Search
45 results for “typedcode”
-
I recently found #musikcube which is a 'is a fully functional terminal-based music player, library, and streaming audio server'.
Since I could not find any possibility to stream to a PC I decided to write a web-based player to stream the music to using musikcube.
Technology wise I use typescript and vue.The API is nicely documented so the player makes good progress :)
-
Fable 4.21.0 is out 🎉
Using `jsOptions` via TypeScript target now generate typed code, so you can enjoy your types even when doing some interop.
It also improves FormattableString and Uri supports.
Python also received some love with a fix when reporting errors.
-
Only 78,000 PR request and we can fix `pull_request_target`
https://github.com/search?q=path%3A*.yml+%22pull_request_target%3A%22&type=code
-
FW: https://xcancel.com/revy4rv/status/2019326441713013130
今日 #linuxdeepin c++书写小窍门
#define private publichttps://github.com/search?q=org%3Alinuxdeepin+%22%23define+private+public%22&type=code
提示:Direct Member Access 也是 DMA,你写
代码还要开挂.jpg -
This Friday I had the privilege of giving the Zagreb #Python meetup a talk on the why, when not and how of #statictyping in Python.
We in the Python community are given this incredible choice between writing dynamically typed code for fast prototyping or using a pretty sophisticated (IMO stronger than Java, Go or even C#) type system for bigger projects. Or anything in between.
The situation isn't perfect, of course, but this is still pretty amazing. Most programming languages don't get this.
-
CW: On Swisspost and Akamai filtering
It turns out that Swisspost¹ uses Akamai to "protect" its login system called SwissID² and they redirect to
hxxps://login.swissid.ch/idp/oauth2/authorize?scope=openid+email+phone+profile&response_type=code&redirect_uri=https%3A%2F%2Faccount.post.ch%2Fredirect%2Fid-confirmation&state=vX7TlNn7IhybofD70YM0_gLsWLzv2r3tSHFubjqvF6o&nonce=z_8pbla4cMqwQABW-Z1l5btJMHOSjZBjvMbnfIEpMII&client_id=klp-client&ui_locales=it &acr_values=loa-1&prompt=login
and this login.swissid.ch lives behind Akamai.
It so happens that the IP I use to connect is also a Tor _relay_ (not an exit node) and Akamai offers the possibility of blocking "all of Tor" (i.e. exits _and_ relays) as "bad people". Of course if you know anything about Tor you also know that relays are not exits and no traffic ever leaves a relay to "the Internet" but, "sekurity theatre" being what it is, they block it anyway.
Several years ago (2013 or so?) Apple used Akamai (they still do) and support.apple.com blocked Tor relays too but, on the :birdsite:, I contacted Akamai's CSO out of desperation (aka "csoandy") who very kindly looked into it and fixed it! :flan_awe: (I assume by educating Apple, or so I hope).
Well, unfortunately Andy has left Akamai and now I cannot have someone "give the talk" to the Swiss Post.
Oh, if you happen to use SwissSign PKI solutions you have the same demented problem.
:flan_set_fire:
#SwissPost #SwissSign #SwissID #Tor #Akamai
__
¹ https://posta.ch/ (in Italian…)
² https://swissid.ch/ -
There are over 538K SQL code blocks in docs on GitHub:
We believe SQL code in docs should be runnable.
We created #SQLCodeLenses with new #SQLBookmarks 📑 in #MarkdownSQLPro Tools 🛠️ for VS Code IDE.
Get #SQLTools drivers to connect to data sources and run SQL queries:
Our Markdown SQL Pro Tools add new SQL code lenses to enable direct SQL code interactions.
Subscribe to get notified when they will be released:
💖 https://github.com/sponsors/RandomFractals/sponsorships?tier_id=295482
-
Even though I fixed semantic mess of #elixirlang by publishing the #uptight library https://github.com/doma-engineering/uptight, I still need to interact with non-tightly-typed code sometimes.
Sometimes, just unwrapping isn't enough or isn't ergonomic, so then I have to go back to operating with raw binaries.
While typing those, as anyone should, I feel bad when I write `binary` and I also feel bad when I write `String.t()`. Again, as anyone should.
After thinking about this issue for so long, I finally understood that in #elixir, both of those types should be called `uninterpreted_binary()` or `blob()`. I know it will never happen, but `String.t()` has to be deprecated.
The reason not to use `binary()` type in Elixir is clear. When binaries are *interpreted* as Strings, there's a whole lot of semantics going on, and this interpretation is way more pushed than in #erlang. But it still happens at interpretation time, it has nothing to do with the type of an term presented. This is the reason not to use `String.t()`. So yeah, the most correct way to put it is `blob()`: an uninterpreted raw binary, that is, however, easily and automatically gets interpreted as strings.
As a matter of fact, `String.t()` may just be the Elixir's hundred thousand dollar mistake.
-
What's this? A phishing email that doesn't get any spelling or grammar wrong? Impressive.
The URL included in the email has a redirect to:
https://newkste66f02.s3.amazonaws.com/44b5cfb3.html
Which just has this in the HTML:
```
window.location.assign("https://jademountains.net/s2");
```Which redirs with an appended slash:
Which redirs to
https://coinbase-v3teamapp.com/signin/consent_challenge=ca1ccf26-a61b-4133-952d-aba54aa249a9
Which isn't a legit coinbase domain -- URL registered today. Which resolves to a blank page with a single javascript payload:
https://coinbase-v3teamapp.com//static/js/main.401607d2.js
Which appears to be a React app, which then ultimately triggers a load of this URL, which includes a list of desired OAuth scopes:
https://login.coinbase.com/oauth2/auth?response_type=code&client_id=${e.data.data.clientId}&redirect_uri=${e.data.data.redirectURI}&account=all&scope=wallet:accounts:read,wallet:accounts:update,wallet:accounts:create,wallet:accounts:delete,wallet:addresses:read,wallet:addresses:create,wallet:buys:read,wallet:buys:create,wallet:deposits:read,wallet:deposits:create,wallet:notifications:read,wallet:payment-methods:read,wallet:payment-methods:delete,wallet:payment-methods:limits,wallet:sells:read,wallet:sells:create,wallet:transactions:read,wallet:transactions:send,wallet:transactions:request,wallet:transactions:transfer,wallet:user:read,wallet:user:update,wallet:user:email,wallet:withdrawals:read,wallet:withdrawals:create,offline_access
Which, cleaned up, is this:
wallet:accounts:read
wallet:accounts:update
wallet:accounts:create
wallet:accounts:delete
wallet:addresses:read
wallet:addresses:create
wallet:buys:read
wallet:buys:create
wallet:deposits:read
wallet:deposits:create
wallet:notifications:read
wallet:payment-methods:read
wallet:payment-methods:delete
wallet:payment-methods:limits
wallet:sells:read
wallet:sells:create
wallet:transactions:read
wallet:transactions:send
wallet:transactions:request
wallet:transactions:transfer
wallet:user:read
wallet:user:update
wallet:user:email
wallet:withdrawals:read
wallet:withdrawals:create
offline_accessWhich is, I'd assume, basically everything, including the ability to withdraw:
wallet:withdrawals:read
wallet:withdrawals:createBefore ultimately ending up at what appears to be a coinbase-owned domain:
```
$ dig -t A coinbase.com +short
104.18.35.15
172.64.152.241
$ dig -t A login.coinbase.com +short
172.64.152.241
104.18.35.15
```The OAuth bits of the URL tell me that this must be a third-party Coinbase app. Can't find an easy way to map that client ID of
c300bb46-07f8-4257-9760-a892c704a8b6
back to an app page though to report it.
What the hell. I'll bite. I don't have anything in Coinbase anymore. Let's see if I can't get the actual app and report it.
Logging in... SMS 2-factor, Email 3rd factor.
Aaaaaand BINGO. The third-party app is named
"Third Party: Support"
However, searching for that in Coinbase's app search yields... nothing. Great job, Coinbase.
Okay, how do I go about reporting this to them? Looks like there's a chat option. Fine. Gonna use this post as my description of what's going on.
-
What's this? A phishing email that doesn't get any spelling or grammar wrong? Impressive.
The URL included in the email has a redirect to:
https://newkste66f02.s3.amazonaws.com/44b5cfb3.html
Which just has this in the HTML:
```
window.location.assign("https://jademountains.net/s2");
```Which redirs with an appended slash:
Which redirs to
https://coinbase-v3teamapp.com/signin/consent_challenge=ca1ccf26-a61b-4133-952d-aba54aa249a9
Which isn't a legit coinbase domain -- URL registered today. Which resolves to a blank page with a single javascript payload:
https://coinbase-v3teamapp.com//static/js/main.401607d2.js
Which appears to be a React app, which then ultimately triggers a load of this URL, which includes a list of desired OAuth scopes:
https://login.coinbase.com/oauth2/auth?response_type=code&client_id=${e.data.data.clientId}&redirect_uri=${e.data.data.redirectURI}&account=all&scope=wallet:accounts:read,wallet:accounts:update,wallet:accounts:create,wallet:accounts:delete,wallet:addresses:read,wallet:addresses:create,wallet:buys:read,wallet:buys:create,wallet:deposits:read,wallet:deposits:create,wallet:notifications:read,wallet:payment-methods:read,wallet:payment-methods:delete,wallet:payment-methods:limits,wallet:sells:read,wallet:sells:create,wallet:transactions:read,wallet:transactions:send,wallet:transactions:request,wallet:transactions:transfer,wallet:user:read,wallet:user:update,wallet:user:email,wallet:withdrawals:read,wallet:withdrawals:create,offline_access
Which, cleaned up, is this:
wallet:accounts:read
wallet:accounts:update
wallet:accounts:create
wallet:accounts:delete
wallet:addresses:read
wallet:addresses:create
wallet:buys:read
wallet:buys:create
wallet:deposits:read
wallet:deposits:create
wallet:notifications:read
wallet:payment-methods:read
wallet:payment-methods:delete
wallet:payment-methods:limits
wallet:sells:read
wallet:sells:create
wallet:transactions:read
wallet:transactions:send
wallet:transactions:request
wallet:transactions:transfer
wallet:user:read
wallet:user:update
wallet:user:email
wallet:withdrawals:read
wallet:withdrawals:create
offline_accessWhich is, I'd assume, basically everything, including the ability to withdraw:
wallet:withdrawals:read
wallet:withdrawals:createBefore ultimately ending up at what appears to be a coinbase-owned domain:
```
$ dig -t A coinbase.com +short
104.18.35.15
172.64.152.241
$ dig -t A login.coinbase.com +short
172.64.152.241
104.18.35.15
```The OAuth bits of the URL tell me that this must be a third-party Coinbase app. Can't find an easy way to map that client ID of
c300bb46-07f8-4257-9760-a892c704a8b6
back to an app page though to report it.
What the hell. I'll bite. I don't have anything in Coinbase anymore. Let's see if I can't get the actual app and report it.
Logging in... SMS 2-factor, Email 3rd factor.
Aaaaaand BINGO. The third-party app is named
"Third Party: Support"
However, searching for that in Coinbase's app search yields... nothing. Great job, Coinbase.
Okay, how do I go about reporting this to them? Looks like there's a chat option. Fine. Gonna use this post as my description of what's going on.
-
What's this? A phishing email that doesn't get any spelling or grammar wrong? Impressive.
The URL included in the email has a redirect to:
https://newkste66f02.s3.amazonaws.com/44b5cfb3.html
Which just has this in the HTML:
```
window.location.assign("https://jademountains.net/s2");
```Which redirs with an appended slash:
Which redirs to
https://coinbase-v3teamapp.com/signin/consent_challenge=ca1ccf26-a61b-4133-952d-aba54aa249a9
Which isn't a legit coinbase domain -- URL registered today. Which resolves to a blank page with a single javascript payload:
https://coinbase-v3teamapp.com//static/js/main.401607d2.js
Which appears to be a React app, which then ultimately triggers a load of this URL, which includes a list of desired OAuth scopes:
https://login.coinbase.com/oauth2/auth?response_type=code&client_id=${e.data.data.clientId}&redirect_uri=${e.data.data.redirectURI}&account=all&scope=wallet:accounts:read,wallet:accounts:update,wallet:accounts:create,wallet:accounts:delete,wallet:addresses:read,wallet:addresses:create,wallet:buys:read,wallet:buys:create,wallet:deposits:read,wallet:deposits:create,wallet:notifications:read,wallet:payment-methods:read,wallet:payment-methods:delete,wallet:payment-methods:limits,wallet:sells:read,wallet:sells:create,wallet:transactions:read,wallet:transactions:send,wallet:transactions:request,wallet:transactions:transfer,wallet:user:read,wallet:user:update,wallet:user:email,wallet:withdrawals:read,wallet:withdrawals:create,offline_access
Which, cleaned up, is this:
wallet:accounts:read
wallet:accounts:update
wallet:accounts:create
wallet:accounts:delete
wallet:addresses:read
wallet:addresses:create
wallet:buys:read
wallet:buys:create
wallet:deposits:read
wallet:deposits:create
wallet:notifications:read
wallet:payment-methods:read
wallet:payment-methods:delete
wallet:payment-methods:limits
wallet:sells:read
wallet:sells:create
wallet:transactions:read
wallet:transactions:send
wallet:transactions:request
wallet:transactions:transfer
wallet:user:read
wallet:user:update
wallet:user:email
wallet:withdrawals:read
wallet:withdrawals:create
offline_accessWhich is, I'd assume, basically everything, including the ability to withdraw:
wallet:withdrawals:read
wallet:withdrawals:createBefore ultimately ending up at what appears to be a coinbase-owned domain:
```
$ dig -t A coinbase.com +short
104.18.35.15
172.64.152.241
$ dig -t A login.coinbase.com +short
172.64.152.241
104.18.35.15
```The OAuth bits of the URL tell me that this must be a third-party Coinbase app. Can't find an easy way to map that client ID of
c300bb46-07f8-4257-9760-a892c704a8b6
back to an app page though to report it.
What the hell. I'll bite. I don't have anything in Coinbase anymore. Let's see if I can't get the actual app and report it.
Logging in... SMS 2-factor, Email 3rd factor.
Aaaaaand BINGO. The third-party app is named
"Third Party: Support"
However, searching for that in Coinbase's app search yields... nothing. Great job, Coinbase.
Okay, how do I go about reporting this to them? Looks like there's a chat option. Fine. Gonna use this post as my description of what's going on.
-
What's this? A phishing email that doesn't get any spelling or grammar wrong? Impressive.
The URL included in the email has a redirect to:
https://newkste66f02.s3.amazonaws.com/44b5cfb3.html
Which just has this in the HTML:
```
window.location.assign("https://jademountains.net/s2");
```Which redirs with an appended slash:
Which redirs to
https://coinbase-v3teamapp.com/signin/consent_challenge=ca1ccf26-a61b-4133-952d-aba54aa249a9
Which isn't a legit coinbase domain -- URL registered today. Which resolves to a blank page with a single javascript payload:
https://coinbase-v3teamapp.com//static/js/main.401607d2.js
Which appears to be a React app, which then ultimately triggers a load of this URL, which includes a list of desired OAuth scopes:
https://login.coinbase.com/oauth2/auth?response_type=code&client_id=${e.data.data.clientId}&redirect_uri=${e.data.data.redirectURI}&account=all&scope=wallet:accounts:read,wallet:accounts:update,wallet:accounts:create,wallet:accounts:delete,wallet:addresses:read,wallet:addresses:create,wallet:buys:read,wallet:buys:create,wallet:deposits:read,wallet:deposits:create,wallet:notifications:read,wallet:payment-methods:read,wallet:payment-methods:delete,wallet:payment-methods:limits,wallet:sells:read,wallet:sells:create,wallet:transactions:read,wallet:transactions:send,wallet:transactions:request,wallet:transactions:transfer,wallet:user:read,wallet:user:update,wallet:user:email,wallet:withdrawals:read,wallet:withdrawals:create,offline_access
Which, cleaned up, is this:
wallet:accounts:read
wallet:accounts:update
wallet:accounts:create
wallet:accounts:delete
wallet:addresses:read
wallet:addresses:create
wallet:buys:read
wallet:buys:create
wallet:deposits:read
wallet:deposits:create
wallet:notifications:read
wallet:payment-methods:read
wallet:payment-methods:delete
wallet:payment-methods:limits
wallet:sells:read
wallet:sells:create
wallet:transactions:read
wallet:transactions:send
wallet:transactions:request
wallet:transactions:transfer
wallet:user:read
wallet:user:update
wallet:user:email
wallet:withdrawals:read
wallet:withdrawals:create
offline_accessWhich is, I'd assume, basically everything, including the ability to withdraw:
wallet:withdrawals:read
wallet:withdrawals:createBefore ultimately ending up at what appears to be a coinbase-owned domain:
```
$ dig -t A coinbase.com +short
104.18.35.15
172.64.152.241
$ dig -t A login.coinbase.com +short
172.64.152.241
104.18.35.15
```The OAuth bits of the URL tell me that this must be a third-party Coinbase app. Can't find an easy way to map that client ID of
c300bb46-07f8-4257-9760-a892c704a8b6
back to an app page though to report it.
What the hell. I'll bite. I don't have anything in Coinbase anymore. Let's see if I can't get the actual app and report it.
Logging in... SMS 2-factor, Email 3rd factor.
Aaaaaand BINGO. The third-party app is named
"Third Party: Support"
However, searching for that in Coinbase's app search yields... nothing. Great job, Coinbase.
Okay, how do I go about reporting this to them? Looks like there's a chat option. Fine. Gonna use this post as my description of what's going on.
-
What's this? A phishing email that doesn't get any spelling or grammar wrong? Impressive.
The URL included in the email has a redirect to:
https://newkste66f02.s3.amazonaws.com/44b5cfb3.html
Which just has this in the HTML:
```
window.location.assign("https://jademountains.net/s2");
```Which redirs with an appended slash:
Which redirs to
https://coinbase-v3teamapp.com/signin/consent_challenge=ca1ccf26-a61b-4133-952d-aba54aa249a9
Which isn't a legit coinbase domain -- URL registered today. Which resolves to a blank page with a single javascript payload:
https://coinbase-v3teamapp.com//static/js/main.401607d2.js
Which appears to be a React app, which then ultimately triggers a load of this URL, which includes a list of desired OAuth scopes:
https://login.coinbase.com/oauth2/auth?response_type=code&client_id=${e.data.data.clientId}&redirect_uri=${e.data.data.redirectURI}&account=all&scope=wallet:accounts:read,wallet:accounts:update,wallet:accounts:create,wallet:accounts:delete,wallet:addresses:read,wallet:addresses:create,wallet:buys:read,wallet:buys:create,wallet:deposits:read,wallet:deposits:create,wallet:notifications:read,wallet:payment-methods:read,wallet:payment-methods:delete,wallet:payment-methods:limits,wallet:sells:read,wallet:sells:create,wallet:transactions:read,wallet:transactions:send,wallet:transactions:request,wallet:transactions:transfer,wallet:user:read,wallet:user:update,wallet:user:email,wallet:withdrawals:read,wallet:withdrawals:create,offline_access
Which, cleaned up, is this:
wallet:accounts:read
wallet:accounts:update
wallet:accounts:create
wallet:accounts:delete
wallet:addresses:read
wallet:addresses:create
wallet:buys:read
wallet:buys:create
wallet:deposits:read
wallet:deposits:create
wallet:notifications:read
wallet:payment-methods:read
wallet:payment-methods:delete
wallet:payment-methods:limits
wallet:sells:read
wallet:sells:create
wallet:transactions:read
wallet:transactions:send
wallet:transactions:request
wallet:transactions:transfer
wallet:user:read
wallet:user:update
wallet:user:email
wallet:withdrawals:read
wallet:withdrawals:create
offline_accessWhich is, I'd assume, basically everything, including the ability to withdraw:
wallet:withdrawals:read
wallet:withdrawals:createBefore ultimately ending up at what appears to be a coinbase-owned domain:
```
$ dig -t A coinbase.com +short
104.18.35.15
172.64.152.241
$ dig -t A login.coinbase.com +short
172.64.152.241
104.18.35.15
```The OAuth bits of the URL tell me that this must be a third-party Coinbase app. Can't find an easy way to map that client ID of
c300bb46-07f8-4257-9760-a892c704a8b6
back to an app page though to report it.
What the hell. I'll bite. I don't have anything in Coinbase anymore. Let's see if I can't get the actual app and report it.
Logging in... SMS 2-factor, Email 3rd factor.
Aaaaaand BINGO. The third-party app is named
"Third Party: Support"
However, searching for that in Coinbase's app search yields... nothing. Great job, Coinbase.
Okay, how do I go about reporting this to them? Looks like there's a chat option. Fine. Gonna use this post as my description of what's going on.
-
EDIT May 2: Thank everyone for sharing, this has all been taken care of!
Could someone who speaks #Arabic, #Chinese, or #Basque help me update the https://jointhefediverse.net site? I'm trying to remove links to joinfirefish.org and want to make sure I do it right.
Any help would be very appreciated!
#translation #localization #TranslationHelp #LocalizationHelp
-
De #iPRES 2024 Programmacommissie heeft je hulp nodig! De commissie is overweldigd door het grote aantal inzendingen voor haar internationale conferentie over digitale duurzaamheid en zoekt daarom extra beoordelaars. Heb jij expertise op dit terrrein en wat tijd om te helpen? 👉 Meld je aan via https://auth.cern.ch/auth/realms/cern/protocol/openid-connect/auth?response_type=code&client_id=indico-cern&redirect_uri=https%3A%2F%2Findico.cern.ch%2Fauthlib%2Fcern&scope=openid&state=n7hhMUmfRsHLCKNuoQRXaL41eMdqVB&nonce=mVSrg9zGFbCXWW2ei59Q. Alvast bedankt voor je hulp!
Beeld via Tim Mossholder
-
I made this !
I made a little game where you get to write a tune and hear me play it on my cello - and it works! Really it's a static web page that has interactive elements. For anyone who does web development it is very basic, but you know, I made it. I am not a coder by training, but sure I typed code before... (*cough*) Ok, in 1983, and th
https://www.lauraritchie.com/2024/03/12/i-made-this/
#LifeLearning #ResonanceProject #cymatics #ChatGPT #Coding #Game #kindness #Resonance #Webpage -
RT @CCAM_EU: If you're interested in developing on-board solutions for individual & shared #automated vehicles that meet the demands of all #users, then you don't want to miss the #HorizonEurope call HORIZON-CL5-2023-D6-01-01.
🔗 https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl5-2023-d6-01-01;callCode=null;freeTextSearchKeyword=CCAM;matchWholeText=true;typeCodes=1,0;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=topicSearchTablePageState#CCAM #EUTransportResearch https://t.co/DBRrfV9v7t
🐦🔗: https://n.respublicae.eu/cinea_eu/status/1666840554972368898
-
#Razpis: priložnost za projekte, ki spominjajo na dogodke v sodobni zgodovini 🇪🇺. Teme:
🔹Vzroki & posledice avtoritarnih & totalitarnih režimov
🔹Holokavst
🔹Demokratična tranzicija
🔹Dediščina kolonializma
🔹Evropska integracija🐦🔗: https://n.respublicae.eu/EKvSloveniji/status/1663156187305484289
-
RT @GabrielMariya: Restoring our ocean & waters by 2030 is our goal!🐟🌊
The EU 🇪🇺 is launching 11 new calls worth €87.7 million for the #MissionOcean & €31 million for joint calls with #MissionSoil and #MissionClimate.
Be part of the blue transition!
🐦🔗: https://n.respublicae.eu/cinea_eu/status/1622981671183175680
-
Promoting cultural literacy through arts education to foster social inclusion https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-07;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState ; Cultural and creative approaches for gender-responsive STEAM education https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-08;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState; Fostering socio-economic development and job creation in rural and remote areas through cultural tourism https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-05;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState #ArtsEducation #Inclusion #gender #STEAM #CulturalTourism #research #funding #digital
-
There are EIGHT amazing calls in this group. Cultural heritage in transformation – facing change with confidence https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-04;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState ; A world leading European video game innovation system https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-06;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState ; Advanced technologies for remote monitoring of heritage monuments and artefacts https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-01;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState ; Cultural and creative industries for a sustainable climate transition https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/horizon-cl2-2023-heritage-01-02;callCode=HORIZON-CL2-2023-HERITAGE-01;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1;statusCodes=31094501,31094502,31094503;programmePeriod=null;programCcm2Id=null;programDivisionCode=null;focusAreaCode=null;destinationGroup=null;missionGroup=null;geographicalZonesCode=null;programmeDivisionProspect=null;startDateLte=null;startDateGte=null;crossCuttingPriorityCode=null;cpvCode=null;performanceOfDelivery=null;sortQuery=sortStatus;orderBy=asc;onlyTenders=false;topicListKey=callTopicSearchTableState #CulturalHeritage #Heritage #VideoGames #RemoteMonitoring #ClimateEmergency
-
RT @GabrielMariya: Have you already applied to the 17 new #EUMissions calls?
With an additional budget of +€507.1 million they will pave the way to deliver on 🇪🇺 ⤵️
🌍#MissionClimate
🌊#MissionOcean
🌱#MissionSoil
Apply by 27 September👉https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-search;callCode=null;freeTextSearchKeyword=;matchWholeText=true;typeCodes=1,0;statusCodes=31094501,3109450…🐦🔗: https://nitter.eu/ERC_Research/status/1556906997186019328
-
Design Systems Checklist, by @tyco.bsky.social:
https://tylercoderre.com/projects/design-systems-checklist.html
-
What result did you come up with? Please share the output with us in the comment section. 🤔👇👇👇
#OneTeam #TYPO3Store #TYPO3Code #TYPO3Coder #Coding #TYPO3 #T3Planet
-
bashunit - A simple testing library for bash scripts
#bash :bash: #shell #shell_script #testing -
bashunit - A simple testing library for bash scripts
#bash :bash: #shell #shell_script #testing -
bashunit - A simple testing library for bash scripts
#bash :bash: #shell #shell_script #testing -
Array Methods Work on NON-Arrays?!
Array methods are DECEPTIVE! They work on any object with length property. This object isn't an array, but map() works on it! JavaScript lies about types!
#javascript #javascripttricks #arraymethods #arraylikeobjects #typecoercion #javascriptweird #javascriptquiz #codingchallenge #javascriptshorts #javascriptwtf #ducktyping #advancedjavascript
-
Array Methods Work on NON-Arrays?!
Array methods are DECEPTIVE! They work on any object with length property. This object isn't an array, but map() works on it! JavaScript lies about types!
#javascript #javascripttricks #arraymethods #arraylikeobjects #typecoercion #javascriptweird #javascriptquiz #codingchallenge #javascriptshorts #javascriptwtf #ducktyping #advancedjavascript