Next Page: 10000

          

Apprenez à programmer en Python

 Cache   
Apprenez à programmer en Python de V.Le Goff
          

Professions: 25B Information Technology Specialist - West Jordan, Utah

 Cache   
AGE REQUIREMENTS: Must be between the ages of 17 and 35 If you've ever considered a job in IT, become an Information Technology Specialist in the Army National Guard and expand your skills and experience with complex technologies. In this role, you will be responsible for sending, receiving, and processing messages and data on the Guard's sophisticated networks. You will also maintain and troubleshoot the systems that support the military's logistics and classified data, and build firewalls that can withstand any attempted cyberattack. Job Duties Maintenance of networks, hardware, and software Provide customer and network administration services Construct, edit, and test computer programs Some of the Skills You'll Learn Use of computer consoles and peripheral equipment Computer systems concepts Planning, designing, and testing computer systems Helpful Skills Interest in computer science Strong attention to detail Ability to communicate effectively Experience in installation of computers Through your training, you will develop the skills and experience to enjoy a civilian career working as a network support technician, data processing technician, or computer programmer in just about any company that uses computers. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Information Technology Specialist consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 20 weeks of Advanced Individual Training (AIT) with classroom instruction. Benefits/Requirements Benefits Paid training A monthly paycheck Montgomery GI Bill Federal and State tuition assistance Retirement benefits for part-time service Low-cost life insurance (up to $400,000 in coverage) 401(k)-type savings plan Student Loan Repayment Program (up to $50,000, for existing loans) Health care benefits available VA home loans Bonuses, if applicable Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements Military enlistment in the Army National Guard Must be at least a junior in high school, or have a high school diploma or a GED certificate Must be between the ages of 17 and 35 Must be able to pass a physical exam and meet legal and moral standards Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information. ()
          

Make music with the help of an Arduino-powered hole puncher

 Cache   
Maker ‘pashiran’ purchased a music box which could be programmed with punch cards, but soon found that actually creating tunes this way by hand was exhausting. His solution was to automate the process, designing a fixture to punch the cards for him! His new auto-programmer acts as a simple CNC machine, using stepper motors to […]
          

Amazon introduced a new version of unmanned machine DeepRacer

 Cache   
Amazon introduced a new version of unmanned machine DeepRacer

Amazon has unveiled a new version of the unmanned machine DeepRacer, which is positioned as a platform for the study of machine learning algorithms by engineers and programmers. The new model received a stereo camera and lidar. In addition, the company will add obstacles to the races, as well as allow the races of two […]

The post Amazon introduced a new version of unmanned machine DeepRacer appeared first on Revyuh.


          

Trainee IT Support

 Cache   
- - Trainee IT Support - - ·Are you looking for an industry recognised online IT training solution that leads to a permanent IT ... 
Used  >  Jobs  >  Information Technology

          

Tech or IT Project Manager

 Cache   
We`re working with a well established technology company to recruit at Project Support Assistant to join their vibrant team. ... 
Used  >  Jobs  >  Information Technology

          

CNC Miller/Programmer

 Cache   
THE ROLE - Our client based in West Yorkshire is looking for a Skilled CNC Programmer Miller to work in a multi-Skilled ... 
Used  >  Jobs  >  Engineering, Architecture & Interior Design

          

CNC Programmer Turner

 Cache   
THE ROLE - Our client based in West Yorkshire is looking for a Skilled CNC Programmer Turner to work in a multi-Skilled ... 
Used  >  Jobs  >  Engineering, Architecture & Interior Design

          

LabVIEW Programmer - QuarterBranch Technologies, Inc. - Lovettsville, VA

 Cache   
We are seeking an experienced National Instruments LabVIEW programmer to develop and maintain real-time system control and data collection/processing code for…
From Indeed - Thu, 24 Oct 2019 21:06:11 GMT - View all Lovettsville, VA jobs
          

Cortex-M7 Processor Technical Reference Manual

 Cache   
ARM® Cortex®-M7 Processor
Technical Reference Manual Revision r0p2



About this book ........................................................................................................... vi
Feedback ..................................................................................................................... x

Chapter 1 Introduction
1.1 About the Cortex-M7 processor ............................................................................... 1-2
1.2 Component blocks ................................................................................................... 1-6
1.3 Interfaces ............................................................................................................... 1-10
1.4 Supported standards ............................................................................................. 1-12
1.5 Design process ...................................................................................................... 1-13
1.6 Documentation ....................................................................................................... 1-14
1.7 Product revisions ................................................................................................... 1-15

Chapter 2 Programmers Model
2.1 About the programmers model ................................................................................ 2-2
2.2 Modes of operation and execution ........................................................................... 2-3
2.3 Instruction set summary ........................................................................................... 2-4
2.4 System address map ............................................................................................... 2-5
2.5 Exclusive monitor ..................................................................................................... 2-7
2.6 Processor core registers .......................................................................................... 2-8
2.7 Exceptions ............................................................................................................... 2-9

Chapter 3 System Control
3.1 About system control ............................................................................................... 3-2
3.2 Register summary .................................................................................................... 3-3
3.3 Register descriptions ............................................................................................... 3-6

Chapter 4 Initialization
4.1 About Initialization .................................................................................................... 4-2

Chapter 5 Memory System
5.1 About the memory system ....................................................................................... 5-2
5.2 Fault handling .......................................................................................................... 5-3
5.3 Memory types and memory system behavior .......................................................... 5-5
5.4 AXIM interface ......................................................................................................... 5-6
5.5 AHB peripheral interface ........................................................................................ 5-22
5.6 AHB slave interface ............................................................................................... 5-30
5.7 TCM interfaces ...................................................................................................... 5-33
5.8 L1 caches .............................................................................................................. 5-35

Chapter 6 Memory Protection Unit
6.1 About the MPU ........................................................................................................ 6-2
6.2 MPU functional description ...................................................................................... 6-3
6.3 MPU programmers model ........................................................................................ 6-4

Chapter 7 Nested Vectored Interrupt Controller
7.1 About the NVIC ........................................................................................................ 7-2
7.2 NVIC functional description ..................................................................................... 7-3
7.3 NVIC programmers model ....................................................................................... 7-4

Chapter 8 Floating Point Unit
8.1 About the FPU ......................................................................................................... 8-2
8.2 FPU functional description ....................................................................................... 8-3
8.3 FPU programmers model ........................................................................................ 8-5

Chapter 9 Debug
9.1 About debug ............................................................................................................ 9-2
9.2 About the AHBD interface ........................................................................................ 9-7
9.3 About the FPB ......................................................................................................... 9-8

Chapter 10 Cross Trigger Interface
10.1 About the CTI ......................................................................................................... 10-2
10.2 Cortex-M7 CTI functional description .................................................................... 10-3
10.3 CTI programmers model ........................................................................................ 10-5

Chapter 11 Data Watchpoint and Trace Unit
11.1 About the DWT ...................................................................................................... 11-2
11.2 DWT functional description .................................................................................... 11-3
11.3 DWT programmers model ..................................................................................... 11-4

Chapter 12 Instrumentation Trace Macrocell Unit
12.1 About the ITM ........................................................................................................ 12-2
12.2 ITM functional description ...................................................................................... 12-3
12.3 ITM programmers model ....................................................................................... 12-4

Chapter 13 Fault detection and handling
13.1 About fault detection and handling ........................................................................ 13-2
13.2 Cache RAM protection ........................................................................................... 13-3
13.3 Logic protection ..................................................................................................... 13-6

Appendix A Revisions
          

SQL Database Developer - Flexible Working

 Cache   
Founded in 2010 we are a specialist digital business change consultancy and have worked with household named brands through complex digital and business transformations. We have developed a patent-pending analytics platform and revolutionary SaaS products . Database Developer - SQL - Disruptive Data Analytics SaaS - Digital Transformation London SE1 | 50,000 Pension Flexible Working Established Tech Start-Up Vibe The Database Developer Role: We're looking for a highly passionate and experienced Database Developer to join our team to extend our rich analytics products as we push and grow our products in the market.The successful applicant will be joining a small, highly focused development team based in Central London. They will be involved in leading the technical design of our analytics platform and its future road map on current technologies and our future move to graph-based technologies. The applicant will lead the data domain and will be responsible for the way in which our data analytics are developed, deployed and managed. The development work in the immediate term is based on MySQL, but we are looking for individuals that are also open to developing their skills into graph-based technologies in future. This is the most exciting time as we have developed a rich underlying platform which we intend to expand rapidly to accommodate a large number of new customers. The successful Database Developer will be expected to have: A strong understanding of relational database technologies (modelling, development and DevOps) Strong experience with agile, sprint based development Able to grasp complex concepts and to drive the direction of data analytics development. A keen willingness to learn and to develop themselves. Transparent and collaborative working style Be a key player in a small and highly efficient development team. 5 years of SQL development in a structured development environment. Experience of a start up, high growth environment Willingness to learn and adapt. Strong ability to work to deadlines. Nice to have : Understanding of graph concepts and. Good understanding of devops processes and how they apply to the data domain. Good understanding of cloud based technologies (ideally AWS) Candidates will be evaluated on a mixture of: Technical capability and experience (40%) Personal motivation and drive(30%) Personality and cultural fit (30%) Your Background / Previous Roles May Include: MySQL Datbase Developer, Database Engineer, Database Programmer, Database Software Developer, Data Modeling. Data Architecture Interested? Apply here for a fast-track path to the Hiring Manager Application notice... We take your privacy seriously. When you apply, we shall process your details and pass your application to our client for review for this vacancy only. As you might expect we may contact you by email, text or telephone. Your data is processed on the basis of our legitimate interests in fulfilling the recruitment process. Please refer to our Data Privacy Policy & Notice on our website for further details. If you have any pre-application questions please contact us first quoting the job title & ref. Good luck, Team RR.
          

DannyHAX GARAPAL ans SIMPLE Free VIP CFPH Chit UPDATED NOW Dec 2 ,2019

 Cache   

What is DannyHAX CFPH 2019?

DannyHAX is a brand new cheat for Crossfire PH which is released in 2019 by programmer Danny. DannyHAX Garapal works 100%. There are some precaution to use these cheat. Please read the complete article to learn about DannyHAX. The download link is available below.

How to Download and Install the Cheat?

The download process for DannyHAX CFPH cheat is very simple, you just need to download the .exe file from the below download link. When the download process is complete, please follow the instruction below to install the loader.

Note: After clicking on the download link below, you will be redirected to another site [mega.nz] where we host our files. You will have to download the cheatph from that site.

If you face any issues while downloading the loader, simple con
crotact us for more detail.


Please Read This…
You will be experience No Menu from your FIRST TRY, Please try again to make it work perfectly.
And If you got an Send Error Report Problem Make Sure your Screen Resolution “1024×768” to Avoid Any Errors!
[If No Menu, Try to Install “VC++ 2010 Runtime x86” Install the .msi File then Run As Admistrator the Loader again and Activate it]

If Cheat doesn’t work, try to Install these Following Files
VC++ 2010 Runtime x86
VC++ Redis
DirectX 9, 10 and 11


Installation instruction:

Step 1: Download cheat link below

Step 2: Unzip the archive file

Step 2: You will see the loader file in .exe

Step 3: Right Click on .exe file and Run as Administrator.

Step 4: Now you will have to click on Load and Skip 2 Ads

DannyHAX GARAPAL Free VIP CFPH Cheat 2019 1
Step 5: Solve the 2 Captcha from the website and then click on “Click Me [After your 2 SKIP ADS]”

DON’T CLOSE LOADER. OPEN GAME AND PLAY !
Use arrow keys or mouse to enable/disable function . Press Insert for hide/show menu

>> Click Here to Download <<<


          

RE: Rabbit RCM3110 Looking for programmer for long term software support.

 Cache   
We currently have 6 standard models that utilize the Rabbit RCM3110 core module. We are looking for a programmer that can review the code and make changes as needed (bugs and customs)
we will provide working test systems for development
Looking to develop long term support. not a one and done.
Current programmer is retiring.
          

Programmer Needed for Rabbit RCM3110

 Cache   
We are looking for programmer to help us support existing products. We are using a Rabbit RCM3110 core module. We have six standard products that utilize the Rabbit. We are looking to develop long term support for our products. We will provide test systems for debugging software. We need help with minor bugs and customs. Our current developer was awesome but is retiring due to health issues. We are looking for immediate help.
          

Re: Superscript not working in quiz answer

 Cache   
by Jessica Kellerman.  

Thanks for the speedy reply, Tim.
Unfortunately I couldn't get that to work. Anything entered after < is ignored and deleted when I save the question.
Googling to check I was using the Unicode correctly (yep, I'm a teacher, not a programmer), I found an alternative solution.
I used the ² from the copy and paste section on this page and it worked! smile
https://www.sheetaki.com/subscript-and-superscript-numbers-in-google-sheets/


          

Temporary Programmer Analyst - Saskatchewan Workers' Compensation Board - Regina, SK

 Cache   
As the Programmer Analyst, you will analyze, design, program, test, implement and document developments and enhancements to WCB’s information systems to meet… $67,646 - $83,880 a year
From Indeed - Wed, 16 Oct 2019 19:40:06 GMT - View all Regina, SK jobs
          

Full Stack Tools Programmer - Eidos-Montréal - Quebec City, QC

 Cache   
Experience with Web Services, XML, JSON. Expérience avec les services web, XML, JSON; Analyser les exigences des clients; Expérience avec Windows et Linux;
From LocalWorkBC.ca - Tue, 19 Nov 2019 11:41:54 GMT - View all Quebec City, QC jobs
          

Remote Key replacement

 Cache   
Got 1 key programmed for £400 from independent key programmer. Jaguar dealership wanted £1600 + VAT to get 2 keys cut and programmed. They also wanted to change the ECU.
          

Programmer/Analyst - Indiana University - Indianapolis, IN

 Cache   
Provide full-stack web development expertise in building healthcare applications. Work will include novel applications in cooperation with scientists and…
From Indiana University - Fri, 22 Nov 2019 18:57:47 GMT - View all Indianapolis, IN jobs
          

Stor stigning i antallet af graduate-programmer i Danmark: Her er de bedste inden for it

 Cache   
Flere og flere danske virksomheder tilbyder graduate-stillinger til unge talenter, der ønsker at kickstarte deres karriere. Ny guide giver et overblik over graduate-programmer i Danmark lige nu. Her er de virksomheder og it-programmer, der er mest eftertragtede.
          

Programmer/developer position 50% at the University of Basel

 Cache   

Programmer/developer position 50% at the University of Basel

The French Studies Seminar at the University of Basel is looking for a self-sufficient and motivated IT technician (50%) to join the group « Le Rire des vers – Mining the Comic Verse » led by Anne-Sophie Bories and funded for 5 years by a PRIMA grant from the Swiss National Science Foundation (SNF) .

Profile

Essential :

  • Master’s Degree (or equivalent) in IT,

  • Thorough knowledge of XML and related technologies (XSL, XPATH, XQUERY), as well as web development, both backend (e.g. SQL, eXist-db) and frontend (HTML, CSS, javascript),

  • Excellent ability to find practical and creative solutions,

  • Ability to learn new programming languages to fit needs,

  • Genuine curiosity for social sciences, literature or linguistics,

  • highly self-sufficient,

  • team worker with an inclination for initiative.

Desirable:

  • basic knowledge of python and of NLP,

  • interest for machine-learning, machine-reasoning, RDF, web ontologies,

  • ability to share their knowledge.

Language skills:

  • EITHER excellent mastery of English as working language and some knowledge of French,

  • OR excellent mastery of French as working language and some knowledge of English.

Responsibilities

  • assist team members in developing and maintaining tailored processes for efficient text- mining,

  • maintain the team’s databases and guarantee their remote access,

  • interact with other scientific teams in the context of collaborations,

  • guide team members in the acquisition of new IT skills,

  • create and maintain the project’s website.

Conditions

One-year contract, renewable for 4 years,
part-time: 50% (21 hours/week, flexible work hours),
5 weeks of paid holiday per year,
Salary in the region of 42’000 Swiss francs per year.

Project

The research project “Le Rire des vers – Mining the Comic Verse” is supported by the Swiss National Science Foundation through a 5 year PRIMA grant awarded to Anne-Sophie Bories. Beside the latter leader, the team will count 2 doctoral candidates and 1 IT technician (50%), and will form part of the French Studies Seminar at the University of Basel. The group will focus on the mapping, analysis and interpretation of both humour and versification in a corpus of modern texts, combining literary analyses with digital humanities methods.

Application

Complete applications should be sent as one single pdf file to Anne-Sophie Bories (a.bories@unibas.ch) and should include:

  • - cover letter,
  • -  cv,

  • -  copy of Master’s Degree,

  • -  1-2 samples of code, or link to a realisation (mention precisely which part or parts of the code were written by the candidate),

  • -  identity document,

  • -  recommendation letter, or certificate from previous employer.

Applications can be submitted in French or English. Candidates still in the final stages of their studies may apply if they can present their official degree by the end of 2019.

Start of contract: as soon as possible
Contact : Dr. Anne-Sophie Bories (a.bories@unibas.ch).


          

Systems A Programmer39s Perspective Solutions

 Cache   
Systems A Programmer39s Perspective Solutions
          

Application Programmer

 Cache   
NJ-Pennington, Genesis10 is currently seeking an Application Programmer with our client in the financial industry in their Pennington, NJ location. This is a 12 month + contract position. Description: Application developer/designer to maintain and enhance existing SharePoint-based web application Correction and improvement of programming and configuration through correction of defects identified by product owner
          

Working on WEB application

 Cache   
Category: HTML, HTML5, Javascript, React.js
Budget: €18 - €36 EUR

We are developing a web application to manage a car rental company. We need a programmer who knows the following technologies React.js Material-IU GraphQL Next.js FaunaDB Jest Cypress Javascript The work will be checked by our team leader...
          

A Programmer En Java Cyrille

 Cache   
A Programmer En Java Cyrille
          

Professions: 401k and Retirement Analyst - Dallas, Texas

 Cache   
This role may sit in either Denver, CO or Dallas, TX With more than 38,000 employees, Global Medical Response teams deliver compassionate, quality medical care, primarily in the areas of emergency and patient relocation services in the United States, the District of Columbia and around the world. GMR was formed by combining the industry leaders in air, ground, managed medical transportation. Each of our companies have long histories of proudly serving the communities where we live: American Medical Response (AMR), Rural Metro Fire, Air Evac Lifeteam, REACH Air Medical Services, Med-Trans Corporation, AirMed International and Guardian Flight. Our mission is providing care to the world at a moment's notice and is at the heart of everything we do. We're growing and looking for passionate people like you to join our team! You'll work in a collaborative environment that values continuous learning, hard work, and innovation. Interested in joining our mission? This role and what you'll be doing: SUMMARY: Responsible for the day-to-day administration of the company's 401(k), Non-Qualified Deferred Compensation, an union retirement plans. Utilizing advanced technical skills to perform reporting and analysis related to the reconciliation and integrity of the 401k data, testing of processes and systems design, identifying and implementing process improvement, and conducting audits to ensure the retirement plans are consistently administered and in compliance with the Plan documents, union agreements and government regulations. Providing accurate information and communicating effectively, when information is requested internally, by outside legal agency or by court order. Essential Duties and Responsibilities: Audit weekly payroll to ensure appropriate 401(k) deductions are deducted from employee paychecks, including employer match, employee loans and adjustments. Process the 401(k)/Retirement inbound and outbound interfaces; ensuring the data is accurate and working the error/exception reports. Reconcile error/exception reports from the retirement plans record keeper. Audit timely submission of 401(k) employee contributions, employer matching contributions and loan re-payments. Audit the benefit mapping document for the various benefit groups to ensure accurate 401(k) assignments. Create and maintain a separate 401(k) mapping document for various union plans. Identify and correct payroll/human errors that affect the retirement plans. Partner with IT programmers to make any adjustments to the 401(k) reconciliation process, including interfaces and database corrections. Communicate effectively and foster a team environment with the Retirement Plan Administrator. Update the Employee Benefits Director daily/weekly of any pertinent issues regarding 401(k). Attend and be prepared to discuss issues on the weekly conference call with the retirement record keeper. Ensure compliance with all regulatory agencies, company policy and union agreements for all 401(k)/Retirement plans, including hardship withdrawals, QDRO's, death claims, etc. Make timely submission of payroll deductions to the retirement record keeper within the guidelines of the DOL/IRS regulations. Co-ordinate all internal and external audits (e.g. DOL, IRS, 401(k) annual audits). Co-ordinate 5500 annual filing and audit; including preparing all necessary schedules and responding to auditor requests for information. Co-ordinate the mid-year and year end NDT testing. Oversee the Qualified Domestic Relation Orders (QDRO) processing. Communicate with the affected employee, the employee's ex-spouse and all attorneys involved. Communicate with past retirement record keepers, while maintaining a current contact list of those record keepers as well. Research past data records to provide the present record keeper the needed information to process the QDRO correctly. Answer all employee 401(k) questions and draft employee communication material. Create new processes related to the Oracle payroll system. Design test scripts and reports to audit the interfaces between the Oracle payroll system and the record keeper. Create various reports combining data from both the payroll systems and the record keeper system. Research issues using the Oracle payroll systems. Must maintain confidentiality and non-disclosure of employee and company information and data. Adhere to all company policies and procedures. Adherence to and compliance with information systems security is everyone's responsibility. It is the responsibility of every computer user to: know and follow Information Systems security policies and procedures. Attend Information Systems security training, when offered. Report information systems security problems. Non-Essential Duties and Responsibilities: Assist with due diligence on mergers and acquisitions as needed. Support the Benefits Team on an as needed basis. Perform other duties as assigned. Travel may be required infrequently. Minimum Qualifications: Education/Licensing/Certification: High School Diploma or GED. Bachelors degree or equivalent experience required. Experience: Accounting and/or auditing experience in benefits or equivalent experience. Must have a minimum three (3) years experience in Health and Welfare and/or retirement plan administration. Oracle and/or Workday experience Knowledge and Skills: General working knowledge of ERISA, IRS, DOL rules and regulations. Strong skills in Microsoft Word and Excel required. Experience in Microsoft Access preferred. Must be detail oriented and possess effective communication skills. Effective oral, written and interpersonal skills required. Strong customer service and problem resolution skills. Must be able to multi-task, manage multiple priorities/projects and work in a fast paced environment. ()
          

Applications Programmer III | Plant Breeding & Genetics Section | School of Integrative Plant Science, CALS | Cornell University

 Cache   
Ithaca, New York, The College of Agriculture and Life Sciences is a pioneer of purpose-driven science and home to Cornell University's second-largest population of students, faculty, and staff. We work across discipli
          

Bayesian Machine Learning in Python: A/B Testing for $24

 Cache   
Expires November 23, 2022 23:59 PST
Buy now and get 80% off

KEY FEATURES

A/B testing is used everywhere, from marketing, retail, news feeds, online advertising, and much more. If you're a data scientist, and you want to tell the rest of the company, "logo A is better than logo B," you're going to need numbers and stats to prove it. That's where A/B testing comes in. In this course, you'll do traditional A/B testing in order to appreciate its complexity as you elevate towards the Bayesian machine learning way of doing things.

  • Access 40 lectures & 3.5 hours of content 24/7
  • Improve on traditional A/B testing w/ adaptive methods
  • Learn about epsilon-greedy algorithm & improve upon it w/ a similar algorithm called UCB1
  • Understand how to use a fully Bayesian approach to A/B testing

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels, but knowledge of calculus, probability, Python, Numpy, Scipy, and Matplotlib is expected
  • All code for this course is available for download here, in the directory ab_testing

Compatibility

  • Internet required

THE EXPERT

The Lazy Programmer is a data scientist, big data engineer, and full stack software engineer. For his master's thesis he worked on brain-computer interfaces using machine learning. These assist non-verbal and non-mobile persons to communicate with their family and caregivers.

He has worked in online advertising and digital media as both a data scientist and big data engineer, and built various high-throughput web services around said data. He has created new big data pipelines using Hadoop/Pig/MapReduce, and created machine learning models to predict click-through rate, news feed recommender systems using linear regression, Bayesian Bandits, and collaborative filtering and validated the results using A/B testing.

He has taught undergraduate and graduate students in data science, statistics, machine learning, algorithms, calculus, computer graphics, and physics for students attending universities such as Columbia University, NYU, Humber College, and The New School.

Multiple businesses have benefitted from his web programming expertise. He does all the backend (server), frontend (HTML/JS/CSS), and operations/deployment work. Some of the technologies he has used are: Python, Ruby/Rails, PHP, Bootstrap, jQuery (Javascript), Backbone, and Angular. For storage/databases he has used MySQL, Postgres, Redis, MongoDB, and more.

          

Deep Learning: GANs and Variational Autoencoders for $25

 Cache   
Expires November 23, 2022 23:59 PST
Buy now and get 86% off

KEY FEATURES

Variational autoencoders and GANs have been two of the most interesting recent developments in deep learning and machine learning. GAN stands for generative adversarial network, where two neural networks compete with each other. Unsupervised learning means you're not trying to map input data to targets, you're just trying to learn the structure of that input data. In this course, you'll learn the structure of data in order to produce more stuff that resembles the original data.

  • Access 41 lectures & 5.5 hours of content 24/7
  • Incorporate ideas from Bayesian Machine Learning, Reinforcement Learning, & Game Theory
  • Discuss variational autoencoder architecture
  • Discover GAN basics

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels, but knowledge of calculus, probability, object-oriented programming, Python, Numpy, linear regression, gradient descent, and how to build a feedforward and convolutional neural network in Theano and TensorFlow is expected
  • All code for this course is available for download here, in the directory unsupervised_class3

Compatibility

  • Internet required

THE EXPERT

The Lazy Programmer is a data scientist, big data engineer, and full stack software engineer. For his master's thesis he worked on brain-computer interfaces using machine learning. These assist non-verbal and non-mobile persons to communicate with their family and caregivers.

He has worked in online advertising and digital media as both a data scientist and big data engineer, and built various high-throughput web services around said data. He has created new big data pipelines using Hadoop/Pig/MapReduce, and created machine learning models to predict click-through rate, news feed recommender systems using linear regression, Bayesian Bandits, and collaborative filtering and validated the results using A/B testing.

He has taught undergraduate and graduate students in data science, statistics, machine learning, algorithms, calculus, computer graphics, and physics for students attending universities such as Columbia University, NYU, Humber College, and The New School.

Multiple businesses have benefitted from his web programming expertise. He does all the backend (server), frontend (HTML/JS/CSS), and operations/deployment work. Some of the technologies he has used are: Python, Ruby/Rails, PHP, Bootstrap, jQuery (Javascript), Backbone, and Angular. For storage/databases he has used MySQL, Postgres, Redis, MongoDB, and more.

          

Programmer Analyst - University of Wyoming - Laramie, WY

 Cache   
Oracle database environment to include SQL, tables, views, packages, and triggers. 1 year work-related experience in computer programming is preferred or…
From University of Wyoming - Tue, 19 Nov 2019 20:14:45 GMT - View all Laramie, WY jobs
          

Fast Poker - Fast.poker

 Cache   
IPB Image

I'm not admin here!
QUOTE
Many Poker rooms write that their system excludes the use of poker bots. But every good programmer knows that it is possible to make a poker bot and the protection mechanisms will not be effective.
😎 Today in darknet it is easy to buy various ready-made bots from $ 500. On hacker-forums in the TOR network, of course, there are excellent programs for the price of $ 20,000 and above. Making money with a poker bot does not mean being absent from the table. It is necessary fix the errors of the program, buy only high-quality and reliable IP, change the settings bot , corrections and follow updates of the program.
👍 Our poker bot plays in different ways against certain players. Based on my own experience and thousands of poker hands. The program simulates a real person with flexible team play settings. Multifunctionality of settings allow to exclude blocking and detection of software.


IPB Image

Plans: 103-350% after 1-25 days

FAST ONE ❤️️ +3% After 1 days
FAST TWO ♣️ +15% After 3 days
FAST THREE ♠️️ +30% After 5 days
FAST FOUR ♦️ +80% After 10 days
FAST FIVE ⭐️️ +250% After 25 days


Min: $20 / Max: Unlimited

QUOTE
SSL Encryption
DDos Protection
Other Script
Registrar NameCheap, Inc
Created on 2019-10-25
Expires on 2020-10-25
Updated on 2019-11-22
NS N2.COVER-DNS.NET NS1.COVER-DNS.NET
N2.COVER-DNS.NET NS1.COVER-DNS.NET


Accept: PM, Payeer, Bitcoin, Litecoin, Dogecoin, ETH, BCH, DASH,..

Join here: https://fast.poker/

Reduced Size Image

My deposit:
QUOTE
The amount of 35 USD has been withdrawn from your account.
Accounts: U4603107->U22338257.
Memo: Shopping Cart Payment. Invoice 1, hyiptank..
Date: 14:29 01.12.19. Batch: 292045898.

          

Threedeposit - Threedeposit.com

 Cache   
I am not admin


QUOTE
threedeposit.com is forming the highest conceivable gain managing numerous trading mechanisms, is steadfast rational work, profoundly adequate veterans of distinctive outlines: traders, analysts, experts on the global moratorium, managers, developers, programmers etc. well-coordinated performance of the entire team of employees, based on the synergy and responsiveness to the slenderest fluctuations in syndicate situations, is solution to the overall prosperity of our companionship.


Invest plans:
600% After 1 Day, 3000 After 2 Days, 20000 After 5 Days and More

Invest amount:
- Minimal $30
- Maximal $30000

Payment accepted:
- Perfectmoney
- Payeer
- Bitcoin
- Ethereum

Referral commission: 5%, 2%,1%

https://threedeposit.com/

The amount of 0.1 USD has been deposited to your account. Accounts: U19206662->U3789391. Memo: API Payment. Withdraw to HYIPIndo from threedeposit.com.. Date: 22:52 01.12.19. Batch: 292098120.
          

GitHub's Student Dev Pack - I'm Finally Applying

 Cache   

After procrastinating for a week, I’m finally applying for GitHub’s Student Developer Pack. It took almost a week for me to answer a simple question.

How do you plan to use GitHub?

It’s a simple question, and I know how do I plan to use GitHub, but for some reasons, I wasn’t able to craft my words, the way I wanted to. Every day, I opened my text editor, wrote a bunch of sentences, and closed it down.

It wasn’t hard for me to write the answer, but I procrastinated, and now I know how does it feel to do something in a week when in reality, you can complete the same thing in around 30 minutes or so.

It took around 10 minutes to write, and the next 20 minutes were spent thinking if what I’ve written makes sense or not.

Here’s what I wrote and sent -

I’ve been using GitHub for a while now. I still remember when I created my account but had absolutely no idea of anything that was happening. I indeed wiped out my ~/home with git rm because I was having a hard time understanding Git and GitHub.

It took me some time, but I understood what’s the work and purpose of GitHub, and how important it is for people like me. If it wasn’t GitHub, I might not have been aware of Programming and Open Source. I love to code, and I genuinely care about FOSS.

GitHub Student Developer is important to me. I’m focused on developing better things than what I’ve built in the past. As a student, I don’t get much time to do a lot of things, so it’s not entirely possible for me to pay for the features that GitHub is providing to the students.

The initial goal is to make progress towards becoming a better developer while contributing to the Open Source as much as I can. So, here’s how I’m planning to use GitHub’s Student Developer Pack -

1) Use Bootstrap Studio, Canva, Iconscout, Icons8, Weglot to learn and build user interfaces and improve my fronted skills.

2) Use Datadog, AWS, Azure, mnx.io to learn, understand, and experiment with the cloud.

3) Use Flatiron School, Thinkful, Covalence, Go Rails, next.tech, Interview Cake, One Month, Frontend Masters, Educative to improve my skills as a programmer. Most importantly, I want to build sensible projects, write tutorials, and make useful contributions to open source.

I can go on and on, but I think these are some basic ways of how I’m planning to use GitHub.

That’s it. I think it makes sense, I guess. Although I don’t know if other people provide such a brief answer while applying, for me, it was different, so I wrote what was going on top of my mind.


21st Nov. 2:54 AM. I just submitted the docs



UPDATE

Thu, Nov 21, 2019 at 3:15 AM



I just got the email from GitHub, and I’m very happy. I don’t have much to say. I’ll just check everything, and then I’ll probably get some sleep.

Happy Moment!

          

This week in KDE: GTK CSD support and more!

 Cache   

I’ve got big news today. Something major landed: full support for the GTK_FRAME_EXTENTS_ protocol, which hugely improves the user experience for running GTK apps that use client-side decoration headerbars! This includes GNOME apps and an increasing number of 3rd-party GTK apps too. In particular, these apps now display window shadows and have proper resize areas without needing to use a thick border. Here’s how Gedit now looks:

It’s almost native-looking! And it fits right in with the rest of your apps.

I’d like to extend a big thanks for Vlad Zahorodnii who has been working hard on this for months! The feature lands in the upcoming Plasma 5.18 LTS.

But wait, there’s more…

More New Features

Bugfixes & Performance Improvements

User Interface Improvements

How You Can Help

Do you love KDE’s apps? Would you like to help develop for them? I knew you would. 🙂 It’s really fun, and you can have a major impact. Many of KDE’s apps are quite beginner-friendly; among them are Dolphin, Elisa, and Spectacle. See the full list here! These apps’ maintainers as well as KDE’s experienced developers are happy to help and mentor newcomers who want to contribute. For more information on how to get help and who to ask, see https://community.kde.org/Get_Involved#Start_Here.21

More generally, have a look at https://community.kde.org/Get_Involved and find out more ways to help be part of a project that really matters. Each contributor makes a huge difference in KDE; you are not a number or a cog in a machine! You don’t have to already be a programmer, either. I wasn’t when I got started. Try it, you’ll like it! We don’t bite!

Finally, consider making a tax-deductible donation to the KDE e.V. foundation.


          

Public statement by Rachana Institute of Typography on the copyright/credit issue of SMC and RIT fonts

 Cache   

About us

We — KH Hussain, CV Radhakrishnan, PK Ashok Kumar and KV Rajeesh — are the copyright holders of TN Joy font. Many of us have worked on free/libre/open source software for years in our spare time and contributed code, design, fonts, documentation, localization and financial support to various free software projects. Our contributions can be found easily on the Web and elsewhere.

A copyright/‘credit’ issue

Immediately after the font ‘TN Joy’ was released to public by Rachana Institute of Typography (RIT), on 2-Oct-2019, Santhosh Thottingal raised a question in a forum with enough number of participants to qualify as a public discussion:

@rajeeshknambiar there are lot (sic) of contributions from me, Kavya in the build scripts, tests, and feature files in https://gitlab.com/rit-fonts/tnjoy/ Consider giving credit.

On 14-Oct-2019, Santhosh followed up again.

@rajeeshknambiar did not reply to my request for giving credits in their font.

and

Ask hussain sir to give credits for font testing and building framework. Crediting anivar alone is not enough.”

To which Rajeesh responded on 19-Oct-2019, to discuss with all the copyright holders of TN Joy about the issue:

“Noted. I will try to take it up for discussion and let you know.

On 29-Oct-2019, Santhosh again followed up:

അങ്ങനെ എഴുതുകയും ചെയ്യുകയും ചെയ്ത ഫോണ്ടിന്റെ കാര്യങ്ങൾക്ക് ക്രെഡിറ്റ് കിട്ടിയില്ലെന്നാണ് പറയുന്നത് അനിവർ:) sundar, and janayugam fonts. ഇതിൽ രാജാജിയുടെ ഹെൽപ്പൊന്നും വേണ്ട. even @rajeeshknambiar can just fix it

Analysis

During the first week of Nov-2019 for the summit organized by Kerala Media Academy, all the copyright holders of TN Joy font met and discussed the issue raised by Santhosh.

As free software developers and users, it was not our intention to violate copyright or appropriate credit of another free software developer’s work at all. Not only in intention, but we strived to achieve that in all our projects by acts. So, this accusation came as a surprise to us and we decided to take a deeper look at how this issue originated and what the root cause is, to address it properly.

We did a detailed analysis and documented the following details.

Technical background

  1. A Malayalam Unicode font has two essential parts — the Glyphs (അക്ഷരരൂപങ്ങൾ) and the OpenType shaping lookup rules. Unlike Latin fonts, both of these are necessary for proper shaping. The final TTF/OTF/WOFF2  contains both Glyphs and OpenType shaping rules to make a Malayalam Unicode font usable software. Without either, such a software is not usable.
Figure 1: Malayalam text without shaping (left) and with correct shaping (right).
  1. The Malayalam opentype features (GSUB and GPOS ‘lookup rules’) used in font ‘TN Joy’ developed by Rachana Institute of Typography (RIT) are adapted from that of font ‘Sundar’ which in turn are adapted from feature file of ‘Rachana’.
  2. To develop the feature file of Rachana over the years, many have contributed including the original author Hussain KH , Suresh P, Santhosh Thottingal, Rajeesh KV, Kavya Manohar et al. [1].
  3. Hussain KH invented and implemented the glyph naming conventions (‘k1’ for ‘ ക’, ‘xx’ for ‘ ്’ etc. instead of names like ‘uni0D15’ etc.), which made font featuring highly comprehensible for programming and much easier to maintain. This naming scheme is followed by all fonts maintained by Swathanthra Malayalam Computing (SMC) and RIT. This was also the naming scheme in fonts developed by ATPS and when it was pointed out that those fonts were derived from SMC’s, the immediate change made was renaming the glyphs and lookup rules [2, 3, 4].
  4. Rajeesh is the original author of lookup rules of SMC’s fonts for revised ‘mlm2’ OpenType specification for Malayalam, and made it possible to support both ‘mlym’ and ‘mlm2’ specification in a single font. This resulted in making a single font work well with Windows XP, Pango/Qt4 era applications and Uniscribe, HarfBuzz era applications [5].
  5. In 2015, Santhosh split the comprehensive lookup rules from the Fontforge SFD file of Rachana into a separate feature file, but the copyright statements were not preserved [4]. It is our opinion that removing copyright statements is violation of copyright act (hence a crime) and immoral in the free software world. This is also the root cause for missing copyright in the OpenType lookup rules and build script, of the fonts in question.
  6. The same lookup rules in 2, 4 and 5 are used and adapted by subsequent fonts developed by SMC and RIT, such as Chilanka, Manjari, Sundar, Gayathri, TN Joy etc. Rajeesh did not claim for credit or copyright when Manjari or Gayathri was released.

RIT’s statement

With this background,

  1. Fonts developed, maintained and distributed by both SMC  and RIT, specifically its OpenType lookup rules + fontforge based build tool + test cases are at the heart of this issue. This is caused by the change introduced by Santhosh in [6].
  2. The copyright holders of TN Joy font were made aware of such ‘credit’ issue — the definition of which Santhosh has not clarified and in RIT’s understanding is sufficient and limited to ‘copyright’. Thanks for bringing light into such a potential legal and moral risk that affects the users and organizations using these fonts.
  3. RIT  would like to acknowledge the copyright of Santhosh Thottingal and Kavya Manohar for the development of ‘Sundar’ and ‘TN Joy’ in the areas of lookup rules, the ‘build script’ and comprehensive ‘test file’. RIT  is willing to add the missing copyright notice to these files;

and RIT asked Santhosh to consider:

  1. Preserve the copyright of the original authors of the ‘lookup rules’ and Naming convention (notation for Glyphs) in all these fonts. The copyright and license statement should read:

“Copyright: Digitized data copyright (c) 2004–2005 Rachana Akshara Vedi (Chitrajakumar R, Hussain KH, Gangadharan N, Vijayakumaran Nair, Subash Kuraiakose), (c) 2006–2016 Hussain KH, Suresh P, Santhosh Thottingal, Rajeesh K Nambiar, Swathanthra Malayalam Computing (http://smc.org.in). This file is licensed under OFL  1.1.”

  1. The Fontforge based ‘build script’ added by Santhosh used to generate TTF/OTF/WOFF/WOFF2 files is adapted from that of Amiri font by Khaled Hosny [7] without preserving copyright or attribution. RIT requests to credit the original author[s] of this tool. It is of our opinion that removing copyright statements from a free software program code is illegal and immoral. It is also hypocritical when a person who asserts one’s own credit does this crime to other well-known and respected free software developer[s].
  2. Test cases in the ‘test file’ are contributed by various contributors, RIT  request to add the attribution of such contributors to the extent possible (Kavya Manohar, Santhosh Thottingal, Rajeesh KV). Santhosh has responded to this request as “test cases were mainly prepared by Kavya and no need to have attribution”, but RIT  firmly believes the copyright statements of the contributors must be added.
  3. The original author of ‘mlym.sty’ file [8] to typeset Unicode Malayalam using XeTeX is Suresh P, which was enhanced by Rajeesh KV with inputs from Hussain KH. Due to frequent requests on how to typeset Malayalam using Unicode, in 2013 Rajeesh wrote a wiki page [9] with basic details, which was later extended by other developers with instructions to install and setup XeTeX packages. This wiki article was later extended by Santhosh by adding matter from Wikipedia. This article was then copied and published in Santhosh’s blog [10] without attributing the authors, and [10] is frequently provided by Santhosh as the first response to general public asking for documentation on how to typeset Malayalam using XeTeX. It is shockingly hypocritical that plagiarism is practised by a well known free software developer who asserts one’s own credit without any respect to others copyright or credit. RIT  would like Santhosh to either: (a) redact [10] and redirect to [9] instead, or (b) credit the original authors in [10].

RIT  stopped the analysis and investigation of Santhosh’s claim at this point, as we have identified the root cause of missing copyrights and these are the important topics directly affecting RIT  developers.

Conclusion

RIT  tried to resolve the issue in private discussion with Santhosh Thottingal but unfortunately it did not succeed. Santhosh has not agreed to reinstate the copyright statement of original authors. Santhosh did not respond to many of the pointed questions we raised and deflected on answering others. Santhosh also refused to clarify what he means by ‘credit’ despite repeated pointed questions. Santhosh withdrew his claim for credit in one of the emails; and it is possible that he could change the mind any time and the issue could resurface. This surrounds the fonts by SMC  and RIT  in Fear, Uncertainty and Doubt (which the corporate proprietary companies successfully used against free software for years) and put all the individual users and organizations and developers using these fonts under legal risk and moral ambiguity.

Thus,

  1. RIT  has added proper copyright statements to all the software used in building its fonts, viz. ‘Sundar’ and ‘ TN Joy’ [11,12].
  2. RIT  believes that our primary responsibility is towards the individual and institutional users of our fonts and developers depending on our tools; and they should be able to use our fonts and tools without any legal risk or moral ambiguity. RIT, to the best of its knowledge, has fulfilled that responsibility and strive to do so.
  3. RIT also understands that as with any issue in the free software world, the community would be divided, and it is a painful thing. RIT request the community to carefully consider all the facts before making a choice.

This will be the final public statement of RIT on the copyright issue raised by Santhosh Thottingal.

Signed

  • KH Hussain
  • CV Radhakrishnan
  • PK Ashok Kumar
  • KV Rajeesh

References

  1. Rachana font commit history, URL https://gitlab.com/smc/…
  2. Kathir font licensing issue (1), 2014, URL http://lists.smc.org.in/…
  3. Kathir font licensing issue (2), 2014, URL http://lists.smc.org.in/…
  4. ATPS  fonts licensing issue, 2015, URL https://groups.google.com/…
  5. Introducing and integrating ‘mlm2’ OpenType shaping rules, 2013, URL https://gitlab.com/smc/…
  6. Split Glyphs and OpenType shaping rules, 2015, URL https://gitlab.com/smc/…
  7. Amiri font build tool, URL https://github.com/alif-type/…
  8. XeTEX Malayalam style file for ‘Logbook of an Observer’, 2012, URL https://github.com/smc/…
  9. Typesetting Malayalam using XeTEX, SMC  Wiki page history, 2013, URL https://wiki.smc.org.in/…
  10. 2014, https://thottingal.in/blog/…
  11. Sundar font, reinstate copyright and license statements, 2019, URL https://gitlab.com/rit-fonts/…
  12. TN Joy font, reinstate copyright and license statements, 2019, URL https://gitlab.com/rit-fonts/…

Profile of the signatories

  • KH Hussain
    Library and information scientist by training and profession, font designer and developer of several fonts including, Rachana, Meera, Meera Inimai, TN Joy, RSugathan, Janayugom, Keraleeyam, Uroob, etc., free software activist, released all fonts under Open Font License. Played an important role in the migration of Janayugom dail to free software based production technologies.
  • CV Radhakrishnan
    Free software activist and TeX programmer, one of the founders of the Free Software Foundation of India and Indian TeX Users Group. Organized two annual meetings of the TeX Users Group in Trivandrum in 2002 and 2011. Wrote several packages (libraries) in LaTeX and released under free license (LPPL) at Comprehensive TeX Archive Network (CTAN).
  • PK Ashok Kumar
    Typesetter by profession and training, has four decades of extensive experience in typesetting right from the age of metal typefaces through digitized typesetting including TeX and LaTeX. Free content activist and principal tester for fonts developed by RIT, played a major role in the migration of production of Janayugom daily using free software.
  • KV Rajeesh
    Free software developer and user. Fedora project developer since 2008 and KDE  developer since 2011. Font maintainer and language computing contributor to Swathanthra Malayalam Computing since 2008. Member of Indic testing team for HarfBuzz. Google Summer of Code mentor. Contributes to various free software projects including Qt, GNOME, VLC, Odoo, Fontforge, SILE, ConTeXt, Okular, etc.

          

The Early History of Usenet, Part VI: The Public Announcement

 Cache   

Our goal was to announce Usenet at the January, 1980 Usenix meeting. In those days, Usenix met at universities; it was a small, comaparatively informal organization, and didn't require hotel meeting rooms and the like. (I don't know just when Usenix started being a formal academic-style conference; I do know that it was no later than 1984, since I was on the program committee that year for what would later be called the Annual Technical Conference.) This meeting was in Boulder; I wasn't there, but Tom Truscott and Jim Ellis were.

Apart from the announcement itself, we of course needed non-experimental code — and my prototype was not going to cut it. Although I no longer remember precisely what deficiencies were in my C version, one likely issue was the ability to configure which neighboring sites would receive which newsgroups. Stephen Daniel, also at Duke CS, wrote the code that became known as "A-news". One important change was the ability to have multiple hierarchies, rather than just the original "NET" or "NET.*". (Aside: I said in a previous note that my C version had switched to "NET.*" for distributed groups, rather than the single NET. I'm now no longer sure of when that was introduced, in my C version or in Steve Daniel's version. He certainly supported other hierarchies; I certainly did not.) It was also possible in the production version to configure which groups or hierarchies a site would receive. For sanity's sake, this configuration would have to be in a file, rather than in an array built into the code.

That latter point was not always obvious. Uucp, as distributed, used an array to list the commands remote sites were permitted to execute:

char *Cmds[] = {
   "mail",
   "rmail",
   "lpr",
   "opr",
   "fsend",
   "fget",
   NULL
   };

/* to remove restrictions from uuxqt
 * redefine CMDOK 0
 *
 * to add allowable commands, add to the list under Cmds[]
 */

To permit rnews to execute, a system administrator would have to change the source code (and most people had source code to Unix in those days) and recompile. This was, in hindsight, an obviously incorrect decision, but it arguably was justifiable in those days: what else should you be allowed to do? There were many, many fewer commands. (I should note: I no longer remember for certain what fsend, fget, or opr were. I think they were for sending and receiving files, and for printing to a Honeywell machine at the Bell Labs Murray Hill comp center. Think of the ancient GCOS field in /etc/passwd file.)

To work around this problem, we supplied a mail-to-rnews program: a sending site could email articles, rather than try to execute rnews directly. A clock-driven daemon would retrieve the email messages and pass them to rnews. And it had to be clock-driven: in those days, there was no way to have email delivered directly to a program or file. (A security feature? No, simply the simplicity that was then the guiding spirit of Unix. But yes, it certainly helped security.) The remote site configuration file in the A-news therefore needed to know a command to execute, too.

The formal announcement can be seen here. The HTML is easier on the eyes, but there are a few typos and even some missing text, so you may want to look at the scanned version linked to at the bottom. A few things stand out. First, as I noted in Part III, there was a provision for Duke to recover phone charges from sites it polled. There was clearly faculty support at Duke for the project. For that matter, faculty at UNC knew what I was doing.

A more interesting point is what we thought the wide-area use would be: "The first articles will probably concern bug fixes, trouble reports, and general cries for help." Given how focused on the system aspects we were, what we really meant was something like the eventual newsgroup comp.sys.unix-wizards. There was, then, a very strong culture of mutual assistance among programmers, not just in organizations like Usenix (which was originally, as I noted, the Unix Users' Group), but also in the IBM mainframe world. The Wikipedia article on SHARE explains this well:

A major resource of SHARE from the beginning was the SHARE library. Originally, IBM distributed what software it provided in source form and systems programmers commonly made small local additions or modifications and exchanged them with other users. The SHARE library and the process of distributed development it fostered was one of the major origins of open source software.

Another proposed use was locating interesting source code, but not flooding it to the network. Why not? Because software might be bulky, and phone calls then were expensive. The announcement estimates that nighttime phone rates were about US$.50 for three minutes; that sounds about right, though even within the US rates varied with distance. In that time, at 300 bps — 30 bytes per second — you could send at most 5400 bytes; given protocol overhead, we conservatively estimated 3000 bytes, or a kilobyte per minute. To pick an arbitrary point of comparison, the source to uucp is about 120KB; at 1KB/sec, that's two hours, or US$20. Adjusting for inflation, that's over US$60 in today's money — and most people don't want most packages. And there was another issue: Duke only had two autodialers; there simply wasn't the bandwidth to send big files to many places, and trying to do so would block all news transfers to other sites. Instead, the proposal was for someone — Duke? — to be a central respository; software could then be retrieved on demand. This was a model later adopted by UUNET; more on it in the next installment of this series.

The most interesting thing, though, is what the announcement didn't talk about: any non-technical use. We completely missed social discussions, hobby discussions, politial discussions, or anything else like that. To the extent we considered it at all, it was for local use — after all, who would want to discuss such things with someone they'd never met?

Written by Steven Bellovin, Professor of Computer Science at Columbia University


          

A day in the life of a 23-year-old Tokyo game programmer

 Cache   

Masa is a 23-year-old game programmer at Bandai Namco Studios in Tokyo. In this 13-minute-video made by Paolo From Tokyo, we see what Masa's life is like, from the moment his alarm goes off in the morning until he is back at home making a Gundam model before he goes to sleep.

From the YouTube description:

We'll even interact with directors from popular Japanese video game titles such as Tekken and CodeVein. Plus we'll get to see what a Japanese programmer from one of the large Video Game companies in Japan does after work with friends. This look inside a Japanese game dev's life is pretty unique and should provide some insight for those people who want to work in Japan as a game developer or game programmer. Also, this day in the life of a Japanese programmer will show you what it takes to be a Japanese programmer. As you would expect, most of the work day is spent programming and coding, but there are other unique aspects of the Japanese programmers life we are able to see in this video.

Image: YouTube Read the rest


          

A day in the life of a 23-year-old Tokyo game programmer

 Cache   

Masa is a 23-year-old game programmer at Bandai Namco Studios in Tokyo. In this 13-minute-video made by Paolo From Tokyo, we see what Masa's life is like, from the moment his alarm goes off in the morning until he is back at home making a Gundam model before he goes to sleep.

From the YouTube description:

We'll even interact with directors from popular Japanese video game titles such as Tekken and CodeVein. Plus we'll get to see what a Japanese programmer from one of the large Video Game companies in Japan does after work with friends. This look inside a Japanese game dev's life is pretty unique and should provide some insight for those people who want to work in Japan as a game developer or game programmer. Also, this day in the life of a Japanese programmer will show you what it takes to be a Japanese programmer. As you would expect, most of the work day is spent programming and coding, but there are other unique aspects of the Japanese programmers life we are able to see in this video.

Image: YouTube Read the rest


          

Famous video game composers

 Cache   
Video games are art. They are manifold and can be way more complex than, for example, films, to which separate representatives of the modern gaming industry are compared more and more frequently. Hundreds and sometimes even thousands of people are involved in a creative process in both of them: artists and programmers, directors and game …
          

Installing Programmers for use with Microcode Studio

 Cache   
Microcode Studio accommodates the use of alternate programming hardware devices, such as the PICKit3 & 4 and Microchip development board on-board...
          

120 Programmer & DEO Jobs In HARTRON 2019, Apply Online @ haryanait.gov.in | हरियाणा राज्य इलेक्ट्रॉनिक्स विकास निगम डाटा एंट्री ऑपरेटर, प्रोग्रामर नौकरी

 Cache   
HARTRON Programmer & DEO Jobs 2019 Recruitment Open For 120 Posts | Fees - 354 | Last Date - 5 Dec 2019:- Hello friends, let's talk directly about recruitment. HARTRON department has recently...

For New Recruitment Visit - www.gktricks.in

          

Training Neural Networks

 Cache   
Neural Networks offer great promise with their ability to "create" algorithms to solve problems - without the programmer knowing how to solve the problem in the first place. Example based problem solving if you will. I would expect that if you knew precisely how to solve a particular problem to the same degree, you could certainly do it perhaps many orders of magnitude faster and possibly higher quality by coding the solution directly -- however its not always easy or practical to know such a so [...]
          

SQL Programmer/ Data Engineer | Palo Alto Veterans Institute for Research (PAVIR)

 Cache   
Menlo Park, California, Knowledge / Skills / Abilities: Comfortable dealing with large data sets; SQL expertise; Commitment to use of Markdown and open science principles and platforms; Ability to work well both in
          

Professions: 25B Information Technology Specialist - Scranton, Pennsylvania

 Cache   
AGE REQUIREMENTS: Must be between the ages of 17 and 35 If you've ever considered a job in IT, become an Information Technology Specialist in the Army National Guard and expand your skills and experience with complex technologies. In this role, you will be responsible for sending, receiving, and processing messages and data on the Guard's sophisticated networks. You will also maintain and troubleshoot the systems that support the military's logistics and classified data, and build firewalls that can withstand any attempted cyberattack. Job Duties Maintenance of networks, hardware, and software Provide customer and network administration services Construct, edit, and test computer programs Some of the Skills You'll Learn Use of computer consoles and peripheral equipment Computer systems concepts Planning, designing, and testing computer systems Helpful Skills Interest in computer science Strong attention to detail Ability to communicate effectively Experience in installation of computers Through your training, you will develop the skills and experience to enjoy a civilian career working as a network support technician, data processing technician, or computer programmer in just about any company that uses computers. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Information Technology Specialist consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 20 weeks of Advanced Individual Training (AIT) with classroom instruction. Benefits/Requirements Benefits Paid training A monthly paycheck Montgomery GI Bill Federal and State tuition assistance Retirement benefits for part-time service Low-cost life insurance (up to $400,000 in coverage) 401(k)-type savings plan Student Loan Repayment Program (up to $50,000, for existing loans) Health care benefits available VA home loans Bonuses, if applicable Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements Military enlistment in the Army National Guard Must be at least a junior in high school, or have a high school diploma or a GED certificate Must be between the ages of 17 and 35 Must be able to pass a physical exam and meet legal and moral standards Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information. ()
          

Programmers: At What Age Did You Start Programming?

 Cache   
A lot of people think they are too old to start programming while others think they are too small when asked to learn to codeThe Question is, AT WHAT AGE DID YOU STARTED PROGRAMMING? you could mention your first tech, how it went then and your experience
          

Luisteraars Radio Mart verdeeld over veroordeling Bouterse

 Cache   
Binnen de Surinaamse gemeenschap in Nederland is het vonnis tegen Desi Bouterses het gesprek van de dag. Een populaire omroep in Amsterdam paste er vanmiddag de programmering voor aan.
          

CNC Machinist / 2nd Shift

 Cache   
CO-Arvada, PrideStaff is looking for a 4-axis and 5-axis CNC Machinist for a growing company located in Arvada, CO. This is a temp to hire opportunity based on client need and employee performance. In this role, as an experienced CNC Machinist and Programmer, you will get a chance to apply your skills, experience and intelligence to complex manufacturing problems on a daily basis. Responsibilities: Set up, a
          

Survey Results — The State of the NetSquared Community in 2019

 Cache   

Who are NetSquared's members? Why do they attend? What are their technology struggles? NetSquared's annual survey of all meetup members answers these questions and more. Plus, the results help our local organizers and partners build stronger groups with better events.

We received over 250 responses to the survey, drawing from our global meetup membership.

Executive Summary

  • Most NetSquared participants come from small "startup" nonprofits with no budget and no staff. They come to us looking for practical tips and a supportive community.
  • Participants find NetSquared valuable because it helps them network with other nonprofits, learn digital skills, and find project collaborators.
  • Event attendees are unfamiliar with TechSoup's services, but less so than they used to be. ;-)

NPS Score: Would You Recommend NetSquared to a Friend?

How likely are you to recommend this meetup to a friend or colleague?

We added a Net Promoter Score (NPS) scale this year, asking "how likely are you to recommend this meetup to a friend or colleague?"

A score of "4.7" doesn't mean much without context — the interesting results will come when we run the survey again and see if the score changes. But NPS benchmarks suggest that this is a low, but still positive score.

Organization Type: What Best Describes Your Organization?

What Best Describes Your Organization?

We asked people to share what kind of organization they represented. The top results were "nonprofit, NGO, or religious organization" (52%); "consultancy" (14%), and the random assortment that is "other" (11%).

Comments

Nonprofits are our core audience, so it's awesome to see that over half of attendees are people working in the sector. But NetSquared groups seek to create connections between NGOs and their allies, so it's good to see strong representation from key sector players like nonprofit tech consultants and business.

What Is Your Organization's Approximate Annual Budget? (US$)

What Is Your Organization's Approximate Annual Budget? (US$)

68% of respondents have a budget under US$1,000,000 and of that 42% are working with less than $100,000 per year.

Comments

The majority of NetSquared participants are small, scrappy, "startup" nonprofits just starting to grow. We are serving the section of civil society that doesn't yet have the ability to bring in paid consultants or dedicated technology staff.

When we compare the results of this survey over previous years, the average budget size for the organizations we serve is decreasing over time as NetSquared expands into more developing countries. This is an important reminder of the limited resources of the sector, especially outside the United States.

How Many Paid Full-Time Employees Work For Your Organization?

How Many Paid Full-Time Employees Work For Your Organization?

59% of respondents have less than ten staff. 31% are entirely community-driven and have zero paid employees.

Comments

NetSquared is serving the "accidental" techie, not the dedicated IT professional or programmer. Attendees are serving multiple roles in their organization.

Who Is Primarily Responsible for Technology Decisions at Your Organization?

Who Is Primarily Responsible for Technology Decisions at Your Organization?

49% have someone helping with a formal IT background. 61% of respondents report that they are the primary technology decision-maker at their organization.

Comments

Almost half of respondents have access to experienced IT help, whether from staff, a volunteer, or consultant. The rest are making do with "accidental techies". Very few organizations are leveraging consultants or external IT staff, probably because they are too small to afford external assistance.

What Is Your Role At Your Organization?

What is Your Role at your organization?

We asked respondents to select up to three roles they play in their organization. The top responses were:

  • Executive, Management, Director (41% — ⬆️ 12% compared to previous survey)
  • IT and Technology (32% — ⬆️ 2% compared to previous survey)
  • Marketing or Communications (21% — ⬇️️ 10% compared to previous survey)
  • Board Member (20% — ⬆️ 6% compared to previous survey)

Comments

There’s been a big jump in the percentage of nonprofit leaders attending NetSquared events. Executive Directors are no longer ignoring the significant positive impact that technology investments can make for their organizations.

TECHSOUP

The next series of questions focus on the respondent's knowledge of NetSquared's parent charity, TechSoup.

Which Techsoup Resources Do You Use?

Which TechSoup Resources do you use?

Besides the NetSquared meetups the most popular TechSoup resources are the blog (35%), product pages (33%), and webinars (31%).

Comments

Annotated version of Which Techsoup Resources Do You Use

Two and a half years ago I surveyed the NetSquared members and discovered that they weren't aware of the resources available from TechSoup. So we set to work to change that with communications to organizers and direct messaging to attendees via Meetup (which has only been possible with the rollout of Meetup Pro since the last survey). 🎉🎉AND WE’VE MADE BIG PROGRESS!🎉🎉

Is Your Nonprofit, Charity, Foundation, or Library Registered with TechSoup?

Is your organizaton registered with TechSoup?

54% of nonprofit respondents report that they have a TechSoup account (and you all should! It's free and it'll save you money!)

Comments

The percentage of TechSoup account-holders is up, but the "I don't know" option remains high at 17% (vs. 19% last time). I suspect that many of the "I don't know" nonprofits do have an account, but don't know about it because it's administered by their IT manager.

NETSQUARED MEETUPS

The next set of questions are focused on the respondent's participation in their local meetup groups.

How Did You Discover NetSquared?

How did you discover NetSquared?

Meetup is the most important tool for NetSquared discovery, with almost 50% of respondents citing it as their entry point to the community. Referrals from a friend are also important, with 25% reporting that it's a personal contact that brought them to NetSquared.

Comments

Increase in TechSoup discovery

The biggest change since the last survey is the HUGE increase in the percentage of NetSquared attendees finding the meetups via TechSoup channels. This is thanks to the increase in email marketing support from TechSoup USA.

What Are the Top Two Reasons You Participate in This Meetup?

What are the top two reasons you attend NetSquared meetups?

We asked people to select two choices from a list. The top options were:

  • Network with nonprofit staff (62%)
  • Learn digital skills (58%)
  • Find project collaborators (29%)

Comments

Once again networking & community is the top choice. People attend NetSquared events for the people.

NetSquared is very successful at being a place to find a community of practice and develop digital skills. However, we don't offer any explicit support for people to find project collaborators or volunteering their skills. This is all happening organically through the networking, but with supporting programs we could help more attendees contribute. 🙏🏾

Have You Shared Information You've Learned at a Meetup?

Have you shared information you've learend at a meetup?

Comments

NetSquared attendees are promiscuous! 76% have shared knowledge they’ve gained at an event. And 18% report that it drove them to try a new product or change the way they work.

Has the Meetup Been Useful in Increasing Your Adoption of Technology?

 NetSquared has increased the adoption of new technology for 59% of attendees

59% of respondents report that attending NetSquared events is useful in helping them increase their adoption of new technology.

How Does NetSquared Help Your Nonprofit?

NetSquared helps nonprofits make better IT decisions

The top three responses answers to this impact question were:

  • Makes connections that help me do my job better (63%)
  • Make better IT or digital marketing decisions (60%)
  • Reach more people (60%)

Comments

Measuring the impact of a distributed network like NetSquared can be difficult, but these questions start to help us determine the difference we make for our nonprofit members. The top answers reflects the value attendees find in networking, and the ability to make better tech decisions and reach more people speaks to the skill development we offer attendees.

 

NetSquared Impact Testimonials

Finally, the last section of the survey analysis features quotes from some of the text replies to the questions "How has attending NetSquared meetups helped your organization?" We have edited some entries for brevity or clarity.

 

Testimonial from Tech for Good Brighton Meetup

NetSquared testimonial —new software and experts NetSquared very valuable to me

NetSquared testimonial — NetSquared helped me prepare a presentation for the board to persuade them to take digital transformation seriously

 

“NetSquared has introduced me to new technology, newer ways to connect with people and to find collaborators. Thanks ”

“I learned about upgrading a website and when I got back home asked my website guy to implement some of them with success.”

“I always learn something at these MeetUps! The organizers are very welcoming and encouraging. Wonderful group of people.”

“Working at a non-profit, you are strapped for time and resources so it is incredibly helpful to get help when it comes to technology. ”

“In one nonprofit, NetSquared experience helped me develop a Collection Management System with offsite backup. In another nonprofit, NetSquared enabled me to know to create a Communications Officer which is now one of the primary officers.” — Leo Kellogg, Torch Foundation

“As a consultant serving the nonprofit sector, I love seeing what technologies people are most interested in, and learning more about their needs. It really helps me do a better job serving clients, whenever I understand their perspectives and priorities better.”

“I not only learn about programs and techniques that I put to valuable use but I also meet experts who I can consult with. The meetings are very valuable to me.” — Frank Brill, EnviroPolitics

“We found the help and cost savings have been really helpful, and we will no doubt take up the discounts on any commercial software that we need to us in the future. ”

“I have enjoyed attending sessions with NetSquared and learned a lot of new things. It has allowed me to network and bounce my ideas with like minded groups.”

 

Changes to the Next Survey

No survey is perfect, especially this one! Here's some tweaks we will consider for the next survey:

  • Add question "Have you ever attended a NetSquared event?" (allows us to filter results to see active vs inactive members)

  • Revise question "What TechSoup Resources Do You Use?"

    • Change "information pages about specific products" to "product pages"
    • Add option "TechSoup discount and donation programs"

          

Programmer

 Cache   
Programmer
          

From cakes to computers

 Cache   
In the early 1950s, the leading British catering firm, J Lyons & Co, pioneered the world's first automated office system. It was baptised LEO - the Lyons Electronic Office - and was used in stock-taking, food ordering and payrolls for the company. Soon it was being hired out to UK government ministries and other British businesses. Mary Coombs worked on the first LEO and was the first woman to become a commercial computer programmer. She tells Mike Lanchin about her memories of those heady days when computers were still in their infancy. Photo: LEO 2 in operation, 1957 (Thanks to The LEO Computers Society for use of archive)
          

Linux for Beginners: The Science of Linux Operating System and Programming Tools for Installation, Configuration and Command Line

 Cache   
Название: Linux for Beginners: The Science of Linux Operating System and Programming Tools for Installation, Configuration and Command Line with a Basic Guide on Networking, Cybersecurity, and Ethical Hacking
Автор: Darwin Growth
Издательство: Amazon Digital Services LLC
Год: 2019
Формат: epub/azw3/pdf(conv.)
Страниц: 158
Размер: 10.6 Mb
Язык: English

Linux is a free and freely distributed operating system inspired by the UNIX system, written by Linus Torvalds with the help of thousands of programmers. UNIX is an operating system developed in 1991, one of whose greatest advantages is that it is easily portable to different types of computers, so there are UNIX versions for almost all types of computers, from PC and Mac to workstations and supercomputers.
Unlike other operating systems, such as MacOS (Apple operating system), UNIX is not intended to be easy to use, but to be extremely flexible. It is generally as easy to use as other operating systems, although great efforts are being made to facilitate its use.
          

IT / Software / Systems: Programmer Analyst - East Lansing, Michigan

 Cache   
BASIC PERFORMANCE EXPECTATIONS: Work involves programming and system analysis on one or more major computer systems, alone or as a member of a team. Work involves meeting with the end user of the system and supervisors to understand problems, designing and documenting solutions and plans to execute that solution, including estimating the time it will take to complete the solution. The work requires developing an approach for the solution that best meets the goals of the assignment, runs efficiently in the computing environment and can be efficiently maintained. Work includes implementing the approach within the team and providing timely and accurate updates as to the status of the completion of the project. Work includes developing and adhering to affiliate or project IT standards and procedures. Work requires keeping up with new developments in the field of computing, particularly as they are identified for the assigned affiliate. Specifically, this position is responsible for learning and using new languages, approaches to programming, testing, databases, utilities, operating systems, or hardware as needed to complete assignments. Assignment may pertain to the areas of architecture, business intelligence, quality assurance, web technologies or application support. This job requires the ability to establish and maintain effective working relationships with members and leaders, as well as staff and management. ASSIGNED DUTIES: Application Development: -- Analyze, design, develop, document, test, implement and maintain applications. Examples of applications include those that are developed in-house, externally or hosted; interfaces between systems, mobile platforms and third-party packages. Design, develop and maintain application databases. Provide database administration support. esearch and evaluate solutions for the design of computer applications. Participate in feasibility studies. Review business specifications and jointly determine requirements to address changing business needs. Present and document possible solutions based on both business and technical considerations taking into account factors such as functionality, business logic, usability and user experience, to subject matter experts, end users and management. Develop specifications for programs and answer questions related to technology on new systems or system enhancements. Provide training and guidance to ITSS team members, end users and managers on the use of applications. Quality Assurance and Testing: -- Develop testing strategies to ensure quality and usability of applications. Perform all testing required to ensure the system delivered to the user meets the user's expectations and specifications. Unit test applications or automate tests according to specifications and acceptance criteria to ensure quality of applications. Participate in code reviews, retrospectives and recommend changes for improvement. Provide testing assistance to end users and managers as needed to ensure testing is thorough and reduces the risk of errors or disruptions to other end users, members and outside vendors. Additionally: -- Work collaboratively with team members and clients. -- Participate in the evolution of best practices, standard, methodologies and policies as it relates to software development. -- Maintain records of time spent on assigned tasks and provide information as required for payroll and other administrative purposes. Orient and mentor new or less experienced team members. Prepare and make presentations on various IT related topics to other staff members. Acquire knowledge of the terminology and services of the affiliate(s). Represent the affiliate(s) at assigned IT user group meetings and conferences. Perform other job-related duties as assigned from time to time. MINIMUM QUALIFICATIONS: Education and experience Bachelor degree in computer science or information systems, or Bachelor degree and formal study in computer science including programming, systems development, database theory, and application development and two years of recent programming experience, or Associate degree in computer programming, information systems or equivalent and four years of recent programming experience including, but not limited to structured programming or object oriented applications and web development. Knowledge of current hardware, software, operating systems, databases, languages, and utilities. Demonstrated ability to design, develop, test, document, and support computer applications. Ability to communicate tactfully, courteously, and effectively. Self-motivated with a willingness to research and learn multiple languages and architectures. Ability to work collaboratively in team settings. ()
          

Professions: Programmer Analyst - East Lansing, Michigan

 Cache   
BASIC PERFORMANCE EXPECTATIONS: Work involves programming and system analysis on one or more major computer systems, alone or as a member of a team. Work involves meeting with the end user of the system and supervisors to understand problems, designing and documenting solutions and plans to execute that solution, including estimating the time it will take to complete the solution.--The work requires developing an approach for the solution that best meets the goals of the assignment, runs efficiently in the computing environment and can be efficiently maintained.--Work includes implementing the approach within the team and providing timely and accurate updates as to the status of the completion of the project. Work includes developing and adhering to affiliate or project IT standards and procedures. Work requires keeping up with new developments in the field of computing, particularly as they are identified for the assigned affiliate.--Specifically, this position is responsible for learning and using new languages, approaches to programming, testing, databases, utilities, operating systems, or hardware as needed to complete assignments. Assignment may pertain to the areas of architecture, business intelligence, quality assurance, web technologies or application support. This job requires the ability to establish and maintain effective working relationships with members and leaders, as well as staff and management. ASSIGNED DUTIES: Application Development: -- Analyze, design, develop, document, test, implement and maintain applications. Examples of applications include those that are developed in-house, externally or hosted; interfaces between systems, mobile platforms and third-party packages. Design, develop and maintain application databases. Provide database administration support. esearch and evaluate solutions for the design of computer applications.--Participate in feasibility studies. Review business specifications and jointly determine requirements to address changing business needs. Present and document possible solutions based on both business and technical considerations taking into account factors such as functionality, business logic, usability and user experience, to subject matter experts, end users and management. Develop specifications for programs and answer questions related to technology on new systems or system enhancements. Provide training and guidance to ITSS team members, end users and managers on the use of applications. Quality Assurance and Testing: -- Develop testing strategies to ensure quality and usability of applications. Perform all testing required to ensure the system delivered to the user meets the user's expectations and specifications. Unit test applications or automate tests according to specifications and acceptance criteria to ensure quality of applications. Participate in code reviews, retrospectives and recommend changes for improvement. Provide testing assistance to end users and managers as needed to ensure testing is thorough and reduces the risk of errors or disruptions to other end users, members and outside vendors. Additionally: -- Work collaboratively with team members and clients. -- Participate in the evolution of best practices, standard, methodologies and policies as it relates to software development. -- Maintain records of time spent on assigned tasks and provide information as required for payroll and other administrative purposes. Orient and mentor new or less experienced team members. Prepare and make presentations on various IT related topics to other staff members. Acquire knowledge of the terminology and services of the affiliate(s). Represent the affiliate(s) at assigned IT user group meetings and conferences. Perform other job-related duties as assigned from time to time. MINIMUM QUALIFICATIONS: Education and experience Bachelor degree in computer science or information systems, or Bachelor degree and formal study in computer science including programming, systems development, database theory, and application development and two years of recent programming experience, or Associate degree in computer programming, information systems or equivalent and four years of recent programming experience including, but not limited to structured programming or object oriented applications and web development. Knowledge of current hardware, software, operating systems, databases, languages, and utilities. Demonstrated ability to design, develop, test, document, and support computer applications. Ability to communicate tactfully, courteously, and effectively. Self-motivated with a willingness to research and learn multiple languages and architectures. Ability to work collaboratively in team settings. ()
          

IT / Software / Systems: Research Programmer - East Lansing, Michigan

 Cache   
BASIC PERFORMANCE EXPECTATIONS: This position involves programming and system analysis on one or more major computer systems, alone or as a member of a team. Work involves meeting with the end user of the system and supervisors to understand problems and designing and documenting solutions and plans to execute that solution, including estimating the time it will take to complete the solution. The work requires developing an approach for the solution that best meets the goals of the assignment, runs efficiently in the computing environment and can be efficiently maintained. This position includes implementing the approach within the team and providing timely and accurate updates as to the status of the completion of the project. This position includes developing and adhering to affiliate or project IT standards and procedures. The incumbent is required to keep up with new developments in the field of computing, particularly as they are identified in the IT Master Plan for the assigned affiliate. Specifically, this position is responsible for learning and using new languages, approaches to programming, databases, utilities, operating systems or hardware as needed to complete the tasks. This position requires the ability to establish and maintain effective working relationships with members and leaders, as well as staff and management. ASSIGNED DUTIES: Learn, improve and program a Proposal Cost Calculator for K-12 and ESP local bargaining. Fix bugs and errors in all research and bargaining department platforms. Upload relevant contract information to MEA profiles. Learn and improve the current financial analysis applications available to field staff. Develop and maintain new computer based programs for the Research and Bargaining department. Learn, maintain and improve the contracts database. Develop and maintain platform for the Cost Alignment Calculator. Create out-of-formula financial analysis. Learn, maintain and improve MEA Profiles including a new profile for Higher Ed units. Create ISD, Higher Ed and Community College Financial Analysis platform. Provide secretarial support on Microsoft Office for research and bargaining professional staff. Program new salary schedule transition generator. Develop methods for data extraction and analysis. Program and maintain insurance cost comparison platform. Research and maintain database of employer contributions to healthcare. Perform all testing required to ensure the system delivered to the user meets the user's expectations and specifications. Responsible for project management and the delivery of a project. Meet with users as necessary to develop requirements and understand specifications for programs, provide training on new systems or system enhancements and answer questions related to technology. Perform other programming duties as assigned by Research department staff. MINIMUM QUALIFICATIONS: Education and experience: Bachelor degree in computer science or information systems, or Bachelor degree and formal study in computer science including programming, systems development, database theory and application development and two years of recent programming experience, or Associate degree in computer programming, information systems or equivalent and four years of recent programming experience including, but not limited to, structured programming or object oriented applications and WEB development. Knowledge of current hardware, software, operating systems, databases, languages and utilities. Demonstrated ability to develop and maintain various platforms. Proficient with Microsoft Access, Excel, PowerPoint and Word. Ability to review and analyze complex data. Ability to communicate tactfully, courteously and effectively. TESTING MS Word 70%MS Excel 70% ()
          

Other: Research Programmer - East Lansing, Michigan

 Cache   
BASIC PERFORMANCE EXPECTATIONS: This position involves programming and system analysis on one or more major computer systems, alone or as a member of a team. Work involves meeting with the end user of the system and supervisors to understand problems and designing and documenting solutions and plans to execute that solution, including estimating the time it will take to complete the solution. The work requires developing an approach for the solution that best meets the goals of the assignment, runs efficiently in the computing environment and can be efficiently maintained. This position includes implementing the approach within the team and providing timely and accurate updates as to the status of the completion of the project. This position includes developing and adhering to affiliate or project IT standards and procedures. The incumbent is required to keep up with new developments in the field of computing, particularly as they are identified in the IT Master Plan for the assigned affiliate. Specifically, this position is responsible for learning and using new languages, approaches to programming, databases, utilities, operating systems or hardware as needed to complete the tasks. This position requires the ability to establish and maintain effective working relationships with members and leaders, as well as staff and management. ASSIGNED DUTIES: Learn, improve and program a Proposal Cost Calculator for K-12 and ESP local bargaining. Fix bugs and errors in all research and bargaining department platforms. Upload relevant contract information to MEA profiles. Learn and improve the current financial analysis applications available to field staff. Develop and maintain new computer based programs for the Research and Bargaining department. Learn, maintain and improve the contracts database. Develop and maintain platform for the Cost Alignment Calculator. Create out-of-formula financial analysis. Learn, maintain and improve MEA Profiles including a new profile for Higher Ed units. Create ISD, Higher Ed and Community College Financial Analysis platform. Provide secretarial support on Microsoft Office for research and bargaining professional staff. Program new salary schedule transition generator. Develop methods for data extraction and analysis. Program and maintain insurance cost comparison platform. Research and maintain database of employer contributions to healthcare. Perform all testing required to ensure the system delivered to the user meets the user's expectations and specifications. Responsible for project management and the delivery of a project. Meet with users as necessary to develop requirements and understand specifications for programs, provide training on new systems or system enhancements and answer questions related to technology. Perform other programming duties as assigned by Research department staff. MINIMUM QUALIFICATIONS: Education and experience: Bachelor degree in computer science or information systems, or Bachelor degree and formal study in computer science including programming, systems development, database theory and application development and two years of recent programming experience, or Associate degree in computer programming, information systems or equivalent and four years of recent programming experience including, but not limited to, structured programming or object oriented applications and WEB development. Knowledge of current hardware, software, operating systems, databases, languages and utilities. Demonstrated ability to develop and maintain various platforms. Proficient with Microsoft Access, Excel, PowerPoint and Word. Ability to review and analyze complex data. Ability to communicate tactfully, courteously and effectively. TESTING MS Word 70% MS Excel 70% ()
          

IT / Software / Systems: Entry Level Computer Programmer Job posting in #Richland #ITjobs - Richland, Washington

 Cache   
As the fastest growing employer of emerging tech talent across the U.S, Revature looks to hire over 300 innovative Entry Level Computer Programmers in the next 4 weeks. One day someone is going to ask you where you got your start.This is IT! With a wide range of Fortune 500 enterprises, government organizations and top systems integrators as our clients, we not only provide you with the skills needed to succeed through an employer-paid training program but will also give you the opportunity to put those skills to use, on projects that matter. What We Are Looking For - College degree (Associates or Bachelors) - Must be authorized to work in the US - Strong desire to learn to code - No prior professional experience required. - A natural problem solver - Strong communication and interpersonal skills - Willing to relocate anywhere in the US - Relocation assistance provided What We Offer - Competitive salary - Relocation & housing assistance - Health, vision & dental insurance - Paid time off - Industry Certifications - Life Insurance Policy - 401k - Mentoring program and ongoing support throughout your entire Revature career - Experience with the largest and most reputable companies in the US Today. Interviews are going on now. #SoftwareEngineering Not Mentioned ()
          

Programmer & Research Analyst - Yukon Government - Whitehorse, YT

 Cache   
The incumbent is also responsible for extraction of data from survey software to develop datasets for statistical analysis, managing survey databases,… $70,795 - $81,620 a year
From Yukon Government - Wed, 20 Nov 2019 09:03:49 GMT - View all Whitehorse, YT jobs
          

CABINETRY

 Cache   
<p><img border="0" src="https://app.recruitology.com/display_ad/8783/image/" style="width:1px; height:1px;" height="1px" width="1px" /></p> <p>1989-2019 30 Years Interior Excellence CAC NOW HIRING FOR THE NEXT 30 YEARS... FABRICATION Programmers CNC... Truncated <a href="http://www.latpro.com/jobs/3719545.html">see more...</a>
          

Statistical Programme

 Cache   
STATISTICAL PROGRAMMER (Syneos Health, LLC Morrisville, NC) Act as the core project team lead to coordinate and manage all statistical programming activities. May telework from any location in the U.S. Please apply online at https://www.syneoshealth.... Truncated <a href="http://www.latpro.com/jobs/3719722.html">see more...</a>
          

IT / Software / Systems: Machinist/Programmer - Denver, Colorado

 Cache   
Postion open for Machinist/ Programmer. Flexible hours available. Experience a must. Position is for 3 and 4 axis mill programming and Machining. Mastercam knowledge is a plus. 5 axis machining experience is also a plus. Health insurance, dental, and 401K with company match are available. Must have strong work ethic. Be willing to work overtime if needed. Pay rate will be based upon skill level and experience. Training on 5 axis machine is an option. Must be able to work independently with little or no suppervision. Must be able to work well with others. ()
          

Guido van Rossum Explains How Python Makes Thinking in Code Easier

 Cache   
Dropbox's Work in Progress blog shared a 2000-word "conversation with the creator of the world's most popular programming language," noting that many computer science schools are switching over from Java to Python, and arguing that "JavaScript still owns the web, and Java runs 2.5 billion Android phones, but for general purpose programming and education, Python has become the default standard." They also write that the language's recently-retired creator Guido van Rossum "thinks Python may be closer to our visual understanding of the structures that we are representing in code than other languages." "While I was researching my book, CODERS," says author Clive Thompson, "I talked to a lot of developers who absolutely love Python. Nearly all said something like âPython is beautiful.' They loved its readability -- they found that it was far easier to glance at Python code and see its intent. Shorn of curly brackets, indented in elegant visual shelves, anything written in Python really looks like modern poetry." They also find that Python is fun to write, which is more important than it may seem. As Thompson writes, "When you meet a coder, you're meeting someone whose core daily experience is of unending failure and grinding frustration." Building the priority of the programmer's time into the language has had a curious effect on the community that's grown around it. There's a social philosophy that flows out of Python in terms of the programmer's responsibility to write programs for other people. There's an implicit suggestion, very much supported by Van Rossum in the ways he talks and writes about Python, to take a little more time in order to make your code more interpretable to someone else in the future. Expressing your respect for others and their time through the quality of your work is an ethos that Van Rossum has stealthily propagated in the world. "You primarily write your code to communicate with other coders, and, to a lesser extent, to impose your will on the computer," he says... Part of the enduring appeal of Python is the optimism and humility of starting over. "If you've invested much more time into writing and debugging code, you're much less eager to throw it all away and start over." Co-founder and CEO, Drew Houston wrote the first prototype of Dropbox in Python on a five-hour bus ride from Boston to New York. "The early prototypes of Dropbox were thrown away, largely, many times," says Van Rossum.... What has he taken away from his thirty year journey with Python? "I have learned that you can't do it alone, which is not an easy lesson for me. I've learned that you don't always get the outcome that you went for, but maybe the outcome you get is just as good, or better." Though two decades ago van Rossum had tried a short-lived project called Computer Programming 4 Everybody (or CP4E), he now says "I'm not so sure that it needs to happen anymore. I think computers have made it to that point, where they're just a useful thing that not everybody needs to know what goes on inside." Long-time Slashdot reader theodp also flagged van Rossum's remarks that "there are certain introductions to programming that are fun for kids to do, but they're not fun for all kids, and I don't think I would want to make it a mandatory part of the curriculum."

Read more of this story at Slashdot.


          

2019 Sees More Geeky Advent Calendars

 Cache   
It's the first day of December, which means the return of an annual geek tradition: the computer programming advent calendars! An anonymous reader delivers this update: It's the very first year for the Raku Advent Calendar (using the language formerly known as Perl 6). Meanwhile, Perl 5 still has its own separate advent calendar. Amsterdam-based Perl programmer Andrew Shitov is also writing a special "Language a Day" advent calendar in which he'll cover the basics of an entirely different programming language each day. And the Go language site Gopher Academy has also launched their 7th annual advent calendar. The 24 Ways site is also promising "an advent calendar for web geeks," offering "a daily dose of web design and development goodness to bring you all a little Christmas cheer." And each day until Christmas the Advent of Code site will offer "small programming puzzles for a variety of skill sets and skill levels that can be solved in any programming language you like. People use them as a speed contest, interview prep, company training, university coursework, practice problems, or to challenge each other." (Their Day One puzzle explains this year's premise. "Santa has become stranded at the edge of the Solar System while delivering presents to other planets....!") There's also one particularly ambitious advent calendar from closer to the north pole. The Norwegian design/technology/strategy consulting firm Bekk is attempting 12 different geeky Christmas calendars, each running for 24 days (for a total of 288 articles). And each one is hosted at a .christmas top-level domain CSS Christmas Functional Christmas Java Christmas JavaScript Christmas Kotlin Christmas ML Christmas Open Source Christmas Product Christmas React Christmas Security Christmas The Cloud Christmas UX Christmas

Read more of this story at Slashdot.


          

Technical analysis of BTC/USD for 02/12/2019:

 Cache   

Crypto Industry News:

Russia is allegedly preparing a ban on the use of cryptocurrencies to pay for goods and services. The media report cites several sources allegedly familiar with the ongoing discussions at the central bank of the country, the financial supervision office and the Ministry of Finance, which support the ban.

Currently, cryptocurrencies can be used in e-commerce, and many Russian freelancers, including programmers, designers and copywriters, agree to receive salaries in Bitcoin or Ethereum, said Vladislav Antonov of Izvestia.

However, it can be seen that although they are not officially allowed, cryptocurrencies are often used to buy a range of goods and services; including tickets, computers and home appliances, apartment rentals or hotel reservations.

If the media sources are right, Russian regulators believe that a ban on the use of cryptocurrencies as payments is necessary because of their concerns about crime.

The report refers to the comments of Alexei Yakovlev, deputy head of the banking regulations department of the Ministry of Finance, who reportedly confirmed at a recent conference on crypto-economy: "We see no basis for using cryptocurrencies as a means of payment."

The central bank's press department has not officially confirmed the preparation of formal law, but stressed that private cryptocurrencies cannot be equated with fiduciary currency and cannot be considered a legitimate way of paying for purchases:

"If it is decided to ban cryptocurrencies as a means of payment at the legislative level, we consider it appropriate to support this position," we read.

Technical Market Overview:

The BTC/USD pair has retraced over 50% of the last wave up and made a local low at the level of $7,080 at the time of writing the analysis. It means that the three-wave upwards move was a counter-trend correction that ended up at the level of $7,809 in form of a Shooting Star candlestick pattern. Since then the bears are trying to take back the control over the market and are pushing the prices towards the next target, which is 61% Fibonacci retracement located at the level of $6,973.

Weekly Pivot Points:

WR3 - $9,343

WR2 - $8,576

WS3 - $7,989

Weekly Pivot - $7,181

WS1 - $6,590

WS2 - $5,869

WS3 - $5,242

Technical recommendations:

The best strategy in the current market conditions is to trade with the larger timeframe trend, which is still down. All the shorter timeframe moves are still being treated as a counter-trend correction inside of the uptrend. When the wave 2 corrective cycles are completed, the market might will ready for another impulsive wave up of a higher degree and uptrend continuation.

analytics5de4c82429a42.jpg

The material has been provided by InstaForex Company - www.instaforex.com
          

Neon Number in Java

 Cache   

Here in this tutorial you will learn how to check a neon number in Java. What is a Neon Number? Neon numbers are those numbers whose sum of the digits when squared is exactly the same as the number itself. For example, the number 9. Now the square of the number, 9 is 81. The sum of the digits in the square, 81 is 8 + 1 = 9, which is equal to the number itself. Hence, the number 9

The post Neon Number in Java appeared first on The Java Programmer.


          

Idées sorties : que faire à Marseille le week-end du 22 au 25 novembre

 Cache   

Ce week-end, Marseille accueille plusieurs manifestations de qua-li-té. Voici ce que nous vous proposons de faire pour finir la semaine en beauté.

Vendredi

Rencontre avec Philippe Pujol 

Le 5 novembre 2018, deux immeubles s'effondrent dans le quartier de Noailles à Marseille, provoquant la mort de huit habitants. Un an après ce drame, Philippe Pujol sort un nouveau livre intitulé « La chute du monstre - Marseille année zéro » qui dissèque cet accident tragique dans la cité phocéenne. À cette occasion, le gagnant du prestigieux prix Albert-Londres sera présent à la Librairie Maupetit pour échanger au sujet de « la chute du monstre [qui] dénonce le système d'une ville gangrénée par la corruption et l'incompétence ». Une rencontre qui promet d'être animée.
Plus d’infos ici.

Guts & Les Akaras de Scoville au Tighten Up

Découper, pitcher, filtrer, découper encore, programmer, déconstruire pour mieux construire : telles sont les bases du nouvel album afro-tropical de Guts. Dans le cadre du festival Tighten Up, cet artiste aux mélodies expérimentales et ensoleillées vous emmène faire un voyage dans les pays du Sud avec son groupe Les Akaras de Scoville. Sur la carlingue, une fresque colorée et généreuse annonce le nom de ce nouvel album : « Philantropiques ». La scène du Moulin de Marseille promet d'être flambante !
Plus d’infos ici.

Samedi

Le label Ovum fête ses 25 ans

Le célèbre label Ovum souffle ses 25 bougies ! Pour cet anniversaire, le label a vu grand et a décidé de faire les choses bien. Après une tournée internationale avec des arrêts à Detroit, Washington, Los Angeles et bien d'autres grandes villes, c'est à Marseille que les festivités continuent ce samedi. Le Cabaret Aléatoire accueillera à cette occasion Josh Wink (Ovum Records) Steve Bug (Poker Flat Recordings) et fera jouer son DJ résident Jack Ollins. Un quart de siècle célébré dans la joie et la bonne... musique.
Plus d’infos ici.

Manifestation contre les violences faites aux femmes

Pour dénoncer les violences faites aux femmes, plusieurs associations féministes invitent les habitants à se joindre à elles ce samedi au cours Estienne d'Orves pour interpeller les pouvoirs publics. Une manifestation qui défend une cause qui nous unit tous.
Plus d’infos ici.

Samedi et dimanche

Deux jours autour du livre et de la cuisine

Cet événement inédit est le premier salon du livre totalement dédié à la cuisine et à la gastronomie. Ouvert aux professionnels et au grand public, il réunira l'ensemble des métiers de la filière livre sur deux jours de rencontres. Au programme : 45 auteurs présents pour faire des dédicaces, des conférences et 4 ateliers thématiques.
Plus d’infos ici.

Dimanche

Lancement du Festival de la Méditerranée en images

Chaque année, le Festival de la Méditerranée en images (aka PriMed) sélectionne les meilleurs reportages et productions documentaires en lien avec la Méditerranée. En ouverture du festival, le Mucem accueille le Prix du public pour le meilleur court-métrage. À cette occasion, il sera possible d’assister à la projection des six films en compétition et de voter pour son favori ! Le 29 novembre, soit la veille de la clôture du festival, le lauréat sera désigné lors d’une cérémonie de remise des prix.
Plus d’infos ici.

Herbie Lite en live au Mama Shelter

Temps fort de la programmation musicale du Mama Shelter, le DJ Herbie Lite sera aux platines pour ambiancer la soirée. Féru de house music, Herbert enchaîne les clubs et résidences tel que le Bazar, la Villa Bivona en passant par le Papagayo de Saint-Tropez. Ses mixes sont un voyage auditif mêlant la soul, la motown, le disco et la house. Une seule quête : le plaisir auditif !
Plus d’infos ici.

Tout le week-end

Des voitures plein la vue

Pour la 7ème édition consécutive, le salon de l'Auto Marseille met en avant sur 18 000 m2 45 marques différentes et plus de 600 véhicules ! Le salon sera complété par une exposition de voitures de collection. Les visiteurs pourront aussi profiter d'animations gratuites ainsi qu'assister à des conférences tournées sur l'industrie automobile. Une caisse, c'est sympa à conduire, et beau à admirer.
Plus d’infos ici.

 


          

Thermostat connecté Netatmo à 119,99 €

 Cache   
Amazon fait une promotion sur le thermostat connecté Netatmo qui passe à 119,99 euros livré gratuitement. Avec lui, vous pourrez contrôler et programmer votre chaudière et donc votre chauffage depuis votre smartphone Economisez en moyenne 300euros pour chauffer votre maison avec un planning adapté à vos habitudes de vie. Pour vérifier si votre installation est compatible, vous pouvez utiliser cet outil
          

Become a Computer Programmer in One Month Bundle

 Cache   

In this set of online courses, you'll learn basic development principles to get you started on the right path. No experience is necessary. Learn UX, HTML, JavaScript and jQuery

The post Become a Computer Programmer in One Month Bundle appeared first on Indie Game Bundles.


          

Shovel Knight Showdown: Designing a roulette of gameplay

 Cache   

In the upcoming platforming brawler game Shovel Knight Showdown, Yacht Club Games designed a mode called Chester's Choice that randomizes the game's many options. Yacht Club programmer David D'Angelo explains how it works. ...


          

Sr. SAS Programmer Analyst I - Rapiditgain - Herndon, VA

 Cache   
Requires Master’s degree or foreign equivalent in Computer Science, Engineering (any), Mathematics, Biology, Chemistry, or a related scientific/quantitative… $86,000 a year
From Rapiditgain - Wed, 16 Oct 2019 09:48:22 GMT - View all Herndon, VA jobs
          

Etude de cas - Un bâtiment entre tradition et modernité

 Cache   

Implantée dans le centre-ville de Bayonne, la nouvelle agence de Pôle Emploi occupe 3 des 6 niveaux d’une construction neuve de 1 806 m². Cette structure entre dans le cadre d’un programme de renouvellement urbain, édicté par l’Agglomération Côte Basque Adour : le secteur d’étude « Rive Gauche Adour ».

 

Une architecture urbaine & audacieuse

Le cabinet d’architectes et d’urbanisme MVRDV a conçu l’immeuble de manière à ce qu’il s’intègre parfaitement dans son environnement. 
En effet, la structure prend la forme d’un prisme, contrastant avec l’architecture traditionnelle et fortement identitaire du Pays Basque. La volumétrie est marquée par une toiture à deux fortes pentes, dont l’une semble se prolonger jusqu’au sol, ainsi que par des façades distinctes selon leur orientation.

Ces façades ont été pensées pour créer un effet miroir

Les couleurs ont été définies en fonction de l’environnement du bâtiment. La façade principale (Sud, côté boulevard) est de couleur béton blanc pour donner un aspect minéral à la construction. Celles côté Ouest et Nord sont de couleur brique, afin de rappeler le coloris typique des toitures de la région. Pour finir, la façade Est est en gris, marquant une continuité avec la toiture en zinc.

Dans une réflexion paysagère globale, des architectes ont intégré tout autour de l’immeuble des plantations, procurant ainsi une note de vert soutenue.

 

 

Un cadre de travail lumineux & confortable

Les espaces de travail ont été réfléchis de manière à rendre confortable l’environnement intérieur des occupants et des visiteurs, avec de grandes surfaces vitrées. En effet, le cabinet d’architectes a favorisé l’entrée optimale de lumière naturelle dans les locaux, afin de réduire l’usage de la lumière artificielle.

La construction se soumet aussi aux exigences de la réglementation RT 2012. Tout d’abord, en termes de confort thermique. Sa forme et son orientation permettent des économies d’énergie que les matériaux utilisés (à faible énergie grise) limitent les risques sur la santé de ses occupants. Puis en termes de confort acoustique : en effet, le bâtiment se situe sur un grand boulevard où il y a beaucoup de passage.

Pour répondre à ces contraintes, 116 fenêtres de toit VELUX ont été intégrées sur la toiture l’immeuble : 96 ouvertures sur la façade Est et 20 sur l’ensemble des autres façades. Les fenêtres toit apportent un confort optimal et une large entrée de lumière naturelle. Leur intégration à la toiture respecte le style architectural du bâtiment.

Enfin, 55 fenêtres ont été équipées d’une motorisation INTEGRA®, offrant ainsi la possibilité aux occupants de programmer l’aération leurs espaces de travail.

Crédit photos: ©Michaël Boudot

          

Super FX chip designer Jez San says Nintendo doesn’t employ many good programmers

 Cache   
Jeremy “Jez” San, who founded Argonaut Software and was part of the team that designed Super Nintendo’s Super FX chip, did a very lengthy interview with NintendoLife about his long career. Among other things, San discusses his time working with Nintendo in a very intimate capacity as Argonaut developed the Super FX chip, as well as games like Star Fox and other hardware like the unreleased Super Visor for VR. He expresses deep gratitude for what Nintendo enabled them to do, but he also offers his insight and opinion into how Nintendo operated back then and perhaps even now. Notably, […]
          

2019 Sees More Geeky Advent Calendars

 Cache   
It's the first day of December, which means the return of an annual geek tradition: the computer programming advent calendars! An anonymous reader delivers this update:It's the very first year for the Raku Advent Calendar (using the language formerly known as Perl 6). Meanwhile, Perl 5 still has its own separate advent calendar. Amsterdam-based Perl programmer Andrew Shitov is also writing a special "Language a Day" advent calendar in which he'll cover the basics of an e
          

Commentaires sur Le binaire pour tuer la spiritualité…La pseudologie du bivalisme est une coercition de notre libre-arbitre. par jean

 Cache   
Ce texte est simpliste voire ridicule. Je ne nie pas qu’il pose quelques bonnes questions mais il s’en prend à des moulins à vent. Le binarisme des ordinateurs n’implique en RIEN le binaire qui plait tant à certains. LE binaire comme toute simplification sémantique ou autre réductionnisme EST UNE ARME du pouvoir. Le bien et le mal ces plaies discursives qui empêchent de penser le réel. En disant bien ou mal, vrai ou faux le salaud et le crétin réduisent les capacités de penser. Un choix d’asservissement. Quelques exemples abjects : le ‘avec nous ou contre nous’, le TINA, un referendum, le scrutin du deuxième tour (en France), la dictature de la majorité, cochez la case des conditions générales, … L’existence du nombre zéro : mais un nombre est un artefact. Il n’existe pas sinon comme concept pour se faciliter la pensée. On distingue le réel versus les concepts pour faciliter la description du réel. Concernant l’ordinateur ternaire ou binaire ou autre. Un faux débat. C’est le langage qui compte. Pour avoir beaucoup programmé (aussi en assembleur), j’ai souvent regretté le binarisme réducteur. Pour y pallier, il suffit de construire un langage respectant ses besoins. C’est trivial. Il en est de même de nos mots ! Nous sommes piégés par l’usage pervers des mots. Nos dirigeants fabriquent des expressions en nous inondant d’éléments de langage. Cette propagande nous empêche de penser, c’est fait pour ! Mais pas un ordinateur, sauf à laisser le dominant le programmer à votre place. Mais là c’est de la servitude volontaire.
          

Fixing Bugs on a ASP.NET MVC Project

 Cache   
Hi, Need a programmer with experience dealing with ASP.NET MVC. Some knowledge in Appraisal system will be helpful. My requirement has been broken down into 2 phases. Please see phase 1 bug fixing ..
          

CNC Programmer & Operator - Naveen Industries - Cossipore, Kolkata, West Bengal

 Cache   
CNC Lathe Machine programmer, operator and controller would be responsible for managing CNC Lathe machine to meet daily production targets. ₹12,000 - ₹14,000 a month
From Indeed - Tue, 20 Aug 2019 06:45:23 GMT - View all Cossipore, Kolkata, West Bengal jobs
          

Programmers: At What Age Did You Start Programming

 Cache   
A lot of people think they are too old to start programming while others think they are too small when asked to learn to code

The Question is, AT WHAT AGE DID YOU STARTED PROGRAMMING' you could mention your first tech, how it went then and your experience now.

Let's inspire one another
          

Programmer & Research Analyst - Yukon Government - Whitehorse, YT

 Cache   
Reporting to the Senior Statistician, the Programmer and Research Analyst is responsible for programming software for survey and statistical research including… $70,795 - $81,620 a year
From Yukon Government - Wed, 20 Nov 2019 09:03:49 GMT - View all Whitehorse, YT jobs
          

AutoCAD Detailer (CNC Programmer)

 Cache   
Coletech Quality Woodworking Inc. - Scarborough, ON - working experience or 3-4 years of college training in autocad CNC Programming...
          

Sr. Web Application Developer

 Cache   
TX-Houston, Job Purpose The Senior Web Application Developer is responsible for developing, testing, implementing, and maintaining web-based application systems; troubleshoots system problems and issues and looks for ways to improve the application. The Sr. Web Application Developer has knowledge of a variety of concepts, practices, and procedures within the programming field; provides other programmers guida
          

Network Engineer

 Cache   
AZ-Chandler, Our client is currently seeking a Network Engineer MINIMUM SKILL SET •Programmer, proficient in perl, PHP, JavaScript, and UNIX shell scripting, plus git SCM •Network Engineer with extensive experience on multiple vendor platforms, especially Cisco IOS and SD-WAN (Viptela). •User interface design (primarily web-based) •Moderate proficiency with image editing tools (Gimp, Photoshop or similar). •My
          

Gris Coming to PS4 on November 26

 Cache   



Experience Gris’ Emotional Journey on PS4 November 26

Hello there! Nomada Studio (that’s us!) and our good friends at Devolver Digital are thrilled to announce that Gris’ dreamlike world will arrive on PlayStation 4 on November 26! Our team are long time PlayStation fans and we’re so pleased to be able to bring our debut project to the PlayStation community.

It’s been quite the undertaking and we took our time to get it perfect because we wanted to deliver to you the absolute best version of Gris possible. Gris has been praised and awarded honors for the visual design, hand drawn art, and fluid animation so we wanted the PS4 version to be an absolute marvel to look at in motion. Our artists and designers went over the game in meticulous detail, updating each of the game’s beautiful scenarios. The art team revamped over five thousand unique assets to 2x – 4x higher resolution to take advantage of the PS4 Pro and 4K displays. Similarly, the majestic score from Berlinist was integrated into the game with less compression so that the music and audio design all sound cleaner and brighter. Additionally, we added some ‘quality of life’ improvements and a PlayStation-exclusive secret homage to one of our favorite games and an inspiration for Gris.

< <

On a more personal note, we would like to take a moment to express what an honor it is to even share a platform with thatgamecompany’s Journey, a game than not only did we love when we played it on PlayStation 3 but that has also become a great inspiration during these last few years! We hope that players find a similar level of emotional engagement with Gris and see how the iconic Journey influenced the design and feeling of Gris.

Gris will be available at PlayStation Store November 26 and physical PS4 edition from Limited Run Games is available now from their store. We hope that you will enjoy this adventure with us and we look forward to the emotional journey the PlayStation community will take with Gris.

Roger Mendoza - Programmer, Nomada Studio

blog.us.playstation.com

          

COORDONNATEUR-TRICE DE PROJET EN SCIENCE ET ROBOTIQUE – ÉCOLE CRIE OU INUITE - Fusion Jeunesse - Nord-du-Québec, QC

 Cache   
Ligue de robotique FIRST LEGO LEAGUE (FLL): Utiliser la technologie de LEGO MINDSTORM NXT pour construire et programmer un robot capable d’accomplir des «… $480 a week
From Fusion Jeunesse - Tue, 12 Nov 2019 22:18:46 GMT - View all Nord-du-Québec, QC jobs
          

IT Programmer Specialist - USA-MD-Bethesda

 Cache   
Job Description: OVERVIEW We are currently searching for a skilled professional to join a well-known client's team as IT Programmer Specialist in Portsmouth, Virginia. The IT Programmer Specialist...
          

How to Battle the Bots Wrecking Your Online Study

 Cache   

Technological
advancements have expanded the scope of online research studies. Given their
ability to help researchers reach thousands of geographically diverse samples
relatively quickly, these online research methods have gained significant traction,
reducing the cost
and time of research.

But
the technological advantages bring a serious threat to science and data integrity:
bots, fake participants that have been programmed to complete dozens of responses
(or more) in a matter of minutes.

We
can’t really determine why programmers are deploying bots to complete online
surveys, but I have a few guesses. First, most online studies that have been
overrun by bots offer some kind of financial reward. Perhaps programmers hope
to complete surveys without being detected to collect larger sums of money than
if they participated truthfully. Bot programmers may also be interested in
skewing research findings for malicious reasons. Others may use unpaid research
to train the bots for future, paid surveys. No matter what the reason may be,
the consequence is the same: unreliable results. Without removing all of the
bot-generated responses, the data set cannot be used to gain insight into the
research question at hand.

The
threat of bots was recently made clear to me when I launched my study examining
risk factors associated with eating disorders in LGBTQ+ populations. The study,
built in Qualtrics and RedCap, was shared on Twitter, and within 12 hours I
received about 380 responses before freezing data collection. It was almost immediately
clear that the majority of participants were bots and that I needed to do
something to parse out the human participants from the bots. I spent hundreds
of hours coding and sorting my responses to come to the final conclusion that
among the responses I received, only 11, or about 3 percent, were not flagged
as bots.

Programmers have developed bots that will create a normal distribution across all responses...or if there are open-ended questions, they’ll extract language from the survey itself to compose more logical responses.

Despite
this setback, I still find it incredibly valuable to use online data collection
platforms to increase diversity in our study samples. Fortunately, there are
ways to protect your data from bots.

One
important thing to consider when building bot protection into an online study
is the varying levels of coding sophistication and schemes used by bot
programmers, suggesting the need to implement more than one tool to flag bots.

There
are a few of the telltale signs that researchers need to be aware of at the
lowest level of bot sophistication. First, bots tend to “speed” through studies.
Bots will also provide illogical responses to open-ended questions and respond
to questions that should be hidden from participants (e.g., honeypot items).
Last, these bots will provide impossible time and date stamps on informed
consent documents.

To
guard against and identify these less-sophisticated bots, researchers should:

  • Include open-ended questions to look for unusual responses
  • Track study time stamps for impossible dates and times (e.g., bundles of
    participants beginning and ending the survey at the same exact time)
  • Flag respondents who completed survey materials impossibly fast
  • Flag participants who respond to items that they shouldn’t
    otherwise have access to

Unfortunately,
more sophisticated bots are much harder to detect in a data set. For instance,
imagine a programmer deployed a bot with a goal of completing 50 responses for
a single survey. Sophisticated programmers who want to thwart a study will ensure
that bots are not stacked together in the data set by manipulating the
timestamp and IP address. Even more insidiously, they’ll program the bot to create a normal distribution
across all 50 responses based on the range for each individual item.
Finally, if there are open-ended questions, they’ll extract language from the
survey itself to compose more logical responses.

As a researcher you may feel like you’re up against it. But there are ways to catch these more sophisticated bots.

As a researcher you may feel like
you’re up against it. But there are ways to catch these more sophisticated bots. Here a
several tips:

  • Do not share your survey on Twitter. It appears as though the
    majority of bots gain access to study links through this platform
  • Build in attention and logic checks directly to your surveys (e.g.,
    provide a paragraph of text, and somewhere in the text directly state which
    answer to choose)
  • Ask the same question at two separate points (e.g., age)
  • Provide unique survey links to each participant rather than using
    a public link. This will prevent the participant from clicking the link more
    than once or sharing the link with others

There
is no way to guarantee that your online study will be completely bot-free. Researchers
should implement several, if not all, of the described strategies to protect their
studies. When you’re collecting online data, it’s important to monitor data
integrity multiple times. I generally suggest that participants should not be
flagged as potential bots without violating at least two of the discussed
points. These strategies should serve as the first step in protecting data. Technology
is advancing each day, and coding schemes are sure to advance in kind; thus,
new ways to protect data from bots should be something researchers discuss
regularly. I hope that my experience helps others avoid a similar one. I still
strongly encourage the use of online research methods. In fact, I recently
reopened my original study—of course, with several new layers of bot
protection.

The post How to Battle the Bots Wrecking Your Online Study appeared first on Behavioral Scientist.


          

Programmer Analyst - University of Wyoming - Laramie, WY

 Cache   
PL/SQL, Perl, C++, Java, and Unix environment shell scripting. Under general supervision, install, modify, and maintain basic hardware and software for…
From University of Wyoming - Tue, 19 Nov 2019 20:14:45 GMT - View all Laramie, WY jobs
          

Ingen prisstigning

 Cache   
I modsætning til andre leverandører af TV-programmer, så er glade for at kunne sige, at vi ikke vil lade vore programpriser stige i 2020 - s...
          

Engineering: Full Stack Engineer - Portland, Oregon

 Cache   
Full Stack Engineer (Some AWS Development with NodeJS expertise) Job Type: Long Contract Job Location: Portland, OR or Milwaukee, WI - Should have solid experience in Full Stack Development, Strong hands-on JavaScript programmer candidate needed. - Should have recent 2-3 years in NodeJS Development, should have experience in creating Rest API. - Should have excellent communication skills. Job description - Proficient in React/Redux, Bootstraps, NodeJS Experience with consuming web services with REST or SOAP Experience with MongoDB and backend development as well. Should have some recent experience of AWS services development. ()
          

Week 48 – Ada Lovelace

 Cache   

This week, our human being of #SiPgoes52 is no one else than Ada Lovelace. Daughter of Lord Byron (a key figure of Romanticism and one of the first modern celebrities), she is known as the first programmer… A century before the construction of the first computer. Raised by her mother who encouraged her to pursue …

The post Week 48 – Ada Lovelace appeared first on Stuck In Plastic.


          

Programmeur de jeu - Flight School (Game Programmer - Flight School) - Reel FX - Montréal, QC

 Cache   
Ability to function in a dynamic and collaborative environment on a diverse slate of projects. Flight School is a studio of artists and technicians, fearlessly…
From Reel FX - Tue, 14 May 2019 16:42:03 GMT - View all Montréal, QC jobs
          

Attach Particle System to character Position

 Cache   
Hi Community, i'm new programmer and i would like to ask you how it is possible to spawn a particle system from the player's position, I have create a particle system with its animation but each time it starts from its position set by the animation Thanks so much special Friends!
          

Ghosts of Painting Past by Sybil Johnson – Spotlight & Giveaway

 Cache   

Ghosts of Painting Past by Sybil Johnson An Aurora Anderson Mystery Book 5 Henery Press • November 19, 2019 It’s Christmastime in the quiet Los Angeles County city of Vista Beach, home of computer programmer and tole-painting enthusiast Aurora (Rory) Anderson. The magic of the season fills the air as residents enjoy school concerts, a […]

The post Ghosts of Painting Past by Sybil Johnson – Spotlight & Giveaway appeared first on Brooke Blogs.


          

Programmeringsarbeten, Inbyggnation rågodslager, Svappavaara 2020-01-16

 Cache   
Programmeringsarbetena omfattar bl a licens, funktionsanalys, applikation, operatörsbilder, FAT och utbildning. Leverantören ska delta vid idrifttagning, kalltest, varmtest, provdrift och prestandaprov för att säkerställa leveransens funktionalitet.
          

20 objets connectés pour améliorer le confort dans la maison

 Cache   
Programmer son chauffage, éteindre la lumière, lancer son café du lit ou écouter de la musique sous la douche, la domotique s'est démocratisée et vous simplifie la vie, améliore votre confort dans la maison et vous fait faire des économies. Et si vous passiez à la maison intelligente ?
          

CNC Programmer - Delta Furniture - Montréal, QC

 Cache   
We are a high end furniture company looking for qualified CNC Programmer/ Drafter to join our team. Experience in furniture manufacturing or mechanical…
From Indeed - Tue, 19 Nov 2019 15:39:03 GMT - View all Montréal, QC jobs
          

IT / Software / Systems: IBM iSeries RPGLE Programmer (Contract) - Tomball, Texas

 Cache   
IMMEDIATE NEED! JC2 Technologies is currently searching for an RPGLE Programmer for a client located in Northwest Houston, TX. The candidate will have the opportunity to work with a leading global manufacturing company that is rapidly expanding! The ideal candidate will have some web development experience as well as AS400 development experience. Local candidates are preferred but nonlocal candidates will be considered if candidate does not mind relocating for the duration of the project. This opportunity is a 6-month to 1 year contract, with the possibility of extension. Candidate must have RPGLE Programming experience as well as specialization in any or all of the following: Java iSeries API HTTP APIs Javascript Python node.js ()
          

Comment on Hello world! by may cat khac laser cnc

 Cache   
My programmer is trying to persuade me to move to .net from PHP. I have always disliked the idea because of the costs. But he's tryiong none the less. I've been using Movable-type on numerous websites for about a year and am nervous about switching to another platform. I have heard very good things about blogengine.net. Is there a way I can import all my wordpress content into it? Any kind of help would be really appreciated!
          

Responsive And Adaptive Design - An Introduction

 Cache   

By growing their ideas at pocket-friendly prices, software development company have helped many software aspirers. The various needs and requirements of a business are provided by a software development company. To compete with other software development companies, there are numerous companies which are offering low price services. This is the reason why most of the companies have settled as significant in the business of software development. Meanwhile you're picking the ideal software development company, there are to be various difficulties occur. The very first thing you need to consider is the experience. To make the people think that the company can help build solution as by your needs, a company must have adequate experience. There are lots of complicated difficulties occur during designing in that case experienced company having trained programmers. By this, they could keep the expertise and determination to take any ambitious trader. An experienced and well-organised company does not imply that their job is the most suitable in all areas. If you're looking to learn more about mobile web design company, click on the previously mentioned website.

You cannot judge anything on behalf of expertise as the representation of the business reduces also. So, in that type of case, you will need some references. Have a look at some companies and their job than go for the choice. Reputation plays a very important role in any company. You need to check out the company's standing even if it is experienced and has given qualitative work to its clients. The person you are going to deal with very first you've got to know that person accurately. Before looking out for a programmer, there are lots of things you have to consider. Honesty plays a vital role in between developer and customer. The growing needs with this globalized world we will need to check how experience, reliability and reputation are changing or not. Assess whether they are adjustable to alter themselves with modification. It's because, in this advanced era, nobody wants to purchase a simple laptop in the age of smart laptops.

Another thing you have to think about is the budget like how much money are you comfortable to give. If you're going for cheap software, then you face many problems later. So don't go for the templates along with other great looking websites while employing a software development company. You need to check previous clients detail why they left the company. The best software development company will allow you to improve your marketing and sales. Hence, selecting a fantastic company increases the possibilities of obtaining outcomes which are in series with your company aims. Create a brief chart of your requirement after that meeting with your team about the buying theme. Create a model that works stepwise it can help your organization to make the right decision. A great deal of time can be saved by doing this action. Also, go for security issues because, without security, everyone can access your software easily.


          

Complete Analysis On The Mobile And Web Design

 Cache   

By growing their ideas at pocket-friendly prices, software development company have helped many software aspirers. The various needs and requirements of a business are provided by a software development company. To compete with other software development companies, there are numerous companies which are offering low price services. This is the reason why most of the companies have settled as significant in the business of software development. Meanwhile you're picking the ideal software development company, there are to be various difficulties occur. The very first thing you need to consider is the experience. To make the people think that the company can help build solution as by your needs, a company must have adequate experience. There are lots of complicated difficulties occur during designing in that case experienced company having trained programmers. By this, they could keep the expertise and determination to take any ambitious trader. An experienced and well-organised company does not imply that their job is the most suitable in all areas. If you're looking to learn more about responsive and adaptive design, click on the previously mentioned website.

You cannot judge anything on behalf of expertise as the representation of the business reduces also. So, in that type of case, you will need some references. Have a look at some companies and their job than go for the choice. Reputation plays a very important role in any company. You need to check out the company's standing even if it is experienced and has given qualitative work to its clients. The person you are going to deal with very first you've got to know that person accurately. Before looking out for a programmer, there are lots of things you have to consider. Honesty plays a vital role in between developer and customer. The growing needs with this globalized world we will need to check how experience, reliability and reputation are changing or not. Assess whether they are adjustable to alter themselves with modification. It's because, in this advanced era, nobody wants to purchase a simple laptop in the age of smart laptops.

Another thing you have to think about is the budget like how much money are you comfortable to give. If you're going for cheap software, then you face many problems later. So don't go for the templates along with other great looking websites while employing a software development company. You need to check previous clients detail why they left the company. The best software development company will allow you to improve your marketing and sales. Hence, selecting a fantastic company increases the possibilities of obtaining outcomes which are in series with your company aims. Create a brief chart of your requirement after that meeting with your team about the buying theme. Create a model that works stepwise it can help your organization to make the right decision. A great deal of time can be saved by doing this action. Also, go for security issues because, without security, everyone can access your software easily.


          

Internationale tentoonstelling Together! komt naar Delft

 Cache   
De internationale tentoonstelling Together! over de toekomst van het wonen en leven in de stad komt naar Delft. Vandaag tekenden TU Delft, gemeente Delft, architectenbureau Inbo en ontwikkelaar cepezedprojects een overeenkomst om de tentoonstelling van september tot december 2020 te organiseren in het ArsenaalDelft aan de Korte Geer. DELFRT -De tentoonstelling Together! geeft antwoord op uitdagingen in de hedendaagse architectuur door collectiviteit en vraaggerichtheid centraal te zetten. De tentoonstelling vond eerder plaats in het Vitra Museum in Weil Am Rhijn - Duitsland, in Le Grand Hornu in Hornu - België en in het Grassi Museum in Leipzig - Duitsland. Nieuwe uitdagingen Stedelijk leven in de 21e eeuw stelt ons voor nieuwe uitdagingen. Betaalbaar wonen, verduurzaming van de woningvoorraad, stedelijke verdichting en slim ruimtegebruik vragen om nieuwe manieren van wonen en leven. Ook de toenemende sociale en multiculturele diversiteit van onze steden vormen een uitdaging voor de manier waarop we samen leven. Dit tijdsgewricht vraagt om experimenten. Een antwoord op deze uitdagingen is een verandering in de hedendaagse architectuur, waarbij collectiviteit en vraaggerichtheid meer en meer centraal staan tijdens het ontwerpproces. De door het Duitse Vitra Design Museum ontwikkelde en reizende tentoonstelling Together! The New Architecture of the Collective toont hiervan het resultaat. Duurzame samenwerking De tentoonstelling sluit goed aan bij de uitdagingen en toekomstige ontwikkelingen van de stad en de regio en de hierover gemaakte verstedelijkingsafspraken. Zowel Delft als de regio staat namelijk voor een grote opgave qua wonen, maar ook qua duurzaamheid en mobiliteit. Daarnaast past Together! bij de doelstellingen van Ons Delft, maak de stad! Hierin staan inspireren, ontmoeten en verbinden centraal. De tentoonstelling en de daar omheen georganiseerde programmering maken ruimte voor een gesprek tussen bewoners, beleidsmakers, bouwers en ontwerpers over deze stedelijke opgaven. Door de samenwerking met de faculteit Bouwkunde van de TU Delft, ontwikkelaar cepezedprojects en architectenbureau Inbo kan de hoognodige kennis worden ontwikkeld om hier vorm aan te geven. Inbo creëert condities voor een gezonde en inclusieve stad met woningen voor alle doelgroepen. Together! draagt bij aan de doelen die de stad Delft heeft als innovatieve en technologische hoofdstad en toeristische topbestemming in Nederland. Ook sluit de tentoonstelling aan bij het Convenant 2016 – 2026 van de TU Delft en de gemeente. Dit convenant legt de basis voor een duurzame samenwerking die zich richt op de toekomstbestendigheid van de stad en de versterking van de nationale en internationale concurrentiepositie van Delft.
          

Java SE 6 Programmer Practice Exams Exam 310 065 By Bert Bates Published December 2010

 Cache   
Java SE 6 Programmer Practice Exams Exam 310 065 By Bert Bates Published December 2010
          

Directorate of Soil Conservation, Assam Recruitment 2019: IT Programmer [2 posts] @ SLNA, WDC-PMKSY, Assam

 Cache   
State Level Nodal Agency (SLNA), WDC-PMKSY, Assam.
Last Date: 15 Days.


Applications are invited in prescribed form of application published in the official website i.e. https://soildirectorate.assam.gov.in for engagement on contractual basis under State Level Nodal Agency (SLNA), Pradhan Mantri Krishi Sinchayee Yojana-Watershed Development Component (WDC-PMKSY), Assam as below:

Name of post: IT Programmer
No of posts:
2 (Two) nos.

Remuneration:
Rs.35,000/- per month
Age: 30 - 45 years

Educational Qualification:
B. Tech. computer science/ IT/ MCA.
Experience: 2+ years post qualification experience in MIS related works, programming, Database Management System with specialization in Windows/ Linux, Project Management implementation and monitoring as well as technical consultancy in Govt./ Private Sector. Preference will be given to the candidates having knowledge in MIS and PFMS (Public Financial Management System).

How to apply: The application with all relevant testimonials (self attested copies of Age Proof Certificate, Pass Certificate, Mark Sheets, Experience Certificates etc.) shall be addressed to the Chief Executive Officer, State Level Nodal Agency (SLNA), Pradhan Mantri Krishi Sinchayee Yojana-Watershed Development component (WDC-PMKSY), Assam, Bhumi Sangrakshan Bhawan, R.G. Baruah Road, Guwahati-78l005.

Last date of submission of applications is 15 (fifteen) days from the date of publication of Notice in the Newspaper [30/11/2019].

Advertisement Details/ Application Form: Click Here .

          

Making Software Is Hard

 Cache   

It is hard for non technical people to understand the amount of work that goes on behind the scene in creating any kind of non trivial application. It is even harder to make them understand that ‘just changing x’ might not be as easy as they think it would be. Only as a software engineer yourself1 you can assume with some degree of confidence what would generally be the amount of work required for a certain feature.

I think that we have finally reached a point where everybody pretty much understands that making software is not easy. The only people who don’t are junior programmers (no pun intended, we all were juniors once) or people who take an already made application and just change the visuals (themes, re-skins,..) and call themselves software engineers. What we have not realized is the magnitude on how much it is not.

I doubt we’ll reach a point where the general population understands that most changes they think about are actually much harder to implement than they imagine anytime soon (if ever).

Sure, you might argue that some times it is the opposite. Changing something may just mean changing one line of code when from an outside perspective it might seem like not such a trivial change, but the opposite case is 99% more common.

Estimates

Deadlines

Estimates in software are notoriously hard. People underestimate work by an order of magnitude. Whatever the methodology to do estimates we may use we make the mistake of thinking about the new feature to develop in isolation. We don’t estimate the time that it might take for hiccups, interfacing with the rest of the system, or having other priorities that limit our available time to work on such feature (and so on). This results in an industry that, in general, keeps failing to keep its promise given at estimation time, with projects constantly over budget and delayed. Public projects are notorious for this (look no further than healtcare.gov as a “fairly recent” example that got a lot of media coverage), but in private projects the same is true as well.

The real problem is that once you know that you will go over time there is not really a solution to speed up.

  • Crunching

A lot of companies decide to force people to work overtime to try and complete a project in time. This will work for the first week, but as time goes on and people get less sleep consistently the start to perform worse and worse and you end up with less work than they would have done if they were working 8 hours, but well rested. This is not taking into consideration all the avverse effect on health from being overworked and not sleeping enough. Also you increase the risk of people burning out from overworking and tanking productivity even further.

  • Hiring more people

Throwing more people into the arena increases complexity so you will waste more time dealing with tooling, interpersonal relationships, some work will be blocked by pending work from someone else and so on. It might work for certain projects, but generally you only get a 0.x increase in productivity and not the expected doubling, this factor also decreases as you add more people. If 2 people instead of one gives a 1.7 factor 3 people might give a 2.2 factor (numbers not accurate, just to give an idea).

  • Decreasing Scope

The only real solution is a change in scope. If the deadline can’t be changed and we also defined that we can increase productivity after a certain extent the only thing left is to cut on features. What is really necessary for the release? Can something be cut out? We’ve seen this clearly in this year’s iOS 13. The OS was not ready for the new iPhone release so Apple decided to ship a version without some of the features announced at WWDC in June and add them a while later with iOS 13.1

Time Estimation

Time estimation in software will always be hard. You are trying to create something when the whole picture is not entirely there until after you’ve built it. That said you can use some tricks:

  • Increase your estimation

If some parts are not clear estimate them for as long as they might take while knowing that if it turns out that it is not as bad as assumed the estimation might be reduced.

  • Clarify what can be clarified

Some times you only need to talk with the client/designers more to get some nebulous parts clarified

  • Some things will always be unknown until you begin

It’s in the nature of software that some things won’t be clear until you actually start working on them. There is nothing you can do about that. What you can do is to take that into account while estimating that feature.

Conclusions

I hope I gave you some tools to give better estimates. Unfotunately you, as developer, do not have a lot of control on the design and product analysis part of the development process that might give you a clearer picture. You just need to be aware of it and act accordingly.

  1. Or as SO of a software engineer. 


          

A new technology Web Twain solution for browser applications

 Cache   

Cross-browser Document TWAIN Scanner solution

Programmers understand, but a lot of end users don’t, why web or ‘thin’ client apps running in a browser can’t easily connect to resources on your local PC or network (the local object model).

There are technical reasons and some sound security reasons. However, that doesn’t help developers who want to connect to a local TWAIN document scanner from a browser-based app to capture paper documents and convert them to digital documents.

There are several solutions out there, but they are very, very expensive and come with awful licensing and maintenance conditions and costs.

We decided to solve this problem with newly developed technology, a much lower cost and no awful licensing and maintenance conditions and costs. Our new technology solution is disruptive in that it is low cost, easy to use and easy to license; totally different to what is currently available.

Our solution is a Web Twain Software Development Kit (SDK) that comes with all the code you will need plus a sample app plus twelve months of free support and updates. Only the developer is licensed, not the end users and there are no restrictions on the distribution of the runtime (built using our SDK). There is a single upfront fee (not an annual license that needs to be renewed each year) and a maintenance agreement (after the initial twelve months) is entirely optional.

The SDK includes the ability to scan, capture, modify images, OCR images, convert to PDF format and upload to the developer’s application on the server. In short, everything you need when working from a browser to convert paper to digital and to capture and store the final document.

Our new product is under development and is expected to be released in March 2020.

Register Interest

If you would like to register your interest in this new SDK, please click on the following link:

Register Interest

Once registered, we will keep you posted on progress and answer any questions you may have.

 

Best Regards,

 

Frank McKenna, CEO


          

Programmer Analyst/Data Strategist - Jefferson Valley, NY - CONTRACTORS REGISTER/ THE BLUE BOOK NETWORK - Jefferson Valley, NY

 Cache   
Develop and maintain supporting programs using shell scripting, batch programming, Perl, and other tools. The Blue Book Network strives to be an indispensable…
From CONTRACTORS REGISTER/ THE BLUE BOOK NETWORK - Thu, 17 Oct 2019 16:20:03 GMT - View all Jefferson Valley, NY jobs
          

Comment on The Fundamental Problem in Python 3 by Chris Barker

 Cache   
I was really surprised that this was posted recently -- it sure seemed like a rant from the past, pre-py3.5 era or so. Is this really still such a big issue? (note, never been one for me :-) ). But the key thing that this post ALMOST does, that I haven't seem before is acknowledge that POSIX IS BROKEN. Sure, "a filename is simply a set of bytes" works great with the old C char* way of thinking about the world, but if you are not a programmer, you want filenames to be: readable, printable, storable in and readable from a text file, usable on a command line, etc, etc. Having filenames that will break shell use, terminals, and who knows what else, was always a really bad idea. That being said, posix has been around a long time, so it would be nice if Python was able to deal with it as it is, not as it should be. So yeah, it probably would have been better to have a "filename" type in Python that would be able to enforce the local rules, and allow essentially broken filesystems not to break Python programs. Maybe even the Path object could do that. As far as I know, no one has written such a object -- maybe because the stdlib wouldn't have been able to deal with it. But we now have the __fspath__ protocol -- so *maybe* one could write a PATH object that worked with arbitrary byte strings on a filesystem now. But the biggest issue with these rants is that they don't acknowledge that filenames with weird-ass characters in them have always caused problems (this one does, but then kinda glosses over the significance of that) -- sure, they don't cause problems when passed around as a char*, but pretty much any situation where a Python3 program will break now, there would have been breakage somewhere else instead. So maybe it's not SO important that your Python programs be able to hide what will be problems later on anyway. I big example is really, really common in my work: I need to store a filename in a text file, to be read and the file opened later. Unless I declare that all my text files are arbitrarily encode (that it, not text files :-) ), I need filenames to be valid Unicode. And heck, I'm still fighting with programs that can't handle f-ing spaces in filenames!
          

Why Every Developer Needs to be a Generalist

 Cache   

Developer Generalist vs Specialist

Context, as they say, is king.

The age-old question of exactly what a software developer should focus on learning has been crossing my mind a lot lately. More than ever, our technology is evolving at a furious pace - and the coding world is definitely feeling the pressure. It can be overwhelming to choose where to pay attention and what to dismiss as a passing fad.

So what are you to do? Let’s look at what the next decade has in store for the development world.

Past Predictions

Cory House spoke convincingly on the merits of specializing in one area to become a known and trusted voice. A few years ago, Forbes came out with a high level article proclaiming the opposite. More recently, I stumbled upon this post on Hacker Noon embracing the notion of both specialist and generalist. Which way is a developer supposed to go? The answer to this question can feel largely opinion-based but there are some logical ways to examine it. Let’s get started.

How Do I Choose the Right Tech to Focus On

This is the question for a specialist: how to leap frog from one framework lilypad to another. It’s easy to fall in love with a specific area of coding and become obsessed - I’ve certainly done it. However, it can truly lead to a head-in-the-sand position when the world moves on without you (my condolences to Windows Phone developer friends, for example).

Are You Saying I Should be a Full Stack Developer

Great question! “Generalist” doesn’t always mean “Full Stack”; they aren’t interchangeable. The traditional view of a full stack programmer referred to the web (back end and front end) but there are many different places where code plays a role!

Personally, I’ve coded for voice, IoT, APIs, timer jobs, mobile apps, intranet sites, external websites, ETLs, and the list goes on. Is any of that knowledge evergreen? Some of it! Mostly the ways in which I interacted with my team and product owner - not how I specifically customized a Sharepoint page.

You can carry a cross-section of evergreen knowledge with you as a software engineer. A specific part of those “years of experience” is still applicable to whatever you need to work on now. And that part fits neatly into being a generalist developer.

Why Does Future Tech Require a Generalist Approach

Regardless of what kind of coding you do now, areas of our industry are developing in impossible to ignore ways. Remember when Javascript started taking over the world? If you wanted to do anything in the browser, you had to learn it. Now, not only does it influence the browser - Node.js & Reactive Native have hugely influenced API and mobile app development as well.

Remember when AI was just another fad? With advancements in Machine Learning, Deep Learning and Big Data analytics - it doesn’t look so dismissable anymore.

Even if your main gig is maintaining a legacy code base, you owe it to your future self to know what tools are out there, different than what you use today. This knowledge doesn’t have to be super deep to be powerful, but you do need to know enough about current and future industry techniques to understand where your experience can fit.

What Should All Developers Learn Right Now

I’m glad you asked! There are a few areas in particular that developers really can’t afford to ignore anymore.

1. Security

Naturally, the developer relations team here at Okta cares a lot about this topic! Often, developers are content to make a system ‘just work’ well enough to get out the door for a deadline. The result is company after company coming forward and admitting to their users that their data was not securely stored or collected. This is an area you HAVE to educate yourself on.

Get started with the basics like the OWASP Top 10 security vulnerabilities. The Cheat Sheet Series is another excellent resource for app devs looking to become knowledgeable on security quickly.

Next, make sure you are coding securely from the very beginning, from how you store API keys to the way you deploy your code. This is one area you cannot afford to cut corners. We’ve got lots of blog posts here at Okta to get you up to speed on user security specifically.

2. Machine Learning

Automation will come in many forms and affect all areas of technology. You should have at least a cursory understanding of how your data is fed into various algorithms and the decisions those algorithms can make.

You’ll need to use coding languages like Python and/or R to get started in this area and there are great tutorials on using Jupyter Notebooks to help. However, if you are interested in using machine learning as a service, Microsoft has come a long way with Cognitive Services, which will allow you to use REST APIs to do basic machine learning tasks like image recognition or text analysis. No matter what business you are part of, AI is here to stay in some capacity and you will probably need to interact with it in some way.

3. DevOps/TechOps

Even if you aren’t the keeper of the big red deployment button, it’s crucial for all developers to understand how code gets to production. From mastering pull-request procedures to knowing how your application architecture impacts hosting costs, development work is intrinsically tied to ops work. This is especially true with microservices architecture, which often impact the bottom line.

Reach out to your local DevOps or TechOps meetup or user group and get acquainted with a few people who really know the practice. If that’s not an option in your area, watch a few video courses on the subject. Look into scripting tools for DevOps automation like Terraform or Pulumi. Playing with infrastructure as code can actually be quite enjoyable and a nice change of pace coming from application development. Whether you are the only technical person both building and deploying code, or you are one part of a large department with a separate DevOps team, take the time to become educated on this flow.

What Do You Think Developers Should Learn

Being a specialist can be rewarding, but being a generalist is a necessity. You truly do need a bit of both; just remember not to sacrifice general knowledge in order to focus on your preference. Security, Machine Learning, and Dev/Tech Ops are the top 3 topics I believe have strong merit at the moment, but that list is certainly not exhaustive. Comment below with what you believe every coder needs to add to their ever-growing toolbox!

Learn more about Developer Careers, Tools, and Security

If you’d like to continue reading our thoughts on developer careers, we’ve published a number of posts that might interest you:

For other great content from the Okta Dev Team, follow us on Twitter and Facebook!


          

DB2 for z/OS & DB2/LUW Database Systems Programmer

 Cache   
DC-Washington, DC, Duties and Responsibilities: Planning, installing, configuring and implementing DB2 for z/OS in a data sharing group in support of high availability. Installing, migrating, and enabling DB2 data sharing. Planning, configuring and implementing DB2 for continuous availability across planned or unplanned outage of any single hardware or software element. Planning and implementing Coupling Facility si
          

Digital Collections Front-End Web Programmer | University of Florida George A. Smathers Libraries

 Cache   
Gainesville, Florida, QUALIFICATIONS Required: A bachelor’s degree in an appropriate area of specialization and two years of appropriate experience, or an associate’s degree and four years of appropriate experience.
          

DFW Pythoneers Social Only Meetup

 Cache   

photoDFW Pythoneers

Come socialize with other Python programmers over dinner. No presentations or demos, just hanging out and chatting.

The location does have WiFi and power outlets.

November meeting changed to third Thursday to avoid conflict with Thanksgiving.

Plano, TX 75024 - USA

Thursday, May 28 at 7:00 PM

1

https://www.meetup.com/dfwpython/events/tnlwbrybchblc/


          

Software Project Night

 Cache   

photoSplat Space - Durham's Hackerspace

Come to Software Project Night with a project that you want to show off, you want to ask others for help with, or that you just want to work on.

Come to Software Project Night with a software topic you want to talk about because you think it's cool, or you want to understand it better.

Come to Software Project Night if you're a beginner or an expert programmer: sharing your unique perspective on software is what makes Software Project Night work!

Durham, NC 27701 - USA

Sunday, February 9 at 6:00 PM

1

https://www.meetup.com/splatspace/events/dctqbrybcdbmb/


          

Jedi: Fallen Order was built on compromise

 Cache   

All games are built on compromise. Coders, designers, and programmers constantly make new systems and bring them to game directors, who then whittle things down to what's important. If it makes it into the game, it's often a result of direct compromising. Jedi: Fallen Order had an extra layer of...



Read the rest in your browser! Tap or click here.


          

IT / Software / Systems: IBM iSeries RPGLE Programmer (Contract) - Tomball, Texas

 Cache   
IMMEDIATE NEED! JC2 Technologies is currently searching for an RPGLE Programmer for a client located in Northwest Houston, TX. The candidate will have the opportunity to work with a leading global manufacturing company that is rapidly expanding! The ideal candidate will have some web development experience as well as AS400 development experience. Local candidates are preferred but nonlocal candidates will be considered if candidate does not mind relocating for the duration of the project. This opportunity is a 6-month to 1 year contract, with the possibility of extension. Candidate must have RPGLE Programming experience as well as specialization in any or all of the following: Java iSeries API HTTP APIs Javascript Python node.js ()
          

Web Application Programmer

 Cache   
FL-Tallahassee, job summary: PURPOSE: This scope of work is for the client of new and existing functionalities required to support the Health Management system (HMS). 5. CONTRACTOR QUALIFICATIONS AND EXPERIENCE: Contractor staff assigned to this scope of work must possess, at minimum, the following qualifications: 5.1 5 years of experience with Software Development Life Cycle Methodology. 5.2 5 years of experienc
          

Sr. Web Application Developer

 Cache   
TX-Houston, Job Purpose The Senior Web Application Developer is responsible for developing, testing, implementing, and maintaining web-based application systems; troubleshoots system problems and issues and looks for ways to improve the application. The Sr. Web Application Developer has knowledge of a variety of concepts, practices, and procedures within the programming field; provides other programmers guida
          

Web Programmer, Node.JS, AngularJS and/or React.

 Cache   
NY-Garden City, No Consulting firms. US citizens and those authorized to work in the US are encouraged to apply. You must reside within a commutable distance from Long Island, NY to be considered. Web Developer, Application Developer, Website Development Description We are looking for a mid to senior level engineer with solid experience in frontend and backend platform development. The right candidate for this ro
          

Culture File: Mindful Facebooking

 Cache   
Artist-programmer, Ben Grosser's works, such as browser plugin, Facebook Demetricator, foster more conscious online lives
          

How to Choose the Right Programming Language

 Cache   

Nowadays the profession of a programmer becomes more and more popular. The main question that every novice programmer faces is “which programming language should I choose to work with”? There are plenty of programming languages and each has its pros and cons. The number of existing languages varies from 400 to 600. So, how to choose the right one? What to begin with? Choosing the first programming language is a very important task, as it affects the sphere in which you will work in the future. We hope this article will help you answer these questions. What to begin with?

The post How to Choose the Right Programming Language appeared first on Bullet In Tech News.


          

In de zone

 Cache   
Dat was al eens lang geleden: programmeren voor het werk. Normaal gezien doe ik dat helemaal niet, wegens gewoon tekenen en dat is dat, maar nu wou ik een prototype maken dat toch redelijk goed werkte. En dus heb ik een hele werkdag in the zone gezeten, en is er uiteindelijk iets uitgekomen dat er […]
          

This Welsh password generator might keep you safe from hackers, but definitely from dragons

 Cache   

Inspired by XKCD's classic diceware strip, a programmer named Alice created an open-source algorithm to randomly generate secure passphrases in Welsh. As difficult as it would be for any human or computer to figure out a nonsense phrase like, "correct horse battery staple," it would be even more difficult to guess, "stwffwl batri ceffyl cywir," especially when there are only about 700,000 Welsh speakers to begin with.

While I'm no cryptologist, I did run a few of the passwords through HowSecureIsMyPassword.net and My1Login.net and they seemed to work out all right. According to those sites, it would take 11 quattuordecillion years or 1 trillion trillion trillion years for a computer to crack "DrefnasidRhyd-y-meirchSefydlogiad6*." Similarly, "GlaeruchdyrauGymreigeiddiaiBarcdir0**" would take 429 tredecillion years, or 94 billion trillion trillion years, respectively.

However, as Alice the programmer warns: "It's probably not a good idea to actually use this, since the wordlist is freely available along with the algorithm being used."

So it might not stop a really clever hacker from getting into your email. But it will almost certainly stop a mythic Welsh dragon from stealing your identity. Probably. I'm assuming their claws are pretty clumsy on the keyboard.

Welsh Password Generator [WheresAlice.info]

Image via Lewis Ogden/Flickr (altered)

*Google Translate tells me this means, "The ford of the horses was arranged." I don't know that I trust it—Google Translate is famously sloppy with the grammar of some Celtic languages—but it certainly sounds epic.

**Similarly, this became "Parkland was a Welsh occupation" which sounds like something you would hear on the Breton version of InfoWars. Read the rest


          

Comment on How Democrats Can Build A Stronger Case To Impeach President Trump by Michael Aarethun

 Cache   
Seig Us No Heils Kamarad but sorry without any facts REJECTED. The difference between serving as programmer as a machinie part and we who support The Constitution. Ad Machina.
          

Castration psychologique

 Cache   

Selon une récente enquête, 25 % des hommes seraient en détresse psychologique. Ce taux grimpe à 43 % chez ceux âgés de 25 à 34 ans. On sait également que les hommes sont trois fois plus nombreux à se suicider que les femmes. Pour toute réaction, on déplore le fait que les hommes consultent peu, et on appelle à augmenter les services. En revanche, c’est l’omerta sur les raisons profondes à l’origine de ce mal-être quasi épidémique.

Misandrie

Si le sujet est tabou, c’est pour occulter une réalité qui dérange, à savoir que, sous l’influence de l’évangile néoféministe, la société flirte avec la misandrie. L’homme, surtout s’il est blanc et hétérosexuel, est aujourd’hui systématiquement démonisé. La masculinité est dite « toxique » et il faut la réprimer pour créer des hommes roses.

Ainsi, à l’école comme à la maison, on nie la nature et les besoins des garçons et on leur impose des comportements de filles, quitte à recourir à la médication pour les « calmer ». Dans la culture populaire, l’homme est, au mieux, ridiculisé en le présentant comme un parfait crétin. Mais généralement, il est présenté comme un dangereux oppresseur dont il faut se méfier, une bête indomptée qu’il faut absolument reprogrammer. On médit allègrement sur l’homme, et on lui attribue des épithètes qu’on n’emploierait jamais pour qualifier quelque groupe que ce soit. Or, à force de l’humilier, on lui a inoculé la honte.

Virilité

Déviriliser l’homme, sinon carrément le féminiser, est devenu le projet social des « progressistes ». Ils nient les qualités nobles de la virilité comme le courage, la force, l’honneur et le sacrifice pour n’invoquer que les dérives de quelques déchets de l’humanité.

Si tant d’hommes souffrent de détresse psychologique, c’est peut-être parce qu’ils vivent une crise identitaire, voire existentielle, causée par une société qui les émascule dès l’enfance. Que les néoféministes l’admettent ou non, la castration psychologique est destructrice !

 


          

Trump Got His Wall, After All

 Cache   

IN THE TWO YEARS AND 308 DAYS THAT DONALD Trump has been president, he has constructed zero miles of wall along the southern border of the United States. He has, to be fair, replaced or reinforced 76 miles of existing fence and signed it with a sharpie. A private group has also built a barrier less than a mile long with some help from Steve Bannon and money raised on GoFundMe. But along the 2,000 miles from Texas to California, there is no blockade of unscalable steel slats in heat-retaining matte black, no electrified spikes, no moat and no crocodiles. The animating force of Trump’s entire presidency—the idea that radiated a warning of dangerous bigotry to his opponents and a promise of unapologetic nativism to his supporters—will never be built in the way he imagined.

And it doesn’t matter. In the two years and 308 days that Donald Trump has been president, his administration has constructed far more effective barriers to immigration. No new laws have actually been passed. This transformation has mostly come about through subtle administrative shifts—a phrase that vanishes from an internal manual, a form that gets longer, an unannounced revision to a website, a memo, a footnote in a memo. Among immigration lawyers, the cumulative effect of these procedural changes is known as the invisible wall.

In the two years after Trump took office, denials for H1Bs, the most common form of visa for skilled workers, more than doubled. In the same period, wait times for citizenship also doubled, while average processing times for all kinds of visas jumped by 46 percent, even as the quantity of applications went down. In 2018, the United States added just 200,000 immigrants to the population, a startling 70 percent less than the year before.

Before Trump was elected, there was virtually no support within either party for policies that make it harder for foreigners to come here legally. For decades, the Republican consensus has favored tough border security along with high levels of legal immigration. The party’s small restrictionist wing protested from the margins, but it was no match for a pro-immigration coalition encompassing business interests, unions and minority groups. In 2013, then-Alabama Senator Jeff Sessions introduced an amendment that would have lowered the number of people who qualified for green cards and work visas. It got a single vote in committee—his own. As a former senior official at the Department of Homeland Security observed, “If you told me these guys would be able to change the way the U.S. does immigration in two years, I would have laughed.”

PRESIDENT DONALD TRUMP REVIEWS PROTOTYPES FOR HIS “IMPENETRABLE, POWERFUL, BEAUTIFUL” WALL. (AP/EVAN VUCCI)

Senior adviser Stephen Miller is usually regarded as the White House’s immigration mastermind, but his maneuvering is only a sliver of the story. The most fine-grained and consequential changes would never have been possible without a group of like-minded figures stationed in relevant parts of the government—particularly the United States Citizenship and Immigration Service, the agency within DHS that administers visas. Early in Trump’s presidency, said the former DHS official, there was a “strategic sprinkling” of people who “shared a common vision and were ready to outwork everybody.” They included Gene Hamilton, Miller’s “terrible sword at DHS” (his actual title was senior counselor to the secretary), and Francis Cissna, the soft-spoken former head of USCIS whom colleagues describe as “an encyclopaedia of immigration law” and “a total immigration nerd.” “If you said to him, what’s on page 468, second paragraph” of the Immigration and Nationality Act, another former DHS official marveled, “he would quote it to you.”

Amidst the chaos at DHS, the restrictionists have already radically scaled back America’s asylum and refugee programs for years to come. But no category of immigrant ( 1 ) The major avenues for legal immigration are via family (including marriage), employment and humanitarian programs for refugees and asylum seekers.has escaped the uptick of denials and delays—not the Palestinian student with a Harvard scholarship who was deported upon landing in Boston, or the Australian business owner forced to leave after building a life here. Not the Bolshoi Ballet stars who somehow failed to meet the criteria of accomplished artists, or the Iraqi translators who risked their lives for the U.S. military and whose annual admissions went from 325 to just two after the change in administration. Then there are the consequences that are harder to capture in headlines or statistics: the couples whose marriages broke down when the foreign spouse was forced to wait far longer than usual in their home country, and the unknown number of people who have abandoned the attempt to stay because of financial hardship or the strain of living with a level of uncertainty that becomes untenable.

“What became clear to me early on was that these guys wanted to shut down every avenue to get into the U.S.,” the first former senior DHS official said. “They wanted to reduce the number of people who could get in under any category: illegals, legals, refugees, asylum seekers—everything. And they wanted to reduce the number of foreigners already here through any means possible.” No government in modern memory has been this dedicated to limiting every form of immigration to the United States. To find one that was, you have to go a long way back, to 1924.

GERMAN-JEWISH REFUGEES ABOARD THE MS ST. LOUIS, WHICH WAS TURNED AWAY FROM THE UNITED STATES AND CUBA IN 1939.(BETTMANN VIA GETTY)

“ANATION OF IMMIGRANTS”—THESE FOUR WORDS, ( 2 ) The phrase was popularized by John F. Kennedy, who used it as the title of his 1958 book.genius in their concision, mask the messiest of histories. People like to recall that George Washington wanted America to “be an Asylum to the persecuted of the earth.” Less often praised: Ben Franklin’s contention that immigrants are “the most ignorant Stupid Sort of their own Nation.” Americans have been having some version of this argument ever since. And for much of the country’s existence, public opinion towards immigration has ranged from tepid to hostile. As Daniel Tichenor, author of the comprehensive history, “Dividing Lines,” puts it, “We love the immigrant past and dread the immigrant present.”

One rare exception came after the Civil War, when the country was desperate to replace the men who had died on the battlefield. A flourishing postwar confidence revived the idea that the country could absorb a never-ending stream of foreigners and fuse their best characteristics into that superior being, an American.

The turn began in the 1880s. Extremes of wealth had sparked massive labor strikes; out West, people fretted that the land was running out. Now, newcomers were a threat, and the more foreign they seemed, the more threatening they were. An early warning was the Chinese Exclusion Act of 1882, the first-ever prohibition of all people of a specific race. Over the next decade, a surge of European migrants accounted for 40 percent of population growth. From the 1890s, this wave was dominated not by English, Scandanavians, Germans or Irish, but by poorer southern and eastern Europeans and Russian Jews. As the country slid into a long depression, the new immigrants became the source and the target of a tinderbox anxiety. There were lynchings of Italians in New Orleans; attacks on Jewish farmers by Mississippi nightriders; a riot against Russian Jewish factory workers in New Jersey.

EDITORIAL CARTOONS FROM THE 1880S-1900S (ABOVE: LOUIS DALRUMPLE. BELOW: C.J. TAYLOR/ MICHIGAN STATE UNIVERSITY MUSEUM)

For decades, nativists in Congress tried and failed to translate this hostility into new immigration laws. It wasn’t until the early 1920s, after Warren Harding was elected president on an “America First” platform, that two Republican lawmakers, Representative Albert Johnson and Senator David Reed, finally realized a restrictionist dream: a comprehensive racial quota system devised to keep American bloodlines pure. “[T]he country would never be the same,” wrote John Higham in his definitive account of American nativism, “Strangers in the Land”—“either in its social structure or in its habits of mind.”

To build the public case for their legislation, Johnson and Reed teamed up with the leading eugenicists of the day. Johnson enlisted Harry Laughlin, who in 1936 received an honorary degree from a German university for his contributions to the “science of racial cleansing,” to conduct research for the House Immigration Committee. Johnson also worked closely with Madison Grant, whose manifesto, “The Passing of the Great Race,” is a deranged codification of white men into three “races” of descending desirability—Nordics, Alpines and Mediterraneans. Grant’s conclusion, drawn from spurious analyses of skull shape and nose width, was that the new immigrants should be scientifically excluded from the definition of whiteness. They were “human flotsam … breeding out their masters and killing by filth and by crowding as effectively as by the sword.”

In 1924, President Calvin Coolidge signed the Johnson-Reed Act, which accorded with his own belief that that “America must be kept American.” The law would ultimately shut down most immigration except for a meager inflow dominated by people Madison Grant would have called Nordics. Everyone else faced waitlists of 10 to 75 years, depending on the quota allotted to their country of origin. The law also birthed a national immigration bureaucracy—what Tichenor calls “an increasingly elaborate immigration control system of racist design.”

Until this point, nearly everyone who arrived at a port of entry like Ellis Island was admitted to the United States. There was no requirement for a visa. Johnson-Reed was deliberately engineered to prevent most immigrants from ever boarding a steamship, by requiring them to obtain visas from U.S. consulates abroad. The State Department, which ran the consulates, was notoriously anti-Semitic: In 1921, the chief of the Consular Service supplied a report to Congress describing Jewish people as “filthy, un-American, and often dangerous in their habits.” By the 1930s, as Hitler launched his assault on the Jews of Europe, the new visa system was perfectly calibrated not to help the growing ranks of refugees, but to keep them out.

In 1934, President Franklin Roosevelt ordered consulates to give Jewish refugees “the most humane and favorable treatment possible under law.” After that, admissions actually went down. Mere presidential preference was no match for the immigration bureaucracy, which erected, in the words of historian David Wyman, a formidable “paper wall.”

The paper wall’s architect was Samuel Miller Breckinridge Long—Breckinridge Long to the public. Thin and rangy, intermittently beset by nervous ailments, Long was born to a family that was practically Confederate aristocracy. He’d glided through Princeton, married into money and spent a good deal of his career as a bureaucrat of middling talents. Thanks to his old pal “Frank” Roosevelt, in 1939 he was put in charge of refugee admissions, though he had no relevant experience. From then on, Roosevelt essentially abdicated refugee policy to Long because he was so spooked by the politics: In 1938, the year of Kristallnacht, 86 percent of Americans opposed an emergency increase of refugee admissions.

BRECKINRIDGE LONG (MYRON DAVIS/THE LIFE PICTURE COLLECTION VIA GETTY)

From the nativists' perspective, Long was the best possible man for the moment. He believed the overwhelming majority of refugees were propagandists, subversives, freeloaders and derelicts. And he knew exactly how to protect his country from the “alien influx”—with the merciless application of rules, regulations, procedures and forms.

In 1940, Long issued a memo instructing subordinates to avoid granting visas to European refugees for a “temporary period of indefinite length.” From today's vantage point, his methods are eerily familiar. “We could do this by simply advising our consuls to put every obstacle in the way and to require additional evidence and resort to various administrative devices which would postpone and postpone and postpone the granting of the visas,” he explained. Later, he would crow in his diary: “The cables practically stopping immigration went!”

Consular officials had enormous latitude in determining a refugee’s fate. In France, you had to obtain an exit visa, a transit visa, an entry visa for the U.S., moral and political affidavits of support, certificates of good behavior and a paid ticket for the ship. You couldn’t get a visa without a ticket, which were sold out months in advance, and you couldn’t get a ticket without a visa, which were only valid for four months, and if just one of your documents had expired on the day of departure, you had to start all over again.

“IT TAKES MONTHS AND MONTHS TO GRANT THE VISAS AND THEN IT USUALLY APPLIES TO A CORPSE.”

One of the most powerful tools employed by visa officials was the public charge rule—a component of federal law which states that a person can’t be admitted to the United States if they are likely to become a burden on the state. Although the rule had been on the books since 1882, it was barely observed until the Depression. Under Long, consulates wielded it with abandon. To Jewish refugees of Nazi Germany, the rule must have seemed like a sadistic joke, since throughout the 1930s they had been forced to relinquish up to 90 percent of their capital when they left the country. Even if they were lucky enough to have American financial sponsors, the standards of proof were constantly shifting. As a result, there were multiple years after Hitler seized power in which the U.S. did not fill its annual quota of just under 30,000 immigrants from Germany. In 1938, for example, the State Department admitted 19,552 former residents of the Third Reich, not all of whom were Jewish.

And yet Breckinridge Long wasn’t satisfied. Convinced Germany was infiltrating America with spies disguised as refugees, he created, for the first time, a centralized immigration processing system based in Washington. Applicants submitted letters of support, financial records and character testimonies. Sponsors were scrutinized. Five committees from different agencies reviewed every application. After that, the flow of refugees nearly stopped altogether. In a speech, Representative Emanuel Cellar blamed Long for the “gruesome bottleneck.” He observed: “It takes months and months to grant the visas and then it usually applies to a corpse.”

A MEETING OF THE WAR REFUGEE BOARD IN 1944. SECRETARY OF THE TREASURY HENRY MORGENTHAU, JR., IS IN THE CENTER. (FRANKLIN D. ROOSEVELT LIBRARY)

In January 1944, Treasury Secretary Robert Morgenthau demanded a meeting with Roosevelt and Long to discuss the situation. He came armed with an investigative memo, which he titled “Report to the Secretary on the Acquiescence of This Government in the Murder of the Jews.” It documented Long’s machinations in devastating detail. Roosevelt immediately agreed to create a War Refugee Board outside Long’s control. Its work during the remainder of the war demonstrated just how many more lives could have been saved: According to Wyman, it managed to rescued around 200,000 people in 18 months.

Long fumed at his demotion, raging to his diary that he had been “thrown to the wolves.” One of his great regrets was that he no longer enjoyed the favor of his old friend Frank. The loss of status gnawed at him. He retired by the end of 1944, and after writing a memoir that failed to find a publisher, mostly concentrated on breeding race horses, which usually lost. To the end of his life, according to his biographer, Neil Rolde, he never acknowledged, or apparently even realized, the magnitude of what he had done.

And yet even after the horrors of the Nazi regime were fully revealed, Johnson-Reed wasn’t overturned for another two decades. The law that replaced it, the Hart-Cellar Act of 1965, is often celebrated as the moment that America opened its doors to the world. At the time, though, its authors had more modest goals. Shamed into action by the civil rights movement, they planned to abolish the racial quotas and create a merit system allowing for limited immigration from outside of Europe.

It was only a last-minute nativist intervention that turned the law into something very different. An antsy Democratic congressman named Michael Feighan secured a provision allowing people to qualify through family ties as well—reasoning that since most immigrants were white, it would protect the racial status quo. “The bill that we sign today is not a revolutionary bill,” President Lyndon Johnson promised. “It will not upset the ethnic mix of our society,” Senator Ted Kennedy agreed.

Instead, the law changed the composition of America by accident. Among other things, Feighan completely failed to consider that people from non-European countries would qualify under the merit system and then sponsor their relatives, the process restrictionists term “chain migration.” ( 3 ) “Congress was saying … 'We need to open the door for some more British doctors, some more German engineers,’” sociologist Stephen Klineberg told NPR. “It never occurred to anyone, literally, that there were going to be African doctors, Indian engineers, Chinese computer programmers who’d be able, for the first time in the 20th century, to immigrate to America.”The foreign-born population grew from 9.6 million in 1965 to 45 million in 2015, with 90 percent of those new arrivals coming from outside Europe—mostly from Asia, Africa, and Latin America. The United States became, wrote historian Aristide Zolberg, “the first nation to mirror humanity.” To restrictionists, the 1965 reforms are the original sin, the moment when America betrayed its workers, sacrificed a mythic social cohesion and placed the country’s heritage and its future at mortal risk. And ever since, reversing those reforms has been their overriding goal.

NEW CITIZENS IN LOS ANGELES ON SEPTEMBER 13, 1995.(GILLES MINGASSON/GETTY)

BACK WHEN JEFF SESSIONS WAS A U.S. SENATOR, HE routinely selected a few staffers to join him in his office for a seminar-style discussion of whatever happened to be on his mind that day. Increasingly over the years, the subject was immigration. These conversations could last for hours. Some staffers surreptitiously tried to work on their phones while the senator dialed up an academic or wended his way through an idea as if preparing to argue a case before a jury. But Sessions’ communications director, Stephen Miller, was invigorated by the intellectual exchange. “They kind of fed off each other,” said one regular attendee. Late in the day, Sessions often took Miller along to his hideaway—the unmarked nook each senator has near the chamber. There, Sessions would decant that day’s conversation into a speech written on a legal pad and deliver it on the floor. “I don’t know how many people listened,” a former staffer said.

Miller, though, was paying close attention. He’d been railing against immigrants since his high school days as a minor conservative talk radio celebrity in Santa Monica, but his vitriol tended towards the generic—immigrants shouldn’t speak Spanish; their communities were incubators for terrorism and crime. By contrast, Sessions’ desire to curb immigration was part of a wider set of concerns about Americans who had been shut out of the modern economy, underpinned by a cohesive historical argument. On numerous occasions, he praised Johnson-Reed, ignoring its explicitly racist motivations and painting it simply as an effort by Coolidge to raise wages, as well as the sole engine of America’s postwar prosperity.

THEN-SENATOR JEFF SESSIONS AND HIS COMMUNICATIONS DIRECTOR, STEPHEN MILLER, IN JANUARY 2014 (ANDREW HARNIK/THE WASHINGTON TIMES)

Similar historical references were cropping up in Miller’s private emails, too. In a series of messages from 2015 obtained by the Southern Poverty Law Center, Miller pinged Breitbart reporter Katie McHugh with ideas for stories celebrating “the heritage established by Calvin Coolidge” and lamenting the damage done by the 1965 legislation. The culmination of the Miller-Sessions mindmeld was a 25-page primer hand-delivered to every Republican congressional office that year. Written by Miller, it lauded the 1924 reforms for ushering in “a sustained slowdown that allowed wages to rise, assimilation to occur, and the middle class to emerge.” It would become a foundational document for the Trump campaign’s immigration platform.

The day after Trump’s election victory, Gene Hamilton started assembling a team to develop an immigration roadmap for the transition and beyond. Hamliton, then a legal adviser to Sessions in his thirties, relied heavily on staffers for Sessions and Senator Chuck Grassley, whose offices had for years been a lonely beacon for restrictionist groups like the Federation for American Immigration Reform, or FAIR; the Center for Immigration Studies and NumbersUSA. From the outset, according to “Border Wars,” by Julie Hirschfeld Davis and Michael Shear, Hamilton’s small braintrust knew they had to fight on two fronts—against liberal-minded career staffers and mainstream Republican appointees wedded to the status quo.

Hamilton himself had a deep knowledge of DHS ( 4 ) Before working for Sessions, Hamilton had spent two years working for various DHS offices, and also interned at Immigration and Customs Enforcement while in law school.and a knack for the inside game, both of which became valuable assets when he joined the department. “He would take the pen on a lot of things,” the former DHS official said—meaning he’d assume responsibility for writing a document, giving him the power to set the terms of the debate and the process. “He was sort of the political commissar,” another former senior DHS official explained. “You had to work with him to make sure you weren’t going to get your legs chopped out underneath you.”

For USCIS director, Hamilton recommended Cissna, a DHS lawyer who’d spent the past two years detailed to Grassley’s office. “Our family is literally a product of our nation’s legal immigration system,” Cissna said at his confirmation hearing, explaining that his grandparents were Peruvian, his wife’s family was Middle Eastern and that he only spoke Spanish to his kids at home. Although he largely shared Miller’s policy goals, his position on immigration “wasn’t a race thing,” the second former DHS senior official told me. Instead, the official said, Cissna saw himself as a “steward of the law,” which he believed should be enforced according to the narrowest interpretation. Quiet and not overtly political, he was nonetheless a canny operator. When he took over at USCIS, “he knew which small things could change to have a big effect,” said Mark Krikorian, the executive director of the Center for Immigration Studies. “He couldn’t be bamboozled by bureaucrats. He knew their job in a way a lot of political appointees don’t.”

FRANCIS CISSNA. (WIN MCNAMEE/GETTY)

Kathy Nuebel Kovarik, a veteran Grassley staffer, was put in charge of the USCIS policy office a couple of weeks after her former boss recommended her to Trump via tweet. (“@POTUS If u want a real expert on fixing H1B a former staffer of mine just moved to HomelandSecurity Call my office I will tell WHO SHE IS.”) She brought in Robert Law, FAIR’s governmental relations director, as her senior adviser. Law was smart but rigid. “You couldn’t convince him of anything he didn’t already believe,” said a person who worked with him at USCIS. Along with other alumni of restrictionist groups, ( 5 ) Julie Kirchner, a former FAIR executive director, became USCIS ombudsman, and Jon Feere, a former CIS analyst, became a senior adviser at ICE.Law became a resource for some DHS officials who lacked an immigration background but found the issue consuming their jobs. “They could tell you, this is the law, this is the history of it. It was fascinating,” said one. “They had been following this for decades.”

At first, things didn’t move as nearly quickly as Miller and Hamilton wanted, mostly because of Trump’s first DHS Secretary, John Kelly. “He was a difficult guy for people to mess with. Even Stephen Miller,” recalled the former DHS official. It wasn’t until Kelly became White House chief of staff in July 2017, another former official explained, that Miller was able to “consolidate his strength.”

A couple of months later, a meeting was convened at the department, with the acting secretary, Elaine Duke, the most senior figure present. According to a person who was there, Hamilton abruptly took control of the gathering, cutting Duke out of the conversation completely. “Everyone was looking at each other. We’d never seen anything like this—a guy with no standing [taking over the meeting].”

Hamilton informed the group they needed to produce memos outlining how to enact 10 White House policy priorities, including how to get rid of a 20-day limit on holding children in detention and how to use family separation to discourage migration. He wanted the memos within days.

The DHS policy office started work according to normal operating procedure—gathering information and assessing the legality and merits of the proposals. Normally, this would take months. “It drove the White House crazy,” said the former DHS official. “Duke’s chief of staff kept asking, ‘Dude, where are the memos?’ He was getting pounded by the White House.” Many of the memos were never produced, the official added, because “some of the [ideas] were so clearly bad.” (Hamilton didn’t respond to a request for comment.)

GENE HAMILTON “WAS SORT OF THE POLITICAL COMMISSAR,” A FORMER OFFICIAL SAID. “YOU HAD TO WORK WITH HIM TO MAKE SURE YOU WEREN’T GOING TO GET YOUR LEGS CHOPPED OUT UNDERNEATH YOU.”

At USCIS, the pressure to scrap old policies and roll out new ones was relentless. In theory, the chief counsel’s office was supposed to conduct thorough legal analyses of all new initiatives. Sometimes the office was cut out of the loop; sometimes lawyers were informed of a new memo the day before it dropped, requiring them to scramble till midnight or later to ensure it met basic legal standards. Comment skirmishes broke out within draft documents, with career staff inserting concerns and political appointees stripping them out. The political appointees “really didn’t care about the operational impact of different policies or litigation concerns,” recalled a former agency lawyer. Hamilton himself has essentially confirmed this. “That sounds like the craziest policy you could ever have,” he said in a deposition when asked if DHS had assessed the litigation risk of ending Deferred Action for Childhood Arrivals, or DACA. “You could never do anything if you were always worried about being sued.”

Kovarik and Law also pushed staffers to dig up evidence for their preferred policies, even when the facts didn’t oblige. For instance, they insisted on advancing the termination of temporary protected status ( 6 ) A temporary status provided to nationals of certain countries experiencing problems that make it difficult or unsafe to return there.for several “shithole countries”—the president’s term—even when experts at State and USCIS recommended extensions. The problem with the official analysis for Haiti, Kovarik explained to a career staffer in an October 2017 email, “is that it reads as though we’d recommend an extension because we talk so much about how bad it is.” The staffer replied, carefully, "We can comb through the country conditions to try to see what else there might be, but the basic problem is that it IS bad there.” Later that month, Law assigned an “important research project” to a low-level employee. “I need positive data on the current status of Haiti to bolster the recommendation to terminate TPS. Improvements or the like that I can plug in,” he wrote. “Be creative.”

In a separate exchange, Cissna complained that staffers hadn’t done a very elegant job of massaging the facts in order to end TPS status for Sudan. "The memo reads like one person who strongly supports extending TPS for Sudan wrote everything up to the recommendation section and then someone who opposes extension snuck up behind the first guy, clubbed him over the head, pushed his senseless body of out of the way, and finished the memo,” he wrote.

Even though USCIS had announced plans to kill DACA and end TPS for six countries, the political appointees were being bombarded by Miller to go faster. One of his obsessions was a regulation for a far tougher version of the public charge rule, which had to go through a mandatory administrative process. In June 2018 emails obtained by Politico, Miller berated Cissna for the “unacceptable” timeframe, writing, “I don't care what you need to do to finish it on time.” Cissna stuck to his principles. “He believed,” said the former DHS official, that “this could all get done through the rule of law.”

ACTIVISTS OUTSIDE THE SUPREME COURT IN NOVEMBER, FOLLOWING A HEARING ON DACA.(CHIP SOMODEVILLA /GETTY)

OVER AND OVER, IN PUBLIC AND TO HIS STAFF WITHIN USCIS’s boxy beige headquarters on Massachusetts Avenue, Cissna insisted that his mission was simply to enforce the law as it was written. At an event last year, he brought along his copy of the Immigration and Nationality Act, a brick of a book stuffed with yellow post-it notes, and patted it almost affectionately. “Everything we do at the agency should be guided by that, not by, you know, any other thing,” he said in his halting manner. “That’s our Bible.”

It was an effective claim, and a disingenuous one. So much of America’s immigration code is open to interpretation. There’s no objective test for whether a concert violinist meets the legal standard of “exceptional;” whether a full-stack Java developer is a “specialized” occupation; whether a certain type of kidney condition technically qualifies as a “hardship.” Many decisions inevitably come down to the judgement of individuals, which means they’re susceptible to the peculiar psychology of the immigration bureaucracy.

“In my own office, I am queen,” one former visa adjudicator told me. What she meant was that the guy down the hallway might require a lot more evidence than she did, or interpret the legal criteria more stringently, and that it wouldn’t be remotely strange if they each reviewed the same case and reached opposite conclusions. Within processing offices, “people get reputations,” she said. There are the officers inclined to give applicants the benefit of the doubt and those hunting for a reason to deny. Many aren’t ideological at all, but are swayed by the preferences of their supervisors. “Everyone learns to write for the teacher,” one officer observed.

All this variability gives each USCIS office a distinct culture. It’s why lawyers regard the Vermont processing center as reasonably fair and efficient and the one in California as more of a crapshoot. You can sense these distinctions as an immigrant, even if you don’t understand them. You file one application and it goes through smoothly; then a subsequent one gets snagged on some unseen impediment. A new boss, maybe, or a big immigration controversy, or some directive that causes the culture within the agency to change.

A few months after Cissna was confirmed, in February 2018, he removed the phrase “nation of immigrants” from USCIS’s mission statement. Less noticed but more significant was his decision to strip references to “customer service” from internal manuals. Staffers knew exactly what this meant. USCIS started referring to applicants as “customers” during the Obama administration, and the change was detested by more skeptical employees, who preferred terms like “foreign nationals” or “aliens.” León Rodriguez, the agency’s director from 2014 to 2017, explained that the deletion of the word “customer” could reshape every aspect of an officer’s work: “It’s a statement that your performance will not be judged based on how you treat the people with whom you’re interacting. Your courtesy, transparency, care in explaining things, compassion. Over time that changes what people prioritize.”

“THE STATISTICS FOR VISA APPROVALS AND DENIALS FOR THE LAST DECADE WERE RELATIVELY CONSISTENT,” SPAULDING SAID. “THEN ABOUT TWO YEARS AGO, ALL HELL BROKE LOOSE.”

The new priority was visa fraud. There had long been a subset of staffers, including upper-level employees, who were convinced that most immigrants were trying to cheat the system in some way. They were mostly kept at bay because the agency’s own statistics showed consistently low levels of fraud. Under Cissna, that all changed. “There was a sense of urgency across the agency that was palpable,” said Spaulding, who worked as an investigator for the fraud unit in Philadelphia from 2006 until 2019. He described the new mandate as: “Your job as adjudicator is to ferret out fraud. Good adjudicators find fraud. Bad ones don’t.” Adjudicators were also trained in more adversarial styles of interviewing, Spaulding said, “like a Customs and Border Protection officer.” (USCIS spokesperson Matthew Bourke said adjudicators regularly receive training to detect fraud but are not instructed to be adversarial.) Across the agency, there was a pronounced shift to what Rodriguez called a “law enforcement model—the sort of culture change very much driven from the top.”
Meanwhile, the political appointees under Cissna were churning out memos announcing administrative changes to visa processing that were devastating in their banality. “If you go through the statistics [for visa approvals] for the last decade, they were relatively consistent,” Spaulding said. “Then about two years ago, all hell broke loose.”

The first memo, issued in October 2017, eliminated something called “prior deference.” Previously, if a person had been greenlit multiple times for certain visas, the adjudications officer would check the circumstances that had changed since the last one. Now, every petition has to be reviewed as if the person was a first-time applicant—a vastly more time-consuming exercise. A former USCIS lawyer told me the memo was very much motivated by the new emphasis on fraud: Excavating old applications provided an opportunity to “get that gotcha moment.” Publicly, though, the agency couldn’t cite that as the justification, “because the stats didn’t back it up. So we had to say something else.”

The administration, Miller included, often insisted that its policies weren’t anti-immigrant, that it wanted to prioritize high-skilled workers over family-based migrants. And yet the changes coming out of USCIS seemed designed to make it difficult for those workers to come to the United States, too. Denials for first-time H1B applicants, who need a bachelor’s degree, jumped from 6 percent in the 2015 financial year to 32 percent in the first quarter of 2019. And even those numbers don’t tell the full story. An H1B visa typically lasts three years, but lawyers report a pattern of approvals for durations so short they are effectively useless—a week or even a day. In a hearing in D.C. district court, the judge asked the lawyer representing USCIS whether a one-day approval was “as good as a denial.” The government’s lawyer admitted: “There's little practical difference, I would agree with that.”

EVERY USCIS OFFICE HAS ITS OWN DISTINCT CULTURE. (JOHN MOORE/GETTY)

For immigrants trying to navigate the rapidly changing rules, everything just kept getting harder. The length of most forms has doubled or tripled or worse. Fees are going up for many visas. Under a new policy of mandatory in-person interviews for employment green cards, the average processing time has gone from around 10 months to more than two years in multiple cities. Yet another memo enabled the government to reject applications without giving the person a chance to correct errors, even incredibly trivial ones. ProPublica found a case that was rejected “because the seventh page, usually left blank, was not attached.” Another was denied “because it did not have a table of contents.” (USCIS has since said it does not intend to reject petitions for “innocent mistakes.”) Meanwhile, the agency has barricaded itself from communication. It is in the process of shuttering 16 of its 23 international offices. Where lawyers could once call or email the office that was handling a case, now they spend hours on hold in a Kafkaesque game of phone tag with a national customer service center. If they miss a return call, they have to start the inquiry from the beginning.

Inside USCIS, the new restrictions and requirements created a “pattern of chaos,” Spaulding said, as adjudicators struggled to “respond to what they think their superiors want.” For instance, the agency is issuing far more RFEs, or requests for additional evidence. ( 7 ) In the first quarter of 2019, the agency issued RFEs in 60 percent of H1B cases, compared to only 20 percent in 2016.“RFEs used to be common sense under Obama—if you can show the evidence, you get approval,” said Matt Cameron, a Boston lawyer who handles both employment and asylum cases. Now, they’re used as a stalling device. Lawyers are routinely asked for basic documents they’ve already submitted. One attorney was told to prove that the client’s mechanical engineering degree was relevant to his job as a mechanical engineer. Another was instructed to provide additional evidence that her client’s marriage was genuine. “I’m like, are you high?” the lawyer said. “Two people who have adopted a child together eight years ago have a fake marriage?”

More often, though, attorneys say they simply receive the same vague, boilerplate questions for multiple clients. For an officer behind on his caseload, Spaulding explained, an RFE is “one of the best ways to buy time.” While the applicant prepares a response, the case is no longer counted as open on the officer’s docket. By the end of 2018, USCIS’s total backlog of pending cases was a record 5.7 million.

Still, Stephen Miller wasn’t satisfied. He kept pushing Cissna to rush out the public charge regulation before it had been fully vetted. When word started to spread that Cissna could be forced out, restrictionist groups told reporters his ouster would be a “colossal mistake.” But it was too late. On May 24, Cissna resigned at Trump’s request in a Miller-driven purge that also claimed DHS Secretary Kirstjen Nielsen. (Cissna didn’t respond to requests for comment.) For the past two years, one USCIS career staffer recalled, she and her demoralized colleagues kept telling themselves that “it could be worse.” Then, in June, Ken Cuccinelli was named the agency’s acting director—“and it did get worse.”

A MAKESHIFT ENCAMPMENT AT THE U.S. BORDER PATROL STATION IN MCALLEN, TEXAS, THIS MAY.(REUTERS/LOREN ELLIOTT)

LATE THIS SUMMER, KEN CUCCINELLI INSTALLED A lumpy human-sized replica of the Statue of Liberty in USCIS headquarters, by a window overlooking Massachusetts Avenue. It was a very on-brand bit of trolling: About two weeks earlier, he had finally announced the public charge regulation at a press conference at the White House. There, Cuccinelli suggested that the famous Emma Lazarus poem affixed to the Statue of Liberty (the real one) would be more accurate if it read: “Give me your tired and your poor who can stand on their own two feet and who will not become a public charge.” The poem, he added, was about “people coming from Europe.”

Cuccinelli is a very different political animal from Cissna, one far more suited to Trumpworld. One of his conditions for accepting the job, according to a source, was that a government car ferry him every day to Washington from his home an hour and a half away in rural Nokesville, Virginia. A conservative purist with a showman’s instinct, he tweets a lot, often about Immigrations and Customs Enforcement or CBP operations that seemed to excite him more than the work of his own agency. Some of the tweets are transparently bespoke for an audience of one. In September, he posted an image of a framed photograph of Trump next to a giant stack of paper, which was a new USCIS policy changing all uses of “foreign nationals” to “aliens.”

KEN CUCCINELLI WITH LADY LIBERTY AND WITH CBP OFFICERS ON THE RIO GRANDE. (@USCISCUCCINELLI/TWITTER)

He also shares his boss’s impatience with the slow pace of policy-making. “It seems like everybody in government defers to DOJ,” Cuccinelli told Mark Krikorian at a recent panel discussion. “I don’t operate that way. Lawyers advise and they can deal with my decision as best they can. They may not be [happy].” A former DHS official who worked with Cissna told me Cuccinelli “respected what Cissna did. But where Cissna would have to get something to 98 percent to make him feel good, I think Ken Cuccinelli is much more of a 60 or 70 percent kind of guy.”

Some DHS leaders, though, felt Cuccinelli’s Trumpian pronouncements were getting in the way of Trump’s agenda. Exhibit A was the outrage provoked by his comments on the Statue of Liberty. “There was concern at DHS that you had an extremely complicated rule, the public charge, which deserved a full policy discussion,” said one former official. “It was fettered by this discussion of the poem, which bore no relevance to the issue.” Asked whether Cuccinelli had ignited the controversy by accident or on purpose, the official paused for an uncomfortably long time and finally said, dryly, “He thinks of himself as a very talented communicator.”

Out of all the administration’s immigration reforms, the public charge rule has been the most ambitious by far. In the past, the term was defined to mean anyone who was primarily dependent on government assistance. Restrictionists pointed out that only cash benefits were counted—excluding major entitlements like food stamps, Medicaid and housing subsidies. But the new definition is aggressively broad. Most new immigrants aren’t actually eligible for welfare. But the rule grants officers vast discretion to determine whether the applicant might become a public charge at any point in the future. They would be empowered to collect reams of personal financial information and reject any applicant whose income is lower than 250 percent of the poverty line, even if that person has a financial sponsor.

In essence, the rule would create a backdoor mechanism to alter the composition of immigrants to the United States. Low-income legal immigrants tend to be nonwhite, and they also tend to come here via family-based green cards. According to an analysis by the Migration Policy Institute, the new definition would potentially exclude more than half of all family-based green card applicants. That is, 71 percent of applicants from Central America, 69 percent from Africa, 52 percent from Asia—but only 36 percent from Europe, Canada and Oceania. The regulation, said Ur Jaddou, chief counsel of USCIS during the Obama administration, “fundamentally changes who gets to use our legal immigration system by race and class without an act of Congress.” (In October, a few days before the rule was due to go into effect, it was temporarily halted by three federal judges. The government is expected to appeal.)

Cuccinelli’s other priority was asylum, one of two major humanitarian categories of legal immigration. (The other is the refugee program, for people requesting protection while in a foreign country rather than at the U.S. border.) Miller had long been incensed that around 90 percent of people pass the “credible fear” screening—the initial interview that determines whether a claim will go before an immigration judge. People explained to him in meetings that the first hurdle was set intentionally low by Congress, to ensure asylum seekers get a fair hearing, and that only a minority (28 percent) eventually succeed. But Miller was convinced the screenings were an outrageous loophole and demanded they be made more restrictive. Cissna pointed out that the agency couldn’t change the requirements without breaking the law. At one meeting, when Miller kept hounding him about it, Cissna finally erupted. “Enough. Enough. Stand down!” he shouted, according to The New York Times. Cuccinelli had none of these qualms. On his second day on the job, according to Buzzfeed, he sent the division an email scolding officers for failing to prevent “frivolous” claims.

THE “SHEER NUMBER OF BOTH SIGNIFICANT AND LESS SIGNIFICANT CHANGES IS OVERWHELMING,” SAID THE FORMER USCIS CHIEF COUNSEL. “IT WILL TAKE AN AMBITIOUS PLAN OVER A SERIES OF YEARS TO UNDO IT ALL.”

Within USCIS, asylum officers have always been a band apart. They work in a separate office from visa adjudicators and wear plain clothes, no badges. When the division was launched in the 1980s, it was something of a scandal to visa officers when it was staffed with human rights lawyers and refugee workers. Today, the asylum corps is especially resented by border patrol agents, a longtime officer said. “In their view, we’re a bunch of hippies letting in people they try to keep out.”

But there’s nothing hippie-ish about the work they do. Asylum officers go through hundreds of hours of rigorous training, learning to distinguish the person who has assumed a false identity because they’re fleeing a violent gang from the person assuming a false identity because they’re a member of that gang. Vetting an applicant can take anywhere between two and five years. “I have to make sure I’m not getting the wool pulled over my eyes by a war criminal,” the officer explained. Since Congress isn’t likely to overhaul the asylum criteria anytime soon, Cuccinelli set about changing the culture of the division itself. Under a DHS pilot program, around 60 border patrol officers are now conducting credible fear screenings. According to government data obtained by Buzzfeed, they have approved less than half of applicants so far. The agency is also hiring 500 new asylum officers, targeting people with law enforcement or military backgrounds, who, according to USCIS spokesperson Matthew Bourke, are “uniquely equipped to support the agency’s improved vetting procedures and fraud-detection efforts.” In a particularly unsubtle move, the division’s head, John Lafferty, was replaced by the director of the fraud unit.

When you put all of this together, it’s clear that the Trump administration has fundamentally altered the nature of humanitarian immigration to the United States—initiatives that are supported by both parties and have been an essential component of foreign policy since the end of World War II. In 2017, Gene Hamilton and Stephen Miller tag-teamed to reduce annual refugee admissions from 110,000 to 45,000. Since then, the number has been slashed to an all-time low of 18,000. In October, the administration started implementing a regulation ordering that asylum seekers be turned away from the southern border if they have passed through another country without seeking asylum there first. What this means, in practice, is that the only people able to seek asylum at the border are Mexican citizens.

And yet the restrictionists still aren’t satisfied. After all, the administration hasn’t come close to their goal of halving legal immigration. “Any real changes”—such as ending birthright citizenship or the visa lottery—“are the kind of thing Congress would have to approve,” said Krikorian. FAIR’s governmental relations director, RJ Hauman, told me Trump “botched” his first year with a flawed rollout of the travel ban on seven Muslim-majority countries. “It tainted everything,” he said, especially the president’s chances of getting more ambitious reforms through Congress.

SHERIFFS FROM AROUND THE COUNTRY MEET PRESIDENT TRUMP AT A FAIR EVENT IN SEPTEMBER. (WHITE HOUSE/JOYCE N. BOGHOSIAN)

In response, the administration is doing its utmost to appease its most hardcore supporters. For 13 years, FAIR has held an annual convention in Washington D.C. to connect conservative talk radio hosts and anti-immigration personalities. Under previous presidents, it was a niche affair, but this September’s event might as well have been sponsored by the Trump administration. FAIR flew in nearly 200 sheriffs, who received a briefing at the White House from Kellyanne Conway, as well as a photo op with Trump. Afterwards, they made their way back to the Phoenix Park Hotel, just around the corner from DHS. Some 70 radio hosts were crammed into a couple of conference rooms. “We’re in the heart of the swamp, up to our knees in muck,” FAIR’s communications director, Dave Ray, remarked to a talk show host named Tom Roten, who has blamed immigrants for his West Virginia county having “the highest concentration of HIV in the country, maybe even the world.” (This is not true.) Ray went on to discuss the “human carnage caused by criminal aliens and drugs;” at one point, Roten asked, “What if we cut the snake off at the head at the border?”

Cuccinelli spent an entire morning powering through eight back-to-back interviews, fueled by his usual cup of McDonalds sweet tea. He talked about family separation with Roten who complained that “the media only shows these kids crying.” Children were constantly crossing the border with different adults, pretending to be related, he stated. “You’re exactly right, Tom. They’re being recycled,” Cuccinelli agreed. (Greg Navano, ICE’s assistant director of investigative programs, said that among other methods, the agency sometimes conducts DNA tests of family units, and that around 15 percent of the tests uncovered an adult falsely claiming to be a child’s biological parent.)

In November, Cuccinelli was promoted to DHS deputy acting secretary. Kathy Nuebel Kovarik became acting deputy at USCIS and Robert Law, the former FAIR lobbyist, ascended to the head of the policy office. The agency has promised a new flurry of major policy changes before the end of the year. And in what is perhaps the purest expression of the administration's intentions so far, it started sending Central American asylum seekers to Guatemala with no access to an attorney, no review by an immigration court, far away from the border infrastructure of activists and reporters and lawyers or any form of help at all.

AN INFANT IN BORDER PATROL CUSTODY.(JOHN MOORE/GETTY)

IT’S EASY ENOUGH TO BELIEVE THAT BECAUSE NONE of the Trump administration’s reforms are entrenched in law, they can be overturned as quickly as they were introduced. And yet even though, in theory, the policy memos can all be withdrawn, the “sheer number of both significant and less significant changes is overwhelming,” said Jaddou, the former USCIS chief counsel. “It will take an ambitious plan over a series of years to undo it all.” Formal regulations, like the third-country asylum rule and public charge rule, if it succeeds, will be especially hard to unravel.

The institutional implications run deeper. The backlog of delayed cases will likely take several years to get under control. The administration has promoted six judges with some of the highest asylum denial rates to the Justice Department’s immigration appeals court, including one who threatened to set a dog on a 2-year-old child for failing to be quiet in his courtroom. Those appointments are permanent.

The refugee program, too, will take years to rebuild. The plunge in admissions caused a plunge in funding to the nine resettlement agencies, which have closed more than 100 offices around the country since 2016. That’s a third of their capacity, according to a report by Refugees Council USA. “The whole infrastructure is deteriorating,” said Rodriguez, the former USCIS director. Because the application process is so lengthy, even if a new administration raises refugee admissions on day one, it would take as long as five years before increased numbers of people actually make it to the United States. Consider that in January 2017, the State Department briefly paused in-bound flights for refugees who had finally made it through the gauntlet of health, security and other checks. As of this summer, some of those refugees were still waiting to leave. While the flights were grounded, they missed the two-month window during which all of their documents were current. When one document expires, it can take months to replace, causing others to expire and trapping the refugee in what the report called “a domino effect of expiring validity periods.”

Even harder to repair is the culture shift within USCIS. New visa adjudicators will remain in their jobs long after the political appointees have gone—kings and queens of their own offices. Employees who were promoted for their skeptical inclinations will stay in those positions, setting priorities for subordinates. The multitude of changes at USCIS are the product of an administration that regards immigration as its political lifeblood. There’s no guarantee—or indication—that any of the potential Democratic nominees would apply the same obsessive zeal to overturning them.

Back in 1924, Johnson-Reed’s supporters never anticipated the Holocaust, and yet they expanded its horrors. We don’t know where our own future is headed, but we live in a time of metastasizing instability. Last year, the United Nations’ official tally of refugees passed 70 million, the highest since World War II. Mass migrations, whether because of violence or inequality or environmental calamity or some murky blend of factors that don't conveniently fit existing laws, are the reality and challenge of our era. There aren’t any easy solutions. But already, what started as a series of small, obscure administrative changes is resulting in unthinkable cruelty. If left to continue, it will, in every sense, redefine what it means to be American.


          

10 must-have STEM toys that are backed by science

 Cache   


  • STEM toys help children build important science, technology, engineering, and math skills.
  • From fossil kits to programmable robots, there are lots of great options for kids of all ages.
  • This STEM gift guide will set you on the right path this holiday season.


None


When it comes to shaping how the world will look in the future, the power of learning through play can not be overstated. From brain-teasing puzzles to fun experiments, there has been a widespread push for learners of all ages to have access to products that are both stimulating and engaging. According to industry research, 91% of parents believe that STEM/STEAM-focused toys can help their children develop skills like cognitive reasoning, critical thinking, and design, but what exactly is STEM?

STEM is an acronym for science, technology, engineering, and mathematics (STEAM adds an "A" for the arts). Building from a decades-old idea that these were important tools for helping humanity understand and interact with the universe, Judith Ramaley (former director of the National Science Foundation's Education and Human Resources Division) coined the term back in 2001. Since then, educators, scientists, and parents have been developing new ways to incorporate the elements into classrooms and play dates. In 2019, the U.S. Department of Education invested $540 million to support STEM educational programs. The demand for STEM toys is high, but there are a lot of great products out there, so here are 10 that you should add to this year's shopping list.

Newton wishes he had this creative tower building game.


The ThinkFun Gravity Maze is part marble run and part logic game. The brightly colored pieces make constructing towers fun, and there are 60 challenges ranging in difficulty from beginner to expert that will teach your builder planning and spatial reasoning skills.

Inspire future software developers and programmers with this adorable coding robot.


Artie 3000 makes coding fun by adding in a bit of artsy flare. Beginner and more advanced coders can use programming languages to turn the cute Wi-Fi-enabled robot into a tabletop Picasso. The designs range from pre-coded geometric shapes to more complex mandalas, or whatever your young coder can come up with. No internet connection is required! All you need is 4 AA batteries and a phone, computer, or tablet to connect to and Artie 3000 is ready to draw.

This activity kit takes rock collecting to the next level with genuine gemstones and real fossils.


This activity set from National Geographic takes the chance out of rock and mineral hunting and replaces it with loads of educational material about the over 200 specimens included in each set. Armed with a magnifying glass, an identification sheet, and an identification guide, young geologists can spend weeks studying rough and polished minerals, cracking open geodes, and learning about prehistoric sharks and other sea creatures.

Discover how ecosystems work with this glow-in-the-dark terrarium.


Rated ages 6 to 96, this cool terrarium kit allows young scientists to build an ecosystem and watch it grow. Complete with a plastic jar, potting mix, chia and wheat grass seeds, figurines, sand, stones, and glow-in-the-dark stickers, the only ingredients needed to bring the terrarium to life are water, time, and an inquisitive mind.

A colorful building game that involves math and fine motor skills.


What sets the Mathlink Builders game apart from other building toys are the activity cards and uniquely shaped pieces. Children are asked to count pieces according to color as they build and are challenged to think critically as they attempt to solve more complex puzzles. The 100-piece toy also allows children to create from their own imaginations.

Toddlers build cognitive and motor skills with this train puzzle game.


Using instructions in the Challenge Booklet, children ages 3+ have to connect wagons to the Brain Train and fill them based on the shape and color of the available pieces. Each of the 48 challenges has one only possible solution, which means that players have to concentrate and problem solve to figure it out. When they do, they have a cute and colorful train to roll around!

An augmented reality globe that turns geography into an immersive experience.


A sneaky way to turn screen time into learning time, this app-based globe connects to smartphones and tablets to make discovering monuments, animals, and cultures around the world more interactive. 3D animations, hundreds of entries, and over 1,000 fun facts equal hours of productive play and a greater appreciation for the planet.

Turn a Nintendo Switch into so much more with this DIY variety kit.


The Nintendo Switch is great as a gaming console, but it has the potential to be so much more. The Nintendo Labo Variety Kit includes projects for building RC cars, a fishing pole, motorbike handlebars, a house, and a piano. The kit is great for collaborative engineering projects, and the pieces are made of cardboard so you won't need any special tools to get playing.

A fun, safe way to learn about circuitry and electrical currents.


Harnessing the power of 3 AAA batteries (not included), this logic game teaches the fundamentals of electronics in a way that is challenging and dynamic. There are 60 maze challenge cards included in each set. The goal of each is to build a closed circuit, and the reward for doing so is a beacon that will light up almost as brightly as your future electrical engineer.

These colorful tiles use magnets to form just about any 3D structure.


Magnets! These clear geometric tile sets are popular because of the limitless possibilities they afford creative thinkers. From architectural structures to fictional creatures, children learn to use color, shape, and space to form three-dimensional objects. They also learn about the polarity of magnets and what it takes to keep a structure from toppling over (gravity, etc.).

None


When you buy something through a link in this article Big Think earns a small affiliate commission. Thank you for supporting our team's work.




          

Wall Mounted Programmer 6312

 Cache   
Wall Mounted Programmer 6312
          

NIELIT Delhi Recruitment 2019 » IT Resource Persons 328 Post

 Cache   
NIELIT Delhi Recruitment 2019: National Institute of Electronics and Information Technology Delhi has issued a latest notification for the recruitment of IT Resource Persons (IT training & Support Executive, Programmer Assistant, IT Manager, Programmer, System Analyst, Network Specialists) Vacancy at 328 posts. Interested candidates can apply by 16 December 2019. Other details of NIELIT Delhi […]
          

Quora Experiment 2019: Week 22

 Cache   

In many Quora questions, people ask what’s required to start competitive programming. It’s not always clear what they’re looking for with these questions, since you don’t need to apply to be a competitive programmer. Online judges are free. Just register and try one out. Here’s a question where the writer is a bit more specific […]

The post Quora Experiment 2019: Week 22 appeared first on Red-Green-Code.


          

Specialized Benefits Connected with Slot machines

 Cache   
Specialized Benefits Connected with Slot machines Moreover above-mentioned common capabilities, there are some special characteristics regarding slot machine games while well. World-renowned programmers with the games marketplace can be explaining ones own great necessary skills when using the addition of … Læs mere
          

IT / Software / Systems: IBM iSeries RPGLE Programmer (Contract) - Tomball, Texas

 Cache   
IMMEDIATE NEED! JC2 Technologies is currently searching for an RPGLE Programmer for a client located in Northwest Houston, TX. The candidate will have the opportunity to work with a leading global manufacturing company that is rapidly expanding! The ideal candidate will have some web development experience as well as AS400 development experience. Local candidates are preferred but nonlocal candidates will be considered if candidate does not mind relocating for the duration of the project. This opportunity is a 6-month to 1 year contract, with the possibility of extension. Candidate must have RPGLE Programming experience as well as specialization in any or all of the following: Java iSeries API HTTP APIs Javascript Python node.js ()
          

Programmer & Research Analyst - Yukon Government - Whitehorse, YT

 Cache   
Reporting to the Senior Statistician, the Programmer and Research Analyst is responsible for programming software for survey and statistical research including… $70,795 - $81,620 a year
From Yukon Government - Wed, 20 Nov 2019 09:03:49 GMT - View all Whitehorse, YT jobs
          

Ata Controller Programmers Reference

 Cache   
Ata Controller Programmers Reference
          

11c Programmer

 Cache   
11c Programmer
          

Cytel: Contract Principal Statistical Programmer

 Cache   
Depends on experience: Cytel: Cytel is the world's largest independent clinical biostatistics research and development organization.  We help leading pharmaceutical, biotech and... Ireland (IE)
          

IT / Software / Systems: Graphics Programmer - Lawndale, California

 Cache   
Working at EMI EMI is the leader in electronic digital advertising display systems in Southern California with a team of experts who take immense pride in creating iconic media projects that last decades. We are a team of highly educated and experienced, hard-working, excellence driven individuals that are capable of working solo and integrated with teammates, constantly juggling multi-faceted projects with unique elements flawlessly, efficiently and accurately. At EMI, nothing but the best is acceptable; we are industry renown for unbeatable service and quality, and we are looking for new teammates to join in this tradition and to be a part of the explosive growth we are experiencing. If you thrive off of challenges, finding solutions and excel with responsibility and freedom, EMI is the place for you. We work hard and play hard and are very protective of our office culture. We treat everyone with respect, kindness and integrity and enjoy a jovial, playful atmosphere. We crack jokes, drink excessive amounts of coffee and cheers with beers at company meetings. EMI offers competitive salaries, bonuses, 401k plans, medical insurance and PTO to ensure our employees are rewarded, appreciated and celebrated. At EMI you are more than just a number or a name on the payroll list; you are a crucial part to the company's success and the executive team prioritizes your growth both professionally and personally.EMI is looking for self-motivators with quick-thinking and problem-solving skills who excel in creative, fast-paced environments. You must be hungry, driven and practice initiative as a religion. You need to welcome constructive criticism and actively seek ways to constantly improve, demanding of yourself to be better than you were yesterday. Working at EMI requires excellent verbal and written communication along with seamless organization and accountability. With these attributes, success is imminent at EMI and greatly rewarded. If you can bring this and more to EMI, please submit a resume AND cover letter to be considered. Position Summary The Graphic Programmer will design and program multiple dynamic assets daily onto over 100 digital displays. The Graphic Programmer supports the Head Programmer to ensure workflow is efficient, design elements are top notch, and all job requests are completed to the highest quality. Each day they will interface with our Maintenance Department and clients via email and phone to ensure all schedules, rotations, and digital displays are accurately programmed and outputting. -Includes special projects as needed and constant maintenance of all softwares.Position ResponsibilitiesRegularlyCreate unique cutting-edge graphics for digital media within a 24-hour turnaround timeProvide white glove responsive support to all customersCreate and configure rotations for over 100 digital displays using various proprietary softwareTroubleshoot day to day technical issues for PC's & proprietary software with field techniciansPromptly answer a high volume of email & phone correspondence with clientsProof of play data log retrieval for advertising clients MonthlyAttend and contribute to company Maintenance/Programming meetingsCustom design & program holiday graphics for over 50 digital displaysComplete wellness checks on all programming software to ensure schedules, hours of operation, and configurations are properly programmedQuarterly/Annually -Research/attend design & CMS workshopsPrepare self-assessment review for Department Head, CEO, & Vice-President of the companyAdditional Tasks As Needed-- - -Position RequirementsBachelor's degree in either Graphic Design, Computer Science, or equivalent from a 4 year accredited universityAptitude (Ability to learn new technologies quickly)Stress Management (Ability to multi-task and meet deadlines under pressure)Ability to work through issues methodicallyAbility & willingness to properly document processes and assetsExperience and comfort supporting executive customersAdvanced knowledge of Windows and Microsoft Office 3653-5 years of professional office experience ** IT support experience preferred 3-5 years of advanced experience with Photoshop/InDesign/Illustrator/After Effects or related appIncredible sense of pride and passion for what you do and a desire to help your teammatesInitiative and drive to improve quality and output with generation of new innovative methods and ideasExcellent verbal and written communication skills Ability to actively interface with clients and interpret design visions and bring them into realityAbility to work efficiently & accurately Ability to take constructive criticism & implement improvementDesire to create and design with a passion for the power of advertising Not averse to highly structured days - ()
          

SQL Programmer with .Net

 Cache   
MI-Lansing, * Direct Client Requirement * Title: SQL Programmer with .Net Location: Lansing, MI Rate: DOE Duration: 12 Months Interview Type: In-Person only Work Status: Successful applicants must be legally authorized to work in the U.S. Job Type: Full-Time,W2,C2H, C2C, Experience: 12 years Plans, develops, tests, and documents computer programs, applying knowledge of programming techniques and computer syst
          

Web Application Programmer

 Cache   
FL-Tallahassee, job summary: PURPOSE: This scope of work is for the client of new and existing functionalities required to support the Health Management system (HMS). 5. CONTRACTOR QUALIFICATIONS AND EXPERIENCE: Contractor staff assigned to this scope of work must possess, at minimum, the following qualifications: 5.1 5 years of experience with Software Development Life Cycle Methodology. 5.2 5 years of experienc
          

Hospitality & Tourism: 25B Information Technology Specialist - Wilmington, Delaware

 Cache   
If you've ever considered a job in IT, become an Information Technology Specialist in the Army National Guard and expand your skills and experience with complex technologies. In this role, you will be responsible for sending, receiving, and processing messages and data on the Guard's sophisticated networks. You will also maintain and troubleshoot the systems that support the military's logistics and classified data, and build firewalls that can withstand any attempted cyberattack. Job Duties • Maintenance of networks, hardware, and software • Provide customer and network administration services • Construct, edit, and test computer programs Some of the Skills You'll Learn • Use of computer consoles and peripheral equipment • Computer systems concepts • Planning, designing, and testing computer systems Helpful Skills • Interest in computer science • Strong attention to detail • Ability to communicate effectively • Experience in installation of computers Through your training, you will develop the skills and experience to enjoy a civilian career working as a network support technician, data processing technician, or computer programmer in just about any company that uses computers. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Information Technology Specialist consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 20 weeks of Advanced Individual Training (AIT) with classroom instruction. Benefits/Requirements Benefits Paid training A monthly paycheck Montgomery GI Bill Federal and State tuition assistance Retirement benefits for part-time service Low-cost life insurance (up to $400,000 in coverage) 401(k)-type savings plan Student Loan Repayment Program (up to $50,000, for existing loans) Health care benefits available VA home loans Bonuses, if applicable Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements Military enlistment in the Army National Guard Must be at least a junior in high school, or have a high school diploma or a GED certificate Must be between the ages of 17 and 35 Must be able to pass a physical exam and meet legal and moral standards Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information. ()
          

Introducing the new RollMe Bot!

 Cache   

I’ve noticed that there are lots of folks out there who occasionally want to perform rolls on Reddit. There have been a few roll-bots that have been created, but most of them are basic.

At Roll20 (where I’m the lead programmer), we’ve already developed a robust library that can handle many different types of games and systems, including advanced mechanics like groups and penetrating dice.

I’ve always wanted to create a Reddit bot just to see how it works, so I thought this was a good way to bring the rolling of Roll20 to reddit for play by post.

Using the RollMe bot is simple. Just include double-bracketed roll expressions anywhere in your comment (note: doesn’t currently work for text posts, only comments in posts), and then make sure to mention the username of the bot—like so—anywhere in the comment (the very end works just fine). RollMe will reply to your post within a few minutes with the results of your rolls.

This is brand-new and I’ve never written a Reddit bot before, so please let me know if you run into any issues or bugs. And let me know if there’s more I can do to make the formatting of the results easier to read.

I’ll post a few examples as comments to this post to get the ball rolling.


          

130+ Essential Vim Commands

 Cache   

Since the 70's, vi and vim are very popular text editors among programmers. 5 years ago, I wrote an article named "100 vim commands every programmer should know" and here is a reworked, updated version. Enjoy!

The post 130+ Essential Vim Commands appeared first on NKRACADEMY DIGITAL SOLUTIONS.


          

Tls 216 Programmeruser

 Cache   
Tls 216 Programmeruser
          

IT Programmer/Analyst I - Database Design & Support

 Cache   
City of Fort Worth. Texas (TX), Fort Worth
IT Programmer/Analyst I - Database Design & SupportCity of Fort Worth - Fort Worth, TXRequisition Number:59167Department:Information TechnologyThe City of Fort Worth seeks an IT Programmer Analyst I (Junior DBA) to...

Salary: $salary. Date posted: 11/29/19
          

Programmers Manual Languages And Support

 Cache   
Programmers Manual Languages And Support
          

PHP Developer

 Cache   
Category: Programming & Development

Description: Job DescriptionExperienced PHP programmer developer having good experience in OOPs ,MVC, MySQL, PHP...

          

Programmer & Research Analyst - Yukon Government - Whitehorse, YT

 Cache   
Proficiency in advanced functionalities of Microsoft Excel; This is for a full time term anticipatory permanent position. $70,795 - $81,620 a year
From Yukon Government - Wed, 20 Nov 2019 09:03:49 GMT - View all Whitehorse, YT jobs
          

For other inquiries, Contact Us

 Cache   

what do embryos look like when aborted

wholesale vibrators They are set up to hold a flaccid packer and to make it look real. Once the packer is in it doesn't slip at all. When I would run around and dance with it on, it wouldn't move at all. I could hardly feel my man's tongue down there. The lowest vibration was perfect as he used it to stimulate my clit and explore the surrounding area. The medium and high were too much, and we didn't even stay on them. wholesale vibrators

Adult Toys You need an antifungal for that. Go see a doctor. And since you CAN get yeast infections without having had sex, why nto just tell your mother and get her to take you to a gynecologist so you can get a thorough exam dildos, hm?By the way: as far as we're concerned here at Scarleteen, it's always better to be open with your parents if you possibly can. Adult Toys

dildos Here a link to the announcement of that initiative does this meet your definition of hyperlocal?All the talk about Adrian Peterson at OTA's got me thinking about the first time the Saints brought in a Hall of Fame RB on the tail end of his career Jim Taylor in 1967, the Saints' first season. Did a quick search of our digital archives for photos from that season but could only find one granted, not the greatest shot, but still a pretty cool nostalgia trip. Here's what the caption says:. dildos

wholesale vibrators For me some foreplay is always necessary for lubrication, i don't want painful sex!, but i spose some people don't always need it. It is not meant to and cannot substitute for advice or care provided by an in person medical professional. The information contained herein is not meant to be used to diagnose or treat a health problem or disease, or for prescribing any medication. wholesale vibrators

Realistic Dildo There are many dildos, many other alternatives. Quantum foundations, the field that deals in resolving the measurement problem and the other basic questions of quantum theory, is a lively subject brimming with creative ideas. The hole at the heart of quantum physics is still there there's still an open problem that needs solving but there are many fascinating theories that have been proposed to solve these problems. Realistic Dildo

I will carry her around the apartment while I do small chores (or have her hold my hand and we walk around) I describe out loud what I doing just so im talking to her. If I doing the dishes, I put her next to me and open the drawer that has all of our wash cloths. I let her empty it out all over the floor to keep her distracted.

Adult Toys I'm going to try to do this healthy. If I want to lose weight I want to do it without starving myself. I just hate feeling so guilty when I eat. We have an extremely observant child who notices the smallest details that others pay no mind too. When trying to figure out how to install a swing in the bedroom we knew we could not have an eye bolt in the ceiling without 20 questions. So we got anWe have an extremely observant child who notices the smallest details that others pay no mind too. Adult Toys

animal dildo Also, that's the other thing! I think it takes her a little while to "loosen up." I can't "rush in" so to speak, she says it hurts a bit. After a couple minutes she seems to loosen up though. Does any of this sound familiar or can any girl sympathize with anything I'm relaying? If so please respond. animal dildo

Taking any pressure off of ourselves with sex is always to our benefit. So is reminding ourselves and each other that sex together is supposed to be an enjoyable and ongoing learning process, about intimacy, pleasure, experimentation and choose your own adventure experiences. It's not supposed to feel anything like taking the SAT or trying to qualify for the Olympics..

gay sex toys The Multiple Sclerosis Society of Canada notes that approximately 10 per cent of people diagnosed with MS have primary progressive MS. Approximately half the people with the more common RRMS will develop secondary progressive MS within 10 to 20 years of diagnosis. Many people who continue to experience relapses will remain on treatment with one of the disease modifying therapies. gay sex toys

vibrators The Bra and g string with rhinestones is our eyes another winner by Coquette. We have added it to our ever growing collection of "disposable" lingerie. We have sampled pieces from almost every manufacturer on this site and found distinct differences in the textile, stitching and fit from Coquette. vibrators

sex toys Keep your slave in position for pleasure and punishment with the Locking Posture Collar from Strict. This stern collar is the perfect BDSM accessory to remind you both who the boss is. Lock your submissive partner into the collar with the included padlock so that they are helpless to your devious desires until you're done having your way. sex toys

horse dildo Thank you so much, I hope I can get some reassurance or advice. It is not meant to and cannot substitute for advice or care provided by an in person medical professional. The information contained herein is not meant to be used to diagnose or treat a health problem or disease, or for prescribing any medication. horse dildo

Maria needed and demanded quite a bit of special treatment from the very start of challenger series onward. Things like not participating in team photo shoots dildos, not being on camera when on stage, many hours of emotional support, alone time at the cost of scrims, her own room, etc all of which were obliged readily. In the middle of the split Maria informed me she would not go on stage if we made LCS until she had her sexual realignment surgery.

Also, the latest on Tom Brady's car accident. Day care center is scheduled to shut down but could be saved, if the political elite parents who send their kids there (Leon Wieseltier, Samantha Power) have their say. Dude, embarrassing!: An aide to Sen.

animal dildo Because cum and vaginal juices smell completely different. Though that would only add fuel to the fire. It sounds like he is convinced that you are doing something. That dildos, we hope, will finally help us organize our toys. That "closet" (Really a nine by twelve mini room) will have a PLUG STRIP running the entire perimeter of the closet at waist height and at floor level, so we could plug in, LITERALLY, 100 toys or other things. It has it own breakerbefore i moved out to school, discretion was a HUGE issue for me and i needed to keep things hidden from both my mom, and two nosey younger brothers. animal dildo

Realistic Dildo You can't control the future. If you're happy and willing to take the leap of faith that is marriage, go for it. Marriage isn't a magical fix for a relationship, it's making the commitment to try your best in the relationship and support the other person everyday. Realistic Dildo

gay sex toys You might hear me mention how hard I'm trying to find a full time, permanent job. I'll probably ask you for help, but you, of course, don't have much say in the lengthy, complicated process of requesting additional head count in a large company.And I get it. A corporation doesn't have any reason to approve those requests. gay sex toys

wholesale vibrators To be fair I live in Europe, so this may be easier for me to do than someone who lives in the US. Though the most common car in the US are large cars with poor fuel efficiency. So again, the average person is not making the conscious choice to buy an electric (or even simply a more fuel efficient, smaller car).Also: Public transport is awesome, but often not an option when your work isn along a frequented route.Why exactly is this up to shell to fix?Buddy, you might live in some dreamlike place where the majority of energy comes from clean sources, where public transport is wide ranging and accessible dildos, and electric cars are cheap, but for the majority of the world that is simply not true. wholesale vibrators

gay sex toys Open up the Sukebe Japanese College Girl Used Panties Pack to find a secret collection of fetish lingerie allegedly taken from a young university student in Tokyo. You will find panties, bra and stockings inside this bag, which is the kind of rare item only found by searching around Akihabara and Kabukicho for days on end. Instead, now you can enjoy the wonder of Japanese used panties delivered straight to your home.. gay sex toys

wholesale sex toys Kingdoms of Amalur: really enjoyed it too dildos, but there a major bug in main quest of a DLC, which literally breaks your save by autosaving in a place you can get out of. Never finished the game after that, though I spent 35h in it before. Game starts a bit slow, but combat gameplay gets really enjoyable later on, and TONS of content.. wholesale sex toys

animal dildo I'm thankful to say, that besides getting a hinky feeling in some places I might be, I've never encountered violence or fear of violence. I go to school at a very liberal school, I'm out at work and at home and I live in a liberal city. The only places where I start to not feel scared but maybe just more aware of my surroundings is when I'm waiting for a bus or train or walking around by myself. animal dildo

I have been with my current boyfriend for a year and a month. We have been having sex for about 8 months. Sex KIND OF feels good when I am really in the mood, but then the feeling goes away real fast. For other inquiries, Contact Us. To see all content on The Sun, please use the Site Map. The Sun website is regulated by the Independent Press Standards Organisation (IPSO).

vibrators I really don't like the term virginity anyways. It causes a heck of a lot of confusion. But if someone asks me if I'm a virgin I'll just say yes because I know what they're meaning and I think a lot of people would just brush off my thoughts so I don't mention them. vibrators

animal dildo Stream and wetland buffers: In late 2013, the state Supreme Court struck down portions of the state oil and gas law, known as Act 13 including a portion that required the DEP to waive stream setbacks for drillers. The DEP says it already has the ability to enforce water quality standards under the PA Clean Streams Act. The new rules would requiremore stringent reviewsof well sites within 100 feet of streams and wetlands.. animal dildo

dildos The vibrations are felt throughout the entire toy. Once I inserted the plug, I could squeeze my butt cheeks together to feel the strong vibrations clearer. I found that this felt very good. I resent admire her for that. I resent respect her for that. And I resent love her for it.. dildos

Adult Toys At the loosest setting, with the pin screwed in all the way, the clamps were too loose. At this setting, the clamps fell off with the brush of my hand. I found the perfect, Goldilocks tightness with the pin screwed in halfway. They haven't dealt with Veronica's season 1 rape in ANY way that was sensitive or indicated any sort of progress in her thought processes about it; season 3's first mystery arc was a horridly handled campus rape mystery that was for most of the season pinned on the 'insane feminist' group (who incidently FAKED a rape to further their cause which just. Argh.)The worst part is Lauren, is that the first season was very innovative and interesting a Buffy the Vampire Slayer meet film noir detective films. Joss Whedon has been very outspoken in his support of the series and in fact, guesst starred on one episode.. Adult Toys

When officers arrived, they observed someone inside the home and knocked on the door repeatedly, according to the report. About an hour later, a man identified as Manasseh Goldberger emerged, saying he had been afraid to talk to police. He had scratches on his body and was walking with a limp dildos, the report says, and he told police that he and Goldstein were loading items onto a trailer when she fell face first from a landing one foot off the ground..

Realistic Dildo But wouldn't you like to experience life outside of high school before getting married?I know in my experience, college is nothing like high school. You meet so many people, and I like being able to know that although I love my boyfriend very much and want to be with him, that it wouldn't be too difficult to end the relationship if I wanted to be single. Ending a boyfriend girlfriend relationship is definitely a lot easier than ending a marriage!Now, I'm not saying that if you and your boyfriend were to marry straight out of high school that you'd divorce eventually. Realistic Dildo

dog dildo In Altoona, Virginia Goldberg, the president and owner of Subway Stamp Shop, recalled the years when her family business operated in the subway arcade at 87 Nassau Street. Dealers often specialized in the stamps of particular countries. If a customer came in and wanted a stamp from a country a dealer was weak in, the dealer could walk a few feet to another dealer. dog dildo

g spot vibrator He named this sex doll 'Solana' and considers it to be the sister of Harmony. The robot's user agreement states: "The policy owner must not perform any sexual act or other indecent behaviour". The report includes an examination of how such robots could be employed as a sexual therapy tool for rapists or paedophiles. g spot vibrator

vibrators The material is quite rough and not pleasant to the touch. However the patern seen on the picture actually comes seperate and can be combined with other lingerie or just used on its own. I love to see my partner with this bodystocking. Frankly, I did a double take when I saw this sex toy! If I didn't know any better, I would have thought the Enchanted came from a company other than California Exotics: it bears no resemblance at all to the last vibrator I reviewed and that's a good thing. The Enchanted was a lot of fun to use both on my clit and on my g spot, though its softness meant that I couldn't push the head of this vibrator as strongly against my g spot as I tend to prefer. With easy to use controls and very quiet yet powerful functions, I'm definitely enchanted with the Enchanted!. vibrators

vibrators In the Kovacs novels however the malleability not just of memory but of our very existence because of course most of our existence is remembered rather than experienced in the now is entirely problematic. For instance how can you know anything is real if your existence is based entirely on data management, given the data can be manipulated? You might think you were living a full and rewarding life when in fact your wretched stick thin carcass was swimming in a vat of amniotic fluids plugged into feeder tubes and neural implants the Matrix conundrum. Then again, would that be such a bad option if the alternative is scrabbling for existence in a post apocalyptic wasteland?. vibrators

wholesale sex toys The Eden silky smooth silicone beads anal beads with loop handle have a curved design to aid with insertion. The first bead is quite tapered and actually is pointed. The beads 5 in all gradually increase in length and width. "I'm sure many students have heard of the stereotype that we don't have any fun, that this is where fun comes to die, that the guys are desperate," the site programmer told The Maroon, UofC's student newspaper. "I'm not going to disclose anything too specific. But I can say that we've already had users who have had success.". wholesale sex toys

Realistic Dildo I don't know if anyone else is interested in this, but a couple of years ago I got curious about self defense in South Korea after watching a show where a character was facing jail time for (fatally) defending herself from a rape. I am a criminal defense lawyer in real life, so I wondered why the characters were so concerned. After googling "self defense in South Korea," I found a cool blog from a South Korean lawyer. Realistic Dildo

Adult Toys Also, not everyone is suited to that kind of work. Let not judge too hard people who knowingly take a path different than "how can I make the most money. " still I wouldn advocate getting a humanities degree if it causes you to emass a substantial debt.. Adult Toys

g spot vibrator Every Saturday and Sunday morning, you will find people squirming in and out of wetsuits and training at this site. It is a great place to practice swimming in the open water. There is a solid breakwall on one side, buoys to mark the,, and mile swim and on a good day you can see the bottom of the lake below you.. g spot vibrator

dildos Of the four of them were happy with the wait because they had nothing planned and weren in a rush. The fourth one threw a small hissy fit at me saying we weren upholding the saying of "fast orders" like on TV but her husband calms her down and they order. Cut to me going to their table saying there meals were coming out very soon to keep them updated, three of the four say "thank you for letting us know" whilst the lady that threw a hissy fit smiled at me and said, "I don think so." I, at this point didn really know what to say so I just smiled and walked away. dildos

wholesale dildos His body is clearly devastated when we see it for a split second, but it doesn't look a purely dead body would, since it looks like parts of his body have grown out and infected the ship around him. That might just be stylization, but it seemed to me like at some point in the quintessence field/while being brought back, Lotor's body and mind were warped and broken to the point where he was unrecognizable. Sure he's still "alive" and physically piloting his mech, but he's barely more than a drone. wholesale dildos

Realistic Dildo I ask that because in general, with menstrual changes, the usual rule of thumb is not to sweat anything for a few months, unless you have had any possible risk of pregnancy or STIs. Because you have been sexually active, even if your body was like clockwork dildos, you'd want to be sure you are getting tested for STIs around once a year. With any pregnancy concerns, you can just go ahead and take a home test if you have a concern (though it seems unlikely, given what you have said about this incident).. Realistic Dildo

Realistic Dildo Medical Medicine Varicose Veins Vasculitis Treatment Leg Acid Ointment 20gNet:20g Weight:about 25g Ingredient: Cinnamon, dangshen, caulis spatholobi, burdock, honeysuckle Function:Relief the swelling. Pain. Nodule that caused by vasculitis and Varicose veins. Realistic Dildo

It's hard to believe that this crime happens in our states, cities and neighborhoods. But even as we write, girls across the country are being subjected to unspeakable acts of violence. We cannot sit back and let this happen and we will do everything in our power to stop it.

sex toys I did gamble my exams. I usually studied the night before. Picked the 3 4 most likely topics within the subject and prayed it will be in it. Get some mutual friends together, and do something simple. When they leave, spend time with other friends. Do something you enjoy. sex toys

animal dildo Rather than taking a separate remedy for each symptom, individuals usually take one remedy to treat the root cause of the issue. Homeopathy is based on the like treats like principle. For example, those suffering from a pollen allergy may be given minute doses of pollen to allow their bodies to build up a tolerance. animal dildo

animal dildo "See Dunkirk," he yelled. "It playing now, I beg you! Please! It on me! It on Mr. Jones! I taught you! Just tell them I taught you!". As we grew, we became a family made out of friends. I saw the two girls as my cousins and their mother as my aunt. We spent every day growing and bonding.After so long dildos, my aunt met a man and they fell in love. animal dildo

dildos Fire Red Mirrored Sunglasses Replacement Lenses for Flak 2.0 XL PolarizedFits for Flak 2.0 XL Sunglasses. 12 months Warranty. 100% New High Quality. Breaking rules, no matter what style of relationship(s) you maintain in your life, is always a bad idea. It violates trust and undermines the stability of relationships. What "cheating" basically means is that you are dishonestly dismissing the rules of your relationship. dildos

Disney has watched as viewership to its one time powerhouse ESPN and other cable channels has shrunk as consumers have cut the cord on pricey cable bills. Instead, many consumers have opted for subscriptions to the likes of Netflix or Amazon, which offers a wide swath of video content at a fraction of the cost. (Amazon's chief executive, Jeffrey P.

wholesale sex toys I'd just like to reiterate that if you're not feeling comfortable in any particular sexual encounter or with a particular kind of sexual behavior, it's perfectly okay to call it off and "back out". In fact, I would say that if you're not feeling comfortable in a particular sexual situation (or with the idea of engaging in a particular kind of sexual activity), backing out is a much better decision than engaging in it anyway. If you feel like you want to try it again at some point, you can, and if not, that's fine too wholesale sex toys.


          

Nieuwe TV-uitzendingen bij lokale omroep RTV Slogo

 Cache   

Ouddorp - RTV Slogo heeft naast de vaste programmering ook wekelijks nieuwe programma’s voor u en jou klaar staan. De nieuwe items van deze week lees je hieronder, evenals de juiste frequenties om mee te genieten van alle radio- en televisieprogramma's van Goeree-Overflakkee.


          

Développeur Mobile IOS

 Cache   
  • Entreprise : Entreprise d'appui au développement du numérique (EADN)
  • Nombre de postes : 1
  • الخبرة المطلوبة : 3 à 5 ans
  • المهنة / الوظيفة : Informatique, Systèmes d'information, Internet
  • قطاعات النشاط : Informatique, Télécom, Internet
  • Niveau de poste : Confirmé / Expérimenté
  • مكان الإقامة : Centre


Mission :

Assurer la programmation des applications mobile destinées aux tablettes iPad et téléphones intelligents iPhone fonctionnant sous le système d'exploitation iOS développé par Apple.

Taches Principales : Mission :

- Maintenir le code existant et programmer de nouvelles applications ou fonctionnalités avec la ...
          

Posts on Hannes Hauswedell's homepage: A beginner's guide to C++ Ranges and Views.

 Cache   

C++ Ranges are one of the major new things in C++20 and “views” are a big part of ranges. This article is a short introduction for programmers that are new to C++ Ranges.

Preface

You don’t need to have any prior knowledge of C++ Ranges, but you should have basic knowledge of C++ iterators and you should have heard of C++ Concepts before. There are various resources on C++ Concepts, e.g. Good Concepts, Wikipedia (although both contain slightly outdated syntax).

This article is based on library documentation that I wrote for the SeqAn3 library. The original is available here. There is also beginner’s documentation on C++ Concepts over there.

Since none of the large standard libraries ship C++ Ranges right now, you need to use the range-v3 library if you want to try any of this. If you do, you need to replace the std::ranges:: prefixes with just ranges:: and any std::views:: prefixes with ranges::views::.

Motivation

Traditionally most generic algorithms in the C++ standard library, like std::sort, take a pair of iterators (e.g. the object returned by begin()). If you want to sort a std::vector v, you have to call std::sort(v.begin(), v.end()) and not std::sort(v). Why was this design with iterators chosen? It is more flexible, because it allows e.g.:

  • sorting only all elements after the fifth one:

    1 std::sort(v.begin() + 5, v.end())
    
  • using non-standard iterators like reverse iterators (sorts in reverse order):

    1 std::sort(v.rbegin(), v.rend());
    
  • combine both (sorts all elements except the last 5 in reverse order):

    1 std::sort(v.rbegin() + 5, v.rend());
    

But this interface is less intuitive than just calling std::sort on the entity that you wish to sort and it allows for more mistakes, e.g. mixing two incompatible iterators. C++20 introduces the notion of ranges and provides algorithms that accept such in the namespace std::ranges::, e.g. std::ranges::sort(v) now works if v is range – and vectors are ranges!

What about the examples that suggest superiority of the iterator-based approach? In C++20 you can do the following:

  • sorting only all elements after the fifth one:

    1 std::ranges::sort(std::views::drop(v, 5));
    
  • sorting in reverse order:

    1 std::ranges::sort(std::views::reverse(v));
    
  • combine both:

    1 std::ranges::sort(std::views::drop(std::views::reverse(v), 5));
    

We will discuss later what std::views::reverse(v) does, for now it is enough to understand that it returns something that appears like a container and that std::ranges::sort can sort it. Later you will see that this approach offers even more flexibility than working with iterators.

Ranges

Ranges are an abstraction of “a collection of items”, or “something iterable”. The most basic definition requires only the existence of begin() and end() on the range.

Range concepts

There are different ways to classify ranges, the most important one is by the capabilities of its iterator.

Ranges are typically input ranges (they can be read from), output ranges (they can be written to) or both. E.g. a std::vector<int> is both, but a std::vector<int> const would only be an input range.

Input ranges have different strengths that are realised through more refined concepts (i.e. types that model a stronger concept, always also model the weaker one):

Concept Description
std::ranges::input_range can be iterated from beginning to end at least once
std::ranges::forward_range can be iterated from beginning to end multiple times
std::ranges::bidirectional_range iterator can also move backwards with --
std::ranges::random_access_range you can jump to elements in constant-time []
std::ranges::contiguous_range elements are always stored consecutively in memory

These concepts are derived directly from the respective concepts on the iterators, i.e. if the iterator of a range models std::forward_iterator, than the range is a std::ranges::forward_range.

For the well-known containers from the standard library this matrix shows which concepts they model:

std::forward_list std::list std::deque std::array std::vector
std::ranges::input_range
std::ranges::forward_range
std::ranges::bidirectional_range
std::ranges::random_access_range
std::ranges::contiguous_range

There are also range concepts that are independent of input or output or one of the above concepts, e.g. std::ranges::sized_range which requires that the size of a range is retrievable by std::ranges::size() (in constant time).

Storage behaviour

Containers are the ranges most well known, they own their elements. The standard library already provides many containers, see above.

Views are ranges that are usually defined on another range and transform the underlying range via some algorithm or operation. Views do not own any data beyond their algorithm and the time it takes to construct, destruct or copy them should not depend on the number of elements they represent. The algorithm is required to be lazy-evaluated so it is feasible to combine multiple views. More on this below.

The storage behaviour is orthogonal to the range concepts defined by the iterators mentioned above, i.e. you can have a container that satisfies std::ranges::random_access_range (e.g. std::vector does, but std::list does not) and you can have views that do so or don’t.

Views

Lazy-evaluation

A key feature of views is that whatever transformation they apply, they do so at the moment you request an element, not when the view is created.

1 std::vector vec{1, 2, 3, 4, 5, 6};
2 auto v = std::views::reverse(vec);

Here v is a view; creating it neither changes vec, nor does v store any elements. The time it takes to construct v and its size in memory is independent of the size of vec.

1 std::vector vec{1, 2, 3, 4, 5, 6};
2 auto v = std::views::reverse(vec);
3 std::cout << *v.begin() << '\n';

This will print “6”, but the important thing is that resolving the first element of v to the last element of vec happens on-demand. This guarantees that views can be used as flexibly as iterators, but it also means that if the view performs an expensive transformation, it will have to do so repeatedly if the same element is requested multiple times.

Combinability

You may have wondered why I wrote

1 auto v = std::views::reverse(vec);

and not

1 std::views::reverse v{vec};

That’s because std::views::reverse is not the view itself, it’s an adaptor that takes the underlying range (in our case the vector) and returns a view object over the vector. The exact type of this view is hidden behind the auto statement. This has the advantage, that we don’t need to worry about the template arguments of the view type, but more importantly the adaptor has an additional feature: it can be chained with other adaptors!

1 std::vector vec{1, 2, 3, 4, 5, 6};
2 auto v = vec | std::views::reverse | std::views::drop(2);
3 
4 std::cout << *v.begin() << '\n';

What will this print?

Here is the solution It will print “4”, because “4” is the 0-th element of the reversed string after dropping the first two.

In the above example the vector is “piped” (similar to the unix command line) into the reverse adaptor and then into the drop adaptor and a combined view object is returned. The pipe is just a different notation that improves readability, i.e. vec | foo | bar(3) | baz(7) is equivalent to baz(bar(foo(vec), 3), 7). Note that accessing the 0th element of the view is still lazy, determining which element it maps to happens at the time of access.

Exercise

Create a view on std::vector vec{1, 2, 3, 4, 5, 6}; that filters out all uneven numbers and squares the remaining (even) values, i.e.

1 std::vector vec{1, 2, 3, 4, 5, 6};
2 auto v = vec | // ...?
3 
4 std::cout << *v.begin() << '\n'; // should print 4

To solve this you can use std::views::transform and std::views::filter. Both take a invocable as argument, e.g. a lambda expression. std::views::transform applies the lambda on each element in the underlying range and std::views::filter “removes” those elements that its lambda function evaluates to false for.

Here is the solution

1 std::vector vec{1, 2, 3, 4, 5, 6};
2 auto v = vec
3        | std::views::filter(   [] (auto const i) { return i % 2 == 0; })
4        | std::views::transform([] (auto const i) { return i*i; });
5 
6 std::cout << *v.begin() << '\n'; // prints 4

View concepts

Views are a specific kind of range that is formalised in the std::ranges::view concept. Every view returned by a view adaptor models this concept, but which other range concepts are modeled by a view?

It depends on the underlying range and also the view itself. With few exceptions, views don’t model more/stronger range concepts than their underlying range (except that they are always a std::ranges::view) and they try to preserve as much of the underlying range’s concepts as possible. For instance the view returned by std::views::reverse models std::ranges::random_access_range (and weaker concepts) iff the underlying range also models the respective concept. It never models std::ranges::contiguous_range, because the third element of the view is not located immediately after the second in memory (but instead before the second).

Perhaps surprising to some, many views also model std::ranges::output_range if the underlying range does, i.e. views are not read-only:

1 std::vector vec{1, 2, 3, 4, 5, 6};
2 auto v = vec | std::views::reverse | std::views::drop(2);
3 
4 *v.begin() = 42; // now vec == {1, 2, 3, 42, 5, 6 } !!

Exercise

Have a look at the solution to the previous exercise (filter+transform). Which of the following concepts do you think v models?

Concept yes/no?
std::ranges::input_range
std::ranges::forward_range
std::ranges::bidirectional_range
std::ranges::random_access_range
std::ranges::contiguous_range
std::ranges::view
std::ranges::sized_range
std::ranges::output_range

Here is the solution

Concept yes/no?
std::ranges::input_range
std::ranges::forward_range
std::ranges::bidirectional_range
std::ranges::random_access_range
std::ranges::contiguous_range
std::ranges::view
std::ranges::sized_range
std::ranges::output_range

The filter does not preserve random-access and therefore not contiguity, because it doesn’t “know” which element of the underlying range is the i-th one in constant time. It cannot “jump” there, it needs to move through the underlying range element-by-element. This also means we don’t know the size.

The transform view would be able to jump, because it always performs the same operation on every element independently of each other; and it would also preserve sized-ness because the size remains the same. In any case, both properties are lost due to the filter. On the other hand the transform view produces a new element on every access (the result of the multiplication), therefore v is not an output range, you cannot assign values to its elements. This would have prevented modelling contiguous-range as well – if it hadn’t been already by the filter – because values are created on-demand and are not stored in memory at all.

Understanding which range concepts “survive” which particular view needs some practice. For the SeqAn3 library we try to document this in detail, I hope we will see something similar on cppreference.com.

Post scriptum

I am quite busy currently with my PhD thesis, but I plan to publish some smaller articles on ranges and views before the holiday season. Most will be based on text pieces I have already written but that never found their way to this blog (library documentation, WG21 papers, snippets from the thesis, …).

Thanks for reading, I hope this article was helpful! If you have any questions, please comment here or on twitter/mastodon.


          

A cryptocurrency expert was charged with helping North Korea evade sanctions after blockchain talk in Pyongyang

 Cache   

ethereum

  • Federal prosecutors accused an American cryptocurrency expert of helping North Korea evade US sanctions with technical knowledge about blockchain platforms. 
  • Prosecutors alleged that Virgil Griffith, 36, used his remarks at a North Korean cryptocurrency conference to describe how North Korea could "launder money and evade sanctions" and "achieve independence from the global banking system." 
  • In August, it was revealed that North-Korean-sponsored hacking groups attacked critical infrastructure of banks and cryptocurrency exchanges to profit an estimated $2 billion for the country's nuclear and missile programs. 
  • Visit Business Insider's homepage for more stories.

Federal prosecutors accused an American cryptocurrency expert Virgil Griffith of helping North Korea evade US sanctions. 

Griffith, 36, was charged with conspiring to violate the International Emergency Economic Powers Act, according to a criminal complaint, and could face up to 20 years in prison. 

The Justice Department alleged in the complaint that, while giving a presentation titled "Blockchain and Peace" in Pyongyang, Griffith described how North Korea could "launder money and evade sanctions" and "use these technologies to achieve independence from the global banking system." 

The complaint also said that Griffith had attended the cryptocurrency conference even after the government denied him permission to do so. 

US Federal prosecutor Geoffrey S. Berman said in a statement that Griffith allegedly "provided highly technical information to North Korea, knowing that this information could be used to help North Korea launder money and evade sanctions."

"In allegedly doing so, Griffith jeopardized the sanctions that both Congress and the president have enacted to place maximum pressure on North Korea's dangerous regime," Berman said in the statement.

The US and the United Nations have ramped up sanctions on North Korea in recent years as a bid to settle its expanding nuclear and ballistic missile programs.

Griffith's arrest seemed to stir outrage in his tech circles, as the hacker magazine 2600 tweeted that the arrest was "an attack on all of us." The magazine's editor, Emmanuel Goldstein, tweeted in apparent disbelief that attending a conference and explaining the "concept of cryptocurrency...are crimes now?!"

Cryptocurrency has emerged at the center of the controversial programs after it was revealed that state-sponsored hacking groups attacked critical infrastructure of banks and cryptocurrency exchanges to profit an estimated $2 billion for its nuclear and missile programs. 

The former programmer was called an "internet man of mystery" by The New York Times in 2008, and described himself to the outlet as a "disruptive technologist." He currently works for Ethereum, a platform that produces a digital currency that rivals Bitcoin.

Join the conversation about this story »


          

Re: Miscellaneous suggestions by Zefram via perl5-porters

 Cache   
Dave Mitchell wrote:
> sub f($x //= expr) { ... }

I'm dubious about that. It's implying that, after $x has been initialised
from the argument, "$x //= expr" is performed. The problem with that is
that it suggests that other kinds of assignment should work similarly:
not only "||=", but consider "sub f($x *= 2) {...}". This could be
implemented just fine: initialise $x from the argument, and then perform
"$x *= 2" so that the body sees twice the argument value. But then that
implies semantics for "sub f($x = expr) {...}" that are very different
from what we've already decided on. I think if "//=" is going to be
allowed here then the defaulting "=" has to change to "!!=" or some such.

> sub f(Dog $spot, ...) { ..}

Meh. I suppose if attributes are supported then this should be supported
too.

In the spirit of matching the "my" usage, the type should always be
adjacent to the specification of the lexical variable. Thus "*Dog $spot",
not "Dog *$spot".

>allow $foo? as a shortcut for $foo=undef

Meh. I'm generally not a fan of these shortcuts.

> and $? as a shortcut for $=

If "$foo?" is allowed then "$?" certainly should be, but "$=" seems
short enough already.

> \$s? becomes a shortcut for \$s = undef,

Presumably you mean "\$s = \undef"; "\$s = undef" would signal an error
in the default case.

> \@a? becomes a shortcut for \@a = [],
> \%h? becomes a shortcut for \%h = {},

Defaulting to empty aggregates, sure, but fresh mutable ones? To parallel
the scalar default they should alias *im*mutable empty aggregates.
Probably always the same immutable array and the same immutable hash.

If there's serious doubt about what the "?" defaults should be, then the
"?" shorthand clearly isn't going to work.

>At the same time, ban the existing legal syntax '$='

I disagree. This syntax is fine as it is, part of a coherent design.
"=" is consistently used in the syntax for optional parameters.

>Perhaps allow simple syntax to auto-declare $self as the first argument?

Imposing a specific variable name on the user?

It's a bit difficult to discuss this absent any "method" keyword or
anything else that implies a subroutine taking one or more stereotyped
positional parameters.

> sub foo($x, ?{ print "x=$x\n" }, $y = $x+1) { ... }
...
>I suppose the question is, whether this is useful, and whether it allows
>you to do things that can't be done with default value expressions,

Clearly it can do things that would be awkward otherwise. For example,
it can munge the value of a parameter variable in arbitrary fashion,
making the munged value visible to expressions associated with setting up
later parameter variables. Linking to the "//=" discussion above, "($x,
?{ $x //= 5 }, $y = $x+1)" lets one easily achieve the effect proposed
for "($x //= 5, $y = $x+1)", without needing to build in a "//=" operator.

So yes, it's useful, and it reduces the pressure for a bunch of other
features of dubious value.

>The '?' before the '{' isn't strictly necessary syntax-wise, but grouping
>it in with the 'query parameter' syntax emphasises that this parameter
>doesn't consume an argument.

It's a bit ugly, but the "query parameter" concept may make up for that.

>My feeling (and as expressed in other individual proposals here) is that
>everything apart from the sigil and parameter name is signature syntax and
>can have optional whitespace around it, like perl stuff generally can.

Yes, these things should permit whitespace.

>On the other hand, Perl 6 doesn't allow whitespace. Should we similarly
>ban it from Perl 5 signatures? My gut feeling is yes: fix this while still
>experimental.

No. Perl 5 permits whitespace between sigil and identifier in all sorts
of non-experimental situations, including of course the non-experimental
"my" syntax for declaring lexical variables. The signature syntax should
be consistent with the rest of Perl 5. There is no justification for
importing a Perl 6 syntax rule just for this one case.

>Should we in some fashion allow additional user/pragma defined traits?
>E.g. 'does', 'has' etc?

"does" and "has" sound like additional forms of type constraint, and as
such should be handled as user-defined type constraints. Preferably by
permitting arbitrary expressions on the rhs of "is", as I discussed in
that subthread.

As for other traits, we don't seem to have any generalised concept of
what traits are for. Of all the traits you've proposed, one is for
coercion, and all the others are about constraints. (Except for the bit
where you imagine "is Int" performing both constraint *and* coercion,
which I reckon is a bad idea.) It would only be meaningful to have a
generalised trait system if there were a generalised way for plugged-in
trait code to do meaningful things. We kinda already have such a system
with attributes, but it turns out there's very little that attribute code
can meaningfully do. In Perl 6, trait handlers have a rich metaobject
ecosystem to mess about in; Perl 5 doesn't have anything like that,
so I think a generalised trait system would be at least as useless as
the generalised attribute system.

>I propose the following order:
...
> Int Optional type

This should go immediately before the sigilled name, as part of the
declaration of the lexical variable rather than anything to do with
arguments per se.

> :foo(...) Optional attribute(s)

This should go immediately after the sigilled name, for the same reason.

> = .... Default value
> where/as/isa/is ... Constraint

This order is appropriate if constrants and coercion apply to default
values. However, it means that trait keywords screw up expression syntax
in default value expressions, which should be avoided. If default values
are exempted from constraint checking (as I've suggested), the order
should be swapped. If traits come before default value then there's
no such syntactic problem: the defaulting "=" is a fine delimiter for
a trait expression, based purely on operator precedence.

> sub f ($a,$a) { ... }
>
> "my" variable $a masks earlier declaration in same scope
>
>I think it should croak instead. (p5hack agreed).

I think it should be consistent with other ways of declaring lexical
variables. The rules should not be different just for signatures.
The programmer is free to make shadowing warnings fatal, and if we think
this is terrible style then we're free to implement a stricture (which
can be part of a Perl-version feature bundle) to make shadowing fatal.

>=head2 Signature introspection API.
...
>Should perl supply such an API?

Introspecting a signature should be exactly as easy (no easier and
no more difficult) than introspecting any other op in a sub's body.
It should absolutely not be promoted as subroutine metadata to be
examined independently from the rest of the body. It's an internal
implementation detail that should not leak out independent of the rest
of the implementation. If it is perceived as metadata, there's a danger
that it'll be treated as part of the sub's API, and become something
that isn't allowed to change between module versions.

> foo(:$x, :$y);
...
>It would be nice if Perl 5 provided a similar syntax.

Yes, a bit. If such a syntax is added, the named parameter syntax for
the common same-name case should imitate the syntax for this shorthand.

>It would be a compile-time error in void/scalar context.

That sounds like a bad idea. List expressions are generally permitted in
void and scalar context. I think this feature should be pure shorthand
for (foo=>$foo).

>Of course, the specific syntax ':$x' wont work in Perl 5, as it's seen as
>part of a ? : conditional.

Yes. I think it might also clash with some of the other uses of colon.

> These appear
>to be free still (at least in the context of when a term is expected):
>
> ^$x
> =$x
> >$x
> .$x

"=" would be problematic because of clashes with POD syntax. There's
already a bit of a clash, but it only arises where a new paragraph
(as judged for POD purposes) happens in the middle of an expression.
"=$x" would mean that expression syntax can *start* with "=", making it
much easier to mistake code for POD.

Of these options, I have some preference for ">$x", which at least looks
like an abbreviation of "x=>$x". But all these options are ugly.

>A second possibility is some sort of punctuation char between the sigil
>and variable name, e.g. $*foo.

This is worse, for the reason you outlined.

> =@foo
> =%foo

This seems more confusing than it's worth, with the implicit
enreferencement. On the receiving end of a named parameter, I'd want
the syntax to be "foo => \@foo", to make the aliasing clear, and the
call should be similar.

-zefram

          

Re: Type and Value Constraints and Coercions by Zefram via perl5-porters

 Cache   
Dave Mitchell wrote:
> $self isa Foo::Bar, # croak unless $self->isa('Foo::Bar');
> $foo isa Foo::Bar?, # croak unless undef or of that class
> $a!, # croak unless $a is defined
> $b is Int, # croak if $b not int-like
> $c is Int?, # croak unless undefined or int-like
> $d is PositiveInt, # user-defined type
> $e is Int where $_ >= 1, # multiple constraints
> $f is \@, # croak unless array ref
> $aref as ref ? $_ : [ $_ ] # coercions: maybe modify the param

Yuck. This is a huge amount of new syntax to add. The new syntax doesn't
pull its weight, given that it can only be used in this one context.
If you're adding a bunch of syntax for type constraints, it should also
be available for type checking purposes outside signatures.

It's also rather too Perl6ish for Perl 5: all these consecutive barewords
will cause a bunch of new parsing ambiguities. Thinking about how the
constraint syntax would be made available in general expression contexts
might help in coming up with less troublesome syntax.

>So, given that a constraint type system and a "real" type system are two
>separate things (unless someone smarter than me can can suggest a way of
>unifying them), I think that they should be kept syntactically separate.

Yes, this is a good decision.

>processed against the lexical parameter, after any binding of arguments or
>default value.

In previous discussion, we were leaning towards exempting default values
from constraints. Given that this is about constrainting arguments,
rather than applying types to lexical variables, I still think exempting
defaults is advantageous.

As for aliasing, it seems to me that in a signature (\@foo), \@foo is
a scalar value capable of being constrained. It makes perfect sense to
apply a constraint to an argument that is received by aliasing, and no,
the automatic constraint to it being an array reference isn't enough.

> sub f ($x isa Class::name)

Would "($x isa $other_class)" be legal? The stuff about postfix
"?" suggests that this syntax is too specific to permit the use of an
arbitrary expression. But forbidding general expressions would be an
annoying limitation on the use of "isa".

> sub foo ($x is Int ) { ... }

Although you say you're not creating a core type system, you are somewhat
doing exactly that here. You're certainly inventing a namespace populated
with a bunch of type-like objects. This is not to be done lightly,
and deciding what "Int" means is a substantial task. You're very much
importing Perl 6 syntax that's tied to semantics that Perl 5 doesn't have.
Perl 6 already has a well defined thing called "Int", which knows which
values satisfy it and which don't, whereas Perl 5 has a semantic that
*anything* is an integer if you want to treat it that way. We certainly
can come up with concepts of "integer" for Perl 5 that identify a proper
subset of values, but there are many possible concepts, and there's no
precedent for the Perl 5 core being concerned with any of them.

> sub foo ($x is PositiveInt) { ... }
> # roughly equivalent to: ($x is Int where $x >= 0)

I hope you don't think that zero is a positive integer.

>Like 'isa', 'is' type names can be followed by '?', indicating that an
>undefined value is also allowed.

This again implies that general expressions won't be permitted on the
rhs of "is". It's a bigger problem for "is" than for "isa".

>Type names as used by 'is' occupy a different namespace than perl
>packages and classes,

It's quite necessary to make this distinction, and particularly to
distinguish between "isa" and "is". But I have issues with the new
namespace used by "is"; see below.

>The built-in constraint types will also coerce the resultant parameter

It's a bad idea to mix these separate concerns. Constraint checking and
type coercion are different ideas that should remain distinct. Also,
just as there are multiple ideas of what is an integer in Perl 5, there
are multiple ideas of what turning a value into a `purer' integer entails.
Remember, passing "is Int" implies that the supplied argument *is* an
integer (whatever that means), so coercing it *to* an integer should
be the identity operation. If you're doing a non-identity coercion,
that means you've got a second, stricter, concept of integer in play.
Wanting to check that an argument satisfies one concept of integer
does not imply which stricter concept of integer you'd like it to be
converted to.

>Constraints apart from '!' and 'isa' cannot be used on a parameter which
>is a direct alias (e.g. *$x), since this might trigger coercing the
>passed argument and thus causing unexpected action at a distance.

It seems essential, to me, that constraints should be applicable to
aliased parameters. Constraint checking code should not have such bad
taste as to side-effect its parameter. Coercion would also better be
seen as a function applied to the parameter to return a coerced value,
rather than mutating its input. But if code is written such that it
does behave so badly, well, it's not the first nor even the fifth place
in Perl 5 that side effects can surprise distant code.

>The complete collection of where/as/isa/is clauses are collectively
>enclosed in their own logical single scope,

This sits uneasily with the interleaving of these clauses with default
value expressions. I'm not sure what the scope of lexical variables
introduced in a where clause *should* be, but I'm pretty sure it shouldn't
be visible in a later where clause without also being visible in an
intervening default value expression. I think it's also difficult
to implement such selective visibility, given the way lexical scopes
are managed.

I'm concerned about the idea of this scope, whether in its lexical or
dynamic aspects, being at all visible to the programmer. It has the
whiff of implementation leaking out.

>Constraints can only be supplied to scalar parameters; in particular they
>can't be applied to:
...
>* Placeholder (nameless) parameters.

Bad idea. It should be possible to type check an argument that is
otherwise ignored. If it's just a matter of the implementation wanting
a lexical variable to apply the constraint logic to, you can perfectly
well create a lexical variable (pad slot) without any name.

> $x is Int+ equivalent to: $x is Int where $_ >= 0
> $x is Str+ equivalent to: $x is Str where length($_) > 0

Failure to make the "+" parts analogous. This suggests that this kind of
name (for which there's no precedent in Perl) would be fairly confusing.

>I think we should also include a few built-in "symbol" constraint type
>names,

Doesn't seem worth the irregularity.

>At compile time it will be possible for pragmata and similar to add
>lexically-scoped type hook functions via the hints mechanism.

It seems to me that Perl already has serviceable namespacing mechanisms,
and doesn't need a new kind of namespace just for type constraints.
It would be better for the rhs of "is" to take an arbitrary expression,
and use the value to which that expression evaluates as the type
constraint object. This way we get to use all our existing mechanisms
to manage the names of type constraints. One "use" declaration and
the programmer can have "Int" et al defined the way you imagine.
This would also avoid the core taking some arbitrary position on what
"Int" `really' means.

The ability to construct type constraints in a general expression can
easily subsume "isa" and "where". There's no need for so much syntax.

We also already have a serviceable mechanism for type constraint objects:
objects that overload the smartmatch operator. No need to reinvent
the wheel.

>4) Return a string containing a source code snippet to be inserted into
>the source text at that point.

Yuck. Terrible plugin mechanism; very vulnerable to lexical state
affecting the parsing. Don't bring Devel::Declare crack into the core,
and don't encourage people to write fragile plugin code. It's already
possible for a constraint checking sub to inline itself via call checker
magic.

>This would be for a constraint hook to be specified as a empty-bodied sub
>with a single parameter. The constraint(s) specified for that parameter
>become the custom constraints which that hook provides.

Nasty.

>I propose that for each built-in constraint type there will be a
>corresponding function in the 'is::' namespace which returns a boolean
>indicating whether the argument passes that constraint.

Too limited. If there's special syntax on the rhs of "is", then the
whole thing, including "where" clauses, "?" decorations, and references
to user-defined type constraints, should be available in some kind of
expression context. Essentially, "$x is Int where $_ > 3" should be a
truth-value expression. Of course, this runs into the problem of the
bareword-based syntax not playing nicely with existing expression syntax;
the syntax would have to be redesigned to fix that.

>be also be useful for built-ins having extra characters in them like I
>suggested above, e.g. is::is($x, 'Int++') and is::is($aref, '\@');

Wrong way to do it. It would mean essentially implementing the type
constraint syntax twice: once in the actual parser, for signatures,
and a second time to handle the string argument to is::is().

>Moose supports aggregate and alternation / composite constraints; for
>example, ArrayRef[Int] and [Int|Num].
>
>Personally I think that we shouldn't support these; it will make things
>far too complex.

Semantically, things like ArrayRef[Int] and junctions are quite
frequently needed. It should be easy to construct such type constraints.
Predeclaring and giving them monomial names as user-defined type
constraints seems rather cumbersome. This is part of why I favour the
rhs of "is" being a general expression context.

> Also, the nested HashRef[ArrayRef[Int]] form quickly
>becomes a performance nightmare, with every element of the AoH having to
>be checked for Int-ness on every call to the function.

If that's the type checking that's actually required, then the cost
of checking must be borne. It is a false economy to discourage the
programmer from making the proper checks.

-zefram



Next Page: 10000

© Googlier LLC, 2019