- May 2020
-
www.digital-democracy.org www.digital-democracy.org
-
www.darpa.mil www.darpa.mil
-
Moreover, common search practices miss information in the deep web—the parts of the web not indexed by standard commercial search engines
-
-
www.themarginalian.org www.themarginalian.org
-
To understand and be understood, those are among life’s greatest gifts, and every interaction is an opportunity to exchange them.
-
-
intercom.help intercom.help
-
Sometimes plugins can conflict with a theme or with each other. Disable all your plugins and see if the problem persists. If everything is working once the plugins were disabled it means there's a conflict with a plugin or maybe even a set of plugins. Enable the plugins one by one to identify the one that is creating the conflict.
-
-
www.hostgator.com www.hostgator.com
-
Right click on the /wp-content/plugins folder and rename it plugins.old. This will deactivate all of the plugins. In most cases, this will also lock the WordPress admin area as well. You will still be able to perform these steps from within the File Manager.Reactivate the plugins folder by following the above instructions and renaming the folder plugins. This will allow you to reactivate each plugin individually to isolate the offending plugin and resolve the 500 Internal Server Error. This should also allow access to the WordPress Dashboard again. From the WordPress Dashboard: Reactivate each plugin (one at a time) and refresh the website to see if the issue has been resolved.
-
-
-
“Extraordinary Commonplaces,” Robert Darnton
-
-
wordpress.org wordpress.org
-
Now personal data exports include users session information and users location data from the community events widget. Plus, a table of contents!See progress as you process export and erasure requests through the privacy tools.
-
-
medium.com medium.com
-
Given the massive amount of stars it had acquired on Github and the fairly quick and easy setup, it seemed very promising. When it comes down to its isomorphic functionality, it’s hard to match. But when it we started using the static export features, we were dropped on our faces with a very ungraceful transition from isomorphic to static that came with a cold side of faulty hot-reloading, strange routing strategies and highly bloated bundles:
-
-
www.analyticsmania.com www.analyticsmania.com
-
To be fully compliant with GDPR, you would also need to enable Show Reject All Button setting.
-
-
www.theguardian.com www.theguardian.com
-
Savage, M. (2020, May 10). A return to work is on the cards. What are the fears and legal pitfalls? The Guardian | The Observer. https://www.theguardian.com/world/2020/may/09/coronavirus-return-to-work-employment-law-logistical-nightmare
-
-
www.cdc.gov www.cdc.gov
-
Ghinai, I., Woods, S., Ritger, K. A., McPherson, T. D., Black, S. R., Sparrow, L., Fricchione, M. J., Kerins, J. L., Pacilli, M., Ruestow, P. S., Arwady, M. A., Beavers, S. F., Payne, D. C., Kirking, H. L., & Layden, J. E. (2020). Community Transmission of SARS-CoV-2 at Two Family Gatherings—Chicago, Illinois, February–March 2020. MMWR. Morbidity and Mortality Weekly Report, 69(15), 446–450. https://doi.org/10.15585/mmwr.mm6915e1
-
-
www.thelancet.com www.thelancet.com
-
Ghinai, I., McPherson, T. D., Hunter, J. C., Kirking, H. L., Christiansen, D., Joshi, K., Rubin, R., Morales-Estrada, S., Black, S. R., Pacilli, M., Fricchione, M. J., Chugh, R. K., Walblay, K. A., Ahmed, N. S., Stoecker, W. C., Hasan, N. F., Burdsall, D. P., Reese, H. E., Wallace, M., … Uyeki, T. M. (2020). First known person-to-person transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) in the USA. The Lancet, 395(10230), 1137–1144. https://doi.org/10.1016/S0140-6736(20)30607-3
-
-
agilevelocity.com agilevelocity.com
-
managing yourself and others.
Authors promote two ideologies.
- Managing Self: The Five Eds (well, first Three) from Agile Leadership by B. Joiner
- Managing Others: at its base is Dave Pink's Drive model: Autonomy, Mastery and Purpose. Authors then go to explain some ways of achieving each of previous.
-
-
ico.org.uk ico.org.ukHome1
-
www.health.govt.nz www.health.govt.nz
-
PDF - Ministry of Health, New Zealand - Approach for testing
-
-
support.gitlab.com support.gitlab.com
-
Requested Dormant Username Enter the username you would like to request, without the preceding URL (e.g., "User" instead of "gitlab.com/User")
Problem Type: Dormant Username Requests
-
-
about.gitlab.com about.gitlab.com
-
The GitLab.com support team does offer support for: Account specific issues (unable to log in, GDPR, etc.) Broken features/states for specific users or repositories Issues with GitLab.com availability
-
Technical and general support for those using our free options is “Community First”. Like many other free SaaS products, users are first directed to find support in community sources such as the following:
-
Out of Scope The following details what is outside of the scope of support for self-managed instances with a license.
-
-
-
For general questions, use cases, or anything else that does not fit into one of the above cases, please post in the GitLab Forum or on a third-party help site.
-
If you're in a paid tier on GitLab.com or GitLab Self-managed, you're entitled to Support. Please open a support ticket after reviewing our Statement of Support
-
If you're a free user on GitLab.com and are having one of the following specific issues please file a support ticket after reviewing the Free Plan Users Section in our Statement of Support
-
-
about.gitlab.com about.gitlab.com
-
Account Support If you haven't received your confirmation email, you can request to resend your confirmation instructions via our confirmation page.
This Account Support section only includes one possible problem related to account support
If you haven't received your confirmation email, you can request to resend your confirmation instructions via our confirmation page.
What about if you have any other issue with your account? How would you get support then? This would be a good opportunity/place to describe what to do in that case.
Presumably the answer is to submit support requests at <del>https://gitlab.com/gitlab-com/support-forum</del> (to be shut down) or in the community forums.
-
-
gitlab.com gitlab.com
-
We're closing the Support Forum issue tracker in favor of the Community Forum and support channels. We recognize that the Support Forum issue tracker has not received much attention in the last few months, and want to redirect our community members to locations that are regularly monitored by GitLab staff. As a result, this issue will be moved to the GitLab product issue tracker and triaged there.
-
-
gitlab.com gitlab.com
-
What I think we're lacking is proper tooling, or at least the knowledge of it. I don't know what most people use to write Git commits, but concepts like interactive staging, rebasing, squashing, and fixup commits are very daunting with Git on the CLI, unless you know really well what you're doing. We should do a better job at learning people how to use tools like Git Tower (to give just one example) to rewrite Git history, and to produce nice Git commits.
-
These two are in my opinion the most problematic — the basically go against each other. Typically, I try to work in increments over a feature and commit when I reach whatever techinical milestone I want to "checkpoint" at. It can also be out of the need to expose some idea or architecture and push it.
-
If we can encourage people to create clean commits as they go, the example as you showed above should be far less common, because cleaning up such history as an after-math is most of the time almost impossible.
-
I think this goes against the Keep It Simple mentality and the Low Level Of Shame that we should have when we contribute.
Tags
- good commits
- do it right/well the first time because it may be too hard to clean up/fix later if you don't
- balance
- need better tools/tooling
- commits: when/how often to commit
- iterative process
- commits
- low level of shame
- easy to use
- keep things simple
- contributing: low barrier to entry
- using the right tool for the job
- git: rewriting history
- friendly and approachable learning resources
- git rebase
- barrier to entry
Annotators
URL
-
-
www.civicuk.com www.civicuk.com
-
With a recognisable, ever present icon, user's can easily manage their consent at any time.
-
-
eugdprcompliant.com eugdprcompliant.com
-
Many also question how the average user with little knowledge of the GDPR will react to being asked so many questions regarding consent. Will they be confused? Probably at first. It will be up to each business to create a consent form that is easy to understand, while being at the same time comprehensive and informative
-
-
www.merriam-webster.com www.merriam-webster.com
-
to remove the force or effectiveness of
-
-
dash.harvard.edu dash.harvard.edu
-
Larremore, Daniel B., Kate M. Bubar, and Yonatan H. Grad. Implications of test characteristics and population seroprevalence on ‘immune passport’ strategies (May 2020).https://dash.harvard.edu/handle/1/42664007
-
-
onlinelibrary.wiley.com onlinelibrary.wiley.com
-
Zahnd, W. E. (2020). The COVID‐19 Pandemic Illuminates Persistent and Emerging Disparities among Rural Black Populations. The Journal of Rural Health, jrh.12460. https://doi.org/10.1111/jrh.12460
Tags
- testing
- demographics
- lang:en
- death rate
- screening
- rural health
- healthcare
- internet
- racial disparity
- outbreak
- COVID-19
- hospital
- telehealth
- access to care
- African American
- USA
- infection rate
- social determinants of health
- health equity
- inequality
- inadequately prepared
- is:article
- black people
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
If you update your pages and push to github, people revisiting the pages who have already got cached copies will not get the new pages without actually cleaning their browser cache. How can a script running in a page determine that it is stale and force an update?
-
-
stackoverflow.com stackoverflow.com
-
for me it was because the browser use cached data(old styles) so i opend other brwser
-
-
www.chromestatus.com www.chromestatus.com
-
AppCache was standardized in the Offline Web applications section of the HTML specification. The standard is formally referred to as application caches. New Web applications should be built around Service Workers. Existing applications that use AppCache should migrate to Service Workers. AppCache access was removed from insecure origins in M70. This intent addresses AppCache usage in secure origins.
First and foremost, AppCache is a deprecated standard with serious architectural concerns. Second, Chrome's AppCache implementation is a security and stability liability. AppCache is documented as deprecated and under removal in MDN and in the WHATWG standard, and marked as obsolete in W3C’s HTML 5.1. It is incompatible with CORS, making it unfriendly for usage with CDNs. Overall, AppCache was changed in over 400 Chromium CLs in 2018-2019. It has imposed a tax on all of Chrome’s significant architectural efforts: Mojofication, Onion Souping, and the Network Service. The security benefits of the removal are covered under Security Risks.
-
-
www.w3.org www.w3.org
-
The "'strict-dynamic'" source expression aims to make Content Security Policy simpler to deploy for existing applications who have a high degree of confidence in the scripts they load directly, but low confidence in their ability to provide a reasonable list of resources to load up front.
-
-
developers.google.com developers.google.com
-
Although it can minimize the overhead of third-party tags, it also makes it trivial for anyone with credentials to add costly tags.
-
A "tag" is a snippet of code that allows digital marketing teams to collect data, set cookies or integrate third-party content like social media widgets into a site.
This is a bad re-purposing of the word "tag", which already has specific meanings in computing.
Why do we need a new word for this? Why not just call it a "script" or "code snippet"?
-
-
spreadprivacy.com spreadprivacy.com
-
Eric Schmidt, former Google CEO and Chairman, famously said “Google’s policy on a lot of these things is to get right up to the creepy line, but not cross it.” But for most people, that line was crossed by Google, Facebook, and others long ago.
-
-
weather.com weather.com
-
These options have almost deceptively similar wordings, with only subtle difference that is too hard to spot at a glance (takes detailed comparison, which is fatiguing for a user):
- can use your browser’s information for providing advertising services for this website and for their own purposes.
- cannot use your browser’s information for purposes other than providing advertising services for this website.
If you rewrite them to use consistent, easy-to-compare wording, then you can see the difference a little easier:
- can use your browser’s information for providing advertising services for this website and for their own purposes.
- can use your browser’s information for providing advertising services for this website <del>and for their own purposes</del>.
Standard Advertising Settings
This means our ad partners can use your browser’s information for providing advertising services for this website and for their own purposes.
Do Not Share My Information other than for ads on this website
This means that our ad partners cannot use your browser’s information for purposes other than providing advertising services for this website.
-
-
www.iubenda.com www.iubenda.com
-
This depends on the legal jurisdiction applicable to your site.
-
-
www.iubenda.com www.iubenda.com
-
Consent means offering individuals real choice and control. Genuine consent should put individuals in charge, build trust and engagement, and enhance your reputation.
-
-
notes.andymatuschak.org notes.andymatuschak.org
-
Instead of having a task like “write an outline of the first chapter,” you have a task like “find notes which seem relevant.” Each step feels doable. This is an executable strategy (see Executable strategy).
Whereas Dr. Sönke Ahrens in How to Make Smart Notes seemed to be saying that the writing of a permanent note (~evergreen note) is a unit of knowledge work with predictable effort & time investment (as well as searching for relevant notes), Andy emphasizes only the note searching activity in this context.
-
-
en.wikipedia.org en.wikipedia.org
-
However, since problems are only addressed when they arise, maintenance is reactive rather than proactive. Small problems left unaddressed can balloon into major failures due to focus on cost.
-
-
bostonreview.net bostonreview.net
-
An aside: witness the superiority of digital annotation (@Hypothes_is style) to Twitter threads.
-
-
martinfowler.com martinfowler.com
-
What a lot of people don't realize is that a source control system is a communication tool. It allows Scarlett to see what other people on the team are doing. With frequent integrations, not just is she alerted right away when there are conflicts, she's also more aware of what everyone is up to, and how the codebase is evolving. We're less like individuals hacking away independently and more like a team working together.
Source code management as a communication tool.
-
-
www.fastcompany.com www.fastcompany.com
-
Google encouraging site admins to put reCaptcha all over their sites, and then sharing the resulting risk scores with those admins is great for security, Perona thinks, because he says it “gives site owners more control and visibility over what’s going on” with potential scammer and bot attacks, and the system will give admins more accurate scores than if reCaptcha is only using data from a single webpage to analyze user behavior. But there’s the trade-off. “It makes sense and makes it more user-friendly, but it also gives Google more data,”
-
For instance, Google’s reCaptcha cookie follows the same logic of the Facebook “like” button when it’s embedded in other websites—it gives that site some social media functionality, but it also lets Facebook know that you’re there.
-
-
www.simplechurchathome.com www.simplechurchathome.com
-
examples, listing both the conventional systems and their counterpart systems: Conventional schooling Home schooling Encyclopedia Britannica Wikipedia Microsoft Office Open Office Taxicabs Uber Hotel chains Airbnb Big-box stores Ebay National currency Cryptocurrency
-
-
www.iubenda.com www.iubenda.com
-
Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.
Answers the question I had above: https://hyp.is/tpgdQo_4EeqPcm-PI0G2jA/www.iubenda.com/en/help/5640-email-newsletter-compliance-guide
-
It’s always best practice to either simply follow the most robust legislations or to check the local anti-spam requirements specific to where your recipients are based.
-
In the EU, the ePrivacy directive sets overall guidelines that are individually implemented by member states
-
Under the FTC’s CAN-SPAM Act, you do not need consent prior to adding users located in the US to your mailing list or sending them commercial messages, however, it is mandatory that you provide users with a clear means of opting out of further contact.
-
Be clear and unambiguous. The average user should be easily able to understand what they’re consenting to;
Tags
- erring on the side of following the strictest laws even if they don't necessarily apply to you
- different laws applying to different countries/regions
- right to object/opt out
- easy to understand
- exemptions
- consent: validity of consent
- spam
- being explicit
- consent
- opting out
- clarity
- implicit/implied
- US law
- GDPR
- unambiguous
- exceptions to the rule
- mailing list
Annotators
URL
-
-
-
they sought to eliminate data controllers and processors acting without appropriate permission, leaving citizens with no control as their personal data was transferred to third parties and beyond
-
-
gdpr-info.eu gdpr-info.eu
-
the compelling legitimate interests pursued
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
While there are no legal precedents to spell out specifically what the actual terms mean, it can be interpreted from the testimony of people like Professor Mark Lemley from Stanford University, in front of the United States Senate Committee on the Judiciary that the individual terms are defined as follows
-
-
kantarainitiative.org kantarainitiative.org
-
“Until CR 1.0 there was no effective privacy standard or requirement for recording consent in a common format and providing people with a receipt they can reuse for data rights. Individuals could not track their consents or monitor how their information was processed or know who to hold accountable in the event of a breach of their privacy,” said Colin Wallis, executive director, Kantara Initiative. “CR 1.0 changes the game. A consent receipt promises to put the power back into the hands of the individual and, together with its supporting API — the consent receipt generator — is an innovative mechanism for businesses to comply with upcoming GDPR requirements. For the first time individuals and organizations will be able to maintain and manage permissions for personal data.”
-
Its purpose is to decrease the reliance on privacy policies and enhance the ability for people to share and control personal information.
-
-
-
make it as easy to withdraw consent as to give it. The latter gets particularly interesting when considering that in some contexts, consent may be obtained “through only one mouse-click, swipe or keystroke” and therefore “data subjects must, in practice, be able to withdraw that consent equally as easily” per the WP29.
It seems, then, that one should be careful to not make it too easy to opt in to something unless you are prepared to accept the liability for making it just as easy to opt out (which may be technically challenging).
-
it is a question of balance — if one mouse-click was all it took to consent, is it appropriate to require a phone call during business hours to withdraw that consent? Probably not.
-
-
wayks.com wayks.com
-
You have the right to withdraw from this contract within 14 days without giving any reason.
-
-
en.wikipedia.org en.wikipedia.org
-
a person can withdraw from research at any point of time and it is no binding of participant to reveal the reason of discontinuation
-
-
www.iubenda.com www.iubenda.com
-
This exemption is may not be applicable for all regions and is therefore subject to specific local regulations.
-
An entity not established in the EU offers goods or services (even if the offer is for free) to people in the EU. The entity can be government agencies, private/public companies, individuals and non-profits;
-
In the US, there is no single comprehensive national body of data regulations; there are, however, various laws on a state level as well as industry guidelines and specific federal laws in place. Since online site/app activity is rarely limited to just one state, it’s always best to adhere to the strictest applicable regulations.
-
Determining your law of reference Generally, the laws of a particular region apply if: You base your operations there; or You use processing services or servers based in the region; or Your service targets users from that region This effectively means that regional regulations may apply to you and/or your business whether you’re located in the region or not. For that reason, it’s always advisable that you approach your data processing activities with the strictest applicable regulations in mind.
-
-
www.iubenda.com www.iubenda.com
-
they’ve contested its accuracy
-
This scope effectively covers almost all companies and, therefore, means that the GDPR can apply to you whether your organization is based in the EU or not. As a matter of fact, this PwC survey showed that the GDPR is a top data protection priority for up to 92 percent of U.S. companies surveyed.
-
-
www.iubenda.com www.iubenda.com
-
it buys, receives, sells, or shares the personal information of 50,000 or more consumers annually for the business’ commercial purposes. Since IP addresses fall under what is considered personal data — and “commercial purposes” simply means to advance commercial or economic interests — it is likely that any website with at least 50k unique visits per year from California falls within this scope.
-
-
www.iubenda.com www.iubenda.com
-
Please note that users enjoy a specific right of opposition to ADM processes
-
-
gdpr-info.eu gdpr-info.eu
-
the data controller shall implement suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and to contest the decision.
-
-
www.reddit.com www.reddit.com
-
I have seen that, but there is no cheaper alternative? Or even better an open source altenative?
-
-
-
This is it. I'm done with Page Translator, but you don't have to be. Fork the repo. Distribute the code yourself. This is now a cat-and-mouse game with Mozilla. Users will have to jump from one extension to another until language translation is a standard feature or the extension policy changes.
-
While there are security benefits to disallowing unsigned extensions by default, it is not clear why there is no option to turn off this behavior, perhaps by making it configurable only with administrator rights.
-
It would be best to offer an official way to allow installing local, unsigned extensions, and make the option configurable only by root, while also showing appropiate warnings about the potential risks of installing unsigned extensions.
-
I reckon that it was: less a communication failure more a failure to pay attention – no disrespect intended. Given the unfortunate coincidence, it's almost entirely understandable that everyone concerned lost sight of Mozilla's forewarning.
-
What I don't like is how they've killed so many useful extensions without any sane method of overriding their decisions.
-
I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
-
None of these methods are ideal and honestly, I'd only blame Mozilla for this. They dismiss all our efforts as incorrect but refuse to provide the correct solution.
-
Mozilla will never publicly ask users to circumvent their own blocklist. But it's their actions that are forcing people to do so.
-
What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
-
They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
-
So to me, it seems like they want to keep their users safer by... making them use Google Chrome or... exposing themselves to even greater danger by disabling the whole blocklist.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
-
We must consider introducing sensible default options in Firefox, while also educating users and allowing them to override certain features, instead of placing marginal security benefits above user liberties and free choice.
Tags
- secure by default
- censorship
- bypassing technical constraints
- balance of power
- easy to miss / not notice (attention)
- balance
- answer the "why?"
- communication
- compromise
- unintended consequence
- unfortunate policies/laws
- cat and mouse game
- good idea
- arbitrary limitations leading to less-than-ideal workarounds
- allowing security constraints to be bypassed by users
- digital rights
- the owner of a device/computer should have freedom to use it however they wish
- empowering people
- security
- trade-offs
- Mozilla
- trust
- marginal benefits
- trying to prevent one bad thing leading to people doing/choosing an even worse option
- awkward workarounds
- self-distributed app/extension
- tactfulness
- key point
- fork
- software freedom
- empowering individual users
- Orwellian
- freedom of user to override specific decision of an authority/vendor (software)
- freedom
- good point
Annotators
URL
-
-
extensionworkshop.com extensionworkshop.com
-
Add-ons must function only as described, and should provide an appealing user experience. Based on the description of the add-on, a user must be able to understand and use the add-on’s features without requiring expert knowledge.
-
-
blog.hubspot.com blog.hubspot.com
-
Starting your answer with a word commonly associated with equivocation automatically weakens your answers and makes you sound less sure of yourself.
-
-
www.iubenda.com www.iubenda.com
-
Implementing prior blocking and asynchronous re-activation Our prior blocking option prevents the installation of non-exempt cookies before user consent is obtained (as required by EU law) and asynchronously activates (without reloading the page) the scripts after the user consents.To use, you must first enable this feature: simply select the “Prior blocking and asynchronous re-activation” checkbox above before copy and pasting the code snippet into the HEAD as mentioned in the preceding paragraph.
-
-
stackoverflow.com stackoverflow.com
-
Whether it's "better" for your implementation is up for you to decide.
-
- Apr 2020
-
www.popularmechanics.com www.popularmechanics.com
-
Take a moment to consider the alternative. No, not the IT department's fantasy world, that never-gonna-happen scenario where you create a strong, unique password for every account, memorize each one, and refresh them every few months. We both know it's not like that. The reality is that in your attempts to handle all those passwords yourself, you will commit the cardinal sin of reusing some. That is actually far more risky than using a password manager. If a single site that uses this password falls, every account that uses it is compromised.
-
-
www.benjaminfleischer.com www.benjaminfleischer.com
-
In particular, I, quite accidentally, became a maintainer of ActsAsTaggableOn, a Rails tagging engine, after bumping a long-stale, minor, pull-request I had written.
-
-
-
github.com github.com
-
Becouse of CanCan, StateMachine and others I deside to create OpenSource organization to maintain gems. People disappear, lose their passion about coding, get new interests, families, children. But if us many we can support gems much longer. I dont pretend to be an expierenced ruby developer, but I can do administarative work: managing teams, members, approve simple pool-requests. If you think it good idea and want to support some inactive gems, not life time, maybe just a little - welcome to organization.
-
There's actually discussion among the rubygems team about a process for putting gems "up for adoption" that you might be interested in: http://www.benjaminfleischer.com/2014/08/17/rubygems-adoption-center/
-
-
www.cnbc.com www.cnbc.com
-
www.cnbc.com www.cnbc.com
-
For instance, one recent blog entry from the Irish Data Protection Commission discussing events at schools borders on the absurd:“Take the scenario whereby a school wants to take and publish photos at a sports day – schools could inform parents in advance that photographs are going to be taken at this event and could provide different-coloured stickers for the children to wear to signify whether or not they can be photographed,” the Commission suggested. The post goes on to discuss the possibility of schools banning photographs at a high school musical, but suggests that might be unwieldy.
-
But now, I think there’s still some lack of clarity from consumers on exactly what they need to do
-
I think that the importance of people understanding what is going on with their data, and not having a surprised reaction that somebody has their information.
Tags
- school
- empowering people
- empowering people to control their privacy / personal data processing
- impractical
- absurd
- personal data processing
- missed opportunity
- clarity
- consent
- confusing
- how?
- don't want to be surprised
- transparency
- taking something too far
- consent: to be photographed
Annotators
URL
-
-
www.iubenda.com www.iubenda.com
-
Allows you to autodetect and limit prior-blocking and cookie consent requests only to users from the EU – where this is a legal requirement – while running cookies scripts normally in regions where you are still legally allowed to do so.
-
Enables the blocking of scripts and their reactivation only after having collected user consent. If false, the blocked scripts are always reactivated regardless of whether or not consent has been provided (useful for testing purposes, or when you’re working on your project locally and don’t want pageviews to be counted). We strongly advise against setting "priorConsent":false if you need to comply with EU legislation. Please note that if the prior blocking setting has been disabled server side (via the checkbox on the flow page), this parameter will be ineffective whether it’s set to true or false.
-
-
www.iubenda.com www.iubenda.com
-
Please note that at the moment the Cookie Solution is optimized to comply with very strict Italian implementation regulations (this can only improve compliance in other jurisdictions).
-
-
en.wikipedia.org en.wikipedia.org
-
Such languages may make it easier for a person without knowledge about the language to understand the code and perhaps also to learn the language.
-
-
-
One thing is certain when it comes to navigation trends, users and designers seem to be fed up with completely hidden styles and demand options that work in similar formats on desktops and mobile devices. This might be one of the reasons a vertical pattern is trending.
-
Non-traditional navigation styles can be a fun way to break up some of the same old design patterns.
See the really creative/fun example image above.
Tags
- avoid the need to rewrite for different contexts/platforms
- mobile app
- pretty visual design
- cross-platform
- app design: navigation: side navigation
- avoid duplication
- app design: navigation: location
- alternative to mainstream way
- creative
- app design: navigation
- non-traditional
- visual design: designing for different screen sizes
- mobile-first
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
Potential for political focus on building new features over technical improvements (such as refactoring)
-
-
en.wikipedia.org en.wikipedia.org
-
the phrase up to is used to convey the idea that some objects in the same class — while distinct — may be considered to be equivalent under some condition or transformation
-
"a and b are equivalent up to X" means that a and b are equivalent, if criterion X, such as rotation or permutation, is ignored
-
-
-
en.wikipedia.org en.wikipedia.org
-
If solutions that differ only by the symmetry operations of rotation and reflection of the board are counted as one, the puzzle has 12 solutions. These are called fundamental solutions; representatives of each are shown below
-
-
makandracards.com makandracards.com
-
What we actually want to do is to escape content if it is unsafe, but leave it unescaped if it is safe. To achieve this we can simply use SafeBuffer's concatenation behavior:
-
Our helper still returns a safe string, but correctly escapes content if it is unsafe. Note how much more flexible our group helper has become because it now works as expected with both safe and unsafe arguments. We can now leave it up to the caller whether to mark input as safe or not, and we no longer need to make any assumptions about the safeness of content.
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
Don't try to correct user input by blacklists: This will make the attack work: "<sc<script>ript>".gsub("<script>", "")
-
-
www.troyhunt.com www.troyhunt.com
-
In fact, both this model and torrenting it were out because they make access to data harder
-
Amazon has got a neat Requestor Pays Feature but as soon as there's a cost - any cost - there's a barrier to entry.
-
-
stackoverflow.com stackoverflow.com
-
You are correct: by default, git log -p shows you the merge commit, but does not even attempt to show a diff for it.
-
-
github.com github.com
-
Remember to call super in any subclasses that override teardown.
And yet the Rails core chose not to use RSpec, citing how it would be too easy to write
subject == expected
on accident?
-
-
stackoverflow.com stackoverflow.com
-
[link](url){:target="_blank"} Works for jekyll or more specifically kramdown, which is a superset of markdown, as part of Jekyll's (default) configuration. But not for plain markdown. ^_^
-
-
-
in order to track the always-improving upstream project, we continuously rebase our patches on top of the upstream master
-
Our hope is that once a formal specification for these extensions is settled, this patchset can be used as a base to upstream the changes in the original project.
What does "can be used as a base to upstream the changes in the original project" mean here?
-
-
github.com github.com
-
There is a forum for discussing CommonMark; you should use it instead of github issues for questions and possibly open-ended discussions. Use the github issue tracker only for simple, clear, actionable issues.
-
-
stackoverflow.com stackoverflow.com
-
stackoverflow.com stackoverflow.com
-
github.com github.com
-
Is there any reason we couldn't just automatically prepend a module that adds the after_sign_in_path_for method override mentioned in the Readme?
-
-
deepspeech.readthedocs.io deepspeech.readthedocs.io
-
Python contributed examples¶ Mic VAD Streaming¶ This example demonstrates getting audio from microphone, running Voice-Activity-Detection and then outputting text. Full source code available on https://github.com/mozilla/DeepSpeech-examples. VAD Transcriber¶ This example demonstrates VAD-based transcription with both console and graphical interface. Full source code available on https://github.com/mozilla/DeepSpeech-examples.
-
-
deepspeech.readthedocs.io deepspeech.readthedocs.io
-
Python API Usage example Edit on GitHub Python API Usage example¶ Examples are from native_client/python/client.cc. Creating a model instance and loading model¶ 115 ds = Model(args.model) Performing inference¶ 149 150 151 152 153 154 if args.extended: print(metadata_to_string(ds.sttWithMetadata(audio, 1).transcripts[0])) elif args.json: print(metadata_json_output(ds.sttWithMetadata(audio, 3))) else: print(ds.stt(audio)) Full source code
-
-
github.com github.com
-
DeepSpeech is an open source Speech-To-Text engine, using a model trained by machine learning techniques based on Baidu's Deep Speech research paper. Project DeepSpeech uses Google's TensorFlow to make the implementation easier. NOTE: This documentation applies to the 0.7.0 version of DeepSpeech only. Documentation for all versions is published on deepspeech.readthedocs.io. To install and use DeepSpeech all you have to do is: # Create and activate a virtualenv virtualenv -p python3 $HOME/tmp/deepspeech-venv/ source $HOME/tmp/deepspeech-venv/bin/activate # Install DeepSpeech pip3 install deepspeech # Download pre-trained English model files curl -LO https://github.com/mozilla/DeepSpeech/releases/download/v0.7.0/deepspeech-0.7.0-models.pbmm curl -LO https://github.com/mozilla/DeepSpeech/releases/download/v0.7.0/deepspeech-0.7.0-models.scorer # Download example audio files curl -LO https://github.com/mozilla/DeepSpeech/releases/download/v0.7.0/audio-0.7.0.tar.gz tar xvf audio-0.7.0.tar.gz # Transcribe an audio file deepspeech --model deepspeech-0.7.0-models.pbmm --scorer deepspeech-0.7.0-models.scorer --audio audio/2830-3980-0043.wav A pre-trained English model is available for use and can be downloaded using the instructions below. A package with some example audio files is available for download in our release notes.
-
-
research.mozilla.org research.mozilla.org
-
Speech & Machine Learning
-
-
pypi.org pypi.org
-
Library for performing speech recognition, with support for several engines and APIs, online and offline. Speech recognition engine/API support: CMU Sphinx (works offline) Google Speech Recognition Google Cloud Speech API Wit.ai Microsoft Bing Voice Recognition Houndify API IBM Speech to Text Snowboy Hotword Detection (works offline) Quickstart: pip install SpeechRecognition. See the “Installing” section for more details. To quickly try it out, run python -m speech_recognition after installing. Project links: PyPI Source code Issue tracker Library Reference The library reference documents every publicly accessible object in the library. This document is also included under reference/library-reference.rst. See Notes on using PocketSphinx for information about installing languages, compiling PocketSphinx, and building language packs from online resources. This document is also included under reference/pocketsphinx.rst.
Tags
Annotators
URL
-
-
github.com github.com
-
Running the example code with python Run like this: cd vosk-api/python/example wget https://github.com/alphacep/kaldi-android-demo/releases/download/2020-01/alphacep-model-android-en-us-0.3.tar.gz tar xf alphacep-model-android-en-us-0.3.tar.gz mv alphacep-model-android-en-us-0.3 model-en python3 ./test_simple.py test.wav To run with your audio file make sure it has proper format - PCM 16khz 16bit mono, otherwise decoding will not work. You can find other examples of using a microphone, decoding with a fixed small vocabulary or speaker identification setup in python/example subfolder
-
Vosk is a speech recognition toolkit. The best things in Vosk are: Supports 8 languages - English, German, French, Spanish, Portuguese, Chinese, Russian, Vietnamese. More to come. Works offline, even on lightweight devices - Raspberry Pi, Android, iOS Installs with simple pip3 install vosk Portable per-language models are only 50Mb each, but there are much bigger server models available. Provides streaming API for the best user experience (unlike popular speech-recognition python packages) There are bindings for different programming languages, too - java/csharp/javascript etc. Allows quick reconfiguration of vocabulary for best accuracy. Supports speaker identification beside simple speech recognition.
-
Kaldi API for offline speech recognition on Android, iOS, Raspberry Pi and servers with Python, Java, C# and Node
Tags
Annotators
URL
-
-
www.analyticsvidhya.com www.analyticsvidhya.com
-
import all the necessary libraries into our notebook. LibROSA and SciPy are the Python libraries used for processing audio signals. import os import librosa #for audio processing import IPython.display as ipd import matplotlib.pyplot as plt import numpy as np from scipy.io import wavfile #for audio processing import warnings warnings.filterwarnings("ignore") view raw modules.py hosted with ❤ by GitHub View the code on <a href="https://gist.github.com/aravindpai/eb40aeca0266e95c128e49823dacaab9">Gist</a>. Data Exploration and Visualization Data Exploration and Visualization helps us to understand the data as well as pre-processing steps in a better way.
-
TensorFlow recently released the Speech Commands Datasets. It includes 65,000 one-second long utterances of 30 short words, by thousands of different people. We’ll build a speech recognition system that understands simple spoken commands. You can download the dataset from here.
-
In the 1980s, the Hidden Markov Model (HMM) was applied to the speech recognition system. HMM is a statistical model which is used to model the problems that involve sequential information. It has a pretty good track record in many real-world applications including speech recognition. In 2001, Google introduced the Voice Search application that allowed users to search for queries by speaking to the machine. This was the first voice-enabled application which was very popular among the people. It made the conversation between the people and machines a lot easier. By 2011, Apple launched Siri that offered a real-time, faster, and easier way to interact with the Apple devices by just using your voice. As of now, Amazon’s Alexa and Google’s Home are the most popular voice command based virtual assistants that are being widely used by consumers across the globe.
-
Learn how to Build your own Speech-to-Text Model (using Python) Aravind Pai, July 15, 2019 Login to Bookmark this article (adsbygoogle = window.adsbygoogle || []).push({}); Overview Learn how to build your very own speech-to-text model using Python in this article The ability to weave deep learning skills with NLP is a coveted one in the industry; add this to your skillset today We will use a real-world dataset and build this speech-to-text model so get ready to use your Python skills!
-
-
-
One can imagine that this whole process may be computationally expensive. In many modern speech recognition systems, neural networks are used to simplify the speech signal using techniques for feature transformation and dimensionality reduction before HMM recognition. Voice activity detectors (VADs) are also used to reduce an audio signal to only the portions that are likely to contain speech. This prevents the recognizer from wasting time analyzing unnecessary parts of the signal.
-
Most modern speech recognition systems rely on what is known as a Hidden Markov Model (HMM). This approach works on the assumption that a speech signal, when viewed on a short enough timescale (say, ten milliseconds), can be reasonably approximated as a stationary process—that is, a process in which statistical properties do not change over time.
-
The first component of speech recognition is, of course, speech. Speech must be converted from physical sound to an electrical signal with a microphone, and then to digital data with an analog-to-digital converter. Once digitized, several models can be used to transcribe the audio to text.
-
How speech recognition works, What packages are available on PyPI; and How to install and use the SpeechRecognition package—a full-featured and easy-to-use Python speech recognition library.
-
The Ultimate Guide To Speech Recognition With Python
-
-
-
Digital ThinkTanking in Times of COVID-19 | DGAP. (n.d.). Retrieved April 24, 2020, from https://dgap.org/en/events/digital-thinktanking-times-covid-19
-
-
developer.mozilla.org developer.mozilla.org
-
,
Not to forget the "," at the end of { } block in json.
-
-
-
While these particular indictments refer to credit card data, the laws do also reference authentication features. Two of the key points here are knowingly and with intent to defraud.
-
Having said all that, I think this is completely absurd that I have to write an entire article justifying the release of this data out of fear of prosecution or legal harassment. I had wanted to write an article about the data itself but I will have to do that later because I had to write this lame thing trying to convince the FBI not to raid me.
-
I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us.
-
For now the laws are on my side because there has to be intent to commit or facilitate a crime
-
it reminds me of IT security best practices. Based on experience and the lessons we have learned in the history of IT security, we have come up with some basic rules that, when followed, go a long way to preventing serious problems later.
-
As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
Tags
- chilling effect
- good intentions
- researcher rights
- making it easy to do the right thing
- absurd
- fear of prosecution/legal harassment
- best practices
- good policy/practice/procedure
- intent to commit/facilitate a crime
- collateral damage/impact
- journalist rights
- do the right thing
- a government for the people?
- don't turn innocent people into criminals (through bad laws)
- unintended consequence
- legitimate activities/uses made illegal due to laws intended only to forbid illegitimate activities
- laws/law enforcement agencies are supposed to be protecting us
- legitimate uses of a feature blocked due to abuse of the same feature
Annotators
URL
-
-
www.csoonline.com www.csoonline.com
-
A user need only remember the master password for the password manager — preferably something like a seven-word diceware passphrase, easy to remember, hard to crack.
-
-
haveibeenpwned.com haveibeenpwned.com
-
In the future, these attributes may expand without the API being versioned. The current attributes are:
-
-
keepass.info keepass.info
-
Data Erasure and Storage Time The personal data of the data subject will be erased or blocked as soon as the purpose of storage ceases to apply. The data may be stored beyond that if the European or national legislator has provided for this in EU regulations, laws or other provisions to which the controller is subject. The data will also be erased or blocked if a storage period prescribed by the aforementioned standards expires, unless there is a need for further storage of the data for the conclusion or performance of a contract.
-
-
www.techopedia.com www.techopedia.com
-
A language that features polymorphism allows developers to program in the general rather than program in the specific. $(document).ready(function() { recordAdModuleData(2964, "impressions","Dictionary Ad"); });
-
-
github.com github.com
-
Devise-Two-Factor only worries about the backend, leaving the details of the integration up to you. This means that you're responsible for building the UI that drives the gem. While there is an example Rails application included in the gem, it is important to remember that this gem is intentionally very open-ended, and you should build a user experience which fits your individual application.
-
-
github.com github.com
-
Recently the HaveIBeenPwned API has moved to a authenticated/paid model , this does not effect the PwnedPasswords API, no payment or authentication is required.
-
-
www.techrepublic.com www.techrepublic.com
-
there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"
-
The more easily relabeled of the two uses of the term "hacker" is the malicious security cracker: it is not only the more recent phenomenon to acquire that label, but also the one whose meaning is most easily evoked by an alternative term. This is why, when you read an article of mine that talks about malicious security crackers, I use the term "malicious security cracker"
-
A hacker, in the classic sense of the term, is someone with a strong interest in how things work, who likes to tinker and create and modify things for the enjoyment of doing so.
-
When you simply accept that "hacker" means "malicious security cracker", you give up the ability to use the term to refer to anything else without potential confusion.
-
-
Some claim that the term has been unrecoverably corrupted, and acquired a new meaning that we should simply accept.
Tags
- popular misconceptions
- language
- if you accept _ then you give up the ability to _
- "hacker" meaning someone who loves to program and enjoys playful cleverness
- communication
- definition
- unrecoverably corrupted
- "hacker" vs. "cracker"
- alternative to mainstream way
- confusing
- acquiescing/giving in
- language: misuse of word
- communicating with less technical people
- hoping/trying to convince others that your view/opinion/way is right by consistently sticking to it despite many being ignorant/mistaken/unaware/holding different opinion
Annotators
URL
-
-
english.stackexchange.com english.stackexchange.com
-
As you indicate, it will be misunderstood in some quarters, which might be a good reason for avoiding it.
-
-
www.troyhunt.com www.troyhunt.com
-
This list is not perfect - it's not meant to be perfect - and there will be some junk due to input data quality and some missing passwords because they weren't in the source data sets. It's simply meant to be a list of strings that pose an elevated risk if used for passwords and for that purpose, it's enormously effective.
-
-
www.troyhunt.com www.troyhunt.com
-
Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
-
-
en.wikipedia.org en.wikipedia.org
-
In 1999, "collateral damage" (German: Kollateralschaden) was named the German Un-Word of the Year by a jury of linguistic scholars. With this choice, it was criticized that the term had been used by NATO forces to describe civilian casualties during the Kosovo War, which the jury considered to be an inhuman euphemism.
-
the classic Orwellian arguments for finding this usage objectionable
-
it is jargon, and to the extent that people cannot decode it, it conceals what is actually going on;
-
-
www.cnet.com www.cnet.com
-
Well, as a home user, I also belong to an investment club with 10 members. I also have a medium size family who I like to send photo's to, and my son is on a soccer team. all those have greater than 5 people on the list. sooooooooo..... once again, the people with valid use of the internet have to 'deal' with those that abuse it.
-
-
en.wikipedia.org en.wikipedia.org
-
accessmedicine.mhmedical.com accessmedicine.mhmedical.com
-
Bacterial species develops the extracellular polymeric substances (EPS) and resistance to disinfectants, antiseptics, and antibiotics in 6 to 12 hours. The biofilm then develops into mature colonies in 2 to 4 days
-
-
en.wikipedia.org en.wikipedia.org
-
the ordinal indicators should be distinguishable from superscript characters
-
frequent mistake is to confuse the degree sign U+00B0 (°) with the masculine ordinal indicator
-
-
github.com github.com
-
There are a couple of similar packages for anyone who does not want to completely accept standard:
-
-
github.com github.com
-
github.com github.com
-
It's amazing what new can do for clarity. This is exactly what I meant, but couldn't figure out how to phrase at the time.
-
-
blog.plataformatec.com.br blog.plataformatec.com.br
-
So what will happen with these projects from now on? All of the projects above have one thing in common: they were created and maintained by passionate individuals who wanted to make positive contributions to their communities. Without these individuals and their efforts, these projects would not have become what they are today. Therefore, it is only fair that Plataformatec gives these individuals control of these projects moving forward.
-
-
-
Add back the Gemfile.lock We want to every clone of this repository to have a set of dependencies that we are sure will have green tests. We remove the lock in CI to make sure we are always running tests with the latest version.
-
-
-
Remove upper bound in our dependencies Doing this we are only asking people to fork our gem or open issues when they want to use a new version of the dependency and we still didn't tested with it.
-
-
github.com github.com
-
Maybe you could provide a patch with tests and we could discuss on top of it?
-
-
helpx.adobe.com helpx.adobe.com
-
See how easy it is to import your footage, create a sequence, add a title, adjust audio levels, and export video in Premiere Pro.
-
-
jamanetwork.com jamanetwork.com
-
Patients with cardiac injury vs those without cardiac injury had shorter durations from symptom onset to follow-up (mean, 15.6 [range, 1-37] days vs 16.9 [range, 3-37] days; P = .001) and admission to follow-up (6.3 [range, 1-16] days vs 7.8 [range, 1-23] days; P = .039).
-
-
www.kickstarter.com www.kickstarter.com
-
We wondered - do voters carefully consider the political issues and then objectively study each candidate’s platform, or do they mainly go with from-the-gut “tribal” feelings?
-
-
accessmedicine.mhmedical.com accessmedicine.mhmedical.com
-
Before repair of the injury is attempted, hemorrhage should be controlled; injuries to the atria can be clamped with a Satinsky vascular clamp, whereas digital pressure is used to occlude the majority of ventricular wounds. Foley catheter occlusion of larger stellate lesions is described, but even minimal traction may enlarge the original injury.
bleeding control is first. satinsky clamp can be used for atria inj but for ventricular, mostly digital pressure is used. minimal stretch may enlarge inj (Foley)
-
Because treatment must be instituted during the latent period between injury and onset of neurologic sequelae, diagnostic imaging is performed based on identified risk factors (Fig. 7-55).91 After identification of an injury, antithrombotics are administered if the patient does not have contraindications (intracranial hemorrhage, falling hemoglobin level with solid organ injury or complex pelvic fractures). Heparin, started without a loading dose at 15 units/kg per hour, is titrated to achieve a PTT between 40 and 50 seconds or antiplatelet agents are initiated (aspirin 325 mg/d or clopidogrel 75 mg/d). The types of antithrombotic treatment appear equivalent in published studies to date, and the duration of treatment is empirically recommended to be 6 months.
diagnostic imaging before onset of neurologic complications while taking
-
Early recognition and management of these injuries is paramount because patients treated with antithrombotics have a stroke rate of <1% compared with stroke rates of 20% in untreated patients.
antithrombotics for blunt inj of carotid and vertebral art decreases stroke rates from 20 to 1%
-
Vertebral artery injuries due to penetrating trauma are difficult to control operatively because of the artery’s protected location within the foramen transversarium. Although exposure from an anterior approach can be accomplished by removing the anterior elements of the bony canal and the tough fascia covering the artery between the elements, typically the most efficacious control of such injuries is angioembolization. Fogarty catheter balloon occlusion, however, is useful for controlling acute bleeding if encountered during neck exploration.
penetrating traumatic vertebral art inj are better controled by angioembolization, rather than removal of ant of foramen transversarium. and Fogarty catheter baloon occlusion for acute bleeding while exploring.
-
Sedation, osmotic diuresis, paralysis, ventricular drainage, and barbiturate coma are used in sequence, with coma induction being the last resort.
-
CPP can be increased by either lowering ICP or raising mean arterial pressure.
-
Penetrating injuries to the head may require operative intervention for hemorrhage control, evacuation of blood, skull fracture fixation, or debridement.
-
-
github.com github.com
-
Not everybody uses rubygems as their package management system. If this sounds odd to you, read https://gist.github.com/54177.
Tags
Annotators
URL
-
-
marker.medium.com marker.medium.com
-
When Casper filed its S-1 in January, analysts, investors, and business nerds descended on the document like vultures. Not only was it a precarious moment to take a startup public, it was the first time anyone could actually access the raw numbers under the hood of a DTC. “The economics work better if Casper sent you a mattress for free, stuffed with $300,” jabbed NYU Stern marketing professor and tech doomsayer Scott Galloway. “This appears to be Casper’s business,” tweeted number-crunching Atlantic columnist Derek Thompson. “Buy mattress at $400. Sell at $1,000. Refund/return 20% of them. Keep $400, on avg. Then spend $290 of that on ads/marketing and $270 on admin (finance, HR, IT). Lose $160. Repeat.”
Summary of Casper's business model
-
-
www.joshmcarthur.com www.joshmcarthur.com
-
-
Almost always, I’m writing some kind of developer-script, and I want to write messages to both the terminal (to let the dev know what is going on), and to a log file (for future reference/audit).
-
-
stackoverflow.com stackoverflow.com