- Dec 2024
-
digitalpromise.org digitalpromise.org
-
employer verification
In addition, this hints at employMENT verification: this could be a light lift sort of Tier 1 entry point for organizations to be both issuing and consuming credentials. Large employers spend a lot of resources responding to requests to verify former workers' employment histories. If part of off-boarding departing workers includes VCs for official employment verification, that could lead to big savings of time and resources (as long as other employers accept the credentials), as well as accelerate hiring processes that sometimes lead to failed hires bc people find another position that starts sooner. For key HR leaders to start with badging from a place of effortlessly improving their efficiency and costs might be a better place to launch than more involved strategies that offer less immediate value propositions.
-
- Nov 2024
-
evolllution.com evolllution.com
-
Our vision is for members of the UMBC community to amass hundreds of microcredentials throughout their careers
This is first I've seen this explicitly stated by an organization
-
- May 2024
-
er.educause.edu er.educause.edu
-
For the first two weeks of a course, I leave detailed feedback in the gradebook comment section. If a student didn't meet the discussion expectations, I deduct points and refer them to the discussion guidelines.
Importance of setting tone in 1st 2 weeks
-
- Feb 2024
-
unix.stackexchange.com unix.stackexchange.com
-
The ls command doesn't expand wildcards, it's the shell that does. Do not parse the output of ls, it's practically never needed and often breaks something.
-
-
stackoverflow.com stackoverflow.com
-
DO NOT PARSE LS.
-
Do not use xargs without -d when you do not want ' " \ to be handled specially.
-
- Jan 2024
-
info.orcid.org info.orcid.org
-
The ORCID Researcher Advisory Council (ORAC) is a diverse group of researchers who provide valuable perspectives and advice to ORCID staff and the ORCID Board to ensure that ORCID provides value and utility to researchers and facilitates research and innovation.
PID - Governance
-
-
upcea.edu upcea.edu
-
alternative credential programming and financialmodels are highly decentralized across an institution – so much so that it may bedifficult for an institution to have a good grasp of its entire portfolio. Adding alternativecredentials to an institution’s strategic priorities will firm up program and business modelplanning and execution
Inconsistent processes for establishing programs, funding programs, and pricing programs
-
First is the strategic priority within their institution. Ifalternative credentials have been embraced by senior leadership and included in thestrategic plan, they are more likely to have the necessary resources allocated to them
Executive sponsorship => resources allocated.
-
-
-
What they say is this is due to is new EU policies about messenger apps. I'm not in the EU. I reckon it's really because there's a new Messenger desktop client for Windows 10, which does have these features. Downloading the app gives FB access to more data from your machine to sell to companies for personalized advertising purposes.
-
- Dec 2023
-
evolllution.com evolllution.com
-
It’s not available to everyone, but a senior leadership who is vocal about lifelong learning can give you greater access to open doors, and people will take it more seriously. Time is never wasted with senior leadership and demonstrating the long-term interest for the institution, communities and companies we serve.
Executive sponsorship is a $0, very valuable resource.
-
- Oct 2023
-
igsn.github.io igsn.github.io
-
In a journal article or manuscript a sample identified by IGSN SSH000SUA may look like this (tagged IGSN): IGSN:SSH000SUA
Manuscript tagging
-
Unlike many other persistent identifiers, an IGSN is used not only used by machines but also needs to be handled by humans.
Human-readable
Tags
Annotators
URL
-
-
riojournal.com riojournal.com
-
Appropriate identifiers Requirement: PIDs appropriate to the digital object type being persistently identified.
Appropriate
-
-
datacite.org datacite.org
-
withdrawing content withoutposting a notification (“Tombstone Page”) andupdating the record's URL/metadata with DataCite
Characteristics
-
-
support.datacite.org support.datacite.org
-
When content underlying a DOI is updated, we recommend updating the DOI metadata and, for major changes, assigning a new DOI. For minor content changes, the same DOI may be used with updated metadata. A new DOI is not required. For major content changes, we recommend assigning a new DOI and linking the new DOI to the previous DOI with related identifiers.
Characteristics
-
To enable easy usability for both humans and machines, a DOI should resolve to a landing page that contains information about the DOI being resolved. It is the responsibility of the entity creating the DOI to provide such a landing page. The following are best practices for creating well-formed DOI landing pages.
Characteristics
-
there may be infrequent cases where it is not desirable for the item described by a DOI to be available publicly, such as in the case of research retraction. In these cases, it is best practice to still provide a "tombstone page", which is a special type of landing page describing the item that has been removed.
Characteristics
-
- Sep 2023
-
documentation.mailgun.com documentation.mailgun.com
- Jun 2023
-
www.alamo.edu www.alamo.edu
-
This six-part series tells the ACD story of exploration, innovation, and learning
6 part playbook from Alamo
-
-
workcred.org workcred.org
-
approaches to align data analytics microcredentials with undergraduate experiences;
embedded MCs
-
-
wcet.wiche.edu wcet.wiche.edu
-
WCET
Report from 2022 WCET workshop
-
-
www.chronicle.com www.chronicle.com
-
gauge the value of the microcredentials they offer, a step I suspect many have not yet been brave enough to take. That calls for tracking how often learners claim their awarded microcredential and share it to a professional networking site like LinkedIn, and for collecting feedback on why they did or didn’t. Another suggestion from the primer: track the number of microcredential learners who go on to enroll in a degree program
Interesting data to collect. Relates to the Equity report from Credential Engine: https://credentialengine.org/credential-transparency/equity/
-
- Nov 2022
-
github.com github.com
-
Because the official images are intended to be learning tools for those new to Docker as well as the base images for advanced users to build their production releases, we review each proposed Dockerfile to ensure that it meets a minimum standard for quality and maintainability. While some of that standard is hard to define (due to subjectivity), as much as possible is defined here, while also adhering to the "Best Practices" where appropriate.
-
- Aug 2022
-
-
try to provide duplicate overlapping examples.
Tags
Annotators
URL
-
- Jul 2022
-
www.hlx.live www.hlx.live
-
General processes and common best practices learned from other Web Content Management projects do not apply and are in many ways obstructions to move quickly and get the best out of Helix.
Tags
Annotators
URL
-
- May 2022
-
en.itpedia.nl en.itpedia.nl
-
What does an IT Consultant do?
An IT consultant is a person who offers advice, guidelines and a roadmap for the sourcing, use and management of IT resources and resources. The IT consultant provides organizations with best practices for using IT solutions and services for their business objectives and in solving their problems. He also often gives organizational advice.
-
-
log.schemescape.com log.schemescape.com
-
memory usage and (lack of) parallelism are concerns
Memory usage is a concern? wat
It's a problem, sure, if you're programming the way NPMers do. So don't do that.
This is a huge problem I've noticed when it comes to people programming in JS—even, bizarrely, people coming from other languages like Java or C# and where you'd expect them to at least try to continue to do things in JS just like they're comfortable doing in their own language. Just because it's there (i.e. possible in the language, e.g. dynamic language features) doesn't mean you have to use it...
(Relevant: How (and why) developers use the dynamic features of programming languages https://users.dcc.uchile.cl/~rrobbes/p/EMSE-features.pdf)
The really annoying thing is that the NPM style isn't even idiomatic for the language! So much of what the NodeJS camp does is so clearly done in frustration and the byproduct of a desire to work against the language. Case in point: the absolutely nonsensical attitude about always using triple equals (as if to ward off some evil spirits) and the undeniable contempt that so many have for
this
.
-
-
news.ycombinator.com news.ycombinator.com
-
typeof v === "number"
Using triple equals to check the results of
typeof
is totally unnecessary, and a sure sign that someone, somewhere has unthinkingly adopted some dubious advice; it's a code smell/red flag.A standard equality comparison (using
==
) does exactly the right thing while also avoiding association with questions/doubts about the quality of the surrounding code.
-
-
-
Requirements: Ruby and Bundler should be installed.
wat
This site has a total of two pages! Just reify them as proper documents instead of compilation artifacts emitted from an SSG.
-
- Feb 2022
-
www.workcred.org www.workcred.org
-
Appendix F: Questions Universities Can Ask Certification Bodies to Assess Quality of Certifications
These questions (I believe) are coming from a place of validating certifications. Experts publish these as helpful guides to understand if and to what degree certifications are trustworthy. In other words, are they worth the paper they're printed on? In the case of micro-credentials, most questions are likely overkill for the proposal process, etc. Given the central role and importance of TRUST however, perhaps providing a version of these questions to stakeholders seeking to propose micro-credentials could be beneficial in pushing their thinking, or at least centering these themes in their thinking.
-
-
www.workcred.org www.workcred.org
-
“Public research universities are committed to improving the workforce outcomes of their students and to addressing the workforce needs of local economies. This approach can ensure students that their credentials will have value to the labor market, and it can ensure employers that graduates have the skills required to perform in the workplace.”
For some, this is reasonable and rationale. It's the point of the whole enterprise. Yet for others, this take is controversial, as it may threaten the ideals and/or visions of the purpose of Public Education. These stakeholders may ask, "Is it the job of public education to serve industry's needs by preparing proper cogs for the workforce wheels?" At the same time, others may wonder, "Is public education willfully performing a disservice to our students if our credentials are not valued by employers?"
These are important questions to ask, and to answer.
-
- Jan 2022
-
ic-badges-credentials.org ic-badges-credentials.org
-
t be issued for unevaluated learning accomplishments, such as the mere completion of a series of tasks, attendance at events, or for learning that has not been assessed, as competency and learning accomplishment evaluation is very important.
Criteria must be measurable and assessable.
-
- Nov 2021
-
deepblue.lib.umich.edu deepblue.lib.umich.edu
-
"The Guide to Social Science Data Preparation and Archiving is aimed at those engaged in the cycle of research, from applying for a research grant, through the data collection phase, and ultimately to preparation of the data for deposit in a public archive: " from tweet
-
-
www.reddit.com www.reddit.com
-
The other commenters are right about the potential solutions. However, it is actually considered a best practice to move the object with the index signature to a nested property.Said differently: No property in the object with the index signature should depart from how the index signature is typed.
-
- Jun 2021
-
stackoverflow.com stackoverflow.com
-
You particular circumstances may or may not warrant a way different from what lhunath (and other users) deem "best practices".
-
-
about.gitlab.com about.gitlab.com
-
docs.gitlab.com docs.gitlab.com
-
hen selecting by text it is best to use the byRole query as it helps enforce accessibility best practices.
-
-
stackoverflow.com stackoverflow.com
-
When defining accessors in Ruby, there can be a tension between brevity (which we all love) and best practice.
-
a principle I use is: If you have an accessor, use the accessor rather than the raw variable or mechanism it's hiding. The raw variable is the implementation, the accessor is the interface. Should I ignore the interface because I'm internal to the instance? I wouldn't if it was an attr_accessor.
-
I have been wrapping instance variables in accessor methods whenever I can though.
-
Setting an instance variable by going through a setter is good practice, and using two access modifiers is the way to accomplish that for a read-only instance variable
Tags
- go through accessor instead of using instance variable directly
- self-enforced
- good explanation
- brevity
- idiomatic Ruby
- balance
- best practices
- Ruby
- programming: access modifiers (public/private)
- public vs. private interface
- good point
- encapsulation
- accessors
- good policy/practice/procedure
- safety (programming)
- I agree
Annotators
URL
-
-
www.w3.org www.w3.org
-
BCP stands for Best Current Practice
Tags
Annotators
URL
-
-
unix.stackexchange.com unix.stackexchange.com
-
As a general rule: You should quote everything (that may be quoted).
-
- May 2021
-
www.reddit.com www.reddit.com
-
Also cross-compatibility with mail clients can be hairy, so you should see what the industry experts are doing.
-
-
- Apr 2021
-
stackoverflow.com stackoverflow.com
-
You should always specify the height and the width of an image if only to help the browser lay the page out even before the image has been downloaded.
-
-
stackoverflow.com stackoverflow.com
-
The quirky looking printf is necessary to correctly expand the script's arguments in $@ while protecting possibly quoted parts of the command (see example below).
-
-
unix.stackexchange.com unix.stackexchange.com
-
For path names with newlines it is better to quote each pathname.
-
- Mar 2021
-
final-form.org final-form.org
-
Your validation functions should also treat undefined and '' as the same. This is not too difficult since both undefined and '' are falsy in javascript. So a "required" validation rule would just be error = value ? undefined : 'Required'.
-
-
news.ycombinator.com news.ycombinator.com
-
here is my set of best practices.I review libraries before adding them to my project. This involves skimming the code or reading it in its entirety if short, skimming the list of its dependencies, and making some quality judgements on liveliness, reliability, and maintainability in case I need to fix things myself. Note that length isn't a factor on its own, but may figure into some of these other estimates. I have on occasion pasted short modules directly into my code because I didn't think their recursive dependencies were justified.I then pin the library version and all of its dependencies with npm-shrinkwrap.Periodically, or when I need specific changes, I use npm-check to review updates. Here, I actually do look at all the changes since my pinned version, through a combination of change and commit logs. I make the call on whether the fixes and improvements outweigh the risk of updating; usually the changes are trivial and the answer is yes, so I update, shrinkwrap, skim the diff, done.I prefer not to pull in dependencies at deploy time, since I don't need the headache of github or npm being down when I need to deploy, and production machines may not have external internet access, let alone toolchains for compiling binary modules. Npm-pack followed by npm-install of the tarball is your friend here, and gets you pretty close to 100% reproducible deploys and rollbacks.This list intentionally has lots of judgement calls and few absolute rules. I don't follow all of them for all of my projects, but it is what I would consider a reasonable process for things that matter.
-
-
github.com github.com
-
I totally understand that there may be a majority still considering this a bad practice and thus keeping it disabled by default in production seem ok. But there could at least be an option to enable it for people who want to, no?
-
-
css-tricks.com css-tricks.com
-
always use real <label for="correct_input"> elements. Just that alone is a UX consideration all too many forms fail on
-
- Feb 2021
-
trailblazer.to trailblazer.to
-
step :direct_debit
I don't think we would/should really want to make this the "success" (Right) path and :credit_card be the "failure" (Left) track.
Maybe it's okay to repurpose Left and Right for something other than failure/success ... but only if we can actually change the default semantic of those signals/outputs. Is that possible? Maybe there's a way to override or delete the default outputs?
-
This connects the failure output to the previous task, which might create an infinity loop and waste your computing time - it is solely here for demonstrational purposes.
Tags
- I have a question about this
- trailblazer-activity
- feels wrong
- example: in order to keep example concise/focused, may not implement all best practices (illustrates one thing only)
- example: not how you would actually do it (does something wrong/bad/nonideal illustrating but we should overlook it because that's not the one thing the example is trying to illustrate/show us)
- semantics
Annotators
URL
-
-
trailblazer.to trailblazer.to
-
Yes, we could and should use Reform or Dry-validation here.
-
-
github.com github.com
-
providing best practices for both HTML-rendering controllers and APIs.
-
-
-
Like all best practices, I think the way you will resolve a problem will depend of the application you are doing.
-
-
stackoverflow.com stackoverflow.com
-
If you're creating an actual, informational web page, stick to frameless HTML, CSS and unobstrusive JavaScripts and keep in mind that the page should still be usable with scripting disabled.
-
-
www.amazon.com www.amazon.com
-
if you want a copy of my consolidated project management Excel workbook, feel free to contact me. It's gratis. I'm all for extending best practices.
sharing
-
- Jan 2021
-
unix.stackexchange.com unix.stackexchange.com
-
For the future, you should: Install LTS (Long-term support) versions as they have an 8-year life span (with Extended Security Maintenance) or 5 years without. The current LTS version is Ubuntu 18.04.1 LTS Bionic Beaver released on July 26, 2018 with an EOL in April 2023. OR Carefully watch the EOL of the interim / development releases and upgrade frequently.
-
-
material-ui.com material-ui.com
-
When you use target="_blank" with Links, it is recommended to always set rel="noopener" or rel="noreferrer" when linking to third party content. rel="noopener" prevents the new page from being able to access the window.opener property and ensures it runs in a separate process. Without this, the target page can potentially redirect your page to a malicious URL. rel="noreferrer" has the same effect, but also prevents the Referer header from being sent to the new page. ⚠️ Removing the referrer header will affect analytics.
Tags
Annotators
URL
-
- Nov 2020
- Oct 2020
-
github.com github.com
-
Guidelines do very little. Developer discipline is not a reliable method of encouraging best practices, they have to be enforced to be reliable.
-
-
dylanvann.com dylanvann.com
-
Props and state can change, and components should handle those changes whenever they happen.
-
Even if a component is rendered just once, your design will improve if rendering twice doesn’t break it.
-
-
www.seanmichaelmorris.com www.seanmichaelmorris.com
-
Teaching Tolerance offers some clear practices that can help establish connectedness:
Are these not "techniques", "exercises", "manoeuvers", from the "front of the room"? I suppose the answer is that technique and leadership are necessary but not sufficient for building community, and that unlike a "best practice" in a controllable process, they may or may not resonate (and thus work) for any given person or group.
-
- Sep 2020
-
github.com github.com
-
Currently, the documentation of :global() is very poor, IMO styling best practices deserve a separate section in the docs.
Tags
Annotators
URL
-
-
www.codingwithjesse.com www.codingwithjesse.com
-
With Svelte, components and files have a one-to-one relationship. Every file is a component, and files can't have more than one component. This is generally a "best practice" when using most component frameworks.
-
- Jul 2020
-
docs.gitlab.com docs.gitlab.com
- Jun 2020
-
www.forbes.com www.forbes.com
-
On April 24, the U.S. National Security Agency published an advisory document on the security of popular messaging and video conferencing platforms. The NSA document “provides a snapshot of best practices,” it says, “coordinated with the Department of Homeland Security.” The NSA goes on to say that it “provides simple, actionable, considerations for individual government users—allowing its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation.” Again somewhat awkwardly, the NSA awarded top marks to WhatsApp, Wickr and Signal, the three platforms that are the strongest advocates of end-to-end message encryption. Just to emphasize the point, the first criteria against which NSA marked the various platforms was, you guessed it, end-to-end encryption.
-
- Apr 2020
-
guides.rubyonrails.org guides.rubyonrails.org
Tags
Annotators
URL
-
-
www.csoonline.com www.csoonline.com
-
These massive dumps of free passwords lower the cost of an attack dramatically. Password reuse or password guessing attacks are script kiddie stuff. Defending your organization against such threats is basic due diligence.
-
-
-
it reminds me of IT security best practices. Based on experience and the lessons we have learned in the history of IT security, we have come up with some basic rules that, when followed, go a long way to preventing serious problems later.
-
The fact is that it doesn’t matter if you can see the threat or not, and it doesn’t matter if the flaw ever leads to a vulnerability. You just always follow the core rules and everything else seems to fall into place.
-
-
github.com github.com
-
One suggestion is to check user's passwords when they log in and you have the plain text password to hand. That way you can also take them through a reset password flow as they log in if their password has been pwned.
-
-
-
In 2017 NIST (National Institute of Standards and Technology) as part of their digital identity guidelines recommended that user passwords are checked against existing public breaches of data. The idea is that if a password has appeared in a data breach before then it is deemed compromised and should not be used. Of course, the recommendations include the use of two factor authentication to protect user accounts too.
-
-
www.troyhunt.com www.troyhunt.com
-
When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised.
-
-
www.troyhunt.com www.troyhunt.com
-
-
NIST isn't mincing words here, in fact they're quite clearly saying that you shouldn't be allowing people to use a password that's been breached before, among other types of passwords they shouldn't be using.
-
-
www.betterspecs.org www.betterspecs.org
-
- Feb 2020
-
docs.k6.io docs.k6.io
-
Do Browse like a user wouldTake natural pauses that users would take to consume page contentFocus on the most common use cases, rather than all the possible use casesTake note of pages where forms/logins occur, you will likely need to complete some scripting there
-
-
stackoverflow.com stackoverflow.com
-
It's a good practice to create respond_to_missing? if you are overriding method_missing. That way, the class will tell you the method you are calling exists, even though it's not explicitly declared.
-
- Nov 2019
-
www.asanet.org www.asanet.org
-
Published by the American Sociological Association, the article addresses best practices for meeting the needs of military students in sociology classes in higher education. Drawing on Knowles' andragogy, the authors give tips for course organization, feedback, content, and communication.
9/10
-
- Oct 2019
-
github.com github.com
-
Yes, absolutely, no two projects are alike. This step is moving towards a direction where we have a set of best practices for webpack isolated in a bundled package and can be maintained in isolation without impacting upgrades or end-user experience. If you have seen next.js or create-react-app they sort of do they same thing for ease and maintainability. Rails is a great example for this - there are some built-in best practices, opinionated defaults and gems that are hidden behind the scene plus power to do advance things where needed.
-
- Apr 2019
-
onlinelibrary.wiley.com onlinelibrary.wiley.com
-
Two commonly used change strategies are clearly not effective: developing and testing “best practice” curricular materials and then making these materials available to other faculty and “top‐down” policy‐making meant to influence instructional practices.
Would this be predicted by the Cynefin framework? Teaching problems are rarely obvious enough for "best" practices; "better" practices may be the best we can hope for.
-
- Jul 2017
-
blog.golang.org blog.golang.org
-
(It's usually a mistake to pass back the concrete type of an error rather than error, for reasons discussed in the Go FAQ, but it's the right thing to do here because ServeHTTP is the only place that sees the value and uses its contents.)
Good clarifying comment on when to pass back the concrete type of an error.
Tags
Annotators
URL
-
- Jan 2017
-
angular.io angular.io
-
Component classes should be lean. They don't fetch data from the server, validate user input, or log directly to the console. They delegate such tasks to services.
A really good point! Lean-ness is something to strive for.
-
- Oct 2016
- Feb 2014
-
github.com github.com
-
For example, imagine you are annotating the second page of a New York Times article. You probably want to see your annotation when you are looking at the article later as a single page, right? Or perhaps you've annotated the HTML for a PLOS ONE article. Wouldn't you like to see those annotations when you are looking at the PDF version of the same article? If annotations were only associated with the URL you happened to be looking at in your browser then the scenarios above would not work, because the documents being annotated all have different URLs.
Publisher Best Practices is a great idea that I would like to see codified in the authoring and publishing tools to make the practices commonplace by default.
I would like to mix PBP with other techniques, though, for richer connection between source and rendering-- I have some source mapping ideas that make it possible to keep annotations linked even as the original source is edited over time.
-