702 Matching Annotations
  1. Sep 2024
    1. In cases where I've been concerned about the migration of data (e.g. copying my entire home directory from one system to another), I've used fingerprint to generate a transcript on the source machine, and then run it on the destination machine, to reassure me that the data was copied correctly and completely.
    1. In practice when people use ||, they do mean ?? (whatever its spelling). It just so happens that most of the time, it does what you want, because you happen to not be dealing with Booleans. But the semantics you mean to express is not about "truthness", but about "nilness". And occasionally you get bitten because false does exist, and behaves differently.
  2. www.reddit.com www.reddit.com
    1. Aluminum Foil Method: Tear off a small piece of aluminum foil and dip it in water or vinegar. Rub the rust spots gently with the foil. Aluminum is softer than chrome and will not scratch the surface while effectively removing rust. As you rub, the foil reacts with the rust, helping to dissolve it. Steel Wool Method (Use with Caution): If the rust is more severe, use fine steel wool (#0000 grade) to gently scrub the rusty areas. Be careful not to press too hard, as steel wool can scratch chrome if applied too aggressively.

      Suggestions for removing rust from chrome on typewriters and typewriter cases.

    1. not to act in such a case would be the egoic response would be there it would be a response that came from the fear of an individual that it would be cowardice it would be it would be refusing to act washing a veneer of of non-violence over one's egoic fea

      for - nonduality - not acting against violence in such a case (as Ukraine war) is an egoic response - acting out of cowardice - Rupert Spira

      comment - One can act egoically both to take action AND to not take action.

  3. Aug 2024
    1. On many of the older 40s/50s typewriters, the same key will work on almost everything. If you search online there are a few people who have posted a 3D printable key that you can download and may be able to print at your local library. I'm guessing based on the limited photo, yours is an early 40s Smith-Corona.

      I've tried a few local locksmiths who don't seem to carry these keys anymore.

      I've got a late 40s Smith-Corona latch that occasionally self-locks and for ages I used a bent paperclip in the rough shape of the old keys to easily pick the lock with just 10 seconds of jiggling around inside. Roughly a 2 mm straight section of paperclip with a 1mm "T" section that sticks out (even just on one side) about 4-5mm and then continues straight ought to work if you're in a jam.

      The level of security these keys/locks provide is minimal at best.

      If you go the online route to buy a key, they can be quite expensive, so if you're a collector, just wait for a machine that comes with one and you'll have another typewriter for "free" in the deal.

      reply to u/Succu6us66 at https://old.reddit.com/r/typewriters/comments/1eqk6rd/typewriter_lock/

    1. for - food system transition - 2022 paper - 6 case studies

      Summary - This paper gives a good complexity-based framework for characterising for system transition - It could be useful for facilitation of participatory community futures workshops - such as Stop Reset Go workshops

  4. Jul 2024
    1. The purpose of distinguishing between safe and unsafe methods is to allow automated retrieval processes (spiders) and cache performance optimization (pre-fetching) to work without fear of causing harm.
    1. However, with verifiable credentials in a Solid Pod, the university issues some information stating that a student completed a course and cryptography signs that information. This is a verifiable credential. They then pass that credential to the student who stores it in their Solid Personal Online Datastore (Pod). When the student wants to apply for a job, all they need to do is grant access to the credential so the company can read it. The company can confirm that the credential isn’t faked because its cryptographically signed by the university.
    1. “deathsof despair.”

      for - definition - deaths of despair

      definition - deaths of despair - Deaths of white working class due to massive loss of livelihood caused by offshoring. - These deaths are characterized by drug overdoes, liver failure, smoking related cancers, etc - author: Case and Deaton

  5. Jun 2024
    1. Five Fairly Fun Fixes For Free by [[Joe Van Cleave]]

      Advice for typewriter ribbon printing, especially as silk ribbons age and more quickly gunk up the loops or letters like "e" or "a". Nylon ribbon and a thin plastic backing sheet can be helpfu.

      Use of bookbinder's glue on fabric of typewriter cases, then layers of shoe polish.

      General advice for replacing feet on typewriter cases.

      Small incremental improvements to your typewriter can be easier and more sustainable than trying to do everything at once.

    1. Docker-in-Docker via dind has historically been widely used in CI environments. It means the "inner" containers have a layer of isolation from the host. A single CI runner container supports every pipeline container without polluting the host's Docker daemon.
    2. While it often works, this is fraught with side effects and not the intended use case for dind. It was added to ease the development of Docker itself, not provide end user support for nested Docker installations.
  6. May 2024
    1. Please note that '+' characters are frequently used as part of an email address to indicate a subaddress, as for example in <bill+ietf@example.org>.

      Nice of them to point that this is a common scenario, not just a hypothetical one.

    1. One of the first thing I noticed was the rubber on this foot was sticking. This is the resting spot for the basket shift. Moving it up or down will adjust where the lower case letters strike the platen. I removed the old sticky rubber. There are two adjustments here, you can’t see the other one, but it’s looks the same. One is for lower case letters the other is for upper case. This is called the “on feet” adjustment. If you ever have the top of an upper case letter not imprinting or not level with the lower case letters, look at this adjustment. A good way to tell is to type HhHh, and see if the bottoms of the letters line up.
  7. Apr 2024
    1. if a mail system automatically unsubscribes recipient mailboxes that have been closed or abandoned, there can be no interaction with a user who is not present

      I had not thought of that use case...

  8. Mar 2024
    1. When you need to publish multiple packages and want to avoid your contributors having to open PRs on many separate repositories whenever they want to make a change.
    2. when projects want to keep strict boundaries within their code and avoid becoming an entangled monolith. This is for example the case for Yarn itself, or many enterprise codebases.
  9. Feb 2024
    1. a fellowlexicographer and one of the Dictionary People, John Stephen Farmer, hadhis own legal drama. Farmer was writing a slang dictionary with WilliamHenley, and was struggling to publish the second volume (containing theletters C and F) of his work on grounds of obscenity. Farmer took hispublisher to court for breach of contract in 1891, and tried to convince a jurythat writing about obscene words in a dictionary did not make him personallyguilty of obscenity, but he lost the case and was ordered to pay costs.Eventually, he found fresh printers and avoided the Obscene Publications Actby arguing that his dictionary was published privately for subscribers only, notthe public, and the remarkable Slang and Its Analogues by Farmer and Henleywas published in seven volumes (from 1890 to 1904), with cunt and fuck andmany other words regarded as lewd on its pages. Farmer’s legal case and thepublic outcry that ensued was a clear deterrent for Murray.
  10. Jan 2024
    1. Instance methods Instances of Models are documents. Documents have many of their own built-in instance methods. We may also define our own custom document instance methods. // define a schema const animalSchema = new Schema({ name: String, type: String }, { // Assign a function to the "methods" object of our animalSchema through schema options. // By following this approach, there is no need to create a separate TS type to define the type of the instance functions. methods: { findSimilarTypes(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); } } }); // Or, assign a function to the "methods" object of our animalSchema animalSchema.methods.findSimilarTypes = function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); }; Now all of our animal instances have a findSimilarTypes method available to them. const Animal = mongoose.model('Animal', animalSchema); const dog = new Animal({ type: 'dog' }); dog.findSimilarTypes((err, dogs) => { console.log(dogs); // woof }); Overwriting a default mongoose document method may lead to unpredictable results. See this for more details. The example above uses the Schema.methods object directly to save an instance method. You can also use the Schema.method() helper as described here. Do not declare methods using ES6 arrow functions (=>). Arrow functions explicitly prevent binding this, so your method will not have access to the document and the above examples will not work.

      Certainly! Let's break down the provided code snippets:

      1. What is it and why is it used?

      In Mongoose, a schema is a blueprint for defining the structure of documents within a collection. When you define a schema, you can also attach methods to it. These methods become instance methods, meaning they are available on the individual documents (instances) created from that schema.

      Instance methods are useful for encapsulating functionality related to a specific document or model instance. They allow you to define custom behavior that can be executed on a specific document. In the given example, the findSimilarTypes method is added to instances of the Animal model, making it easy to find other animals of the same type.

      2. Syntax:

      Using methods object directly in the schema options:

      javascript const animalSchema = new Schema( { name: String, type: String }, { methods: { findSimilarTypes(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); } } } );

      Using methods object directly in the schema:

      javascript animalSchema.methods.findSimilarTypes = function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); };

      Using Schema.method() helper:

      javascript animalSchema.method('findSimilarTypes', function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); });

      3. Explanation in Simple Words with Examples:

      Why it's Used:

      Imagine you have a collection of animals in your database, and you want to find other animals of the same type. Instead of writing the same logic repeatedly, you can define a method that can be called on each animal instance to find similar types. This helps in keeping your code DRY (Don't Repeat Yourself) and makes it easier to maintain.

      Example:

      ```javascript const mongoose = require('mongoose'); const { Schema } = mongoose;

      // Define a schema with a custom instance method const animalSchema = new Schema({ name: String, type: String });

      // Add a custom instance method to find similar types animalSchema.methods.findSimilarTypes = function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); };

      // Create the Animal model using the schema const Animal = mongoose.model('Animal', animalSchema);

      // Create an instance of Animal const dog = new Animal({ type: 'dog', name: 'Buddy' });

      // Use the custom method to find similar types dog.findSimilarTypes((err, similarAnimals) => { console.log(similarAnimals); }); ```

      In this example, findSimilarTypes is a custom instance method added to the Animal schema. When you create an instance of the Animal model (e.g., a dog), you can then call findSimilarTypes on that instance to find other animals with the same type. The method uses the this.type property, which refers to the type of the current animal instance. This allows you to easily reuse the logic for finding similar types across different instances of the Animal model.

      Certainly! Let's go through each part and explain it in simple terms: ### 1. `this` in Mongoose: - **What is `this`?** In JavaScript, `this` refers to the current context or object. In Mongoose, particularly within methods and middleware functions, `this` represents the instance (document) the function is currently operating on. - **Why is it used?** `this` is used to access and modify the properties of the current document. For example, in a Mongoose method, `this` allows you to refer to the fields of the specific document the method is called on. ### 2. Example: Let's use the `userSchema.pre("save", ...)`, which is a Mongoose middleware, as an example: ```javascript userSchema.pre("save", async function (next) { if (!this.isModified("password")) { next(); } else { this.password = await bcrypt.hash(this.password, 10); next(); } }); ``` - **Explanation in Simple Words:** - Imagine you have a system where users can sign up and set their password. - Before saving a new user to the database, you want to ensure that the password is securely encrypted (hashed) using a library like `bcrypt`. - The `userSchema.pre("save", ...)` is a special function that runs automatically before saving a user to the database. - In this function: - `this.isModified("password")`: Checks if the password field of the current user has been changed. - If the password is not modified, it means the user is not updating their password, so it just moves on to the next operation (saving the user). - If the password is modified, it means a new password is set or the existing one is changed. In this case, it uses `bcrypt.hash` to encrypt (hash) the password before saving it to the database. - The use of `this` here is crucial because it allows you to refer to the specific user document that's being saved. It ensures that the correct password is hashed for the current user being processed. In summary, `this` in Mongoose is a way to refer to the current document or instance, and it's commonly used to access and modify the properties of that document, especially in middleware functions like the one demonstrated here for password encryption before saving to the database.

    Tags

    Annotators

    URL

    1. It's also common to want to compute the transitive closure of these relations, for instance, in listing all the issues that are, transitively, duped to the current one to hunt for information about how to reproduce them.
    2. Purpose of the relations should be to allow advanced analysis, visualization and planning by third-party tools or extensions/plugins, while keeping Gitlab's issues simple and easy to use.
  11. Dec 2023
  12. Nov 2023
  13. Oct 2023
    1. MYH7-V934A, MYH7-E1387K and MYH7-M877I were identified as novel MYH7 mutations causing HCM.

      Novel mutations related to Hypertrophic cardiomyopathy using exome-sequencing technology and verified by Sanger

  14. Sep 2023
    1. WORLD Italian cheesemakers microchip parmesan in bid to fight copycats BY EMMET LYONS

      AUGUST 18, 2023 / 11:45 AM / CBS NEWS

      One of the world's most famous cheeses is also one of the most counterfeited dairy products on the planet.

      Competing manufacturers have for years produced cheaper imitations of Italy's parmigiano reggiano, a favored topping for pasta and salad.

      FILE PHOTO: A storage area for Parmesan cheese wheels is pictured at storehouse shelf at 4 Madonne Caseificio dell'Emilia dairy cooperative in Modena A storage area for Parmesan cheese wheels is pictured at storehouse shelf at 4 Madonne Caseificio dell'Emilia dairy cooperative in Modena, Italy, February 16 2016. ALESSANDRO BIANCHI / REUTERS Now, the producers of parmigiano reggiano say they have innovated a way to prevent any pretenders from ripping off their product.

      Parmigiano Reggiano Consortium (PRC), the association that oversees production of the cheese, says it has been putting microchips in its product as part of a technological trial which would allow consumers to trace parmesan cheese back to its place of origin.

      Under special protections designated by the European Union, parmigiano reggiano is the only kind of cheese which can be called parmesan within Europe and it must be made in a small part of northern Italy, including in the provinces of Parma and Reggio Emilia.

      PRC are hopeful that their new technology will help to enforce that protected status. Their microchips are about the size of a grain of salt and have been inserted into the labels found on the rind of about 120,000 wheels of parmigiano reggiano. The chips work as scannable food tags with a QR code label (link)

    1. Recent work has revealed several new and significant aspects of the dynamics of theory change. First, statistical information, information about the probabilistic contingencies between events, plays a particularly important role in theory-formation both in science and in childhood. In the last fifteen years we’ve discovered the power of early statistical learning.

      The data of the past is congruent with the current psychological trends that face the education system of today. Developmentalists have charted how children construct and revise intuitive theories. In turn, a variety of theories have developed because of the greater use of statistical information that supports probabilistic contingencies that help to better inform us of causal models and their distinctive cognitive functions. These studies investigate the physical, psychological, and social domains. In the case of intuitive psychology, or "theory of mind," developmentalism has traced a progression from an early understanding of emotion and action to an understanding of intentions and simple aspects of perception, to an understanding of knowledge vs. ignorance, and finally to a representational and then an interpretive theory of mind.

      The mechanisms by which life evolved—from chemical beginnings to cognizing human beings—are central to understanding the psychological basis of learning. We are the product of an evolutionary process and it is the mechanisms inherent in this process that offer the most probable explanations to how we think and learn.

      Bada, & Olusegun, S. (2015). Constructivism Learning Theory : A Paradigm for Teaching and Learning.

  15. Aug 2023
    1. async vs. sync depends exactly on what you are doing in what context. If this is in a network service, you need async. For a command line utility, sync is the appropriate paradigm in most simple cases, but just knee-jerk saying "async is better" is not correct. My snippet is based on the OP snippet for context.
  16. May 2023
    1. Please can we (a) retain case information from the email address the student uses to set up their account (in case their mailbox is case sensitive), and use that when sending password reset emails, etc., but also (b) when checking credentials for login or setting up an account, treat the email address as non-case-sensitive. The upshot would be if someone registered with Student@City.ac.uk, all emails would go to Student@City.ac.uk, but the student would be able to log in with student@city.ac.uk, and if someone later tried to set up an account with student@city.ac.uk they'd be told that the user already exists.
    2. Although there's an argument for keeping case sensitivity for the local mailbox (as they can be case sensitive, depending on how they're set up, though I haven't come across case sensitivity in university emails), the domain part of the email address is not case sensitive and should not be treated as such. Please can we (a) retain case information from the email address the student uses to set up their account (in case their mailbox is case sensitive), and use that when sending password reset emails, etc., but also (b) when checking credentials for login or setting up an account, treat the email address as non-case-sensitive. The upshot would be if someone registered with Student@City.ac.uk, all emails would go to Student@City.ac.uk, but the student would be able to log in with student@city.ac.uk, and if someone later tried to set up an account with student@city.ac.uk they'd be told that the user already exists.
    1. If you are storing email addresses then you probably should store them in their original case (the recipient at least) to be safe. However, always compare them case-insensitively in order to avoid duplicates.
    1. However, it's difficult to rely on a case-sensitive email address in the real world because many systems (typically ones that have to handle data merging) don't preserve case. Notably systems that use email addresses for user IDs, or any system that has to collate data from multiple sources (CRMs, email broadcast systems, etc) will either normalise case or treat them case-insensitively.
    2. However, for all practical purposes in the modern age, I believe you can consider email addresses to be case insensitive.
    1. a SHOULD is always trumped in RFCs by a MUST. The fact that hosts SHOULD do something means that they might not and I just wanted reassurance that, in reality, the SHOULD is a bit more widely adopted than its definition implies.
    1. While email addresses are only partially case-sensitive, it is generally safe to think of them as case insensitive. All major providers, such as Gmail, Yahoo Mail, Hotmail, and others, treat the local parts of email addresses as case insensitive.
    2. According to RFC 5321, the local part of the email address is case sensitive. This means that, in theory, SoMething@something.com is not the same as something@something.com. However, email providers have the liberty to treat the local parts as both case sensitive and case insensitive.
    1. Are Email Addresses Case Sensitive? Technically, the answer is yes. However, email addresses are typically not case sensitive; if you type your email address into a form and accidentally capitalize one or two letters, it probably won’t prevent the sender from emailing you.
    2. The local part does, in fact, take the case into account, as per RFC 5321. However, Email Service Providers (ESPs) are aware of the potential confusion that could result from allowing upper-case letters.
    1. In short, while it’s technically possible to make the part before @ case sensitive, most popular email servers do not allow that. 
    2. Most big email providers like Gmail, Outlook and even company email address hosted on Google Suite are not case sensitive. Just to avoid any unnecessary confusion. However, in extreme cases, some large companies, implement case sensitivity on their server as some people can often have the same first and last name. But in general, this creates more confusion, than the usability, which is why most standard email providers avoid case sensitivity. 
    1. Either way, at some point almost everyone started treating addresses as case-insensitive.
    2. Despite it being commonplace to “fix up” email addresses by lowercasing them — or, in financial/government contexts, uppercasing them — email addresses are clearly defined as case-sensitive in the only standard that matters.
    1. Since using case insensitivity is so widespread, take their sign up email address and make it lower case. Whenever they try to log in, convert that to lowercase as well, for comparison purposes, when you go to see if the user exists. As far as sign up and sign in go, do a case insensitive comparison. If the person signs up as Steve@example.com, you'll still want to allow them to sign in later with steve@example.com or sTeVE@example.com.
    2. But you should also keep track of the email address that they signed up with in a case sensitive fashion. Any time you send an email to them, be sure to send it with that original casing. This allows the email server to handle it however it feels like it needs to. So even though the person may always be signing in to your site with steve@example.com, if they signed up as Steve@example.com, you'll always send email to Steve@example.com, just to be safe.
    3. The de facto standard is to treat local mailboxes as case insensitive, but the official standard says case matters (though even the official standard mentions the de facto standard).
    1. So yes, the part before the "@" could be case-sensitive, since it is entirely under the control of the host system. In practice though, no widely used mail systems distinguish different addresses based on case.
    2. In short, you are safe to treat email addresses as case-insensitive.
    1. Since the case sensitivity of email addresses can create confusion and delivery problems, most email providers and clients either fix the case if the email address is entered in the wrong case, or they ignore upper-case entries. Not many email services or ISPs enforce case-sensitive email addresses.
    1. human values and ethics, rather than solely pursuing technological progress.

      I ask whether technology is classic Pandora's Box--once the attitude is out, you cannot re-box it. Or at least we haven't figured out a way.

      Once this margin has been populated with annotations I want to redo the prompt to include them as an alternative point of view in the dialogue.

    1. articulates requirements for readability sating that identifiers must be: Any printable characters from the Universal Character Set of ISO/IEC 10646 (ISO 2012):UTF-8 encoding is required; Case insensitive:Only ASCII case folding is allowed.

      {UTF-8} {ASCII Case Folding}

  17. Apr 2023
    1. Clearly this type of reasoning has an argumentation scheme. One premisedefines or describes a goal. The other premise describes a means of achieving thegoal. The conclusion directs the agent towards action to carry out the means.6But this type of reasoning is so common and distinctive, having manyvariants and subspecies of argumentation, that it is misleading to call it anargumentation scheme. Better to call it a type of reasoning that can be used inargumentation in different types of dialogue (as in Walton, What Reas., 1990).
      • Agential Network
      • Case and Inferential Qualifications
      • Conclusions and Goal Relations
      • Normative Framework
    2. A person who puts forward an argumentation anticipates criticism, and bychoosing a particular type of argumentation, using the one argumentationscheme rather than the other, he implies that he thinks he knows which routewill lead to the justification of his standpoint. At any rate, whether he reallythinks this or not, if he is to be taken seriously by the other party, he may beheld to be committed to deal with the critical questions which pertain to ajustification via the argumentation scheme that is inherent in his argumentation.In relying on a certain argumentation scheme, the arguer invokes a particular testing method in a dialectical procedure, in which certain criticalreactions are relevant, and others not. Each argumentation scheme calls, as itwere, for its own set of critical reactions. In conjunction with each other,these reactions constitute a well-rounded test for checking the soundness of anargumentation of the type concerned. (p. 98)This way of describing argumentation schemes suggests that they are normativelybinding, in the following sense. If the hearer accepts the premises of the speaker'sargument, and the argument is an instance of a genuine and appropriate argumentation scheme (for the type of dialogue they are engaged in), then the hearer mustor should (in some binding way) accept the conclusion. This does not appear to be"validity" in the same sense in which the word is familiarly used in deductive (orperhaps even inductive) logic. But it does appear to express a normative or broadlylogical sense of validity, bindingness, conditional acceptability, or whatever youwant to call it
      • Initial Speaker has goal in mind thus presents reasoning that invites particular types of attention
      • This includes Supportive and Critical attention
      • The reasoning is normative in that it conformism to the shared communicative standards. Not definitive logical ones.
    3. Arguments like the one in Case 1 . 1 lie on a razor's edge: They are somewhatweak and unreliable, and apt to fail occasionally, but they are not so bad or inherently erroneous that they should be called "fallacious" in all instances. On theother hand, they can tum out to be fallacious, in some cases. And, in particular,they run the risk of committing the secundum quid fallacy as quite a general sort offailure they are prone to. If this is right, a new approach to fallacies is called foran approach that takes more care in assessing the particulars of a given case.In arguments like the one in Case 1 . 1 , the premise, if true in a given case,does give a reason for accepting the conclusion. But it is not a conclusive reason,and it is subject to default relative to what is known (or becomes known) of thefurther circumstances of the case. The problem then is to find the underlying structure of inference in such a case that enables one to identify and test the correctness(or incorrectness) of the argument as an instance of an argumentation scheme
      • Case = Argumentative Stage in the Sequence of Goal Statements
      • All Cases generate infernal qualifications.
      • Inferential Qualifications give rise to conclusions
      • Qualification to Conclusion = Argument
      • Arguments Relate to Goal.
    1. Recommended Resource

      Since Unit 4 mentions some CC license infringement cases as examples, I recommend adding a court case from the Netherlands of a photographer suing a website for using their photo without permission or compensation. The name of the court case is below.

      ECLI:NL:RBMNE:2021:5887

      The court case ended with the judge awarding the photographer (plaintiff) the following damages (excerpt is from the court case records).

      "5.4. orders [defendant] to pay to [plaintiff] against proof of discharge:

      € 450.00 in damages, increased by the statutory interest as referred to in Article 6:119 of the Dutch Civil Code, with effect from 11 June 2021 until the day of full payment,

      € 67.50 in extrajudicial collection costs,

      5.5. orders [defendant] to pay the costs of the proceedings on the part of [plaintiff], estimated at € 2,036.30 until the judgment of this judgment, of which € 1,702.00 in salary for the authorized representative."

      This case demonstrates the enforceability of the CC license in other countries, such as the Netherlands.

  18. Mar 2023
  19. Jan 2023
  20. Nov 2022
    1. It can be useful to use with keywords argument, which required symbol keys.
    1. For example, if I make an application (Client) that allows a user (Resource Owner) to make notes and save them as a repo in their GitHub account (Resource Server), then my application will need to access their GitHub data. It's not secure for the user to directly supply their GitHub username and password to my application and grant full access to the entire account. Instead, using OAuth 2.0, they can go through an authorization flow that will grant limited access to some resources based on a scope, and I will never have access to any other data or their password.
    1. Post.in_order_of(:type, %w[Draft Published Archived]).order(:created_at).pluck(:name) which generates SELECT posts.name FROM posts ORDER BY CASE posts.type WHEN 'Draft' THEN 1 WHEN 'Published' THEN 2 WHEN 'Archived' THEN 3 ELSE 4 END ASC, posts.created_at ASC
  21. Oct 2022
    1. Your alternator is NOT a chargerThe alternator’s job is to supply the power needed for all electrical items on the vehicle, plus replenish the battery from the last start up. The alternator is not a battery charger so much as it is a battery maintainer. If the alternator has to recharge an overly discharged battery, the alternator will become over-worked, which will shorten its life.If you use your alternator to charge your dead battery, you will overheat the alternator during its charging process. The greater the amperage flowing through it, the higher the heat an alternator creates.Maximum Alternator Output Only Occurs at high RPMSAfter you start your car with jumper cables, the voltage regulator sees a discharged battery and commands maximum field in the rotor. But at 600 RPM, the alternator can only provide about 1/4th of its rated output. Let it idle for a long period and all you’ll do it overheat the rotor windings and burn up your expensive alternator. A 110-amp alternator can only output 110-amps at RPMS of 2,500 or more. So don’t even think about letting it idle to recharge the battery.A battery charger costs $40. A new Alternator $350Not exactly brain surgery, is it?The correct way to deal with this situation is to jump the battery (using a jumper pack is much safer than jumper cables) and driving it to a place where you can place a REAL battery charger on the battery.
    1. This was much more of an issue a generation ago, when your ‘74 Chevy Nova or ‘69 Ford F-100 had a 35 amp alternator. Any car made in the last 15-20 years will have a 75 amp alternator as a bare minimum, and ratings well north of 100 amps are common in larger vehicles.There’s dozens of amps of headroom to charge the battery at idle speed, especially if you turn off the lights, stereo, HVAC, etc. That said, it’ll charge even more quickly if you drive the car.

      In reply to: https://hyp.is/YNQwwlF0Ee206UcS3HYLnA/www.reddit.com/r/Cartalk/comments/aoks7b/how_much_idling_needed_after_jump_start_to/

      This seems like more sound/trustworthy advice than the replied-to's advice/info.

    2. This will KILL your alternator. You should get a battery charger or a trickle charger. Alternators go through hell when trying to recharge a fully depleted battery.
  22. Sep 2022
    1. in my personal opinion, there shouldn't be a special treatment of do-end blocks in general. I believe that anything that starts a "block", i.e. something that is terminated by and end, should have the same indentation logic
    1. Consumers can use the status member to determine what the original status code used by the generator was, in cases where it has been changed (e.g., by an intermediary or cache), and when message bodies persist without HTTP information. Generic HTTP software will still use the HTTP status code.
    1. https://www.amazon.com/s?k=math+demystified&i=stripbooks&crid=UM15P2ZTY84C&sprefix=math+demystified%2Cstripbooks%2C137&ref=nb_sb_noss_2

      A whole series of books from McGraw Hill whose titles all carry an implicit math shaming. Who wants to carry these books around and be seen reading them? Even the word DeMYSTiFieD on the cover is written in CLoWn case.

      • Business Math Demystified
      • Dosage Calculations and Basic Math for Nurses Demystified
      • Geometry Demystified
      • Business Calculus Demystified
      • Math Word Problems Demystified
      • Everyday Math Demystified
      • Discrete Mathematics Demystified
      • Math Proofs Demystified
      • Pre-Algebra Demystified
  23. Aug 2022
    1. It seems to me that they tried to roboticize a manufacturing process for a product that was designed to be manufactured by humans. Rookie mistake.

      If they want to automate construction of Mac products, they'll have to redesign the product to fit the constraints of robotic manufacture.

    1. Dr Dan Goyal. (2022, March 15). What’s been happening This Week in Covid? The schism between reality and policy grew even wider this week... Omicron B.2 sent cases soaring and stock markets sinking! #TheWeekInCovid [Tweet]. @danielgoyal. https://twitter.com/danielgoyal/status/1503699425427968001

    1. ReconfigBehSci. (2021, December 13). RT @DrEricDing: 11) Omicron is doubling every 1.6 days in UK 🇬🇧 according to @DrWilliamKu’s figure. That’s way faster growth than in South… [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1470451594378502154

    1. John Burn-Murdoch. (2021, November 25). Five quick tweets on the new variant B.1.1.529 Caveat first: Data here is very preliminary, so everything could change. Nonetheless, better safe than sorry. 1) Based on the data we have, this variant is out-competing others far faster than Beta and even Delta did 🚩🚩 https://t.co/R2Ac4e4N6s [Tweet]. @jburnmurdoch. https://twitter.com/jburnmurdoch/status/1463956686075580421

    1. ReconfigBehSci. (2021, December 9). a rather worrying development- a (local) newspaper “fact checking” the new German health minister simply by interviewing a virologist who happens to have a different view. There’s simply no established “fact” as to the severity of omicron in children at this point in time [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1469037817481334786