The handler can be a method or a Proc object passed to the :with option. You can also use a block directly instead of an explicit Proc object.
Example of: letting you either pass a proc (as a keyword arg in this case) or as a block.
The handler can be a method or a Proc object passed to the :with option. You can also use a block directly instead of an explicit Proc object.
Example of: letting you either pass a proc (as a keyword arg in this case) or as a block.
You can also switch to JavaScript to see the text-based code behind the blocks.
We prefer Freshconnect for ticket related discussions because it maintains the context and always remains part of the ticket. In Slack, these discussions get lost in threads within channels.
If you don't receive a reply, even if you do provide all the information required to show the issue, be aware that the forums are a very busy place. There are more than 40 new threads a day asking for assistance and not every one can be freely answered.
letting them adjust consent decisions for specific purposes and exercise other user rights at any time.
The diagram above shows an example of this
Regardless of where an organization is based (in the EU or otherwise), its website must meet regulatory obligations when processing EU/EEA citizens’ data or the business will face financial penalties.
Prevent your tags from running before you obtain a legal consent.
The personal data is no longer necessary in relation to the purposes for which it was originally collected or otherwise processed.
That outcome, in fact, is why the General Data Protection Regulation has been introduced. GDPR is being billed by the EU as the biggest shake-up of data privacy regulations since the birth of the web, saying it sets new standards in the wake of the recent Facebook data harvesting scandal.
In Europe, access to the Los Angeles Times was blocked and those who tried to access it were offered a screen with a notice which simply read: "Unfortunately, our website is currently unavailable in most European countries.
Lest U.S. companies think they will escape GDPR because they are headquartered in the U.S., Milla believes there will be fines applied to companies in the EU, the US and other jurisdictions.
"users are not able to fully understand the extent of the processing operations carried out by Google and that ‘the information on processing operations for the ads personalization is diluted in several documents and does not enable the user to be aware of their extent."
Country specific requirements In addition to the above, please apply the following considerations if based in the countries listed below.
To read the consent from the __cmp function, you can open the browser console and launch these commands
27$/year
They spell it "27$/year" instead of "$27/year". I love it that they bucked the useless convention of putting $ sign first and did it the way that makes more sense. We've all had that thought, why do we say it "27 dollars" but write it, "dollars 27". It just doesn't make sense.
If other third-party tools guarantee not to use cookies, perhaps by providing specific configuration options, they too can be considered to be exempt from prior blocking. This is the case namely with YouTube, which provides a specific feature to prevent the user from being tracked through cookies.
This depends on the legal jurisdiction applicable to your site. In Europe, you’re legally required to block cookie scripts until user consent is obtained. All cookies must be blocked except for those that are exempt.
In Italy, the condition for Google Analytics to be eligible for “no prior consent necessary” is IP anonymization – however in France, Google Analytics doesn’t seem to be eligible for exceptions,
Some cookies are exempted from prior consent and therefore do not require compliance with the instructions contained in this guide
It’s the ethical alternative to Google Analytics.
I usually write in Google's online word processor Google Docs, even when noting the company's shortcomings. This article is different: it was drafted in a similar but more private service called Graphite Docs.
Source at: https://github.com/matomo-org/matomo
Did you know accurate data reporting is often capped? Meaning once your website traffic reaches a certain limit, the data then becomes a guess rather than factual.This is where tools like Google Analytics becomes extremely limited and cashes in with their GA360 Premium suite. At Matomo, we believe all data should be reported 100% accurately, or else what’s the point?
This option is particularly relevant to users who operate in the UK as the ICO now requires that a reject button be displayed.
We long ago admitted that we’re poor at scheduling, so we have roosters; sundials; calendars; clocks; sand timers; and those restaurant staff who question my integrity, interrupting me with a phone call under the premise of “confirming” that I’ll stick to my word regarding my reservation.
A closely-related failing to scheduling is our failure to remember, so humans are very willing to save information on their computers for later.
If these asset owners regarded the “robots” as having the same status as guide dogs, blind people or default human citizens, they would undoubtedly stop imposing CAPTCHA tests and just offer APIs with reasonable limits applied.
Robots are currently suffering extreme discrimination due to a few false assumptions, mainly that they’re distinctly separate actors from humans. My point of view is that robots and humans often need to behave in the same way, so it’s a fruitless and pointless endeavour to try distinguishing them.
As technology improves, humans keep integrating these extra abilities into our cyborg selves
Don't be discouraged when you get feedback about a method that isn't all sunshine and roses. Facets has been around long enough now that it needs to maintain a certain degree of quality control, and that means serious discernment about what goes into the library. That includes having in depth discussions the merits of methods, even about the best name for a method --even if the functionality has been accepted the name may not.
about: merits
Describe the problem fully Link to a test case showing the problem.
Without this information, very likely your question will not be answered, frustrating both yourself and anyone else who does want to help, because they are unable to do so
ask your question in a way that it provides enough information that it can be answered
people are building databases to keep track of which seniors need help having groceries and prescriptions delivered
illustrates the extent to which illegal practices prevail, with vendors of CMPs turning a blind eye to — or worse, incentivising — clearly illegal configurations of their systems
All of which means — per EU law — it should be equally easy for website visitors to choose not to be tracked as to agree to their personal data being processed.
“Popular CMP implementation wizards still allow their clients to choose implied consent, even when they have already indicated the CMP should check whether the visitor’s IP is within the geographical scope of the EU, which should be mutually exclusive,” they note, arguing that: “This raises significant questions over adherence with the concept of data protection by design in the GDPR.”
Is there a reason not to do caused-by stack trace printing? Or has it just not been implemented by anyone yet?
Q. Why does Rubinius not support frozen and tainted? A. Rubinius has better features; frozen and tainted are considered harmful. To elaborate... Both frozen and tainted depend on strewing checks throughout the source code. As a classic weak-link system, only one of those checks needs to be misplaced for the guarantees offered by either to fail. Since the number of checks is high, and as new code is written new checks need to be considered, the features inherently constitute unbounded complexity and unbounded risk.
7 years after this question, I believe the correct answer is
I realize I'm 6 years late to this party, but
Now we're moving on to the next thing instead of really rolling around with this idea and trying to understand it."
Yes, it's that deeper processing that we can aim for. Developing the kinds of critical thinking tasks that foster reflection, investigation, and redjusment.
An example of reliance on legitimate interests includes a computer store, using only the contact information provided by a customer in the context of a sale, serving that customer with direct regular mail marketing of similar product offerings — accompanied by an easy-to-select choice of online opt-out.
This is no different where legitimate interests applies – see the examples below from the DPN. It should also be made clear that individuals have the right to object to processing of personal data on these grounds.
One of the main threads of the GDPR is providing clear and transparent information to individuals about data collected, how it is processed, and the lawful basis for this processing.
How do you leverage browser cache when Google’s very own Analytics.js has it’s expiry time set to 2 hours? How do you minimize DNS requests when Google advices you to copy their tracking code, linking to an externally hosted Javascript file?If that isn’t bad enough already, Google’s advice is to avoid hosting the JavaScript file locally. And why? To ensure you get access to new features and product updates.
You could try AoE (ATA over Ethernet, very fast since it's Layer 2 protocol). SSHfs is yet another option (fast setup and encrypted by default). Or iSCSI (wich is tricky to setup).
I've been meaning to remind readers that I do read the comments. Some time ago, one disappointed commenter mused that others' reflections seemed to go (as I recall) "into a void," because I remained silent to each. Perhaps I was ignoring readers' remarks? I assure you that is not the case. I read them all — although on this site, for some reason, "all" means somewhat sparse — and I find them nearly all remarkable in their perceptiveness. I especially welcome, and enjoy, intelligent disagreement. I choose not to respond, however, only because of my editorial philosophy, which holds that the comment section is, rightfully, for commenters — and commenters alone. I've already had my say, and it seems to me rather rude to take another whack in reply. Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in. So, I beg you not to take my silence personally.
but as is Google’s practice, you won’t find any help writing a privacy policy for your site.
However, we recognise there are some differing opinions as well as practical considerations around the use of partial cookie walls and we will be seeking further submissions and opinions on this point from interested parties.
Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
The deceitful obfuscation of commercial intention certainly runs all the way through the data brokering and ad tech industries that sit behind much of the ‘free’ consumer Internet. Here consumers have plainly been kept in the dark so they cannot see and object to how their personal information is being handed around, sliced and diced, and used to try to manipulate them.
design choices are being selected to be intentionally deceptive. To nudge the user to give up more than they realize. Or to agree to things they probably wouldn’t if they genuinely understood the decisions they were being pushed to make.
This might not be the most user-friendly solution. But it’s certainly creative and something different from your typical captcha systems. Pennyauth aims to verify your users by asking them to pay $0.01 per login. Payments are processed using QUID — and users can submit payment in as little time as it takes for them to grab their credit card.
My summaries of books I've read and liked
For mainly two reasons: I pay for things that bring value to my life, and when something's "free", you're usually really just giving away your privacy without being aware.
It's also a good way to make sure my personal thoughts don't get exposed to a more wider audience.
I would like to make an appeal to core developers: all design decisions involving involuntary session creation MUST be made with a great caution. In case of a high-load project, avoiding to create a session for non-authenticated users is a vital strategy with a critical influence on application performance. It doesn't really make a big difference, whether you use a database backend, or Redis, or whatever else; eventually, your load would be high enough, and scaling further would not help anymore, so that either network access to the session backend or its “INSERT” performance would become a bottleneck. In my case, it's an application with 20-25 ms response time under a 20000-30000 RPM load. Having to create a session for an each session-less request would be critical enough to decide not to upgrade Django, or to fork and rewrite the corresponding components.
Google Recaptcha and personal dataBut we all know: there’s no such thing as a free lunch right? So what is the price we pay for this great feature? Right: it’s personal data.
The business had a policy that you should report safety incidents when you see them. The process around that was you fill out a form and fax it to a number and someone will take action on it. The safety manager in this company saw that and decided to digitize this workflow and optimize it. Once this process was put into place, the number of safety incidents reported increased 5 times. The speed at which safety incidents were addressed increased by 60%.
There is no use learning the word for “aardvark” in Swahili if you are never likely to use it. Think of words you use all the time and get familiar with them first.[2] X Research source For example, if you’re an exchange student in Russia, you might need to introduce yourself, ask for directions, and order food. While you might need to know the Swahili word for “aardvark” someday, you can learn it at a later date when the time comes.
If you ever need to work with external translators, it’s a bit of a pain sending both your YML files and a bunch of views like index.en.html.erb. For one thing, you need some code to find all those files and send them, and put them back after receiving the translations. For another, your translator must respect the markup and code of the template, and know not to translate them. And if you want to use tools like WebTranslateIt, it’s easier to stick to YML.
Good point. Better to store translations in your I18n backend in the same place as your subject translations, etc. (which by default is in YAML file).
accuses Apple of seeking to “exclude competition … under the guise of security” by locking down the iPhone and iPad.
Using fear of losing your "streak" as a motivation
A European court in May 2014 ordered Google and other search engines operating in Europe to allow individuals the “right to be forgotten,” letting them ask sites to delist certain search results relating to their name. Since that time, Google has received more than 650,000 requests.
Yes, it’s been deprecated. Why? Because too few people were using it to make it worth the time, money, and energy to maintain. In truth, although I sometimes disagree with the operator changes, I happen to agree with this one. Maintaining ALL of the synonyms takes real time and costs us real money. Supporting this operator also increases the complexity of the code base. By dropping support for it we can free up a bunch of resources that can be used for other, more globally powerful changes.
When we go back and forth three times, we jump on a synchronous video call.
it is worth opening a merge request with the minimal viable change instead of opening an issue encouraging open feedback on the problem without proposing any specific change directly.
keep one-to-many written communication short
How to Speak
how to speak lecture
Hence why we built k6, the load testing tool we’ve always wanted ourselves!
Similar projects Here is a list of other projects found in the same design space.
each package has its own unique subdirectory such as /nix/store/b6gvzjyb2pg0kjfwrjmg1vfhh54ad73z-firefox-33.1/ where b6gvzjyb2pg0… is a unique identifier for the package that captures all its dependencies (it’s a cryptographic hash of the package’s build dependency graph). This enables many powerful features.
Similar to: "Russian doll caching" that was added to Rails template caching
The rational expectation and thelearning-from-price literatures argue that equilibrium prices are accurate becausethey reveal and aggregate the information of all market participants. The MarketSelection Hypothesis,MSH, proposes instead that prices become accurate becausethey eventually reflect only the beliefs of the most accurate agent. The Wisdomof the Crowd argument,WOC, however suggests that market prices are accuratebecause individual, idiosyncratic errors are averaged out by the price formationmechanism
Three models (arguments for) drivers of market efficiency
Market competition provides a mechanism for weeding out those who underperform.
Note how this has failed in the current guilded age of the United States where it is possible for things to be "too big to fail".
I use this to keep information about processes that were running at any time during last five days. These are 1-min snapshots so something might get lost but I think it is good enough for me. I want to have some data available when I discover there was a peak in resource usage (I use munin for that). I haven't found a better way to keep track of past processes (tried psacct).
to remember how to best fall down;
Remember how our children learned to walk? Yeah, they didn't learn how to walk, they learned how to fall down.

I’m often neglecting half of my projects in order to obtain progress by leaps and bounds in just a few
Source at: https://github.com/lobsters/lobsters
I understand this is a relational division type problem, involving having and count. These posts describe what I want to do, but I can't figure out how to apply the examples to the particular case above:
Please do not make the mistake of trying to reduce the HAVING clause with a little false relational algebra to: 1 HAVING COUNT(PS1.plane_name) = COUNT(H1.plane_name) because it does not work; it will tell you that the hangar has (n) planes in it and the pilot_name is certified for (n) planes, but not that those two sets of planes are equal to each other.
Thyroxine was added to their antidepressant medication, and the doses were increased to a mean of 482 ± 72 μg/day.
This is the highest dose of levothyroxine that I've seen administered. Even treatment for thyroid cancer rarely goes beyond 300 mcg (or even 200 mcg, which is more common).
Thyroid Hormone Augmentation in Treatment-Refractory
L-T3 has proven to be 4-5 times more biologically active and to take effect more quickly than L-thyroxine (L-T4).
Will need to check up on that. I recall T4 being less potent.
Axel Bruns’ dismantling of the filter bubble.
research to read
Hypothesis considers a "close enough match" to be a success and does NOT place the corresponding annotation in the Orphan category, thus creating a false positive.
a private library is not an ego-boosting appendages but a research tool. The library should contain as much of what you do not know as your financial means … allow you to put there. You will accumulate more knowledge and more books as you grow older, and the growing number of unread books on the shelves will look at you menacingly. Indeed, the more you know, the larger the rows of unread books. Let us call this collection of unread books an antilibrary.
The substitution of l-T3 for l-T4 at equivalent doses (relative to the pituitary) reduced body weight and resulted in greater thyroid hormone action on the lipid metabolism, without detected differences in cardiovascular function or insulin sensitivity.
This implies that T4 and T3 are not identical, but I want to check the study further to see if half-life comes into play. The T3 group could theoretically have higher daily thyroidergic exposure, but maintain TSH because they experience a daily dip. Multiple dosing at least partly solves this issue. Controlled release tablets would be ideal.
In almost all cases the genetic basis of RTH lies in mutation of the carboxyl-terminus of the ß-thyroid hormone receptor. RTH is a dominant disorder, except in one family; most individuals are heterozygous for the mutant allele.
So, given that thyroid hormone resistance does exist, the remaining question is whether it is common enough to explain some cases of CFS or similar conditions. Unfortunately this paper is not in english, but the abstract provides enough information to google more.
ssh doesn't let you specify a command precisely, as you have done, as a series of arguments to be passed to execvp on the remote host. Instead it concatenates all the arguments into a string and runs them through a remote shell. This stands out as a major design flaw in ssh in my opinion... it's a well-behaved unix tool in most ways, but when it comes time to specify a command it chose to use a single monolithic string instead of an argv, like it was designed for MSDOS or something!
I think, it's better to replace \n symbol with some other symbol, and then work as usual:
Timothy Morton is Rita Shea Guffey Chair in English at Rice University in Houston. He is the author of Realist Magic: Objects, Ontology, Causality and Hyperobjects: Philosophy and Ecology after the End Of The World.
want to read these
altered thyroid gland function affects vasopressin and oxytocin release from the hypothalamo-neurohypophysial system in the state of equilibrated water metabolism
I ought read the full study to see the proposed mechanism. The vasopressin effect is not surprising at all, but the oxytocin effect was unexpected for me. That may be because I know more about vasopressin than I do oxytocin.
Through a process called rehashing, rbenv maintains shims
How does rehashing work?
First sighting of Jupyter Notebook (that I recall).
he ZORA Canon, our list of the 100 greatest books ever written by African American women, is one of a kind, yet it exists within a rich cultural tradition.
We're developing Onivim 2 in the open, but it is licensed under a commercial EULA.
We use http://asana.com at work. priorietary stuff but it works. Someone should make a similar open source solution one day.
And since it’s just a client, you can always use the todo.txt format text file created by it in the very beginning with any other client. Give it a try.
Alternatively, you can use the Explore function to ask Google Sheets any number of questions about your to do list. It'll give you suggestions like "Most frequent Task" or "What percentage of Tag is [tag name]" and so on. This can give you insight into what you're working on the most and how you're spending your time, which can help you plan your workdays more productively.
It's not customizable enough and there aren't enough distinct fields for inevitably complex work tasks. Google Sheets fixes that. No, it's not a to do list app, but that's why I love it. It's an app I already use. It's extremely customizable.
Best to-do list app for taking control of your to-do list
Games are fantastic at motivating mundane activity—how else can you explain all that time you've spent on mindless fetch quests? Habitica, formerly known as HabitRPG, tries to use principles from game design to motivate you to get things done, and it's remarkably effective
The best to-do list apps
Because keeping track of your tasks is an intensely personal thing, and people will reject anything that doesn't feel right pretty much instantly.
For example: I wanted a way to add recurring tasks to my list, so I wrote a simple bash script called goodmorning.sh. It uses the command prompt client to quickly add a bunch of tasks to my todo list of choice. I run this script first thing in the morning every workday, and I like it better than any built-in system I’ve found for recurring tasks, because it’s fully under my control.
n their book “New Power,” Henry Timms and Jeremy Heimans lay out the characteristics of old and new power.<img class="ex t u je ak" src="https://miro.medium.com/max/1862/1*jmW_5ey9vS_fNMPt5qO5Cg.png" width="931" height="522" role="presentation"/>
Types of questions and where to ask: How do I? -- ask on Server Fault (tell them what tags to use -- your product tag at minimum) I got this error, why? -- ask on Server Fault I got this error and I'm sure it's a bug -- report it on your own site I have an idea/request -- report it on your own site Why do you? -- ask in your own community (support forum, etc) When will you? -- ask in your own community
Basically, the standard said something, interpreters ignored it because the standard seemed illogical, but now interpreters like Bash have really confusing semantics, and no-one wants to fix it.
ReST
"ReST" instead of "REST". I like how this way matches the case of the actual phrase that it's standing in for "Representational State Transfer", so you can better tell which letters are the beginning of words (all but "e").
An ssh public key in a ~/.ssh/authorized_keys file can have a command="" option which forces a particular command to be executed when the key is used to authenticate an ssh connection. This is a security control that mitigates against private key compromise. This is great when you only need to execute a single command. But if you need to perform multiple tasks, you would normally need to create and install a separate key pair for each command, or just not bother making use of forced commands and allow the key to be used to execute any command.
Both /proc and /sys are virtual filesystems which reflect the state of the system, and allow you to change several runtime parameters (and sometimes do more dangerous things, like directly writing to the memory or to a device). You should never backup or restore them.
You might think that a one-line configuration file is not worth backing up. However, if it took you three hours to figure out how to set that configuration, it will probably take you three hours again in six months time.
I would rather you vote against my position because you had an opposing view than vote with my position because you flipped a coin.
Timeshift for Linux is an application that provides functionality similar to the System Restore feature in Windows and the Time Machine tool in Mac OS.
CloneZilla works perfectly. It produces small image files, has integrity check and works fast. If you want to use third device as image repository you should choose device-image when creating image of the first disk and then image-device when you restore it to second disk. If you want to use only two disks - you should use device-device mode. Optionally you may want generate new UUIDs, SSH-key (if SSH server installed), and change hostname.
three terrific popular books by Ben Goldacre - "Bad science", "Bad pharma" and "I think you'll find it's a bit more complicated than that"
Pygmalion,
Her feet, swinging up and down high in the air, seemed to be nodding at him.
---"not doing the can-can, for God's sake.
“You’re glad to be rid of me, aren’t you?” he said.
This problem can also come up when you use npm link or an equivalent. In that case, your bundler might “see” two Reacts — one in application folder and one in your library folder. Assuming myapp and mylib are sibling folders, one possible fix is to run npm link ../myapp/node_modules/react from mylib. This should make the library use the application’s React copy.
Arguably, the rails-team's choice of raising ArgumentError instead of validation error is correct in the sense that we have full control over what options a user can select from a radio buttons group, or can select over a select field, so if a programmer happens to add a new radio button that has a typo for its value, then it is good to raise an error as it is an application error, and not a user error. However, for APIs, this will not work because we do not have any control anymore on what values get sent to the server.
liberal_enum :kind
When the controller creates the user, instead of adding a validation error to the record, it raises an exception. How to avoid this?
I really dislike the reasoning as stated in the issue listed above. Since the value is coming over the wire, it should be treated the same as a freetext input where the expectation is to validate in the model and not the controller. This is especially true in APIs where the developers have even less of a say as far as expected input coming from form data (for example).
In case anyone wants a hack, here is what I came up with.
But now the first line throws an exception ArgumentError: '0' is not a valid audience
By default, fetch() doesn’t provide a way to intercept requests, but it’s not hard to come up with a workaround. You can overwrite the global fetch method and define your own interceptor, like this
TC39 urges caution when using Stage 2-or below proposals, as it might result in inadvertent pressure from the community to keep the implementation as-is instead of improving it for fear of breaking existing code or ecosystem fragmentation (e.g. using a different symbol like # instead of @ for decorators).
It's completely understandable that this happens without realizing it, but continuing to do so sets different expectations for how the language progresses. It's nothing to feel guilty about — we learn as a community and remind one another of how JavaScript works.
Therefore, it's easy to search around for tweets/blog posts/talks that say "ES7 Decorators" and find that it's become the accustomed name for it.
is more detailed than the discussion in #1269, so I wanted to create a separate discussion for it. If the maintainers disagree with this split please feel free to mark as a duplicate of 1269.
This repo attempts to show how neutrino config can be used to configure storybook
Here are a few common cases where you might want to try something else:
Seeking more fuel from art, Proust started reading John Ruskin, whose influential The Seven Lamps of Architecture (1849) and The Stones of Venice (1851-53) revived popular interest in medieval art.
want to read
Super flexible & extensible SilverStripe fits the outcomes you want, and doesn't force your business outcomes into an out-of-the-box solution. Customise to your needs!
Because immutable components also prevent their children from re-rendering, they should probably not have non-immutable children.
Null Components should never have children - they'd never be rendered.
Injector components should never be self-closing, and they should never wrap multiple children. We can fix this at code-time and not wait for the errors at runtime.
I started this project mainly to explore using a React Native app to build React Native apps. There is a lot missing... I had to abandon while it was in progress since I don't have as much free time any more.
Try doing the equivalent of #indexes without it. Not that it's especially hard, but you have to stop and work out a solutuon. When you need it, that's when you wish there were already a method for it.
Second, uBlock Origin does not have a dedicated server, it can't "phone home" with your browsing data, there is only GitHub, and GitHub is completely unrelated to uBlock Origin.
Is there a home server?
Dave Thomas
Reason compiles to JavaScript thanks to our partner project, BuckleScript, which compiles OCaml/Reason into readable JavaScript with smooth interop. Reason also compiles to fast, barebone assembly, thanks to OCaml itself.
Revery is like flutter in that it does not use native widgets.
Today, Electron is one of the most popular tools for building desktop apps - using an HTML, JS, CSS stack. However, it has a heavy footprint in terms of both RAM and CPU - essentially packing an entire browser into the app.
I'm considering this, although I'm still leaning towards not including it and I'd love to just get rid of first if it wouldn't break so many peoples tests. Newcomers to Capybara don't understand (or aren't willing to learn) the issues that all/first (and last if added) have and massively overuse them. Yes the fact that all and first now wait by default will prevent some of the new user issues/confusion, but it won't fix the non-reloadability issue.
It makes sense that the incoherent render would not be committed to browser and that it would not have any consequences most of the time. But that means that you render logic must be ready to manage incoherency between props and states without crashing. E.g. a list of resource ids in props that doesn't match a list of http requests from a previous id list in the state could lead to weird situations. This is a worry that didn't exist in class components.
Since an uncontrolled component keeps the source of truth in the DOM, it is sometimes easier to integrate React and non-React code when using uncontrolled components.
A good example for when to use uncontrolled components
This does not set the native input element to indeterminate due to inconsistent behavior across browsers. However, we set a data-indeterminate attribute on the input.
Please submit questions like this on StackOverflow next time. People answers on GitHub don't compound as much
the main reason we built a new multiprocess architecture is that Chromium's multiprocess support was never contributed to the WebKit project. It has always lived in the separate Chromium tree, making it pretty hard to use for non-Chrome purposes.Before we wrote a single line of what would become WebKit2 we directly asked Google folks if they would be willing to contribute their multiprocess support back to WebKit, so that we could build on it. They said no.
Can I ask people to upvote my submission? No. Users should vote for a story because they personally find it intellectually interesting, not because someone has content to promote.
The thing is that each UI decision depends on countless other UI decisions. A simple example is keybindings. On UNIX/Linux, it’s nearly impossible to pick reasonable default bindings for global desktop navigation because they all conflict with bindings that some app is using. On Windows, the desktop navigation bindings are hardcoded, and no app uses them, because apps know for sure which bindings to avoid.
REST and GraphQL are wonderful tools to create an API that is meant to be consumed by third parties. Facebook's API, for example, is consumed by ~200k third parties. It is no surprise that Facebook is using (and invented) GraphQL; a GraphQL API enables third parties to extensively access Facebook's social graph enabling them to build all kinds of applications. For an API with that many consumers, GraphQL is the fitting tool. But, to create an internal API (an API developed and consumed by code written by the same organization), RPC offers a simpler and more powerful alternative. Large companies, such as Netflix, Google and Facebook, are starting to replace REST/GraphQL with RPC for their internal APIs. Most notably with gRPC which is getting popular in the industry.