Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »

Welcome to Software Development on Codidact!

Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.

Activity for matthewsnyder‭

Type On... Excerpt Status Date
Suggested Edit Post #291046 Suggested edit:
Simplify, standardize terminology, retag. No attempt to change original meaning
(more)
helpful 2 months ago
Comment Post #290992 It has the `nc_permit_dns` option (nc = name constraint?). In the past, when I tried this, I got errors about how a root CA can't have NC. But I just tried adding it and it works. Would you like to post this as an answer so I can upvote/mark worked?
(more)
3 months ago
Edit Post #290992 Initial revision 3 months ago
Question GnuTLS config for my own root CA, for use on internal server
I am trying to generate my own root CA certificate. Context My goal is to sign an intermediate CA with this certificate, and then install the intermediate CA on my own client machines. The intermediate CA will be used to sign a server on my private LAN. The server has no inbound route and cannot ...
(more)
3 months ago
Comment Post #290747 I guess that's where I disagree - I think possessing a good answer is indicative of a good question.
(more)
3 months ago
Edit Post #290816 Post edited:
3 months ago
Edit Post #290780 Post edited:
3 months ago
Edit Post #290817 Initial revision 3 months ago
Answer A: How to hide files from the VS Code sidebar without pattern matching?
You could just move the files to a new folder and open that :) Alright alright here's a serious answer: I noticed that VSC automatically dereferences symlinks. So if you create a temporary new folder and symlink only the files you want, this will effectively accomplish what you are asking. To m...
(more)
3 months ago
Suggested Edit Post #290780 Suggested edit:

(more)
helpful 3 months ago
Comment Post #290786 While indeed bash is code, bash discussion tends to happen on linux.codidact.com/ so perhaps this question is better move there so it can get better answers.
(more)
3 months ago
Comment Post #290788 This is surely explained at https://developers.google.com/identity?
(more)
3 months ago
Edit Post #290816 Post edited:
3 months ago
Edit Post #290816 Post edited:
3 months ago
Edit Post #290816 Initial revision 3 months ago
Answer A: What is the difference between hashing and encryption?
Hashing is lossy compression. You can't recover the input of a hash from the result. This would obviously not work as an encryption. How would you decrypt it, if half the message is destroyed :) Consider the SHA hash. You can hash a 1 GB file into a 0.1 kB string. Wow! Why don't we just sen...
(more)
3 months ago
Comment Post #290747 IMO, the downvotes are inappropriate here. The question is well-written and easily answerable - in the negative, as I tried to do. Asking how to do an impossible thing shouldn't be downvoted. Someone trying to learn about a topic may be unaware of what's possible or not, but there's nothing wrong ...
(more)
3 months ago
Edit Post #290815 Initial revision 3 months ago
Answer A: Building a language model completely from scratch
This is not feasible as described. To learn LLMs, you can look at models like 3B WizardLM. These are open source and should be possible to just train and run as is. The build may be very complex, and consumer hardware may be insufficient (but the easy solution is to run it on the cloud). You ca...
(more)
3 months ago
Edit Post #290502 Post edited:
4 months ago
Comment Post #290526 It sounds like your problem isn't really about Chatty or speech recognition, you just have a simple import error. See if you can follow the answer in https://software.codidact.com/posts/290550
(more)
4 months ago
Edit Post #290551 Initial revision 4 months ago
Answer A: How to troubleshoot ModuleNotFoundError?
`ModuleNotFoundError` means that in running your program, Python attempted to import some module `xyz` but it was not present on your system. It could be that you forgot to install the module (forgot to `pip install -r requirements.txt`), misspelled the module name, or tried to import a module tha...
(more)
4 months ago
Edit Post #290550 Initial revision 4 months ago
Question How to troubleshoot ModuleNotFoundError?
I ran some Python code and it crashed with `ModuleNotFoundError`. What is the general approach for dealing with these situations?
(more)
4 months ago
Comment Post #290502 I think people make a new rainbow table in that case.
(more)
4 months ago
Edit Post #290502 Post edited:
4 months ago
Edit Post #290502 Post edited:
4 months ago
Edit Post #290502 Initial revision 4 months ago
Answer A: Are "strong passwords" at all meaningful?
The assumption of 1k attempts/s is wishful thinking, as is the idea that a hacker will go on mail.google.com and try to guess your login (they would get a captcha after like 5 failed attempts). Password security comes into play when someone steals the whole table of all accounts and password hashe...
(more)
4 months ago
Comment Post #290343 Fair enough. I know that this is one of your self-answer canonicals. I think the question is interesting, but I noticed all the answer you posted are quite long. So I decided to post a shorter one for people who are in a hurry, and also as an example for how it can be made more succinct. I operate un...
(more)
6 months ago
Edit Post #290327 Post edited:
6 months ago
Edit Post #290327 Post edited:
6 months ago
Edit Post #290344 Initial revision 6 months ago
Answer A: Does Python have a "ternary operator" (conditional evaluation operator like "?:" in other languages)?
The Python ternary "operator" is `if` and `else`: ``` x = 1 if somecondition else 0 ``` In Python, this is called a "conditional expression" rather than an operator, and the documentation explains it: https://docs.python.org/3.12/reference/expressions.html?highlight=ternary#conditional-expressi...
(more)
6 months ago
Comment Post #289753 This is a good question, but IMO it mixes too many things together, so it's hard to write a good answer. In my own answer, I try to call out the specific things I think should be a separate question.
(more)
6 months ago
Edit Post #290343 Post edited:
6 months ago
Edit Post #290343 Post edited:
6 months ago
Edit Post #290343 Post edited:
6 months ago
Edit Post #290343 Post edited:
6 months ago
Edit Post #290343 Post edited:
6 months ago
Edit Post #290343 Initial revision 6 months ago
Answer A: Understanding mutable default arguments in Python
Everything you put on the line with `def` is global (global to the file, not as in the `global` keyword), so the (initially empty) list you create with `param=[]` persists and gets reused between calls to `example()`. You probably want to create a local list for each invocation instead. For that, you...
(more)
6 months ago
Edit Post #290342 Initial revision 6 months ago
Question PEP20 on namespaces: What exactly is it saying to do?
PEP20 aka the Zen of Python has a statement: >Namespaces are one honking great idea -- let's do more of those! What exactly are we supposed to "do" according to this? Is it saying we should have more "honking great ideas" like namespaces and add them to the language as PEPs? Is it saying ...
(more)
6 months ago
Edit Post #290327 Post edited:
6 months ago
Edit Post #290327 Initial revision 6 months ago
Answer A: What is the point of triggering CI/CD with an empty git commit?
The reason this practice exists is because CIs suck. The frameworks/services themselves suck, and the way people write the configs also suck, and the two combine to create a mega-suck. A CI is supposed to trigger as you make changes so you automatically have an up-to-date indicator on whether the ...
(more)
6 months ago
Edit Post #290317 Post edited:
More reflective of the self-answer
6 months ago
Comment Post #290301 If we're going to have "what is the default setting X in Y program" questions, they should give some version range ("at least in version x.y.z") to avoid becoming less than useful a few years later.
(more)
6 months ago