Code Documentation Quotes

We've searched our database for all the quotes and captions related to Code Documentation. Here they are! All 100 of them:

I will love you if I never see you again, and I will love you if I see you every Tuesday. I will love you as the starfish loves a coral reef and as kudzu loves trees, even if the oceans turn to sawdust and the trees fall in the forest without anyone around to hear them. I will love you as the pesto loves the fettuccini and ats the horseradish loves the miyagi, and the pepperoni loves the pizza. I will love you as the manatee loves the head of lettuce and as the dark spot loves the leopard, as the leech loves the ankle of a wader and as a corpse loves the beak of the vulture. I will love you as the doctor loves his sickest patient and a lake loves its thirstiest swimmer. I will love you as the beard loves the chin, and the crumbs love the beard, and the damp napkin loves the crumbs, and the precious document loves the dampness of the napkin, and the squinting eye of the reader loves the smudged document, and the tears of sadness love the squinting eye as it misreads what is written. I will love you as the iceberg loves the ship, and the passengers love the lifeboat, and the lifeboat loves the teeth of the sperm whale, and the sperm whale loves the flavor of naval uniforms. I will love you as a drawer loves a secret compartment, and as a secret compartment loves a secret, and as a secret loves to make a person gasp... I will love you until all such compartments are discovered and opened, and all the secrets have gone gasping into the world. I will love you until all the codes and hearts have been broken and until every anagram and egg has been unscrambled. I will love you until every fire is extinguished and rebuilt from the handsomest and most susceptible of woods. I will love you until the bird hates a nest and the worm hates an apple. I will love you as we find ourselves farther and farther from one another, where once we were so close... I will love you until your face is fogged by distant memory. I will love you no matter where you go and who you see, I will love you if you don't marry me. I will love you if you marry someone else--and i will love you if you never marry at all, and spend your years wishing you had married me after all. That is how I will love you even as the world goes on its wicked way.
Lemony Snicket (The Beatrice Letters)
Good code is its own best documentation. As you're about to add a comment, ask yourself, 'How can I improve the code so that this comment isn't needed?' Improve the code and then document it to make it even clearer.
Steve McConnell (Code Complete: A Practical Handbook of Software Construction)
I have never been one of those people—I know you aren’t, either—who feels that the love one has for a child is somehow a superior love, one more meaningful, more significant, and grander than any other. I didn’t feel that before Jacob, and I didn’t feel that after. But it is a singular love, because it is a love whose foundation is not physical attraction, or pleasure, or intellect, but fear. You have never known fear until you have a child, and maybe that is what tricks us into thinking that it is more magnificent, because the fear itself is more magnificent. Every day, your first thought is not “I love him” but “How is he?” The world, overnight, rearranges itself into an obstacle course of terrors. I would hold him in my arms and wait to cross the street and would think how absurd it was that my child, that any child, could expect to survive this life. It seemed as improbable as the survival of one of those late-spring butterflies—you know, those little white ones—I sometimes saw wobbling through the air, always just millimeters away from smacking itself against a windshield. And let me tell you two other things I learned. The first is that it doesn’t matter how old that child is, or when or how he became yours. Once you decide to think of someone as your child, something changes, and everything you have previously enjoyed about them, everything you have previously felt for them, is preceded first by that fear. It’s not biological; it’s something extra-biological, less a determination to ensure the survival of one’s genetic code, and more a desire to prove oneself inviolable to the universe’s feints and challenges, to triumph over the things that want to destroy what’s yours. The second thing is this: when your child dies, you feel everything you’d expect to feel, feelings so well-documented by so many others that I won’t even bother to list them here, except to say that everything that’s written about mourning is all the same, and it’s all the same for a reason—because there is no real deviation from the text. Sometimes you feel more of one thing and less of another, and sometimes you feel them out of order, and sometimes you feel them for a longer time or a shorter time. But the sensations are always the same. But here’s what no one says—when it’s your child, a part of you, a very tiny but nonetheless unignorable part of you, also feels relief. Because finally, the moment you have been expecting, been dreading, been preparing yourself for since the day you became a parent, has come. Ah, you tell yourself, it’s arrived. Here it is. And after that, you have nothing to fear again.
Hanya Yanagihara (A Little Life)
The unit tests are documents. They describe the lowest-level design of the system.
Robert C. Martin (Clean Coder, The: A Code of Conduct for Professional Programmers (Robert C. Martin Series))
In a modern twist to the classic overeating experiments, Feltham decided that he would eat 5794 calories per day and document his weight gain. But the diet he chose was not a random 5794 calories. He followed a low-carbohydrate, high-fat diet of natural foods for twenty-one days. Feltham believed, based on clinical experience, that refined carbohydrates, not total calories, caused weight gain. The macronutrient breakdown of his diet was 10 percent carbohydrate, 53 percent fat and 37 percent protein. Standard calorie calculations predicted a weight gain of about 16 pounds (7.3 kilograms). Actual weight gain, however, was only about 2.8 pounds (1.3 kilograms). Even more interesting, he dropped more than 1 inch (2.5 centimeters) from his waist measurement. He gained weight, but it was lean mass.
Jason Fung (The Obesity Code: Unlocking the Secrets of Weight Loss (Why Intermittent Fasting Is the Key to Controlling Your Weight))
Overlooked, too, is that the Visigothic Code of Law was, for its time, an impressive document that combined Visigoth practices with Roman law and Christian principles, and that evidences a guiding desire to limit the power of government many centuries before Magna Carta.
Darío Fernández-Morera (The Myth of the Andalusian Paradise: Muslims, Christians, and Jews under Islamic Rule in Medieval Spain)
The Bible became the book of books, but it is not one document. It is a mystical library of interwoven texts by unknown authors who wrote and edited at different times with widely divergent aims. This sacred work of so many epochs and so many hands contains some facts of provable history, some stories of unprovable myth, some poetry of soaring beauty, and many passages of unintelligible, perhaps coded, perhaps simply mistranslated, mystery. Most of it is written not to recount events but to promote a higher truth—the relationship of one people and their God.
Simon Sebag Montefiore (Jerusalem: The Biography)
In 1953, Allen Dulles, then director of the USA Central Intelligence Agency (CIA), named Dr Sidney Gottlieb to direct the CIA's MKULTRA programme, which included experiments conducted by psychiatrists to create amnesia, new dissociated identities, new memories, and responses to hypnotic access codes. In 1972, then-CIA director Richard Helms and Gottlieb ordered the destruction of all MKULTRA records. A clerical error spared seven boxes, containing 1738 documents, over 17,000 pages. This archive was declassified through a Freedom of Information Act Request in 1977, though the names of most people, universities, and hospitals are redacted. The CIA assigned each document a number preceded by "MORI", for "Managament of Officially Released Information", the CIA's automated electronic system at the time of document release. These documents, to be referenced throughout this chapter, are accessible on the Internet (see: abuse-of-power (dot) org/modules/content/index.php?id=31). The United States Senate held a hearing exposing the abuses of MKULTRA, entitled "Project MKULTRA, the CIA's program of research into behavioral modification" (1977).
Orit Badouk Epstein (Ritual Abuse and Mind Control)
Even the National Cholesterol Education Program admits, “The percentage of total fat in the diet, independent of caloric intake, has not been documented to be related to body weight.
Jason Fung (The Obesity Code: Unlocking the Secrets of Weight Loss (Why Intermittent Fasting Is the Key to Controlling Your Weight))
For a thousand years,” Langdon continued, “legends of this secret have been passed on. The entire collection of documents, its power, and the secret it reveals have become known by a single name—Sangreal.
Dan Brown (The da Vinci Code (Robert Langdon, #2))
But it is a singular love, because it is a love whose foundation is not physical attraction, or pleasure, or intellect, but fear. You have never known fear until you have a child, and maybe that is what tricks us into thinking that it is more magnificent, because the fear itself is more magnificent. Every day, your first thought is not “I love him” but “How is he?” The world, overnight, rearranges itself into an obstacle course of terrors. I would hold him in my arms and wait to cross the street and would think how absurd it was that my child, that any child, could expect to survive this life. It seemed as improbable as the survival of one of those late-spring butterflies—you know, those little white ones—I sometimes saw wobbling through the air, always just millimeters away from smacking itself against a windshield. And let me tell you two other things I learned. The first is that it doesn’t matter how old that child is, or when or how he became yours. Once you decide to think of someone as your child, something changes, and everything you have previously enjoyed about them, everything you have previously felt for them, is preceded first by that fear. It’s not biological; it’s something extra-biological, less a determination to ensure the survival of one’s genetic code, and more a desire to prove oneself inviolable to the universe’s feints and challenges, to triumph over the things that want to destroy what’s yours. The second thing is this: when your child dies, you feel everything you’d expect to feel, feelings so well-documented by so many others that I won’t even bother to list them here, except to say that everything that’s written about mourning is all the same, and it’s all the same for a reason—because there is no real deviation from the text. Sometimes you feel more of one thing and less of another, and sometimes you feel them out of order, and sometimes you feel them for a longer time or a shorter time. But the sensations are always the same. But here’s what no one says—when it’s your child, a part of you, a very tiny but nonetheless unignorable part of you, also feels relief. Because finally, the moment you have been expecting, been dreading, been preparing yourself for since the day you became a parent, has come. Ah, you tell yourself, it’s arrived. Here it is. And after that, you have nothing to fear again.
Hanya Yanagihara (A Little Life)
Irena Sendler (code name "Jolanta") described it. A Christian doctor's daughter with many Jewish friends, she reconfigured her job at the Social Welfare Department, recruited ten like-minded others, and began issuing false documents with forged signatures.
Diane Ackerman (The Zookeeper's Wife)
And let me tell you two other things I learned. The first is that it doesn’t matter how old that child is, or when or how he became yours. Once you decide to think of someone as your child, something changes, and everything you have previously enjoyed about them, everything you have previously felt for them, is preceded first by that fear. It’s not biological; it’s something extra-biological, less a determination to ensure the survival of one’s genetic code, and more a desire to prove oneself inviolable to the universe’s feints and challenges, to triumph over the things that want to destroy what’s yours. The second thing is this: when your child dies, you feel everything you’d expect to feel, feelings so well-documented by so many others that I won’t even bother to list them here, except to say that everything that’s written about mourning is all the same, and it’s all the same for a reason—because there is no real deviation from the text. Sometimes you feel more of one thing and less of another, and sometimes you feel them out of order, and sometimes you feel them for a longer time or a shorter time. But the sensations are always the same. But here’s what no one says—when it’s your child, a part of you, a very tiny but nonetheless unignorable part of you, also feels relief. Because finally, the moment you have been expecting, been dreading, been preparing yourself for since the day you became a parent, has come. Ah, you tell yourself, it’s arrived. Here it is. And after that, you have nothing to fear again.
Hanya Yanagihara (A Little Life)
Any attempt to fix it with minimum effort will repair the local and obvious, but unless the structure is pure or the documentation very fine, the far-reaching effects of the repair will be overlooked. Second, the repairer is usually not the man who wrote the code, and often he is a junior programmer or trainee.
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
If Urton is right, khipu were unique. They were the world’s sole intrinsically three-dimensional written documents (Braille is a translation of writing on paper) and the only ones to use a “system of coding information” that “like the coding systems used in present-day computer language, was structured primarily as a binary code.
Charles C. Mann (1491: New Revelations of the Americas Before Columbus)
Inheritance adds complexity to a program, and, as such, it's a dangerous technique. As Java guru Joshua Bloch says, "Design and document for inheritance, or prohibit it." If a class isn't designed to be inherited from, make its members non-virtual in C++, final in Java, or non-overridable in Microsoft Visual Basic so that you can't inherit from it.
Steve McConnell (Code Complete)
Armstrong: I like documentation. I don't think a program is finished until you've written some reasonable documentation. And I quite like a specification. I think it's unprofessional these people who say, "What does it do? Read the code." The code shows me what it does. It doesn't show me what it's supposed to do. I think the code is the answer to a problem.
Seibel Peter
In the case of Peugeot SA the crucial story was the French legal code, as written by the French parliament. According to the French legislators, if a certified lawyer followed all the proper liturgy and rituals, wrote all the required spells and oaths on a wonderfully decorated piece of paper, and affixed his ornate signature to the bottom of the document, then hocus pocus – a new company was incorporated.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Before getting into CRISPR, Zayner tried a variety of synthetic biology experiments, including on himself. To treat his gastrointestinal problems, he performed a fecal transplant (don’t ask) to transform his gut’s microbiome. He did the procedure in a hotel room with two filmmakers documenting the scene, and (in case you really do want to know how it works) it became a short documentary called Gut Hack that can be found online.2
Walter Isaacson (The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race)
In the morning I walked to the bank. I went to the automated teller machine to check my balance. I inserted my card, entered my secret code, tapped out my request. The figure on the screen roughly corresponded to my independent estimate, feebly arrived at after long searches through documents, tormented arithmetic. Waves of relief and gratitude flowed over me. The system had blessed my life. I felt its support and approval. The system hardware, the mainframe sitting in a locked room in some distant city. What a pleasing interaction. I sensed that something of deep personal value, but not money, not that at all, had been authenticated and confirmed. A deranged person was escorted from the bank by two armed guards. The system was invisible, which made it all the more impressive, all the more disquieting to deal with. But we were in accord, at least for now.
Don DeLillo (White Noise)
The tail is the time period from “code slush” (true code freezes are rare) or “feature freeze” to actual deployment. This is the time period when companies do some or all of the following: beta testing, regression testing, product integration, integration testing, documentation, defect fixing. The worst “tail” I’ve encountered was 18 months—18 months from feature freeze to product release, and most of that time was spent in QA. I’ve
Jim Highsmith (Adaptive Leadership)
Irrelevant’ Chris Fogle turns a page. Howard Cardwell turns a page. Ken Wax turns a page. Matt Redgate turns a page. ‘Groovy’ Bruce Channing attaches a form to a file. Ann Williams turns a page. Anand Singh turns two pages at once by mistake and turns one back which makes a slightly different sound. David Cusk turns a page. Sandra Pounder turns a page. Robert Atkins turns two separate pages of two separate files at the same time. Ken Wax turns a page. Lane Dean Jr. turns a page. Olive Borden turns a page. Chris Acquistipace turns a page. David Cusk turns a page. Rosellen Brown turns a page. Matt Redgate turns a page. R. Jarvis Brown turns a page. Ann Williams sniffs slightly and turns a page. Meredith Rand does something to a cuticle. ‘Irrelevant’ Chris Fogle turns a page. Ken Wax turns a page. Howard Cardwell turns a page. Kenneth ‘Type of Thing’ Hindle detaches a Memo 402-C(1) from a file. ‘Second-Knuckle’ Bob McKenzie looks up briefly while turning a page. David Cusk turns a page. A yawn proceeds across one Chalk’s row by unconscious influence. Ryne Hobratschk turns a page. Latrice Theakston turns a page. Rotes Group Room 2 hushed and brightly lit, half a football field in length. Howard Cardwell shifts slightly in his chair and turns a page. Lane Dean Jr. traces his jaw’s outline with his ring finger. Ed Shackleford turns a page. Elpidia Carter turns a page. Ken Wax attaches a Memo 20 to a file. Anand Singh turns a page. Jay Landauer and Ann Williams turn a page almost precisely in sync although they are in different rows and cannot see each other. Boris Kratz bobs with a slight Hassidic motion as he crosschecks a page with a column of figures. Ken Wax turns a page. Harriet Candelaria turns a page. Matt Redgate turns a page. Ambient room temperature 80° F. Sandra Pounder makes a minute adjustment to a file so that the page she is looking at is at a slightly different angle to her. ‘Irrelevant’ Chris Fogle turns a page. David Cusk turns a page. Each Tingle’s two-tiered hemisphere of boxes. ‘Groovy’ Bruce Channing turns a page. Ken Wax turns a page. Six wigglers per Chalk, four Chalks per Team, six Teams per group. Latrice Theakston turns a page. Olive Borden turns a page. Plus administration and support. Bob McKenzie turns a page. Anand Singh turns a page and then almost instantly turns another page. Ken Wax turns a page. Chris ‘The Maestro’ Acquistipace turns a page. David Cusk turns a page. Harriet Candelaria turns a page. Boris Kratz turns a page. Robert Atkins turns two separate pages. Anand Singh turns a page. R. Jarvis Brown uncrosses his legs and turns a page. Latrice Theakston turns a page. The slow squeak of the cart boy’s cart at the back of the room. Ken Wax places a file on top of the stack in the Cart-Out box to his upper right. Jay Landauer turns a page. Ryne Hobratschk turns a page and then folds over the page of a computer printout that’s lined up next to the original file he just turned a page of. Ken Wax turns a page. Bob Mc-Kenzie turns a page. Ellis Ross turns a page. Joe ‘The Bastard’ Biron-Maint turns a page. Ed Shackleford opens a drawer and takes a moment to select just the right paperclip. Olive Borden turns a page. Sandra Pounder turns a page. Matt Redgate turns a page and then almost instantly turns another page. Latrice Theakston turns a page. Paul Howe turns a page and then sniffs circumspectly at the green rubber sock on his pinkie’s tip. Olive Borden turns a page. Rosellen Brown turns a page. Ken Wax turns a page. Devils are actually angels. Elpidia Carter and Harriet Candelaria reach up to their Cart-In boxes at exactly the same time. R. Jarvis Brown turns a page. Ryne Hobratschk turns a page. ‘Type of Thing’ Ken Hindle looks up a routing code. Some with their chin in their hand. Robert Atkins turns a page even as he’s crosschecking something on that page. Ann Williams turns a page. Ed Shackleford searches a file for a supporting document. Joe Biron-Maint turns a page. Ken Wax turns a page.
David Foster Wallace (The Pale King)
[ Dr. Lois Jolyon West was cleared at Top Secret for his work on MKULTRA. ] Dr. Michael Persinger [235], another FSMF Board Member, is the author of a paper entitled “Elicitation of 'Childhood Memories' in Hypnosis-Like Settings Is Associated With Complex Partial Epileptic-Like Signs For Women But Not for Men: the False Memory Syndrome.” In the paper Perceptual and Motor Skills,In the paper, Dr. Persinger writes: On the day of the experiment each subject (not more than two were tested per day) was asked to sit quietly in an acoustic chamber and was told that the procedure was an experiment in relaxation. The subject wore goggles and a modified motorcycle helmet through which 10-milligauss (1 microTesla) magnetic fields were applied through the temporal plane. Except for a weak red (photographic developing) light, the room was dark. Dr. Persinger's research on the ability of magnetic fields to facilitate the creation of false memories and altered states of consciousness is apparently funded by the Defense Intelligence Agency through the project cryptonym SLEEPING BEAUTY. Freedom of Information Act requests concerning SLEEPING BEAUTY with a number of different intelligence agencies including the CIA and DEA has yielded denial that such a program exists. Certainly, such work would be of direct interest to BLUEBIRD, ARTICHOKE, MKULTRA and other non-lethal weapons programs. Schnabel [280] lists Dr. Persinger as an Interview Source in his book on remote viewing operations conducted under Stargate, Grill Flame and other cryptonyms at Fort Meade and on contract to the Stanford Research Institute. Schnabel states (p. 220) that, “As one of the Pentagon's top scientists, Vorona was privy to some of the strangest, most secret research projects ever conceived. Grill Flame was just one. Another was code-named Sleeping Beauty; it was a Defense Department study of remote microwave mind-influencing techniques ... [...] It appears from Schnabel's well-documented investigations that Sleeping Beauty is a real, but still classified mind control program. Schnabel [280] lists Dr. West as an Interview Source and says that West was a, “Member of medical oversight board for Science Applications International Corp. remote-viewing research in early 1990s.
Colin A. Ross (The CIA Doctors: Human Rights Violations by American Psychiatrists)
As you grow in influence, you’ll find that more and more people want you to care about things. Someone’s putting together a best practices document for how your organization does code review, and they want your opinion. Your group is doing a hiring push and needs help deciding what to interview for. There’s a deprecation that would be making more progress if it had a staff engineer drumming up senior sponsorship. And that’s just Monday morning. What do you do?
Tanya Reilly (The Staff Engineer's Path: A Guide for Individual Contributors Navigating Growth and Change)
In a classic study of how names impact people’s experience on the job market, researchers show that, all other things being equal, job seekers with White-sounding first names received 50 percent more callbacks from employers than job seekers with Black-sounding names.5 They calculated that the racial gap was equivalent to eight years of relevant work experience, which White applicants did not actually have; and the gap persisted across occupations, industry, employer size – even when employers included the “equal opportunity” clause in their ads.6 With emerging technologies we might assume that racial bias will be more scientifically rooted out. Yet, rather than challenging or overcoming the cycles of inequity, technical fixes too often reinforce and even deepen the status quo. For example, a study by a team of computer scientists at Princeton examined whether a popular algorithm, trained on human writing online, would exhibit the same biased tendencies that psychologists have documented among humans. They found that the algorithm associated White-sounding names with “pleasant” words and Black-sounding names with “unpleasant” ones.7 Such findings demonstrate what I call “the New Jim Code”: the employment of new technologies that reflect and reproduce existing inequities but that are promoted and perceived as more objective or progressive than the discriminatory systems of a previous era.
Ruha Benjamin (Race After Technology: Abolitionist Tools for the New Jim Code)
understand that there are rules to follow if you are to win: 1. The model will provide consistent value to your customers, employees, suppliers, and lenders, beyond what they expect. 2. The model will be operated by people with the lowest possible level of skill. 3. The model will stand out as a place of impeccable order. 4. All work in the model will be documented in Operations Manuals. 5. The model will provide a uniformly predictable service to the customer. 6. The model will utilize a uniform color, dress, and facilities code.
Michael E. Gerber (The E-Myth Revisited: Why Most Small Businesses Don't Work and What to Do About It)
Consider this oddly neglected fact: the West was acquired, conquested, and largely consolidated into the nation coincident with the greatest breakthrough in the history of human communication. The breakthrough was the telegraph. The great advances that followed it, the telephone, radio, television, and the Internet, were all elaborations on its essential contribution. The telegraph separated the person from the message. Before it, with a few exceptions such as a sephamore and carrier pigeons, information moved only as fast as people did. By the nineteenth century, people were certainly moving a lot faster, and indeed a second revolution, that of transportation, was equally critical in creating the West, but before the telegraph a message still had to move with a person, either as a document or in somebody’s head. The telegraph liberated information. Now it could travel virtually at the speed of light. The railroad carried people and things, including letters, ten to fifteen times faster than the next most rapid form of movement. The telegraph accelerated communication more than forty million times. A single dot of Morse code traveled from Kansas City to Denver faster than the click it produced moved from the receiver to the telegrapher’s eardrum.
Elliott West (The Essential West: Collected Essays)
Security is a big and serious deal, but it’s also largely a solved problem. That’s why the average person is quite willing to do their banking online and why nobody is afraid of entering their credit card number on Amazon. At 37signals, we’ve devised a simple security checklist all employees must follow: 1. All computers must use hard drive encryption, like the built-in FileVault feature in Apple’s OS X operating system. This ensures that a lost laptop is merely an inconvenience and an insurance claim, not a company-wide emergency and a scramble to change passwords and worry about what documents might be leaked. 2. Disable automatic login, require a password when waking from sleep, and set the computer to automatically lock after ten inactive minutes. 3. Turn on encryption for all sites you visit, especially critical services like Gmail. These days all sites use something called HTTPS or SSL. Look for the little lock icon in front of the Internet address. (We forced all 37signals products onto SSL a few years back to help with this.) 4. Make sure all smartphones and tablets use lock codes and can be wiped remotely. On the iPhone, you can do this through the “Find iPhone” application. This rule is easily forgotten as we tend to think of these tools as something for the home, but inevitably you’ll check your work email or log into Basecamp using your tablet. A smartphone or tablet needs to be treated with as much respect as your laptop. 5. Use a unique, generated, long-form password for each site you visit, kept by password-managing software, such as 1Password.§ We’re sorry to say, “secretmonkey” is not going to fool anyone. And even if you manage to remember UM6vDjwidQE9C28Z, it’s no good if it’s used on every site and one of them is hacked. (It happens all the time!) 6. Turn on two-factor authentication when using Gmail, so you can’t log in without having access to your cell phone for a login code (this means that someone who gets hold of your login and password also needs to get hold of your phone to login). And keep in mind: if your email security fails, all other online services will fail too, since an intruder can use the “password reset” from any other site to have a new password sent to the email account they now have access to. Creating security protocols and algorithms is the computer equivalent of rocket science, but taking advantage of them isn’t. Take the time to learn the basics and they’ll cease being scary voodoo that you can’t trust. These days, security for your devices is just simple good sense, like putting on your seat belt.
Jason Fried (Remote: Office Not Required)
When a domain reaches a point where the knowledge for skillful professional practice cannot be acquired in a decade, more or less, then several adaptive developments are likely to occur. Specialization will usually increase (as it has, for example, in medicine), and practitioners will make increasing use of books and other external reference aids in their work. Architecture is a good example of a domain where much of the information a professional requires is stored in reference works, such as catalogues of available building materials, equipment, and components, and official building codes. No architect expects to keep all of this in his head or to design without frequent resort to these information sources. In fact architecture can almost be taken as a prototype for the process of design in a semantically rich task domain. The emerging design is itself incorporated in a set of external memory structures: sketches, floor plans, drawings of utility systems, and so on. At each stage in the design process, partial design reflected in these documents serves as a major stimulus suggesting to the designer what he should attend to next. This direction to new sub-goals permits in turn new information to be extracted from memory and reference sources and another step to be taken toward the development of the design.
Herbert A. Simon (The Sciences of the Artificial)
There are. Storytelling may be the mind’s way of rehearsing for the real world, a cerebral version of the playful activities documented across numerous species which provide a safe means for practicing and refining critical skills. Leading psychologist and all-around man of the mind Steven Pinker describes a particularly lean version of the idea: “Life is like chess, and plots are like those books of famous chess games that serious players study so they will be prepared if they ever find themselves in similar straits.” Pinker imagines that through story we each build a “mental catalogue” of strategic responses to life’s potential curveballs, which we can then consult in moments of need. From fending off devious tribesmen to wooing potential mates, to organizing collective hunts, to avoiding poisonous plants, to instructing the young, to apportioning meager food supplies, and so on, our forebears faced one obstacle after another as their genes sought a presence in subsequent generations. Immersion in fictional tales grappling with a wide assortment of similar challenges would have had the capacity to refine our forebears’ strategies and responses. Coding the brain to engage with fiction would thus be a clever way to cheaply, safely, and efficiently give the mind a broader base of experience from which to operate.
Brian Greene (Until the End of Time: Mind, Matter, and Our Search for Meaning in an Evolving Universe)
I’d never coded before, and I’d always thought games were huge undertakings by thousands of people in a big studio. Little did I know that a major part of coding involves Googling to find documentation, code snippets, and communities that help people fix common problems. Free information and guidance aren’t limited to programming, either. The Open Source movement makes tremendous amounts of knowledge and resources available online for free, and some major universities are making classes available for free on the internet. It’s a shame that a lot of us use the internet only to talk shit in comments sections and check our email when we have the sum of human knowledge at our fingertips.
Zoe Quinn (Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate)
In the case of Peugeot SA the crucial story was the French legal code, as written by the French parliament. According to the French legislators, if a certified lawyer followed all the proper liturgy and rituals, wrote all the required spells and oaths on a wonderfully decorated piece of paper, and affixed his ornate signature to the bottom of the document, then hocus pocus – a new company was incorporated. When in 1896 Armand Peugeot wanted to create his company, he paid a lawyer to go through all these sacred procedures. Once the lawyer had performed all the right rituals and pronounced all the necessary spells and oaths, millions of upright French citizens behaved as if the Peugeot company really existed.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
The American Declaration of Independence asserts that: We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable rights, that among these are life, liberty, and the pursuit of happiness. Like Hammurabi’s Code, the American founding document promises that if humans act according to its sacred principles, millions of them would be able to cooperate effectively, living safely and peacefully in a just and prosperous society. Like the Code of Hammurabi, the American Declaration of Independence was not just a document of its time and place – it was accepted by future generations as well. For more than 200 years, American schoolchildren have been copying and learning it by heart. The two texts present us with an obvious dilemma. Both the Code of Hammurabi and the American Declaration of Independence claim to outline universal and eternal principles of justice, but according to the Americans all people are equal, whereas according to the Babylonians people are decidedly unequal. The Americans would, of course, say that they are right, and that Hammurabi is wrong. Hammurabi, naturally, would retort that he is right, and that the Americans are wrong. In fact, they are both wrong. Hammurabi and the American Founding Fathers alike imagined a reality governed by universal and immutable principles of justice, such as equality or hierarchy. Yet the only place where such universal principles exist is in the fertile imagination of Sapiens, and in the myths they invent and tell one another. These principles have no objective validity. It
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
11). The Bible is like a large picture puzzle. Each puzzle piece (individual book) has its own unique shape and bears its own unique image. But these individual shapes were designed to fit together into something whole, and the image of the whole provides the context and makes sense of the smaller, individual images. For this reason, it is helpful to understand that the Bible is not a love letter, a self-help guide, a history textbook, a story, a legal code, a collection of ancient letters, or a religious handbook, though these types of things certainly appear throughout the pages of the biblical text (diversity). Rather, altogether, the Bible is the record, the deposit, the testimony of God’s good news in Jesus Christ (unity). It is a legal, objective, public document that describes and explains the covenantal relationship by which God has condescended and united himself first to this world and then to his people through Jesus Christ (function).
Miles V. Van Pelt (A Biblical-Theological Introduction to the Old Testament: The Gospel Promised)
The potential for manipulation here is enormous. Here’s one example. During the 2012 election, Facebook users had the opportunity to post an “I Voted” icon, much like the real stickers many of us get at polling places after voting. There is a documented bandwagon effect with respect to voting; you are more likely to vote if you believe your friends are voting, too. This manipulation had the effect of increasing voter turnout 0.4% nationwide. So far, so good. But now imagine if Facebook manipulated the visibility of the “I Voted” icon on the basis of either party affiliation or some decent proxy of it: ZIP code of residence, blogs linked to, URLs liked, and so on. It didn’t, but if it had, it would have had the effect of increasing voter turnout in one direction. It would be hard to detect, and it wouldn’t even be illegal. Facebook could easily tilt a close election by selectively manipulating what posts its users see. Google might do something similar with its search results.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Buy Verified Webmoney Accounts We sell Buy Verified Webmoney Accounts, which are completely safe and 100% accurate at unbelievably low prices. If you want a secure and stable Buy Verified Webmoney Accounts, you can order one here at smusashope.com. It’s possible to state that our service is completely safe and you’ll never lose your money with us. Our Company Service Quality: ❖100% Customer Satisfaction Guaranteed. ❖Personal and Business Accounts. ❖100% Phone Verified USA, UK and other Countries. ❖Real Gmail used USA, UK and other Countries. ❖100% full Documents Verified. ❖SNN Code and Router Number. ❖Driving License (Front and back). ❖Passport Number or Passport Card. ❖100% Money Back Guarantee. ❖30 Days Replacement. ❖Replacement Guaranteed within short time. ❖24/7 customer support. Our Service Is WorldWide Best Services, US, UK, CA, Aus & All Country Services We Provide 100% Trusted Guaranteed & safe. 24 Hours Reply/Contact Email: smusashope@gmail.com WhatsApp: +1 (423) 483-9224 Telegram: @Smusashope Skype: Smusashope
Top 36 best Place to Verified WebMoney Accounts In New Week
Cash was running low, so I'd applied for a job as an administrative assistant for a nonprofit arts group. Without question, my organizational skills were as sharp as my vision, and I had no office experience to speak of. Luckily for me, none of this surfaced during the interview. 'Ryan, pretend it's a rough morning for a sec. Handle this situation for me. When you arrive at work to open the arts resource centre, several people are already at the door. Two clients want immediate help with grant applications - you know those artists, they just can't wait! - and a third wants to use our library, which isn't open till noon. Entering the office, you hear the phone is ringing and see the message light is blinking. The fax machine looks jammed again, and we're expecting an important document. Among the people waiting is a courier with a package you need to sign for. Think about it, though. The lights haven't been turned on yet, and the sign put out front. The alarm needs the code within a minute, too. So, wow, rough morning. I'd like to know what you'd do first.' 'First I'd tell everybody how weird this is. I'm in the same test situation from my job interview. What are the chances?' I started the next day.
Ryan Knighton (Cockeyed: A Memoir)
I have never been one of those people—I know you aren't, either—who feels that the love one has for a child is somehow a superior love, one more meaningful, more significant, and grander than any other. I didn't feel that before Jacob, and I didn't feel that after. But it is a singular love, because it is a love whose foundation is not physical attraction, or pleasure, or intellect, but fear. You have never known fear until you have a child, and maybe that is what tricks us into thinking that it is more magnificent, because the fear itself is more magnificent. Every day, your first thought is not “I love him” but “How is he?” The world, overnight, rearranges itself into an obstacle course of terrors. I would hold him in my arms and wait to cross the street and would think how absurd it was that my child, that any child, could expect to survive this life. It seemed as improbable as the survival of one of those late-spring butterflies—you know, those little white ones—I sometimes saw wobbling through the air, always just millimeters away from smacking itself against a windshield. And let me tell you two other things I learned. The first is that it doesn't matter how old that child is, or when or how he became yours. Once you decide to think of someone as your child, something changes, and everything you have previously enjoyed about them, everything you have previously felt for them, is preceded first by that fear. It's not biological; it's something extra-biological, less a determination to ensure the survival of one's genetic code, and more a desire to prove oneself inviolable to the universe's feints and challenges, to triumph over the things that want to destroy what's yours. The second thing is this: when your child dies, you feel everything you'd expect to feel, feelings so well-documented by so many others that I won't even bother to list them here, except to say that everything that's written about mourning is all the same, and it's all the same for a reason—because there is no real deviation from the text. Sometimes you feel more of one thing and less of another, and sometimes you feel them out of order, and sometimes you feel them for a longer time or a shorter time. But the sensations are always the same. But here's what no one says—when it's your child, a part of you, a very tiny but nonetheless unignorable part of you, also feels relief. Because finally, the moment you have been expecting, been dreading, been preparing yourself for since the day you became a parent, has come. Ah, you tell yourself, it's arrived. Here it is. And after that, you have nothing to fear again.
Hanya Yanagihara, A Little Life
2006 interview by Jim Gray, Amazon CTO Werner Vogels recalled another watershed moment: We went through a period of serious introspection and concluded that a service-oriented architecture would give us the level of isolation that would allow us to build many software components rapidly and independently. By the way, this was way before service-oriented was a buzzword. For us service orientation means encapsulating the data with the business logic that operates on the data, with the only access through a published service interface. No direct database access is allowed from outside the service, and there’s no data sharing among the services.3 That’s a lot to unpack for non–software engineers, but the basic idea is this: If multiple teams have direct access to a shared block of software code or some part of a database, they slow each other down. Whether they’re allowed to change the way the code works, change how the data are organized, or merely build something that uses the shared code or data, everybody is at risk if anybody makes a change. Managing that risk requires a lot of time spent in coordination. The solution is to encapsulate, that is, assign ownership of a given block of code or part of a database to one team. Anyone else who wants something from that walled-off area must make a well-documented service request via an API.
Colin Bryar (Working Backwards: Insights, Stories, and Secrets from Inside Amazon)
Buy Verified Stripe Account ➤Email: usaseostore@gmail.com ➤Skype: USASEOStore ➤Telegram: @Usaseostore ➤WhatsApp: +1 (213) 373-3139 Unlock seamless online transactions with USASEOStore.com Buy Verified Stripe Account service. Gain access to meticulously verified Stripe accounts, swift acquisition, and comprehensive support for a hassle-free payment experience. Buy Verified Stripe Account Rated 4.75 out of 5 based on 4customer ratings(5 customer reviews) $599.00 – $1,599.00 Buy Verified Stripe Account Unlock seamless online transactions with USASEOStore.com Buy Verified Stripe Account service. Gain access to meticulously verified Stripe accounts, swift acquisition, and comprehensive support for a hassle-free payment experience. USASEOStore.com to empower your business with secure payment gateways, instilling confidence in both buyers and sellers. Our Services : ✅ Account Created By USA, AUS, UK, CA & others country. ✅ Valid DL Verified ✅ Valid SSN Verified ✅ Valid LLC Verified ✅ Selifie Verified ✅ Parsonal/Business info Verified ✅ Payout(1,2,7)days ✅ Dispute .0 ✅ G-mail with login password ✅ 2Fa Live Code/(GV) Phone number add ✅ Instant Delivery ✅ Login Access With full documents Replay and contact 24/7 Live Support Buy Verified Stripe Account ➤Email: usaseostore@gmail.com ➤Skype: USASEOStore ➤Telegram: @Usaseostore ➤WhatsApp: +1 (213) 373-3139
Buying Stripe Accounts - Info & Feedback
How exactly did Armand Peugeot, the man, create Peugeot, the company? In much the same way that priests and sorcerers have created gods and demons throughout history, and in which thousands of French curés were still creating Christ’s body every Sunday in the parish churches. It all revolved around telling stories, and convincing people to believe them. In the case of the French curés, the crucial story was that of Christ’s life and death as told by the Catholic Church. According to this story, if a Catholic priest dressed in his sacred garments solemnly said the right words at the right moment, mundane bread and wine turned into God’s flesh and blood. The priest exclaimed, ‘Hoc est corpus meum! ’ (Latin for ‘This is my body!’) and hocus pocus – the bread turned into Christ’s flesh. Seeing that the priest had properly and assiduously observed all the procedures, millions of devout French Catholics behaved as if God really existed in the consecrated bread and wine. In the case of Peugeot SA the crucial story was the French legal code, as written by the French parliament. According to the French legislators, if a certified lawyer followed all the proper liturgy and rituals, wrote all the required spells and oaths on a wonderfully decorated piece of paper, and affixed his ornate signature to the bottom of the document, then hocus pocus – a new company was incorporated. When in 1896 Armand Peugeot wanted to create his company, he paid a lawyer to go through all these sacred procedures. Once the lawyer had performed all the right rituals and pronounced all the necessary spells and oaths, millions of upright French citizens behaved as if the Peugeot company really existed.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Sociologist Barry Glassner (1999) has documented many of the biases introduced by “If it bleeds, it leads” news reporting, and by the strategic efforts of special interest groups to control the agenda of public fear of crime, disease, and other hazards. Is an increase of approximately 700 incidents in 50 states over 7 years an “epidemic” of road rage? Is it conceivable that there is (or ever was) a crisis in children’s day care stemming from predatory satanic cults? In 1994, a research team funded by the U.S. government spent 4 years and $750,000 to reach the conclusion that the myth of satanic conspiracies in day care centers was totally unfounded; not a single verified instance was found (Goodman, Qin, Bottoms, & Shaver, 1994; Nathan & Snedeker, 1995). Are automatic-weapon-toting high school students really the first priority in youth safety? (In 1999, approximately 2,000 school-aged children were identified as murder victims; only 26 of those died in school settings, 14 of them in one tragic incident at Columbine High School in Littleton, Colorado.) The anthropologist Mary Douglas (Douglas & Wildavsky, 1982) pointed out that every culture has a store of exaggerated horrors, many of them promoted by special interest factions or to defend cultural ideologies. For example, impure water had been a hazard in 14th-century Europe, but only after Jews were accused of poisoning wells did the citizenry become preoccupied with it as a major problem. But the original news reports are not always ill-motivated. We all tend to code and mention characteristics that are unusual (that occur infrequently). [...] The result is that the frequencies of these distinctive characteristics, among the class of people considered, tend to be overestimated.
Reid Hastie (Rational Choice in an Uncertain World: The Psychology of Judgement and Decision Making)
Buy Verified Revolut Account – Best 100% KYC Active Accounts Introduction To Buy verified Revolut account, you can search for trusted sellers or platforms that offer this service. Thorough research is also needed to make sure that the accounts are authentic, meaning if you want to use any from across the internet, make sure to do your research and only choose from a reliable source. Before buying make sure to verify the seller is reputable, reviews, and payment options. Revolut is a UK bank account Buy Verified Revolut Account that allows you to bank online, send money and make purchases. The company was launched in 2015 and the company has made a very strong impact within the American and European markets. Best Place to Buy Verified Revolut Account Revolut has successfully entered the market of digital banking and financial services and offers the customer the ability to use services at the level of bank and investment. As mentioned earlier, it is advisable to check the received code and verify your Revolut account because once you verify; you are allowed access to other things such as enhanced transaction limits than the other standard users and more security features You get than the non-Verified users. However, to have a verified account, one has to under go certain verifications which may take some time and in addition, the user can only be verified to his or her country of origin. This has resulted in a publics call for buy verified Revolut account from genuine service providers. In this article we will tell whether it is beneficial to have a verified Revolut account and how difficult it is and why you should buy one on SMMUSIT. Order Now This Page What’s Verified Revolut Account? If you have a Verified Revolut Account then that’s such a game changer when it comes to banking. It is an online based account meant to help you control your finances easily and efficiently. This account has a simple and user friendly interface that comes with a very wide range of features compared to typical banking methods. The verification is one of the key aspects of a Verified Revolut Account. If you Buy verified account, you can trust that the account has been verified. What this means comes down to the fact that your identity has now been fully authenticated, which offers an extra layer of security to your transactions. Verified Revolut Account- Tips Revolut verified account is a verified digital banking solution, offer many financial services and you can have a verified one which can provide you with a trusted way to access your bank account. If you have a verified Revolut account, you can check your money, transfer money cross borders at competitive rates and invest in stocks and cryptocurrencies. Verified Revolut Account – Tips Now, when you can Buy verified Revolut account, you’re purchasing an account that’s been fully verified by the platform itself. This means that you have all the right documentation and Revolut has confirmed its legitimacy and something that is gonna be trustworthy. Buy Verified Revolut Account – 100% Best USA,UK,CA Revolut You can Buy Verified Revolut Account which is 100% originals USA, UK, CA only. We will give you all necessary documents including bank statements. Buy Verified Revolut Account now! Buy Revolut Business Accounts Revolut business accounts are available for corporate, small business, and the mid-size business. The types of accounts include business, which work in the same way as Personal Revolut account but with extra options for your business. Revolut Account for sale If you’re after a legit Revolut account, this is just what you need! Revolut accounts for sale are the best and most reliable Revolut accounts for sale at SMMUSIT. So why would you even need a Revolut account?
Byy Verified Revolut AccountIN This Year
Sometimes what-if fantasies are useful. Imagine that the entirety of Western civilisation’s coding for computer systems or prints of all films ever made or all copies of Shakespeare and the Bible and the Qur’an were encrypted and held on one tablet device. And if that tablet was lost, stolen, burnt or corrupted, then our knowledge, use and understanding of that content, those words and ideas, would be gone for ever – only, perhaps, lingering in the minds of a very few men of memory whose job it had been to keep ideas alive. This little thought-experiment can help us to comprehend the totemic power of manuscripts. This is the great weight of responsibility for the past, the present and the future that the manuscripts of Constantinople carried. Much of our global cultural heritage – philosophies, dramas, epic poems – survive only because they were preserved in the city’s libraries and scriptoria. Just as Alexandria and Pergamon too had amassed vast libraries, Constantinople understood that a physical accumulation of knowledge worked as a lode-stone – drawing in respect, talent and sheer awe. These texts contained both the possibilities and the fact of empire and had a quasi-magical status. This was a time when the written word was considered so potent – and so precious – that documents were thought to be objects with spiritual significance. (...) It was in Constantinople that the book review was invented. Scholars seem to have had access to books within a proto-lending-library system, and there were substantial libraries within the city walls. Thanks to Constantinople, we have the oldest complete manuscript of the Iliad, Aeschylus’ dramas Agamemnon and Eumenides, and the works of Sophocles and Pindar. Fascinating scholia in the margins correct and improve: plucking work from the page ‘useful for the reader . . . not just the learned’, as one Byzantine scholar put it. These were texts that were turned into manuals for contemporary living.
Bettany Hughes (Istanbul: A Tale of Three Cities)
Today the cloud is the central metaphor of the internet: a global system of great power and energy that nevertheless retains the aura of something noumenal and numnious, something almost impossible to grasp. We connect to the cloud; we work in it; we store and retrieve stuff from it; we think through it. We pay for it and only notice it when it breaks. It is something we experience all the time without really understanding what it is or how it works. It is something we are training ourselves to rely upon with only the haziest of notions about what is being entrusted, and what it is being entrusted to. Downtime aside, the first criticism of this cloud is that it is a very bad metaphor. The cloud is not weightless; it is not amorphous, or even invisible, if you know where to look for it. The cloud is not some magical faraway place, made of water vapor and radio waves, where everything just works. It is a physical infrastructure consisting of phone lines, fibre optics, satellites, cables on the ocean floor, and vast warehouses filled with computers, which consume huge amounts of water and energy and reside within national and legal jurisdictions. The cloud is a new kind of industry, and a hungry one. The cloud doesn't just have a shadow; it has a footprint. Absorbed into the cloud are many of the previously weighty edifices of the civic sphere: the places where we shop, bank, socialize, borrow books, and vote. Thus obscured, they are rendered less visible and less amenable to critique, investigation, preservation and regulation. Another criticism is that this lack of understanding is deliberate. There are good reasons, from national security to corporate secrecy to many kinds of malfeasance, for obscuring what's inside the cloud. What evaporates is agency and ownership: most of your emails, photos, status updates, business documents, library and voting data, health records, credit ratings, likes, memories, experiences, personal preferences, and unspoken desires are in the cloud, on somebody else's infrastructure. There's a reason Google and Facebook like to build data centers in Ireland (low taxes) and Scandinavia (cheap energy and cooling). There's a reason global, supposedly post-colonial empires hold onto bits of disputed territory like Diego Garcia and Cyprus, and it's because the cloud touches down in these places, and their ambiguous status can be exploited. The cloud shapes itself to geographies of power and influence, and it serves to reinforce them. The cloud is a power relationship, and most people are not on top of it. These are valid criticisms, and one way of interrogating the cloud is to look where is shadow falls: to investigate the sites of data centers and undersea cables and see what they tell us about the real disposition of power at work today. We can seed the cloud, condense it, and force it to give up some of its stories. As it fades away, certain secrets may be revealed. By understanding the way the figure of the cloud is used to obscure the real operation of technology, we can start to understand the many ways in which technology itself hides its own agency - through opaque machines and inscrutable code, as well as physical distance and legal constructs. And in turn, we may learn something about the operation of power itself, which was doing this sort of thing long before it had clouds and black boxes in which to hide itself.
James Bridle (New Dark Age: Technology and the End of the Future)
Buy Verified Go2Bank Accounts Discover the benefits of secure, buy verified Go2Bank accounts from usukseller . Suitable for personal or business use, these accounts offer seamless transactions and reliable financial management. Buy verified Go2Bank account today and experience hassle-free banking! Our Service 100% approved account. Photo ID Verified Email Verified This account is active and fully verified. We offer 24/7 customer service. instant delivery Full Documents Verified Accounts. High-Quality Service Cheap Price Per Account Aged Accounts Full Access Provide Available in the USA, UK, CA and AU If you want to know more or have any queries, just knock us here- 24 Hours Reply/Contact ✅➤Telegram:@usukseller ✅➤Whatsapp: +1(939)328-6215‪ ✅➤Email: usukseller6@gmail.com Buy Verified Go2Bank Accounts In today’s fast-paced digital world, having a reliable banking solution is essential. Enter Go2Bank—a modern fintech offering that simplifies your financial life. If you’re looking to streamline your banking experience or just need easy access to funds, buying verified Go2Bank accounts can be an appealing option. But how do you navigate this landscape? From understanding the features of Go2Bank to exploring various ways to manage and withdraw your money, this guide will walk you through everything you need to know about purchasing verified accounts safely and effectively. Whether you’re curious about loading cash onto your card or transferring funds seamlessly between platforms like Cash App or PayPal, we’ve got the answers for you right here! Let’s dive in and explore the ins and outs of buying verified Go2Bank accounts. How to Buy Verified Go2Bank Accounts? Buying verified Go2Bank accounts requires a cautious approach. Start by researching reputable sellers online. Look for platforms that specialize in financial services or account verification. Check reviews and testimonials from previous buyers. A trustworthy seller should have positive feedback and a history of successful transactions. Once you find a potential seller, inquire about the account’s features. Ensure it meets your needs regarding balance limits, withdrawal options, and any associated fees. When ready to purchase, confirm the payment method accepted by the seller. Secure payment options like PayPal or credit cards provide added protection during your transaction. After completing the purchase, follow any provided instructions carefully to access your new Go2Bank account effectively. This often includes setting up security measures like two-factor authentication for added safety. How to withdraw money from Go2Bank without a card? Withdrawing money from your Go2Bank account without a card is straightforward. Start by accessing the Go2Bank mobile app or website. Log in to your account securely. Once logged in, navigate to the cash withdrawal options. You may find an option to generate a unique code for ATM access or direct withdrawals at partner locations. If you prefer visiting stores, many retail partners allow cash withdrawals using just your phone number and verification code. This method can be convenient while on the go. Additionally, consider transferring funds to another bank account if you’re unable to withdraw directly. Funds transferred can quickly become accessible through other banking methods, like checks or local ATMs. Always ensure that you check any fees associated with these transactions for surprise-free withdrawals. Where to verify Go2bank Accounts? Finding verified Go2Bank accounts can be tricky. Several online platforms specialize in providing such services. Look for reputable websites that focus on financial products and digital banking solutions. Social media groups or forums dedicated to personal finance might also offer leads. Users often share their experiences, which could guide you toward trustworthy sellers.
Markus Zusak
She located a code on the document and used her computer terminal to look it up. “Postal money order.” Daphne said, “Difficult if not impossible to trace.
Ridley Pearson (No Witnesses (Boldt & Matthews, #3))
If you want code that presents good abstractions, you must document those abstractions with comments.
John Ousterhout (A Philosophy of Software Design)
While pulling clean drafts together took thousands of hours of work, the stories had all but revealed themselves. Facebook had allowed human trafficking to take place in the Persian Gulf on its platform as long as it occurred through brick-and-mortar businesses. In trying to improve the platform and boost user numbers, it had actually made the site, and the people who used it, angrier. Mental health researchers had concluded “we make body issues worse” and that Instagram was a toxic place for many teen girls, in particular. We divided up the stories among ourselves. Georgia Wells began interviewing young women who had developed eating disorders or body image issues of the sort that Instagram’s researchers worried their product might aggravate. The story she led would cite company documents that found “comparisons on Instagram can change how young women view and describe themselves,” citing research that found 32 percent of teen girls said that “when they felt bad about their bodies, Instagram made them feel worse.
Jeff Horwitz (Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets)
For a story on Facebook’s failings in developing countries, Newley Purnell and Justin Scheck found a woman who had been trafficked from Kenya to Saudi Arabia, and they were looking into the role Facebook had played in recruiting hit men for Mexican drug lords. That story would reveal that Facebook had failed to effectively shut down the presence of the Jalisco New Generation Cartel on Facebook and Instagram, allowing it to repeatedly post photos of extreme gore, including severed hands and beheadings. Looking into how the platform encouraged anger, Keach Hagey relied on documents showing that political parties in Poland had complained to Facebook that the changes it had made around engagement made them embrace more negative positions. The documents didn’t name the parties; she was trying to figure out which ones. Deepa Seetharaman was working to understand how Facebook’s vaunted AI managed to take down such a tiny percentage—a low single-digit percent, according to the documents Haugen had given me—of hate speech on the platform, including constant failures to identify first-person shooting videos and racist rants.
Jeff Horwitz (Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets)
These microservices were delivered not as a pile of code, nor as a website, but as a web-based API. APIs are well-defined interfaces that enable code to talk to other bits of code. Once a team builds and exposes an API to others, it’s important that they teach other teams how to use it via documentation that’s accurate and up to date.
Jeff Lawson (Ask Your Developer: How to Harness the Power of Software Developers and Win in the 21st Century)
If any of the news coverage had drawn blood, Meta wasn’t going to show it. Zuckerberg told the company’s People Planning team to bring him an aggressive hiring target for 2022. When they brought him an unprecedentedly ambitious plan to bring on 40,000 new staffers that year, Zuckerberg took the one-page document—known as “the napkin”—and then passed it back with a handwritten instruction to hire 8,000 more. “If we don’t hit these targets it’s game over,” Recruiting VP Miranda Kalinowski told the managers on her staff. To handle the deluge of hiring, Meta brought on an additional 1,000 recruiters between the last quarter of 2021 and the first quarter of the following year. Few of the new staffers would be slated to go into integrity work. Zuckerberg had declared that the company’s existing products were no longer its future, and Haugen’s document breach had solidified a sense that researchers and data scientists working on societal problems contained a potential corporate fifth column.
Jeff Horwitz (Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets)
which a drawing imported into a text document can no longer be altered, but must be changed in the original graphics program and reintroduced into the text document.) Out of the box the Star was multilingual, offering typefaces and keyboard configurations that could be implemented in the blink of an eye for writing in Russian, French, Spanish, and Swedish through the use of “virtual keyboards”—graphic representations of keyboards that appeared on screen to show the user where to find the unique characters in whatever language he or she was using. In 1982 an internal library of 6,000 Japanese kanji characters was added; eventually Star users were able to draft documents in almost every modern language, from Arabic and Bengali to Amharic and Cambodian. As the term implied, the user’s view of the screen resembled the surface of a desk. Thumbnail-sized icons representing documents were lined up on one side of the screen and those representing peripheral devices—printers, file servers, e-mail boxes—on the other. The display image could be infinitely personalized to be tidy or cluttered, obsessively organized or hopelessly confused, alphabetized or random, as dictated by the user’s personality and taste. The icons themselves had been painstakingly drafted and redrafted so they would be instantaneously recognized by the user as document pages (with a distinctive dog-eared upper right corner), file folders, in and out baskets, a clock, and a wastebasket. Thanks to the system’s object-oriented software, the Star’s user could launch any application simply by clicking on the pertinent icon; the machine automatically “knew” that a text document required it to launch a text editor or a drawing to launch a graphics program. No system has ever equaled the consistency of the Star’s set of generic commands, in which “move,” “copy,” and “delete” performed similar operations across the entire spectrum of software applications. The Star was the epitome of PARC’s user-friendly machine. No secretary had to learn about programming or code to use the machine, any more than she had to understand the servomechanism driving the dancing golf ball to type on an IBM Selectric typewriter. Changing a font, or a margin, or the space between typed lines in most cases required a keystroke or two or a couple of intuitive mouse clicks. The user understood what was happening entirely from watching the icons or documents move or change on the screen. This was no accident: “When everything in a computer system is visible on the screen,” wrote David Smith, a designer of the Star interface, “the display becomes reality. Objects and actions can be understood purely in terms of their effects on the display.
Michael A. Hiltzik (Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age)
During the trip to the NATO base, Agnew noticed something that made him wary. “I observed four F84F aircraft . . . sitting on the end of a runway, each was carrying two MK 7 [nuclear] gravity bombs,” he wrote in a document declassified in 2023. What this meant was that “custody of the MK 7s was under the watchful eye of one very young U.S. Army private armed with a M1 rifle with 8 rounds of ammunition.” Agnew told his colleagues: “The only safeguard against unauthorized use of an atomic bomb was this single G.I. surrounded by a large number of foreign troops on foreign territory with thousands of Soviet troops just miles away.” Back in the United States, Agnew contacted a project engineer at Sandia Laboratories named Don Cotter and asked “if we could insert an electronic ‘lock’ in the [bomb’s] firing circuit that could prevent just any passerby from arming the MK 7.” Cotter got to work. He put together a demonstration of a device, a lock and coded switch, that functioned as follows: “[a] 3-digit code would be entered, a switch was thrown, the green light extinguished, and the red light illuminated indicating the arming circuit was live.
Annie Jacobsen (Nuclear War: A Scenario)
Project house is a warehouse of more than 100+ projects in all platforms focused on effectively helping understudies with quality, well-informed, dependable and project ideas and task materials that helps the final year projects for computer science students to make a good academic project and improving their project ideas.This website not only helps you to choose a project but also provides step by step instructions on how to make it happen by providing abstract, demo videos and screenshots and also an option to upload your individual project. The top project categories are python, unity, machine learning, android, .net, java and php. All software projects are exploring IEEE Papers. We provide all the documents regarding the projects. And the code deployment will also be given to you. All the software needed to the project will be given by us. You just do one thing; Pick a project that matches your interest and then you can request to the administrator for that project then administrator group will reach you for further procedures. We help you to identify the best project for you. Project house also helps to identify free internship for final year Computer science and Information science and job training facility. Register now site link is in my profile
Ananya micheal
North America felt that the king of England was treating them unjustly. Their representatives gathered in the city of Philadelphia, and on 4 July 1776 the colonies declared that their inhabitants were no longer subjects of the British Crown. Their Declaration of Independence proclaimed universal and eternal principles of justice, which, like those of Hammurabi, were inspired by a divine power. However, the most important principle dictated by the American god was somewhat different from the principle dictated by the gods of Babylon. The American Declaration of Independence asserts that: We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable rights, that among these are life, liberty, and the pursuit of happiness. Like Hammurabi’s Code, the American founding document promises that if humans act according to its sacred principles, millions of them would be able to cooperate effectively, living safely and peacefully in a
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Here are a few of of the most important red flags discussed in this book. The presence of any of these symptoms in a system suggests that there is a problem with the system’s design: Shallow Module: the interface for a class or method isn’t much simpler than its implementation (see pp. 25, 110). Information Leakage: a design decision is reflected in multiple modules (see p. 31). Temporal Decomposition: the code structure is based on the order in which operations are executed, not on information hiding (see p. 32). Overexposure: An API forces callers to be aware of rarely used features in order to use commonly used features (see p. 36). Pass-Through Method: a method does almost nothing except pass its arguments to another method with a similar signature (see p. 52). Repetition: a nontrivial piece of code is repeated over and over (see p. 68). Special-General Mixture: special-purpose code is not cleanly separated from general purpose code (see p. 71). Conjoined Methods: two methods have so many dependencies that its hard to understand the implementation of one without understanding the implementation of the other (see p. 75). Comment Repeats Code: all of the information in a comment is immediately obvious from the code next to the comment (see p. 104). Implementation Documentation Contaminates Interface: an interface comment describes implementation details not needed by users of the thing being documented (see p. 114). Vague Name: the name of a variable or method is so imprecise that it doesn’t convey much useful information (see p. 123). Hard to Pick Name: it is difficult to come up with a precise and intuitive name for an entity (see p. 125). Hard to Describe: in order to be complete, the documentation for a variable or method must be long. (see p. 133). Nonobvious Code: the behavior or meaning of a piece of code cannot be understood easily. (see p. 150).
John Ousterhout (A Philosophy of Software Design)
In-code documentation plays a crucial role in software design. Comments are essential to help developers understand a system and work efficiently, but the role of comments goes beyond this. Documentation also plays an important role in abstraction; without comments, you can’t hide complexity.
John Ousterhout (A Philosophy of Software Design)
Selecting names for variables, methods, and other entities is one of the most underrated aspects of software design. Good names are a form of documentation: they make code easier to understand. They reduce the need for other documentation and make it easier to detect errors. Conversely, poor name choices increase the complexity of code and create ambiguities and misunderstandings that can result in bugs.
John Ousterhout (A Philosophy of Software Design)
The researchers [Picca and Feagin] document that in front-stage settings (those in which people of color were present), the white students displayed a range of racially conscious behaviors, including the following: - Acting overly nice - Avoiding contact (e.g., crossing a street or not going to a particular bar or club) - Mimicking "black mannerisms and speech" - Being careful not to use racial terms or labels - Using code words to talk negatively about people of color - Occasional violence directed at people of color In backstage settings, where people of color were not present, white students often used humor to reinforce racial stereotypes about people of color, particularly blacks. Picca and Feagin argue that the purpose of these backstage performances is to create white solidarity and to reinforce the ideology of white and male supremacy. This behavior keeps racism circulating, albeit in less formal but perhaps more powerful ways than in the past. Today we have a cultural norm that insists we hide our racism from people of color and deny it among ourselves, but not that we actually challenge it. In fact, we are socially penalized for challenging racism. (p. 49-50)
Robin DiAngelo (White Fragility: Why It's So Hard for White People to Talk About Racism)
But despite the fact that this boy was clearly suicidal and required hospitalization, he was not included among the patients listed as having developed serious adverse effects in the published 2001 Paxil study. Other patients were similarly miscoded. One was a fifteen-year-old girl who had been withdrawn from the Brown study site in 1995 after becoming combative with her mother. According to internal university documents that Howard gave me, Brown researchers knew that this girl had become suicidal after taking Paxil. In a memo to the Institutional Review Board dated October 30, 1995, Martin Keller wrote that this teenager, who had been enrolled in the study in June 1995, “was hospitalized on 9/15/95 due to becoming very combative with her mother and threatening suicide.” Yet instead of coding her behavior as an adverse effect related to Paxil, Keller in his memo says she was “terminated from the study for non-compliance.” The Brown investigators may have coded her as noncompliant because she had stopped taking Paxil before having her meltdown. But they shouldn’t have, according to several clinicians familiar with the study. The Brown researchers should have included all adverse effects experienced by their patients, regardless of what may have caused the problems. As a Harvard Medical School biostatistician later told me, “You shouldn’t try to make these subjective attributions and exclude patients who don’t fit into your thesis.” As research has shown, the SSRI antidepressants can cause serious side effects, including suicidal behaviors and hostility, weeks after people stop taking them.
Alison Bass (Side Effects: A Prosecutor, a Whistleblower, and a Bestselling Antidepressant on Trial)
I discovered other parallels with South African apartheid. I learned that to control the movement of Black people, the apartheid regime had imposed a “pass” system forcing every Black person to carry an identity document indicating whether they had permission to be in a given area—and permission to be in any city was granted only to those employed by white farms, mines, or businesses. Black people who lacked a pass to be in a city could be summarily deported to a rural economic wasteland known as a Bantustan. Similarly, to control our movement as Palestinians in the occupied territories, Israel imposes color-coded identification cards and license plates, has installed an elaborate permit and checkpoint system, and has designated specific roads we’re allowed to drive on—not to mention that Israel erected an apartheid wall.
Ahed Tamimi (They Called Me a Lioness: A Palestinian Girl's Fight for Freedom)
The growing complexity of law and the coded language of legal proceedings and documents—whatever else they may be intended for—clearly proclaim to the general public, “We in the legal profession have access to hidden knowledge that can make or break you. And after we’ve charged you an outrageous fee for our services, you may, or may not, benefit from our magic.
Robert L. Moore (King, Warrior, Magician, Lover: Rediscovering Masculinity Through the Lens of Archetypal Psychology - A Journey into the Male Psyche and Its Four Essential Aspects)
There are certain tips and tricks that apply at all levels of software development, ideas that are almost axiomatic, and processes that are virtually universal. However, these approaches are rarely documented as such; you'll mostly find them written down as odd sentences in discussions of design, project management, or coding.
Andrew Hunt (The Pragmatic Programmer: From Journeyman to Master)
Terrorism suspects aren’t the NSA’s only targets, however. Operations against nation-state adversaries have exploded in recent years as well. In 2011, the NSA mounted 231 offensive cyber operations against other countries, according to the documents, three-fourths of which focused on “top-priority” targets like Iran, Russia, China, and North Korea. Under a $652-million clandestine program code named GENIE, the NSA, CIA, and special military operatives have planted covert digital bugs in tens of thousands of computers, routers, and firewalls around the world to conduct computer network exploitation, or CNE. Some are planted remotely, but others require physical access to install through so-called interdiction—the CIA or FBI intercepts shipments of hardware from manufacturers and retailers in order to plant malware in them or install doctored chips before they reach the customer.
Anonymous
There are four key practices to writing great code: Version control Documentation Testing Continuous Integration Each
Kevin Harvey (Test-Driven Development with Django)
This is a joke. Right?” I’m pointing at the green-screen terminal on the desk, and the huge dial-infested rotary phone beside it. “No sir.” Bill clears his throat. “Unfortunately the NDO’s office budget was misfiled years ago and nobody knows the correct code to requisition new supplies. At least it’s warm in winter: you’re right on top of the classified document incinerator room, and it’s got the only chimney in the building.
Charles Stross (Overtime (Laundry Files, #3.5))
Here’s something you may not know: every time you go to Facebook or ESPN.com or wherever, you’re unleashing a mad scramble of money, data, and pixels that involves undersea fiber-optic cables, the world’s best database technologies, and everything that is known about you by greedy strangers. Every. Single. Time. The magic of how this happens is called “real-time bidding” (RTB) exchanges, and we’ll get into the technical details before long. For now, imagine that every time you go to CNN.com, it’s as though a new sell order for one share in your brain is transmitted to a stock exchange. Picture it: individual quanta of human attention sold, bit by bit, like so many million shares of General Motors stock, billions of times a day. Remember Spear, Leeds & Kellogg, Goldman Sachs’s old-school brokerage acquisition, and its disappearing (or disappeared) traders? The company went from hundreds of traders and two programmers to twenty programmers and two traders in a few years. That same process was just starting in the media world circa 2009, and is right now, in 2016, kicking into high gear. As part of that shift, one of the final paroxysms of wasted effort at Adchemy was taking place precisely in the RTB space. An engineer named Matthew McEachen, one of Adchemy’s best, and I built an RTB bidding engine that talked to Google’s huge ad exchange, the figurative New York Stock Exchange of media, and submitted bids and ads at speeds of upwards of one hundred thousand requests per second. We had been ordered to do so only to feed some bullshit line Murthy was laying on potential partners that we were a real-time ads-buying company. Like so much at Adchemy, that technology would be a throwaway, but the knowledge I gained there, from poring over Google’s RTB technical documentation and passing Google’s merciless integration tests with our code, would set me light-years ahead of the clueless product team at Facebook years later.
Antonio García Martínez (Chaos Monkeys: Obscene Fortune and Random Failure in Silicon Valley)
Python “best practice” rule of thumb is to use docstrings for functional documentation (what your objects do) and hash-mark comments for more micro-level documentation (how arcane bits of code work).
Mark Lutz (Learning Python: Powerful Object-Oriented Programming)
In recent years, Eric Ries famously adapted Lean to solve the wicked problem of software startups: what if we build something nobody wants?[ 41] He advocates use of a minimum viable product (“ MVP”) as the hub of a Build-Measure-Learn loop that allows for the least expensive experiment. By selling an early version of a product or feature, we can get feedback from customers, not just about how it’s designed, but about what the market actually wants. Lean helps us find the goal. Figure 1-7. The Lean Model. Agile is a similar mindset that arose in response to frustration with the waterfall model in software development. Agilistas argue that while Big Design Up Front may be required in the contexts of manufacturing and construction where it’s costly if not impossible to make changes during or after execution, it makes no sense for software. Since requirements often change and code can be edited, the Agile Manifesto endorses flexibility. Individuals and interactions over processes and tools. Working software over comprehensive documentation. Customer collaboration over contract negotiation. Responding to change over following a plan.
Peter Morville (Planning for Everything: The Design of Paths and Goals)
For African Americans, war commenced not in 1861, but in 1661, when the Virginia Colony began passing America's first black codes, the charter documents of a slave society that rendered blacks a permanent servile class and whites a mass aristocracy. They were also a declaration of war.
Ta-Nehisi Coates (We Were Eight Years in Power: An American Tragedy)
colour coding to decipher. Can you work out what the colour coding means? Is it related to input vs output functions? Or perhaps it’s business vs infrastructure? Existing vs new? Buy vs build? Or maybe different people simply had different colour pens! Who knows.
Simon Brown (Software Architecture for Developers: Volume 2 - Visualise, document and explore your software architecture)
All joking aside, these diagrams do suffer from one or more of the following problems: • Notation (e.g. colour coding, shapes, etc) is not explained or is inconsistent. • The purpose and meaning of elements is ambiguous. • Relationships between elements are missing or ambiguous. • Generic terms such as “business logic” are used. • Technology choices (or options, if doing up front design) are omitted. • Levels of abstraction are mixed. • Too much or too little detail. • No context or a logical starting point.
Simon Brown (Software Architecture for Developers: Volume 2 - Visualise, document and explore your software architecture)
In frontline dressing stations, wounded men of Axis and Allied armies often received treatment side by side, on no few occasions from German and British medical officers working shoulder to shoulder. The leading exemplar of this code was Rommel himself. When orders from Hitler mandated the execution of captured British commandos, Rommel tossed the document into the trash.
Steven Pressfield (Killing Rommel)
No writer in the world agonizes over words the way a scientist does. Terminology is everything: we identify something by its established name, describe it using the universally agreed-upon terms, study it in a completely individual way, and then write about it using a code that takes years to master. When documenting our work, we “hypothesize” but never “guess”; we “conclude,” not just “decide.” We view the word “significant” to be so vague that it is useless but know that the addition of “highly” can signify half a million dollars of funding.
Hope Jahren (Lab Girl)
How exactly did Armand Peugeot, the man, create Peugeot, the company? In much the same way that priests and sorcerers have created gods and demons throughout history, and in which thousands of French curés were still creating Christ’s body every Sunday in the parish churches. It all revolved around telling stories, and convincing people to believe them. In the case of the French curés, the crucial story was that of Christ’s life and death as told by the Catholic Church. According to this story, if a Catholic priest dressed in his sacred garments solemnly said the right words at the right moment, mundane bread and wine turned into God’s flesh and blood. The priest exclaimed ‘Hoc est corpus meum! ’ (Latin for ‘This is my body!’) and hocus pocus – the bread turned into Christ’s flesh. Seeing that the priest had properly and assiduously observed all the procedures, millions of devout French Catholics behaved as if God really existed in the consecrated bread and wine. In the case of Peugeot SA the crucial story was the French legal code, as written by the French parliament. According to the French legislators, if a certified lawyer followed all the proper liturgy and rituals, wrote all the required spells and oaths on a wonderfully decorated piece of paper, and affixed his ornate signature to the bottom of the document, then hocus pocus – a new company was incorporated.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
The idea that schedules can be shortened in order to reduce cost or speed up delivery is a very common misconception. You‘ll commonly see attempts to require overtime or sacrifice ―less important scheduled tasks (like unit-testing) as a way to reduce delivery dates or increase functionality while keeping the delivery dates as is. Avoid this scenario at all costs. Remind those requesting the changes of the following facts: - A rushed design schedule leads to poor design, bad documentation and probable Quality Assurance or User Acceptance problems. - A rushed coding or delivery schedule has a direct relationship to the number of bugs delivered to the users. - A rushed test schedule leads to poorly tested code and has a direct relationship to the number of testing issues encountered. - All of the above lead to Production issues which are much more expensive to fix.
Richard Monson-Haefel (97 Things Every Software Architect Should Know)
For African Americans, war commenced not in 1861, but in 1661, when the Virginia Colony began passing America’s first black codes, the charter documents of a slave society that rendered blacks a permanent servile class and whites a mass aristocracy. They were also a declaration of war.
Ta-Nehisi Coates (We Were Eight Years in Power: An American Tragedy)
on as you learn more complex hacks and tests, you will need a target machines suited for such hacks. The best way to learn to hack Linux systems is to download and install the Metasploitable Linux distribution. The Metasploitable distro is purposefully made to incorporate vulnerabilities that learners like yourself can use for security testing and hacking purposes. The best part is that you can set it up to boot just like an operating system you use for your everyday computing needs or you can set it up in VirtualBox or VMware Workstation platforms. Using Metasploitable Linux OS for your hacking practice is the best way to understand more about the Linux infrastructure, security setup, and how to discover and exploit its vulnerabilities. You can read the documentation of Metasploitable and download the installation ISO from Rapid 7
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
need to download and install Python, get the recent most stable version from python.org and install it on your computer. If you already have Python installed on your Linux computer, do not uninstall the older 2.x as this may break your operating system. Instead, install the latest version alongside it. You may be required to use the command python3 and not python to initialize the interpreter though. All the information you need is provided on the documentation page of the Python.org website. We recommend you take the time to read the ‘Beginners Guide’ if you are still new to Python. Practical hacking: Free online hacking practice servers There is a saying in the world of information security that the best defense is a good offense. This is what has inspired many cyber security companies to make available deliberately vulnerable websites and servers to encourage developers, auditors, pentesters, system admins, and security professionals to practice their hacking skills online.
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
On the plantations the slave owners would take their slaves’ drums away because they didn’t want them communicating with other slaves. They were afraid that the drum was some kind of magic signal system, a primal, coded language, which it was. And is. When the drums were taken away, other instruments were taken up—fifes and fiddles and the rest, and they were used for celebration and lamentation both, and a new kind of song sprung up, a work song, to document the labor in the fields, to pass the time, to pass on the content of the time, so that people would know what had happened.
Ahmir "Questlove" Thompson (Mo' Meta Blues: The World According to Questlove)
When the superior programmer refrains from coding, his force is felt for a thousand miles.
Eric S. Raymond (Art of UNIX Programming, The, Portable Documents)
Rushing to optimize before the bottlenecks are known may be the only error to have ruined more designs than feature creep. From tortured code to incomprehensible data layouts, the results of obsessing about speed or memory or disk usage at the expense of transparency and simplicity are everywhere. They spawn innumerable bugs and cost millions of man-hours—often, just to get marginal gains in the use of some resource much less expensive than debugging time. Disturbingly often, premature local optimization actually hinders global optimization (and hence reduces overall performance). A prematurely optimized portion of a design frequently interferes with changes that would have much higher payoffs across the whole design, so you end up with both inferior performance and excessively complex code.
Eric S. Raymond (Art of UNIX Programming, The, Portable Documents)
When you see the right thing, do it—this may look like more work in the short term, but it’s the path of least effort in the long run. If you don’t know what the right thing is, do the minimum necessary to get the job done, at least until you figure out what the right thing is. To do the Unix philosophy right, you have to be loyal to excellence. You have to believe that software design is a craft worth all the intelligence, creativity, and passion you can muster. Otherwise you won’t look past the easy, stereotyped ways of approaching design and implementation; you’ll rush into coding when you should be thinking. You’ll carelessly complicate when you should be relentlessly simplifying—and then you’ll wonder why your code bloats and debugging is so hard.
Eric S. Raymond (Art of UNIX Programming, The, Portable Documents)
Codex Magica is the first book ever to crack the Illuminati code. It is a fully documented, authoritative reference source, as you’ll see from its lengthy index and footnotes sections. Now they won’t be able to dodge and duck, because, in addition to my exclusive investigative materials, Codex Magica also heavily quotes and relies on the Illuminati’s own, most touted textbooks and manuals.
Texe Marrs (Conspiracy World)
As programmers, we collect, organize, maintain, and harness knowledge. We document knowledge in specifications, we make it come alive in running code, and we use it to provide the checks needed during testing.
Andrew Hunt (The Pragmatic Programmer)
documenting exclusively through code has some of the same basic problems as using comprehensive UML diagrams.
Eric Evans (Domain-Driven Design: Tackling Complexity in the Heart of Software)
A document shouldn’t try to do what the code already does well.
Eric Evans (Domain-Driven Design: Tackling Complexity in the Heart of Software)
Written documents should complement the code and the talking.
Eric Evans (Domain-Driven Design: Tackling Complexity in the Heart of Software)
We write code, which communicates our intentions to a machine and documents our thinking for future generations of developers.
Andrew Hunt (The Pragmatic Programmer)
Finally, unlike Plan-and-Document, in Agile you revise code continuously to improve the design and to add functionality starting with the second iteration.
Armando Fox (Engineering Software as a Service: An Agile Approach Using Cloud Computing + $10 AWS Credit)
At one level, the whole notion seemed ludicrous, even suicidal. Yet in a way that he could not explain even to himself, his uncle’s intense sense of conviction about the matter struck a mystifying yet riveting chord deep in Jacob’s soul. Finally he shrugged and nodded, and as he did, Avi and Morry beamed with what appeared to be joy, a rather odd emotion to be feeling under the circumstances, Jacob thought. “Very good,” the Frenchman began. “I will personally oversee your training. You two must both get in much better shape. Physical conditioning is critical. Then we’ll cover setting up safe houses, forging documents, Morse code, building and fixing and operating all kinds of radios, surveillance, weapons training, hand-to-hand combat. But we don’t have much time. We’re expecting the Germans to invade by the end of the year. You sure you’re up for this?” Jacob looked at his uncle, then to Maurice Tulek, and nodded. “I’m ready.
Joel C. Rosenberg (The Auschwitz Escape)
Question of Official Secrets Act confronts Delhi Police probe By Shreeja Sen | 553 words New Delhi: Investigations into an alleged corporate espionage case are on at full steam, the Delhi Police said on Sunday even as it held around a dozen people in detention after confidential documents were stolen from the petroleum ministry. With the detainees yet to be charged, the police are proceeding only under the provisions of the Indian Penal Code, 1860—Sections 411 (dishonestly receiving stolen property) and 120B (criminal conspiracy).
Anonymous
Turing’s years at Bletchley constitute the best-documented period in his life, yet in the end his work as a code breaker amounted to a very long diversion from his dream of building a universal machine. For the bombes were about as far from universal as you could get. Their very design guaranteed their obsolescence, since it depended on the quirks and particularities of another, much smaller machine, the Enigma, of which the bombe was the huge, distorted shadow.
David Leavitt (The Man Who Knew Too Much: Alan Turing and the Invention of the Computer (Great Discoveries))
I also fear an attack directly upon us which shall be considerably aided by the French colonists! I therefore support your plan to act first and stage a preemptive strike against the French by launching “Operation Bright Moon”, which is now the code name for the Japanese coup d ětat which will disarm the Vichy French Forces by or during the 9th of March 1945!”  
Michael G Kramer Omieaust (A Gracious Enemy & After the War Volume Two)
Building on the Pentagon’s anthrax simulation (1999) and the intelligence agency’s “Dark Winter” (2001), Atlantic Storm (2003, 2005), Global Mercury (2003), Schwartz’s “Lockstep” Scenario Document (2010), and MARS (2017), the Gates-funded SPARS scenario war-gamed a bioterrorist attack that precipitated a global coronavirus epidemic lasting from 2025 to 2028, culminating in coercive mass vaccination of the global population. And, as Gates had promised, the preparations were analogous to “preparing for war.”191 Under the code name “SPARS Pandemic,” Gates presided over a sinister summer school for globalists, spooks, and technocrats in Baltimore. The panelists role-played strategies for co-opting the world’s most influential political institutions, subverting democratic governance, and positioning themselves as unelected rulers of the emerging authoritarian regime. They practiced techniques for ruthlessly controlling dissent, expression, and movement, and degrading civil rights, autonomy, and sovereignty. The Gates simulation focused on deploying the usual psyops retinue of propaganda, surveillance, censorship, isolation, and political and social control to manage the pandemic. The official eighty-nine-page summary is a miracle of fortune-telling—an uncannily precise month-by-month prediction of the 2020 COVID-19 pandemic as it actually unfolded.192 Looked at another way, when it erupted five years later, the 2020 COVID-19 contagion faithfully followed the SPARS blueprint. Practically the only thing Gates and his planners got wrong was the year. Gates’s simulation instructs public health officials and other collaborators in the global vaccine cartel exactly what to expect and how to behave during the upcoming plague. Reading through the eighty-nine pages, it’s difficult not to interpret this stunningly prescient document as a planning, signaling, and training exercise for replacing democracy with a new regimen of militarized global medical tyranny. The scenario directs participants to deploy fear-driven propaganda narratives to induce mass psychosis and to direct the public toward unquestioning obedience to the emerging social and economic order. According to the scenario narrative, a so-called “SPARS” coronavirus ignites in the United States in January 2025 (the COVID-19 pandemic began in January 2020). As the WHO declares a global emergency, the federal government contracts a fictional firm that resembles Moderna. Consistent with Gates’s seeming preference for diabolical cognomens, the firm is dubbed “CynBio” (Sin-Bio) to develop an innovative vaccine using new “plug-and-play” technology. In the scenario, and now in real life, Federal health officials invoke the PREP Act to provide vaccine makers liability protection.
Robert F. Kennedy Jr. (The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health)
When writing a commit message, ask yourself whether developers will need to use that information in the future. If so, then document this information in the code. An example is a commit message describing a subtle problem that motivated a code change. If this isn’t documented in the code, then a developer might come along later and undo the change without realizing that they have re-created a bug. If you want to include a copy of this information in the commit message as well, that’s fine, but the most important thing is to get it in the code. This illustrates the principle of placing documentation in the place where developers are most likely to see it; the commit log is rarely that place.
John Ousterhout (A Philosophy of Software Design)
It’s important that readers can easily find all the documentation needed to understand your code, but that doesn’t mean you have to write all of that documentation.
John Ousterhout (A Philosophy of Software Design)
Code is most obvious if it conforms to the conventions that readers will be expecting; if it doesn’t, then it’s important to document the behavior so readers aren’t confused.
John Ousterhout (A Philosophy of Software Design)
I kept the poems in the tower with my hoarded documents of murders. I was constructing my own house of conscience with the transgressions of conscience on exhibit. I found myself poring over the verses for days and nights trying to break their code.
Steve Erickson (Rubicon Beach)