910 Matching Annotations
  1. Sep 2020
    1. The lack of spread continues to be a big pain for me, adding lots of difficult-to-maintain cruft in my components. Having to maintain a list of all possible attributes that I might ever need to pass through a component is causing me a lot of friction in my most composable components.
    1. To me, abandoning all these live upgrades to have only k8s is like someone is asking me to just get rid of all error and exceptions handling and reboot the computer each time a small thing goes wrong.

      the Function-as-a-Service offering often have multiple fine-grained updateable code modules (functions) running within the same vm, which comes pretty close to the Erlang model.

      then add service mesh, which in some cases can do automatic retry at the network layer, and you start to recoup some of the supervisor tree advantages a little more.

      really fun article though, talking about the digital matter that is code & how we handle it. great reminder that there's much to explore. and some really great works we could be looking to.

    1. Références1°'degré:art.1°',2et3del'arrêtédu13mai1985relatifauconseild'école,circulairen°2000-082du9juin2000relativeauxmodalitésd'électiondesreprésentantsdesparentsd'élèvesauconseild'école.2"°'degré:art.R.421-26,R.421-29etR.421-30ducodedel'éducation.
    2. L'articleL.1'|'I-4ducodedel'éducationdisposequelesparentsd'élèvesparticipent,parleursreprésentants,auxconseilsd'écoleetauxconseilsd'administrationdesétablissementsscolairesetauxconseilsdeclasse
    1. Critical Code Studies Working Groups (CCSWGs)
    2. Code is a social text, the meaning of which develops and transforms as additional readers encoun-ter it over time and as contexts change

      Le code est une langue et, en tant que telle, est une construction sociale (comme toutes les langues). Comme une œuvre littéraire, son sens n'est pas fixé.

    1. There’s a bunch of fiddly syntax here, not to mention 2 separate build stacks and 3 sets of dependencies, but the end result is awesome. Simply renaming a field on a shared model will reveal all the React components using that value on the front-end, and back-end code using it.
    2. The “shared” schema is effectively the API schema. These are the fields exchanged in the API, common to client and server.
    1. À cette fin, comme le prévoit l'article D. 111-8 du Code de l'éducation, les directeurs d'école et les chefs d'établissement doivent communiquer aux associations de parents d'élèves qui en font la demande la liste des parents d'élèves de l'école ou de l'établissement scolaire mentionnant leurs noms, adresses postale et électronique, à la condition que ceux-ci aient donné leur accord exprès à cette communication.
    1. Because of that, it's easy to end up in a situation where the styles for a given piece of markup are defined far away (in terms of number of lines) from the markup itself, which reduces the advantage of having styles and markup co-located in the first place.
  2. Aug 2020
    1. “I came to Rust from Haskell, and I feel that Haskell is a very elegant and safe language. The biggest differentiator for me is that there is a greater difference between high-performance code and idiomatic ‘clean’ code in Haskell than in Rust. Most Rust code looks like most other Rust code, even when it performs well. Haskell can become unfamiliar real quick if someone is operating under different libraries and goals from what you are typically doing. Small differences in syntax can result in huge differences in behavior, and Rust has more uniformity on that axis.”
  3. Jul 2020
    1. The key to successfully creating reusable components using both render props and scoped slots is being able to correctly separate behavior from presentation. Each time you create a new UI component, think “What is the core behavior of this component? Can I use this anywhere else?”
    1. In your environment you may want to always configure internationalization, routers, user data etc. If you have many different React roots it can be a pain to set up configuration nodes all over the place. By creating your own wrapper you can unify that configuration into one place.
    1. prevent its disclosure to any person not authorized to create the subscriber's digital signature

      So the signature can be used by another entity to create the digital signature if authorized beforehand.

      So if there is a statement that "I authorize [organization] to create a cryptographic key-pair on my behalf, and create the digital signature."

    1. Acknowledgments

      ”Blasphemy” and “irony” are mentioned--and continued through Kafer--to connote less math and masculinity and more--frankly--code, spoken from reclaimed empowerment. I couldn’t digest Haraway’s prose--within the coming Information Age she concentrates a lot of terms like machine parts herself--”Star Wars,” “Magic Mountain,” even “goddess” (Haraway 57). I wished for her own Dictionary.com to identify what these references meant to her.

      Did she mean to confound us for shock-factor’s sake? Because within her text that I could decipher I felt a postgendered, post-species, colorblind coalition that I couldn’t fully find affinity within, as much as the vague image of the Cyborg tantalizes me. For unity did she mean to catalyze divisiveness through language?

  4. Jun 2020
    1. Garantir le respect des droits de l’enfant Recommandation 2Le Défenseur des droits recommande l’inscription, dans le code de l’éducation et le code de l’action sociale et des familles, de l’interdiction de tout châtiment corporel ou traitement humiliant à l’égard des enfants
    1. What would be nice is if JavaScript had a built-in way to do what I can do in Ruby with:

      > I18n.interpolate('Hi, %{name}', name: 'Fred')
      => "Hi, Fred"
      

      But to be fair, I18n comes from i18n library, so JS could just as easily (and I'm sure does) have a library that does the same thing.

      Update: Actually, you can do this in plain Ruby (so why do we even need I18n.interpolate?):

      main > "Hi, %{name}" % {name: 'Fred'}
      => "Hi, Fred"
      
      main > ? String#%
      
      From: string.c (C Method):
      Owner: String
      Visibility: public
      Signature: %(arg1)
      Number of lines: 9
      
      Format---Uses str as a format specification, and returns the result
      of applying it to arg. If the format specification contains more than
      one substitution, then arg must be an Array or Hash
      containing the values to be substituted. See Kernel::sprintf for
      details of the format string.
      
         "%05d" % 123                              #=> "00123"
         "%-5s: %016x" % [ "ID", self.object_id ]  #=> "ID   : 00002b054ec93168"
         "foo = %{foo}" % { :foo => 'bar' }        #=> "foo = bar"
      

      I guess that built-in version is fine for simple cases. You only need to use I18n.translate if you need its more advanced features like I18n.config.missing_interpolation_argument_handler.

    1. I was just expressing that, even thought I like React, I dread having to still manually handle everything, instead of just using a directive, a la Vue.JS. This is what I consider boilerplate. Hence my comment on how I could leave React for Svelte just because of that. Clearly a Svelte side-by-side code comparison shows a much cleaner code for Svelte.
    1. Aujourd’hui, pour les seuls code pénal et code du travail, on atteint en France 25 critères21, et jusqu’à 30 si l’on considère d’autres codes (code de l’assurance maladie, de l’éducation...)
    1. This is the first post of the Disassembling Rails series. What I want to do is to give you a general idea about how Rails' components interact with each other when you use its functionalities (like fragment caching).

      I like the term "Disassembling"...

  5. May 2020
    1. export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client"
    2. if [ -z "${DOCKER_HOST:-}" ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
    1. if [ -n "${DOCKER_HOST:-}" ] && _should_tls; then export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" fi
    2. if [ -z "${DOCKER_HOST:-}" ] && [ ! -S /var/run/docker.sock ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
    1. There are no plans to deprecate the REST API. To reduce the technical burden of supporting two APIs in parallel, they should share implementations as much as possible.
    1. Docker 19.03 does this automatically # by setting the DOCKER_HOST in # https://github.com/docker-library/docker/blob/d45051476babc297257df490d22cbd806f1b11e4/19.03/docker-entrypoint.sh#L23-L29
    1. REM This file was produced by typing in a listing from appendix B of Hugh Burns' thesis,

      Topoi program in BASIC

    1. We have come to a place where thanks to many libraries and frameworks, and overall improving software, what would’ve once used many developers to build from scratch is now more often than not, a bunch of people plumbing different things together. Software is creating software faster than we can use it. This is also why you are seeing so many of these “no-code” or “low-code” solutions pop up all over the place. There are increasingly fewer reasons to write code, and those who are writing code should, and do, increasingly write less of it. This will only be more accelerated by shifting to remote work due to how it’s going to change how we decide what code to write.

      There are increasingly less reasons to write code, so less code should be written.

      How Can relates this to remote work is unclear to me here.

    2. Anyone who’s spent a few months at a sizable tech company can tell you that a lot of software seems to exist primarily because companies have hired people to write and maintain them. In some ways, the software serves not the business, but the people who have written it, and then those who need to maintain it. This is stupid, but also very, very true.

      A company with a software development team writing its own software often creates inertia for itself. They will be biased to write software, because they have that capability – not because it's necessary.

    1. Jones did make one change, adding a question that asked students to reflect on their experience during the pandemic, and how it will shape their approach to studying family history.

      reflection questiğon about pandemic could be important for med students and may change their approach to exam and honor code also. people who think they have a free will, act more ethical compared to who doesn't.

    1. Code Owners allows for a version controlled single source of truth file outlining the exact GitLab users or groups that own certain files or paths in a repository.
    1. It should be possible to implement the functionality of page-translator via a more popular extension that is designed to inject arbitrary data into websites, including remote code, e.g. https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/ .
    1. Add-ons are not allowed to contain obfuscated code, nor code that hides the purpose of the functionality involved. If external resources are used in combination with add-on code, the functionality of the code must not be obscured.
    1. Mozilla can still block distribution of the extension, even when not distributed via ADO. It is not possible for us to provide Mozilla the unminified JavaScript source files for Google’s and Microsoft’s translation widgets. This is a risk because Mozilla can demand such.
    2. Mozilla does not permit extensions distributed through https://addons.mozilla.org/ to load external scripts. Mozilla does allow extensions to be externally distributed, but https://addons.mozilla.org/ is how most people discover extensions. The are still concerns: Google and Microsoft do not grant permission for others to distribute their "widget" scripts. Google's and Microsoft's "widget" scripts are minified. This prevents Mozilla's reviewers from being able to easily evaluate the code that is being distributed. Mozilla can reject an extension for this. Even if an extension author self-distributes, Mozilla can request the source code for the extension and halt its distribution for the same reason.

      Maybe not technically a catch-22/chicken-and-egg problem, but what is a better name for this logical/dependency problem?

  6. Apr 2020
    1. n the near future, given the increase in the use and profile of preprintservers, and alternative publishing platforms such as F1000 Researc
      • Di sini kami memperlihatkan manfaat preprint dengan keleluasaanya (tanpa batasan format, ukuran, jenis berkas dll) akan memberikan dorongan bagi peneliti untuk mempublikasi data dan metode (misal kode program).

      • Ada banyak platform berbagi kode (seperti Github dan Gitlab) yang membuka banyak pintu keterbatasan saat penulis ingin membagikan kode program.

      • Platform-platform ini juga mendukung proses berbagi dokumen dan data yang cari (fluid), karena semua orang dapat dengan mudah menggandakan (forking melalui perintah git clone) proyek seseorang untuk kemudian digunakan, dimodifikasi, dan pada akhirnya mungkin mereka meminta kreator orisinalnya untuk memasukkan modifikasi menjadi versi baru dari kode program.

      • Hebatnya semua proses itu tercatat dengan hubungan antara repositori dan akun yang jelas terlihat.

  7. Mar 2020
    1. Don’t go to code academy, go to design academy. Be advocates of the user & consumer. It’s not about learning how to code, it’s about translating real-world needs to technological specifications in just ways that give end users agency and equity in design, development and delivery. Be a champion of user-centric design. Learn how to steward data and offer your help.
    1. ActionController and ActionMailer default include AbstractController::Rendering directly or indirectly (ActionController::Metal::Rendering). AbstractController::Rendering uses ActionView as default library for its template rendering engine and includes AbstractController::ViewPaths and an instance of I18n proxy to find localized views. To learn more i'd like to refer to the ActionPack source code on github. To get to the point. ActionView allows you to use localisation in your templates: See Rails guide: Action View Overview , Chapter Localized views.

      Not a very detailed or good code dissection, but is kind of one.

    1. it comes down to opportunities for code reuse. Will your system re-use more code if you use WordPress and its very usable admin area, myriad of available plugins and themes? Or can you re-use more code by harnessing the object-oriented design, DSLs and good software development practices mecca that is Ruby, Rails and the available libraries and tools?
  8. Feb 2020
    1. We believe load test scripts should be plain code to get all the benefits of version control, as opposed to say unreadable and tool generated XML.

      Saw another comment lamenting the use of ugly/unreasonable XML files:

      https://github.com/flood-io/ruby-jmeter

      Tired of using the JMeter GUI or looking at hairy XML files?

    2. DevOps has taught us that the software development process can be generalized and reused for dealing with change not just in application code but also in infrastructure, docs and tests. It can all just be code.
  9. Jan 2020
    1. When we don’t feel confident in our code, it is tempting to attach our sense of self-worth and professional pride to something that can be measured.

      Great code related quote by Dan Abramob

    1. use the services of the OpenETC

      What would constitute a full list of the services of OpenETC? Is it just this website, or does it include email lists, chat rooms, a Slack room, other services? The CoC should apply to all these areas listed.

      (Original annotation at https://boffosocko.com/2020/01/10/code-of-conduct-openetc/#use%20the%20services%20of%20the%20OpenETC)

    2. Guidelines

      These are some generally useful guidelines, but it would be nice to have a section on where to go or who to contact for help and conflict resolution. What should someone who notices a violation do? Where should they turn for help?

      (Original annotation at https://boffosocko.com/2020/01/10/code-of-conduct-openetc/#Guidelines)

    3. Temporary access

      Large portions of the material below this read more like a Terms of Service than a Code of Conduct. It might be more useful to split these into two pages to better delineate the two ideas.

      (Original annotation at https://boffosocko.com/2020/01/10/code-of-conduct-openetc/#Temporary%20access)

    4. draft of the proposed OpenETC code of conduct

      When making a CoC, it's always nice to spend some time researching others.

      Here's a copy of the IndieWeb's CoC, which I've liked. They also documented a list of other CoC's for other communities that might be worth looking at as well. Most of them have licenses for ease of cutting/pasting for reuse.

      I don't see a license on this draft, but it would be nice if you provided a CC0 license for it.

      (Original annotation at https://boffosocko.com/2020/01/10/code-of-conduct-openetc/#draft%20of%20the%20proposed++1)

    1. I was going through the source for Thin and noticed that instead of using require, Marc-Andre Cournoyer was using a method called autoload to load thin's constituent parts.
  10. Dec 2019
    1. // reduce() without initialValue [ { x: 22 }, { x: 42 } ].reduce( maxCallback ); // 42 [ { x: 22 } ].reduce( maxCallback ); // { x: 22 } [ ].reduce( maxCallback ); // TypeError // map/reduce; better solution, also works for empty or larger arrays [ { x: 22 }, { x: 42 } ].map( el => el.x ) .reduce( maxCallback2, -Infinity );
    1. It allows the module code (and subsequently dependants on the module) to not use preprocessor hacks, source code changes, or runtime detection hacks to identify which code is appropriate when creating a client bound package.
    2. It allows your source code to remain clean and free of hacks.
    3. The browser field is where the module author can hint to the bundler which elements (other modules or source files) need to be replaced when packaging.
    4. When a javascript module is prepared for use on a client there are two major concerns: certain features are already provided by the client, and certain features are not available. Features provided by a client can include http requests, websockets, dom manipulation. Features not available would include tcp sockets, system disk IO.
    5. You can simply prevent a module or file from being loaded into a bundle by specifying a value of false for any of the keys. This is useful if you know certain codepaths will not be executed client side but find it awkward to split up or change the code structure.
    1. Do the technical administrators have to be the same people doing the social organizing? I think the answer as of June 2019 is, sadly, yes. If you have 2 people with root access to the server and 2 people managing the community aspects, you'll end up with imbalances in that group of 4. You will end up with technical administrators who feel like code monkeys who never get the gratitude that the community organizers get, or you'll end up with community organizers who feel like glorified babysitters while the techies have all the real power. You might even end up with a situation where both are true. I think that if you're dedicated to this sort of project though, you could start with something like that 2 and 2, and then the techies could teach the organizers the technical skills, and the organizers could teach the techies the organizing skills.
    1. First sighting. First time I've seen a literal, non-whitespace character (┊) used to show indentation. Looks pretty nice. But breaks copy-and-pastability.

  11. Nov 2019
    1. const setRefs = useRef(new Map()).current; const { children } = props; return ( <div> {React.Children.map(children, child => { return React.cloneElement(child, { // v not innerRef ref: node => { console.log('imHere'); return !node ? setRefs.delete(child.key) : setRefs.set(child.key, node)

      Illustrates the importance of having unique keys when iterating over children, since that allows them to be used as unique keys in a Map.

    2. useRef(new Map()).current
    1. // require('hammerjs') when in a browser. This is safe because Hammer is only // invoked in componentDidMount, which is not executed on the server. var Hammer = (typeof window !== 'undefined') ? require('hammerjs') : undefined
    1. this is not intended to become a big, public thing. You're welcome to use anything and steal any code. Please do not count on us adressing feature requests or issues though.
    1. Onivim 2 leverages the VSCode Extension Host process in its entirety - meaning, eventually, complete support for VSCode extensions and configuration.
    1. the main reason we built a new multiprocess architecture is that Chromium's multiprocess support was never contributed to the WebKit project. It has always lived in the separate Chromium tree, making it pretty hard to use for non-Chrome purposes.Before we wrote a single line of what would become WebKit2 we directly asked Google folks if they would be willing to contribute their multiprocess support back to WebKit, so that we could build on it. They said no.
    1. The chosen approach pushes a lot of complexity out of the core. As a result it might take more code to achieve certain functionalities. This is the price of flexibility. And that's the primary design goal of Reactabular.
    1. import { NgModule } from '@angular/core'; import { CommonModule } from '@angular/common'; import { FormsModule } from '@angular/forms'; import { MaterialModule } from '@angular/material'; import { MyInterface } from './my.interface'; import { MyService } from './my.service'; @NgModule({ imports: [ CommonModule, FormsModule, MaterialModule.forRoot() ], declarations: [ MyInterface],//<- this is causing the message exports: [ MyInterface], providers: [ MyService ] }) export class MyModule { }
  12. Oct 2019
    1. All conversations and communities on Spectrum agree to our underlying code of conduct. This code of conduct also applies to all conversations that happen within our contributor community here on GitHub. We expect discussions in issues and pull requests to stay positive, productive, and respectful. Remember: there are real people on the other side of that screen!
  13. Sep 2019
  14. Aug 2019
    1. Is there something like instance variables? Yes! The useRef() Hook isn’t just for DOM refs. The “ref” object is a generic container whose current property is mutable and can hold any value, similar to an instance property on a class.

      Not just for references to DOM elements…

  15. Apr 2019
    1. ([a b] (if (and (map? a) (map? b)) (merge-with deep-merge a b) b))

      deep-merge nice recursive solution piggybacking on merge-with

    2. ([m k f] (if-let [kv (find m k)] (assoc m k (f (val kv))) m))

      update-existing good use of find & combination of if-let and find!

    3. ([pred coll] (reduce (fn [_ x] (if (pred x) (reduced x))) nil coll))

      find-first

    1. (def current "Get current process PID" (memoize (fn [] (-> (java.lang.management.ManagementFactory/getRuntimeMXBean) (.getName) (string/split #"@") (first)))))

      getting current proces id (PID) more importantly: java.lang.management.ManagementFactory/getRuntimeMXBean

    1. (defn- file? [f] (instance? java.io.File f)) (defn- find-files-in-dir [dir] (filter #(.isFile ^File %) (file-seq dir)))

      finding files nice declarative way file-seq of this dir

    1. (s/def :ring.http/field-name (-> (s/and string? not-empty field-name-chars?) (s/with-gen #(gen/not-empty (gen-string field-name-chars)))))

      clean way of using with gen!

    2. (defn- gen-string [chars] (gen/fmap str/join (gen/vector (gen/elements chars)))) (defn- gen-query-string [] (->> (gen/tuple (gen/not-empty (gen/string-alphanumeric)) (gen-string uri-chars)) (gen/fmap (fn [[k v]] (str k "=" v))) (gen/vector) (gen/fmap #(str/join "&" %)))) (defn- gen-method [] (gen/fmap keyword (gen/not-empty (gen-string lower-case-chars)))) (defn- gen-input-stream [] (gen/fmap #(java.io.ByteArrayInputStream. %) (gen/bytes))) (defn- gen-exception [] (gen/fmap (fn [s] (Exception. s)) (gen/string-alphanumeric)))

      nice lesson on generators

    3. (defn- char-range [a b] (map char (range (int a) (inc (int b))))) (def ^:private lower-case-chars (set (char-range \a \z)))

      nice way of defining character range

    1. What is code refactoring?Code refactoring means restructuring your existing code, in a way that improves the internal structure but doesn’t change its external behavior. This complex procedure is aimed at modernizing software. It is typically used to increase the system’s maintainability, enhance performance, scalability, security and so on. If performed well, it can help developers discover some hidden bugs or vulnerabilities in the system.Typically, refactoring is done in small steps, called micro-refactorings. Each of these steps is usually a tiny change to a source code that leaves the functionality of the system unchanged, it just makes the code cleaner and simpler. And if you do want to change some functionality of your code, it’s much easier to do with a clean, refactored code.
  16. Mar 2019
  17. Feb 2019
    1. :ok

      nice, return value: keyword!

    2. (fn [system] (throw (ex-info "initializer not set, did you call `set-init`?" {}))))

      interesting pattern, default function throws kind of like abstract base classes methods in python

    1. rob_se <- list(sqrt(diag(vcovHC(fatalities_mod1, type = "HC1"))), sqrt(diag(vcovHC(fatalities_mod2, type = "HC1"))), sqrt(diag(vcovHC(fatalities_mod3, type = "HC1"))), sqrt(diag(vcovHC(fatalities_mod4, type = "HC1"))), sqrt(diag(vcovHC(fatalities_mod5, type = "HC1"))), sqrt(diag(vcovHC(fatalities_mod6, type = "HC1"))), sqrt(diag(vcovHC(fatalities_mod7, type = "HC1"))))

      Error in solve.default(crossprod(demX)) : system is computationally singular: reciprocal condition number = 1.63237e-31

  18. Dec 2018
  19. Nov 2018
    1. And earlier this year, CMS announced that by this time next year hospitalists would be assigned their own specialty designation code. SHM’s Public Policy Committee lobbied for the move for more than two years.
  20. Sep 2018
    1. Ceci est une note de page. Elle peut inclure un lien vers une autre page, que celle-ci soit connectée ou non via Hypothes.is. Voyez dans l'URL le préfixe qui assure que l'on peut annoter celle-ci. Mais avec ce blogue on n'en a pas besoin car son auteur a déjà inclus un code permettant de l'annoter par défaut (à condition de s'être créée un compte hypothes.is).

  21. Aug 2018
    1. Integrity Data Attacks in Power Market Operations

      Hello I am a electrical engineering student from Iran. I am interested in data integrity attacks on power grid state estimation. I can realize the basic concepts by reading the papers, but when I try to re-simulate them, I run into trouble. I have searched the net to find some example matlab codes of the attack structure, but I could not find anything. During my search, I noticed your page and saw that you graciously shared the MATLAB code of some of your papers with the public. So, I decided to leave you a message and ask you if you could provide me with a basic code of false data injection attack (like the one used in this paper) written in MATLAB. I would appereciate it. Thanks in advance.

  22. edu522.networkedlearningcollaborative.com edu522.networkedlearningcollaborative.com
    1. Incessentaly correcting graamer

      This may be my favorite line of the entire code of conduct! I'm doing my best to resist....

  23. Mar 2018
    1. if (app.metadata && app.metadata.has('dc:title') && app.metadata.get('dc:title') !== 'Untitled') { title = app.metadata.get('dc:title'); }

      the empty dc:title should also be considered as Untitled

    1. export var Layer = Evented.extend({

      Layer is the base class for geometry object in Leaflet.

      • base class for Marker
      • base class for Vector objects (path, polyline, polygon, circle, rectangle)
      • base class for tile layers
    1. // Adds the given layer to the group.

      addLayer method add object to LayerGroup. Since Path is extend from Layer. Almost all geometry can be applied here.

      • marker
      • path/circle/ployline/polygon
  24. Feb 2018
    1. Static code analysis TeamCity uses a set of several hundred IntelliJ IDEA and ReSharper inspections to analyze your code and identify potential problems. If you prefer to use other tools, TeamCity supports FxCop out of the box. It can also import reports produced by PMD, PMD/CPD, FindBugs, Checkstyle or JSLint.
  25. Sep 2017
    1. ou are encountering a WCF default limit on the message size. To raise the limit, use the maxReceivedMessageSize attribute in your web.config file (server side).

      Saved so much time!

    1. dispatchInternal (payload, cb) { if (processType === 'extension-page') { cb() ipcCargo.push(payload) return } if (processType === 'renderer') { // only handle actions that are for this window if (!payload.queryInfo || payload.queryInfo.windowId == null || payload.queryInfo.windowId === currentWindow.getCurrentWindowId()) { this.dispatchToOwnRegisteredCallbacks(payload) } // only forward actions that have not been relayed through the browser process if (!payload.sentFromBrowser) { cb() ipcCargo.push(payload) } return }

      This section of code is brilliant!

    2. This code saved me so much time!

  26. Jun 2017
  27. May 2017
    1. "who's the target of the assignment (LHS)" and "who's the source of the assignment (RHS)".

      LHS is looking for the target of that assignment whiel RHS is looking for the source!

  28. Apr 2017
    1. <content> <rng:ref name="height"/> <rng:ref name="width"/> </content>
    1. Commissioned Article

      Lots of coding issues. 8 fragments, 290 lines.