...What an odd and dishonest framing of the problem. Do you define "hospital not destroyed" as "some walls are still standing"? Because an easy counterpoint to your claim is the Al-Shifa Hospital, which you will certainly agree cannot be operational in this state and thus can be defined as "destroyed":
Okay, you go get treatment at that facility if it's working as well as you insist.
Besides, whether the facility is (partially!) operational today is besides the point. Your original post insisted that "Israel has destroyed no hospitals", while it clearly has. The picture I linked is from 2024. The fact that Al-Shifa was brought back to a partially operating state in late 2025, after months of partial ceasefire, doesn't disprove that it was destroyed in 2024. Sources like https://en.yenisafak.com/world/al-shifa-hospital-begins-reco... show that the situation is far from positive.
You said al Shifa isn't operational. I proved it is. Now you're trying to redefine "operational" to mean "yes, you can get treatment at the hospital but it's not working well." That's a major switcheroo.
I stand by my claim that Israel has not bombed any hospital buildings. If you think this is false, find me a hospital building that Israel has bombed, tell me when it's been bombed, the munition used, etc.
The quality of the benchmark code is... not great. This seems like Zig written by someone who doesn't know Zig or asked Claude to write it for them. Hell, actually Claude might do a better job here.
In short, I wouldn't trust these results for anything concrete. If you're evaluating which language is a better fit for your problem, craft your own benchmark tailored for that problem instead.
Great timing: I just received a Copilot spam email from GitHub. I don't remember opting in to such marketing communications, instead I generally opt-out from such communications as soon as I sign up to a service...
I came here to suggest the same! It's incredibly handy and I use it all the time at work: there's a process that runs for a very long time and I can't be sure ahead of time if the output it generates is going to be useful or not, but if it's useful I want to capture it. I usually just pipe it into `less` and then examine the contents once it's done running, and if needed I will use `s` to save it to a file.
(I suppose I could `tee`, but then I would always dump to a file even if it ends up being useless output.)
I agree that especially larger players should be proactive and register all similar-sounding TLDs to mitigate such phishing attacks, but they can't be outright prevented this way.
Yes, practically all of my projects are private and visible only to me. Servers IIRC are located in the Netherlands. It's free to use with limitations, and financed by donations from supporters.
But I am now at home with Helix and Flow Control.
reply