- Dec 2023
-
docdrop.org docdrop.org
-
there are good stories and bad stories uh good stories I mean this is very on a very very simplistic level but good stories 00:13:23 benefit people and bad stories can create you know Wars and genocides and and the most terrible crimes in history were committed in the name of some fictional story people believed very few 00:13:38 Wars in history are about objective material things people think that we fight like wolves or chimpanzees over food and territory this is not the case 00:13:52 at least not in the modern world if I look for instance at my country which is at present in at War the Israeli Palestinian conflict is not really about food and territory there is enough food 00:14:04 between the Jordan and Mediterranean to feed everybody there is enough territory to build houses and schools for everybody but you have two conflicting stories or more than two conflicting 00:14:17 stories in the minds of different people and they can't agree on the story they can't find a common story that everybody would be happy with and this is the the Deep source of the conflict
-
for: stories - consequences of good and bad stories, inisight - war and genocide - when people violently disagree on stories,
-
insight
- disagreement of stories
- not just wars, but climate change skeptics believe a different story than environmentalists
- hyperobjects and evolution play a role as well in what we believe
- disagreement of stories
-
-
-
developers.google.com developers.google.com
-
A personalized button gives users a quick indication of the session status, both on Google's side and on your website, before they click the button. This is especially helpful to end users who visit your website only occasionally. They may forget whether an account has been created or not, and in which way. A personalized button reminds them that Sign In With Google has been used before. Thus, it helps to prevent unnecessary duplicate account creation on your website.
first sighting: sign-in: problem: forgetting whether an account has been created or not, and in which way
-
-
developers.google.com developers.google.com
-
Warning: Do not accept plain user IDs, such as those you can get with the GoogleUser.getId() method, on your backend server. A modified client application can send arbitrary user IDs to your server to impersonate users, so you must instead use verifiable ID tokens to securely get the user IDs of signed-in users on the server side.
-
- Nov 2023
-
www.intricatecloud.io www.intricatecloud.io
-
If I wanted to integrate this with an existing login system, “signing out” would mean signing out of my own application (and not out of my Google account).
-
-
developers.google.com developers.google.com
-
A personalized button reminds end users that they have used Sign in with Google before, and thus helps to prevent unnecessary duplicate account creation on your website. This is especially helpful to end users who visit your website only occasionally. They may forget the login methods they used.
-
-
github.com github.com
-
This is a shell script that essentially does the same as the flaky test: #!/bin/sh cat <<EOS > m.rb module M sleep 0.5 def self.works? true end end EOS ruby -I. <<EOS autoload :M, "m" t = Thread.new { M } p M.works? EOS rm m.rb
Same thing in another language....
Tags
Annotators
URL
-
-
docdrop.org docdrop.org
-
-
for climate change - wartime mobilization, interview - Seth Klein - A Good War
-
summary
- An interview with activist Seth Klein on his book: A Good War. Klein studied how WWI and WWII stimulated a rapid mobilization of Canada with an eye to translating the same methods to combating climate change.
-
-
-
www.sethklein.ca www.sethklein.ca
-
-
for: Book: A Good War, Seth Klein, Climate Emergency - mobilizing Canada
-
title: A Good War: Mobilizing Canada for the Climate Emergency
- author: Seth Klein
- date: 2020
-
-
-
docdrop.org docdrop.org
-
there's an interesting book by Seth Klein Naomi Klein's brother the 00:56:39 just for about creating a mobilizing federal government provincial um almost a state of emergency to address 00:56:53 climate change uh and and that would if you had extraordinary powers then you could basically say well electric vehicles and 00:57:04 more cars is not the solution and we're gonna go in a different area we're going to secure for example the water supply we're going to secure the air supply 00:57:16 we're going to reduce emissions in a very structured way
- reference
- A Good War: Mobilizing Canada for the Climate Emergency
- reference
Tags
Annotators
URL
-
-
github.com github.com
-
One more example of a simple approach to this that might help a lot too is add a PORO generator. It could be incredibly basic - rails g poro MyClass yields class MyClass end But by doing that and landing the file in the app/models directory, it would make it clear that was the intended location instead of lib.
-
I think the real question then becomes: Where do Ruby classes, who I can't find a meaningful folder in app
-
lib/ is intended to be for non-app specific library code that just happens to live in the app for now (usually pending extraction into open source or whatever).
-
Everything has a place so do better and find it. There is a certain belief that everything within app should be organized into functionally-named directories and any files placed in app/lib actually belongs in app/services or app/interactors or app/models or someplace if the developers just tried harder. The implication is that developers are bad developers if they don’t yet know what kind of constant they have and where its forever home should be. I reject this. Over the lifespan of an application, there will be constants that have not yet found their functional kin, if those kin ever come to exist at all; sometimes you simply need some code and a place to put it. app/lib can be the convention for where those constants can live temporarily or as long as necessary. Autoloading is really nice, let’s treat them to it.
-
It is confusing that app/lib is named similarly to lib . I agree, but it is not uncommon to have directories with the same name and similar function nested under different contexts. I believe developers can handle this complexity. Most similarly, Linux has lib and usr/lib . Within a new Rails app, there are many such directories that are manageable: app/assets and lib/assets (sometimes even vendor/assets too) app/javascript and vendor/javascript storage and tmp/storage config and app/assets/config app/controllers and app/javascript/controllers
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
triggering homologous recombination and creating genetic instability10,11,12,13
-
-
docdrop.org docdrop.org
-
my favorite questions are ones that take 00:23:48 them out of their daily experience and get them 30,000 feet looking at their life and so it's like what crossroads are you at
- for: how to ask good questions
-
I had a student uh a couple years ago two years ago named 00:17:41 Jillian Sawyer and Jillian's uh dad died of pancreatic cancer uh while she was in college
- for: good story - accompaniment
-
when Jimmy greets 00:15:11 anybody he's greeting someone anybody made in the image of God he's looking into the face of God he's looking at somebody with the in a soul of infinite value and dignity he's looking at somebody so important that 00:15:24 Jesus was willing to die for that person now you could be Christian Jewish Muslim Muslim Buddhist atheist agnostic I don't care but greeting each person you meet with that level of reverence and respect 00:15:36 is a precondition for seeing them well
- for: good story - everyone is sacred
-
I was in Waco Texas several years ago and I was having lunch with a woman named laru dorsy and Mrs dorsy was a teacher most of her career and she presented herself to me as this Stern disciplinarian sort 00:14:19 of a drill sergeant type
- for: good story - illuminators - pastor
-
Bell labs they 00:12:40 had a bunch of researchers and some of them were just more creative and Innovative than others and they wanted to know why
- for: good story - illuminators - Bell labs
-
- Oct 2023
-
auth0.com auth0.com
-
after they log out
They're not even consistent within this same page.
-
after they logout
They're not even consistent within this same page.
-
-
journals-asm-org.ezproxy.rice.edu journals-asm-org.ezproxy.rice.edu
-
Well written discussion section with one central idea per paragraph appearing in the first line of the para!
-
-
claudemariottini.com claudemariottini.com
-
There are several occasions where the massebah is not associated with pagan worship. When the massebah is associated with the worship of Yahweh, the massebah is accepted as a valid expression of commitment to Yahweh.
Massebah for pagan worship: - Exodus 23:24 (https://hypothes.is/a/r3m5QmyDEe6SC8eLYcJE1Q) - Hosea 10:1 (https://hypothes.is/a/4PK2GGyDEe6wZg_r2YpVCA ) - 2 Kings 18:4 - 2 Kings 23:14
Massebah for worship of Yahweh: - Genesis 28:18 Jacob's pillow (https://hypothes.is/a/NF5p8Gx6Ee65Rg_J4tfaMQ)<br /> - Genesis 31:44-45 Jacob and Laban's covenant - Exodus 24:4 - Joshua 24:25-27
-
-
ell.stackexchange.com ell.stackexchange.com
-
And as others have pointed out, there is potential for ambiguity: if A is dependent on B, then a dependence or dependency (relationship) exists; but referring to either A or B as the dependency demands context.
"demands context" :)
-
There are certainly cases where you can use dependency and cannot use dependence: for example "The UK's overseas dependencies", or "This software releases has dependencies on Unix and Java". So if the dependent things are discrete and countable, it should definitely be "dependency".
-
-
docdrop.org docdrop.org
-
on the traditional empiricist account we do not have direct access to the facts of the external world 00:11:03 that is we do not experience externality directly but only immediately not immediately but immediately because between us and the external world are those what do you call them oh yes 00:11:18 sense organs and so the question is how faithfully they report what is going on out there well to raise the question how faithful is the sensory report 00:11:30 of the external world is to assume that you have some reliable non-sensory way of answering that question that's the box you can't get out of and so there is always this gap 00:11:42 between reality as it might possibly be known by some non-human creature and reality as empirically sampled by the senses whose limitations and distortions are very well 00:11:56 known but not perfectly classified or categorized or or measured
-
for: good explanation: empiricism, empiricism - knowledge gap, quote, quote - Dan Robinson, quote - philosophy, quote - empiricism - knowledge gap, Critique of Pure Reason - goal 1 - address empiricism and knowledge gap
-
good explanation : empiricism - knowledge gap
-
quote
- on the traditional empiricist account
- we do not have direct access to the facts of the external world
- that is we do not experience externality directly but only MEDIATELY, not immediately but MEDIATELY
- because between us and the external world are those what do you call them oh yes, sense organs
- and so the question is how faithfully they report what is going on out there
- To raise the question how faithful is the sensory report of the external world
- is to assume that you have some reliable non-sensory way of answering that question
- That's the box you can't get out of and so there is always this gap between
- reality as it might possibly be known by some non-human creature and
- reality as empirically sampled by the senses
- whose limitations and distortions are very well
known
- but not perfectly classified or categorized or or measured
- whose limitations and distortions are very well
known
- on the traditional empiricist account
-
Comment
- Robinson contextualizes the empiricist project and gap thereof, as one of the 4 goals of Kant's Critique of Pure Reason.
- Robinson informally calls this the "Locke" problem, after one of the founders of the Empiricist school, John Locke.
- Robinson also alludes to a Thomas Reed approach to realism that contends that we don't experience reality MEDIATELY, but IMMEDIATELY, thereby eliminating the gap problem altogether.
- It's interesting to see how modern biology views the empericist's knowledge gap, especially form the perspective of the Umwelt and Sensory Ecology
-
Tags
- good explanation
- The Locke problem
- Thomas Reed
- John Locke - empiricism
- Critique of Pure Reason - goal - resolve empiricism and its knowledge gap
- quote - empiricism - knowledge gap
- quote
- quote - Ben Robinson
- good explanation - empiricism
- Critique of Pure Reason - empiricism knowledge gap
Annotators
URL
-
- Sep 2023
-
-
54:30 Max utopian in his head, trust in random people
- see index zk on Apollonian and Dionysian theory (idealism, good or bad?)
57:00 inherently, people are good, but they get corrupted (good and evil)
57:44 “there is some light” (life can be good): see zk 9 section on light & darkness
-
-
modoboa.org modoboa.orgModoboa1
-
use the services of free email providers (Gmail, Live, Yahoo...) which are limited and your data is used for commercial purposes. Install your own email server, which requires important technical knowledge to setup and configure the system.
Tags
Annotators
URL
-
-
unix.stackexchange.com unix.stackexchange.com
-
Using quotes for i in "$(cat $1)"; results in i being assigned the whole file at once. What should I change?
-
-
sendgrid.com sendgrid.com
-
In order to enable MPP, users must have Apple devices, configure their email account to use Apple Mail applications, update their operating system to the latest version, and opt into MPP.
-
-
rubyreferences.github.io rubyreferences.github.io
-
Before Ruby 3.2, there core class Time provided no way to to get back a Time value from any serialization, including even simple Time#inspect or #to_s. The Time.parse provided by standard library time (not core functionality, doesn’t work with explicit require 'time'), and tries to parse every imaginable format, while Time.new with string is stricter.
-
string ones are those most of the Rubyists remember.
-
Low-level processing of strings (like networks middleware, or efficient search algorithms, or packing/unpacking) might need an ability to operate on a level of single bytes, regardless of original string’s encoding. It is especially important while handling variable-length encodings like UTF-8. Before methods introduction, the only way to perform byte-level processing was to forcing string encoding into ASCII-8BIT, process, and then force encoding back.
-
There are many simple use cases like pagination (when “21 items / 10 per page” should yield “3 pages”).
-
-
bugs.ruby-lang.org bugs.ruby-lang.org
-
For me, I don't have an issue, but there was one syntax situation I found awkward: I need to sometimes know whether it is a class or a module that I am modifying. So I may have code: module Foo module Bar class Baz versus: class Foo::Bar::Baz It's not a huge issue, but ruby would yield an error if I specify a class or module incorrectly (which can happen if you spread code out into different .rb files, so I understand why there is an error message shown, to avoid accidents). But I then also wondered why I have to care whether it is a module or class, if my primary goal is to modify something, such as by adding a method. If I want to add a method: def foobar; end then I really should never be required to have to know whether I am modifying a class or a module.
Tags
Annotators
URL
-
-
documentation.mailgun.com documentation.mailgun.com
-
We dream of a day when IP reputation does not matter and we can rely on domain reputation, but unfortunately we are not there yet.
-
- Aug 2023
-
github.com github.com
-
The point of acts_as_paranoid is keeping old versions around, not really destroying them, so you can look at past state, or roll back to past version. Do you consider the attached file part of the state you should be able to look at? If you roll back to past version, should it have it's attachment there too, in the restored version?
Tags
Annotators
URL
-
-
blog.jerrybrito.com blog.jerrybrito.com
-
After all, Luhmann himself didn’t have automatic backlinking. He had to manually add the cross-references to his analog notecards, and yet the system allowed him to write dozens of books and papers. Indeed, as Christian from Zettelkasten.de has said, automation might actually be an impediment to the cogitation and deep understanding the method seeks to engender.
-
-
github.com github.com
-
ActiveStorage has a different approach than what is suggested by @dhh here. The idea there seems to be to rule out a default and to explicitly set ActiveStorage::Current.url_options or by include ActiveStorage::SetCurrent. I don't understand why and asked about it in the Rails Forum. Maybe someone here can point out why we don't use a sensible default in ActiveStorage?
-
-
www.theguardian.com www.theguardian.com
-
Todo: Climate Reanalyzer
Tags
- expert: Matthew England
- process: ocean heating
- institution: NOAA
- institution: British Antarctic Survey
- expert: Ben Webber
- project: OISST
- expert: Mike Meredith
- expert: Mark Maslin
- process: ocean warming
- expert: Simon Good
Annotators
URL
theguardian.com/environment/2023/apr/26/accelerating-ocean-warming-earth-temperatures-climate-crisis -
- Jul 2023
-
-
The distinction doesn't refer to the files _contents_ but how to the file is _treated_ when it is being read or written. In "rb"/"wb" modes files are left how they are, in "r"/"w" modes Windows programmers get line ends "\r\n" translated into "\n" what disturbs file positions and string lengths.
-
-
docdrop.org docdrop.org
-
How do we end up designing systems that attract all of the right people into power
- key question
- knowing the self-selection effect, how do we design better systems that end up putting good people in positions of power?
- key question
Tags
Annotators
URL
-
-
community.cisco.com community.cisco.com
-
I understand Duo follows the spec and attempts to make life easier by giving users the full 30 seconds, but unfortunately service providers don’t honor that recommendation, which leads to lockouts and a bunch of calls to our 1st line teams. You can’t tell users to stop using {platform}, but we can tell them to switch TOTP providers.
-
-
www.codewithjason.com www.codewithjason.com
-
The way to do this with Capybara is documented on StackOverflow but, unfortunately, the answer there is buried in a little too much noise. I decided to create my own tiny noise-free blog post that contains the answer. Here it is:
-
-
-
Is the column a boolean column? (i.e. what does User.columns_hash[:admin_created].type return?)
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
approaches, which typically encapsulate bacteria in hydrogels, have produced deployable optical sensors for explosives14, heavy metals15 and chemical inducers16,17
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
current state-of-the-art whole-cell biosensors for field applications34,35, such as hydrogel-based20,36 and liquid-in-a-cartridge devices37
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
Translocation to a cell’s surface utilizes a signal peptide (for inner membrane translocation) and AIDAc as an outer membrane autotransporter pore
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
Making MoneySerializer reloadable would be confusing, because reloading an edited version would have no effect on that class object stored in Active Job.
-
-
www.nature.com www.nature.com
-
AHL communication modules with functional devices built from the biological components of the las18, tra18, rpa18, rhl19, cin19 and esa20 quorum-sensing systems
-
- Jun 2023
-
www.soulcutter.com www.soulcutter.com
-
I’ve heard-suggested that ActiveSupport, which does a ton of monkey-patching of core classes, would make potentially-nice refinements. I don’t hold this opinion strongly, but I disagree with that idea. A big value proposition of ActiveSupport is that it is “omnipresent” and sets a new baseline for ruby behaviors - as such, being global really makes the most sense. I don’t know that anyone would be pleased to sprinkle using ActiveSupport in all their files that use it - they don’t even want to THINK about the fact that they’re using it.
-
-
interblah.net interblah.net
-
What I do care about, though, is that we might start to accept and adopt opinions like “that feature is bad”, or “this sucks”, without ever pausing to question them or explore the feature ourselves.
-
If we hand most, if not all responsibility for that exploration to the relatively small number of people who talk at conferences, or have popular blogs, or who tweet a lot, or who maintain these very popular projects and frameworks, then that’s only a very limited perspective compared to the enormous size of the Ruby community.
-
-
www.frontiersin.org www.frontiersin.org
-
programming environmental microbes have been applied to a wide range of organisms. Some examples of newly-programmable microbes include
good citations of engineering non-model organisms
-
-
www.biorxiv.org www.biorxiv.org
-
To date, serine integrases have not been used extensively in plant systems
although they have been shown to work in principle in Arabidopsis23, Nicotiana benthamiana2421, barley25 and wheat26
-
-
stackoverflow.com stackoverflow.com
-
Have you ever: Been disappointed, surprised or hurt by a library etc. that had a bug that could have been fixed with inheritance and few lines of code, but due to private / final methods and classes were forced to wait for an official patch that might never come? I have. Wanted to use a library for a slightly different use case than was imagined by the authors but were unable to do so because of private / final methods and classes? I have.
-
I'm not saying never mark methods private. I'm saying the better rule of thumb is to "make methods protected unless there's a good reason not to".
-
Marking methods protected by default is a mitigation for one of the major issues in modern SW development: failure of imagination.
-
If it's dangerous, note it in the class/method Javadocs, don't just blindly slam the door shut.
-
Been disappointed, surprised or hurt by a library etc. that was overly permissive in it's extensibility? I have not.
-
The old wisdom "mark it private unless you have a good reason not to" made sense in days when it was written, before open source dominated the developer library space and VCS/dependency mgmt. became hyper collaborative thanks to Github, Maven, etc. Back then there was also money to be made by constraining the way(s) in which a library could be utilized. I spent probably the first 8 or 9 years of my career strictly adhering to this "best practice". Today, I believe it to be bad advice. Sometimes there's a reasonable argument to mark a method private, or a class final but it's exceedingly rare, and even then it's probably not improving anything.
Tags
- extensibility
- +0.9
- can't think of everything
- only supporting some/specific/limited use cases
- good point
- allow others take the responsibility/risk if they want; don't just rigidly shut the door to even the possibility
- please elaborate
- failure of imagination
- software development
- member visibility: make it protected unless you have a good reason not to
- rule of thumb
- not:
- annotation meta: may need new tag
- inextensible
- not extensible enough
- bad advice
- rigidness/inflexibility
- well-intentioned protections causing pain or overly complicated workarounds
- never say never
- don't be so rigid
- member visibility: make it private unless you have a good reason not to
- disappointing
- member visibility
- what does this actually mean?
- you can't know for sure
- dangerous (programming)
- can't predict the future
- reasonable defaults
- surprising
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
Are protected members/fields really that bad? No. They are way, way worse. As soon as a member is more accessible than private, you are making guarantees to other classes about how that member will behave. Since a field is totally uncontrolled, putting it "out in the wild" opens your class and classes that inherit from or interact with your class to higher bug risk. There is no way to know when a field changes, no way to control who or what changes it. If now, or at some point in the future, any of your code ever depends on a field some certain value, you now have to add validity checks and fallback logic in case it's not the expected value - every place you use it. That's a huge amount of wasted effort when you could've just made it a damn property instead ;) The best way to share information with deriving classes is the read-only property: protected object MyProperty { get; } If you absolutely have to make it read/write, don't. If you really, really have to make it read-write, rethink your design. If you still need it to be read-write, apologize to your colleagues and don't do it again :) A lot of developers believe - and will tell you - that this is overly strict. And it's true that you can get by just fine without being this strict. But taking this approach will help you go from just getting by to remarkably robust software. You'll spend far less time fixing bugs.
In other words, make the member variable itself private, but can be abstracted (and access provided) via public methods/properties
-
Exposing properties gives you a way to hide the implementation. It also allows you to change the implementation without changing the code that uses it (e.g. if you decide to change the way data are stored in the class)
-
Anything that isn't explicitly enforced by contract is vulnerable to misunderstandings. It's doing your teammates a great service, and reducing everyone's effort, by eliminating ambiguity and enforcing information flow by design.
-
Far more preferable is to minimize data structure so that it tends to be normalized and not to have inconsistent states. Then, if a member of a class is changed, it is simply changed, rather than damaged.
-
Another point is that properties are good in that you can place breakpoints in them to capture getting/setting events and find out where they come from.
Tags
- member visibility: make it private unless you have a good reason not to
- by design
- being explicit
- explicit interfaces
- avoid complexity
- +0.9
- normalizing data
- good point
- contract (programming)
- good idea
- misunderstanding
- encapsulation (programming)
- properties vs. direct access to instance variables
- eliminate ambiguity
- to make debugging easier
- using properties to abstract, encapsulate, and control access to private instance variables/data
- data flow
Annotators
URL
-
-
www.typescriptlang.org www.typescriptlang.org
-
Derived classes need to follow their base class contracts, but may choose to expose a subtype of base class with more capabilities. This includes making protected members public:
-
-
www.postgresql.org www.postgresql.org
-
Writing json_populate_record in the FROM clause is good practice, since all of the extracted columns are available for use without duplicate function calls.
-
- May 2023
-
stackoverflow.com stackoverflow.com
-
while I'm not as strongly against the above example code as the others, specifically because you did call it out as pseudocode and it is for illustrative purposes only, perhaps all of the above comments could be addressed by replacing your query = ... lines with simple query = // Insert case-sensitive/insensitive search here comments as that keeps the conversation away from the SQL injection topic and focuses on what you're trying to show. In other words, keep it on the logic, not the implementation. It will silence the critics.
-
I know this is an old question but I just want to comment here: To any extent email addresses ARE case sensitive, most users would be "very unwise" to actively use an email address that requires capitals. They would soon stop using the address because they'd be missing a lot of their mail. (Unless they have a specific reason to make things difficult, and they expect mail only from specific senders they know.) That's because imperfect humans as well as imperfect software exist, (Surprise!) which will assume all email is lowercase, and for this reason these humans and software will send messages using a "lower cased version" of the address regardless of how it was provided to them. If the recipient is unable to receive such messages, it won't be long before they notice they're missing a lot, and switch to a lowercase-only email address, or get their server set up to be case-insensitive.
-
-
en.wikipedia.org en.wikipedia.org
-
A flaw can become entrenched as a de facto standard. Any implementation of the protocol is required to replicate the aberrant behavior, or it is not interoperable. This is both a consequence of applying the robustness principle, and a product of a natural reluctance to avoid fatal error conditions. Ensuring interoperability in this environment is often referred to as aiming to be "bug for bug compatible".
-
-
blog.teknkl.com blog.teknkl.com
-
This doesn't make any sense, though. Once you recognize that the two may represent different addresses, you're arbitrarily choosing the first one in your system as the right one, when the second one is just as right. Just give up at that point and lowercase ’em.
which one should be considered the correct one?
-
Some say you should treat addresses as case-preserving as opposed to case-sensitive, meaning you don't change IStillUse@AOL.COM to istilluse@aol.com but you still consider it a dupe of iSTilLUSE@aol.com.
-
-
ux.stackexchange.com ux.stackexchange.com
-
Since using case insensitivity is so widespread, take their sign up email address and make it lower case. Whenever they try to log in, convert that to lowercase as well, for comparison purposes, when you go to see if the user exists. As far as sign up and sign in go, do a case insensitive comparison. If the person signs up as Steve@example.com, you'll still want to allow them to sign in later with steve@example.com or sTeVE@example.com.
-
But you should also keep track of the email address that they signed up with in a case sensitive fashion. Any time you send an email to them, be sure to send it with that original casing. This allows the email server to handle it however it feels like it needs to. So even though the person may always be signing in to your site with steve@example.com, if they signed up as Steve@example.com, you'll always send email to Steve@example.com, just to be safe.
-
-
-
we split the head from the hands, or isolate humane studies from practicallife, we unfortunately tend to suppose that a liberal cultural education is the rightof only an elite few—the heads. Don’t we all—and not just the socially advantaged“heads”—deserve an education that prioritizes human growth?
YES ABSOLUTELY!!!!
-
none of this means we should turn students and teachers intofunctionaries or serfs for, in Dewey’s words in Democracy and Education, a “feudaldogma of social predestination.”
Yes!
-
. The problem arises when institutions and policymakers assume,following the logic of the industrial model, that our primary and overriding edu-cational aim is thus to train students to fit the specifications of this existing infra-structure.
BARSSSSS
-
The mission of K–12 and higher educationis, in Wisconsin Gov. Scott Walker’s infamous words last year, “to develop humanresources to meet the state’s workforce needs.”
Ridiculous. But indicative of how much of the system is set up, in relaity
-
“A being of infinitescope,” she wrote, “must not be treated with an exclusive view to any one relation. . . . Give the soul free course. . . and the being will be fit for any and every relationto which it may be called.”1
Right, and that is particularly what is stripped away when people are only seen as employees. When the personage of workers is ignored, they are restricted in relation only to vocation.
-
- Apr 2023
-
security.stackexchange.com security.stackexchange.com
-
If you send links with a secret login token with email, then they should be single-use and expire rather quickly.
-
If so, then how is sending a link for password reset any more secure? Isn't logging-in using a magic link the same thing as sending a magic link for resetting a password?
In my opinion: It's not any different or less secure.
-
-
en.wikipedia.org en.wikipedia.org
-
Google allowed third parties to build their own Wave services (be it private or commercial) because it wanted the Wave protocol to replace the e-mail protocol.[2][16][17] Initially, Google was the only Wave service provider, but it was hoped that other service providers would launch their own Wave services, possibly designing their own unique web-based clients as is common with many email service providers.
-
-
softwareengineering.stackexchange.com softwareengineering.stackexchange.com
-
users/me feels like a bad idea because REST prefers to have one url per resource. You will then have: users/me users/123myId Which point to the same resource.
-
- Mar 2023
-
stackoverflow.com stackoverflow.com
-
Exactly my thoughts on the matter! I'm coming from XML SOAP background and concept of schema just got into my blood and JSON documents rather don't announce their schema. To me it's whether server "understands" the request or not. If server doesn't know what "sales_tax" is then it's simply 400: "I have no idea what you sent me but definitely not what I want.".
-
Just because the code is described as part of the WebDAV spec doesn't mean it's WebDAV-specific! Status codes are supposed to be generic.
-
-
www.inc.com www.inc.com
-
"There is a robust debate going on in the computing industry about how to create it, and whether it can even be created at all."
Is there? By whom? Why industry only and not government, academia and civil society?
-
-
-
Why the 2 separate steps for this? Simple: to make things easier on the front-end side of things. Sending 2 different error codes, one for when the OTP is required but missing, and one where the OTP was provided but invalid, allows us to adjust our login UI accordingly.
-
-
-
fidoalliance.org fidoalliance.org
-
User Experience The user experience will be familiar and consistent across many of the user’s devices – a simple verification of their fingerprint or face, or a device PIN, the same simple action that consumers take multiple times each day to unlock their devices.
Tags
Annotators
URL
-
-
blog.cmpxchg8b.com blog.cmpxchg8b.com
-
The problem with using SMS-2FA to mitigate this problem is that there’s no reason to think that after entering their credentials, they would not also enter any OTP.
-
I believe that SMS 2FA is wholly ineffective, and advocating for it is harmful.
Would this also appyl to OTP by e-mail??
-
This argument only works if what you’re defending is good. As I’ve already explained, SMS-2FA is not good.
-
Don’t let the perfect be the enemy of the good. Seat belts aren’t perfect either, do you argue we shouldn’t wear them? Etc, etc. This argument only works if what you’re defending is good. As I’ve already explained, SMS-2FA is not good.
-
You are currently allowing your users to choose their own password, and many of them are using the same password they use on other services. There is no other possible way your users are vulnerable to credential stuffing.
-
If you use a third party password manager, you might not realize that modern browsers have password management built in with a beautiful UX. Frankly, it’s harder to not use it.
-
If you’re a security conscious user... You don’t need SMS-2FA. You can use unique passwords, this makes you immune to credential stuffing and reduces the impact of phishing. If you use the password manager built in to modern browsers, it can effectively eliminate phishing as well.
not needed: password manager: 3rd-party
-
-
www.reddit.com www.reddit.com
-
You can also find the combination verb+in+to, but in that case you're usually dealing with a phrasal verb consisting of a verb and the particle "in", which happens to be followed by the preposition "to".They wouldn't give in to our demands.
-
"Built in to" appears when you use the phrasal verb "build in" followed by an infinitive, but that is not what you are trying to do in your sentence.There's an electronic switch built in to stop all data transfers.
-
-
www.chompchomp.com www.chompchomp.com
-
The house, of course, is not doing the agreeing; Cooper is! Because of the distance between Cooper and the participle phrase that describes him, the comma is necessary.
Tags
Annotators
URL
-
-
english.stackexchange.com english.stackexchange.com
-
How can this be called an adjective? The postmodifier here is a participle phrase, 'built into the library'.
-
take off, should also be counted as a (multi-word) verb.
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
A survey of 230 diverse bacterial and archaeal genomes found evidence of DNA methylation in 93% of genomes, with a diverse array of methylated motifs (834 distinct motifs; average of three motifs per organism)
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
conjugative plasmids have broad-host ranges23, are resistant to restriction-modification systems24, are easy to engineer with large coding capacities25, and do not require a cellular receptor26 that would provide a facile mechanism for bacterial resistance.
-
-
journals.plos.org journals.plos.org
-
Bacterial cells are typically one thousandth the volume of mammalian cells, which places them near the edge of instrument detection. At this size it can be challenging to differentiate viable cells from debris of similar size
-
-
www.frontiersin.org www.frontiersin.org
-
Detailed descriptions, assumptions, limitations and test cases of many popular statistical methods for ecological research can be found in the GUSTAME server (Buttigieg and Ramette, 2014), and in the review by Paliy and Shankar (2016).
-
condensing the information into two- or three-dimensional spaces. A very good overview of techniques to achieve this was written by Paliy and Shankar (2016).
-
-
academic.oup.com academic.oup.com
-
There are several widely used tool collections, e.g., QIIME 2 [13], mothur [14], usearch [15], and vsearch [16], and 1-stop pipelines, e.g., LotuS [17], with new approaches continually being developed, e.g., OCToPUS [18] and PEMA [19]
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
Recently, redox-responsive biomolecules such as phenazines have been used in several electrochemical strategies to interrogate a range of biological activities30,31 and to control gene expression in living cells32,33, where the redox status of the biomolecules could be measured or manipulated by application of electronic potentials
-
-
github.com github.com
-
Double quotes for string literals - because pre-committing to whether you'll need interpolation in a string slows people down
Tags
Annotators
URL
-
-
www.networkworld.com www.networkworld.com
-
Protocols are, by their very nature, open. If you can't read the protocol specification then you can't very well implement it, can you?
-
-
kevinjmurphy.com kevinjmurphy.com
-
Our test raises an ActiveRecord::RecordNotFound exception. We know that Rails has special handling to return a 404 status code in this case. However, the request spec still raises the exception.
-
-
library.oapen.org library.oapen.org
-
Although these approaches may differ, all of them concur onthree essential points:
- Paraphrase
- three essential points for having a good life:
- A good life goes beyond mere survival and moves into a life that humans value
- A good life ensures that individuals have the opportunity to flourish
- A good life requires providing the conditions and resources individuals need to satisfy or develop their full potential
-
Instead of weighing the balance of pleasure and pain,individuals tend to think about a good life in terms of their life beingmeaningful to them
// - from this perspective, the meaning crisis is a threat to a good life
-
Often, environmental and social analysts focus on threats, dangers,and damage. They highlight negatives, in terms of limited or non-renewable resources, or the impacts of excessive emissions or effuents.But what if one took the opposite approach and focused on the posi-tives that we want to strive for? We – the authors – believe that everyhuman being, that is you and us and everybody close and far away,wants to be able to live a good life, a life that is worth living. Giventhat the Earth’s resources are limited and distributed highly unevenly,the core objective has to be how everybody can live well within limits.
// - A key shift is required to mobilize people at scale - This strategy is already being adopted by change agents around the globe but the change in perspective needs to become greater - Living within doughnut economics reaches the same conclusion: https://jonudell.info/h/facet/?max=100&expanded=true&user=stopresetgo&exactTagSearch=true&any=a+good+life+for+all - and currently, as the "Good Life for All" study showed at a national (country) scale, very few if any countries are meeting this requirement - the great inequality implies that the poor must be uplifted materially, whilst the rich must be encouraged to share material and economic wealth - the poor of the world will receive material and economic gain while the economic elites of the world gain nonmaterial wealth
-
It requiresa deep and profound orientation toward the good life. It requires usto ponder what the good life is, what conditions must be fulflled forindividuals to live it, and what it takes to create these conditions.
// - Orienting towards the good life is needed to mobilize action. - Why? - Because shifting from a negative vision to a positive one is necessary to mobilize action (at scale) - It is the difference between: - being coerced vs being self-motivated - being reactive vs being proactive - being depressed and lethargic vs being joyful and energetic - hence, in this transition journey, we must accompany the limits with the positive transformation that allows us to achieve wellbeing within them.
-
By tying the question of limits to human needsand requirements for their satisfaction, they neither demand asceti-cism or renunciation, nor pursue unspecifed moral suasion in termsof “we should consume less.” Rather, they highlight the necessity –diffcult to pursue but rich in participatory rewards – to jointly defnethe conditions necessary to live a good life, and the subsequent stepsnecessary to make such a good life possible for all individuals. By pro-viding freedom to pursue the good life in an ecologically and sociallyfrayed world, these limits offer the beneft of ensuring that all otherindividuals living now and into the future can do so as well.
- Comment
- perspective is critical.
- Rather than employing moral suasion, we need to really define what is meant by a good life.
- Many of the materially wealthy are emotionally unhappy, and so material wealth does not equate to "a good life"
- This point must be really understood by the elites of the world.
- Often elites come from a background of escaping poverty themselves and wealth acts as a pathological buffer against extreme poverty
-
Justice in the context of consumption corridorsmeans that every person deserves access to a defned minimum level ofecological and social resources necessary to be able to live a good life,solely because they are a human being (what scholars call a natural-law-based perspective on justice).
- Definition - Natural Law
- a natural law based perspective of justice claims that every person deserves access to a defined minimum level of ecological and social resources necessary to live a "good life".
Tags
- minimum consumption standards
- story shift
- wellbeing within limits
- natural law
- A good life
- meaning crisis
- maximum consumption standards
- a good life within Earth System Boundaries
- a good life
- common denominators of a good life
- a good life within ESBs
- a good life within planetary boundaries
- positive story
- A good life within limits
Annotators
URL
-
-
goodlife.leeds.ac.uk goodlife.leeds.ac.uk
-
//
- This is a good resource to explore doughnut economics at a national scale for many countries of the world.
- The two quadrants show a major pattern and dualism between 1) many developed countries that can meet socio-economic well-being, but only at the high price of exceeding planetary boundaries, and 2) many countries that stay under planetary boundary limits, but only at the expense of poor socio-economic indicators.
- The conclusion of the study is that currently, a good life for all within planet boundaries does not exist
-
-
www.washington.edu www.washington.edu
-
Unless physical stature is of relevance in a conversation, simply using a person's name is appropriate.
-
-
blog.oup.com blog.oup.com
-
In the new collection, The Good It Promises, The Harm It Does, activists and scholars address the deeper problems that EA poses to social justice efforts. Even when EA is pursued with what appears to be integrity, it damages social movements by asserting that it has top-down answers to complex, local problems, and promises to fund grass-roots organizations only if they can prove that they are effective on EA’s terms.
- Comment
- The book title is a perfect taking to introduce the concept of progress traps, of which effective altruism appears to be.
-
-
support.google.com support.google.com
-
I am a developer, and we are developing the app for the customer, that will not publish through the google play store. But when we distribute the app to the customer, customer get that error. I want to avoid that alert of the Play stored.I want to understand, exactly which security concern has been break by my app.
-
- Feb 2023
-
github.com github.com
-
There should thus be an option to give npm a list of vulnerability IDs (CVEs etc.) that it does not need to defend because the admin has decided it does not apply to their edge case.
should be optional
Tags
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
Result of lots of searching on net is that pre-checkout hook in git is not implemented yet. The reason can be: There is no practical use. I do have a case It can be achieved by any other means. Please tell me how? Its too difficult to implement. I don't think this is a valid reason
-
-
medium.com medium.com
-
The variable x initially has the type unknown: the type of all values. The predicate typeof x === "number" extracts dynamic information about the value bound to x, but the type-checker can exploit this information for static reasoning. In the body of the if statement the predicate is assumed to be true; therefore, it must be the case the value bound to x is a number. TypeScript exploits this information and narrows the type of x from unknown to number in the body of if statement.
-
- Jan 2023
-
bugs.ruby-lang.org bugs.ruby-lang.org
-
This depends on the ruby code. Some projects will be semi-dormant due to various reasons. That's for us to address as a community. Are we going to let a single decade-old gem prevent us from moving Ruby forward? What's the threshold? There's libraries out there that don't work on Ruby 1.9. We left them behind or replaced them. And are people depending on a gem that's unmaintained really going to be the ones to jump on Ruby 3.0 the day after Christmas 2020? This is also still supposition. Name some gems that are unmaintained and in wide use. We can fix them! We have the technology! In my opinion, if matz's objective is to make the transition to ruby 3.0 simple, then it actually makes a lot of sense to postpone frozen strings by default. Postpone until when? 3.1? So then 3.1 will be the hard break? They've been discussed for what, ten years now? How long is long enough? We've added many ways for people to start transitioning to immutable literal strings, and people are using those mechanisms widely. We've pushed this transition a long time, and we still have another year until 3.0 is out and longer than that until people will need to make a move. What is the threshold for being "ready" to make this change? Unless we're planning to wait until Ruby 4.0 in 2030 to do this, I think we should do it now. I use frozen strings in most of my ruby projects, most of them set to true via the toplevel comment, so either way, it would not affect me. Exactly. Most people already do use frozen string literals. And adding a pragma means we can transition troublesome code to the new way with a single line per affected file. Heck, we can even add --enable:mutable-literal-string for people that are stuck with some of that old unmaintained code, allowing them to have a soft landing.
Tags
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
because most languages treat strings as immutable, which helps ensure you don't accidentally modify them and can improve performance. Fewer state changes in a program mean less complexity. It's better to opt-in to mutability after careful consideration rather than making everything mutable by default. What is immutability and why should I worry about it? may help.
-
-
-
https://www.imdb.com/title/tt11534762/
The Good Fight S4 E5 "The Gang Goes to War"
This episode features Diane chatting with a co-star about her note taking experience. The woman indicates that she took notes incessantly and voraciously, but that she never referred back to them. The experience just caused her extreme stress so she gave it up completely as she felt it never gave her any benefit. She resorted instead to a more zen practice of drawing circles in her notebooks. She showed Diane a pile of notebooks filled with circles in various designs and colors. Later in the episode while in court the woman asked Diane about it and Diane showed her some of her new circle "note" pages.
[Watched the episode passively sometime in the past two weeks.]
-
-
datatracker.ietf.org datatracker.ietf.orgrfc67491
-
If the client knows the access token expired, it skips to step (G); otherwise, it makes another protected resource request.
It doesn't have to wait until it gets an invalid token error. It can independently be checking the expiration time before making a request, and if it sees that it has expired, don't even bother making the request, just skip directly to using the refresh token.
Tags
Annotators
URL
-
-
humansandnature.org humansandnature.org
-
This larger perspective is offered by an analysis of citizenship and the common good. I begin with the idea of citizenship as being a practice entrusted with the preservation and conservation of the nexus of recognitional practices in a society. Then I move to the notion of the common good, interpreted not as a collective thing, a transcendent principle, or an abstract concept, but as the flourishing of the recognitional nexus itself.
!- interpretation of citizenship : from perspective of common good - common good as the flourishing of the nexus of recognitional practices in a society.
!- comment : salience of citizenship and common good - it's important to educate the public on what it means to be a citizen from the perspective of our empowering role in creating the society we want to live in
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
belongs_to does not ensure reference consistency, so depending on the use case, you might also need to add a database-level foreign key constraint on the reference column, like this: create_table :books do |t| t.belongs_to :author, foreign_key: true # ... end
Tags
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
class String alias strip_ws strip def strip chr=nil return self.strip_ws if chr.nil? self.gsub /^[#{Regexp.escape(chr)}]*|[#{Regexp.escape(chr)}]*$/, '' end end
-
-
-
That tends to be the biggest cop out excuse for libraries. Just do a major version release. The fact this library lies about the encodingis extremely problematic and causes numerous bugs. Any program currently using this library is already incorrect because of this behavior. Actually exposing the problem makes it easier for people to fix.
in reply to subject of https://hyp.is/VeTJlpN0Ee2mNKOVyQ-B5g/github.com/mikel/mail/issues/902
-
-
www.studysquare.com www.studysquare.com
-
what do you think? Is Germany good for Indian students? To know more, read this article till the end.
-
-
-
It's usually undesirable to add a default scope. It will take more effort to work around and will cause more headaches. If you know you need a default scope, it's easy to add yourself .
-
- Dec 2022
-
-
I once had a cut on my arm. Someone asked me, is it serious? “It depends,” I replied, “on how much I scratch.”
-
-
www.facebook.com www.facebook.com
-
Pleeaasse don't give "it" a name.There is no "it". You believers are part of the church in your location and you meet together.There is zero biblical precedent for a group of believers giving their particular group a name.I understand that nearly all believers do .... That in no way makes it right.Names seperate us from others of the church in our area.
-
-
github.com github.com
-
has_scope :category do |controller, scope, value| value != 'all' ? scope.by_category(value) : scope end
-