architecture – What are the challenges of browser user interfaces?

The browser user interface is typically for remote devices such as routers, printers, and so on. It is also used in desktop applications such as Jupyter Notebook.

In order to consider a commercial office application, what are the challenges? Are there examples? Electron that uses Web technologies is excluded because of its bulk. The latest advances in browsers like indexdb, notification, wasm, all seem to indicate that it is time to consider this possibility for some classes of applications.

Google Foobar Challenges Python Partial Test Case Errors "Queue"

I started the foobar challenge a few days ago, and I am now at the first issue of the third step, and I have the challenge "Queue to do" . The problem is that I receive partial errors in the verification process. There are 10 test cases with 2 open cases and 8 hidden cases, and I had a problem with three hidden test cases.
This is the question:

Queue to do

You are almost ready to destroy the LAMBCHOP Domsday device, but the security checkpoints that protect the underlying systems of LAMBCHOP will be problematic. You managed to shoot one without triggering alarms, which is great! Except that as assistant commander Lambda, you learned that the checkpoints are about to be subject to automatic control, which means that your sabotage will be discovered and your cover stolen - unless you can fool the automatic control system.

To deceive the system, you will have to write a program that will return the same amount of security check that the guards would have after controlling all the workers. Fortunately, Commander Lambda's desire for efficiency does not allow waiting times of several hours. Guards at checkpoints have therefore found ways to speed up the rate of transmission. Instead of checking every incoming worker, the guards check all people online while noting their security ID, and then let the line fill up. Once done, they go back to the line, this time leaving the last worker. They continue as well, leaving an extra worker on the line each time but saving the security IDs of those they check, until they jump the entire line, then they record the IDs of all the workers that they wrote down in a checksum and then leave for lunch. Fortunately, the orderly nature of the workers forces them to always align in a numerical order without gaps.

For example, if the first operator of the line has ID 0 and the security checkpoint line contains three employees, the process will look like this:
0 1 2 /
3 4/5
6/7 8
where the checksum XOR (^) of the guards is 0 ^ 1 ^ 2 ^ 3 ^ 4 ^ 6 == 2.

Similarly, if the first operator is identified by ID 17 and the checkpoint contains four, the process would look like this:
17 18 19 20 /
21 22 23/24
25 26/27 28
29/30 31 32
which produces the checksum 17 ^ 18 ^ 19 ^ 20 ^ 21 ^ 22 ^ 23 ^ 25 ^ 26 ^ 29 == 14.

All worker IDs (including the first worker) are between 0 and 200,000,000 inclusive, and the checkpoint line will always have a minimum length of 1 worker.

With this information, write a feature solution (start, length) that will cover the missing security checkpoint by generating the same checksum that the guards would normally submit before lunch. You just have time to find the ID of the first operator to check (start) and the length of the line (length) before the automatic review. Your program must therefore generate the appropriate checksum with these two values ​​only.


To provide a Java solution, edit
To provide a Python solution, edit

Test case
Your code must pass the following tests.
Note that it can also be run on hidden test cases not shown here.

- Java case -
Solution.solution (0, 3)

Solution.solution (17, 4)

- Python cases -
solution.solution (0, 3)

solution.solution (17, 4)


I have tested my first code:

def solution (start, length):
checksum = 0
for j in the beach (length):
for i in the range (length-j):
checksum ^ = (start + j * length + i)
return the checksum

This code has returned three hidden test errors: Test # 5, # 6, # 9.


I have therefore tried to reconstruct the answer using a table.

def solution (start, length):
checksum = 0
strin = []
    for j in the beach (length):
for i in the range (length-j):
strin.append (start + j * length + i)
for i in strin:
checksum ^ = i
return the checksum

But now, this one throws me another failure of test case in test n ° 3, n ° 5, n ° 6, n ° 9

I would like to know why this difference in Test # 3 was made. And if possible, I would like to know what would be the cause of failures in other test cases (# 5, # 6, # 9).

Pathfinder – What are the challenges of playing a Chaotic Evil character in a heroic party?

I have seen several issues similar to this one closed for their too great width, but it seems to me that this is a question quite often asked so that I will try to reduce the scope of application of so that it is both useful and useful.

As GM online in the past, several players have applied for my games with Chaotic Evil characters. I never accepted them. For all the reasons why a MJ running a heroic game would be wary of Chaotic Evil, I've recently begun to take a closer look at the lineup to see if I would be able to create a character capable of Chaotic. to work with a heroic party.

As far as I know, such a character (and not just for me) would need at least the following:

  • A mature player who understands that it's a team game
  • A reason for character to work with the party
  • The ability to grow as a character
  • A strong understanding of the differences between "Chaotic Evil" and "Chaotic Stupid"

I'd like to allow my players more freedom to choose their alignments in the future, but I can not guide them in creating and playing a Chaotic Evil character if I do not know which one kind of challenges they will face.

According to your experience, what challenges does a character who fulfills the above qualifications but who is still Chaotic Evil have to integrate into a heroic party, while still maintaining a Chaotic Evil alignment?

To clarify the type of answer I'm looking for, I'm not asking you whether the chaotic Evil could be integrated, or whether it should be, or what "chaotic Evil" means to you. Since all this is based on opinion, talk about your experience by playing your version of Chaotic Evil, playing with another person's version of Chaotic Evil or by organizing a heroic night with at least one character of Chaotic Evil.

Also, assume that any interpretation of what "chaotic evil" means is valid, assuming that it is reasonably south of "good" and "lawful". If the game was supposed to be mainly Lawful Evil, such experiences also work perfectly from this different angle. Specific examples of how the experience of playing, playing with or modifying the character have been good or could have been improved are not insignificant and close enough to be on the subject, but I would ask that they be anecdotes or useful examples instead of answers.

If so, your answer depends on the system in which your experience occurred, please identify the system. Otherwise, I expect that most of the answers will be universal between Pathfinder and the different versions of Dungeons and Dragons, possibly among other games using this system of alignment.

What are the challenges ahead for SEO in 2019?

What are the challenges ahead for SEO in 2019?

Are skill challenges an official option or a homebrewed?

I am curious about the challenges in terms of skills and looking for official documentation on implementation, but I can not find anything. Are the skills at 5th homebrewed?

[ Politics ] Open question: McGahn challenges the subpoena to appear on the WH Trump order. More obstruction to justice?

Dear Don McGahn-
You have a chance to be a patriot. But you only have one chance. Tomorrow morning before the Judiciary Committee. Do not challenge the subpoena. Do not be more complicit with obstruction. Testify that Trump has obstructed justice.
Do it,
All rational Americans.

What challenges did you face as a technical manager?

I was offered the role. Would like to know the challenges you may have encountered in your career

What are the challenges with cognitive procedures step by step?

The title says it all 🙂 What are some of the challenges associated with cognitive step-by-step procedures? Some steps for which you have found challenges and have given you new ideas.

np hard – How to generate snowflakes from a fixed area as challenges for the FridgeIQ puzzle?

A friend introduced me to FridgeIQ and she planted an idea in my head.

FridgeIQ is a geometric cutting puzzle composed of 16 polygonal tiles, as shown in the terrible picture at the bottom of this article.

The tile shapes are based on a square grid with an occasional diagonal on one of the grid's fields. The total area of ​​all tiles is 40 grid units. Each tile is identified by a single letter.

The box contains a set of challenges, each giving a subset of the tiles and a shape to create. For example, a challenge is: "build a square using BDQSYJN tiles". What I did in this picture and I still have tiles that were not part of this particular challenge.

In addition to the standard challenges, my friend has introduced an additional set of target forms that are ultimately the goal of this issue. I have attached another photo showing one of them in solved state.

These additional challenges all use the complete mosaic game, so their total area is 40 units and they all exhibit quad mirror symmetry. Not everyone is as simple as the photo, some have a hole or holes, but they are all connected.

I'll call these forms "snowflakes" because they look somehow like decorative snowflakes cut out of folded paper to generate the symmetries. Especially those with holes.

I asked myself the following question: how many forms of this type, subject to these constraints, can actually be made from the given tiles?

Snowflakes per se, there is infinitely man. But I believe that all bound elements whose finite area consists of half-unit triangles must be finite. Properly huge, but finished. Solvents are a subset of these.

What would be a good algorithm to generate them? I do not expect that there is an effective way, and I do not believe that the universe has enough time to create them all. But I would like to find at least some new ones.

Bad photo of FridgeIQ tiles

Solved additional challenge

Here are some unfinished reflections up to now:

At first, I built a simple solver, which reproduces my manual solutions (and finds many alternative solutions). So, even if it would be terribly inefficient, I could just generate snowflake shapes at will and use my solver to check them.

I thought it would be enough to generate an eighth of the form, a half-quadrant, with a total area of ​​10 units. Symmetry provides the rest. Note that the solution does not have the same symmetry when taking into account individual mosaics, only when the complete form is taken into account.

To generate candidate forms, I could simply insert 20 triangles of half-units in the half-quadrant. Let's hope in a systematic way. Most of these arrangements will not be compact and insoluble enough. And without a good idea to eliminate them, their number is absolutely intractable.

Another approach is simply to generate combinations of tiles and to check their symmetry. Again, the algorithm should focus on symmetrical arrangements or explosive combinatorics means that I can never hope to find a single new provision.

Ideas? Keywords for searches and / or pointers in the literature are also appreciated.

Thank you so much.

Visual C ++ – The Challenges of 32-bit Migration in C ++ and 64-bit Java

No matter which set of directives or pointers to compile and run existing applications using the 32-bit Java version to bind native code in C ++ and Java, from Java9 (JDK9), only 64-bit versions Java will be available. Any way to migrate the JNI layer (32 bits) and C ++ code to a 64-bit architecture.

Note: Using compiling and running Visual Studio 2012 IDE code for C ++. Updated the configuration settings (linker properties, VC ++ directories, C / C ++ properties), in VC ++, to point to the 64-bit JDK version. This was compiled, but when debugging, which gives access violation errors when accessing embedded C ++ methods?

To share our current approach, we compile our code in VC ++ 2012, which is 32-bit. What we have done so far to check compatibility, is changed the platform from X86 to X64 in the IDE configuration manager. Is this a correct approach on our side to get a compiled version of 64-bit DLL ?. Indeed, writing 64-bit code on an existing system does not seem to be the viable option for the moment.