2,465 Matching Annotations
  1. Aug 2020

    Tags

    Annotators

  2. Jul 2020

    Tags

    Annotators

    Tags

    Annotators

    1. This isn’t an accident. OpenOffice’s sidebar code was copied and incorporated into LibreOffice. The Apache OpenOffice project uses the Apache License, while the LibreOffice uses a dual LGPLv3 / MPL license. The practical result is LibreOffice can take OpenOffice’s code and incorporate it into LibreOffice — the licenses are compatible. On the other hand, LibreOffice has some features — like font embedding — that don’t appear in OpenOffice. This is because the two different licenses only allow a one-way transfer of code. LibreOffice can incorporate OpenOffice’s code, but OpenOffice can’t incorporate LibreOffice’s code. This is the result of the different licenses the projects chose.

      What part of LGPLv3 / MPL prevents LibreOffice code from being incorporated back into OpenOffice's Apache Licensed code??

    1. The rela-tively large-sized AR NTDs, however, wrap around the LBDs,blocking the access of SRC-3 to the LBD. Consequently,SRC-3 is solely recruited by the AR NTD, and p300 recruitmentis stabilized by contacting two AR NTDs

      AR NTD wrap around its LBD. Does AR NTD mimic the function of some NR co-activator? These conclusion is only true when AR agonist R1881 is added, check figure 4

    Tags

    Annotators

    Tags

    Annotators

    Tags

    Annotators

    1. In the Set class we already called this - and difference, which it is ok but not really accurate because of the previous explanation, but probably not worthwhile to change it.

      Is this saying that the name difference is inaccurate?

      Why is it inaccurate? You even called it the "theoretic difference" above.

      Is that because "relative complement" would be better? Or because the full phrase "theoretic difference" [https://en.wiktionary.org/wiki/set-theoretic_difference] is required in order for it to be accurate rather than just "difference"?

    1. Flash dont l’activité est déclenchée

      C'est une drôle de comparaison dans la mesure ou le Flash est aujourd'hui obsolète et que les contenus dans ce format sont irrécupérable faute d'avoir les clefs de déchiffrement. Est-ce le même cas pour Proust ?

    1. Mais il nous faut maintenant revenir au problème de l’expression qui marque l’éternel commencement, l’univers en perpétuelle création.

      Je ne suis pas sûre de saisir l'idée ici

    1. So why isn't there an easy way to remove an element from such an array in a way that respects both the order and number (count) of each element? Why do all methods for removing elements from an array assume that you always want to remove all matching elements from the receiver, with no option to do otherwise?
    1. JavaScript functions are themselves objects — like everything else in JavaScript — and you can add or change properties on them

      how can we add or change properties on a function?

      edit: see below section (Custom objects)

    1. Partant du phénomène physique du comportement des vagues qui présentent différents modèles de diffraction – par exemple les formes qui apparaissent lorsque nous jetons une pierre dans un volume aqueux – et qui résultent de la réaction des vagues en rencontrant un obstacle (2007, 28)

      c'est une phrase nominale ?

    2. décèdera des suites d’un accident à cheval

      C'est une hypothèse totalement parce que je ne connais pas bien le passage (si passage il y a) de l'accident de cheval, mais est-ce qu'il y aurait peut-être une piste ou un élément d'analyse à trouver dans cet objet du cheval (objet sexuel chez Freud) qui est à la fois un ancien corps "technique" de voyager ?

    3. « it is after all, the story of a ‘nervous Narrator’ who struggles against negative hereditary factors in his family (personified in the semi-invalid aunt Léonie), and who suffers from a chronic lack of drive that makes him prefer salon time to productive time alone 

      Il me semblait que dans les chapitres précédents les citations en anglais été traduites

    4.  The disruption and constriction of one’s habitual world thus correlates with a new relation to one’s body. In pain, the body or a certain part of the body emerges as an alien presence » (Leder 1990, 76).

      peut-être proposer une traduction en note ?

    5.  L’espace intercorporel qui se fait jour existe en deçà des paramètres usuels qui nous permettent de saisir l’expérience humaine (langage, lois sociales), elle en efface les signifiants.

      je ne ne comprends pas bien la succession des sujets ici

    6. Autrement dit, si cette technique n’avait pas existé, le narrateur n’aurait pas pu exprimer la même chose

      Peut-être est-ce juste une question d'expression, parce que je saisis bien l'idée du paragraphe, mais cette phrase résonne à la lecture selon l'adage "avec des si, on mettrait Paris en bouteille"

    7. Si la voix inépuisable qui résonne à travers la Recherche s’adresse directement au lectorat, on peut être sensible à ce qu’elle recèle

      La construction "si...., alors ..." implique souvent une contradiction sousentendue, ici je ne la vois pas. Peut-être choisir une construction plus causale ?

  3. Jun 2020
    1. In this case, we notice that comment.post and post should belong to the same database object. But, is Rails smart enough to know that the comment should be removed from both of the associations? Or are comment.post and post different representations of the same database row?

    Tags

    Annotators

    Tags

    Annotators

    1. With this second scheme, the DBMS stores the physical addressof versions in the index entries. This approach is only applicablefor append-only storage, since the DBMS stores the versions in thesame table and therefore all of the indexes can point to them. Whenupdating any tuple in a table, the DBMS inserts the newly createdversion into all the secondary indexes. In this manner, the DBMScan search for a tuple from a secondary index without comparingthe secondary key with all of the indexed versions. Several MVCCDBMSs, including MemSQL and Hekaton, employ this scheme

      Physical Pointers: 只对Append-only storage有用

      问题:“since the DBMS stores the versions in the same table and therefore all of the indexes can point to the”这句话怎么理解

      Likewise, using physical pointers is better for read-intensive workloads because an index entry points to the exact version. But it is slower for update operations because this scheme requires theDBMS to insert an entry into every secondary index for each new version, which makes update operations slower

    1. Dans la dichotomie qui s’établit entre l’aplatissement et la fragmentation de l’expérience (l’appréhension cinématographique du voyage en automobile) d’une part, et son intensification (« quand notre imagination nous portait du lieu où nous vivions jusqu’au cœur d’un lieu désiré »).

      est-ce volontairement ici une phrase nominale ?

    2. à la croisée de la vie intérieure et des désordres situés au-delà des limites corporelles

      c'est une belle formule mais peut-être un peu trop forte dans le style, peut-être l'alléger un peu pour que l'idée soit plus évidente à la lecture ?

    1. T-34 caused the degradation of the full-length AR, but not the tau-5-deleted AR

      tau-5 locates between AF-1 and DBD, deletion of this region may cause significant protein structure change, such change may result in different AR degradation profile which is irrelavant with UT-34

    1. chloroform extracts of ten marine sponges werescreened for their antimicrobial activit

      chloroform extracts were directly used without further separation for antimicrobial activity test. How to separate the active indigrient then?

    Tags

    Annotators

    Tags

    Annotators

    1. tunnel splitting

      What exactly is tunnel splitting? The essay mentions this various times without clearly explaining what it is, and whenever I search it up online multiple things are said about it.

      From what I could understand, quantum spin tunnel splitting makes it so that the magnetization of a system can "switch between states with opposite magnetization that are separated by an energy barrier much larger than thermal energy". But what exactly happens during tunnel splitting? And why are there different ones mentioned in the article? [magnetization tunneling, zero-field tunnel splitting, ground-state tunnel splitting]

      I also understand that this phenomenon "defies classical physics" because of magnetization switching. How is that possible?

  4. May 2020
    1. Related concepts in other fields are: In natural language, the coordinating conjunction "and". In programming languages, the short-circuit and control structure. In set theory, intersection. In predicate logic, universal quantification.

      Strictly speaking, are these examples of dualities (https://en.wikipedia.org/wiki/Duality_(mathematics))? Or can I only, at strongest, say they are analogous (a looser coonection)?

    1. 1. Disabling concrete extension update. That's what I wanted! You can do this by editing the extensions manifest json-file on Windows: C:\Users\<USERNAME>\AppData\Local\Google\Chrome\User Data\Default\Extensions\<EXTENSION-ID>\<VERSION>\manifest.json (find out the extensions ID by enabling developer mode in the extension settings page) on Ubuntu for Chromium: ${HOME}/.config/chromium/Default/Preferences In this file set "update_url" property to something invalid like "https://localhost" for example. For now according to given url updating of that extension is simply impossible.
    1. The consent provided by the user is saved in some cookies within the host page’s domain. By verifying the presence or the absence of these cookies you can determine whether the user has given their consent or not.

      But how do you check if they've given consent to a specific category??

    Tags

    Annotators

    1. Make it clear that signing up is optional. Consent must be “freely given”; you may not coerce users into joining your mailing list or make it appear as if joining the list is mandatory. For this reason, you must make it clear that signing up is optional. This is especially relevant in cases where you offer free white-papers (or e-books) for download. While the user’s email address is required for the delivery of the service, signing up for your newsletter is not. In such a case, you must not make it appear as if signing-up to the newsletter list mandatory and must make it clear that it is optional.

      Question (answer below)

      Are they saying that it's not allowed to make signing up for a mailing list a precondition/requirement for anything? This was surprising to me.

      So if you have a newsletter sign-up page that sends a digital bonus gift (like an e-book) to new subscribers, are required to completely change/repurpose your "newsletter sign-up page" into a "download e-book page" (that has an optional checkbox to also sign up for the newsletter, if you want)? That seems dumb to me, since it requires completely reversing the purpose of the page — which was, in my mind, primarily about signing up for the newsletter, with a bonus (an essentially optional one) thrown in for those who do so. Are you required to either repurpose it like that or remove the free bonus offer that would be sent to new subscribers?

      The irony of this is that it requires websites that have a newsletter sign-up page like that to change it into a "newsletter sign-up page" where the newsletter sign-up part is optional. Which make you look kind of stupid, making a page that claims to be one thing but doesn't necessarily do what it says it's for.

      Does this mean, in effect, that you may not lawfully provide any sort of incentive or reward for signing up for something (like a mailing list)? As long as it's very clear that some action is required before delivery of some thing, I don't see why this sort of thing should not be permitted? Would this fall under contract law? And as such, wouldn't such a contract be allowed and valid? Are mailing lists a special class of [service] that has special requirements like this? Or is it part of a broader category to which this requirement applies more generally?

      Why is requiring the user to provide an email address before they can download a digital reward allowed but not requiring signing up to a mailing list? Why isn't it required that even the email address be optional to provide? (To answer my own question, probably because it's allowed to allow a user to request a specific thing to be sent via email, and an email address is required in order to fulfill that request. But...) It seems that the website could just provide a direct link to download it via HTTP/FTP/etc. as an option for users that chose not to provide an email address. (But should they be required to provide that option anytime they / just because they provide the option to have the same thing delivered via email?)

      Answer

      Looks like my question was answered below:

      Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.

      So the case I described, where it is made very clear that the incentive that is offered is conditional on subscribing, is listed as an exception to the general rule. That's good; it should be allowed.

    1. Regular Expression Functions There are three regular-expression functions that operate on strings: matches() tests if a regular expression matches a string. replace() uses regular expressions to replace portions of a string. tokenize() returns a sequence of strings formed by breaking a supplied input string at any separator that matches a given regular expression. Example:   

      Test question: how many are there regular-expression functions in XSLT?

    2. What’s the difference between xsl:value-of, xsl:copy-of, and xsl:sequence? xsl:value-of always creates a text node. xsl:copy-of always creates a copy. xsl:sequence returns the nodes selected, subject possibly to atomization. Sequences can be extended with xsl:sequence.

      What’s the difference between xsl:value-of, xsl:copy-of, and xsl:sequence?

    3. Types XSLT 2.0 allows you to declare: The type of variables. The return type of templates. The type of sequences (constructed with xsl:sequence) The return type of (user-declared) functions. Both the type and required type of parameters.

      What are the types that one can declare in XSLT 2?

    1. relax ligand-receptor complexeswithout causing major alterations of their originalgeometry, or to perform a torsional scan on a selecteddihedral while relaxing the rest of the molecule.

      such functions are like Schrodinger MacroModel, how to implement them?

    Tags

    Annotators

    1. MONN contains a pairwise interaction prediction module, which can capture the non-covalent interactions between atoms of a compound and residues of a protein with extra supervision from the labels extracted from available high-quality 3D compound-protein complex structures

      does that mean MONN can predict binding site

  5. Apr 2020
    1. A company runs a memory-intensive analytics application using on-demand Amazon EC2 C5 compute optimized instance. The application is used continuously and application demand doubles during working hours. The application currently scales based on CPU usage. When scaling in occurs, a lifecycle hook is used because the instance requires 4 minutes to clean the application state before terminating.Because users reported poor performance during working hours, scheduled scaling actions were implemented so additional instances would be added during working hours. The Solutions Architect has been asked to reduce the cost of the application.Which solution is MOST cost-effective?

      should be A here, cause C5 is 40% cheaper than R5

    Tags

    Annotators

    1. Mixed the plate thoroughly and incubated for one hour at room temperature. Then 5 μL development solution was added to each well and the plate was incubated for 1h at room temperature;

      the compound and kinase are incubated together for at least 2 hours. And 2 hours is enough for covalent adduct to form. if compound can form covalent adduct with FGFR1, why FGFR1 inhibition IC50 is so poor?

    Tags

    Annotators

    1. What is a Function Expression?A JavaScript function can also be defined using an expression.A function expression can be stored in a variable:var x = function (a, b) {return a * b};After a function expression has been stored in a variable, the variable can be used as a function. Functions stored in variables do not need function names. They are always invoked (called) using the variable name.

      Test question: What is function expression?

  6. javascript.info javascript.info
    1. A poised fragment library enables rapid syntheticexpansion yielding thefirst reported inhibitors ofPHIP(2), an atypical bromodomain

      what is the library? compound in the library can be expanded quickly by synthesis why they designed it this way? they did not find convincing hits from solution screen. They use crystallography as primary screening tech what assay they used for the screening? AlphaScreen competition assay as function assay

    Tags

    Annotators

  7. developer.mozilla.org developer.mozilla.org
  8. developer.mozilla.org developer.mozilla.org
    1. Your client’s CloudWatch Logs configuration receives logs and data from on-premises monitoring systems and agents installed in operating systems. A new team wants to use CloudWatch to also monitor Amazon EC2 instance performance and state changes of EC2 instances, such as instance creation, instance power-off, and instance termination. This solution should also be able to notify the team of any state changes for troubleshooting.
    1. Chrome first sends an encrypted, 3-byte hash of your username to Google, where it is compared to Google's list of compromised usernames. If there's a match, your local computer is sent a database of every potentially matching username and password in the bad credentials list

      Why do they only send password matches if username also matches?? A password should be deemed compromised and never used again if the password is found in a breach/paste anywhere, even if in connection with a different username/email.