1,116 Matching Annotations
  1. Apr 2020
    1. The term "ad hoc" in this context is not intended to be pejorative; it refers simply to the fact that this type of polymorphism is not a fundamental feature of the type system.
    1. there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"
    2. The more easily relabeled of the two uses of the term "hacker" is the malicious security cracker: it is not only the more recent phenomenon to acquire that label, but also the one whose meaning is most easily evoked by an alternative term. This is why, when you read an article of mine that talks about malicious security crackers, I use the term "malicious security cracker"
    1. 1Password wasn’t built in a vacuum. It was developed on top of open standards that anyone with the right skills can investigate, implement, and improve. Open tools are trusted, proven, and constantly getting better. Here’s how 1Password respects the principles behind the open tools on which it relies:

      I found it ironic that this proprietary software that I have avoided using because it is proprietary software is touting the importance of open tools.

    1. Automattic uses WordPress to power WordPress.com, and it contributes back code and time to the WordPress project. It is a symbiotic relationship. It isn’t accurate to say that WordPress is Automattic’s product, or that WordPress came from Automattic. Indeed, the opposite is true — Automattic came from WordPress, and Automattic (through WordPress.com) exists as part of the vast WordPress community and ecosystem.

      That's probably a common misconception. I'm glad they clarified that because I might have assumed that as well:

      It isn’t accurate to say that WordPress is Automattic’s product, or that WordPress came from Automattic. Indeed, the opposite is true — Automattic came from WordPress, and Automattic (through WordPress.com) exists as part of the vast WordPress community and ecosystem.

  2. Mar 2020
    1. Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
    1. The business had a policy that you should report safety incidents when you see them. The process around that was you fill out a form and fax it to a number and someone will take action on it. The safety manager in this company saw that and decided to digitize this workflow and optimize it. Once this process was put into place, the number of safety incidents reported increased 5 times. The speed at which safety incidents were addressed increased by 60%.
    1. There is no use learning the word for “aardvark” in Swahili if you are never likely to use it. Think of words you use all the time and get familiar with them first.[2] X Research source For example, if you’re an exchange student in Russia, you might need to introduce yourself, ask for directions, and order food. While you might need to know the Swahili word for “aardvark” someday, you can learn it at a later date when the time comes.
  3. Feb 2020
    1. Lead by example and make sure people understand that things need to be written down in issues as they happen.
    1. We also place an emphasis on ensuring that conclusions of offline conversations are written down.
    1. After your question is answered, please document the answer so that it can be shared.
    1. But, let’s be pragmatic for a second, the 80/20 rule states that you get 80% of the value from 20% of the work and a couple of simple tests are vastly better than no tests at all. Start small and simple, make sure you get something out of the testing first, then expand the test suite and add more complexity until you feel that you’ve reached the point where more effort spent on realism will not give enough return on your invested time.
    1. Mais qu’est-ce donc que je suis ? une chose qui pense. Qu’est-ce qu’une chose qui pense ? c’est une chose qui doute, qui entend, qui conçoit, qui affirme, qui nie, qui veut, qui ne veut pas, qui imagine aussi, et qui sent.

      The fact that thinking is the production of a human being derives from the necessity of knowing what an human being is. Descartes wants to answer the question: who am I. Thus he takes what seems to be the more material and certain thing: thinking. Then he says: I am something who thinks. But actually this is a paralogism.

  4. Jan 2020
    1. Through a process called rehashing, rbenv maintains shims

      How does rehashing work?

    2. One thing well. rbenv is concerned solely with switching Ruby versions. It's simple and predictable.
  5. Dec 2019
    1. Confusingly, all the distributions I use (Ubuntu, RHEL and Cygwin) had some type of check (testing $- or $PS1) to ensure the current shell is interactive. I don’t like cargo cult programming so I set about understanding the purpose of this code in my .bashrc.
    1. No, clumsily working around the root account in situations where it is absolutely appropriate to use it is not for good reasons. This is just another form of cargo cult programming - you don't really understand the concept behind sudo vs root, you just blindly apply the belief "root is bad, sudo is good" because you've read that somewhere.
    1. Cargo cult programming is a style of computer programming characterized by the ritual inclusion of code or program structures that serve no real purpose.
    1. It doesn't use a database (unlike Keepass) and thus doesn't open all passwords at once. Just one at a time. Since it's just a directory of encrypted files, you can access your passwords with any PGP-compatible tool.
    1. Using find and cpio is a more unix-y approach in that you let find do the file selection with all the power that it has, and let cpio do the archiving. It is worth learning this simple use of cpio, as you find it easy to solve problems you bang your ahead against when trying tar.
    1. TC39 urges caution when using Stage 2-or below proposals, as it might result in inadvertent pressure from the community to keep the implementation as-is instead of improving it for fear of breaking existing code or ecosystem fragmentation (e.g. using a different symbol like # instead of @ for decorators).
    2. It's completely understandable that this happens without realizing it, but continuing to do so sets different expectations for how the language progresses. It's nothing to feel guilty about — we learn as a community and remind one another of how JavaScript works.
    3. Therefore, it's easy to search around for tweets/blog posts/talks that say "ES7 Decorators" and find that it's become the accustomed name for it.
    1. People cannot see exhaustive documentation and code examples on their own file system. They would have to visit the repository (which also requires an internet connection).
  6. Nov 2019
    1. As Onivim 2 completely handles the rendering layer, this Vim-modelled-as-a-pure-function could focus on just buffer manipulation.
    2. It is responsible for
    1. Epiphany aims to present the simplest interface possible for a browser. Simple does not necessarily mean less-powerful. The commonly-used browsers of today are too big, buggy, and bloated. Epiphany is a small browser designed for the web: not for mail, newsgroups, file management, instant messaging, or coffeemaking. The UNIX philosophy is to design small tools that do one thing and do it well.
  7. Oct 2019
    1. Try to avoid mucking with native prototypes, including Array.prototype, if you don't know who will be consuming your code (3rd parties, coworkers, yourself at a later date, etc.). There are ways to safely extend prototypes (but not in all browsers) and there are ways to safely consume objects created from extended prototypes, but a better rule of thumb is to follow the Principle of Least Surprise and avoid these practices altogether.
    2. He's not messing with them he's extending them for Arrays.
    1. She’d just gotten published for a snippet on one of Neil Gaiman’s Death graphic novels, and the editor of Minx asked if Pratchett would be interested in writing about video games.

      Just goes to show, breaking big successes is as much luck as hard-slog work and talent/skill.

  8. Sep 2019
    1. MobX as a data flow library, that enables you to roll your own state management architecture with minimal effort
  9. Aug 2019
    1. Suspending is built on the mechanism as error boundaries. In fact, we recently (like last week) completely rewrote error handling to prepare for this feature. It's also built on the same "expiration time" model we use for CPU scheduling. I love it when features compose together!
  10. May 2019
    1. import java.util.Scanner;

      /**

      • A simple class to run the Magpie class.
      • @author Laurie White
      • @version 6 March 2012 */ public class MagpieRunner2 {

        /**

        • Create a Magpie, give it user input, and print its replies. */ public static void main(String[] args) { Magpie2 maggie = new Magpie2();

          System.out.println (maggie.getGreeting()); Scanner in = new Scanner (System.in); String statement = in.nextLine();

          while (!statement.equals("Bye")) {

           System.out.println (maggie.getResponse(statement));
           statement = in.nextLine();
          

          } }

      }

  11. Apr 2019
    1. ​Technology is in constant motion. If we try to ignore the advances being made the world will move forward without us. Instead of trying to escape change, there needs to be an effort to incorporate technology into every aspect of our lives in the most beneficial way possible. If we look at the ways technology can improve our lives, we can see that technology specifically smartphones, have brought more benefits than harm to the academic and social aspects of teenagers lives, which is important because there is a constant pressure to move away from smart devices from older generations. The first aspect people tend to focus on is the effect that technology has on the academic life of a teen. Smartphones and other smart devices are a crucial part of interactive learning in a classroom and can be used as a tool in increasing student interest in a topic. For example, a popular interactive website, Kahoot, is used in many classrooms because it forces students to participate in the online quiz, while teachers can gauge how their students are doing in the class. Furthermore, these interactive tools are crucial for students that thrive under visual learning, since they can directly interact with the material. This can be extended to students with learning disabilities, such as Down Syndrome and Autism,​ research has shown that using specialized and interactive apps on a smart device aids learning more effectively than technology free learning. Picture Picture Another fear regarding technology is the impact it has on the social lives of young adults, but the benefits technology has brought to socializing outweighs any possible consequences. The obvious advantage smartphones have brought to social lives is the ability to easily communicate with people; with social media, texting, and calling all in one portable box there is no longer a struggle to be in contact with family and friends even if they are not in your area. Social media can also be used for much more In recent years, social media has been a key platform in spreading platforms and movements for social change. Because social media websites lower the barrier for communicating to large groups of people, it has been much easier to spread ideas of change across states, countries, or the world. For example, after Hurricane Sandy tore apart the northeastern United States, a movement called "Occupy Sandy" in which people gathered to provide relief for the areas affected was promoted and organized through social media. Other movements that have been possible because of social media include #MeToo, March for Our Lives, #BlackLivesMatter, and the 2017 Women's March. ​

  12. Dec 2018
    1. With regard to the superstitions of logicians, I shall never tire of emphasizing a small, terse fact, which is unwillingly recognized by these credulous minds--namely, that a thought comes when "it" wishes, and not when "I" wish; so that it is a PERVERSION of the facts of the case to say that the subject "I" is the condition of the predicate "think." ONE thinks; but that this "one" is precisely the famous old "ego," is, to put it mildly, only a supposition, an assertion, and assuredly not an "immediate certainty." After all, one has even gone too far with this "one thinks"--even the "one" contains an INTERPRETATION of the process, and does not belong to the process itself. One infers here according to the usual grammatical formula--"To think is an activity; every activity requires an agency that is active; consequently" . . . It was pretty much on the same lines that the older atomism sought, besides the operating "power," the material particle wherein it resides and out of which it operates--the atom. More rigorous minds, however, learnt at last to get along without this "earth-residuum," and perhaps some day we shall accustom ourselves, even from the logician's point of view, to get along without the little "one" (to which the worthy old "ego" has refined itself).

      The original text (avaiable here: http://www.nietzschesource.org/#eKGWB/JGB-17) goes: Was den Aberglauben der Logiker betrifft: so will ich nicht müde werden, eine kleine kurze Thatsache immer wieder zu unterstreichen, welche von diesen Abergläubischen ungern zugestanden wird, — nämlich, dass ein Gedanke kommt, wenn „er“ will, und nicht wenn „ich“ will; so dass es eine Fälschung des Thatbestandes ist, zu sagen: das Subjekt „ich“ ist die Bedingung des Prädikats „denke“. Es denkt: aber dass dies „es“ gerade jenes alte berühmte „Ich“ sei, ist, milde geredet, nur eine Annahme, eine Behauptung, vor Allem keine „unmittelbare Gewissheit“. Zuletzt ist schon mit diesem „es denkt“ zu viel gethan: schon dies „es“ enthält eine Auslegung des Vorgangs und gehört nicht zum Vorgange selbst. Man schliesst hier nach der grammatischen Gewohnheit „Denken ist eine Thätigkeit, zu jeder Thätigkeit gehört Einer, der thätig ist, folglich —“. Ungefähr nach dem gleichen Schema suchte die ältere Atomistik zu der „Kraft“, die wirkt, noch jenes Klümpchen Materie, worin sie sitzt, aus der heraus sie wirkt, das Atom; strengere Köpfe lernten endlich ohne diesen „Erdenrest“ auskommen, und vielleicht gewöhnt man sich eines Tages noch daran, auch seitens der Logiker ohne jenes kleine „es“ (zu dem sich das ehrliche alte Ich verflüchtigt hat) auszukommen.

      The translation "one thinks" is not exact. Es denkt. It thinks. Something thinks

  13. Oct 2018
    1. Effective governors communicate what the priorities of your organization are and what is expected of people.

      Largely missing in HIH.

    2. most IT governance strategies prove to be ineffective in practice due to application of traditional strategies and ways of thinking.
    3. Lean IT governance balances your short-term and long-term needs. Too many organizations have allowed technical debt to grow in recent years, for the skills of their IT staff to stagnate, and to continue to tolerate traditional IT process strategies from yesteryear. This is because they allowed short-term priorities to trump long-term health. We must do better.

      Sounds like HIH.

  14. Aug 2018
    1. The technical and theoretical details underlying clinical informatics are beyond the scope of this chapter. What follows is a concise introduction to topics and resources of general interest in this field, presented to help clinicians use information technology for the benefit of patient care.

      This is interesting!

  15. Jun 2018
  16. Apr 2018
    1. I SHALL not be content till this country can produce every single thing we need, even coffee, cocoa, and rubber, and so keep all our dollars at home. If we can do this and at the same time work up tourist traffic so that foreigners will come from every part of the world to see such remarkable wonders as the Grand Canyon, Glacier and Yellowstone etc. parks, the fine hotels of Chicago, & etc., thus leaving their money here, we shall have such a balance of trade as will go far to carry out my often-criticized yet completely sound idea of from $3000 to $5000 per year for every single family—that is, I mean every real American family. Such an aspiring Vision is what we want, and not all this nonsense of wasting our time at Geneva and talky-talk at Lugano, wherever that is. Zero Hour, Berzelius Windrip.
    2. that the average toiler would immediately receive $5000 a year.

      see Why The World is Ripping Itself Apart: Five Ways History’s Repeating Itself https://eand.co/five-ways-historys-repeating-itself-fed5721e225e

  17. Dec 2017
  18. Sep 2017
    1. This means they have some say – although not complete – over their personal data, and in turn they begin to have an understanding of the technologies that underpin the Web, including how their work and their data circulate there.

      You know, if we're going to force Gen Ed material down student's throats and wallets, why not throw in IT/CS stuff while we're at it? Technical literacy would make for a fair easier world.

  19. Jun 2017
  20. Mar 2017
  21. Feb 2017
    1. It may be conceived by some that the dcvoced Christian female, who is willing thus to be led by the Spirit into paths of usefulness, may Jose, in some degree, lhose lovely and becoming lraits of character, which we admire in the female sex.

      Some might argue that a woman loses her character the more she follows the Holy Spirit, yet Palmer insists that nothing could be further form the truth. Religion, she argues, actually strengthens a lady's resolve.

  22. Dec 2016
    1. The church persecuted many scholars whose ideas and teaching contradicted religious beliefs. One such scholar was the Italian astronomer and physicist Galileo, who had been a member of the faculty of the University of Padua. The church silenced him in 1633 for arguing that Earth moved around the sun.

      Galileo started and moved the idea that scholars should have academic freedom.

  23. Nov 2016
  24. Oct 2016
    1. First Read's Morning Clips: It's Nev-ADDD-ah, not Nev-AHHHH-dah Share Share Tweet Share Email Print Comment advertisement OFF TO THE RACES: It's Nev-ADDD-ah, not Nev-AHHHH-dah Donald Trump's attempt to pronounce "Nevada" in the Silver State last night didn't go well. Tim Kaine praised his own Tuesday night debate performance. Trump says he's "getting a lot of credit" after Mike Pence's widely-praised debate. Pence is taking heat from Latinos after his "Mexican thing" remark. From the Washington Post: "Sen. Tim Kaine may have awakened Wednesday to poor reviews after the first and only vice-presidential debate, but his acerbic performance in Farmville, Va., revealed that the Clinton campaign's strategy for these debates extends far beyond the stage. Armed with pre-planned Web videos, television ads and tweets, the campaign has used key debate moments this week and last as a cudgel against the Republican ticket, showing a level of discipline and organization largely absent from Donald Trump and Indiana Gov. Mike Pence's campaign." Trump said yesterday: "They say Donald Trump loves Putin. I don't love, I don't hate. We'll see how it works." And here's Trump on the issue of Yucca Mountain: "Number one is safety and it is a little too close to major population, so I will take a look at it and I will have an opinion." The New York Times does a deep dive into Trump's business ventures. "Of the roughly 60 endeavors started or promoted by Mr. Trump during the period analyzed, The Times found few that went off without a hitch. One-third of them either never got off the ground or soon petered out. Another third delivered a measure of what was promised — buildings were built, courses taught, a product introduced — but they also encountered substantial problems, like lawsuits, government investigations, partnership woes or market downturns." Here's how Pennsylvania boosted its swing-state status, according to the Washington Post. An interesting data point from PRRI/The Atlantic: "White likely voters who still live in their hometown strongly prefer Donald Trump over Hillary Clinton (57 percent vs. 31 percent), while nearly half (46 percent) of those who live more than a two-hour drive away from their hometown are supporting Clinton compared to 40 percent who are supporting Trump." The Atlantic endorsed Hillary Clinton, only the third time it has weighed in on a presidential election since 1857. Via POLITICO: With hopes in Pennsylvania fading, Trump is hoping to make gains in the Mountain West. From the AP: "Donald Trump once called data "overrated" in politics. But with Election Day swiftly approaching, the Republican presidential nominee is spending millions of dollars on data and digital services in an effort to land donations and win over voters. Ushering Trump toward a more analytical approach are Jared Kushner, Trump's son-in-law and adviser, and Brad Parscale, the campaign's digital director and a veteran Trump Organization consultant." Sean Hannity is accusing Megyn Kelly of supporting Hillary Clinton. "Republican presidential nominee Donald Trump has throughout his career given campaign contributions to state attorneys general while they weighed decisions affecting his business, a review of his political donations shows," notes the Wall Street Journal. From the New York Times yesterday: "The F.B.I. secretly arrested a former National Security Agency contractor in August and, according to law enforcement officials, is investigating whether he stole and disclosed highly classified computer code developed by the agency to hack into the networks of foreign governments. The arrest raises the embarrassing prospect that for the second time in three years, a contractor for the consulting company Booz Allen Hamilton managed to steal highly damaging secret information while working for the N.S.A." What will happen to Merrick Garland's nomination in December? The

      The first thing i noticed when i got to the NBC website was that all of the political articles are about Trump. That really says something about the style of politics that are alive in the U.S. today. Although the article title talks about "Nevada" and how Trump says the State's name, it actually takes a deeper look into Trump's past business dealings and political affiliations. As opposed to the Fox news article that actually did focus on his pronunciation of Nevada. On top of that the author in this article goes after Trump's VP candidate as well as others that are in Trump's campaign committee. This article seemed more like an attack on trump rather than a criticism.

  25. Sep 2016
    1. Around 1809, Samuel Taylor Coleridge rejected “he” as the generic pronoun (“in order to avoid particularising man or woman, or in order to express either sex indifferently”, he wrote in his notebooks), settling on “it” as an ideal, neutral solution

      Coleridge uses "it" for neutral singular

  26. Jul 2016
    1. who was arrested  for selling drugs when he really didn’t sell any

      they have to look for evidence before doing something to people like putting them in jail

    1. The freedom and belief that you poured into those accomplishments, it’s a source that can  be transferred into other areas, after all, that is a belief system. One that is controllable. If you can reveal that source of power, you can literally direct it into everything you need to deal with.
  27. Apr 2016
    1. Office of Management and Budget (OMB) directs agency chief information officers (CIO) to respond to 36 information technology (IT) management reporting requirements

      36

  28. Jan 2016
    1. не все нелегалы пираты. помнишь, я выше уже писал про истекшие лицензии?
    2. Сравни с пруф номер 1. M$ фактически создали ситуацию, при которой системы без обновлений ждали, когда их превратят в зомби. В конце 2008-2009 получили конфикер и огроменные ботнеты.
    3. Microsoft много чего финансирует, это же не какое-нибудь нищее FSFну, нищий, это скорее всего ты, а FSF - некоммерческая организация. и тем не менее это не противоречит тому, что я написал выше.
    4. Даа, правильно, большое количество пиратских инсталов. А почему их так много? Потому что microsoft не хочется терять рынок и фактически смотрит на пиратство сквозь пальцы. Сюда же нужно добавить политику апдейтов, которая не позволяла ставить апдейты на пиракт в то время. Ситуация ими же и создана.
    5. я отлично помню OpenOffice 1.1, который крешился просто постоянно на типовых документах (в формате doc, который M$ старательно засекречивал), да еще и медленный. а active X и все прочее - это уже вторая часть....--- тогда позиция майкрософт была: посмотрите, какое говно этот линукс (и это имело основания, т.к. майкрософт всячески помогал линуксу быть говном).а сейчас позиция майкрософт: мы любим линукс! мы сами почти опенсорс! давайте запустим его софт у нас, на винде!и народу, которая вылупилась в эпоху виндовс 10, конечно, кажется фанатизмом, что кто-то не любит такую белую и пушистую компанию M$.
    6. основные проблемы всегда связаны именно с проприетарными особенностями. Я говорил именно о том, что выбирая в качестве фундаментов проприетарные кактусы нелогично жаловаться на проблемы с портированием впоследствии. Лучше изначально выбирать те станадарты, которые присутствуют везде.
    7. Если бы он не был нестандартной проприетарщиной, то никто бы не придумывал такие форматы как ODF. Новые форматы разрабатывают и внедряют тогда, когда есть проблемы с уже существующими, и, как правило, как следствие их проприетарности и закрытости. Даже у разных версий Microsoft Office разные представления о формате DOC. Как следствие, документ, созданный в одной версии софтины, криво открывается в другой. А уж заставить нормально его поддерживать другие офисные пакеты можно и не мечтать - форматирование всё равно будет разъезжаться. Поэтому его и стали закапывать внедрением ODF.
    8. аа, так правильно ли я тебя понял, что формат .doc, который используется на предприятии, ты назвал «нестандартная, некроссплатформенная проприетарщина»?
    9. «странное» == «нестандартная, некроссплатформенная проприетарщина». «на каждом углу» != «львиная доля». Открытые стандарты кроссплатформенны. Все проблемы портирования в первую очередь связаны именно с нестандартными проприетарными реализациями (которые и упомянуты выше: макросы офиса, active X,...). И только во вторую с некоторыми особенностями конкретных непроприетарных реализаций.
    10. Твоя логика тоже прекрасна. Если какая-то компания приобрела монополию в масштабах страны или даже мира, то это норма, законно и так все и должно оставаться. Создание и использование альтернатив - наивно (я удивлен, что ты не сказал противозаконно).так вот это в корне не верно.
    1. Добавь отсутствие полного доступа. Линукс, где ты можешь удалить любой файл, стал как глоток свежего воздуха в системе, где ты значишься за админа, но по факту просто продвинутый юзер.
    2. Добавь к этому, что технологии, которыми принуждали тебя пользоваться содержали дыры и ошибки безопасности, защита которых стала индустрией для антивирусных компаний. (Когда-то в винде даже антивируса не было и он подхватывал заразу во враждебной среде за 15 минут.) И несмотря на то, что все они обещали неуязвимость и крайнюю надежность и защищенность ОС случались масштабные эпидемии типа Conficker.
    3. Вот ты хотел слезть с Винды и не мог, потому что M$ всячески препятствовал тому, чтобы у тебя был выбор. Ты со своим линуксом не мог зайти даже в виндовую сетевую шару.
    4. Вообще же истоки негатива в том времени, когда Microsoft вел очень агрессивную маркетинговую компанию. Очень агрессивно проталкивали преинсталы (нелегко купить ноут без винды). Они тупо публиковали документы, где доказывали, что Windows в итоге дешевле Linux. Они платили поставщикам, чтобы те не ставили Linux. Они намерено ломали спецификации в своих продуктах, чтобы сделать их несовместимыми со свободными реализациями.
    5. Я доверяю сообществу и открытости кода. Самому-то не смешно сравнивать кусок проприетарщины, у которого в лицензионном соглашении прописано, что тебе залезут в задницу, со свободной системой, где вероятность подобного поведения существует, но значительно ниже?
    6. Россыпи зондов, EEE, проприетарные форматы и протоколы во все поля, невероятная криворукость разрабов в ряде моментов (скайп, обновления винды (вот за это вообще бить надо), долгая загрузка и т.д.), хреновая настраиваемость (никаких тайловых WM, раскладка на капсе и куча иных плюшек только через сторонние приложения) и так далее.Платность - меньшее из зол.
    7. Раз уж ты сам назвал дату... 2003... как раз в это время Samba Team инициировало судебное дело в суде ЕС о предоставили спецификаций smb протокола и закрытых форматов документов. Думаешь, потому что все было «прекрасно»? Вот, почитайhttps://fsfe.org/activities/ms-vs-eu/timeline.en.html
    8. понимаешь, каждый раз придет кто-нибудь и скажет, что у него дома все работает. Одна проблема, что этот кто-то не заставлял это работать на предприятии под ответственность и не читал всякие технические выкладки, почему это не работает.
    1. ВЫВОДЫ

      <br>

      • Все комплектующие адаптера должны быть последнего поколения. К высокоскоростному Wi-Fi 802.11ac должен прилагаться высокоскоростной же USB 3.0, тогда и в двухантенном адаптере есть смыл.

      • Если комплектующие разных поколений. Высокоростной Wi-Fi 802.11ac + низкоскоростной USB 2.0 дадут ⩽ 270 Мбит/с и не больше. В двухантенном смысла нет.

      • Если все комплектующие предыдущих поколений. Средне- и низкоскоростные Wi-Fi 802.11 a/b/g/n (не ac) + низкоскоростной USB 2.0 — есть смысл в двухантенном адаптере. <br>

      Но для получения максимальных результатов адаптер должен принимать сигнал от роутера, соответствующего характеристикам адаптера. То есть поколение роутера тоже должно соответствовать.

    2. Минусом работы на 5 ГГц может быть уменьшение дальности работы (по сравнению с 2,4 ГГц), но этот вопрос мы в данной статье не затрагивали и постараемся вернуться к нему в следующих публикациях.
    3. Конечно, не забывайте, что и роутер должен соответствовать этому уровню.
    4. Если же адаптер работает в ПК или ноутбуке по интерфейсу USB версии 3.0, то скоростные показатели заметно интереснее — до 450 Мбит/с и выше.
    5. в случае работы с шиной USB 2.0 пользователи сетей 802.11ac могут рассчитывать на максимальные скорости около 270 Мбит/с. При этом особого смысла гнаться за двухантенным (скорость соединения 867 Мбит/с) адаптером практически нет. Единственное, где он может выиграть у одноантенного (скорость соединения 433 Мбит/с) — работа с сетями прошлого поколения.
    6. Если вы пользуетесь ноутбуком, встроенный беспроводной адаптер которого обеспечивает работу в 802.11n/300 Мбит/с (а таких моделей в среднем сегменте большинство), то установка внешнего контроллера может помочь существенно увеличить скорость работы с сетью, и подобный апгрейд может быть оправдан.
  29. May 2015
    1. GOV.uk er direkte underlagt statsministerens kontor. De har lisens til å drepe unødvendige nettsteder og skakkjørte prosjekter. De har mandat, de har penger, og de har trumf.
  30. Mar 2015
    1. an objective set for the Sprint that can be met through the implementation of Product Backlog. It provides guidance to the Development Team on why it is building the Increment. It is created during the Sprint Planning meeting. The Sprint Goal gives the Development Team some flexibility regarding the functionality implemented within the Sprint. The selected Product Backlog items deliver one coherent function, which can be the Sprint Goal. The Sprint Goal can be any other coherence that causes the Development Team to work together rather than on separate initiatives.

      an objective set for the Sprint that can be met through the implementation of Product Backlog. It provides guidance to the Development Team on why it is building the Increment. It is created during the Sprint Planning meeting. The Sprint Goal gives the Development Team some flexibility regarding the functionality implemented within the Sprint. The selected Product Backlog items deliver one coherent function, which can be the Sprint Goal. The Sprint Goal can be any other coherence that causes the Development Team to work together rather than on separate initiatives.