219 Matching Annotations
  1. Nov 2022
    1. Cloud Computing in Healthcare: How Technology is Improving the Industry The healthcare industry is one of the most important sectors in any economy, and it relies heavily on technology. This blog post will explore how cloud computing solutions are definitely worth their weight in gold in the healthcare industry. https://bit.ly/3tpAvMO

    1. (note: this is not the reason why Jenkins uses Tini, they use it for signal reaping, but it was used in the RabbitMQ image for that reason).
    1. Well, actually, some ligatures do have legacy codes, but solely for backwards compatibility with outdated encodings from the long-gone, dark ages of eight-bit computing. E.g. f_f can have the U+FB00 LATIN SMALL LIGATURE FF code point. If ‘eight-bit’ does not tell you anything, please erase everything you read within these parentheses from your memory immediately, keep calm and continue reading.
  2. Oct 2022
  3. Sep 2022
    1. The Field Notes journal serves as RAM, the index cards as HDD, metaphorically speaking...(brain is CPU).

      Den analogizes their note taking system to computing on 2010-11-11 8:43 PM.

    1. If the program provides accurate real-time feedback about how user manipulations affect program state, it reduces user errors and surprises. A good GUI provides this service.
    1. Because rbspy is a sampling profiler (not a tracing profiler), it actually can't tell you how times a function was called -- it just reports "hey, I observed your program 100,000 times, and 98,000 of those times it was in the calculate_thing function". ruby-prof is a tracing profiler for Ruby, which can tell you exactly how many times each function was called at the cost of being higher overhead.
    2. it's useful to understand the difference between "self time" and "total time" spent in a function
  4. Aug 2022
    1. Especially if CouchDB were an integrated part of the browser

      It's always funny/interesting to read these not-quite-projections about overhyped tech from a far enough vantage point, but this sounds a little like what I've advocated for in the past, which is resurrecting Google Gears.

    1. Editorial: The real reason I wanted Cmm to succeed: to democratize programming. It wouldn’t belong in any business plan, and I seldom mentioned to anyone, but the real reason I wanted Cmm to succeed was not about making money (although paying the mortgage was always important). The real reason was because of the feeling I had when I programmed a computer to perform work for me
    1. And it’s like, no, no, you know? This is an adaptation thing. You know, computers are almost as old as television now, and we’re still treating them like, “ooh, mysterious technology thing.” And it’s like, no, no, no! Okay, we’re manipulating information. And everybody knows what information is. When you bleach out any technical stuff about computers, everybody understands the social dynamics of telling this person this and not telling that person that, and the kinds of decorum and how you comport yourself in public and so on and so forth. Everybody kind of understands how information works innately, but then you like you try it in the computer and they just go blank and you know, like 50 IQ points go out the window and they’re like, “doh, I don’t get it?” And it’s the same thing, it’s just mediated by a machine.
    1. Mobile Network Hacking, IP Edition. by Karsten Nohl, Luca Melette & Sina Yazdanmehr. Black Hat. London. December 2-5, 2019. 47 minute video. https://www.blackhat.com/eu-19/briefings/schedule/index.html#mobile-network-hacking-ip-edition-17617

      Mobile networks have gone through a decade of security improvements ranging from better GSM encryption to stronger SIM card and SS7 configurations. These improvements were driven by research at this and other hacking conferences.

      Meanwhile, the networks have also mushroomed in complexity by integrating an ever-growing number of IT technologies from SIP to WiFi, IPSec, and most notably web technologies.

      This talk illustrates the security shortcomings when merging IT protocols into mobile networks. We bring back hacking gadgets long thought to be mitigated, including intercepting IMSI catchers, remote SMS intercept, and universal caller ID spoofing.

      We explore which protection measures are missing from the mobile network and discuss how to best bring them over from the IT security domain into mobile networks.

    1. Roughly stated, my overarching career mission is to design, build, and deploy software platforms that put end users in control of their computing and data, in part by making it easy and natural for programmers to create software that honors user desire.
    1. This very much appears to be a bug or design flaw in puma - The fact that a persistent connection ties up a thread on the chance a request might come over that connection seems like not great behavior. This would really only be an issue when puma is run with no workers (which wouldn't be done in production) but it still seems a little nuts.
  5. Jul 2022
    1. The definition of “super app” is fuzzy, but companies and their leaders most often use it to describe a state of cramming ever more features and functions into their apps—often ones adjacent to, but distinct from, their core functionality. So, for example, a financial-tech super app might start with payments and bolt on buy-now-pay-later, cryptocurrency and in-app storefronts. For social media, it could mean incorporating things like shopping. And for a delivery and ride-hailing company, it might mean adding new modes of transportation or other categories of goods for drivers to convey.

      Definition of "super-app"

      Not yet common in the U.S., but exemplified by WeChat in China. This is a response to the decline in mobile app user tracking and the corresponding ad-tech. It is about capturing more time and attention from mobile computing uers.

    1. the question you were asking was what is mind or consciousness so here we're using the words synonymously um and from a buddhist perspective uh there are 01:11:50 six what we call primary minds and then there's a whole slew of secondary minds and some of the more common systems include 51 in the secondary minds now please understand that mind like 01:12:04 everything else that exists in the world doesn't exist permanently it exists there are a few exceptions okay but essentially everything that exists in the world um is not permanent therefore 01:12:18 it's changing moment to moment therefore everything exists as a continuum including mind so that means there'll be a moment of mind followed by a next moment of mind etc 01:12:31 and the next moment of mind is determined primarily but not solely by the previous moment of mind so from that we can extrapolate a continuum an infinite continuum and mind is an 01:12:43 infinite continuum from perspective of buddhism and that means that we've had that implies suggests rebirth and it suggests we've had ultimate we've had infinite rebirths there's been no beginning 01:12:56 and so this then comes up again with the notion of a beginning creator if you will a so-called you know god there are some some problems here to resolve this um 01:13:07 and so mind is a continuum it's infinite now each moment of mind is made up of a primary mind and a constellation of secondary minds these six primary or the five as you read from nagarjuna the five 01:13:22 sensory minds of seeing hearing smelling tasting touching tactile right these five plus what's sometimes called the mental consciousness and that has live different levels of subtlety on the 01:13:34 grossest level is thinking if we go a little bit deeper a little bit more so little subtler we have dream mind which seems like these senses are active but actually 01:13:46 when we're sleeping the senses are inactive so it's just something coming from our sixth or mental consciousness it seems like the senses are active in dream mind that dream mind is a little more subtle than a wake mind awake 01:13:59 thinking mind and then if we go more subtle we're talking now again about awake mind we we talk about intuition when we're in intuition we're not thinking right it's a non-conceptual 01:14:11 mind uh in that sense and deeper yet our minds we call non-conceptual and non-dual where there's no awareness of a subject or an object so subject object non-duality so 01:14:25 that's kind of the rough sort of you know lay of the land

      Barry provides a brief summary of what the word "mind" means from a Buddhist philosophy perspective and says that there are six primary minds and 51 secondary minds.

      The 6 primary minds are the 5 senses plus mental consciousness, which itself consists of the coarse thinking (conceptual) mind, the intuitive mind (these two could be roughly mapped to Daniel Kahnaman's fast and slow system respectively), as well as the dreaming mind.

      Barry also conveys an interpretation of reincarnation based on the concept that the mind is never the same from one moment to the next, but is rather an ever changing continuum. The current experience of mind is GENERALLY most strongly influenced by the previous moments but also influenced by temporally distant memories. This above interpretation of reincarnation makes sense, as the consciousness is born anew in every moment. It is also aligned to the nature of the Indyweb interpersonal computing ecosystem, in which access to one's own private data store, the so-called Indyhub, allows one to experience the flow of consciousness by seeing how one's digital experience, which is quite significant today, affects learning on a moment to moment basis. In other words, we can see, on a granular level, how one idea, feeling or experience influences another idea, experience or feeling.

  6. Jun 2022
    1. The experts were asked to independently provide a comprehensive list of levers and leverage points for global sustainability, based on the potential for disproportionate effects to address and reverse the deterioration of nature while meeting societal needs. They were asked to consider actions by the full range of possible actors, and both top-down and bottom-up effects across various sectors. The collection of all responses became our initial set of levers and leverage points. Ensuing processes were then informed by five linked conceptualizations of transformative change identified by the experts (Chan et al., 2019): ● Complexity theory and leverage points of transformation (Levin et al., 2013; Liu et al., 2007; Meadows, 2009); ● Resilience, adaptability and transformability in social–ecological systems (Berkes, Colding, & Folke, 2003; Folke et al., 2010); ● A multi-level perspective for transformative change (Geels, 2002); ● System innovations and their dynamics (Smits, Kuhlmann, & Teubal, 2010; OECD, 2015) and ● Learning sustainability through ‘real-world experiments’ (Geels, Berkhout, & van Vuuren, 2016; Gross & Krohn, 2005; Hajer, 2011).

      Set of levers and leverage points identified by the authors.

      Creating an open public network for radical collaboration, which we will call the Indyweb, can facilitate bottom-up engagement to both educate the public on these levers as well as be an application space to crowdsource the public to begin sharing local instantiations of these levers.

      An Indyweb that is in the form of an interpersonal space in which each individual is the center of their data universe, and in which they can see all the data from their diverse digital interactions across the web and in real life all consolidated in one place offers a profound possibility for both individual and collective learning. Such an Indyweb would bring the relational nature of the human being, the so called "human INTERbeing" alive, and would effortlessly emerge the human INTERbeing explicitly as the natural form merely from its daily use. One can immediately see the relational nature of individual learning, how it is so entangled with collective learning, and would be reinforced with each social interaction on the web or in real life. This is what is needed to track both individual inner transformation (IIT) as well as collective outer transformation (COT) towards a rapid whole system change mobilization. Accelerated by a program of open access Deep Humanity (DH) knowledge that plumbs the very depth of what it is to be human, this can accelerate the indirect drivers of change and provide practical tools for granular monitoring of both IIT and COT.

      Could we use AI to search for levers and leverage points?

    1. Cloud costs can be up to 5X higher than traditional on-premise infrastructure. And that while the cloud promise is so beautiful. What is going on? This article gives you more insight into the other side of the coin and shows you that the cloud promise is not the full story.

      Cloud costs are 5X higher than on-premise costs

      Cloud costs can be up to 5X higher than traditional on-premise infrastructure. And that while the cloud promise is so beautiful. What is going on? This article gives you more insight into the other side of the coin and shows you that the cloud promise is not the full story.

  7. May 2022
    1. a society-wide hyperconversation. This hyperconversation operationalizes continuous discourse, including its differentiation and emergent framing aspects. It aims to assist people in developing their own ways of framing and conceiving the problem that makes sense given their social, cultural, and environmental contexts. As depicted in table 1, the hyperconversation also reflects a slower, more deliberate approach to discourse; this acknowledges damaged democratic processes and fractured societal social cohesion. Its optimal design would require input from other relevant disciplines and expertise,

      The public Indyweb is eminently designed as a public space for holding deep, continuous, asynchronous conversations with provenance. That is, if the partcipant consents to public conversation, ideas can be publicly tracked. Whoever reads your public ideas can be traced.and this paper trail is immutably stored, allowing anyone to see the evolution of ideas in real time.

      In theory, this does away with the need for patents and copyrights, as all ideas are traceable to the contributors and each contribution is also known. This allows for the system to embed crowdsourced microfunding, supporting the best (upvoted) ideas to surface.

      Participants in the public Indyweb ecosystem are called Indyviduals and each has their own private data hub called an Indyhub. Since Indyweb is interpersonal computing, each person is the center of their indyweb universe. Through the discoverability built into the Indyweb, anything of immediate salience is surfaced to your private hub. No applications can use your data unless you give exact permission on which data to use and how it shall be used. Each user sets the condition for their data usage. Instead of a user's data stored in silos of servers all over the web as is current practice, any data you generate, in conversation, media or data files is immediately accessible on your own Indyhub.

      Indyweb supports symmathesy, the exchange of ideas based on an appropriate epistemological model that reflects how human INTERbeings learn as a dynamic interplay between individual and collective learning. Furthermore, all data that participants choose to share is immutably stored on content addressable web3 storage forever. It is not concentrated on any server but the data is stored on the entire IPFS network:

      "IPFS works through content adddressibility. It is a peer-to-peer (p2p) storage network. Content is accessible through peers located anywhere in the world, that might relay information, store it, or do both. IPFS knows how to find what you ask for using its content address rather than its location.

      There are three fundamental principles to understanding IPFS:

      Unique identification via content addressing Content linking via directed acyclic graphs (DAGs) Content discovery via distributed hash tables (DHTs)" (Source: https://docs.ipfs.io/concepts/how-ipfs-works/)

      The privacy, scalability, discoverability, public immutability and provenance of the public Indyweb makes it ideal for supporting hyperconversations that emerge tomorrows collectively emergent solutions. It is based on the principles of thought augmentation developed by computer industry pioneers such as Doug Englebart and Ted Nelson who many decades earlier in their prescience foresaw the need for computing tools to augment thought and provide the ability to form Network Improvement Communities (NIC) to solve a new generation of complex human challenges.

    1. Maybe Mozilla could buy up Glitch and integrate it natively inside Firefox? Maybe BeakerBrowser will get enough traction and look beyond the P2P web? Maybe the Browser Company will do something like this?

      Before Keybase died, I had hopes that they would do something kind of like this. It'd work by installing worker services in the Keybase client and/or also allow you to connect to network-attached compute like AWS or DigitalOcean (or some Keybase-operated service) to seamlessly process worker requests when your laptop was offline. The main draw would be a friendly UI in the Keybase client for managing your workers. Too bad!

  8. Apr 2022
  9. Mar 2022
    1. The flotsam and jetsam of our digital queries and transactions, the flurry of electrons flitting about, warm the medium of air. Heat is the waste product of computation, and if left unchecked, it becomes a foil to the workings of digital civilization. Heat must therefore be relentlessly abated to keep the engine of the digital thrumming in a constant state, 24 hours a day, every day.

      "Cloud Computing" has a waste stream, and one of the waste streams is heat exhaust from servers. This is a poetic description of that waste stream.

  10. Feb 2022
    1. 9/8g Hinter der Zettelkastentechnik steht dieErfahrung: Ohne zu schreiben kann mannicht denken – jedenfalls nicht in anspruchsvollen,selektiven Zugriff aufs Gedächtnis voraussehendenZusammenhängen. Das heißt auch: ohne Differenzen einzukerben,kann man nicht denken.

      Google translation:

      9/8g The Zettelkasten technique is based on experience: You can't think without writing—at least not in contexts that require selective access to memory.

      That also means: you can't think without notching differences.

      There's something interesting about the translation here of "notching" occurring on an index card about ideas which can be linked to the early computer science version of edge-notched cards. Could this have been a subtle and tangential reference to just this sort of computing?

      The idea isn't new to me, but in the last phrase Luhmann tangentially highlights the value of the zettelkasten for more easily and directly comparing and contrasting the ideas on two different cards which might be either linked or juxtaposed.


      Link to:

      • Graeber and Wengrow ideas of storytelling
      • Shield of Achilles and ekphrasis thesis

      • https://hypothes.is/a/I-VY-HyfEeyjIC_pm7NF7Q With the further context of the full quote including "with selective access to memory" Luhmann seemed to at least to make space (if not give a tacit nod?) to oral traditions which had methods for access to memories in ways that modern literates don't typically give any credit at all. Johannes F.K .Schmidt certainly didn't and actively erased it in Niklas Luhmann’s Card Index: The Fabrication of Serendipity.

    1. It was not until the 14th century that scientists created the first sophisticated astronomical clocks.
    2. the first precision-geared mechanism known is a relatively simple—yet impressive for the time—geared sundial and calendar of Byzantine origin dating to about C.E. 600.

      The first known precision-geared mechanism is a sundial and calendar of Byzantine origin dating to circa 600 C.E.

  11. Jan 2022
    1. What is End User Computing (EUC)? Thanks to the progressive introduction of DevOps, attention to the role of the end user in software development and testing has increased significantly. It is now important to think like an end user when we develop and test software. After all, that's what we're all doing it for.

      What is End User Computing (EUC)? Thanks to the progressive introduction of DevOps, attention to the role of the end user in software development and testing has increased significantly. It is now important to think like an end user when we develop and test software. After all, that's what we're all doing it for.

    1. Zimmerman, M. I., Porter, J. R., Ward, M. D., Singh, S., Vithani, N., Meller, A., Mallimadugula, U. L., Kuhn, C. E., Borowsky, J. H., Wiewiora, R. P., Hurley, M. F. D., Harbison, A. M., Fogarty, C. A., Coffland, J. E., Fadda, E., Voelz, V. A., Chodera, J. D., & Bowman, G. R. (2021). SARS-CoV-2 simulations go exascale to predict dramatic spike opening and cryptic pockets across the proteome. Nature Chemistry, 13(7), 651–659. https://doi.org/10.1038/s41557-021-00707-0

    1. Here, the card index func-tions as a ‘thinking machine’,67 and becomes the best communication partner for learned men.68

      From a computer science perspective, isn't the index card functioning like an external memory, albeit one with somewhat pre-arranged linked paths? It's the movement through the machine's various paths that is doing the "thinking". Or the user's (active) choices that create the paths creates the impression of thinking.

      Perhaps it's the pre-arranged links where the thinking has already happened (based on "work" put into the system) and then traversing the paths gives the appearance of "new" thinking?

      How does this relate to other systems which can be thought of as thinking from a complexity perspective? Bacteria perhaps? Groups of cells acting in concert? Groups of people acting in concert? Cells seeing out food using random walks? etc?

      From this perspective, how can we break out the constituent parts of thought and thinking? Consciousness? With enough nodes and edges and choices of paths between them (or a "correct" subset of paths) could anything look like thinking or computing?

    1. The essay is most famous for its description of a hypothetical information-retrieval system, the Memex, a kind of mechanical Evernote, in which a person's every "book, record, or communication" was microfilmed and cataloged.

      It really kills me that there's so much hero worship of all this, particularly given the information processing power of index card systems at the time. I don't really think it took such a leap to image automating such a system given the technological bent of the time.

      Of course actually doing it is another thing, but conceptualizing the idea at the time would have be de rigueur.

  12. Dec 2021
    1. Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

      Edge Computing: What It Is and Why It Matters0 https://en.itpedia.nl/2021/12/29/edge-computing-what-it-is-and-why-it-matters/ Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

    1. Green computing, or green information technology, is the practice of environmentally sustainable computing. In this article we take a closer look at: * Greening the workplace. * A green workplace business case. * Opportunities to make Data Centers greener by: - ​​Other IT equipment. - The cooling of IT spaces. - The data center buildings.

      Green computing : Workplace and data center, a real business case https://en.itpedia.nl/2021/12/11/green-computing-werkplek-datacenter-business-case/ Green computing, or green information technology, is the practice of environmentally sustainable computing. In this article we take a closer look at: Greening the workplace. A green workplace business case. * Opportunities to make Data Centers greener by: - ​​Other IT equipment. - The cooling of IT spaces. - The data center buildings.

    1. In § 3, I explain that to have a life of its own, a card index must be provid-ed with self-referential closure.

      In order to become a free-standing tool, the card index needed to have self-referential closure.

      This may have been one of the necessary steps for the early ideas behind computers. In addition to the idea of a clockwork universe, the index card may have been a step towards early efforts at creating the modern computer.

  13. Nov 2021
    1. Do you have a high-quality and almost irresistible application in your bag? Your potential customers will not enjoy your app to the full if they cannot access it easily and quickly. That is why you need to consider how to choose the right SaaS hosting provider carefully. In this article, we will review different SaaS cloud hosting options and their strengths and weaknesses. Read on to find out how to make hosting for your SaaS application reliable, cost-effective, and scalable.

      Do you have a high-quality and almost irresistible application in your bag? Your potential customers will not enjoy your app to the full if they cannot access it easily and quickly. That is why you need to consider how to choose the right SaaS hosting provider carefully.

      In this article, we will review different SaaS cloud hosting options and their strengths and weaknesses. Read on to find out how to make hosting for your SaaS application reliable, cost-effective, and scalable.

    1. 10 Best SaaS Startups in 2022 for Your InspirationDmitryCEOStartupSaaSHomeBlogEntrepreneurship10 Best SaaS Startups in 2022 for Your InspirationPublishedJul 29, 2020UpdatedNov 5, 202111 min readToday, the SaaS industry is gaining momentum. According to research, 80% of businesses already use at least one SaaS application. Hence, building a SaaS company is currently a skyrocketing business idea. To help you find inspiration and launch the best SaaS startup ever, in this article you will find 10 great examples of SaaS startups you can learn from. All of them produce valuable and fast-growing products for now. Likewise, Growthlist and AngelList marked them as promising SaaS startups of 2021-2022. Without further ado, let’s take a closer look at them.

      Today, the SaaS industry is gaining momentum. According to research, 80% of businesses already use at least one SaaS application. Hence, building a SaaS company is currently a skyrocketing business idea.

      To help you find inspiration and launch the best SaaS startup ever, in this article you will find 10 great examples of SaaS startups you can learn from. All of them produce valuable and fast-growing products for now. Likewise, Growthlist and AngelList marked them as promising SaaS startups of 2021-2022.

      Without further ado, let’s take a closer look at them.

  14. Oct 2021
    1. As a result, cloud-rendering servers typically face utilization issues due to the need to plan for peak demand. A cloud-gaming service might require 75,000 dedicated servers for the Cleveland area at 8PM Sunday night, but only 4,000 at 4AM Monday. As a consumer, you can purchase a $400 GPU and let it sit offline as much as you want, but data-center economics are oriented toward optimizing for demand.

      Power generation metaphors; peak vs off-peak demand; can off-peak generation be stored / repurposed? What would a computing power battery look like?

    2. And even at ultra-low latency, it makes little sense to stream (versus locally process) AR data given the speed at which a camera moves and new input data is received (i.e. literally the speed of light and from only a few feet away). Given the intensive computational requirements of AR, it’s therefore likely our core personal/mobile devices will be able to do a ‘good enough’ job at most real-time rendering.

      Data streaming rates, computing power, video displays, etc, all the technologies will progress at different rates, and this differential will play a role in determining the best solution for advancing

    1. Ungar, around @1:00:00:

      I try to explain to people that the notion of compiler is broken. Of course I learned this from Smalltalk, but what we want to build is experiences--artificial realities that convince you that your source code is real. It's directly executed. There's no lag between editing and running[...] The environment stresses things in your program, not tools--which is another rant I have. It's this whole idea that we want to put you in an artificial reality--I got that from Randy [Smith]--in which it's easy and natural and low-cognitive-burden to get the computer to do what you want it to do, rather than running language translators that turn weird strings of text into bits the machine can run

    1. Leading SaaS Trends for 2021 You Shouldn’t MissDmitryChief Executive OfficerSaaSTrendsHomeBlogTechnologyLeading SaaS Trends for 2021 You Shouldn’t MissDec 1, 202012 min readNowadays, different kinds of businesses are extensively moving to the cloud. O’Reilly reports that 88% of the respondent companies had used cloud services before lockdown and expect their further growth by Q2 2021. Therefore, SaaS application development looks also like a profitable venture today. Yet, to stay afloat in the cloud arena, you need to arm your offering with precise technology and fresh tools. In other words, you need to keep your eye on the future of SaaS. To help you deploy the promptest cloud solutions, in this post, I collected the top SaaS trends for 2021.

      SaaS application development looks also like a profitable venture today. Yet, to stay afloat in the cloud arena, you need to arm your offering with precise technology and fresh tools. In other words, you need to keep your eye on the future of SaaS.

      To help you deploy the promptest cloud solutions, in this post, I collected the top SaaS trends for 2021.

  15. Sep 2021
    1. From my point of view, this approach will help you to write cleaner code. Also, it will help to maintain the project. For instance, moving a file from the current directory to another will cause fewer problems, because every file uses an absolute path instead of a relative one. Last but not least, it helps you during development.
    1. This is not dumb at all. It is exceedingly common to use aliases. It's not about being lazy, it's about writing portable code.
  16. Aug 2021
    1. Rubyists don't call these things annotations. One of the things I like doing is to find common techniques that cross languages, for me this is a common technique and 'annotation' seems like a good generic word for it. I don't know if Rubyists will agree.
    1. Grötschel, an expert in optimization, observes that a benchmark production planning model solved using linear programming would have taken 82 years to solve in 1988, using the computers and the linear programming algorithms of the day. Fifteen years later – in 2003 – this same model could be solved in roughly 1 minute, an improvement by a factor of roughly 43 million. Of this, a factor of roughly 1,000 was due to increased processor speed, whereas a factor of roughly 43,000 was due to improvements in algo-rithms
    1. SaaS vs PaaS vs IaaS: Choosing the Best Cloud Computing ModelAlina NechvolodE-Commerce & SaaS StrategistSaaSHomeBlogTechnologySaaS vs PaaS vs IaaS: Choosing the Best Cloud Computing ModelJun 12, 202011 min readThe usage of cloud computing has long been a standard practice for businesses. More and more companies harness the power of the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) models. Thus, they can save on hardware and protect their sensitive information from hacking and internal data theft. In this article, we discuss the SaaS vs PaaS vs IaaS models and define their principal differences. What are the core parameters for comparison? They include primary characteristics, usage, the main benefits, and drawbacks.

      The usage of cloud computing has long been a standard practice for businesses. More and more companies harness the power of the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) models. Thus, they can save on hardware and protect their sensitive information from hacking and internal data theft.

      In this article, we discuss the SaaS vs PaaS vs IaaS models and define their principal differences. What are the core parameters for comparison? They include primary characteristics, usage, the main benefits, and drawbacks.

    1. What seems more problematic is divergence between drivers. For example, capybara-webkit and poltergeist support several of the same things. Let's take resizing the window as an example. In capybara-webkit this is page.driver.resize_window(x, y) and in poltergeist it's page.driver.resize(x, y). This means that if a user wants to switch from one to the other they have to change their code. Now I don't know if selenium does or doesn't support resizing the window, but supposing it doesn't I think there's still a lot of value in the capybara project deciding what the blessed API is, because then all the drivers that support that feature can implement it using the same API, increasing portability.
  17. Jul 2021
    1. The difference between PUT and POST is that PUT is idempotent: calling it once or several times successively has the same effect (that is no side effect), whereas successive identical POST requests may have additional effects, akin to placing an order several times.
    1. Idempotent just means that following a link twice has exactly the same effect on persistent state as clicking it once. It does not mean that following the link must not change state, just that after following it once, following it again must not change state further. There are good reasons to avoid GET requests for changing state, but that’s not what idempotent means.
    1. as a more experienced user I know one can navigate much more quickly using a terminal than using the hunt and peck style of most file system GUIs

      As an experienced user, this claim strikes me as false.

      I often start in a graphical file manager (nothing special, Nautilus on my system, or any conventional file explorer elsewhere), then use "Open in Terminal" from the context menu, precisely because of how much more efficient desktop file browsers are for navigating directory hierarchies in comparison.

      NB: use of a graphical file browser doesn't automatically preclude keyboard-based navigation.

    1. They were input laboriously by hand either on punched cards, with each card holding up to eighty characters or one line of text (uppercase letters only), or on paper tape, where lower-case letters were perhaps possible but which could not be read in any way at all by a human being. Father Busa has stories of truckloads of punched cards being transported from one center to another in Italy. All computing was carried out as batch processing, where the user could not see the results at all until printout appeared when the job had run.

      It may be of interest to some that the first 'computer' used punch cards and tape; it was the Jacquard loom. Here is a link to information about the Jacquard loom and it's influence on computing. http://www.columbia.edu/cu/computinghistory/jacquard.html

  18. Jun 2021
  19. May 2021
    1. I want to avoid nginx overhead (especially if they have tons of alias and rewrites) for in-server communication. Basically, you can have sveltekit server, backend server and nginx server, in that case, communicate inside your internal network will be very expensive like: browser->nginx server(10.0.0.1)->sveltekit server(10.0.0.3)->nginx server(10.0.0.1)->backend server(10.0.0.2) instead just: browser->nginx server(10.0.0.1)->sveltekit server(10.0.0.3)->backend server(10.0.0.2)
    1. Why are there so many programming languages and frameworks? Everyone has their own opinion on how something should be done. Some of these systems, like AOL, Yahoo, etc... have been around for a decade, and probably not updated much.
    2. Simple fact is that HTML support is different in them because mail clients are so old, or others are allowed to operate in browsers where not all CSS or even HTML can be applied in a secure manner. Older clients have outdated browsers that you'll likely NEVER see brought up to standards; what with Opera's standalone aging like milk, and thunderbird lagging behind the firefox on which it's even built. Don't even get me STARTED on older clients like Eudora or Outlook.
  20. Apr 2021
    1. In many computing contexts, "TTY" has become the name for any text terminal, such as an external console device, a user dialing into the system on a modem on a serial port device, a printing or graphical computer terminal on a computer's serial port or the RS-232 port on a USB-to-RS-232 converter attached to a computer's USB port, or even a terminal emulator application in the window system using a pseudoterminal device.

      It's still confusing, but this at least helps/tries to clarify.

    1. Some add a wildcard character to the name to make an abbreviation like "Un*x"[2] or "*nix", since Unix-like systems often have Unix-like names such as AIX, A/UX, HP-UX, IRIX, Linux, Minix, Ultrix, Xenix, and XNU. These patterns do not literally match many system names, but are still generally recognized to refer to any UNIX system, descendant, or work-alike, even those with completely dissimilar names such as Darwin/macOS, illumos/Solaris or FreeBSD.
  21. Mar 2021
    1. Athena is still in production use at MIT. It works as software (currently a set of Debian packages)[2] that makes a machine a thin client, that will download educational applications from the MIT servers on demand
  22. Feb 2021
    1. With the introduction of CPUs which ran faster than the original 4.77 MHz Intel 8088 used in the IBM Personal Computer, programs which relied on the CPU's frequency for timing were executing faster than intended. Games in particular were often rendered unplayable. To provide some compatibility, the "turbo" button was added. Engaging turbo mode slows the system down to a state compatible with original 8086/8088 chips.
    1. Space: Suppose we had infinite memory, then cache all the data; but we don't so we have to decide what to cache that is meaningful to have the cache implemented (is a ??K cache size enough for your use case? Should you add more?) - It's the balance with the resources available.
  23. Jan 2021
    1. Prior to the adoption of the Cross-Origin Resource Sharing (CORS) standard, JSONP was the only option to get a JSON response from a server of a different origin.
  24. Dec 2020
    1. By understanding the definition of cloud computing, you must have guessed why healthcare institutes would be interested in upgrading their data management systems with this trending technology.

      Cloud computing in healthcare is bringing many big changes to the medical industry. Make sure you don't fall behind on this revolution.

  25. Nov 2020
    1. Portable... your .name address works with any email or web service. With our automatic forwarding service on third level domains, you can change email accounts, your ISP, or your job without changing your email address. Any mail sent to your .name address arrives in any email box you choose.
    1. In July 2010, Microsoft let go Jimmy Schementi, one of two remaining members of the IronRuby core team, and stopped funding the project.[19][20] In October 2010 Microsoft announced the Iron projects (IronRuby and IronPython) were being changed to "external" projects and enabling "community members to make contributions without Microsoft's involvement or sponsorship by a Microsoft employee".
    1. will only apply up the chain

      Should this "up the chain" be "down the chain"?

      In terms of a tree, I think of the caller/consumer/thing that imports this file as "up" and the things that I call/import as "down".

      That is more consistent with a tree, but not a stack trace (or any stack), I suppose, which has most recently called thing at the top ("up"), and the consumer of that at the bottom ("down").

    1. React didn't support rendering arrays without a wrapper for most of its existence 16.0.0 (September 26, 2017): Components can now return arrays and strings from render.
  26. Oct 2020
    1. Final Form makes the assumption that your validation functions are "pure" or "idempotent", i.e. will always return the same result when given the same values.
    2. Final Form makes the assumption that your validation functions are "pure" or "idempotent", i.e. will always return the same result when given the same values. This is why it doesn't run the synchronous validation again (just to double check) before allowing the submission: because it's already stored the results of the last time it ran it.
    1. In agent-oriented programming the antonym is depender, though in general usage the common term dependent is used instead. There is no common language equivalent for dependee', however – other metaphors are used instead, such as parent/child. The circumlocutions “A depends on B” and “B is depended on by A” are much more common in general use than “A is the depender, B is the ' dependee ”.
    1. I think it is still problematic since many people in the software industry use and understand "dependency" to mean the thing on which something depends (as indicated by this and other answers). So saying "being a dependency" indicates to those people the thing on which something depends, which is the opposite of the way I think of it (and what it means according to the dictionary).
    1. There may be times that required owned elements are missing, for example, while editing or while loading a data set. When a widget is missing required owned elements due to script execution or loading, authors MUST mark a containing element with aria-busy equal to true. For example, until a page is fully initialized and complete, an author could mark the document element as busy.

      "busy" here seems to = "loading" in most other programming contexts

    1. Longstanding controversy surrounds the meaning of the term "hacker". In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks[5] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).
    1. In React 0.12 time frame we did a bunch of small changes to how key, ref and defaultProps works. Particularly, they get resolved early on in the React.createElement(...) call. This made sense when everything was classes, but since then, we've introduced function components. Hooks have also make function components more prevalent. It might be time to reevaluate some of those designs to simplify things (at least for function components).
    1. Node doesn't have a DOM available. So in order to render HTML we use string concatenation instead. This has the fun benefit of being quite efficient, which in turn means it's great for server rendering!
    1. Facebook’s React has an optional language extension that enables you to embed HTML inside JavaScript. This extension can make your code more concise, but it also breaks compatibility with the rest of the JavaScript ecosystem. ECMAScript 6 will have template strings [1], which enable you to implement JSX (or something close to it) inside the language.