Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Activity for elgonzoâ€
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Edit | Post #281886 |
Post edited: |
— | over 3 years ago |
Edit | Post #281886 |
Post edited: |
— | over 3 years ago |
Edit | Post #281886 |
Post edited: |
— | over 3 years ago |
Edit | Post #281886 |
Post edited: |
— | over 3 years ago |
Edit | Post #281886 | Initial revision | — | over 3 years ago |
Answer | — |
A: Difference between puts and print for Array The official ruby documentation explains the observed difference between the outputs of `print` and `puts`. The important bits are as follows: print For any non-string object given as argument (such as an array, for example), `print` invokes the object's `tos` method and outputs the resulti... (more) |
— | over 3 years ago |
Comment | Post #281808 |
Yeah, either we stick with the commonly used definitions or interpretations of "object oriented programming" and "functional programming", or we end up with a bunch of different and contradictory answers that despite their contradictions will all be true in some sense because we change the rules of t... (more) |
— | over 3 years ago |
Comment | Post #281606 |
If it is about having different "SomethingElse" instances with their individual incarnations of C_1 ... C_n instances, well, I don't know nothing about this "SomethingElse" except its name and that you call it a "registry" of C_1 ... C_n instances. So, again i can't tell with certainty, but from the ... (more) |
— | over 3 years ago |
Comment | Post #281606 |
Hmm, you said you have instances of C_1 ... C_n classes. Why is it then not about classes? The facade pattern is about "hiding" the structure and complexities of a (sub)system and present (some of) its functionality through a simplified interface (the facade, in your case X). Your comment leaves me e... (more) |
— | over 3 years ago |
Comment | Post #281606 |
Unless i am mistaken, your X sounds like an implementation of the Facade pattern (https://en.wikipedia.org/wiki/Facade_pattern). But, i am not entirely sure whether your question is specifically about X or about some other aspect of your code structure and logic, though... (more) |
— | over 3 years ago |
Comment | Post #281511 |
I have to clarify a statement in my 1st comment. Of course browsers do have concepts of different sessions (browser session, page session, etc.), but which are different from the concept of "web site login sessions" we are talking about here. So, the respective sentence in my 1st comment should have ... (more) |
— | over 3 years ago |
Comment | Post #281511 |
(2/2) Keep in mind, cookies are NOT used by a web browser to organize data (beyond managing the ownership/origin constraints and expiry dates of the cookies, of course). Cookies are used by web sites (not browsers!) to store whatever(!!!) pieces of information the web site wants to store client-side.... (more) |
— | over 3 years ago |
Comment | Post #281511 |
"Why aren't web browser developers separate the two?" Wheter some cookie or some other (small) piece of data is representing an (active) session is known and decided only by the web server, not the web browser. The concept of a "session" does not exist in the browser software. It merely exist server-... (more) |
— | over 3 years ago |
Comment | Post #280755 |
(2/2) However, if your problem behind your Q is not strictly requiring interfaces and structs, and if your application scenario is not particularly restricted/intolerant towards object allocations, you could turn the interface into an abstract class `public abstract class RingBase<TRing> where TRing ... (more) |
— | almost 4 years ago |
Comment | Post #280755 |
Well, if you want/need to stick with interfaces and structs, you are out of luck, as you already noticed - and which pretty much would be the answer to the question. (1/2)
(more) |
— | almost 4 years ago |
Comment | Post #280647 |
I am not a fan of backing fields only differing from their associated property names in letter case. It makes it all too easy to write member method code that by accident manipulates the backing field instead of going through the property setter (which for VMs often has side effects such as raising e... (more) |
— | almost 4 years ago |
Comment | Post #280512 |
Your answer begins with stating that "Above PHP 7 PHP object is faster **and lighter** than array". However, according to your test results, arrays are always lighter than object. (more) |
— | almost 4 years ago |
Comment | Post #280449 |
It's hard to tell and guess without actually being able to take a closer look at the bin and elf file. But i guess the sections in the elf file don't form a continuous block of memory, and there could be unused memory "gaps" between some sections in memory. Your bin file (whose actual file format i a... (more) |
— | almost 4 years ago |
Comment | Post #278540 |
It's not really that well documented, unless one considers the source code being the documentation: https://github.com/jenkinsci/git-parameter-plugin/blob/c40ec6db14f5a5e0abaab143037d3292bbe3fcbb/src/main/java/net/uaznia/lukanus/hudson/plugins/gitparameter/GitParameterDefinition.java#L370-L377 (more) |
— | about 4 years ago |
Comment | Post #278540 |
Funnily enough, the branchfilter of the git-parameter plug-in will take the matched capture group as value, if and only if the regex pattern contains a single capture group. If the regex patterns happens to have more than one capture group, the branch name is taken as value - as if the pattern was de... (more) |
— | about 4 years ago |
Comment | Post #278281 |
It seems so. Some googling reveals some services/programs apparently be able converting G-Code to STL, such as MakePrintable (service), Voxelizer (software), and probably some more. There is also a rather outdated Blender script for importing G-Code (with Blender providing the STL export) at Github n... (more) |
— | about 4 years ago |
Comment | Post #278203 |
Hooking as a technique is not necessarily approved or an intentional part of the software design by the developer as this answer suggest. Hooking can also be done in a manner unintended/unapproved by the original developer, for example by jump splicing; although, modern security features of CPUs (suc... (more) |
— | about 4 years ago |
Comment | Post #278197 |
This is a bit like asking: How is a flower different from a plant? Hooking is a technique that can be used for code injection. But not all techniques for code injection are hooks. For example, buffer overflow
bugs or specially crafted malicious input data can be exploited to inject code, yet they a... (more) |
— | about 4 years ago |
Comment | Post #277931 |
It's probably worth mentioning that overlapping occurences are not accounted for. For example, while "ABBA" occurs twice in "ABBABBA", the technique explained in the answer will only count one occurence. I am not saying that the intent of the asker included accounting for overlaps, but it is somethin... (more) |
— | about 4 years ago |
Comment | Post #277430 |
I tend to disagree. If you can verify that your developers implement and handle string-to-number conversions correctly as intended, you should also be able to verify if a json parser of your choice does number parsing correctly. If you are unable to test whether a given json parser does number conver... (more) |
— | over 4 years ago |
Comment | Post #277441 |
Note that variant glyphs is NOT a feature of TrueType fonts. It is a feature of OpenType. The Caveat font is also available as OTF (https://github.com/googlefonts/caveat/tree/master/fonts/OTF). However, i have no insight into OpenType's glyph variation rules nor to which degree OTF's are usable in Wo... (more) |
— | over 4 years ago |