37 Matching Annotations
  1. Mar 2023
    1. silicea for excessive sweating in palms and feet for people suffering from hypertension. also foul odour n this feet

  2. Dec 2022
    1. delete files adb kill-server unplug usb adb devices: will show no devices, but server starts plug usb On phone, turn off USB debugging and then on, it will then give you the prompt for USB debugging - Yes Now things should work fine.

  3. Nov 2022
  4. Feb 2022
  5. Mar 2021
  6. Jan 2021
  7. Dec 2020
  8. Nov 2020
  9. Oct 2020
  10. Sep 2020
  11. Aug 2020
  12. Jul 2020
  13. Apr 2020
      1. Need for containerization is application running in dev env., should run well in productions as well.

      2. Docker is a very light weight method of virtualization.

      3. Kubernetes is for deploying a dersired configuraiton into the available infrastructure and monitoring to maintain that configuration. Some parts of Kubernetes include API, scheduler.

      https://www.youtube.com/watch?v=PH-2FfFD2PU

  14. Mar 2020
    1. intended and do not create applications that unfairly reduce service quality or limit access for others.

      a

  15. Feb 2019
  16. Dec 2018
    1. Now let’s say another developer wants to make some additions to your code. In this situation, they would get the code, including the Pipfile, and use this command:

      pipenv.lock is like staging the changes, while pipfile is for active development. Unless specified, the latest site packages in development will be installed

    1. In C++11 scope guards can be trivially implemented in terms of std::function, with the cleanup action supplied in each place via a lambda expression.

      checkout folly/ScopeGuard

      syntax: auto cleanUpGuard = folly::makeGuard(&{cleanupDataStoresBeforeExit();});

  17. Nov 2018
    1. aggregate

      An aggregate is an array or class (clause 9) with no user-declared constructors (12.1), no private or protected non-static data members (clause 11), no base classes (clause 10) and no virtual functions

  18. Oct 2018
    1. the concept of magic numbers goes back to unix and pre-dates the use of file extensions. The original idea of the shell was that all 'executable' would look the same - it didn't matter how the file had been created or what program should be used to evaluate it. The shell would look at the contents of the file and determine the appropriate file. Microsoft came along and chose a different approach and the era of file extensions was born. Then to make things 'nicer' for users microsoft chose to 'hide' these extensions and the era of trojan files which look like they are of one type but really have a different extension and are processed by a different file was born.