85 Matching Annotations
  1. Nov 2021
    1. Even if #foo is originally on the page and then removed and replaced with a #foo which contains baz after a short wait, Capybara will still figure this out.
    2. As long as you stick to the Capybara API, and have a basic grasp of how its waiting behaviour works, you should never have to use wait_until explicitly.
    3. Let’s make that really clear, Capybara is ridiculously good at waiting for content.
    4. apybara could have easily figured out how to wait for this content, without you muddying up your specs with tons of explicit calls to wait_until. Our developer could simply have done this: page.find("#foo").should have_content("login failed")
  2. Oct 2021
    1. And on any given day, developing with Svelte and its reactive nature is simply a dream to use. You can tell Svelte to track state changes on practically anything using the $: directive. And it’s quite likely that your first reactive changes will produce all the expected UI results.
  3. Sep 2021
  4. Aug 2021
  5. Jul 2021
    1. Hayek draws attention to the fact that the most relevant knowledge for economic decision-making is not the general knowledge of the economist or philosopher, but rather the dispersed, local, and often tacit knowledge of myriad individuals in an economy

      will big data change the situation? What used to be impossible now starts to seem likely.

  6. Jun 2021
  7. May 2021
  8. Apr 2021
  9. Mar 2021
    1. With all this “monetization” happening around Trailblazer, we will also make sure that all free and paid parts of the project grow adult and maintan an LTS - or long-term support - status. Those are good news to all you users out there having been scared to use gems of this project, not knowing whether or not they’re being maintained, breaking code in the future or making your developers addicted to and then cutting off the supply chain. Trailblazer 2.1 onwards is LTS, and the last 1 ½ years of collaboration have proven that.
  10. Feb 2021
    1. Literally, everything in this example can go wrong. Here’s an incomplete list of all possible errors that might occur: Your network might be down, so request won’t happen at all The server might be down The server might be too busy and you will face a timeout The server might require an authentication API endpoint might not exist The user might not exist You might not have enough permissions to view it The server might fail with an internal error while processing your request The server might return an invalid or corrupted response The server might return invalid json, so the parsing will fail And the list goes on and on! There are so maybe potential problems with these three lines of code, that it is easier to say that it only accidentally works. And normally it fails with the exception.
  11. Jan 2021
    1. A robust solution is always the most desirable—in a time of crisis, it might even save a life. This might sound hyperbolic, but having a stable copy of something that works offline could make all the difference in a time of need.
  12. Nov 2020
  13. Oct 2020
  14. Sep 2020
  15. Aug 2020
    1. As a web designer, I hate that "log in" creates a visual space between the words. If you line up "Log In Register" - is that three links or two? This creates a Gestalt problem, meaning you have to really fiddle with spacing to get the word groupings right, without using pipe characters.

      Sure, you can try to solve that problem by using a one-word alternative for any multi-word phrase, but that's not always possible: there isn't always a single word that can be used for every possible phrase you may have.

      Adjusting the letter-spacing and margin between items in your list isn't that hard and would be better in the long run since it gives you a scalable, general solution.

      "Log in" is the only correct way to spell the verb, and the only way to be consistent with 1000s of other phrasal verbs that are spelled with a space in them.

      We don't need nor want an exception to the general rule just for "login" just because so many people have made that mistake.

  16. Jul 2020
  17. May 2020
    1. Add-ons must function only as described, and should provide an appealing user experience. Based on the description of the add-on, a user must be able to understand and use the add-on’s features without requiring expert knowledge.
  18. Dec 2019
    1. Confusingly, all the distributions I use (Ubuntu, RHEL and Cygwin) had some type of check (testing $- or $PS1) to ensure the current shell is interactive. I don’t like cargo cult programming so I set about understanding the purpose of this code in my .bashrc.
    1. No, clumsily working around the root account in situations where it is absolutely appropriate to use it is not for good reasons. This is just another form of cargo cult programming - you don't really understand the concept behind sudo vs root, you just blindly apply the belief "root is bad, sudo is good" because you've read that somewhere.
    1. Cargo cult programming is a style of computer programming characterized by the ritual inclusion of code or program structures that serve no real purpose.
    1. Merch by Amazon is OnDemand T-shirt Print Services platform where the designer needs to upload design as per Amazon guidance and rest will be held by Amazon. If you want to know each information about it and how you succeed then refer one best guide "How Merch by Amazon Works".

  19. Aug 2019
    1. How does Demand-side platforms (DSP) work? The functioning of the Demand-side platforms is technical and requires some attentive reading here. While building an ad campaign buyers can use the tool to provide required metrics like age, gender, location, interests, incomes et cetera.

      Advanced technology and developed algorithms have changed the way ads were bought, placed, and traced. Demand-side platforms simplified purchasing and handling the ads inventories, thus, making it cheaper & reliable.

  20. Dec 2018
    1. though it found me suffering under a more severe attack than usual of my old grievance, spasmodic bile, and hardly able to crawl from my bed to the sofa

      Diana's seems to be a bit exaggerated in her account which reminds me of Mary's letters of her "illness" to Anne in Persuasion and hypochondriac Mr. Woodhouse in Emma.

  21. Jun 2018
  22. ktakahata.github.io ktakahata.github.io
    1. That gentleman’s pamphlet

      Colonel Martyn's An Essay upon Plantership

    1. best known for his The Night Before Christmas[1][2] for Narrator and Orchestra and his fifteen-minute miniature opera Hamlet


  23. Dec 2017
    1. (3)

      Has the Earth's sixth mass extinction already arrived? A. D. Barnosky, N. Matzke, S. Tomiya, G. O. U. Wogan, B. Swartz, T. B. Quental, C. Marshall, J. L. McGuire, E. L. Lindsey, K. C. Maguire, B. Mersey, E. A. Ferrer

      This article suggests that the current rate of species extinction is higher than what has been expected in the past (compared against fossil records). The authors propose that this elevated rate of extinction may possibly be the beginning of the 6th known mass extinction event on earth.

      This extinction would drastically lower biodiversity by killing off many species that would otherwise function as carbon sinks. The release of such massive amounts of carbon might have dramatic effects upon the environment.


    2. (1).

      Past and present of sediment and carbon biogeochemical cycling models By:Mackenzie, FT (Mackenzie, FT); Lerman, A (Lerman, A); Andersson, AJ (Andersson, AJ) This is a secondary study of the history of the carbon cycle, with particular respect to the onset of industrialization as well as the dynamic role the ocean plays in carbon storage. Prior to industrialization, the ocean was a net source of CO2 emissions due to the net carbon differences between photosynthesis and respiration. However, the massive CO2 releases from the burning of fossil fuels have made the ocean into a net carbon sink.

      This citation is referring to the storage of carbon within calcium carbonate (CaCO3), or limescale within the ocean. This limescale comprises most of the 'rocks' in reference.


  24. Oct 2017
  25. Sep 2017
    1. Anita Allen

      Anita Allen

      • spatial
      • informational
      • decisional
      • reputational
      • associational
    2. Roger Clarke

      Clarke's maslow pyramid classification

      • bodily privacy
      • spatial privacy
      • privacy of communication
      • privacy of personal data
    3. Alan Westin

      Westin's four states of privacy - solitude, intimacy, anonymity, reservation

    4. dangers of privacy when it is used to cover up physical harm done to women by perpetrating their subjection.

      Feminist critique of privacy

    5. privacy should be protected only when access to information would reduce its value such as when a student is allowed access to a letter of recommendation for admission, rendering such a letter less reliable. According to Posner, privacy when manifested as control over information about oneself, is utilised to mislead or manipulate others

      Economic critique of privacy - posner

    6. Judith Jarvis Thomson,in an article published in 1975, noted that while there is little agreement on the content of privacy, ultimately privacy is a cluster of rights which overlap with property rights or the right to bodily security. In her view, the right to privacy is derivative in the sense that a privacy violation is better understood as violation of a more basic right

      Reductionist critique of privacy - JJ Thomson used by respondents to support the argument that privacy itself is not a right, but privacy violations may lead to other violations.

    7. rights which individuals while making a social compact to create a government, reserve to themselves, are natural rights because they originate in a condition of nature and survive the social compact

      Patterson on natural rights surviving the social contract

    8. The idea that individuals can have rights against the State that are prior to rights created by explicit legislation has been developed as part of a liberal theory of law propounded by Ronald Dworkin

      Rights predating the recognition through explicit legislation (Dworkin)

    9. Aristotle’s distinction between the public and private realms can be regarded as providing a basis for restricting governmental authority to activities falling within the public realm.

      Aristotle's Public v private sphere. Role of government restricted to public sphere. Early conception of a sphere of rights (?) repelling state action

    10. Mill posited that the tyranny of the majority could be reined by the recognition of civil rights such as the individual right to privacy, free speech, assembly and expression

      Mill's conception of civil liberties to counter majoritarian actions

    11. traced the recognition of an inviolable zone to an inalienable right to property. Property is construed in the broadest sense to include tangibles and intangibles and ultimately to control over one’s conscience itself

      Madison's propertarian view of privacy

    12. in reality not the principle of private property, but that of an inviolate personality

      Warren & Brandeis - Early conception that privacy rests not in places, but in persons

  26. Aug 2017
  27. May 2017
    1. “Our Communities.” CPDC, Edgewater Terrace Apartments, www.cpdc.org/communities/edgewood-terrace-the-vantage-and-the-parke/. Accessed 19 Feb. 2017.
  28. Dec 2016
  29. Nov 2016
    1. “Advisory Neighborhood Commission 5E.” N.p., n.d. Web. 18 Nov. 2016. Barnard, Anne. “Beirut, Also the Site of Deadly Attacks, Feels Forgotten.” The New York Times 15 Nov. 2015. NYTimes.com. Web. 16 Nov. 2016.

      Double space this or try to do something to make more readable.

  30. Oct 2016
  31. Jul 2016
    1. Effective Copyright Policy: Copyrights encourage creativity and incentivize innovators to invest knowledge, time, and money into the generation of myriad forms of content. However, the copyright system has languished for many decades, and is in need of administrative reform to maximize its benefits in the digital age. Hillary believes the federal government should modernize the copyright system by unlocking—and facilitating access to—orphan works that languished unutilized, benefiting neither their creators nor the public. She will also promote open-licensing arrangements for copyrighted material and data supported by federal grant funding, including in education, science, and other fields. She will seek to develop technological infrastructure to support digitization, search, and repositories of such content, to facilitate its discoverability and use.   And she will encourage stakeholders to work together on creative solutions that remove barriers to the seamless and efficient licensing of content in the U.S. and abroad.

      "Effective Copyright Policy" section of "Hillary Clinton’s Initiative on Technology & Innovation". Note, especially, the position on orphan works.

  32. Apr 2015
    1. hypothesis.js

      hypothesis.js is injected into the page by embed.js using either the browser's plugin API or (in the case of the bookmarklet) the DOM API. (embed.js was in turn injected by the browser plugin or bookmarklet).

      hypothesis.js is the "bootstrap" code that connects up and starts the various components of the Hypothesis app.

    2. app: jQuery('link[type="application/annotator+html"]').attr('href'),

      Here we find the <link rel="sidebar" ... that embed.js injected into the page. We pass it into the constructor method of Annotator.Host below.

    3. window.annotator = new Klass(document.body, options);

      Calling the Annotator.Host construct, passing an options object including our sidebar link.

    4. Annotator.noConflict().$.noConflict(true);

      Having created our Annotator instance and added our custom plugins etc to it, we inject Annotator into the page.

    1. layout.app_inject_urls

      app_inject_urls is the list of scripts and stylesheets that we're going to inject into the page. This comes from layouts.py, which in turn gets it from assets.yaml.

      Most importantly these URLs to be injected include a minified version of hypothesis.js.

    2. var baseUrl = document.createElement('link'); baseUrl.rel = 'sidebar'; baseUrl.href = '{{ app_uri or request.resource_url(context, 'app.html') }}'; baseUrl.type = 'application/annotator+html'; document.head.appendChild(baseUrl);

      Finally, we inject a <link rel="sidebar" type="application/annotator+html" href=".../app.html"> into the <head> of the document. This is the HTML page for the contents of the sidebar/iframe. This link will be picked up by hypothesis.js later.

    3. if (resources.length) { var url = resources.shift(); var ext = url.split('?')[0].split('.').pop(); var fn = (ext === 'css' ? injectStylesheet : injectScript); fn(url, next); }

      This loop is where we actually call injectScript() or injectStylesheet() on each of the resource URLs defined above.

    4. var injectScript = inject.script || function injectScript(src, fn) {

      And we do the same thing for injecting scripts as we did for injecting stylesheets - we either use the function passed in by the browser plugin, or when called by the bookmarklet we fall back on the DOM API.

    5. var injectStylesheet = inject.stylesheet || function injectStylesheet(href, fn) {

      hypothesisInstall() will use the inject.stylesheet() function passed in to it to inject stylesheets into the page or, if no function was passed in, it'll fallback on the default function defined inline here.

      The default method just uses the DOM's appendChild() method, but this method may fail if the site we're trying to annotate uses the Content Security Policy.

      That's why when we're using one of the browser plugins rather than the bookmarklet, we pass in the browser API's method for injecting a stylesheet instead.

      This is why the bookmarklet doesn't currently work on GitHub, for example, but the Chrome plugin does.

    6. embed.js

      embed.js is responsible for "embedding" the different components of the Hypothesis frontend application into the page.

      First, either bookmarklet.js or one of the browser plugins injects a <script> tag to embed.js into the page, then embed.js runs.

      This way the code in embed.js is shared across all bookmarklets and browser plugins, and the bookmarklets and plugins themselves have very little code.

    1. app.appendTo(@frame)

      And we inject our <iframe> into ... the frame? (@frame is a <div> that wraps our <iframe>, it's defined and injected into the page in guest.coffee).

    2. app = $('<iframe></iframe>') .attr('name', 'hyp_sidebar_frame') .attr('seamless', '') .attr('src', src)

      Finally, this is where we create the <iframe> element that is the Hypothesis sidebar!

    1. embed = document.createElement('script'); embed.setAttribute('src', embedUrl); document.body.appendChild(embed);

      Here we construct the actual <script> element, set its src URL, and inject it into the page using the DOM's appendChild() method.

    2. var embedUrl = '{{request.resource_url(context, "embed.js")}}';

      The whole job of the bookmarket is to inject a <script src=".../embed.js"> element into the current page. The src URL of this script element points to embed.js, another Pyramid template rendered by the server-side Hypothesis app.

    3. bookmarklet.js

      bookmarklet.js is the Pyramid template (rendered by our server-side Pyramid app) for the Hypothesis bookmarklet. This little bit of JavaScript (after being rendered by Pyramid) is what the user actually drags to their bookmarks bar as a bookmarklet.

  33. Feb 2014
  34. Jan 2014
    1. The academic publisher Elsevier has contributed to many U.S. Congressional representatives, pushing the Elsevier-supported Research Works Act, which among other things would have forbidden any effort by any federal agency to ensure taxpayer access to work financed by the federal government without permission of the publisher.

      What other legislation has Elsevier pushed?