1,064 Matching Annotations
  1. Last 7 days
    1. In today’s digital environment, this question arises in a particular way, and this text could not exist independently of the technological environment in which it emerges.

      Il faudrait définir précisément ce que "technological environment" signifie, et pourquoi pas plutôt "technical environment" par exemple (sans vouloir couper les cheveux en 4) ?

    2. This is the paradox of access.

      Ce "paradoxe de l'accès" pourrait aussi être comparé avec la question de l'accès aux données numériques ? Les données sont produites, stockées, mais sont-elles encore accessibles, compréhensibles (par des machines ou des humains) ou exploitables ?

    1. To whom did you sell your keys and at what kind of rates? https://steamcommunity.com/id/playa131 for example resells them and might be the source for DIG's purchases.
    1. Currently, only Right signals are wired up.

      So what happens if a task returns a Left signal?? Will it still go Right? Will it error?

  2. Feb 2021
    1. For each output declared in outputs, the corresponding environment variable is set to point to the intended path in the Nix store for that output. Each output path is a concatenation of the cryptographic hash of all build inputs, the name attribute and the output name. (The output name is omitted if it’s out.)

      QUESTION: So when I see $out in a builder script, it refers to the default output path because the output attribute in the Nix expression has never been explicitly set, right?

    2. derivationA description of a build action. The result of a derivation is a store object. Derivations are typically specified in Nix expressions using the derivation primitive. These are translated into low-level store derivations (implicitly by nix-env and nix-build, or explicitly by nix-instantiate).

      Organically related to the annotation regarding my nix-shell confusion.

      The dissection of this definition to show why I find it lacking:

      A description of a build action.

      The first (couple) time(s) I read the manuals, this description popped up in many places, and I identified it with Nix expression every time, thinking that a derivation is a synonym for Nix expression.

      Maybe it is, because it clearly tries to disambiguate between store derivations and derivation in the last sentence.

      The result of a derivation is a store object.

      Is this store object the same as a store derivation?

      Derivations are typically specified in Nix expressions using the `derivation primitive. These are translated into low-level store derivations (implicitly by nix-env and nix-build, or explicitly by nix-instantiate).

      QUESTION: So, the part of the Nix build expression (such as default.nix) where the derivation primitive is called (explicitly or implicitly, as in mkDerivation) is the derivation, that will be ultimately be translated into store derivations?

      ANSWER: Start at section 15.4 Derivation.

      QUESTION: Also, why is typically used here? Can one define derivations outside of Nix expressions?

      ANSWER(?): One could I guess, because store derivations are ATerms (see annotation at the top), and the Nix expression language is just a tool to translate parameterized build actions into concrete terms to build a software package. The store derivations could be achieved using different means; e.g., the way Guix uses Guile scheme to get the same result))

      I believe, that originally, derivation was simply a synonym to store derivation. Maybe it still is, and I'm just having difficulties with reading comprehension but I think the following would be less misleading (to me and apart from re-writing the very first sentence):

      Derivations are typically the result of Nix expressions calling the derivation primitive explicitly, or implicitly usingmkDerivation`. These are translated into low-level store derivations (implicitly by nix-env and nix-build, or explicitly by nix-instantiate).

    3. The command nix-shell will build the dependencies of the specified derivation, but not the derivation itself. It will then start an interactive shell in which all environment variables defined by the derivation path have been set to their corresponding values, and the script $stdenv/setup has been sourced. This is useful for reproducing the environment of a derivation for development.

      QUESTION: What exactly does nix-shell execute from the Nix expression (i.e., shell.nix, default.nix, etc.)?

      ANSWER: Based on my current understanding, the answer is everything. It calls $stdenv/setup (see annotation below) to set up the most basic environment variables (TODO: expand on this), and "injects" the most common tools (e.g., gcc, sed) into it.

      It also defines the phases (TODO: verify this) and builder functions, such as genericBuilder. For example, the default builder is just two lines:

      source $stdenv/setup

      TODO: pkgs/stdenv/generic/builder.sh is a mystery though.

      QUESTION: Once dropping into nix-shell, how do I know what phases to execute by looking at a default.nix? (E.g., [..]freeswitch/default.nix)

      ANSWER: As far as I can tell, one can override the phases in their Nix build expression (to build the derivation, see at the bottom), but they won't get executed as only the $stdenv/setup (see above) will get sourced, and no builders are called that, in return, invoke the phases (again, see above).

      So if one is using nix-shell

      • to create/hack on a package, the person has to manually invoke the builder or phases (TODO: still fuzzy on this subject)

      • to set up an environment, then one doesn't even have to worry about builders/phases because we just use nix-shell to clear the environment and to inject tools that we need for a given task

      QUESTION: When dropping into nix-shell, is this Nix expression (i.e., freeswitch/default.nix) executed? Or just parts of it?

      ANSWER: As stated above, all of the input Nix expression is evaluated, but no builders and build phases are called; although, nothing prevents one to override the phases, in case they are creating/hacking on a package.


      The command nix-shell will build the dependencies of the specified derivation, but not the derivation itself.

      What is the "derivation" here exactly? I know that it is a build expression, but does that mean the default.nix (or other Nix expression) nix-shell is invoked with?

      <sup>This statement also seems like a contradiction with how `nix-shell` works (i.e., if one issues `nix-shell -p curl`, then `curl` will be available in that sub-shell), but `-p` acts like a shortcut to as if `curl` had been listed in `buildInputs` so this is not the case.</sup>

      ANSWER: I have the feeling my confusion comes from the fact that the term "derivation" is used ambiguously in the manuals, sometimes to mean multiple things (see list below).

      TODO: Substantiate this claim, and make sure that it not coming from my misunderstanding certain topics.

      • Nix build expression (such as default.nix) whose output is going to become the store derivation itself (see last item at the bottom about the Nix manual's glossary definition)

      • store derivation.

      Had multiple cracks at unambiguously define what a derivation is, and here's a list of these:

    4. $stdenv/setup

      QUESTION: Does this refer to pkgs/stdenv/generic/setup.sh? According to 6.5 Phases in the Nixpkgs manual?

      ANSWER: I'm pretty sure it does. It sets up the environment (not sure how yet; I see the env vars, but not the basic commands - sed, awk, etc. - that are listed below) and defines a bunch of functions (such as genericBuilder) but it doesn't call these functions!

    5. substitute

      this is another key topic. Also:

      • substitute vs. substituter => this (I think)

      See annotations with the substitute tag

    6. When you ask Nix to install a package, it will first try to get it in pre-compiled form from a binary cache. By default, Nix will use the binary cache https://cache.nixos.org; it contains binaries for most packages in Nixpkgs. Only if no binary is available in the binary cache, Nix will build the package from source. So if nix-env -i subversion results in Nix building stuff from source, then either the package is not built for your platform by the Nixpkgs build servers, or your version of Nixpkgs is too old or too new.

      binary caches tie in with substitutes somehow; get to the bottom of it. See annotations with the substitute tag.

      Maybe this?

    7. At the same time, it is not possible for one user to inject a Trojan horse into a package that might be used by another user.
    8. Chapter 6. SecurityNix has two basic security models. First, it can be used in “single-user mode”, which is similar to what most other package management tools do: there is a single user (typically root) who performs all package management operations. All other users can then use the installed packages, but they cannot perform package management operations themselves.Alternatively, you can configure Nix in “multi-user mode”. In this model, all users can perform package management operations — for instance, every user can install software without requiring root privileges. Nix ensures that this is secure. For instance, it’s not possible for one user to overwrite a package used by another user with a Trojan horse.

      Would have been nice to link these to the install chapter where single- and multi-user modes were mentioned.

      How would this look in a topic-based documentation? I would think that his chapter would be listed in the pre-requisites, and it could be used to buld different reading paths (or assemblies in DocBook, I believe) such as practical, depth-first (if there are people like me who want to understand everything first), etc.

    9. reentrancy
    10. nix-shell '<nixpkgs>' -A pan

      What is happening here exactly?

      nix-shell's syntax synopsis always bugged because it looks like this

      nix-shell [--arg name value] [--argstr name value] [{--attr | -A} attrPath] [--command cmd] [--run cmd] [--exclude regexp] [--pure] [--keep name] {{--packages | -p} packages...  | [path]}

      and the canonical example is nix-shell '<nixpkgs>' -A pan; what tripped me up is that path is usually the first in examples, and I thought that the position of arguments are strict. As it turns out, nix-shell -A pan '<nixpkgs> is just as valid.

      Side note<br> Apparently there is no standard for man pages. See 1, 2.

      '<nixpkgs>' path is the one specified in the NIX_PATH environment variable, and -A pan looks up the pan attribute in pkgs/top-level/all-packages.nix in the Nixpkgs repo.

    1. 17.3. Fixed point

      QUESTION: What is a fixed-point of a function?

      ANSWER: See this video) at least, and the Fixed-point (mathematics)) wikipedia article:

      In mathematics, a fixed point (sometimes shortened to fixpoint, also known as an invariant point) of a function is an element of the function's domain that is mapped to itself by the function. That is to say, c is a fixed point of the function f if f(c) = c. This means

      f(f(...f(c)...)) = f n(c) = c

      an important terminating consideration when recursively computing f. A set of fixed points is sometimes called a fixed set.

      For example, if f is defined on the real numbers by f(x)=x^{2}-3x+4,}, then 2 is a fixed point of f, because f(2) = 2.

      There is also the wiki article fixed-point combinator that actually plays a role here, but read through the articles in this order.

      Then dissect the Stackoverflow thread What is a Y combinator?, and pay attention to the comments! For example:

      According to Mike Vanier's description, your definition for Y is actually not a combinator because it's recursive. Under "Eliminating (most) explicit recursion (lazy version)" he has the lazy scheme equivalent of your C# code but explains in point 2: "It is not a combinator, because the Y in the body of the definition is a free variable which is only bound once the definition is complete..." I think the cool thing about Y-combinators is that they produce recursion by evaluating the fixed-point of a function. In this way, they don't need explicit recursion. – GrantJ Jul 18 '11 at 0:02


      Other resources in no particular order:

      QUESTION: How the hell did they come up with the idea of using this with Nix and package management? (..and who? I remember a video saved somewhere, but maybe that was about overlays)

      QUESTION: ... and how does it work in this context?

      ANSWER: Well, not an answer yet, but this may be something in the right direction:


    2. there's no ldconfig cache either. So where does bash find libc?

      QUESTION: What is ldconfig cache?

      QUESTION: What is libc and why does Bash need it?

    3. Derivations/packages are stored in the Nix store as follows: /nix/store/hash-name, where the hash uniquely identifies the derivation (this isn't quite true, it's a little more complex), and the name is the name of the derivation.

      QUESTION: So the Nix store houses derivations and not the built packages?

      QUESTION: Are the hashes in the Nix store not unique?

    1. The latter are important examples which usually also exist in "purely" functional programming languages.

      How can they exist and it still be considered pure??

      I guess that's not quite the same / as bad as saying something had side effects in a purely functional programming context, right?

    1. provide interfaces so you don’t have to think about them

      Question to myself: Is not having to think about it actually a good goal to have? Is it at odds with making intentional/well-considered decisions?  Obviously there are still many of interesting decisions to make even when using a framework that provides conventions and standardization and makes some decisions for you...

    1. What is the opposite of free content?

      The opposite of free/open-source software is proprietary software or non-free software (https://en.wikipedia.org/wiki/Proprietary_software).

      So should we call the opposite of free content "non-free content"? Or "proprietary content"?

      Seems likes either would be fine.

      Looks like https://en.wikipedia.org/wiki/Wikipedia:Non-free_content prefers the term "non-free content".

      Couldn't find anyone contrasting these 2 terms (like I could no doubt find for software):

      Not to be confused with:

      • paid content ... just like:
      • free content should not be confused with gratis content (?)
      • free software should not be confused with freeware
    1. Why then sending the SIGINT manually to the shell doesn't kill the child, e.g. 'kill -2 <shell-pid>' doesn't do anything to a child process while Ctrl-C kills it?
    1. Specifying a name and a src is the absolute minimum Nix requires.

      Didn't they mean what mkDerivation requires?

      I have been jumping around in this manual, so not sure about what arguments does derivation require.

    1. What do you get when you add a sudden surge of demand to an equally sudden loss of capacity? A crisis, whose roots lie in a decade’s worth of deregulation and cost-cutting, of an energy “independence” that has left the state at the mercy of the elements.

      The author is asking a rhetorical question and answering it immediately. He is doing this not only to clear one of the audience's questions regarding the consequences of Texas situations, but also to make the government officials more guilty for leaving Texas in this situation.

    1. compose(Add, x: x, y: 3)

      How is this better than simply:

      Add.run(x: x, y: 3)


      I guess if we did that we would also have to remember to handle merging errors from that outcome into self...

    1. However, using channels is not fully reproducible, as a channel may evolve to incorporate updates.

      TODO: Find other sources about this topic. I remember this mentioned already (and it makes) sense, but need to learn more.

      TODO: What is a better alternative? An own repo? Flakes? Can cachix help?

      It says right below that pinning can help but keep looking.

      When package reproducibility become a major concern, as it is the case in this tutorial, it is preferable to refer to a pinned version of the nixpkgs repository instead — i.e, a specific commit of the repository or an immutable archived tarball. The ability to pin the version of nixpkgs is powerful, it will ensure that a package is always constructed from the same Nix source. As we go deeper in the tutorial we avoid using channels in favor of pinned environments.

    1. Service Balance = Value of service exports –Value of service Imports

      Question: How do they measure the value of import services?



    1. An asthmatic, she had been taken to the hospital nearly 30 times in less than three years and suffered numerous seizures

      Does this relate and increase how it impacts the pollution aspect compared to if it had been someone without asthma?

    2. he first person in Britain to officially have air pollution listed as a cause of death,

      How would this relate and compare to other countries in general? Or in more specific areas in places that have higher amounts of people dying from pollution?

    1. you'll want to update Devise's generated views to remove references to passwords, since you don't need them any more

      Doesn't this contradict the statement

      This strategy plays well with most other Devise strategies

      (which includes password strategies)?

      One thing that wasn't clear from their instructions was whether magic links could be used as an option in addition to regular password log-ins. On the one hand they say:

      This strategy plays well with most other Devise strategies (see notes on other Devise strategies).

      but on the other hand they say:

      you'll want to update Devise's generated views to remove references to passwords, since you don't need them any more

    1. While all these things were happening in various places, Saturnian Juno sent Iris from heaven to brave Turnus,

      We continually see Juno try to intervene, all the while working in accordance with the will of Jupiter and the fates. This begs the question, are gods bound by the fates, or do they shape them? Juno is queen of heaven, a leader of the gods, so why cant she shape fate as Jupiter seems to be able to?

    1. unfamiliar—that is, a metaphorical Journey in which designers move into unchartered territory by attempting to formulate what hasn’t yet been formulated.

      Head Scratcher: using this simple explanation of "unfamiliar" we can see that it is difficult to navigate through territory that has not been properly formed yet or mapped out.

      How do we move forward as Instuctional Designers into the future of Education and Instruction?

      My best efforts so far have been to never be afraid to try new models or technology to lead your instruction.

    1. but what does it mean to be clever, and how can you teach someone to be clever?

      Head Scratcher: How do you teach "cleverness"? This is a tough question and I feel that it is hard to understand for most instructors. How do I get my students to be more creative and clever, I believe we usually feel that students either are or are not creative and thats the end of the story. So really maybe we are the ones at fault for not teaching studetns to be "creative".

    1. We still must decide how to present certain information, but it doesn’t have to be at the cost of another medium.

      Headscratcher: How do we make sure, in our times creating instuction, that we do not neglect a medium that could be used for instruction?

      I feel that one way could be to allow learners choice in how they respond to prompts and learning. I feel that this could allow for students to use their gifting and talents to excel and produce amazing work.

    1. the most productive environment possible for people that use their computer to create.What is a productive environment?How do you measure productivity in an operating system environment?How do you compare YOUR distribution to other distributions when it comes to productivity?Is the way in which 'people that use their computer to create' (creators) the same across all professions and activities?Does a photographer have the same requirements for a productive environment as a software engineer?Why do you think your distribution will be the best for delivering a productive environment than any other Linux distribution?
    1. deconstructing Brazilian gender roles through their performances

      An interesting concept I'd like to consider and interrogate. Does exacerbating and essentially parodying gender roles ACTUALLY work to dismantle those roles, or does it enforce them?

      No strong opinion yet. Come back to this.

    1. A blue-grey spider lay on her exposed cheek. But when I held the match closer there was nothing there, nothing but the faint outlines of a dimple.

      Could there be any other reason or meaning behind the confusing of a pimple with a blue-grey spider, except for the narrator being drunk?

  3. Jan 2021
    1. A value of -1 will disable the limit and the chunk size will grow indefinitely.

      Below it mentions a value of off, where does -1 come from? And since --vfs-read-chunk-size has a nonzero default value does that mean that this feature is on by default, and with an unlimited limit?

    1. Third, it is important to remember that causal conclusions can only be drawn about the manipulated independent variable.

      But can causal conclusions be drawn about the conjunction of the manipulated and non-manipulated variables? Would Schnall and colleagues be justified in concluding that disgust and body consciousness together affect the harshness of moral judgments?

    1. Both longstanding tradition and popular wisdom hold that languages can vary from each other in their degree of relative complexity. However, by the late 20th century a consensus had arisen among linguists that all languages are equally com-plex.

      Why do you think this shift happened?

    1. The model is trained on 147M multi-turn dialogue from Reddit discussion thread. The largest model can be trained in several hours on a 8 V100 machines (however this is not required), with distributed training and FP16 option.

      github-dialogpt traning problem

    1. S. cerevisiae is amenable to genome engineering because of its capacity for efficient homologous recombination, although its transformation efficiency is much lower than that of E. coli.

      This is a very logical explanation provided for why S. cerevisiae is a strong candidate for the organism for the experiment because of its efficient homologous recombination, however since it notes E. coli has a superior transformation efficiency, why isn't that used instead?

    1. Students may be more willing to express their thoughts privately, or on a document that only the teacher can read. Social annotations, on the other hand, can function more like a class discussion, with students reading and responding to each other’s comments.

      I wonder if there are any statistics that show what students prefer?

    2. students practice annotation of digital texts outside of school. For example, students add filters, drawings, emojis, and writing to content they create or interact with in digital spaces such as Snapchat, Instagram, and YouTube.

      I feel like students do not understand that Snapchats, Instagram, Youtube are considered digital annotations because when students are using these technological tools, they are just having fun. In order to teach them that these tech tools are digital annotations, we as teachers need to help them connect the phrase "digital annotation" to these technology tools.

    1. Interpret at least 5 significant “events” which best demonstrate this change.
    2. conditions and consciousness

      what do these mean?

    3. Compare and contrast the conditions and consciousness of the following relative to the WASP male “winners”
    4. Many did not enjoy the rewards produced by industrial and financial capitalism in the United States.

      What is industrial and financial capitalism???

    5. List and interpret the most significant issues found in the document itself and place each in a valid and revealing historical context.
    6. Is it appropriate to define the European people occupying British North America as “American” prior to 1763?
    7. Is it appropriate to define the European people occupying British North America as “American” prior to 1763?
    8. Between the first days of the European Invasion of North America and the ratification of the constitution there were both winners and losers here. List, in rank order, the most significant groups of winners and losers. What factors best explain the relative conditions of the groups on your lists? Connect causes and consequences to each. Were these outcomes inevitable? If so, why?

      Subject = American Conquest EQ = Who won and lost and why? Activities:

    1. It isn’t always guaranteed to be a single root element, in that case it could return an array of elements?
    1. Nous nous concentrerons sur deux de ces nouvelles approches émergentes en sciences cognitives, à savoir le paradigme de la cognition distribuée et les recherches en Acao, où la nature de l'activité instrumentée se pose comme question de recherche fondamentale.
    1. Get back to Chromium : how its evolution will be handled by Debian ? How its cousin-sister-child projects will be handled ( vivaldi, brave, electron… ) ?
    1. What if there's an icon that I need that's not in this set?

      How do I add a custom icon to the set for use on a web page and have the custom icon styled the same way as these "standard" icons?

      Like how they have instructions for adding an icon here, for example: https://www.digitalocean.com/community/tutorials/angular-custom-svg-icons-angular-material#custom-svg-icons

    1. What if your download UI element isn’t just for a single static asset, but is actually generating a custom file when you press it? For example, if you have a list of files, you can check as many as you want, and pressing a download UI element zips those files together and then downloads that one file. In this case, we’d be using JS anyway, and the UI element is triggering more than just the link, it is ‘performing actions’, so a button would make sense, right?
    2. What best describes a download? Is it a triggered action, and therefore should be in the domain of the <button> element? Or is it a destination, and therefore best described using an <a> element?
  4. Dec 2020
    1. If the Klensin Standards Track [Page 19] RFC 5321 SMTP October 2008 recipient is known not to be a deliverable address, the SMTP server returns a 550 reply, typically with a string such as "no such user - " and the mailbox name (other circumstances and reply codes are possible).

      Will the entire transaction be canceled? "Transaction" in the name of this a section implies yes, but what if all the recipients are valid?

      See replies below but the answer is no; an RCPT command is specified for each recipient in the mail data, these RCPT commands will be evaluated in sequence,, and any SMTP (error) notifications will be sent to the address in the MAIL FROM command (which is not necessarily the same as the mail data's From: header).

    2. If the verb is initially accepted and the 354 reply issued, the DATA command should fail only if the mail transaction was incomplete (for example, no recipients),

      How could this specific scenario be even possible? It just said in the previous paragraph that

      If there was no MAIL, or no RCPT, command, or all such commands were rejected, the server MAY return a "command out of sequence" (503) or "no valid recipients" (554) reply in response to the DATA command.

    3. 5yz

      This was unexpected; why wasn't the canonical format (i.e., 5xx) used instead?

    1. echo "First line" > file.txt echo "Second line" >> file.txt

      what is the difference b/w single > and double >> ????

    2. $

      what indicates this dollar symbol ?

    1. This can be used to perform actions once the navigation has completed, such as updating a database, store

      Wouldn't/shouldn't it be the other way around — wouldn't we wait until the save is completed (database is updated) successfully before we navigate away from the current page/form??

    1. Live By

      Do you keep the promises you have made and lay them up against your daily actions to see how they square? Is this what we mean by ethics and reflection?

    2. Promise

      Is Ortiz talking about a promise made or about the promise implied by our very identity, our very selves.

    1. That's all! We have the stack and BSS, so we can jump to the main() C function

      一头雾水 总的来讲.是为了初始化C语言运行环境设置的一坨东西

    2. it calls the 0x10 interrupt


  5. Nov 2020
    1. performs fully automated deployment. This is a good thing because it ensures that deployments are reproducible.It performs provisioning.

      What is the difference between provisioning and deployment?

    1. Three times I poured some out and gave it to him,                           480 and, like a fool, he swilled it down. So then, once that strong wine had addled Cyclops’ wits,

      Did Odysseus really need to give the cyclops the wine to trick him given what has happened?

    2. ‘Nobody is killing me, my friends, by treachery, not using any force.’

      Given that Odysseus was clever enough to fool the cyclops regarding his name, what do you think instigated Odysseus to give away his trick?

      Side note: The saying that a magician should never reveal his secrets.

    1. what I think to be the entire purpose of education in the first place.

      Is Baldwin talking educational reform or revolution?

    1. research does indicate that older adults can learn in training environments if that environment is designed to meet the individual needs of learners (Callahan et al., 2003; Charness and Schumann, 1992)

      Does this translate to learning in higher ed at a distance?



    1. In this context, the objective of thisstudy is to increase knowledge of the motivations and patterns of behaviour of foodstagrammertourists and to contribute new insights about this phenomenon. In the first part of the article,therefore, we establish the framework for the characteristics and motivations of foodstagrammertourists. We then describe the ethnographic methodology employed in this study and presentour detailed fieldwork. Finally, we explain our findings and discuss the phenomenon of foodsta-grammer tourists and their managerial implications.

      The research study, 'An Ethnographic Study of Motivations of Foodstagrammer tourists' highlights how a research question may be portrayed by using a broad research statement to identify their overarching focus of inquiry as opposed to directly stating a research question. In this study, it is found in the goals of the study and could be converted to a question format. Stating the purpose for the inquiry works as effectively as proposing a prompt research question.

  6. mattieburkert.files.wordpress.com mattieburkert.files.wordpress.com
    1. Without such limits on derogatory, racist, sexist, or homophobic materials, Google al-lows its algorithm—which is, as we can see, laden with what Diaz calls “sociopolitics”—to stand without debate while protesting its inability to remove pages.

      Why does google straight allow terrible thing to be presented and will only remove unlawful content? Hopefully if you search some of these words that show explicit things that they warn some people may feel disgusted or get offended. Most of the information is also incorrect so they are providing false things

    1. Man, for some reason, I really like this answer. I recognize it's a bit more complicated, but it seems so useful. And given that I'm no bash expert, it leads me to believe that my logic is faulty, and there's something wrong with this methodology, otherwise, I feel others would have given it more praise. So, what's the problem with this function? Is there anything I should be looking out for here?

      I think the main thing wrong with it is the eval (which I think can be changed to $("$@") and it's pretty verbose.

      Also, there are more concise ways to do it that would probably appeal more to most bash experts...

      like set -x

      and it does unnecessary things: why save output to a variable? Just let output go to where it would normally go...

      So yeah, I can see why this solution isn't very popular. And I'm rather surprised by all the praise comments it's gotten.

    1. Is anything like this possible with the new setup?
    2. is there a way we can specify for image build layers to be included in the pull?
    3. Sorry, I don't totally know how the internals work, but does there currently exist a workaround? By that I mean, can I pull an image, then run it at a layer other than the top layer? (I basically use this for testing purposes, its certainly possible to build the image myself then do it, but its slightly less convenient)
    1. The Chinese Internet also illustrates the importance of theorizing online expression based on a representative spectrum of digital environments.

      How does Chinese cancel culture differ from American cancel cuture? Is this phenomenon different worldwide?

    1. The study traces the interrelationships of the utterances of emergent bilingual stu-dents discussing text in English for the first time in the context of a small-group discus-sion focused on English-language picture books.

      How do did they code the "utterances" of students?

  7. Oct 2020
    1. I really dont need a solution to this problem! I can find many workararounds

      Actually, the answer that was given was a good answer, as it pointed to the problem: It was a reminder that you need to:

      assign to a locally declared variable.

      So I'm not sure the answer was intended to "just" be a solution/workaround, but to help correct or fill in the misunderstanding / forgotten piece of the puzzle to help OP realize why it wasn't working, and realize how reactivity is designed to work (based on assignments).

      It was a very simplified answer, but it was meant to point in the right direction.

      Indeed, it pointed to this main point that was explained in more detail by @rixo later:

      Personally, this also totally aligns with my expectations because in your function fruit can come from anywhere and be anything:

    1. “"

      Which character is this referring to exactly?

      It looks like the empty string, which wouldn't make sense.

      https://www.postgresql.org/docs/13/functions-matching.html only lists these 2:

      If pattern does not contain percent signs or underscores, then the pattern only represents the string itself; in that case LIKE acts like the equals operator. An underscore (_) in pattern stands for (matches) any single character; a percent sign (%) matches any sequence of zero or more characters.

    1. Steele has noted that stereotype threat is most likely in areas of performance in which individuals are particularly motivated

      Stereotype threat is an important factor in student performance that faculty should be aware of, particularly with marginalized students and adult learners who may not identify as successful students, but how does it affect their own performance as instructors? If they care about teaching, but don't identify primarily as instructors, does this limit their teaching ability?

    2. Social dimensions of identity are linked to social roles or characteristics that make one recogniz-able as a member of a group, such as being a woman or a Christian (Tajfel and Turner, 1979).

      How do social dimensions of identity influence instructional decisions?

    3. priming learners to adopt a multicultural mindset may support more-divergent think-ing about multiple possible goals related to achievement, family, identity, and

      Is this the same for instructors? Does priming them to adult a multicultural mindset support more divergent thinking about instructional strategies and students' needs?

    4. Normal aging is accompanied by a gradual decline in episodic memory that begins as early as the twenties and accelerates precipi-tously after the age of 60 (Salthouse, 2009). This decline is associated with degradation in a key aspect of episodic memory: the ability to anchor or bind an event to one’s personal past and to a location (e.g., Fandakova et al., 2014; Wheeler et al., 1997).

      Is this contrary to what they said above about adults remembering more aspects of episodes? How does this decline in episodic memory affect learning in adults?

    5. An adult’s more mature neural structures and networks manage to retain many more of the features of the original experience.

      How does this affect instructional design? If adults are better at remembering experiences, should instructional include more experiential learning?

    6. Interventions that target social and emotional learning may be beneficial in part because they improve executive function (Riggs et al., 2006)

      Is there a connection between SEL and EF?



    1. But then he was hit by Peneleus, below his eyebrows, just underneath his eye. The spear knocked out the eyeball, went in his eye, drove through his neck, and sliced the tendons at the nape. Ilioneus collapsed, stretching out his arms. Peneleus drew his sharp sword and struck his neck,                         580 chopping head and helmet, so they hit the ground,

      Why does Homer go into such detail about the way that heroes die? Most modern writing doesn't go into this level of detail. Is this something the greeks enjoyed hearing about?

    1. But many of these systems continue to re-request the same DTDs from our site thousands of times over, even after we have been serving them nothing but 503 errors for hours or days. Why are these systems bothering to request these resources at all if they don’t care about the response?
    1. Could you please explain why it is a vulnerability for an attacker to know the user names on a system? Currently External Identity Providers are wildly popular, meaning that user names are personal emails.My amazon account is my email address, my Azure account is my email address and both sites manage highly valuable information that could take a whole company out of business... and yet, they show no concern on hiding user names...

      Good question: Why do the big players like Azure not seem to worry? Microsoft, Amazon, Google, etc. too probably. In fact, any email provider. So once someone knows your email address, you are (more) vulnerable to someone trying to hack your account. Makes me wonder if the severity of this problem is overrated.

      Irony: He (using his full real name) posts:

      1. Information about which account ("my Azure account is my email address"), and
      2. How high-value of a target he would be ("both sites manage highly valuable information that could take a whole company out of business...")

      thus making himself more of a target. (I hope he does not get targetted though.)

    1. He took three paces—with the fourth he reached his goal,       

      Interesting depiction of the actual size of gods here. If Poseidon was this large, how large would other gods appear such as Zeus? Or even Cronus, as literature suggests he too has a physical form. Would gods be able to show their true form to humans? Or is this why Zeus often appears as other beings when interacting with mortals.

    1. during file creation

      Only during file creation or also if the file has already been created (, e.g. using chmod)?

    1. Another example:

      const expensiveOperation = async (value) => {
        // return Promise.resolve(value)
          // console.log('value:', value)
          await sleep(1000)
          console.log('expensiveOperation: value:', value, 'finished')
          return value
      var expensiveOperationDebounce = debounce(expensiveOperation, 100);
      // for (let num of [1, 2]) {
      //   expensiveOperationDebounce(num).then(value => {
      //     console.log(value)
      //   })
      // }
      (async () => { await sleep(0   ); console.log(await expensiveOperationDebounce(1)) })();
      (async () => { await sleep(200 ); console.log(await expensiveOperationDebounce(2)) })();
      (async () => { await sleep(1300); console.log(await expensiveOperationDebounce(3)) })();
      // setTimeout(async () => {
      //   console.log(await expensiveOperationDebounce(3))
      // }, 1300)

      Outputs: 1, 2, 3

      Why, if I change it to:

      (async () => { await sleep(0   ); console.log(await expensiveOperationDebounce(1)) })();
      (async () => { await sleep(200 ); console.log(await expensiveOperationDebounce(2)) })();
      (async () => { await sleep(1100); console.log(await expensiveOperationDebounce(3)) })();

      Does it only output 2, 3?

    1. What links all these things is the way they pass the responsibility for upholding norms — for creating “school” — onto individual children and families.

      This is where you can type your notes.

    1. I don't understand the need for the name "Open–closed principle". It doesn't seem meaningful or clear to me.

      Can't we just call it "extensibility" or "easily extendable"? Doesn't "extensibility" already imply that we are extending it (adding new code on top of it, to interoperate with it) rather than modifying its source code?

    1. Don’t indent code blocks.

      Sure, we don't need to add any additional indent. But what if your code block contains indentation (function body)? It would look silly to remove all leading indentation.

    1. so there is no signi cant correlation be-302tween Fram Strait sea ice drift and AO/DA indices

      Smedsrud et al. (2017) point to the fact that the AO - Fram Strait export correlation is non-stationary in time. The results presented here are in line with what Smedsrud et al. report for the 21st century. Yet, I am curious about the earlier period, do you see any correlation between drift and AO in earlier periods of the FESOM simulations?

    2. Relative contributions from winds and thermal forcing

      I find this section very convincing!

      One additional suggestion, still. What do the sea ice area export curves look like in the FESOM simulations? I am assuming that if you were to look at area export (function of ice drift and ice concentration), you would get a similar picture to Fig. 3c - i.e.: slightly positive trends, with the variability almost entirely explained by winds. Is it possible to show that (additional panel in Fig. 3)? I believe it would bring yet an another argument supporting that the long term trend in volume export has to be thickness driven.

    3. nnual mean sea level pressure

      Why not calculate correlations with SLP over land? There might be some interesting connections when thinking about high pressure systems above Greenland?

    4. he same as(a) but for sea ice thickness.

      In Fig. 2b - the observations are the Cryosat-2 thicknesses, correct?

      I understand that CMST assimilates sea ice thickness from Cryosat-2. Therefore, why is there such an important discrepancy in the ice thickness in Fram Strait between CMST and the observations?

    1. Could I get your intuition for why that rule of thumb applies to svelte components but not Javascript functions? I tend to make heavy use of let x = e when writing normal Javascript, as I do in most other languages (though unlambda is a notable exception). How is svelte different?
    1. The contrast between these two responses reveals a shift from projection onto an object to engagement with a subject

      how do you differentiate the lien between projection between an object and engagement to a subject

    2. “When I wake up in the morning and see her face [the robot’s] over there, it makes me feel so nice, like somebody is watching over me.”

      why does the robot carry a presence without action? do the roles we assign it carry over more than we consciously realize



    1. We say that uu is ’a utility function for ≿\succsim.

      Does "u is a utility function for \($\succsim$\)" mean that the utility function 'represents' \($\succsim$\)/



    1. The extent of faculty involvement in institutional decision making tendsto vary among institutional types

      This helps to address the institutional type question



    1. Books

      Do you have a bookshelf? What percentage of the books that you own are paper and what digital?

    2. blazes

      This word is ambiguous. It has several meanings. This is what poet thinking is all about for me--subverting the routine. First, the word is about fire, right, but if you have every looked at my posts (count on two hands my very fine viewership) you know that I write about trail blazes. I want the word to be a fork and to mean both of these simultaneously. My poems are designed to carry a lot of freight. What do you think about ambiguity?

    3. ethical blazes

      What ethical blazes have books kindled in you? Most poetry tries to freshen the language. Most poets are work necromancers. They bring what is routine and everyday back into clear and plain air. This is called a metaphor. Values don't really burn, but I am trying to conjure up a feeling here where what we believes has the intensity of a fire. I am trying to do that with a few words and not a lot like here. Maybe poetry is all about translation and summary put together. What do you think poetry is supposed to be or do?

    1. Flow of execution

      how many types of flow of execution are there in python?

    2. Math functions

      what is math function and use of it in python ?

  8. Sep 2020
    1. The objective function f and the inequality constraints g1, g2 and g3 being convex, every local solution to this problem is also a global solution by theorem 2.2

      Do the inequality constrains have to be convex functions as well? This is not considered in def. 2.13.

    1. Actually just returning the loginDaoCall works fine. I dont really get what's different as it is the looked like it was the same instance, but probably not.

      So the posted answer wasn't necessary/correct? Which part of the answer was incorrect/unneeded?

      I wish this OP comment included the full version of code that worked.

      I don't understand this OP comment. Wasn't OP already returning loginDaoCall? So maybe the only thing they could mean is that they just needed to change it to return loginDaoCall.then(...) instead...

      That would be consistent with what the answer said:

      the promise returned by the further .then() does also get rejected and was not handled.

      So I guess the unnecessary part of the answer was adding the return true/false...

    1. Now long-haired Achaeans are mocking us, saying we’ve put forward as a champion one who looks good, but lacks a strong brave mind.

      Why do you think when the Trojans are mentioning the Greeks they mention them as "long-haired Achaeans"?

      My take on it is that its an insult as to call them out to look like women because they have long hair as Homer does include insults that relate to the opposite sex.

    2. Despicable Paris, handsomest of men, but woman-mad seducer. How I wish you never had been born or died unmarried.

      Why do you think the statement of "handsomest of men" was used by Homer when it is stated that Hector is insulting him?

      In my opinion, he is trying to create a reflection of how he looks the part of a hero but, lacks the internal motivations to be a real hero.

  9. web.hypothes.is web.hypothes.is