17 private links
One issue that is unfortunately contentious these days is whether denying Nazis a platform to organize and recruit by banning them from online spaces and university campuses (hereafter “No Platform”) is a violation of free speech principles. I say “unfortunately”, because it is hard to believe that we are actually having this discussion: of course it is not a violation of free speech principles to prevent evil people from organizing to commit genocide. But even if it were, we would still be morally obligated to so prevent them.
No platform is the practice of of preventing someone—either through policy or through protest—from spreading their ideas through a particular event or website. The term is mostly used to refer to rescinding an invitation to someone asked to speak at an event (such as a guest lecture at a college). The concept apparently originates from a policy used by the British National Union of Students to prevent people they disagree with from giving speeches on UK college campuses. The concept is similar to the political action of cordon sanitaire, where a politician or political party is either unconditionally excluded from coalitions or other forms or cooperation, or even completely ignored. "No platform" is typically invoked for issues such as racism, sexism, homophobia, Holocaust denial, and so forth. As what is and is not acceptable by society changes with the times, so do the targets of "no platform", with 2015 seeing protests of speakers seen as transphobic or Islamophobic who consider themselves progressive as they are feminists or atheists, respectively. No-platforming is, at best, an attempt to prevent a balance fallacy, with protesters refusing to allow tacit endorsement of reactionary views.
Depending on the circumstances, the tactic can be controversial, and has been compared to book burning.[1] Ignoring a person (or group) also means that no one is directly refuting their arguments. Some have criticized the action as a form of censorship and a violation of the principles of freedom of speech and critical thinking. The Foundation for Individual Rights in Education maintains a database of hundreds of incidents[2] in which invited speakers have been no-platformed on college campuses, showing that the phenomenon has been "steadily increasing over the past 15 years" and is used more often by left-wingers than right wingers.[3]
Advocates of no-platforming counter that the speaker's message has already been heard by protesters and venue holders, and they have decided not to extend the speakers the right to an audience that has already rejected them. The protests are generally meant to raise awareness of the target's views and not a call to place a blanket ban them; the reaction from many protested is arguably censorial itself, considering they're refusing to acknowledge the right to demonstrate opposition to their views.[4] Apparently, they believe that their speech is more free than others'.
De passage à une grand messe technologique comme l'ensemble du globe et la place parisienne en comptent tant et tant, le président Emmanuel Macron a récemment déclaré : "Je veux que la France soit une Start-Up Nation. Une nation qui...
Composer and sound artist, guitar and objects player, silence listener.
SubwayTooter - Mastodon client app for Android
Very useful for stuff like whitespace-mode or auto-fill-mode: 
(hook 'c-mode-hook (lambda () (xxxxxxxx-mode -1)))
(add-hook 'js-mode-hook (lambda () (xxxxxxxx-mode -1)))The quickest way to check if a package is installed is to search for it with kpsewhich {package-name}.sty.  So, to check for etoolbox, use
$ kpsewhich etoolbox.sty
/usr/local/texlive/2014/texmf-dist/tex/latex/etoolbox/etoolbox.styIf it finds the package, it will output the path (just like normal which).  If it doesn't find the package, it will output nothing and have a non-zero exit code.
Perhaps the most direct way to answer the question though would be to try and use the package:
\documentclass{article}
\usepackage{etoolbox}
\begin{document}
\end{document}The above will fail if etoolbox cannot be found.
If you installed TeXLive via the Arch repositories, you can look up the installed packages in the files located in:
/var/lib/texmf/arch/installedpkgs/*.pkgsOn Manjaro there might be similar files or the same in a different (or same?) path (I don't know, because the Manjaro-Wiki includes no article about its TeXLive).
Comment ça marche ?
La Brique Internet est un simple boîtier VPN couplé à un serveur.
Un VPN sert à relier un ordinateur à un autre, de façon sécurisée, de façon à ce qu'aucun intermédiaire sur Internet ne puisse lire le contenu des communications qui transitent. Pour que la Brique fonctionne, il faut lui configurer un accès VPN, qui lui permettra de créer un tunnel jusqu'à un autre ordinateur sur Internet. En vous connectant simplement en WiFi sur la Brique, vous pourrez aller sur Internet, en passant automatiquement au travers de ce tunnel chiffré. De cette façon, votre Fournisseur d'Accès à Internet (FAI) ne peut plus ni vous espionner, ni vous brider ni vous filtrer. C'est le même mécanisme qui permet à la Brique d'être un serveur nomade.
Élimination de la surveillance, de la part du FAI et des fournisseurs de services :
Schéma
L'ordinateur auquel vous vous reliez par le VPN doit être géré par des gens de confiance (e.g. une association rattachée à la FFDN). C'est pour cette raison qu'il est souhaitable de choisir une association pour laquelle vous avez déjà rencontré les adhérents. Certaines associations vous fourniront directement le boîtier clé en main, avec votre accès VPN préconfiguré.
Mullvad is a VPN service that helps keep your online activity, identity and location private. Only €5/month. We accept Bitcoin, cash, bank wire, credit card (PayPal), and Swish
hug + hack = infinity
JsonResume creates pretty versions of resume from a single JSON input file. Output formats are specifically customized to modern resume templates. Also, there are a ton of customizations to the templates possible, to make your own version of resume created easily and super quickly.
Dans Rester bourgeois : les quartiers populaires, nouveaux chantiers de la distinction, la sociologue Anaïs Collet analyse de manière croisée la gentrification des Pentes de la Croix-Rousse et du Bas-Montreuil. Compte-rendu de lecture de la partie du livre consacrée à Lyon.
Une complainte qui cache un plaidoyer politique.
jQuery and its cousins are great, and by all means use them if it makes it easier to develop your application.
If you're developing a library on the other hand, please take a moment to consider if you actually need jQuery as a dependency. Maybe you can include a few lines of utility code, and forgo the requirement. If you're only targeting more modern browsers, you might not need anything more than what the browser ships with.
At the very least, make sure you know what jQuery is doing for you, and what it's not. Some developers believe that jQuery is protecting us from a great demon of browser incompatibility when, in truth, post-IE8, browsers are pretty easy to deal with on their own.
jQuery and its cousins are great, and by all means use them if it makes it easier to develop your application.
If you're developing a library on the other hand, please take a moment to consider if you actually need jQuery as a dependency. Maybe you can include a few lines of utility code, and forgo the requirement. If you're only targeting more modern browsers, you might not need anything more than what the browser ships with.
At the very least, make sure you know what jQuery is doing for you, and what it's not. Some developers believe that jQuery is protecting us from a great demon of browser incompatibility when, in truth, post-IE8, browsers are pretty easy to deal with on their own.
A per-user emacs daemon service for systemd
Tips for upgrading your configuration
From 3.5 to 4.0
The best advice is to start from the default rc.lua and backport any changes you might have added to your rc.lua. This avoids most of the possible errors due to missing important changes.
To do this, you can download the default rc.lua for 3.5.9 here, and then compare your existing rc.lua with the 3.5.9 default using your diff tool of choice. Write down the changes, then apply these to the 4.0 default rc.lua, which you can find at /etc/xdg/awesome/rc.lua after the upgrade, or here if you have not yet performed the upgrade.
If you still wish to ignore this advice, first read the NEWS section about the breaking changes. This document assumes you did.
Be warned, even if it looks like it’s working after changing some lines, it wont supports dynamic screen changes and will have many subtle bugs. The changes mentioned below are important for the stability of your window manager.
Here is a diff of the 3.5.9 rc.lua with the 4.0 one. All changes due to new features and new syntaxes have been removed. A – in front of the line correspond to content of the 3.5 rc.lua and + its replacement in 4.0.
This document does not cover the new features added in the Awesome 4 rc.lua, it only covers the minimal required changes to have a properly behaving config.
Security in WordPress is taken very seriously, but as with any other system there are potential security issues that may arise if some basic security precautions aren't taken. This article will introduce you to basic security concepts and serve as an introductory guide to making your WordPress website more secure.
This article is not the ultimate quick fix to your security concerns.
 
                   
     
   
                   
                   
                   
                   
                   
                   
                   
                   
                  