Comment Re: ignorant hypocrites (Score 1) 347
writing the article is a DIRECT response to being asked to provide estimates for ACTUAL WORK
... writing the article was most certainly done in lieu of that actual work...
writing the article is a DIRECT response to being asked to provide estimates for ACTUAL WORK
... writing the article was most certainly done in lieu of that actual work...
If you're storing the length, then "iterate over array and perform this operation" (for example, for a search or a "double every element" transformation) can use the known length to set up a for loop, rather than having to check "am I at the last element of the array" for every element... This could be a good reason to store the length even if you don't want the cost of bounds-checking.
(or what's the length for?)
Bounds checking is one option, but it could also be used for iteration.
Can you spin up a minimal VM and reproduce it? Then it could definitely use a bug report...
If you don't, I might try it in a few days when I get some breathing room.
I agree with you on the idea and behaviour of the control classes, but have generally found it handy to have some guarantees of well-formedness in the data objects.
Otherwise, every control object which uses the data object needs to verify every detail about the data object before it uses it - which leads to the duplication of validation code issue you were concerned about in the first place...
So if you are not doing your field validation at creation time, how do you enforce the "interface contract"?
Something somewhere has to verify that the address is a valid address, and the port is a valid port (why would you accept a socket request for port 67890?) - why allow a non-conformant data object to exist?
What domains have such wide-ranging field values that validated data is not a reasonable idea?
Data classes like this?
class TCPSocketAddress
{
private long ipaddress;
private int port;
string getAddress()
{
return long2ip(ipaddress);
}
void setAddress(string addr)
{
if (addr.matches("/^\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3)$/")) ipaddress = ip2long(addr);
else throw InvalidIPAddressException;
}
int getPort()
{
return port;
}
void setPort(string addr)
{
if (newport > 0 && newport < 65536) port = newport;
else throw InvalidTCPPortException;
}
}
On the one hand I was confused how systemD was involved in the launch.
Then you haven't been paying attention - all the systemd supporters are adamant that it is descended from launchd!
That's partly because T-Mobile is basically a European phone company - they're the international arm of Deutsche Telekom...
LEGO is contraception in its own right - just play with LEGO and you can guarantee that you're never having any kids.
I assume he means that his GPG key is used to sign packages which get loaded to the Debian repository, which you could potentially use to upload a package with a root-executed file in it...
In many PDF readers I have used, the space bar key works the way you've described - scrolling by one screenful.
I'm not on my usual PC, but I've just tested both Adobe Reader and the Firefox built-in PDF viewer, and both scroll by a screenful both for the space bar, as well as for the page-down key. Neither of them scrolled by the "page" size.
Further, at-rest encryption means you can't search for shit.
Yep, that's a major issue we have with the encryption technologies we use at the moment. That's where the need for homomorphic encryption and other similar searchable encryption comes from.
Where there's a will, there's a relative.