Hammerspoon of course provides a setIcon method on menubar to help us provide an image icon, so we’ll just grab a Slack icon from the web and—whoa, what’s this???
imageData … can be one of the following … – A string beginning with ASCII: which signifies that the rest of the string is interpreted as a special form of ASCII diagram, which will be rendered to an image and used as the icon.
Ok, drop everything, we’re doing this. Check out this craziness: With simple ASCII character progression, we can define vector art!tutorial hammerspoon
Back in university, students used to tease the Systems Design Engineers, calling it "boxes and arrows" engineering. Not real engineering, you see, since it didn't touch anything tangible, like buildings, motors, hydrochloric acid, or, uh, electrons.
I don't think any of us really understood what boxes-and-arrows engineering really was back then, but luckily for you, now I'm old. Let me tell you some stories.reading
Anecdotes about the development of Apple's original Macintosh, and the people who made it.reading apple mac
This wiki is dedicated to hosting Squid Web Cache documentation, including the FAQ, KnowledgeBase articles, ConfigExamples, and the development RoadMapdocumentation squid
You may occasionally in your career have had a want or need to set Windows proxy settings for every account on a machine regardless of who is logged in. There are a few common ways to do this.windows proxy
We are here because the editor of this magazine asked me, “Can you tell me what code is?”reading interesting interactive
You’re worried that shooting the deer ends the scene. But it’s actually when you cross that threshold where all the creativity is. So many new options open up.inspiration
If you lose something [in Git], don't panic. There's a good chance that you can find someone who will be able to hunt it down again.git
Welcome to the world of Git. I hope this document will help to advance your understanding of this powerful content tracking system, and reveal a bit of the simplicity underlying it — however dizzying its array of options may seem from the outside.git
This essay explains how Git works. It assumes you understand Git well enough to use it to version control your projects.git
There are a few things that inspire deep revulsion in me. The episode of Star Trek: Voyager I just watched was pretty gross. I definitely saw some pretty bad roadkill on my daily walks during the Covid lockdowns. But nothing - nothing - comes close to the white hot fury that radiates from me the moment someone suggests plugging a spreadsheet into some sort of automated process.excel funny
Provided your code already has both dictionaries as variables, it's very concise to check for this inline:
if big | small == big: # do something
Here is a solution that also properly recurses into lists and sets contained within the dictionary. You can also use this for lists containing dicts etc...
def is_subset(subset, superset): if isinstance(subset, dict): return all(key in superset and is_subset(val, superset[key]) for key, val in subset.items()) if isinstance(subset, list) or isinstance(subset, set): return all(any(is_subset(subitem, superitem) for superitem in superset) for subitem in subset) # assume that subset is a plain value if none of the above match return subset == superset
The concept known as "worse is better" holds that in software making (and perhaps in other arenas as well) it is better to start with a minimal creation and grow it as needed. Christopher Alexander might call this "piecemeal growth." This is the story of the evolution of that concept.development reading
A layman's guide to thinking like the self-aware smol brained developer.development reading programming
The playground allows you to learn about systemd interactively, right from your browser! Create examples without the danger of breaking your system, and without being distracted by hundreds of unrelated unit files.tutorial linux
A security identifier (SID) is used to uniquely identify a security principal or security group. Security principals can represent any entity that can be authenticated by the operating system, such as a user account, a computer account, or a thread or process that runs in the security context of a user or computer account.security windows
Well-known security identifiers (SIDs) identify generic groups and generic users. There are universal well-known SIDs, which are meaningful on all secure systems using this security model, and well-known SIDs that are meaningful only on Windows systems.security windows
Provides an overview and links to information about the User Rights Assignment security policy settings user rights that are available in Windows. User rights govern the methods by which a user can log on to a system. User rights are applied at the local device level, and they allow users to perform tasks on a device or in a domain. User rights include logon rights and permissions. Logon rights control who is authorized to log on to a device and how they can log on. User rights permissions control access to computer and domain resources, and they can override permissions that have been set on specific objects.security windows
I've spent quite a few hours learning how to wrangle auditd around exclusions. Here's what I've learned.linux security
Fast forward to today, we can see that how these proxy server variables are handled varies, depending on what language or tool you are using.documentation proxy