997 Matching Annotations
  1. Sep 2020
    1. There is an escape hatch in :global() that facilitates this. It is verbose, and we are okay with that, we don't want it to be too pleasant to use. We don't want people doing this at all, but it is there when needed.
    2. I understand what you're getting at, but we shouldn't miss out on useful features just because a few developers will abuse it...
    1. If your reaction to the video was 'fine, but if we use TypeScript and write plugins for each editor then we can get all the autocomplete and syntax highlighting stuff' — in other words, if you believe that in order to achieve parity with CSS it makes sense to build, document, promote and maintain a fleet of ancillary projects — then, well, you and I may never see eye to eye!
    1. I don’t want my source to be human-readable, not for protective reasons, but because I care about web performance more. I want my website to arrive at light speed on a tiny spec of magical network packet dust and blossom into a complete website. Or do whatever computer science deems is the absolute fastest way to send website data between computers. I’m much more worried about the state of web performance than I am about web education. But even if I was very worried about web education, I don’t think it’s the network’s job to deliver teachability
    1. Now of course we know how React handles this conflict: it takes the new nodes in your virtual DOM tree — the waters in your flowing river — and maps them onto existing nodes in the DOM. In other words React is a functional abstraction over a decidedly non-functional substrate.

      To me this is a warning sign, because in my experience, the bigger the gap between an abstraction and the thing it abstracts, the more likely you are to suffer what programmers like to call ‘impedance mismatches’, and I think we do experience that in React.

    1. Now I know what you're thinking, "this is an atrocity, what a horrible mess!" and you're right, it's kind of ugly. In fact it's just about impossible to think this is a good idea the first time you see it — you have to actually try it.
  2. Aug 2020
    1. If you are a senior, try talking to a junior or someone less experienced than you. Many companies are running what is called ”reverse mentoring” programs where juniors coach senior members of a company. Senior’s experience is traded for a fresh perspective from a junior. You’d be amazed at how much you could learn and share.
    1. We share our labor of love

      Here's something to share from the margins--George Carlin. Like Carlin, we in the margins need is to crash into the open and yoke academic power (good ideas, clearly expressed, and openly political) to systemic change. Open education seems too tame to do that. Prove me wrong.

      https://youtu.be/Nyvxt1svxso

    1. Fix it, please, if it's incorrect.
    2. FWIW, I would have raised it earlier if I thought it would have made a difference.

      This is different from apathy; it's more like powerlessness.

    3. If we've gone more than a year without this being a problem in the slightest, I don't see how the next year would be any different.
    4. +1 for taking the language back.
    5. Can't upvote this enough. It is highly irritating to see language destroyed (and we wonder why kids bastardize the language..).
    1. my point is that using "into" in such a case is just as incorrect as using "inas" would be. The fact that people make mistakes doesn't change this.

      "Log in" is the only correct way to spell the verb, and the only way to be consistent with 1000s of other phrasal verbs that are spelled with a space in them.

      We don't need nor want an exception to the general rule just for "login" just because so many people have made that mistake.

    1. I don't think it should be the individual application's responsibility to add Cache-Control: Vary when that negotiation/routing is done by Rails on behalf of the app, do you?
    2. At a certain point it is up to the application to specify when they're varying.
    1. you could imagine my extreme disappointment after i came back after a year and a half to find that the entire exploration map was about 80% smaller, every different island was within clear view of your starting island completely decimating any sense of adventure or exploration you could have had.Almost all materials could be collected and all items built within four and a half hours. Islands are literally numbered one to five to display they're level of danger.not only that but you were practically spoon fed each advancement in the game, it feels like it was taken from a greatly ambitious open world, exploration survival game that would take months to finish and achieve everything in. To now being an arcade style iphone app game catered to ten year olds that would foolishly enter their parents card details in order to buy 10,000 roblox coins.
    1. I have over 689 hours into this game and would like to talk about the changes made to the Exploration. In my opinion the Exploration which made this game amazing now stinks!. You know longer need a ship to hit the islands. The exploration has pretty much been removed. One of the things that made this game so amazing was grinding to make your ship and heading out to Explore and find the other islands. Now all the islands are really close to the spawn point, there are not that many and well they stink. There is no reason or need to make a ship because you can easily reach all the island with a raft.
  3. Jul 2020
    1. "AOO is not, and isn't designed to be, the 'super coolest open source office suite with all the latest bells and whistles,'" Jagielski continued. "Our research shows that a 'basic,' functional office suite, which is streamlined with a 'simple' and uncluttered, uncomplicated UI, serves an incredible under-represented community.
    1. Article 7(3) of the GDPR prescribes that the controller must ensure that consent can be withdrawn bythe data subject as easy as giving consent and at any given time. The GDPR does not say that givingand withdrawing consent must always be done through the same action.
    2. consent is obtained through use of a service-specific user interface (for example, via a website, an app,a log-on account, the interface of an IoT device or by e-mail), there is no doubt a data subject must beable to withdraw consent via the same electronic interface, as switching to another interface for thesole reason of withdrawing consentwould require undue effort.
    3. The controller informs customers that they havethe possibility to withdraw consent. To do this, they could contact a call centre on business daysbetween 8am and 5pm, free of charge. The controller in this example doesnotcomply with article 7(3)of the GDPR. Withdrawing consent in this case requires a telephone call during business hours, this ismore burdensome than the one mouse-click needed for giving consent through the online ticketvendor, which is open 24/7.
    1. The User has the right to object to such processing and may exercise that right by visiting the privacy policies of the respective vendors.

      It's not like going to a privacy policy really helps you exercise your right to object? How? By providing an address to which to send your objections?

    1. These seem to be better reasons to support sub-nanosecond resolution. I think either storing picoseconds or storing sec fraction as 64-bit integer are better approaches than storing a rational. However, either change would be very invasive, and it seems unlikely to be worth the effort.
    1. JSON parsing is always pain in ass. If the input is not as expected it throws an error and crashes what you are doing. You can use the following tiny function to safely parse your input. It always turns an object even if the input is not valid or is already an object which is better for most cases.

      It would be nicer if the parse method provided an option to do it safely and always fall back to returning an object instead of raising exception if it couldn't parse the input.

    1. In your environment you may want to always configure internationalization, routers, user data etc. If you have many different React roots it can be a pain to set up configuration nodes all over the place. By creating your own wrapper you can unify that configuration into one place.
    1. is to make sure that students have sufficient background knowledge to stimulate interest and avoid confusion.

      Scaffolding teaching? Providing those hints that are mentioned earlier in the article?

    1. Matz, alas, I cannot offer one. You see, Ruby--coding generally--is just a hobby for me. I spend a fair bit of time answering Ruby questions on SO and would have reached for this method on many occasions had it been available. Perhaps readers with development experience (everybody but me?) could reflect on whether this method would have been useful in projects they've worked on.
    1. I agree in general splitting an array, according to some property using the order of the elements (no take_drop_while) or to some other array (this request) is more difficult than it could be.
  4. Jun 2020
    1. According to our understanding of the inconsistencies, the feature was likely trying to support too many edge cases. All caching strategies have weaknesses and eventually break down if the usage is not properly scoped.
    1. Sometimes, the line between 'bug' and 'feature' is a hard one to draw. Generally, a feature is anything that adds new behavior, while a bug is anything that causes incorrect behavior. Sometimes, the core team will have to make a judgment call.
    1. OK, so what about regular messages? Turns out they are not encrypted after all. Where Signal implements the security and privacy protocols right from the start, Telegram separates the two and offers an additional option. The problem is that not everyone is aware of the Secret Chat option and first-time users may send sensitive information in the regular chat window unknowingly.
  5. May 2020
    1. Pipes are great for taking output of one command and transforming it using other commands like jq. They’re a key part of the Unix philosophy of “small sharp tools”: since commands can be chained together with pipes, each command only needs to do one thing and then hand it off to another command.
    1. CodeGuard relies upon industry best practices to protect customers’ data. All backups and passwords are encrypted, secure connections (SFTP/SSH/SSL) are utilized if possible, and annual vulnerability testing is conducted by an independent agency. To-date, there has not been a data breach or successful hack or attack upon CodeGuard.
    1. We iterate to deliver features, so we often don't have functionality that people expect. For this reason, 'people could reasonably expect this functionality' does not make it a bug.
    1. The "'strict-dynamic'" source expression aims to make Content Security Policy simpler to deploy for existing applications who have a high degree of confidence in the scripts they load directly, but low confidence in their ability to provide a reasonable list of resources to load up front.
    1. Eric Schmidt, former Google CEO and Chairman, famously said “Google’s policy on a lot of these things is to get right up to the creepy line, but not cross it.” But for most people, that line was crossed by Google, Facebook, and others long ago.
    1. When is your site not built with the Jamstack? Any project that relies on a tight coupling between client and server is not built with the Jamstack.
    1. In natural languages, some apparent tautologies may have non-tautological meanings in practice. In English, "it is what it is" is used to mean 'there is no way of changing it'.[1] In Tamil, vantaalum varuvaan literally means 'if he comes, he will come', but really means 'he just may come'.[2]
    1. An entity not established in the EU offers goods or services (even if the offer is for free) to people in the EU. The entity can be government agencies, private/public companies, individuals and non-profits;
    2. Determining your law of reference Generally, the laws of a particular region apply if: You base your operations there; or You use processing services or servers based in the region; or Your service targets users from that region This effectively means that regional regulations may apply to you and/or your business whether you’re located in the region or not. For that reason, it’s always advisable that you approach your data processing activities with the strictest applicable regulations in mind.
    1. This scope effectively covers almost all companies and, therefore, means that the GDPR can apply to you whether your organization is based in the EU or not. As a matter of fact, this PwC survey showed that the GDPR is a top data protection priority for up to 92 percent of U.S. companies surveyed.
    1. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
    2. They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
    3. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
  6. Apr 2020
    1. Despite their awarded diplomas in the art of writing, you'd be surprised at how many editors and journalists in the United States make English mistakes. For instance, "an" is still often coupled with words that begin with an "H" sound, even though this is improper. I'd advise against treating material from news sources as if it were error-free or even a higher authority on grammar.
    1. What we actually want to do is to escape content if it is unsafe, but leave it unescaped if it is safe. To achieve this we can simply use SafeBuffer's concatenation behavior:
    2. Our helper still returns a safe string, but correctly escapes content if it is unsafe. Note how much more flexible our group helper has become because it now works as expected with both safe and unsafe arguments. We can now leave it up to the caller whether to mark input as safe or not, and we no longer need to make any assumptions about the safeness of content.
    1. Other sites could absolutely spend time crawling for new lists of breached passwords and then hashing and comparing against their own. However this is an intensive process and I'm sure both Facebook and Google have a team dedicated to account security with functions like this.
    2. Before embarking on the effort to scrape the web for new password breaches and compare against your entire user database you also need to consider the ROI. The beauty of the pwned passwords API and this, and other, implementations of it is that you can get a good improvement in your account security with comparatively little engineering effort.
    1. Now, do I care which one you use? No. As long as you test your code, I am happy. A professional developer should be able to work in either one of these because they essentially do the same thing: test your code.
    1. The only goal is correctness. Code style is not a consideration. Providing the level of configuration necessary to make everyone happy would be a huge distraction from the main purpose. After conversion, I recommend using rubocop's awesome --auto-correct feature to apply your preferred code style.
    1. The term "ad hoc" in this context is not intended to be pejorative; it refers simply to the fact that this type of polymorphism is not a fundamental feature of the type system.
    1. there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"
    2. The more easily relabeled of the two uses of the term "hacker" is the malicious security cracker: it is not only the more recent phenomenon to acquire that label, but also the one whose meaning is most easily evoked by an alternative term. This is why, when you read an article of mine that talks about malicious security crackers, I use the term "malicious security cracker"
    1. 1Password wasn’t built in a vacuum. It was developed on top of open standards that anyone with the right skills can investigate, implement, and improve. Open tools are trusted, proven, and constantly getting better. Here’s how 1Password respects the principles behind the open tools on which it relies:

      I found it ironic that this proprietary software that I have avoided using because it is proprietary software is touting the importance of open tools.

    1. Automattic uses WordPress to power WordPress.com, and it contributes back code and time to the WordPress project. It is a symbiotic relationship. It isn’t accurate to say that WordPress is Automattic’s product, or that WordPress came from Automattic. Indeed, the opposite is true — Automattic came from WordPress, and Automattic (through WordPress.com) exists as part of the vast WordPress community and ecosystem.

      That's probably a common misconception. I'm glad they clarified that because I might have assumed that as well:

      It isn’t accurate to say that WordPress is Automattic’s product, or that WordPress came from Automattic. Indeed, the opposite is true — Automattic came from WordPress, and Automattic (through WordPress.com) exists as part of the vast WordPress community and ecosystem.

  7. Mar 2020
    1. Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
    1. The business had a policy that you should report safety incidents when you see them. The process around that was you fill out a form and fax it to a number and someone will take action on it. The safety manager in this company saw that and decided to digitize this workflow and optimize it. Once this process was put into place, the number of safety incidents reported increased 5 times. The speed at which safety incidents were addressed increased by 60%.
    1. There is no use learning the word for “aardvark” in Swahili if you are never likely to use it. Think of words you use all the time and get familiar with them first.[2] X Research source For example, if you’re an exchange student in Russia, you might need to introduce yourself, ask for directions, and order food. While you might need to know the Swahili word for “aardvark” someday, you can learn it at a later date when the time comes.
  8. Feb 2020
    1. Lead by example and make sure people understand that things need to be written down in issues as they happen.
    1. We also place an emphasis on ensuring that conclusions of offline conversations are written down.
    1. After your question is answered, please document the answer so that it can be shared.
    1. But, let’s be pragmatic for a second, the 80/20 rule states that you get 80% of the value from 20% of the work and a couple of simple tests are vastly better than no tests at all. Start small and simple, make sure you get something out of the testing first, then expand the test suite and add more complexity until you feel that you’ve reached the point where more effort spent on realism will not give enough return on your invested time.
    1. Mais qu’est-ce donc que je suis ? une chose qui pense. Qu’est-ce qu’une chose qui pense ? c’est une chose qui doute, qui entend, qui conçoit, qui affirme, qui nie, qui veut, qui ne veut pas, qui imagine aussi, et qui sent.

      The fact that thinking is the production of a human being derives from the necessity of knowing what an human being is. Descartes wants to answer the question: who am I. Thus he takes what seems to be the more material and certain thing: thinking. Then he says: I am something who thinks. But actually this is a paralogism.

  9. Jan 2020
    1. Through a process called rehashing, rbenv maintains shims

      How does rehashing work?

    2. One thing well. rbenv is concerned solely with switching Ruby versions. It's simple and predictable.
  10. Dec 2019
    1. Confusingly, all the distributions I use (Ubuntu, RHEL and Cygwin) had some type of check (testing $- or $PS1) to ensure the current shell is interactive. I don’t like cargo cult programming so I set about understanding the purpose of this code in my .bashrc.
    1. No, clumsily working around the root account in situations where it is absolutely appropriate to use it is not for good reasons. This is just another form of cargo cult programming - you don't really understand the concept behind sudo vs root, you just blindly apply the belief "root is bad, sudo is good" because you've read that somewhere.
    1. Cargo cult programming is a style of computer programming characterized by the ritual inclusion of code or program structures that serve no real purpose.
    1. It doesn't use a database (unlike Keepass) and thus doesn't open all passwords at once. Just one at a time. Since it's just a directory of encrypted files, you can access your passwords with any PGP-compatible tool.
    1. Using find and cpio is a more unix-y approach in that you let find do the file selection with all the power that it has, and let cpio do the archiving. It is worth learning this simple use of cpio, as you find it easy to solve problems you bang your ahead against when trying tar.
    1. TC39 urges caution when using Stage 2-or below proposals, as it might result in inadvertent pressure from the community to keep the implementation as-is instead of improving it for fear of breaking existing code or ecosystem fragmentation (e.g. using a different symbol like # instead of @ for decorators).
    2. It's completely understandable that this happens without realizing it, but continuing to do so sets different expectations for how the language progresses. It's nothing to feel guilty about — we learn as a community and remind one another of how JavaScript works.
    3. Therefore, it's easy to search around for tweets/blog posts/talks that say "ES7 Decorators" and find that it's become the accustomed name for it.
    1. People cannot see exhaustive documentation and code examples on their own file system. They would have to visit the repository (which also requires an internet connection).
  11. Nov 2019
    1. As Onivim 2 completely handles the rendering layer, this Vim-modelled-as-a-pure-function could focus on just buffer manipulation.
    2. It is responsible for
    1. Epiphany aims to present the simplest interface possible for a browser. Simple does not necessarily mean less-powerful. The commonly-used browsers of today are too big, buggy, and bloated. Epiphany is a small browser designed for the web: not for mail, newsgroups, file management, instant messaging, or coffeemaking. The UNIX philosophy is to design small tools that do one thing and do it well.
  12. Oct 2019
    1. Try to avoid mucking with native prototypes, including Array.prototype, if you don't know who will be consuming your code (3rd parties, coworkers, yourself at a later date, etc.). There are ways to safely extend prototypes (but not in all browsers) and there are ways to safely consume objects created from extended prototypes, but a better rule of thumb is to follow the Principle of Least Surprise and avoid these practices altogether.
    2. He's not messing with them he's extending them for Arrays.
    1. She’d just gotten published for a snippet on one of Neil Gaiman’s Death graphic novels, and the editor of Minx asked if Pratchett would be interested in writing about video games.

      Just goes to show, breaking big successes is as much luck as hard-slog work and talent/skill.

  13. Sep 2019
    1. MobX as a data flow library, that enables you to roll your own state management architecture with minimal effort
  14. Aug 2019
    1. Suspending is built on the mechanism as error boundaries. In fact, we recently (like last week) completely rewrote error handling to prepare for this feature. It's also built on the same "expiration time" model we use for CPU scheduling. I love it when features compose together!
  15. May 2019
    1. import java.util.Scanner;

      /**

      • A simple class to run the Magpie class.
      • @author Laurie White
      • @version 6 March 2012 */ public class MagpieRunner2 {

        /**

        • Create a Magpie, give it user input, and print its replies. */ public static void main(String[] args) { Magpie2 maggie = new Magpie2();

          System.out.println (maggie.getGreeting()); Scanner in = new Scanner (System.in); String statement = in.nextLine();

          while (!statement.equals("Bye")) {

           System.out.println (maggie.getResponse(statement));
           statement = in.nextLine();
          

          } }

      }

  16. Apr 2019
    1. ​Technology is in constant motion. If we try to ignore the advances being made the world will move forward without us. Instead of trying to escape change, there needs to be an effort to incorporate technology into every aspect of our lives in the most beneficial way possible. If we look at the ways technology can improve our lives, we can see that technology specifically smartphones, have brought more benefits than harm to the academic and social aspects of teenagers lives, which is important because there is a constant pressure to move away from smart devices from older generations. The first aspect people tend to focus on is the effect that technology has on the academic life of a teen. Smartphones and other smart devices are a crucial part of interactive learning in a classroom and can be used as a tool in increasing student interest in a topic. For example, a popular interactive website, Kahoot, is used in many classrooms because it forces students to participate in the online quiz, while teachers can gauge how their students are doing in the class. Furthermore, these interactive tools are crucial for students that thrive under visual learning, since they can directly interact with the material. This can be extended to students with learning disabilities, such as Down Syndrome and Autism,​ research has shown that using specialized and interactive apps on a smart device aids learning more effectively than technology free learning. Picture Picture Another fear regarding technology is the impact it has on the social lives of young adults, but the benefits technology has brought to socializing outweighs any possible consequences. The obvious advantage smartphones have brought to social lives is the ability to easily communicate with people; with social media, texting, and calling all in one portable box there is no longer a struggle to be in contact with family and friends even if they are not in your area. Social media can also be used for much more In recent years, social media has been a key platform in spreading platforms and movements for social change. Because social media websites lower the barrier for communicating to large groups of people, it has been much easier to spread ideas of change across states, countries, or the world. For example, after Hurricane Sandy tore apart the northeastern United States, a movement called "Occupy Sandy" in which people gathered to provide relief for the areas affected was promoted and organized through social media. Other movements that have been possible because of social media include #MeToo, March for Our Lives, #BlackLivesMatter, and the 2017 Women's March. ​

  17. Dec 2018
    1. With regard to the superstitions of logicians, I shall never tire of emphasizing a small, terse fact, which is unwillingly recognized by these credulous minds--namely, that a thought comes when "it" wishes, and not when "I" wish; so that it is a PERVERSION of the facts of the case to say that the subject "I" is the condition of the predicate "think." ONE thinks; but that this "one" is precisely the famous old "ego," is, to put it mildly, only a supposition, an assertion, and assuredly not an "immediate certainty." After all, one has even gone too far with this "one thinks"--even the "one" contains an INTERPRETATION of the process, and does not belong to the process itself. One infers here according to the usual grammatical formula--"To think is an activity; every activity requires an agency that is active; consequently" . . . It was pretty much on the same lines that the older atomism sought, besides the operating "power," the material particle wherein it resides and out of which it operates--the atom. More rigorous minds, however, learnt at last to get along without this "earth-residuum," and perhaps some day we shall accustom ourselves, even from the logician's point of view, to get along without the little "one" (to which the worthy old "ego" has refined itself).

      The original text (avaiable here: http://www.nietzschesource.org/#eKGWB/JGB-17) goes: Was den Aberglauben der Logiker betrifft: so will ich nicht müde werden, eine kleine kurze Thatsache immer wieder zu unterstreichen, welche von diesen Abergläubischen ungern zugestanden wird, — nämlich, dass ein Gedanke kommt, wenn „er“ will, und nicht wenn „ich“ will; so dass es eine Fälschung des Thatbestandes ist, zu sagen: das Subjekt „ich“ ist die Bedingung des Prädikats „denke“. Es denkt: aber dass dies „es“ gerade jenes alte berühmte „Ich“ sei, ist, milde geredet, nur eine Annahme, eine Behauptung, vor Allem keine „unmittelbare Gewissheit“. Zuletzt ist schon mit diesem „es denkt“ zu viel gethan: schon dies „es“ enthält eine Auslegung des Vorgangs und gehört nicht zum Vorgange selbst. Man schliesst hier nach der grammatischen Gewohnheit „Denken ist eine Thätigkeit, zu jeder Thätigkeit gehört Einer, der thätig ist, folglich —“. Ungefähr nach dem gleichen Schema suchte die ältere Atomistik zu der „Kraft“, die wirkt, noch jenes Klümpchen Materie, worin sie sitzt, aus der heraus sie wirkt, das Atom; strengere Köpfe lernten endlich ohne diesen „Erdenrest“ auskommen, und vielleicht gewöhnt man sich eines Tages noch daran, auch seitens der Logiker ohne jenes kleine „es“ (zu dem sich das ehrliche alte Ich verflüchtigt hat) auszukommen.

      The translation "one thinks" is not exact. Es denkt. It thinks. Something thinks

  18. Oct 2018
    1. Effective governors communicate what the priorities of your organization are and what is expected of people.

      Largely missing in HIH.

    2. most IT governance strategies prove to be ineffective in practice due to application of traditional strategies and ways of thinking.
    3. Lean IT governance balances your short-term and long-term needs. Too many organizations have allowed technical debt to grow in recent years, for the skills of their IT staff to stagnate, and to continue to tolerate traditional IT process strategies from yesteryear. This is because they allowed short-term priorities to trump long-term health. We must do better.

      Sounds like HIH.

  19. Aug 2018
    1. The technical and theoretical details underlying clinical informatics are beyond the scope of this chapter. What follows is a concise introduction to topics and resources of general interest in this field, presented to help clinicians use information technology for the benefit of patient care.

      This is interesting!

  20. Jun 2018
  21. Apr 2018
    1. I SHALL not be content till this country can produce every single thing we need, even coffee, cocoa, and rubber, and so keep all our dollars at home. If we can do this and at the same time work up tourist traffic so that foreigners will come from every part of the world to see such remarkable wonders as the Grand Canyon, Glacier and Yellowstone etc. parks, the fine hotels of Chicago, & etc., thus leaving their money here, we shall have such a balance of trade as will go far to carry out my often-criticized yet completely sound idea of from $3000 to $5000 per year for every single family—that is, I mean every real American family. Such an aspiring Vision is what we want, and not all this nonsense of wasting our time at Geneva and talky-talk at Lugano, wherever that is. Zero Hour, Berzelius Windrip.
    2. that the average toiler would immediately receive $5000 a year.

      see Why The World is Ripping Itself Apart: Five Ways History’s Repeating Itself https://eand.co/five-ways-historys-repeating-itself-fed5721e225e

  22. Dec 2017
  23. Sep 2017
    1. This means they have some say – although not complete – over their personal data, and in turn they begin to have an understanding of the technologies that underpin the Web, including how their work and their data circulate there.

      You know, if we're going to force Gen Ed material down student's throats and wallets, why not throw in IT/CS stuff while we're at it? Technical literacy would make for a fair easier world.

  24. Jun 2017
  25. Mar 2017
  26. Feb 2017
    1. It may be conceived by some that the dcvoced Christian female, who is willing thus to be led by the Spirit into paths of usefulness, may Jose, in some degree, lhose lovely and becoming lraits of character, which we admire in the female sex.

      Some might argue that a woman loses her character the more she follows the Holy Spirit, yet Palmer insists that nothing could be further form the truth. Religion, she argues, actually strengthens a lady's resolve.

  27. Dec 2016
    1. The church persecuted many scholars whose ideas and teaching contradicted religious beliefs. One such scholar was the Italian astronomer and physicist Galileo, who had been a member of the faculty of the University of Padua. The church silenced him in 1633 for arguing that Earth moved around the sun.

      Galileo started and moved the idea that scholars should have academic freedom.

  28. Nov 2016
  29. Oct 2016
    1. First Read's Morning Clips: It's Nev-ADDD-ah, not Nev-AHHHH-dah Share Share Tweet Share Email Print Comment advertisement OFF TO THE RACES: It's Nev-ADDD-ah, not Nev-AHHHH-dah Donald Trump's attempt to pronounce "Nevada" in the Silver State last night didn't go well. Tim Kaine praised his own Tuesday night debate performance. Trump says he's "getting a lot of credit" after Mike Pence's widely-praised debate. Pence is taking heat from Latinos after his "Mexican thing" remark. From the Washington Post: "Sen. Tim Kaine may have awakened Wednesday to poor reviews after the first and only vice-presidential debate, but his acerbic performance in Farmville, Va., revealed that the Clinton campaign's strategy for these debates extends far beyond the stage. Armed with pre-planned Web videos, television ads and tweets, the campaign has used key debate moments this week and last as a cudgel against the Republican ticket, showing a level of discipline and organization largely absent from Donald Trump and Indiana Gov. Mike Pence's campaign." Trump said yesterday: "They say Donald Trump loves Putin. I don't love, I don't hate. We'll see how it works." And here's Trump on the issue of Yucca Mountain: "Number one is safety and it is a little too close to major population, so I will take a look at it and I will have an opinion." The New York Times does a deep dive into Trump's business ventures. "Of the roughly 60 endeavors started or promoted by Mr. Trump during the period analyzed, The Times found few that went off without a hitch. One-third of them either never got off the ground or soon petered out. Another third delivered a measure of what was promised — buildings were built, courses taught, a product introduced — but they also encountered substantial problems, like lawsuits, government investigations, partnership woes or market downturns." Here's how Pennsylvania boosted its swing-state status, according to the Washington Post. An interesting data point from PRRI/The Atlantic: "White likely voters who still live in their hometown strongly prefer Donald Trump over Hillary Clinton (57 percent vs. 31 percent), while nearly half (46 percent) of those who live more than a two-hour drive away from their hometown are supporting Clinton compared to 40 percent who are supporting Trump." The Atlantic endorsed Hillary Clinton, only the third time it has weighed in on a presidential election since 1857. Via POLITICO: With hopes in Pennsylvania fading, Trump is hoping to make gains in the Mountain West. From the AP: "Donald Trump once called data "overrated" in politics. But with Election Day swiftly approaching, the Republican presidential nominee is spending millions of dollars on data and digital services in an effort to land donations and win over voters. Ushering Trump toward a more analytical approach are Jared Kushner, Trump's son-in-law and adviser, and Brad Parscale, the campaign's digital director and a veteran Trump Organization consultant." Sean Hannity is accusing Megyn Kelly of supporting Hillary Clinton. "Republican presidential nominee Donald Trump has throughout his career given campaign contributions to state attorneys general while they weighed decisions affecting his business, a review of his political donations shows," notes the Wall Street Journal. From the New York Times yesterday: "The F.B.I. secretly arrested a former National Security Agency contractor in August and, according to law enforcement officials, is investigating whether he stole and disclosed highly classified computer code developed by the agency to hack into the networks of foreign governments. The arrest raises the embarrassing prospect that for the second time in three years, a contractor for the consulting company Booz Allen Hamilton managed to steal highly damaging secret information while working for the N.S.A." What will happen to Merrick Garland's nomination in December? The

      The first thing i noticed when i got to the NBC website was that all of the political articles are about Trump. That really says something about the style of politics that are alive in the U.S. today. Although the article title talks about "Nevada" and how Trump says the State's name, it actually takes a deeper look into Trump's past business dealings and political affiliations. As opposed to the Fox news article that actually did focus on his pronunciation of Nevada. On top of that the author in this article goes after Trump's VP candidate as well as others that are in Trump's campaign committee. This article seemed more like an attack on trump rather than a criticism.

  30. Sep 2016
    1. Around 1809, Samuel Taylor Coleridge rejected “he” as the generic pronoun (“in order to avoid particularising man or woman, or in order to express either sex indifferently”, he wrote in his notebooks), settling on “it” as an ideal, neutral solution

      Coleridge uses "it" for neutral singular

  31. Jul 2016
    1. who was arrested  for selling drugs when he really didn’t sell any

      they have to look for evidence before doing something to people like putting them in jail

    1. The freedom and belief that you poured into those accomplishments, it’s a source that can  be transferred into other areas, after all, that is a belief system. One that is controllable. If you can reveal that source of power, you can literally direct it into everything you need to deal with.
  32. Apr 2016
    1. Office of Management and Budget (OMB) directs agency chief information officers (CIO) to respond to 36 information technology (IT) management reporting requirements

      36

  33. Jan 2016
    1. не все нелегалы пираты. помнишь, я выше уже писал про истекшие лицензии?
    2. Сравни с пруф номер 1. M$ фактически создали ситуацию, при которой системы без обновлений ждали, когда их превратят в зомби. В конце 2008-2009 получили конфикер и огроменные ботнеты.
    3. Microsoft много чего финансирует, это же не какое-нибудь нищее FSFну, нищий, это скорее всего ты, а FSF - некоммерческая организация. и тем не менее это не противоречит тому, что я написал выше.
    4. Даа, правильно, большое количество пиратских инсталов. А почему их так много? Потому что microsoft не хочется терять рынок и фактически смотрит на пиратство сквозь пальцы. Сюда же нужно добавить политику апдейтов, которая не позволяла ставить апдейты на пиракт в то время. Ситуация ими же и создана.
    5. я отлично помню OpenOffice 1.1, который крешился просто постоянно на типовых документах (в формате doc, который M$ старательно засекречивал), да еще и медленный. а active X и все прочее - это уже вторая часть....--- тогда позиция майкрософт была: посмотрите, какое говно этот линукс (и это имело основания, т.к. майкрософт всячески помогал линуксу быть говном).а сейчас позиция майкрософт: мы любим линукс! мы сами почти опенсорс! давайте запустим его софт у нас, на винде!и народу, которая вылупилась в эпоху виндовс 10, конечно, кажется фанатизмом, что кто-то не любит такую белую и пушистую компанию M$.
    6. основные проблемы всегда связаны именно с проприетарными особенностями. Я говорил именно о том, что выбирая в качестве фундаментов проприетарные кактусы нелогично жаловаться на проблемы с портированием впоследствии. Лучше изначально выбирать те станадарты, которые присутствуют везде.
    7. Если бы он не был нестандартной проприетарщиной, то никто бы не придумывал такие форматы как ODF. Новые форматы разрабатывают и внедряют тогда, когда есть проблемы с уже существующими, и, как правило, как следствие их проприетарности и закрытости. Даже у разных версий Microsoft Office разные представления о формате DOC. Как следствие, документ, созданный в одной версии софтины, криво открывается в другой. А уж заставить нормально его поддерживать другие офисные пакеты можно и не мечтать - форматирование всё равно будет разъезжаться. Поэтому его и стали закапывать внедрением ODF.
    8. аа, так правильно ли я тебя понял, что формат .doc, который используется на предприятии, ты назвал «нестандартная, некроссплатформенная проприетарщина»?
    9. «странное» == «нестандартная, некроссплатформенная проприетарщина». «на каждом углу» != «львиная доля». Открытые стандарты кроссплатформенны. Все проблемы портирования в первую очередь связаны именно с нестандартными проприетарными реализациями (которые и упомянуты выше: макросы офиса, active X,...). И только во вторую с некоторыми особенностями конкретных непроприетарных реализаций.
    10. Твоя логика тоже прекрасна. Если какая-то компания приобрела монополию в масштабах страны или даже мира, то это норма, законно и так все и должно оставаться. Создание и использование альтернатив - наивно (я удивлен, что ты не сказал противозаконно).так вот это в корне не верно.
    1. Добавь отсутствие полного доступа. Линукс, где ты можешь удалить любой файл, стал как глоток свежего воздуха в системе, где ты значишься за админа, но по факту просто продвинутый юзер.
    2. Добавь к этому, что технологии, которыми принуждали тебя пользоваться содержали дыры и ошибки безопасности, защита которых стала индустрией для антивирусных компаний. (Когда-то в винде даже антивируса не было и он подхватывал заразу во враждебной среде за 15 минут.) И несмотря на то, что все они обещали неуязвимость и крайнюю надежность и защищенность ОС случались масштабные эпидемии типа Conficker.
    3. Вот ты хотел слезть с Винды и не мог, потому что M$ всячески препятствовал тому, чтобы у тебя был выбор. Ты со своим линуксом не мог зайти даже в виндовую сетевую шару.
    4. Вообще же истоки негатива в том времени, когда Microsoft вел очень агрессивную маркетинговую компанию. Очень агрессивно проталкивали преинсталы (нелегко купить ноут без винды). Они тупо публиковали документы, где доказывали, что Windows в итоге дешевле Linux. Они платили поставщикам, чтобы те не ставили Linux. Они намерено ломали спецификации в своих продуктах, чтобы сделать их несовместимыми со свободными реализациями.
    5. Я доверяю сообществу и открытости кода. Самому-то не смешно сравнивать кусок проприетарщины, у которого в лицензионном соглашении прописано, что тебе залезут в задницу, со свободной системой, где вероятность подобного поведения существует, но значительно ниже?
    6. Россыпи зондов, EEE, проприетарные форматы и протоколы во все поля, невероятная криворукость разрабов в ряде моментов (скайп, обновления винды (вот за это вообще бить надо), долгая загрузка и т.д.), хреновая настраиваемость (никаких тайловых WM, раскладка на капсе и куча иных плюшек только через сторонние приложения) и так далее.Платность - меньшее из зол.
    7. Раз уж ты сам назвал дату... 2003... как раз в это время Samba Team инициировало судебное дело в суде ЕС о предоставили спецификаций smb протокола и закрытых форматов документов. Думаешь, потому что все было «прекрасно»? Вот, почитайhttps://fsfe.org/activities/ms-vs-eu/timeline.en.html
    8. понимаешь, каждый раз придет кто-нибудь и скажет, что у него дома все работает. Одна проблема, что этот кто-то не заставлял это работать на предприятии под ответственность и не читал всякие технические выкладки, почему это не работает.
    1. ВЫВОДЫ

      <br>

      • Все комплектующие адаптера должны быть последнего поколения. К высокоскоростному Wi-Fi 802.11ac должен прилагаться высокоскоростной же USB 3.0, тогда и в двухантенном адаптере есть смыл.

      • Если комплектующие разных поколений. Высокоростной Wi-Fi 802.11ac + низкоскоростной USB 2.0 дадут ⩽ 270 Мбит/с и не больше. В двухантенном смысла нет.

      • Если все комплектующие предыдущих поколений. Средне- и низкоскоростные Wi-Fi 802.11 a/b/g/n (не ac) + низкоскоростной USB 2.0 — есть смысл в двухантенном адаптере. <br>

      Но для получения максимальных результатов адаптер должен принимать сигнал от роутера, соответствующего характеристикам адаптера. То есть поколение роутера тоже должно соответствовать.

    2. Минусом работы на 5 ГГц может быть уменьшение дальности работы (по сравнению с 2,4 ГГц), но этот вопрос мы в данной статье не затрагивали и постараемся вернуться к нему в следующих публикациях.
    3. Конечно, не забывайте, что и роутер должен соответствовать этому уровню.
    4. Если же адаптер работает в ПК или ноутбуке по интерфейсу USB версии 3.0, то скоростные показатели заметно интереснее — до 450 Мбит/с и выше.
    5. в случае работы с шиной USB 2.0 пользователи сетей 802.11ac могут рассчитывать на максимальные скорости около 270 Мбит/с. При этом особого смысла гнаться за двухантенным (скорость соединения 867 Мбит/с) адаптером практически нет. Единственное, где он может выиграть у одноантенного (скорость соединения 433 Мбит/с) — работа с сетями прошлого поколения.
    6. Если вы пользуетесь ноутбуком, встроенный беспроводной адаптер которого обеспечивает работу в 802.11n/300 Мбит/с (а таких моделей в среднем сегменте большинство), то установка внешнего контроллера может помочь существенно увеличить скорость работы с сетью, и подобный апгрейд может быть оправдан.
  34. May 2015
    1. GOV.uk er direkte underlagt statsministerens kontor. De har lisens til å drepe unødvendige nettsteder og skakkjørte prosjekter. De har mandat, de har penger, og de har trumf.
  35. Mar 2015
    1. an objective set for the Sprint that can be met through the implementation of Product Backlog. It provides guidance to the Development Team on why it is building the Increment. It is created during the Sprint Planning meeting. The Sprint Goal gives the Development Team some flexibility regarding the functionality implemented within the Sprint. The selected Product Backlog items deliver one coherent function, which can be the Sprint Goal. The Sprint Goal can be any other coherence that causes the Development Team to work together rather than on separate initiatives.

      an objective set for the Sprint that can be met through the implementation of Product Backlog. It provides guidance to the Development Team on why it is building the Increment. It is created during the Sprint Planning meeting. The Sprint Goal gives the Development Team some flexibility regarding the functionality implemented within the Sprint. The selected Product Backlog items deliver one coherent function, which can be the Sprint Goal. The Sprint Goal can be any other coherence that causes the Development Team to work together rather than on separate initiatives.