Where does the irrational hate of black people comes from?
The irrational hate of black people, also known as racism, is a deeply entrenched and complex issue with a long history. Racism has its roots in the systems of slavery and colonialism that have been used to exploit and oppress black people for centuries. These systems have perpetuated negative stereotypes and prejudices about black people, which have been used to justify discrimination and violence against them.
Racism is also fueled by power dynamics and social conditioning. Those who have held power and privilege in society have often used their influence to maintain their dominance over marginalized groups, including black people. This has led to the internalization of negative attitudes towards black people by those who have been socialized in a racist culture.
Racism is a deeply harmful and destructive force that has caused immense suffering and injustice throughout history. It is important to recognize and challenge racism in all its forms, and to work towards a more inclusive and equitable society for all people.
I am African-Canadian with 2 engineering degrees and ask myself that question all the time, but I don’t bother anymore because I believe strongly that I contribute more to the society, and I live a better life than most of those racists. They (I am referring to irrational racists against black people only) are just jealous of black people strength, athleticism and intelligence that they don’t expect them to have. The only way to overcome it is to not need them (racists or anyone else in power).
Work hard, read as much as possible, educate yourself , build assets (buy real estate or valuable stocks) and make sure your kids are educated and of top of that let’s create and own our businesses and lands. Last, but not least, always be strong mentally and physically to scare them (racists one only) even more.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
When racists avoid to sit near you in the bus or train, use it at your advantage and enjoy the empty sit near you.
When racists refrain to speak to you, ignore them too, and listen to your radio on your headphone or read your book; always love yourself and make sure to keep your family together.
Our kids need both parents and strong family values. We are blessed with physical strength, spontaneity, good health and toughness and racists will kill us for it if they have their way.
I am a software engineer like you and by my second year I started feeling the unhealthy behavior of sitting down and coding for long hours.
Exercise regularly: Exercise can help you maintain physical and mental health. Engaging in regular physical activity can help you reduce stress, improve your sleep, and boost your mood.
Eat a healthy diet: A healthy diet can help you maintain your energy levels and focus. Make sure to eat a variety of fruits, vegetables, and whole grains, and limit your intake of processed and sugary foods.
Get enough sleep: Adequate sleep is important for maintaining physical and mental health. Aim for 7-9 hours of sleep per night.
Take breaks: It is important to take breaks from your work to avoid burnout. Step away from your computer, stretch, and take some time to relax.
Stay hydrated: Drink plenty of water to stay hydrated and maintain your energy levels.
Manage stress: Chronic stress can have negative impacts on your physical and mental health. Find healthy ways to manage stress, such as through exercise, meditation, or talking to a therapist.
Practice good posture: Poor posture can lead to muscle strain and fatigue. Make sure to sit up straight, with your feet flat on the ground and your elbows bent at a 90-degree angle.
By following these tips, you can maintain your physical and mental health as a software engineer.
Below are the steps that I took:
Avoid sitting down for more than 1 hour without getting up for a walk.
Stand up for 15 minutes every hour to code.
Take multiple short walks outdoor during working hours.
Avoid elevators unless you have no choice, use the stairs to go up and down if your office floor is lower than the 5th floor.
Avoid drinking sweet drinks or too much coffee during work hours.
Avoid eating chips or almost anything while working.
Instead of spending long hours reading manuals and documents on your computer, print them out, then take a walk and read them somewhere quiet while standing.
Stretch often while working (extend your legs, arms, rotate your neck).
Take short breaks of 2 to 5 minutes every 2 hours to read something different from your main topic. It can be news, sports, entertainment, or anything else you like. I read or write on Quora during my breaks.
Change your position frequently and don’t hesitate to stand up at your desk from time to time while working.
Make sure that your chair is always comfortable. Don’t hesitate to upgrade or get a better chair if necessary.
Here are the steps that I took to stay active and healthy:
I am committed, no matter what, to playing at least 2 competitive games of soccer or basketball a week, either in an amateur team league or at drop-in sports leagues. Check out one of my drop in league chapter in your city at ShowUpAndPlaySports chapters – Djamga – ShowUpAndPlaySports
I volunteer to organize soccer and basketball games every week via Home – Djamga – ShowUpAndPlaySports
I walk regularly at lunch time, and try to get as much sunshine as possible.
I visit a chiropractor once a month to adjust my back and neck.
I visit a certified massage therapist regularly to work on my neck, back, hamstrings, and feet.
I visit a pedicure clinic once a month for a good pedicure and foot massage.
I eat a healthy diet of mostly vegetables and fish (mostly salmon).
I drastically reduced the carbs in my diet. Every morning, I take one cup of coffee or tea with no sugar or milk and a small cake. Then, I am covered until dinner time. In the evening, I have a large meal of vegetables and fish, usually salmon.
I drink plenty of water.
I don’t drink alcohol or smoke.
It is very important to sleep well; sleep at least 6 hours per day. You spend about 25% of your life in your bed, there you need to invest on your mattresses, pillows, bed furnitures and upgrade them regularly.
After adopting these habits, my efficiency came back. I was able to work as hard as when I was a student . I even lost weight!
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
Now, I can go toe-to-toe with young players and students in their twenties on the soccer field. I easily work more than 60 hours per week and still have enough time to play with my kids and enjoy a fulfilling life with my family.
I highly recommend these life-changing habits to all IT professionals and engineers so they can remain healthy and effective as they get older and busier.
Using the rev command: The rev command is a utility that reverses the lines of a file or the characters in a string. To reverse a string, you can use the echo command to pass the string to rev:
echo"string" | rev
Using the sed command: The sed command is a powerful utility that can perform various text transformations. To reverse a string, you can use the sed command with the -r option and the 's/.*(.)/\1/g' expression:
echo"string" | sed -r 's/.*(.)/\1/g'
Using the awk command: The awk command is a programming language that is used for text processing. To reverse a string, you can use the awk command with the {print} action:
echo"string" | awk '{print $1}'
On Windows:
Using the powershell command: The powershell command is a shell that provides a command-line interface for Windows. To reverse a string, you can use the powershell command with the -C option and the '[System.Text.Encoding]::Unicode.GetString([System.Text.Encoding]::Unicode.GetBytes("string"))' expression:
Using the cmd command: The cmd command is the command-line interpreter for Windows. To reverse a string, you can use the cmd command with the for loop:
cmd /c "for /L %i in (1,1,%len%) do @echo !string:~%len%-%i,1!"
These are some ways to reverse a string on Linux and Windows. There are other ways to achieve this, using different utilities or programming languages.
Via shell script on Linux
sh-3.2# vi reverse.sh #### Start Script ##### #!/bin/bash input_string=”$1″ reverse_string=””
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
input_string_length=${#input_string} for (( i=$input_string_length-1; i>=0; i– )) do reverse_string=”$reverse_string${input_string:$i:1}” done
::—————- :: Calc Var Length ::—————- :: %*=Str to Check :: Returns %Len% :: ————— :StrLen %* set Data=%* for /L %%a in (0,1,80) do ( set Char=!Data:~%%a,1! if not “!Char!”==”” ( set /a Len=%%a+1 ) else (exit /b) ) exit /b
::————— :: Reverse String ::————— :: %* Str to Reverse :: Returns %Reverse% ::—————— :ReverseStr %* set Data=%* call :StrLen %Data% for /L %%a in (!Len!,-1,0) do ( set Char=!Data:~%%a,1! set Reverse=!Reverse!!Char! ) exit /b
Definition: jQuery is a lightweight, “write less, do more”, JavaScript library. jQuery is a cross-platform JavaScript library designed to simplify the client-side scripting of HTML.
Purpose The purpose of jQuery is to make it much easier to use JavaScript on your website. jQuery’s syntax is designed to make it easier to navigate a document, select DOM elements, create animations, handle events, and develop Ajax applications jQuery also simplifies a lot of the complicated things from JavaScript, like AJAX calls and DOM manipulation.
What is in it The jQuery library contains the following features:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
HTML/DOM manipulation
CSS manipulation
HTML event methods
Effects and animations
AJAX
Utilities
Advantages: The modular approach to the jQuery library allows the creation of powerful dynamic web pages and web applications. jQuery has plugins for almost any task out there.
jQuery Syntax: The jQuery syntax is tailor made for selecting HTML elements and performing some action on the element(s).
Basic syntax is: $(selector).action()
A $ sign to define/access jQuery
A (selector) to “query (or find)” HTML elements
A jQuery action() to be performed on the element(s)
JSON is a lightweight text-based open standard designed for human-readable data. It is the most widely used format for exchanging data on the web. It originates from the JavaScript language and is represented with two primary data structures: ordered lists (recognized as ‘arrays’) and name/value pairs (recognized as ‘objects’).
Why JSON?
The JSON standard is language-independent and its data structures, arrays and objects, are universally recognized. These structures are supported in some way by nearly all modern programming languages and are familiar to nearly all programmers. These qualities make it an ideal format for data interchange on the web.
JSON vs XML
The XML specification does not match the data model for most programming languages which makes it slow and tedious for programmers to parse. Compared to JSON, XML has a low data-to-markup ratio which results in it being more difficult for humans to read and write.
JSON Data Types
Number{ “myNum”: 123.456 } A series of numbers; decimals ok; double-precision floating-point format.
String{ “myString”: “abcdef” } A series of characters (letters, numbers, or symbols); double-quoted UTF-8 with backslash escaping.
Boolean{ “myBool”: true } True or false.
Array{ “myArray”: [ “a”, “b”, “c”, “d” ] } Sequence of comma-separated values (any data type); enclosed in square brackets.
Object{ “myObject”: { “id”: 7 } }; Unordered collection of comma-separated key/value pairs; enclosed in curly braces; properties (keys) are distinct strings.
Null{ “myNull”: null } Variable with null (empty) value.
Unsupported Data Types
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
Undefinedvar myUndefined; Variable with no value assigned.
Datevar myDate = new Date(); Object used to work with dates and times.
Errorvar myError = new Error(); Object containing information about errors.
Regular Expressionvar myRegEx = /json/i; Variable containing a sequence of characters that form a search pattern.
Functionvar myFunction = function(){}; Variable containing a block of code designed to perform a particular task.
The Windows boot process involves several stages, in which the operating system performs various tasks to prepare the system for use.
The BIOS (Basic Input/Output System) runs a power-on self-test (POST) to check the system’s hardware components and to load the bootstrap program.
The bootstrap program, also known as the boot loader, is responsible for loading the operating system kernel and transferring control to it. In Windows, the boot loader is called the bootmgr.
The operating system kernel, which is the core of the operating system, initializes the system and starts the system services.
The system services, such as the device drivers, are loaded and initialized.
The operating system loads the user profile and starts the user interface, such as the desktop or the login screen.
The user can log in and start using the system.
This is a general overview of the Windows boot process. The exact sequence of events may vary depending on the specific version of Windows and the hardware configuration of the system.
Power is turned on.
The first process starting when you turn on your computer is BIOS i.e, Basic Input Output System. BIOS has two functions, to conduct POST and read MBR.
POST – POST stands for Power On Self Test. POST checks all the hardware devices connected to a computer like RAM, hard disk etc and make sure that the system can run smoothly with those hardware devices. If the POST is a failure the system halts with a beep sound.
Now BIOS checks the boot priority. We can set the boot priority as CD drive, hard disk or floppy drive
MBR – The next duty of BIOS is to read the MBR. MBR stands for Master Boot Record and its the first sector on a hard disk. MBR contains the partition table and boot loader.
Functions of Boot loader Now BIOS has passed the control to boot loader and boot loader is a small program which loads kernel to computers memory. Actually there are two stages of boot loaders, stage 1 boot loader and stage 2 boot loader. MBR contains the stage 1 boot loader and stage 1 boot loader is a link to the stage 2 boot loader. The stage 2 boot loader resides in the boot partition and it loads the kernel to memory.
Boot files and functions There are three boot files in a Windows operating system and they are NTLDR, NTDETECT.COM and Boot.ini. The boot files are found in the active partition of hard disk and its normally C drive in a Windows machine.
NTLDR – NTLDR stands for NT Loader and its the second stage bootloader. The path of NTLDR is C:\Windows\i386\NTLDR.
Boot.ini – Boot.ini contains the configuration files of NTLDR. When the operating system is loaded we cannot pass any arguments to kernel, so those arguments are passed through boot.ini. You can edit boot.ini by opening through notepad. The path of Boot.ini is C:\boot.ini.
NTDETECT.COM – This file detect hardware’s and passes information to NTLDR. Using the collected information the NTLDR creates a hardware key and this key is used to detect hardware’s. A new hardware key is generated after each reboot of the operating system and that’s why system asks to reboot after installation of a new hardware. The hardware keys created by NTLDR can be found in Windows registry at HKEY_LOCAL_MACHINE -> HARDWARES.
Kernel and its functions After executing the functions of boot files the control is passed to Kernel. ntoskrnal.exe is the kernel file in a Windows machine and its path is C:\Windows\system 32\ntoskrnal.exe. Kernel acts as a layer between software and hardware. The library file hal.dll (C;\Windows\system32\hal.dll) helps Kernel to interact with hardware’s. HAL stands for Hardware Abstraction Layer and this hal.dll file is machine specific. Now the drivers for hardware’s are loaded from the file C:\Windows\system32\config\system and the Kernel is loaded to primary memory.
Services and log in procedure When kernel is loaded in the primary memory services for each process is started and the registry entry for those services can be found at HKEY_LOCAL_MACHINE – System – Current control set – Services. Winlogon.exe (C:\Windows\system32\winlogon.exe) is the last service started during this process. Winlogon.exe starts the log in procedures of windows machine. It first calls the library file msgina.dll (C:\Windows\system32\msgina.dll). MSGINA stands for Microsoft Graphics Identification and Authentication and it provides the log in window. Now msginal.dll passes the control to LSA (Local Security Authority), it verifies the username and password from the SAM file. SAM (Security Accounts Manager) contains the information about all users created in a Windows operating system. Now the booting procedure is over and we have reached the desktop of Windows operating system.
The Mac OS X boot process involves several stages, in which the operating system performs various tasks to prepare the system for use.
When the Mac is powered on, the firmware (a low-level software that controls the hardware) performs a power-on self-test (POST) to check the hardware components.
The firmware loads the bootloader, which is responsible for loading the operating system kernel and transferring control to it. In Mac OS X, the bootloader is called the boot.efi file.
The operating system kernel, which is the core of the operating system, initializes the system and starts the system services.
The system services, such as the device drivers, are loaded and initialized.
The operating system loads the user profile and starts the user interface, such as the desktop or the login screen.
The user can log in and start using the system.
This is a general overview of the Mac OS X boot process. The exact sequence of events may vary depending on the specific version of Mac OS X and the hardware configuration of the system.
Boot ROM
Firmware. Part of Hardware system BootROM firmware is activated
POST
Power-On Self Test initializes some hardware interfaces and verifies that sufficient memory is available and in a good state.
EFI
Extensible Firmware Interface EFI does basic hardware initialization and selects which operating system to use.
BOOTX
boot.efi boot loader load the kernel environment
Rooting/Kernel
The init routine of the kernel is executed boot loader starts the kernel’s initialization procedure Various Mach/BSD data structures are initialized by the kernel. The I/O Kit is initialized. The kernel starts /sbin/mach_init
Run Level
mach_init starts /sbin/init init determines the runlevel, and runs /etc/rc.boot, which sets up the machine enough to run single-user. rc.boot figures out the type of boot (Multi-User, Safe, CD-ROM, Network etc.)
Power is turned on.
Open Firmware code is executed.
Hardware information is collected and hardware is initialized.
Something (usually the OS, but also things like the Apple Hardware Test, etc.) is selected to boot. The user may be prompted to select what to boot.
Control passes to /System/Library/CoreServices/BootX, the boot loader. BootX loads the kernel and also draws the OS badges, if any.
BootX tries to load a previously cached list of device drivers (created/updated by /usr/sbin/kextcache). Such a cache is of the type mkext and contains the info dictionaries and binary files for multiple kernel extensions. Note that if the mkext cache is corrupt or missing, BootX would look in /System/Library/Extensions for extensions that are needed in the current scenario (as determined by the value of the OSBundleRequired property in the Info.plist file of the extension’s bundle.
The init routine of the kernel is executed. The root device of the booting system is determined. At this point, Open Firmware is not accessible any more.
Various Mach/BSD data structures are initialized by the kernel.
The I/O Kit is initialized.
The kernel starts /sbin/mach_init, the Mach service naming (bootstrap) daemon. mach_init maintains mappings between service names and the Mach ports that provide access to those services.
From here on, the startup becomes user-level:
mach_init starts /sbin/init, the traditional BSD init process. init determines the runlevel, and runs /etc/rc.boot, which sets up the machine enough to run single-user.
rc.boot figures out the type of boot (Multi-User, Safe, CD-ROM, Network etc.). In case of a network boot (the sysctl variable kern.netboot will be set to 1 in which case), it runs /etc/rc.netboot with a start argument.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
The Linux boot process involves several stages, in which the operating system performs various tasks to prepare the system for use.
When the system is powered on, the BIOS (Basic Input/Output System) or the UEFI (Unified Extensible Firmware Interface) performs a power-on self-test (POST) to check the hardware components and to load the bootloader.
The bootloader, such as GRUB (GRand Unified Bootloader), is responsible for loading the operating system kernel and transferring control to it.
The operating system kernel, which is the core of the operating system, initializes the system and starts the system services.
The system services, such as the device drivers, are loaded and initialized.
The operating system loads the user profile and starts the user interface, such as the desktop or the login screen.
The user can log in and start using the system.
This is a general overview of the Linux boot process. The exact sequence of events may vary depending on the specific distribution of Linux and the hardware configuration of the system.
BIOS
Basic INPUT/OUTPUT System. Executes MBR
MBR
Master Boot Record Executes GRUB
GRUB
Grand Unified Bootloader Executes kernel
KERNEL
Kernel Executes /sbin/init
INIT
Init Executes Run level programs
Run Level
Run Level Programs are executed from /etc/rc.d/rc*.d/
As power comes up the BIOS is given control
BIOS runs self tests, usually including cursory memory tests.
The BIOS then loads the first sector of the disk to be used for booting and transfers control to it.
The MBR code varies. One version will chain to the code in the first sector of the boot partition (Windows), another will load a bootloader. Windows boot proceeds from code and information in the boot partition.
The bootloader chooses kernel location and version
The bootloader prepares kernel and initrd image in memory, transfers control to kernel
Loading kernel modules
Discovering hardware and load additional kernel modules to support it
Looking for disks
R/O mount of / partition so that it can potentially be checked and repaired
init process spawn
/etc/inittab read and executing
Mounting all FSes from /etc/fstab
runlevels running (based on default runlevel in /etc/inittab) or another init method such as systemd or upstart
The result is a compressed file named sysdiagnose_YYYY.MM.DD_HH-MM-SS-TTTT.tar.gz and it contains the following: Accessibility BluetoothTraceFile.pklg DiagnosticMessages Etienne’s SystemConfiguration airport_info.txt apsd-status.txt bc_stats.txt bootstamps.txt brctl.tar.gz breadcrumbs.txt crashes_and_spins darwinup.txt dig-results.txt disks.txt diskutil.txt error_log.txt filecoordination_dump.txt footprint-all.txt fs_usage.txt fsck_hfs_user.log fsck_hfs_var.log gpt.txt ifconfig.txt ioreg ipconfig.txt kextstat.txt launchctl-list.txt locale.txt logs lsappinfo.txt lsmp.txt lsof.txt lsregister.txt microstackshots microstackshots_lastday.txt microstackshots_lasthour.txt microstackshots_lastminute.txt mount.txt netstat nfsstat.txt odutil.txt pluginkit.txt pmset_everything.txt powermetrics.txt ps.txt ps_thread.txt reachability-info.txt resolv.conf scutil.txt smcDiagnose.txt spindump.txt stackshot-last-sym.log sysctl.txt sysdiagnose.log system_profiler.spx talagent.txt taskinfo.txt thermal.txt top.txt var_run_resolv.conf vm_stat.txt zprint.txt
You can use the top command to monitor the resources of your Macbook in real-time. The top command is a built-in utility that shows the processes that are currently running on the system, along with information about their CPU and memory usage.
To use the top command, open a terminal window and type top. The output will show the list of processes, sorted by their CPU usage, with the most CPU-intensive processes at the top. You can use the q key to exit the top command.
Here are some of the key options you can use with the top command:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6 Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
-o: sort the processes by a particular resource, such as CPU usage or memory usage. For example, top -o cpu will sort the processes by CPU usage.
-s: specify the delay between updates. For example, top -s 2 will update the display every 2 seconds.
-u: show the process for a particular user. For example, top -u username will show the processes for the user with the specified username.
You can use these options in combination to customize the output of the top command. For example, to monitor the CPU usage of the processes owned by a particular user, you can use the following command:
Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.
Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.