That sequence doesn't work. The actual rule requires an understanding of floating point representation. Seems like the authors were not eager enough to disprove their own rules.
Obviously I'm being kind of snarky. I feel like there is another effect here that conflates the results though. When I first encountered this link, my response was "fuck that, generating enough tests to deduce a rule for what I know is a trick will take forever." So I just clicked on the "tell me the answer" link. In other words, the cost to do this correctly is extremely high ... of course I would do it incorrectly as there is no consequence of being wrong. In other words, this immediately threw a TooMuchTediumException in my brain.
On est encore en plein dedans dans l'est de la France: http://www.meteofrance.com/previsions-meteo-france/dijon/21000, http://vigilance.meteofrance.com/
Maybe next year? with Marina Kaye  as singer?
At least we'd have one chance not to be in the bottom of the class.
Anyway, Sweden's victory at #Eurovision2015 was well-deserved. And France deserved to be the last (Germany and Austria did better IMO, despite their final scores)
One of those "best practices" is to only use SSL/TLS when absolutely required, because (paraphrasing as I'm translating) “encryption of all HTTP streams requires a lot of CPU cycles; yet encrypting static elements such as images (except content) is of no interest, but significantly increases resource consumption.”
Well, I agree that encryption is not strictly needed for many (mostly static) resources, but at the very least there should be a way of ensuring the served resource is the one we were expected to get, and without creating "mixed content".
So has there been any thought given to including a checksum of external resources in HTML attributes? (how about resources referenced in CSS stylesheets? maybe we could require TLS for those then) Something similar to CSP hashes for inline scripts and styles, but on the reverse included inside the document about external resources. You could then transfer HTML pages through TLS that could reference unencrypted resources and wouldn't trigger "mixed content" provided the checksum is validated (granted, that wouldn't be backwards-compatible, and would trigger "mixed content" in all browsers not implementing the feature).
Looking around, I found that the HTML 3.0 proposal did define an MD attribute, but it didn't made the cut into HTML 3.2: http://www.w3.org/MarkUp/html3/img.html
Or is the "non backwards-compatibility" issue a showstopper? (one could imaging putting the unencrypted resource URI in another attribute, but then the HTML page becomes larger, possibly trumping –particularly when adding other network optimizations– the gains of unencrypted transfer)
Or maybe the initial criticism of TLS costs in CPU is just stale? otherwise, why would everyone want to put TLS everywhere? and why would CloudFlare offer TLS for free? †
† Note: another "best practice" in this book is to prefer GET requests to POST, because “POST requests require 2 TCP connections (one for the headers, the other for the data)”. Book's credibility takes a knock!
(many other advices in the book are well-known performance best practices: avoid unnecessary work, take advantage of HTTP caching, don't resource images through HTML/CSS, avoid computations in loop conditions if they can be extracted, avoid try/catch in performance-sensitive loops, etc.)
That was Tuesday actually, at my parents house. We went to the attic looking for some toys and, after moving a few old boxes, found an old dollhouse. Among the dollhouse furniture was a phonograph, and my daughter asked me what it was. I went on to explain it to her and told her you put discs on it, not the kind like CDs and DVDs, but the same kind of discs we had moved in a box in the attic. She did't remember it, so to show her we put one on the turntable. Long story short, she didn't like the music, and I went up to the attic grab the records I had seen there: The Beatles red, blue, and white albums.
Man, this is such good music!
- Atol Conseils & DéveloppementsSoftware Architect, present
- Angry Birds Stella
- 0h h1
- Angry Birds Under Pigstruction
- Angry Birds Stella POP!
- Linebound - Life On The Line
- Angry Birds Go!
- Angry Birds Friends
Les enfants en colère après la publication de caricatures jugées injurie...
OSLO – La nouvelle n'a pas tardé à faire réagir. À peine publiées par un journal iranien, les caricatures se moquant ouvertement du Père Noë
Testing on the Toilet: Writing Descriptive Test Names
by Andrew Trenk, This article was adapted from a Google Testing on the Toilet (TotT) episode. You can download a printer-friendly version of
One man willingly gave Google his data. See what happened next. - O'Reil...
Despite some misgivings about the company’s product course and service permanence (I was an early and fanatical user of Google Wave), my rel
Bolinfest Changeblog: Hacking on Atom Part I: CoffeeScript
The truth is out: money is just an IOU, and the banks are rolling in it
The Bank of England's dose of honesty throws the theoretical basis for austerity out the window
22 Responses To Buzzfeed's 22 Creationist Messages
Buzzfeed published 22 questions and statements from Creationists; here's some responses from a science reporter.
Troy Hunt: For your convenience, please disable security warnings
Let's just start here: This is an annoying feature of Internet Explorer, and is not indicative of any security. Allow me to provide a techni