1,686 Matching Annotations
  1. Mar 2021
  2. kubernetes.io kubernetes.io
    1. Path to credentials to authenticate itself to the API server.

      那为为什么叫 kubeconfig?而不是kube-credentials-path? 参见 https://github.com/zecke/Kubernetes/blob/master/docs/user-guide/kubeconfig-file.md kubeconfig 就是存鉴权信息地方

    2. Kubernetes keeps the object for the invalid Node and continues checking to see whether it becomes healthy.You, or a controller, must explicitly delete the Node object to stop that health checking.

      有没有某种机制是用来检查这个异常状态的?

    1. Or even a simple 1-liner in the Contract that references an AR Model so you don't have to rewrite the validations again in that contract, or have to choose between writing the validations once either in the contract there or in the AR Model?
    1. Durham

      does this trajectory say something: Winston-Salem-Durham-hill above Harlem.... is this person a long way from home?

    1. Essentially we're trying to figure out when it's appropriate for "my" code to become "everyones" code, and if there are steps in between. ("Standard library", for example.)
    1. Self answer: 4d00bdf it seems to be to prevent shifting lines in source maps.
    2. This semi-colon is added to prevent changing the code behaviour (the famous line ending with parentheses, etc) Most people will use a JS minifier If they don't, a single extra character is unlikely to change much If I'm right about all the above: Why don't we simply always add a semi-colon regardless of what the file ends with?
    1. What is the point of avoiding the semicolon in concat_javascript_sources

      For how detailed and insightful his analysis was -- which didn't elaborate or even touch on his not understanding the reason for adding the semicolon -- it sure appeared like he knew what it was for. Otherwise, the whole issue would/should have been about how he didn't understand that, not on how to keep adding the semicolon but do so in a faster way!

      Then again, this comment from 3 months afterwards, indicates he may not think they are even necessary: https://github.com/rails/sprockets/issues/388#issuecomment-252417741

      Anyway, just in case he really didn't know, the comment shortly below partly answers the question:

      Since the common problem with concatenating JavaScript files is the lack of semicolons, automatically adding one (that, like Sam said, will then be removed by the minifier if it's unnecessary) seems on the surface to be a perfectly fine speed optimization.

      This also alludes to the problem: https://github.com/rails/sprockets/issues/388#issuecomment-257312994

      But the explicit answer/explanation to this question still remains unspoken: because if you don't add them between concatenated files -- as I discovered just to day -- you will run into this error:

         (intermediate value)(...) is not a function
             at something.source.js:1
      

      , apparently because when it concatenated those 2 files together, it tried to evaluate it as:

         ({
           // other.js
         })()
         (function() {
           // something.js
         })();
      

      It makes sense that a ; is needed.

    1. Yes, but honestly, and no offense intended, but I don't see the harm in these type questions, nor why some people are offended when they are asked. If I owed a website, I wouldn't mind it because it just creates more pages that can be indexed. I see it as helping the website. But, I did look and didn't see a simple answer. Again, no offense is intended. I've just never understood the complaints.
    1. Thinking can be identified in many different sorts of inscriptions: written words, sounds, images, traces.

      La pensée n'est donc que traces. Dirais-tu que la voix, sans technologie d'enregistrement, n'est que pensée dans la mesure où elle a une « conscience » pour la recevoir, c'est-à-dire une surface sur laquelle s'inscrire?

      On pourrait même stipuler que la pensée n'est autre qu'énergie transformée et emmagasinée. Mes cordes vocales produisent des ondes sonores (une forme d'énergie) qui sont ensuite reçues par un système auditif qui l'interprète et envoie des signaux électromagnétique (toujours de l'énergie) au cerveau.

    1. thought always corresponds to the material conditions of its production

      matérialisme dialectique?

    2. Dogmatic realism

      Serait-il plus clair de parler de réalisme direct, « naïf »?

    3. In today’s digital environment, this question arises in a particular way, and this text could not exist independently of the technological environment in which it emerges.

      Il faudrait définir précisément ce que "technological environment" signifie, et pourquoi pas plutôt "technical environment" par exemple (sans vouloir couper les cheveux en 4) ?

    4. This is the paradox of access.

      Ce "paradoxe de l'accès" pourrait aussi être comparé avec la question de l'accès aux données numériques ? Les données sont produites, stockées, mais sont-elles encore accessibles, compréhensibles (par des machines ou des humains) ou exploitables ?

    1. the concept of world will be tentatively defined as follows: the world is everything which is.

      Comment cette définition minimale interagit-elle avec la définition de monde en logique modale comme ensemble logique (non-contradictoire) de propositions nécessaires et contingentes (Leibniz)? Pour ses fins méthodologiques, les logiciens contemporains (XXe) semblent fonder une ontologie non sur les objets, mais des propositions appréhendables par le langage. Il semble, aux premiers abords, que la logique modale reformule un certain idéalisme. Mais la position des logiciens est-elle réellement irréconciliable avec celle du new materialism?

    1. ab­sorbed

      jazz and 'city vs rustic' as hot and cold? don't follow rly

    2. It is this implosive factor that alters the position of the Negro, the teen-ager, and some other groups. They can no longer be contained, in the political sense of limited association. They are now involved in our lives, as we in theirs, thanks to the electric media.

      they can no longer be CONTAINED? is he saying they can no longer be blissfully ignored like above?

    3. The Theater of the Absurd

      what are these theaters he's talking about??

    Tags

    Annotators

  3. Feb 2021
    1. To whom did you sell your keys and at what kind of rates? https://steamcommunity.com/id/playa131 for example resells them and might be the source for DIG's purchases.
    1. Currently, only Right signals are wired up.

      So what happens if a task returns a Left signal?? Will it still go Right? Will it error?

    1. For each output declared in outputs, the corresponding environment variable is set to point to the intended path in the Nix store for that output. Each output path is a concatenation of the cryptographic hash of all build inputs, the name attribute and the output name. (The output name is omitted if it’s out.)

      QUESTION: So when I see $out in a builder script, it refers to the default output path because the output attribute in the Nix expression has never been explicitly set, right?

    2. derivationA description of a build action. The result of a derivation is a store object. Derivations are typically specified in Nix expressions using the derivation primitive. These are translated into low-level store derivations (implicitly by nix-env and nix-build, or explicitly by nix-instantiate).

      Organically related to the annotation regarding my nix-shell confusion.

      The dissection of this definition to show why I find it lacking:

      A description of a build action.

      The first (couple) time(s) I read the manuals, this description popped up in many places, and I identified it with Nix expression every time, thinking that a derivation is a synonym for Nix expression.

      Maybe it is, because it clearly tries to disambiguate between store derivations and derivation in the last sentence.

      The result of a derivation is a store object.

      Is this store object the same as a store derivation?

      Derivations are typically specified in Nix expressions using the `derivation primitive. These are translated into low-level store derivations (implicitly by nix-env and nix-build, or explicitly by nix-instantiate).

      QUESTION: So, the part of the Nix build expression (such as default.nix) where the derivation primitive is called (explicitly or implicitly, as in mkDerivation) is the derivation, that will be ultimately be translated into store derivations?

      ANSWER: Start at section 15.4 Derivation.


      QUESTION: Also, why is typically used here? Can one define derivations outside of Nix expressions?

      ANSWER(?): One could I guess, because store derivations are ATerms (see annotation at the top), and the Nix expression language is just a tool to translate parameterized build actions into concrete terms to build a software package. The store derivations could be achieved using different means; e.g., the way Guix uses Guile scheme to get the same result))


      I believe, that originally, derivation was simply a synonym to store derivation. Maybe it still is, and I'm just having difficulties with reading comprehension but I think the following would be less misleading (to me and apart from re-writing the very first sentence):

      Derivations are typically the result of Nix expressions calling the derivation primitive explicitly, or implicitly usingmkDerivation`. These are translated into low-level store derivations (implicitly by nix-env and nix-build, or explicitly by nix-instantiate).

    3. $stdenv/setup

      QUESTION: Does this refer to pkgs/stdenv/generic/setup.sh? According to 6.5 Phases in the Nixpkgs manual?

      ANSWER: I'm pretty sure it does. It sets up the environment (not sure how yet; I see the env vars, but not the basic commands - sed, awk, etc. - that are listed below) and defines a bunch of functions (such as genericBuilder) but it doesn't call these functions!

    4. substitute

      this is another key topic. Also:

      • substitute vs. substituter => this (I think)

      See annotations with the substitute tag

    5. When you ask Nix to install a package, it will first try to get it in pre-compiled form from a binary cache. By default, Nix will use the binary cache https://cache.nixos.org; it contains binaries for most packages in Nixpkgs. Only if no binary is available in the binary cache, Nix will build the package from source. So if nix-env -i subversion results in Nix building stuff from source, then either the package is not built for your platform by the Nixpkgs build servers, or your version of Nixpkgs is too old or too new.

      binary caches tie in with substitutes somehow; get to the bottom of it. See annotations with the substitute tag.

      Maybe this?

    6. At the same time, it is not possible for one user to inject a Trojan horse into a package that might be used by another user.
    7. Chapter 6. SecurityNix has two basic security models. First, it can be used in “single-user mode”, which is similar to what most other package management tools do: there is a single user (typically root) who performs all package management operations. All other users can then use the installed packages, but they cannot perform package management operations themselves.Alternatively, you can configure Nix in “multi-user mode”. In this model, all users can perform package management operations — for instance, every user can install software without requiring root privileges. Nix ensures that this is secure. For instance, it’s not possible for one user to overwrite a package used by another user with a Trojan horse.

      Would have been nice to link these to the install chapter where single- and multi-user modes were mentioned.

      How would this look in a topic-based documentation? I would think that his chapter would be listed in the pre-requisites, and it could be used to buld different reading paths (or assemblies in DocBook, I believe) such as practical, depth-first (if there are people like me who want to understand everything first), etc.

    8. reentrancy
    9. nix-shell '<nixpkgs>' -A pan

      What is happening here exactly?

      nix-shell's syntax synopsis always bugged because it looks like this

      SYNOPSIS
      nix-shell [--arg name value] [--argstr name value] [{--attr | -A} attrPath] [--command cmd] [--run cmd] [--exclude regexp] [--pure] [--keep name] {{--packages | -p} packages...  | [path]}
      

      and the canonical example is nix-shell '<nixpkgs>' -A pan; what tripped me up is that path is usually the first in examples, and I thought that the position of arguments are strict. As it turns out, nix-shell -A pan '<nixpkgs> is just as valid.

      Side note<br> Apparently there is no standard for man pages. See 1, 2.

      '<nixpkgs>' path is the one specified in the NIX_PATH environment variable, and -A pan looks up the pan attribute in pkgs/top-level/all-packages.nix in the Nixpkgs repo.

    1. 17.3. Fixed point

      QUESTION: What is a fixed-point of a function?

      ANSWER: See this video) at least, and the Fixed-point (mathematics)) wikipedia article:

      In mathematics, a fixed point (sometimes shortened to fixpoint, also known as an invariant point) of a function is an element of the function's domain that is mapped to itself by the function. That is to say, c is a fixed point of the function f if f(c) = c. This means

      f(f(...f(c)...)) = f n(c) = c
      

      an important terminating consideration when recursively computing f. A set of fixed points is sometimes called a fixed set.

      For example, if f is defined on the real numbers by f(x)=x^{2}-3x+4,}, then 2 is a fixed point of f, because f(2) = 2.

      There is also the wiki article fixed-point combinator that actually plays a role here, but read through the articles in this order.

      Then dissect the Stackoverflow thread What is a Y combinator?, and pay attention to the comments! For example:

      According to Mike Vanier's description, your definition for Y is actually not a combinator because it's recursive. Under "Eliminating (most) explicit recursion (lazy version)" he has the lazy scheme equivalent of your C# code but explains in point 2: "It is not a combinator, because the Y in the body of the definition is a free variable which is only bound once the definition is complete..." I think the cool thing about Y-combinators is that they produce recursion by evaluating the fixed-point of a function. In this way, they don't need explicit recursion. – GrantJ Jul 18 '11 at 0:02

      (wut?)

      Other resources in no particular order:


      QUESTION: How the hell did they come up with the idea of using this with Nix and package management? (..and who? I remember a video saved somewhere, but maybe that was about overlays)


      QUESTION: ... and how does it work in this context?

      ANSWER: Well, not an answer yet, but this may be something in the right direction:

      http://blog.tpleyer.de/posts/2020-01-29-Nix-overlay-evaluation-example.html

    2. there's no ldconfig cache either. So where does bash find libc?

      QUESTION: What is ldconfig cache?

      QUESTION: What is libc and why does Bash need it?

    3. Derivations/packages are stored in the Nix store as follows: /nix/store/hash-name, where the hash uniquely identifies the derivation (this isn't quite true, it's a little more complex), and the name is the name of the derivation.

      QUESTION: So the Nix store houses derivations and not the built packages?

      QUESTION: Are the hashes in the Nix store not unique?

    1. The latter are important examples which usually also exist in "purely" functional programming languages.

      How can they exist and it still be considered pure??

      I guess that's not quite the same / as bad as saying something had side effects in a purely functional programming context, right?

    1. provide interfaces so you don’t have to think about them

      Question to myself: Is not having to think about it actually a good goal to have? Is it at odds with making intentional/well-considered decisions?  Obviously there are still many of interesting decisions to make even when using a framework that provides conventions and standardization and makes some decisions for you...

    1. What is the opposite of free content?

      The opposite of free/open-source software is proprietary software or non-free software (https://en.wikipedia.org/wiki/Proprietary_software).

      So should we call the opposite of free content "non-free content"? Or "proprietary content"?

      Seems likes either would be fine.

      Looks like https://en.wikipedia.org/wiki/Wikipedia:Non-free_content prefers the term "non-free content".

      Couldn't find anyone contrasting these 2 terms (like I could no doubt find for software):

      Not to be confused with:

      • paid content ... just like:
      • free content should not be confused with gratis content (?)
      • free software should not be confused with freeware
    1. Why then sending the SIGINT manually to the shell doesn't kill the child, e.g. 'kill -2 <shell-pid>' doesn't do anything to a child process while Ctrl-C kills it?
    1. Specifying a name and a src is the absolute minimum Nix requires.

      Didn't they mean what mkDerivation requires?

      I have been jumping around in this manual, so not sure about what arguments does derivation require.

    1. What do you get when you add a sudden surge of demand to an equally sudden loss of capacity? A crisis, whose roots lie in a decade’s worth of deregulation and cost-cutting, of an energy “independence” that has left the state at the mercy of the elements.

      The author is asking a rhetorical question and answering it immediately. He is doing this not only to clear one of the audience's questions regarding the consequences of Texas situations, but also to make the government officials more guilty for leaving Texas in this situation.

    1. compose(Add, x: x, y: 3)

      How is this better than simply:

      Add.run(x: x, y: 3)
      

      ?

      I guess if we did that we would also have to remember to handle merging errors from that outcome into self...

    1. However, using channels is not fully reproducible, as a channel may evolve to incorporate updates.

      TODO: Find other sources about this topic. I remember this mentioned already (and it makes) sense, but need to learn more.

      TODO: What is a better alternative? An own repo? Flakes? Can cachix help?

      It says right below that pinning can help but keep looking.

      When package reproducibility become a major concern, as it is the case in this tutorial, it is preferable to refer to a pinned version of the nixpkgs repository instead — i.e, a specific commit of the repository or an immutable archived tarball. The ability to pin the version of nixpkgs is powerful, it will ensure that a package is always constructed from the same Nix source. As we go deeper in the tutorial we avoid using channels in favor of pinned environments.

    1. Service Balance = Value of service exports –Value of service Imports

      Question: How do they measure the value of import services?

    Tags

    Annotators

    1. An asthmatic, she had been taken to the hospital nearly 30 times in less than three years and suffered numerous seizures

      Does this relate and increase how it impacts the pollution aspect compared to if it had been someone without asthma?

    2. he first person in Britain to officially have air pollution listed as a cause of death,

      How would this relate and compare to other countries in general? Or in more specific areas in places that have higher amounts of people dying from pollution?

    1. you'll want to update Devise's generated views to remove references to passwords, since you don't need them any more

      Doesn't this contradict the statement

      This strategy plays well with most other Devise strategies

      (which includes password strategies)?


      One thing that wasn't clear from their instructions was whether magic links could be used as an option in addition to regular password log-ins. On the one hand they say:

      This strategy plays well with most other Devise strategies (see notes on other Devise strategies).

      but on the other hand they say:

      you'll want to update Devise's generated views to remove references to passwords, since you don't need them any more

    1. While all these things were happening in various places, Saturnian Juno sent Iris from heaven to brave Turnus,

      We continually see Juno try to intervene, all the while working in accordance with the will of Jupiter and the fates. This begs the question, are gods bound by the fates, or do they shape them? Juno is queen of heaven, a leader of the gods, so why cant she shape fate as Jupiter seems to be able to?

    1. unfamiliar—that is, a metaphorical Journey in which designers move into unchartered territory by attempting to formulate what hasn’t yet been formulated.

      Head Scratcher: using this simple explanation of "unfamiliar" we can see that it is difficult to navigate through territory that has not been properly formed yet or mapped out.

      How do we move forward as Instuctional Designers into the future of Education and Instruction?

      My best efforts so far have been to never be afraid to try new models or technology to lead your instruction.

    1. but what does it mean to be clever, and how can you teach someone to be clever?

      Head Scratcher: How do you teach "cleverness"? This is a tough question and I feel that it is hard to understand for most instructors. How do I get my students to be more creative and clever, I believe we usually feel that students either are or are not creative and thats the end of the story. So really maybe we are the ones at fault for not teaching studetns to be "creative".

    1. We still must decide how to present certain information, but it doesn’t have to be at the cost of another medium.

      Headscratcher: How do we make sure, in our times creating instuction, that we do not neglect a medium that could be used for instruction?

      I feel that one way could be to allow learners choice in how they respond to prompts and learning. I feel that this could allow for students to use their gifting and talents to excel and produce amazing work.

    1. the most productive environment possible for people that use their computer to create.What is a productive environment?How do you measure productivity in an operating system environment?How do you compare YOUR distribution to other distributions when it comes to productivity?Is the way in which 'people that use their computer to create' (creators) the same across all professions and activities?Does a photographer have the same requirements for a productive environment as a software engineer?Why do you think your distribution will be the best for delivering a productive environment than any other Linux distribution?
    1. deconstructing Brazilian gender roles through their performances

      An interesting concept I'd like to consider and interrogate. Does exacerbating and essentially parodying gender roles ACTUALLY work to dismantle those roles, or does it enforce them?

      No strong opinion yet. Come back to this.

    1. A blue-grey spider lay on her exposed cheek. But when I held the match closer there was nothing there, nothing but the faint outlines of a dimple.

      Could there be any other reason or meaning behind the confusing of a pimple with a blue-grey spider, except for the narrator being drunk?

  4. Jan 2021
    1. A value of -1 will disable the limit and the chunk size will grow indefinitely.

      Below it mentions a value of off, where does -1 come from? And since --vfs-read-chunk-size has a nonzero default value does that mean that this feature is on by default, and with an unlimited limit?

    1. Third, it is important to remember that causal conclusions can only be drawn about the manipulated independent variable.

      But can causal conclusions be drawn about the conjunction of the manipulated and non-manipulated variables? Would Schnall and colleagues be justified in concluding that disgust and body consciousness together affect the harshness of moral judgments?

    1. Both longstanding tradition and popular wisdom hold that languages can vary from each other in their degree of relative complexity. However, by the late 20th century a consensus had arisen among linguists that all languages are equally com-plex.

      Why do you think this shift happened?

    1. The model is trained on 147M multi-turn dialogue from Reddit discussion thread. The largest model can be trained in several hours on a 8 V100 machines (however this is not required), with distributed training and FP16 option.

      github-dialogpt traning problem

    1. S. cerevisiae is amenable to genome engineering because of its capacity for efficient homologous recombination, although its transformation efficiency is much lower than that of E. coli.

      This is a very logical explanation provided for why S. cerevisiae is a strong candidate for the organism for the experiment because of its efficient homologous recombination, however since it notes E. coli has a superior transformation efficiency, why isn't that used instead?

    1. Students may be more willing to express their thoughts privately, or on a document that only the teacher can read. Social annotations, on the other hand, can function more like a class discussion, with students reading and responding to each other’s comments.

      I wonder if there are any statistics that show what students prefer?

    2. students practice annotation of digital texts outside of school. For example, students add filters, drawings, emojis, and writing to content they create or interact with in digital spaces such as Snapchat, Instagram, and YouTube.

      I feel like students do not understand that Snapchats, Instagram, Youtube are considered digital annotations because when students are using these technological tools, they are just having fun. In order to teach them that these tech tools are digital annotations, we as teachers need to help them connect the phrase "digital annotation" to these technology tools.

    1. Interpret at least 5 significant “events” which best demonstrate this change.
    2. conditions and consciousness

      what do these mean?

    3. Compare and contrast the conditions and consciousness of the following relative to the WASP male “winners”
    4. Many did not enjoy the rewards produced by industrial and financial capitalism in the United States.

      What is industrial and financial capitalism???

    5. List and interpret the most significant issues found in the document itself and place each in a valid and revealing historical context.
    6. Is it appropriate to define the European people occupying British North America as “American” prior to 1763?
    7. Is it appropriate to define the European people occupying British North America as “American” prior to 1763?
    8. Between the first days of the European Invasion of North America and the ratification of the constitution there were both winners and losers here. List, in rank order, the most significant groups of winners and losers. What factors best explain the relative conditions of the groups on your lists? Connect causes and consequences to each. Were these outcomes inevitable? If so, why?

      Subject = American Conquest EQ = Who won and lost and why? Activities:

    1. It isn’t always guaranteed to be a single root element, in that case it could return an array of elements?
    1. Nous nous concentrerons sur deux de ces nouvelles approches émergentes en sciences cognitives, à savoir le paradigme de la cognition distribuée et les recherches en Acao, où la nature de l'activité instrumentée se pose comme question de recherche fondamentale.
    1. Get back to Chromium : how its evolution will be handled by Debian ? How its cousin-sister-child projects will be handled ( vivaldi, brave, electron… ) ?
    1. What if there's an icon that I need that's not in this set?

      How do I add a custom icon to the set for use on a web page and have the custom icon styled the same way as these "standard" icons?

      Like how they have instructions for adding an icon here, for example: https://www.digitalocean.com/community/tutorials/angular-custom-svg-icons-angular-material#custom-svg-icons

    1. What if your download UI element isn’t just for a single static asset, but is actually generating a custom file when you press it? For example, if you have a list of files, you can check as many as you want, and pressing a download UI element zips those files together and then downloads that one file. In this case, we’d be using JS anyway, and the UI element is triggering more than just the link, it is ‘performing actions’, so a button would make sense, right?
    2. What best describes a download? Is it a triggered action, and therefore should be in the domain of the <button> element? Or is it a destination, and therefore best described using an <a> element?
  5. Dec 2020
    1. If the Klensin Standards Track [Page 19] RFC 5321 SMTP October 2008 recipient is known not to be a deliverable address, the SMTP server returns a 550 reply, typically with a string such as "no such user - " and the mailbox name (other circumstances and reply codes are possible).

      Will the entire transaction be canceled? "Transaction" in the name of this a section implies yes, but what if all the recipients are valid?

      See replies below but the answer is no; an RCPT command is specified for each recipient in the mail data, these RCPT commands will be evaluated in sequence,, and any SMTP (error) notifications will be sent to the address in the MAIL FROM command (which is not necessarily the same as the mail data's From: header).

    2. If the verb is initially accepted and the 354 reply issued, the DATA command should fail only if the mail transaction was incomplete (for example, no recipients),

      How could this specific scenario be even possible? It just said in the previous paragraph that

      If there was no MAIL, or no RCPT, command, or all such commands were rejected, the server MAY return a "command out of sequence" (503) or "no valid recipients" (554) reply in response to the DATA command.

    3. 5yz

      This was unexpected; why wasn't the canonical format (i.e., 5xx) used instead?

    1. echo "First line" > file.txt echo "Second line" >> file.txt

      what is the difference b/w single > and double >> ????

    2. $

      what indicates this dollar symbol ?

    1. This can be used to perform actions once the navigation has completed, such as updating a database, store

      Wouldn't/shouldn't it be the other way around — wouldn't we wait until the save is completed (database is updated) successfully before we navigate away from the current page/form??

    1. Live By

      Do you keep the promises you have made and lay them up against your daily actions to see how they square? Is this what we mean by ethics and reflection?

    2. Promise

      Is Ortiz talking about a promise made or about the promise implied by our very identity, our very selves.

    1. That's all! We have the stack and BSS, so we can jump to the main() C function

      一头雾水 总的来讲.是为了初始化C语言运行环境设置的一坨东西

    2. it calls the 0x10 interrupt

      who?

  6. Nov 2020
    1. performs fully automated deployment. This is a good thing because it ensures that deployments are reproducible.It performs provisioning.

      What is the difference between provisioning and deployment?

    1. Three times I poured some out and gave it to him,                           480 and, like a fool, he swilled it down. So then, once that strong wine had addled Cyclops’ wits,

      Did Odysseus really need to give the cyclops the wine to trick him given what has happened?

    2. ‘Nobody is killing me, my friends, by treachery, not using any force.’

      Given that Odysseus was clever enough to fool the cyclops regarding his name, what do you think instigated Odysseus to give away his trick?

      Side note: The saying that a magician should never reveal his secrets.

    1. what I think to be the entire purpose of education in the first place.

      Is Baldwin talking educational reform or revolution?

    1. research does indicate that older adults can learn in training environments if that environment is designed to meet the individual needs of learners (Callahan et al., 2003; Charness and Schumann, 1992)

      Does this translate to learning in higher ed at a distance?

    Tags

    Annotators

    1. In this context, the objective of thisstudy is to increase knowledge of the motivations and patterns of behaviour of foodstagrammertourists and to contribute new insights about this phenomenon. In the first part of the article,therefore, we establish the framework for the characteristics and motivations of foodstagrammertourists. We then describe the ethnographic methodology employed in this study and presentour detailed fieldwork. Finally, we explain our findings and discuss the phenomenon of foodsta-grammer tourists and their managerial implications.

      The research study, 'An Ethnographic Study of Motivations of Foodstagrammer tourists' highlights how a research question may be portrayed by using a broad research statement to identify their overarching focus of inquiry as opposed to directly stating a research question. In this study, it is found in the goals of the study and could be converted to a question format. Stating the purpose for the inquiry works as effectively as proposing a prompt research question.

  7. mattieburkert.files.wordpress.com mattieburkert.files.wordpress.com
    1. Without such limits on derogatory, racist, sexist, or homophobic materials, Google al-lows its algorithm—which is, as we can see, laden with what Diaz calls “sociopolitics”—to stand without debate while protesting its inability to remove pages.

      Why does google straight allow terrible thing to be presented and will only remove unlawful content? Hopefully if you search some of these words that show explicit things that they warn some people may feel disgusted or get offended. Most of the information is also incorrect so they are providing false things

    1. Man, for some reason, I really like this answer. I recognize it's a bit more complicated, but it seems so useful. And given that I'm no bash expert, it leads me to believe that my logic is faulty, and there's something wrong with this methodology, otherwise, I feel others would have given it more praise. So, what's the problem with this function? Is there anything I should be looking out for here?

      I think the main thing wrong with it is the eval (which I think can be changed to $("$@") and it's pretty verbose.

      Also, there are more concise ways to do it that would probably appeal more to most bash experts...

      like set -x

      and it does unnecessary things: why save output to a variable? Just let output go to where it would normally go...

      So yeah, I can see why this solution isn't very popular. And I'm rather surprised by all the praise comments it's gotten.

    1. Is anything like this possible with the new setup?
    2. is there a way we can specify for image build layers to be included in the pull?
    3. Sorry, I don't totally know how the internals work, but does there currently exist a workaround? By that I mean, can I pull an image, then run it at a layer other than the top layer? (I basically use this for testing purposes, its certainly possible to build the image myself then do it, but its slightly less convenient)
    1. The Chinese Internet also illustrates the importance of theorizing online expression based on a representative spectrum of digital environments.

      How does Chinese cancel culture differ from American cancel cuture? Is this phenomenon different worldwide?

    1. The study traces the interrelationships of the utterances of emergent bilingual stu-dents discussing text in English for the first time in the context of a small-group discus-sion focused on English-language picture books.

      How do did they code the "utterances" of students?

  8. Oct 2020
    1. I really dont need a solution to this problem! I can find many workararounds

      Actually, the answer that was given was a good answer, as it pointed to the problem: It was a reminder that you need to:

      assign to a locally declared variable.

      So I'm not sure the answer was intended to "just" be a solution/workaround, but to help correct or fill in the misunderstanding / forgotten piece of the puzzle to help OP realize why it wasn't working, and realize how reactivity is designed to work (based on assignments).

      It was a very simplified answer, but it was meant to point in the right direction.

      Indeed, it pointed to this main point that was explained in more detail by @rixo later:

      Personally, this also totally aligns with my expectations because in your function fruit can come from anywhere and be anything:

    1. “"

      Which character is this referring to exactly?

      It looks like the empty string, which wouldn't make sense.

      https://www.postgresql.org/docs/13/functions-matching.html only lists these 2:

      If pattern does not contain percent signs or underscores, then the pattern only represents the string itself; in that case LIKE acts like the equals operator. An underscore (_) in pattern stands for (matches) any single character; a percent sign (%) matches any sequence of zero or more characters.

    1. Steele has noted that stereotype threat is most likely in areas of performance in which individuals are particularly motivated

      Stereotype threat is an important factor in student performance that faculty should be aware of, particularly with marginalized students and adult learners who may not identify as successful students, but how does it affect their own performance as instructors? If they care about teaching, but don't identify primarily as instructors, does this limit their teaching ability?

    2. Social dimensions of identity are linked to social roles or characteristics that make one recogniz-able as a member of a group, such as being a woman or a Christian (Tajfel and Turner, 1979).

      How do social dimensions of identity influence instructional decisions?

    3. priming learners to adopt a multicultural mindset may support more-divergent think-ing about multiple possible goals related to achievement, family, identity, and

      Is this the same for instructors? Does priming them to adult a multicultural mindset support more divergent thinking about instructional strategies and students' needs?

    4. Normal aging is accompanied by a gradual decline in episodic memory that begins as early as the twenties and accelerates precipi-tously after the age of 60 (Salthouse, 2009). This decline is associated with degradation in a key aspect of episodic memory: the ability to anchor or bind an event to one’s personal past and to a location (e.g., Fandakova et al., 2014; Wheeler et al., 1997).

      Is this contrary to what they said above about adults remembering more aspects of episodes? How does this decline in episodic memory affect learning in adults?

    5. An adult’s more mature neural structures and networks manage to retain many more of the features of the original experience.

      How does this affect instructional design? If adults are better at remembering experiences, should instructional include more experiential learning?

    6. Interventions that target social and emotional learning may be beneficial in part because they improve executive function (Riggs et al., 2006)

      Is there a connection between SEL and EF?

    Tags

    Annotators

    1. But then he was hit by Peneleus, below his eyebrows, just underneath his eye. The spear knocked out the eyeball, went in his eye, drove through his neck, and sliced the tendons at the nape. Ilioneus collapsed, stretching out his arms. Peneleus drew his sharp sword and struck his neck,                         580 chopping head and helmet, so they hit the ground,

      Why does Homer go into such detail about the way that heroes die? Most modern writing doesn't go into this level of detail. Is this something the greeks enjoyed hearing about?

    1. But many of these systems continue to re-request the same DTDs from our site thousands of times over, even after we have been serving them nothing but 503 errors for hours or days. Why are these systems bothering to request these resources at all if they don’t care about the response?
    1. Could you please explain why it is a vulnerability for an attacker to know the user names on a system? Currently External Identity Providers are wildly popular, meaning that user names are personal emails.My amazon account is my email address, my Azure account is my email address and both sites manage highly valuable information that could take a whole company out of business... and yet, they show no concern on hiding user names...

      Good question: Why do the big players like Azure not seem to worry? Microsoft, Amazon, Google, etc. too probably. In fact, any email provider. So once someone knows your email address, you are (more) vulnerable to someone trying to hack your account. Makes me wonder if the severity of this problem is overrated.

      Irony: He (using his full real name) posts:

      1. Information about which account ("my Azure account is my email address"), and
      2. How high-value of a target he would be ("both sites manage highly valuable information that could take a whole company out of business...")

      thus making himself more of a target. (I hope he does not get targetted though.)

    1. He took three paces—with the fourth he reached his goal,       

      Interesting depiction of the actual size of gods here. If Poseidon was this large, how large would other gods appear such as Zeus? Or even Cronus, as literature suggests he too has a physical form. Would gods be able to show their true form to humans? Or is this why Zeus often appears as other beings when interacting with mortals.

    1. during file creation

      Only during file creation or also if the file has already been created (, e.g. using chmod)?

    1. Another example:

      const expensiveOperation = async (value) => {
        // return Promise.resolve(value)
          // console.log('value:', value)
          await sleep(1000)
          console.log('expensiveOperation: value:', value, 'finished')
          return value
      }
      
      var expensiveOperationDebounce = debounce(expensiveOperation, 100);
      
      // for (let num of [1, 2]) {
      //   expensiveOperationDebounce(num).then(value => {
      //     console.log(value)
      //   })
      // }
      (async () => { await sleep(0   ); console.log(await expensiveOperationDebounce(1)) })();
      (async () => { await sleep(200 ); console.log(await expensiveOperationDebounce(2)) })();
      (async () => { await sleep(1300); console.log(await expensiveOperationDebounce(3)) })();
      // setTimeout(async () => {
      //   console.log(await expensiveOperationDebounce(3))
      // }, 1300)
      

      Outputs: 1, 2, 3

      Why, if I change it to:

      (async () => { await sleep(0   ); console.log(await expensiveOperationDebounce(1)) })();
      (async () => { await sleep(200 ); console.log(await expensiveOperationDebounce(2)) })();
      (async () => { await sleep(1100); console.log(await expensiveOperationDebounce(3)) })();
      

      Does it only output 2, 3?

    1. What links all these things is the way they pass the responsibility for upholding norms — for creating “school” — onto individual children and families.

      This is where you can type your notes.

    1. I don't understand the need for the name "Open–closed principle". It doesn't seem meaningful or clear to me.

      Can't we just call it "extensibility" or "easily extendable"? Doesn't "extensibility" already imply that we are extending it (adding new code on top of it, to interoperate with it) rather than modifying its source code?