288 Matching Annotations
  1. Last 7 days
    1. So, whether you’re already running a business or planning to start a new venture, cloud integration will be a mandatory thing. But, when you deep dive into the ocean of cloud computing, you may get confused between the top three service models – Iaas vs PaaS vs SaaS.

      article, we will be going through many aspects of SaaS vs PaaS vs IaaS. Stay tuned till the end of the blog to know which one will suit best for your business.

    1. // DO NOT INLINE this variable. For backward compatibility, foundations take a Partial<MDCFooAdapter>. // To ensure we don't accidentally omit any methods, we need a separate, strongly typed adapter variable.

      I wish I understood what they meant and why this is necessary

    1. Certainly during the first few turns in a less developed game, you are taking more strategic gambles, and later you are more tactically choosing who will mail off their Form 1120 on time.
  2. Nov 2020
    1. I'd say it's better overall because it replaces paths at compile-time. It means there is no runtime dependency or any performance overhead.
    1. Loaders use a mapping configuration to map module names to files at run-time, see RequireJs documentation and SystemJS documentation.
    1. This module should not be used in other npm modules since it modifies the default require behavior! It is designed to be used for development of final projects i.e. web-sites, applications etc.
    1. The following options are ideal for development:
    2. Some of these values are suited for development and some for production. For development you typically want fast Source Maps at the cost of bundle size, but for production you want separate Source Maps that are accurate and support minimizing.
    1. I'm looking at https://html.spec.whatwg.org/#attributes-3 right now, and it seems that there are a few others that ought to be boolean but are not currently in this list: allowpaymentrequest, formnovalidate, hidden (is on the original list in the master branch), itemscope, nomodule, and playsinline.
    1. Some of the verbs implemented by systemctl are designed to provide a high-level overview in a human readable format. All that information is available over dbus, and/or journalctl, systemctl show. We could provide that information in json format, but there's a second problem. Information and format of information printed by e.g. systemctl status is not stable. Since the output is not suitable for programmatic consumption anyway, there's no need to provide it in a machine readable format.
    1. Now let me get back to your question. The FBI presents its conflict with Apple over locked phones as a case as of privacy versus security. Yes, smartphones carry a lot of personal data—photos, texts, email, and the like. But they also carry business and account information; keeping that secure is really important. The problem is that if you make it easier for law enforcement to access a locked device, you also make it easier for a bad actor—a criminal, a hacker, a determined nation-state—to do so as well. And that's why this is a security vs. security issue.

      The debate should not be framed as privacy-vs-security because when you make it easier for law enforcement to access a locked device, you also make it easier for bad actors to do so as well. Thus it is a security-vs-security issue.

  3. Oct 2020
    1. It is only soft-deprecated, which means that your code will not break at the moment and no deprecation warning will be displayed, but this constant will be removed in the future.
    1. If you don't like to create an extra function and remove the items 'inline'
    2. However, this will only walk the object shallowly. To do it deeply, you can use recursion:
    3. Note that if you're willing to use a library like lodash/underscore.js, you can use _.pick instead. However, you will still need to use recursion to filter deeply, since neither library provides a deep filter function.
    1. export const validationSchema = {
        field: {
          account: [Validators.required.validator, iban.validator, ibanBlackList],
          name: [Validators.required.validator],
          integerAmount: [

      Able to update this schema on the fly, with:

        React.useEffect(() => {
          getDisabledCountryIBANCollection().then(countries => {
            const newValidationSchema = {
              field: {
                account: [
                    validator: countryBlackList,
                    customArgs: {
        }, []);
    1. Image a situation wherein you have just launched your app. But the data of your app is not being properly displayed or you are not able to fetch the data that is being entered by the users. What will be the impression of your app in the user’s mind?

      Many businesses get confused when it comes to choosing the right database for their application. In fact, it is quite crucial to choose the one between SQLite and Realm.

    1. SwiftUI is a user interface toolkit that lets us design apps in a declarative way. That’s a fancy way of saying that we tell SwiftUI how we want our UI to look and work, and it figures out how to make that happen as the user interacts with it.
    2. Imperative UI causes all sorts of problems, most of which revolve around state, which is another fancy term meaning “values we store in our code”. We need to track what state our code is in, and make sure our user interface correctly reflects that state.
    1. Doing so also means adding empty import statements to guarantee correct order of evaluation of modules (in ES modules, evaluation order is determined statically by the order of import declarations, whereas in CommonJS – and environments that simulate CommonJS by shipping a module loader, i.e. Browserify and Webpack – evaluation order is determined at runtime by the order in which require statements are encountered).

      Here: dynamic loading (libraries/functions) meaning: at run time

    2. This PR replaces nested require statements in files in vendor/postcss with import declarations, so that they can be properly resolved at build time.
    1. Note that these are not hyperlinks; these URIs are used for identification. This is a machine-readable way to say “this is HTML”. In particular, software does not usually need to fetch these resources, and certainly does not need to fetch the same one over and over!
    1. Every URL is a URI; Every URN is a URI; URI and URL are NOT interchangeable – a URL is a URI, but a URI is not always a URL; URLs always contain an access mechanism.
    1. Roles are element types and authors MUST NOT change role values over time or with user actions. Authors wishing to change a role MUST do so by deleting the associated element and its children and replacing it with a new element with the appropriate role.
    1. Their trailer said "A video game for the home computer". Not sure why they said that instead of PC, but it was a refreshing new term for it.

    1. Longstanding controversy surrounds the meaning of the term "hacker". In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks[5] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).
    1. Returns a Promise<?Object> that resolves with no value on success or resolves with an Object of submission errors on failure. The reason it resolves with errors is to leave rejection for when there is a server or communications error.
    1. In highlighting the dangers of big-up-front-design (BUFD) and waterfall development, Agilists seem to advocate no-up-front-design (NUFD) or no-up-front-requirements (NUFR) or no-up-front-architecture (NUFA).
    1. Most people seem to follow one of two strategies - and these strategies come under the umbrella of tree-traversal algorithms in computer science.

      Deciding whether you want to go deep into one topic, or explore more topics, can be seen as a choice between two types of tree-traversal algorithms: depth-first and breadth-first.

      This also reminds me of the Explore-Exploit problem in machine learning, which I believe is related to the Multi-Armed Bandit Problem.

    1. In general it is recommended you handle forms in this "controlled" manner. In some cases it might make sense to manage the form state outside of Solid via refs. These "uncontrolled" forms can also work. Just be conscious of the difference as mixing approaches can lead to unexpected results.
    1. t’s not clear why the sequence of the vaccines only mattered in girls, partly because there has been very little research into how male and female immune systems are different. “Somehow immunology has been blind to sex,” says Aaby. “If you read research about mortality in low income countries, there is no such thing as boys and girls – there are children. So we perceive that they have to be the same, and they are definitely not the same.”

      Take away: "Immune training" or bystander effects from other vaccinations may help to fight off Covid-19 or other infections, in spite of not being specific to that pathogen. Some of these effects are sex-specific.

      Claim: "Somehow immunology has been blind to sex"

      The evidence: This is not entirely true- there is actually a LOT of research into sex differences in the immune response, and it is well-known that women can generally mount stronger Th1-type immune responses against viral infections than men. This is thought to be partially linked to estrogen cycling, and partly due to the fact that women have 2 active copies of genes associated with immunity because those are encoded on the X chromosomes. Men only have 1 copy, and thus they don't generally mount as strong an inflammatory response. However, women are also more prone to autoimmune diseases as a consequence of having stronger inflammatory responses than men, which is seen in diseases such as multiple sclerosis, rheumatoid arthritis, and lupus.

      Sources: (https://www.nature.com/articles/nri.2016.90).

  4. Sep 2020
    1. detach, as an api, should be declarative (ensure the node is detached) instead of imperative (detach the node), allowing it to be called multiple times by performing a noop if the node is already detached. This way, it won't matter if the node is removed from the DOM from outside of svelte.
    1. Let’s take a look at some facts and figures related to iOS vs. Android, which can help you choose one of two operating systems:
    1. Some modules, like events or util, are built in to Node.js. If you want to include those (for example, so that your bundle runs in the browser), you may need to include rollup-plugin-node-polyfills.
    1. dependencies are the packages your project depends on. devDependencies are the packages that are needed during the development phase. Say a testing framework like Jest or other utilities like Babel or ESLint.
    1. Svelte will not offer a generic way to support style customizing via contextual class overrides (as we'd do it in plain HTML). Instead we'll invent something new that is entirely different. If a child component is provided and does not anticipate some contextual usage scenario (style wise) you'd need to copy it or hack around that via :global hacks.
    2. Explicit interfaces are preferable, even if it places greater demand on library authors to design both their components and their style interfaces with these things in mind.
    1. You'll have to create a new component that brings in the functionality of both. TooltipButton, TooltipLink, Link, and TooltipRoutedLink. We're starting to get a lot of components to handle a bit of added functionality.
    2. For the tooltip example, if you had a whole bunch of tooltips on different elements, it would be annoying to have different event listeners and "should it be shown" variables for each one.
    1. Perhaps at that point we're better off settling on a way to pass components through as parameters? <!-- App.html --> <Outer contents={Inner}/> <!-- Outer.html --> <div> <div>Something</div> <[contents] foo='bar'/> </div>
    2. I would hope for it to come with React-like behavior where I could pass in a string (like div or a) and have it show up as a normal div/a element when the child component used it.
    1. The lack of spread continues to be a big pain for me, adding lots of difficult-to-maintain cruft in my components. Having to maintain a list of all possible attributes that I might ever need to pass through a component is causing me a lot of friction in my most composable components.
    1. As a general rule, I would recommend reading the article in it's entirety. With that said, if you wish to "cut to the chase", I have summarized my findings at the end ... feel free to jump ahead to the Summary!
    1. Yow loveres axe I now this questioun:      1347 Who hath the worse, arcite or palamoun?      1348

      The Knight’s Tale The question of what is the lesser of the two evils seems tobe a running theme in Chaucer’s The Knight’s Tale. This theme is most apparentat the end of part one of The Knight’s Tale when the question is asked ”Yowloveres axe I now this questioun:/ Who hath the worse, Arcite or Palamoun?” (lines1347/48).In other words, it poses the question, what is worse Arcite being exiled andunable to see Emelye or  the positionthat Palamoun finds himself in as a prisoner, but has access to Emelye? I wouldargue that Palamoun’s position is the worse of the two. Arcite, can romanticizethe past or move on in a way that Palamoun is unable to. Palmoun, on the otherhand, is confined in a cell making it difficult to romanticize the past or moveforward.  This idea of the lesser of thetwo evils also appears in lines 1318-23, although not as directly in theprevious lines:Ther as a beest may al his lust fulfille.And whan a beest is deed he hath no peyne;But man after his deeth moot wepe and pleyne,Though in this world he have care and wo.Withouten doute it may stonden so. The answere of thislete I to dyvynys,          In these lines, a beast can act on his desires and can makedecisions without considering an afterlife. However, the opposite is true forman. Chaucer’s use of these juxtapositions to allows him to continue this themeof the lesser of the two evils.What is Chaucer’s intention in having his reader contemplateone side or the other in such a direct way?

    1. A paradigm is a model or pattern. In JavaScript, there are a number of popular paradigms including object-oriented programming (OOP) and functional programming (FP). Paradigms are more important than is sometimes recognized. They help form mental models for solving problems. Becoming well-versed in the principles of a given paradigm can help accelerate development by providing mental shortcuts for solving the challenges that arise while building applications. They can also help produce higher quality software.
  5. Aug 2020
    1. Facilitators don't have to be experts in the topic — they can be learners too!

      yup, and I think having this distinction and also being clear/honest about it - and being transparent in our own learning process.

      I think a challenge we've had with some online educators, is they have positioned themselves as an expert, and shared content from a place of 'authority' that was a bit rocky.

      The advice then gets taken as 'set in stone', next thing you know a rough idea goes viral and becomes 'best practice' when it was really 'some person trying to figure something out'

      By being more transparent in where you are at, it can then encourage more feedback and discussion, and also a deepening of the facilitators understanding.

    2. Online courses tend to be based around linear playlists of videos, along with associated readings and other activities. These often look like university courses filmed and translated more or less directly to online form. More internet native courses tend to be shorter and more focused, but still just as linear and video-centric.

      agree with this.

      I've often thought that at times learning feels more like the Path fo Exile skill spider-web than a linear path.

      Many 'road maps', 'how to' feels like a ladder - and then it's not always clear how much you need to learn about a certain step before moving onto the next step, while also failing to realize that you may have learned the outcomes from the step in another way.

    1. Stallman has also stated that considering the practical advantages of free software is like considering the practical advantages of not being handcuffed, in that it is not necessary for an individual to consider practical reasons in order to realize that being handcuffed is undesirable in itself.
  6. Jul 2020
    1. RDFa is intended to solve the problem of marking up machine-readable data in HTML documents. RDFa provides a set of HTML attributes to augment visual data with machine-readable hints. Using RDFa, authors may turn their existing human-visible text and links into machine-readable data without repeating content.
    1. This is very irresponsible of them, with respect to the number of downloads. They should finally realize this and just redirect people to LO. Continuing like this hurts the Apache Foundation credibility as well as the open source community as a whole.
    1. He had put the case (without mentioning names) to an eminent physician; and the eminent physician had smiled, had shaken his head, and had said–nothing. On these grounds, Mr. Bruff entered his protest, and left it there.

      So to say nothing is enough proof that there is no merit to this experiment? Isn't Ezra's thoughts inspired by textbooks/an intention to mimic the scientific process?

      I feel like such ignorance towards science is relevant today *cough*,*cough* people who refuse to wear face masks *cough*,*cough*

    1. It does, however, provide the --porcelain option, which causes the output of git status --porcelain to be formatted in an easy-to-parse format for scripts, and will remain stable across Git versions and regardless of user configuration.
    2. Parsing the output of git status is a bad idea because the output is intended to be human readable, not machine-readable. There's no guarantee that the output will remain the same in future versions of Git or in differently configured environments.
  7. Jun 2020
    1. The chief justice explained that he continues to think the Texas case was wrongly decided, but believes it’s important for the court to stand by its prior decisions.


    1. EFF describes this as “a major threat,” warning that “the privacy and security of all users will suffer if U.S. law enforcement achieves its dream of breaking encryption.”
    2. Once the platforms introduce backdoors, those arguing against such a move say, bad guys will inevitably steal the keys. Lawmakers have been clever. No mention of backdoors at all in the proposed legislation or the need to break encryption. If you transmit illegal or dangerous content, they argue, you will be held responsible. You decide how to do that. Clearly there are no options to some form of backdoor.
    3. While this debate has been raging for a year, the current “EARN-IT’ bill working its way through the U.S. legislative process is the biggest test yet for the survival of end-to-end encryption in its current form. In short, this would enforce best practices on the industry to “prevent, reduce and respond to” illicit material. There is no way they can do that without breaking their own encryption. QED.
    4. Governments led by the U.S., U.K. and Australia are battling the industry to open up “warrant-proof” encryption to law enforcement agencies. The industry argues this will weaken security for all users around the world. The debate has polarized opinion and is intensifying.
    1. Such is the security of this architecture, that it has prompted law enforcement agencies around the world to complain that they now cannot access a user’s messages, even with a warrant. There is no backdoor—the only option is to compromise one of the endpoints and access messages in their decrypted state.
  8. May 2020
    1. This starter takes advantage of Typescript and Emotion. This is a personal choice, and I'd encourage you to give it a shot. If you're interested in using plain ES6 and regular scss styling, see release v1 of this library.
    1. Venmo vs Zelle - Which Peer-to-Peer Payment App Wins the Battle?

      Well, it completely depends on the users, which peer to peer payment to opt for. Some may feel comfortable to go for Zelle while others may opt for Venmo.

    1. Stripe vs Braintree: Pick the Best One for Your Online BusinessYou are here:HomeStartupsStripe vs Braintree: Pick the…

      Stripe and Braintree are the bellwethers of the rapidly changing payment processing industry. In this article, we are going to thoroughly compare Stripe vs Braintree so that you can decide on which one is suitable for their needs.

    1. Out of Scope The following details what is outside of the scope of support for GitLab.com customers with a subscription.
    2. The GitLab.com support team does offer support for: Account specific issues (unable to log in, GDPR, etc.) Broken features/states for specific users or repositories Issues with GitLab.com availability
    3. Out of Scope The following details what is outside of the scope of support for self-managed instances with a license.
    1. WhyGeneral infrastructure simply takes time to build. You have to carefully design interfaces, write documentation and tests, and make sure that your systems will handle load. All of that is rival with experimentation, and not just because it takes time to build: it also makes the system much more rigid.Once you have lots of users with lots of use cases, it’s more difficult to change anything or to pursue radical experiments. You’ve got to make sure you don’t break things for people or else carefully communicate and manage change.Those same varied users simply consume a great deal of time day-to-day: a fault which occurs for 1% of people will present no real problem in a small prototype, but it’ll be high-priority when you have 100k users.Once this playbook becomes the primary goal, your incentives change: your goal will naturally become making the graphs go up, rather than answering fundamental questions about your system.

      The reason the conceptual architecture tends to freeze is because there is a tradeoff between a large user base and the ability to run radical experiments. If you've got a lot of users, there will always be a critical mass of complaints when the experiment blows up.

      Secondly, it takes a lot of time to scale up. This is time that you cannot spend experimenting.

      Andy here is basically advocating remaining in Explore mode a little bit longer than is usually recommended. Doing so will increase your chances of climbing the highest peak during the Exploit mode.

  9. Apr 2020
    1. The idea behind the app is to allow people to rent something that they would only use once or very rarely. Rather than buying that expensive drill that you will only use for 15 mins, why not rent it from your neighbor?
    1. In mainstream press, the word "hacker" is often used to refer to a malicious security cracker. There is a classic definition of the term "hacker", arising from its first documented uses related to information technologies at MIT, that is at odds with the way the term is usually used by journalists. The inheritors of the technical tradition of the word "hacker" as it was used at MIT sometimes take offense at the sloppy use of the term by journalists and others who are influenced by journalistic inaccuracy.
    2. there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"