ๐คฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐1
Samson Endale ๐ช๐น
So we are arresting princes now? ๐คฃ ๐คฃ ๐คฃ
Wow, on his own birthday ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ ๐คฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
Imagine your big bro is the king and you got arrested on your own birthday ๐
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2
Samson Endale ๐ช๐น
Imagine your big bro is the king and you got arrested on your own birthday ๐
This is looking like a medieval movie ๐คฃ ๐คฃ ๐คฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐5
If you are an ERPNext Expert, please apply
https://docs.google.com/document/d/e/2PACX-1vQed7TI6m8GlQzKCMGnIkudR3x_cpqjhkIXGkyxSIO0nf6NH7t-ptReKtx6rgsP5AHpfh4k0WywUtXa/pub
If you have a telegram channel, please share it.
https://docs.google.com/document/d/e/2PACX-1vQed7TI6m8GlQzKCMGnIkudR3x_cpqjhkIXGkyxSIO0nf6NH7t-ptReKtx6rgsP5AHpfh4k0WywUtXa/pub
If you have a telegram channel, please share it.
โก5โค3
Samson Endale ๐ช๐น pinned ยซIf you are an ERPNext Expert, please apply https://docs.google.com/document/d/e/2PACX-1vQed7TI6m8GlQzKCMGnIkudR3x_cpqjhkIXGkyxSIO0nf6NH7t-ptReKtx6rgsP5AHpfh4k0WywUtXa/pub If you have a telegram channel, please share it.ยป
At Agelgil Delivery, weโve hit an incredible milestone: serving over 500,000 customers across 6 sub-cities in Addis Ababa. But with half a million people comes half a million different expectations.
The hard truth of scaling? You canโt please everyone. If you try to bend your business model for every single outlier request, youโll lose the very efficiency that made you successful in the first place.
https://web.facebook.com/share/v/1Af7tKf3kE
The hard truth of scaling? You canโt please everyone. If you try to bend your business model for every single outlier request, youโll lose the very efficiency that made you successful in the first place.
The key to failure is trying to please everybody.
https://web.facebook.com/share/v/1Af7tKf3kE
๐ฅ32โค6๐1
You must watch this
https://youtu.be/49k8BsYTrM4
And follow https://www.youtube.com/@rationalityrules on youtube
You will learn how to debate and public speaking
https://youtu.be/49k8BsYTrM4
And follow https://www.youtube.com/@rationalityrules on youtube
You will learn how to debate and public speaking
YouTube
How to BREAK a Pseudo-Scientist's "Evidence" With 1 Question
Go to https://ground.news/rationality to stay fully informed on breaking news, compare coverage and avoid media bias. Subscribe through my link for 40% off unlimited access this month.
To support us on Patreon (thank you): https://www.patreon.com/rationalityrulesโฆ
To support us on Patreon (thank you): https://www.patreon.com/rationalityrulesโฆ
๐ฅ2
Server side validation is for security.
Client side validation is for accessibility.
Client side validation is for accessibility.
๐ฏ13โค1
For anyone planning to get INSA certificate
https://cyberaudit.insa.gov.et/customer/help
https://cyberaudit.insa.gov.et/guidelines/Web_Application_Security_Testing_Requirements_Document_4_5.pdf
https://cyberaudit.insa.gov.et/guidelines/Network_Infrastructure_Security_Audit_Requirements_Document_2.pdf
https://cyberaudit.insa.gov.et/guidelines/Mobile_Application_Security_Testing_Requirements_Document_4_2.pdf
https://cyberaudit.insa.gov.et/customer/help
https://cyberaudit.insa.gov.et/guidelines/Web_Application_Security_Testing_Requirements_Document_4_5.pdf
https://cyberaudit.insa.gov.et/guidelines/Network_Infrastructure_Security_Audit_Requirements_Document_2.pdf
https://cyberaudit.insa.gov.et/guidelines/Mobile_Application_Security_Testing_Requirements_Document_4_2.pdf
โค10๐5๐2