tag:blogger.com,1999:blog-1897757324567699379.comments2018-10-15T01:34:08.206-04:00Code Singer: Gary Poster's BlogAnonymoushttp://www.blogger.com/profile/02305364761685060789noreply@blogger.comBlogger27125tag:blogger.com,1999:blog-1897757324567699379.post-47219565662596635602016-05-01T06:58:22.308-04:002016-05-01T06:58:22.308-04:00Very helpful. Thank you for sharing. Very helpful. Thank you for sharing. Anonymoushttps://www.blogger.com/profile/15887895125014560933noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-57995345352745494592012-12-12T06:09:59.513-05:002012-12-12T06:09:59.513-05:00Heh, I was asked that myself. :-). Thanks for clar...Heh, I was asked that myself. :-). Thanks for clarifying. Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-16954905773504882022012-08-16T07:22:34.209-04:002012-08-16T07:22:34.209-04:00I'm glad, Nicola. :-)I'm glad, Nicola. :-)Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-11222721102171252792012-07-22T05:34:14.357-04:002012-07-22T05:34:14.357-04:00self.useFixture(TempHomeDir())
Needs fixtures 0.3...self.useFixture(TempHomeDir())<br /><br />Needs <a href="http://pypi.python.org/pypi/fixtures" rel="nofollow">fixtures 0.3.9</a> or better.Anonymoushttps://www.blogger.com/profile/11400080716012026985noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-46433384707885205022012-07-21T06:24:24.885-04:002012-07-21T06:24:24.885-04:00Thanks for posting this.
I remember being told on...Thanks for posting this.<br /><br />I remember being told once about set-based design, where two or three teams/individuals build their own thing according to their own design, governed only by meeting already establish constraints (i.e. within a bounded "set").<br /><br />Then, at the last responsible moment, the designs are merged. That might mean throwing one away, or abandoning a Anonymoushttps://www.blogger.com/profile/11400080716012026985noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-75907658486740937192012-07-20T15:26:30.099-04:002012-07-20T15:26:30.099-04:00True, stub. Thanks.True, stub. Thanks.Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-45898927288143165902012-07-20T15:25:56.639-04:002012-07-20T15:25:56.639-04:00Heh, good to know, Michael. Thank you.Heh, good to know, Michael. Thank you.Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-72636868422339949562012-07-17T16:53:57.975-04:002012-07-17T16:53:57.975-04:00On freenode's #juju, hazmat had an idea of a v...<i>On freenode's #juju, hazmat had an idea of a variant of the approach above, appropriate for automated scripts that want to use Juju. The scripts could locally modify $HOME before running Juju. Then they can configure a custom .ssh (and .juju, for that matter, to set up a custom environments.yaml) to do what they want.</i><br /><br />Aside from the problems you mention, assuming juju usesMichael Hudson-Doylehttps://www.blogger.com/profile/08800334898826186482noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-39916658988455722362012-07-17T04:18:45.170-04:002012-07-17T04:18:45.170-04:00Your test runs are probably more reliable than the...Your test runs are probably more reliable than the existing setup now. We might notice failures more due to the higher velocity, but we should keep things in perspective.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-49012264544885247762011-11-23T10:34:34.683-05:002011-11-23T10:34:34.683-05:00Thanks Stuart! I updated that part of the post.Thanks Stuart! I updated that part of the post.Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-84893758196129524432011-11-23T09:27:11.641-05:002011-11-23T09:27:11.641-05:00Re OpenJDK, Clojure generally works fine. Tests wi...Re OpenJDK, Clojure generally works fine. Tests with OpenJDK run on Clojure's <a href="http://build.clojure.org/" rel="nofollow">continuous integration</a> server.<br /><br />The only problems I'm aware of right now are with ClojureScript and the Rhino JavaScript interpreter in OpenJDK.Stuart Sierrahttps://www.blogger.com/profile/13693732881629219442noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-10208981654328264352011-11-16T19:51:48.017-05:002011-11-16T19:51:48.017-05:00It's great to know that socks are welcome in s...It's great to know that socks are welcome in some Clojure community subsets, Philip. :-)Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-12328110284119502222011-11-16T19:36:46.203-05:002011-11-16T19:36:46.203-05:00Thanks, Jake. I made the correction.Thanks, Jake. I made the correction.Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-41606192295034968112011-11-16T08:40:28.340-05:002011-11-16T08:40:28.340-05:00David Nolen gave a similar presentation at a NYC C...David Nolen gave a similar presentation at a NYC Clojure users group meeting. Should be able to hold over anyone until video and slides from from the Conj are posted. http://vimeo.com/27860102<br /><br />Minor correction, Fogus's BASIC DSL was implemented in Scala. http://blog.fogus.me/2009/03/26/baysick-a-scala-dsl-implementing-basic/Jake McCraryhttps://www.blogger.com/profile/11038349078426581524noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-40350500636560258752010-09-19T12:37:24.623-04:002010-09-19T12:37:24.623-04:00Hey, good to see you back posting! It's intere...Hey, good to see you back posting! It's interesting to see links to projects you've worked on all in one place.Anonymoushttps://www.blogger.com/profile/02484887646163794311noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-54127751555255901552010-09-18T09:02:45.343-04:002010-09-18T09:02:45.343-04:00Thanks, Gary, a thorough and interesting survey of...Thanks, Gary, a thorough and interesting survey of what sounds like a great conference. I hope that more of this work appears at PyCons across the world. Zope was a very early demonstration of Python's power, and contains much a broader audience could learn from.Stevehttps://www.blogger.com/profile/15732819755000554717noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-69258742009539399832010-09-17T15:47:48.255-04:002010-09-17T15:47:48.255-04:00Thanks for blogging this Gary, sounds like a fun t...Thanks for blogging this Gary, sounds like a fun time and some interesting discussions.<br /><br />A small thought: for a security cache, I'd strongly expect it to be a an accomodation to just-in-time policy checks (even in zodb); moving those checks to the 'obtain' step not the 'dereference' step should help with death-by-a-thousand-cuts.Robert Collinshttps://www.blogger.com/profile/13675006570070996862noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-69144767572610992742010-03-04T00:50:16.309-05:002010-03-04T00:50:16.309-05:00I think the memory size if the key of getting fast...I think the memory size if the key of getting faster speed on vmware. When I gave my Fedora 6 128MB ram, it need 2-3 minutes to compile myself source code, but under 384MB ram it only take 34 seconds.<br /><br />I think the other adjustings also have affects a little somehow.Anonymoushttps://www.blogger.com/profile/02764851405730581845noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-42861016654977397082010-01-15T06:44:34.646-05:002010-01-15T06:44:34.646-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-72743533404832479542009-05-13T19:56:00.000-04:002009-05-13T19:56:00.000-04:00My "muddying the waters" concern was entirely sema...My "muddying the waters" concern was entirely semantic, not syntactic. I tentatively agree with you that there would be no syntactic problems.<br /><br />However, semantically, it sounds like you are dismissing the differences in one hand and acknowledging them in the other. On the one hand, you seem to say that they are basically the same, because they describe an object's behavior. You are Anonymoushttps://www.blogger.com/profile/02305364761685060789noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-28151500358691772442009-05-13T18:40:00.000-04:002009-05-13T18:40:00.000-04:00Why do you think that using isinstance/issubclass ...Why do you think that using isinstance/issubclass instead of providedBy/implementedBy would be "muddying the waters"? Both are used to basically check an object's behaviour (I include method signatures in "behaviour"), except for marker interfaces. At the syntactic I see no problems, and at the semantic level naming conventions ('I' prefix for interfaces) should cover most cases; when they don't,Anonymoushttps://www.blogger.com/profile/02484887646163794311noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-33310904526572277602009-04-16T07:17:00.000-04:002009-04-16T07:17:00.000-04:00Cool! See you there!Cool! See you there!Lennart Regebrohttps://www.blogger.com/profile/08337807480455483637noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-82209552205300683862009-03-14T04:33:00.000-04:002009-03-14T04:33:00.000-04:00From the point of view of someone who's primarily ...From the point of view of someone who's primarily doing Django, I personally see the need for some sort of term like this as a necessary evil.<BR/><BR/>Even though most of the successful new frameworks and libraries for web apps from the last few years have made significant breaks with MVC, they still separate concerns in a way which (if you don't look too closely) resembles MVC just enough that James Bennetthttps://www.blogger.com/profile/08219551890477104042noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-6912339952229504362009-03-13T19:12:00.000-04:002009-03-13T19:12:00.000-04:00I don't normally do this, but I have to say that I...I don't normally do this, but I have to say that I agree completely and don't have anything to add.<BR/><BR/>Well, maybe a little note: one of the things I like about Routes is that it gives me a bidirectional mapping. I can go from a URL to a particular view, and I can generate the URL if I know the view I want. Doing this in the graph traversal way is more difficult: there can be more than Marius Gedminashttps://www.blogger.com/profile/15155998626202067226noreply@blogger.comtag:blogger.com,1999:blog-1897757324567699379.post-42422556627122475132009-03-11T03:30:00.000-04:002009-03-11T03:30:00.000-04:00Even though D above here has a nice example of why...Even though D above here has a nice example of why not to use your own __*__ functions. However I disagree with the part of the Python interpreter giving warnings about it. Like the title of this blog post says, if you are hacking you might want to overwrite certain built in __*__ functions (not saying this is a wise plan).<BR/><BR/>Some packages are built on this, so that would be breaking Simon Rivadahttps://www.blogger.com/profile/15163510969430086408noreply@blogger.com