864 Matching Annotations
  1. Last 7 days
  2. Jul 2022
    1. instead of inlining the images, the image URL’s (and captions) are read from a .yaml file. The URL of the yaml file is passed as an argument when loading the page. The .yaml file as well as the images should be publicly served.
    1. It really only takes one head scratching issue to suck up all the time it saves you over a year, and in my experience these head scratchers happen much more often than once a year. So in that sense it's not worth it, and the first time I run into an issue with it, I disable it completely.
    2. It feels like « removing spring » is one of those unchallenged truths like « always remove Turbolinks » or « never use fixtures ». It also feels like a confirmation bias when it goes wrong.

      "unchallenged truths" is not really accurate. More like unchallenged assumption.

    1. https://x28newblog.wordpress.com/2022/07/13/pruning-for-output/comment-page-1/#comment-4960

      I love that you're adding links to the responses back and forth for future reference. I remember doing this manually several years back, but its a practice I rarely see. Both Stephen and I are using the Webmention spec to do this for our selves in an automatic fashion. (Mine display on my site in the comments, though I don't think Stephen does presently.) On wordpress.com you'd likely need to have a higher paid tier to add the plugins to enable this for WordPress, though depending on how often you do this it may be worth it?

    1. the illusion that pervades our sense perception is that what we experience is something external to us that somehow 00:20:10 we've got a world that exists as it is independent of us and that we simply happen to be perfect world detectors and we wander through it detecting things just as they are

      This is a key statement of our illusion. We sense that what we experience is the way the world actually is, not seeing that our bodies play a huge role in what we observe. We don't know what it's like to be a bat!

    1. I'm trying to get info OUT of my note-taking system. It's not as easy as I'd like it to be.

      This is one of the biggest problems with any of the systems digital or analog. The workflows for this are all generally not great.

      I'm actually trying some advice from Konrad Gessner from the 1500s today. I've printed out some of my digital notes about Tiago Forte's new book to arrange and organize them in an attempt to reuse all my writing and thinking about it into a review of the book. It'll probably take a bit as I've left them for a week or two, but I'm curious to see what the manual process looks like here in an effort to help make the digital portion potentially easier.

  3. Jun 2022
    1. All this hoopla seems out of character for the sedate man who likes to say of his work: ''Whatever I did, there was always someone around who was better qualified. They just didn't bother to do it.''
    1. The paradox of hoarding isthat no matter how much we collect and accumulate, it’s neverenough.

      How is the paradox of hoarding related to the collector's fallacy?

      Regardless of how much you collect, you can't take it with you. So what's the value? - Having and using it to sustain you while you're alive. - Combining it in creative ways to leave behind new ideas and new innovations for those who follow you. - others?

    2. No one had to read or respond to what these peoplewrote down—the benefits came just from the act of writing

      Benefit of writing things down

      link this to - rubber duck debugging - https://hypothes.is/a/beiGPOFOEeySP3__4Mj_0w - benefits of talking to a therapist - others? - morning pages

    1. Francesca Benatti (Open University)

      Online

      Short Bio

      I joined The Open University in 2012 as a member of the Arts Faculty and I am now part of the School of Arts and Humanities and the English and Creative Writing Department. I hold a Laurea in Lettere Moderne from the University of Bologna, as well as an MA in Literature and Publishing and a PhD in English from the National University of Ireland, Galway.

      My main role in the Faculty is to promote research in the Digital Humanities as the co-leader of DH_OU, the Digital Humanities at The Open University Research Collaboration (web and Twitter) and of the OOC DTP Digital Humanities training programme.

      I am a member of the READ-IT project, the Reading Experience Database, the History of Books and Reading Research Group, the Gender and Otherness in the Humanities (GOTH) Research Centre, the European Romanticism in Association and RÊVE project and the Open Arts Archive.

      During 2014-2019 I led the Arts and Humanities in the Digital Age training programme for the CHASE doctoral training partnership. In 2017 I was the Principal Investigator of the A Question of Style project, which was funded by a Research Society for Victorian Periodicals Field Development Grant. In 2016-2019 I was a member of the Executive Committee of the British Association for Romantic Studies (BARS) and of the International Executive Council of centerNet.

      Select bibliography

      • Understanding the phenomenology of reading through modelling (2021-01-26) Antonini, Alessio; Suárez-Figueroa, Mari Carmen; Adamou, Alessandro; Benatti, Francesca; Vignale, François; Gravier, Guillaume and Lupi, Lucia Semantic Web Journal, 12(2) (pp. 191-217)
      • *ing the Written Word: Digital Humanities Methods for Book History (2020) Antonini, Alessio and Benatti, Francesca In : SHARP 2020: Power of the Written Word (11-15 Jul 2020, Amsterdam)
    2. Alessio Antonini (Open University)

      Dr Alessio Antonini is a Research Associate at the Knowledge Media Institute (KMi), Open University, and a member of KMi's Intelligent Systems and Data Science group. Before joining KMi, he was a post-doc researcher in Urban Computing at the University of Turin, Italy. His research is on Human-Data Interaction (HDI) in applicative context of Civic Technologies, Smart City and Digital Humanities (DH) applications, in which contributed with more than 30 peer-reviewed papers. Transdisciplinary problems emerging from real-life scenarios are the focus of his research, approached through interdisciplinary collaborations, ranging from urban planning, philosophy, law, humanities, history and geography. He has extensive experience in EU and national projects, leading activities and work-packages in 14 projects. With more than ten years of professional practice, he as broad experience in leading R&D projects.

      Select bibliography:

      • Antonini, A., Benatti, F., Watson, N., King, E. and Gibson, J. (2021) Death and Transmediations: Manuscripts in the Age of Hypertext, HT '21: Proceedings of the 32th ACM Conference on Hypertext and Social Media, Virtual Event USA
      • Vignale, F., Antonini, A. and Gravier, G. (2020) The Reading Experience Ontology (REO): Reusing and Extending CIDOC CRM, Digital Humanities Conference 2020, Ottawa
      • Antonini, A. and Brooker, S. (2020) Mediation as Calibration: A Framework for Evaluating the Author/Reader Relation, Proceedings of the 31st ACM HyperText, Orlando, Florida, USA
      • Antonini, A. and Benatti, F. (2020) *ing the Written Word: Digital Humanities Methods for Book History, SHARP 2020: Power of the Written Word, Amsterdam
      • Antonini, A., (2020) Understanding the phenomenology of reading through modelling Understanding the phenomenology of reading through modelling, pp. (Early Access)
      • Vignale, F., Benatti, F. and Antonini, A. (2019) Reading in Europe - Challenge and Case Studies of READ-IT Project, DH2019, Utrecht, Netherland
      • Antonini, A., Vignale, F., Guillaume, G. and Brigitte, O. (2019) The Model of Reading: Modelling principles, Definitions, Schema, Alignments
    1. Cloud costs can be up to 5X higher than traditional on-premise infrastructure. And that while the cloud promise is so beautiful. What is going on? This article gives you more insight into the other side of the coin and shows you that the cloud promise is not the full story.

      Cloud costs are 5X higher than on-premise costs

      Cloud costs can be up to 5X higher than traditional on-premise infrastructure. And that while the cloud promise is so beautiful. What is going on? This article gives you more insight into the other side of the coin and shows you that the cloud promise is not the full story.

  4. May 2022
    1. Where around hooks shine is when you want to run an example within a block. For instance, if your database library offers a transaction method that receives a block, you can use an around to cleanly open and close the transaction around the example.
    1. The 6 Business Objectives of SaaS

      The main business objectives of a company are to address the problems and needs of their customers with products or services that are a solution for them. The importance of technology in our daily lives means that we simply cannot ignore SaaS when it comes to running our business.

    1. What does an IT Consultant do?

      An IT consultant is a person who offers advice, guidelines and a roadmap for the sourcing, use and management of IT resources and resources. The IT consultant provides organizations with best practices for using IT solutions and services for their business objectives and in solving their problems. He also often gives organizational advice.

    1. "I'd want to learn a lot from Professor Zimmerman so that I may obtain as much information as possible and use it in reality. It's not about the work."

    2. "To summarize, I am prepared to conquer all hurdles in my path to achieving the career of my dreams so that I may contribute to my society. I am a firm believer in the concept of dreams coming true."

    1. Most of the early books for children were didactic rather than artistic, meant to teach letter sounds and words or to improve the child's moral and spiritual life. In the mid-1700s, however, British publisher John Newbery (1713–1767), influenced by John Locke's ideas that children should enjoy reading, began publishing books for children's amusement. Since that time there has been a gradual transition from the deliberate use of purely didactic literature to inculcate moral, spiritual, and ethical values in children to the provision of literature to entertain and inform. This does not imply that suitable literature for children is either immoral or amoral. On the contrary, suitable literature for today's children is influenced by the cultural and ethical values of its authors. These values are frequently revealed as the literary work unfolds, but they are a means to an end, not an end in themselves. Authors assume a degree of intelligence on the part of their audience that was not assumed in the past. In this respect, children's literature has changed dramatically since its earliest days.

      Children's Literature began as a means of teaching letter and sounds and words. It also began with the purpose to improve the child's moral and spiritual life.It began in John Newberry's idea that reading should be fun for children.

    1. At every step of the process we target a specific risk: the risk of not shipping on time. .... Improving your discovery process should come after regaining your ability to ship.

      You can have the best strategy in the world, but if you can't act on it, what good does it do?

    Tags

    Annotators

    1. Is IT Maintenance the same as IT Management? For some it may be a semantic discussion while others consider these words synonymous.

      IT Maintenance and IT Management are not the same

      Is IT Maintenance the same as IT Management? For some it may be a semantic discussion while others consider these words synonymous.

  5. Apr 2022
    1. Which Components of IT Infrastructure do we need for DevOps?

      Many companies that want to move to DevOps eventually struggle with the question “What are the Components of IT Infrastructure we need? The use of DevOps stems from the desire to be able to release software more often and faster. The traditional Operations Team (OPS) however will not wholeheartedly embrace this because they would rather benefit from maintaining a stable infrastructure and its maintenance.

    1. “An NFT marketplace is abbreviated as a digital token. It is specifically designed to be used as proof of a digital certificate of the proprietary rights for things like tweets, physical or virtual assets, codes, videos and much more. For example, the very first tweet of Jack Dorsey (best known as being the co-founder of Twitter) was sold as an NFT for $2.9m.”
    1. Another elaborate site touching advanced C/C++ issues.

    1. How do you get your annotations into the rest of your workflow for notes and learning? How do you prevent that your social annotation tool is yet another separate place where one keeps stuff, cutting off the connections to the rest of one’s work and learning that would make it valuable?

      Where

      My annotations broadly flow into two spaces:

      Obsidian

      My private Obsidian-based vault is where I collect the notes and actively work on, modify, edit, and expand them if and when necessary. This is also the space where I'm broadly attempting to densely interlink them together for future use and publication in other venues. If I could, I would publish these all on the web, but I've yet to find a set up with a low enough admin tax that I can publish them inexpensively in a way I'd like them to appear (primarily with properly linked [[WikiLinks]]) while still owning them in my own space.

      I've been experimenting around with using Blot.im as a solution to display them here https://notes.boffosocko.com/, but at present it's a very limited selection of my extant notes and doesn't include Webmention or other niceties I'd like to add. As it's a very alpha stage experiment I don't recommend anyone follow or use it and it may disappear altogether in the coming months.

      WordPress

      My main website uses WordPress. To a great extent, this is (now) primarily a back up location and the majority of the annotations are unpublished to the public, but are searchable to me on the back end.

      I do, however, use it occasionally for quickly publishing and syndicating select annotations which I think others may find interesting or upon which I'm looking for comments/feedback and don't expect that the audience I'd like these from will find them natively on Hypothes.is' platform. An example of this might be a paper I was reading this weekend on Roland Barthes which discusses his reasonably well documented zettelkasten-like note taking practice. The article can be found here: https://culturemachine.net/wp-content/uploads/2019/01/373-604-1-PB.pdf with the annotations seen here: https://docdrop.org/pdf/The-Card-Index-as-Creativity-Ma---Wilken-Rowan-upq8g.pdf/. To tip off others in the space, I made a post on my site with a bit of a puzzle and syndicated it to Twitter. A few hours later I posted a follow up with some additional details and links to my notes on hypothesis which got some useful feedback from Matthias Melcher on the Barthes paper as well as on a related paper I mentioned by Luhmann, particularly about German translation, with which I have little facility.

      Another recent illustrative example was this annotation on the Library of Congress website about Vladimir Nabokov which was picked up by my website (though unpublished/not public) but which I syndicated to Twitter primarily to be able to send a notification to Eleanor Konik who I know is interested in the idea of World Building using historical facts and uses Obsidian in her work. (The @mention in the tweet is hiding in the image of the index card so that I could save text space in the main tweet.) Several others interested in note taking and zettelkasten for writing also noticed it and "liked" it. Not being on Hypothes.is to my knowledge much less following me there, neither Eleanor nor the others would have seen it without the Tweet.

      Nabokov used index cards for his research & writing. In one index card for Lolita, he creates a "weight-heigh-age table for girls of school age" to be able to specify Lolita's measurements. He also researched the Colt catalog of 1940. #WorldBuildinghttps://t.co/i16Yc7CbJ8 pic.twitter.com/JSjXV50L3M

      — Chris Aldrich (@ChrisAldrich) April 10, 2022
      <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

      How

      Obsidian

      Getting annotations from Hypothes.is to Obsidian is a short two-step process which is reasonably well automated so that I don't spend a lot of time cutting/pasting/formatting.

      I start with an IFTTT recipe that takes the RSS output of Hypothes.is and creates text files directly into my Obsidian vault. The results are quite rudimentary and only include the title of the document, the permalink of the Hypothes.is post, the highlighted text, and my annotation. It doesn't include the tags as RSS doesn't have a specification for these.

      Second, I've set up Hypothesidian which has a much higher fidelity dovetail with the Hypothes.is API to get all the data and even the formatting set up I'm looking for. A reasonably well laid out set of instructions with a low/no code approach for it can be found at https://forum.obsidian.md/t/retrieve-annotations-for-hypothes-is-via-templater-plugin-hypothes-idian/17225. It allows importing annotations by a variety of methods including by date and by document URL. I've also made a small modification to it so that tags on Hypothes.is are turned into [[wikilinks]] in Obsidian instead of #tags which I only use sparingly.

      All the IFTTT annotations will be ported individually into a specific Obsidian folder where I'll process them. I can then quickly use Hypothesidian to import the properly laid out version (using templates) of the notes with just a few keystrokes and then focus my time on revising my notes if necessary and then linking them to the appropriate notes already in my system. Finally I'll move them into the appropriate folder based on their content—typically one of the following: zettelkasten, wiki, commonplace, dictionary, or sources (for bibliographic use). Careful watchers will notice that I often use Hypothes.is' "page notes" functionality to create a bookmark-like annotation into which I will frequently post the URL of the page and occasionally a summary of a piece, these are imported into my system and are used as source/bibliographic information. I also have some dovetailing with Zotero as a bibliographic set up which feeds into this data as well.

      This version which I've cobbled together works well for me so that I'm not missing anything, but there are definitely other similar processes available out there both for Obsidian (with plugins or scripts) as well as for other platforms. If I'm not mistaken, I think Readwise (a paid solution) has a set up for note transfer and formatting.

      WordPress

      As there isn't an extant Micropub client for Hypothes.is I initially used RSS as a transport layer to get my notes from Hypothes.is into WordPress. The fidelity isn't great in part because RSS doesn't include any tags. To get some slightly better presentation I set up a workflow using RSS output from Hypothes.is as input into an IFTTT workflow which outputs to a webhook that stands in as a Micropub client targeting my websites Micropub server. Some of the display on my site is assisted by using the Post Kinds plugin, which I know you've been working around yourself. The details may be above some, but I've outlined most of the broad strokes of how this is done in a tutorial at https://boffosocko.com/2020/01/21/using-ifttt-to-syndicate-pesos-content-from-social-services-to-wordpress-using-micropub/. In that example, I use the service Pocket as an example, but Hypothes.is specific information could easily be swapped out on a 1-1 basis.

      A custom stand-alone or even an integrated micropub client for Hypothes.is would be a fantastic project if someone wanted to dig into the details and dovetail it with the Hypothes.is API.

      Why

      Ideally, I'm hoping that small pieces loosely joined and IndieWeb building blocks will allow me to use the tools and have the patterns I'm looking for, without a lot of work, so that I can easily make annotations with Hypothes.is but have and share (POSSE) my content on my own site in a way that works much the way many IndieWeb sites dovetail with Twitter or Mastodon.

      I'm doing some portions of it manually at present, without a lot of overhead, but it would be fun to see someone add micropub and webmention capabilities to Hypothes.is or other IndieWeb building blocks. (I suspect it won't be Hypothes.is themselves as their team is very small and they're already spread thin on multiple other mission critical projects.)

      In the end, I'm using Hypothes.is as a well designed and convenient tool for quickly making notes on digital documents. All the data is flowing to one of two other locations where I'm actually making use of it. While there is some social layer there, I'm getting email notifications through the Hypothes.is settings and the data from my responses just gets rolled back into my spaces which I try to keep open and IndieWeb friendly by default. At the same time, for those who want or need it, Hypothes.is' interface is a great way of reading, searching, sorting, and interacting with my notes in public, particularly until I get something specific and user friendly up to do it on my own domain.

    1. assistive technology

      We should place the definition of Assistive Technology here: Assistive Technology is technology used by individuals with disabilities in order to perform functions that might otherwise be difficult or impossible.

    1. In Rails, this is known as nested layouts, and it is a bit awkward to use. The standard Rails practice for nested layouts is complicated and involves these considerations:
  6. Mar 2022
    1. The last note is that when binding commands to keyboard shortcuts it is often necessary to only have one command, not two commands connected with a pipe like we use above. You can accomplish this by invoking your piped command as a command string argumetn to a new shell like this:
    1. The while(true) is not a problem because the loop contains sleep 0.5 which relinquishes half a second of CPU time in each of the loop's iterations. Because of that (and the lightweightness of the xsel command invocation which comprises the other part of the loop), the CPU resources taken up by the loop will be exceedingly tiny even on the slowest of Ubuntu machines.
  7. readlists.jim-nielsen.com readlists.jim-nielsen.com
    1. https://readlists.jim-nielsen.com/

      <small><cite class='h-cite via'> <span class='p-author h-card'>Jim Nielsen</span> in (Re)Introducing Readlists (<time class='dt-published'>03/25/2022 23:09:14</time>)</cite></small>

    1. The IT Equipment Room (MER, SER and DER) guidelines

      It is clear that the Equipment_Rooms (MER, SER and DER) are important spaces for a company. Much of the business depends on these spaces. That is why many companies draw up minimal guidelines to ensure continuity.

    1. level 1Fatal_Taco · 2 days ago · edited 2 days agoArch Linux, and likely most distros, are defined by these few things and are not limited to:The Linux Kernel, what type of config and modules it's been compiled with.The pre-packaged programs it comes with by default.The init.The package manager.The repositories it references.The slightly differing Linux Filesystem Hierarchy.The types of computers it runs on.
    2. Just like any other distribution, Arch Linux is just a collection of utilities strapped together running Linux kernel under the hood.
  8. learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com
    1. insidious declamations should have no effect upon the wise legislators who have decreed liberty to humanity. The attacks the colonists propose against this liberty must be feared all the more insofar as they hide their detestable projects under the veil of patriotism. We know that illusory and specious descriptions have been made to you of the renewal of terrible violence. Already, perfidious emissaries have crept among us to foment destruction at the hands ofliberticides. They will not succeed, this 1 swear by all that is most sacred in liberty. My attachment to France, the gratitude that all the blacks conserve for her, make it my duty to hide from you neither the plans being fomented nor the oath that we renew to bury ourselves beneath the ruins of a country revived by liberty rather than suffer the return of slavery.

      Here Toussaint states that he refuses to let Vaublanc convince 'property' owners in St. Domingue to regress back to the use of enslavement. Toussaint also says that it he and other Blacks have gratitude to France and will not try to hide the fact they will all fight should, the "enemy of liberty" slavery return.

    1. Ruby Object Mapper (rom-rb) is a fast ruby persistence library with the goal of providing powerful object mapping capabilities without limiting the full power of the underlying datastore.
  9. Feb 2022
    1. How to reveal if developers are micromanaged? Ask the following.How do you handle bugs? Do you handle these as a team or an individual solves them?What’s your on-call policy? Do you have one?Do developers feel in control of the tasks? Do you have clear task scopes?

      Nice Qs no2 to the interviewer (and to the team members!).

    2. What can you use to find out fake agile practices?Ask the following questions:How do you handle bugs? Are bugs resolved as a team or an individual handles them?How often do you release software? What’s your release cadence?Do you have a product owner, scrum masters? How is communication to the client done?What’s your code review process? How many required approvals do you have? What’s the last comment you left on a code review?What’s your take on tech debt? How would you classify tech debt?Tell me more about testing practices. Do you use Sonar or other static analysis tools? Do you use integration, unit tests? Do you have a dedicated team of testers?How do you handle issues? Do you have an issue tracker?

      Nice Qs no1 to the interviewer (and to the team members!).

    1. Remember, our wizard controller is responsible for showing and updating steps, but our top-level controller is still responsible for managing our Pet models.
    1. Σημείο καμπής και ημερομηνία σταθμός είναι η 8η Δεκεμβρίου όπου για λόγους που όλοι μπορούμε να φανταστούμε, κόπηκε η πρόσβαση από το υπουργείο Ψηφιακής Πολιτικής.

      Ο Θεοδωρικάκος διαχειρίζεται KAI τα δεδομενα covid19!

    1. The most significant problem of a code review is asynchronous ping-pong of quite difficult questions/answers. This is inefficient, but also makes people frustrated.

      Indeed it's disheartening to await for a code-review.

  10. Jan 2022
    1. Defining the project scope means that you must have a clear vision and agreement on the outcomes of the project. This allows any deliverable of the project to remain on schedule.

      This is how you determine the project scope Defining the project scope means that you must have a clear vision and agreement on the outcomes of the project. This allows any deliverable of the project to remain on schedule.

    1. Is ITIL Losing Importance Due To SaaS? ITIL is a set of procedures and practices of IT service management when we mistakenly believe that we don't have to worry about that in SaaS. However, ITIL has many aspects and facets that encompasses running IT in an organization. Moreover, it is not a checklist for the implementation of specific services in specific environments. For SaaS, we can just use a different toolset to follow the general ITIL guidelines.

    1. The server generating a 401 response MUST send a WWW-Authenticate header field (Section 4.1) containing at least one challenge applicable to the target resource.

      Meaning that 99% of the people use it are using it "wrong" because they're not using it for HTTP authentication and don't send a WWW-Authenticate header field with their 401 response?

      Hmm. That's a tough one. On the one hand, the spec does say they must send it.

      Initial opinion

      But on the other hand, one could argue that that requirement only applies if using 401 for HTTP authentication. And that saying it's wrong to do so (as they claim at https://stackoverflow.com/questions/3297048/403-forbidden-vs-401-unauthorized-http-responses/14713094#14713094 and https://hyp.is/JA45zHotEeybDdM_In4frQ/stackoverflow.com/questions/3297048/403-forbidden-vs-401-unauthorized-http-responses) is having a too strict/narrow/literal interpretation.

      HTTP is meant to be used widely in many very different uses and contexts, most of which do not use this very specific HTTP authentication scheme; my opinion is that they shouldn't be denied from using it, just because they don't have anything useful WWW-Authenticate header field. (Or (which is also fine with me), just put something "emptyish" in the field, like "Unused". Unless that would trigger a Basic auth modal in the browser, in which case we shouldn't, for practical reasons.)

      Why shouldn't we be able to repurpose this same status code for uses that are still authentication, but just not HTTP authentication per se?

      Is it really wrong to repurpose this useful status code for other contexts, like cookie-based app-defined authentication systems?

      I say that it's okay to repurpose/reuse 401 for any authentication system (that uses HTTP as a part of it, even though not using HTTP's own authentication system), as long as we try to maintain the same semantic as originally intended/described here. I think it's okay to use 401 as a response to a XHR request, and then have the client redirect to a login page, which provides a way to authenticate again (reattempt the authentication challenge), analogous to how it works for HTTP authentication.

      Revised opinion

      https://stackoverflow.com/questions/3297048/403-forbidden-vs-401-unauthorized-http-responses/14713094#14713094 has made me change my mind and convinced me that...

      Authentication by schemes outside of (not defined by) RFC7235: Hypertext Transfer Protocol (HTTP/1.1): Authentication should not use HTTP status 401, because 401 Unauthorized is only defined (by current RFCs) by RFC7235: Hypertext Transfer Protocol (HTTP/1.1): Authentication, and has semantics and requirements (such as the requirement that "A server generating a 401 (Unauthorized) response MUST send a WWW-Authenticate header field containing at least one challenge.") that simply don't make sense or cannot be fulfilled if using a non-HTTP authentication scheme.

      403 Forbidden, on the other hand, is defined by the broader HTTP standard, in RFC7231: Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content and RFC7235: Hypertext Transfer Protocol (HTTP/1.1): Authentication.

      In conclusion, if you have your own roll-your-own login process and never use HTTP Authentication, 403 is always the proper response and 401 should never be used.

      Couldn't a custom auth system use WWW-Authenticate header?

      The question was asked:

      Doesn't RFC7235 provide for "roll-your-own" or alternate auth challenges? Why can't my app's login flow present its challenge in the form of a WWW-Authenticate header? Even if a browser doesn't support it, my React app can...

      And I would say sure, if you want (and if the browser doesn't automatically show a Basic auth modal in this case and thwart your plans).

      They might be on to something here with that question!

      But that should probably be the test of whether you can/should use 401: are you actually using WWW-Authenticate header?

      Indeed I found an example where it is used for OAuth2.

    1. Authentication by schemes outside of RFC2617 is not supported in HTTP status codes and are not considered when deciding whether to use 401 or 403.

      What does "are not considered when deciding whether to use 401 or 403" mean exactly? What exactly should not be considered, and what exactly should be considered instead? In other words, how did someone arrive at the conclusion that "if you have your own roll-your-own login process and never use HTTP Authentication, 403 is always the proper response and 401 should never be used."? Why is 403 okay to use for non-HTTP authentication, but not 401?

      Oh, I think I understand the difference now.

      They should have said:

      Authentication by schemes outside of (not defined by) RFC7235: Hypertext Transfer Protocol (HTTP/1.1): Authentication should not use HTTP status 401, because 401 Unauthorized is only defined (by current RFCs) by RFC7235: Hypertext Transfer Protocol (HTTP/1.1): Authentication, and has semantics and requirements (such as the requirement that "A server generating a 401 (Unauthorized) response MUST send a WWW-Authenticate header field containing at least one challenge.") that simply don't make sense or cannot be fulfilled if using a non-HTTP authentication scheme.

      403 Forbidden, on the other hand, is defined by the broader HTTP standard, in RFC7231: Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content and RFC7235: Hypertext Transfer Protocol (HTTP/1.1): Authentication.

      In conclusion, if you have your own roll-your-own login process and never use HTTP Authentication, 403 is always the proper response and 401 should never be used.

      See also my comments in https://hyp.is/p1iCnnowEeyUPl9PxO8BuQ/www.rfc-editor.org/rfc/rfc7235

    2. Meaning if you have your own roll-your-own login process and never use HTTP Authentication, 403 is always the proper response and 401 should never be used.
    3. If HTTP authentication is not in use and the service has a cookie-based authentication scheme as is the norm nowadays, then a 403 or a 404 should be returned.
    1. APIs that simply map CRUD actions to HTTP verbs have nothing to do with Application State Transfer. You can call them Web APIs or HTTP APIs, but please don’t call them RESTful.
    1. Sorry, let me rephrase. Is this how it is supposed to work? Because right now it looks like a bug. The documentation is really terribly sparse on this topic.
    1. This is just one of those things in CSS that seems easy to understand (and really, it should be), but it’s sometimes not — because of the way that percentages work in CSS.
    1. The Business Strategy stems from a detailed strategic planning process. However, the question we want to answer in this article is whether we can execute multiple strategies side by side while they do not interfere with each other. We compare multiple strategies for business, information provision and IT and focus on Strategic planning.

      Business strategy alignment and the secrets of strategic planning https://en.itpedia.nl/2022/01/02/business-strategie-alignment-en-de-geheimen-van-strategische-planning/ The Business Strategy stems from a detailed strategic planning process. However, the question we want to answer in this article is whether we can execute multiple strategies side by side while they do not interfere with each other. We compare multiple strategies for business, information provision and IT and focus on Strategic planning.

  11. Dec 2021
    1. Do you blame individuals?How do you fix bugs?Do you assign all the bugs to one person?

      Interview Q for hiring project-managers & leads.

    2. What do you feel that your employer does well at, as a company, organization, or employer?Describe one thing that company did on your proposal?Does company hears your issues? How does company helps with your issues?What do you feel that your employer needs to improve on the most, as a company, organization, or employer?Would you recommend this company to your friends?Do you see yourself in this company in the future?What’s your turnover rate? How many people left the company last year and why?

      Interview Qs about previous employer revealing cooperation issues.

    1. Green computing, or green information technology, is the practice of environmentally sustainable computing. In this article we take a closer look at: * Greening the workplace. * A green workplace business case. * Opportunities to make Data Centers greener by: - ​​Other IT equipment. - The cooling of IT spaces. - The data center buildings.

      Green computing : Workplace and data center, a real business case https://en.itpedia.nl/2021/12/11/green-computing-werkplek-datacenter-business-case/ Green computing, or green information technology, is the practice of environmentally sustainable computing. In this article we take a closer look at: Greening the workplace. A green workplace business case. * Opportunities to make Data Centers greener by: - ​​Other IT equipment. - The cooling of IT spaces. - The data center buildings.

  12. Nov 2021
    1. The moment one gets into the ‘expert’ state of mind a great number of things become impossible.”

      Being an IT expert means always being arrogant.

    1. Finally, I think Actions are great for animations, because you will definitely need to apply the same logic to many different elements. One of my favorite examples are FLIP animations, where a change in DOM position can be animated. For example shuffling a list of items. I will not dive deep into the topic in this article: I've written about some techniques in this article about FLIP animations in React and in this article about how to create spring animations with Web Animation API. Although they are not about Svelte, at the end of the day it all boils down to manipulating the HTML element directly. And Svelte Actions are a great place to do it.
    1. Honestly, I don't know. Strictly speaking it's different to a window being opened at a specific size (I can see the difference). I don't know whether that difference is material. Seeing as these are tests, I'd like to remove as many unknowns as possible. If someone can tell me that it makes no difference then I'd be happy.
    1. Even if #foo is originally on the page and then removed and replaced with a #foo which contains baz after a short wait, Capybara will still figure this out.
    2. As long as you stick to the Capybara API, and have a basic grasp of how its waiting behaviour works, you should never have to use wait_until explicitly.
    3. Let’s make that really clear, Capybara is ridiculously good at waiting for content.
    4. apybara could have easily figured out how to wait for this content, without you muddying up your specs with tons of explicit calls to wait_until. Our developer could simply have done this: page.find("#foo").should have_content("login failed")
    5. Now after a long debugging session, our developer has found the timing issue. They now realize that there is a wait_until method in the API, and immediately think that, "hey, this sounds like what I need!"
    6. Its existence confuses people into thinking that it is necessary, when in fact it isn’t.
    1. apt-rdepends exists. This functionality should really reside in apt-cache itself.

      Update: Maybe it does already exist now. I was able to run this, for example without apt-rdepends being installed: apt-cache rdepends --installed libwebpmux3

    1. Calling a software convention "pretty 90s" somewhat undermines your position. Quite a lot of well-designed software components are older than that. If something is problematic, it would be more useful to argue its faults. When someone cites age to justify change, I usually find that they're inexperienced and don't fully understand the issues or how their proposed change would impact other people.
    1. I posted a question about MD5 hash collision back in 2014. As far as I know questions about algorithms are on-topic on Stack Overflow, and the cryptography tag did not have the warning "CRYPTOGRAPHY MUST BE PROGRAMMING RELATED" back then.
    2. Someone reported it for being off-topic, but a mod declined it with a comment "I see no reason why this is off-topic. Not a programming question? You must surely be joking!", so it seems that this is controversial for the mods as well.
  13. Oct 2021
    1. From a client side/application (as a whole) standpoint this is an internal endpoint, for the router of SvelteKit this would be an external resource.
    1. Inflections go the other way around.In classic mode, given a missing constant Rails underscores its name and performs a file lookup. On the other hand, zeitwerk mode checks first the file system, and camelizes file names to know the constant those files are expected to define.While in common names these operations match, if acronyms or custom inflection rules are configured, they may not. For example, by default "HTMLParser".underscore is "html_parser", and "html_parser".camelize is "HtmlParser".
    2. All these problems are solved in zeitwerk mode, it just works as expected, and require_dependency should not be used anymore, it is no longer needed.
    1. And on any given day, developing with Svelte and its reactive nature is simply a dream to use. You can tell Svelte to track state changes on practically anything using the $: directive. And it’s quite likely that your first reactive changes will produce all the expected UI results.
  14. Sep 2021
    1. Laying a drainage pipe for plumbing is a job for professionals. Most cities and homeowner’s associations won’t look kindly upon extensive do-it-yourself excavation projects.
    1. Best demonstration: glue PVC inside an ABS hub or vice-versa. Cut through the two with a mitre saw and make a nice, clean cut. Look at all the voids where the plastics didn't glue together.
    1. Installing a sanitary tee and wye drain, or any multi-outlet drainage fitting requires basic plumbing knowledge. Once you know the basics, it is easy to install this kind of piping system without hiring outside assistance.
    1. It is also why it's implementation in firefox is completely useless, considering that windows/osx/most linux distros plan to add support for DoH/DoT/DNScrypt resolvers in the near future, so firefox doing it itself will provide no additional benefit.
    1. The main concern for most organizations is to keep complete control over their project. To let them reach the end results, the IT staff augmentation model was brought into the picture.
    1. Update API usage of the view helpers by changing javascript_packs_with_chunks_tag and stylesheet_packs_with_chunks_tag to javascript_pack_tag and stylesheet_pack_tag. Ensure that your layouts and views will only have at most one call to javascript_pack_tag or stylesheet_pack_tag. You can now pass multiple bundles to these view helper methods.

      Good move. Rather than having 2 different methods, and requiring people to "go out of their way" to "opt in" to using chunks by using the longer-named javascript_packs_with_chunks_tag, they changed it to just use chunks by default, out of the box.

      Now they don't need 2 similar but separate methods that do nearly the same, which makes things simpler and easier to understand (no longer have to stop and ask oneself, which one should I use? what's the difference?).

      You can't get it "wrong" now because there's only one option.

      And by switching that method to use the shorter name, it makes it clearer that that is the usual/common/recommended way to go.

    2. Webpacker used to configure Webpack indirectly, which lead to a complicated secondary configuration process. This was done in order to provide default configurations for the most popular frameworks, but ended up creating more complexity than it cured. So now Webpacker delegates all configuration directly to Webpack's default configuration setup.

      more trouble than it's worth

      • creating more complexity than it cured
    1. I’ve written a few thousand words on why traditional “semantic class names” are the reason CSS is hard to maintain, but the truth is you’re never going to believe me until you actually try it.