url
stringlengths
11
2.25k
text
stringlengths
88
50k
ts
timestamp[s]date
2026-01-13 08:47:33
2026-01-13 09:30:40
https://parenting.forem.com/jess/we-started-a-new-routine-called-highs-and-lows-to-get-our-kids-to-open-up-more-3dd8#comments
We started a new routine called 'highs and lows' to get our kids to open up more! - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse Jess Lee Posted on Oct 22, 2025           We started a new routine called 'highs and lows' to get our kids to open up more! # discuss My two kids are quite different. The younger one is our chatterbox while the older one barely shares a thing. "How was school? Fine." "What did you do today? I don't remember." At 'circle time' in school, every kid is supposed to go around sharing one thing that makes their heart happy. My kid has 'passed' every.single.time. for over a year! Needless to say, this has been a delicate balance in our household of trying to get more but not be pushy about it so we create a safe space. Well, we had a breakthrough over the weekend! Highs and Lows We hosted friends for a few nights and got to witness one of their family rituals - "highs and lows" . Every night, this family shares one high and one low they experienced during the day. Usually done over dinner but if they can't all be present, right before bed time. I think one of the keys is that everyone is involved. Level the playing field. They invited us to do it with them one night and I was sure my kid would pass as she scrambled to hide behind my partner and look away from everyone waiting for a response. To my utter shock, she participated! Enthusiastically. New Daily Routine My partner and I were shocked, and decided this was something we would need to try again. And we have, and it's worked! She will thoughtfully reflect on her day and pull out something that made her happy, and something she was less than pleased about. It's not a super long conversation but it feels special that it's coming honestly from her as opposed to a response to some sort of interrogation by us. I'm hoping this can be a new daily routine...forever? If we can bake it in as just how our family functions , I hope we can hold it through the teenage years and beyond. Anyway, just wanted to share! I know there are a million tricks out there so this is just one of many you could try if you have a quiet kid too. Top comments (2) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Collapse Expand   Joanna Duffey Joanna Duffey Joanna Duffey Follow Joined Oct 20, 2025 • Oct 22 '25 Dropdown menu Copy link Hide We do something similar in our house, and I have to say, it’s become a family favorite. Some days it’s not very fruitful, but other days my son really opens up. What’s even more interesting is watching him ask questions about the highs or lows my husband and I mention. I’ve also come to realize that most days are filled with many more high than lows :) Like comment: Like comment: 4  likes Like Comment button Reply Collapse Expand   Matt Figler Matt Figler Matt Figler Follow Joined Jun 22, 2017 • Oct 22 '25 • Edited on Oct 23 • Edited Dropdown menu Copy link Hide This has shifted the paradigm of sharing feelings with our family, can confirm! Like comment: Like comment: 2  likes Like Comment button Reply Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse Jess Lee Follow Building DEV and Forem with everyone here. Interested in the future. Location USA / TAIWAN Pronouns she/they Work Co-Founder & COO at Forem Joined Jul 29, 2016 More from Jess Lee This...has not worked the last three nights 😒 # discuss International Travel with Toddlers: Car Seat (or vest!) Considerations # travel # gear How do you think about screen time and technology? # technology # discuss 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://docs.python.org/3/tutorial/introduction.html#id3
3. An Informal Introduction to Python — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | 3. An Informal Introduction to Python ¶ In the following examples, input and output are distinguished by the presence or absence of prompts ( >>> and … ): to repeat the example, you must type everything after the prompt, when the prompt appears; lines that do not begin with a prompt are output from the interpreter. Note that a secondary prompt on a line by itself in an example means you must type a blank line; this is used to end a multi-line command. You can use the “Copy” button (it appears in the upper-right corner when hovering over or tapping a code example), which strips prompts and omits output, to copy and paste the input lines into your interpreter. Many of the examples in this manual, even those entered at the interactive prompt, include comments. Comments in Python start with the hash character, # , and extend to the end of the physical line. A comment may appear at the start of a line or following whitespace or code, but not within a string literal. A hash character within a string literal is just a hash character. Since comments are to clarify code and are not interpreted by Python, they may be omitted when typing in examples. Some examples: # this is the first comment spam = 1 # and this is the second comment # ... and now a third! text = "# This is not a comment because it's inside quotes." 3.1. Using Python as a Calculator ¶ Let’s try some simple Python commands. Start the interpreter and wait for the primary prompt, >>> . (It shouldn’t take long.) 3.1.1. Numbers ¶ The interpreter acts as a simple calculator: you can type an expression into it and it will write the value. Expression syntax is straightforward: the operators + , - , * and / can be used to perform arithmetic; parentheses ( () ) can be used for grouping. For example: >>> 2 + 2 4 >>> 50 - 5 * 6 20 >>> ( 50 - 5 * 6 ) / 4 5.0 >>> 8 / 5 # division always returns a floating-point number 1.6 The integer numbers (e.g. 2 , 4 , 20 ) have type int , the ones with a fractional part (e.g. 5.0 , 1.6 ) have type float . We will see more about numeric types later in the tutorial. Division ( / ) always returns a float. To do floor division and get an integer result you can use the // operator; to calculate the remainder you can use % : >>> 17 / 3 # classic division returns a float 5.666666666666667 >>> >>> 17 // 3 # floor division discards the fractional part 5 >>> 17 % 3 # the % operator returns the remainder of the division 2 >>> 5 * 3 + 2 # floored quotient * divisor + remainder 17 With Python, it is possible to use the ** operator to calculate powers [ 1 ] : >>> 5 ** 2 # 5 squared 25 >>> 2 ** 7 # 2 to the power of 7 128 The equal sign ( = ) is used to assign a value to a variable. Afterwards, no result is displayed before the next interactive prompt: >>> width = 20 >>> height = 5 * 9 >>> width * height 900 If a variable is not “defined” (assigned a value), trying to use it will give you an error: >>> n # try to access an undefined variable Traceback (most recent call last): File "<stdin>" , line 1 , in <module> NameError : name 'n' is not defined There is full support for floating point; operators with mixed type operands convert the integer operand to floating point: >>> 4 * 3.75 - 1 14.0 In interactive mode, the last printed expression is assigned to the variable _ . This means that when you are using Python as a desk calculator, it is somewhat easier to continue calculations, for example: >>> tax = 12.5 / 100 >>> price = 100.50 >>> price * tax 12.5625 >>> price + _ 113.0625 >>> round ( _ , 2 ) 113.06 This variable should be treated as read-only by the user. Don’t explicitly assign a value to it — you would create an independent local variable with the same name masking the built-in variable with its magic behavior. In addition to int and float , Python supports other types of numbers, such as Decimal and Fraction . Python also has built-in support for complex numbers , and uses the j or J suffix to indicate the imaginary part (e.g. 3+5j ). 3.1.2. Text ¶ Python can manipulate text (represented by type str , so-called “strings”) as well as numbers. This includes characters “ ! ”, words “ rabbit ”, names “ Paris ”, sentences “ Got your back. ”, etc. “ Yay! :) ”. They can be enclosed in single quotes ( '...' ) or double quotes ( "..." ) with the same result [ 2 ] . >>> 'spam eggs' # single quotes 'spam eggs' >>> "Paris rabbit got your back :)! Yay!" # double quotes 'Paris rabbit got your back :)! Yay!' >>> '1975' # digits and numerals enclosed in quotes are also strings '1975' To quote a quote, we need to “escape” it, by preceding it with \ . Alternatively, we can use the other type of quotation marks: >>> 'doesn \' t' # use \' to escape the single quote... "doesn't" >>> "doesn't" # ...or use double quotes instead "doesn't" >>> '"Yes," they said.' '"Yes," they said.' >>> " \" Yes, \" they said." '"Yes," they said.' >>> '"Isn \' t," they said.' '"Isn\'t," they said.' In the Python shell, the string definition and output string can look different. The print() function produces a more readable output, by omitting the enclosing quotes and by printing escaped and special characters: >>> s = 'First line. \n Second line.' # \n means newline >>> s # without print(), special characters are included in the string 'First line.\nSecond line.' >>> print ( s ) # with print(), special characters are interpreted, so \n produces new line First line. Second line. If you don’t want characters prefaced by \ to be interpreted as special characters, you can use raw strings by adding an r before the first quote: >>> print ( 'C:\some \n ame' ) # here \n means newline! C:\some ame >>> print ( r 'C:\some\name' ) # note the r before the quote C:\some\name There is one subtle aspect to raw strings: a raw string may not end in an odd number of \ characters; see the FAQ entry for more information and workarounds. String literals can span multiple lines. One way is using triple-quotes: """...""" or '''...''' . End-of-line characters are automatically included in the string, but it’s possible to prevent this by adding a \ at the end of the line. In the following example, the initial newline is not included: >>> print ( """ \ ... Usage: thingy [OPTIONS] ... -h Display this usage message ... -H hostname Hostname to connect to ... """ ) Usage: thingy [OPTIONS] -h Display this usage message -H hostname Hostname to connect to >>> Strings can be concatenated (glued together) with the + operator, and repeated with * : >>> # 3 times 'un', followed by 'ium' >>> 3 * 'un' + 'ium' 'unununium' Two or more string literals (i.e. the ones enclosed between quotes) next to each other are automatically concatenated. >>> 'Py' 'thon' 'Python' This feature is particularly useful when you want to break long strings: >>> text = ( 'Put several strings within parentheses ' ... 'to have them joined together.' ) >>> text 'Put several strings within parentheses to have them joined together.' This only works with two literals though, not with variables or expressions: >>> prefix = 'Py' >>> prefix 'thon' # can't concatenate a variable and a string literal File "<stdin>" , line 1 prefix 'thon' ^^^^^^ SyntaxError : invalid syntax >>> ( 'un' * 3 ) 'ium' File "<stdin>" , line 1 ( 'un' * 3 ) 'ium' ^^^^^ SyntaxError : invalid syntax If you want to concatenate variables or a variable and a literal, use + : >>> prefix + 'thon' 'Python' Strings can be indexed (subscripted), with the first character having index 0. There is no separate character type; a character is simply a string of size one: >>> word = 'Python' >>> word [ 0 ] # character in position 0 'P' >>> word [ 5 ] # character in position 5 'n' Indices may also be negative numbers, to start counting from the right: >>> word [ - 1 ] # last character 'n' >>> word [ - 2 ] # second-last character 'o' >>> word [ - 6 ] 'P' Note that since -0 is the same as 0, negative indices start from -1. In addition to indexing, slicing is also supported. While indexing is used to obtain individual characters, slicing allows you to obtain a substring: >>> word [ 0 : 2 ] # characters from position 0 (included) to 2 (excluded) 'Py' >>> word [ 2 : 5 ] # characters from position 2 (included) to 5 (excluded) 'tho' Slice indices have useful defaults; an omitted first index defaults to zero, an omitted second index defaults to the size of the string being sliced. >>> word [: 2 ] # character from the beginning to position 2 (excluded) 'Py' >>> word [ 4 :] # characters from position 4 (included) to the end 'on' >>> word [ - 2 :] # characters from the second-last (included) to the end 'on' Note how the start is always included, and the end always excluded. This makes sure that s[:i] + s[i:] is always equal to s : >>> word [: 2 ] + word [ 2 :] 'Python' >>> word [: 4 ] + word [ 4 :] 'Python' One way to remember how slices work is to think of the indices as pointing between characters, with the left edge of the first character numbered 0. Then the right edge of the last character of a string of n characters has index n , for example: +---+---+---+---+---+---+ | P | y | t | h | o | n | +---+---+---+---+---+---+ 0 1 2 3 4 5 6 - 6 - 5 - 4 - 3 - 2 - 1 The first row of numbers gives the position of the indices 0…6 in the string; the second row gives the corresponding negative indices. The slice from i to j consists of all characters between the edges labeled i and j , respectively. For non-negative indices, the length of a slice is the difference of the indices, if both are within bounds. For example, the length of word[1:3] is 2. Attempting to use an index that is too large will result in an error: >>> word [ 42 ] # the word only has 6 characters Traceback (most recent call last): File "<stdin>" , line 1 , in <module> IndexError : string index out of range However, out of range slice indexes are handled gracefully when used for slicing: >>> word [ 4 : 42 ] 'on' >>> word [ 42 :] '' Python strings cannot be changed — they are immutable . Therefore, assigning to an indexed position in the string results in an error: >>> word [ 0 ] = 'J' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment >>> word [ 2 :] = 'py' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment If you need a different string, you should create a new one: >>> 'J' + word [ 1 :] 'Jython' >>> word [: 2 ] + 'py' 'Pypy' The built-in function len() returns the length of a string: >>> s = 'supercalifragilisticexpialidocious' >>> len ( s ) 34 See also Text Sequence Type — str Strings are examples of sequence types , and support the common operations supported by such types. String Methods Strings support a large number of methods for basic transformations and searching. f-strings String literals that have embedded expressions. Format String Syntax Information about string formatting with str.format() . printf-style String Formatting The old formatting operations invoked when strings are the left operand of the % operator are described in more detail here. 3.1.3. Lists ¶ Python knows a number of compound data types, used to group together other values. The most versatile is the list , which can be written as a list of comma-separated values (items) between square brackets. Lists might contain items of different types, but usually the items all have the same type. >>> squares = [ 1 , 4 , 9 , 16 , 25 ] >>> squares [1, 4, 9, 16, 25] Like strings (and all other built-in sequence types), lists can be indexed and sliced: >>> squares [ 0 ] # indexing returns the item 1 >>> squares [ - 1 ] 25 >>> squares [ - 3 :] # slicing returns a new list [9, 16, 25] Lists also support operations like concatenation: >>> squares + [ 36 , 49 , 64 , 81 , 100 ] [1, 4, 9, 16, 25, 36, 49, 64, 81, 100] Unlike strings, which are immutable , lists are a mutable type, i.e. it is possible to change their content: >>> cubes = [ 1 , 8 , 27 , 65 , 125 ] # something's wrong here >>> 4 ** 3 # the cube of 4 is 64, not 65! 64 >>> cubes [ 3 ] = 64 # replace the wrong value >>> cubes [1, 8, 27, 64, 125] You can also add new items at the end of the list, by using the list.append() method (we will see more about methods later): >>> cubes . append ( 216 ) # add the cube of 6 >>> cubes . append ( 7 ** 3 ) # and the cube of 7 >>> cubes [1, 8, 27, 64, 125, 216, 343] Simple assignment in Python never copies data. When you assign a list to a variable, the variable refers to the existing list . Any changes you make to the list through one variable will be seen through all other variables that refer to it.: >>> rgb = [ "Red" , "Green" , "Blue" ] >>> rgba = rgb >>> id ( rgb ) == id ( rgba ) # they reference the same object True >>> rgba . append ( "Alph" ) >>> rgb ["Red", "Green", "Blue", "Alph"] All slice operations return a new list containing the requested elements. This means that the following slice returns a shallow copy of the list: >>> correct_rgba = rgba [:] >>> correct_rgba [ - 1 ] = "Alpha" >>> correct_rgba ["Red", "Green", "Blue", "Alpha"] >>> rgba ["Red", "Green", "Blue", "Alph"] Assignment to slices is also possible, and this can even change the size of the list or clear it entirely: >>> letters = [ 'a' , 'b' , 'c' , 'd' , 'e' , 'f' , 'g' ] >>> letters ['a', 'b', 'c', 'd', 'e', 'f', 'g'] >>> # replace some values >>> letters [ 2 : 5 ] = [ 'C' , 'D' , 'E' ] >>> letters ['a', 'b', 'C', 'D', 'E', 'f', 'g'] >>> # now remove them >>> letters [ 2 : 5 ] = [] >>> letters ['a', 'b', 'f', 'g'] >>> # clear the list by replacing all the elements with an empty list >>> letters [:] = [] >>> letters [] The built-in function len() also applies to lists: >>> letters = [ 'a' , 'b' , 'c' , 'd' ] >>> len ( letters ) 4 It is possible to nest lists (create lists containing other lists), for example: >>> a = [ 'a' , 'b' , 'c' ] >>> n = [ 1 , 2 , 3 ] >>> x = [ a , n ] >>> x [['a', 'b', 'c'], [1, 2, 3]] >>> x [ 0 ] ['a', 'b', 'c'] >>> x [ 0 ][ 1 ] 'b' 3.2. First Steps Towards Programming ¶ Of course, we can use Python for more complicated tasks than adding two and two together. For instance, we can write an initial sub-sequence of the Fibonacci series as follows: >>> # Fibonacci series: >>> # the sum of two elements defines the next >>> a , b = 0 , 1 >>> while a < 10 : ... print ( a ) ... a , b = b , a + b ... 0 1 1 2 3 5 8 This example introduces several new features. The first line contains a multiple assignment : the variables a and b simultaneously get the new values 0 and 1. On the last line this is used again, demonstrating that the expressions on the right-hand side are all evaluated first before any of the assignments take place. The right-hand side expressions are evaluated from the left to the right. The while loop executes as long as the condition (here: a < 10 ) remains true. In Python, like in C, any non-zero integer value is true; zero is false. The condition may also be a string or list value, in fact any sequence; anything with a non-zero length is true, empty sequences are false. The test used in the example is a simple comparison. The standard comparison operators are written the same as in C: < (less than), > (greater than), == (equal to), <= (less than or equal to), >= (greater than or equal to) and != (not equal to). The body of the loop is indented : indentation is Python’s way of grouping statements. At the interactive prompt, you have to type a tab or space(s) for each indented line. In practice you will prepare more complicated input for Python with a text editor; all decent text editors have an auto-indent facility. When a compound statement is entered interactively, it must be followed by a blank line to indicate completion (since the parser cannot guess when you have typed the last line). Note that each line within a basic block must be indented by the same amount. The print() function writes the value of the argument(s) it is given. It differs from just writing the expression you want to write (as we did earlier in the calculator examples) in the way it handles multiple arguments, floating-point quantities, and strings. Strings are printed without quotes, and a space is inserted between items, so you can format things nicely, like this: >>> i = 256 * 256 >>> print ( 'The value of i is' , i ) The value of i is 65536 The keyword argument end can be used to avoid the newline after the output, or end the output with a different string: >>> a , b = 0 , 1 >>> while a < 1000 : ... print ( a , end = ',' ) ... a , b = b , a + b ... 0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987, Footnotes [ 1 ] Since ** has higher precedence than - , -3**2 will be interpreted as -(3**2) and thus result in -9 . To avoid this and get 9 , you can use (-3)**2 . [ 2 ] Unlike other languages, special characters such as \n have the same meaning with both single ( '...' ) and double ( "..." ) quotes. The only difference between the two is that within single quotes you don’t need to escape " (but you have to escape \' ) and vice versa. Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:39
https://legal.x.com/sk/purchaser-terms.html
Podmienky používania služby X pre kupujúcich Podmienky používania služby X pre kupujúcich Stiahnuť Podmienky používania služby X pre kupujúcich Podmienky používania platených služieb Dodatočné podmienky služby X Premium Dodatočné Predplatné podmienky Stiahnuť Podmienky používania služby X pre kupujúcich Podmienky používania služby X pre kupujúcich goglobalwithtwitterbanner Podmienky používania platených služieb Dodatočné podmienky služby X Premium Dodatočné podmienky používania predplatného tvorcu Dodatočné podmienky pre služby Premium pre firmy a Premium pre organizácie   Podmienky používania platených služieb Dodatočné podmienky služby X Premium Dodatočné podmienky používania predplatného tvorcu Dodatočné podmienky pre služby Premium pre firmy a Premium pre organizácie   Podmienky používania služby X pre kupujúcich Platnosť: 1. augusta 2025 Ak žijete mimo Európskej únie, štátov EZVO alebo Spojeného kráľovstva, vrátane toho, ak žijete v Spojených štátoch, vzťahujú sa na vás nasledujúce Podmienky používania služby X pre kupujúcich.   Ak žijete v Európskej únii, štátoch EZVO alebo Spojenom kráľovstve, vzťahujú sa na vás tieto Podmienky používania služby X pre kupujúcich.      Podmienky používania služby X pre kupujúcich Ak žijete mimo Európskej únie, štátov EZVO alebo Spojeného kráľovstva vrátane prípadu, že žijete v Spojených štátoch X vám umožňuje prístup k určitým funkciám výmenou za platbu jednorazového alebo opakovaného poplatku, ktorý sa vzťahuje na príslušné funkcie (každá „ Platená služba “ a spoločne " Platené služby "). Napríklad, služba X Premium (ako je definované nižšie) a predplatné by sa obe považovali za „Platenú službu“.  V rozsahu, v akom sa zaregistrujete a/alebo používate platenú službu, vaše používanie platených služieb a všetkých príslušných transakcií podlieha: (i) podmienkam používania stanoveným v tomto dokumente, vrátane platných podmienok pre každú platenú službu, ktorú si zakúpite, pričom všetky podmienky sú uvedené nižšie (súhrnne „ Podmienky používania služby X pre kupujúcich “) a (ii) platným podmienkam Podmienky používania služby X , Zásady ochrany súkromia služby X , Pravidlá a zásady služby X a všetky zásady v ňom zahrnuté (súhrnne „ Zmluva s používateľom služby X “). Tieto zmluvné podmienky pre nákupcu X a vyššie uvedená zmluva s používateľom X sa v tomto dokumente budú spoločne označovať ako „ Podmienky “. „ X “ označuje entitu X, ktorá vám poskytuje Platené služby. Pozorne si prečítajte tieto Podmienky používania služby X pre kupujúcich, aby ste sa uistili, že rozumiete platným podmienkam a výnimkám. AK ŽIJETE V SPOJENÝCH ŠTÁTOCH AMERICKÝCH, TIETO PODMIENKY OBSAHUJÚ DÔLEŽITÉ INFORMÁCIE, KTORÉ SA NA VÁS VZŤAHUJÚ O RIEŠENÍ SPOROV, VRÁTANE VZDANIA SA PRÁVA NA UPLATNENIE NÁROKOV AKO HROMADNÉ ŽALOBY A OBMEDZENIA VÁŠHO PRÁVA UPLATNIŤ NÁROKY VOČI SPOLOČNOSTI X VIAC AKO 2 ROKY PO VÝSKYTE PRÍSLUŠNÝCH UDALOSTÍ, KTORÉ OVPLYVŇUJÚ VAŠE PRÁVA A POVINNOSTI V PRÍPADE AKÉHOKOĽVEK SPORU SO SPOLOČNOSŤOU X. POZRI ODDIEL 6 PODROBNOSTI O TÝCHTO USTANOVENIACH PODĽA VŠEOBECNÝCH PODMIENOK. Prijatie . Používaním platenej služby alebo prístupom k platenej službe (plateným službám) od spoločnosti X, zadaním platby podľa tejto služby a/alebo kliknutím na tlačidlo na jednorazový nákup alebo opakované predplatné za platenú službu poskytovanú spoločnosťou X súhlasíte s tým, že budete viazaní podmienkami. Ak týmto Podmienkam nerozumiete alebo neakceptujete žiadnu ich časť, potom nesmiete používať žiadne platené služby ani k nim mať prístup. Ak si chcete zakúpiť a používať platenú službu, musíte: (i) mať aspoň 18 rokov alebo mať vek plnoletosti podľa právnych predpisov jurisdikcie, v ktorej žijete, alebo (ii) mať výslovný súhlas rodiča alebo opatrovníka s kúpou a používaním tejto platenej služby. Ak ste rodič alebo zákonný opatrovník a umožníte svojmu dieťaťu (alebo dieťaťu, ktorého ste zástupcom) kúpiť alebo používať platenú službu, súhlasíte s tým, že sa na vás vzťahujú podmienky, že budete dodržiavať podmienky a že ste zodpovední za aktivity dieťaťa v platených službách a za zabezpečenie toho, aby dieťa tiež dodržiavalo podmienky. V každom prípade, ako je uvedené v časti Who May Use the Services (Kto môže používať služby) v Podmienkach používania služby X, ak chcete používať službu X, musíte mať aspoň 13 rokov. Ak prijímate tieto Podmienky používania služby X pre kupujúcich a používate platené služby v mene spoločnosti, organizácie, vlády alebo inej právnickej osoby, vyhlasujete a zaručujete, že ste na to oprávnení a máte právomoc zaviazať takúto osobu týmito Podmienkami služby X pre kupujúcich, pričom v takom prípade sa slová „vy“ a „váš“ použité v týchto Podmienkach používania služby X pre kupujúcich vzťahujú na takúto osobu. X Zmluvný subjekt . Tieto Podmienky používania služby X pre kupujúcich uzatvárate so subjektom, ktorý zodpovedá miestu vášho bydliska, ako je uvedené nižšie. Táto entita vám poskytne platené služby. Žiadny iný subjekt nie je voči vám viazaný žiadnymi záväzkami podľa týchto Podmienok používania pre kupujúcich. Vaša lokalita Kontinenty Severná Amerika (vrátane Havaja) alebo Južná Amerika Zmluvný subjekt X Corp., s kanceláriou na adrese 865 FM 1209, Building 2, Bastrop, TX 78602, USA Vaša lokalita Každá krajina, na ktorú sa nevzťahujú uvedené dve miesta, vrátane ázijsko-tichomorského regiónu, Blízkeho východu, Afriky alebo Európy (okrem krajín EÚ, štátov EZVO a Spojeného kráľovstva) Zmluvný subjekt X Global LLC, so sídlom na adrese 701 S. Carson St., Suite 200, Carson City, NV 89701, USA   Zmeny podmienok, platených služieb a cien 1. Zmeny podmienok. Spoločnosť môže tieto Podmienky používania služby X pre kupujúcich čas od času upravovať, vrátane obchodných, finančných alebo právnych dôvodov. Zmeny nebudú retroaktívne a vaše používanie platených služieb a všetkých príslušných transakcií sa bude riadiť najaktuálnejšou verziou Podmienok používania služby X pre kupujúcich, ktorá je k dispozícii na adrese legal.x.com/purchaser-terms . Ak upravíme alebo revidujeme tieto podmienky po tom, ako s nimi budete súhlasiť (napríklad, ak sa tieto podmienky upravia po zakúpení predplatného), vopred vás upozorníme na podstatné revízie týchto podmienok. Takáto notifikácia sa môže poskytnúť elektronicky, a to aj (a bez obmedzenia) prostredníctvom notifikácií o službe alebo e-mailu na e-mailovú adresu spojenú s vaším účtom. Pokračovaním v prístupe k plateným službám alebo ich používaní po nadobudnutí účinnosti týchto revízií súhlasíte s tým, že budete viazaní revidovanými Podmienkami používania služby X pre kupujúcich. Ak nesúhlasíte s dodržiavaním týchto alebo akýchkoľvek budúcich Podmienok používania služby X pre kupujúcich, nepoužívajte platené služby ani k nim nepristupujte (ani k nim nepokračujte). Podmienky používania služby X pre kupujúcich sú napísané v angličtine, ale sú k dispozícii vo viacerých jazykoch prostredníctvom prekladov. X sa snaží preložiť obsah čo najpresnejšie podľa pôvodnej anglickej verzie. V prípade akýchkoľvek rozporov alebo nezrovnalostí má však prednosť anglická verzia Podmienok používania služby X pre kupujúcich. Beriete na vedomie, že angličtina je referenčným jazykom pre interpretáciu a vytváranie Podmienok používania služby X pre kupujúcich. 2. Zmeny v platených službách.  Naše platené služby sa neustále vyvíjajú. Platené služby sa preto môžu z času na čas zmeniť podľa nášho uváženia, a to aj z akýchkoľvek obchodných, finančných alebo právnych dôvodov. Môžeme zastaviť (trvale alebo dočasne) poskytovanie platených služieb alebo akýchkoľvek funkcií v rámci platených služieb pre vás alebo používateľov všeobecne s upozornením alebo bez upozornenia. Spoločnosť X nenesie voči vám ani voči žiadnej tretej strane žiadnu zodpovednosť za akúkoľvek zmenu, pozastavenie alebo ukončenie platených služieb. Špecifické podmienky (zahrnuté nižšie) pre konkrétnu platenú službu špecifikujú, ako môžete zrušiť predplatné alebo prípadne požiadať o vrátenie peňazí.  3. Zmeny cien. Ceny platených služieb vrátane opakujúcich sa poplatkov za predplatné sa môžu z času na čas zmeniť, a to aj z akýchkoľvek obchodných, finančných alebo právnych dôvodov. Spoločnosť X bude vopred primerane informovať o každej podstatnej zmene ceny platených služieb. V prípade predplatných služieb sa zmeny cien prejavia na začiatku nasledujúceho obdobia predplatného po dátume zmeny ceny. Ak nesúhlasíte so zmenou ceny, máte právo odmietnuť zmenu zrušením predplatného na platenú službu pred nadobudnutím účinnosti zmeny ceny. Platobné podmienky .  X ponúka rôzne možnosti platby, ktoré sa môžu líšiť v závislosti od platenej služby, vášho zariadenia a/alebo operačného systému, vašej geografickej polohy alebo iných faktorov. V dostupnom rozsahu (keďže spoločnosť X môže z času na čas sprístupniť rôzne spôsoby nákupu) môžu tieto možnosti platby zahŕňať možnosť používať funkciu „Platba v aplikácii“, ktorú ponúka spoločnosť Google alebo Apple, alebo uskutočniť webovú platbu pomocou externého spracovateľa platby spoločnosti X, Stripe ( www.stripe.com – ďalej len „ Stripe “). Pri platbe výslovne súhlasíte s tým, že: (i) zaplatíte cenu uvedenú za platenú službu spolu so všetkými ďalšími sumami týkajúcimi sa príslušných daní, poplatkov za kreditnú kartu, bankových poplatkov, poplatkov za zahraničnú transakciu, devízových poplatkov a kolísania meny a (ii) budete dodržiavať všetky príslušné podmienky používania služby, zásady ochrany súkromia alebo iné právne dohody alebo obmedzenia (vrátane dodatočných vekových obmedzení) uložené spoločnosťou Google, Apple alebo Stripe (ako externý spracovateľ platby spoločnosti X) v súvislosti s použitím danej platobnej metódy (napríklad len ak sa rozhodnete uskutočniť platbu prostredníctvom nákupnej funkcie v aplikácii spoločnosti Apple, súhlasíte s tým, že budete dodržiavať akékoľvek relevantné podmienky, požiadavky a/alebo obmedzenia uložené spoločnosťou Apple). Všetky súkromné osobné údaje, ktoré poskytnete v súvislosti s vaším používaním platených služieb, vrátane bez obmedzenia, akýchkoľvek údajov poskytnutých v súvislosti s platbou, budú spracované v súlade so zásadami ochrany súkromia v službe X. Služba X môže zdieľať vaše platobné údaje s poskytovateľmi platobných služieb na spracovanie platieb; predchádzanie podvodom alebo iným zakázaným činnostiam, ich odhaľovanie a vyšetrovanie; na riešenie sporov, ako sú vrátenia platieb alebo refundácie, a na iné účely súvisiace s prijímaním kreditných kariet, debetných kariet alebo platieb ACH. Je vašou zodpovednosťou zabezpečiť, aby vaše bankové údaje, kreditné karty, debetné karty a/alebo iné platobné informácie boli vždy aktuálne, úplné a presné. Ak uskutočníte platbu za platenú službu, môžeme získať informácie o vašej transakcii, napríklad kedy bola uskutočnená, kedy je nastavená platnosť predplatného alebo automatické obnovenie, na akej platforme ste uskutočnili nákup, a ďalšie informácie. Spoločnosť X nebude zodpovedná za žiadne chyby alebo omeškania spôsobené spracovateľom platby, obchodom Apple App Store alebo obchodom Google Play, vašou bankou, spoločnosťou vydávajúcou kreditné karty a/alebo akoukoľvek platobnou sieťou. Informácie o platobných podmienkach uplatniteľných na konkrétnu platenú službu vrátane spôsobu spracovania obnovení predplatného a ďalších dôležitých podmienok nájdete nižšie v podrobnostiach o platených službách. Uplatňovanie zmluvy s používateľom služby X, ukončenie, žiadne náhrady, viaceré účty v službe X a obmedzenia 1. Platí pre vás zmluva s používateľom služby X . MUSÍTE VŽDY SLEDOVAŤ A DODRŽIAVAŤ ZMLUVU S POUŽÍVATEĽOM SLUŽBY X. Na používanie služby X vrátane platených služieb a funkcií sa vždy vzťahuje zmluva s používateľom služby X. Ak nebudete sledovať a nebudete dodržiavať zmluvu s používateľom služby X alebo ak sa spoločnosť X domnieva, že ste nesledovali a nedodržiavali zmluvu s používateľom služby X, môže to viesť k zrušeniu služieb, ktoré vám boli zaplatené. Každé takéto zrušenie bude nad rámec a bez obmedzenia akéhokoľvek donucovacieho opatrenia, ktoré môže proti vám spoločnosť X prijať na základe zmluvy s používateľom služby X. V takýchto prípadoch môžete stratiť výhody svojich platených služieb a nebudete mať nárok na refundáciu žiadnej sumy, ktorú ste zaplatili (alebo predplatili) za platené služby. 2. Prečo vám spoločnosť X môže ukončiť prístup k plateným službám. Spoločnosť X môže pozastaviť alebo ukončiť váš prístup k plateným službám, prestať vám poskytovať všetky platené služby alebo ich časť, alebo podniknúť akékoľvek iné kroky, ktoré považuje za vhodné, vrátane napríklad pozastavenia vášho účtu (bez akejkoľvek zodpovednosti), a to z akéhokoľvek dôvodu alebo bez neho, okrem iného z nasledujúcich dôvodov: a. Spoločnosť X je presvedčená, že podľa vlastného uváženia ste porušili podmienky alebo vaše používanie platenej služby (služieb) by porušovalo akékoľvek platné zákony. b. Služba X je o to požiadaná alebo jej to nariaďuje akýkoľvek príslušný súd, regulačný orgán alebo orgán činný v trestnom konaní. c. Služba X má neočakávané technické alebo bezpečnostné problémy. d. Spoločnosť X sa domnieva podľa vlastného uváženia, že ste porušili Zmluvu s používateľom služby X; e. Spoločnosť X sa podľa vlastného uváženia domnieva, že sa zapájate do manipulácie alebo iného rušivého alebo zakázaného správania všeobecne alebo v súvislosti s platenými službami; f.  Vytvárate riziko alebo možné právne ohrozenie pre spoločnosť X; g. Váš účet by mal byť odstránený z dôvodu dlhodobej nečinnosti alebo h. Váš účet by mal byť odstránený z dôvodu dlhodobej nečinnosti alebo i. Naše poskytovanie platených služieb (úplne alebo čiastočne) vám už nie je komerčne životaschopné (podľa vlastného uváženia X). 3. Všetky transakcie sú konečné. Všetky platby za platené služby sú konečné a nie sú refundovateľné ani vymeniteľné, okrem prípadov, keď to vyžaduje uplatniteľné právo. Neposkytujeme žiadnu záruku, pokiaľ ide o povahu, kvalitu alebo hodnotu platenej služby alebo jej dostupnosť či dodávku. Náhrady alebo úvery sa neposkytujú za žiadnu nevyužitú alebo čiastočne využitú platenú službu (napríklad za čiastočne využité obdobie predplatného).  4. Platené služby sú neprenosné medzi účtami v službe X. Každý nákup platenej služby sa vzťahuje na jeden účet v službe X, čo znamená, že váš nákup sa bude vzťahovať výlučne na účet, ktorý ste používali pri zakúpení platenej služby a nebude sa vzťahovať na iné účty, ku ktorým môžete mať prístup alebo kontrolu nad nimi. Ak máte alebo kontrolujete viac účtov a chcete prístup k plateným službám na každom účte, musíte si zakúpiť platenú službu na každom účte jednotlivo. 5. Obmedzenia a povinnosti.  a. Platenú službu si môžete zakúpiť a používať len vtedy, ak máte zo zákona povolené používať platenú službu vo vašej krajine a žijete v krajine podporovanej spoločnosťou X pre platenú službu. Spoločnosť X môže podľa vlastného uváženia v určitých krajinách obmedziť možnosť prístupu k platenej službe alebo jej nákupu. Služba X si vyhradzuje právo priebežne upravovať zoznam podporovaných krajín. b. Vyhradzujeme si právo odmietnuť transakcie platených služieb alebo zrušiť či prerušiť predaj alebo používanie platenej služby podľa vlastného uváženia.  c.  Nesmiete povoliť iným používať váš účet v službe X na prístup k akejkoľvek platenej službe, ktorú si takáto osoba neobjednala. d. Platenú službu si nemôžete zakúpiť ani používať, ak ste osobou, s ktorou osoby v USA nemajú povolenie obchodovať na základe hospodárskych sankcií, vrátane, bez obmedzenia, sankcií, ktoré spravuje Ministerstvo zahraničných vecí Ministerstva financií Spojených štátov alebo akýkoľvek iný príslušný sankčný orgán (" zakázaná osoba "). To okrem iného zahŕňa osoby, ktoré sa nachádzajú v nasledujúcich krajinách a regiónoch alebo v nich majú obvyklý pobyt: Kuba, Irán, ukrajinské regióny Krymu, Severná Kórea a Sýria. Vyhlasujete a zaručujete, že nie ste zakázaná osoba. e. UVÁDZATE, ŽE PLATENÉ SLUŽBY BUDETE POUŽÍVAŤ LEN NA ZÁKONNÉ ÚČELY A LEN V SÚLADE S PODMIENKAMI. Dane a poplatky . Zodpovedáte a súhlasíte s tým, že zaplatíte všetky príslušné dane, clá, tarify a poplatky súvisiace s nákupom platených služieb vrátane tých, ktoré je potrebné zaplatiť buď X, alebo spracovateľovi platieb tretej strany. Tieto dane môžu okrem iného zahŕňať DPH, DPH, DPH, daň z predaja, zrážkovú daň a všetky ostatné príslušné dane. V závislosti od vašej lokality môže byť spoločnosť X zodpovedná za zhromažďovanie a vykazovanie informácií týkajúcich sa daní z transakcií vyplývajúcich z vášho nákupu platených služieb. Udeľujete spoločnosti X povolenie na poskytovanie vášho účtu a osobných informácií príslušným daňovým orgánom na plnenie našich povinností v oblasti zbierky daní a podávania správ.   Všeobecné podmienky 1. Kontaktné údaje. Ak máte akékoľvek otázky týkajúce sa platených služieb alebo týchto podmienok, viac informácií môžete nájsť v  Centre pomoci pre platené služby spoločnosti X . Ak ste si už zakúpili platenú službu, môžete nás kontaktovať aj prostredníctvom odkazu na podporu, ktorý je k dispozícii v navigačnej ponuke vášho účtu v službe X v nastaveniach platby alebo predplatného. Ak máte ďalšie otázky, môžete nás kontaktovať tu pomocou formulára „Nápoveda k plateným funkciám“. 2. VYHLÁSENIA O VYLÚČENÍ ZODPOVEDNOSTI. VÁŠ PRÍSTUP K PLATENÝM SLUŽBÁM A ICH POUŽÍVANIE JE NA VAŠE VLASTNÉ RIZIKO V MAXIMÁLNOM ROZSAHU POVOLENOM PLATNÝMI PRÁVNYMI PREDPISMI. ROZUMIETE A SÚHLASÍTE S TÝM, ŽE VÁM PLATENÉ SLUŽBY POSKYTNETE NA ZÁKLADE "AKO JE" A "AKO SÚ K DISPOZÍCII". SPOLOČNOSŤ X SA ZRIEKA VŠETKÝCH ZÁRUK A PODMIENOK, ČI UŽ VÝSLOVNÝCH ALEBO IMPLICITNÝCH, TÝKAJÚCICH SA OBCHODOVATEĽNOSTI, VHODNOSTI NA KONKRÉTNY ÚČEL ALEBO NEPORUŠENIA. SPOLOČNOSŤ X NEPOSKYTUJE ŽIADNU ZÁRUKU ANI ZASTÚPENIE A VZDÁVA SA AKEJKOĽVEK ZODPOVEDNOSTI ZA: (I) ÚPLNOSŤ, PRESNOSŤ, DOSTUPNOSŤ, VČASNOSŤ, BEZPEČNOSŤ ALEBO SPOĽAHLIVOSŤ PLATENÝCH SLUŽIEB A (II) ČI PLATENÉ SLUŽBY BUDÚ SPĹŇAŤ VAŠE POŽIADAVKY ALEBO BUDÚ K DISPOZÍCII NEPRERUŠENE, BEZPEČNE ALEBO BEZCHYBNE. STE ZODPOVEDNÍ ZA POUŽÍVANIE SLUŽBY X VRÁTANE PLATENÝCH SLUŽIEB, A AKÉHOKOĽVEK OBSAHU, KTORÝ POSKYTNETE. 3. OBMEDZENIE ZODPOVEDNOSTI ZA ŠKODU. V MAXIMÁLNOM ROZSAHU POVOLENOM UPLATNITEĽNÝM PRÁVOM NESÚ SUBJEKTY SLUŽBY X ZODPOVEDNOSŤ ZA ŽIADNE NEPRIAME, NÁHODNÉ, OSOBITNÉ, NÁSLEDNÉ ALEBO REPRESÍVNE ŠKODY ALEBO ZA AKÉKOĽVEK STRATY ZISKOV ALEBO PRÍJMOV, ČI UŽ PRIAMO ALEBO NEPRIAMO, ALEBO ZA AKÉKOĽVEK STRATY ÚDAJOV, POUŽITIA, DOBREJ VÔLE ALEBO INÝCH NEHMOTNÝCH STRÁT, KTORÉ VYPLÝVAJÚ Z (I) VÁŠHO PRÍSTUPU K PLATENÝM SLUŽBÁM ALEBO ICH POUŽÍVANIA ALEBO NESCHOPNOSTI PRÍSTUPU K NIM ALEBO ICH POUŽÍVANIA; (ii) AKÉHOKOĽVEK KONANIA ALEBO OBSAHU AKEJKOĽVEK TRETEJ STRANY, KTORÁ BOLA PROSTREDNÍCTVOM PLATENÝCH SLUŽIEB ZVEREJNENÁ, VRÁTANE BEZ OBMEDZENIA AKÉHOKOĽVEK HANLIVÉHO, URÁŽLIVÉHO ALEBO NEZÁKONNÉHO KONANIA INÝCH POUŽÍVATEĽOV ALEBO TRETÍCH STRÁN; (iii) AKÉHOKOĽVEK OBSAHU ZÍSKANÉHO Z PLATENÝCH SLUŽIEB; ALEBO (iv) NEOPRÁVNENÝ PRÍSTUP, POUŽÍVANIE ALEBO ZMENA VÁŠHO PRENOSU ALEBO OBSAHU. ABY SA PREDIŠLO POCHYBNOSTIAM, DEFINÍCIA PLATENÝCH SLUŽIEB SA OBMEDZUJE NA FUNKCIE PONÚKANÉ SPOLOČNOSŤOU X A NEZAHŔŇA ŽIADNY OBSAH, KU KTORÉMU PRISTUPUJETE A/ALEBO S KTORÝM INTERAGUJETE PRI POUŽÍVANÍ TÝCHTO FUNKCIÍ. CELKOVÁ ZODPOVEDNOSŤ SUBJEKTOV SLUŽBY X V ŽIADNOM PRÍPADE NEPRESIAHNE VIAC AKO 100,00 USD ALEBO SUMU, KTORÚ STE ZAPLATILI SLUŽBE X ZA POSLEDNÝCH ŠESŤ MESIACOV, AK STE NEJAKÚ ZAPLATILI, ZA PLATENÉ SLUŽBY, KTORÉ ZAPRÍČINILI VZNIK NÁROKU. OBMEDZENIA UVEDENÉ V TOMTO PODODDIELE SA VZŤAHUJÚ NA AKÚKOĽVEK TEÓRIU ZODPOVEDNOSTI, ČI UŽ ZALOŽENÚ NA ZÁRUKE, ZMLUVE, ZÁKONE, DELIKTE (VRÁTANE NEDBANLIVOSTI) ALEBO INAK, A BEZ OHĽADU NA TO, ČI SUBJEKTY X BOLI ALEBO NEBOLI INFORMOVANÉ O MOŽNOSTI VZNIKU TAKEJTO ŠKODY, A TO AJ V PRÍPADE, AK SA ZISTÍ, ŽE OPRAVNÝ PROSTRIEDOK UVEDENÝ V TOMTO DOKUMENTE NESPLNIL SVOJ ZÁKLADNÝ ÚČEL. „SUBJEKTY SPOLOČNOSTI X“ SA VZŤAHUJÚ NA SPOLOČNOSŤ X, JEJ RODIČOV, PRIDRUŽENÉ SPOLOČNOSTI, PREPOJENÉ SPOLOČNOSTI, ÚRADNÍKOV, RIADITEĽOV, ZAMESTNANCOV, AGENTOV, ZÁSTUPCOV, PARTNEROV A POSKYTOVATEĽOV LICENCIÍ. ROZHODNÉ PRÁVO VO VAŠEJ JURISDIKCII NEMUSÍ UMOŽŇOVAŤ URČITÉ OBMEDZENIA ZODPOVEDNOSTI. V ROZSAHU POŽADOVANOM ROZHODNÝM PRÁVOM VO VAŠEJ JURISDIKCII VYŠŠIE UVEDENÉ NEOBMEDZUJE ZODPOVEDNOSŤ SUBJEKTOV SPOLOČNOSTI X ZA PODVOD, PODVODNÉ SKRESĽOVANIE INFORMÁCIÍ, SMRŤ ALEBO UJMU NA ZDRAVÍ SPÔSOBENÚ NAŠOU NEDBANLIVOSŤOU, HRUBOU NEDBANLIVOSŤOU A/ALEBO ÚMYSELNÝM SPRÁVANÍM. V CELKOVOM ROZSAHU POVOLENOM PODĽA PRÍSLUŠNÝCH PRÁVNYCH PREDPISOV JE MAXIMÁLNA CELKOVÁ ZODPOVEDNOSŤ SUBJEKTOV SPOLOČNOSTI X ZA AKÉKOĽVEK NEVYLUČITEĽNÉ ZÁRUKY OBMEDZENÁ NA STO AMERICKÝCH DOLÁROV (100,00 USD). 4. Upozornenie týkajúce sa spoločnosti Apple. Ak ste si zakúpili platené služby alebo používate platené služby alebo k nim pristupujete na zariadení so systémom iOS, ďalej beriete na vedomie a súhlasíte s podmienkami tejto časti. Beriete na vedomie, že podmienky sú len medzi vami a nami, nie so spoločnosťou Apple, a spoločnosť Apple nie je zodpovedná za platené služby a ich obsah. Spoločnosť Apple nemá žiadnu povinnosť poskytovať akékoľvek služby údržby a podpory v súvislosti s platenými službami. V prípade rozporu medzi ustanoveniami týchto Podmienok služby pre kupujúcich a ustanoveniami Zmluvy s používateľom majú prednosť ustanovenia týchto Podmienok služby pre kupujúcich, a to výlučne s ohľadom na vaše používanie platenej služby. Spoločnosť Apple nie je zodpovedná za riešenie akýchkoľvek nárokov od vás alebo akejkoľvek tretej strany v súvislosti s platenými službami alebo vaším vlastníctvom a/alebo používaním platených služieb, okrem iného vrátane: (i) nárokov na zodpovednosť za produkt; (ii) akéhokoľvek nároku, že platené služby nie sú v súlade s akýmikoľvek uplatniteľnými právnymi alebo regulačnými požiadavkami a (iii) nárokov vyplývajúcich z právnych predpisov na ochranu spotrebiteľa alebo podobných právnych predpisov. Spoločnosť Apple nie je zodpovedná za vyšetrovanie, obhajobu, urovnanie a likvidáciu akéhokoľvek nároku tretej strany, že platené služby a/alebo vaše vlastníctvo a používanie mobilnej aplikácie porušujú práva duševného vlastníctva tejto tretej strany. Súhlasíte s tým, že pri používaní služieb Paid budete dodržiavať všetky platné podmienky tretích strán. Spoločnosť Apple a dcérske spoločnosti spoločnosti Apple sú príjemcami zmluvných podmienok tretie strany a po prijatí zmluvných podmienok bude mať spoločnosť Apple právo (a bude sa to považovať za akceptovanie práva) vymáhať plnenie zmluvných podmienok voči vám ako príjemcovi zmluvných podmienok tretej strany. Týmto vyhlasujete a zaručujete, že (i) sa nenachádzate v krajine, na ktorú sa vzťahuje embargo vlády USA, alebo ktorá bola vládou USA označená ako "podpora teroristov" krajina; a (ii) nie ste uvedený na žiadnom zozname zakázaných alebo obmedzených strán vlády USA. 5. Rozpor. V prípade sporu medzi ustanoveniami týchto Podmienok používania služby X pre kupujúcich a ustanoveniami zmluvy s používateľom služby X majú ustanovenia týchto Podmienok používania služby X pre kupujúcich prednosť výlučne s ohľadom na vaše používanie platenej služby.   6. RIEŠENIE SPOROV A ZRIEKNUTIE SA HROMADNEJ ŽALOBY a. Počiatočné riešenie sporov.  Väčšinu sporov medzi vami a X je možné vyriešiť neformálne. Môžete nás kontaktovať tak, že napíšete na Platenú podporu tu . Keď nás kontaktujete, uveďte stručný opis povahy a základov vašich obáv, vaše kontaktné informácie a konkrétnu pomoc, ktorú hľadáte. Strany vynaložia maximálne úsilie prostredníctvom tohto procesu podpory na urovnanie sporov, nárokov alebo kontroverzií vyplývajúcich z týchto podmienok alebo s nimi súvisiacich a/alebo vašej účasti v programe (jednotlivo " spor " alebo viac ako jeden " spory "). Vy a my súhlasíme s tým, že účasť v tomto neformálnom procese je potrebná v dobrej viere a musí byť dokončená tak, ako je uvedené vyššie, predtým, ako môže ktorákoľvek zo strán začať súdny spor týkajúci sa akéhokoľvek sporu, s výnimkou žiadostí o núdzové súdne príkazy („ Oslobodený spor “). Ak sa nám nepodarí s vami dosiahnuť dohodnuté riešenie sporu (okrem vylúčeného sporu) v lehote tridsiatich (30) dní od začatia neformálneho riešenia sporu podľa vyššie uvedeného ustanovenia o počiatočnom riešení sporu, môžete vy alebo my začať súdny spor. b.   Voľba práva a výber súdu . POZORNE SI PREČÍTAJTE TÚTO ČASŤ - MÔŽE TO VÝZNAMNE OVPLYVNIŤ VAŠE ZÁKONNÉ PRÁVA VRÁTANE VÁŠHO PRÁVA PODAŤ ŽALOBU NA SÚDE. Tieto podmienky a všetky spory, ktoré vzniknú medzi vami a nami, sa riadia zákonmi štátu Texas, s výnimkou ustanovení o voľbe práva, bez ohľadu na akúkoľvek inú dohodu medzi vami a nami, ktorá by bola opačná. Všetky spory súvisiace s týmito Podmienkami, vrátane akýchkoľvek sporov, nárokov alebo kontroverzií vyplývajúcich z týchto Podmienok alebo s nimi súvisiacich, sa budú riešiť výlučne na federálnych alebo štátnych súdoch nachádzajúcich sa v okrese Tarrant, Texas, Spojené štáty americké, a vy súhlasíte s osobnou jurisdikciou na týchto súdoch a vzdávate sa akejkoľvek námietky týkajúcej sa nevhodného súdu. Bez toho, aby bolo dotknuté vyššie uvedené, súhlasíte s tým, že spoločnosť X môže podľa vlastného uváženia podať akýkoľvek nárok, dôvod žaloby alebo spor, ktorý proti vám máme, na ktoromkoľvek príslušnom súde v krajine, v ktorej máte bydlisko, ktorý má jurisdikciu a miestnu príslušnosť nad nárokom. Ak ste federálnym, štátnym alebo miestnym vládnym subjektom v Spojených štátoch vo svojej oficiálnej funkcii a z právneho hľadiska nemôžete akceptovať vyššie uvedené ustanovenia o kontrolnom zákone, jurisdikcii alebo mieste konania, potom sa na vás tieto ustanovenia nevzťahujú. V prípade takýchto subjektov federálnej vlády USA sa táto dohoda a všetky činnosti s ňou súvisiace budú riadiť zákonmi Spojených štátov amerických (bez odkazu na konflikt zákonov) a v prípade absencie federálneho zákona a v rozsahu povolenom federálnym zákonom, zákony štátu Texas (okrem voľby práva). c. MÁTE DVA ROKY NA PODANIE ŽALOBY PROTI X . Akýkoľvek nárok voči spoločnosti X vyplývajúci z týchto podmienok alebo s nimi súvisiaci musíte uplatniť do dvoch (2) rokov od dátumu výskytu udalosti alebo skutočností, ktoré viedli k sporu, pokiaľ platné právne predpisy nestanovujú, že bežnú premlčaciu lehotu pre tento nárok nie je možné skrátiť dohodou. Ak v tejto lehote neuplatníte nárok, navždy sa vzdávate práva na uplatnenie akéhokoľvek nároku alebo dôvodu žaloby akéhokoľvek druhu alebo charakteru na základe takýchto udalostí alebo skutočností a takéto nároky alebo dôvody žaloby sú trvalo zakázané a spoločnosť X nebude mať žiadnu zodpovednosť v súvislosti s takýmto nárokom. d. Odstúpenie od hromadnej žaloby . V rozsahu povolenom zákonom sa tiež vzdávate práva zúčastniť sa ako žalobca alebo člen skupiny v akejkoľvek údajnej skupinovej žalobe, kolektívnej žalobe alebo konaní o zastupiteľskej žalobe.   Podmienky používania služby X pre kupujúcich Ak žijete v Európskej únii, štátoch EZVO alebo Spojenom kráľovstve X vám umožňuje prístup k určitým funkciám výmenou za platbu jednorazového alebo opakovaného poplatku, ktorý sa vzťahuje na príslušné funkcie (každá „ Platená služba “ a spoločne " Platené služby "). Napríklad, služba X Premium (ako je definované nižšie) a predplatné by sa obe považovali za „Platenú službu“.  V rozsahu, v akom sa zaregistrujete a/alebo používate platenú službu, vaše používanie platených služieb a všetkých príslušných transakcií podlieha: (i) podmienkam používania stanoveným v tomto dokumente, vrátane platných podmienok pre každú platenú službu, ktorú si zakúpite, pričom všetky podmienky sú uvedené nižšie (súhrnne „ Podmienky používania služby X pre kupujúcich   “) a (ii)   platným podmienkam Podmienky používania služby X  , Zásady ochrany súkromia služby X ,  Pravidlá a zásady služby X a všetky zásady v ňom zahrnuté (súhrnne „ Zmluva s používateľom služby X “). Tieto zmluvné podmienky pre nákupcu X a vyššie uvedená zmluva s používateľom X sa v tomto dokumente budú spoločne označovať ako „ Podmienky “. „ X “ označuje entitu X, ktorá vám poskytuje Platené služby. Pozorne si prečítajte tieto Podmienky používania služby X pre kupujúcich, aby ste sa uistili, že rozumiete platným zmluvným podmienkam, podmienkam a výnimkám. AK ŽIJETE V EURÓPSKEJ ÚNII, ŠTÁTOCH EZVO ALEBO SPOJENOM KRÁĽOVSTVE, TIETO PODMIENKY OBSAHUJÚ DÔLEŽITÉ INFORMÁCIE, KTORÉ SA NA VÁS VZŤAHUJÚ O RIEŠENÍ SPOROV, VRÁTANE ZRIEKNUTIA SA PRÁVA VZNIESŤ NÁROKY AKO SKUPINOVÉ ŽALOBY A OBMEDZENIA VÁŠHO PRÁVA NA UPLATNENIE NÁROKOV VOČI X VIAC AKO 1 ROK PO TOM, ČO DOŠLO K PRÍSLUŠNÝM UDALOSTIAM, KTORÉ OVPLYVNIA VAŠE PRÁVA A POVINNOSTI V PRÍPADE AKÉHOKOĽVEK SPORU SO SPOLOČNOSŤOU X. POZRI ODDIEL 6 PODROBNOSTI O TÝCHTO USTANOVENIACH PODĽA VŠEOBECNÝCH PODMIENOK. Prijatie .  Používaním platenej služby alebo prístupom k platenej službe (plateným službám) od spoločnosti X, zadaním platby podľa tejto služby a/alebo kliknutím na tlačidlo na jednorazový nákup alebo opakované predplatné za platenú službu poskytovanú spoločnosťou X súhlasíte s tým, že budete viazaní podmienkami. Ak týmto Podmienkam nerozumiete alebo neakceptujete žiadnu ich časť, potom nesmiete používať žiadne platené služby ani k nim mať prístup. Ak si chcete zakúpiť a používať platenú službu, musíte: (i) mať aspoň 18 rokov alebo mať vek plnoletosti podľa právnych predpisov jurisdikcie, v ktorej žijete, alebo (ii) mať výslovný súhlas rodiča alebo opatrovníka s kúpou a používaním tejto platenej služby. Ak ste rodič alebo zákonný opatrovník a umožníte svojmu dieťaťu (alebo dieťaťu, ktorého ste zástupcom) kúpiť alebo používať platenú službu, súhlasíte s tým, že sa na vás vzťahujú podmienky, že budete dodržiavať podmienky a že ste zodpovední za aktivity dieťaťa v platených službách a za zabezpečenie toho, aby dieťa tiež dodržiavalo podmienky. V každom prípade, ako je uvedené v časti Who May Use the Services (Kto môže používať služby) v Podmienkach používania služby X, ak chcete používať službu X, musíte mať aspoň 13 rokov. Ak prijímate tieto Podmienky používania služby X pre kupujúcich a používate platené služby v mene spoločnosti, organizácie, vlády alebo inej právnickej osoby, vyhlasujete a zaručujete, že ste na to oprávnení a máte právomoc zaviazať takúto osobu týmito Podmienkami služby X pre kupujúcich, pričom v takom prípade sa slová „vy“ a „váš“ použité v týchto Podmienkach používania služby X pre kupujúcich vzťahujú na takúto osobu. Zmluvný subjekt služby X .  Tieto Podmienky používania služby X pre kupujúcich uzatvárate so subjektom, ktorý zodpovedá miestu vášho bydliska, ako je uvedené nižšie. Táto entita vám poskytne platené služby. Žiadny iný subjekt nie je voči vám viazaný žiadnymi záväzkami podľa týchto Podmienok používania pre kupujúcich. Vaša lokalita Európska únia, štáty EZVO alebo Spojené kráľovstvo Zmluvný subjekt X Internet Unlimited Company, so sídlom na adrese One Cumberland Place, Fenian Street, Dublin 2, D02 AX07 Ireland   Zmeny podmienok, platených služieb a cien 1. Zmeny podmienok.  Spoločnosť X môže tieto Podmienky používania služby X pre kupujúcich čas od času upravovať na základe platného a rozumného dôvodu. Platný a rozumný dôvod môže zahŕňať (i) zmenu našich služieb, napríklad z dôvodu technických, bezpečnostných alebo prevádzkových zmien, (ii) odstránenie technických chýb, (iii) zmenu našej činnosti, napríklad z dôvodu zmien v politike, finančných alebo iných strategických zmien, (iv) zmenu právnej situácie, napríklad z dôvodu zmeny zákona, požiadavky úradného orgánu alebo rozhodnutia súdu, a (v) optimalizáciu používateľského zážitku prostredníctvom implementácie nových funkcií. Zmeny nebudú retroaktívne a vaše používanie platených služieb a všetkých príslušných transakcií sa bude riadiť najaktuálnejšou verziou Podmienok používania služby X pre kupujúcich, ktorá je k dispozícii na adrese legal.x.com/purchaser-terms . Ak tieto Podmienky upravíme alebo zmeníme po tom, ako ste s nimi súhlasili (napríklad ak sa tieto podmienky upravia po tom, ako ste si zakúpili predplatné), zaväzujeme sa oznámiť vám až 30 dní (v závislosti od konkrétnych zmien) vopred pred nadobudnutím platnosti podstatných úprav týchto podmienok, pričom používateľovi stanovíme rozumnú lehotu vo vzťahu k zmenám a upozorníme vás na následky pokračovania používania po uplynutí lehoty. Takáto notifikácia sa môže poskytnúť elektronicky, a to aj (a bez obmedzenia) prostredníctvom notifikácií o službe alebo e-mailu na e-mailovú adresu spojenú s vaším účtom. V prípade, že budete pokračovať v používaní Platených služieb po uplynutí vyššie uvedenej lehoty, súhlasíte s tým, že budete viazaní upravenými Podmienkami používania služby X pre kupujúcich. Ak nesúhlasíte so zmenami Podmienok používania služby X pre kupujúcich, budete musieť prestať používať alebo pristupovať (alebo pokračovať v používaní alebo pristupovaní) k Plateným službám. Podmienky používania služby X pre kupujúcich sú napísané v angličtine, ale sú k dispozícii vo viacerých jazykoch prostredníctvom prekladov. X sa snaží preložiť obsah čo najpresnejšie podľa pôvodnej anglickej verzie. V prípade akýchkoľvek rozporov alebo nezrovnalostí má však prednosť anglická verzia Podmienok používania služby X pre kupujúcich. Beriete na vedomie, že angličtina je referenčným jazykom pre interpretáciu a vytváranie Podmienok používania služby X pre kupujúcich. 2. Zmeny platených služieb.  Naše platené služby a naše produkty a služby sa neustále vyvíjajú. Spoločnosť X môže zmeniť platené služby na primeranom a platnom základe. Takýto platný a primeraný základ môže zahŕňať (i) technický, bezpečnostný alebo prevádzkový vývoj, (ii) odstránenie technických chýb, (iii) súlad so zmenenou právnou situáciou, napríklad v dôsledku zmeny zákona, žiadosti oficiálneho orgánu alebo rozhodnutia súdu, (iv) optimalizáciu používateľského zážitku prostredníctvom implementácie nových funkcií, a (v) zmena v našom podnikaní, napríklad v dôsledku politiky, finančných okolností alebo iných zmien smerovania. O akýchkoľvek zmenách platených služieb vás budeme informovať do 30 dní pred ich nadobudnutím účinnosti, napríklad prostredníctvom oznámenia o službe alebo e-mailu zaslaného na e-mailovú adresu prepojenú s vaším účtom, pričom uvedieme charakteristiky a dátum účinnosti zmien a budeme vás informovať o vašom prípadnom práve ukončiť predplatné. Lehota sa môže skrátiť v prípade zmien súvisiacich s bezpečnosťou. Nasledujúce sa nepovažuje za zmeny Platených služieb v zmysle tohto ustanovenia: (i) zmeny, ktoré ovplyvňujú základnú povahu Platených služieb a podstatné charakteristiky služby, ktorú má poskytovať spoločnosť X, a (ii) trvalé ukončenie služieb. Spoločnosť X nenesie voči vám žiadnu zodpovednosť za akúkoľvek zmenu, pozastavenie alebo ukončenie platených služieb. Ak to vyžaduje zákon, vyššie uvedené obmedzenie zodpovednosti sa nevzťahuje (i) na náhradu predvídateľných škôd v prípadoch mierne nedbalého porušenia povinností, pokiaľ ich splnenie je podstatné pre riadne vykonanie zmluvy a používatelia sa môžu spoľahnúť na ich splnenie (podstatné zmluvné záväzky), zo strany spoločnosti X alebo jej zákonných zástupcov alebo pomocných osôb, a (ii) na zodpovednosť spoločnosti X za (a) škodu vyplývajúcu z poškodenia života, tela alebo zdravia, ako aj za škody spôsobené úmyslom alebo hrubou nedbalosťou zo strany spoločnosti X, jej zákonných zástupcov alebo pomocných osôb, a (b) škodu v dôsledku nesplnenia záruky alebo garantovanej vlastnosti alebo v dôsledku podvodne skrytej vady. Špecifické zmluvné podmienky (uvedené nižšie) pre konkrétnu platenú službu špecifikujú, ako môžete zrušiť predplatné alebo prípadne požiadať o vrátenie peňazí. 3. Zmeny cien. Ceny platených služieb vrátane opakujúcich sa poplatkov za predplatné sa môžu z času na čas zmeniť z dôvodu zmeny nákladov súvisiacich s prevádzkou, údržbou, technickým zabezpečením, obchodnými úvahami a poplatkami účtovanými tretími stranami alebo zákonnými poplatkami podľa nášho primeraného uváženia. V prípade zvýšenia nákladov si X vyhradzuje právo na úpravu cien spoplatnených služieb. Spoločnosť X vás písomne upozorní na akékoľvek zmeny cien až 30 dní pred ich nadobudnutím účinnosti, napríklad prostredníctvom notifikácie služby alebo e-mailu na e-mailovú adresu prepojenú s vaším účtom, pričom uvedie vaše práva a následky ich nevyužitia. V prípade zmeny ceny môžete ukončiť predplatné príslušnej platenej služby alebo používateľskú zmluvu do 24 hodín pred začiatkom ďalšieho fakturačného cyklu za predpokladu, že zrušenie sa uskutoční do 30 dní od prijatia oznámenia. V opačnom prípade zmena ceny nadobudne účinnosť v čase uvedenom v oznámení. V prípade predplatných služieb sa zmeny cien prejavia na začiatku nasledujúceho obdobia predplatného po dátume nadobudnutia účinnosti zmeny ceny. Platobné podmienky .  X ponúka rôzne možnosti platby, ktoré sa môžu líšiť v závislosti od platenej služby, vášho zariadenia a/alebo operačného systému, vašej geografickej polohy alebo iných faktorov. V dostupnom rozsahu (keďže spoločnosť X môže z času na čas sprístupniť rôzne spôsoby nákupu) môžu tieto možnosti platby zahŕňať možnosť používať funkciu „Platba v aplikácii“, ktorú ponúka spoločnosť Google alebo Apple, alebo uskutočniť webovú platbu pomocou externého spracovateľa platby spoločnosti X, Stripe ( www.stripe.com – ďalej len „ Stripe “). Pri platbe výslovne súhlasíte s tým, že: (i) zaplatíte cenu uvedenú za platenú službu spolu so všetkými ďalšími sumami týkajúcimi sa príslušných daní, poplatkov za kreditnú kartu, bankových poplatkov, poplatkov za zahraničnú transakciu, devízových poplatkov a kolísania meny a (ii) budete dodržiavať všetky príslušné podmienky používania služby, zásady ochrany súkromia alebo iné právne dohody alebo obmedzenia (vrátane dodatočných vekových obmedzení) uložené spoločnosťou Google, Apple alebo Stripe (ako externý spracovateľ platby spoločnosti X) v súvislosti s použitím danej platobnej metódy (napríklad len ak sa rozhodnete uskutočniť platbu prostredníctvom nákupnej funkcie v aplikácii spoločnosti Apple, súhlasíte s tým, že budete dodržiavať akékoľvek relevantné podmienky, požiadavky a/alebo obmedzenia uložené spoločnosťou Apple). Všetky súkromné osobné údaje, ktoré poskytnete v súvislosti s vaším používaním platených služieb, vrátane bez obmedzenia, akýchkoľvek údajov poskytnutých v súvislosti s platbou, budú spracované v súlade so zásadami ochrany súkromia v službe X. Služba X môže zdieľať vaše platobné údaje s poskytovateľmi platobných služieb na spracovanie platieb; predchádzanie podvodom alebo iným zakázaným činnostiam, ich odhaľovanie a vyšetrovanie; na riešenie sporov, ako sú vrátenia platieb alebo refundácie, a na iné účely súvisiace s prijímaním kreditných kariet, debetných kariet alebo platieb ACH. Je vašou zodpovednosťou zabezpečiť, aby vaše bankové údaje, kreditné karty, debetné karty a/alebo iné platobné informácie boli vždy aktuálne, úplné a presné. Ak uskutočníte platbu za platenú službu, môžeme získať informácie o vašej transakcii, napríklad kedy bola uskutočnená, kedy je nastavená platnosť predplatného alebo automatické obnovenie, na akej platforme ste uskutočnili nákup, a ďalšie informácie. Spoločnosť X nebude zodpovedná za žiadne chyby alebo omeškania spôsobené spracovateľom platby, obchodom Apple App Store alebo obchodom Google Play, vašou bankou, spoločnosťou vydávajúcou kreditné karty a/alebo akoukoľvek platobnou sieťou. Informácie o platobných podmienkach uplatniteľných na konkrétnu platenú službu vrátane spôsobu spracovania obnovení predplatného a ďalších dôležitých podmienok nájdete nižšie v podrobnostiach o platených službách. Uplatňovanie zmluvy s používateľom služby X, ukončenie, žiadne náhrady, viaceré účty v službe X a obmedzenia 1. Platí pre vás zmluva s používateľom služby X . MUSÍTE VŽDY SLEDOVAŤ A DODRŽIAVAŤ ZMLUVU S POUŽÍVATEĽOM SLUŽBY X. Na používanie služby X vrátane platených služieb a funkcií sa vždy vzťahuje zmluva s používateľom služby X. Ak nebudete sledovať a nebudete dodržiavať zmluvu s používateľom služby X alebo ak sa spoločnosť X domnieva, že ste nesledovali a nedodržiavali zmluvu s používateľom služby X, môže to viesť k zrušeniu služieb, ktoré vám boli zaplatené. Každé takéto zrušenie bude nad rámec a bez obmedzenia akéhokoľvek donucovacieho opatrenia, ktoré môže proti vám spoločnosť X prijať na základe zmluvy s používateľom služby X. V takýchto prípadoch môžete stratiť výhody svojich platených služieb a nebudete mať nárok na refundáciu žiadnej sumy, ktorú ste zaplatili (alebo predplatili) za platené služby. 2. Prečo vám spoločnosť X môže ukončiť prístup k plateným službám. Spoločnosť X môže pozastaviť alebo ukončiť váš prístup k plateným službám, prestať vám poskytovať všetky platené služby alebo ich časť, alebo podniknúť akékoľvek iné kroky, ktoré považuje za vhodné, vrátane napríklad pozastavenia vášho účtu (bez akejkoľvek zodpovednosti), a to z akéhokoľvek dôvodu alebo bez neho, okrem iného z nasledujúcich opodstatnených dôvodov: a. Spoločnosť X je presvedčená, že podľa vlastného uváženia ste porušili podmienky alebo vaše používanie platenej služby (služieb) by porušovalo akékoľvek platné zákony. b. Služba X je o to požiadaná alebo jej to nariaďuje akýkoľvek príslušný súd, regulačný orgán alebo orgán činný v trestnom konaní. c. Služba X má neočakávané technické alebo bezpečnostné problémy. d. Spoločnosť X sa domnieva podľa vlastného opodstatneného uváženia, že ste porušili Zmluvu s používateľom služby X; e. X sa domnieva, že z opodstatnených dôvodov, napríklad ak sa zapájate do manipulácie, hrania hier alebo iného rušivého alebo zakázaného správania v súvislosti s platenými službami; f.  Vytvárate riziko alebo možné právne ohrozenie pre spoločnosť X; g. Váš účet by mal byť odstránený z dôvodu dlhodobej nečinnosti alebo h. Váš účet by mal byť odstránený z dôvodu dlhodobej nečinnosti alebo i. Naše poskytovanie platených služieb (úplne alebo čiastočne) vám už nie je komerčne životaschopné (podľa vlastného uváženia X). 3. Všetky transakcie sú konečné. Všetky platby za platené služby sú konečné a nie sú refundovateľné ani vymeniteľné, okrem prípadov, keď to vyžaduje uplatniteľné právo. Neposkytujeme žiadnu záruku, pokiaľ ide o povahu, kvalitu alebo hodnotu platenej služby alebo jej dostupnosť či dodávku. Náhrady alebo úvery sa neposkytujú za žiadnu nevyužitú alebo čiastočne využitú platenú službu (napríklad za čiastočne využité obdobie predplatného).  4. Platené služby sú neprenosné medzi účtami v službe X. Každý nákup platenej služby sa vzťahuje na jeden účet v službe X, čo znamená, že váš nákup sa bude vzťahovať výlučne na účet, ktorý ste používali pri zakúpení platenej služby a nebude sa vzťahovať na iné účty, ku ktorým môžete mať prístup alebo kontrolu nad nimi. Ak máte alebo kontrolujete viac účtov a chcete prístup k plateným službám na každom účte, musíte si zakúpiť platenú službu na každom účte jednotlivo. 5. Obmedzenia a povinnosti.  a. Platenú službu si môžete zakúpiť a používať len vtedy, ak máte zo zákona povolené používať platenú službu vo vašej krajine a žijete v krajine podporovanej spoločnosťou X pre platenú službu. Spoločnosť X môže podľa vlastného uváženia v určitých krajinách obmedziť možnosť prístupu k platenej službe alebo jej nákupu. Služba X si vyhradzuje právo priebežne upravovať zoznam podporovaných krajín. b. Vyhradzujeme si právo odmietnuť transakcie platených služieb alebo zrušiť či prerušiť predaj alebo používanie platenej služby podľa vlastného uváženia.  c.  Nesmiete povoliť iným používať váš účet v službe X na prístup k akejkoľvek platenej službe, ktorú si takáto osoba neobjednala. d. Platenú službu si nemôžete zakúpiť ani používať, ak ste osobou, s ktorou osoby v USA nemajú povolenie obchodovať na základe hospodárskych sankcií, vrátane, bez obmedzenia, sankcií, ktoré spravuje Ministerstvo zahraničných vecí Ministerstva financií Spojených štátov alebo akýkoľvek iný príslušný sankčný orgán (" zakázaná osoba "). To okrem iného zahŕňa osoby, ktoré sa nachádzajú v nasledujúcich krajinách a regiónoch alebo v nich majú obvyklý pobyt: Kuba, Irán, ukrajinské regióny Krymu, Severná Kórea a Sýria. Vyhlasujete a zaručujete, že nie ste zakázaná osoba. e. UVÁDZATE, ŽE PLATENÉ SLUŽBY BUDETE POUŽÍVAŤ LEN NA ZÁKONNÉ ÚČELY A LEN V SÚLADE S PODMIENKAMI. Dane a poplatky . Zodpovedáte a súhlasíte s tým, že zaplatíte všetky príslušné dane, clá, tarify a poplatky súvisiace s nákupom platených služieb vrátane tých, ktoré je potrebné zaplatiť buď X, alebo spracovateľovi platieb tretej strany. Tieto dane môžu okrem iného zahŕňať DPH, DPH, DPH, daň z predaja, zrážkovú daň a všetky ostatné príslušné dane. V závislosti od vašej lokality môže byť spoločnosť X zodpovedná za zhromažďovanie a vykazovanie informácií týkajúcich sa daní z transakcií vyplývajúcich z vášho nákupu platených služieb. Udeľujete spoločnosti X povolenie na poskytovanie vášho účtu a osobných informácií príslušným daňovým orgánom na plnenie našich povinností v oblasti zbierky daní a podávania správ. Všeobecné podmienky 1. Kontaktné údaje. Ak máte akékoľvek otázky týkajúce sa platených služieb alebo týchto podmienok, viac informácií môžete nájsť v  Centre pomoci pre platené služby spoločnosti X . Ak ste si už zakúpili platenú službu, môžete nás kontaktovať aj prostredníctvom odkazu na podporu, ktorý je k dispozícii v navigačnej ponuke vášho účtu v službe X v nastaveniach platby alebo pr
2026-01-13T08:48:39
https://twitter.com/intent/tweet/?text=AWS%20SDK%20for%20.NET%20v3.5%20Preview&via=awscloud&url=https://aws.amazon.com/blogs/developer/aws-sdk-for-net-v3-5-preview/
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://dev.to/new/tutorial
New Post - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Join the DEV Community DEV Community is a community of 3,676,891 amazing developers Continue with Apple Continue with Facebook Continue with Forem Continue with GitHub Continue with Google Continue with Twitter (X) OR Email Password Remember me Forgot password? By signing in, you are agreeing to our privacy policy , terms of use and code of conduct . New to DEV Community? Create account . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://twitter.com/intent/tweet?text=%22Marching%20Cubes%20algorithm%20written%20in%20Rust%22%20by%20EmberNoGlow%20%23DEVCommunity%20https%3A%2F%2Fdev.to%2Fembernoglow%2Fmarching-cubes-algorithm-written-in-rust-473d
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://docs.python.org/3/library/functions.html#float
Built-in Functions — Python 3.14.2 documentation Theme Auto Light Dark Previous topic Introduction Next topic Built-in Constants This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Standard Library » Built-in Functions | Theme Auto Light Dark | Built-in Functions ¶ The Python interpreter has a number of functions and types built into it that are always available. They are listed here in alphabetical order. Built-in Functions A abs() aiter() all() anext() any() ascii() B bin() bool() breakpoint() bytearray() bytes() C callable() chr() classmethod() compile() complex() D delattr() dict() dir() divmod() E enumerate() eval() exec() F filter() float() format() frozenset() G getattr() globals() H hasattr() hash() help() hex() I id() input() int() isinstance() issubclass() iter() L len() list() locals() M map() max() memoryview() min() N next() O object() oct() open() ord() P pow() print() property() R range() repr() reversed() round() S set() setattr() slice() sorted() staticmethod() str() sum() super() T tuple() type() V vars() Z zip() _ __import__() abs ( number , / ) ¶ Return the absolute value of a number. The argument may be an integer, a floating-point number, or an object implementing __abs__() . If the argument is a complex number, its magnitude is returned. aiter ( async_iterable , / ) ¶ Return an asynchronous iterator for an asynchronous iterable . Equivalent to calling x.__aiter__() . Note: Unlike iter() , aiter() has no 2-argument variant. Added in version 3.10. all ( iterable , / ) ¶ Return True if all elements of the iterable are true (or if the iterable is empty). Equivalent to: def all ( iterable ): for element in iterable : if not element : return False return True awaitable anext ( async_iterator , / ) ¶ awaitable anext ( async_iterator , default , / ) When awaited, return the next item from the given asynchronous iterator , or default if given and the iterator is exhausted. This is the async variant of the next() builtin, and behaves similarly. This calls the __anext__() method of async_iterator , returning an awaitable . Awaiting this returns the next value of the iterator. If default is given, it is returned if the iterator is exhausted, otherwise StopAsyncIteration is raised. Added in version 3.10. any ( iterable , / ) ¶ Return True if any element of the iterable is true. If the iterable is empty, return False . Equivalent to: def any ( iterable ): for element in iterable : if element : return True return False ascii ( object , / ) ¶ As repr() , return a string containing a printable representation of an object, but escape the non-ASCII characters in the string returned by repr() using \x , \u , or \U escapes. This generates a string similar to that returned by repr() in Python 2. bin ( integer , / ) ¶ Convert an integer number to a binary string prefixed with “0b”. The result is a valid Python expression. If integer is not a Python int object, it has to define an __index__() method that returns an integer. Some examples: >>> bin ( 3 ) '0b11' >>> bin ( - 10 ) '-0b1010' If the prefix “0b” is desired or not, you can use either of the following ways. >>> format ( 14 , '#b' ), format ( 14 , 'b' ) ('0b1110', '1110') >>> f ' { 14 : #b } ' , f ' { 14 : b } ' ('0b1110', '1110') See also enum.bin() to represent negative values as twos-complement. See also format() for more information. class bool ( object = False , / ) ¶ Return a Boolean value, i.e. one of True or False . The argument is converted using the standard truth testing procedure . If the argument is false or omitted, this returns False ; otherwise, it returns True . The bool class is a subclass of int (see Numeric Types — int, float, complex ). It cannot be subclassed further. Its only instances are False and True (see Boolean Type - bool ). Changed in version 3.7: The parameter is now positional-only. breakpoint ( * args , ** kws ) ¶ This function drops you into the debugger at the call site. Specifically, it calls sys.breakpointhook() , passing args and kws straight through. By default, sys.breakpointhook() calls pdb.set_trace() expecting no arguments. In this case, it is purely a convenience function so you don’t have to explicitly import pdb or type as much code to enter the debugger. However, sys.breakpointhook() can be set to some other function and breakpoint() will automatically call that, allowing you to drop into the debugger of choice. If sys.breakpointhook() is not accessible, this function will raise RuntimeError . By default, the behavior of breakpoint() can be changed with the PYTHONBREAKPOINT environment variable. See sys.breakpointhook() for usage details. Note that this is not guaranteed if sys.breakpointhook() has been replaced. Raises an auditing event builtins.breakpoint with argument breakpointhook . Added in version 3.7. class bytearray ( source = b'' ) class bytearray ( source , encoding , errors = 'strict' ) Return a new array of bytes. The bytearray class is a mutable sequence of integers in the range 0 <= x < 256. It has most of the usual methods of mutable sequences, described in Mutable Sequence Types , as well as most methods that the bytes type has, see Bytes and Bytearray Operations . The optional source parameter can be used to initialize the array in a few different ways: If it is a string , you must also give the encoding (and optionally, errors ) parameters; bytearray() then converts the string to bytes using str.encode() . If it is an integer , the array will have that size and will be initialized with null bytes. If it is an object conforming to the buffer interface , a read-only buffer of the object will be used to initialize the bytes array. If it is an iterable , it must be an iterable of integers in the range 0 <= x < 256 , which are used as the initial contents of the array. Without an argument, an array of size 0 is created. See also Binary Sequence Types — bytes, bytearray, memoryview and Bytearray Objects . class bytes ( source = b'' ) class bytes ( source , encoding , errors = 'strict' ) Return a new “bytes” object which is an immutable sequence of integers in the range 0 <= x < 256 . bytes is an immutable version of bytearray – it has the same non-mutating methods and the same indexing and slicing behavior. Accordingly, constructor arguments are interpreted as for bytearray() . Bytes objects can also be created with literals, see String and Bytes literals . See also Binary Sequence Types — bytes, bytearray, memoryview , Bytes Objects , and Bytes and Bytearray Operations . callable ( object , / ) ¶ Return True if the object argument appears callable, False if not. If this returns True , it is still possible that a call fails, but if it is False , calling object will never succeed. Note that classes are callable (calling a class returns a new instance); instances are callable if their class has a __call__() method. Added in version 3.2: This function was first removed in Python 3.0 and then brought back in Python 3.2. chr ( codepoint , / ) ¶ Return the string representing a character with the specified Unicode code point. For example, chr(97) returns the string 'a' , while chr(8364) returns the string '€' . This is the inverse of ord() . The valid range for the argument is from 0 through 1,114,111 (0x10FFFF in base 16). ValueError will be raised if it is outside that range. @ classmethod ¶ Transform a method into a class method. A class method receives the class as an implicit first argument, just like an instance method receives the instance. To declare a class method, use this idiom: class C : @classmethod def f ( cls , arg1 , arg2 ): ... The @classmethod form is a function decorator – see Function definitions for details. A class method can be called either on the class (such as C.f() ) or on an instance (such as C().f() ). The instance is ignored except for its class. If a class method is called for a derived class, the derived class object is passed as the implied first argument. Class methods are different than C++ or Java static methods. If you want those, see staticmethod() in this section. For more information on class methods, see The standard type hierarchy . Changed in version 3.9: Class methods can now wrap other descriptors such as property() . Changed in version 3.10: Class methods now inherit the method attributes ( __module__ , __name__ , __qualname__ , __doc__ and __annotations__ ) and have a new __wrapped__ attribute. Deprecated since version 3.11, removed in version 3.13: Class methods can no longer wrap other descriptors such as property() . compile ( source , filename , mode , flags = 0 , dont_inherit = False , optimize = -1 ) ¶ Compile the source into a code or AST object. Code objects can be executed by exec() or eval() . source can either be a normal string, a byte string, or an AST object. Refer to the ast module documentation for information on how to work with AST objects. The filename argument should give the file from which the code was read; pass some recognizable value if it wasn’t read from a file ( '<string>' is commonly used). The mode argument specifies what kind of code must be compiled; it can be 'exec' if source consists of a sequence of statements, 'eval' if it consists of a single expression, or 'single' if it consists of a single interactive statement (in the latter case, expression statements that evaluate to something other than None will be printed). The optional arguments flags and dont_inherit control which compiler options should be activated and which future features should be allowed. If neither is present (or both are zero) the code is compiled with the same flags that affect the code that is calling compile() . If the flags argument is given and dont_inherit is not (or is zero) then the compiler options and the future statements specified by the flags argument are used in addition to those that would be used anyway. If dont_inherit is a non-zero integer then the flags argument is it – the flags (future features and compiler options) in the surrounding code are ignored. Compiler options and future statements are specified by bits which can be bitwise ORed together to specify multiple options. The bitfield required to specify a given future feature can be found as the compiler_flag attribute on the _Feature instance in the __future__ module. Compiler flags can be found in ast module, with PyCF_ prefix. The argument optimize specifies the optimization level of the compiler; the default value of -1 selects the optimization level of the interpreter as given by -O options. Explicit levels are 0 (no optimization; __debug__ is true), 1 (asserts are removed, __debug__ is false) or 2 (docstrings are removed too). This function raises SyntaxError or ValueError if the compiled source is invalid. If you want to parse Python code into its AST representation, see ast.parse() . Raises an auditing event compile with arguments source and filename . This event may also be raised by implicit compilation. Note When compiling a string with multi-line code in 'single' or 'eval' mode, input must be terminated by at least one newline character. This is to facilitate detection of incomplete and complete statements in the code module. Warning It is possible to crash the Python interpreter with a sufficiently large/complex string when compiling to an AST object due to stack depth limitations in Python’s AST compiler. Changed in version 3.2: Allowed use of Windows and Mac newlines. Also, input in 'exec' mode does not have to end in a newline anymore. Added the optimize parameter. Changed in version 3.5: Previously, TypeError was raised when null bytes were encountered in source . Added in version 3.8: ast.PyCF_ALLOW_TOP_LEVEL_AWAIT can now be passed in flags to enable support for top-level await , async for , and async with . class complex ( number = 0 , / ) ¶ class complex ( string , / ) class complex ( real = 0 , imag = 0 ) Convert a single string or number to a complex number, or create a complex number from real and imaginary parts. Examples: >>> complex ( '+1.23' ) (1.23+0j) >>> complex ( '-4.5j' ) -4.5j >>> complex ( '-1.23+4.5j' ) (-1.23+4.5j) >>> complex ( ' \t ( -1.23+4.5J ) \n ' ) (-1.23+4.5j) >>> complex ( '-Infinity+NaNj' ) (-inf+nanj) >>> complex ( 1.23 ) (1.23+0j) >>> complex ( imag =- 4.5 ) -4.5j >>> complex ( - 1.23 , 4.5 ) (-1.23+4.5j) If the argument is a string, it must contain either a real part (in the same format as for float() ) or an imaginary part (in the same format but with a 'j' or 'J' suffix), or both real and imaginary parts (the sign of the imaginary part is mandatory in this case). The string can optionally be surrounded by whitespaces and the round parentheses '(' and ')' , which are ignored. The string must not contain whitespace between '+' , '-' , the 'j' or 'J' suffix, and the decimal number. For example, complex('1+2j') is fine, but complex('1 + 2j') raises ValueError . More precisely, the input must conform to the complexvalue production rule in the following grammar, after parentheses and leading and trailing whitespace characters are removed: complexvalue : floatvalue | floatvalue ( "j" | "J" ) | floatvalue sign absfloatvalue ( "j" | "J" ) If the argument is a number, the constructor serves as a numeric conversion like int and float . For a general Python object x , complex(x) delegates to x.__complex__() . If __complex__() is not defined then it falls back to __float__() . If __float__() is not defined then it falls back to __index__() . If two arguments are provided or keyword arguments are used, each argument may be any numeric type (including complex). If both arguments are real numbers, return a complex number with the real component real and the imaginary component imag . If both arguments are complex numbers, return a complex number with the real component real.real-imag.imag and the imaginary component real.imag+imag.real . If one of arguments is a real number, only its real component is used in the above expressions. See also complex.from_number() which only accepts a single numeric argument. If all arguments are omitted, returns 0j . The complex type is described in Numeric Types — int, float, complex . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.8: Falls back to __index__() if __complex__() and __float__() are not defined. Deprecated since version 3.14: Passing a complex number as the real or imag argument is now deprecated; it should only be passed as a single positional argument. delattr ( object , name , / ) ¶ This is a relative of setattr() . The arguments are an object and a string. The string must be the name of one of the object’s attributes. The function deletes the named attribute, provided the object allows it. For example, delattr(x, 'foobar') is equivalent to del x.foobar . name need not be a Python identifier (see setattr() ). class dict ( ** kwargs ) class dict ( mapping , / , ** kwargs ) class dict ( iterable , / , ** kwargs ) Create a new dictionary. The dict object is the dictionary class. See dict and Mapping Types — dict for documentation about this class. For other containers see the built-in list , set , and tuple classes, as well as the collections module. dir ( ) ¶ dir ( object , / ) Without arguments, return the list of names in the current local scope. With an argument, attempt to return a list of valid attributes for that object. If the object has a method named __dir__() , this method will be called and must return the list of attributes. This allows objects that implement a custom __getattr__() or __getattribute__() function to customize the way dir() reports their attributes. If the object does not provide __dir__() , the function tries its best to gather information from the object’s __dict__ attribute, if defined, and from its type object. The resulting list is not necessarily complete and may be inaccurate when the object has a custom __getattr__() . The default dir() mechanism behaves differently with different types of objects, as it attempts to produce the most relevant, rather than complete, information: If the object is a module object, the list contains the names of the module’s attributes. If the object is a type or class object, the list contains the names of its attributes, and recursively of the attributes of its bases. Otherwise, the list contains the object’s attributes’ names, the names of its class’s attributes, and recursively of the attributes of its class’s base classes. The resulting list is sorted alphabetically. For example: >>> import struct >>> dir () # show the names in the module namespace ['__builtins__', '__name__', 'struct'] >>> dir ( struct ) # show the names in the struct module ['Struct', '__all__', '__builtins__', '__cached__', '__doc__', '__file__', '__initializing__', '__loader__', '__name__', '__package__', '_clearcache', 'calcsize', 'error', 'pack', 'pack_into', 'unpack', 'unpack_from'] >>> class Shape : ... def __dir__ ( self ): ... return [ 'area' , 'perimeter' , 'location' ] ... >>> s = Shape () >>> dir ( s ) ['area', 'location', 'perimeter'] Note Because dir() is supplied primarily as a convenience for use at an interactive prompt, it tries to supply an interesting set of names more than it tries to supply a rigorously or consistently defined set of names, and its detailed behavior may change across releases. For example, metaclass attributes are not in the result list when the argument is a class. divmod ( a , b , / ) ¶ Take two (non-complex) numbers as arguments and return a pair of numbers consisting of their quotient and remainder when using integer division. With mixed operand types, the rules for binary arithmetic operators apply. For integers, the result is the same as (a // b, a % b) . For floating-point numbers the result is (q, a % b) , where q is usually math.floor(a / b) but may be 1 less than that. In any case q * b + a % b is very close to a , if a % b is non-zero it has the same sign as b , and 0 <= abs(a % b) < abs(b) . enumerate ( iterable , start = 0 ) ¶ Return an enumerate object. iterable must be a sequence, an iterator , or some other object which supports iteration. The __next__() method of the iterator returned by enumerate() returns a tuple containing a count (from start which defaults to 0) and the values obtained from iterating over iterable . >>> seasons = [ 'Spring' , 'Summer' , 'Fall' , 'Winter' ] >>> list ( enumerate ( seasons )) [(0, 'Spring'), (1, 'Summer'), (2, 'Fall'), (3, 'Winter')] >>> list ( enumerate ( seasons , start = 1 )) [(1, 'Spring'), (2, 'Summer'), (3, 'Fall'), (4, 'Winter')] Equivalent to: def enumerate ( iterable , start = 0 ): n = start for elem in iterable : yield n , elem n += 1 eval ( source , / , globals = None , locals = None ) ¶ Parameters : source ( str | code object ) – A Python expression. globals ( dict | None ) – The global namespace (default: None ). locals ( mapping | None ) – The local namespace (default: None ). Returns : The result of the evaluated expression. Raises : Syntax errors are reported as exceptions. Warning This function executes arbitrary code. Calling it with user-supplied input may lead to security vulnerabilities. The source argument is parsed and evaluated as a Python expression (technically speaking, a condition list) using the globals and locals mappings as global and local namespace. If the globals dictionary is present and does not contain a value for the key __builtins__ , a reference to the dictionary of the built-in module builtins is inserted under that key before source is parsed. That way you can control what builtins are available to the executed code by inserting your own __builtins__ dictionary into globals before passing it to eval() . If the locals mapping is omitted it defaults to the globals dictionary. If both mappings are omitted, the source is executed with the globals and locals in the environment where eval() is called. Note, eval() will only have access to the nested scopes (non-locals) in the enclosing environment if they are already referenced in the scope that is calling eval() (e.g. via a nonlocal statement). Example: >>> x = 1 >>> eval ( 'x+1' ) 2 This function can also be used to execute arbitrary code objects (such as those created by compile() ). In this case, pass a code object instead of a string. If the code object has been compiled with 'exec' as the mode argument, eval() 's return value will be None . Hints: dynamic execution of statements is supported by the exec() function. The globals() and locals() functions return the current global and local dictionary, respectively, which may be useful to pass around for use by eval() or exec() . If the given source is a string, then leading and trailing spaces and tabs are stripped. See ast.literal_eval() for a function that can safely evaluate strings with expressions containing only literals. Raises an auditing event exec with the code object as the argument. Code compilation events may also be raised. Changed in version 3.13: The globals and locals arguments can now be passed as keywords. Changed in version 3.13: The semantics of the default locals namespace have been adjusted as described for the locals() builtin. exec ( source , / , globals = None , locals = None , * , closure = None ) ¶ Warning This function executes arbitrary code. Calling it with user-supplied input may lead to security vulnerabilities. This function supports dynamic execution of Python code. source must be either a string or a code object. If it is a string, the string is parsed as a suite of Python statements which is then executed (unless a syntax error occurs). [ 1 ] If it is a code object, it is simply executed. In all cases, the code that’s executed is expected to be valid as file input (see the section File input in the Reference Manual). Be aware that the nonlocal , yield , and return statements may not be used outside of function definitions even within the context of code passed to the exec() function. The return value is None . In all cases, if the optional parts are omitted, the code is executed in the current scope. If only globals is provided, it must be a dictionary (and not a subclass of dictionary), which will be used for both the global and the local variables. If globals and locals are given, they are used for the global and local variables, respectively. If provided, locals can be any mapping object. Remember that at the module level, globals and locals are the same dictionary. Note When exec gets two separate objects as globals and locals , the code will be executed as if it were embedded in a class definition. This means functions and classes defined in the executed code will not be able to access variables assigned at the top level (as the “top level” variables are treated as class variables in a class definition). If the globals dictionary does not contain a value for the key __builtins__ , a reference to the dictionary of the built-in module builtins is inserted under that key. That way you can control what builtins are available to the executed code by inserting your own __builtins__ dictionary into globals before passing it to exec() . The closure argument specifies a closure–a tuple of cellvars. It’s only valid when the object is a code object containing free (closure) variables . The length of the tuple must exactly match the length of the code object’s co_freevars attribute. Raises an auditing event exec with the code object as the argument. Code compilation events may also be raised. Note The built-in functions globals() and locals() return the current global and local namespace, respectively, which may be useful to pass around for use as the second and third argument to exec() . Note The default locals act as described for function locals() below. Pass an explicit locals dictionary if you need to see effects of the code on locals after function exec() returns. Changed in version 3.11: Added the closure parameter. Changed in version 3.13: The globals and locals arguments can now be passed as keywords. Changed in version 3.13: The semantics of the default locals namespace have been adjusted as described for the locals() builtin. filter ( function , iterable , / ) ¶ Construct an iterator from those elements of iterable for which function is true. iterable may be either a sequence, a container which supports iteration, or an iterator. If function is None , the identity function is assumed, that is, all elements of iterable that are false are removed. Note that filter(function, iterable) is equivalent to the generator expression (item for item in iterable if function(item)) if function is not None and (item for item in iterable if item) if function is None . See itertools.filterfalse() for the complementary function that returns elements of iterable for which function is false. class float ( number = 0.0 , / ) ¶ class float ( string , / ) Return a floating-point number constructed from a number or a string. Examples: >>> float ( '+1.23' ) 1.23 >>> float ( ' -12345 \n ' ) -12345.0 >>> float ( '1e-003' ) 0.001 >>> float ( '+1E6' ) 1000000.0 >>> float ( '-Infinity' ) -inf If the argument is a string, it should contain a decimal number, optionally preceded by a sign, and optionally embedded in whitespace. The optional sign may be '+' or '-' ; a '+' sign has no effect on the value produced. The argument may also be a string representing a NaN (not-a-number), or positive or negative infinity. More precisely, the input must conform to the floatvalue production rule in the following grammar, after leading and trailing whitespace characters are removed: sign : "+" | "-" infinity : "Infinity" | "inf" nan : "nan" digit : <a Unicode decimal digit, i.e. characters in Unicode general category Nd> digitpart : digit ([ "_" ] digit )* number : [ digitpart ] "." digitpart | digitpart [ "." ] exponent : ( "e" | "E" ) [ sign ] digitpart floatnumber : number [ exponent ] absfloatvalue : floatnumber | infinity | nan floatvalue : [ sign ] absfloatvalue Case is not significant, so, for example, “inf”, “Inf”, “INFINITY”, and “iNfINity” are all acceptable spellings for positive infinity. Otherwise, if the argument is an integer or a floating-point number, a floating-point number with the same value (within Python’s floating-point precision) is returned. If the argument is outside the range of a Python float, an OverflowError will be raised. For a general Python object x , float(x) delegates to x.__float__() . If __float__() is not defined then it falls back to __index__() . See also float.from_number() which only accepts a numeric argument. If no argument is given, 0.0 is returned. The float type is described in Numeric Types — int, float, complex . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.7: The parameter is now positional-only. Changed in version 3.8: Falls back to __index__() if __float__() is not defined. format ( value , format_spec = '' , / ) ¶ Convert a value to a “formatted” representation, as controlled by format_spec . The interpretation of format_spec will depend on the type of the value argument; however, there is a standard formatting syntax that is used by most built-in types: Format Specification Mini-Language . The default format_spec is an empty string which usually gives the same effect as calling str(value) . A call to format(value, format_spec) is translated to type(value).__format__(value, format_spec) which bypasses the instance dictionary when searching for the value’s __format__() method. A TypeError exception is raised if the method search reaches object and the format_spec is non-empty, or if either the format_spec or the return value are not strings. Changed in version 3.4: object().__format__(format_spec) raises TypeError if format_spec is not an empty string. class frozenset ( iterable = () , / ) Return a new frozenset object, optionally with elements taken from iterable . frozenset is a built-in class. See frozenset and Set Types — set, frozenset for documentation about this class. For other containers see the built-in set , list , tuple , and dict classes, as well as the collections module. getattr ( object , name , / ) ¶ getattr ( object , name , default , / ) Return the value of the named attribute of object . name must be a string. If the string is the name of one of the object’s attributes, the result is the value of that attribute. For example, getattr(x, 'foobar') is equivalent to x.foobar . If the named attribute does not exist, default is returned if provided, otherwise AttributeError is raised. name need not be a Python identifier (see setattr() ). Note Since private name mangling happens at compilation time, one must manually mangle a private attribute’s (attributes with two leading underscores) name in order to retrieve it with getattr() . globals ( ) ¶ Return the dictionary implementing the current module namespace. For code within functions, this is set when the function is defined and remains the same regardless of where the function is called. hasattr ( object , name , / ) ¶ The arguments are an object and a string. The result is True if the string is the name of one of the object’s attributes, False if not. (This is implemented by calling getattr(object, name) and seeing whether it raises an AttributeError or not.) hash ( object , / ) ¶ Return the hash value of the object (if it has one). Hash values are integers. They are used to quickly compare dictionary keys during a dictionary lookup. Numeric values that compare equal have the same hash value (even if they are of different types, as is the case for 1 and 1.0). Note For objects with custom __hash__() methods, note that hash() truncates the return value based on the bit width of the host machine. help ( ) ¶ help ( request ) Invoke the built-in help system. (This function is intended for interactive use.) If no argument is given, the interactive help system starts on the interpreter console. If the argument is a string, then the string is looked up as the name of a module, function, class, method, keyword, or documentation topic, and a help page is printed on the console. If the argument is any other kind of object, a help page on the object is generated. Note that if a slash(/) appears in the parameter list of a function when invoking help() , it means that the parameters prior to the slash are positional-only. For more info, see the FAQ entry on positional-only parameters . This function is added to the built-in namespace by the site module. Changed in version 3.4: Changes to pydoc and inspect mean that the reported signatures for callables are now more comprehensive and consistent. hex ( integer , / ) ¶ Convert an integer number to a lowercase hexadecimal string prefixed with “0x”. If integer is not a Python int object, it has to define an __index__() method that returns an integer. Some examples: >>> hex ( 255 ) '0xff' >>> hex ( - 42 ) '-0x2a' If you want to convert an integer number to an uppercase or lower hexadecimal string with prefix or not, you can use either of the following ways: >>> ' %#x ' % 255 , ' %x ' % 255 , ' %X ' % 255 ('0xff', 'ff', 'FF') >>> format ( 255 , '#x' ), format ( 255 , 'x' ), format ( 255 , 'X' ) ('0xff', 'ff', 'FF') >>> f ' { 255 : #x } ' , f ' { 255 : x } ' , f ' { 255 : X } ' ('0xff', 'ff', 'FF') See also format() for more information. See also int() for converting a hexadecimal string to an integer using a base of 16. Note To obtain a hexadecimal string representation for a float, use the float.hex() method. id ( object , / ) ¶ Return the “identity” of an object. This is an integer which is guaranteed to be unique and constant for this object during its lifetime. Two objects with non-overlapping lifetimes may have the same id() value. CPython implementation detail: This is the address of the object in memory. Raises an auditing event builtins.id with argument id . input ( ) ¶ input ( prompt , / ) If the prompt argument is present, it is written to standard output without a trailing newline. The function then reads a line from input, converts it to a string (stripping a trailing newline), and returns that. When EOF is read, EOFError is raised. Example: >>> s = input ( '--> ' ) --> Monty Python's Flying Circus >>> s "Monty Python's Flying Circus" If the readline module was loaded, then input() will use it to provide elaborate line editing and history features. Raises an auditing event builtins.input with argument prompt before reading input Raises an auditing event builtins.input/result with the result after successfully reading input. class int ( number = 0 , / ) ¶ class int ( string , / , base = 10 ) Return an integer object constructed from a number or a string, or return 0 if no arguments are given. Examples: >>> int ( 123.45 ) 123 >>> int ( '123' ) 123 >>> int ( ' -12_345 \n ' ) -12345 >>> int ( 'FACE' , 16 ) 64206 >>> int ( '0xface' , 0 ) 64206 >>> int ( '01110011' , base = 2 ) 115 If the argument defines __int__() , int(x) returns x.__int__() . If the argument defines __index__() , it returns x.__index__() . For floating-point numbers, this truncates towards zero. If the argument is not a number or if base is given, then it must be a string, bytes , or bytearray instance representing an integer in radix base . Optionally, the string can be preceded by + or - (with no space in between), have leading zeros, be surrounded by whitespace, and have single underscores interspersed between digits. A base-n integer string contains digits, each representing a value from 0 to n-1. The values 0–9 can be represented by any Unicode decimal digit. The values 10–35 can be represented by a to z (or A to Z ). The default base is 10. The allowed bases are 0 and 2–36. Base-2, -8, and -16 strings can be optionally prefixed with 0b / 0B , 0o / 0O , or 0x / 0X , as with integer literals in code. For base 0, the string is interpreted in a similar way to an integer literal in code , in that the actual base is 2, 8, 10, or 16 as determined by the prefix. Base 0 also disallows leading zeros: int('010', 0) is not legal, while int('010') and int('010', 8) are. The integer type is described in Numeric Types — int, float, complex . Changed in version 3.4: If base is not an instance of int and the base object has a base.__index__ method, that method is called to obtain an integer for the base. Previous versions used base.__int__ instead of base.__index__ . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.7: The first parameter is now positional-only. Changed in version 3.8: Falls back to __index__() if __int__() is not defined. Changed in version 3.11: int string inputs and string representations can be limited to help avoid denial of service attacks. A ValueError is raised when the limit is exceeded while converting a string to an int or when converting an int into a string would exceed the limit. See the integer string conversion length limitation documentation. Changed in version 3.14: int() no longer delegates to the __trunc__() method. isinstance ( object , classinfo , / ) ¶ Return True if the object argument is an instance of the classinfo argument, or of a (direct, indirect, or virtual ) subclass thereof. If object is not an object of the given type, the function always returns False . If classinfo is a tuple of type objects (or recursively, other such tuples) or a Union Type of multiple types, return True if object is an instance of any of the types. If classinfo is not a type or tuple of types and such tuples, a TypeError exception is raised. TypeError may not be raised for an invalid type if an earlier check succeeds. Changed in version 3.10: classinfo can be a Union Type . issubclass ( class , classinfo , / ) ¶ Return True if class is a subclass (direct, indirect, or virtual ) of classinfo . A class is considered a subclass of itself. classinfo may be a tuple of class objects (or recursively, other such tuples) or a Union Type , in which case return True if class is a subclass of any entry in classinfo . In any other case, a TypeError exception is raised. Changed in version 3.10: classinfo can be a Union Type . iter ( iterable , / ) ¶ iter ( callable , sentinel , / ) Return an iterator object. The first argument is interpreted very differently depending on the presence of the second argument. Without a second argument, the single argument must be a collection object which supports the iterable protocol (the __iter__() method), or it must support the sequence protocol (the __getitem__() method with integer arguments starting at 0 ). If it does not support either of those protocols, TypeError is raised. If the second argument, sentinel , is given, then the first argument must be a callable object. The iterator created in this case will call callable with no arguments for each call to its __next__() method; if the value returned is equal to sentinel , StopIteration will be raised, otherwise the value will be returned. See also Iterator Types . One useful application of the second form of iter() is to build a block-reader. For example, reading fixed-width blocks from a binary database file until the end of file is reached: from functools import partial with open ( 'mydata.db' , 'rb' ) as f : for block in iter ( partial ( f . read , 64 ), b '' ): process_block ( block ) len ( object , / ) ¶ Return the length (the number of items) of an object. The argument may be a sequence (such as a string, bytes, tuple, list, or range) or a collection (such as a dictionary, set, or frozen set). CPython implementation detail: len raises OverflowError on lengths larger than sys.maxsize , such as range(2 ** 100) . class list ( iterable = () , / ) Rather than being a function, list is actually a mutable sequence type, as documented in Lists and Sequence Types — list, tuple, range . locals ( ) ¶ Return a mapping object representing the current local symbol table, with variable names as the keys, and their currently bound references as the values. At module scope, as well as when using exec() or eval() with a single namespace, this function returns the same namespace as globals() . At class scope, it returns the namespace that will be passed to the metaclass constructor. When using exec() or eval() with separate local and global arguments, it returns the local namespace passed in to the function call. In all of the above cases, each call to locals() in a given frame of execution will return the same mapping object. Changes made through the mapping object returned from locals() will be visible as assigned, reassigned, or deleted local variables, and assigning, reassigning, or deleting local variables will immediately affect the contents of the returned mapping object. In an optimized scope (including functions, generators, and coroutines), each call to locals() instead returns a fresh dictionary containing the current bindings of the function’s local variables and any nonlocal cell references. In this case, name binding changes made via the returned dict are not written back to the corresponding local variables or nonlocal cell references, and assigning, reassigning, or deleting local variables and nonlocal cell references does not affect the contents of previously returned dictionaries. Calling locals() as part of a comprehension in a function, generator, or coroutine is equivalent to calling it in the containing scope, except that the comprehension’s initialised iteration variables will be included. In other scopes, it behaves as if the comprehension were running as a nested function. Calling locals() as part of a generator expression is equivalent to calling it in a nested generator function. Changed in version 3.12: The behaviour of locals() in a comprehension has been updated as described in PEP 709 . Changed in version 3.13: As part of PEP 667 , the semantics of mutating the mapping objects returned from this function are now defined. The behavior in optimized scopes is now as described above. Aside from being defined, the behaviour in other scopes remains unchanged from previous versions. map ( function , iterable , / , * iterables , strict = False ) ¶ Return an iterator that applies function to every item of iterable , yielding the results. If additional iterables arguments are passed, function must take that many arguments and is applied to the items from all iterables in parallel. With multiple iterables, the iterator stops when the shortest iterable is exhausted. If strict is True and one of the iterables is exhausted before the others, a ValueError is raised. For cases where the function inputs are already arranged into argument tuples, see itertools.starmap() . Changed in version 3.14: Added the strict parameter. max ( iterable , / , * , key = None ) ¶ max ( iterable , / , * , default , key = None ) max ( arg1 , arg2 , / , * args , key = None ) Return the largest item in an iterable or the largest of two or more arguments. If one positional argument is provided, it should be an iterable . The largest item in the iterable is returned. If two or more positional arguments are provided, the largest of the positional arguments is returned. There are two optional keyword-only arguments. The key argument specifies a one-argument ordering function like that used for list.sort() . The default argument specifies an object to return if the provided iterable is empty. If the iterable is empty and default is not provided, a ValueError is raised. If multiple items are maximal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as sorted(iterable, key=keyfunc, reverse=True)[0] and heapq.nlargest(1, iterable, key=keyfunc) . Changed in version 3.4: Added the default keyword-only parameter. Changed in version 3.8: The key can be None . class memoryview ( object ) Return a “memory view” object created from the given argument. See Memory Views for more information. min ( iterable , / , * , key = None ) ¶ min ( iterable , / , * , default , key = None ) min ( arg1 , arg2 , / , * args , key = None ) Return the smallest item in an iterable or the smallest of two or more arguments. If one positional argument is provided, it should be an iterable . The smallest item in the iterable is returned. If two or more positional arguments are provided, the smallest of the positional arguments is returned. There are two optional keyword-only arguments. The key argument specifies a one-argument ordering function like that used for list.sort() . The default argument specifies an object to return if the provided iterable is empty. If the iterable is empty and default is not provided, a ValueError is raised. If multiple items are minimal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as sorted(iterable, key=keyfunc)[0] and heapq.nsmallest(1, iterable, key=keyfunc) . Changed in version 3.4: Added the default keyword-only parameter. Changed in version 3.8: The key can be None . next ( iterator , / ) ¶ next ( iterator , default , / ) Retrieve the next item from the iterator by calling its __next__() method. If default is given, it is returned if the iterator is exhausted, otherwise StopIteration is raised. class object ¶ This is the ultimate base class of all other classes. It has methods that are common to all instances of Python classes. When the constructor is called, it returns a new featureless object. The constructor does not accept any arguments. Note object instances do not have __dict__ attributes, so you can’t assign arbitrary attributes to an instance of object . oct ( integer , / ) ¶ Convert an integer number to an octal string prefixed with “0o”. The result is a valid Python expression. If integer is not a Python int object, it has to define an __index__() method that returns an integer. For example: >>> oct ( 8 ) '0o10' >>> oct ( - 56 ) '-0o70' If you want to convert an integer number to an octal string either with the prefix “0o” or not, you can use either of the following ways. >>> ' %#o ' % 10 , ' %o ' % 10 ('0o12', '12') >>> format ( 10 , '#o' ), format ( 10 , 'o' ) ('0o12', '12') >>> f ' { 10 : #o } ' , f ' { 10 : o } ' ('0o12', '12') See also format() for more information. open ( file , mode = 'r' , buffering = -1 , encoding = None , errors = None , newline = None , closefd = True , opener = None ) ¶ Open file and return a corresponding file object . If the file cannot be opened, an OSError is raised. See Reading and Writing Files for more examples of how to use this function. file is a path-like object giving the pathname (absolute or relative to the current working directory) of the file to be opened or an integer file descriptor of the file to be wrapped. (If a file descriptor is given, it is closed when the returned I/O object is closed unless closefd is set to False .) mode is an optional string that specifies the mode in which the file is opened. It defaults to 'r' which means open for reading in text mode. Other common values are 'w' for writing (truncating the file if it already exists), 'x' for exclusive creation, and 'a' for appending (which on some Unix systems, means that all writes append to the end of the file regardless of the current seek position). In text mode, if encoding is not specified the encoding used is platform-dependent: locale.getencoding() is called to get the current locale encoding. (For reading and writing raw bytes use binary mode and leave encoding unspecified.) The available modes are: Character Meaning 'r' open for reading (default) 'w' open for writing, truncating the file first 'x' open for exclusive creation, failing if the file already exists 'a' open for writing, appending to the end of file if it exists 'b' binary mode 't' text mode (default) '+' open for updating (reading and writing) The default mode is 'r' (open for reading text, a synonym of 'rt' ). Modes 'w+' and 'w+b' open and truncate the file. Modes 'r+' and 'r+b' open the file with no truncation. As mentioned in the Overview , Python distinguishes between binary and text I/O. Files opened in binary mode (including 'b' in the mode argument) return contents as bytes objects without any decoding. In text mode (the default, or when 't' is included in the mode argument), the contents of the file are returned as str , the bytes having been first decoded using a platform-dependent encoding or using the specified encoding if given. Note Python doesn’t depend on the underlying operating system’s notion of text files; all the processing is done by Python itself, and is therefore platform-independent. buffering is an optional integer used to set the buffering policy. Pass 0 to switch buffering off (only allowed in binary mode), 1 to select line buffering (only usable when writing in text mode), and an integer > 1 to indicate the size in bytes of a fixed-size chunk buffer. Note that specifying a buffer size this way applies for binary buffered I/O, but TextIOWrapper (i.e., files opened with mode='r+' ) would have another buffering. To disable buffering in TextIOWrapper , consider using the write_through flag for io.TextIOWrapper.reconfigure() . When no buffering argument is given, the default buffering policy works as follows: Binary files are buffered in fixed-size chunks; the size of the buffer is max(min(blocksize, 8 MiB), DEFAULT_BUFFER_SIZE) when the device block size is available. On most systems, the buffer will typically be 128 kilobytes long. “Interactive” text files (files for which isatty() returns True ) use line buffering. Other text files use the policy described above for binary files. encoding is the name of the encoding used to decode or encode the file. This should only be used in text mode. The default encoding is platform dependent (whatever locale.getencoding() returns), but any text encoding supported by Python can be used. See the codecs module for the list of supported encodings. errors is an optional string that specifies how encoding and decoding errors are to be handled—this cannot be used in binary mode. A variety of standard error handlers are available (listed under Error Handlers ), though any error handling name that has
2026-01-13T08:48:39
https://dev.to/adventures_in_ml/data-visualization-and-hugging-face-ml-131#main-content
Data Visualization and Hugging Face - ML 131 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Adventures in Machine Learning Follow Data Visualization and Hugging Face - ML 131 Nov 2 '23 play In today's episode, we chat with Sylvain Lesage from Hugging Face, a specialist in data visualization and software engineering. Dive in to discover insights about Hugging Face's software engineering environment, invaluable data visualization techniques, and more! Sponsors Zilliz , who makes  a vector database  for the enterprise Chuck's Resume Template Developer Book Club starting Become a Top 1% Dev with a Top End Devs Membership Socials LinkedIn: Sylvain Lesage Advertising Inquiries: https://redcircle.com/brands Privacy & Opt-Out: https://redcircle.com/privacy Episode source Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Your browser does not support the audio element. 1x initializing... × 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://docs.python.org/3/library/functions.html#int
Built-in Functions — Python 3.14.2 documentation Theme Auto Light Dark Previous topic Introduction Next topic Built-in Constants This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Standard Library » Built-in Functions | Theme Auto Light Dark | Built-in Functions ¶ The Python interpreter has a number of functions and types built into it that are always available. They are listed here in alphabetical order. Built-in Functions A abs() aiter() all() anext() any() ascii() B bin() bool() breakpoint() bytearray() bytes() C callable() chr() classmethod() compile() complex() D delattr() dict() dir() divmod() E enumerate() eval() exec() F filter() float() format() frozenset() G getattr() globals() H hasattr() hash() help() hex() I id() input() int() isinstance() issubclass() iter() L len() list() locals() M map() max() memoryview() min() N next() O object() oct() open() ord() P pow() print() property() R range() repr() reversed() round() S set() setattr() slice() sorted() staticmethod() str() sum() super() T tuple() type() V vars() Z zip() _ __import__() abs ( number , / ) ¶ Return the absolute value of a number. The argument may be an integer, a floating-point number, or an object implementing __abs__() . If the argument is a complex number, its magnitude is returned. aiter ( async_iterable , / ) ¶ Return an asynchronous iterator for an asynchronous iterable . Equivalent to calling x.__aiter__() . Note: Unlike iter() , aiter() has no 2-argument variant. Added in version 3.10. all ( iterable , / ) ¶ Return True if all elements of the iterable are true (or if the iterable is empty). Equivalent to: def all ( iterable ): for element in iterable : if not element : return False return True awaitable anext ( async_iterator , / ) ¶ awaitable anext ( async_iterator , default , / ) When awaited, return the next item from the given asynchronous iterator , or default if given and the iterator is exhausted. This is the async variant of the next() builtin, and behaves similarly. This calls the __anext__() method of async_iterator , returning an awaitable . Awaiting this returns the next value of the iterator. If default is given, it is returned if the iterator is exhausted, otherwise StopAsyncIteration is raised. Added in version 3.10. any ( iterable , / ) ¶ Return True if any element of the iterable is true. If the iterable is empty, return False . Equivalent to: def any ( iterable ): for element in iterable : if element : return True return False ascii ( object , / ) ¶ As repr() , return a string containing a printable representation of an object, but escape the non-ASCII characters in the string returned by repr() using \x , \u , or \U escapes. This generates a string similar to that returned by repr() in Python 2. bin ( integer , / ) ¶ Convert an integer number to a binary string prefixed with “0b”. The result is a valid Python expression. If integer is not a Python int object, it has to define an __index__() method that returns an integer. Some examples: >>> bin ( 3 ) '0b11' >>> bin ( - 10 ) '-0b1010' If the prefix “0b” is desired or not, you can use either of the following ways. >>> format ( 14 , '#b' ), format ( 14 , 'b' ) ('0b1110', '1110') >>> f ' { 14 : #b } ' , f ' { 14 : b } ' ('0b1110', '1110') See also enum.bin() to represent negative values as twos-complement. See also format() for more information. class bool ( object = False , / ) ¶ Return a Boolean value, i.e. one of True or False . The argument is converted using the standard truth testing procedure . If the argument is false or omitted, this returns False ; otherwise, it returns True . The bool class is a subclass of int (see Numeric Types — int, float, complex ). It cannot be subclassed further. Its only instances are False and True (see Boolean Type - bool ). Changed in version 3.7: The parameter is now positional-only. breakpoint ( * args , ** kws ) ¶ This function drops you into the debugger at the call site. Specifically, it calls sys.breakpointhook() , passing args and kws straight through. By default, sys.breakpointhook() calls pdb.set_trace() expecting no arguments. In this case, it is purely a convenience function so you don’t have to explicitly import pdb or type as much code to enter the debugger. However, sys.breakpointhook() can be set to some other function and breakpoint() will automatically call that, allowing you to drop into the debugger of choice. If sys.breakpointhook() is not accessible, this function will raise RuntimeError . By default, the behavior of breakpoint() can be changed with the PYTHONBREAKPOINT environment variable. See sys.breakpointhook() for usage details. Note that this is not guaranteed if sys.breakpointhook() has been replaced. Raises an auditing event builtins.breakpoint with argument breakpointhook . Added in version 3.7. class bytearray ( source = b'' ) class bytearray ( source , encoding , errors = 'strict' ) Return a new array of bytes. The bytearray class is a mutable sequence of integers in the range 0 <= x < 256. It has most of the usual methods of mutable sequences, described in Mutable Sequence Types , as well as most methods that the bytes type has, see Bytes and Bytearray Operations . The optional source parameter can be used to initialize the array in a few different ways: If it is a string , you must also give the encoding (and optionally, errors ) parameters; bytearray() then converts the string to bytes using str.encode() . If it is an integer , the array will have that size and will be initialized with null bytes. If it is an object conforming to the buffer interface , a read-only buffer of the object will be used to initialize the bytes array. If it is an iterable , it must be an iterable of integers in the range 0 <= x < 256 , which are used as the initial contents of the array. Without an argument, an array of size 0 is created. See also Binary Sequence Types — bytes, bytearray, memoryview and Bytearray Objects . class bytes ( source = b'' ) class bytes ( source , encoding , errors = 'strict' ) Return a new “bytes” object which is an immutable sequence of integers in the range 0 <= x < 256 . bytes is an immutable version of bytearray – it has the same non-mutating methods and the same indexing and slicing behavior. Accordingly, constructor arguments are interpreted as for bytearray() . Bytes objects can also be created with literals, see String and Bytes literals . See also Binary Sequence Types — bytes, bytearray, memoryview , Bytes Objects , and Bytes and Bytearray Operations . callable ( object , / ) ¶ Return True if the object argument appears callable, False if not. If this returns True , it is still possible that a call fails, but if it is False , calling object will never succeed. Note that classes are callable (calling a class returns a new instance); instances are callable if their class has a __call__() method. Added in version 3.2: This function was first removed in Python 3.0 and then brought back in Python 3.2. chr ( codepoint , / ) ¶ Return the string representing a character with the specified Unicode code point. For example, chr(97) returns the string 'a' , while chr(8364) returns the string '€' . This is the inverse of ord() . The valid range for the argument is from 0 through 1,114,111 (0x10FFFF in base 16). ValueError will be raised if it is outside that range. @ classmethod ¶ Transform a method into a class method. A class method receives the class as an implicit first argument, just like an instance method receives the instance. To declare a class method, use this idiom: class C : @classmethod def f ( cls , arg1 , arg2 ): ... The @classmethod form is a function decorator – see Function definitions for details. A class method can be called either on the class (such as C.f() ) or on an instance (such as C().f() ). The instance is ignored except for its class. If a class method is called for a derived class, the derived class object is passed as the implied first argument. Class methods are different than C++ or Java static methods. If you want those, see staticmethod() in this section. For more information on class methods, see The standard type hierarchy . Changed in version 3.9: Class methods can now wrap other descriptors such as property() . Changed in version 3.10: Class methods now inherit the method attributes ( __module__ , __name__ , __qualname__ , __doc__ and __annotations__ ) and have a new __wrapped__ attribute. Deprecated since version 3.11, removed in version 3.13: Class methods can no longer wrap other descriptors such as property() . compile ( source , filename , mode , flags = 0 , dont_inherit = False , optimize = -1 ) ¶ Compile the source into a code or AST object. Code objects can be executed by exec() or eval() . source can either be a normal string, a byte string, or an AST object. Refer to the ast module documentation for information on how to work with AST objects. The filename argument should give the file from which the code was read; pass some recognizable value if it wasn’t read from a file ( '<string>' is commonly used). The mode argument specifies what kind of code must be compiled; it can be 'exec' if source consists of a sequence of statements, 'eval' if it consists of a single expression, or 'single' if it consists of a single interactive statement (in the latter case, expression statements that evaluate to something other than None will be printed). The optional arguments flags and dont_inherit control which compiler options should be activated and which future features should be allowed. If neither is present (or both are zero) the code is compiled with the same flags that affect the code that is calling compile() . If the flags argument is given and dont_inherit is not (or is zero) then the compiler options and the future statements specified by the flags argument are used in addition to those that would be used anyway. If dont_inherit is a non-zero integer then the flags argument is it – the flags (future features and compiler options) in the surrounding code are ignored. Compiler options and future statements are specified by bits which can be bitwise ORed together to specify multiple options. The bitfield required to specify a given future feature can be found as the compiler_flag attribute on the _Feature instance in the __future__ module. Compiler flags can be found in ast module, with PyCF_ prefix. The argument optimize specifies the optimization level of the compiler; the default value of -1 selects the optimization level of the interpreter as given by -O options. Explicit levels are 0 (no optimization; __debug__ is true), 1 (asserts are removed, __debug__ is false) or 2 (docstrings are removed too). This function raises SyntaxError or ValueError if the compiled source is invalid. If you want to parse Python code into its AST representation, see ast.parse() . Raises an auditing event compile with arguments source and filename . This event may also be raised by implicit compilation. Note When compiling a string with multi-line code in 'single' or 'eval' mode, input must be terminated by at least one newline character. This is to facilitate detection of incomplete and complete statements in the code module. Warning It is possible to crash the Python interpreter with a sufficiently large/complex string when compiling to an AST object due to stack depth limitations in Python’s AST compiler. Changed in version 3.2: Allowed use of Windows and Mac newlines. Also, input in 'exec' mode does not have to end in a newline anymore. Added the optimize parameter. Changed in version 3.5: Previously, TypeError was raised when null bytes were encountered in source . Added in version 3.8: ast.PyCF_ALLOW_TOP_LEVEL_AWAIT can now be passed in flags to enable support for top-level await , async for , and async with . class complex ( number = 0 , / ) ¶ class complex ( string , / ) class complex ( real = 0 , imag = 0 ) Convert a single string or number to a complex number, or create a complex number from real and imaginary parts. Examples: >>> complex ( '+1.23' ) (1.23+0j) >>> complex ( '-4.5j' ) -4.5j >>> complex ( '-1.23+4.5j' ) (-1.23+4.5j) >>> complex ( ' \t ( -1.23+4.5J ) \n ' ) (-1.23+4.5j) >>> complex ( '-Infinity+NaNj' ) (-inf+nanj) >>> complex ( 1.23 ) (1.23+0j) >>> complex ( imag =- 4.5 ) -4.5j >>> complex ( - 1.23 , 4.5 ) (-1.23+4.5j) If the argument is a string, it must contain either a real part (in the same format as for float() ) or an imaginary part (in the same format but with a 'j' or 'J' suffix), or both real and imaginary parts (the sign of the imaginary part is mandatory in this case). The string can optionally be surrounded by whitespaces and the round parentheses '(' and ')' , which are ignored. The string must not contain whitespace between '+' , '-' , the 'j' or 'J' suffix, and the decimal number. For example, complex('1+2j') is fine, but complex('1 + 2j') raises ValueError . More precisely, the input must conform to the complexvalue production rule in the following grammar, after parentheses and leading and trailing whitespace characters are removed: complexvalue : floatvalue | floatvalue ( "j" | "J" ) | floatvalue sign absfloatvalue ( "j" | "J" ) If the argument is a number, the constructor serves as a numeric conversion like int and float . For a general Python object x , complex(x) delegates to x.__complex__() . If __complex__() is not defined then it falls back to __float__() . If __float__() is not defined then it falls back to __index__() . If two arguments are provided or keyword arguments are used, each argument may be any numeric type (including complex). If both arguments are real numbers, return a complex number with the real component real and the imaginary component imag . If both arguments are complex numbers, return a complex number with the real component real.real-imag.imag and the imaginary component real.imag+imag.real . If one of arguments is a real number, only its real component is used in the above expressions. See also complex.from_number() which only accepts a single numeric argument. If all arguments are omitted, returns 0j . The complex type is described in Numeric Types — int, float, complex . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.8: Falls back to __index__() if __complex__() and __float__() are not defined. Deprecated since version 3.14: Passing a complex number as the real or imag argument is now deprecated; it should only be passed as a single positional argument. delattr ( object , name , / ) ¶ This is a relative of setattr() . The arguments are an object and a string. The string must be the name of one of the object’s attributes. The function deletes the named attribute, provided the object allows it. For example, delattr(x, 'foobar') is equivalent to del x.foobar . name need not be a Python identifier (see setattr() ). class dict ( ** kwargs ) class dict ( mapping , / , ** kwargs ) class dict ( iterable , / , ** kwargs ) Create a new dictionary. The dict object is the dictionary class. See dict and Mapping Types — dict for documentation about this class. For other containers see the built-in list , set , and tuple classes, as well as the collections module. dir ( ) ¶ dir ( object , / ) Without arguments, return the list of names in the current local scope. With an argument, attempt to return a list of valid attributes for that object. If the object has a method named __dir__() , this method will be called and must return the list of attributes. This allows objects that implement a custom __getattr__() or __getattribute__() function to customize the way dir() reports their attributes. If the object does not provide __dir__() , the function tries its best to gather information from the object’s __dict__ attribute, if defined, and from its type object. The resulting list is not necessarily complete and may be inaccurate when the object has a custom __getattr__() . The default dir() mechanism behaves differently with different types of objects, as it attempts to produce the most relevant, rather than complete, information: If the object is a module object, the list contains the names of the module’s attributes. If the object is a type or class object, the list contains the names of its attributes, and recursively of the attributes of its bases. Otherwise, the list contains the object’s attributes’ names, the names of its class’s attributes, and recursively of the attributes of its class’s base classes. The resulting list is sorted alphabetically. For example: >>> import struct >>> dir () # show the names in the module namespace ['__builtins__', '__name__', 'struct'] >>> dir ( struct ) # show the names in the struct module ['Struct', '__all__', '__builtins__', '__cached__', '__doc__', '__file__', '__initializing__', '__loader__', '__name__', '__package__', '_clearcache', 'calcsize', 'error', 'pack', 'pack_into', 'unpack', 'unpack_from'] >>> class Shape : ... def __dir__ ( self ): ... return [ 'area' , 'perimeter' , 'location' ] ... >>> s = Shape () >>> dir ( s ) ['area', 'location', 'perimeter'] Note Because dir() is supplied primarily as a convenience for use at an interactive prompt, it tries to supply an interesting set of names more than it tries to supply a rigorously or consistently defined set of names, and its detailed behavior may change across releases. For example, metaclass attributes are not in the result list when the argument is a class. divmod ( a , b , / ) ¶ Take two (non-complex) numbers as arguments and return a pair of numbers consisting of their quotient and remainder when using integer division. With mixed operand types, the rules for binary arithmetic operators apply. For integers, the result is the same as (a // b, a % b) . For floating-point numbers the result is (q, a % b) , where q is usually math.floor(a / b) but may be 1 less than that. In any case q * b + a % b is very close to a , if a % b is non-zero it has the same sign as b , and 0 <= abs(a % b) < abs(b) . enumerate ( iterable , start = 0 ) ¶ Return an enumerate object. iterable must be a sequence, an iterator , or some other object which supports iteration. The __next__() method of the iterator returned by enumerate() returns a tuple containing a count (from start which defaults to 0) and the values obtained from iterating over iterable . >>> seasons = [ 'Spring' , 'Summer' , 'Fall' , 'Winter' ] >>> list ( enumerate ( seasons )) [(0, 'Spring'), (1, 'Summer'), (2, 'Fall'), (3, 'Winter')] >>> list ( enumerate ( seasons , start = 1 )) [(1, 'Spring'), (2, 'Summer'), (3, 'Fall'), (4, 'Winter')] Equivalent to: def enumerate ( iterable , start = 0 ): n = start for elem in iterable : yield n , elem n += 1 eval ( source , / , globals = None , locals = None ) ¶ Parameters : source ( str | code object ) – A Python expression. globals ( dict | None ) – The global namespace (default: None ). locals ( mapping | None ) – The local namespace (default: None ). Returns : The result of the evaluated expression. Raises : Syntax errors are reported as exceptions. Warning This function executes arbitrary code. Calling it with user-supplied input may lead to security vulnerabilities. The source argument is parsed and evaluated as a Python expression (technically speaking, a condition list) using the globals and locals mappings as global and local namespace. If the globals dictionary is present and does not contain a value for the key __builtins__ , a reference to the dictionary of the built-in module builtins is inserted under that key before source is parsed. That way you can control what builtins are available to the executed code by inserting your own __builtins__ dictionary into globals before passing it to eval() . If the locals mapping is omitted it defaults to the globals dictionary. If both mappings are omitted, the source is executed with the globals and locals in the environment where eval() is called. Note, eval() will only have access to the nested scopes (non-locals) in the enclosing environment if they are already referenced in the scope that is calling eval() (e.g. via a nonlocal statement). Example: >>> x = 1 >>> eval ( 'x+1' ) 2 This function can also be used to execute arbitrary code objects (such as those created by compile() ). In this case, pass a code object instead of a string. If the code object has been compiled with 'exec' as the mode argument, eval() 's return value will be None . Hints: dynamic execution of statements is supported by the exec() function. The globals() and locals() functions return the current global and local dictionary, respectively, which may be useful to pass around for use by eval() or exec() . If the given source is a string, then leading and trailing spaces and tabs are stripped. See ast.literal_eval() for a function that can safely evaluate strings with expressions containing only literals. Raises an auditing event exec with the code object as the argument. Code compilation events may also be raised. Changed in version 3.13: The globals and locals arguments can now be passed as keywords. Changed in version 3.13: The semantics of the default locals namespace have been adjusted as described for the locals() builtin. exec ( source , / , globals = None , locals = None , * , closure = None ) ¶ Warning This function executes arbitrary code. Calling it with user-supplied input may lead to security vulnerabilities. This function supports dynamic execution of Python code. source must be either a string or a code object. If it is a string, the string is parsed as a suite of Python statements which is then executed (unless a syntax error occurs). [ 1 ] If it is a code object, it is simply executed. In all cases, the code that’s executed is expected to be valid as file input (see the section File input in the Reference Manual). Be aware that the nonlocal , yield , and return statements may not be used outside of function definitions even within the context of code passed to the exec() function. The return value is None . In all cases, if the optional parts are omitted, the code is executed in the current scope. If only globals is provided, it must be a dictionary (and not a subclass of dictionary), which will be used for both the global and the local variables. If globals and locals are given, they are used for the global and local variables, respectively. If provided, locals can be any mapping object. Remember that at the module level, globals and locals are the same dictionary. Note When exec gets two separate objects as globals and locals , the code will be executed as if it were embedded in a class definition. This means functions and classes defined in the executed code will not be able to access variables assigned at the top level (as the “top level” variables are treated as class variables in a class definition). If the globals dictionary does not contain a value for the key __builtins__ , a reference to the dictionary of the built-in module builtins is inserted under that key. That way you can control what builtins are available to the executed code by inserting your own __builtins__ dictionary into globals before passing it to exec() . The closure argument specifies a closure–a tuple of cellvars. It’s only valid when the object is a code object containing free (closure) variables . The length of the tuple must exactly match the length of the code object’s co_freevars attribute. Raises an auditing event exec with the code object as the argument. Code compilation events may also be raised. Note The built-in functions globals() and locals() return the current global and local namespace, respectively, which may be useful to pass around for use as the second and third argument to exec() . Note The default locals act as described for function locals() below. Pass an explicit locals dictionary if you need to see effects of the code on locals after function exec() returns. Changed in version 3.11: Added the closure parameter. Changed in version 3.13: The globals and locals arguments can now be passed as keywords. Changed in version 3.13: The semantics of the default locals namespace have been adjusted as described for the locals() builtin. filter ( function , iterable , / ) ¶ Construct an iterator from those elements of iterable for which function is true. iterable may be either a sequence, a container which supports iteration, or an iterator. If function is None , the identity function is assumed, that is, all elements of iterable that are false are removed. Note that filter(function, iterable) is equivalent to the generator expression (item for item in iterable if function(item)) if function is not None and (item for item in iterable if item) if function is None . See itertools.filterfalse() for the complementary function that returns elements of iterable for which function is false. class float ( number = 0.0 , / ) ¶ class float ( string , / ) Return a floating-point number constructed from a number or a string. Examples: >>> float ( '+1.23' ) 1.23 >>> float ( ' -12345 \n ' ) -12345.0 >>> float ( '1e-003' ) 0.001 >>> float ( '+1E6' ) 1000000.0 >>> float ( '-Infinity' ) -inf If the argument is a string, it should contain a decimal number, optionally preceded by a sign, and optionally embedded in whitespace. The optional sign may be '+' or '-' ; a '+' sign has no effect on the value produced. The argument may also be a string representing a NaN (not-a-number), or positive or negative infinity. More precisely, the input must conform to the floatvalue production rule in the following grammar, after leading and trailing whitespace characters are removed: sign : "+" | "-" infinity : "Infinity" | "inf" nan : "nan" digit : <a Unicode decimal digit, i.e. characters in Unicode general category Nd> digitpart : digit ([ "_" ] digit )* number : [ digitpart ] "." digitpart | digitpart [ "." ] exponent : ( "e" | "E" ) [ sign ] digitpart floatnumber : number [ exponent ] absfloatvalue : floatnumber | infinity | nan floatvalue : [ sign ] absfloatvalue Case is not significant, so, for example, “inf”, “Inf”, “INFINITY”, and “iNfINity” are all acceptable spellings for positive infinity. Otherwise, if the argument is an integer or a floating-point number, a floating-point number with the same value (within Python’s floating-point precision) is returned. If the argument is outside the range of a Python float, an OverflowError will be raised. For a general Python object x , float(x) delegates to x.__float__() . If __float__() is not defined then it falls back to __index__() . See also float.from_number() which only accepts a numeric argument. If no argument is given, 0.0 is returned. The float type is described in Numeric Types — int, float, complex . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.7: The parameter is now positional-only. Changed in version 3.8: Falls back to __index__() if __float__() is not defined. format ( value , format_spec = '' , / ) ¶ Convert a value to a “formatted” representation, as controlled by format_spec . The interpretation of format_spec will depend on the type of the value argument; however, there is a standard formatting syntax that is used by most built-in types: Format Specification Mini-Language . The default format_spec is an empty string which usually gives the same effect as calling str(value) . A call to format(value, format_spec) is translated to type(value).__format__(value, format_spec) which bypasses the instance dictionary when searching for the value’s __format__() method. A TypeError exception is raised if the method search reaches object and the format_spec is non-empty, or if either the format_spec or the return value are not strings. Changed in version 3.4: object().__format__(format_spec) raises TypeError if format_spec is not an empty string. class frozenset ( iterable = () , / ) Return a new frozenset object, optionally with elements taken from iterable . frozenset is a built-in class. See frozenset and Set Types — set, frozenset for documentation about this class. For other containers see the built-in set , list , tuple , and dict classes, as well as the collections module. getattr ( object , name , / ) ¶ getattr ( object , name , default , / ) Return the value of the named attribute of object . name must be a string. If the string is the name of one of the object’s attributes, the result is the value of that attribute. For example, getattr(x, 'foobar') is equivalent to x.foobar . If the named attribute does not exist, default is returned if provided, otherwise AttributeError is raised. name need not be a Python identifier (see setattr() ). Note Since private name mangling happens at compilation time, one must manually mangle a private attribute’s (attributes with two leading underscores) name in order to retrieve it with getattr() . globals ( ) ¶ Return the dictionary implementing the current module namespace. For code within functions, this is set when the function is defined and remains the same regardless of where the function is called. hasattr ( object , name , / ) ¶ The arguments are an object and a string. The result is True if the string is the name of one of the object’s attributes, False if not. (This is implemented by calling getattr(object, name) and seeing whether it raises an AttributeError or not.) hash ( object , / ) ¶ Return the hash value of the object (if it has one). Hash values are integers. They are used to quickly compare dictionary keys during a dictionary lookup. Numeric values that compare equal have the same hash value (even if they are of different types, as is the case for 1 and 1.0). Note For objects with custom __hash__() methods, note that hash() truncates the return value based on the bit width of the host machine. help ( ) ¶ help ( request ) Invoke the built-in help system. (This function is intended for interactive use.) If no argument is given, the interactive help system starts on the interpreter console. If the argument is a string, then the string is looked up as the name of a module, function, class, method, keyword, or documentation topic, and a help page is printed on the console. If the argument is any other kind of object, a help page on the object is generated. Note that if a slash(/) appears in the parameter list of a function when invoking help() , it means that the parameters prior to the slash are positional-only. For more info, see the FAQ entry on positional-only parameters . This function is added to the built-in namespace by the site module. Changed in version 3.4: Changes to pydoc and inspect mean that the reported signatures for callables are now more comprehensive and consistent. hex ( integer , / ) ¶ Convert an integer number to a lowercase hexadecimal string prefixed with “0x”. If integer is not a Python int object, it has to define an __index__() method that returns an integer. Some examples: >>> hex ( 255 ) '0xff' >>> hex ( - 42 ) '-0x2a' If you want to convert an integer number to an uppercase or lower hexadecimal string with prefix or not, you can use either of the following ways: >>> ' %#x ' % 255 , ' %x ' % 255 , ' %X ' % 255 ('0xff', 'ff', 'FF') >>> format ( 255 , '#x' ), format ( 255 , 'x' ), format ( 255 , 'X' ) ('0xff', 'ff', 'FF') >>> f ' { 255 : #x } ' , f ' { 255 : x } ' , f ' { 255 : X } ' ('0xff', 'ff', 'FF') See also format() for more information. See also int() for converting a hexadecimal string to an integer using a base of 16. Note To obtain a hexadecimal string representation for a float, use the float.hex() method. id ( object , / ) ¶ Return the “identity” of an object. This is an integer which is guaranteed to be unique and constant for this object during its lifetime. Two objects with non-overlapping lifetimes may have the same id() value. CPython implementation detail: This is the address of the object in memory. Raises an auditing event builtins.id with argument id . input ( ) ¶ input ( prompt , / ) If the prompt argument is present, it is written to standard output without a trailing newline. The function then reads a line from input, converts it to a string (stripping a trailing newline), and returns that. When EOF is read, EOFError is raised. Example: >>> s = input ( '--> ' ) --> Monty Python's Flying Circus >>> s "Monty Python's Flying Circus" If the readline module was loaded, then input() will use it to provide elaborate line editing and history features. Raises an auditing event builtins.input with argument prompt before reading input Raises an auditing event builtins.input/result with the result after successfully reading input. class int ( number = 0 , / ) ¶ class int ( string , / , base = 10 ) Return an integer object constructed from a number or a string, or return 0 if no arguments are given. Examples: >>> int ( 123.45 ) 123 >>> int ( '123' ) 123 >>> int ( ' -12_345 \n ' ) -12345 >>> int ( 'FACE' , 16 ) 64206 >>> int ( '0xface' , 0 ) 64206 >>> int ( '01110011' , base = 2 ) 115 If the argument defines __int__() , int(x) returns x.__int__() . If the argument defines __index__() , it returns x.__index__() . For floating-point numbers, this truncates towards zero. If the argument is not a number or if base is given, then it must be a string, bytes , or bytearray instance representing an integer in radix base . Optionally, the string can be preceded by + or - (with no space in between), have leading zeros, be surrounded by whitespace, and have single underscores interspersed between digits. A base-n integer string contains digits, each representing a value from 0 to n-1. The values 0–9 can be represented by any Unicode decimal digit. The values 10–35 can be represented by a to z (or A to Z ). The default base is 10. The allowed bases are 0 and 2–36. Base-2, -8, and -16 strings can be optionally prefixed with 0b / 0B , 0o / 0O , or 0x / 0X , as with integer literals in code. For base 0, the string is interpreted in a similar way to an integer literal in code , in that the actual base is 2, 8, 10, or 16 as determined by the prefix. Base 0 also disallows leading zeros: int('010', 0) is not legal, while int('010') and int('010', 8) are. The integer type is described in Numeric Types — int, float, complex . Changed in version 3.4: If base is not an instance of int and the base object has a base.__index__ method, that method is called to obtain an integer for the base. Previous versions used base.__int__ instead of base.__index__ . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.7: The first parameter is now positional-only. Changed in version 3.8: Falls back to __index__() if __int__() is not defined. Changed in version 3.11: int string inputs and string representations can be limited to help avoid denial of service attacks. A ValueError is raised when the limit is exceeded while converting a string to an int or when converting an int into a string would exceed the limit. See the integer string conversion length limitation documentation. Changed in version 3.14: int() no longer delegates to the __trunc__() method. isinstance ( object , classinfo , / ) ¶ Return True if the object argument is an instance of the classinfo argument, or of a (direct, indirect, or virtual ) subclass thereof. If object is not an object of the given type, the function always returns False . If classinfo is a tuple of type objects (or recursively, other such tuples) or a Union Type of multiple types, return True if object is an instance of any of the types. If classinfo is not a type or tuple of types and such tuples, a TypeError exception is raised. TypeError may not be raised for an invalid type if an earlier check succeeds. Changed in version 3.10: classinfo can be a Union Type . issubclass ( class , classinfo , / ) ¶ Return True if class is a subclass (direct, indirect, or virtual ) of classinfo . A class is considered a subclass of itself. classinfo may be a tuple of class objects (or recursively, other such tuples) or a Union Type , in which case return True if class is a subclass of any entry in classinfo . In any other case, a TypeError exception is raised. Changed in version 3.10: classinfo can be a Union Type . iter ( iterable , / ) ¶ iter ( callable , sentinel , / ) Return an iterator object. The first argument is interpreted very differently depending on the presence of the second argument. Without a second argument, the single argument must be a collection object which supports the iterable protocol (the __iter__() method), or it must support the sequence protocol (the __getitem__() method with integer arguments starting at 0 ). If it does not support either of those protocols, TypeError is raised. If the second argument, sentinel , is given, then the first argument must be a callable object. The iterator created in this case will call callable with no arguments for each call to its __next__() method; if the value returned is equal to sentinel , StopIteration will be raised, otherwise the value will be returned. See also Iterator Types . One useful application of the second form of iter() is to build a block-reader. For example, reading fixed-width blocks from a binary database file until the end of file is reached: from functools import partial with open ( 'mydata.db' , 'rb' ) as f : for block in iter ( partial ( f . read , 64 ), b '' ): process_block ( block ) len ( object , / ) ¶ Return the length (the number of items) of an object. The argument may be a sequence (such as a string, bytes, tuple, list, or range) or a collection (such as a dictionary, set, or frozen set). CPython implementation detail: len raises OverflowError on lengths larger than sys.maxsize , such as range(2 ** 100) . class list ( iterable = () , / ) Rather than being a function, list is actually a mutable sequence type, as documented in Lists and Sequence Types — list, tuple, range . locals ( ) ¶ Return a mapping object representing the current local symbol table, with variable names as the keys, and their currently bound references as the values. At module scope, as well as when using exec() or eval() with a single namespace, this function returns the same namespace as globals() . At class scope, it returns the namespace that will be passed to the metaclass constructor. When using exec() or eval() with separate local and global arguments, it returns the local namespace passed in to the function call. In all of the above cases, each call to locals() in a given frame of execution will return the same mapping object. Changes made through the mapping object returned from locals() will be visible as assigned, reassigned, or deleted local variables, and assigning, reassigning, or deleting local variables will immediately affect the contents of the returned mapping object. In an optimized scope (including functions, generators, and coroutines), each call to locals() instead returns a fresh dictionary containing the current bindings of the function’s local variables and any nonlocal cell references. In this case, name binding changes made via the returned dict are not written back to the corresponding local variables or nonlocal cell references, and assigning, reassigning, or deleting local variables and nonlocal cell references does not affect the contents of previously returned dictionaries. Calling locals() as part of a comprehension in a function, generator, or coroutine is equivalent to calling it in the containing scope, except that the comprehension’s initialised iteration variables will be included. In other scopes, it behaves as if the comprehension were running as a nested function. Calling locals() as part of a generator expression is equivalent to calling it in a nested generator function. Changed in version 3.12: The behaviour of locals() in a comprehension has been updated as described in PEP 709 . Changed in version 3.13: As part of PEP 667 , the semantics of mutating the mapping objects returned from this function are now defined. The behavior in optimized scopes is now as described above. Aside from being defined, the behaviour in other scopes remains unchanged from previous versions. map ( function , iterable , / , * iterables , strict = False ) ¶ Return an iterator that applies function to every item of iterable , yielding the results. If additional iterables arguments are passed, function must take that many arguments and is applied to the items from all iterables in parallel. With multiple iterables, the iterator stops when the shortest iterable is exhausted. If strict is True and one of the iterables is exhausted before the others, a ValueError is raised. For cases where the function inputs are already arranged into argument tuples, see itertools.starmap() . Changed in version 3.14: Added the strict parameter. max ( iterable , / , * , key = None ) ¶ max ( iterable , / , * , default , key = None ) max ( arg1 , arg2 , / , * args , key = None ) Return the largest item in an iterable or the largest of two or more arguments. If one positional argument is provided, it should be an iterable . The largest item in the iterable is returned. If two or more positional arguments are provided, the largest of the positional arguments is returned. There are two optional keyword-only arguments. The key argument specifies a one-argument ordering function like that used for list.sort() . The default argument specifies an object to return if the provided iterable is empty. If the iterable is empty and default is not provided, a ValueError is raised. If multiple items are maximal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as sorted(iterable, key=keyfunc, reverse=True)[0] and heapq.nlargest(1, iterable, key=keyfunc) . Changed in version 3.4: Added the default keyword-only parameter. Changed in version 3.8: The key can be None . class memoryview ( object ) Return a “memory view” object created from the given argument. See Memory Views for more information. min ( iterable , / , * , key = None ) ¶ min ( iterable , / , * , default , key = None ) min ( arg1 , arg2 , / , * args , key = None ) Return the smallest item in an iterable or the smallest of two or more arguments. If one positional argument is provided, it should be an iterable . The smallest item in the iterable is returned. If two or more positional arguments are provided, the smallest of the positional arguments is returned. There are two optional keyword-only arguments. The key argument specifies a one-argument ordering function like that used for list.sort() . The default argument specifies an object to return if the provided iterable is empty. If the iterable is empty and default is not provided, a ValueError is raised. If multiple items are minimal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as sorted(iterable, key=keyfunc)[0] and heapq.nsmallest(1, iterable, key=keyfunc) . Changed in version 3.4: Added the default keyword-only parameter. Changed in version 3.8: The key can be None . next ( iterator , / ) ¶ next ( iterator , default , / ) Retrieve the next item from the iterator by calling its __next__() method. If default is given, it is returned if the iterator is exhausted, otherwise StopIteration is raised. class object ¶ This is the ultimate base class of all other classes. It has methods that are common to all instances of Python classes. When the constructor is called, it returns a new featureless object. The constructor does not accept any arguments. Note object instances do not have __dict__ attributes, so you can’t assign arbitrary attributes to an instance of object . oct ( integer , / ) ¶ Convert an integer number to an octal string prefixed with “0o”. The result is a valid Python expression. If integer is not a Python int object, it has to define an __index__() method that returns an integer. For example: >>> oct ( 8 ) '0o10' >>> oct ( - 56 ) '-0o70' If you want to convert an integer number to an octal string either with the prefix “0o” or not, you can use either of the following ways. >>> ' %#o ' % 10 , ' %o ' % 10 ('0o12', '12') >>> format ( 10 , '#o' ), format ( 10 , 'o' ) ('0o12', '12') >>> f ' { 10 : #o } ' , f ' { 10 : o } ' ('0o12', '12') See also format() for more information. open ( file , mode = 'r' , buffering = -1 , encoding = None , errors = None , newline = None , closefd = True , opener = None ) ¶ Open file and return a corresponding file object . If the file cannot be opened, an OSError is raised. See Reading and Writing Files for more examples of how to use this function. file is a path-like object giving the pathname (absolute or relative to the current working directory) of the file to be opened or an integer file descriptor of the file to be wrapped. (If a file descriptor is given, it is closed when the returned I/O object is closed unless closefd is set to False .) mode is an optional string that specifies the mode in which the file is opened. It defaults to 'r' which means open for reading in text mode. Other common values are 'w' for writing (truncating the file if it already exists), 'x' for exclusive creation, and 'a' for appending (which on some Unix systems, means that all writes append to the end of the file regardless of the current seek position). In text mode, if encoding is not specified the encoding used is platform-dependent: locale.getencoding() is called to get the current locale encoding. (For reading and writing raw bytes use binary mode and leave encoding unspecified.) The available modes are: Character Meaning 'r' open for reading (default) 'w' open for writing, truncating the file first 'x' open for exclusive creation, failing if the file already exists 'a' open for writing, appending to the end of file if it exists 'b' binary mode 't' text mode (default) '+' open for updating (reading and writing) The default mode is 'r' (open for reading text, a synonym of 'rt' ). Modes 'w+' and 'w+b' open and truncate the file. Modes 'r+' and 'r+b' open the file with no truncation. As mentioned in the Overview , Python distinguishes between binary and text I/O. Files opened in binary mode (including 'b' in the mode argument) return contents as bytes objects without any decoding. In text mode (the default, or when 't' is included in the mode argument), the contents of the file are returned as str , the bytes having been first decoded using a platform-dependent encoding or using the specified encoding if given. Note Python doesn’t depend on the underlying operating system’s notion of text files; all the processing is done by Python itself, and is therefore platform-independent. buffering is an optional integer used to set the buffering policy. Pass 0 to switch buffering off (only allowed in binary mode), 1 to select line buffering (only usable when writing in text mode), and an integer > 1 to indicate the size in bytes of a fixed-size chunk buffer. Note that specifying a buffer size this way applies for binary buffered I/O, but TextIOWrapper (i.e., files opened with mode='r+' ) would have another buffering. To disable buffering in TextIOWrapper , consider using the write_through flag for io.TextIOWrapper.reconfigure() . When no buffering argument is given, the default buffering policy works as follows: Binary files are buffered in fixed-size chunks; the size of the buffer is max(min(blocksize, 8 MiB), DEFAULT_BUFFER_SIZE) when the device block size is available. On most systems, the buffer will typically be 128 kilobytes long. “Interactive” text files (files for which isatty() returns True ) use line buffering. Other text files use the policy described above for binary files. encoding is the name of the encoding used to decode or encode the file. This should only be used in text mode. The default encoding is platform dependent (whatever locale.getencoding() returns), but any text encoding supported by Python can be used. See the codecs module for the list of supported encodings. errors is an optional string that specifies how encoding and decoding errors are to be handled—this cannot be used in binary mode. A variety of standard error handlers are available (listed under Error Handlers ), though any error handling name that has
2026-01-13T08:48:39
https://parenting.forem.com/t/schoolage#main-content
Schoolage - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close # schoolage Follow Hide Discussing kids in elementary and middle school. Create Post Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://parenting.forem.com/privacy#7-retention-of-personal-information
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://dev.to/t/beginners/page/3376
Beginners Page 3376 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Beginners Follow Hide "A journey of a thousand miles begins with a single step." -Chinese Proverb Create Post submission guidelines UPDATED AUGUST 2, 2019 This tag is dedicated to beginners to programming, development, networking, or to a particular language. Everything should be geared towards that! For Questions... Consider using this tag along with #help, if... You are new to a language, or to programming in general, You want an explanation with NO prerequisite knowledge required. You want insight from more experienced developers. Please do not use this tag if you are merely new to a tool, library, or framework. See also, #explainlikeimfive For Articles... Posts should be specifically geared towards true beginners (experience level 0-2 out of 10). Posts should require NO prerequisite knowledge, except perhaps general (language-agnostic) essentials of programming. Posts should NOT merely be for beginners to a tool, library, or framework. If your article does not meet these qualifications, please select a different tag. Promotional Rules Posts should NOT primarily promote an external work. This is what Listings is for. Otherwise accepable posts MAY include a brief (1-2 sentence) plug for another resource at the bottom. Resource lists ARE acceptable if they follow these rules: Include at least 3 distinct authors/creators. Clearly indicate which resources are FREE, which require PII, and which cost money. Do not use personal affiliate links to monetize. Indicate at the top that the article contains promotional links. about #beginners If you're writing for this tag, we recommend you read this article . If you're asking a question, read this article . Older #beginners posts 3373 3374 3375 3376 3377 3378 3379 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://legal.x.com/el/purchaser-terms.html
Όροι Παροχής Υπηρεσιών Αγοραστή του X Όροι Παροχής Υπηρεσιών Αγοραστή του X Λήψη των Όρων Παροχής Υπηρεσιών Αγοραστή του X Όροι για τις υπηρεσίες επί πληρωμή Πρόσθετοι Όροι για το X Premium Πρόσθετοι όροι για το πρόγραμμα Συνδρομών Λήψη των Όρων Παροχής Υπηρεσιών Αγοραστή του X Όροι Παροχής Υπηρεσιών Αγοραστή του X goglobalwithtwitterbanner Όροι για τις υπηρεσίες επί πληρωμή Πρόσθετοι Όροι για το X Premium Πρόσθετοι όροι συνδρομών δημιουργών Πρόσθετοι όροι για τα προγράμματα Premium Επιχείρηση και το Premium Οργανισμοί   Όροι για τις υπηρεσίες επί πληρωμή Πρόσθετοι Όροι για το X Premium Πρόσθετοι όροι συνδρομών δημιουργών Πρόσθετοι όροι για τα προγράμματα Premium Επιχείρηση και το Premium Οργανισμοί   Όροι Παροχής Υπηρεσιών Αγοραστή του X Έναρξη ισχύος: 1 Αυγούστου 2025 Εάν ζείτε εκτός της Ευρωπαϊκής Ένωσης, των χωρών ΕΖΕΣ ή του Ηνωμένου Βασιλείου, συμπεριλαμβανομένων των Ηνωμένων Πολιτειών, ισχύουν για εσάς οι ακόλουθοι Όροι χρήσης της υπηρεσίας X Αγοραστή .  Εάν ζείτε στην Ευρωπαϊκή Ένωση, τις χώρες ΕΖΕΣ ή το Ηνωμένο Βασίλειο, αυτοί οι Όροι χρήσης της υπηρεσίας X Αγοραστή  ισχύουν για εσάς.   Όροι Παροχής Υπηρεσιών Αγοραστή του X Εάν ζείτε εκτός της Ευρωπαϊκής Ένωσης, των κρατών ΕΖΕΣ ή του Ηνωμένου Βασιλείου, συμπεριλαμβανομένων των Ηνωμένων Πολιτειών Το X σάς επιτρέπει να έχετε πρόσβαση σε ορισμένες λειτουργίες με αντάλλαγμα την πληρωμή μιας εφάπαξ ή επαναλαμβανόμενης χρέωσης, όπως ισχύει για τις σχετικές λειτουργίες (κάθε μια " Υπηρεσία επί πληρωμή " και συλλογικά " Αμειβόμενες υπηρεσίες "). Για παράδειγμα, το X Premium (όπως ορίζεται παρακάτω) και το Συνδρομές θα θεωρούνται το καθένα "Υπηρεσία επί πληρωμή".  Στο βαθμό που εγγράφεστε ή/και χρησιμοποιείτε μια Υπηρεσία επί πληρωμή, η χρήση των Υπηρεσιών επί πληρωμή και οι αντίστοιχες συναλλαγές υπόκεινται σε: (i) τους όρους και τις προϋποθέσεις που παρατίθενται στο παρόν, συμπεριλαμβανομένων των εφαρμοστέων όρων και προϋποθέσεων για κάθε Υπηρεσία επί πληρωμή που αγοράζετε, κάθε μία από τις οποίες παρατίθεται παρακάτω (συλλογικά, οι " Όροι Παροχής Υπηρεσιών Αγοραστή του X ") και (ii) τους εφαρμοστέους Όρους Χρήσης Υπηρεσίας του X , την Πολιτική προστασίας προσωπικών δεδομένων του X , τους Κανόνες και Πολιτικές του X , και όλες τις πολιτικές που ενσωματώνονται σε αυτές (συλλογικά, η " Συμφωνία χρήστη X "). Οι παρόντες Όροι Παροχής Υπηρεσιών Αγοραστή X και η προαναφερθείσα Συμφωνία Χρήστη Χ θα αναφέρονται συλλογικά στο παρόν έγγραφο ως " Όροι ". Το " X " αναφέρεται στην οντότητα X που σας παρέχει τις Υπηρεσίες επί πληρωμή. Διαβάστε προσεκτικά αυτούς τους Όρους χρήσης της υπηρεσίας X Αγοραστή για να βεβαιωθείτε ότι κατανοείτε τους ισχύοντες όρους, τις προϋποθέσεις και τις εξαιρέσεις. ΕΑΝ ΖΕΙΤΕ ΣΤΙΣ ΗΝΩΜΕΝΕΣ ΠΟΛΙΤΕΙΕΣ, ΟΙ ΠΑΡΟΝΤΕΣ ΟΡΟΙ ΠΕΡΙΕΧΟΥΝ ΣΗΜΑΝΤΙΚΕΣ ΠΛΗΡΟΦΟΡΙΕΣ ΠΟΥ ΙΣΧΥΟΥΝ ΓΙΑ ΕΣΑΣ ΣΧΕΤΙΚΑ ΜΕ ΤΗΝ ΕΠΙΛΥΣΗ ΔΙΑΦΟΡΩΝ, ΣΥΜΠΕΡΙΛΑΜΒΑΝΟΜΕΝΗΣ ΤΗΣ ΠΑΡΑΙΤΗΣΗΣ ΑΠΟ ΤΟ ΔΙΚΑΙΩΜΑ ΣΑΣ ΝΑ ΕΓΕΙΡΕΤΕ ΑΞΙΩΣΕΙΣ ΩΣ ΟΜΑΔΙΚΕΣ ΑΓΩΓΕΣ ΚΑΙ ΤΟΥ ΠΕΡΙΟΡΙΣΜΟΥ ΤΟΥ ΔΙΚΑΙΩΜΑΤΟΣ ΣΑΣ ΝΑ ΕΓΕΙΡΕΤΕ ΑΞΙΩΣΕΙΣ ΚΑΤΑ ΤΟΥ X ΣΕ ΔΙΑΣΤΗΜΑ ΜΕΓΑΛΥΤΕΡΟ ΤΩΝ 2 ΕΤΩΝ ΜΕΤΑ ΤΗΝ ΕΠΕΛΕΥΣΗ ΤΩΝ ΣΧΕΤΙΚΩΝ ΓΕΓΟΝΟΤΩΝ, ΤΑ ΟΠΟΙΑ ΕΠΗΡΕΑΖΟΥΝ ΤΑ ΔΙΚΑΙΩΜΑΤΑ ΚΑΙ ΤΙΣ ΥΠΟΧΡΕΩΣΕΙΣ ΣΑΣ ΣΕ ΠΕΡΙΠΤΩΣΗ ΠΟΥ ΠΡΟΚΥΨΕΙ ΟΠΟΙΑΔΗΠΟΤΕ ΔΙΑΦΟΡΑ ΜΕ ΤΟ X. ΑΝΑΤΡΕΞΤΕ ΣΤΗΝ ΕΝΟΤΗΤΑ 6 ΣΤΟΥΣ ΓΕΝΙΚΟΥΣ ΟΡΟΥΣ ΓΙΑ ΛΕΠΤΟΜΕΡΕΙΕΣ ΣΧΕΤΙΚΑ ΜΕ ΑΥΤΕΣ ΤΙΣ ΔΙΑΤΑΞΕΙΣ. Αποδοχή . Χρησιμοποιώντας ή αποκτώντας πρόσβαση σε μια (ή περισσότερες) Υπηρεσία(ες) επί πληρωμή από το X, υποβάλλοντας πληρωμή βάσει αυτής ή/και κάνοντας κλικ σε ένα κουμπί για να πραγματοποιήσετε μια εφάπαξ αγορά ή επαναλαμβανόμενες πληρωμές συνδρομής για την Υπηρεσία επί πληρωμή που παρέχεται από το X, συμφωνείτε ότι δεσμεύεστε από τους Όρους. Εάν δεν κατανοείτε τους Όρους ή δεν αποδέχεστε οποιοδήποτε μέρος τους, τότε δεν μπορείτε να χρησιμοποιήσετε ή να αποκτήσετε πρόσβαση σε οποιεσδήποτε Υπηρεσίες επί πληρωμή. Για να αγοράσετε και να χρησιμοποιήσετε μια Υπηρεσία επί πληρωμή πρέπει: (i) να είστε τουλάχιστον 18 ετών ή να έχετε ενηλικιωθεί σύμφωνα με τους νόμους της δικαιοδοσίας στην οποία ζείτε ή (ii) να έχετε τη ρητή συγκατάθεση του γονέα ή του κηδεμόνα σας για να αγοράσετε και να χρησιμοποιήσετε την εν λόγω Υπηρεσία επί πληρωμή. Εάν είστε γονέας ή νόμιμος κηδεμόνας και επιτρέπετε στο παιδί σας (ή σε ένα παιδί του οποίου είστε κηδεμόνας) να αγοράσει ή να χρησιμοποιήσει μια Υπηρεσία επί πληρωμή, συμφωνείτε ότι οι Όροι ισχύουν για εσάς, ότι θα συμμορφώνεστε με τους Όρους και ότι είστε υπεύθυνοι για τη δραστηριότητα του παιδιού στις Υπηρεσίες επί πληρωμή και για τη διασφάλιση   ότι και το παιδί συμμορφώνεται επίσης με τους Όρους. Σε κάθε περίπτωση, όπως αναφέρεται στην ενότητα "Ποιοι μπορούν να χρησιμοποιούν τις υπηρεσίες" των Όρων Χρήσης Υπηρεσίας του X, πρέπει να είστε τουλάχιστον 13 ετών για να χρησιμοποιήσετε την υπηρεσία X. Εάν αποδέχεστε τους παρόντες Όρους Παροχής Υπηρεσιών Αγοραστή X και χρησιμοποιείτε τις επί πληρωμή υπηρεσίες για λογαριασμό εταιρείας, οργανισμού, κυβέρνησης ή άλλης νομικής οντότητας, δηλώνετε και εγγυάστε ότι είστε εξουσιοδοτημένοι να το πράξετε και έχετε την εξουσία να δεσμεύσετε την εν λόγω οντότητα στους παρόντες Όρους Παροχής Υπηρεσιών Αγοραστή X, οπότε οι λέξεις "εσείς" και "σας", όπως χρησιμοποιούνται στους παρόντες Όρους Παροχής Υπηρεσιών Αγοραστή X, αναφέρονται στην εν λόγω οντότητα. Αναθέτων Φορέας X . Συνάπτετε συμφωνία για αυτούς τους Όρους χρήσης της υπηρεσίας X Αγοραστή με την οντότητα που αντιστοιχεί στον τόπο διαμονής σας, όπως αναφέρεται παρακάτω. Αυτή η οντότητα θα σας παρέχει τις Υπηρεσίες επί πληρωμή. Καμία άλλη οντότητα δεν δεσμεύεται από οποιεσδήποτε υποχρεώσεις απέναντί σας σύμφωνα με τους παρόντες Όρους χρήσης της υπηρεσίας Αγοραστή. Η τοποθεσία σας Οι ήπειροι της Βόρειας Αμερικής (συμπεριλαμβανομένης της Χαβάης) ή της Νότιας Αμερικής Αναθέτων Φορέας X Corp., με γραφείο που βρίσκεται στο 865 FM 1209, Building 2, Bastrop, TX 78602, USA Η τοποθεσία σας Οποιαδήποτε χώρα που δεν καλύπτεται από τις δύο παραπάνω τοποθεσίες, συμπεριλαμβανομένης της περιοχής Ασίας-Ειρηνικού, της Μέσης Ανατολής, της Αφρικής ή της Ευρώπης (εξαιρουμένων των χωρών της ΕΕ, των κρατών ΕΖΕΣ και του Ηνωμένου Βασιλείου) Αναθέτων Φορέας X Global LLC, με έδρα στη διεύθυνση 701 S. Carson St., Suite 200, Carson City, NV 89701, USA   Αλλαγές σε Όρους, Υπηρεσίες επί πληρωμή και Τιμολόγηση 1. Αλλαγές στους Όρους. Το X μπορεί να αναθεωρεί αυτούς τους Όρους χρήσης της υπηρεσίας X Αγοραστή κατά καιρούς, μεταξύ άλλων, για επιχειρηματικούς, οικονομικούς ή νομικούς λόγους. Οι αλλαγές δεν θα έχουν αναδρομική ισχύ και η πιο πρόσφατη έκδοση των Όρων χρήσης της υπηρεσίας για αγοραστές του X, που διατίθενται στη διεύθυνση legal.x.com/purchaser-terms , θα διέπουν τη χρήση των Υπηρεσιών επί πληρωμή, καθώς και κάθε αντίστοιχη συναλλαγή. Εάν τροποποιήσουμε ή αναθεωρήσουμε αυτούς τους Όρους αφού συμφωνήσετε με αυτούς (για παράδειγμα, εάν αυτοί οι όροι τροποποιηθούν αφού αγοράσετε μια συνδρομή), θα σας ειδοποιήσουμε εκ των προτέρων για ουσιαστικές αναθεωρήσεις αυτών των όρων. Η εν λόγω ειδοποίηση μπορεί να δοθεί ηλεκτρονικά, όπως ενδεικτικά ως ειδοποίηση υπηρεσίας ή email που αποστέλλεται στη διεύθυνση ηλεκτρονικού ταχυδρομείου για τον λογαριασμό σας. Εάν συνεχίσετε να έχετε πρόσβαση ή να χρησιμοποιείτε τις Υπηρεσίες επί πληρωμή μετά την έναρξη ισχύος αυτών των αναθεωρήσεων, αυτό σημαίνει ότι συμφωνείτε να δεσμεύεστε από τους αναθεωρημένους Όρους χρήσης της υπηρεσίας για αγοραστές του X. Εάν δεν συμφωνείτε να συμμορφώνεστε με αυτούς ή οποιουσδήποτε μελλοντικούς Όρους χρήσης της υπηρεσίας για αγοραστές του X, δεν πρέπει να χρησιμοποιείτε ή να έχετε πρόσβαση (ή να συνεχίσετε να χρησιμοποιείτε ή να έχετε πρόσβαση) στις Υπηρεσίες επί πληρωμή. Οι Όροι Παροχής Υπηρεσιών του αγοραστή X είναι γραμμένοι στα αγγλικά, αλλά διατίθενται σε πολλές γλώσσες μέσω μεταφράσεων. Το X προσπαθεί να κάνει τις μεταφράσεις όσο το δυνατόν ακριβέστερες στην αρχική αγγλική έκδοση. Ωστόσο, σε περίπτωση οποιασδήποτε ασυμφωνίας ή ασυνέπειας, υπερισχύει η αγγλική έκδοση των Όρων Παροχής Υπηρεσιών του αγοραστή X. Αναγνωρίζετε ότι τα Αγγλικά θα είναι η γλώσσα αναφοράς για την ερμηνεία και τη δημιουργία των όρων των Όρων Παροχής Υπηρεσιών του αγοραστή X. 2. Αλλαγές στις υπηρεσίες επί πληρωμή.  Οι υπηρεσίες μας επί πληρωμή εξελίσσονται συνεχώς. Ως εκ τούτου, οι Υπηρεσίες επί πληρωμή ενδέχεται να αλλάζουν κατά καιρούς, κατά την κρίση μας, μεταξύ άλλων για επιχειρηματικούς, οικονομικούς ή νομικούς λόγους. Ενδέχεται να διακόψουμε (μόνιμα ή προσωρινά) την παροχή των Υπηρεσιών επί πληρωμή ή οποιωνδήποτε δυνατοτήτων εντός των Υπηρεσιών επί πληρωμή σε εσάς ή σε χρήστες γενικά, με ή χωρίς ειδοποίηση. Το X δεν ευθύνεται έναντι σε εσάς ή σε οποιοδήποτε τρίτο μέρος για οποιαδήποτε τροποποίηση, αναστολή ή διακοπή των Υπηρεσιών επί πληρωμή. Οι συγκεκριμένοι όροι και προϋποθέσεις (που περιλαμβάνονται παρακάτω) για τη συγκεκριμένη Υπηρεσία επί πληρωμή προβλέπουν ότι μπορείτε να ακυρώσετε μια συνδρομή ή, κατά περίπτωση, να ζητήσετε επιστροφή χρημάτων.  3.Αλλαγές στην τιμολόγηση. Οι τιμές για τις Υπηρεσίες επί πληρωμή, συμπεριλαμβανομένων των επαναλαμβανόμενων τελών συνδρομής, υπόκεινται σε αλλαγές κατά καιρούς, μεταξύ άλλων για επιχειρηματικούς, οικονομικούς ή νομικούς λόγους. Το X θα παρέχει εύλογη πρότερη ειδοποίηση για οποιαδήποτε ουσιαστική αλλαγή στην τιμή των Υπηρεσιών επί πληρωμή. Για τις συνδρομητικές υπηρεσίες, οι αλλαγές τιμών θα τεθούν σε ισχύ από την έναρξη της επόμενης συνδρομητικής περιόδου μετά την ημερομηνία αλλαγής της τιμής. Εάν δεν συμφωνείτε με κάποια αλλαγή τιμής, έχετε το δικαίωμα να απορρίψετε την αλλαγή ακυρώνοντας τη συνδρομή σας στη σχετική Υπηρεσία επί πληρωμή πριν από την έναρξη ισχύος της αλλαγής τιμής. Όροι πληρωμής .  Το X προσφέρει διάφορες επιλογές πληρωμής που μπορεί να διαφέρουν ανάλογα με την Υπηρεσία επί πληρωμή, τη συσκευή ή/και το λειτουργικό σας σύστημα, τη γεωγραφική σας τοποθεσία ή άλλους παράγοντες. Στον βαθμό που είναι διαθέσιμες (καθώς το X μπορεί να καταστήσει διαθέσιμους διάφορους τρόπους αγοράς κατά καιρούς), αυτές οι επιλογές πληρωμής μπορεί να περιλαμβάνουν τη δυνατότητα χρήσης της λειτουργικότητας "Πληρωμή εντός εφαρμογής" που προσφέρεται από την Google ή την Apple ή να πραγματοποιεί πληρωμή μέσω διαδικτύου χρησιμοποιώντας τη Stripe ( www.stripe.com - εφεξής " Stripe "), μια ανεξάρτητη εταιρεία διεκπεραίωσης πληρωμών του X. Όταν πραγματοποιείτε μια πληρωμή, συμφωνείτε ρητά: (i) να καταβάλετε το τίμημα που αναφέρεται για την Υπηρεσία επί πληρωμή, μαζί με τυχόν πρόσθετα ποσά για ισχύοντες φόρους, χρεώσεις πιστωτικών καρτών, τραπεζικές προμήθειες, προμήθειες για συναλλαγές αλλοδαπής, προμήθειες συναλλάγματος και νομισματικές διακυμάνσεις, και (ii) να συμμορφώνεστε με οποιουσδήποτε σχετικούς όρους χρήσης της υπηρεσίας, πολιτικές απορρήτου ή άλλες νομικές συμφωνίες ή περιορισμούς (συμπεριλαμβανομένων πρόσθετων ηλικιακών περιορισμών) που επιβάλλονται από την Google, την Apple ή την Stripe (ως ανεξάρτητη εταιρεία διεκπεραίωσης πληρωμών του X) σε σχέση με την από μέρους σας χρήση ενός δεδομένου τρόπου πληρωμής (για παράδειγμα, εάν επιλέξετε να πραγματοποιήσετε την πληρωμή σας μέσω της λειτουργίας αγορών εντός εφαρμογής της Apple, συμφωνείτε να συμμορφώνεστε με τυχόν σχετικούς όρους, απαιτήσεις ή/και περιορισμούς που επιβάλλει η Apple). Τυχόν ιδιωτικά προσωπικά δεδομένα που παρέχετε σε σχέση με την από μέρους σας χρήση των Υπηρεσιών επί πληρωμή, συμπεριλαμβανομένων ενδεικτικά τυχόν δεδομένων που παρέχονται σε σχέση με πληρωμή, θα υποβάλλονται σε επεξεργασία σύμφωνα με την Πολιτική προστασίας προσωπικών δεδομένων του X. Το X δικαιούται να κοινοποιήσει τα στοιχεία πληρωμής σας σε παρόχους υπηρεσιών πληρωμών με σκοπό τη διεκπεραίωση πληρωμών, την αποτροπή, τον εντοπισμό και τη διερεύνηση απάτης ή άλλων απαγορευμένων δραστηριοτήτων, τη διευκόλυνση της επίλυσης διαφωνιών, όπως για αιτήματα αντιστροφής χρεώσεων ή επιστροφής χρημάτων, και για άλλους σκοπούς που συσχετίζονται με την αποδοχή πιστωτικών και χρεωστικών καρτών ή ACH. Αποτελεί ευθύνη σας να βεβαιωθείτε ότι τα τραπεζικά στοιχεία σας, τα στοιχεία της πιστωτικής και χρεωστικής κάρτας, ή/και άλλα στοιχεία πληρωμών σας είναι επικαιροποιημένα, πλήρη και ακριβή ανά πάσα στιγμή. Εάν πραγματοποιήσετε πληρωμή για Υπηρεσία επί πληρωμή, ενδέχεται να λάβουμε πληροφορίες σχετικά με τη συναλλαγή σας, όπως πότε πραγματοποιήθηκε, πότε πρόκειται να λήξει ή να ανανεωθεί αυτόματα μια συνδρομή, σε ποια πλατφόρμα κάνατε την αγορά και άλλες πληροφορίες. Το X δεν θα είναι υπεύθυνο ή υπαίτιο για τυχόν σφάλματα ή καθυστερήσεις μιας εταιρείας διεκπεραίωσης πληρωμών, του App Store της Apple ή του Google Play Store, της τράπεζάς σας, της εταιρείας της πιστωτικής σας κάρτας ή/και οποιουδήποτε δικτύου πληρωμών. Ανατρέξτε στους εκάστοτε Όρους και προϋποθέσεις Υπηρεσιών επί πληρωμή παρακάτω για τους όρους πληρωμής που ισχύουν για τη συγκεκριμένη Υπηρεσία επί πληρωμή, συμπεριλαμβανομένου του τρόπου χειρισμού των ανανεώσεων της συνδρομής και άλλων σημαντικών όρων. Εφαρμογή της Συμφωνίας Χρήστη του X, Τερματισμός, Μη επιστροφή χρημάτων, Πολλαπλοί λογαριασμοί X και Περιορισμοί 1. Η συμφωνία χρήστη X ισχύει για εσάς . ΠΡΕΠΕΙ ΠΑΝΤΑ ΝΑ ΑΚΟΛΟΥΘΕΙΤΕ ΚΑΙ ΝΑ ΣΥΜΜΟΡΦΩΝΕΣΤΕ ΜΕ ΤΗ ΣΥΜΦΩΝΙΑ ΧΡΗΣΤΗ ΤΟΥ X. Η Συμφωνία χρήστη X ισχύει πάντα για τη χρήση της Υπηρεσίας X από εσάς, συμπεριλαμβανομένων των Υπηρεσιών επί πληρωμή και των λειτουργιών. Η αδυναμία σας να ακολουθήσετε και να συμμορφωθείτε με τη Συμφωνία χρήστη X ή η πεποίθηση του X ότι έχετε αποτύχει να ακολουθήσετε και να συμμορφωθείτε με τη Συμφωνία Χρήστη X μπορεί να έχει ως αποτέλεσμα την ακύρωση των επί πληρωμή υπηρεσιών σας. Οποιαδήποτε τέτοια ακύρωση θα είναι επιπρόσθετη και χωρίς περιορισμό οποιασδήποτε ενέργειας επιβολής που μπορεί να λάβει το X εναντίον σας σύμφωνα με τη Συμφωνία χρήστη X. Σε τέτοιες περιπτώσεις, ενδέχεται να χάσετε τα οφέλη των Υπηρεσιών επί πληρωμή και δεν θα δικαιούστε επιστροφή χρημάτων για τυχόν ποσά που έχετε πληρώσει (ή προπληρώσει) για Υπηρεσίες επί πληρωμή. 2. Γιατί το X μπορεί να τερματίσει την πρόσβασή σας σε Υπηρεσίες Επί Πληρωμή. Το X μπορεί να αναστείλει ή να τερματίσει την πρόσβασή σας στις Υπηρεσίες Επί Πληρωμή, να σταματήσει να σας παρέχει όλες ή μέρος των Υπηρεσιών Επί Πληρωμή, ή να λάβει οποιαδήποτε άλλη ενέργεια που κρίνει κατάλληλη, συμπεριλαμβανομένης, για παράδειγμα, της αναστολής του λογαριασμού σας, (χωρίς καμία ευθύνη) ανά πάσα στιγμή για οποιονδήποτε ή κανένα λόγο, συμπεριλαμβανομένων, ενδεικτικά, οποιουδήποτε από τους ακόλουθους λόγους: α. Το Χ πιστεύει, κατά την απόλυτη διακριτική του ευχέρεια, ότι έχετε παραβιάσει τους Όρους ή ότι η χρήση των Υπηρεσιών επί πληρωμή θα παραβιάζει τυχόν ισχύοντες νόμους. β. Το X καλείται ή καθοδηγείται να το πράξει από οποιοδήποτε αρμόδιο δικαστήριο, ρυθμιστική αρχή ή υπηρεσία επιβολής του νόμου, γ. Το X έχει απροσδόκητα τεχνικά προβλήματα ή προβλήματα ασφάλειας. δ. Το X πιστεύει, κατά την απόλυτη διακριτική του ευχέρεια, ότι έχετε παραβιάσει τη Συμφωνία χρήστη X∙ ε. Το X πιστεύει, κατά την απόλυτη διακριτική του ευχέρεια, ότι εμπλέκεστε σε χειραγώγηση ή άλλη ενοχλητική ή απαγορευμένη συμπεριφορά γενικώς ή σε σχέση με τις Υπηρεσίες επί πληρωμή∙ στ.  Δημιουργείτε κίνδυνο ή πιθανή νομική έκθεση για το X∙ στ. Ο λογαριασμός σας θα πρέπει να αφαιρεθεί λόγω παράνομης συμπεριφοράς. η. Ο λογαριασμός σας θα πρέπει να καταργηθεί λόγω παρατεταμένης αδράνειας. ή i.Η παροχή των Υπηρεσιών επί πληρωμή (εν όλω ή εν μέρει) σε εσάς δεν είναι πλέον εμπορικά βιώσιμη (κατά την αποκλειστική διακριτική ευχέρεια της X). 3. Όλες οι συναλλαγές είναι οριστικές. Όλες οι πληρωμές για Υπηρεσίες επί πληρωμή είναι οριστικές και δεν επιστρέφονται ούτε ανταλλάσσονται, εκτός εάν απαιτείται από την ισχύουσα νομοθεσία. Δεν παρέχουμε καμία εγγύηση ως προς τη φύση, την ποιότητα ή την αξία μιας Υπηρεσίας επί πληρωμή ή τη διαθεσιμότητα ή την παροχή αυτής. Δεν παρέχονται επιστροφές χρημάτων ή πιστώσεις για οποιαδήποτε αχρησιμοποίητη ή μερικώς χρησιμοποιημένη Υπηρεσία επί πληρωμή (για παράδειγμα, περίοδος συνδρομής που χρησιμοποιήθηκε μερικώς).  4. Οι υπηρεσίες επί πληρωμή δεν μπορούν να μεταφερθούν μεταξύ λογαριασμών X. Κάθε αγορά υπηρεσίας επί πληρωμή ισχύει για έναν λογαριασμό X, που σημαίνει ότι η αγορά σας θα ισχύει αποκλειστικά για τον λογαριασμό που χρησιμοποιούσατε όταν αγοράσατε την Υπηρεσία επί πληρωμή και δεν θα ισχύει για άλλους λογαριασμούς στους οποίους ενδέχεται να έχετε πρόσβαση ή να ελέγχετε. Εάν έχετε ή ελέγχετε πολλούς λογαριασμούς και θέλετε πρόσβαση στις Υπηρεσίες επί πληρωμή σε κάθε λογαριασμό, πρέπει να αγοράσετε την Υπηρεσία επί πληρωμή σε κάθε λογαριασμό ξεχωριστά. 5. Περιορισμοί και Υποχρεώσεις.  α. Μπορείτε να αγοράσετε και να χρησιμοποιήσετε μια Υπηρεσία επί πληρωμή μόνο εάν σας επιτρέπεται νόμιμα να χρησιμοποιήσετε την Υπηρεσία επί πληρωμή στη χώρα σας και ζείτε σε χώρα που υποστηρίζεται από το X για την ισχύουσα Υπηρεσία επί πληρωμή. Το X μπορεί, κατά την κρίση του, να περιορίσει τη δυνατότητα πρόσβασης ή αγοράς μιας Υπηρεσίας επί πληρωμή σε ορισμένες χώρες. Το X διατηρεί το δικαίωμα να τροποποιεί τη λίστα των υποστηριζόμενων χωρών κατά διαστήματα. β. Διατηρούμε το δικαίωμα να αρνηθούμε συναλλαγές Υπηρεσιών επί πληρωμή ή να ακυρώσουμε ή να διακόψουμε την πώληση ή τη χρήση μιας Υπηρεσίας επί πληρωμή κατά την απόλυτη διακριτική μας ευχέρεια.  γ.  Δεν επιτρέπεται να επιτρέπετε σε άλλους να χρησιμοποιούν τον λογαριασμό σας X για πρόσβαση σε οποιαδήποτε Υπηρεσία επί πληρωμή που δεν παρήγγειλε το συγκεκριμένο άτομο. δ. Δεν μπορείτε να αγοράσετε ή να χρησιμοποιήσετε μια Υπηρεσία επί πληρωμή εάν είστε πρόσωπο με το οποίο τα πρόσωπα των ΗΠΑ δεν επιτρέπεται να έχουν συναλλαγές σύμφωνα με οικονομικές κυρώσεις, συμπεριλαμβανομένων, χωρίς περιορισμό, των κυρώσεων που διαχειρίζεται το Γραφείο Ελέγχου Εξωτερικών Περιουσιακών Στοιχείων του Υπουργείου Οικονομικών των Ηνωμένων Πολιτειών ή οποιαδήποτε άλλη ισχύουσα αρχή επιβολής κυρώσεων (" Απαγορευμένο Πρόσωπο "). Αυτό περιλαμβάνει, χωρίς περιορισμό, πρόσωπα που βρίσκονται ή διαμένουν συνήθως στις ακόλουθες χώρες και περιοχές: Κούβα, Ιράν, Ουκρανικές περιοχές της Κριμαίας, Βόρεια Κορέα και Συρία. Δηλώνετε και εγγυάστε ότι δεν είστε Απαγορευμένο Πρόσωπο. ε. ΔΗΛΩΝΕΤΕ ΟΤΙ ΘΑ ΧΡΗΣΙΜΟΠΟΙΗΣΕΤΕ ΤΙΣ ΠΛΗΡΩΜΕΝΕΣ ΥΠΗΡΕΣΙΕΣ ΜΟΝΟ ΓΙΑ ΝΟΜΙΜΟΥΣ ΣΚΟΠΟΥΣ ΚΑΙ ΜΟΝΟ ΣΥΜΦΩΝΑ ΜΕ ΤΟΥΣ ΟΡΟΥΣ. Φόροι και Τέλη . Είστε υπεύθυνοι και συμφωνείτε να πληρώσετε όλους τους ισχύοντες φόρους, δασμούς, δασμολόγια και τέλη που σχετίζονται με την αγορά των πληρωμένων υπηρεσιών, συμπεριλαμβανομένων εκείνων που απαιτείται να καταβληθούν είτε στο X είτε σε τρίτο φορέα επεξεργασίας πληρωμών. Αυτοί οι φόροι μπορεί να περιλαμβάνουν, μεταξύ άλλων, ΦΠΑ, GST, φόρο επί των πωλήσεων, παρακρατούμενους φόρους και οποιουσδήποτε άλλους ισχύοντες φόρους. Ανάλογα με την τοποθεσία σας, το X ενδέχεται να είναι υπεύθυνο για τη συλλογή και την αναφορά πληροφοριών σχετικά με τους φόρους συναλλαγών που προκύπτουν από την αγορά πληρωμένων υπηρεσιών. Παρέχετε στο X την άδεια να παρέχει τον λογαριασμό σας και τις προσωπικές σας πληροφορίες στις αρμόδιες φορολογικές αρχές για την εκπλήρωση των υποχρεώσεών μας όσον αφορά τη συλλογή φόρων και την υποβολή εκθέσεων.   Γενικοί Όροι 1. Στοιχεία επικοινωνίας. Εάν έχετε οποιεσδήποτε ερωτήσεις σχετικά με τις Υπηρεσίες επί πληρωμή ή αυτούς τους Όρους, μπορείτε να ανατρέξετε στο X Κέντρο βοήθειας υπηρεσιών επί πληρωμή για περισσότερες πληροφορίες. Εάν έχετε ήδη αγοράσει μια Υπηρεσία επί πληρωμή, μπορείτε επίσης να επικοινωνήσετε μαζί μας μέσω του συνδέσμου υποστήριξης που είναι διαθέσιμος στο μενού πλοήγησης του λογαριασμού σας X στις ρυθμίσεις πληρωμής ή συνδρομής. Εάν έχετε επιπλέον ερωτήσεις, τότε μπορείτε να επικοινωνήσετε μαζί μας εδώ χρησιμοποιώντας τη φόρμα "Βοήθεια με λειτουργίες επί πληρωμή". 2. ΑΠΟΠΟΙΗΣΗ ΕΥΘΥΝΩΝ. ΣΤΟΝ ΜΕΓΙΣΤΟ ΒΑΘΜΟ ΠΟΥ ΕΠΙΤΡΕΠΕΤΑΙ ΑΠΟ ΤΗΝ ΙΣΧΥΟΥΣΑ ΝΟΜΟΘΕΣΙΑ, Η ΠΡΟΣΒΑΣΗ ΣΑΣ ΚΑΙ Η ΧΡΗΣΗ ΤΩΝ ΥΠΗΡΕΣΙΩΝ ΠΛΗΡΩΜΕΝΩΝ ΓΙΝΕΤΑΙ ΜΕ ΔΙΚΗ ΣΑΣ ΕΥΘΥΝΗ. ΚΑΤΑΝΟΕΙΤΕ ΚΑΙ ΣΥΜΦΩΝΕΙΤΕ ΟΤΙ ΟΙ ΕΠΙ ΠΛΗΡΩΜΗ ΥΠΗΡΕΣΙΕΣ ΣΑΣ ΠΑΡΕΧΟΝΤΑΙ "ΟΠΩΣ ΕΙΝΑΙ" ΚΑΙ "ΟΠΩΣ ΕΙΝΑΙ ΔΙΑΘΕΣΙΜΕΣ". Το X ΑΠΟΠΟΙΕΙΤΑΙ ΟΛΕΣ ΤΙΣ ΕΓΓΥΗΣΕΙΣ ΚΑΙ ΤΙΣ ΠΡΟΫΠΟΘΕΣΕΙΣ, ΡΗΤΕΣ Ή ΣΙΩΠΗΡΕΣ, ΕΜΠΟΡΕΥΣΙΜΟΤΗΤΑΣ, ΚΑΤΑΛΛΗΛΟΤΗΤΑΣ ΓΙΑ ΣΥΓΚΕΚΡΙΜΕΝΟ ΣΚΟΠΟ Ή ΜΗ ΠΑΡΑΒΙΑΣΗΣ. ΤΟ X ΔΕΝ ΠΑΡΕΧΕΙ ΚΑΜΙΑ ΕΓΓΥΗΣΗ Ή ΑΝΤΙΠΡΟΣΩΠΕΥΣΗ ΚΑΙ ΑΠΟΠΟΙΕΙΤΑΙ ΚΑΘΕ ΕΥΘΥΝΗ ΚΑΙ ΕΥΘΥΝΗ ΓΙΑ: (I) ΤΗΝ ΠΛΗΡΟΤΗΤΑ, ΤΗΝ ΑΚΡΙΒΕΙΑ, ΤΗ ΔΙΑΘΕΣΙΜΟΤΗΤΑ, ΤΗΝ ΕΠΙΚΑΙΡΟΤΗΤΑ, ΤΗΝ ΑΣΦΑΛΕΙΑ Ή ΤΗΝ ΑΞΙΟΠΙΣΤΙΑ ΤΩΝ ΠΛΗΡΩΜΕΝΩΝ ΥΠΗΡΕΣΙΩΝ ΚΑΙ (II) ΤΟ ΑΝ ΟΙ ΠΛΗΡΩΜΕΝΕΣ ΥΠΗΡΕΣΙΕΣ ΘΑ ΙΚΑΝΟΠΟΙΟΥΝ ΤΙΣ ΑΠΑΙΤΗΣΕΙΣ ΣΑΣ Ή ΘΑ ΕΙΝΑΙ ΔΙΑΘΕΣΙΜΕΣ ΑΠΡΟΣΚΟΠΤΑ, ΑΣΦΑΛΩΣ Ή ΧΩΡΙΣ ΛΑΘΗ. ΕΙΣΤΕ ΥΠΕΥΘΥΝΟΙ ΓΙΑ ΤΗ ΧΡΗΣΗ ΤΗΣ ΥΠΗΡΕΣΙΑΣ ΤΟΥ X, ΣΥΜΠΕΡΙΛΑΜΒΑΝΟΜΕΝΩΝ ΤΩΝ ΠΛΗΡΩΜΕΝΩΝ ΥΠΗΡΕΣΙΩΝ, ΚΑΙ ΟΠΟΙΟΔΗΠΟΤΕ ΠΕΡΙΕΧΟΜΕΝΟ ΠΑΡΕΧΕΤΕ. 3. ΤΠΕΡΙΟΡΙΣΜΟΣ ΤΗΣ ΕΥΘΥΝΗΣ. ΣΤΟ ΜΕΓΙΣΤΟ ΜΕΤΡΟ ΠΟΥ ΕΠΙΤΡΕΠΕΤΑΙ ΑΠΟ ΤΗΝ ΙΣΧΥΟΥΣΑ ΝΟΜΟΘΕΣΙΑ, ΟΙ ΟΝΤΟΤΗΤΕΣ ΤΟΥ X ΔΕΝ ΕΥΘΥΝΟΝΤΑΙ ΓΙΑ ΟΠΟΙΕΣΔΗΠΟΤΕ ΕΜΜΕΣΕΣ, ΠΑΡΕΜΠΙΠΤΟΥΣΕΣ, ΕΙΔΙΚΕΣ, ΕΠΑΓΩΓΙΚΕΣ Η ΤΙΜΩΡΗΤΙΚΕΣ ΖΗΜΙΕΣ, Η ΟΠΟΙΑΔΗΠΟΤΕ ΑΠΩΛΕΙΑ ΚΕΡΔΟΥΣ Η ΕΙΣΟΔΗΜΑΤΟΣ, ΑΝΕΞΑΡΤΗΤΩΣ ΑΜΕΣΑ Ή ΕΜΜΕΣΑ, Ή ΟΠΟΙΑΔΗΠΟΤΕ ΑΠΩΛΕΙΑ ΣΤΟΙΧΕΙΩΝ, ΧΡΗΣΗΣ, ΠΕΡΙΟΥΣΙΑΚΗΣ ΕΥΘΥΝΗΣ Ή ΑΛΛΩΝ ΑΥΘΑΙΡΕΤΩΝ ΑΠΩΛΕΙΩΝ, ΠΟΥ ΠΡΟΚΥΠΤΟΥΝ ΑΠΟ (i) ΤΗΝ ΠΡΟΣΒΑΣΗ ΣΑΣ ΣΤΙΣ ΠΛΗΡΩΜΕΝΕΣ ΥΠΗΡΕΣΙΕΣ Ή ΤΗ ΧΡΗΣΗ Ή ΤΗΝ ΑΔΥΝΑΜΙΑ ΠΡΟΣΒΑΣΗΣ Ή ΧΡΗΣΗΣ ΤΩΝ ΠΛΗΡΩΜΕΝΩΝ ΥΠΗΡΕΣΙΩΝ, (ii) ΟΠΟΙΑΣΔΗΠΟΤΕ ΣΥΜΠΕΡΙΦΟΡΑΣ Ή ΠΕΡΙΕΧΟΜΕΝΟΥ ΟΠΟΙΟΥΔΗΠΟΤΕ ΤΡΙΤΟΥ ΜΕΣΩ ΤΩΝ ΠΛΗΡΩΜΩΝ ΥΠΗΡΕΣΙΩΝ, ΣΥΜΠΕΡΙΛΑΜΒΑΝΟΜΕΝΗΣ, ΧΩΡΙΣ ΠΕΡΙΟΡΙΣΜΟ, ΟΠΟΙΑΣΔΗΠΟΤΕ ΔΥΝΗΤΙΚΗΣ, ΠΡΟΣΒΑΣΤΙΚΗΣ Ή ΠΑΡΑΝΟΜΗΣ ΣΥΜΠΕΡΙΦΟΡΑΣ ΑΛΛΩΝ ΧΡΗΣΤΩΝ Ή ΤΡΙΤΩΝ, (iii) ΟΠΟΙΟΥΔΗΠΟΤΕ ΠΕΡΙΕΧΟΜΕΝΟΥ ΑΠΟ ΤΙΣ ΠΛΗΡΩΜΕΣ ΥΠΗΡΕΣΙΕΣ, Ή (iv) ΑΔΙΑΦΟΡΕΤΙΚΗΣ ΠΡΟΣΒΑΣΗΣ, ΧΡΗΣΗΣ Ή ΑΛΛΑΓΗΣ ΤΩΝ ΜΕΤΑΔΟΣΕΩΝ ΣΑΣ Ή ΤΟΥ ΠΕΡΙΕΧΟΜΕΝΟΥ ΣΑΣ. ΠΡΟΣ ΑΠΟΦΥΓΗ ΑΜΦΙΒΟΛΙΩΝ, Ο ΟΡΙΣΜΟΣ ΤΩΝ ΕΠΙ ΠΛΗΡΩΜΉ ΥΠΗΡΕΣΙΩΝ ΠΕΡΙΟΡΙΖΕΤΑΙ ΣΤΙΣ ΛΕΙΤΟΥΡΓΙΕΣ ΠΟΥ ΠΡΟΣΦΕΡΕΙ ΤΟ X ΚΑΙ ΔΕΝ ΠΕΡΙΛΑΜΒΑΝΕΙ ΤΟ ΠΕΡΙΕΧΟΜΕΝΟ ΣΤΟ ΟΠΟΙΟ ΕΧΕΤΕ ΠΡΟΣΒΑΣΗ ΚΑΙ/Ή ΑΛΛΗΛΕΠΙΔΡΑΣΗ ΜΕ ΤΟ ΟΠΟΙΟ ΧΡΗΣΙΜΟΠΟΙΕΙΤΕ ΤΙΣ ΕΝ ΛΟΓΩ ΛΕΙΤΟΥΡΓΙΕΣ ΣΕ ΚΑΜΙΑ ΠΕΡΙΠΤΩΣΗ Η ΣΥΝΟΛΙΚΗ ΕΥΘΥΝΗ ΤΩΝ ΟΝΤΟΤΗΤΩΝ X ΔΕΝ ΥΠΕΡΒΑΙΝΕΙ ΤΟ ΠΕΡΙΣΣΟΤΕΡΟ ΤΩΝ ΕΚΑΤΟ ΔΟΛΑΡΩΝ ΗΠΑ (100,00 $ ΗΠΑ) Ή ΤΟ ΠΟΣΟ ΠΟΥ ΜΑΣ ΠΛΗΡΩΣΕΤΕ, ΑΝ ΥΠΑΡΧΕΙ, ΚΑΤΑ ΤΟΥΣ ΤΕΛΕΥΤΑΙΟΥΣ ΕΞΙ ΜΗΝΕΣ ΓΙΑ ΤΙΣ ΑΜΕΙΒΟΜΕΝΕΣ ΥΠΗΡΕΣΙΕΣ ΠΟΥ ΔΗΜΙΟΥΡΓΟΥΝ ΤΗΝ ΑΙΤΗΣΗ. ΟΙ ΠΕΡΙΟΡΙΣΜΟΙ ΤΗΣ ΠΑΡΟΥΣΑΣ ΕΝΟΤΗΤΑΣ ΙΣΧΥΟΥΝ ΓΙΑ ΟΠΟΙΑΔΗΠΟΤΕ ΘΕΩΡΙΑ ΕΥΘΥΝΗΣ, ΕΙΤΕ ΒΑΣΙΖΟΝΤΑΙ ΣΕ ΕΓΓΥΗΣΗ, ΣΥΜΒΑΣΗ, ΚΑΤΑΣΤΑΤΙΚΟ, ΑΔΙΚΟΠΡΑΞΙΑ (ΣΥΜΠΕΡΙΛΑΜΒΑΝΟΜΕΝΗΣ ΤΗΣ ΑΜΕΛΕΙΑΣ) ΕΙΤΕ ΜΕ ΑΛΛΟ ΤΡΟΠΟ, ΚΑΙ ΕΙΤΕ ΟΙ ΟΝΤΟΤΗΤΕΣ ΤΟΥ X ΕΧΟΥΝ ΕΝΗΜΕΡΩΘΕΙ ΓΙΑ ΤΗΝ ΠΙΘΑΝΟΤΗΤΑ ΟΠΟΙΑΣΔΗΠΟΤΕ ΤΕΤΟΙΑΣ ΖΗΜΙΑΣ ΕΙΤΕ ΟΧΙ, ΚΑΙ ΑΚΟΜΗ ΚΑΙ ΑΝ ΔΙΑΠΙΣΤΩΘΕΙ ΟΤΙ ΕΝΑ ΜΕΣΟ ΑΠΟΚΑΤΑΣΤΑΣΗΣ ΠΟΥ ΠΕΡΙΓΡΑΦΕΤΑΙ ΣΤΟ ΠΑΡΟΝ ΑΠΟΤΥΓΧΑΝΕΙ ΤΟΥ ΟΥΣΙΑΣΤΙΚΟΥ ΣΚΟΠΟΥ ΤΟΥ. ΟΙ "ΟΝΤΟΤΗΤΕΣ ΤΟΥ X" ΑΝΑΦΕΡΟΝΤΑΙ ΣΤΟ X, ΤΙΣ ΜΗΤΡΙΚΕΣ, ΤΙΣ ΘΥΓΑΤΡΙΚΕΣ, ΣΧΕΤΙΚΕΣ ΕΤΑΙΡΕΙΕΣ, ΣΤΕΛΕΧΗ, ΔΙΕΥΘΥΝΤΕΣ, ΕΡΓΑΖΟΜΕΝΟΥΣ, ΠΡΑΚΤΟΡΕΣ, ΕΚΠΡΟΣΩΠΟΥΣ, ΣΥΝΕΡΓΑΤΕΣ ΚΑΙ ΔΙΚΑΙΟΠΑΡΟΧΟΥΣ. Η ΙΣΧΥΟΥΣΑ ΝΟΜΟΘΕΣΙΑ ΣΤΗ ΔΙΚΑΙΟΔΟΣΙΑ ΣΑΣ ΕΝΔΕΧΕΤΑΙ ΝΑ ΜΗΝ ΕΠΙΤΡΕΠΕΙ ΟΡΙΣΜΕΝΟΥΣ ΠΕΡΙΟΡΙΣΜΟΥΣ ΕΥΘΥΝΗΣ. ΣΤΟ ΒΑΘΜΟ ΠΟΥ ΑΠΑΙΤΕΙΤΑΙ ΑΠΟ ΤΗΝ ΙΣΧΥΟΥΣΑ ΝΟΜΟΘΕΣΙΑ ΣΤΗ ΔΙΚΑΙΟΔΟΣΙΑ ΣΑΣ, ΤΑ ΠΑΡΑΠΑΝΩ ΔΕΝ ΠΕΡΙΟΡΙΖΟΥΝ ΤΗΝ ΕΥΘΥΝΗ ΤΩΝ ΟΝΤΟΤΗΤΩΝ ΤΟΥ X ΓΙΑ ΑΠΑΤΗ, ΔΟΛΙΑ ΠΑΡΑΠΛΑΝΗΣΗ, ΘΑΝΑΤΟ Ή ΣΩΜΑΤΙΚΗ ΒΛΑΒΗ ΠΟΥ ΠΡΟΚΑΛΕΙΤΑΙ ΑΠΟ ΑΜΕΛΕΙΑ, ΒΑΡΙΑ ΑΜΕΛΕΙΑ Ή/ΚΑΙ ΣΚΟΠΙΜΗ ΣΥΜΠΕΡΙΦΟΡΑ. ΣΤΟΝ ΠΛΗΡΗ ΒΑΘΜΟ ΠΟΥ ΕΠΙΤΡΕΠΕΤΑΙ ΣΥΜΦΩΝΑ ΜΕ ΤΗΝ ΙΣΧΥΟΥΣΑ ΝΟΜΟΘΕΣΙΑ, Η ΜΕΓΙΣΤΗ ΑΘΡΟΙΣΤΙΚΗ ΕΥΘΥΝΗ ΤΩΝ ΟΝΤΟΤΗΤΩΝ X ΓΙΑ ΟΠΟΙΕΣΔΗΠΟΤΕ ΜΗ ΕΞΑΙΡΟΥΜΕΝΕΣ ΕΓΓΥΗΣΕΙΣ ΠΕΡΙΟΡΙΖΕΤΑΙ ΣΕ ΕΚΑΤΟ ΔΟΛΛΑΡΙΑ ΗΠΑ (US$100,00). 4. Σημείωση σχετικά με την Apple. Στο βαθμό που αγοράσατε τις Υπηρεσίες επί πληρωμή ή χρησιμοποιείτε ή αποκτάτε πρόσβαση στις Υπηρεσίες επί πληρωμή σε συσκευή iOS, περαιτέρω αναγνωρίζετε και συμφωνείτε με τους όρους αυτής της Ενότητας. Αναγνωρίζετε ότι οι Όροι είναι μεταξύ εσάς και εμάς μόνο, όχι με την Apple και η Apple δεν είναι υπεύθυνη για τις Υπηρεσίες επί πληρωμή και το περιεχόμενό τους. Η Apple δεν έχει καμία απολύτως υποχρέωση να παρέχει οποιαδήποτε υπηρεσία συντήρησης και υποστήριξης σε σχέση με τις Υπηρεσίες επί πληρωμή. Σε περίπτωση μη συμμόρφωσης των Υπηρεσιών επί πληρωμή με οποιαδήποτε ισχύουσα εγγύηση, μπορείτε να ειδοποιήσετε την Apple και η Apple θα σας επιστρέψει οποιαδήποτε ισχύουσα τιμή αγοράς για τις Υπηρεσίες επί πληρωμή και, στο μέγιστο βαθμό που επιτρέπεται από την ισχύουσα νομοθεσία, η Apple δεν έχει καμία άλλη υποχρέωση εγγύησης σε σχέση με τις Υπηρεσίες επί πληρωμή. Η Apple δεν είναι υπεύθυνη για την αντιμετώπιση οποιωνδήποτε αξιώσεων από εσάς ή οποιονδήποτε τρίτο σχετικά με τις Υπηρεσίες επί πληρωμή ή την κατοχή ή/και χρήση των Υπηρεσιών επί πληρωμή από εσάς, συμπεριλαμβανομένων, ενδεικτικά: (iii) αξιώσεις που απορρέουν από την προστασία του καταναλωτή ή παρόμοια νομοθεσία. Η Apple δεν είναι υπεύθυνη για τη διερεύνηση, την υπεράσπιση, τον διακανονισμό και την απαλλαγή από οποιαδήποτε αξίωση τρίτου ότι οι Υπηρεσίες επί πληρωμή ή/και η κατοχή και η χρήση της εφαρμογής για κινητά από εσάς παραβιάζουν τα δικαιώματα πνευματικής ιδιοκτησίας του εν λόγω τρίτου. Συμφωνείτε να συμμορφώνεστε με τυχόν ισχύοντες όρους τρίτων όταν χρησιμοποιείτε τις Υπηρεσίες επί πληρωμή. Η Apple και οι θυγατρικές της Apple είναι τρίτοι δικαιούχοι των Όρων και μετά την αποδοχή των Όρων από εσάς, η Apple θα έχει το δικαίωμα (και θα θεωρείται ότι έχει αποδεχτεί το δικαίωμα) να επιβάλει τους Όρους εναντίον σας ως τρίτος δικαιούχος των Όρων. Με το παρόν δηλώνετε και εγγυάστε ότι (i) δεν βρίσκεστε σε χώρα που υπόκειται σε εμπάργκο της κυβέρνησης των ΗΠΑ ή που έχει οριστεί από την κυβέρνηση των ΗΠΑ ως" χώρα που υποστηρίζει την τρομοκρατία"; και (ii) δεν περιέχεστε σε καμία λίστα απαγορευμένων ή υπό περιορισμό μερών της κυβέρνησης των ΗΠΑ. 5. Σύγκρουση. Σε περίπτωση σύγκρουσης μεταξύ των διατάξεων των παρόντων Όρων Παροχής Υπηρεσιών για Αγοραστές X και των διατάξεων της Συμφωνίας Χρήστη X, οι διατάξεις των παρόντων Όρων Παροχής Υπηρεσιών για Αγοραστές X υπερισχύουν αποκλειστικά και μόνο όσον αφορά τη χρήση μιας Υπηρεσίας επί πληρωμή από εσάς.   6. ΕΠΙΛΥΣΗ ΔΙΑΦΟΡΩΝ ΚΑΙ ΠΑΡΑΙΤΗΣΗ ΑΠΟ ΟΜΑΔΙΚΕΣ ΑΓΩΓΕΣ α. Αρχική επίλυση διαφορών.  Οι περισσότερες διαφορές ανάμεσα σε εσάς και τον Χ μπορούν να επιλυθούν ανεπίσημα. Μπορείτε να επικοινωνήσετε μαζί μας γράφοντας την Υποστήριξη Επί Πληρωμή εδώ . Όταν επικοινωνείτε μαζί μας, παρακαλείστε να δώσετε μια σύντομη περιγραφή της φύσης και των βάσεων των ανησυχιών σας, τα στοιχεία επικοινωνίας σας και τη συγκεκριμένη βοήθεια που ζητάτε. Τα μέρη θα καταβάλουν κάθε δυνατή προσπάθεια μέσω αυτής της διαδικασίας υποστήριξης για την επίλυση διαφορών, αξιώσεων ή αντιπαραθέσεων που προκύπτουν από ή σχετίζονται με τους παρόντες Όρους ή/και τη συμμετοχή σας στο Πρόγραμμα (μεμονωμένα μια " Διαφορά " ή περισσότερες από μία, " Διαφορές "). Εσείς και εμείς συμφωνούμε ότι η καλόπιστη συμμετοχή σε αυτήν την ανεπίσημη διαδικασία απαιτείται και πρέπει να ολοκληρωθεί όπως ορίζεται παραπάνω προτού οποιοδήποτε μέρος μπορέσει να ξεκινήσει δικαστική διαμάχη σχετικά με οποιαδήποτε Διαφορά, εκτός από τα αιτήματα για ασφαλιστικά μέτρα έκτακτης ανάγκης (« Εξαιρούμενη Διαφορά »). Εάν δεν μπορέσουμε να καταλήξουμε σε μια συμφωνημένη επίλυση μαζί σας σχετικά με μια Διαφωνία (εκτός από μια Εξαιρούμενη Διαφωνία) εντός τριάντα (30) ημερών από την έναρξη της άτυπης επίλυσης διαφορών σύμφωνα με την παραπάνω διάταξη για την αρχική επίλυση διαφορών, τότε είτε εσείς είτε εμείς μπορούμε κινήσει δικαστική διαμάχη. β.   Επιλογή δικαίου και επιλογή δικαστηρίου . ΠΑΡΑΚΑΛΩ ΔΙΑΒΑΣΤΕ ΑΥΤΗ ΤΗΝ ΕΝΟΤΗΤΑ ΠΡΟΣΕΚΤΙΚΑ – ΜΠΟΡΕΙ ΝΑ ΕΠΗΡΕΑΖΕΙ ΣΗΜΑΝΤΙΚΑ ΤΑ ΝΟΜΙΚΑ ΣΑΣ ΔΙΚΑΙΩΜΑΤΑ, ΣΥΜΠΕΡΙΛΑΜΒΑΝΟΜΕΝΟΥ ΤΟΥ ΔΙΚΑΙΩΜΑΤΟΣ ΣΑΣ ΝΑ ΚΑΤΑΘΕΣΕΤΕ ΑΓΩΓΗ ΣΤΟ ΔΙΚΑΣΤΗΡΙΟ. Οι νόμοι της Πολιτείας του Τέξας, εξαιρουμένων των διατάξεων περί επιλογής νόμου, θα διέπουν τους παρόντες Όρους και οποιαδήποτε διαφορά προκύψει μεταξύ εσάς και εμάς, ανεξάρτητα από οποιαδήποτε άλλη συμφωνία μεταξύ εσάς και εμάς για το αντίθετο. Όλες οι διαφορές που σχετίζονται με αυτούς τους Όρους, συμπεριλαμβανομένων τυχόν διαφορών, αξιώσεων ή διαφωνιών που προκύπτουν από ή σχετίζονται με αυτούς τους Όρους, θα εκδικάζονται αποκλειστικά στο ομοσπονδι�
2026-01-13T08:48:39
https://parenting.forem.com/jennyli/what-do-you-do-when-your-kids-wont-wear-weather-appropriate-clothes-222k
What do you do when your kids won't wear weather appropriate clothes? - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse Jenny Li Posted on Oct 14, 2025           What do you do when your kids won't wear weather appropriate clothes? # discuss I'm tired of fighting Penelope (my 4yo) on her clothing options for the day. It's getting cold in buffalo and shorts aren't an option when she spends most of the school day outside. Do I force warm clothing on her or give her bodily autonomy to suffer the consequences of being dressed inappropriately? Note: I also don't want to suffer these consequences bc I assume she'll just get sick. And then everyone will get sick. Not really sure what the happy medium is here. Top comments (1) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Collapse Expand   Jess Lee Jess Lee Jess Lee Follow Building DEV and Forem with everyone here. Interested in the future. Email jess@forem.com Location USA / TAIWAN Pronouns she/they Work Co-Founder & COO at Forem Joined Jul 29, 2016 • Oct 14 '25 Dropdown menu Copy link Hide Ugh, feel you on this. If I can't influence them to make the right choice, I just pack extra clothes with them to school so that they have something to put on when they inevitably get cold. It's not ideal. Like comment: Like comment: 1  like Like Comment button Reply Some comments may only be visible to logged-in visitors. Sign in to view all comments. Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse Jenny Li Follow Mom to Penelope and Sky 💕 Parrot person 🦜 Joined Oct 14, 2025 More from Jenny Li Weaning Woes # venting # bodyfeeding Feeling sad about the lack of diversity at my kid's school # inclusion # venting 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://docs.python.org/3/faq/programming.html#faq-programming-raw-string-backslash
Programming FAQ — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents Programming FAQ General Questions Core Language Numbers and strings Performance Sequences (Tuples/Lists) Objects Modules Previous topic General Python FAQ Next topic Design and History FAQ This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » Python Frequently Asked Questions » Programming FAQ | Theme Auto Light Dark | Programming FAQ ¶ Contents Programming FAQ General Questions Is there a source code level debugger with breakpoints, single-stepping, etc.? Are there tools to help find bugs or perform static analysis? How can I create a stand-alone binary from a Python script? Are there coding standards or a style guide for Python programs? Core Language Why am I getting an UnboundLocalError when the variable has a value? What are the rules for local and global variables in Python? Why do lambdas defined in a loop with different values all return the same result? How do I share global variables across modules? What are the “best practices” for using import in a module? Why are default values shared between objects? How can I pass optional or keyword parameters from one function to another? What is the difference between arguments and parameters? Why did changing list ‘y’ also change list ‘x’? How do I write a function with output parameters (call by reference)? How do you make a higher order function in Python? How do I copy an object in Python? How can I find the methods or attributes of an object? How can my code discover the name of an object? What’s up with the comma operator’s precedence? Is there an equivalent of C’s “?:” ternary operator? Is it possible to write obfuscated one-liners in Python? What does the slash(/) in the parameter list of a function mean? Numbers and strings How do I specify hexadecimal and octal integers? Why does -22 // 10 return -3? How do I get int literal attribute instead of SyntaxError? How do I convert a string to a number? How do I convert a number to a string? How do I modify a string in place? How do I use strings to call functions/methods? Is there an equivalent to Perl’s chomp() for removing trailing newlines from strings? Is there a scanf() or sscanf() equivalent? What does UnicodeDecodeError or UnicodeEncodeError error mean? Can I end a raw string with an odd number of backslashes? Performance My program is too slow. How do I speed it up? What is the most efficient way to concatenate many strings together? Sequences (Tuples/Lists) How do I convert between tuples and lists? What’s a negative index? How do I iterate over a sequence in reverse order? How do you remove duplicates from a list? How do you remove multiple items from a list How do you make an array in Python? How do I create a multidimensional list? How do I apply a method or function to a sequence of objects? Why does a_tuple[i] += [‘item’] raise an exception when the addition works? I want to do a complicated sort: can you do a Schwartzian Transform in Python? How can I sort one list by values from another list? Objects What is a class? What is a method? What is self? How do I check if an object is an instance of a given class or of a subclass of it? What is delegation? How do I call a method defined in a base class from a derived class that extends it? How can I organize my code to make it easier to change the base class? How do I create static class data and static class methods? How can I overload constructors (or methods) in Python? I try to use __spam and I get an error about _SomeClassName__spam. My class defines __del__ but it is not called when I delete the object. How do I get a list of all instances of a given class? Why does the result of id() appear to be not unique? When can I rely on identity tests with the is operator? How can a subclass control what data is stored in an immutable instance? How do I cache method calls? Modules How do I create a .pyc file? How do I find the current module name? How can I have modules that mutually import each other? __import__(‘x.y.z’) returns <module ‘x’>; how do I get z? When I edit an imported module and reimport it, the changes don’t show up. Why does this happen? General Questions ¶ Is there a source code level debugger with breakpoints, single-stepping, etc.? ¶ Yes. Several debuggers for Python are described below, and the built-in function breakpoint() allows you to drop into any of them. The pdb module is a simple but adequate console-mode debugger for Python. It is part of the standard Python library, and is documented in the Library Reference Manual . You can also write your own debugger by using the code for pdb as an example. The IDLE interactive development environment, which is part of the standard Python distribution (normally available as Tools/scripts/idle3 ), includes a graphical debugger. PythonWin is a Python IDE that includes a GUI debugger based on pdb. The PythonWin debugger colors breakpoints and has quite a few cool features such as debugging non-PythonWin programs. PythonWin is available as part of pywin32 project and as a part of the ActivePython distribution. Eric is an IDE built on PyQt and the Scintilla editing component. trepan3k is a gdb-like debugger. Visual Studio Code is an IDE with debugging tools that integrates with version-control software. There are a number of commercial Python IDEs that include graphical debuggers. They include: Wing IDE Komodo IDE PyCharm Are there tools to help find bugs or perform static analysis? ¶ Yes. Pylint and Pyflakes do basic checking that will help you catch bugs sooner. Static type checkers such as Mypy , Pyre , and Pytype can check type hints in Python source code. How can I create a stand-alone binary from a Python script? ¶ You don’t need the ability to compile Python to C code if all you want is a stand-alone program that users can download and run without having to install the Python distribution first. There are a number of tools that determine the set of modules required by a program and bind these modules together with a Python binary to produce a single executable. One is to use the freeze tool, which is included in the Python source tree as Tools/freeze . It converts Python byte code to C arrays; with a C compiler you can embed all your modules into a new program, which is then linked with the standard Python modules. It works by scanning your source recursively for import statements (in both forms) and looking for the modules in the standard Python path as well as in the source directory (for built-in modules). It then turns the bytecode for modules written in Python into C code (array initializers that can be turned into code objects using the marshal module) and creates a custom-made config file that only contains those built-in modules which are actually used in the program. It then compiles the generated C code and links it with the rest of the Python interpreter to form a self-contained binary which acts exactly like your script. The following packages can help with the creation of console and GUI executables: Nuitka (Cross-platform) PyInstaller (Cross-platform) PyOxidizer (Cross-platform) cx_Freeze (Cross-platform) py2app (macOS only) py2exe (Windows only) Are there coding standards or a style guide for Python programs? ¶ Yes. The coding style required for standard library modules is documented as PEP 8 . Core Language ¶ Why am I getting an UnboundLocalError when the variable has a value? ¶ It can be a surprise to get the UnboundLocalError in previously working code when it is modified by adding an assignment statement somewhere in the body of a function. This code: >>> x = 10 >>> def bar (): ... print ( x ) ... >>> bar () 10 works, but this code: >>> x = 10 >>> def foo (): ... print ( x ) ... x += 1 results in an UnboundLocalError : >>> foo () Traceback (most recent call last): ... UnboundLocalError : local variable 'x' referenced before assignment This is because when you make an assignment to a variable in a scope, that variable becomes local to that scope and shadows any similarly named variable in the outer scope. Since the last statement in foo assigns a new value to x , the compiler recognizes it as a local variable. Consequently when the earlier print(x) attempts to print the uninitialized local variable and an error results. In the example above you can access the outer scope variable by declaring it global: >>> x = 10 >>> def foobar (): ... global x ... print ( x ) ... x += 1 ... >>> foobar () 10 This explicit declaration is required in order to remind you that (unlike the superficially analogous situation with class and instance variables) you are actually modifying the value of the variable in the outer scope: >>> print ( x ) 11 You can do a similar thing in a nested scope using the nonlocal keyword: >>> def foo (): ... x = 10 ... def bar (): ... nonlocal x ... print ( x ) ... x += 1 ... bar () ... print ( x ) ... >>> foo () 10 11 What are the rules for local and global variables in Python? ¶ In Python, variables that are only referenced inside a function are implicitly global. If a variable is assigned a value anywhere within the function’s body, it’s assumed to be a local unless explicitly declared as global. Though a bit surprising at first, a moment’s consideration explains this. On one hand, requiring global for assigned variables provides a bar against unintended side-effects. On the other hand, if global was required for all global references, you’d be using global all the time. You’d have to declare as global every reference to a built-in function or to a component of an imported module. This clutter would defeat the usefulness of the global declaration for identifying side-effects. Why do lambdas defined in a loop with different values all return the same result? ¶ Assume you use a for loop to define a few different lambdas (or even plain functions), e.g.: >>> squares = [] >>> for x in range ( 5 ): ... squares . append ( lambda : x ** 2 ) This gives you a list that contains 5 lambdas that calculate x**2 . You might expect that, when called, they would return, respectively, 0 , 1 , 4 , 9 , and 16 . However, when you actually try you will see that they all return 16 : >>> squares [ 2 ]() 16 >>> squares [ 4 ]() 16 This happens because x is not local to the lambdas, but is defined in the outer scope, and it is accessed when the lambda is called — not when it is defined. At the end of the loop, the value of x is 4 , so all the functions now return 4**2 , i.e. 16 . You can also verify this by changing the value of x and see how the results of the lambdas change: >>> x = 8 >>> squares [ 2 ]() 64 In order to avoid this, you need to save the values in variables local to the lambdas, so that they don’t rely on the value of the global x : >>> squares = [] >>> for x in range ( 5 ): ... squares . append ( lambda n = x : n ** 2 ) Here, n=x creates a new variable n local to the lambda and computed when the lambda is defined so that it has the same value that x had at that point in the loop. This means that the value of n will be 0 in the first lambda, 1 in the second, 2 in the third, and so on. Therefore each lambda will now return the correct result: >>> squares [ 2 ]() 4 >>> squares [ 4 ]() 16 Note that this behaviour is not peculiar to lambdas, but applies to regular functions too. How do I share global variables across modules? ¶ The canonical way to share information across modules within a single program is to create a special module (often called config or cfg). Just import the config module in all modules of your application; the module then becomes available as a global name. Because there is only one instance of each module, any changes made to the module object get reflected everywhere. For example: config.py: x = 0 # Default value of the 'x' configuration setting mod.py: import config config . x = 1 main.py: import config import mod print ( config . x ) Note that using a module is also the basis for implementing the singleton design pattern, for the same reason. What are the “best practices” for using import in a module? ¶ In general, don’t use from modulename import * . Doing so clutters the importer’s namespace, and makes it much harder for linters to detect undefined names. Import modules at the top of a file. Doing so makes it clear what other modules your code requires and avoids questions of whether the module name is in scope. Using one import per line makes it easy to add and delete module imports, but using multiple imports per line uses less screen space. It’s good practice if you import modules in the following order: standard library modules – e.g. sys , os , argparse , re third-party library modules (anything installed in Python’s site-packages directory) – e.g. dateutil , requests , PIL.Image locally developed modules It is sometimes necessary to move imports to a function or class to avoid problems with circular imports. Gordon McMillan says: Circular imports are fine where both modules use the “import <module>” form of import. They fail when the 2nd module wants to grab a name out of the first (“from module import name”) and the import is at the top level. That’s because names in the 1st are not yet available, because the first module is busy importing the 2nd. In this case, if the second module is only used in one function, then the import can easily be moved into that function. By the time the import is called, the first module will have finished initializing, and the second module can do its import. It may also be necessary to move imports out of the top level of code if some of the modules are platform-specific. In that case, it may not even be possible to import all of the modules at the top of the file. In this case, importing the correct modules in the corresponding platform-specific code is a good option. Only move imports into a local scope, such as inside a function definition, if it’s necessary to solve a problem such as avoiding a circular import or are trying to reduce the initialization time of a module. This technique is especially helpful if many of the imports are unnecessary depending on how the program executes. You may also want to move imports into a function if the modules are only ever used in that function. Note that loading a module the first time may be expensive because of the one time initialization of the module, but loading a module multiple times is virtually free, costing only a couple of dictionary lookups. Even if the module name has gone out of scope, the module is probably available in sys.modules . Why are default values shared between objects? ¶ This type of bug commonly bites neophyte programmers. Consider this function: def foo ( mydict = {}): # Danger: shared reference to one dict for all calls ... compute something ... mydict [ key ] = value return mydict The first time you call this function, mydict contains a single item. The second time, mydict contains two items because when foo() begins executing, mydict starts out with an item already in it. It is often expected that a function call creates new objects for default values. This is not what happens. Default values are created exactly once, when the function is defined. If that object is changed, like the dictionary in this example, subsequent calls to the function will refer to this changed object. By definition, immutable objects such as numbers, strings, tuples, and None , are safe from change. Changes to mutable objects such as dictionaries, lists, and class instances can lead to confusion. Because of this feature, it is good programming practice to not use mutable objects as default values. Instead, use None as the default value and inside the function, check if the parameter is None and create a new list/dictionary/whatever if it is. For example, don’t write: def foo ( mydict = {}): ... but: def foo ( mydict = None ): if mydict is None : mydict = {} # create a new dict for local namespace This feature can be useful. When you have a function that’s time-consuming to compute, a common technique is to cache the parameters and the resulting value of each call to the function, and return the cached value if the same value is requested again. This is called “memoizing”, and can be implemented like this: # Callers can only provide two parameters and optionally pass _cache by keyword def expensive ( arg1 , arg2 , * , _cache = {}): if ( arg1 , arg2 ) in _cache : return _cache [( arg1 , arg2 )] # Calculate the value result = ... expensive computation ... _cache [( arg1 , arg2 )] = result # Store result in the cache return result You could use a global variable containing a dictionary instead of the default value; it’s a matter of taste. How can I pass optional or keyword parameters from one function to another? ¶ Collect the arguments using the * and ** specifiers in the function’s parameter list; this gives you the positional arguments as a tuple and the keyword arguments as a dictionary. You can then pass these arguments when calling another function by using * and ** : def f ( x , * args , ** kwargs ): ... kwargs [ 'width' ] = '14.3c' ... g ( x , * args , ** kwargs ) What is the difference between arguments and parameters? ¶ Parameters are defined by the names that appear in a function definition, whereas arguments are the values actually passed to a function when calling it. Parameters define what kind of arguments a function can accept. For example, given the function definition: def func ( foo , bar = None , ** kwargs ): pass foo , bar and kwargs are parameters of func . However, when calling func , for example: func ( 42 , bar = 314 , extra = somevar ) the values 42 , 314 , and somevar are arguments. Why did changing list ‘y’ also change list ‘x’? ¶ If you wrote code like: >>> x = [] >>> y = x >>> y . append ( 10 ) >>> y [10] >>> x [10] you might be wondering why appending an element to y changed x too. There are two factors that produce this result: Variables are simply names that refer to objects. Doing y = x doesn’t create a copy of the list – it creates a new variable y that refers to the same object x refers to. This means that there is only one object (the list), and both x and y refer to it. Lists are mutable , which means that you can change their content. After the call to append() , the content of the mutable object has changed from [] to [10] . Since both the variables refer to the same object, using either name accesses the modified value [10] . If we instead assign an immutable object to x : >>> x = 5 # ints are immutable >>> y = x >>> x = x + 1 # 5 can't be mutated, we are creating a new object here >>> x 6 >>> y 5 we can see that in this case x and y are not equal anymore. This is because integers are immutable , and when we do x = x + 1 we are not mutating the int 5 by incrementing its value; instead, we are creating a new object (the int 6 ) and assigning it to x (that is, changing which object x refers to). After this assignment we have two objects (the ints 6 and 5 ) and two variables that refer to them ( x now refers to 6 but y still refers to 5 ). Some operations (for example y.append(10) and y.sort() ) mutate the object, whereas superficially similar operations (for example y = y + [10] and sorted(y) ) create a new object. In general in Python (and in all cases in the standard library) a method that mutates an object will return None to help avoid getting the two types of operations confused. So if you mistakenly write y.sort() thinking it will give you a sorted copy of y , you’ll instead end up with None , which will likely cause your program to generate an easily diagnosed error. However, there is one class of operations where the same operation sometimes has different behaviors with different types: the augmented assignment operators. For example, += mutates lists but not tuples or ints ( a_list += [1, 2, 3] is equivalent to a_list.extend([1, 2, 3]) and mutates a_list , whereas some_tuple += (1, 2, 3) and some_int += 1 create new objects). In other words: If we have a mutable object ( list , dict , set , etc.), we can use some specific operations to mutate it and all the variables that refer to it will see the change. If we have an immutable object ( str , int , tuple , etc.), all the variables that refer to it will always see the same value, but operations that transform that value into a new value always return a new object. If you want to know if two variables refer to the same object or not, you can use the is operator, or the built-in function id() . How do I write a function with output parameters (call by reference)? ¶ Remember that arguments are passed by assignment in Python. Since assignment just creates references to objects, there’s no alias between an argument name in the caller and callee, and so no call-by-reference per se. You can achieve the desired effect in a number of ways. By returning a tuple of the results: >>> def func1 ( a , b ): ... a = 'new-value' # a and b are local names ... b = b + 1 # assigned to new objects ... return a , b # return new values ... >>> x , y = 'old-value' , 99 >>> func1 ( x , y ) ('new-value', 100) This is almost always the clearest solution. By using global variables. This isn’t thread-safe, and is not recommended. By passing a mutable (changeable in-place) object: >>> def func2 ( a ): ... a [ 0 ] = 'new-value' # 'a' references a mutable list ... a [ 1 ] = a [ 1 ] + 1 # changes a shared object ... >>> args = [ 'old-value' , 99 ] >>> func2 ( args ) >>> args ['new-value', 100] By passing in a dictionary that gets mutated: >>> def func3 ( args ): ... args [ 'a' ] = 'new-value' # args is a mutable dictionary ... args [ 'b' ] = args [ 'b' ] + 1 # change it in-place ... >>> args = { 'a' : 'old-value' , 'b' : 99 } >>> func3 ( args ) >>> args {'a': 'new-value', 'b': 100} Or bundle up values in a class instance: >>> class Namespace : ... def __init__ ( self , / , ** args ): ... for key , value in args . items (): ... setattr ( self , key , value ) ... >>> def func4 ( args ): ... args . a = 'new-value' # args is a mutable Namespace ... args . b = args . b + 1 # change object in-place ... >>> args = Namespace ( a = 'old-value' , b = 99 ) >>> func4 ( args ) >>> vars ( args ) {'a': 'new-value', 'b': 100} There’s almost never a good reason to get this complicated. Your best choice is to return a tuple containing the multiple results. How do you make a higher order function in Python? ¶ You have two choices: you can use nested scopes or you can use callable objects. For example, suppose you wanted to define linear(a,b) which returns a function f(x) that computes the value a*x+b . Using nested scopes: def linear ( a , b ): def result ( x ): return a * x + b return result Or using a callable object: class linear : def __init__ ( self , a , b ): self . a , self . b = a , b def __call__ ( self , x ): return self . a * x + self . b In both cases, taxes = linear ( 0.3 , 2 ) gives a callable object where taxes(10e6) == 0.3 * 10e6 + 2 . The callable object approach has the disadvantage that it is a bit slower and results in slightly longer code. However, note that a collection of callables can share their signature via inheritance: class exponential ( linear ): # __init__ inherited def __call__ ( self , x ): return self . a * ( x ** self . b ) Object can encapsulate state for several methods: class counter : value = 0 def set ( self , x ): self . value = x def up ( self ): self . value = self . value + 1 def down ( self ): self . value = self . value - 1 count = counter () inc , dec , reset = count . up , count . down , count . set Here inc() , dec() and reset() act like functions which share the same counting variable. How do I copy an object in Python? ¶ In general, try copy.copy() or copy.deepcopy() for the general case. Not all objects can be copied, but most can. Some objects can be copied more easily. Dictionaries have a copy() method: newdict = olddict . copy () Sequences can be copied by slicing: new_l = l [:] How can I find the methods or attributes of an object? ¶ For an instance x of a user-defined class, dir(x) returns an alphabetized list of the names containing the instance attributes and methods and attributes defined by its class. How can my code discover the name of an object? ¶ Generally speaking, it can’t, because objects don’t really have names. Essentially, assignment always binds a name to a value; the same is true of def and class statements, but in that case the value is a callable. Consider the following code: >>> class A : ... pass ... >>> B = A >>> a = B () >>> b = a >>> print ( b ) <__main__.A object at 0x16D07CC> >>> print ( a ) <__main__.A object at 0x16D07CC> Arguably the class has a name: even though it is bound to two names and invoked through the name B the created instance is still reported as an instance of class A . However, it is impossible to say whether the instance’s name is a or b , since both names are bound to the same value. Generally speaking it should not be necessary for your code to “know the names” of particular values. Unless you are deliberately writing introspective programs, this is usually an indication that a change of approach might be beneficial. In comp.lang.python, Fredrik Lundh once gave an excellent analogy in answer to this question: The same way as you get the name of that cat you found on your porch: the cat (object) itself cannot tell you its name, and it doesn’t really care – so the only way to find out what it’s called is to ask all your neighbours (namespaces) if it’s their cat (object)… ….and don’t be surprised if you’ll find that it’s known by many names, or no name at all! What’s up with the comma operator’s precedence? ¶ Comma is not an operator in Python. Consider this session: >>> "a" in "b" , "a" (False, 'a') Since the comma is not an operator, but a separator between expressions the above is evaluated as if you had entered: ( "a" in "b" ), "a" not: "a" in ( "b" , "a" ) The same is true of the various assignment operators ( = , += etc). They are not truly operators but syntactic delimiters in assignment statements. Is there an equivalent of C’s “?:” ternary operator? ¶ Yes, there is. The syntax is as follows: [ on_true ] if [ expression ] else [ on_false ] x , y = 50 , 25 small = x if x < y else y Before this syntax was introduced in Python 2.5, a common idiom was to use logical operators: [ expression ] and [ on_true ] or [ on_false ] However, this idiom is unsafe, as it can give wrong results when on_true has a false boolean value. Therefore, it is always better to use the ... if ... else ... form. Is it possible to write obfuscated one-liners in Python? ¶ Yes. Usually this is done by nesting lambda within lambda . See the following three examples, slightly adapted from Ulf Bartelt: from functools import reduce # Primes < 1000 print ( list ( filter ( None , map ( lambda y : y * reduce ( lambda x , y : x * y != 0 , map ( lambda x , y = y : y % x , range ( 2 , int ( pow ( y , 0.5 ) + 1 ))), 1 ), range ( 2 , 1000 ))))) # First 10 Fibonacci numbers print ( list ( map ( lambda x , f = lambda x , f :( f ( x - 1 , f ) + f ( x - 2 , f )) if x > 1 else 1 : f ( x , f ), range ( 10 )))) # Mandelbrot set print (( lambda Ru , Ro , Iu , Io , IM , Sx , Sy : reduce ( lambda x , y : x + ' \n ' + y , map ( lambda y , Iu = Iu , Io = Io , Ru = Ru , Ro = Ro , Sy = Sy , L = lambda yc , Iu = Iu , Io = Io , Ru = Ru , Ro = Ro , i = IM , Sx = Sx , Sy = Sy : reduce ( lambda x , y : x + y , map ( lambda x , xc = Ru , yc = yc , Ru = Ru , Ro = Ro , i = i , Sx = Sx , F = lambda xc , yc , x , y , k , f = lambda xc , yc , x , y , k , f :( k <= 0 ) or ( x * x + y * y >= 4.0 ) or 1 + f ( xc , yc , x * x - y * y + xc , 2.0 * x * y + yc , k - 1 , f ): f ( xc , yc , x , y , k , f ): chr ( 64 + F ( Ru + x * ( Ro - Ru ) / Sx , yc , 0 , 0 , i )), range ( Sx ))): L ( Iu + y * ( Io - Iu ) / Sy ), range ( Sy ))))( - 2.1 , 0.7 , - 1.2 , 1.2 , 30 , 80 , 24 )) # \___ ___/ \___ ___/ | | |__ lines on screen # V V | |______ columns on screen # | | |__________ maximum of "iterations" # | |_________________ range on y axis # |____________________________ range on x axis Don’t try this at home, kids! What does the slash(/) in the parameter list of a function mean? ¶ A slash in the argument list of a function denotes that the parameters prior to it are positional-only. Positional-only parameters are the ones without an externally usable name. Upon calling a function that accepts positional-only parameters, arguments are mapped to parameters based solely on their position. For example, divmod() is a function that accepts positional-only parameters. Its documentation looks like this: >>> help ( divmod ) Help on built-in function divmod in module builtins: divmod(x, y, /) Return the tuple (x//y, x%y). Invariant: div*y + mod == x. The slash at the end of the parameter list means that both parameters are positional-only. Thus, calling divmod() with keyword arguments would lead to an error: >>> divmod ( x = 3 , y = 4 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : divmod() takes no keyword arguments Numbers and strings ¶ How do I specify hexadecimal and octal integers? ¶ To specify an octal digit, precede the octal value with a zero, and then a lower or uppercase “o”. For example, to set the variable “a” to the octal value “10” (8 in decimal), type: >>> a = 0o10 >>> a 8 Hexadecimal is just as easy. Simply precede the hexadecimal number with a zero, and then a lower or uppercase “x”. Hexadecimal digits can be specified in lower or uppercase. For example, in the Python interpreter: >>> a = 0xa5 >>> a 165 >>> b = 0XB2 >>> b 178 Why does -22 // 10 return -3? ¶ It’s primarily driven by the desire that i % j have the same sign as j . If you want that, and also want: i == ( i // j ) * j + ( i % j ) then integer division has to return the floor. C also requires that identity to hold, and then compilers that truncate i // j need to make i % j have the same sign as i . There are few real use cases for i % j when j is negative. When j is positive, there are many, and in virtually all of them it’s more useful for i % j to be >= 0 . If the clock says 10 now, what did it say 200 hours ago? -190 % 12 == 2 is useful; -190 % 12 == -10 is a bug waiting to bite. How do I get int literal attribute instead of SyntaxError? ¶ Trying to lookup an int literal attribute in the normal manner gives a SyntaxError because the period is seen as a decimal point: >>> 1. __class__ File "<stdin>" , line 1 1.__class__ ^ SyntaxError : invalid decimal literal The solution is to separate the literal from the period with either a space or parentheses. >>> 1 . __class__ <class 'int'> >>> ( 1 ) . __class__ <class 'int'> How do I convert a string to a number? ¶ For integers, use the built-in int() type constructor, e.g. int('144') == 144 . Similarly, float() converts to a floating-point number, e.g. float('144') == 144.0 . By default, these interpret the number as decimal, so that int('0144') == 144 holds true, and int('0x144') raises ValueError . int(string, base) takes the base to convert from as a second optional argument, so int( '0x144', 16) == 324 . If the base is specified as 0, the number is interpreted using Python’s rules: a leading ‘0o’ indicates octal, and ‘0x’ indicates a hex number. Do not use the built-in function eval() if all you need is to convert strings to numbers. eval() will be significantly slower and it presents a security risk: someone could pass you a Python expression that might have unwanted side effects. For example, someone could pass __import__('os').system("rm -rf $HOME") which would erase your home directory. eval() also has the effect of interpreting numbers as Python expressions, so that e.g. eval('09') gives a syntax error because Python does not allow leading ‘0’ in a decimal number (except ‘0’). How do I convert a number to a string? ¶ To convert, e.g., the number 144 to the string '144' , use the built-in type constructor str() . If you want a hexadecimal or octal representation, use the built-in functions hex() or oct() . For fancy formatting, see the f-strings and Format String Syntax sections, e.g. "{:04d}".format(144) yields '0144' and "{:.3f}".format(1.0/3.0) yields '0.333' . How do I modify a string in place? ¶ You can’t, because strings are immutable. In most situations, you should simply construct a new string from the various parts you want to assemble it from. However, if you need an object with the ability to modify in-place unicode data, try using an io.StringIO object or the array module: >>> import io >>> s = "Hello, world" >>> sio = io . StringIO ( s ) >>> sio . getvalue () 'Hello, world' >>> sio . seek ( 7 ) 7 >>> sio . write ( "there!" ) 6 >>> sio . getvalue () 'Hello, there!' >>> import array >>> a = array . array ( 'w' , s ) >>> print ( a ) array('w', 'Hello, world') >>> a [ 0 ] = 'y' >>> print ( a ) array('w', 'yello, world') >>> a . tounicode () 'yello, world' How do I use strings to call functions/methods? ¶ There are various techniques. The best is to use a dictionary that maps strings to functions. The primary advantage of this technique is that the strings do not need to match the names of the functions. This is also the primary technique used to emulate a case construct: def a (): pass def b (): pass dispatch = { 'go' : a , 'stop' : b } # Note lack of parens for funcs dispatch [ get_input ()]() # Note trailing parens to call function Use the built-in function getattr() : import foo getattr ( foo , 'bar' )() Note that getattr() works on any object, including classes, class instances, modules, and so on. This is used in several places in the standard library, like this: class Foo : def do_foo ( self ): ... def do_bar ( self ): ... f = getattr ( foo_instance , 'do_' + opname ) f () Use locals() to resolve the function name: def myFunc (): print ( "hello" ) fname = "myFunc" f = locals ()[ fname ] f () Is there an equivalent to Perl’s chomp() for removing trailing newlines from strings? ¶ You can use S.rstrip("\r\n") to remove all occurrences of any line terminator from the end of the string S without removing other trailing whitespace. If the string S represents more than one line, with several empty lines at the end, the line terminators for all the blank lines will be removed: >>> lines = ( "line 1 \r\n " ... " \r\n " ... " \r\n " ) >>> lines . rstrip ( " \n\r " ) 'line 1 ' Since this is typically only desired when reading text one line at a time, using S.rstrip() this way works well. Is there a scanf() or sscanf() equivalent? ¶ Not as such. For simple input parsing, the easiest approach is usually to split the line into whitespace-delimited words using the split() method of string objects and then convert decimal strings to numeric values using int() or float() . split() supports an optional “sep” parameter which is useful if the line uses something other than whitespace as a separator. For more complicated input parsing, regular expressions are more powerful than C’s sscanf and better suited for the task. What does UnicodeDecodeError or UnicodeEncodeError error mean? ¶ See the Unicode HOWTO . Can I end a raw string with an odd number of backslashes? ¶ A raw string ending with an odd number of backslashes will escape the string’s quote: >>> r 'C:\this\will\not\work \' File "<stdin>" , line 1 r 'C:\this\will\not\work \' ^ SyntaxError : unterminated string literal (detected at line 1) There are several workarounds for this. One is to use regular strings and double the backslashes: >>> 'C: \\ this \\ will \\ work \\ ' 'C:\\this\\will\\work\\' Another is to concatenate a regular string containing an escaped backslash to the raw string: >>> r 'C:\this\will\work' ' \\ ' 'C:\\this\\will\\work\\' It is also possible to use os.path.join() to append a backslash on Windows: >>> os . path . join ( r 'C:\this\will\work' , '' ) 'C:\\this\\will\\work\\' Note that while a backslash will “escape” a quote for the purposes of determining where the raw string ends, no escaping occurs when interpreting the value of the raw string. That is, the backslash remains present in the value of the raw string: >>> r 'backslash \' preserved' "backslash\\'preserved" Also see the specification in the language reference . Performance ¶ My program is too slow. How do I speed it up? ¶ That’s a tough one, in general. First, here are a list of things to remember before diving further: Performance characteristics vary across Python implementations. This FAQ focuses on CPython . Behaviour can vary across operating systems, especially when talking about I/O or multi-threading. You should always find the hot spots in your program before attempting to optimize any code (see the profile module). Writing benchmark scripts will allow you to iterate quickly when searching for improvements (see the timeit module). It is highly recommended to have good code coverage (through unit testing or any other technique) before potentially introducing regressions hidden in sophisticated optimizations. That being said, there are many tricks to speed up Python code. Here are some general principles which go a long way towards reaching acceptable performance levels: Making your algorithms faster (or changing to faster ones) can yield much larger benefits than trying to sprinkle micro-optimization tricks all over your code. Use the right data structures. Study documentation for the Built-in Types and the collections module. When the standard library provides a primitive for doing something, it is likely (although not guaranteed) to be faster than any alternative you may come up with. This is doubly true for primitives written in C, such as builtins and some extension types. For example, be sure to use either the list.sort() built-in method or the related sorted() function to do sorting (and see the Sorting Techniques for examples of moderately advanced usage). Abstractions tend to create indirections and force the interpreter to work more. If the levels of indirection outweigh the amount of useful work done, your program will be slower. You should avoid excessive abstraction, especially under the form of tiny functions or methods (which are also often detrimental to readability). If you have reached the limit of what pure Python can allow, there are tools to take you further away. For example, Cython can compile a slightly modified version of Python code into a C extension, and can be used on many different platforms. Cython can take advantage of compilation (and optional type annotations) to make your code significantly faster than when interpreted. If you are confident in your C programming skills, you can also write a C extension module yourself. See also The wiki page devoted to performance tips . What is the most efficient way to concatenate many strings together? ¶ str and bytes objects are immutable, therefore concatenating many strings together is inefficient as each concatenation creates a new object. In the general case, the total runtime cost is quadratic in the total string length. To accumulate many str objects, the recommended idiom is to place them into a list and call str.join() at the end: chunks = [] for s in my_strings : chunks . append ( s ) result = '' . join ( chunks ) (another reasonably efficient idiom is to use io.StringIO ) To accumulate many bytes objects, the recommended idiom is to extend a bytearray object using in-place concatenation (the += operator): result = bytearray () for b in my_bytes_objects : result += b Sequences (Tuples/Lists) ¶ How do I convert between tuples and lists? ¶ The type constructor tuple(seq) converts any sequence (actually, any iterable) into a tuple with the same items in the same order. For example, tuple([1, 2, 3]) yields (1, 2, 3) and tuple('abc') yields ('a', 'b', 'c') . If the argument is a tuple, it does not make a copy but returns the same object, so it is cheap to call tuple() when you aren’t sure that an object is already a tuple. The type constructor list(seq) converts any sequence or iterable into a list with the same items in the same order. For example, list((1, 2, 3)) yields [1, 2, 3] and list('abc') yields ['a', 'b', 'c'] . If the argument is a list, it makes a copy just like seq[:] would. What’s a negative index? ¶ Python sequences are indexed with positive numbers and negative numbers. For positive numbers 0 is the first index 1 is the second index and so forth. For negative indices -1 is the last index and -2 is the penultimate (next to last) index and so forth. Think of seq[-n] as the same as seq[len(seq)-n] . Using negative indices can be very convenient. For example S[:-1] is all of the string except for its last character, which is useful for removing the trailing newline from a string. How do I iterate over a sequence in reverse order? ¶ Use the reversed() built-in function: for x in reversed ( sequence ): ... # do something with x ... This won’t touch your original sequence, but build a new copy with reversed order to iterate over. How do you remove duplicates from a list? ¶ See the Python Cookbook for a long discussion of many ways to do this: https://code.activestate.com/recipes/52560/ If you don’t mind reordering the list, sort it and then scan from the end of the list, deleting duplicates as you go: if mylist : mylist . sort () last = mylist [ - 1 ] for i in range ( len ( mylist ) - 2 , - 1 , - 1 ): if last == mylist [ i ]: del mylist [ i ] else : last = mylist [ i ] If all elements of the list may be used as set keys (i.e. they are all hashable ) this is often faster mylist = list ( set ( mylist )) This converts the list into a set, thereby removing duplicates, and then back into a list. How do you remove multiple items from a list ¶ As with removing duplicates, explicitly iterating in reverse with a delete condition is one possibility. However, it is easier and faster to use slice replacement with an implicit or explicit forward iteration. Here are three variations.: mylist [:] = filter ( keep_function , mylist ) mylist [:] = ( x for x in mylist if keep_condition ) mylist [:] = [ x for x in mylist if keep_condition ] The list comprehension may be fastest. How do you make an array in Python? ¶ Use a list: [ "this" , 1 , "is" , "an" , "array" ] Lists are equivalent to C or Pascal arrays in their time complexity; the primary difference is that a Python list can contain objects of many different types. The array module also provides methods for creating arrays of fixed types with compact representations, but they are slower to index than lists. Also note that NumPy and other third party packages define array-like structures with various characteristics as well. To get Lisp-style linked lists, you can emulate cons cells using tuples: lisp_list = ( "like" , ( "this" , ( "example" , None ) ) ) If mutability is desired, you could use lists instead of tuples. Here the analogue of a Lisp car is lisp_list[0] and the analogue of cdr is lisp_list[1] . Only do this if you’re sure you really need to, because it’s usually a lot slower than using Python lists. How do I create a multidimensional list? ¶ You probably tried to make a multidimensional array like this: >>> A = [[ None ] * 2 ] * 3 This looks correct if you print it: >>> A [[None, None], [None, None], [None, None]] But when you assign a value, it shows up in multiple places: >>> A [ 0 ][ 0 ] = 5 >>> A [[5, None], [5, None], [5, None]] The reason is that replicating a list with * doesn’t create copies, it only creates references to the existing objects. The *3 creates a list containing 3 references to the same list of length two. Changes to one row will show in all rows, which is almost certainly not what you want. The suggested approach is to create a list of the desired length first and then fill in each element with a newly created list: A = [ None ] * 3 for i in range ( 3 ): A [ i ] = [ None ] * 2 This generates a list containing 3 different lists of length two. You can also use a list comprehension: w , h = 2 , 3 A = [[ None ] * w for i in range ( h )] Or, you can use an extension that provides a matrix datatype; NumPy is the best known. How do I apply a method or function to a sequence of objects? ¶ To call a method or function and accumulate the return values is a list, a list comprehension is an elegant solution: result = [ obj . method () for obj in mylist ] result = [ function ( obj ) for obj in mylist ] To just run the method or function without saving the return values, a plain for loop will suffice: for obj in mylist : obj . method () for obj in mylist : function ( obj ) Why does a_tuple[i] += [‘item’] raise an exception when the addition works? ¶ This is because of a combination of the fact that augmented assignment operators are assignment operators, and the difference between mutable and immutable objects in Python. This discussion applies in general when augmented assignment operators are applied to elements of a tuple that point to mutable objects, but we’ll use a list and += as our exemplar. If you wrote: >>> a_tuple = ( 1 , 2 ) >>> a_tuple [ 0 ] += 1 Traceback (most recent call last): ... TypeError : 'tuple' object does not support item assignment The reason for the exception should be immediately clear: 1 is added to the object a_tuple[0] points to ( 1 ), producing the result object, 2 , but when we attempt to assign the result of the computation, 2 , to element 0 of the tuple, we get an error because we can’t change what an element of a tuple points to. Under the covers, what this augmented assignment statement is doing is approximately this: >>> result = a_tuple [ 0 ] + 1 >>> a_tuple [ 0 ] = result Traceback (most recent call last): ... TypeError : 'tuple' object does not support item assignment It is the assignment part of the operation that produces the error, since a tuple is immutable. When you write something like: >>> a_tuple = ([ 'foo' ], 'bar' ) >>> a_tuple [ 0 ] += [ 'item' ] Traceback (most recent call last): ... TypeError : 'tuple' object does not support item assignment The exception is a bit more surprising, and even more surprising is the fact that even though there was an error, the append worked: >>> a_tuple [ 0 ] ['foo', 'item'] To see why this happens, you need to know that (a) if an object implements an __iadd__() magic method, it gets called when the += augmented assignment is executed, and its return value is what gets used in the assignment statement; and (b) for lists, __iadd__() is equivalent to calling extend() on the list and returning the list. That’s why we say that for lists, += is a “shorthand” for list.extend() : >>> a_list = [] >>> a_list += [ 1 ] >>> a_list [1] This is equivalent to: >>> result = a_list . __iadd__ ([ 1 ]) >>> a_list = result The object pointed to by a_list has been mutated, and the pointer to the mutated object is assigned back to a_list . The end result of the assignment is a no-op, since it is a pointer to the same object that a_list was previously pointing to, but the assignment still happens. Thus, in our tuple example what is happening is equivalent to: >>> result = a_tuple [ 0 ] . __iadd__ ([ 'item' ]) >>> a_tuple [ 0 ] = result Traceback (most recent call last): ... TypeError : 'tuple' object does not support item assignment The __iadd__() succeeds, and thus the list is extended, but even though result points to the same object that a_tuple[0] already points to, that final assignment still results in an error, because tuples are immutable. I want to do a complicated sort: can you do a Schwartzian Transform in Python? ¶ The technique, attributed to Randal Schwartz of the Perl community, sorts the elements of a list by a metric which maps each element to its “sort value”. In Python, use the key
2026-01-13T08:48:39
https://twitter.com/reactjs
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://docs.python.org/3/library/hashlib.html#module-hashlib
hashlib — Secure hashes and message digests — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents hashlib — Secure hashes and message digests Hash algorithms Usage Constructors Attributes Hash Objects SHAKE variable length digests File hashing Key derivation BLAKE2 Creating hash objects Constants Examples Simple hashing Using different digest sizes Keyed hashing Randomized hashing Personalization Tree mode Credits Previous topic Cryptographic Services Next topic hmac — Keyed-Hashing for Message Authentication This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Standard Library » Cryptographic Services » hashlib — Secure hashes and message digests | Theme Auto Light Dark | hashlib — Secure hashes and message digests ¶ Source code: Lib/hashlib.py This module implements a common interface to many different hash algorithms. Included are the FIPS secure hash algorithms SHA224, SHA256, SHA384, SHA512, (defined in the FIPS 180-4 standard ), the SHA-3 series (defined in the FIPS 202 standard ) as well as the legacy algorithms SHA1 ( formerly part of FIPS ) and the MD5 algorithm (defined in internet RFC 1321 ). Note If you want the adler32 or crc32 hash functions, they are available in the zlib module. Hash algorithms ¶ There is one constructor method named for each type of hash . All return a hash object with the same simple interface. For example: use sha256() to create a SHA-256 hash object. You can now feed this object with bytes-like objects (normally bytes ) using the update method. At any point you can ask it for the digest of the concatenation of the data fed to it so far using the digest() or hexdigest() methods. To allow multithreading, the Python GIL is released while computing a hash supplied more than 2047 bytes of data at once in its constructor or .update method. Constructors for hash algorithms that are always present in this module are sha1() , sha224() , sha256() , sha384() , sha512() , sha3_224() , sha3_256() , sha3_384() , sha3_512() , shake_128() , shake_256() , blake2b() , and blake2s() . md5() is normally available as well, though it may be missing or blocked if you are using a rare “FIPS compliant” build of Python. These correspond to algorithms_guaranteed . Additional algorithms may also be available if your Python distribution’s hashlib was linked against a build of OpenSSL that provides others. Others are not guaranteed available on all installations and will only be accessible by name via new() . See algorithms_available . Warning Some algorithms have known hash collision weaknesses (including MD5 and SHA1). Refer to Attacks on cryptographic hash algorithms and the hashlib-seealso section at the end of this document. Added in version 3.6: SHA3 (Keccak) and SHAKE constructors sha3_224() , sha3_256() , sha3_384() , sha3_512() , shake_128() , shake_256() were added. blake2b() and blake2s() were added. Changed in version 3.9: All hashlib constructors take a keyword-only argument usedforsecurity with default value True . A false value allows the use of insecure and blocked hashing algorithms in restricted environments. False indicates that the hashing algorithm is not used in a security context, e.g. as a non-cryptographic one-way compression function. Changed in version 3.9: Hashlib now uses SHA3 and SHAKE from OpenSSL if it provides it. Changed in version 3.12: For any of the MD5, SHA1, SHA2, or SHA3 algorithms that the linked OpenSSL does not provide we fall back to a verified implementation from the HACL* project . Usage ¶ To obtain the digest of the byte string b"Nobody inspects the spammish repetition" : >>> import hashlib >>> m = hashlib . sha256 () >>> m . update ( b "Nobody inspects" ) >>> m . update ( b " the spammish repetition" ) >>> m . digest () b'\x03\x1e\xdd}Ae\x15\x93\xc5\xfe\\\x00o\xa5u+7\xfd\xdf\xf7\xbcN\x84:\xa6\xaf\x0c\x95\x0fK\x94\x06' >>> m . hexdigest () '031edd7d41651593c5fe5c006fa5752b37fddff7bc4e843aa6af0c950f4b9406' More condensed: >>> hashlib . sha256 ( b "Nobody inspects the spammish repetition" ) . hexdigest () '031edd7d41651593c5fe5c006fa5752b37fddff7bc4e843aa6af0c950f4b9406' Constructors ¶ hashlib. new ( name , [ data , ] * , usedforsecurity=True ) ¶ Is a generic constructor that takes the string name of the desired algorithm as its first parameter. It also exists to allow access to the above listed hashes as well as any other algorithms that your OpenSSL library may offer. Using new() with an algorithm name: >>> h = hashlib . new ( 'sha256' ) >>> h . update ( b "Nobody inspects the spammish repetition" ) >>> h . hexdigest () '031edd7d41651593c5fe5c006fa5752b37fddff7bc4e843aa6af0c950f4b9406' hashlib. md5 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha1 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha224 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha256 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha384 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha512 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha3_224 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha3_256 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha3_384 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. sha3_512 ( [ data , ] * , usedforsecurity=True ) ¶ Named constructors such as these are faster than passing an algorithm name to new() . Attributes ¶ Hashlib provides the following constant module attributes: hashlib. algorithms_guaranteed ¶ A set containing the names of the hash algorithms guaranteed to be supported by this module on all platforms. Note that ‘md5’ is in this list despite some upstream vendors offering an odd “FIPS compliant” Python build that excludes it. Added in version 3.2. hashlib. algorithms_available ¶ A set containing the names of the hash algorithms that are available in the running Python interpreter. These names will be recognized when passed to new() . algorithms_guaranteed will always be a subset. The same algorithm may appear multiple times in this set under different names (thanks to OpenSSL). Added in version 3.2. Hash Objects ¶ The following values are provided as constant attributes of the hash objects returned by the constructors: hash. digest_size ¶ The size of the resulting hash in bytes. hash. block_size ¶ The internal block size of the hash algorithm in bytes. A hash object has the following attributes: hash. name ¶ The canonical name of this hash, always lowercase and always suitable as a parameter to new() to create another hash of this type. Changed in version 3.4: The name attribute has been present in CPython since its inception, but until Python 3.4 was not formally specified, so may not exist on some platforms. A hash object has the following methods: hash. update ( data ) ¶ Update the hash object with the bytes-like object . Repeated calls are equivalent to a single call with the concatenation of all the arguments: m.update(a); m.update(b) is equivalent to m.update(a+b) . hash. digest ( ) ¶ Return the digest of the data passed to the update() method so far. This is a bytes object of size digest_size which may contain bytes in the whole range from 0 to 255. hash. hexdigest ( ) ¶ Like digest() except the digest is returned as a string object of double length, containing only hexadecimal digits. This may be used to exchange the value safely in email or other non-binary environments. hash. copy ( ) ¶ Return a copy (“clone”) of the hash object. This can be used to efficiently compute the digests of data sharing a common initial substring. SHAKE variable length digests ¶ hashlib. shake_128 ( [ data , ] * , usedforsecurity=True ) ¶ hashlib. shake_256 ( [ data , ] * , usedforsecurity=True ) ¶ The shake_128() and shake_256() algorithms provide variable length digests with length_in_bits//2 up to 128 or 256 bits of security. As such, their digest methods require a length. Maximum length is not limited by the SHAKE algorithm. shake. digest ( length ) ¶ Return the digest of the data passed to the update() method so far. This is a bytes object of size length which may contain bytes in the whole range from 0 to 255. shake. hexdigest ( length ) ¶ Like digest() except the digest is returned as a string object of double length, containing only hexadecimal digits. This may be used to exchange the value in email or other non-binary environments. Example use: >>> h = hashlib . shake_256 ( b 'Nobody inspects the spammish repetition' ) >>> h . hexdigest ( 20 ) '44709d6fcb83d92a76dcb0b668c98e1b1d3dafe7' File hashing ¶ The hashlib module provides a helper function for efficient hashing of a file or file-like object. hashlib. file_digest ( fileobj , digest , / ) ¶ Return a digest object that has been updated with contents of file object. fileobj must be a file-like object opened for reading in binary mode. It accepts file objects from builtin open() , BytesIO instances, SocketIO objects from socket.socket.makefile() , and similar. fileobj must be opened in blocking mode, otherwise a BlockingIOError may be raised. The function may bypass Python’s I/O and use the file descriptor from fileno() directly. fileobj must be assumed to be in an unknown state after this function returns or raises. It is up to the caller to close fileobj . digest must either be a hash algorithm name as a str , a hash constructor, or a callable that returns a hash object. Example: >>> import io , hashlib , hmac >>> with open ( "library/hashlib.rst" , "rb" ) as f : ... digest = hashlib . file_digest ( f , "sha256" ) ... >>> digest . hexdigest () '...' >>> buf = io . BytesIO ( b "somedata" ) >>> mac1 = hmac . HMAC ( b "key" , digestmod = hashlib . sha512 ) >>> digest = hashlib . file_digest ( buf , lambda : mac1 ) >>> digest is mac1 True >>> mac2 = hmac . HMAC ( b "key" , b "somedata" , digestmod = hashlib . sha512 ) >>> mac1 . digest () == mac2 . digest () True Added in version 3.11. Changed in version 3.14: Now raises a BlockingIOError if the file is opened in non-blocking mode. Previously, spurious null bytes were added to the digest. Key derivation ¶ Key derivation and key stretching algorithms are designed for secure password hashing. Naive algorithms such as sha1(password) are not resistant against brute-force attacks. A good password hashing function must be tunable, slow, and include a salt . hashlib. pbkdf2_hmac ( hash_name , password , salt , iterations , dklen = None ) ¶ The function provides PKCS#5 password-based key derivation function 2. It uses HMAC as pseudorandom function. The string hash_name is the desired name of the hash digest algorithm for HMAC, e.g. ‘sha1’ or ‘sha256’. password and salt are interpreted as buffers of bytes. Applications and libraries should limit password to a sensible length (e.g. 1024). salt should be about 16 or more bytes from a proper source, e.g. os.urandom() . The number of iterations should be chosen based on the hash algorithm and computing power. As of 2022, hundreds of thousands of iterations of SHA-256 are suggested. For rationale as to why and how to choose what is best for your application, read Appendix A.2.2 of NIST-SP-800-132 . The answers on the stackexchange pbkdf2 iterations question explain in detail. dklen is the length of the derived key in bytes. If dklen is None then the digest size of the hash algorithm hash_name is used, e.g. 64 for SHA-512. >>> from hashlib import pbkdf2_hmac >>> our_app_iters = 500_000 # Application specific, read above. >>> dk = pbkdf2_hmac ( 'sha256' , b 'password' , b 'bad salt' * 2 , our_app_iters ) >>> dk . hex () '15530bba69924174860db778f2c6f8104d3aaf9d26241840c8c4a641c8d000a9' Function only available when Python is compiled with OpenSSL. Added in version 3.4. Changed in version 3.12: Function now only available when Python is built with OpenSSL. The slow pure Python implementation has been removed. hashlib. scrypt ( password , * , salt , n , r , p , maxmem = 0 , dklen = 64 ) ¶ The function provides scrypt password-based key derivation function as defined in RFC 7914 . password and salt must be bytes-like objects . Applications and libraries should limit password to a sensible length (e.g. 1024). salt should be about 16 or more bytes from a proper source, e.g. os.urandom() . n is the CPU/Memory cost factor, r the block size, p parallelization factor and maxmem limits memory (OpenSSL 1.1.0 defaults to 32 MiB). dklen is the length of the derived key in bytes. Added in version 3.6. BLAKE2 ¶ BLAKE2 is a cryptographic hash function defined in RFC 7693 that comes in two flavors: BLAKE2b , optimized for 64-bit platforms and produces digests of any size between 1 and 64 bytes, BLAKE2s , optimized for 8- to 32-bit platforms and produces digests of any size between 1 and 32 bytes. BLAKE2 supports keyed mode (a faster and simpler replacement for HMAC ), salted hashing , personalization , and tree hashing . Hash objects from this module follow the API of standard library’s hashlib objects. Creating hash objects ¶ New hash objects are created by calling constructor functions: hashlib. blake2b ( data = b'' , * , digest_size = 64 , key = b'' , salt = b'' , person = b'' , fanout = 1 , depth = 1 , leaf_size = 0 , node_offset = 0 , node_depth = 0 , inner_size = 0 , last_node = False , usedforsecurity = True ) ¶ hashlib. blake2s ( data = b'' , * , digest_size = 32 , key = b'' , salt = b'' , person = b'' , fanout = 1 , depth = 1 , leaf_size = 0 , node_offset = 0 , node_depth = 0 , inner_size = 0 , last_node = False , usedforsecurity = True ) ¶ These functions return the corresponding hash objects for calculating BLAKE2b or BLAKE2s. They optionally take these general parameters: data : initial chunk of data to hash, which must be bytes-like object . It can be passed only as positional argument. digest_size : size of output digest in bytes. key : key for keyed hashing (up to 64 bytes for BLAKE2b, up to 32 bytes for BLAKE2s). salt : salt for randomized hashing (up to 16 bytes for BLAKE2b, up to 8 bytes for BLAKE2s). person : personalization string (up to 16 bytes for BLAKE2b, up to 8 bytes for BLAKE2s). The following table shows limits for general parameters (in bytes): Hash digest_size len(key) len(salt) len(person) BLAKE2b 64 64 16 16 BLAKE2s 32 32 8 8 Note BLAKE2 specification defines constant lengths for salt and personalization parameters, however, for convenience, this implementation accepts byte strings of any size up to the specified length. If the length of the parameter is less than specified, it is padded with zeros, thus, for example, b'salt' and b'salt\x00' is the same value. (This is not the case for key .) These sizes are available as module constants described below. Constructor functions also accept the following tree hashing parameters: fanout : fanout (0 to 255, 0 if unlimited, 1 in sequential mode). depth : maximal depth of tree (1 to 255, 255 if unlimited, 1 in sequential mode). leaf_size : maximal byte length of leaf (0 to 2**32-1 , 0 if unlimited or in sequential mode). node_offset : node offset (0 to 2**64-1 for BLAKE2b, 0 to 2**48-1 for BLAKE2s, 0 for the first, leftmost, leaf, or in sequential mode). node_depth : node depth (0 to 255, 0 for leaves, or in sequential mode). inner_size : inner digest size (0 to 64 for BLAKE2b, 0 to 32 for BLAKE2s, 0 in sequential mode). last_node : boolean indicating whether the processed node is the last one ( False for sequential mode). See section 2.10 in BLAKE2 specification for comprehensive review of tree hashing. Constants ¶ blake2b. SALT_SIZE ¶ blake2s. SALT_SIZE ¶ Salt length (maximum length accepted by constructors). blake2b. PERSON_SIZE ¶ blake2s. PERSON_SIZE ¶ Personalization string length (maximum length accepted by constructors). blake2b. MAX_KEY_SIZE ¶ blake2s. MAX_KEY_SIZE ¶ Maximum key size. blake2b. MAX_DIGEST_SIZE ¶ blake2s. MAX_DIGEST_SIZE ¶ Maximum digest size that the hash function can output. Examples ¶ Simple hashing ¶ To calculate hash of some data, you should first construct a hash object by calling the appropriate constructor function ( blake2b() or blake2s() ), then update it with the data by calling update() on the object, and, finally, get the digest out of the object by calling digest() (or hexdigest() for hex-encoded string). >>> from hashlib import blake2b >>> h = blake2b () >>> h . update ( b 'Hello world' ) >>> h . hexdigest () '6ff843ba685842aa82031d3f53c48b66326df7639a63d128974c5c14f31a0f33343a8c65551134ed1ae0f2b0dd2bb495dc81039e3eeb0aa1bb0388bbeac29183' As a shortcut, you can pass the first chunk of data to update directly to the constructor as the positional argument: >>> from hashlib import blake2b >>> blake2b ( b 'Hello world' ) . hexdigest () '6ff843ba685842aa82031d3f53c48b66326df7639a63d128974c5c14f31a0f33343a8c65551134ed1ae0f2b0dd2bb495dc81039e3eeb0aa1bb0388bbeac29183' You can call hash.update() as many times as you need to iteratively update the hash: >>> from hashlib import blake2b >>> items = [ b 'Hello' , b ' ' , b 'world' ] >>> h = blake2b () >>> for item in items : ... h . update ( item ) ... >>> h . hexdigest () '6ff843ba685842aa82031d3f53c48b66326df7639a63d128974c5c14f31a0f33343a8c65551134ed1ae0f2b0dd2bb495dc81039e3eeb0aa1bb0388bbeac29183' Using different digest sizes ¶ BLAKE2 has configurable size of digests up to 64 bytes for BLAKE2b and up to 32 bytes for BLAKE2s. For example, to replace SHA-1 with BLAKE2b without changing the size of output, we can tell BLAKE2b to produce 20-byte digests: >>> from hashlib import blake2b >>> h = blake2b ( digest_size = 20 ) >>> h . update ( b 'Replacing SHA1 with the more secure function' ) >>> h . hexdigest () 'd24f26cf8de66472d58d4e1b1774b4c9158b1f4c' >>> h . digest_size 20 >>> len ( h . digest ()) 20 Hash objects with different digest sizes have completely different outputs (shorter hashes are not prefixes of longer hashes); BLAKE2b and BLAKE2s produce different outputs even if the output length is the same: >>> from hashlib import blake2b , blake2s >>> blake2b ( digest_size = 10 ) . hexdigest () '6fa1d8fcfd719046d762' >>> blake2b ( digest_size = 11 ) . hexdigest () 'eb6ec15daf9546254f0809' >>> blake2s ( digest_size = 10 ) . hexdigest () '1bf21a98c78a1c376ae9' >>> blake2s ( digest_size = 11 ) . hexdigest () '567004bf96e4a25773ebf4' Keyed hashing ¶ Keyed hashing can be used for authentication as a faster and simpler replacement for Hash-based message authentication code (HMAC). BLAKE2 can be securely used in prefix-MAC mode thanks to the indifferentiability property inherited from BLAKE. This example shows how to get a (hex-encoded) 128-bit authentication code for message b'message data' with key b'pseudorandom key' : >>> from hashlib import blake2b >>> h = blake2b ( key = b 'pseudorandom key' , digest_size = 16 ) >>> h . update ( b 'message data' ) >>> h . hexdigest () '3d363ff7401e02026f4a4687d4863ced' As a practical example, a web application can symmetrically sign cookies sent to users and later verify them to make sure they weren’t tampered with: >>> from hashlib import blake2b >>> from hmac import compare_digest >>> >>> SECRET_KEY = b 'pseudorandomly generated server secret key' >>> AUTH_SIZE = 16 >>> >>> def sign ( cookie ): ... h = blake2b ( digest_size = AUTH_SIZE , key = SECRET_KEY ) ... h . update ( cookie ) ... return h . hexdigest () . encode ( 'utf-8' ) >>> >>> def verify ( cookie , sig ): ... good_sig = sign ( cookie ) ... return compare_digest ( good_sig , sig ) >>> >>> cookie = b 'user-alice' >>> sig = sign ( cookie ) >>> print ( " {0} , {1} " . format ( cookie . decode ( 'utf-8' ), sig )) user-alice,b'43b3c982cf697e0c5ab22172d1ca7421' >>> verify ( cookie , sig ) True >>> verify ( b 'user-bob' , sig ) False >>> verify ( cookie , b '0102030405060708090a0b0c0d0e0f00' ) False Even though there’s a native keyed hashing mode, BLAKE2 can, of course, be used in HMAC construction with hmac module: >>> import hmac , hashlib >>> m = hmac . new ( b 'secret key' , digestmod = hashlib . blake2s ) >>> m . update ( b 'message' ) >>> m . hexdigest () 'e3c8102868d28b5ff85fc35dda07329970d1a01e273c37481326fe0c861c8142' Randomized hashing ¶ By setting salt parameter users can introduce randomization to the hash function. Randomized hashing is useful for protecting against collision attacks on the hash function used in digital signatures. Randomized hashing is designed for situations where one party, the message preparer, generates all or part of a message to be signed by a second party, the message signer. If the message preparer is able to find cryptographic hash function collisions (i.e., two messages producing the same hash value), then they might prepare meaningful versions of the message that would produce the same hash value and digital signature, but with different results (e.g., transferring $1,000,000 to an account, rather than $10). Cryptographic hash functions have been designed with collision resistance as a major goal, but the current concentration on attacking cryptographic hash functions may result in a given cryptographic hash function providing less collision resistance than expected. Randomized hashing offers the signer additional protection by reducing the likelihood that a preparer can generate two or more messages that ultimately yield the same hash value during the digital signature generation process — even if it is practical to find collisions for the hash function. However, the use of randomized hashing may reduce the amount of security provided by a digital signature when all portions of the message are prepared by the signer. ( NIST SP-800-106 “Randomized Hashing for Digital Signatures” ) In BLAKE2 the salt is processed as a one-time input to the hash function during initialization, rather than as an input to each compression function. Warning Salted hashing (or just hashing) with BLAKE2 or any other general-purpose cryptographic hash function, such as SHA-256, is not suitable for hashing passwords. See BLAKE2 FAQ for more information. >>> import os >>> from hashlib import blake2b >>> msg = b 'some message' >>> # Calculate the first hash with a random salt. >>> salt1 = os . urandom ( blake2b . SALT_SIZE ) >>> h1 = blake2b ( salt = salt1 ) >>> h1 . update ( msg ) >>> # Calculate the second hash with a different random salt. >>> salt2 = os . urandom ( blake2b . SALT_SIZE ) >>> h2 = blake2b ( salt = salt2 ) >>> h2 . update ( msg ) >>> # The digests are different. >>> h1 . digest () != h2 . digest () True Personalization ¶ Sometimes it is useful to force hash function to produce different digests for the same input for different purposes. Quoting the authors of the Skein hash function: We recommend that all application designers seriously consider doing this; we have seen many protocols where a hash that is computed in one part of the protocol can be used in an entirely different part because two hash computations were done on similar or related data, and the attacker can force the application to make the hash inputs the same. Personalizing each hash function used in the protocol summarily stops this type of attack. ( The Skein Hash Function Family , p. 21) BLAKE2 can be personalized by passing bytes to the person argument: >>> from hashlib import blake2b >>> FILES_HASH_PERSON = b 'MyApp Files Hash' >>> BLOCK_HASH_PERSON = b 'MyApp Block Hash' >>> h = blake2b ( digest_size = 32 , person = FILES_HASH_PERSON ) >>> h . update ( b 'the same content' ) >>> h . hexdigest () '20d9cd024d4fb086aae819a1432dd2466de12947831b75c5a30cf2676095d3b4' >>> h = blake2b ( digest_size = 32 , person = BLOCK_HASH_PERSON ) >>> h . update ( b 'the same content' ) >>> h . hexdigest () 'cf68fb5761b9c44e7878bfb2c4c9aea52264a80b75005e65619778de59f383a3' Personalization together with the keyed mode can also be used to derive different keys from a single one. >>> from hashlib import blake2s >>> from base64 import b64decode , b64encode >>> orig_key = b64decode ( b 'Rm5EPJai72qcK3RGBpW3vPNfZy5OZothY+kHY6h21KM=' ) >>> enc_key = blake2s ( key = orig_key , person = b 'kEncrypt' ) . digest () >>> mac_key = blake2s ( key = orig_key , person = b 'kMAC' ) . digest () >>> print ( b64encode ( enc_key ) . decode ( 'utf-8' )) rbPb15S/Z9t+agffno5wuhB77VbRi6F9Iv2qIxU7WHw= >>> print ( b64encode ( mac_key ) . decode ( 'utf-8' )) G9GtHFE1YluXY1zWPlYk1e/nWfu0WSEb0KRcjhDeP/o= Tree mode ¶ Here’s an example of hashing a minimal tree with two leaf nodes: 10 / \ 00 01 This example uses 64-byte internal digests, and returns the 32-byte final digest: >>> from hashlib import blake2b >>> >>> FANOUT = 2 >>> DEPTH = 2 >>> LEAF_SIZE = 4096 >>> INNER_SIZE = 64 >>> >>> buf = bytearray ( 6000 ) >>> >>> # Left leaf ... h00 = blake2b ( buf [ 0 : LEAF_SIZE ], fanout = FANOUT , depth = DEPTH , ... leaf_size = LEAF_SIZE , inner_size = INNER_SIZE , ... node_offset = 0 , node_depth = 0 , last_node = False ) >>> # Right leaf ... h01 = blake2b ( buf [ LEAF_SIZE :], fanout = FANOUT , depth = DEPTH , ... leaf_size = LEAF_SIZE , inner_size = INNER_SIZE , ... node_offset = 1 , node_depth = 0 , last_node = True ) >>> # Root node ... h10 = blake2b ( digest_size = 32 , fanout = FANOUT , depth = DEPTH , ... leaf_size = LEAF_SIZE , inner_size = INNER_SIZE , ... node_offset = 0 , node_depth = 1 , last_node = True ) >>> h10 . update ( h00 . digest ()) >>> h10 . update ( h01 . digest ()) >>> h10 . hexdigest () '3ad2a9b37c6070e374c7a8c508fe20ca86b6ed54e286e93a0318e95e881db5aa' Credits ¶ BLAKE2 was designed by Jean-Philippe Aumasson , Samuel Neves , Zooko Wilcox-O’Hearn , and Christian Winnerlein based on SHA-3 finalist BLAKE created by Jean-Philippe Aumasson , Luca Henzen , Willi Meier , and Raphael C.-W. Phan . It uses core algorithm from ChaCha cipher designed by Daniel J. Bernstein . The stdlib implementation is based on pyblake2 module. It was written by Dmitry Chestnykh based on C implementation written by Samuel Neves . The documentation was copied from pyblake2 and written by Dmitry Chestnykh . The C code was partly rewritten for Python by Christian Heimes . The following public domain dedication applies for both C hash function implementation, extension code, and this documentation: To the extent possible under law, the author(s) have dedicated all copyright and related and neighboring rights to this software to the public domain worldwide. This software is distributed without any warranty. You should have received a copy of the CC0 Public Domain Dedication along with this software. If not, see https://creativecommons.org/publicdomain/zero/1.0/ . The following people have helped with development or contributed their changes to the project and the public domain according to the Creative Commons Public Domain Dedication 1.0 Universal: Alexandr Sokolovskiy See also Module hmac A module to generate message authentication codes using hashes. Module base64 Another way to encode binary hashes for non-binary environments. https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.180-4.pdf The FIPS 180-4 publication on Secure Hash Algorithms. https://csrc.nist.gov/pubs/fips/202/final The FIPS 202 publication on the SHA-3 Standard. https://www.blake2.net/ Official BLAKE2 website. https://en.wikipedia.org/wiki/Cryptographic_hash_function Wikipedia article with information on which algorithms have known issues and what that means regarding their use. https://www.ietf.org/rfc/rfc8018.txt PKCS #5: Password-Based Cryptography Specification Version 2.1 https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf NIST Recommendation for Password-Based Key Derivation. Table of Contents hashlib — Secure hashes and message digests Hash algorithms Usage Constructors Attributes Hash Objects SHAKE variable length digests File hashing Key derivation BLAKE2 Creating hash objects Constants Examples Simple hashing Using different digest sizes Keyed hashing Randomized hashing Personalization Tree mode Credits Previous topic Cryptographic Services Next topic hmac — Keyed-Hashing for Message Authentication This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Standard Library » Cryptographic Services » hashlib — Secure hashes and message digests | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:39
https://twitter.com/intent/tweet?text=%22How%20to%20Handle%20Stripe%20and%20Paystack%20Webhooks%20in%20Next.js%20%28The%20App%20Router%20Way%29%22%20by%20%40thekarlesi%20%23DEVCommunity%20https%3A%2F%2Fdev.to%2Fthekarlesi%2Fhow-to-handle-stripe-and-paystack-webhooks-in-nextjs-the-app-router-way-5bgi
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://docs.python.org/3/library/functions.html#len
Built-in Functions — Python 3.14.2 documentation Theme Auto Light Dark Previous topic Introduction Next topic Built-in Constants This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Standard Library » Built-in Functions | Theme Auto Light Dark | Built-in Functions ¶ The Python interpreter has a number of functions and types built into it that are always available. They are listed here in alphabetical order. Built-in Functions A abs() aiter() all() anext() any() ascii() B bin() bool() breakpoint() bytearray() bytes() C callable() chr() classmethod() compile() complex() D delattr() dict() dir() divmod() E enumerate() eval() exec() F filter() float() format() frozenset() G getattr() globals() H hasattr() hash() help() hex() I id() input() int() isinstance() issubclass() iter() L len() list() locals() M map() max() memoryview() min() N next() O object() oct() open() ord() P pow() print() property() R range() repr() reversed() round() S set() setattr() slice() sorted() staticmethod() str() sum() super() T tuple() type() V vars() Z zip() _ __import__() abs ( number , / ) ¶ Return the absolute value of a number. The argument may be an integer, a floating-point number, or an object implementing __abs__() . If the argument is a complex number, its magnitude is returned. aiter ( async_iterable , / ) ¶ Return an asynchronous iterator for an asynchronous iterable . Equivalent to calling x.__aiter__() . Note: Unlike iter() , aiter() has no 2-argument variant. Added in version 3.10. all ( iterable , / ) ¶ Return True if all elements of the iterable are true (or if the iterable is empty). Equivalent to: def all ( iterable ): for element in iterable : if not element : return False return True awaitable anext ( async_iterator , / ) ¶ awaitable anext ( async_iterator , default , / ) When awaited, return the next item from the given asynchronous iterator , or default if given and the iterator is exhausted. This is the async variant of the next() builtin, and behaves similarly. This calls the __anext__() method of async_iterator , returning an awaitable . Awaiting this returns the next value of the iterator. If default is given, it is returned if the iterator is exhausted, otherwise StopAsyncIteration is raised. Added in version 3.10. any ( iterable , / ) ¶ Return True if any element of the iterable is true. If the iterable is empty, return False . Equivalent to: def any ( iterable ): for element in iterable : if element : return True return False ascii ( object , / ) ¶ As repr() , return a string containing a printable representation of an object, but escape the non-ASCII characters in the string returned by repr() using \x , \u , or \U escapes. This generates a string similar to that returned by repr() in Python 2. bin ( integer , / ) ¶ Convert an integer number to a binary string prefixed with “0b”. The result is a valid Python expression. If integer is not a Python int object, it has to define an __index__() method that returns an integer. Some examples: >>> bin ( 3 ) '0b11' >>> bin ( - 10 ) '-0b1010' If the prefix “0b” is desired or not, you can use either of the following ways. >>> format ( 14 , '#b' ), format ( 14 , 'b' ) ('0b1110', '1110') >>> f ' { 14 : #b } ' , f ' { 14 : b } ' ('0b1110', '1110') See also enum.bin() to represent negative values as twos-complement. See also format() for more information. class bool ( object = False , / ) ¶ Return a Boolean value, i.e. one of True or False . The argument is converted using the standard truth testing procedure . If the argument is false or omitted, this returns False ; otherwise, it returns True . The bool class is a subclass of int (see Numeric Types — int, float, complex ). It cannot be subclassed further. Its only instances are False and True (see Boolean Type - bool ). Changed in version 3.7: The parameter is now positional-only. breakpoint ( * args , ** kws ) ¶ This function drops you into the debugger at the call site. Specifically, it calls sys.breakpointhook() , passing args and kws straight through. By default, sys.breakpointhook() calls pdb.set_trace() expecting no arguments. In this case, it is purely a convenience function so you don’t have to explicitly import pdb or type as much code to enter the debugger. However, sys.breakpointhook() can be set to some other function and breakpoint() will automatically call that, allowing you to drop into the debugger of choice. If sys.breakpointhook() is not accessible, this function will raise RuntimeError . By default, the behavior of breakpoint() can be changed with the PYTHONBREAKPOINT environment variable. See sys.breakpointhook() for usage details. Note that this is not guaranteed if sys.breakpointhook() has been replaced. Raises an auditing event builtins.breakpoint with argument breakpointhook . Added in version 3.7. class bytearray ( source = b'' ) class bytearray ( source , encoding , errors = 'strict' ) Return a new array of bytes. The bytearray class is a mutable sequence of integers in the range 0 <= x < 256. It has most of the usual methods of mutable sequences, described in Mutable Sequence Types , as well as most methods that the bytes type has, see Bytes and Bytearray Operations . The optional source parameter can be used to initialize the array in a few different ways: If it is a string , you must also give the encoding (and optionally, errors ) parameters; bytearray() then converts the string to bytes using str.encode() . If it is an integer , the array will have that size and will be initialized with null bytes. If it is an object conforming to the buffer interface , a read-only buffer of the object will be used to initialize the bytes array. If it is an iterable , it must be an iterable of integers in the range 0 <= x < 256 , which are used as the initial contents of the array. Without an argument, an array of size 0 is created. See also Binary Sequence Types — bytes, bytearray, memoryview and Bytearray Objects . class bytes ( source = b'' ) class bytes ( source , encoding , errors = 'strict' ) Return a new “bytes” object which is an immutable sequence of integers in the range 0 <= x < 256 . bytes is an immutable version of bytearray – it has the same non-mutating methods and the same indexing and slicing behavior. Accordingly, constructor arguments are interpreted as for bytearray() . Bytes objects can also be created with literals, see String and Bytes literals . See also Binary Sequence Types — bytes, bytearray, memoryview , Bytes Objects , and Bytes and Bytearray Operations . callable ( object , / ) ¶ Return True if the object argument appears callable, False if not. If this returns True , it is still possible that a call fails, but if it is False , calling object will never succeed. Note that classes are callable (calling a class returns a new instance); instances are callable if their class has a __call__() method. Added in version 3.2: This function was first removed in Python 3.0 and then brought back in Python 3.2. chr ( codepoint , / ) ¶ Return the string representing a character with the specified Unicode code point. For example, chr(97) returns the string 'a' , while chr(8364) returns the string '€' . This is the inverse of ord() . The valid range for the argument is from 0 through 1,114,111 (0x10FFFF in base 16). ValueError will be raised if it is outside that range. @ classmethod ¶ Transform a method into a class method. A class method receives the class as an implicit first argument, just like an instance method receives the instance. To declare a class method, use this idiom: class C : @classmethod def f ( cls , arg1 , arg2 ): ... The @classmethod form is a function decorator – see Function definitions for details. A class method can be called either on the class (such as C.f() ) or on an instance (such as C().f() ). The instance is ignored except for its class. If a class method is called for a derived class, the derived class object is passed as the implied first argument. Class methods are different than C++ or Java static methods. If you want those, see staticmethod() in this section. For more information on class methods, see The standard type hierarchy . Changed in version 3.9: Class methods can now wrap other descriptors such as property() . Changed in version 3.10: Class methods now inherit the method attributes ( __module__ , __name__ , __qualname__ , __doc__ and __annotations__ ) and have a new __wrapped__ attribute. Deprecated since version 3.11, removed in version 3.13: Class methods can no longer wrap other descriptors such as property() . compile ( source , filename , mode , flags = 0 , dont_inherit = False , optimize = -1 ) ¶ Compile the source into a code or AST object. Code objects can be executed by exec() or eval() . source can either be a normal string, a byte string, or an AST object. Refer to the ast module documentation for information on how to work with AST objects. The filename argument should give the file from which the code was read; pass some recognizable value if it wasn’t read from a file ( '<string>' is commonly used). The mode argument specifies what kind of code must be compiled; it can be 'exec' if source consists of a sequence of statements, 'eval' if it consists of a single expression, or 'single' if it consists of a single interactive statement (in the latter case, expression statements that evaluate to something other than None will be printed). The optional arguments flags and dont_inherit control which compiler options should be activated and which future features should be allowed. If neither is present (or both are zero) the code is compiled with the same flags that affect the code that is calling compile() . If the flags argument is given and dont_inherit is not (or is zero) then the compiler options and the future statements specified by the flags argument are used in addition to those that would be used anyway. If dont_inherit is a non-zero integer then the flags argument is it – the flags (future features and compiler options) in the surrounding code are ignored. Compiler options and future statements are specified by bits which can be bitwise ORed together to specify multiple options. The bitfield required to specify a given future feature can be found as the compiler_flag attribute on the _Feature instance in the __future__ module. Compiler flags can be found in ast module, with PyCF_ prefix. The argument optimize specifies the optimization level of the compiler; the default value of -1 selects the optimization level of the interpreter as given by -O options. Explicit levels are 0 (no optimization; __debug__ is true), 1 (asserts are removed, __debug__ is false) or 2 (docstrings are removed too). This function raises SyntaxError or ValueError if the compiled source is invalid. If you want to parse Python code into its AST representation, see ast.parse() . Raises an auditing event compile with arguments source and filename . This event may also be raised by implicit compilation. Note When compiling a string with multi-line code in 'single' or 'eval' mode, input must be terminated by at least one newline character. This is to facilitate detection of incomplete and complete statements in the code module. Warning It is possible to crash the Python interpreter with a sufficiently large/complex string when compiling to an AST object due to stack depth limitations in Python’s AST compiler. Changed in version 3.2: Allowed use of Windows and Mac newlines. Also, input in 'exec' mode does not have to end in a newline anymore. Added the optimize parameter. Changed in version 3.5: Previously, TypeError was raised when null bytes were encountered in source . Added in version 3.8: ast.PyCF_ALLOW_TOP_LEVEL_AWAIT can now be passed in flags to enable support for top-level await , async for , and async with . class complex ( number = 0 , / ) ¶ class complex ( string , / ) class complex ( real = 0 , imag = 0 ) Convert a single string or number to a complex number, or create a complex number from real and imaginary parts. Examples: >>> complex ( '+1.23' ) (1.23+0j) >>> complex ( '-4.5j' ) -4.5j >>> complex ( '-1.23+4.5j' ) (-1.23+4.5j) >>> complex ( ' \t ( -1.23+4.5J ) \n ' ) (-1.23+4.5j) >>> complex ( '-Infinity+NaNj' ) (-inf+nanj) >>> complex ( 1.23 ) (1.23+0j) >>> complex ( imag =- 4.5 ) -4.5j >>> complex ( - 1.23 , 4.5 ) (-1.23+4.5j) If the argument is a string, it must contain either a real part (in the same format as for float() ) or an imaginary part (in the same format but with a 'j' or 'J' suffix), or both real and imaginary parts (the sign of the imaginary part is mandatory in this case). The string can optionally be surrounded by whitespaces and the round parentheses '(' and ')' , which are ignored. The string must not contain whitespace between '+' , '-' , the 'j' or 'J' suffix, and the decimal number. For example, complex('1+2j') is fine, but complex('1 + 2j') raises ValueError . More precisely, the input must conform to the complexvalue production rule in the following grammar, after parentheses and leading and trailing whitespace characters are removed: complexvalue : floatvalue | floatvalue ( "j" | "J" ) | floatvalue sign absfloatvalue ( "j" | "J" ) If the argument is a number, the constructor serves as a numeric conversion like int and float . For a general Python object x , complex(x) delegates to x.__complex__() . If __complex__() is not defined then it falls back to __float__() . If __float__() is not defined then it falls back to __index__() . If two arguments are provided or keyword arguments are used, each argument may be any numeric type (including complex). If both arguments are real numbers, return a complex number with the real component real and the imaginary component imag . If both arguments are complex numbers, return a complex number with the real component real.real-imag.imag and the imaginary component real.imag+imag.real . If one of arguments is a real number, only its real component is used in the above expressions. See also complex.from_number() which only accepts a single numeric argument. If all arguments are omitted, returns 0j . The complex type is described in Numeric Types — int, float, complex . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.8: Falls back to __index__() if __complex__() and __float__() are not defined. Deprecated since version 3.14: Passing a complex number as the real or imag argument is now deprecated; it should only be passed as a single positional argument. delattr ( object , name , / ) ¶ This is a relative of setattr() . The arguments are an object and a string. The string must be the name of one of the object’s attributes. The function deletes the named attribute, provided the object allows it. For example, delattr(x, 'foobar') is equivalent to del x.foobar . name need not be a Python identifier (see setattr() ). class dict ( ** kwargs ) class dict ( mapping , / , ** kwargs ) class dict ( iterable , / , ** kwargs ) Create a new dictionary. The dict object is the dictionary class. See dict and Mapping Types — dict for documentation about this class. For other containers see the built-in list , set , and tuple classes, as well as the collections module. dir ( ) ¶ dir ( object , / ) Without arguments, return the list of names in the current local scope. With an argument, attempt to return a list of valid attributes for that object. If the object has a method named __dir__() , this method will be called and must return the list of attributes. This allows objects that implement a custom __getattr__() or __getattribute__() function to customize the way dir() reports their attributes. If the object does not provide __dir__() , the function tries its best to gather information from the object’s __dict__ attribute, if defined, and from its type object. The resulting list is not necessarily complete and may be inaccurate when the object has a custom __getattr__() . The default dir() mechanism behaves differently with different types of objects, as it attempts to produce the most relevant, rather than complete, information: If the object is a module object, the list contains the names of the module’s attributes. If the object is a type or class object, the list contains the names of its attributes, and recursively of the attributes of its bases. Otherwise, the list contains the object’s attributes’ names, the names of its class’s attributes, and recursively of the attributes of its class’s base classes. The resulting list is sorted alphabetically. For example: >>> import struct >>> dir () # show the names in the module namespace ['__builtins__', '__name__', 'struct'] >>> dir ( struct ) # show the names in the struct module ['Struct', '__all__', '__builtins__', '__cached__', '__doc__', '__file__', '__initializing__', '__loader__', '__name__', '__package__', '_clearcache', 'calcsize', 'error', 'pack', 'pack_into', 'unpack', 'unpack_from'] >>> class Shape : ... def __dir__ ( self ): ... return [ 'area' , 'perimeter' , 'location' ] ... >>> s = Shape () >>> dir ( s ) ['area', 'location', 'perimeter'] Note Because dir() is supplied primarily as a convenience for use at an interactive prompt, it tries to supply an interesting set of names more than it tries to supply a rigorously or consistently defined set of names, and its detailed behavior may change across releases. For example, metaclass attributes are not in the result list when the argument is a class. divmod ( a , b , / ) ¶ Take two (non-complex) numbers as arguments and return a pair of numbers consisting of their quotient and remainder when using integer division. With mixed operand types, the rules for binary arithmetic operators apply. For integers, the result is the same as (a // b, a % b) . For floating-point numbers the result is (q, a % b) , where q is usually math.floor(a / b) but may be 1 less than that. In any case q * b + a % b is very close to a , if a % b is non-zero it has the same sign as b , and 0 <= abs(a % b) < abs(b) . enumerate ( iterable , start = 0 ) ¶ Return an enumerate object. iterable must be a sequence, an iterator , or some other object which supports iteration. The __next__() method of the iterator returned by enumerate() returns a tuple containing a count (from start which defaults to 0) and the values obtained from iterating over iterable . >>> seasons = [ 'Spring' , 'Summer' , 'Fall' , 'Winter' ] >>> list ( enumerate ( seasons )) [(0, 'Spring'), (1, 'Summer'), (2, 'Fall'), (3, 'Winter')] >>> list ( enumerate ( seasons , start = 1 )) [(1, 'Spring'), (2, 'Summer'), (3, 'Fall'), (4, 'Winter')] Equivalent to: def enumerate ( iterable , start = 0 ): n = start for elem in iterable : yield n , elem n += 1 eval ( source , / , globals = None , locals = None ) ¶ Parameters : source ( str | code object ) – A Python expression. globals ( dict | None ) – The global namespace (default: None ). locals ( mapping | None ) – The local namespace (default: None ). Returns : The result of the evaluated expression. Raises : Syntax errors are reported as exceptions. Warning This function executes arbitrary code. Calling it with user-supplied input may lead to security vulnerabilities. The source argument is parsed and evaluated as a Python expression (technically speaking, a condition list) using the globals and locals mappings as global and local namespace. If the globals dictionary is present and does not contain a value for the key __builtins__ , a reference to the dictionary of the built-in module builtins is inserted under that key before source is parsed. That way you can control what builtins are available to the executed code by inserting your own __builtins__ dictionary into globals before passing it to eval() . If the locals mapping is omitted it defaults to the globals dictionary. If both mappings are omitted, the source is executed with the globals and locals in the environment where eval() is called. Note, eval() will only have access to the nested scopes (non-locals) in the enclosing environment if they are already referenced in the scope that is calling eval() (e.g. via a nonlocal statement). Example: >>> x = 1 >>> eval ( 'x+1' ) 2 This function can also be used to execute arbitrary code objects (such as those created by compile() ). In this case, pass a code object instead of a string. If the code object has been compiled with 'exec' as the mode argument, eval() 's return value will be None . Hints: dynamic execution of statements is supported by the exec() function. The globals() and locals() functions return the current global and local dictionary, respectively, which may be useful to pass around for use by eval() or exec() . If the given source is a string, then leading and trailing spaces and tabs are stripped. See ast.literal_eval() for a function that can safely evaluate strings with expressions containing only literals. Raises an auditing event exec with the code object as the argument. Code compilation events may also be raised. Changed in version 3.13: The globals and locals arguments can now be passed as keywords. Changed in version 3.13: The semantics of the default locals namespace have been adjusted as described for the locals() builtin. exec ( source , / , globals = None , locals = None , * , closure = None ) ¶ Warning This function executes arbitrary code. Calling it with user-supplied input may lead to security vulnerabilities. This function supports dynamic execution of Python code. source must be either a string or a code object. If it is a string, the string is parsed as a suite of Python statements which is then executed (unless a syntax error occurs). [ 1 ] If it is a code object, it is simply executed. In all cases, the code that’s executed is expected to be valid as file input (see the section File input in the Reference Manual). Be aware that the nonlocal , yield , and return statements may not be used outside of function definitions even within the context of code passed to the exec() function. The return value is None . In all cases, if the optional parts are omitted, the code is executed in the current scope. If only globals is provided, it must be a dictionary (and not a subclass of dictionary), which will be used for both the global and the local variables. If globals and locals are given, they are used for the global and local variables, respectively. If provided, locals can be any mapping object. Remember that at the module level, globals and locals are the same dictionary. Note When exec gets two separate objects as globals and locals , the code will be executed as if it were embedded in a class definition. This means functions and classes defined in the executed code will not be able to access variables assigned at the top level (as the “top level” variables are treated as class variables in a class definition). If the globals dictionary does not contain a value for the key __builtins__ , a reference to the dictionary of the built-in module builtins is inserted under that key. That way you can control what builtins are available to the executed code by inserting your own __builtins__ dictionary into globals before passing it to exec() . The closure argument specifies a closure–a tuple of cellvars. It’s only valid when the object is a code object containing free (closure) variables . The length of the tuple must exactly match the length of the code object’s co_freevars attribute. Raises an auditing event exec with the code object as the argument. Code compilation events may also be raised. Note The built-in functions globals() and locals() return the current global and local namespace, respectively, which may be useful to pass around for use as the second and third argument to exec() . Note The default locals act as described for function locals() below. Pass an explicit locals dictionary if you need to see effects of the code on locals after function exec() returns. Changed in version 3.11: Added the closure parameter. Changed in version 3.13: The globals and locals arguments can now be passed as keywords. Changed in version 3.13: The semantics of the default locals namespace have been adjusted as described for the locals() builtin. filter ( function , iterable , / ) ¶ Construct an iterator from those elements of iterable for which function is true. iterable may be either a sequence, a container which supports iteration, or an iterator. If function is None , the identity function is assumed, that is, all elements of iterable that are false are removed. Note that filter(function, iterable) is equivalent to the generator expression (item for item in iterable if function(item)) if function is not None and (item for item in iterable if item) if function is None . See itertools.filterfalse() for the complementary function that returns elements of iterable for which function is false. class float ( number = 0.0 , / ) ¶ class float ( string , / ) Return a floating-point number constructed from a number or a string. Examples: >>> float ( '+1.23' ) 1.23 >>> float ( ' -12345 \n ' ) -12345.0 >>> float ( '1e-003' ) 0.001 >>> float ( '+1E6' ) 1000000.0 >>> float ( '-Infinity' ) -inf If the argument is a string, it should contain a decimal number, optionally preceded by a sign, and optionally embedded in whitespace. The optional sign may be '+' or '-' ; a '+' sign has no effect on the value produced. The argument may also be a string representing a NaN (not-a-number), or positive or negative infinity. More precisely, the input must conform to the floatvalue production rule in the following grammar, after leading and trailing whitespace characters are removed: sign : "+" | "-" infinity : "Infinity" | "inf" nan : "nan" digit : <a Unicode decimal digit, i.e. characters in Unicode general category Nd> digitpart : digit ([ "_" ] digit )* number : [ digitpart ] "." digitpart | digitpart [ "." ] exponent : ( "e" | "E" ) [ sign ] digitpart floatnumber : number [ exponent ] absfloatvalue : floatnumber | infinity | nan floatvalue : [ sign ] absfloatvalue Case is not significant, so, for example, “inf”, “Inf”, “INFINITY”, and “iNfINity” are all acceptable spellings for positive infinity. Otherwise, if the argument is an integer or a floating-point number, a floating-point number with the same value (within Python’s floating-point precision) is returned. If the argument is outside the range of a Python float, an OverflowError will be raised. For a general Python object x , float(x) delegates to x.__float__() . If __float__() is not defined then it falls back to __index__() . See also float.from_number() which only accepts a numeric argument. If no argument is given, 0.0 is returned. The float type is described in Numeric Types — int, float, complex . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.7: The parameter is now positional-only. Changed in version 3.8: Falls back to __index__() if __float__() is not defined. format ( value , format_spec = '' , / ) ¶ Convert a value to a “formatted” representation, as controlled by format_spec . The interpretation of format_spec will depend on the type of the value argument; however, there is a standard formatting syntax that is used by most built-in types: Format Specification Mini-Language . The default format_spec is an empty string which usually gives the same effect as calling str(value) . A call to format(value, format_spec) is translated to type(value).__format__(value, format_spec) which bypasses the instance dictionary when searching for the value’s __format__() method. A TypeError exception is raised if the method search reaches object and the format_spec is non-empty, or if either the format_spec or the return value are not strings. Changed in version 3.4: object().__format__(format_spec) raises TypeError if format_spec is not an empty string. class frozenset ( iterable = () , / ) Return a new frozenset object, optionally with elements taken from iterable . frozenset is a built-in class. See frozenset and Set Types — set, frozenset for documentation about this class. For other containers see the built-in set , list , tuple , and dict classes, as well as the collections module. getattr ( object , name , / ) ¶ getattr ( object , name , default , / ) Return the value of the named attribute of object . name must be a string. If the string is the name of one of the object’s attributes, the result is the value of that attribute. For example, getattr(x, 'foobar') is equivalent to x.foobar . If the named attribute does not exist, default is returned if provided, otherwise AttributeError is raised. name need not be a Python identifier (see setattr() ). Note Since private name mangling happens at compilation time, one must manually mangle a private attribute’s (attributes with two leading underscores) name in order to retrieve it with getattr() . globals ( ) ¶ Return the dictionary implementing the current module namespace. For code within functions, this is set when the function is defined and remains the same regardless of where the function is called. hasattr ( object , name , / ) ¶ The arguments are an object and a string. The result is True if the string is the name of one of the object’s attributes, False if not. (This is implemented by calling getattr(object, name) and seeing whether it raises an AttributeError or not.) hash ( object , / ) ¶ Return the hash value of the object (if it has one). Hash values are integers. They are used to quickly compare dictionary keys during a dictionary lookup. Numeric values that compare equal have the same hash value (even if they are of different types, as is the case for 1 and 1.0). Note For objects with custom __hash__() methods, note that hash() truncates the return value based on the bit width of the host machine. help ( ) ¶ help ( request ) Invoke the built-in help system. (This function is intended for interactive use.) If no argument is given, the interactive help system starts on the interpreter console. If the argument is a string, then the string is looked up as the name of a module, function, class, method, keyword, or documentation topic, and a help page is printed on the console. If the argument is any other kind of object, a help page on the object is generated. Note that if a slash(/) appears in the parameter list of a function when invoking help() , it means that the parameters prior to the slash are positional-only. For more info, see the FAQ entry on positional-only parameters . This function is added to the built-in namespace by the site module. Changed in version 3.4: Changes to pydoc and inspect mean that the reported signatures for callables are now more comprehensive and consistent. hex ( integer , / ) ¶ Convert an integer number to a lowercase hexadecimal string prefixed with “0x”. If integer is not a Python int object, it has to define an __index__() method that returns an integer. Some examples: >>> hex ( 255 ) '0xff' >>> hex ( - 42 ) '-0x2a' If you want to convert an integer number to an uppercase or lower hexadecimal string with prefix or not, you can use either of the following ways: >>> ' %#x ' % 255 , ' %x ' % 255 , ' %X ' % 255 ('0xff', 'ff', 'FF') >>> format ( 255 , '#x' ), format ( 255 , 'x' ), format ( 255 , 'X' ) ('0xff', 'ff', 'FF') >>> f ' { 255 : #x } ' , f ' { 255 : x } ' , f ' { 255 : X } ' ('0xff', 'ff', 'FF') See also format() for more information. See also int() for converting a hexadecimal string to an integer using a base of 16. Note To obtain a hexadecimal string representation for a float, use the float.hex() method. id ( object , / ) ¶ Return the “identity” of an object. This is an integer which is guaranteed to be unique and constant for this object during its lifetime. Two objects with non-overlapping lifetimes may have the same id() value. CPython implementation detail: This is the address of the object in memory. Raises an auditing event builtins.id with argument id . input ( ) ¶ input ( prompt , / ) If the prompt argument is present, it is written to standard output without a trailing newline. The function then reads a line from input, converts it to a string (stripping a trailing newline), and returns that. When EOF is read, EOFError is raised. Example: >>> s = input ( '--> ' ) --> Monty Python's Flying Circus >>> s "Monty Python's Flying Circus" If the readline module was loaded, then input() will use it to provide elaborate line editing and history features. Raises an auditing event builtins.input with argument prompt before reading input Raises an auditing event builtins.input/result with the result after successfully reading input. class int ( number = 0 , / ) ¶ class int ( string , / , base = 10 ) Return an integer object constructed from a number or a string, or return 0 if no arguments are given. Examples: >>> int ( 123.45 ) 123 >>> int ( '123' ) 123 >>> int ( ' -12_345 \n ' ) -12345 >>> int ( 'FACE' , 16 ) 64206 >>> int ( '0xface' , 0 ) 64206 >>> int ( '01110011' , base = 2 ) 115 If the argument defines __int__() , int(x) returns x.__int__() . If the argument defines __index__() , it returns x.__index__() . For floating-point numbers, this truncates towards zero. If the argument is not a number or if base is given, then it must be a string, bytes , or bytearray instance representing an integer in radix base . Optionally, the string can be preceded by + or - (with no space in between), have leading zeros, be surrounded by whitespace, and have single underscores interspersed between digits. A base-n integer string contains digits, each representing a value from 0 to n-1. The values 0–9 can be represented by any Unicode decimal digit. The values 10–35 can be represented by a to z (or A to Z ). The default base is 10. The allowed bases are 0 and 2–36. Base-2, -8, and -16 strings can be optionally prefixed with 0b / 0B , 0o / 0O , or 0x / 0X , as with integer literals in code. For base 0, the string is interpreted in a similar way to an integer literal in code , in that the actual base is 2, 8, 10, or 16 as determined by the prefix. Base 0 also disallows leading zeros: int('010', 0) is not legal, while int('010') and int('010', 8) are. The integer type is described in Numeric Types — int, float, complex . Changed in version 3.4: If base is not an instance of int and the base object has a base.__index__ method, that method is called to obtain an integer for the base. Previous versions used base.__int__ instead of base.__index__ . Changed in version 3.6: Grouping digits with underscores as in code literals is allowed. Changed in version 3.7: The first parameter is now positional-only. Changed in version 3.8: Falls back to __index__() if __int__() is not defined. Changed in version 3.11: int string inputs and string representations can be limited to help avoid denial of service attacks. A ValueError is raised when the limit is exceeded while converting a string to an int or when converting an int into a string would exceed the limit. See the integer string conversion length limitation documentation. Changed in version 3.14: int() no longer delegates to the __trunc__() method. isinstance ( object , classinfo , / ) ¶ Return True if the object argument is an instance of the classinfo argument, or of a (direct, indirect, or virtual ) subclass thereof. If object is not an object of the given type, the function always returns False . If classinfo is a tuple of type objects (or recursively, other such tuples) or a Union Type of multiple types, return True if object is an instance of any of the types. If classinfo is not a type or tuple of types and such tuples, a TypeError exception is raised. TypeError may not be raised for an invalid type if an earlier check succeeds. Changed in version 3.10: classinfo can be a Union Type . issubclass ( class , classinfo , / ) ¶ Return True if class is a subclass (direct, indirect, or virtual ) of classinfo . A class is considered a subclass of itself. classinfo may be a tuple of class objects (or recursively, other such tuples) or a Union Type , in which case return True if class is a subclass of any entry in classinfo . In any other case, a TypeError exception is raised. Changed in version 3.10: classinfo can be a Union Type . iter ( iterable , / ) ¶ iter ( callable , sentinel , / ) Return an iterator object. The first argument is interpreted very differently depending on the presence of the second argument. Without a second argument, the single argument must be a collection object which supports the iterable protocol (the __iter__() method), or it must support the sequence protocol (the __getitem__() method with integer arguments starting at 0 ). If it does not support either of those protocols, TypeError is raised. If the second argument, sentinel , is given, then the first argument must be a callable object. The iterator created in this case will call callable with no arguments for each call to its __next__() method; if the value returned is equal to sentinel , StopIteration will be raised, otherwise the value will be returned. See also Iterator Types . One useful application of the second form of iter() is to build a block-reader. For example, reading fixed-width blocks from a binary database file until the end of file is reached: from functools import partial with open ( 'mydata.db' , 'rb' ) as f : for block in iter ( partial ( f . read , 64 ), b '' ): process_block ( block ) len ( object , / ) ¶ Return the length (the number of items) of an object. The argument may be a sequence (such as a string, bytes, tuple, list, or range) or a collection (such as a dictionary, set, or frozen set). CPython implementation detail: len raises OverflowError on lengths larger than sys.maxsize , such as range(2 ** 100) . class list ( iterable = () , / ) Rather than being a function, list is actually a mutable sequence type, as documented in Lists and Sequence Types — list, tuple, range . locals ( ) ¶ Return a mapping object representing the current local symbol table, with variable names as the keys, and their currently bound references as the values. At module scope, as well as when using exec() or eval() with a single namespace, this function returns the same namespace as globals() . At class scope, it returns the namespace that will be passed to the metaclass constructor. When using exec() or eval() with separate local and global arguments, it returns the local namespace passed in to the function call. In all of the above cases, each call to locals() in a given frame of execution will return the same mapping object. Changes made through the mapping object returned from locals() will be visible as assigned, reassigned, or deleted local variables, and assigning, reassigning, or deleting local variables will immediately affect the contents of the returned mapping object. In an optimized scope (including functions, generators, and coroutines), each call to locals() instead returns a fresh dictionary containing the current bindings of the function’s local variables and any nonlocal cell references. In this case, name binding changes made via the returned dict are not written back to the corresponding local variables or nonlocal cell references, and assigning, reassigning, or deleting local variables and nonlocal cell references does not affect the contents of previously returned dictionaries. Calling locals() as part of a comprehension in a function, generator, or coroutine is equivalent to calling it in the containing scope, except that the comprehension’s initialised iteration variables will be included. In other scopes, it behaves as if the comprehension were running as a nested function. Calling locals() as part of a generator expression is equivalent to calling it in a nested generator function. Changed in version 3.12: The behaviour of locals() in a comprehension has been updated as described in PEP 709 . Changed in version 3.13: As part of PEP 667 , the semantics of mutating the mapping objects returned from this function are now defined. The behavior in optimized scopes is now as described above. Aside from being defined, the behaviour in other scopes remains unchanged from previous versions. map ( function , iterable , / , * iterables , strict = False ) ¶ Return an iterator that applies function to every item of iterable , yielding the results. If additional iterables arguments are passed, function must take that many arguments and is applied to the items from all iterables in parallel. With multiple iterables, the iterator stops when the shortest iterable is exhausted. If strict is True and one of the iterables is exhausted before the others, a ValueError is raised. For cases where the function inputs are already arranged into argument tuples, see itertools.starmap() . Changed in version 3.14: Added the strict parameter. max ( iterable , / , * , key = None ) ¶ max ( iterable , / , * , default , key = None ) max ( arg1 , arg2 , / , * args , key = None ) Return the largest item in an iterable or the largest of two or more arguments. If one positional argument is provided, it should be an iterable . The largest item in the iterable is returned. If two or more positional arguments are provided, the largest of the positional arguments is returned. There are two optional keyword-only arguments. The key argument specifies a one-argument ordering function like that used for list.sort() . The default argument specifies an object to return if the provided iterable is empty. If the iterable is empty and default is not provided, a ValueError is raised. If multiple items are maximal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as sorted(iterable, key=keyfunc, reverse=True)[0] and heapq.nlargest(1, iterable, key=keyfunc) . Changed in version 3.4: Added the default keyword-only parameter. Changed in version 3.8: The key can be None . class memoryview ( object ) Return a “memory view” object created from the given argument. See Memory Views for more information. min ( iterable , / , * , key = None ) ¶ min ( iterable , / , * , default , key = None ) min ( arg1 , arg2 , / , * args , key = None ) Return the smallest item in an iterable or the smallest of two or more arguments. If one positional argument is provided, it should be an iterable . The smallest item in the iterable is returned. If two or more positional arguments are provided, the smallest of the positional arguments is returned. There are two optional keyword-only arguments. The key argument specifies a one-argument ordering function like that used for list.sort() . The default argument specifies an object to return if the provided iterable is empty. If the iterable is empty and default is not provided, a ValueError is raised. If multiple items are minimal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as sorted(iterable, key=keyfunc)[0] and heapq.nsmallest(1, iterable, key=keyfunc) . Changed in version 3.4: Added the default keyword-only parameter. Changed in version 3.8: The key can be None . next ( iterator , / ) ¶ next ( iterator , default , / ) Retrieve the next item from the iterator by calling its __next__() method. If default is given, it is returned if the iterator is exhausted, otherwise StopIteration is raised. class object ¶ This is the ultimate base class of all other classes. It has methods that are common to all instances of Python classes. When the constructor is called, it returns a new featureless object. The constructor does not accept any arguments. Note object instances do not have __dict__ attributes, so you can’t assign arbitrary attributes to an instance of object . oct ( integer , / ) ¶ Convert an integer number to an octal string prefixed with “0o”. The result is a valid Python expression. If integer is not a Python int object, it has to define an __index__() method that returns an integer. For example: >>> oct ( 8 ) '0o10' >>> oct ( - 56 ) '-0o70' If you want to convert an integer number to an octal string either with the prefix “0o” or not, you can use either of the following ways. >>> ' %#o ' % 10 , ' %o ' % 10 ('0o12', '12') >>> format ( 10 , '#o' ), format ( 10 , 'o' ) ('0o12', '12') >>> f ' { 10 : #o } ' , f ' { 10 : o } ' ('0o12', '12') See also format() for more information. open ( file , mode = 'r' , buffering = -1 , encoding = None , errors = None , newline = None , closefd = True , opener = None ) ¶ Open file and return a corresponding file object . If the file cannot be opened, an OSError is raised. See Reading and Writing Files for more examples of how to use this function. file is a path-like object giving the pathname (absolute or relative to the current working directory) of the file to be opened or an integer file descriptor of the file to be wrapped. (If a file descriptor is given, it is closed when the returned I/O object is closed unless closefd is set to False .) mode is an optional string that specifies the mode in which the file is opened. It defaults to 'r' which means open for reading in text mode. Other common values are 'w' for writing (truncating the file if it already exists), 'x' for exclusive creation, and 'a' for appending (which on some Unix systems, means that all writes append to the end of the file regardless of the current seek position). In text mode, if encoding is not specified the encoding used is platform-dependent: locale.getencoding() is called to get the current locale encoding. (For reading and writing raw bytes use binary mode and leave encoding unspecified.) The available modes are: Character Meaning 'r' open for reading (default) 'w' open for writing, truncating the file first 'x' open for exclusive creation, failing if the file already exists 'a' open for writing, appending to the end of file if it exists 'b' binary mode 't' text mode (default) '+' open for updating (reading and writing) The default mode is 'r' (open for reading text, a synonym of 'rt' ). Modes 'w+' and 'w+b' open and truncate the file. Modes 'r+' and 'r+b' open the file with no truncation. As mentioned in the Overview , Python distinguishes between binary and text I/O. Files opened in binary mode (including 'b' in the mode argument) return contents as bytes objects without any decoding. In text mode (the default, or when 't' is included in the mode argument), the contents of the file are returned as str , the bytes having been first decoded using a platform-dependent encoding or using the specified encoding if given. Note Python doesn’t depend on the underlying operating system’s notion of text files; all the processing is done by Python itself, and is therefore platform-independent. buffering is an optional integer used to set the buffering policy. Pass 0 to switch buffering off (only allowed in binary mode), 1 to select line buffering (only usable when writing in text mode), and an integer > 1 to indicate the size in bytes of a fixed-size chunk buffer. Note that specifying a buffer size this way applies for binary buffered I/O, but TextIOWrapper (i.e., files opened with mode='r+' ) would have another buffering. To disable buffering in TextIOWrapper , consider using the write_through flag for io.TextIOWrapper.reconfigure() . When no buffering argument is given, the default buffering policy works as follows: Binary files are buffered in fixed-size chunks; the size of the buffer is max(min(blocksize, 8 MiB), DEFAULT_BUFFER_SIZE) when the device block size is available. On most systems, the buffer will typically be 128 kilobytes long. “Interactive” text files (files for which isatty() returns True ) use line buffering. Other text files use the policy described above for binary files. encoding is the name of the encoding used to decode or encode the file. This should only be used in text mode. The default encoding is platform dependent (whatever locale.getencoding() returns), but any text encoding supported by Python can be used. See the codecs module for the list of supported encodings. errors is an optional string that specifies how encoding and decoding errors are to be handled—this cannot be used in binary mode. A variety of standard error handlers are available (listed under Error Handlers ), though any error handling name that has
2026-01-13T08:48:39
https://dev.to/embernoglow/the-most-useless-python-utility-for-development-you-can-make-mem-lol-pillow-2a84
The most useless python utility for development you can make? Mem lol Pillow - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse EmberNoGlow Posted on Nov 20, 2025 The most useless python utility for development you can make? Mem lol Pillow # python # meme # programming # learning This is the most useless Python program created for entertainment purposes . I just had nothing better to do. Github : https://github.com/EmberNoGlow/Meme-lol-Pillow/ Why? Just like that. License Use it as you wish, it's a public domain Top comments (0) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse EmberNoGlow Follow Just a dude, a mid-level on Godot / Python developer and Rust beginner Joined Nov 18, 2025 More from EmberNoGlow From Zero to SDF Editor Beta: How I Used AI to Force My Dream Project Out of the Prototype Stage. What I learned? # python # sideprojects # opensource # discuss Marching Cubes algorithm written in Rust # rust # algorithms # opensource # programming [Boost] # discuss # python # coding # startup 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Forem — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Forem © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://dev.to/t/beginners/page/3377
Beginners Page 3377 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Beginners Follow Hide "A journey of a thousand miles begins with a single step." -Chinese Proverb Create Post submission guidelines UPDATED AUGUST 2, 2019 This tag is dedicated to beginners to programming, development, networking, or to a particular language. Everything should be geared towards that! For Questions... Consider using this tag along with #help, if... You are new to a language, or to programming in general, You want an explanation with NO prerequisite knowledge required. You want insight from more experienced developers. Please do not use this tag if you are merely new to a tool, library, or framework. See also, #explainlikeimfive For Articles... Posts should be specifically geared towards true beginners (experience level 0-2 out of 10). Posts should require NO prerequisite knowledge, except perhaps general (language-agnostic) essentials of programming. Posts should NOT merely be for beginners to a tool, library, or framework. If your article does not meet these qualifications, please select a different tag. Promotional Rules Posts should NOT primarily promote an external work. This is what Listings is for. Otherwise accepable posts MAY include a brief (1-2 sentence) plug for another resource at the bottom. Resource lists ARE acceptable if they follow these rules: Include at least 3 distinct authors/creators. Clearly indicate which resources are FREE, which require PII, and which cost money. Do not use personal affiliate links to monetize. Indicate at the top that the article contains promotional links. about #beginners If you're writing for this tag, we recommend you read this article . If you're asking a question, read this article . Older #beginners posts 3374 3375 3376 3377 3378 3379 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://parenting.forem.com/privacy#9-supplemental-notice-for-nevada-residents
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://community.chocolatey.org/packages/sui
Chocolatey Software | Main Sui Binary 1.63.1 Resources Watch videos, read documentation, and hear Chocolatey success stories from companies you trust. View Resources Events Find past and upcoming webinars, workshops, and conferences. New events have recently been added! View Events Courses Step-by-step guides for all things Chocolatey! Earn badges as you learn through interactive digital courses. View Courses Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Learn More Join the Chocolatey Team on our regular monthly stream where we put a spotlight on the most recent Chocolatey product releases. You'll have a chance to have your questions answered in a live Ask Me Anything format. Learn More Join us for the Chocolatey Coding Livestream, where members of our team dive into the heart of open source development by coding live on various Chocolatey projects. Tune in to witness real-time coding, ask questions, and gain insights into the world of package management. Don't miss this opportunity to engage with our team and contribute to the future of Chocolatey! Learn More Webinar from Wednesday, 17 January 2024 We are delighted to announce the release of Chocolatey Central Management v0.12.0, featuring seamless Deployment Plan creation, time-saving duplications, insightful Group Details, an upgraded Dashboard, bug fixes, user interface polishing, and refined documentation. As an added bonus we'll have members of our Solutions Engineering team on-hand to dive into some interesting ways you can leverage the new features available! Watch On-Demand Join the Chocolatey Team as we discuss all things Community, what we do, how you can get involved and answer your Chocolatey questions. Watch The Replays Webinar Replay from Wednesday, 30 March 2022 At Chocolatey Software we strive for simple, and teaching others. Let us teach you just how simple it could be to keep your 3rd party applications updated across your devices, all with Intune! Watch On-Demand Livestream from Thursday, 9 June 2022 Join James and Josh to show you how you can get the Chocolatey For Business recommended infrastructure and workflow, created, in Azure, in around 20 minutes. Watch On-Demand Livestream from Thursday, 04 August 2022 Join Paul and Gary to hear more about the plans for the Chocolatey CLI in the not so distant future. We'll talk about some cool new features, long term asks from Customers and Community and how you can get involved! Watch On-Demand Livestreams from October 2022 For Hacktoberfest, Chocolatey ran a livestream every Tuesday! Re-watch Cory, James, Gary, and Rain as they share knowledge on how to contribute to open-source projects such as Chocolatey CLI. Watch On-Demand Don't miss a byte of Chocolatey goodness! Explore our livestream events now! Main Community Docs Blog Install Light Dark Auto Light Dark Auto k Main Community Docs Blog Install Light Dark Auto Packages Learn Resources Courses Product Products Chocolatey for Business Pro Edition Chocolatey Open Source Compare Editions Pricing Support Solutions Self-Service Anywhere Central Management Deployments Secure Offline Deployments Ready to give Chocolatey for Business a Try? We offer a 14 day white glove free trial to help get you started. Start Trial Connect Events Careers Newsletter Chocolatey Community Support Contact Bluesky butterfly logo Sign In Sign Up Profile Account Sign Out Profile Account Sign Out Welcome to the Chocolatey Community Package Repository! The packages found in this section of the site are provided, maintained, and moderated by the community. Moderation Every version of each package undergoes a rigorous moderation process before it goes live that typically includes: Security , consistency, and quality checking Installation testing Virus checking through VirusTotal Human moderators who give final review and sign off More detail at Security and Moderation . Organizational Use If you are an organization using Chocolatey, we want your experience to be fully reliable. Due to the nature of this publicly offered repository, reliability cannot be guaranteed. Packages offered here are subject to distribution rights, which means they may need to reach out further to the internet to the official locations to download files at runtime. Fortunately, distribution rights do not apply for internal use. With any edition of Chocolatey (including the free open source edition), you can host your own packages and cache or internalize existing community packages. Disclaimer Your use of the packages on this site means you understand they are not supported or guaranteed in any way. Learn more... I Understand Generate Script B U I L D E R STEP 1 Package Review STEP 2 Integration Method STEP 3 Internal Repo Url STEP 4 Environment Setup STEP 5 Install Script Previous Next Step 1: Review Your Packages Step 2: Choose Your Integration Method Generic Individual Ansible PS DSC Step 3: Enter Your Internal Repository Url (this should look similar to https://community.chocolatey.org/api/v2/ ) Step 3: Copy Your Script or Download Config Option 1: Copy Script Option 2: Download Config Save as .config File Step 4: Setup Your Environment 1. Ensure you are set for organizational deployment Please see the organizational deployment guide 2. Get the package into your environment Option 1: Cached Package (Unreliable, Requires Internet - Same As Community) Open Source or Commercial: Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://community.chocolatey.org/api/v2/ . Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information. You can also just download the packages and push them to a repository Download Packages Option 2: Internalized Package (Reliable, Scalable) Open Source Download the packages: Download Packages Follow manual internalization instructions Package Internalizer (C4B) Run: (additional options) For package and dependencies run: Automate package internalization Step 5: Copy Your Script See options you can pass to upgrade. See best practices for scripting. Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes. If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures: If Applicable - Chocolatey Configuration/Installation ## 1. REQUIREMENTS ## ### Here are the requirements necessary to ensure this is successful. ### a. Internal/Private Cloud Repository Set Up ### #### You'll need an internal/private cloud repository you can use. These are #### generally really quick to set up and there are quite a few options. #### Chocolatey Software recommends Nexus, Artifactory Pro, or ProGet as they #### are repository servers and will give you the ability to manage multiple #### repositories and types from one server installation. ### b. Download Chocolatey Package and Put on Internal Repository ### #### You need to have downloaded the Chocolatey package as well. #### Please see https://chocolatey.org/install#organization ### c. Other Requirements ### #### We initialize a few things that are needed by this script - there are no other requirements. $ErrorActionPreference = "Stop" #### Set TLS 1.2 (3072) as that is the minimum required by various up-to-date repositories. #### Use integers because the enumeration value for TLS 1.2 won't exist #### in .NET 4.0, even though they are addressable if .NET 4.5+ is #### installed (.NET 4.5 is an in-place upgrade). [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072 #### We use this variable for future REST calls. $RequestArguments = @{ UseBasicParsing = $true } ## 2. TOP LEVEL VARIABLES ## ### a. Your internal repository url (the main one). ### #### Should be similar to what you see when you browse #### to https://community.chocolatey.org/api/v2/ $NugetRepositoryUrl = "INTERNAL REPO URL" ### b. Internal Repository Credential ### #### If required, add the repository access credential here # $NugetRepositoryCredential = [PSCredential]::new( # "username", # ("password" | ConvertTo-SecureString -AsPlainText -Force) # ) # $RequestArguments.Credential = $NugetRepositoryCredential ### c. Chocolatey nupkg download url ### #### This url should result in an immediate download when you navigate to it $ChocolateyDownloadUrl = "$($NugetRepositoryUrl.TrimEnd('/'))/package/chocolatey.2.6.0.nupkg" ### d. Chocolatey Central Management (CCM) ### #### If using CCM to manage Chocolatey, add the following: #### i. Endpoint URL for CCM # $ChocolateyCentralManagementUrl = "https://chocolatey-central-management:24020/ChocolateyManagementService" #### ii. If using a Client Salt, add it here # $ChocolateyCentralManagementClientSalt = "clientsalt" #### iii. If using a Service Salt, add it here # $ChocolateyCentralManagementServiceSalt = "servicesalt" ## 3. ENSURE CHOCOLATEY IS INSTALLED ## ### Ensure Chocolatey is installed from your internal repository #### Download the Nupkg, appending .zip to the filename to handle archive cmdlet limitations if (-not (Get-Command choco.exe -ErrorAction SilentlyContinue)) { $TempDirectory = Join-Path $env:Temp "chocolateyInstall" if (-not (Test-Path $TempDirectory -PathType Container)) { $null = New-Item -Path $TempDirectory -ItemType Directory } $DownloadedNupkg = Join-Path $TempDirectory "$(Split-Path $ChocolateyDownloadUrl -Leaf).zip" Invoke-WebRequest -Uri $ChocolateyDownloadUrl -OutFile $DownloadedNupkg @RequestArguments #### Extract the Nupkg, and run the chocolateyInstall script if (Get-Command Microsoft.PowerShell.Archive\Expand-Archive -ErrorAction SilentlyContinue) { Microsoft.PowerShell.Archive\Expand-Archive -Path $DownloadedNupkg -DestinationPath $TempDirectory -Force } else { # PowerShell versions See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html . If Applicable - Chocolatey Configuration/Installation ## 1. REQUIREMENTS ## ### Here are the requirements necessary to ensure this is successful. ### a. Internal/Private Cloud Repository Set Up ### #### You'll need an internal/private cloud repository you can use. These are #### generally really quick to set up and there are quite a few options. #### Chocolatey Software recommends Nexus, Artifactory Pro, or ProGet as they #### are repository servers and will give you the ability to manage multiple #### repositories and types from one server installation. ### b. Download Chocolatey Package and Put on Internal Repository ### #### You need to have downloaded the Chocolatey package as well. #### Please see https://chocolatey.org/install#organization ### c. Other Requirements ### #### i. chocolatey.chocolatey ##### You will require the chocolatey.chocolatey collection to be installed ##### on all machines using this playbook. ##### Please see https://github.com/chocolatey/chocolatey-ansible/#installing-the-collection-from-ansible-galaxy - name: Install and Configure Chocolatey hosts: all ## 2. TOP LEVEL VARIABLES ## vars: ### a. Your internal repository url (the main one). ### #### Should be similar to what you see when you browse #### to https://community.chocolatey.org/api/v2/ nuget_repository_url: INTERNAL REPO URL ### b. Internal Repository Credential ### #### If required, add the repository access credential here and #### uncomment lines with source_username and source_password below # nuget_repository_username: username # nuget_repository_password: password ### c. Chocolatey Central Management (CCM) ### #### If using CCM to manage Chocolatey, add the following: #### i. Endpoint URL for CCM # chocolatey_central_management_url: https://chocolatey-central-management:24020/ChocolateyManagementService #### ii. If using a Client Salt, add it here # chocolatey_central_management_client_salt: clientsalt #### iii. If using a Service Salt, add it here # chocolatey_central_management_service_salt: servicesalt ## 3. ENSURE CHOCOLATEY IS INSTALLED ## ### Ensure Chocolatey is installed from your internal repository tasks: - name: Install chocolatey win_chocolatey: name: chocolatey source: ""{{ nuget_repository_url }}"" # source_username: ""{{ nuget_repository_username }}"" # source_password: ""{{ nuget_repository_password }}"" ## 4. CONFIGURE CHOCOLATEY BASELINE ## ### a. FIPS Feature ### #### If you need FIPS compliance - make this the first thing you configure #### before you do any additional configuration or package installations # - name: Enable FIPS compliance # win_chocolatey_feature: # name: useFipsCompliantChecksums # state: enabled ### b. Apply Recommended Configuration ### #### Move cache location so Chocolatey is very deterministic about #### cleaning up temporary data and the location is secured to admins - name: Set the cache location win_chocolatey_config: name: cacheLocation state: present value: C:\ProgramData\chocolatey\cache #### Increase timeout to at least 4 hours - name: Set the command execution timeout win_chocolatey_config: name: commandExecutionTimeoutSeconds state: present value: 14400 #### Turn off download progress when running choco through integrations - name: Disable showing download progress win_chocolatey_feature: name: showDownloadProgress state: disabled ### c. Sources ### #### Remove the default community package repository source - name: Remove Chocolatey Community Repository win_chocolatey_source: name: chocolatey state: absent #### Add internal default sources #### You could have multiple sources here, so we will provide an example #### of one using the remote repo variable here #### NOTE: This EXAMPLE may require changes - name: Add Internal Repository win_chocolatey_source: name: ChocolateyInternal state: present source: {{ nuget_repository_url }} # source_username: {{ nuget_repository_username }} # source_password: {{ nuget_repository_password }} priority: 1 ### b. Keep Chocolatey Up To Date ### #### Keep chocolatey up to date based on your internal source #### You control the upgrades based on when you push an updated version #### to your internal repository. #### Note the source here is to the OData feed, similar to what you see #### when you browse to https://community.chocolatey.org/api/v2/ - name: Upgrade Chocolatey win_chocolatey: name: chocolatey state: latest ## 5. ENSURE CHOCOLATEY FOR BUSINESS ## ### If you don't have Chocolatey for Business (C4B), you'll want to remove from here down. ### a. Ensure The License File Is Installed ### #### Create a license package using script from https://docs.chocolatey.org/en-us/how-tos/setup-offline-installation#exercise-4-create-a-package-for-the-license - name: Install Chocolatey License win_chocolatey: name: chocolatey-license source: ChocolateyInternal state: latest ### b. Disable The Licensed Source ### #### The licensed source cannot be removed, so it must be disabled. #### This must occur after the license has been set by the license package. - name: Disable Chocolatey Community Repository win_chocolatey_source: name: chocolatey.licensed state: disabled ### c. Ensure Chocolatey Licensed Extension ### #### You will have downloaded the licensed extension to your internal repository #### as you have disabled the licensed repository in step 5b. #### Ensure the chocolatey.extension package (aka Chocolatey Licensed Extension) - name: Install Chocolatey Extension win_chocolatey: name: chocolatey.extension source: ChocolateyInternal state: latest #### The Chocolatey Licensed Extension unlocks all of the following, which also have configuration/feature items available with them. You may want to visit the feature pages to see what you might want to also enable: #### - Package Builder - https://docs.chocolatey.org/en-us/features/paid/package-builder #### - Package Internalizer - https://docs.chocolatey.org/en-us/features/paid/package-internalizer #### - Package Synchronization (3 components) - https://docs.chocolatey.org/en-us/features/paid/package-synchronization #### - Package Reducer - https://docs.chocolatey.org/en-us/features/paid/package-reducer #### - Package Audit - https://docs.chocolatey.org/en-us/features/paid/package-audit #### - Package Throttle - https://docs.chocolatey.org/en-us/features/paid/package-throttle #### - CDN Cache Access - https://docs.chocolatey.org/en-us/features/paid/private-cdn #### - Branding - https://docs.chocolatey.org/en-us/features/paid/branding #### - Self-Service Anywhere (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/self-service-anywhere #### - Chocolatey Central Management (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/chocolatey-central-management #### - Other - https://docs.chocolatey.org/en-us/features/paid/ ### d. Ensure Self-Service Anywhere ### #### If you have desktop clients where users are not administrators, you may #### to take advantage of deploying and configuring Self-Service anywhere - name: Hide not-elevated warnings win_chocolatey_feature: name: showNonElevatedWarnings state: disabled - name: Use background mode for self-service win_chocolatey_feature: name: useBackgroundService state: enabled - name: Use background service for non-admins win_chocolatey_feature: name: useBackgroundServiceWithNonAdministratorsOnly state: enabled - name: Allow background uninstallation for user installs win_chocolatey_feature: name: allowBackgroundServiceUninstallsFromUserInstallsOnly state: enabled - name: Set allowed background service commands win_chocolatey_config: name: backgroundServiceAllowedCommands state: present value: install,upgrade,uninstall ### e. Ensure Chocolatey Central Management ### #### If you want to manage and report on endpoints, you can set up and configure ### Central Management. There are multiple portions to manage, so you'll see ### a section on agents here along with notes on how to configure the server ### side components. - name: Install Chocolatey Agent when: chocolatey_central_management_url is defined win_chocolatey: name: chocolatey-agent source: ChocolateyInternal state: latest - name: Set the Central Management Service URL when: chocolatey_central_management_url is defined win_chocolatey_config: name: CentralManagementServiceUrl state: present value: {{ chocolatey_central_management_url }} - name: Set the Central Management Client Salt when: chocolatey_central_management_client_salt is defined win_chocolatey_config: name: centralManagementClientCommunicationSaltAdditivePassword state: present value: {{ chocolatey_central_management_client_salt }} - name: Set the Central Management Service Salt when: chocolatey_central_management_service_salt is defined win_chocolatey_config: name: centralManagementServiceCommunicationSaltAdditivePassword state: present value: {{ chocolatey_central_management_service_salt }} - name: Use Central Management when: chocolatey_central_management_url is defined win_chocolatey_feature: name: useChocolateyCentralManagement state: enabled - name: Use Central Management Deployments when: chocolatey_central_management_url is defined win_chocolatey_feature: name: useChocolateyCentralManagementDeployments state: enabled See docs at https://docs.chef.io/resource_chocolatey_package.html . If Applicable - Chocolatey Configuration/Installation ## 1. REQUIREMENTS ## ### Here are the requirements necessary to ensure this is successful. ### a. Internal/Private Cloud Repository Set Up ### #### You'll need an internal/private cloud repository you can use. These are #### generally really quick to set up and there are quite a few options. #### Chocolatey Software recommends Nexus, Artifactory Pro, or ProGet as they #### are repository servers and will give you the ability to manage multiple #### repositories and types from one server installation. ### b. Download Chocolatey Package and Put on Internal Repository ### #### You need to have downloaded the Chocolatey package as well. #### Please see https://chocolatey.org/install#organization ### c. Other Requirements ### #### The Chocolatey resources are available with any recent version of Chef. #### We utilise the Chocolatey recipe to install the Chocolatey binaries. include_recipe "chocolatey" ## 2. TOP LEVEL VARIABLES ## ### a. Your internal repository url (the main one). ### #### Should be similar to what you see when you browse #### to https://community.chocolatey.org/api/v2/ NugetRepositoryUrl = "INTERNAL REPO URL" ### b. Internal Repository Credential ### #### If required, add the repository access credential here # NugetRepositoryUsername = "username" # NugetRepositoryPassword = "password" ### c. Chocolatey nupkg download url ### #### This url should result in an immediate download when you navigate to it in #### a web browser ChocolateyNupkgUrl = "INTERNAL REPO URL/package/chocolatey.2.6.0.nupkg", ### d. Chocolatey Central Management (CCM) ### #### If using CCM to manage Chocolatey, add the following: #### i. Endpoint URL for CCM # ChocolateyCentralManagementUrl = "https://chocolatey-central-management:24020/ChocolateyManagementService" #### ii. If using a Client Salt, add it here # ChocolateyCentralManagementClientSalt = "clientsalt" #### iii. If using a Service Salt, add it here # ChocolateyCentralManagementServiceSalt = "servicesalt" ## 3. ENSURE CHOCOLATEY IS INSTALLED ## ### Ensure Chocolatey is installed from your internal repository node['chocolatey']['install vars'] = { 'chocolateyDownloadUrl' => "#{ChocolateyNupkgUrl}", } ## 4. CONFIGURE CHOCOLATEY BASELINE ## ### a. FIPS Feature ### #### If you need FIPS compliance - make this the first thing you configure #### before you do any additional configuration or package installations # chocolatey_feature 'useFipsCompliantChecksums' do # action :enable # end ### b. Apply Recommended Configuration ### #### Move cache location so Chocolatey is very deterministic about #### cleaning up temporary data and the location is secured to admins chocolatey_config 'cacheLocation' do value 'C:\ProgramData\chocolatey\cache' end #### Increase timeout to at least 4 hours chocolatey_config 'commandExecutionTimeoutSeconds' do value '14400' end #### Turn off download progress when running choco through integrations chocolatey_feature 'showDownloadProgress' do action :disable end ### c. Sources ### #### Remove the default community package repository source chocolatey_source 'chocolatey' do action :remove end #### Add internal default sources #### You could have multiple sources here, so we will provide an example #### of one using the remote repo variable here #### NOTE: This EXAMPLE may require changes chocolatey_source 'ChocolateyInternal' do source "#{NugetRepositoryUrl}" priority 1 action :add end execute 'ChocolateyInternal' do command "choco source add --name ChocolateyInternal -s #{NugetRepositoryUrl} -u=#{NugetRepositoryUsername} -p=#{NugetRepositoryPassword} --priority=1" only_if { NugetRepositoryUsername != nil || NugetRepositoryPassword != nil } end ### b. Keep Chocolatey Up To Date ### #### Keep chocolatey up to date based on your internal source #### You control the upgrades based on when you push an updated version #### to your internal repository. #### Note the source here is to the OData feed, similar to what you see #### when you browse to https://community.chocolatey.org/api/v2/ chocolatey_package 'chocolatey' do action :upgrade source "#{NugetRepositoryUrl}" end ## 5. ENSURE CHOCOLATEY FOR BUSINESS ## ### If you don't have Chocolatey for Business (C4B), you'll want to remove from here down. ### a. Ensure The License File Is Installed ### #### Create a license package using script from https://docs.chocolatey.org/en-us/how-tos/setup-offline-installation#exercise-4-create-a-package-for-the-license chocolatey_package 'chocolatey-license' do action :install source "#{NugetRepositoryUrl}" end ### b. Disable The Licensed Source ### #### The licensed source cannot be removed, so it must be disabled. #### This must occur after the license has been set by the license package. chocolatey_source 'chocolatey.licensed' do action :disable end ### c. Ensure Chocolatey Licensed Extension ### #### You will have downloaded the licensed extension to your internal repository #### as you have disabled the licensed repository in step 5b. #### Ensure the chocolatey.extension package (aka Chocolatey Licensed Extension) chocolatey_package 'chocolatey.extention' do action install source "#{NugetRepositoryUrl}" end #### The Chocolatey Licensed Extension unlocks all of the following, which also have configuration/feature items available with them. You may want to visit the feature pages to see what you might want to also enable: #### - Package Builder - https://docs.chocolatey.org/en-us/features/paid/package-builder #### - Package Internalizer - https://docs.chocolatey.org/en-us/features/paid/package-internalizer #### - Package Synchronization (3 components) - https://docs.chocolatey.org/en-us/features/paid/package-synchronization #### - Package Reducer - https://docs.chocolatey.org/en-us/features/paid/package-reducer #### - Package Audit - https://docs.chocolatey.org/en-us/features/paid/package-audit #### - Package Throttle - https://docs.chocolatey.org/en-us/features/paid/package-throttle #### - CDN Cache Access - https://docs.chocolatey.org/en-us/features/paid/private-cdn #### - Branding - https://docs.chocolatey.org/en-us/features/paid/branding #### - Self-Service Anywhere (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/self-service-anywhere #### - Chocolatey Central Management (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/chocolatey-central-management #### - Other - https://docs.chocolatey.org/en-us/features/paid/ ### d. Ensure Self-Service Anywhere ### #### If you have desktop clients where users are not administrators, you may #### to take advantage of deploying and configuring Self-Service anywhere chocolatey_feature 'showNonElevatedWarnings' do action :disable end chocolatey_feature 'useBackgroundService' do action :enable end chocolatey_feature 'useBackgroundServiceWithNonAdministratorsOnly' do action :enable end chocolatey_feature 'allowBackgroundServiceUninstallsFromUserInstallsOnly' do action :enable end chocolatey_config 'backgroundServiceAllowedCommands' do value 'install,upgrade,uninstall' end ### e. Ensure Chocolatey Central Management ### #### If you want to manage and report on endpoints, you can set up and configure ### Central Management. There are multiple portions to manage, so you'll see ### a section on agents here along with notes on how to configure the server ### side components. chocolatey_package 'chocolatey-agent' do action install source "#{NugetRepositoryUrl}" # user "#{NugetRepositoryUsername}" # password "#{NugetRepositoryPassword}" only_if { ChocolateyCentralManagementUrl != nil } end chocolatey_config 'CentralManagementServiceUrl' do value "#{ChocolateyCentralManagementUrl}" only_if { ChocolateyCentralManagementUrl != nil } end chocolatey_config 'centralManagementClientCommunicationSaltAdditivePassword' do value "#{ChocolateyCentralManagementClientSalt}" only_if { ChocolateyCentralManagementClientSalt != nil } end chocolatey_config 'centralManagementServiceCommunicationSaltAdditivePassword' do value "#{ChocolateyCentralManagementServiceSalt}" only_if { ChocolateyCentralManagementServiceSalt != nil } end chocolatey_feature 'useChocolateyCentralManagement' do action :enable only_if { ChocolateyCentralManagementUrl != nil } end chocolatey_feature 'useChocolateyCentralManagementDeployments' do action :enable only_if { ChocolateyCentralManagementUrl != nil } end Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco . If Applicable - Chocolatey Configuration/Installation #requires -Modules cChoco ## 1. REQUIREMENTS ## ### Here are the requirements necessary to ensure this is successful. ### a. Internal/Private Cloud Repository Set Up ### #### You'll need an internal/private cloud repository you can use. These are #### generally really quick to set up and there are quite a few options. #### Chocolatey Software recommends Nexus, Artifactory Pro, or ProGet as they #### are repository servers and will give you the ability to manage multiple #### repositories and types from one server installation. ### b. Download Chocolatey Package and Put on Internal Repository ### #### You need to have downloaded the Chocolatey package as well. #### Please see https://chocolatey.org/install#organization ### c. Other Requirements ### #### i. Requires chocolatey\cChoco DSC module to be installed on the machine compiling the DSC manifest #### NOTE: This will need to be installed before running the DSC portion of this script if (-not (Get-Module cChoco -ListAvailable)) { $null = Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force if (($PSGallery = Get-PSRepository -Name PSGallery).InstallationPolicy -ne "Trusted") { Set-PSRepository -Name PSGallery -InstallationPolicy Trusted } Install-Module -Name cChoco if ($PSGallery.InstallationPolicy -ne "Trusted") { Set-PSRepository -Name PSGallery -InstallationPolicy $PSGallery.InstallationPolicy } } #### ii. Requires a hosted copy of the install.ps1 script ##### This should be available to download without authentication. ##### The original script can be found here: https://community.chocolatey.org/install.ps1 Configuration ChocolateyConfig { ## 2. TOP LEVEL VARIABLES ## param( ### a. Your internal repository url (the main one). ### #### Should be similar to what you see when you browse #### to https://community.chocolatey.org/api/v2/ $NugetRepositoryUrl = "INTERNAL REPO URL", ### b. Chocolatey nupkg download url ### #### This url should result in an immediate download when you navigate to it in #### a web browser $ChocolateyNupkgUrl = "INTERNAL REPO URL/package/chocolatey.2.6.0.nupkg", ### c. Internal Repository Credential ### #### If required, add the repository access credential here # $NugetRepositoryCredential = [PSCredential]::new( # "username", # ("password" | ConvertTo-SecureString -AsPlainText -Force) # ), ### d. Install.ps1 URL #### The path to the hosted install script: $ChocolateyInstallPs1Url = "https://community.chocolatey.org/install.ps1" ### e. Chocolatey Central Management (CCM) ### #### If using CCM to manage Chocolatey, add the following: #### i. Endpoint URL for CCM # $ChocolateyCentralManagementUrl = "https://chocolatey-central-management:24020/ChocolateyManagementService", #### ii. If using a Client Salt, add it here # $ChocolateyCentralManagementClientSalt = "clientsalt", #### iii. If using a Service Salt, add it here # $ChocolateyCentralManagementServiceSalt = "servicesalt" ) Import-DscResource -ModuleName PSDesiredStateConfiguration Import-DscResource -ModuleName cChoco Node 'localhost' { ## 3. ENSURE CHOCOLATEY IS INSTALLED ## ### Ensure Chocolatey is installed from your internal repository Environment chocoDownloadUrl { Name = "chocolateyDownloadUrl" Value = $ChocolateyNupkgUrl } cChocoInstaller installChocolatey { DependsOn = "[Environment]chocoDownloadUrl" InstallDir = Join-Path $env:ProgramData "chocolatey" ChocoInstallScriptUrl = $ChocolateyInstallPs1Url } ## 4. CONFIGURE CHOCOLATEY BASELINE ## ### a. FIPS Feature ### #### If you need FIPS compliance - make this the first thing you configure #### before you do any additional configuration or package installations # cChocoFeature featureFipsCompliance { # FeatureName = "useFipsCompliantChecksums" # } ### b. Apply Recommended Configuration ### #### Move cache location so Chocolatey is very deterministic about #### cleaning up temporary data and the location is secured to admins cChocoConfig cacheLocation { DependsOn = "[cChocoInstaller]installChocolatey" ConfigName = "cacheLocation" Value = "C:\ProgramData\chocolatey\cache" } #### Increase timeout to at least 4 hours cChocoConfig commandExecutionTimeoutSeconds { DependsOn = "[cChocoInstaller]installChocolatey" ConfigName = "commandExecutionTimeoutSeconds" Value = 14400 } #### Turn off download progress when running choco through integrations cChocoFeature showDownloadProgress { DependsOn = "[cChocoInstaller]installChocolatey" FeatureName = "showDownloadProgress" Ensure = "Absent" } ### c. Sources ### #### Remove the default community package repository source cChocoSource removeCommunityRepository { DependsOn = "[cChocoInstaller]installChocolatey" Name = "chocolatey" Ensure = "Absent" } #### Add internal default sources #### You could have multiple sources here, so we will provide an example #### of one using the remote repo variable here. #### NOTE: This EXAMPLE may require changes cChocoSource addInternalSource { DependsOn = "[cChocoInstaller]installChocolatey" Name = "ChocolateyInternal" Source = $NugetRepositoryUrl Credentials = $NugetRepositoryCredential Priority = 1 } ### b. Keep Chocolatey Up To Date ### #### Keep chocolatey up to date based on your internal source #### You control the upgrades based on when you push an updated version #### to your internal repository. #### Note the source here is to the OData feed, similar to what you see #### when you browse to https://community.chocolatey.org/api/v2/ cChocoPackageInstaller updateChocolatey { DependsOn = "[cChocoSource]addInternalSource", "[cChocoSource]removeCommunityRepository" Name = "chocolatey" AutoUpgrade = $true } ## 5. ENSURE CHOCOLATEY FOR BUSINESS ## ### If you don't have Chocolatey for Business (C4B), you'll want to remove from here down. ### a. Ensure The License File Is Installed ### #### Create a license package using script from https://docs.chocolatey.org/en-us/how-tos/setup-offline-installation#exercise-4-create-a-package-for-the-license cChocoPackageInstaller chocolateyLicense { DependsOn = "[cChocoPackageInstaller]updateChocolatey" Name = "chocolatey-license" } ### b. Disable The Licensed Source ### #### The licensed source cannot be removed, so it must be disabled. #### This must occur after the license has been set by the license package. Script disableLicensedSource { DependsOn = "[cChocoPackageInstaller]chocolateyLicense" GetScript = { $Source = choco source list --limitoutput | ` ConvertFrom-Csv -Delimiter '|' -Header Name, Source, Disabled | ` Where-Object Name -eq "chocolatey.licensed" return @{ Result = if ($Source) { [bool]::Parse($Source.Disabled) } else { Write-Warning "Source 'chocolatey.licensed' was not present." $true # Source does not need disabling } } } SetScript = { $null = choco source disable --name "chocolatey.licensed" } TestScript = { $State = [ScriptBlock]::Create($GetScript).Invoke() return $State.Result } } ### c. Ensure Chocolatey Licensed Extension ### #### You will have downloaded the licensed extension to your internal repository #### as you have disabled the licensed repository in step 5b. #### Ensure the chocolatey.extension package (aka Chocolatey Licensed Extension) cChocoPackageInstaller chocolateyLicensedExtension { DependsOn = "[Script]disableLicensedSource" Name = "chocolatey.extension" } #### The Chocolatey Licensed Extension unlocks all of the following, which also have configuration/feature items available with them. You may want to visit the feature pages to see what you might want to also enable: #### - Package Builder - https://docs.chocolatey.org/en-us/features/paid/package-builder #### - Package Internalizer - https://docs.chocolatey.org/en-us/features/paid/package-internalizer #### - Package Synchronization (3 components) - https://docs.chocolatey.org/en-us/features/paid/package-synchronization #### - Package Reducer - https://docs.chocolatey.org/en-us/features/paid/package-reducer #### - Package Audit - https://docs.chocolatey.org/en-us/features/paid/package-audit #### - Package Throttle - https://docs.chocolatey.org/en-us/features/paid/package-throttle #### - CDN Cache Access - https://docs.chocolatey.org/en-us/features/paid/private-cdn #### - Branding - https://docs.chocolatey.org/en-us/features/paid/branding #### - Self-Service Anywhere (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/self-service-anywhere #### - Chocolatey Central Management (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/chocolatey-central-management #### - Other - https://docs.chocolatey.org/en-us/features/paid/ ### d. Ensure Self-Service Anywhere ### #### If you have desktop clients where users are not administrators, you may #### to take advantage of deploying and configuring Self-Service anywhere cChocoFeature hideElevatedWarnings { DependsOn = "[cChocoPackageInstaller]chocolateyLicensedExtension" FeatureName = "showNonElevatedWarnings" Ensure = "Absent" } cChocoFeature useBackgroundService { DependsOn = "[cChocoPackageInstaller]chocolateyLicensedExtension" FeatureName = "useBackgroundService" Ensure = "Present" } cChocoFeature useBackgroundServiceWithNonAdmins { DependsOn = "[cChocoPackageInstaller]chocolateyLicensedExtension" FeatureName = "useBackgroundServiceWithNonAdministratorsOnly" Ensure = "Present" } cChocoFeature useBackgroundServiceUninstallsForUserInstalls { DependsOn = "[cChocoPackageInstaller]chocolateyLicensedExtension" FeatureName = "allowBackgroundServiceUninstallsFromUserInstallsOnly" Ensure = "Present" } cChocoConfig allowedBackgroundServiceCommands { DependsOn = "[cChocoFeature]useBackgroundService" ConfigName = "backgroundServiceAllowedCommands" Value = "install,upgrade,uninstall" } ### e. Ensure Chocolatey Central Management ### #### If you want to manage and report on endpoints, you can set up and configure ### Central Management. There are multiple portions to manage, so you'll see ### a section on agents here along with notes on how to configure the server ### side components. if ($ChocolateyCentralManagementUrl) { cChocoPackageInstaller chocolateyAgent { DependsOn = "[cChocoPackageInstaller]chocolateyLicensedExtension" Name = "chocolatey-agent" } cChocoConfig centralManagementServiceUrl { DependsOn = "[cChocoPackageInstaller]chocolateyAgent" ConfigName = "CentralManagementServiceUrl" Value = $ChocolateyCentralManagementUrl } if ($ChocolateyCentralManagementClientSalt) { cChocoConfig centralManagementClientSalt { DependsOn = "[cChocoPackageInstaller]chocolateyAgent" ConfigName = "centralManagementClientCommunicationSaltAdditivePassword" Value = $ChocolateyCentralManagementClientSalt } } if ($ChocolateyCentralManagementServiceSalt) { cChocoConfig centralManagementServiceSalt { DependsOn = "[cChocoPackageInstaller]chocolateyAgent" ConfigName = "centralManagementServiceCommunicationSaltAdditivePassword" Value = $ChocolateyCentralManagementServiceSalt } } cChocoFeature useCentralManagement { DependsOn = "[cChocoPackageInstaller]chocolateyAgent" FeatureName = "useChocolateyCentralManagement" Ensure = "Present" } cChocoFeature useCentralManagementDeployments { DependsOn = "[cChocoPackageInstaller]chocolateyAgent" FeatureName = "useChocolateyCentralManagementDeployments" Ensure = "Present" } } } } # If working this into an existing configuration with a good method for $ConfigData = @{ AllNodes = @( @{ NodeName = "localhost" PSDscAllowPlainTextPassword = $true } ) } try { Push-Location $env:Temp $Config = ChocolateyConfig -ConfigurationData $ConfigData Start-DscConfiguration -Path $Config.PSParentPath -Wait -Verbose -Force } finally { Pop-Location } Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey . If Applicable - Chocolatey Configuration/Installation ## 1. REQUIREMENTS ## ### Here are the requirements necessary to ensure this is successful. ### a. Internal/Private Cloud Repository Set Up ### #### You'll need an internal/private cloud repository you can use. These are #### generally really quick to set up and there are quite a few options. #### Chocolatey Software recommends Nexus, Artifactory Pro, or ProGet as they #### are repository servers and will give you the ability to manage multiple #### repositories and types from one server installation. ### b. Download Chocolatey Package and Put on Internal Repository ### #### You need to have downloaded the Chocolatey package as well. #### Please see https://chocolatey.org/install#organization ### c. Other Requirements ### #### i. Requires puppetlabs/chocolatey module #### See https://forge.puppet.com/puppetlabs/chocolatey ## 2. TOP LEVEL VARIABLES ## ### a. Your internal repository url (the main one). ### #### Should be similar to what you see when you browse #### to https://community.chocolatey.org/api/v2/ $_repository_url = 'INTERNAL REPO URL' ### b. Chocolatey nupkg download url ### #### This url should result in an immediate download when you navigate to it in #### a web browser $_choco_download_url = 'INTERNAL REPO URL/package/chocolatey.2.6.0.nupkg' ### c. Chocolatey Central Management (CCM) ### #### If using CCM to manage Chocolatey, add the following: #### i. Endpoint URL for CCM # $_chocolatey_central_management_url = 'https://chocolatey-central-management:24020/ChocolateyManagementService' #### ii. If using a Client Salt, add it here # $_chocolatey_central_management_client_salt = "clientsalt" #### iii. If using a Service Salt, add it here # $_chocolatey_central_management_service_salt = 'servicesalt' ## 3. ENSURE CHOCOLATEY IS INSTALLED ## ### Ensure Chocolatey is installed from your internal repository ### Note: `chocolatey_download_url is completely different than normal ### source locations. This is directly to the bare download url for the ### chocolatey.nupkg, similar to what you see when you browse to ### https://community.chocolatey.org/api/v2/package/chocolatey class {'chocolatey': chocolatey_download_url => $_choco_download_url, use_7zip => false, } ## 4. CONFIGURE CHOCOLATEY BASELINE ## ### a. FIPS Feature ### #### If you need FIPS compliance - make this the first thing you configure #### before you do any additional configuration or package installations #chocolateyfeature {'useFipsCompliantChecksums': # ensure => enabled, #} ### b. Apply Recommended Configuration ### #### Move cache location so Chocolatey is very deterministic about #### cleaning up temporary data and the location is secured to admins chocolateyconfig {'cacheLocation': value => 'C:\ProgramData\chocolatey\cache', } #### Increase timeout to at least 4 hours chocolateyconfig {'commandExecutionTimeoutSeconds': value => '14400', } #### Turn off download progress when running choco through integrations chocolateyfeature {'showDownloadProgress': ensure => disabled, } ### c. Sources ### #### Remove the default community package repository source chocolateysource {'chocolatey': ensure => absent, location => 'https://community.chocolatey.org/api/v2/', } #### Add internal default sources #### You could have multiple sources here, so we will provide an example #### of one using the remote repo variable here #### NOTE: This EXAMPLE requires changes chocolateysource {'internal_chocolatey': ensure => present, location => $_repository_url, priority => 1, username => 'optional', password => 'optional,not ensured', bypass_proxy => true, admin_only => false, allow_self_service => false, } ### b. Keep Chocolatey Up To Date ### #### Keep chocolatey up to date based on your internal source #### You control the upgrades based on when you push an updated version #### to your internal repository. #### Note the source here is to the OData feed, similar to what you see #### when you browse to https://community.chocolatey.org/api/v2/ package {'chocolatey': ensure => latest, provider => chocolatey, source => $_repository_url, } ## 5. ENSURE CHOCOLATEY FOR BUSINESS ## ### If you don't have Chocolatey for Business (C4B), you'll want to remove from here down. ### a. Ensure The License File Is Installed ### #### Create a license package using script from https://docs.chocolatey.org/en-us/guides/organizations/organizational-deployment-guide#exercise-4-create-a-package-for-the-license # TODO: Add resource for installing/ensuring the chocolatey-license package package {'chocolatey-license': ensure => latest, provider => chocolatey, source => $_repository_url, } ### b. Disable The Licensed Source ### #### The licensed source cannot be removed, so it must be disabled. #### This must occur after the license has been set by the license package. ## Disabled sources still need all other attributes until ## https://tickets.puppetlabs.com/browse/MODULES-4449 is resolved. ## Password is necessary with user, but not ensurable, so it should not ## matter what it is set to here. If you ever do get into trouble here, ## the password is your license GUID. chocolateysource {'chocolatey.licensed': ensure => disabled, priority => '10', user => 'customer', password => '1234', require => Package['chocolatey-license'], } ### c. Ensure Chocolatey Licensed Extension ### #### You will have downloaded the licensed extension to your internal repository #### as you have disabled the licensed repository in step 5b. #### Ensure the chocolatey.extension package (aka Chocolatey Licensed Extension) package {'chocolatey.extension': ensure => latest, provider => chocolatey, source => $_repository_url, require => Package['chocolatey-license'], } #### The Chocolatey Licensed Extension unlocks all of the following, which also have configuration/feature items available with them. You may want to visit the feature pages to see what you might want to also enable: #### - Package Builder - https://docs.chocolatey.org/en-us/features/paid/package-builder #### - Package Internalizer - https://docs.chocolatey.org/en-us/features/paid/package-internalizer #### - Package Synchronization (3 components) - https://docs.chocolatey.org/en-us/features/paid/package-synchronization #### - Package Reducer - https://docs.chocolatey.org/en-us/features/paid/package-reducer #### - Package Audit - https://docs.chocolatey.org/en-us/features/paid/package-audit #### - Package Throttle - https://docs.chocolatey.org/en-us/features/paid/package-throttle #### - CDN Cache Access - https://docs.chocolatey.org/en-us/features/paid/private-cdn #### - Branding - https://docs.chocolatey.org/en-us/features/paid/branding #### - Self-Service Anywhere (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/self-service-anywhere #### - Chocolatey Central Management (more components will need to be installed and additional configuration will need to be set) - https://docs.chocolatey.org/en-us/features/paid/chocolatey-central-management #### - Other - https://docs.chocolatey.org/en-us/features/paid/ ### d. Ensure Self-Service Anywhere ### #### If you have desktop clients where users are not administrators, you may #### to take advantage of deploying and configuring Self-Service anywhere chocolateyfeature {'showNonElevatedWarnings': ensure => disabled, } chocolateyfeature {'useBackgroundService': ensure => enabled, } chocolateyfeature {'useBackgroundServiceWithNonAdministratorsOnly': ensure => enabled, } chocolateyfeature {'allowBackgroundServiceUninstallsFromUserInstallsOnly': ensure => enabled, } chocolateyconfig {'backgroundServiceAllowedCommands': value => 'install,upgrade,uninstall', } ### e. Ensure Chocolatey Central Management ### #### If you want to manage and report on endpoints, you can set up and configure ### Central Management. There are multiple portions to manage, so you'll see ### a section on agents here along with notes on how to configure the server ### side components. if $_chocolatey_central_management_url { package {'chocolatey-agent': ensure => latest, provider => chocolatey, source => $_repository_url, require => Package['chocolatey-license'], } chocolateyconfig {'CentralManagementServiceUrl': value => $_chocolatey_central_management_url, } if $_chocolatey_central_management_client_salt { chocolateyconfig {'centralManagementClientCommunicationSaltAdditivePassword': value => $_chocolatey_central_management_client_salt, } } if $_chocolatey_central_management_service_salt { chocolateyconfig {'centralManagementClientCommunicationSaltAdditivePassword': value => $_chocolatey_central_management_client_salt, } } chocolateyfeature {'useChocolateyCentralManagement': ensure => enabled, require => Package['chocolatey-agent'], } chocolateyfeature {'useChocolateyCentralManagementDeployments': ensure => enabled, require => Package['chocolatey-agent'], } } Previous Next Need Help? View our docs or file an issue . There is already a version of this package in your Script Builder Current Version New Version Delete and Add New Version Cancel Downloads: 17,163 Downloads of v 1.63.1: 45 Last Update: 06 Jan 2026 Package Maintainer(s): eboguslavsky Software Author(s): sui Tags: #sui Software Specific: Software Site Software Source Software License Software Issues Package Specific: Package Source Package outdated? Package broken? Contact Maintainers Contact Site Admins Software Vendor? Report Abuse Download Main Sui Binary 1 2 3 1.63.1 | Updated: 06 Jan 2026 Show Additional Links Software Specific: Software Site Software Source Software License Software Issues Package Specific: Package Source Package outdated? Package broken? Contact Maintainers Contact Site Admins Software Vendor? Report Abuse Download Downloads: 17,163 Downloads of v 1.63.1: 45 Maintainer(s): eboguslavsky Software Author(s): sui Tags: sui
2026-01-13T08:48:39
https://docs.suprsend.com/reference/cli-event-push
Push Events - SuprSend, Notification infrastructure for Product teams Skip to main content SuprSend, Notification infrastructure for Product teams home page Search... ⌘ K Community Trust Center Platform Status Postman Collection Versioning Versioning and Support Policy CLI Changelog Getting Started with CLI CLI Overview BETA Quickstart Installation Authentication Enable Autocompletion Global Flags Profile Commands and Flags Add Profile Use Profile List Profile Modify Profile Remove Profile Sync Sync Assets Workflow Commands and Flags List Workflows Pull Workflows Push Workflows Enable Workflow Disable Workflow Schema Commands and Flags List Schemas Pull Schemas Push Schemas Commit Schema Generate Types Event Commands and Flags List Events Pull Events Push Events Preference Category Commands and Flags List Categories Pull Categories Push Categories Commit Categories List Category Translations Pull Category Translations Push Category Translations Translation Commands and Flags List Translations Pull Translations Push Translations Commit Translations Contact Us Get Started SuprSend, Notification infrastructure for Product teams home page Search... ⌘ K Ask AI Contact Us Get Started Get Started Search... Navigation Event Push Events Documentation API Reference Management API CLI Reference Developer Resources Changelog Documentation API Reference Management API CLI Reference Developer Resources Changelog Event Push Events OpenAI Open in ChatGPT Push events from local directory to SuprSend OpenAI Open in ChatGPT ⚠️ Important: Always sync Schema changes before pushing Events. If the schema referenced in an event is not available in the target workspace, it will result in validation errors during sync. ​ Syntax Copy Ask AI suprsend event push [flags] ​ Flags Flag Description Default -h, --help Show help for the command – -d, --dir string Directory to push events from suprsend/event -w, --workspace string Workspace to push events to staging ​ Example Copy Ask AI # Push events from default directory suprsend event push # Push events from custom directory suprsend event push --dir events # Push events to production workspace suprsend event push --workspace production Was this page helpful? Yes No Suggest edits Raise issue Previous Commands and Flags Reference for managing preference categories via SuprSend CLI. Next ⌘ I x github linkedin youtube Powered by On this page Syntax Flags Example
2026-01-13T08:48:39
http://www.x.com
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://docs.python.org/it/3/
3.14.2 Documentation Theme Auto Light Dark Download Scarica questi documenti Documenti per versione Python 3.15 (in development) Python 3.14 (stable) Python 3.13 (stable) Python 3.12 (security-fixes) Python 3.11 (security-fixes) Python 3.10 (security-fixes) Python 3.9 (EOL) Python 3.8 (EOL) Python 3.7 (EOL) Python 3.6 (EOL) Python 3.5 (EOL) Python 3.4 (EOL) Python 3.3 (EOL) Python 3.2 (EOL) Python 3.1 (EOL) Python 3.0 (EOL) Python 2.7 (EOL) Python 2.6 (EOL) Tutte le versioni Altre risorse Indice PEP Guida per principianti Elenco di Libri Interventi audio/video Guida per sviluppatori Python Navigazione indice moduli | Python » 3.14.2 Documentation » | Theme Auto Light Dark | Documentazione Python 3.14.2 Benvenuti! Questa è la documentazione di Python 3.14.2. Sezioni della documentazione: Cosa c'è di nuovo in Python 3.14? o tutti i documenti "Cosa c'è di nuovo" dalla versione 2.0 di Python Tutorial Inizia da qui: un tour della sintassi e delle funzionalità di Python Riferimenti alla libreria Libreria standard e funzioni integrate Guida al Linguaggio Sintassi ed elementi del linguaggio Installazione e utilizzo di Python Come installare, configurare e utilizzare Python HOWTO Python Manuali di argomenti approfonditi Installazione dei moduli Python PyPI.org e moduli di terze parti Distribuzione dei moduli Python Pubblicazione di moduli per l'uso da parte di altre persone Estendere ed integrare Tutorial per programmatori C/C++ L'API C di Python Riferimento all'API C Le FAQ Domande frequenti (con risposte!) Deprecations Deprecated functionality Indici, glossario e ricerca: Indice globale dei moduli Tutti i moduli e le librerie Indice generale Tutte le funzioni, le classi, i termini Glossario Spiegazione dei termini Pagina di Ricerca Cerca in questa documentazione Tabella dei contenuti completa Elenca tutte le sezioni e sottosezioni Informazioni sul progetto: Segnalazione di problemi Contributing to docs Scarica questa documentazione Storia e licenza di Python Copyright Informazioni sulla documentazione Download Scarica questi documenti Documenti per versione Python 3.15 (in development) Python 3.14 (stable) Python 3.13 (stable) Python 3.12 (security-fixes) Python 3.11 (security-fixes) Python 3.10 (security-fixes) Python 3.9 (EOL) Python 3.8 (EOL) Python 3.7 (EOL) Python 3.6 (EOL) Python 3.5 (EOL) Python 3.4 (EOL) Python 3.3 (EOL) Python 3.2 (EOL) Python 3.1 (EOL) Python 3.0 (EOL) Python 2.7 (EOL) Python 2.6 (EOL) Tutte le versioni Altre risorse Indice PEP Guida per principianti Elenco di Libri Interventi audio/video Guida per sviluppatori Python « Navigazione indice moduli | Python » 3.14.2 Documentation » | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Ultimo aggiornamento gen 13, 2026 (06:41 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:39
https://docs.suprsend.com/reference/cli-intro#benefits-of-using-suprsend-cli
CLI Overview - SuprSend, Notification infrastructure for Product teams Skip to main content SuprSend, Notification infrastructure for Product teams home page Search... ⌘ K Community Trust Center Platform Status Postman Collection Versioning Versioning and Support Policy CLI Changelog Getting Started with CLI CLI Overview BETA Quickstart Installation Authentication Enable Autocompletion Global Flags Profile Commands and Flags Add Profile Use Profile List Profile Modify Profile Remove Profile Sync Sync Assets Workflow Commands and Flags List Workflows Pull Workflows Push Workflows Enable Workflow Disable Workflow Schema Commands and Flags List Schemas Pull Schemas Push Schemas Commit Schema Generate Types Event Commands and Flags List Events Pull Events Push Events Preference Category Commands and Flags List Categories Pull Categories Push Categories Commit Categories List Category Translations Pull Category Translations Push Category Translations Translation Commands and Flags List Translations Pull Translations Push Translations Commit Translations Contact Us Get Started SuprSend, Notification infrastructure for Product teams home page Search... ⌘ K Ask AI Contact Us Get Started Get Started Search... Navigation Getting Started with CLI CLI Overview Documentation API Reference Management API CLI Reference Developer Resources Changelog Documentation API Reference Management API CLI Reference Developer Resources Changelog Getting Started with CLI CLI Overview OpenAI Open in ChatGPT Introduction to SuprSend CLI for managing notification infrastructure from the command line. OpenAI Open in ChatGPT Beta Feature - The SuprSend CLI is under active development. Commands and flags may change, and new functionality will be added over time. If you encounter issues or need additional commands, please open an issue on GitHub or contribute directly — the project is open source. The SuprSend CLI is a powerful command-line interface that enables developers to setup CI/CD pipeline for notification changes and manage, automate, and sync SuprSend assets across multiple workspaces. With a few commands, you can handle workflows, schemas, events, and even integrate directly with AI agents. ​ Benefits of using SuprSend CLI Developers often prefer CLI as it offers speed, automation, and flexibility . Instead of writing boilerplate code or clicking through multiple screens on UI, you can run a single command or script to perform repeatable actions—ideal for modern DevOps and automation. By using the CLI, you can: Automate with CI/CD Deployment – Release notification changes through feature or bugfix branches, just like any other piece of code: version it, test it, and deploy it. Work with assets locally – Create, edit, and commit workflows, schemas, and translation files locally. Version Control Changes – Pull all assets locally and track them in Git for maintaining release history. Enforce Approval gates for production releases - Setup strict checks that all changes on production go through approval process so that nothing goes live without check. ​ What You Can Do with SuprSend CLI Manage Assets – List, pull, push, and commit notification workflows, schemas, preference categories, and events. Sync Across Workspaces – Transfer assets between workspaces for multi-environment setups. AI Agent Integration – Start an MCP server from the CLI and connect SuprSend with AI agents or developer copilots. ​ Available Commands ​ Profile Manage objects : create, update, list, and promote across workspaces. Also, see Object Management APIs . Command Description profile list List profiles in a workspace profile add Add a new profile profile modify Modify an existing profile profile remove Remove a profile profile use Switch to a specific profile ​ Workflow Manage workflows : create, update, enable, disable, and promote across workspaces. Also, see Workflow Management APIs . Command Description workflow list List workflows in a workspace workflow push Push local workflows to SuprSend workflow pull Pull workflows from SuprSend to local files workflow enable Enable a workflow workflow disable Disable a workflow ​ Schema Manage schemas : create, update, commit, reset, and promote across workspaces. Also, see Schema Management APIs . Command Description schema list List schemas in a workspace schema push Push local schemas to SuprSend schema pull Pull schemas from SuprSend to local files schema commit Commit a schema to make it live generate-types Generate type definitions from JSON schemas ​ Event Manage events : create, update, list, and promote across workspaces. Also, see Event Management APIs . Command Description event list List events in a workspace event push Push local events to SuprSend event pull Pull events from SuprSend to local files ​ Category Manage categories : create, update, list, and promote across workspaces. Also, see Category Management APIs . Command Description category list List categories in a workspace category pull Pull categories from SuprSend to local files category push Push local categories to SuprSend category commit Commit categories to make them live ​ Sync Manage sync : sync assets between workspaces. Command Description sync Sync assets between workspaces Was this page helpful? Yes No Suggest edits Raise issue Previous Quickstart Get up and running with SuprSend CLI in minutes. Complete setup, authentication, and start using right away. Next ⌘ I x github linkedin youtube Powered by On this page Benefits of using SuprSend CLI What You Can Do with SuprSend CLI Available Commands Profile Workflow Schema Event Category Sync
2026-01-13T08:48:39
https://twitter.com/sawaratsuki1004
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://dev.to/embernoglow/prototype-of-voxel-terrain-generation-in-godot-4-3op5
📜 Prototype of Voxel Terrain Generation in Godot 4 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse EmberNoGlow Posted on Nov 20, 2025 📜 Prototype of Voxel Terrain Generation in Godot 4 # godot # gamedev # tool # opensource Hey Dev Community! I’m excited to share a little prototype I’ve been tinkering with: a Procedural VOXEL Terrain Generator for Godot 4. If you’re dreaming of creating blocky worlds (think Minecraft-style landscapes), this tool might just be the quick start you need. What Is It? This generator produces procedural voxel terrain using Godot 4’s MeshInstance3D and 3D noise algorithms. It’s designed to be: Simple: Minimal setup, easy to understand and modify. Lightweight : No heavy dependencies - just a single script and basic Godot nodes. Flexible : Tweak parameters to shape your world however you like. 📜 License and Compatibility This tool is developed for Godot 4.4. It is in the public domain, so feel free to use, adapt, or build upon it for your games or experiments. 👇 Get Involved and Try It Out! → Source code on GitHub : https://github.com/EmberNoGlow/Godot-Procedural-VOXEL-Terrain → Download via Godot Asset Library : https://godotengine.org/asset-library/asset/4443 I would love to hear your feedback, suggestions, and bug reports. If you like the project, please consider starring it on GitHub! ⭐ Thanks for reading! I hope this generator helps you in crafting your game worlds. Top comments (0) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse EmberNoGlow Follow Just a dude, a mid-level on Godot / Python developer and Rust beginner Joined Nov 18, 2025 More from EmberNoGlow From Zero to SDF Editor Beta: How I Used AI to Force My Dream Project Out of the Prototype Stage. What I learned? # python # sideprojects # opensource # discuss Marching Cubes algorithm written in Rust # rust # algorithms # opensource # programming Raymarching Mountains for Godot - addon that solves the problem of open worlds # godot # shader # tool # gamedev 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://dev.to/zeeshanali0704/polyfil-usereducer-4lf9
Polyfil - useReducer - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse ZeeshanAli-0704 Posted on Jan 11 Polyfil - useReducer # react # interview # tutorial # javascript Polyfill series (8 Part Series) 1 Polyfill - Promise.all 2 Polyfills for .forEach(), .map(), .filter(), .reduce() in JavaScript ... 4 more parts... 3 Polyfill - Promise 4 Polyfill - fetch 5 Polyfill - call, apply & bind 6 Polyfill - useState (React) 7 Polyfill - useEffect (React) 8 Polyfil - useReducer Below, I'll provide a simple, executable useReducer polyfill with detailed comments, an explanation, expected output, and key interview talking points, mirroring the structure and simplicity of the useState example. Simple Working JavaScript Code for useReducer Polyfill // Simple useReducer polyfill for interview explanation function createUseReducer () { // Array to store state values across multiple "renders" of the component. // This simulates React's internal state storage for a component. let stateStore = []; // Variable to track the current index for hook calls during a single render. // This ensures each useReducer call maps to the same state slot every render. let currentIndex = 0 ; // The useReducer function, mimicking React's hook for managing complex state. function useReducer ( reducer , initialState ) { // Capture the current index for this specific useReducer call. // This index determines where in stateStore this state value lives. const index = currentIndex ; // Increment currentIndex for the next useReducer/useState call in this render. // e.g., First call gets index 0, second gets index 1, etc. currentIndex ++ ; // Initialize the state value at this index if it hasn't been set yet. // This happens during the first render or if state was cleared. if ( stateStore [ index ] === undefined ) { stateStore [ index ] = initialState ; } // Get the current state value from stateStore at this index. // This is what the component will use during this render. const currentState = stateStore [ index ]; // Define the dispatch function to update state using the reducer. // This mimics React's dispatch behavior to update state based on actions. const dispatch = function ( action ) { // Call the reducer with current state and action to get new state. const newState = reducer ( stateStore [ index ], action ); stateStore [ index ] = newState ; console . log ( `State updated to: ${ JSON . stringify ( newState )} at index ${ index } with action: ${ JSON . stringify ( action )} ` ); // In real React, this would trigger a re-render automatically. // Here, we just log the update for demonstration. }; // Return an array with the current state value and the dispatch function. // This matches React's useReducer API: [state, dispatch]. return [ currentState , dispatch ]; } // Function to reset the index to 0 after a render simulation. // This simulates the end of a render cycle, preparing for the next render. // In real React, hook indices reset per render to maintain call order. function resetIndex () { currentIndex = 0 ; console . log ( ' Resetting index for next render ' ); } // Return an object with useReducer and resetIndex functions. // This allows the component to use the hook and reset the index manually. return { useReducer , resetIndex }; } // Create an instance of useReducer by calling createUseReducer(). // This sets up a unique state store for this simulation. const { useReducer , resetIndex } = createUseReducer (); // Reducer function to manage state updates based on actions. // This is a user-defined function passed to useReducer, just like in React. function counterReducer ( state , action ) { switch ( action . type ) { case ' INCREMENT ' : return { ... state , count : state . count + 1 }; case ' DECREMENT ' : return { ... state , count : state . count - 1 }; case ' SET_NAME ' : return { ... state , name : action . payload }; default : return state ; } } // Simulated functional component to demonstrate useReducer usage. // In real React, this would be a component that renders UI. function MyComponent () { // Use useReducer to manage a state object with a counter and name. // Pass the reducer function and initial state. // This will map to index 0 in stateStore. const [ state , dispatch ] = useReducer ( counterReducer , { count : 0 , name : " Zeeshan " }); // Log the current state values during this render. // This shows what the component "sees" at this moment. console . log ( ' Current State - Count: ' , state . count , ' Name: ' , state . name ); // Return the dispatch function to allow updates outside render. // In real React, updates might happen via events like button clicks. return { dispatch }; } // Run the simulation to mimic React rendering the component multiple times. console . log ( ' First Call (Initial Render): ' ); // Call MyComponent for the first time, simulating the initial render. // This initializes state values in stateStore. const { dispatch } = MyComponent (); // Reset the index after the render to prepare for the next call. // This ensures the next call to MyComponent starts at index 0 again. resetIndex (); // Update the state using the dispatch function. // This simulates user interaction or some event updating the state. console . log ( ' \n Updating State: ' ); dispatch ({ type : ' INCREMENT ' }); // Updates state.count to 1. dispatch ({ type : ' SET_NAME ' , payload : ' John ' }); // Updates state.name to "John". // Run the component again to simulate a re-render after state updates. // This mimics React re-rendering the component to reflect new state. console . log ( ' \n Second Call (After Update): ' ); MyComponent (); // Reset the index again after this render to keep hook order consistent. resetIndex (); Enter fullscreen mode Exit fullscreen mode How to Execute In a Browser : Open your browser's developer tools (e.g., Chrome DevTools), go to the "Console" tab, copy-paste the code above, and press Enter. You'll see the logs showing the initial state, updates, and updated state. In Node.js : Save this code in a file (e.g., simpleUseReducer.js ) and run it using node simpleUseReducer.js in your terminal. The output will appear in the console. Expected Output When you run this code, you'll see output similar to this: First Call (Initial Render): Current State - Count: 0 Name: Zeeshan Resetting index for next render Updating State: State updated to: {"count":1,"name":"Zeeshan"} at index 0 with action: {"type":"INCREMENT"} State updated to: {"count":1,"name":"John"} at index 0 with action: {"type":"SET_NAME","payload":"John"} Second Call (After Update): Current State - Count: 1 Name: John Resetting index for next render Enter fullscreen mode Exit fullscreen mode Explanation of Code Purpose : This polyfill demonstrates the basic idea of useReducer —managing complex state in a functional component by using a reducer function to update state based on dispatched actions, across "renders." How It Works : stateStore is a simple array that holds state values. Each useReducer call gets a unique index tracked by currentIndex during a render, ensuring consistency across calls. The state is initialized the first time useReducer is called for that index with the provided initialState . dispatch updates the state by calling the reducer function with the current state and an action, storing the new state in stateStore . Calling MyComponent() multiple times simulates re-renders, showing the updated state. Simplification : Unlike real React, there’s no automatic re-rendering or complex hook order edge cases. It’s a basic demonstration of state management with a reducer using an array. Key Interview Talking Points What is useReducer ? : Explain it’s a React hook for managing state in functional components, especially for complex state logic. It uses a reducer function to update state based on actions, similar to Redux. How This Polyfill Works : Walk through the code: State is stored in an array ( stateStore ) with each useReducer call getting its own slot via currentIndex . dispatch updates the state by invoking the reducer with the current state and an action, storing the result. Calling the component again shows the updated state, mimicking a re-render. Why Use useReducer Over useState ? : Mention that useReducer is preferred for complex state updates (e.g., multiple related fields or logic-heavy transitions) as it centralizes update logic in a reducer, making it more predictable and testable. Why Simple? : Note this is a basic version to show the concept. Real React uses a fiber tree and update queue for state management and rendering, which this manual simulation simplifies. State Persistence : Highlight that state isn’t reset between calls to the component, just like in React, where state persists across renders. Limitations : Point out that this lacks React’s automatic re-rendering, batched updates, or strict hook order rules. It’s purely for conceptual understanding. This useReducer polyfill is intentionally minimal, mirroring the simplicity of the useState example, and focuses on the core idea of state management with a reducer for an interview. It’s easy to explain and execute, showing how state is stored and updated via actions. If you’d like to add more detail, combine it with useState , or explore more complex reducer examples, let me know! Polyfill series (8 Part Series) 1 Polyfill - Promise.all 2 Polyfills for .forEach(), .map(), .filter(), .reduce() in JavaScript ... 4 more parts... 3 Polyfill - Promise 4 Polyfill - fetch 5 Polyfill - call, apply & bind 6 Polyfill - useState (React) 7 Polyfill - useEffect (React) 8 Polyfil - useReducer Top comments (0) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse ZeeshanAli-0704 Follow Results-driven Principal Applications Engineer with 9+ years of experience in scalable web app development using React, Angular, Node.js, and KnockoutJS across BFSI, Media, and Healthcare domains. Location INDIA Pronouns he Work Oracle Joined Aug 13, 2022 More from ZeeshanAli-0704 Polyfill - useEffect (React) # javascript # react # tutorial Polyfill - useState (React) # javascript Polyfill - call, apply & bind # javascript # interview 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://dev.to/t/beginners/page/3378
Beginners Page 3378 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Beginners Follow Hide "A journey of a thousand miles begins with a single step." -Chinese Proverb Create Post submission guidelines UPDATED AUGUST 2, 2019 This tag is dedicated to beginners to programming, development, networking, or to a particular language. Everything should be geared towards that! For Questions... Consider using this tag along with #help, if... You are new to a language, or to programming in general, You want an explanation with NO prerequisite knowledge required. You want insight from more experienced developers. Please do not use this tag if you are merely new to a tool, library, or framework. See also, #explainlikeimfive For Articles... Posts should be specifically geared towards true beginners (experience level 0-2 out of 10). Posts should require NO prerequisite knowledge, except perhaps general (language-agnostic) essentials of programming. Posts should NOT merely be for beginners to a tool, library, or framework. If your article does not meet these qualifications, please select a different tag. Promotional Rules Posts should NOT primarily promote an external work. This is what Listings is for. Otherwise accepable posts MAY include a brief (1-2 sentence) plug for another resource at the bottom. Resource lists ARE acceptable if they follow these rules: Include at least 3 distinct authors/creators. Clearly indicate which resources are FREE, which require PII, and which cost money. Do not use personal affiliate links to monetize. Indicate at the top that the article contains promotional links. about #beginners If you're writing for this tag, we recommend you read this article . If you're asking a question, read this article . Older #beginners posts 3375 3376 3377 3378 3379 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://dev.to/t/etiquette
Etiquette - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # etiquette Follow Hide Discussions on proper golf etiquette and pace of play Create Post Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu Favorite Slack Features Neal Gamradt Neal Gamradt Neal Gamradt Follow May 22 '23 Favorite Slack Features # slack # tips # features # etiquette Comments Add Comment 7 min read Manipulating the browser's history in react Esther Itolima Esther Itolima Esther Itolima Follow Mar 5 '23 Manipulating the browser's history in react # discuss # gratitude # etiquette 11  reactions Comments Add Comment 3 min read The power of Remark Wojciech Rithaler Wojciech Rithaler Wojciech Rithaler Follow Feb 27 '23 The power of Remark # help # etiquette 6  reactions Comments 1  comment 9 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://dev.to/eriadura/comment/2k549#main-content
*Matt Eland is a passionate learner, speaker, and author dedicated to explori... - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Discussion on: S27:E8 - Learning AI (Matt Eland) View post Collapse Expand   SAMUEL ADENIJI SAMUEL ADENIJI SAMUEL ADENIJI Follow I am a website developer and a game developer Email samuel.adeniji2012@gmail.com Location Nigeria Education Codingal online class Pronouns Mr Work website developer Joined May 30, 2024 • Dec 5 '24 Dropdown menu Copy link Hide * Matt Eland is a passionate learner, speaker, and author dedicated to exploring and sharing knowledge in the most enthusiastic ways. As a Microsoft MVP in AI, he actively contributes to the tech community through his two blogs, YouTube channel, and by organizing the Central Ohio .NET Developer Group. Currently, Matt is balancing his work on a second book and course while also completing his master's degree. * Like comment: Like comment: 7  likes Like Comment button Reply Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://parenting.forem.com/privacy#b-information-collected-automatically
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://parenting.forem.com/privacy#c-information-collected-from-other-sources
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://parenting.forem.com/privacy#8-supplemental-disclosures-for-california-residents
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://poprey.com/
Poprey - Instagram Followers, Likes & More | From $2.60 Poprey Instagram YouTube InstaMonitor Account Likes Followers Auto-Likes Views Comments Buy Instagram Likes Regular 403 Reviews Premium 509 Reviews 25 Likes For 0.00 200 Likes For 2.60 500 Likes For 5.20 1000 Likes For 9.50 2000 Likes For 14.90 5000 Likes For 29.90 10,000 Likes For 51.90 — 2 0 , 0 0 0 + Likes For 86.90 Benefits Instant Start The fulfillment starts right after the payment. Permanent The result will stay with you forever. Normal Looking The accounts are looking good. Instant/Gradual Delivery You will be able to choose the delivery option while ordering. 0 Reach 0 Reach 0 Impressions 0 Impressions 0 Saves 0 Saves Free Trial 25 Likes 0 Cost Buy Now 0 % Chance to reach explore page Increase to improve chances. Likes Reach 0 Impressions 0 Saves 0 Add feedback Feedback 403 Feedbacks 4.96 Dolcevita Made a purchase just for fun, rapid and fantastic! dav Acquistato un piccolo up-grade per testare il servizio ..... consegna volece e in numero maggiore di quelli acquistati ....ottimo servizio Joynal Nice 👍 ‪Nader Hanafy‬‏ it is so good Deku Service was so good and fast Coner It's incredible, it raised my self-esteem quite well, it made me happy. San_dh_ya_ It’s good Pahan very good and usefully Someone really it's a good apk BELLE Its so helpful. Thanks poprey :) Vigen Nicee i like this website Anonymous It's true, it works very well, I thank my friends who made me discover the site, it's not a scam. duony Muy bueno, actúa muy rápido. noël really good Mr_rekib_07 Good kimki nice hai_tem___21 ❤️❤️❤️ Matheuz Bom funciona mesmo Alice__25 Nice services s_k__dream I’m So Proud 😘 Of You Add feedback Add your review Submit Trust your Instagram to the oldest and most reliable service - Poprey, which will help you build your reputation on social media. Modern business practices evidence that online marketing accounts for more than 90% of all marketing activities. The purpose of active social media engagement goes beyond entertainment because it serves as an indispensable business instrument to grow your brand while contacting your audience and boosting your financial success. Thundering numbers of companies operating in pizza delivery and fashion boutique industries implement funny videos, advertising campaigns to increase followers, likes, views, or other digital tactics to enhance their customer base penetration. Poprey helps you boost your Instagram, TikTok followers, and YouTube subscriptions by delivering real interactions tailored to your needs. Why Should You Buy Instagram Likes? Instagram provides massive growth opportunities for businesses and individual creators alike — whether you`re selling clothes, photography services, or running a local restaurant. Followers and likes are more than just numbers. They’re the quickest way to boost your visibility on Instagram’s algorithm. With Poprey’s high-quality service, you receive: 100% safe and legitimate engagement by likes Flexible Packages of 25 - 50,000 real likes Premium Packages with Instagram Reach, Impressions, Saves Instant/Gradual Deliver Competitive Pricing The more likes your posts have, the wider your reach and the stronger your social proof. You will save money as well as time and reach new audience members without extra effort. How to Get Started with Poprey? The successful growth of your Instagram goes past posting quality content by requiring strategic planning together with consistent user engagement. Users are increasingly drawn to unfamiliar Instagram profiles that show high numbers of likes, views, and followers. We help trigger real Instagram users to notice your posts and accounts, leading to steady and sustainable growth on Instagram, TikTok, and YouTube. The process of starting with Poprey is straightforward as follows: 1 Choose the package Conduct an audit of competitors with respect to the quality of data collection and analysis. This is the best way to understand which strategy will be 100% effective. 2 Enter details and check out Decide on the number of likes — 10, 20, 50, 100, or 1000. With the Poprey platform, this parameter can be adjusted flexibly. We make sure that our customers do not overpay. 3 Enjoy the fruits of your labor Pay for the service in a convenient way. The Poprey offers solutions for businesses and individuals. We accept instant payments and bank transfers. Buy Instagram Followers Buying Instagram followers builds trust within the Instagram community. Other users begin to view you and your posts more positively, and as a result, they become your fans — triggering a chain reaction that signals the algorithm to show your content more often. This is how true organic visibility on Instagram begins. Your larger fan base builds credibility not only with other users but also with Instagram’s algorithm. When you buy IG followers . you’re laying the foundation for your social media presence — one that makes it easier to gain additional engagement like Instagram views, comments, and likes over time. Since 2017, Poprey has supported thousands of influencers, entrepreneurs, and brands in achieving their Instagram goals. Whether youre a blogger, designer, marketer, or small business owner, we offer customized growth solutions at unbeatable prices. With cutting-edge AI technology and a commitment to genuine interactions, our services ensure maximum effectiveness and long-lasting results. Our track record speaks volumes—real Instagram followers, likes, and views that help businesses thrive. FAQ What Makes Poprey’s Instagram Followers Stand Out? Our company pioneered the industry by providing Instagram followers alongside algorithm testing and successful solution discovery. Our company serves as a trusted partner that delivers the best solutions to help you grow your Instagram follower base. Package deals ranging from 100 to 50,000 followers, including exclusive VIP options. Affordable Pricing Without Hidden Fees Fast and Secure Delivery Guarantee от 60 Days Expert Customer Support 24/7 Our company earns trust from brand influencers and enterprises all around the world Why should I buy Instagram likes from Poprey? We were among the first to start working back when Instagram still showed the number of likes under each post. We’re the team that helped many influencers rise to fame. Since then, we’ve continued to grow and improve our service. Today, you can try our platform for free and share your honest feedback with us. With us, you can boost your likes even further by adding Instagram Reach, Impressions, or Saves. You can also calculate the likelihood of your post appearing on the Explore page. Our service stands apart because it delivers exceptional value together with quantifiable outcomes. Do Instagram likes still matter in 2025? Absolutely. The metric of likes continues to play an essential role in Instagram engagement during 2025. Your content receives better algorithm placement because of likes which also creates social proof that draws genuine users to your content.A high like count boosts visibility, increases trust, and plays a crucial role in growing your audience organically. What payment methods are available? When ordering a service through our website you will have no misunderstandings with payments. Just use a Credit/Debit Cards — Visa and Mastercard — or send money via cryptocurrency. Partnership with Commercegate allows us to guarantee safety. Be sure that your money will be spent with benefit. Can you buy Instagram followers and likes for business accounts? Yes, you can safely buy Instagram followers and likes for business accounts. In fact, many brands do it to build credibility, attract more customers, and increase their reach. When done correctly, it can enhance your online presence and give your business the social proof it needs to stand out. Poprey’s Services Instagram Likes Boost the visibility and appeal of your posts quickly with real likes. About 40% of users who might become future customers currently follow brands through Instagram. The purchase of Instagram likes presents a beneficial option not only for influencers and bloggers, but also for clothing stores, serves delivery services along with beauty salons and other types of businesses. Poprey provides budget-friendly package solutions adapted for small to large businesses through an easy process. The delivery of our solutions leads directly to better engagement levels. Higher engagement levels as a result of increased likes cause your content to appear on the Explore page, where it naturally reaches wider audiences. Instagram Followers Gain real, active Instagram followers instantly with different packeteges. Our followers enhance your credibility, make your profile attractive to visitors, and increase organic growth by leveraging Instagrams algorithms. Buying followers is a proven way to stand out on Instagram. A large number of followers on an account makes people want to explore it because it appears both trustworthy and interesting. The platform's functionality extends beyond human interactions. The Instagram algorithm detects rising engagement which leads to increased content visibility. The additional visibility from a boost initiates genuine growth which leads to natural audience expansion. Instagram Views Video visibility improves when users view content. Your contents perceived value increases immediately when you buy IG views . The number of views on your videos indicates to visitors that they will find your content interesting which leads them to extend their time on your page and generate new likes. Your content will serve as social proof when people observe its high number of views which results in attracting new viewers who can expand your organic reach. As views go up, so do likes, followers, and your chances of gaining traction naturally. Your profiles significance increases when users view it frequently because the algorithm and viewers both recognize its value leading to better visibility across the platform. Instagram Comments Users underestimate the impact of comments on Instagram . The strong form of engagement helps the algorithm determine which content to show to larger audiences. Most users focus on their follower counts and like total, but comments remain underappreciated which grants those who value them an exclusive advantage. A comment-rich post provides double benefits to the algorithm because it also attracts real users. Real users become drawn to content which receives comments. Active conversations within an accounts content attract more users because they view it as an engaging platform worthy of following. A community thrives when its comments section buzzes with activity because new users immediately desire to join such an active community. Poprey Us Buy Instagram Followers Buy Instagram Auto-Likes Buy Instagram Views Buy Instagram Comments Free Trial Instagram Likes Free Instagram Followers Free Instagram Views Services Instagram Monitoring Buy YouTube Views Buy YouTube Subscribers Buy YouTube Likes Buy YouTube Comments Contact Information Company: Qloyd OÜ Registration: 16257994 Address: Harju maakond, Tallinn, Lasnamäe linnaosa, Peterburi tee 71, 11415 E-mail: [email protected] Rules Terms of service Help Account Blog FAQ Contact
2026-01-13T08:48:39
https://openapi.tools/categories/data-validators
Data Validators | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Data Validators Check to see if API requests and responses are lining up with the API description. Data Validators There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:39
https://www.x.com
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T08:48:39
https://docs.python.org/3/tutorial/introduction.html#text
3. An Informal Introduction to Python — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | 3. An Informal Introduction to Python ¶ In the following examples, input and output are distinguished by the presence or absence of prompts ( >>> and … ): to repeat the example, you must type everything after the prompt, when the prompt appears; lines that do not begin with a prompt are output from the interpreter. Note that a secondary prompt on a line by itself in an example means you must type a blank line; this is used to end a multi-line command. You can use the “Copy” button (it appears in the upper-right corner when hovering over or tapping a code example), which strips prompts and omits output, to copy and paste the input lines into your interpreter. Many of the examples in this manual, even those entered at the interactive prompt, include comments. Comments in Python start with the hash character, # , and extend to the end of the physical line. A comment may appear at the start of a line or following whitespace or code, but not within a string literal. A hash character within a string literal is just a hash character. Since comments are to clarify code and are not interpreted by Python, they may be omitted when typing in examples. Some examples: # this is the first comment spam = 1 # and this is the second comment # ... and now a third! text = "# This is not a comment because it's inside quotes." 3.1. Using Python as a Calculator ¶ Let’s try some simple Python commands. Start the interpreter and wait for the primary prompt, >>> . (It shouldn’t take long.) 3.1.1. Numbers ¶ The interpreter acts as a simple calculator: you can type an expression into it and it will write the value. Expression syntax is straightforward: the operators + , - , * and / can be used to perform arithmetic; parentheses ( () ) can be used for grouping. For example: >>> 2 + 2 4 >>> 50 - 5 * 6 20 >>> ( 50 - 5 * 6 ) / 4 5.0 >>> 8 / 5 # division always returns a floating-point number 1.6 The integer numbers (e.g. 2 , 4 , 20 ) have type int , the ones with a fractional part (e.g. 5.0 , 1.6 ) have type float . We will see more about numeric types later in the tutorial. Division ( / ) always returns a float. To do floor division and get an integer result you can use the // operator; to calculate the remainder you can use % : >>> 17 / 3 # classic division returns a float 5.666666666666667 >>> >>> 17 // 3 # floor division discards the fractional part 5 >>> 17 % 3 # the % operator returns the remainder of the division 2 >>> 5 * 3 + 2 # floored quotient * divisor + remainder 17 With Python, it is possible to use the ** operator to calculate powers [ 1 ] : >>> 5 ** 2 # 5 squared 25 >>> 2 ** 7 # 2 to the power of 7 128 The equal sign ( = ) is used to assign a value to a variable. Afterwards, no result is displayed before the next interactive prompt: >>> width = 20 >>> height = 5 * 9 >>> width * height 900 If a variable is not “defined” (assigned a value), trying to use it will give you an error: >>> n # try to access an undefined variable Traceback (most recent call last): File "<stdin>" , line 1 , in <module> NameError : name 'n' is not defined There is full support for floating point; operators with mixed type operands convert the integer operand to floating point: >>> 4 * 3.75 - 1 14.0 In interactive mode, the last printed expression is assigned to the variable _ . This means that when you are using Python as a desk calculator, it is somewhat easier to continue calculations, for example: >>> tax = 12.5 / 100 >>> price = 100.50 >>> price * tax 12.5625 >>> price + _ 113.0625 >>> round ( _ , 2 ) 113.06 This variable should be treated as read-only by the user. Don’t explicitly assign a value to it — you would create an independent local variable with the same name masking the built-in variable with its magic behavior. In addition to int and float , Python supports other types of numbers, such as Decimal and Fraction . Python also has built-in support for complex numbers , and uses the j or J suffix to indicate the imaginary part (e.g. 3+5j ). 3.1.2. Text ¶ Python can manipulate text (represented by type str , so-called “strings”) as well as numbers. This includes characters “ ! ”, words “ rabbit ”, names “ Paris ”, sentences “ Got your back. ”, etc. “ Yay! :) ”. They can be enclosed in single quotes ( '...' ) or double quotes ( "..." ) with the same result [ 2 ] . >>> 'spam eggs' # single quotes 'spam eggs' >>> "Paris rabbit got your back :)! Yay!" # double quotes 'Paris rabbit got your back :)! Yay!' >>> '1975' # digits and numerals enclosed in quotes are also strings '1975' To quote a quote, we need to “escape” it, by preceding it with \ . Alternatively, we can use the other type of quotation marks: >>> 'doesn \' t' # use \' to escape the single quote... "doesn't" >>> "doesn't" # ...or use double quotes instead "doesn't" >>> '"Yes," they said.' '"Yes," they said.' >>> " \" Yes, \" they said." '"Yes," they said.' >>> '"Isn \' t," they said.' '"Isn\'t," they said.' In the Python shell, the string definition and output string can look different. The print() function produces a more readable output, by omitting the enclosing quotes and by printing escaped and special characters: >>> s = 'First line. \n Second line.' # \n means newline >>> s # without print(), special characters are included in the string 'First line.\nSecond line.' >>> print ( s ) # with print(), special characters are interpreted, so \n produces new line First line. Second line. If you don’t want characters prefaced by \ to be interpreted as special characters, you can use raw strings by adding an r before the first quote: >>> print ( 'C:\some \n ame' ) # here \n means newline! C:\some ame >>> print ( r 'C:\some\name' ) # note the r before the quote C:\some\name There is one subtle aspect to raw strings: a raw string may not end in an odd number of \ characters; see the FAQ entry for more information and workarounds. String literals can span multiple lines. One way is using triple-quotes: """...""" or '''...''' . End-of-line characters are automatically included in the string, but it’s possible to prevent this by adding a \ at the end of the line. In the following example, the initial newline is not included: >>> print ( """ \ ... Usage: thingy [OPTIONS] ... -h Display this usage message ... -H hostname Hostname to connect to ... """ ) Usage: thingy [OPTIONS] -h Display this usage message -H hostname Hostname to connect to >>> Strings can be concatenated (glued together) with the + operator, and repeated with * : >>> # 3 times 'un', followed by 'ium' >>> 3 * 'un' + 'ium' 'unununium' Two or more string literals (i.e. the ones enclosed between quotes) next to each other are automatically concatenated. >>> 'Py' 'thon' 'Python' This feature is particularly useful when you want to break long strings: >>> text = ( 'Put several strings within parentheses ' ... 'to have them joined together.' ) >>> text 'Put several strings within parentheses to have them joined together.' This only works with two literals though, not with variables or expressions: >>> prefix = 'Py' >>> prefix 'thon' # can't concatenate a variable and a string literal File "<stdin>" , line 1 prefix 'thon' ^^^^^^ SyntaxError : invalid syntax >>> ( 'un' * 3 ) 'ium' File "<stdin>" , line 1 ( 'un' * 3 ) 'ium' ^^^^^ SyntaxError : invalid syntax If you want to concatenate variables or a variable and a literal, use + : >>> prefix + 'thon' 'Python' Strings can be indexed (subscripted), with the first character having index 0. There is no separate character type; a character is simply a string of size one: >>> word = 'Python' >>> word [ 0 ] # character in position 0 'P' >>> word [ 5 ] # character in position 5 'n' Indices may also be negative numbers, to start counting from the right: >>> word [ - 1 ] # last character 'n' >>> word [ - 2 ] # second-last character 'o' >>> word [ - 6 ] 'P' Note that since -0 is the same as 0, negative indices start from -1. In addition to indexing, slicing is also supported. While indexing is used to obtain individual characters, slicing allows you to obtain a substring: >>> word [ 0 : 2 ] # characters from position 0 (included) to 2 (excluded) 'Py' >>> word [ 2 : 5 ] # characters from position 2 (included) to 5 (excluded) 'tho' Slice indices have useful defaults; an omitted first index defaults to zero, an omitted second index defaults to the size of the string being sliced. >>> word [: 2 ] # character from the beginning to position 2 (excluded) 'Py' >>> word [ 4 :] # characters from position 4 (included) to the end 'on' >>> word [ - 2 :] # characters from the second-last (included) to the end 'on' Note how the start is always included, and the end always excluded. This makes sure that s[:i] + s[i:] is always equal to s : >>> word [: 2 ] + word [ 2 :] 'Python' >>> word [: 4 ] + word [ 4 :] 'Python' One way to remember how slices work is to think of the indices as pointing between characters, with the left edge of the first character numbered 0. Then the right edge of the last character of a string of n characters has index n , for example: +---+---+---+---+---+---+ | P | y | t | h | o | n | +---+---+---+---+---+---+ 0 1 2 3 4 5 6 - 6 - 5 - 4 - 3 - 2 - 1 The first row of numbers gives the position of the indices 0…6 in the string; the second row gives the corresponding negative indices. The slice from i to j consists of all characters between the edges labeled i and j , respectively. For non-negative indices, the length of a slice is the difference of the indices, if both are within bounds. For example, the length of word[1:3] is 2. Attempting to use an index that is too large will result in an error: >>> word [ 42 ] # the word only has 6 characters Traceback (most recent call last): File "<stdin>" , line 1 , in <module> IndexError : string index out of range However, out of range slice indexes are handled gracefully when used for slicing: >>> word [ 4 : 42 ] 'on' >>> word [ 42 :] '' Python strings cannot be changed — they are immutable . Therefore, assigning to an indexed position in the string results in an error: >>> word [ 0 ] = 'J' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment >>> word [ 2 :] = 'py' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment If you need a different string, you should create a new one: >>> 'J' + word [ 1 :] 'Jython' >>> word [: 2 ] + 'py' 'Pypy' The built-in function len() returns the length of a string: >>> s = 'supercalifragilisticexpialidocious' >>> len ( s ) 34 See also Text Sequence Type — str Strings are examples of sequence types , and support the common operations supported by such types. String Methods Strings support a large number of methods for basic transformations and searching. f-strings String literals that have embedded expressions. Format String Syntax Information about string formatting with str.format() . printf-style String Formatting The old formatting operations invoked when strings are the left operand of the % operator are described in more detail here. 3.1.3. Lists ¶ Python knows a number of compound data types, used to group together other values. The most versatile is the list , which can be written as a list of comma-separated values (items) between square brackets. Lists might contain items of different types, but usually the items all have the same type. >>> squares = [ 1 , 4 , 9 , 16 , 25 ] >>> squares [1, 4, 9, 16, 25] Like strings (and all other built-in sequence types), lists can be indexed and sliced: >>> squares [ 0 ] # indexing returns the item 1 >>> squares [ - 1 ] 25 >>> squares [ - 3 :] # slicing returns a new list [9, 16, 25] Lists also support operations like concatenation: >>> squares + [ 36 , 49 , 64 , 81 , 100 ] [1, 4, 9, 16, 25, 36, 49, 64, 81, 100] Unlike strings, which are immutable , lists are a mutable type, i.e. it is possible to change their content: >>> cubes = [ 1 , 8 , 27 , 65 , 125 ] # something's wrong here >>> 4 ** 3 # the cube of 4 is 64, not 65! 64 >>> cubes [ 3 ] = 64 # replace the wrong value >>> cubes [1, 8, 27, 64, 125] You can also add new items at the end of the list, by using the list.append() method (we will see more about methods later): >>> cubes . append ( 216 ) # add the cube of 6 >>> cubes . append ( 7 ** 3 ) # and the cube of 7 >>> cubes [1, 8, 27, 64, 125, 216, 343] Simple assignment in Python never copies data. When you assign a list to a variable, the variable refers to the existing list . Any changes you make to the list through one variable will be seen through all other variables that refer to it.: >>> rgb = [ "Red" , "Green" , "Blue" ] >>> rgba = rgb >>> id ( rgb ) == id ( rgba ) # they reference the same object True >>> rgba . append ( "Alph" ) >>> rgb ["Red", "Green", "Blue", "Alph"] All slice operations return a new list containing the requested elements. This means that the following slice returns a shallow copy of the list: >>> correct_rgba = rgba [:] >>> correct_rgba [ - 1 ] = "Alpha" >>> correct_rgba ["Red", "Green", "Blue", "Alpha"] >>> rgba ["Red", "Green", "Blue", "Alph"] Assignment to slices is also possible, and this can even change the size of the list or clear it entirely: >>> letters = [ 'a' , 'b' , 'c' , 'd' , 'e' , 'f' , 'g' ] >>> letters ['a', 'b', 'c', 'd', 'e', 'f', 'g'] >>> # replace some values >>> letters [ 2 : 5 ] = [ 'C' , 'D' , 'E' ] >>> letters ['a', 'b', 'C', 'D', 'E', 'f', 'g'] >>> # now remove them >>> letters [ 2 : 5 ] = [] >>> letters ['a', 'b', 'f', 'g'] >>> # clear the list by replacing all the elements with an empty list >>> letters [:] = [] >>> letters [] The built-in function len() also applies to lists: >>> letters = [ 'a' , 'b' , 'c' , 'd' ] >>> len ( letters ) 4 It is possible to nest lists (create lists containing other lists), for example: >>> a = [ 'a' , 'b' , 'c' ] >>> n = [ 1 , 2 , 3 ] >>> x = [ a , n ] >>> x [['a', 'b', 'c'], [1, 2, 3]] >>> x [ 0 ] ['a', 'b', 'c'] >>> x [ 0 ][ 1 ] 'b' 3.2. First Steps Towards Programming ¶ Of course, we can use Python for more complicated tasks than adding two and two together. For instance, we can write an initial sub-sequence of the Fibonacci series as follows: >>> # Fibonacci series: >>> # the sum of two elements defines the next >>> a , b = 0 , 1 >>> while a < 10 : ... print ( a ) ... a , b = b , a + b ... 0 1 1 2 3 5 8 This example introduces several new features. The first line contains a multiple assignment : the variables a and b simultaneously get the new values 0 and 1. On the last line this is used again, demonstrating that the expressions on the right-hand side are all evaluated first before any of the assignments take place. The right-hand side expressions are evaluated from the left to the right. The while loop executes as long as the condition (here: a < 10 ) remains true. In Python, like in C, any non-zero integer value is true; zero is false. The condition may also be a string or list value, in fact any sequence; anything with a non-zero length is true, empty sequences are false. The test used in the example is a simple comparison. The standard comparison operators are written the same as in C: < (less than), > (greater than), == (equal to), <= (less than or equal to), >= (greater than or equal to) and != (not equal to). The body of the loop is indented : indentation is Python’s way of grouping statements. At the interactive prompt, you have to type a tab or space(s) for each indented line. In practice you will prepare more complicated input for Python with a text editor; all decent text editors have an auto-indent facility. When a compound statement is entered interactively, it must be followed by a blank line to indicate completion (since the parser cannot guess when you have typed the last line). Note that each line within a basic block must be indented by the same amount. The print() function writes the value of the argument(s) it is given. It differs from just writing the expression you want to write (as we did earlier in the calculator examples) in the way it handles multiple arguments, floating-point quantities, and strings. Strings are printed without quotes, and a space is inserted between items, so you can format things nicely, like this: >>> i = 256 * 256 >>> print ( 'The value of i is' , i ) The value of i is 65536 The keyword argument end can be used to avoid the newline after the output, or end the output with a different string: >>> a , b = 0 , 1 >>> while a < 1000 : ... print ( a , end = ',' ) ... a , b = b , a + b ... 0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987, Footnotes [ 1 ] Since ** has higher precedence than - , -3**2 will be interpreted as -(3**2) and thus result in -9 . To avoid this and get 9 , you can use (-3)**2 . [ 2 ] Unlike other languages, special characters such as \n have the same meaning with both single ( '...' ) and double ( "..." ) quotes. The only difference between the two is that within single quotes you don’t need to escape " (but you have to escape \' ) and vice versa. Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:39
https://www.linkedin.com/help/linkedin/answer/34593?lang=en&trk=d_checkpoint_lg_consumer_login_ft_community_guidelines#site-search-common-search-query
Learn more about the LinkedIn Professional Community Policies | LinkedIn Help Attention screen reader users, you are in a mobile optimized view and content may not appear where you expect it to be. To return the screen to its desktop view, please maximize your browser. Skip to content Skip to search Close jump menu Help LinkedIn Help Dropdown menu, expand to explore help for other LinkedIn products Close menu Get help with: LinkedIn Corporate Billing Learning Marketing Solutions Recruiter Sales Navigator Talent Insights Go to LinkedIn Sign in Sign in Learn more about the LinkedIn Professional Community Policies Last updated: 11 months ago We periodically update our Professional Community Policies to ensure that the millions of conversations taking place each day on our services help our members be more productive, successful, and free of inappropriate and unwanted content or behavior.  We encourage you to take a look and familiarize yourself with our Professional Community Policies , which we continue to develop and provide guidance for the use of our services. Tagged in Data and Privacy LinkedIn Contact us Select a language. The page will automatically refresh after a language has been selected. العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) LinkedIn Corporation © 2026 About Transparency Center Privacy and Terms Cookies Copyright Terms Privacy Guest controls Dismiss Privacy and Terms menu LinkedIn Corporation © 2026
2026-01-13T08:48:39
https://openapi.tools/categories/converters
Converters | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Converters Various tools to convert to and from OpenAPI and other API description formats. Converters There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:39
https://dev.to/devnews/s7-e5-a-german-court-rules-against-google-fonts-deepmind-s-ai-coding-engine-raspberry-pi-s-64-bit-os-and-flutter-for-windows#main-content
S7:E5 - A German Court Rules Against Google Fonts, DeepMind’s AI Coding Engine, Raspberry Pi’s 64-bit OS, and Flutter for Windows - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close DevNews Follow S7:E5 - A German Court Rules Against Google Fonts, DeepMind’s AI Coding Engine, Raspberry Pi’s 64-bit OS, and Flutter for Windows Feb 10 '22 play In this episode, we talk about some hardware and some software that might be of interest to you, and DeepMind’s claims that their AI coding engine is on par with your average human developer. Then we speak with Giulia Gentile, fellow in law at the London School of Economics and Political Science, about Europe’s General Data Protection Regulation and a ruling by a German court saying that it found "no legitimate interest for using Google Fonts on its websites," and the legal precedent that it sets. Show Notes DevDiscuss (sponsor) Stack Overflow Podcast (sponsor) CodeNewbie (sponsor) Scout APM (DevNews) (sponsor) Raspberry Pi OS (64-bit) Announcing Flutter for Windows Competitive programming with AlphaCode No legitimate interest for using Google Fonts on websites, says German court Giulia Gentile Giulia Gentile is Fellow in Law at the LSE Law School. She joined LSE Law School in 2021, having previously worked as Lecturer and Postdoctoral Researcher at Maastricht University and as Visiting Lecturer at King’s College London. She holds a PhD and an LLM from King’s College London and an LLB/MA from the University of Naples ‘Federico II’. During her doctoral studies, she was awarded research scholarships by the Centre of European Law at King’s College London and the Max Planck Institute of European Procedural Law (Luxembourg). Episode source Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Your browser does not support the audio element. 1x initializing... × 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://openapi.tools/categories/monitoring
Monitoring | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Monitoring Monitoring tools let you know what is going on in your API. Monitoring There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:39
https://www.python.org/doc/av/
Audio/Video Instructional Materials for Python | Python.org Notice: While JavaScript is not essential for this website, your interaction with the content will be limited. Please turn JavaScript on for the full experience. Skip to content ▼ Close Python PSF Docs PyPI Jobs Community ▲ The Python Network Donate ≡ Menu Search This Site GO A A Smaller Larger Reset Socialize LinkedIn Mastodon Chat on IRC Twitter About Applications Quotes Getting Started Help Python Brochure Downloads All releases Source code Windows macOS Android Other Platforms License Alternative Implementations Documentation Docs Audio/Visual Talks Beginner's Guide FAQ Non-English Docs PEP Index Python Books Python Essays Community Diversity Mailing Lists IRC Forums PSF Annual Impact Report Python Conferences Special Interest Groups Python Logo Python Wiki Code of Conduct Community Awards Get Involved Shared Stories Success Stories Arts Business Education Engineering Government Scientific Software Development News Python News PSF Newsletter PSF News PyCon US News News from the Community Events Python Events User Group Events Python Events Archive User Group Events Archive Submit an Event Audio/Video Instructional Materials for Python There is a growing body of podcasts, screencasts and video presentations for the Python community. This page collects some of the best. Podcast Repositories core.py Pablo Galindo and Łukasz Langa talk about Python internals, because they work on Python internals. PyPodcats Hidden Figures of Python podcast series. Our goal is to highlight the contributions and accomplishments of the underrepresented group members in the Python community. Talk Python To Me A podcast on Python and related technologies. The Real Python Podcast Hear what’s new in the world of Python programming and become a more effective Pythonista. Python Bytes Python headlines delivered directly to your earbuds. Python People A podcast about getting to know the people who help make the Python community great. Django Chat A podcast on the Django Web Framework by Will Vincent and Carlton Gibson. Pybites Podcast A podcast about Python development, career and mindset skills. Sad Python Girls Club Refreshing insights of the VS Code Python team, with authentic perspectives on the Python ecosystem and how VS Code fits in it. Inactive Podcast Repositories Test and Code Practical automated testing for software engineers using Python. Python Community News A look at the news around and impacting the Python Community. Podcast.__init__ A podcast about Python and the people who make it great. Radio Free Python A podcast of Python news and interviews by Larry Hastings. From Python import podcast From Python Import Podcast is a bimonthly podcast dedicated to sharing thoughts, opinions, rants, and intelligent discussion about all things Python. A Little Bit of Python An occasional podcast on Python by Michael Foord , Steve Holden , Andrew Kuchling , Dr. Brett Cannon and Jesse Noller . Python411 Python411 is a series of podcasts about Python presented by Ron Stephens, aimed at hobbyists and others who are learning Python. Each episode focuses on one aspect of learning Python, or one kind of Python programming, and points to online tools and tutorials. Python related news and events will also be reported upon as well as interviews with key Python contributors. Ron has built up quite a collection of podcasts since he started in May 2005 - over fifty as of April 2007. They are great for listening to on the train or in traffic. The site provides an XML/RSS feed to which you can subscribe with your favorite reader or make a live bookmark of dropdown podcast titles using Mozilla Firefox. Djangodose A podcast about all things Django, discussing new features in the development tree, how-tos, and listener questions. Jython Monthly Interviews and coverage of specific Jython-related events in a pseudo-live podcast fashion. PyCon Podcast The PyCon podcast carries recordings of talks from the PyCon conference . Hear the talks you missed! Conference Talk and Video Lecture Repositories pyvideo.org An index to many talk and session videos made available by Python conferences and user groups around the world. The site makes it very easy to find interesting Python talk videos and displays them in a clean and uncluttered way. PyCon US on YouTube Keynotes, talks and tutorials from PyCon US 2020 onwards. EuroPython on YouTube Keynotes, talks and tutorials from EuroPython 2011 onwards. PyCon US 08 on YouTube Raw video of talks from the 2008 conference are available on YouTube. Because they're the raw video, presentation slides have not been edited into the recording and no cleanup of the audio has been done. The PSF The Python Software Foundation is the organization behind Python. Become a member of the PSF and help advance the software and our mission. ▲ Back to Top About Applications Quotes Getting Started Help Python Brochure Downloads All releases Source code Windows macOS Android Other Platforms License Alternative Implementations Documentation Docs Audio/Visual Talks Beginner's Guide FAQ Non-English Docs PEP Index Python Books Python Essays Community Diversity Mailing Lists IRC Forums PSF Annual Impact Report Python Conferences Special Interest Groups Python Logo Python Wiki Code of Conduct Community Awards Get Involved Shared Stories Success Stories Arts Business Education Engineering Government Scientific Software Development News Python News PSF Newsletter PSF News PyCon US News News from the Community Events Python Events User Group Events Python Events Archive User Group Events Archive Submit an Event Contributing Developer's Guide Issue Tracker python-dev list Core Mentorship Report a Security Issue ▲ Back to Top Help & General Contact Diversity Initiatives Submit Website Bug Status Copyright ©2001-2026.   Python Software Foundation   Legal Statements   Privacy Notice Powered by PSF Community Infrastructure -->
2026-01-13T08:48:39
https://parenting.forem.com/jess/international-travel-with-toddlers-car-seat-or-vest-considerations-p51#comments
International Travel with Toddlers: Car Seat (or vest!) Considerations - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse Jess Lee Posted on Oct 14, 2025           International Travel with Toddlers: Car Seat (or vest!) Considerations # travel # gear After flying from the U.S. to Taiwan (twice) with my toddlers, I've become the go-to person for travel gear recs amongst my friends. Instead of sending the same lengthy text message over and over again, I figured I'd jot everything down in a series of posts for easy sharing. Obviously, every kid and journey is different but this series will give you a few things to can consider. No referral links or anything like that. Let's start with the biggest headache: car seats. Unless you're planning to car share everywhere (and even then), you need a solution. And no, you don't want to lug around your cushy at-home car seat, unless it's one of the ones I'm suggesting below: Option 1: Low Budget Traditional Car Seat - Cosco Scenara Next The Cosco Scenera Next is the lightest weight traditional car seat on the market. It's a bulky shape (like all car seats), but it's cheap and it works for both rear and front facing, so it'll last you a while. The link above might be for their older model. Option 2: The Packable Premium - Wayb Pico If you have the budget and want something that actually packs down, the Wayb Pico is the most packable car seat on the market. It's expensive, but if you're a frequent traveler, it might be worth the investment. Check it out at Wayb . I've seen kids strapped into these on short-haul flights and they seem great. I can't imagine keeping my kids in one of these flights for a 6+ hour flight, though. I've never had the pleasure of owning one but you should know about it as part of your research. Important note: this is only for kids who can front-face. Option 3: The Game Changer - RideSafer Travel Vest Here's what I actually recommend for kids old enough to understand instructions: the car seat vest. This thing passes all the same testing standards that regular car seats do, as long as your child stays in the right position and doesn't mess with the straps . For a kid who can follow directions and understands safety, this is ridiculously convenient and cheap. No lugging a giant plastic contraption through airports. Just a vest. Find it here . Rideshare or Car Rental? Since we did not rent a car in Taiwan and traveled via rideshare, we went with the travel vest for the older kid and cosco for the yougner kid. We only did this because I'd be with my kid in the backseat the entire time to monitor their straps. This is really important! We've done some domestic travel where we did rent a car and have had to buy a last minute car seat (the cosco one) because the 4yo would either fall asleep or slouch in the vest, putting them in an unsafe position. So now I own...two cosco seats and a travel vest. Car Seat Travel Bag If you go with a traditional car seat, you'll also want a car seat travel bag. Some airlines (depending on the airport) will provide a clear plastic bag for you but definitely don't bank on that. Here's the car seat travel bag we use, it's cheap and effective. Note: you can bring your car seat (not the vest) directly onto the plane to strap your kids into. I personally don't do this for long-haul flights because my kids would lose their minds, but it is the safest option for them while in-flight. A Word of Warning About International Cars Here's something nobody tells you: car safety standards vary wildly by country. In Taiwan, 99% of cars didn't have the ratcheting mechanism in the seat belt like they do in the U.S. Brand new Teslas didn't have them. So, if you're paranoid, you might want a car seat that supports lower anchors (both cosco and wayb do). Anyway, be sure to do your research on your destination country before you land so you know what to expect! Next Up My next post will be about gear you'll want while you're 30,000 feet in the air! Top comments (2) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Collapse Expand   Peter Kim Frank Peter Kim Frank Peter Kim Frank Follow Doing a bit of everything at DEV / Forem Email peter@dev.to Education Wesleyan University Pronouns He/Him Work Co-Founder Joined Jan 3, 2017 • Oct 15 '25 Dropdown menu Copy link Hide +1 for the Cosco. We normally just use the straps to hook the car seat directly to our stroller which works like a charm. Like comment: Like comment: 3  likes Like Comment button Reply Collapse Expand   Matt Figler Matt Figler Matt Figler Follow Joined Jun 22, 2017 • Oct 22 '25 Dropdown menu Copy link Hide This is an awesome breakdown, takes a little bit of stress out of family travel. Like comment: Like comment: 2  likes Like Comment button Reply Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse Jess Lee Follow Building DEV and Forem with everyone here. Interested in the future. Location USA / TAIWAN Pronouns she/they Work Co-Founder & COO at Forem Joined Jul 29, 2016 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:39
https://devguide.python.org/documentation/help-documenting/
Helping with documentation Contents Menu Expand Light mode Dark mode Auto light/dark, in light mode Auto light/dark, in dark mode Skip to content Python Developer's Guide Python Developer's Guide Getting started Setup and building Fixing “easy” issues (and beyond) Git bootcamp and cheat sheet Lifecycle of a pull request Where to get help Generative AI Development workflow Following Python’s development Changing Python Development cycle Adding to the stdlib Standard library extension modules Changing Python’s C API Changing CPython’s grammar Porting to a new platform Software Bill-of-Materials (SBOM) Python Security Response Team (PSRT) Issues and triaging Issue tracker Triaging an issue GitHub labels GitHub issues for BPO users Triage Team Documentation Getting started Helping with documentation Style guide reStructuredText markup Translations Translating Coordinating Helping with the Developer’s Guide Testing and buildbots Running and writing tests Silence warnings from the test suite Increase test coverage Working with buildbots New buildbot workers Development tools Argument Clinic Tutorial How-to guides GDB support Dynamic analysis with Clang Tools for tracking compiler warnings Core team Responsibilities Accepting pull requests Experts index Team log Motivations and affiliations How to join the core team Memorialization CPython’s internals Status of Python versions Python Contributor’s Guide (draft) [Plan for the Contributor’s Guide] Introduction The CPython project Code of Conduct Roles Governance Generative AI GitHub Directory structure Communication channels Outreach Issues and triaging Issue tracker Triaging an issue GitHub labels Reviewing Triage Team Documentation contributions Getting started Helping with documentation Style guide reStructuredText markup Pull request lifecycle Translating Helping with the Developer’s Guide Code contributions Setup and building Git tips Pull request lifecycle Development workflow Following Python’s development Development cycle Adding to the stdlib Standard library extension modules Changing Python’s C API Changing Python Changing CPython’s grammar Porting to a new platform Software Bill-of-Materials (SBOM) Python Security Response Team (PSRT) Testing and buildbots Running and writing tests Silence warnings from the test suite Increase test coverage Working with buildbots New buildbot workers Development tools Argument Clinic Tutorial How-to guides GDB support Dynamic analysis with Clang Tools for tracking compiler warnings Core team Responsibilities Accepting pull requests Experts index Team log Motivations and affiliations How to join the core team Accessibility, design, and user success Security and infrastructure contributions Workflows Install Git Get the source code Install Dependencies Compile and build Regenerating auto-created files Install Git Using GitHub Codespaces Back to top View this page Edit this page Helping with documentation ¶ Python is known for having well-written documentation. Maintaining the documentation’s accuracy and keeping a high level of quality takes a lot of effort. Community members, like you, help with writing, editing, and updating content, and these contributions are appreciated and welcomed. This high-level Helping with Documentation section provides: an overview of Python’s documentation how to help with documentation issues information on proofreading You will find extensive and detailed information on how to write documentation and submit changes on the Documenting Python page. Python documentation ¶ The Documenting Python section covers the details of how Python’s documentation works. It includes information about the markup language used, specific formats, and style recommendations. Looking at pre-existing documentation source files can be very helpful when getting started. How to build the documentation walks you through the steps to create a draft build which lets you see how your changes will look and validates that your new markup is correct. You can view the documentation built from in-development and maintenance branches at https://docs.python.org/dev/ . The in-development and recent maintenance branches are rebuilt once per day. If you would like to be more involved with documentation, consider subscribing to the Documentation category on the Python Discourse and the docs@python.org mailing list where user issues are raised and documentation toolchain, projects, and standards are discussed. Helping with documentation issues ¶ If you look at documentation issues on the issue tracker , you will find various documentation problems that may need work. Issues vary from typos to unclear documentation and items lacking documentation. If you see a documentation issue that you would like to tackle, you can: check to see if there is pull request icon to the right of the issue’s title, or an open pull request listed under Linked PRs in the issue body. If there is, then someone has already created a pull request for the issue. leave a comment on the issue saying you are going to try and create a pull request and roughly how long you think you will take to do so (this allows others to take on the issue if you happen to forget or lose interest). submit a pull request for the issue. By following the steps in the Quick Guide to Pull Requests , you will learn the workflow for documentation pull requests. Translating ¶ The Python documentation is being actively translated into several languages. If you are interested in helping with translation, see our pages on translating to get started. Proofreading ¶ While an issue filed on the issue tracker means there is a known issue somewhere, that does not mean there are not other issues lurking about in the documentation. Proofreading a part of the documentation, such as a “How to” or OS specific document, can often uncover problems (for example, documentation that needs updating for Python 3). If you decide to proofread, read a section of the documentation from start to finish, filing issues in the issue tracker for each major type of problem you find. Simple typos don’t require issues of their own, but, instead, submit a pull request directly. It’s best to avoid filing a single issue for an entire section containing multiple problems; instead, file several issues so that it is easier to break the work up for multiple people and more efficient review. For help with the finer points of English technical writing, mention the @python/proofreaders team in your issue or pull request in any @python repo. If you’d like to join the team, open a core-workflow issue similar to python/core-workflow#461 . Next Style guide Previous Getting started Copyright © 2011 Python Software Foundation Made with Sphinx and @pradyunsg 's Furo On this page Helping with documentation Python documentation Helping with documentation issues Translating Proofreading
2026-01-13T08:48:39
https://openapi.tools/categories/annotations
Annotations | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Annotations Use annotations in your code to generate OpenAPI definitions, keeping the documentation close to the implementation. Annotations * * *
2026-01-13T08:48:39
https://google.com/
Google 검색 이미지 지도 Play YouTube 뉴스 Gmail 드라이브 더보기 » 웹 기록 | 설정 | 로그인   고급검색 광고 비즈니스 솔루션 Google 정보 Google.co.kr © 2026 - 개인정보처리방침 - 약관
2026-01-13T08:48:39
https://dev.to/codemouse92/updated-opensource-tag-guidelines-55m5#aliases
Updated #opensource Tag Guidelines - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse Jason C. McDonald Posted on Jul 17, 2019 • Edited on Apr 8, 2020           Updated #opensource Tag Guidelines # opensource # meta Updated 8 April 2020 The #opensource tag is awesome, but it's also been lacking a lot of focus. Is it for promoting projects? Talking about open source? Posting lists of the top 20 open source Javascript modules? It's hard to tell. In a way, because the lion's share of our technologies, libraries, tools, and projects are open source, nearly everything qualified for this tag before. It was becoming our site's junk drawer as it were - lots of nifty and useful stuff, but no semblance of organization to any of it. Since DEV.to rolled out Listings , I'm taking the opportunity to narrow the tag focus a bit. The goal is to give the #opensource tag clear topic boundaries, so Following it doesn't lead to a bunch of irrelevant posts leaking into your feed. New Guidelines I've updated the tag guidelines, but I wanted to lay out the changes here. Posts promoting a single project should go on Listings , or on #showdev or #news if it qualifies. Posts using or mentioning one or more open source projects should go on the appropriate tags for the relevant languages and technologies. This includes tutorials, "round ups", guides, comparisons, reviews, and the like. These typically land in #opensource, and are the main reason for the tag clutter. Announcements relating to your awesome project, including new features, releases, versions, and the like, should go on #news or Listings , or should be expanded out into a proper article (tutorial, maybe?) and posted on the appropriate technology tags. Open source contributor requests should go on #contributorswanted or Listings . If you're just bursting with pride at something you built, use the #showdev tag instead. "Roundups" and other lists of cool open source projects belong on #githunt . What Changed? All this mainly means the #opensource tag is no longer valid merely if the project(s) being discusses happen to be open source! To put that another way, here's a few theoretical topics which would have been #opensource material before, but aren't now. "Top 10 Open Source Python Data Modules" ( #python ) "My Awesome Data Visualizer in Go" ( #go , #showdev ) "Looking for contributors to Supercoolproject" (Listings or #contributorswanted ) "What I did on my Perl project this week" ( #perl , #devjournal , possibly #showdev ) "Installing Epictool on Ubuntu" ( #ubuntu ) "5 Open Source Alternatives to AWS" ( #cloud ) What SHOULD It Be? Articles in this tag should be about at least one of these three broad topics: Organizing, managing, running, contributing to, or working in an Open Source project. Open Source philosophy, licensing, and/or practical and legal topics thereof. Advocacy and adoption of Open Source philosophy . Aliases #foss and #freesoftware have been aliased over to #opensource (thanks @michaeltharrington !) and the tag info updated to account for that. I know that Free Software is culturally distinct from Open Source, but as the former is always compliant to a subset of the latter, having one tag for all just makes sense. Guideline Enforcement I won't be applying this to any posts before July 17th 2019 (retroactive guidelines just aren't fair). If the #opensource tag is used incorrectly in new posts, I'll remove it and provide a friendly reminder, along with suggestions on better tags to use. I know it'll take a while to get used to the updated rules, so don't worry if you miss it a few dozen times. Top comments (8) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Collapse Expand   Ben Halpern Ben Halpern Ben Halpern Follow A Canadian software developer who thinks he’s funny. Email ben@forem.com Location NY Education Mount Allison University Pronouns He/him Work Co-founder at Forem Joined Dec 27, 2015 • Jul 17 '19 Dropdown menu Copy link Hide Well thought out Jason. I'll be following along. We'll have some more easily accessible tag guidelines adjacent to the editor coming soon so folks can understand the instructions without being caught off guard by doing it wrong. As more folks define their guidelines, my biggest worry is what a lot of forums become when mods are overbearing. So I'm glad this is well thought out and well described. @michaeltharrington let's Jason well with this and we'll coordinate on functionality that needs to ship. Like comment: Like comment: 5  likes Like Comment button Reply Collapse Expand   Michael Tharrington Michael Tharrington Michael Tharrington Follow I'm a friendly, non-dev, cisgender guy from NC who enjoys playing music/making noise, hiking, eating veggies, and hanging out with my best friend/wife + our 3 kitties + 1 greyhound. Email mct3545@gmail.com Location North Carolina Education BFA in Creative Writing Pronouns he/him Work Senior Community Manager at DEV Joined Oct 24, 2017 • Jul 17 '19 Dropdown menu Copy link Hide Agreed! This is very well thought out. I think this tag will definitely benefit from more focus. Jason, feel free to hit me up if you need a hand with anything. I'm happy to help! Like comment: Like comment: 2  likes Like Comment button Reply Collapse Expand   Jason C. McDonald Jason C. McDonald Jason C. McDonald Follow Author. Speaker. Time Lord. (Views are my own) Email codemouse92@outlook.com Location Time Vortex Pronouns he/him Work Author of "Dead Simple Python" (No Starch Press) Joined Jan 31, 2017 • Jul 17 '19 Dropdown menu Copy link Hide Thanks, Michael and Ben! Like comment: Like comment: 3  likes Like Comment button Reply Collapse Expand   William Antonelli William Antonelli William Antonelli Follow Joined Mar 7, 2019 • Jul 18 '19 Dropdown menu Copy link Hide This is a list of what not to use the tag for. Can you give some examples of what we would use it for? I think that would be easier to understand. Like comment: Like comment: 1  like Like Comment button Reply Collapse Expand   Jason C. McDonald Jason C. McDonald Jason C. McDonald Follow Author. Speaker. Time Lord. (Views are my own) Email codemouse92@outlook.com Location Time Vortex Pronouns he/him Work Author of "Dead Simple Python" (No Starch Press) Joined Jan 31, 2017 • Jul 18 '19 Dropdown menu Copy link Hide No problem. From the tag info: To keep this tag clean and meaningful, please ensure your post fits into at least one of the following categories: * Organizing, managing, running, or working in an Open Source project. * Open Source philosophy, licensing, and/or practical and legal topics thereof. * Advocacy and adoption of Open Source technology. I'll add that to the post. Like comment: Like comment: 2  likes Like Comment button Reply Collapse Expand   Frederik 👨‍💻➡️🌐 Creemers Frederik 👨‍💻➡️🌐 Creemers Frederik 👨‍💻➡️🌐 Creemers Follow I'm never sure what to put in a bio. If there's anything you want to know, don't be afraid to ask! Email frederikcreemers@gmail.com Location Maastricht, the Netherlands Education Knowledge Engineering & Data Science at Maastricht University Pronouns he/him Work Developer at TalkJS Joined Mar 22, 2017 • Jul 17 '19 Dropdown menu Copy link Hide I think the #githunt tag is also relevant here. Looking at some of its recent posts, it could also use some enforcement of its guidelines. Like comment: Like comment: 1  like Like Comment button Reply Collapse Expand   Jason C. McDonald Jason C. McDonald Jason C. McDonald Follow Author. Speaker. Time Lord. (Views are my own) Email codemouse92@outlook.com Location Time Vortex Pronouns he/him Work Author of "Dead Simple Python" (No Starch Press) Joined Jan 31, 2017 • Aug 3 '19 • Edited on Aug 3 • Edited Dropdown menu Copy link Hide Y'know, they're always looking for more tag moderators, and I agree that #githunt needs some love. Maybe that'd be something you'd be good at? (Contact yo@dev.to if you're interested.) Like comment: Like comment: 1  like Like Comment button Reply Some comments may only be visible to logged-in visitors. Sign in to view all comments. Some comments have been hidden by the post's author - find out more Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse Jason C. McDonald Follow Author. Speaker. Time Lord. (Views are my own) Location Time Vortex Pronouns he/him Work Author of "Dead Simple Python" (No Starch Press) Joined Jan 31, 2017 More from Jason C. McDonald 5 Ways to Retain Open Source Contributors # opensource # culture # projectmanagement Social Lifespan of Posts # meta # discuss Introducing #devjournal # devjournal # meta 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Forem — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Forem © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:39
https://docs.python.org/3/tutorial/interpreter.html
2. Using the Python Interpreter — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 2. Using the Python Interpreter 2.1. Invoking the Interpreter 2.1.1. Argument Passing 2.1.2. Interactive Mode 2.2. The Interpreter and Its Environment 2.2.1. Source Code Encoding Previous topic 1. Whetting Your Appetite Next topic 3. An Informal Introduction to Python This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 2. Using the Python Interpreter | Theme Auto Light Dark | 2. Using the Python Interpreter ¶ 2.1. Invoking the Interpreter ¶ The Python interpreter is usually installed as /usr/local/bin/python3.14 on those machines where it is available; putting /usr/local/bin in your Unix shell’s search path makes it possible to start it by typing the command: python3.14 to the shell. [ 1 ] Since the choice of the directory where the interpreter lives is an installation option, other places are possible; check with your local Python guru or system administrator. (E.g., /usr/local/python is a popular alternative location.) On Windows machines where you have installed Python from the Microsoft Store , the python3.14 command will be available. If you have the py.exe launcher installed, you can use the py command. See Python install manager for other ways to launch Python. Typing an end-of-file character ( Control - D on Unix, Control - Z on Windows) at the primary prompt causes the interpreter to exit with a zero exit status. If that doesn’t work, you can exit the interpreter by typing the following command: quit() . The interpreter’s line-editing features include interactive editing, history substitution and code completion on systems that support the GNU Readline library. Perhaps the quickest check to see whether command line editing is supported is typing Control - P to the first Python prompt you get. If it beeps, you have command line editing; see Appendix Interactive Input Editing and History Substitution for an introduction to the keys. If nothing appears to happen, or if ^P is echoed, command line editing isn’t available; you’ll only be able to use backspace to remove characters from the current line. The interpreter operates somewhat like the Unix shell: when called with standard input connected to a tty device, it reads and executes commands interactively; when called with a file name argument or with a file as standard input, it reads and executes a script from that file. A second way of starting the interpreter is python -c command [arg] ... , which executes the statement(s) in command , analogous to the shell’s -c option. Since Python statements often contain spaces or other characters that are special to the shell, it is usually advised to quote command in its entirety. Some Python modules are also useful as scripts. These can be invoked using python -m module [arg] ... , which executes the source file for module as if you had spelled out its full name on the command line. When a script file is used, it is sometimes useful to be able to run the script and enter interactive mode afterwards. This can be done by passing -i before the script. All command line options are described in Command line and environment . 2.1.1. Argument Passing ¶ When known to the interpreter, the script name and additional arguments thereafter are turned into a list of strings and assigned to the argv variable in the sys module. You can access this list by executing import sys . The length of the list is at least one; when no script and no arguments are given, sys.argv[0] is an empty string. When the script name is given as '-' (meaning standard input), sys.argv[0] is set to '-' . When -c command is used, sys.argv[0] is set to '-c' . When -m module is used, sys.argv[0] is set to the full name of the located module. Options found after -c command or -m module are not consumed by the Python interpreter’s option processing but left in sys.argv for the command or module to handle. 2.1.2. Interactive Mode ¶ When commands are read from a tty, the interpreter is said to be in interactive mode . In this mode it prompts for the next command with the primary prompt , usually three greater-than signs ( >>> ); for continuation lines it prompts with the secondary prompt , by default three dots ( ... ). The interpreter prints a welcome message stating its version number and a copyright notice before printing the first prompt: $ python3.14 Python 3.14 (default, April 4 2024, 09:25:04) [GCC 10.2.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> Continuation lines are needed when entering a multi-line construct. As an example, take a look at this if statement: >>> the_world_is_flat = True >>> if the_world_is_flat : ... print ( "Be careful not to fall off!" ) ... Be careful not to fall off! For more on interactive mode, see Interactive Mode . 2.2. The Interpreter and Its Environment ¶ 2.2.1. Source Code Encoding ¶ By default, Python source files are treated as encoded in UTF-8. In that encoding, characters of most languages in the world can be used simultaneously in string literals, identifiers and comments — although the standard library only uses ASCII characters for identifiers, a convention that any portable code should follow. To display all these characters properly, your editor must recognize that the file is UTF-8, and it must use a font that supports all the characters in the file. To declare an encoding other than the default one, a special comment line should be added as the first line of the file. The syntax is as follows: # -*- coding: encoding -*- where encoding is one of the valid codecs supported by Python. For example, to declare that Windows-1252 encoding is to be used, the first line of your source code file should be: # -*- coding: cp1252 -*- One exception to the first line rule is when the source code starts with a UNIX “shebang” line . In this case, the encoding declaration should be added as the second line of the file. For example: #!/usr/bin/env python3 # -*- coding: cp1252 -*- Footnotes [ 1 ] On Unix, the Python 3.x interpreter is by default not installed with the executable named python , so that it does not conflict with a simultaneously installed Python 2.x executable. Table of Contents 2. Using the Python Interpreter 2.1. Invoking the Interpreter 2.1.1. Argument Passing 2.1.2. Interactive Mode 2.2. The Interpreter and Its Environment 2.2.1. Source Code Encoding Previous topic 1. Whetting Your Appetite Next topic 3. An Informal Introduction to Python This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 2. Using the Python Interpreter | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:39
https://docs.suprsend.com/docs/python-create-user-profile
Manage Users - SuprSend, Notification infrastructure for Product teams Skip to main content SuprSend, Notification infrastructure for Product teams home page Search... ⌘ K Community Trust Center Platform Status Postman Collection Developer Resources Overview Updates and Versioning Versioning and Support Policy SDK Changelog Authentication API Keys and Secrets Service Token Best Practices for Key & Token Management MCP Overview BETA Quickstart Tool List Building with LLMs Security Security SDKs and APIs SDKs SDK Overview SuprSend Backend SDK Python SDK Integrate Python SDK Manage Users Objects Send and Track Events Trigger Workflow from API Tenants Lists Broadcast Node.js SDK Java SDK Go SDK SuprSend Client SDK Management API REST API Postman Collection Features Validate Trigger Payload Type Safety Testing Testing the Template Test Mode Monitoring and Logging Logs Data Out Contact Us Get Started SuprSend, Notification infrastructure for Product teams home page Search... ⌘ K Ask AI Contact Us Get Started Get Started Search... Navigation Python SDK Manage Users Documentation API Reference Management API CLI Reference Developer Resources Changelog Documentation API Reference Management API CLI Reference Developer Resources Changelog Python SDK Manage Users OpenAI Open in ChatGPT Create, update, & manage user profiles and communication channels using Python SDK methods. OpenAI Open in ChatGPT ​ How Suprsend identifies a user SuprSend identifies users with immutable distinct_id . It’s best to map the same identifier in your DB with distinct_id in SuprSend. Do not use identifiers that can be changed like email or phone number. You can view synced users by searching distinct_id on Users page . ​ Create User To create a new user or to update an existing user, you’ll have to fetch user instance. Call supr_client.user.get_instance to instantiate user object. Copy Ask AI import suprsend supr_client = suprsend.Suprsend( "workspace_key" , "workspace_secret" ) distinct_id = "distinct_id" # Unique identifier of user in your application # Instantiate User profile user = supr_client.users.get_edit_instance(distinct_id) ​ Edit User To Edit user, you need to first fetch user instance, call all the update methods and save changes using users.async_edit method. Request Response Copy Ask AI #Fetch user instance user = supr_client.users.get_edit_instance( "_distinct_id_" ) #Call user update methods user.set_timezone( "America/Los_Angeles" ) user.set( "name" , "John Doe" ) #Save Changes res = supr_client.users.async_edit(user) print (res) Here’s a list of all edit methods: Add User Channels Add communication channels on which you want to notify user. Push sand Inbox tokens are automatically tracked on user identification when the corresponding frontend SDK is integrated. Other channels (Email, SMS, Slack, MS teams, WhatsApp) need to be explicitly set in user profile. Use user.add_* method(s) to add user channels. python Copy Ask AI # Add channel details to user-instance. Call relevant add_* methods user.add_email( " [email protected] " ) # - To add Email user.add_sms( "+15555555555" ) # - To add SMS user.add_whatsapp( "+15555555555" ) # - To add WhatsApp user.add_androidpush( "__android_push_fcm_token__" ) user.add_iospush( "__iospush_token__" ) # - To add Slack using email user.add_slack( { "email" : " [email protected] " , "access_token" : "xoxb-XXXXXXXX" }) # - To add Slack if slack member_id is known user.add_slack( { "user_id" : "U03XXXXXXXX" , "access_token" : "xoxb-XXXXXXXX" }) # - To add Slack channel user.add_slack( { "channel_id" : "CXXXXXXXX" , "access_token" : "xoxb-XXXXXXXX" }) # - To add Slack incoming webhook user.add_slack( { "incoming_webhook" : { "url" : "https://hooks.slack.com/services/TXXXX/BXXXX/XXXXXXX" } }) # - To add MS teams user or channel using conversation_id user.add_ms_teams( { "tenant_id" : "c1981ab2-9aaf-xxxx-xxxx" , "service_url" : "https://smba.trafficmanager.net/amer" , "conversation_id" : "19:c1524d7c-a06f-456f-8abe-xxxx" }) # - To add MS teams user using user_id user.add_ms_teams( { "tenant_id" : "c1981ab2-9aaf-xxxx-xxxx" , "service_url" : "https://smba.trafficmanager.net/amer" , "user_id" : "29:1nsLcmJ2RKtYH6Cxxxx-xxxx" }) # - To add MS teams using incoming webhook user.add_ms_teams( { "incoming_webhook" : { "url" : "https://wnk1z.webhook.office.com/webhookb2/XXXXXXXXX" } }) Remove User Channels Use user.remove_* method(s) to remove channels. python Copy Ask AI # Remove channel details from user-instance. Call relevant remove_* methods user.remove_email( " [email protected] " ) user.remove_sms( "+15555555555" ) user.remove_whatsapp( "+15555555555" ) user.remove_androidpush( "__android_push_fcm_token__" ) user.remove_iospush( "__iospush_token__" ) # - To remove Slack email user.remove_slack( { "email" : " [email protected] " , "access_token" : "xoxb-XXXXXXXX" }) # - To remove Slack if slack member_id is known user.remove_slack( { "user_id" : "U03XXXXXXXX" , "access_token" : "xoxb-XXXXXXXX" }) # - To remove Slack channel user.remove_slack( { "channel_id" : "CXXXXXXXX" , "access_token" : "xoxb-XXXXXXXX" }) # - To remove Slack incoming webhook user.remove_slack( { "incoming_webhook" : { "url" : "https://hooks.slack.com/services/TXXXX/BXXXX/XXXXXXX" } }) # - To remove MS teams user or channel using conversation_id user.remove_ms_teams( { "tenant_id" : "c1981ab2-9aaf-xxxx-xxxx" , "service_url" : "https://smba.trafficmanager.net/amer" , "conversation_id" : "19:c1524d7c-a06f-456f-8abe-xxxx" }) # - To remove MS teams user using user_id user.remove_ms_teams( { "tenant_id" : "c1981ab2-9aaf-xxxx-xxxx" , "service_url" : "https://smba.trafficmanager.net/amer" , "user_id" : "29:1nsLcmJ2RKtYH6Cxxxx-xxxx" }) # - To remove MS teams using incoming webhook user.remove_ms_teams( { "incoming_webhook" : { "url" : "https://wnk1z.webhook.office.com/webhookb2/XXXXXXXXX" } }) Remove Channel types This method will delete/unset all values in specified channel for user (ex: remove all emails attached to user). python Copy Ask AI # --- To delete all emails associated with user user.unset( "$email" ) user.unset([ "$email" , "$sms" , "$whatsapp" ]) # Supported channel keys are: # $email, $whatsapp, $sms, $androidpush, $iospush, $webpush, $slack, $ms_teams Set Preferred language If you want to send notification in user’s preferred language, you can set it by passing  language code  in this method. This is useful especially for the applications which offer vernacular or multi-lingual support. Copy Ask AI user.set_preferred_language( "en" ) Set preferred timezone You can set timezone of user using this method. Value for timezone must be from amongst the  IANA timezones . Copy Ask AI user.set_timezone( "America/Los_Angeles" ) Set Set is used to add custom user properties. It is an upsert function, meaning any existing property value with the same key will be overwritten on subsequent updates. Copy Ask AI user.set(key, value) user.set( "name" , "John Doe" ) user.set({ key1: value1, key2: value2 }) user.set({ "name" : "John Doe" , "city" : "San Francisco" }) Set Once Works just like user.set, except it will not override already existing property values. This is useful for properties like first_login_date. Copy Ask AI user.set_once(key, value) user.set_once( "first_login" , "2021-11-02" ) user.set_once({ key1: value1, key2: value2 }) user.set_once({ "first_login" : "2021-11-02" , "signup_date" : "2021-11-02" }) Unset Unset is used to remove a property key. Copy Ask AI user.unset(key) user.unset( "name" ) user.unset([key1, key2]) user.unset([ "name" , "city" ]) Append This method will append a value to the array list. Copy Ask AI user.append(key, value) user.append( "played_games" , "game_1" ) user.append({ key1: value1, key2: value2 }) user.append({ "played_games" : "game_1" , "liked_games" : "game_2" }) Remove This method will remove a value from the array list. Copy Ask AI user.remove(key, value) user.remove( "played_games" , "game_1" ) user.remove({ key1: value1, key2: value2 }) user.remove({ "played_games" : "game_1" , "liked_games" : "game_2" }) Increment Increase or decrease integer values on consecutive action, like login count. To reduce a property, provide a negative number for the value. Copy Ask AI user.increment(key, value) user.increment( "login_count" , 1 ) user.increment({ key1: value1, key2: value2 }) user.increment({ "login_count" : 1 , "order_count" : 1 }) After calling add*/remove*/unset methods, don’t forget to call users.async_edit() since user edit is async update and the changes will be sent to SuprSend only after calling this method. ​ Bulk Update users Bulk operations use UPSERT to create or update users. There isn’t any limit on number-of-records that can be added to bulk_users instance. Use .append() on bulk_users instance to add however-many-records to call in bulk. Rate limit: 1000 requests per second. The SDK automatically chunks requests based on the size of the payload. So, you don’t need to worry about these rate limits while using bulk operations. Request Response Copy Ask AI # Create bulk instance bulk_ins = supr_client.users.get_bulk_edit_instance() # Prepare multiple users edit instance distinct_id1 = "__distinct_id1__" # User 1 u1 = supr_client.users.get_edit_instance(distinct_id1) u1.add_email( " [email protected] " ) distinct_id2 = "__distinct_id2__" # User 2 u2 = supr_client.users.get_edit_instance(distinct_id2) u2.add_email( " [email protected] " ) # Append users to the bulk instance bulk_ins.append(u1, u2) # ------- res = bulk_ins.save() print (res) Bulk API supported in SDK version 0.2.0 and above: Bulk API is supported in SuprSend python-sdk version 0.2.0 and above. If you are using an older version, please upgrade to the latest SDK version. ​ Get user details Request Response Copy Ask AI res = supr_client . users . get ( "_distinct_id_" ) print ( res ) ​ Delete user Request Response Copy Ask AI res = supr_client . users . delete ( "_distinct_id_" ) print ( res ) ​ Get list of objects subscribed by user You can pass optional query parameters - limit ,  before ,  after Request Response Copy Ask AI res = supr_client . users . get_objects_subscribed_to ( "_distinct_id_" , { "after" : "01JJW6HXXXXPB59ARDW85G0KN" , "limit" : 1 }) print ( res ) ​ Get lists subscribed by user You can pass optional query parameters - limit ,  before ,  after Request Response Copy Ask AI res = supr_client . users . get_lists_subscribed_to ( "_distinct_id_" , { "after" : "01JJW6HXXXXPB59ARDW85G0KN" , "limit" : 1 }) print ( res ) Was this page helpful? Yes No Suggest edits Raise issue Previous Objects Create, update, & manage objects and their subscriptions using Python SDK methods. Next ⌘ I x github linkedin youtube Powered by On this page How Suprsend identifies a user Create User Edit User Bulk Update users Get user details Delete user Get list of objects subscribed by user Get lists subscribed by user
2026-01-13T08:48:40
https://docs.python.org/tr/3/
3.14.2 Documentation Tema Otomatik Açık Koyu İndir Bu belgeleri indir Sürüme göre dokümanlar Python 3.15 (in development) Python 3.14 (stable) Python 3.13 (stable) Python 3.12 (security-fixes) Python 3.11 (security-fixes) Python 3.10 (security-fixes) Python 3.9 (EOL) Python 3.8 (EOL) Python 3.7 (EOL) Python 3.6 (EOL) Python 3.5 (EOL) Python 3.4 (EOL) Python 3.3 (EOL) Python 3.2 (EOL) Python 3.1 (EOL) Python 3.0 (EOL) Python 2.7 (EOL) Python 2.6 (EOL) Tüm sürümler Diğer kaynaklar PEP (Python Geliştirme Önerileri) Endeksi Başlangıç Kılavuzu Kitap Listesi İşitsel/Görsel Konuşmalar Python Geliştirici Rehberi Navigasyon dizin modülleri | Python » 3.14.2 Documentation » | Tema Otomatik Açık Koyu | Python 3.14.2 belgelendirmesi Hoş geldin! Bu sayfada, Python 3.14.2 için resmi dokümantasyonu bulabilirsin. Documentation sections: Python 3.14 sürümündeki yenilikler nelerdir? Or all "What's new" documents since Python 2.0 Öğretici Start here: a tour of Python's syntax and features Library reference Standard library and builtins Language reference Syntax and language elements Python setup and usage How to install, configure, and use Python Python NASIL'ları In-depth topic manuals Installing Python modules Third-party modules and PyPI.org Distributing Python modules Publishing modules for use by other people Extending and embedding For C/C++ programmers Python's C API C API reference SSS (Sıkça Sorulan Sorular) Frequently asked questions (with answers!) Deprecations Deprecated functionality Indices, glossary, and search: Global module index All modules and libraries General index All functions, classes, and terms Sözlük Terms explained Arama sayfası Search this documentation Complete table of contents Lists all sections and subsections Project information: Reporting issues Contributing to docs Dokümantasyonu indir History and license of Python Telif Hakkı Dokümantasyon hakkında İndir Bu belgeleri indir Sürüme göre dokümanlar Python 3.15 (in development) Python 3.14 (stable) Python 3.13 (stable) Python 3.12 (security-fixes) Python 3.11 (security-fixes) Python 3.10 (security-fixes) Python 3.9 (EOL) Python 3.8 (EOL) Python 3.7 (EOL) Python 3.6 (EOL) Python 3.5 (EOL) Python 3.4 (EOL) Python 3.3 (EOL) Python 3.2 (EOL) Python 3.1 (EOL) Python 3.0 (EOL) Python 2.7 (EOL) Python 2.6 (EOL) Tüm sürümler Diğer kaynaklar PEP (Python Geliştirme Önerileri) Endeksi Başlangıç Kılavuzu Kitap Listesi İşitsel/Görsel Konuşmalar Python Geliştirici Rehberi « Navigasyon dizin modülleri | Python » 3.14.2 Documentation » | Tema Otomatik Açık Koyu | © Telif Hakkı 2001 Python Software Foundation. Bu sayfa, Python Software Foundation License Version 2 kapsamında lisanslanmıştır. Dokümantasyondaki örnekler, tarifler ve diğer kodlar ek olarak Zero Clause BSD License kapsamında lisanslanmıştır. Daha fazla bilgi için Geçmiş ve Lisans bölümüne bakın. Python Software Foundation kâr amacı gütmeyen bir kuruluştur. Lütfen bağış yapın. En son Oca 13, 2026 (07:20 UTC) tarihinde güncellendi. Bir bug mı buldunuz ? Sphinx 8.2.3 ile oluşturuldu.
2026-01-13T08:48:40
https://webpack.js.org/
webpack Documentation Contribute Blog English 中文 한국어 Search bundle your assets scripts STATIC ASSETS .png .css .jpg .js MODULES WITH DEPENDENCIES .jpg .png .sass .sass .js .sass .cjs .hbs .js Write Your Code src/index.js Copy import bar from './bar.js' ; bar ( ) ; src/bar.js Copy export default function bar ( ) { // } Bundle It Without config or provide custom webpack.config.js Copy const path = require ( 'path' ) ; module . exports = { entry : './src/index.js' , output : { path : path . resolve ( __dirname , 'dist' ) , filename : 'bundle.js' , } , } ; page.html Copy <! DOCTYPE html > < html > < head > < meta charset = " utf-8 " /> ... </ head > < body > ... < script src = " dist/bundle.js " > </ script > </ body > </ html > Then run webpack on the command-line to create bundle.js . Awesome, isn't it? Let's dive in! Get Started quickly in our Guides section, or dig into the Concepts section for more high-level information on the core notions behind webpack. Support the Team Through contributions, donations, and sponsorship, you allow webpack to thrive. Your donations directly support office hours, continued enhancements, and most importantly, great documentation and learning material! Latest Sponsors       Platinum Sponsors       Gold Sponsors       Silver Sponsors       Bronze Sponsors       Backers       Get Started Comparison Privacy Policy Swag Store Awesome webpack Glossary Branding Discord Changelog
2026-01-13T08:48:40
https://openapi.tools/categories/domain-specific-languages
Domain-Specific Languages (DSLs) | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Domain-Specific Languages (DSLs) Writing YAML by hand is no fun, and maybe you don't want a GUI, so use a Domain Specific Language to write OpenAPI in your language of choice. Domain-Specific Languages (DSLs) There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://dev.to/t/communication/page/5
Communication Page 5 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # communication Follow Hide Tips for talking effectively with your children at every age. Create Post Older #communication posts 2 3 4 5 6 7 8 9 10 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu #LearnedToday: One month of #LearnedToday Daniel Zotti Daniel Zotti Daniel Zotti Follow Jul 29 '23 #LearnedToday: One month of #LearnedToday # learnedtoday # webdev # communication # socialmedia 2  reactions Comments Add Comment 2 min read Improve your messengers communication experience with these 7 small tips Alexey Kramin Alexey Kramin Alexey Kramin Follow Jun 22 '23 Improve your messengers communication experience with these 7 small tips # productivity # team # communication # management 14  reactions Comments 8  comments 3 min read Architectural documentation and communication Anders Tornblad Anders Tornblad Anders Tornblad Follow Jun 8 '23 Architectural documentation and communication # architecture # documentation # communication 1  reaction Comments 3  comments 12 min read How detailed should requirements be?🤔 akazah akazah akazah Follow May 25 '23 How detailed should requirements be?🤔 # softwareengineering # requirements # communication # productowner Comments Add Comment 3 min read Systems Thinking and Technical Debt Aman Agrawal Aman Agrawal Aman Agrawal Follow for Coolblue Apr 6 '23 Systems Thinking and Technical Debt # systemsthinking # communication # technicaldebt # models Comments Add Comment 8 min read 5 principles of effective communication with a team-lead romanwrites romanwrites romanwrites Follow Apr 3 '23 5 principles of effective communication with a team-lead # softskill # communication # teamlead Comments Add Comment 1 min read CRUD Routing with Sinatra Stephanie Sison Stephanie Sison Stephanie Sison Follow Feb 11 '23 CRUD Routing with Sinatra # communication # management # career # productivity 1  reaction Comments Add Comment 4 min read Unlock the Power of CSS - 10 Tricks to Get Started! Helitha Rupasinghe Helitha Rupasinghe Helitha Rupasinghe Follow Jan 14 '23 Unlock the Power of CSS - 10 Tricks to Get Started! # writing # communication # productivity 21  reactions Comments 1  comment 9 min read Source of most problems in projects? Miscommunication! Michał Żurakowski Michał Żurakowski Michał Żurakowski Follow for Emphie Nov 16 '22 Source of most problems in projects? Miscommunication! # devjournal # programming # communication # teamwork 5  reactions Comments Add Comment 4 min read Where do developers hang out in 2022? Salman Shaikh Salman Shaikh Salman Shaikh Follow Oct 28 '22 Where do developers hang out in 2022? # generaladvice # generalprogramming # communication # community 6  reactions Comments Add Comment 11 min read Asynchronous Communication for remote teams Olumide Akinremi Olumide Akinremi Olumide Akinremi Follow Aug 26 '22 Asynchronous Communication for remote teams # communication # remote 7  reactions Comments 1  comment 4 min read 5 types of decision-makers Matheus Gomes 👨‍💻 Matheus Gomes 👨‍💻 Matheus Gomes 👨‍💻 Follow Apr 28 '22 5 types of decision-makers # softskills # communication # decisionmakers 1  reaction Comments Add Comment 2 min read Communications in Remote Teams Svitla Systems Inc. Svitla Systems Inc. Svitla Systems Inc. Follow Apr 22 '22 Communications in Remote Teams # remote # communication # remoteteams # teamcommunication 4  reactions Comments 4  comments 11 min read Lots Of Thoughts But Can’t Verbalise? Here’s How To Jumpstart Your Expression Channel Seow Yan Yi Seow Yan Yi Seow Yan Yi Follow Mar 16 '22 Lots Of Thoughts But Can’t Verbalise? Here’s How To Jumpstart Your Expression Channel # communication # softskills # speaking # personaldevelopment 3  reactions Comments 1  comment 3 min read The 3 Step Approach To Make Initiating Conversations With Strangers Less Scary Seow Yan Yi Seow Yan Yi Seow Yan Yi Follow Mar 16 '22 The 3 Step Approach To Make Initiating Conversations With Strangers Less Scary # conversations # communication # softskills # personaldevelopment 4  reactions Comments Add Comment 4 min read Why More Knowledge Isn’t Making Your Conversations Interesting (And How Associations Can Help) Seow Yan Yi Seow Yan Yi Seow Yan Yi Follow Mar 16 '22 Why More Knowledge Isn’t Making Your Conversations Interesting (And How Associations Can Help) # communication # personaldevelopment # career # speaking 2  reactions Comments Add Comment 3 min read The Most Effective Way to Reach Your Users - Building the Omnichannel Michael Bogan Michael Bogan Michael Bogan Follow Mar 14 '22 The Most Effective Way to Reach Your Users - Building the Omnichannel # tutorial # webdev # communication # channels 5  reactions Comments Add Comment 5 min read S T A H P Nathan Kallman Nathan Kallman Nathan Kallman Follow Mar 11 '22 S T A H P # productivity # communication 11  reactions Comments 5  comments 2 min read Communication Skills and Coding Akash Nigam Akash Nigam Akash Nigam Follow Feb 28 '22 Communication Skills and Coding # communication # interaction 4  reactions Comments Add Comment 1 min read This email should have been a document rinaarts rinaarts rinaarts Follow Feb 19 '22 This email should have been a document # productivity # communication 3  reactions Comments 1  comment 10 min read These 5 Tips Will Improve Your Designer To Developer Communications Today heymichellemac heymichellemac heymichellemac Follow Feb 14 '22 These 5 Tips Will Improve Your Designer To Developer Communications Today # design # communication # team # guide 3  reactions Comments Add Comment 6 min read 5 types of communication a senior developer does Sandor Dargo Sandor Dargo Sandor Dargo Follow Feb 9 '22 5 types of communication a senior developer does # watercooler # career # communication # responsibilities 63  reactions Comments Add Comment 8 min read How to write an effective design document rinaarts rinaarts rinaarts Follow Jan 12 '22 How to write an effective design document # softwaredesign # writing # communication 6  reactions Comments Add Comment 9 min read Handle scope changes without coming across as a naysayer 🙌 Valentin Sawadski (he/him) Valentin Sawadski (he/him) Valentin Sawadski (he/him) Follow Dec 28 '21 Handle scope changes without coming across as a naysayer 🙌 # career # management # communication # softskills 4  reactions Comments Add Comment 2 min read Content Fatigue and How to Avoid It Lilly Lilly Lilly Follow for Contenda Mar 30 '23 Content Fatigue and How to Avoid It # contentcreation # teamwork # communication Comments Add Comment 3 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://docs.sui.io/guides/developer/getting-started/connect#view-the-smart-contract-code
Hello, World! | Sui Documentation Skip to main content Sui Documentation Guides Concepts Standards References Search Overview Getting Started Install Sui Install from Source Install from Binaries Configure a Sui Client Create a Sui Address Get SUI from Faucet Hello, World! Connect a Frontend Next Steps Sui Essentials Objects Packages Currencies and Tokens NFTs Cryptography Nautilus Advanced App Examples Dev Cheat Sheet Operator Guides SuiPlay0X1 🗳️ Book Office Hours → 💬 Join Discord → Getting Started Hello, World! On this page Hello, World! You'll build a "Hello, World!" program to learn the fundamentals of programming on Sui. You create programs on Sui by writing and deploying smart contracts to the network. The most basic unit of storage on Sui is an object . Other blockchains typically structure storage using key-value stores. Sui centers storage around objects with unique ID addresses on-chain. Every Sui smart contract is an object that manipulates other objects. Objects can be immutable or mutable: Immutable objects cannot be transferred, changed, or deleted. No one owns them and anyone can access them publicly. Mutable objects can be transferred, changed, and deleted. A Sui address can own them, or they can be shared for public access. Every object's unique ID and version number references it on-chain. Every transaction on the network takes objects as input, then reads, writes, and mutates the inputs to produce new or altered objects as output. Every object knows the hash of the transaction that produced it. When an object is modified by a transaction, the transaction's output writes the object's mutated contents to the same object ID but with a new version number. Sui has limits on the maximum transaction size (128KB) and number of objects (2,048) used in a transaction. For more information on limits, see Building Against Limits in The Move Book. What is Move? ​ Move is the programming language Sui uses to create smart contracts. It is platform agnostic and enables common libraries, tooling, and developer communities across blockchains with vastly different data and execution models. There are three ways to use Move in the context of Sui: Move packages, Move modules, and Move objects. A Sui Move package is also referred to as a Move smart contract. It is a set of Move bytecode published to the Sui network. It is immutable and cannot be changed or removed, however you can upgrade it. Upgrading creates a new version of the package object on-chain, leaving the original intact. All prior versions of a package still exist on-chain. Once you publish it, other packages can import and use the modules it provides. Anyone can view a package's contents and use a Sui Explorer to see how its logic manipulates other objects. Every Move package on Sui includes one or more Sui Move modules that define the package's interaction with on-chain objects. A module's name is always unique within the package that contains it. A Sui Move module governs a Sui Move object , which is typed data from a Sui Move package. Each Move object value is a struct with fields that can contain primitive types, such as integers and addresses, other objects, and non-object structs. Clone "Hello, World!" ​ Prerequisites Install the latest version of Sui . Configure the Sui client . Create a Sui address . Get SUI Testnet tokens . Download and install an IDE. The following are recommended, as they offer Move extensions: VSCode , corresponding Move extension Emacs , corresponding Move extension Vim , corresponding Move extension Zed , corresponding Move extension Alternatively, you can use the Move web IDE , which does not require a download. It does not support all functions necessary for this guide, however. Download and install Git . To demonstrate creating objects, packages, and how to build your first Sui application, start by cloning the "Hello, World!" example: $ git clone \ https://github.com/MystenLabs/sui-stack-hello-world.git $ cd sui-stack-hello-world/move/hello-world In this project, there are two important files that define the package's logic, information, and its dependencies: move/hello-world/sources/greeting.move : Defines the package's logic. In this example, it defines a basic shared greeting object and public functions to interact with it. move/hello-world/Move.toml : The package's configuration file that defines the package name, dependencies, and addresses. Click to open move/hello-world/Move.toml File not found in manifest: move/hello-world/Move.toml . You probably need to run `pnpm prebuild` and restart the site. View the smart contract code ​ Open the greeting.move file in your IDE of choice. You can see the following Move code: File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Code explanation ​ First, this code defines a module called greeting : module hello_world :: greeting { use std :: string ; ... } Then, it defines a public struct called Greeting that contains a unique object ID and text. A struct is a type of resource : File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Then, it defines the function new that makes an API call to the Greeting struct and initializes it with the text "Hello world!" , storing it in a new shared object: File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Lastly, the package defines a function called update_text that can be called to update the text stored in Greeting : File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Resource safety ​ A unique aspect of programming applications on Sui is the resource safety enforced by the Move Bytecode Verifier. Move packages must satisfy the following resource safety parameters: All resources must be either moved into global storage or destroyed by the end of a transaction. Resources cannot be copied. In the "Hello, World!" example, the struct Greeting is a resource type. To satisfy the requirement that all resources must be moved or destroyed by the end of a transaction, Greeting is assigned to new_greeting , which the call to transfer::share_object(new_greeting) then moves into global storage. To mutate Greeting , the function update_text takes the input (&mut Greeting) rather than the resource itself. This function satisfies resource safety as the function does not copy the resource and mutates it via a reference. Learn more about the Move Bytecode Verifier. How does this differ from EVM applications? ​ The Ethereum Virtual Machine adopts a gas-based resource safety strategy. Every opcode on an EVM chain has an associated gas price that makes transactions costly, preventing the network from running a single transaction indefinitely. Build the Move package ​ Before you can publish a Move package to the network, you must first build it. Building your package is necessary because the .move source file is a human-readable piece of code, while the network can only understand bytecode. To build your "Hello, World!" package, first confirm your working directory is ~/sui-stack-hello-world/move/hello-world , then run the following command: $ sui move build The build process fetches and compiles the dependencies defined in the Move.toml file. The Move compiler checks your .move code for type errors, syntax errors, and enforces resource safety , then translates your .move code into bytecode that Sui can execute. info You must build your package before you can publish it, but also before you test it. You cannot run tests ( sui move test ) on your code until it has been built. Publish the Move package ​ Now that your package has been built, you need to publish it. After you publish it, other packages and users can use the package's modules and functions by making calls to the package ID. First, confirm your client is configured to use Testnet as the active environment: $ sui client active-env This should return testnet . If it does not return testnet , follow the client configuration instructions before continuing. Then, check your balance of SUI tokens to confirm you have enough to publish to Testnet: $ sui client balance You should have a balance of SUI tokens: ╭────────────────────────────────────────────╮ │ Balance of coins owned by this address │ ├────────────────────────────────────────────┤ │ ╭────────────────────────────────────────╮ │ │ │ coin balance (raw) balance │ │ │ ├────────────────────────────────────────┤ │ │ │ Sui 56804696124 0.50 SUI │ │ │ ╰────────────────────────────────────────╯ │ ╰────────────────────────────────────────────╯ If you do not have a balance, follow the SUI faucet instructions . Now, publish the package to Testnet with the command: $ sui client publish Click to open Output Transaction Digest: 8R39iKKLGPDG3QkW2SrRW3QX71csRP2BLhK9H7oz9SwW ╭──────────────────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Transaction Data │ ├──────────────────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Sender: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ Gas Owner: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ Gas Budget: 9843200 MIST │ │ Gas Price: 1000 MIST │ │ Gas Payment: │ │ ┌── │ │ │ ID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Version: 591332925 │ │ │ Digest: FLC4NXntT7WiHcqCkpDuBUq14DFTfi3EFeUiJcSNHdPu │ │ └── │ │ │ │ Transaction Kind: Programmable │ │ ╭──────────────────────────────────────────────────────────────────────────────────────────────────────────╮ │ │ │ Input Objects │ │ │ ├──────────────────────────────────────────────────────────────────────────────────────────────────────────┤ │ │ │ 0 Pure Arg: Type: address, Value: "0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803" │ │ │ ╰──────────────────────────────────────────────────────────────────────────────────────────────────────────╯ │ │ ╭─────────────────────────────────────────────────────────────────────────╮ │ │ │ Commands │ │ │ ├─────────────────────────────────────────────────────────────────────────┤ │ │ │ 0 Publish: │ │ │ │ ┌ │ │ │ │ │ Dependencies: │ │ │ │ │ 0x0000000000000000000000000000000000000000000000000000000000000001 │ │ │ │ │ 0x0000000000000000000000000000000000000000000000000000000000000002 │ │ │ │ └ │ │ │ │ │ │ │ │ 1 TransferObjects: │ │ │ │ ┌ │ │ │ │ │ Arguments: │ │ │ │ │ Result 0 │ │ │ │ │ Address: Input 0 │ │ │ │ └ │ │ │ ╰─────────────────────────────────────────────────────────────────────────╯ │ │ │ │ Signatures: │ │ mUxqMIofPq+yIzPxxYM+2mSIPTFneDxhWGGxJ7tM02hnRBRy5/FosnnWKxd4OSAjmaw6FNylwVdqUoUlJSxWCQ== │ │ │ ╰──────────────────────────────────────────────────────────────────────────────────────────────────────────────╯ ╭───────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Transaction Effects │ ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Digest: 8R39iKKLGPDG3QkW2SrRW3QX71csRP2BLhK9H7oz9SwW │ │ Status: Success │ │ Executed Epoch: 875 │ │ │ │ Created Objects: │ │ ┌── │ │ │ ID: 0x136e41f505888066f189fb823d710ec96ab4fd75144b3d8008b91d58de85fd12 │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ Version: 591332926 │ │ │ Digest: BGfc1tihsYPTLLozrj58HmRkDeQ1DWZfqeaR4SZDb1cX │ │ └── │ │ ┌── │ │ │ ID: 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1 │ │ │ Owner: Immutable │ │ │ Version: 1 │ │ │ Digest: EtGAG9RHHCsguX4iuX1cbRDvW4QAkJXgDCMJjiufHtxB │ │ └── │ │ Mutated Objects: │ │ ┌── │ │ │ ID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ Version: 591332926 │ │ │ Digest: CiU5KNZALUmuckc2YUFmJq5YXgbB8oG3rs4cnh2rdDXd │ │ └── │ │ Gas Object: │ │ ┌── │ │ │ ID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ Version: 591332926 │ │ │ Digest: CiU5KNZALUmuckc2YUFmJq5YXgbB8oG3rs4cnh2rdDXd │ │ └── │ │ Gas Cost Summary: │ │ Storage Cost: 7843200 MIST │ │ Computation Cost: 1000000 MIST │ │ Storage Rebate: 978120 MIST │ │ Non-refundable Storage Fee: 9880 MIST │ │ │ │ Transaction Dependencies: │ │ 2dkJtqsoQcyCZJvjZnskNVPQeynwVtwCcA9goAru6tTi │ │ 7PStztXyh92keJmrDD1aghHaKVdgCoVkVx4ZmLUfmQeK │ │ Dd9pn1zFcSJjinxQewFd2gQdR4XKsHxFioD5MYnwLZQz │ ╰───────────────────────────────────────────────────────────────────────────────────────────────────╯ ╭─────────────────────────────╮ │ No transaction block events │ ╰─────────────────────────────╯ ╭──────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Object Changes │ ├──────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Created Objects: │ │ ┌── │ │ │ ObjectID: 0x136e41f505888066f189fb823d710ec96ab4fd75144b3d8008b91d58de85fd12 │ │ │ Sender: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ ObjectType: 0x2::package::UpgradeCap │ │ │ Version: 591332926 │ │ │ Digest: BGfc1tihsYPTLLozrj58HmRkDeQ1DWZfqeaR4SZDb1cX │ │ └── │ │ Mutated Objects: │ │ ┌── │ │ │ ObjectID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Sender: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ ObjectType: 0x2::coin::Coin<0x2::sui::SUI> │ │ │ Version: 591332926 │ │ │ Digest: CiU5KNZALUmuckc2YUFmJq5YXgbB8oG3rs4cnh2rdDXd │ │ └── │ │ Published Objects: │ │ ┌── │ │ │ PackageID: 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1 │ │ │ Version: 1 │ │ │ Digest: EtGAG9RHHCsguX4iuX1cbRDvW4QAkJXgDCMJjiufHtxB │ │ │ Modules: greeting │ │ └── │ ╰──────────────────────────────────────────────────────────────────────────────────────────────────╯ ╭───────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Balance Changes │ ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ ┌── │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ CoinType: 0x2::sui::SUI │ │ │ Amount: -7865080 │ │ └── │ ╰───────────────────────────────────────────────────────────────────────────────────────────────────╯ When you publish a Move package to the network, the network uploads and stores the bytecode as a Move package with a unique package ID and version number. The network consumes SUI tokens as gas and processes the transaction on-chain. After successfully executing, the output provides details about the transaction used to publish the package, including the gas cost, transaction digest, dependencies, owner, and sender. For this guide, the most important section is Published Objects , which includes the package's ID, version, and its modules: │ Published Objects: │ │ ┌── │ │ │ PackageID: 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1 │ │ │ Version: 1 │ │ │ Digest: EtGAG9RHHCsguX4iuX1cbRDvW4QAkJXgDCMJjiufHtxB │ │ │ Modules: greeting │ │ └── Both the package ID and module are required to interact with the package from the command line. Take note of both values for future use in the Connecting a Frontend guide. Interact with the Move package ​ Interact with the newly published package by first making a call to the new function that creates a new Greeting object and initialize it with the text "Hello world!" : $ sui client call --package <PACKAGE_ID> --module greeting --function new Replace <PACKAGE_ID> with the package ID the output of the sui client publish command returned. You must include the --package , --module , and --function flags. The output of this call includes a newly created object: ╭───────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Transaction Effects │ ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Digest: 6xB9Foy5vyhXG99xppaCxrNvpPTV3UZsH39zqUKNoGsD │ │ Status: Success │ │ Executed Epoch: 875 │ │ │ │ Created Objects: │ │ ┌── │ │ │ ID: 0x2834aa3d2ed1b5060f4e5d400092544fa9c95430fd894b139b7dfb0312501594 │ │ │ Owner: Shared( 591332927 ) │ │ │ Version: 591332927 │ │ │ Digest: 8xJRijHHp3gNXLExTG98KX5jYAQDVKqsBD8ATFMJXCbA │ │ └── ... To verify that the object contains the text "Hello world!" , make a call to query the object's information: $ sui client object <OBJECT_ID> Replace <OBJECT_ID> with the value under Created Objects, ID: . You should see the object's details, including a value of text: Hello world! : ╭───────────────┬──────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮ │ objectId │ 0x2834aa3d2ed1b5060f4e5d400092544fa9c95430fd894b139b7dfb0312501594 │ │ version │ 591332927 │ │ digest │ 8xJRijHHp3gNXLExTG98KX5jYAQDVKqsBD8ATFMJXCbA │ │ objType │ 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1::greeting::Greeting │ │ owner │ ╭────────┬──────────────────────────────────────────╮ │ │ │ │ Shared │ ╭────────────────────────┬─────────────╮ │ │ │ │ │ │ │ initial_shared_version │ 591332927 │ │ │ │ │ │ │ ╰────────────────────────┴─────────────╯ │ │ │ │ ╰────────┴──────────────────────────────────────────╯ │ │ prevTx │ 6xB9Foy5vyhXG99xppaCxrNvpPTV3UZsH39zqUKNoGsD │ │ storageRebate │ 1413600 │ │ content │ ╭───────────────────┬──────────────────────────────────────────────────────────────────────────────────────────╮ │ │ │ │ dataType │ moveObject │ │ │ │ │ type │ 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1::greeting::Greeting │ │ │ │ │ hasPublicTransfer │ false │ │ │ │ │ fields │ ╭──────┬───────────────────────────────────────────────────────────────────────────────╮ │ │ │ │ │ │ │ id │ ╭────┬──────────────────────────────────────────────────────────────────────╮ │ │ │ │ │ │ │ │ │ │ id │ 0x2834aa3d2ed1b5060f4e5d400092544fa9c95430fd894b139b7dfb0312501594 │ │ │ │ │ │ │ │ │ │ ╰────┴──────────────────────────────────────────────────────────────────────╯ │ │ │ │ │ │ │ │ text │ Hello world! │ │ │ │ │ │ │ ╰──────┴───────────────────────────────────────────────────────────────────────────────╯ │ │ │ │ ╰───────────────────┴──────────────────────────────────────────────────────────────────────────────────────────╯ │ ╰───────────────┴──────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯ Important transaction considerations ​ You cannot send 2 or more transactions simultaneously, otherwise you encounter an error such as: Failed to sign transaction by a quorum of validators because one or more of its objects is reserved for another transaction. If you receive this error, you must wait until the current epoch is over before submitting your transaction again. You can see how long is left in the current epoch using Sui Explorer or another network explorer like SuiScan . To prevent the same object from being modified by multiple transactions at once, your address 'locks' the object to prevent conflicting modifications. If you'd like to batch multiple transaction commands together, you can use programmable transaction blocks . Transactions also have limitations regarding total size, number of objects, and number of inputs. Learn more about limitations in Building Against Limits in The Move Book. Next steps Create a Full Stack dApp Connect a frontend interface to your "Hello, World!" smart contract. Access Sui Data Learn more about accessing data on Sui. Join the Community Join the Sui developer community, try out other example projects, or read more documentation. Edit this page What is Move? Clone "Hello, World!" View the smart contract code Code explanation Resource safety Build the Move package Publish the Move package Interact with the Move package Important transaction considerations © 2026 Sui Foundation | Documentation distributed under CC BY 4.0
2026-01-13T08:48:40
https://dev.to/t/learninpublic
Learninpublic - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # learninpublic Follow Hide Create Post Older #learninpublic posts 1 2 3 4 5 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu HTML-101 #5. Text Formatting, Quotes & Code Formatting Himanshu Bhatt Himanshu Bhatt Himanshu Bhatt Follow Jan 11 HTML-101 #5. Text Formatting, Quotes & Code Formatting # html # learninpublic # beginners # tutorial 5  reactions Comments Add Comment 5 min read Learnings from 2026 January 3-9 Gee-Wey Yue Gee-Wey Yue Gee-Wey Yue Follow Jan 9 Learnings from 2026 January 3-9 # learninpublic Comments Add Comment 2 min read Day 1 with Docker Chandra Shekar Chandra Shekar Chandra Shekar Follow Dec 22 '25 Day 1 with Docker # devops # docker # learninpublic # learning Comments Add Comment 1 min read From Non-CS to Full-Stack AI Engineer: My Learning in Public Roadmap Arham Ghori Arham Ghori Arham Ghori Follow Nov 25 '25 From Non-CS to Full-Stack AI Engineer: My Learning in Public Roadmap # learninpublic # learning # beginners # career 1  reaction Comments Add Comment 3 min read 🚀 Starting My MERN Journey Ganesh Gaikwad Ganesh Gaikwad Ganesh Gaikwad Follow Oct 6 '25 🚀 Starting My MERN Journey # webdev # mern # beginners # learninpublic Comments Add Comment 1 min read Day 2 of My Golang Journey Kshitij Jain Kshitij Jain Kshitij Jain Follow Sep 8 '25 Day 2 of My Golang Journey # go # learninpublic # programming # buildinpublic 1  reaction Comments Add Comment 1 min read Week 9: DevOps Meets Cloud – AWS Skills for Modern Engineering Dev Dave Dev Dave Dev Dave Follow Aug 16 '25 Week 9: DevOps Meets Cloud – AWS Skills for Modern Engineering # devops # aws # cloud # learninpublic Comments Add Comment 1 min read OOPS - JAVA (Part A) Abhijeet Vishwakarma Abhijeet Vishwakarma Abhijeet Vishwakarma Follow Jul 3 '25 OOPS - JAVA (Part A) # programming # java # learninpublic # dsa Comments Add Comment 3 min read Escaping Tutorial Hell: I’m Building My Own Blog from Scratch This Summer - Join Me! Sourav Yadav Sourav Yadav Sourav Yadav Follow May 30 '25 Escaping Tutorial Hell: I’m Building My Own Blog from Scratch This Summer - Join Me! # webdev # learning # learninpublic # devchallenge 12  reactions Comments 15  comments 1 min read My Journey Learning CSS - Types-Inline, Internal, External 🚀 (Day-7) Angshuman Angshuman Angshuman Follow Feb 4 '25 My Journey Learning CSS - Types-Inline, Internal, External 🚀 (Day-7) # learninpublic # webdev # programming # beginners 1  reaction Comments Add Comment 2 min read React Reloaded: My Journey from JSX to Component Synergy 🚀 mayowa-kalejaiye mayowa-kalejaiye mayowa-kalejaiye Follow Dec 23 '24 React Reloaded: My Journey from JSX to Component Synergy 🚀 # learninpublic # react # webdev # codingjourney 3  reactions Comments Add Comment 2 min read DevOps Journey: Week 2 - Learning Git & Version Control Arjun Sonani Arjun Sonani Arjun Sonani Follow Oct 17 '24 DevOps Journey: Week 2 - Learning Git & Version Control # devops # git # linux # learninpublic Comments Add Comment 2 min read Starting My DevOps Journey: Week 1 - Linux Fundamentals 🚀 Arjun Sonani Arjun Sonani Arjun Sonani Follow Oct 8 '24 Starting My DevOps Journey: Week 1 - Linux Fundamentals 🚀 # devops # linux # learninpublic 1  reaction Comments Add Comment 1 min read 100 days of code challenge Harshit Sethi Harshit Sethi Harshit Sethi Follow Jun 12 '24 100 days of code challenge # 100daysofcode # leetcode # dsa # learninpublic Comments Add Comment 1 min read Coding Out Loud: Why I'm Choosing to "Learn in Public" Julia Alexis Diaz Julia Alexis Diaz Julia Alexis Diaz Follow Mar 28 '24 Coding Out Loud: Why I'm Choosing to "Learn in Public" # learninpublic # codenewbie # virtualcoffee # beginners 16  reactions Comments 15  comments 4 min read 1732. Find the Highest Altitude Tahzib Mahmud Rifat Tahzib Mahmud Rifat Tahzib Mahmud Rifat Follow Mar 6 '24 1732. Find the Highest Altitude # dsa # java # leetcode # learninpublic Comments Add Comment 1 min read Being a Developer Advocate: Half a Year Review Johannes Dienst Johannes Dienst Johannes Dienst Follow Jun 30 '23 Being a Developer Advocate: Half a Year Review # devrel # learning # learninpublic Comments Add Comment 2 min read Being a Developer Advocate: Week 36 Johannes Dienst Johannes Dienst Johannes Dienst Follow Jun 2 '23 Being a Developer Advocate: Week 36 # devrel # learninpublic 2  reactions Comments Add Comment 1 min read How to learn in public Rizèl Scarlett Rizèl Scarlett Rizèl Scarlett Follow Dec 18 '22 How to learn in public # learninpublic # career # leadership # community 154  reactions Comments 18  comments 12 min read Repurposing Content for Content Creation Nick Taylor Nick Taylor Nick Taylor Follow Oct 16 '22 Repurposing Content for Content Creation # learninpublic # podcast # contentcreation 18  reactions Comments 4  comments 2 min read Do you stream on Twitch, YouTube or elsewhere? Nick Taylor Nick Taylor Nick Taylor Follow Sep 21 '22 Do you stream on Twitch, YouTube or elsewhere? # discuss # twitch # youtube # learninpublic 58  reactions Comments 20  comments 1 min read First Week as a Developer Advocate Johannes Dienst Johannes Dienst Johannes Dienst Follow Sep 9 '22 First Week as a Developer Advocate # devrel # learninpublic 4  reactions Comments Add Comment 1 min read Como a comunidade brasileira utiliza o twitter para aprender em público Pablo Jonatan Pablo Jonatan Pablo Jonatan Follow Feb 24 '22 Como a comunidade brasileira utiliza o twitter para aprender em público # learninpublic # opensource # programming # braziliandevs 23  reactions Comments 2  comments 5 min read Learn in Public: WCAG Principles & Guidelines Part 2 Byonca H. Byonca H. Byonca H. Follow Feb 22 '22 Learn in Public: WCAG Principles & Guidelines Part 2 # a11y # learninpublic # cnc2022 # wcag 3  reactions Comments 1  comment 2 min read A blog post about blogging Jelle Smeets Jelle Smeets Jelle Smeets Follow Oct 5 '21 A blog post about blogging # beginners # meta # learninpublic # learning 8  reactions Comments Add Comment 4 min read loading... trending guides/resources Day 1 with Docker From Non-CS to Full-Stack AI Engineer: My Learning in Public Roadmap Learnings from 2026 January 3-9 HTML-101 #5. Text Formatting, Quotes & Code Formatting 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://openapi.tools/categories/http-clients
HTTP Clients | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . HTTP Clients Tools and libraries for making HTTP requests to APIs usually with a fancy GUI experience. HTTP Clients * * *
2026-01-13T08:48:40
https://share.transistor.fm/s/7632eec5#copya
APIs You Won't Hate | All About the API Specifications Conference APIs You Won't Hate 40 ? 30 : 10)" @keyup.document.left="seekBySeconds(-10)" @keyup.document.m="toggleMute" @keyup.document.s="toggleSpeed" @play="play(false, true)" @loadedmetadata="handleLoadedMetadata" @pause="pause(true)" preload="none" @timejump.window="seekToSeconds($event.detail.timestamp); shareTimeFormatted = formatTime($event.detail.timestamp)" > Trailer Bonus 10 40 ? 30 : 10)" class="seek-seconds-button" > 40 ? 30 : 10"> Subscribe Share More Info Download More episodes Subscribe newValue ? setTimeout(() => copied = false, 2500) : null)" @click="copied = copyFeedUrl()" class="form-input-group" > Copied to clipboard Apple Podcasts Spotify Pocket Casts Overcast Castro YouTube Goodpods Goodpods Metacast Amazon Music Pandora CastBox Anghami Anghami Fountain JioSaavn Gaana iHeartRadio TuneIn TuneIn Player FM SoundCloud SoundCloud Deezer Podcast Addict Share newValue ? setTimeout(() => copied = false, 2500) : null)" @click="copied = copyShareUrl()" class="form-input-group" > Share Copied to clipboard newValue ? setTimeout(() => copied = false, 2500) : null)" @click="copied = copyEmbedHtml()" class="form-input-group" > Embed Copied to clipboard Start at Trailer Bonus Full Transcript View the website updateDescriptionLinks($el))" class="episode-description" > Chapters June 2, 2021 by APIs You Won't Hate View the website Listen On Apple Podcasts Listen On Spotify Listen On YouTube RSS Feed Subscribe RSS Feed RSS Feed URL Copied! Follow Episode Details Matt is joined by Taylor and Kin, organizers of the API Specification Conference to talk about the conference! Show Notes Matt is joined by Taylor ( @taylor_atx ) and Kin ( @apievangelist ) to talk about the API Specifications Conference (ASC). We talked about how the conference is shaping up, the kinds of talks they are hoping to put forward in the program, how it is organizing a conference under the Linux Foundation and how can you get involved with such an important, yet very niche, topic in our community. Notes: @apispecs on twitter ASC conference website Call For Papers Conference Sponsorship Information Creators and Guests Host Mike Bifulco Cofounder and host of APIs You Won't Hate. Blogs at https://mikebifulco.com Into 🚴‍♀️, espresso ☕, looking after 🌍. ex @Stripe @Google @Microsoft What is APIs You Won't Hate? A no-nonsense (well, some-nonsense) podcast about API design & development, new features in the world of HTTP, service-orientated architecture, microservices, and probably bikes. All audio, artwork, episode descriptions and notes are property of APIs You Won't Hate, for APIs You Won't Hate, and published with permission by Transistor, Inc. Broadcast by
2026-01-13T08:48:40
https://dev.to/t/ai/page/4
Artificial Intelligence Page 4 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Artificial Intelligence Follow Hide Artificial intelligence leverages computers and machines to mimic the problem-solving and decision-making capabilities found in humans and in nature. Create Post submission guidelines Posts about artificial intelligence. Older #ai posts 1 2 3 4 5 6 7 8 9 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu dots-ocr: Open-Source OCR Outperforms Giants for Multilingual Automation Dr Hernani Costa Dr Hernani Costa Dr Hernani Costa Follow Jan 12 dots-ocr: Open-Source OCR Outperforms Giants for Multilingual Automation # ai # automation # machinelearning # productivity Comments Add Comment 4 min read AI in Assistive Technologies for People with Visual Impairments Tatyana Bayramova, CPACC Tatyana Bayramova, CPACC Tatyana Bayramova, CPACC Follow Jan 12 AI in Assistive Technologies for People with Visual Impairments # discuss # a11y # ai # news 1  reaction Comments Add Comment 2 min read When Top Comments Meet AI Quant: A Journey Into Strategy Implementation fmzquant fmzquant fmzquant Follow Jan 13 When Top Comments Meet AI Quant: A Journey Into Strategy Implementation # ai # development # jellyfin # nocode Comments Add Comment 15 min read Building GeoAI Models: From Spatial Data to Actionable Insights Koushik Vishal Annamalai Koushik Vishal Annamalai Koushik Vishal Annamalai Follow Jan 12 Building GeoAI Models: From Spatial Data to Actionable Insights # ai # machinelearning # python # gis Comments Add Comment 5 min read How to Transcribe and Detect Intent Using Deepgram for STT: A Developer's Journey CallStack Tech CallStack Tech CallStack Tech Follow Jan 12 How to Transcribe and Detect Intent Using Deepgram for STT: A Developer's Journey # ai # voicetech # machinelearning # webdev 1  reaction Comments Add Comment 11 min read Run `gh` Command in Claude Code on the Web Oikon Oikon Oikon Follow Jan 12 Run `gh` Command in Claude Code on the Web # claudecode # claude # ai # coding Comments Add Comment 4 min read Why LLMs Are Bad at "First Try" and Great at Verification Shinsuke KAGAWA Shinsuke KAGAWA Shinsuke KAGAWA Follow Jan 12 Why LLMs Are Bad at "First Try" and Great at Verification # ai # llm # softwareengineering # promptengineering Comments Add Comment 6 min read From Web to Desktop: Building CodeForge Portable with WebView2 Francesco Marconi Francesco Marconi Francesco Marconi Follow Jan 12 From Web to Desktop: Building CodeForge Portable with WebView2 # webview2 # architecture # wpf # ai 1  reaction Comments Add Comment 6 min read When Tests Keep Passing, but Design Stops Moving Felix Asher Felix Asher Felix Asher Follow Jan 12 When Tests Keep Passing, but Design Stops Moving # tdd # ai # testing # softwareengineering Comments Add Comment 3 min read The Great Tune-Out: Why AI’s Perfect Illusions Might Save Us from Social Media Meg Rehn Meg Rehn Meg Rehn Follow Jan 13 The Great Tune-Out: Why AI’s Perfect Illusions Might Save Us from Social Media # discuss # ai # ethics # watercooler Comments Add Comment 4 min read Your AI Bills Tripled Last Month. Here's Why (And How to Fix It) Debby McKinney Debby McKinney Debby McKinney Follow Jan 12 Your AI Bills Tripled Last Month. Here's Why (And How to Fix It) # programming # ai # devops # software 3  reactions Comments 1  comment 5 min read Agentic Coding Tools Are Accelerating Output, Not Velocity Signadot Signadot Signadot Follow Jan 12 Agentic Coding Tools Are Accelerating Output, Not Velocity # ai # devops # kubernetes # productivity Comments Add Comment 5 min read learning complex coding Masood Ahmad Masood Ahmad Masood Ahmad Follow Jan 13 learning complex coding # programming # webdev # ai # beginners Comments Add Comment 1 min read From Writing Code to Teaching AI: The Rise of the AI-Assisted Developer Amit Shrivastava Amit Shrivastava Amit Shrivastava Follow Jan 12 From Writing Code to Teaching AI: The Rise of the AI-Assisted Developer # ai # aiinpractice # career # softwareengineering Comments Add Comment 3 min read Claude-Gemini Integration Tool "CGMB" v1.1.0: Implementing Windows Support ryoto miyake ryoto miyake ryoto miyake Follow Jan 12 Claude-Gemini Integration Tool "CGMB" v1.1.0: Implementing Windows Support # ai # gemini # llm # tooling Comments Add Comment 2 min read How I Built a Healthcare Job Board with 8,295+ Listings Using Next.js and Supabase Sathish Sathish Sathish Follow Jan 12 How I Built a Healthcare Job Board with 8,295+ Listings Using Next.js and Supabase # webdev # ai # buildinpublic # nextjs Comments Add Comment 1 min read Structural Logic in Prompt Engineering: Building an AI Grammar Teacher, Not Just a Checker FARAZ FARHAN FARAZ FARHAN FARAZ FARHAN Follow Jan 12 Structural Logic in Prompt Engineering: Building an AI Grammar Teacher, Not Just a Checker # ai # promptengineering # nlp # automation Comments Add Comment 4 min read Contextual Inference with Generative AI: Turning Messy Notes into Professional Meeting Minutes FARAZ FARHAN FARAZ FARHAN FARAZ FARHAN Follow Jan 12 Contextual Inference with Generative AI: Turning Messy Notes into Professional Meeting Minutes # ai # productivity # automation # promptengineering Comments Add Comment 4 min read I built a WASM execution firewall for AI agents — here’s why Xnfinite Xnfinite Xnfinite Follow Jan 10 I built a WASM execution firewall for AI agents — here’s why # discuss # typescript # rust # ai Comments Add Comment 2 min read 🚀 AI Article Summarizer | Fast & Clean AI-Powered Summary Tool Built with Next.js Reactjs Guru Reactjs Guru Reactjs Guru Follow Jan 12 🚀 AI Article Summarizer | Fast & Clean AI-Powered Summary Tool Built with Next.js # nextjs # ai # react # opensource Comments Add Comment 1 min read I built an AI tutor to learn GeoGuessr-style visual geography (not a solver) TunaDev TunaDev TunaDev Follow Jan 12 I built an AI tutor to learn GeoGuessr-style visual geography (not a solver) # showdev # ai # learning # opensource Comments Add Comment 1 min read A Deterministic PC Builder That Refuses to Guess — Powered by Algolia Agent Studio yuer yuer yuer Follow Jan 12 A Deterministic PC Builder That Refuses to Guess — Powered by Algolia Agent Studio # devchallenge # algoliachallenge # ai # agents Comments Add Comment 3 min read Building AI Agents in 2025: From ChatGPT to Multi-Agent Systems Muhammad Zulqarnain Akram Muhammad Zulqarnain Akram Muhammad Zulqarnain Akram Follow Jan 12 Building AI Agents in 2025: From ChatGPT to Multi-Agent Systems # ai # machinelearning # python # webdev Comments Add Comment 4 min read Debugging 5 Real-World Bugs: A Practical Walkthrough That Doesn't Include Console.log! Eleftheria Batsou Eleftheria Batsou Eleftheria Batsou Follow Jan 12 Debugging 5 Real-World Bugs: A Practical Walkthrough That Doesn't Include Console.log! # ai # debug # debugging # frontend 6  reactions Comments 1  comment 5 min read From 100+ Manual Edits to an AI Workflow: Mastering "People Removal" with Nano Banana 🍌 Xing Xiong Xing Xiong Xing Xiong Follow Jan 12 From 100+ Manual Edits to an AI Workflow: Mastering "People Removal" with Nano Banana 🍌 # showdev # ai # promptengineering # indiehackers Comments 1  comment 3 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:38
https://openapi.tools/categories/gateways
Gateways | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Gateways API Gateways and related tools that have integrated support for OpenAPI. Gateways There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://dev.to/t/communication/page/4
Communication Page 4 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # communication Follow Hide Tips for talking effectively with your children at every age. Create Post Older #communication posts 1 2 3 4 5 6 7 8 9 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu Improving Your Communication Strategy with AI in Business Texting James James James Follow May 8 '24 Improving Your Communication Strategy with AI in Business Texting # salesforce # smsapp # communication # ai Comments Add Comment 2 min read The Power of "Thanks" Björn Schmidt Björn Schmidt Björn Schmidt Follow May 9 '24 The Power of "Thanks" # leadership # praise # communication # teamwork 2  reactions Comments 2  comments 5 min read Prompt engineering is a dumb term Roel Roel Roel Follow May 24 '24 Prompt engineering is a dumb term # promptengineering # communication # ai 4  reactions Comments 3  comments 3 min read WebSockets Jayant Jayant Jayant Follow May 16 '24 WebSockets # nextjs # websockets # backendcommunication # communication 1  reaction Comments Add Comment 3 min read A Success Story: I Didn’t Get the Job Noemi Rozpara Noemi Rozpara Noemi Rozpara Follow May 6 '24 A Success Story: I Didn’t Get the Job # career # workplace # recruitment # communication 6  reactions Comments 2  comments 9 min read Death to the invincible engineer Juraj Malenica Juraj Malenica Juraj Malenica Follow Mar 20 '24 Death to the invincible engineer # productivity # vulnerability # communication # softwareengineering 62  reactions Comments 6  comments 7 min read Demystifying the Technical Writing Process: A Guide to Creating Clear and Effective Documentation Freda Victor Freda Victor Freda Victor Follow Mar 24 '24 Demystifying the Technical Writing Process: A Guide to Creating Clear and Effective Documentation # technicalwriting # communication # productivity Comments Add Comment 3 min read The Ultimate How-To Authorizing Xfinity for Seamless Streaming Mark John Mark John Mark John Follow Mar 9 '24 The Ultimate How-To Authorizing Xfinity for Seamless Streaming # communication Comments Add Comment 2 min read Shrink Your Meeting “Feedback Loops” Sean Killeen Sean Killeen Sean Killeen Follow Feb 27 '24 Shrink Your Meeting “Feedback Loops” # culture # meetings # communication # facilitation Comments Add Comment 1 min read Exploring the Homepage Canvas: A Guide to Strategic Website Planning Per Starke Per Starke Per Starke Follow Feb 21 '24 Exploring the Homepage Canvas: A Guide to Strategic Website Planning # webdev # websiteplan # communication # tooling 5  reactions Comments Add Comment 3 min read I Built a Tiny Tool for 1-on-1 Meeting Topics! Sean Killeen Sean Killeen Sean Killeen Follow Feb 16 '24 I Built a Tiny Tool for 1-on-1 Meeting Topics! # communication # leadership # automation # management Comments Add Comment 1 min read Angel Hack Community Builder's Programme 2024 Atul Kushwaha Atul Kushwaha Atul Kushwaha Follow Feb 10 '24 Angel Hack Community Builder's Programme 2024 # discuss # community # communication 3  reactions Comments 2  comments 2 min read 26 communication tips to advance your career in software George O. E. Campbell George O. E. Campbell George O. E. Campbell Follow Jan 25 '24 26 communication tips to advance your career in software # communication # career # softskills # software Comments Add Comment 6 min read understand short polling with example Ritu Raj Singh Ritu Raj Singh Ritu Raj Singh Follow Jan 23 '24 understand short polling with example # rookiebackend # client # server # communication Comments Add Comment 3 min read Show your working out Ben Selby Ben Selby Ben Selby Follow Jan 22 '24 Show your working out # newbie # communication # beginners # tutorial Comments Add Comment 2 min read Effective Asynchronous Communication Sibelius Seraphini Sibelius Seraphini Sibelius Seraphini Follow for Woovi Jan 11 '24 Effective Asynchronous Communication # async # communication # startup 11  reactions Comments 1  comment 4 min read Learning about Appreciative Inquiry Cosima Cosima Cosima Follow Dec 20 '23 Learning about Appreciative Inquiry # communication # teamwork # learning # agile Comments Add Comment 4 min read How Brainstory follows management principles Lilly Lilly Lilly Follow for Contenda Dec 20 '23 How Brainstory follows management principles # management # communication # organizational # psychology Comments Add Comment 1 min read Bridging Business and Software: Strategies for Success Krzysztof Sajna Krzysztof Sajna Krzysztof Sajna Follow Oct 30 '23 Bridging Business and Software: Strategies for Success # beginners # communication # business # sdlc 1  reaction Comments 1  comment 8 min read Resources for Writing Clearly Andy Andy Andy Follow Oct 7 '23 Resources for Writing Clearly # writing # communication # resources 1  reaction Comments Add Comment 2 min read How to communicate efficiently as software engineers Alessandro Diaferia Alessandro Diaferia Alessandro Diaferia Follow Sep 25 '23 How to communicate efficiently as software engineers # softwareengineering # agile # communication # leadership Comments Add Comment 6 min read Communication is key to success Bhuvaneswari Subramani Bhuvaneswari Subramani Bhuvaneswari Subramani Follow for AWS Heroes Sep 19 '23 Communication is key to success # communication # learning # leadership # beginners 1  reaction Comments Add Comment 2 min read Comunicação além das técnicas Morganna Morganna Morganna Follow Sep 15 '23 Comunicação além das técnicas # braziliandevs # devrel # communication # diversity 12  reactions Comments 4  comments 1 min read 5 Common Mistakes to avoid at First Client Call Redoan Adil Redoan Adil Redoan Adil Follow Sep 10 '23 5 Common Mistakes to avoid at First Client Call # career # communication # hacks # clientrelationships 1  reaction Comments Add Comment 2 min read Leveraging RxJS for Seamless Communication Between Components in Different Layouts in Next.js Lev Lev Lev Follow Aug 8 '23 Leveraging RxJS for Seamless Communication Between Components in Different Layouts in Next.js # nextjs # rxjs # communication # react Comments Add Comment 6 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://openapi.tools/categories/learning
Learning | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Learning Whether generating documentation for a third-party API based on traffic, or are trying to "catch up on design-first" at an organization with no OpenAPI at all, these "learning" (or traffic sniffing) tools can help you get there. Learning There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://openapi.tools/categories/ides
IDEs and GUI Editors | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . IDEs and GUI Editors Visual editors help you design APIs without needing to memorize the entire OpenAPI specification. IDEs and GUI Editors There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://aws.amazon.com/blogs/
AWS Blogs - Cloud news & innovation | Amazon Web Services (AWS) Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions AWS › AWS Blogs AWS Blogs Top announcements of AWS re:Invent 2025: Key breakthrough cloud innovations Explore major AWS innovations across AI, compute, infrastructure, security, analytics, and more.. From frontier AI models and intelligent agents to enhanced infrastructure solutions, learn how these key announcements can help you build, operate, and transform your business in the cloud. Read the post Introducing Amazon Nova Forge: Build your own frontier models using Nova Amazon Bedrock AgentCore adds quality evaluations and policy controls for deploying trusted AI agents New AWS Security Agent secures applications proactively from design to deployment (preview) Introducing AWS Transform custom: Crush tech debt with AI-powered code modernization Newest posts Filter Loading Loading Loading Loading Loading Loading Loading Loading Loading Loading Loading Loading Loading Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs & Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T08:48:40
https://openapi.tools/categories/monitoring
Monitoring | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Monitoring Monitoring tools let you know what is going on in your API. Monitoring There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://dev.to/t/communication/page/8
Communication Page 8 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # communication Follow Hide Tips for talking effectively with your children at every age. Create Post Older #communication posts 5 6 7 8 9 10 11 12 13 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu Essential Software for Working From Home QuanticDev QuanticDev QuanticDev Follow May 13 '20 Essential Software for Working From Home # workingfromhome # communication # collaboration 2  reactions Comments Add Comment 1 min read IPC between C# and C++ by using named pipes Josef Biehler Josef Biehler Josef Biehler Follow May 3 '20 IPC between C# and C++ by using named pipes # csharp # cpp # communication # network 29  reactions Comments 1  comment 4 min read How to effectively communicate with your clients? Muhammad Arslan Aslam Muhammad Arslan Aslam Muhammad Arslan Aslam Follow Apr 27 '20 How to effectively communicate with your clients? # discuss # freelancing # communication 2  reactions Comments Add Comment 1 min read How To Secure The Communication Of Your Remote Team Nikola Baldikov Nikola Baldikov Nikola Baldikov Follow Apr 22 '20 How To Secure The Communication Of Your Remote Team # Secure # Communication # remote # team 2  reactions Comments 1  comment 7 min read Public speaking in times of Covid19 Davide de Paolis Davide de Paolis Davide de Paolis Follow Apr 21 '20 Public speaking in times of Covid19 # publicspeaking # career # remotework # communication 6  reactions Comments Add Comment 4 min read Building solutions that fight back Pooja Mistry Pooja Mistry Pooja Mistry Follow for IBM Developer Apr 13 '20 Building solutions that fight back # tutorial # communication # webinar # development 5  reactions Comments Add Comment 5 min read Quarentou: E agora? Letícia Silva Letícia Silva Letícia Silva Follow Apr 12 '20 Quarentou: E agora? # homeoffice # agile # communication # relationship 36  reactions Comments 1  comment 15 min read Why we went from Slack to Discord Matteo Joliveau Matteo Joliveau Matteo Joliveau Follow for MIKAMAI Apr 9 '20 Why we went from Slack to Discord # remote # community # communication 24  reactions Comments 4  comments 6 min read Please be professional and stop saying "I'm almost done!" Davide de Paolis Davide de Paolis Davide de Paolis Follow Mar 30 '20 Please be professional and stop saying "I'm almost done!" # beginners # bestpractices # communication # career 165  reactions Comments 39  comments 6 min read 6 Tips to Solve Miscommunication in Dev Teams Sara Miteva Sara Miteva Sara Miteva Follow for Microtica Mar 23 '20 6 Tips to Solve Miscommunication in Dev Teams # communication # development # team 13  reactions Comments 2  comments 4 min read Non-Violent Code Reviews Niels Theen Niels Theen Niels Theen Follow Mar 21 '20 Non-Violent Code Reviews # codequality # review # communication 12  reactions Comments Add Comment 2 min read No fear of Videoconferencing Thomas Scharke Thomas Scharke Thomas Scharke Follow Mar 15 '20 No fear of Videoconferencing # communication # video # remote # people 6  reactions Comments 3  comments 2 min read Convention over Conversation Sam Jarman 👨🏼‍💻 Sam Jarman 👨🏼‍💻 Sam Jarman 👨🏼‍💻 Follow Mar 9 '20 Convention over Conversation # journey # teamwork # communication 7  reactions Comments Add Comment 5 min read Programming is a social activity, source code is communication Charles Szilagyi Charles Szilagyi Charles Szilagyi Follow Mar 3 '20 Programming is a social activity, source code is communication # programming # team # communication # productivity 5  reactions Comments Add Comment 2 min read Estimating software: How to deal with requests for estimates Barry O Sullivan Barry O Sullivan Barry O Sullivan Follow Mar 2 '20 Estimating software: How to deal with requests for estimates # estimates # productivity # communication 22  reactions Comments Add Comment 7 min read A Time without a Zone Josh Branchaud Josh Branchaud Josh Branchaud Follow Feb 28 '20 A Time without a Zone # communication # learninpublic 6  reactions Comments Add Comment 2 min read Dev Huddle: An agile ceremony for devs Gabrielle Duarte Gabrielle Duarte Gabrielle Duarte Follow Feb 26 '20 Dev Huddle: An agile ceremony for devs # agile # planning # communication # ceremony 33  reactions Comments 2  comments 4 min read Book Club: Communication and Metrics Edition Tanya Janca Tanya Janca Tanya Janca Follow Feb 18 '20 Book Club: Communication and Metrics Edition # social # tech # communication # metrics 17  reactions Comments 2  comments 5 min read Professional communication skills - Intro Xinran Wang Xinran Wang Xinran Wang Follow Feb 11 '20 Professional communication skills - Intro # career # communication # growth 62  reactions Comments 6  comments 2 min read How to Support Junior Developers Domenico Solazzo Domenico Solazzo Domenico Solazzo Follow Feb 9 '20 How to Support Junior Developers # discuss # mentoring # career # communication 40  reactions Comments 2  comments 5 min read Conference Talk: Technical Debt Must Die Matt Eland Matt Eland Matt Eland Follow for Pluralsight Feb 8 '20 Conference Talk: Technical Debt Must Die # techtalks # codequality # codemash # communication 62  reactions Comments 5  comments 1 min read Personas in Writing Matt Eland Matt Eland Matt Eland Follow Jan 31 '20 Personas in Writing # communication # writing # blogging 51  reactions Comments 1  comment 9 min read How to Weaponize Impostor Syndrome Matt Eland Matt Eland Matt Eland Follow Jan 22 '20 How to Weaponize Impostor Syndrome # career # communication # impostorsyndrome 149  reactions Comments 5  comments 6 min read What are ways to convey language- and framework-properties in a better way in teams? Thomas Scharke Thomas Scharke Thomas Scharke Follow Dec 29 '19 What are ways to convey language- and framework-properties in a better way in teams? # communication # codequality # agile # motivation 4  reactions Comments 1  comment 4 min read Defining Technical Debt Matt Eland Matt Eland Matt Eland Follow Dec 23 '19 Defining Technical Debt # techdebt # management # codequality # communication 112  reactions Comments 6  comments 6 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://parenting.forem.com/jess/international-travel-with-toddlers-car-seat-or-vest-considerations-p51
International Travel with Toddlers: Car Seat (or vest!) Considerations - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse Jess Lee Posted on Oct 14, 2025           International Travel with Toddlers: Car Seat (or vest!) Considerations # travel # gear After flying from the U.S. to Taiwan (twice) with my toddlers, I've become the go-to person for travel gear recs amongst my friends. Instead of sending the same lengthy text message over and over again, I figured I'd jot everything down in a series of posts for easy sharing. Obviously, every kid and journey is different but this series will give you a few things to can consider. No referral links or anything like that. Let's start with the biggest headache: car seats. Unless you're planning to car share everywhere (and even then), you need a solution. And no, you don't want to lug around your cushy at-home car seat, unless it's one of the ones I'm suggesting below: Option 1: Low Budget Traditional Car Seat - Cosco Scenara Next The Cosco Scenera Next is the lightest weight traditional car seat on the market. It's a bulky shape (like all car seats), but it's cheap and it works for both rear and front facing, so it'll last you a while. The link above might be for their older model. Option 2: The Packable Premium - Wayb Pico If you have the budget and want something that actually packs down, the Wayb Pico is the most packable car seat on the market. It's expensive, but if you're a frequent traveler, it might be worth the investment. Check it out at Wayb . I've seen kids strapped into these on short-haul flights and they seem great. I can't imagine keeping my kids in one of these flights for a 6+ hour flight, though. I've never had the pleasure of owning one but you should know about it as part of your research. Important note: this is only for kids who can front-face. Option 3: The Game Changer - RideSafer Travel Vest Here's what I actually recommend for kids old enough to understand instructions: the car seat vest. This thing passes all the same testing standards that regular car seats do, as long as your child stays in the right position and doesn't mess with the straps . For a kid who can follow directions and understands safety, this is ridiculously convenient and cheap. No lugging a giant plastic contraption through airports. Just a vest. Find it here . Rideshare or Car Rental? Since we did not rent a car in Taiwan and traveled via rideshare, we went with the travel vest for the older kid and cosco for the yougner kid. We only did this because I'd be with my kid in the backseat the entire time to monitor their straps. This is really important! We've done some domestic travel where we did rent a car and have had to buy a last minute car seat (the cosco one) because the 4yo would either fall asleep or slouch in the vest, putting them in an unsafe position. So now I own...two cosco seats and a travel vest. Car Seat Travel Bag If you go with a traditional car seat, you'll also want a car seat travel bag. Some airlines (depending on the airport) will provide a clear plastic bag for you but definitely don't bank on that. Here's the car seat travel bag we use, it's cheap and effective. Note: you can bring your car seat (not the vest) directly onto the plane to strap your kids into. I personally don't do this for long-haul flights because my kids would lose their minds, but it is the safest option for them while in-flight. A Word of Warning About International Cars Here's something nobody tells you: car safety standards vary wildly by country. In Taiwan, 99% of cars didn't have the ratcheting mechanism in the seat belt like they do in the U.S. Brand new Teslas didn't have them. So, if you're paranoid, you might want a car seat that supports lower anchors (both cosco and wayb do). Anyway, be sure to do your research on your destination country before you land so you know what to expect! Next Up My next post will be about gear you'll want while you're 30,000 feet in the air! Top comments (2) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Collapse Expand   Peter Kim Frank Peter Kim Frank Peter Kim Frank Follow Doing a bit of everything at DEV / Forem Email peter@dev.to Education Wesleyan University Pronouns He/Him Work Co-Founder Joined Jan 3, 2017 • Oct 15 '25 Dropdown menu Copy link Hide +1 for the Cosco. We normally just use the straps to hook the car seat directly to our stroller which works like a charm. Like comment: Like comment: 3  likes Like Comment button Reply Collapse Expand   Matt Figler Matt Figler Matt Figler Follow Joined Jun 22, 2017 • Oct 22 '25 Dropdown menu Copy link Hide This is an awesome breakdown, takes a little bit of stress out of family travel. Like comment: Like comment: 2  likes Like Comment button Reply Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse Jess Lee Follow Building DEV and Forem with everyone here. Interested in the future. Location USA / TAIWAN Pronouns she/they Work Co-Founder & COO at Forem Joined Jul 29, 2016 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:40
https://share.transistor.fm/s/8f8b74c8#goodpods-path-1
APIs You Won't Hate | Maybe GraphQL isn't so terrible? A conversation with Marc-Andre Giroux APIs You Won't Hate 40 ? 30 : 10)" @keyup.document.left="seekBySeconds(-10)" @keyup.document.m="toggleMute" @keyup.document.s="toggleSpeed" @play="play(false, true)" @loadedmetadata="handleLoadedMetadata" @pause="pause(true)" preload="none" @timejump.window="seekToSeconds($event.detail.timestamp); shareTimeFormatted = formatTime($event.detail.timestamp)" > Trailer Bonus 10 40 ? 30 : 10)" class="seek-seconds-button" > 40 ? 30 : 10"> Subscribe Share More Info Download More episodes Subscribe newValue ? setTimeout(() => copied = false, 2500) : null)" @click="copied = copyFeedUrl()" class="form-input-group" > Copied to clipboard Apple Podcasts Spotify Pocket Casts Overcast Castro YouTube Goodpods Goodpods Metacast Amazon Music Pandora CastBox Anghami Anghami Fountain JioSaavn Gaana iHeartRadio TuneIn TuneIn Player FM SoundCloud SoundCloud Deezer Podcast Addict Share newValue ? setTimeout(() => copied = false, 2500) : null)" @click="copied = copyShareUrl()" class="form-input-group" > Share Copied to clipboard newValue ? setTimeout(() => copied = false, 2500) : null)" @click="copied = copyEmbedHtml()" class="form-input-group" > Embed Copied to clipboard Start at Trailer Bonus Full Transcript View the website updateDescriptionLinks($el))" class="episode-description" > Chapters June 12, 2020 by APIs You Won't Hate View the website Listen On Apple Podcasts Listen On Spotify Listen On YouTube RSS Feed Subscribe RSS Feed RSS Feed URL Copied! Follow Episode Details Phil and Matt talk with Marc-Andre Giroux, a developer working at Github who helps maintain their REST and GraphQL APIs. Show Notes A quick note before we get started: We recorded this episode back in April of 2020 when everyone was quarantining and making bread to post on instagram. Fast forward to now, in June, American cities, and cities around the world are joining in, protesting the systemic racism that has long been an issue in our societies. While our energy and focus turned to current events, editing this episode took a seat on the backburner. That said, we have it ready… but it couldn’t be released at a worse time. Three white dudes talking about APIs while our friends in other communities are fighting injustices that have long kept them down seems to be a bit tone deaf, and we know that, recognize that and commit ourselves to being involved. There are a lot of conversations we want to have around this topic both in the API world, and outside of it. We don’t want this episode to take away from the discussions going on around such important and heavy topics, but we hope this can serve as a way for you to take a break while you travel to and from a protest. If you are going to protest please be safe, drink as much water as you can to stay hydrated in the heat and know that things are changing for the better. To all the Black API developers out there: we see you, we're fighting with you, and we want you to know that we're listening.  From all of us at APIs You Won't Hate: Black lives matter. Recorded back in April, Matt and Phil are joined by Marc-Andre Giroux to talk about the APIs he works on at Github and his fascination of GraphQL. Marc-Andre recently released a book titled " Production Ready GraphQL " where he talks about schema design, tooling, architecture and more. We take a dive into knowing when GraphQL is the right tool for the job, versus when to use REST and talk a little about the whole quarantine thing that was happening. Sponsors: Stoplight makes it possible for us to bring you this podcast while we nerd out about APIs. Check them out for their tooling around documentation with Studio, an app that makes API documentation an absolute joy to work with. Twitter: https://twitter.com/__xuorig__ Book: Production Ready GraphQL APIs You Wont Hate Jobs Board: https://apisyouwonthate.com/jobs APIs You Wont Hate Slack: https://apisyouwonthate.com/community Creators and Guests Host Mike Bifulco Cofounder and host of APIs You Won't Hate. Blogs at https://mikebifulco.com Into 🚴‍♀️, espresso ☕, looking after 🌍. ex @Stripe @Google @Microsoft What is APIs You Won't Hate? A no-nonsense (well, some-nonsense) podcast about API design & development, new features in the world of HTTP, service-orientated architecture, microservices, and probably bikes. All audio, artwork, episode descriptions and notes are property of APIs You Won't Hate, for APIs You Won't Hate, and published with permission by Transistor, Inc. Broadcast by
2026-01-13T08:48:40
https://parenting.forem.com/privacy#main-content
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:40
https://www.flowdas.com/pages/python-docs-ko.html
파이썬 한국어 번역 — flowdas You are using an outdated browser. Please upgrade your browser or activate Google Chrome Frame to improve your experience. flowdas Home 파이썬 한국어 번역 Think Python about 파이썬 한국어 번역 https://docs.python.org 사이트의 한국어 번역이 진행중입니다. 다음은 관련 링크들입니다. https://python.flowdas.com/ - 번역의 주석판이 출판되는 장소입니다. 예제 코드에 포함된 주석과 독스트링의 번역이 포함되고 역자주도 제공됩니다. 교정이 마무리되지 않은 원고도 출판되기 때문에 가장 먼저 번역이 올라갑니다. https://github.com/flowdas/python-docs-ko - 번역 작업에 필요한 도구의 소스 코드와 도움말이 제공되는 공식 git 저장소 입니다. https://docs.python.org/ko/3/ - 번역이 최종 출판되는 장소입니다. 언어 선택기에서 한국어를 선택할 때 나오는 장소이기도 합니다. 예제 코드의 번역과 역자주는 포함되지 않습니다. https://www.facebook.com/groups/pythondocsko/ - 번역팀이 의견을 나누는 페이스북 그룹입니다. 페이스북을 쓰지 않는 분들은 메일로 연락하셔도 됩니다. https://github.com/python/python-docs-ko - 번역 결과가 저장되는 공식 git 저장소 입니다. 실제 번역물은 버전 브랜치에 있습니다. https://github.com/python/python-docs-ko/issues - 번역상의 오류를 발견했을 때 등록하는 곳입니다. 앞으로 작업할 일감이 들어있는 곳이기도 합니다. 파이썬 자습서 와 파이썬 언어 레퍼런스 는 완료되었고, 나머지는 순서 없이 작업 중입니다. 번역에 기여하기 이 프로젝트에 기여하는 가장 간단한 방법은 번역된 문서를 읽고 잘못된 부분을 찾아주시는 겁니다. 일단 사이트에 올린 후에는 다시 돌아보며 교정할 수 있는 인력을 갖고 있지 않습니다. 오탈자를 찾는 것부터 어색한 표현, 비문, 오역들을 찾아주시면 큰 도움이 됩니다. 사소한 것들은 이슈로 등록하지 않고 페이스북 그룹으로 알려주셔도 됩니다. 직접 번역으로 기여하고 싶으신 분들은 https://github.com/python/python-docs-ko 저장소를 fork 해서 po 파일을 수정한 후 PR 을 보내시면 됩니다. 일감은 https://github.com/python/python-docs-ko/issues 에서 고르시면됩니다. 모든 po 파일을 개별 이슈로 등록해 두었습니다. 이슈의 순서는 중요하지 않습니다 (대략 파일명의 역순입니다). 서로 일이 겹치지 않도록, 시작하실 때 이슈에 코멘트를 남겨주시면 좋습니다. 아주 오래된 코멘트는 무시하시고 작업하셔도 됩니다. 찾으시는 파일이 없다면 페이스북 그룹으로 문의하시고, 새 번역 이슈를 만들지는 말아주세요. 물론 버그 이슈를 등록하는 것은 언제나 환영입니다. 이 때 다음과 같은 사항을 유의하셔야 합니다. 최신 버전의 브랜치에서 작업하세요. master 브랜치는 번역물이 들어가는 곳이 아닙니다. po 파일의 일부만 번역하지 마시고 파일 전체를 번역한 후에 PR 주세요. 일부 파일들은 꽤 큽니다. 마무리할 수 있을지 미리 확인해 보시고 시작해주세요. 부분 번역을 미리 리뷰받고 싶으시면 PR 하지 마시고 페이스북 그룹으로 포스트해주세요. 교정이 끝난 최종본을 PR 해 주세요. 띄어쓰기, 철자 검사는 필수입니다. 교정에 필요한 프리뷰 빌드 도구가 https://github.com/flowdas/python-docs-ko 에서 제공됩니다. 빌드할 때 없던 경고가 생기지 않도록 확인 바랍니다. 어떤 경우에도 msgid 는 변경하지 마시고, msgstr 부분만 변경해주세요. 마크업 ( :ref:`...` , *term* , `... <...>`_ , ...) 뒤에 조사가 공백없이 연결되면 마크업으로 인식되지 않습니다. 띄어쓰기 없이 마크업을 분리하려면 \\ 를 삽입해주세요. :ref:... 는 번역하지 말고 그냥 두세요. 만약 :ref:`mutable <typesseq-mutable>` 처럼 참조가 <> 로 처리되어있다면 나머지 부분은 번역하세요. :ref:`가변 <typesseq-mutable>` :term:... 은 용어집 를 참조하여 번역어와 원문을 병기해야 합니다. 가령 :term:`asynchronous iterator` 는 :term:`비동기 이터레이터 <asynchronous iterator>` 로 번역해야합니다. :dfn:... 역시 번역어와 원문을 병기합니다. 예를 들어, :dfn:`comprehension` 은 :dfn:`컴프리헨션 (comprehension)` 로 번역합니다. 파이썬 자습서 는 "...입니다" 스타일인 반면, 파이썬 언어 레퍼런스 는 "...다" 스타일입니다. 파이썬 언어 레퍼런스 이외의 모든 문서는 파이썬 자습서 스타일을 유지해주세요. 가능하면 긴 msgstr 은 여러줄 로 나눠주세요. 그래야 웹에서 리뷰할 때 편합니다. 줄 나누기 할 때 필요한 공백이 빠지지 않도록 조심하시고요. 드물긴 하지만 때로 원문에 오류가 있을 수도 있습니다. 특히 실제로 동작하지 않는 무의미한 마크업이 존재하기도 합니다. 이 경우 마크업을 제거하지 마시고 그대로 유지해주세요. 원문과 번역의 마크업이 일치하지 않으면 빌더가 불평합니다. 꼭 마음의 평화를 얻으셔야한다면 원문의 오류를 등록하시기 바랍니다 ( 버그 다루기 ). 번역을 완료했지만 빌드해보면 일부 번역이 이루어지지 않은 상태로 표시되는 경우가 있습니다. 보통 두가지 경우입니다. 하나는 번역이 fuzzy 로 마킹되어 있는 경우이고, 다른 하나는 po 파일이 최신 버전이 아닌 경우입니다. fuzzy 로 마킹하는 것은 번역이 불완전해서 검토가 필요하다는 뜻입니다. 때문에 빌드되지 않습니다. po 파일이 최신 버전이 아닌 것은 제가 최신 버전의 변경 사항들을 아직 po 파일에 merge 하지 않았기 때문입니다. po 파일을 merge 할 때마다 기존과 다른 부분들이 fuzzy 로 마킹되기도 합니다. 이런 일이 일어나면 제가 새 이슈를 등록합니다. po 파일 끝에 #~ 로 시작하는 주석들이 있을 수 있습니다. 비정기적으로 원문의 변경 사항을 반영해서 po 파일을 갱신하는데, 이 때 원문에서 사라진 것으로 판단되는 msgid 가 있으면, 이런식으로 남겨둡니다. 이미 번역했던 파일이면 예전의 번역을 남겨두는 목적입니다. 변경된 부분을 찾아서 수정할 때 쓰라는 것이지요. 새로 번역하는 파일에 이런 부분이 있으면 삭제해도 무방합니다. 참고로, 저는 띄어쓰기와 철자 검사에 http://speller.cs.pusan.ac.kr/ 를 사용하고 있습니다. 이 자리를 빌려 감사드립니다. 큰 도움이 되고 있습니다. 용어집 용어는 이미 번역된 파일들을 참고해서 일관성을 유지해 주시기 바랍니다. 완전하지는 않지만 자주 등장하는 것들을 적어보았습니다. 용어집 에 등장하지 않는 용어들에 대한 번역어들입니다. 로마자 표기법으로 소리나는대로 적는 경우도 포함시켰습니다. 기여자들간의 협의에 의해 변경될 수 있습니다. 변경 전까지는 가능하면 일관성을 유지해주세요. 그래야 한꺼번에 바꾸기도 쉽습니다.: access : 액세스 algorithm : 알고리즘 alias : 에일리어스 angle brackets : 화살괄호 apostrophe : 작은따옴표 application : 응용 프로그램 architecture : 아키텍처 assign : 대입 associative array : 연관 배열 asterisk : 애스터리스크 backslash : 역 슬래시 body : 바디 buffer : 버퍼 buffered : 버퍼드 built - in : 내장 byte - oriented datastream : 바이트지향 데이터스트림 bytes : 바이트열 bytes - like : 바이트열류 cache : 캐시 callable : 콜러블 callback : 콜백 caller : 호출자 calling convention : 호출 규약 canonical : 규범적 case : 케이스 chaining : 연쇄 clause : 절 clean - up : 뒷정리 code : 코드 code block : 코드 블록 codec : 코덱 collation : 콜레이션 collection : 컬렉션 command : 명령 computationally - intensive : 계산집약적 concrete class : 구상 클래스 construct : 구조물 constructor : 생성자 container : 컨테이너 control flow : 제어 흐름 cyclic garbage collector : 순환 가비지 수거기 curly braces : 중괄호 custom : 커스텀 data structure : 자료 구조 decimal : 십진 소수 # decimal 모듈과 관련될 때 dedent : 내어쓰기 deep copy : 깊은 사본 default : 기본 delimiter : 구분자 derived class : 파생 클래스 deserializing : 역 직렬화 destructor : 파괴자 digit : 디지트 # numeric character 와 구분할 때 directory : 디렉터리 dispatch : 디스패치 documentation : 설명서 dotted expression : 점표현식 enclosing : 둘러싼 encoding : 인코딩 environment variable : 환경 변수 error : 에러 escape : 이스케이프 evaluate : 값을 구하다 exception : 예외 exhaust : 소진하다 explicit : 명시적 export : 익스포트 expose : 드러내다 factory : 팩토리 floating point number : 실수 format specifier : 포맷 지정자 formatted string literal : 포맷 문자열 리터럴 frozenset : 불변 집합 fully qualified name : 완전히 정규화된 이름 glossary : 용어집 hashability : 해시 가능성 heterogeneous : 이질적 homogeneous : 등질적 identifier : 식별자 idiom : 이디엄 imaginary unit : 허수 단위 implicit : 묵시적 indent : 들여쓰기 index : 인덱스 inheritance : 상속 inline : 인라인 instance : 인스턴스 instruction : 명령어 interface : 인터페이스 interactive : 대화형 interpreter : 인터프리터 interrupt : 인터럽트 introspection : 인트로스펙션 iteration : 이터레이션 keyword argument : 키워드 인자 lexicographical : 사전식 linked list : 연결 리스트 literal : 리터럴 local : 지역 locale : 로케일 locale specific convention : 로케일 특정 방식 locking : 로킹 logging : 로깅 lookup : 조회 loop : 루프 machine code : 기계어 magic method : 매직 메서드 mechanism : 메커니즘 machinery : 절차 mode : 모드 module : 모듈 multi - processor : 다중 프로세서 multi - threaded : 다중스레드화 operating system : 운영 체제 operation : 연산 operator : 연산자 optional : 선택적 , 생략 가능한 parallelism : 병렬성 parentheses : 괄호 parse tree : 파스 트리 parser : 파서 phase : 시기 positional argument : 위치 인자 procedure : 프로시저 prompt : 프롬프트 property : 프로퍼티 queue : 큐 quotation mark : 따옴표 raw string : 날 문자열 redirection : 리디렉션 reference counting : 참조 횟수 추적 reference cycle : 참조 순환 resume : 재개 reverse iteration : 역 이터레이션 section : 섹션 serializing : 직렬화 set : 집합 shallow copy : 얕은 사본 shell : 셸 shift : 시프트 short - circuit : 단락 - 회로 side effect : 부작용 signature : 시그니처 socket : 소켓 source : 소스 square brackets : 대괄호 stack : 스택 step : 스텝 stream : 스트림 string : 문자열 subroutine : 서브루틴 subscript notation : 서브 스크립트 표기법 superclass : 슈퍼 클래스 suspend : 일시 중지 symlink : 심볼릭 링크 syntactic sugar : 편의 문법 syntax error : 문법 에러 third party : 제삼자 thread : 스레드 token : 토큰 truth value : 논리값 tutorial : 자습서 underlying resource : 하부 자원 virtual subclass : 가상 서브 클래스 wildcard : 와일드카드 Windows : 윈도우 Please enable JavaScript to view the comments powered by Disqus. Recent Posts Type casting in Python 도널드 크로허스트의 기이한 마지막 항해 틀리지 않는 법 뇌과학의 비밀 악의 꽃 (앙리 마티스 에디션) 원숭이 신의 잃어버린 도시 플라워 문 골목길 역사산책 서울편 황금방울새 리틀 드러머 걸 검색 Categories APLR (3) Book (14) python-docs-ko (2) Typeable (1) © Copyright 2005-2021, 오동권. Powered by Tinkerer and Sphinx .
2026-01-13T08:48:40
https://dev.to/t/communication/page/2
Communication Page 2 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # communication Follow Hide Tips for talking effectively with your children at every age. Create Post Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu Closed Anonymity sta sta sta Follow Nov 21 '25 Closed Anonymity # anonymous # communication # form Comments Add Comment 4 min read There's a Limit to Chat Tools — Enter QWINCS! sta sta sta Follow Nov 20 '25 There's a Limit to Chat Tools — Enter QWINCS! # communication # collaboration # tooling Comments Add Comment 5 min read No Impression Is an Impression — and Why Tolerance for Disrespect Taught Me More About Myself Than Others Brian Kim Brian Kim Brian Kim Follow Nov 7 '25 No Impression Is an Impression — and Why Tolerance for Disrespect Taught Me More About Myself Than Others # reflection # selfgrowth # leadership # communication 8  reactions Comments 5  comments 2 min read When Smart People Clash: What Engineering Taught Me About NVC Joseph Sanjaya Joseph Sanjaya Joseph Sanjaya Follow Oct 17 '25 When Smart People Clash: What Engineering Taught Me About NVC # engineering # teamwork # communication # codereview Comments Add Comment 4 min read Semantic Streams: Rethinking Video Transmission with AI Arvind SundaraRajan Arvind SundaraRajan Arvind SundaraRajan Follow Nov 5 '25 Semantic Streams: Rethinking Video Transmission with AI # ai # machinelearning # communication # video Comments 1  comment 2 min read Unlock Your Voice: 8 Vocal Exercises Communication Techniques for Beginner Developers Werliton Silva Werliton Silva Werliton Silva Follow Sep 23 '25 Unlock Your Voice: 8 Vocal Exercises Communication Techniques for Beginner Developers # webdev # voice # skill # communication 1  reaction Comments 2  comments 2 min read The Weight of the First Word Reme Le Hane Reme Le Hane Reme Le Hane Follow Sep 30 '25 The Weight of the First Word # leadership # communication # feedback 1  reaction Comments Add Comment 1 min read Unlock Your Voice: 5 TED-Style Communication Techniques for Beg Werliton Silva Werliton Silva Werliton Silva Follow Sep 25 '25 Unlock Your Voice: 5 TED-Style Communication Techniques for Beg # webdev # programming # softskills # communication 1  reaction Comments Add Comment 2 min read Bridging the Gap: How Business Analysts and Developers Can Communicate Better Vivek Singhal Vivek Singhal Vivek Singhal Follow Aug 20 '25 Bridging the Gap: How Business Analysts and Developers Can Communicate Better # developers # communication # business Comments Add Comment 4 min read What parts of security brings CORS In a Project ngouend gerard ngouend gerard ngouend gerard Follow Aug 15 '25 What parts of security brings CORS In a Project # backend # errors # network # communication Comments Add Comment 14 min read A brief history of video conferencing. Part 2: From commercial premium service to "pocket" technology Vlada Vlada Vlada Follow Jul 17 '25 A brief history of video conferencing. Part 2: From commercial premium service to "pocket" technology # videoconferencing # communication # history Comments Add Comment 9 min read The Importance of Effective Communication in a Tech Team Supun Geethanjana Supun Geethanjana Supun Geethanjana Follow Aug 8 '25 The Importance of Effective Communication in a Tech Team # communication # webdev # programming # productivity Comments Add Comment 3 min read Brevity At Work Samuel Rouse Samuel Rouse Samuel Rouse Follow Jul 8 '25 Brevity At Work # webdev # programming # beginners # communication Comments Add Comment 4 min read Stop Saying 'Technical Debt' — Start Speaking Product John Munn John Munn John Munn Follow May 28 '25 Stop Saying 'Technical Debt' — Start Speaking Product # engineering # career # communication # productivity Comments Add Comment 1 min read Flutter VoIP App with AI Assistant: Real-Time Voice and Chat Using AI Sushan Dristi Sushan Dristi Sushan Dristi Follow Jun 29 '25 Flutter VoIP App with AI Assistant: Real-Time Voice and Chat Using AI # voip # time # real # communication 1  reaction Comments Add Comment 5 min read 𝗕𝘂𝗶𝗹𝗱𝗶𝗻𝗴 𝗥𝗲𝗹𝗮𝘁𝗶𝗼𝗻𝘀𝗵𝗶𝗽𝘀 𝗪𝗵𝗶𝗹𝗲 𝗪𝗼𝗿𝗸𝗶𝗻𝗴 𝗳𝗿𝗼𝗺 𝗛𝗼𝗺𝗲 Supraja Tangella Supraja Tangella Supraja Tangella Follow May 7 '25 𝗕𝘂𝗶𝗹𝗱𝗶𝗻𝗴 𝗥𝗲𝗹𝗮𝘁𝗶𝗼𝗻𝘀𝗵𝗶𝗽𝘀 𝗪𝗵𝗶𝗹𝗲 𝗪𝗼𝗿𝗸𝗶𝗻𝗴 𝗳𝗿𝗼𝗺 𝗛𝗼𝗺𝗲 # remotework # workfromhome # communication # teambuilding Comments Add Comment 1 min read AI vs. Human Language: Why AI Will Never Fully Capture Human Communication? Glaxit Software Agency Glaxit Software Agency Glaxit Software Agency Follow May 3 '25 AI vs. Human Language: Why AI Will Never Fully Capture Human Communication? # ai # human # aivshuman # communication Comments Add Comment 2 min read From Pitfalls to Profit: How to Successfully Implement Async JetThoughts Dev JetThoughts Dev JetThoughts Dev Follow for JetThoughts May 20 '25 From Pitfalls to Profit: How to Successfully Implement Async # productivity # devops # tutorial # communication 1  reaction Comments Add Comment 5 min read The Async Advantage: How Switching Communication Styles Saves $3.2M Annually JetThoughts Dev JetThoughts Dev JetThoughts Dev Follow for JetThoughts May 19 '25 The Async Advantage: How Switching Communication Styles Saves $3.2M Annually # productivity # devops # process # communication 1  reaction Comments Add Comment 8 min read An Overview of Communication Techniques for Embedded Systems Monarch Innovation Private Limited Monarch Innovation Private Limited Monarch Innovation Private Limited Follow Apr 21 '25 An Overview of Communication Techniques for Embedded Systems # iot # embeded # communication Comments Add Comment 3 min read Rethinking Email Strategy Like a Chess Game: What Developers and Tech Professionals Can Learn from TDZ Pro Matt Johnson Matt Johnson Matt Johnson Follow May 22 '25 Rethinking Email Strategy Like a Chess Game: What Developers and Tech Professionals Can Learn from TDZ Pro # productivity # communication # email # strategy 31  reactions Comments 25  comments 3 min read Improving Virtual and Verbal Communication at Work Krideo Krideo Krideo Follow Apr 14 '25 Improving Virtual and Verbal Communication at Work # virtual # verbal # communication # videoconferencing Comments Add Comment 1 min read Why We’re Moving from Slack and Teams to WhatsApp for Internal Communication Akshay Joshi Akshay Joshi Akshay Joshi Follow Apr 2 '25 Why We’re Moving from Slack and Teams to WhatsApp for Internal Communication # communication # management # decision # productivity Comments Add Comment 2 min read Why should every project start with a Team Communication Plan? Writegenic AI Writegenic AI Writegenic AI Follow May 8 '25 Why should every project start with a Team Communication Plan? # team # webdev # community # communication Comments 3  comments 2 min read Tecnologias: 5 invenções inéditas — a Nona cria mercados do zero. adevilson de lima adevilson de lima adevilson de lima Follow Mar 24 '25 Tecnologias: 5 invenções inéditas — a Nona cria mercados do zero. # blockchain # ai # cryptography # communication Comments Add Comment 1 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://docs.python.org/3/tutorial/controlflow.html
4. More Control Flow Tools — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 4. More Control Flow Tools 4.1. if Statements 4.2. for Statements 4.3. The range() Function 4.4. break and continue Statements 4.5. else Clauses on Loops 4.6. pass Statements 4.7. match Statements 4.8. Defining Functions 4.9. More on Defining Functions 4.9.1. Default Argument Values 4.9.2. Keyword Arguments 4.9.3. Special parameters 4.9.3.1. Positional-or-Keyword Arguments 4.9.3.2. Positional-Only Parameters 4.9.3.3. Keyword-Only Arguments 4.9.3.4. Function Examples 4.9.3.5. Recap 4.9.4. Arbitrary Argument Lists 4.9.5. Unpacking Argument Lists 4.9.6. Lambda Expressions 4.9.7. Documentation Strings 4.9.8. Function Annotations 4.10. Intermezzo: Coding Style Previous topic 3. An Informal Introduction to Python Next topic 5. Data Structures This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 4. More Control Flow Tools | Theme Auto Light Dark | 4. More Control Flow Tools ¶ As well as the while statement just introduced, Python uses a few more that we will encounter in this chapter. 4.1. if Statements ¶ Perhaps the most well-known statement type is the if statement. For example: >>> x = int ( input ( "Please enter an integer: " )) Please enter an integer: 42 >>> if x < 0 : ... x = 0 ... print ( 'Negative changed to zero' ) ... elif x == 0 : ... print ( 'Zero' ) ... elif x == 1 : ... print ( 'Single' ) ... else : ... print ( 'More' ) ... More There can be zero or more elif parts, and the else part is optional. The keyword ‘ elif ’ is short for ‘else if’, and is useful to avoid excessive indentation. An if … elif … elif … sequence is a substitute for the switch or case statements found in other languages. If you’re comparing the same value to several constants, or checking for specific types or attributes, you may also find the match statement useful. For more details see match Statements . 4.2. for Statements ¶ The for statement in Python differs a bit from what you may be used to in C or Pascal. Rather than always iterating over an arithmetic progression of numbers (like in Pascal), or giving the user the ability to define both the iteration step and halting condition (as C), Python’s for statement iterates over the items of any sequence (a list or a string), in the order that they appear in the sequence. For example (no pun intended): >>> # Measure some strings: >>> words = [ 'cat' , 'window' , 'defenestrate' ] >>> for w in words : ... print ( w , len ( w )) ... cat 3 window 6 defenestrate 12 Code that modifies a collection while iterating over that same collection can be tricky to get right. Instead, it is usually more straight-forward to loop over a copy of the collection or to create a new collection: # Create a sample collection users = { 'Hans' : 'active' , 'Éléonore' : 'inactive' , '景太郎' : 'active' } # Strategy: Iterate over a copy for user , status in users . copy () . items (): if status == 'inactive' : del users [ user ] # Strategy: Create a new collection active_users = {} for user , status in users . items (): if status == 'active' : active_users [ user ] = status 4.3. The range() Function ¶ If you do need to iterate over a sequence of numbers, the built-in function range() comes in handy. It generates arithmetic progressions: >>> for i in range ( 5 ): ... print ( i ) ... 0 1 2 3 4 The given end point is never part of the generated sequence; range(10) generates 10 values, the legal indices for items of a sequence of length 10. It is possible to let the range start at another number, or to specify a different increment (even negative; sometimes this is called the ‘step’): >>> list ( range ( 5 , 10 )) [5, 6, 7, 8, 9] >>> list ( range ( 0 , 10 , 3 )) [0, 3, 6, 9] >>> list ( range ( - 10 , - 100 , - 30 )) [-10, -40, -70] To iterate over the indices of a sequence, you can combine range() and len() as follows: >>> a = [ 'Mary' , 'had' , 'a' , 'little' , 'lamb' ] >>> for i in range ( len ( a )): ... print ( i , a [ i ]) ... 0 Mary 1 had 2 a 3 little 4 lamb In most such cases, however, it is convenient to use the enumerate() function, see Looping Techniques . A strange thing happens if you just print a range: >>> range ( 10 ) range(0, 10) In many ways the object returned by range() behaves as if it is a list, but in fact it isn’t. It is an object which returns the successive items of the desired sequence when you iterate over it, but it doesn’t really make the list, thus saving space. We say such an object is iterable , that is, suitable as a target for functions and constructs that expect something from which they can obtain successive items until the supply is exhausted. We have seen that the for statement is such a construct, while an example of a function that takes an iterable is sum() : >>> sum ( range ( 4 )) # 0 + 1 + 2 + 3 6 Later we will see more functions that return iterables and take iterables as arguments. In chapter Data Structures , we will discuss in more detail about list() . 4.4. break and continue Statements ¶ The break statement breaks out of the innermost enclosing for or while loop: >>> for n in range ( 2 , 10 ): ... for x in range ( 2 , n ): ... if n % x == 0 : ... print ( f " { n } equals { x } * { n // x } " ) ... break ... 4 equals 2 * 2 6 equals 2 * 3 8 equals 2 * 4 9 equals 3 * 3 The continue statement continues with the next iteration of the loop: >>> for num in range ( 2 , 10 ): ... if num % 2 == 0 : ... print ( f "Found an even number { num } " ) ... continue ... print ( f "Found an odd number { num } " ) ... Found an even number 2 Found an odd number 3 Found an even number 4 Found an odd number 5 Found an even number 6 Found an odd number 7 Found an even number 8 Found an odd number 9 4.5. else Clauses on Loops ¶ In a for or while loop the break statement may be paired with an else clause. If the loop finishes without executing the break , the else clause executes. In a for loop, the else clause is executed after the loop finishes its final iteration, that is, if no break occurred. In a while loop, it’s executed after the loop’s condition becomes false. In either kind of loop, the else clause is not executed if the loop was terminated by a break . Of course, other ways of ending the loop early, such as a return or a raised exception, will also skip execution of the else clause. This is exemplified in the following for loop, which searches for prime numbers: >>> for n in range ( 2 , 10 ): ... for x in range ( 2 , n ): ... if n % x == 0 : ... print ( n , 'equals' , x , '*' , n // x ) ... break ... else : ... # loop fell through without finding a factor ... print ( n , 'is a prime number' ) ... 2 is a prime number 3 is a prime number 4 equals 2 * 2 5 is a prime number 6 equals 2 * 3 7 is a prime number 8 equals 2 * 4 9 equals 3 * 3 (Yes, this is the correct code. Look closely: the else clause belongs to the for loop, not the if statement.) One way to think of the else clause is to imagine it paired with the if inside the loop. As the loop executes, it will run a sequence like if/if/if/else. The if is inside the loop, encountered a number of times. If the condition is ever true, a break will happen. If the condition is never true, the else clause outside the loop will execute. When used with a loop, the else clause has more in common with the else clause of a try statement than it does with that of if statements: a try statement’s else clause runs when no exception occurs, and a loop’s else clause runs when no break occurs. For more on the try statement and exceptions, see Handling Exceptions . 4.6. pass Statements ¶ The pass statement does nothing. It can be used when a statement is required syntactically but the program requires no action. For example: >>> while True : ... pass # Busy-wait for keyboard interrupt (Ctrl+C) ... This is commonly used for creating minimal classes: >>> class MyEmptyClass : ... pass ... Another place pass can be used is as a place-holder for a function or conditional body when you are working on new code, allowing you to keep thinking at a more abstract level. The pass is silently ignored: >>> def initlog ( * args ): ... pass # Remember to implement this! ... For this last case, many people use the ellipsis literal ... instead of pass . This use has no special meaning to Python, and is not part of the language definition (you could use any constant expression here), but ... is used conventionally as a placeholder body as well. See The Ellipsis Object . 4.7. match Statements ¶ A match statement takes an expression and compares its value to successive patterns given as one or more case blocks. This is superficially similar to a switch statement in C, Java or JavaScript (and many other languages), but it’s more similar to pattern matching in languages like Rust or Haskell. Only the first pattern that matches gets executed and it can also extract components (sequence elements or object attributes) from the value into variables. If no case matches, none of the branches is executed. The simplest form compares a subject value against one or more literals: def http_error ( status ): match status : case 400 : return "Bad request" case 404 : return "Not found" case 418 : return "I'm a teapot" case _ : return "Something's wrong with the internet" Note the last block: the “variable name” _ acts as a wildcard and never fails to match. You can combine several literals in a single pattern using | (“or”): case 401 | 403 | 404 : return "Not allowed" Patterns can look like unpacking assignments, and can be used to bind variables: # point is an (x, y) tuple match point : case ( 0 , 0 ): print ( "Origin" ) case ( 0 , y ): print ( f "Y= { y } " ) case ( x , 0 ): print ( f "X= { x } " ) case ( x , y ): print ( f "X= { x } , Y= { y } " ) case _ : raise ValueError ( "Not a point" ) Study that one carefully! The first pattern has two literals, and can be thought of as an extension of the literal pattern shown above. But the next two patterns combine a literal and a variable, and the variable binds a value from the subject ( point ). The fourth pattern captures two values, which makes it conceptually similar to the unpacking assignment (x, y) = point . If you are using classes to structure your data you can use the class name followed by an argument list resembling a constructor, but with the ability to capture attributes into variables: class Point : def __init__ ( self , x , y ): self . x = x self . y = y def where_is ( point ): match point : case Point ( x = 0 , y = 0 ): print ( "Origin" ) case Point ( x = 0 , y = y ): print ( f "Y= { y } " ) case Point ( x = x , y = 0 ): print ( f "X= { x } " ) case Point (): print ( "Somewhere else" ) case _ : print ( "Not a point" ) You can use positional parameters with some builtin classes that provide an ordering for their attributes (e.g. dataclasses). You can also define a specific position for attributes in patterns by setting the __match_args__ special attribute in your classes. If it’s set to (“x”, “y”), the following patterns are all equivalent (and all bind the y attribute to the var variable): Point ( 1 , var ) Point ( 1 , y = var ) Point ( x = 1 , y = var ) Point ( y = var , x = 1 ) A recommended way to read patterns is to look at them as an extended form of what you would put on the left of an assignment, to understand which variables would be set to what. Only the standalone names (like var above) are assigned to by a match statement. Dotted names (like foo.bar ), attribute names (the x= and y= above) or class names (recognized by the “(…)” next to them like Point above) are never assigned to. Patterns can be arbitrarily nested. For example, if we have a short list of Points, with __match_args__ added, we could match it like this: class Point : __match_args__ = ( 'x' , 'y' ) def __init__ ( self , x , y ): self . x = x self . y = y match points : case []: print ( "No points" ) case [ Point ( 0 , 0 )]: print ( "The origin" ) case [ Point ( x , y )]: print ( f "Single point { x } , { y } " ) case [ Point ( 0 , y1 ), Point ( 0 , y2 )]: print ( f "Two on the Y axis at { y1 } , { y2 } " ) case _ : print ( "Something else" ) We can add an if clause to a pattern, known as a “guard”. If the guard is false, match goes on to try the next case block. Note that value capture happens before the guard is evaluated: match point : case Point ( x , y ) if x == y : print ( f "Y=X at { x } " ) case Point ( x , y ): print ( f "Not on the diagonal" ) Several other key features of this statement: Like unpacking assignments, tuple and list patterns have exactly the same meaning and actually match arbitrary sequences. An important exception is that they don’t match iterators or strings. Sequence patterns support extended unpacking: [x, y, *rest] and (x, y, *rest) work similar to unpacking assignments. The name after * may also be _ , so (x, y, *_) matches a sequence of at least two items without binding the remaining items. Mapping patterns: {"bandwidth": b, "latency": l} captures the "bandwidth" and "latency" values from a dictionary. Unlike sequence patterns, extra keys are ignored. An unpacking like **rest is also supported. (But **_ would be redundant, so it is not allowed.) Subpatterns may be captured using the as keyword: case ( Point ( x1 , y1 ), Point ( x2 , y2 ) as p2 ): ... will capture the second element of the input as p2 (as long as the input is a sequence of two points) Most literals are compared by equality, however the singletons True , False and None are compared by identity. Patterns may use named constants. These must be dotted names to prevent them from being interpreted as capture variable: from enum import Enum class Color ( Enum ): RED = 'red' GREEN = 'green' BLUE = 'blue' color = Color ( input ( "Enter your choice of 'red', 'blue' or 'green': " )) match color : case Color . RED : print ( "I see red!" ) case Color . GREEN : print ( "Grass is green" ) case Color . BLUE : print ( "I'm feeling the blues :(" ) For a more detailed explanation and additional examples, you can look into PEP 636 which is written in a tutorial format. 4.8. Defining Functions ¶ We can create a function that writes the Fibonacci series to an arbitrary boundary: >>> def fib ( n ): # write Fibonacci series less than n ... """Print a Fibonacci series less than n.""" ... a , b = 0 , 1 ... while a < n : ... print ( a , end = ' ' ) ... a , b = b , a + b ... print () ... >>> # Now call the function we just defined: >>> fib ( 2000 ) 0 1 1 2 3 5 8 13 21 34 55 89 144 233 377 610 987 1597 The keyword def introduces a function definition . It must be followed by the function name and the parenthesized list of formal parameters. The statements that form the body of the function start at the next line, and must be indented. The first statement of the function body can optionally be a string literal; this string literal is the function’s documentation string, or docstring . (More about docstrings can be found in the section Documentation Strings .) There are tools which use docstrings to automatically produce online or printed documentation, or to let the user interactively browse through code; it’s good practice to include docstrings in code that you write, so make a habit of it. The execution of a function introduces a new symbol table used for the local variables of the function. More precisely, all variable assignments in a function store the value in the local symbol table; whereas variable references first look in the local symbol table, then in the local symbol tables of enclosing functions, then in the global symbol table, and finally in the table of built-in names. Thus, global variables and variables of enclosing functions cannot be directly assigned a value within a function (unless, for global variables, named in a global statement, or, for variables of enclosing functions, named in a nonlocal statement), although they may be referenced. The actual parameters (arguments) to a function call are introduced in the local symbol table of the called function when it is called; thus, arguments are passed using call by value (where the value is always an object reference , not the value of the object). [ 1 ] When a function calls another function, or calls itself recursively, a new local symbol table is created for that call. A function definition associates the function name with the function object in the current symbol table. The interpreter recognizes the object pointed to by that name as a user-defined function. Other names can also point to that same function object and can also be used to access the function: >>> fib <function fib at 10042ed0> >>> f = fib >>> f ( 100 ) 0 1 1 2 3 5 8 13 21 34 55 89 Coming from other languages, you might object that fib is not a function but a procedure since it doesn’t return a value. In fact, even functions without a return statement do return a value, albeit a rather boring one. This value is called None (it’s a built-in name). Writing the value None is normally suppressed by the interpreter if it would be the only value written. You can see it if you really want to using print() : >>> fib ( 0 ) >>> print ( fib ( 0 )) None It is simple to write a function that returns a list of the numbers of the Fibonacci series, instead of printing it: >>> def fib2 ( n ): # return Fibonacci series up to n ... """Return a list containing the Fibonacci series up to n.""" ... result = [] ... a , b = 0 , 1 ... while a < n : ... result . append ( a ) # see below ... a , b = b , a + b ... return result ... >>> f100 = fib2 ( 100 ) # call it >>> f100 # write the result [0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89] This example, as usual, demonstrates some new Python features: The return statement returns with a value from a function. return without an expression argument returns None . Falling off the end of a function also returns None . The statement result.append(a) calls a method of the list object result . A method is a function that ‘belongs’ to an object and is named obj.methodname , where obj is some object (this may be an expression), and methodname is the name of a method that is defined by the object’s type. Different types define different methods. Methods of different types may have the same name without causing ambiguity. (It is possible to define your own object types and methods, using classes , see Classes ) The method append() shown in the example is defined for list objects; it adds a new element at the end of the list. In this example it is equivalent to result = result + [a] , but more efficient. 4.9. More on Defining Functions ¶ It is also possible to define functions with a variable number of arguments. There are three forms, which can be combined. 4.9.1. Default Argument Values ¶ The most useful form is to specify a default value for one or more arguments. This creates a function that can be called with fewer arguments than it is defined to allow. For example: def ask_ok ( prompt , retries = 4 , reminder = 'Please try again!' ): while True : reply = input ( prompt ) if reply in { 'y' , 'ye' , 'yes' }: return True if reply in { 'n' , 'no' , 'nop' , 'nope' }: return False retries = retries - 1 if retries < 0 : raise ValueError ( 'invalid user response' ) print ( reminder ) This function can be called in several ways: giving only the mandatory argument: ask_ok('Do you really want to quit?') giving one of the optional arguments: ask_ok('OK to overwrite the file?', 2) or even giving all arguments: ask_ok('OK to overwrite the file?', 2, 'Come on, only yes or no!') This example also introduces the in keyword. This tests whether or not a sequence contains a certain value. The default values are evaluated at the point of function definition in the defining scope, so that i = 5 def f ( arg = i ): print ( arg ) i = 6 f () will print 5 . Important warning: The default value is evaluated only once. This makes a difference when the default is a mutable object such as a list, dictionary, or instances of most classes. For example, the following function accumulates the arguments passed to it on subsequent calls: def f ( a , L = []): L . append ( a ) return L print ( f ( 1 )) print ( f ( 2 )) print ( f ( 3 )) This will print [ 1 ] [ 1 , 2 ] [ 1 , 2 , 3 ] If you don’t want the default to be shared between subsequent calls, you can write the function like this instead: def f ( a , L = None ): if L is None : L = [] L . append ( a ) return L 4.9.2. Keyword Arguments ¶ Functions can also be called using keyword arguments of the form kwarg=value . For instance, the following function: def parrot ( voltage , state = 'a stiff' , action = 'voom' , type = 'Norwegian Blue' ): print ( "-- This parrot wouldn't" , action , end = ' ' ) print ( "if you put" , voltage , "volts through it." ) print ( "-- Lovely plumage, the" , type ) print ( "-- It's" , state , "!" ) accepts one required argument ( voltage ) and three optional arguments ( state , action , and type ). This function can be called in any of the following ways: parrot ( 1000 ) # 1 positional argument parrot ( voltage = 1000 ) # 1 keyword argument parrot ( voltage = 1000000 , action = 'VOOOOOM' ) # 2 keyword arguments parrot ( action = 'VOOOOOM' , voltage = 1000000 ) # 2 keyword arguments parrot ( 'a million' , 'bereft of life' , 'jump' ) # 3 positional arguments parrot ( 'a thousand' , state = 'pushing up the daisies' ) # 1 positional, 1 keyword but all the following calls would be invalid: parrot () # required argument missing parrot ( voltage = 5.0 , 'dead' ) # non-keyword argument after a keyword argument parrot ( 110 , voltage = 220 ) # duplicate value for the same argument parrot ( actor = 'John Cleese' ) # unknown keyword argument In a function call, keyword arguments must follow positional arguments. All the keyword arguments passed must match one of the arguments accepted by the function (e.g. actor is not a valid argument for the parrot function), and their order is not important. This also includes non-optional arguments (e.g. parrot(voltage=1000) is valid too). No argument may receive a value more than once. Here’s an example that fails due to this restriction: >>> def function ( a ): ... pass ... >>> function ( 0 , a = 0 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : function() got multiple values for argument 'a' When a final formal parameter of the form **name is present, it receives a dictionary (see Mapping Types — dict ) containing all keyword arguments except for those corresponding to a formal parameter. This may be combined with a formal parameter of the form *name (described in the next subsection) which receives a tuple containing the positional arguments beyond the formal parameter list. ( *name must occur before **name .) For example, if we define a function like this: def cheeseshop ( kind , * arguments , ** keywords ): print ( "-- Do you have any" , kind , "?" ) print ( "-- I'm sorry, we're all out of" , kind ) for arg in arguments : print ( arg ) print ( "-" * 40 ) for kw in keywords : print ( kw , ":" , keywords [ kw ]) It could be called like this: cheeseshop ( "Limburger" , "It's very runny, sir." , "It's really very, VERY runny, sir." , shopkeeper = "Michael Palin" , client = "John Cleese" , sketch = "Cheese Shop Sketch" ) and of course it would print: -- Do you have any Limburger ? -- I'm sorry, we're all out of Limburger It's very runny, sir. It's really very, VERY runny, sir. ---------------------------------------- shopkeeper : Michael Palin client : John Cleese sketch : Cheese Shop Sketch Note that the order in which the keyword arguments are printed is guaranteed to match the order in which they were provided in the function call. 4.9.3. Special parameters ¶ By default, arguments may be passed to a Python function either by position or explicitly by keyword. For readability and performance, it makes sense to restrict the way arguments can be passed so that a developer need only look at the function definition to determine if items are passed by position, by position or keyword, or by keyword. A function definition may look like: def f(pos1, pos2, /, pos_or_kwd, *, kwd1, kwd2): ----------- ---------- ---------- | | | | Positional or keyword | | - Keyword only -- Positional only where / and * are optional. If used, these symbols indicate the kind of parameter by how the arguments may be passed to the function: positional-only, positional-or-keyword, and keyword-only. Keyword parameters are also referred to as named parameters. 4.9.3.1. Positional-or-Keyword Arguments ¶ If / and * are not present in the function definition, arguments may be passed to a function by position or by keyword. 4.9.3.2. Positional-Only Parameters ¶ Looking at this in a bit more detail, it is possible to mark certain parameters as positional-only . If positional-only , the parameters’ order matters, and the parameters cannot be passed by keyword. Positional-only parameters are placed before a / (forward-slash). The / is used to logically separate the positional-only parameters from the rest of the parameters. If there is no / in the function definition, there are no positional-only parameters. Parameters following the / may be positional-or-keyword or keyword-only . 4.9.3.3. Keyword-Only Arguments ¶ To mark parameters as keyword-only , indicating the parameters must be passed by keyword argument, place an * in the arguments list just before the first keyword-only parameter. 4.9.3.4. Function Examples ¶ Consider the following example function definitions paying close attention to the markers / and * : >>> def standard_arg ( arg ): ... print ( arg ) ... >>> def pos_only_arg ( arg , / ): ... print ( arg ) ... >>> def kwd_only_arg ( * , arg ): ... print ( arg ) ... >>> def combined_example ( pos_only , / , standard , * , kwd_only ): ... print ( pos_only , standard , kwd_only ) The first function definition, standard_arg , the most familiar form, places no restrictions on the calling convention and arguments may be passed by position or keyword: >>> standard_arg ( 2 ) 2 >>> standard_arg ( arg = 2 ) 2 The second function pos_only_arg is restricted to only use positional parameters as there is a / in the function definition: >>> pos_only_arg ( 1 ) 1 >>> pos_only_arg ( arg = 1 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : pos_only_arg() got some positional-only arguments passed as keyword arguments: 'arg' The third function kwd_only_arg only allows keyword arguments as indicated by a * in the function definition: >>> kwd_only_arg ( 3 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : kwd_only_arg() takes 0 positional arguments but 1 was given >>> kwd_only_arg ( arg = 3 ) 3 And the last uses all three calling conventions in the same function definition: >>> combined_example ( 1 , 2 , 3 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : combined_example() takes 2 positional arguments but 3 were given >>> combined_example ( 1 , 2 , kwd_only = 3 ) 1 2 3 >>> combined_example ( 1 , standard = 2 , kwd_only = 3 ) 1 2 3 >>> combined_example ( pos_only = 1 , standard = 2 , kwd_only = 3 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : combined_example() got some positional-only arguments passed as keyword arguments: 'pos_only' Finally, consider this function definition which has a potential collision between the positional argument name and **kwds which has name as a key: def foo ( name , ** kwds ): return 'name' in kwds There is no possible call that will make it return True as the keyword 'name' will always bind to the first parameter. For example: >>> foo ( 1 , ** { 'name' : 2 }) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : foo() got multiple values for argument 'name' >>> But using / (positional only arguments), it is possible since it allows name as a positional argument and 'name' as a key in the keyword arguments: >>> def foo ( name , / , ** kwds ): ... return 'name' in kwds ... >>> foo ( 1 , ** { 'name' : 2 }) True In other words, the names of positional-only parameters can be used in **kwds without ambiguity. 4.9.3.5. Recap ¶ The use case will determine which parameters to use in the function definition: def f ( pos1 , pos2 , / , pos_or_kwd , * , kwd1 , kwd2 ): As guidance: Use positional-only if you want the name of the parameters to not be available to the user. This is useful when parameter names have no real meaning, if you want to enforce the order of the arguments when the function is called or if you need to take some positional parameters and arbitrary keywords. Use keyword-only when names have meaning and the function definition is more understandable by being explicit with names or you want to prevent users relying on the position of the argument being passed. For an API, use positional-only to prevent breaking API changes if the parameter’s name is modified in the future. 4.9.4. Arbitrary Argument Lists ¶ Finally, the least frequently used option is to specify that a function can be called with an arbitrary number of arguments. These arguments will be wrapped up in a tuple (see Tuples and Sequences ). Before the variable number of arguments, zero or more normal arguments may occur. def write_multiple_items ( file , separator , * args ): file . write ( separator . join ( args )) Normally, these variadic arguments will be last in the list of formal parameters, because they scoop up all remaining input arguments that are passed to the function. Any formal parameters which occur after the *args parameter are ‘keyword-only’ arguments, meaning that they can only be used as keywords rather than positional arguments. >>> def concat ( * args , sep = "/" ): ... return sep . join ( args ) ... >>> concat ( "earth" , "mars" , "venus" ) 'earth/mars/venus' >>> concat ( "earth" , "mars" , "venus" , sep = "." ) 'earth.mars.venus' 4.9.5. Unpacking Argument Lists ¶ The reverse situation occurs when the arguments are already in a list or tuple but need to be unpacked for a function call requiring separate positional arguments. For instance, the built-in range() function expects separate start and stop arguments. If they are not available separately, write the function call with the * -operator to unpack the arguments out of a list or tuple: >>> list ( range ( 3 , 6 )) # normal call with separate arguments [3, 4, 5] >>> args = [ 3 , 6 ] >>> list ( range ( * args )) # call with arguments unpacked from a list [3, 4, 5] In the same fashion, dictionaries can deliver keyword arguments with the ** -operator: >>> def parrot ( voltage , state = 'a stiff' , action = 'voom' ): ... print ( "-- This parrot wouldn't" , action , end = ' ' ) ... print ( "if you put" , voltage , "volts through it." , end = ' ' ) ... print ( "E's" , state , "!" ) ... >>> d = { "voltage" : "four million" , "state" : "bleedin' demised" , "action" : "VOOM" } >>> parrot ( ** d ) -- This parrot wouldn't VOOM if you put four million volts through it. E's bleedin' demised ! 4.9.6. Lambda Expressions ¶ Small anonymous functions can be created with the lambda keyword. This function returns the sum of its two arguments: lambda a, b: a+b . Lambda functions can be used wherever function objects are required. They are syntactically restricted to a single expression. Semantically, they are just syntactic sugar for a normal function definition. Like nested function definitions, lambda functions can reference variables from the containing scope: >>> def make_incrementor ( n ): ... return lambda x : x + n ... >>> f = make_incrementor ( 42 ) >>> f ( 0 ) 42 >>> f ( 1 ) 43 The above example uses a lambda expression to return a function. Another use is to pass a small function as an argument. For instance, list.sort() takes a sorting key function key which can be a lambda function: >>> pairs = [( 1 , 'one' ), ( 2 , 'two' ), ( 3 , 'three' ), ( 4 , 'four' )] >>> pairs . sort ( key = lambda pair : pair [ 1 ]) >>> pairs [(4, 'four'), (1, 'one'), (3, 'three'), (2, 'two')] 4.9.7. Documentation Strings ¶ Here are some conventions about the content and formatting of documentation strings. The first line should always be a short, concise summary of the object’s purpose. For brevity, it should not explicitly state the object’s name or type, since these are available by other means (except if the name happens to be a verb describing a function’s operation). This line should begin with a capital letter and end with a period. If there are more lines in the documentation string, the second line should be blank, visually separating the summary from the rest of the description. The following lines should be one or more paragraphs describing the object’s calling conventions, its side effects, etc. The Python parser strips indentation from multi-line string literals when they serve as module, class, or function docstrings. Here is an example of a multi-line docstring: >>> def my_function (): ... """Do nothing, but document it. ... ... No, really, it doesn't do anything: ... ... >>> my_function() ... >>> ... """ ... pass ... >>> print ( my_function . __doc__ ) Do nothing, but document it. No, really, it doesn't do anything: >>> my_function() >>> 4.9.8. Function Annotations ¶ Function annotations are completely optional metadata information about the types used by user-defined functions (see PEP 3107 and PEP 484 for more information). Annotations are stored in the __annotations__ attribute of the function as a dictionary and have no effect on any other part of the function. Parameter annotations are defined by a colon after the parameter name, followed by an expression evaluating to the value of the annotation. Return annotations are defined by a literal -> , followed by an expression, between the parameter list and the colon denoting the end of the def statement. The following example has a required argument, an optional argument, and the return value annotated: >>> def f ( ham : str , eggs : str = 'eggs' ) -> str : ... print ( "Annotations:" , f . __annotations__ ) ... print ( "Arguments:" , ham , eggs ) ... return ham + ' and ' + eggs ... >>> f ( 'spam' ) Annotations: {'ham': <class 'str'>, 'return': <class 'str'>, 'eggs': <class 'str'>} Arguments: spam eggs 'spam and eggs' 4.10. Intermezzo: Coding Style ¶ Now that you are about to write longer, more complex pieces of Python, it is a good time to talk about coding style . Most languages can be written (or more concise, formatted ) in different styles; some are more readable than others. Making it easy for others to read your code is always a good idea, and adopting a nice coding style helps tremendously for that. For Python, PEP 8 has emerged as the style guide that most projects adhere to; it promotes a very readable and eye-pleasing coding style. Every Python developer should read it at some point; here are the most important points extracted for you: Use 4-space indentation, and no tabs. 4 spaces are a good compromise between small indentation (allows greater nesting depth) and large indentation (easier to read). Tabs introduce confusion, and are best left out. Wrap lines so that they don’t exceed 79 characters. This helps users with small displays and makes it possible to have several code files side-by-side on larger displays. Use blank lines to separate functions and classes, and larger blocks of code inside functions. When possible, put comments on a line of their own. Use docstrings. Use spaces around operators and after commas, but not directly inside bracketing constructs: a = f(1, 2) + g(3, 4) . Name your classes and functions consistently; the convention is to use UpperCamelCase for classes and lowercase_with_underscores for functions and methods. Always use self as the name for the first method argument (see A First Look at Classes for more on classes and methods). Don’t use fancy encodings if your code is meant to be used in international environments. Python’s default, UTF-8, or even plain ASCII work best in any case. Likewise, don’t use non-ASCII characters in identifiers if there is only the slightest chance people speaking a different language will read or maintain the code. Footnotes [ 1 ] Actually, call by object reference would be a better description, since if a mutable object is passed, the caller will see any changes the callee makes to it (items inserted into a list). Table of Contents 4. More Control Flow Tools 4.1. if Statements 4.2. for Statements 4.3. The range() Function 4.4. break and continue Statements 4.5. else Clauses on Loops 4.6. pass Statements 4.7. match Statements 4.8. Defining Functions 4.9. More on Defining Functions 4.9.1. Default Argument Values 4.9.2. Keyword Arguments 4.9.3. Special parameters 4.9.3.1. Positional-or-Keyword Arguments 4.9.3.2. Positional-Only Parameters 4.9.3.3. Keyword-Only Arguments 4.9.3.4. Function Examples 4.9.3.5. Recap 4.9.4. Arbitrary Argument Lists 4.9.5. Unpacking Argument Lists 4.9.6. Lambda Expressions 4.9.7. Documentation Strings 4.9.8. Function Annotations 4.10. Intermezzo: Coding Style Previous topic 3. An Informal Introduction to Python Next topic 5. Data Structures This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 4. More Control Flow Tools | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:40
http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/MT2002/emt19937ar.html
mt19937ar: Mersenne Twister with improved initialization Mersenne Twister with improved initialization Japanese Version News: we released SIMD-oriented Fast Mersenne Twister (SFMT). SFMT is roughly twice faster than the original Mersenne Twister, and has a better equidistibution property, as well as a quicker recovery from zero-excess initial state. Click here! (2007/1/31) Among the all previous initialization routines of MT, there is a small problem that the most significant bit of the seed is not well reflected to the state vector. We should have noticed this when an important caution on initializing tt800 (a small cousin of MT19937) was raised by Jeff Szuhay in the world-known random-number homepage pLab , or when Dick van Albada taught us that the older initialization scheme may yield just nearly "shifted" sequence. The both phenomena arise from the same problem, namely that if two initial states are too near with respect to the Hamming distance, then the corresponding output sequences are close to each other. This type of defficiency becomes very clear by a report by Martin Kretschmar , who initialized the state vector with many zeroes, or some bit-pattern. Then the tendency of non-randomness remains for long. Here putted is a new standard code of MT19937, mt19937ar.c (ar for ARray) solving this shortcoming. This code includes another initialization admitting an array of arbitrary length as a seed. Please use init_genrand(seed) instead of previous initializing routines. Those who need initial seed with more than 32-bit length may use init_by_array() for initialization which admits an array of arbitrary length as seeds. Real versions such as [0,1), 53-bit precision, etc, are available. gzipped tar-file: mt19937ar.tgz . This tar-ball includes C-source mt19937ar.c , its output mt19937ar.out , readme-file readme-mt.txt. This version is free, in the sense that we adoped BSD license, which permits modifications and use in a commercial product. Those who needs speed: all the five real-versions make a function call to the integer version genrand_int(), which makes them slower than the previous versions. If you maximize your compiler's optimization level, it often develops the function call into "inline". If it does not, and if you need speed, then copy the code of genrand_int into the necessary functions, and add by hand your requiring transformation from integer to real. A possibly faster (depending on the platform) version considering Shawn Cokus's code is also available (2002/Feb./11). ( Agner Fog reported that Cokus's code is slower in Pentium 4) This is also freely usable. gzipped tar-file of Cokus-type code with simplification and speed-up by Matthew Bellew: mt19937ar-cok.tgz . This tar-ball includes C-source mt19937ar-cok.c , its output mt19937ar-cok.out , readme-file readme-mt.txt. Pablo M. Ronchi and other people suggested that it is useful to organize the original C code for mt19937ar into three source files: ordinary function file(.c), header file(.h) and test main file(.c). This would be more convenient for users. gzipped tar-file of these files: mt19937ar.sep.tgz . This tar-ball includes C-source mt19937ar.c header file mt19937ar.h C-source for test mtTest.c their output mt19937ar.out readme-file readme-mt.txt. The generation/initialization algorithms are unchanged: same with the original mt19937ar.c (2002 version). These versions are free, may be used for commercial use. Return to MT's page
2026-01-13T08:48:40
https://docs.python.org/3/tutorial/introduction.html#id1
3. An Informal Introduction to Python — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | 3. An Informal Introduction to Python ¶ In the following examples, input and output are distinguished by the presence or absence of prompts ( >>> and … ): to repeat the example, you must type everything after the prompt, when the prompt appears; lines that do not begin with a prompt are output from the interpreter. Note that a secondary prompt on a line by itself in an example means you must type a blank line; this is used to end a multi-line command. You can use the “Copy” button (it appears in the upper-right corner when hovering over or tapping a code example), which strips prompts and omits output, to copy and paste the input lines into your interpreter. Many of the examples in this manual, even those entered at the interactive prompt, include comments. Comments in Python start with the hash character, # , and extend to the end of the physical line. A comment may appear at the start of a line or following whitespace or code, but not within a string literal. A hash character within a string literal is just a hash character. Since comments are to clarify code and are not interpreted by Python, they may be omitted when typing in examples. Some examples: # this is the first comment spam = 1 # and this is the second comment # ... and now a third! text = "# This is not a comment because it's inside quotes." 3.1. Using Python as a Calculator ¶ Let’s try some simple Python commands. Start the interpreter and wait for the primary prompt, >>> . (It shouldn’t take long.) 3.1.1. Numbers ¶ The interpreter acts as a simple calculator: you can type an expression into it and it will write the value. Expression syntax is straightforward: the operators + , - , * and / can be used to perform arithmetic; parentheses ( () ) can be used for grouping. For example: >>> 2 + 2 4 >>> 50 - 5 * 6 20 >>> ( 50 - 5 * 6 ) / 4 5.0 >>> 8 / 5 # division always returns a floating-point number 1.6 The integer numbers (e.g. 2 , 4 , 20 ) have type int , the ones with a fractional part (e.g. 5.0 , 1.6 ) have type float . We will see more about numeric types later in the tutorial. Division ( / ) always returns a float. To do floor division and get an integer result you can use the // operator; to calculate the remainder you can use % : >>> 17 / 3 # classic division returns a float 5.666666666666667 >>> >>> 17 // 3 # floor division discards the fractional part 5 >>> 17 % 3 # the % operator returns the remainder of the division 2 >>> 5 * 3 + 2 # floored quotient * divisor + remainder 17 With Python, it is possible to use the ** operator to calculate powers [ 1 ] : >>> 5 ** 2 # 5 squared 25 >>> 2 ** 7 # 2 to the power of 7 128 The equal sign ( = ) is used to assign a value to a variable. Afterwards, no result is displayed before the next interactive prompt: >>> width = 20 >>> height = 5 * 9 >>> width * height 900 If a variable is not “defined” (assigned a value), trying to use it will give you an error: >>> n # try to access an undefined variable Traceback (most recent call last): File "<stdin>" , line 1 , in <module> NameError : name 'n' is not defined There is full support for floating point; operators with mixed type operands convert the integer operand to floating point: >>> 4 * 3.75 - 1 14.0 In interactive mode, the last printed expression is assigned to the variable _ . This means that when you are using Python as a desk calculator, it is somewhat easier to continue calculations, for example: >>> tax = 12.5 / 100 >>> price = 100.50 >>> price * tax 12.5625 >>> price + _ 113.0625 >>> round ( _ , 2 ) 113.06 This variable should be treated as read-only by the user. Don’t explicitly assign a value to it — you would create an independent local variable with the same name masking the built-in variable with its magic behavior. In addition to int and float , Python supports other types of numbers, such as Decimal and Fraction . Python also has built-in support for complex numbers , and uses the j or J suffix to indicate the imaginary part (e.g. 3+5j ). 3.1.2. Text ¶ Python can manipulate text (represented by type str , so-called “strings”) as well as numbers. This includes characters “ ! ”, words “ rabbit ”, names “ Paris ”, sentences “ Got your back. ”, etc. “ Yay! :) ”. They can be enclosed in single quotes ( '...' ) or double quotes ( "..." ) with the same result [ 2 ] . >>> 'spam eggs' # single quotes 'spam eggs' >>> "Paris rabbit got your back :)! Yay!" # double quotes 'Paris rabbit got your back :)! Yay!' >>> '1975' # digits and numerals enclosed in quotes are also strings '1975' To quote a quote, we need to “escape” it, by preceding it with \ . Alternatively, we can use the other type of quotation marks: >>> 'doesn \' t' # use \' to escape the single quote... "doesn't" >>> "doesn't" # ...or use double quotes instead "doesn't" >>> '"Yes," they said.' '"Yes," they said.' >>> " \" Yes, \" they said." '"Yes," they said.' >>> '"Isn \' t," they said.' '"Isn\'t," they said.' In the Python shell, the string definition and output string can look different. The print() function produces a more readable output, by omitting the enclosing quotes and by printing escaped and special characters: >>> s = 'First line. \n Second line.' # \n means newline >>> s # without print(), special characters are included in the string 'First line.\nSecond line.' >>> print ( s ) # with print(), special characters are interpreted, so \n produces new line First line. Second line. If you don’t want characters prefaced by \ to be interpreted as special characters, you can use raw strings by adding an r before the first quote: >>> print ( 'C:\some \n ame' ) # here \n means newline! C:\some ame >>> print ( r 'C:\some\name' ) # note the r before the quote C:\some\name There is one subtle aspect to raw strings: a raw string may not end in an odd number of \ characters; see the FAQ entry for more information and workarounds. String literals can span multiple lines. One way is using triple-quotes: """...""" or '''...''' . End-of-line characters are automatically included in the string, but it’s possible to prevent this by adding a \ at the end of the line. In the following example, the initial newline is not included: >>> print ( """ \ ... Usage: thingy [OPTIONS] ... -h Display this usage message ... -H hostname Hostname to connect to ... """ ) Usage: thingy [OPTIONS] -h Display this usage message -H hostname Hostname to connect to >>> Strings can be concatenated (glued together) with the + operator, and repeated with * : >>> # 3 times 'un', followed by 'ium' >>> 3 * 'un' + 'ium' 'unununium' Two or more string literals (i.e. the ones enclosed between quotes) next to each other are automatically concatenated. >>> 'Py' 'thon' 'Python' This feature is particularly useful when you want to break long strings: >>> text = ( 'Put several strings within parentheses ' ... 'to have them joined together.' ) >>> text 'Put several strings within parentheses to have them joined together.' This only works with two literals though, not with variables or expressions: >>> prefix = 'Py' >>> prefix 'thon' # can't concatenate a variable and a string literal File "<stdin>" , line 1 prefix 'thon' ^^^^^^ SyntaxError : invalid syntax >>> ( 'un' * 3 ) 'ium' File "<stdin>" , line 1 ( 'un' * 3 ) 'ium' ^^^^^ SyntaxError : invalid syntax If you want to concatenate variables or a variable and a literal, use + : >>> prefix + 'thon' 'Python' Strings can be indexed (subscripted), with the first character having index 0. There is no separate character type; a character is simply a string of size one: >>> word = 'Python' >>> word [ 0 ] # character in position 0 'P' >>> word [ 5 ] # character in position 5 'n' Indices may also be negative numbers, to start counting from the right: >>> word [ - 1 ] # last character 'n' >>> word [ - 2 ] # second-last character 'o' >>> word [ - 6 ] 'P' Note that since -0 is the same as 0, negative indices start from -1. In addition to indexing, slicing is also supported. While indexing is used to obtain individual characters, slicing allows you to obtain a substring: >>> word [ 0 : 2 ] # characters from position 0 (included) to 2 (excluded) 'Py' >>> word [ 2 : 5 ] # characters from position 2 (included) to 5 (excluded) 'tho' Slice indices have useful defaults; an omitted first index defaults to zero, an omitted second index defaults to the size of the string being sliced. >>> word [: 2 ] # character from the beginning to position 2 (excluded) 'Py' >>> word [ 4 :] # characters from position 4 (included) to the end 'on' >>> word [ - 2 :] # characters from the second-last (included) to the end 'on' Note how the start is always included, and the end always excluded. This makes sure that s[:i] + s[i:] is always equal to s : >>> word [: 2 ] + word [ 2 :] 'Python' >>> word [: 4 ] + word [ 4 :] 'Python' One way to remember how slices work is to think of the indices as pointing between characters, with the left edge of the first character numbered 0. Then the right edge of the last character of a string of n characters has index n , for example: +---+---+---+---+---+---+ | P | y | t | h | o | n | +---+---+---+---+---+---+ 0 1 2 3 4 5 6 - 6 - 5 - 4 - 3 - 2 - 1 The first row of numbers gives the position of the indices 0…6 in the string; the second row gives the corresponding negative indices. The slice from i to j consists of all characters between the edges labeled i and j , respectively. For non-negative indices, the length of a slice is the difference of the indices, if both are within bounds. For example, the length of word[1:3] is 2. Attempting to use an index that is too large will result in an error: >>> word [ 42 ] # the word only has 6 characters Traceback (most recent call last): File "<stdin>" , line 1 , in <module> IndexError : string index out of range However, out of range slice indexes are handled gracefully when used for slicing: >>> word [ 4 : 42 ] 'on' >>> word [ 42 :] '' Python strings cannot be changed — they are immutable . Therefore, assigning to an indexed position in the string results in an error: >>> word [ 0 ] = 'J' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment >>> word [ 2 :] = 'py' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment If you need a different string, you should create a new one: >>> 'J' + word [ 1 :] 'Jython' >>> word [: 2 ] + 'py' 'Pypy' The built-in function len() returns the length of a string: >>> s = 'supercalifragilisticexpialidocious' >>> len ( s ) 34 See also Text Sequence Type — str Strings are examples of sequence types , and support the common operations supported by such types. String Methods Strings support a large number of methods for basic transformations and searching. f-strings String literals that have embedded expressions. Format String Syntax Information about string formatting with str.format() . printf-style String Formatting The old formatting operations invoked when strings are the left operand of the % operator are described in more detail here. 3.1.3. Lists ¶ Python knows a number of compound data types, used to group together other values. The most versatile is the list , which can be written as a list of comma-separated values (items) between square brackets. Lists might contain items of different types, but usually the items all have the same type. >>> squares = [ 1 , 4 , 9 , 16 , 25 ] >>> squares [1, 4, 9, 16, 25] Like strings (and all other built-in sequence types), lists can be indexed and sliced: >>> squares [ 0 ] # indexing returns the item 1 >>> squares [ - 1 ] 25 >>> squares [ - 3 :] # slicing returns a new list [9, 16, 25] Lists also support operations like concatenation: >>> squares + [ 36 , 49 , 64 , 81 , 100 ] [1, 4, 9, 16, 25, 36, 49, 64, 81, 100] Unlike strings, which are immutable , lists are a mutable type, i.e. it is possible to change their content: >>> cubes = [ 1 , 8 , 27 , 65 , 125 ] # something's wrong here >>> 4 ** 3 # the cube of 4 is 64, not 65! 64 >>> cubes [ 3 ] = 64 # replace the wrong value >>> cubes [1, 8, 27, 64, 125] You can also add new items at the end of the list, by using the list.append() method (we will see more about methods later): >>> cubes . append ( 216 ) # add the cube of 6 >>> cubes . append ( 7 ** 3 ) # and the cube of 7 >>> cubes [1, 8, 27, 64, 125, 216, 343] Simple assignment in Python never copies data. When you assign a list to a variable, the variable refers to the existing list . Any changes you make to the list through one variable will be seen through all other variables that refer to it.: >>> rgb = [ "Red" , "Green" , "Blue" ] >>> rgba = rgb >>> id ( rgb ) == id ( rgba ) # they reference the same object True >>> rgba . append ( "Alph" ) >>> rgb ["Red", "Green", "Blue", "Alph"] All slice operations return a new list containing the requested elements. This means that the following slice returns a shallow copy of the list: >>> correct_rgba = rgba [:] >>> correct_rgba [ - 1 ] = "Alpha" >>> correct_rgba ["Red", "Green", "Blue", "Alpha"] >>> rgba ["Red", "Green", "Blue", "Alph"] Assignment to slices is also possible, and this can even change the size of the list or clear it entirely: >>> letters = [ 'a' , 'b' , 'c' , 'd' , 'e' , 'f' , 'g' ] >>> letters ['a', 'b', 'c', 'd', 'e', 'f', 'g'] >>> # replace some values >>> letters [ 2 : 5 ] = [ 'C' , 'D' , 'E' ] >>> letters ['a', 'b', 'C', 'D', 'E', 'f', 'g'] >>> # now remove them >>> letters [ 2 : 5 ] = [] >>> letters ['a', 'b', 'f', 'g'] >>> # clear the list by replacing all the elements with an empty list >>> letters [:] = [] >>> letters [] The built-in function len() also applies to lists: >>> letters = [ 'a' , 'b' , 'c' , 'd' ] >>> len ( letters ) 4 It is possible to nest lists (create lists containing other lists), for example: >>> a = [ 'a' , 'b' , 'c' ] >>> n = [ 1 , 2 , 3 ] >>> x = [ a , n ] >>> x [['a', 'b', 'c'], [1, 2, 3]] >>> x [ 0 ] ['a', 'b', 'c'] >>> x [ 0 ][ 1 ] 'b' 3.2. First Steps Towards Programming ¶ Of course, we can use Python for more complicated tasks than adding two and two together. For instance, we can write an initial sub-sequence of the Fibonacci series as follows: >>> # Fibonacci series: >>> # the sum of two elements defines the next >>> a , b = 0 , 1 >>> while a < 10 : ... print ( a ) ... a , b = b , a + b ... 0 1 1 2 3 5 8 This example introduces several new features. The first line contains a multiple assignment : the variables a and b simultaneously get the new values 0 and 1. On the last line this is used again, demonstrating that the expressions on the right-hand side are all evaluated first before any of the assignments take place. The right-hand side expressions are evaluated from the left to the right. The while loop executes as long as the condition (here: a < 10 ) remains true. In Python, like in C, any non-zero integer value is true; zero is false. The condition may also be a string or list value, in fact any sequence; anything with a non-zero length is true, empty sequences are false. The test used in the example is a simple comparison. The standard comparison operators are written the same as in C: < (less than), > (greater than), == (equal to), <= (less than or equal to), >= (greater than or equal to) and != (not equal to). The body of the loop is indented : indentation is Python’s way of grouping statements. At the interactive prompt, you have to type a tab or space(s) for each indented line. In practice you will prepare more complicated input for Python with a text editor; all decent text editors have an auto-indent facility. When a compound statement is entered interactively, it must be followed by a blank line to indicate completion (since the parser cannot guess when you have typed the last line). Note that each line within a basic block must be indented by the same amount. The print() function writes the value of the argument(s) it is given. It differs from just writing the expression you want to write (as we did earlier in the calculator examples) in the way it handles multiple arguments, floating-point quantities, and strings. Strings are printed without quotes, and a space is inserted between items, so you can format things nicely, like this: >>> i = 256 * 256 >>> print ( 'The value of i is' , i ) The value of i is 65536 The keyword argument end can be used to avoid the newline after the output, or end the output with a different string: >>> a , b = 0 , 1 >>> while a < 1000 : ... print ( a , end = ',' ) ... a , b = b , a + b ... 0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987, Footnotes [ 1 ] Since ** has higher precedence than - , -3**2 will be interpreted as -(3**2) and thus result in -9 . To avoid this and get 9 , you can use (-3)**2 . [ 2 ] Unlike other languages, special characters such as \n have the same meaning with both single ( '...' ) and double ( "..." ) quotes. The only difference between the two is that within single quotes you don’t need to escape " (but you have to escape \' ) and vice versa. Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:40
https://dev.to/t/travel
Travel - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # travel Follow Hide Create Post Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu We built a travel journal app while working jobs we hate TripMemo TripMemo TripMemo Follow Jan 6 We built a travel journal app while working jobs we hate # travel # mobileapp # sideprojects # startup Comments Add Comment 2 min read Day 9: Smart Holiday Shopping & Travel (Currency Converter) Michael Amachree Michael Amachree Michael Amachree Follow Dec 31 '25 Day 9: Smart Holiday Shopping & Travel (Currency Converter) # svelte # sveltekit # travel # opensource Comments Add Comment 1 min read WanderChina.Guide: How I Built a China Travel Hub as an AI-Powered Solo Founder DoubleZ DoubleZ DoubleZ Follow Dec 10 '25 WanderChina.Guide: How I Built a China Travel Hub as an AI-Powered Solo Founder # webdev # ai # travel 5  reactions Comments Add Comment 4 min read Building Voyage Planner – Modern Travel Booking Website Adeshina Attoe Adeshina Attoe Adeshina Attoe Follow Nov 24 '25 Building Voyage Planner – Modern Travel Booking Website # webdev # travel # html # css Comments Add Comment 1 min read HappyTravel 🌍 — Helping Tourists Find Their Way Comfortably Lukshan Nilusanka Lukshan Nilusanka Lukshan Nilusanka Follow Oct 30 '25 HappyTravel 🌍 — Helping Tourists Find Their Way Comfortably # webdev # github # javascript # travel 2  reactions Comments Add Comment 1 min read Comparison DSLR vs Mirrorless Camera Which is Best UAE Grow Journal Grow Journal Grow Journal Follow Sep 21 '25 Comparison DSLR vs Mirrorless Camera Which is Best UAE # dslr # camera # photography # travel Comments Add Comment 6 min read Will your travel platform be invisible in the age of AI Agents? Reshab Agarwal Reshab Agarwal Reshab Agarwal Follow Sep 15 '25 Will your travel platform be invisible in the age of AI Agents? # travel # ai Comments Add Comment 3 min read Digital Nomads' Paradise: The Top Destinations Programmers Love in 2025 Nomadas Digitales TOP Nomadas Digitales TOP Nomadas Digitales TOP Follow Oct 3 '25 Digital Nomads' Paradise: The Top Destinations Programmers Love in 2025 # digitalnomad # remotework # programming # travel Comments 1  comment 3 min read I Engineered an AI Prompt to Plan My Vacations Perfectly—Here It Is Hui Hui Hui Follow Sep 23 '25 I Engineered an AI Prompt to Plan My Vacations Perfectly—Here It Is # ai # productivity # promptengineering # travel Comments Add Comment 4 min read Recursos para el Turismo Accesible entre las ciudades de Chicago(Estados Unidos), Madrid y Sevilla (España) ValerianaGit💙 ValerianaGit💙 ValerianaGit💙 Follow Aug 18 '25 Recursos para el Turismo Accesible entre las ciudades de Chicago(Estados Unidos), Madrid y Sevilla (España) # a11y # travel # inclusion # techvioletsoftware Comments Add Comment 1 min read How Much Does It Cost to Build a Flight Booking Engine? Anshi Anshi Anshi Follow Aug 19 '25 How Much Does It Cost to Build a Flight Booking Engine? # travel # webdev # api # cost 1  reaction Comments Add Comment 2 min read Best Time to Visit Mount Abu and Udaipur Alone? Rajasthan Tourism Bureau Rajasthan Tourism Bureau Rajasthan Tourism Bureau Follow Jun 8 '25 Best Time to Visit Mount Abu and Udaipur Alone? # travel # trips # holidays # solotour Comments Add Comment 4 min read Exploring Nature: Top Adventure Spots Near Sabaragamuwa University, Sri Lanka Prabath Kavinda Prabath Kavinda Prabath Kavinda Follow May 30 '25 Exploring Nature: Top Adventure Spots Near Sabaragamuwa University, Sri Lanka # tourist # travel # sports Comments Add Comment 1 min read How I Built a Travel Booking Website While Backpacking Across Europe Amelia Brown Amelia Brown Amelia Brown Follow Jul 2 '25 How I Built a Travel Booking Website While Backpacking Across Europe # webdev # beginners # productivity # travel Comments Add Comment 3 min read Coliving App Open-Source Launch Coliving App Coliving App Coliving App Follow May 13 '25 Coliving App Open-Source Launch # coliving # opensource # digitalnomad # travel Comments Add Comment 3 min read Everything You Need to Know About Niagara Falls? Eeman Eeman Eeman Follow Jun 25 '25 Everything You Need to Know About Niagara Falls? # travel Comments 3  comments 16 min read Unlock Adventure with the Best Buggy Rentals Dubai Has to Offer robertjohn5814 robertjohn5814 robertjohn5814 Follow Apr 24 '25 Unlock Adventure with the Best Buggy Rentals Dubai Has to Offer # buggyrental # travel Comments Add Comment 6 min read A New Era of Agent Native Applications Ilbets Ilbets Ilbets Follow May 24 '25 A New Era of Agent Native Applications # llm # ai # startup # travel 1  reaction Comments 1  comment 6 min read Traveling Solo Abroad: A Journey of Self-Discovery and Adventure Danielle Morris Danielle Morris Danielle Morris Follow May 29 '25 Traveling Solo Abroad: A Journey of Self-Discovery and Adventure # travel Comments 2  comments 2 min read 15 Reasons to Celebrate Your Wedding in Bali Alger Leinoz Alger Leinoz Alger Leinoz Follow Jun 9 '25 15 Reasons to Celebrate Your Wedding in Bali # wedding # travel # management # writing 1  reaction Comments 4  comments 6 min read Dario Schiraldi's Insights: How AI is Impacting the Travel Industry Dario Schiraldi Dario Schiraldi Dario Schiraldi Follow Mar 10 '25 Dario Schiraldi's Insights: How AI is Impacting the Travel Industry # ai # openai # travel Comments Add Comment 3 min read Why Everyone Should Travel Alone At Least Once Melissa Hankins Melissa Hankins Melissa Hankins Follow Apr 9 '25 Why Everyone Should Travel Alone At Least Once # solotravel # travel Comments 2  comments 3 min read My Routine for Work, Training & Travel – Get Things Done & Enjoy It All Per Starke Per Starke Per Starke Follow Mar 9 '25 My Routine for Work, Training & Travel – Get Things Done & Enjoy It All # productivity # business # travel # webdev 6  reactions Comments Add Comment 6 min read The Vital Role of APIs in Driving Innovation in the Travel Industry Ravi Makhija Ravi Makhija Ravi Makhija Follow Feb 20 '25 The Vital Role of APIs in Driving Innovation in the Travel Industry # api # travel # webdev # programming 1  reaction Comments Add Comment 4 min read Thought about traveling to Brazil por 22 segundos Simran Indulkar Simran Indulkar Simran Indulkar Follow Jan 30 '25 Thought about traveling to Brazil por 22 segundos # travel Comments Add Comment 7 min read loading... trending guides/resources Building Voyage Planner – Modern Travel Booking Website WanderChina.Guide: How I Built a China Travel Hub as an AI-Powered Solo Founder HappyTravel 🌍 — Helping Tourists Find Their Way Comfortably Day 9: Smart Holiday Shopping & Travel (Currency Converter) We built a travel journal app while working jobs we hate 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://dev.to/t/communication
Communication - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # communication Follow Hide Tips for talking effectively with your children at every age. Create Post Older #communication posts 1 2 3 4 5 6 7 8 9 Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu MRM (Mention Response Mode) sta sta sta Follow Dec 25 '25 MRM (Mention Response Mode) # slack # productivity # communication # management Comments Add Comment 3 min read Art of a Good Question Karan Thakkar Karan Thakkar Karan Thakkar Follow Dec 22 '25 Art of a Good Question # thinking # communication # career # learning Comments Add Comment 3 min read The Narrative Engine: Why Humans Are Wired for Story and Bored by Data gandolfslayer gandolfslayer gandolfslayer Follow Dec 22 '25 The Narrative Engine: Why Humans Are Wired for Story and Bored by Data # diversity # neuroscience # communication # marketing 2  reactions Comments Add Comment 7 min read How to Explain Your Thought Process During Coding Interviews (Without Sounding Robotic) Alex Hunter Alex Hunter Alex Hunter Follow Dec 15 '25 How to Explain Your Thought Process During Coding Interviews (Without Sounding Robotic) # interviewskills # communication # softskills # interviewprep Comments Add Comment 10 min read The Ultimate Guide to Effective Meeting Summaries: From Chaos to Clarity Anas Kayssi Anas Kayssi Anas Kayssi Follow Jan 8 The Ultimate Guide to Effective Meeting Summaries: From Chaos to Clarity # productivity # engineeringmanagement # communication # workflow Comments Add Comment 4 min read How to Explain Your Code While Writing It in an Interview Alex Hunter Alex Hunter Alex Hunter Follow Dec 12 '25 How to Explain Your Code While Writing It in an Interview # interviewtips # softskills # communication # mockinterview Comments Add Comment 3 min read Effective Facilitation Techniques: Speaker Queue and Speaker Stack sta sta sta Follow Dec 20 '25 Effective Facilitation Techniques: Speaker Queue and Speaker Stack # meetings # communication # facilitation # management Comments Add Comment 2 min read How to Explain Your LeetCode Solution Out Loud During Coding Interviews Alex Hunter Alex Hunter Alex Hunter Follow Dec 8 '25 How to Explain Your LeetCode Solution Out Loud During Coding Interviews # interviewprep # communication # softskills # problemsolving Comments Add Comment 9 min read Your Stakeholder Report Is a Data Dump. Here’s How to Make It a Narrative. Hui Hui Hui Follow Dec 1 '25 Your Stakeholder Report Is a Data Dump. Here’s How to Make It a Narrative. # projectmanagement # communication # leadership # ai Comments Add Comment 6 min read How to Explain LeetCode Solutions in Plain English for Interview Success Alex Hunter Alex Hunter Alex Hunter Follow Dec 8 '25 How to Explain LeetCode Solutions in Plain English for Interview Success # communication # interviewprep # problemsolving # softskills 1  reaction Comments Add Comment 9 min read Communication As A Task: A Mindset for Successful Asynchronous Work sta sta sta Follow Dec 16 '25 Communication As A Task: A Mindset for Successful Asynchronous Work # workplace # management # communication # culture Comments Add Comment 4 min read What You Want is Knowledge sta sta sta Follow Dec 16 '25 What You Want is Knowledge # productivity # communication # devrel Comments Add Comment 4 min read The Art of Thinking Aloud: The Skill That Passes Interviews Alex Hunter Alex Hunter Alex Hunter Follow Dec 15 '25 The Art of Thinking Aloud: The Skill That Passes Interviews # softskills # interviewing # communication # careeradvice 1  reaction Comments Add Comment 5 min read RAIS (Regular Asynchronous Information Sharing) sta sta sta Follow Dec 15 '25 RAIS (Regular Asynchronous Information Sharing) # management # culture # communication # devrel 1  reaction Comments Add Comment 4 min read From AMA to RMA sta sta sta Follow Dec 11 '25 From AMA to RMA # devrel # devex # management # communication Comments Add Comment 2 min read Categorizing Soft Skills into 5Cs sta sta sta Follow Dec 8 '25 Categorizing Soft Skills into 5Cs # communication # collaboration # culture # management 2  reactions Comments 1  comment 7 min read Rapid Q&A sta sta sta Follow Dec 7 '25 Rapid Q&A # qanda # chat # communication Comments Add Comment 4 min read RAP Framework for Asynchronous Work sta sta sta Follow Dec 6 '25 RAP Framework for Asynchronous Work # asynccommunication # asyncwork # async # communication Comments Add Comment 5 min read MAMA (Meeting as an AMA) sta sta sta Follow Nov 27 '25 MAMA (Meeting as an AMA) # ama # meeting # communication Comments 1  comment 4 min read Dry Behavior sta sta sta Follow Nov 26 '25 Dry Behavior # ai # communication Comments Add Comment 3 min read On Engineers Having to Do Emotional Labor sta sta sta Follow Nov 24 '25 On Engineers Having to Do Emotional Labor # discuss # engineering # communication Comments Add Comment 2 min read Full Async sta sta sta Follow Nov 24 '25 Full Async # workstyle # async # communication # tealorganization Comments Add Comment 9 min read Full Remote sta sta sta Follow Nov 24 '25 Full Remote # remote # workstyle # fullremote # communication Comments Add Comment 4 min read Notes and Boards as Virtual Offices: A Lightweight Approach sta sta sta Follow Nov 22 '25 Notes and Boards as Virtual Offices: A Lightweight Approach # virtualoffice # communication # team # workspace Comments Add Comment 4 min read Talk Early, Fail Less: How Communication Builds Great Teams Renan Martins Renan Martins Renan Martins Follow Nov 11 '25 Talk Early, Fail Less: How Communication Builds Great Teams # peopleoverpixels # buildingbetterteams # beyondcode # communication Comments Add Comment 3 min read loading... trending guides/resources On Engineers Having to Do Emotional Labor There's a Limit to Chat Tools — Enter QWINCS! Art of a Good Question MAMA (Meeting as an AMA) How to Explain Your LeetCode Solution Out Loud During Coding Interviews Your Stakeholder Report Is a Data Dump. Here’s How to Make It a Narrative. What You Want is Knowledge Dry Behavior Categorizing Soft Skills into 5Cs Full Async MRM (Mention Response Mode) Effective Facilitation Techniques: Speaker Queue and Speaker Stack The Art of Thinking Aloud: The Skill That Passes Interviews Full Remote No Impression Is an Impression — and Why Tolerance for Disrespect Taught Me More About Myself Tha... RAP Framework for Asynchronous Work The Ultimate Guide to Effective Meeting Summaries: From Chaos to Clarity The Narrative Engine: Why Humans Are Wired for Story and Bored by Data RAIS (Regular Asynchronous Information Sharing) Communication As A Task: A Mindset for Successful Asynchronous Work 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://openapi.tools/collections/opensource
Open Source Tools | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Open Source Tools Free and open source tools for working with OpenAPI descriptions. These tools have publicly available source code that you can inspect, modify, and contribute to. They’re great for self-hosting, customization, and learning how OpenAPI tooling works under the hood. * * *
2026-01-13T08:48:40
https://parenting.forem.com/privacy#4-how-we-disclose-your-information
Privacy Policy - Parenting Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Parenting Close Privacy Policy Last Updated: September 01, 2023 This Privacy Policy is designed to help you understand how DEV Community Inc. (" DEV ," " we ," or " us ") collects, use, and discloses your personal information. What's With the Defined Terms? You'll notice that some words appear in quotes in this Privacy Policy.  They're called "defined terms," and we use them so that we don't have to repeat the same language again and again.  They mean the same thing in every instance, to help us make sure that this Privacy Policy is consistent. We've included the defined terms throughout because we want it to be easy for you to read them in context. 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? 2. PERSONAL INFORMATION WE COLLECT 3. HOW WE USE YOUR INFORMATION 4. HOW WE DISCLOSE YOUR INFORMATION 5. YOUR PRIVACY CHOICES AND RIGHTS 6. INTERNATIONAL DATA TRANSFERS 7. RETENTION OF PERSONAL INFORMATION 8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS 10. CHILDREN'S INFORMATION 11. OTHER PROVISIONS 12. CONTACT US 1. WHAT DOES THIS PRIVACY POLICY APPLY TO? This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, and other online or offline offerings — basically anything we do. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are all collectively called the " Services. " Beyond this Privacy Policy, your use of the Services is subject to our DEV Community Terms and our Forem Terms. The Services include both our own community forum at https://www.dev.to (the " DEV Community ") and the open source tool we provide called " Forem ," available at https://www.forem.com which allows our customers to create and operate their own online forums. We collect personal information from two categories of people: (1) our customers, who use Forem and our hosting services to run and host their own forums (we'll call them " Forem Operators "), and (2) the people who interact with DEV-hosted forums, including forums provided by Forem Operators utilizing Forem and separately our own DEV Community (we'll call them " Users "). An Important Note for Users Since we provide hosting services for Forem Operators, technically we also process your information on their behalf. That processing is governed by the contracts that we have in place with each Forem Operator, not this Privacy Policy. In other words, when you share your data on a DEV-hosted forum operated by a Forem Operator, we at DEV are basically just the "pipes" — we process the data on behalf of the Forem Operator, but don't do anything with it ourselves beyond what we're required to do under our contract (and by law). So, if you post your information on a DEV-powered forum provided by a Forem Operator, that Forem Operator's privacy policy applies, and any questions or requests relating to your data on that service should be directed to that Forem Operator, not us. Likewise, if you use our mobile application, you may also interact with forums that use DEV's open-source tools but do all their hosting and data collection themselves. For those forums, we at DEV have no access to your data, so be sure to read the privacy policy of any third-party hosted forum before posting. 2. PERSONAL INFORMATION WE COLLECT The categories of personal information we collect depend on whether you're a User or Forem Operator, how you interact with us, our Services, and the requirements of applicable law. Breaking it down, we collect three types of information: (1) information that you provide to us directly, (2) information we obtain automatically when you use our Services, and (3) information we get about you from other sources (such as third-party services and organizations). More details are below. A. Information You Provide to Us Directly We may collect the following personal information that you provide to us. Account Creation (for Forem Operators): We'll require your name and email address to get started, as well as some details about the Forem you want to run, such as: whether you're running the Forem on your own behalf or as part of an organization, and details about the community you want to support (how big is it, what topics does it cover, where do members currently communicate, how/if the community earns money, whether the community is open, invite-only or paid, any existing social media accounts, etc.) You'll need to tell us a bit about your personal coding background, and you'll have the option to provide your DEV username as well, if you are a member of the DEV.to community. Account Creation (for Users) : We collect name and email address from users that create an account on DEV Community. For other forums created by Forem Operators using Forem, the Forem Operator determines what information is required for User account creation for their respective forums. Interactive Features (for Users) . Like any other social network, both we and other Users of our Services may collect personal information that you submit or make available through our interactive features (e.g., messaging and chat features, commenting functionalities, forums, blogs, posts, and other social media pages). While we do have private messages that are only between you and the person you're messaging (as well as us and the Forem Operator, as applicable), any information you provide using the public sharing features of the Services, such as the information you post to your public profile or the topics you follow is public, including to recruiters and prospective employers, and is not subject to any of the privacy protections we mention in this Privacy Policy except where legally required. Please exercise caution before revealing any information that may identify you in the real world to others. Purchases . If you buy stuff on our shop site https://shop.dev.to/ (as either a User or Forem Operator), or otherwise if you pay us in connection with your use of the Forem service, we may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors, such as Stripe, Shopify, and PayPal. We do not directly collect or store any payment card information entered through our Services, but may receive information associated with your payment card information (e.g., your billing details). Your Communications with Us (Users and Forem Operators) . We may collect personal information, such as email address, phone number, or mailing address when you request information about our Services, register for our newsletter or loyalty program, request customer or technical support, apply for a job, or otherwise communicate with us. Surveys . We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information (for example, your home address). Sweepstakes or Contests . We may collect personal information you provide for any sweepstakes or contests that we offer. In some jurisdictions, we are required to publicly share information of sweepstakes and contest winners. Conferences, Trade Shows, and Other Events . We may collect personal information from individuals when we attend conferences, trade shows, and other events. Business Development and Strategic Partnerships . We may collect personal information from individuals and third parties to assess and pursue potential business opportunities. Job Applications . We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications. B. Information Collected Automatically We may collect personal information automatically when you use our Services: Automatic Data Collection . We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you in their posts. Cookies, Pixel Tags/Web Beacons, and Other Technologies . We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (" Technologies ") to automatically collect information through your use of our Services. Cookies . Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience. Pixel Tags/Web Beacons . A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded. Our uses of these Technologies fall into the following general categories: Operationally Necessary . This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality. Performance-Related . We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services ( see Analytics below ). Functionality-Related . We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed. Analytics . We may use Technologies and other third-party tools to process analytics information on our Services. Some of our analytics partners include Google Analytics. For more information,please visit Google Analytics' Privacy Policy . To learn more about how to opt-out of Google Analytics' use of your information, please click here . Social Media Platforms . Our Services may contain social media buttons such as Twitter, Facebook, GitHub, Instagram, and Twitch (that might include widgets such as the "share this" button or other interactive mini programs). These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it. See the "Your Privacy Choices and Rights" section below to understand your choices regarding these Technologies. C. Information Collected from Other Sources We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service (e.g., through Twitter, Apple, or GitHub), or a social networking site, we may collect whatever information about you from that third-party application that you have made available via your privacy settings. 3. HOW WE USE YOUR INFORMATION We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below. A. Provide Our Services We use your information to fulfill our contract with you and provide you with our Services, such as: Managing your information and accounts; Providing access to certain areas, functionalities, and features of our Services; Answering requests for customer or technical support; Communicating with you about your account, activities on our Services, and policy changes; Processing your financial information and other payment methods for products or Services purchased; Processing applications if you apply for a job we post on our Services; and Allowing you to register for events. B. Administrative Purposes We use your information for various administrative purposes, such as: Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention; Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity; Measuring interest and engagement in our Services, including for usage-based billing purposes; Short-term, transient use, such as contextual customization of ads; Improving, optimizing, upgrading, or enhancing our Services; Developing new products and Services; Ensuring internal quality control and safety; Authenticating and verifying individual identities, including requests to exercise your rights under this policy; Debugging to identify and repair errors with our Services; Auditing relating to interactions, transactions and other compliance activities; Enforcing our agreements and policies; and Complying with our legal obligations. C. Marketing and Advertising our Products and Services We may use your personal information to tailor and provide you with content and advertisements for our Services, such as via email. If you have any questions about our marketing practices, you may contact us at any time as set forth in the "Contact Us" section below. D. Other Purposes We also use your information for other purposes as requested by you or as permitted by applicable law. Consent . We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent. Automated Decision Making. We may engage in automated decision making, including profiling, such as to suggest topics or other Users for you to follow. DEV's processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth in the "Contact Us" section below. De-identified and Aggregated Information . We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, information about the device from which you access our Services, or other analyses we create. For example, we may collect system-wide information to ensure availability of the platform, or measure aggregate data trends to analyze and optimize our Services. Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services. Please only share with us contact information of people with whom you have a relationship (e.g., relative, friend neighbor, or co-worker). 4. HOW WE DISCLOSE YOUR INFORMATION We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below. A. Disclosures to Provide our Services The categories of third parties with whom we may share your information are described below. Service Providers . We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, customer service, and related services. For example, our Shop site is run by Shopify, who handle your shipping details on our behalf. Business Partners . We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services. Other Users . As described above in the "Personal Information We Collect" section of this Privacy Policy, our Service allows Users to share their profiles, and any posts, chats, etc. with other Users and with the general public, including to those who do not use our Services. APIs/SDKs . We may use third-party Application Program Interfaces ("APIs") and Software Development Kits ("SDKs") as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth in the "Contact Us" section below. B . Disclosures to Protect Us or Others We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others' rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; or assist with an investigation or prosecution of suspected or actual illegal activity. C. Disclosure in the Event of Merger, Sale, or Other Asset Transfers If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract. 5. YOUR PRIVACY CHOICES AND RIGHTS Your Privacy Choices . The privacy choices you may have about your personal information are determined by applicable law and are described below. Email Communications . If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy). Mobile Devices . We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. "Do Not Track." Do Not Track (" DNT ") is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers. Cookies and Interest-Based Advertising . You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. Please note you must separately opt out in each browser and on each device. Your Privacy Rights . In accordance with applicable law, you may have the right to: Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; Request Correction of your personal information where it is inaccurate, incomplete or outdated. In some cases, we may provide self-service tools that enable you to update your personal information; Request Deletion, Anonymization or Blocking of your personal information when processing is based on your consent or when processing is unnecessary, excessive or noncompliant; Request Restriction of or Object to our processing of your personal information when processing is noncompliant; Withdraw Your Consent to our processing of your personal information. If you refrain from providing personal information or withdraw your consent to processing, some features of our Service may not be available; Request Data Portability and Receive an Electronic Copy of Personal Information that You Have Provided to Us; Be Informed about third parties with which your personal information has been shared; and Request the Review of Decisions Taken Exclusively Based on Automated Processing if such decisions could affect your data subject rights. If you would like to exercise any of these rights, please contact us as set forth in "Contact Us" below. We will process such requests in accordance with applicable laws. 6. INTERNATIONAL DATA TRANSFERS All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We always strive to safeguard your information consistent with the requirements of applicable laws. 7. RETENTION OF PERSONAL INFORMATION We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary: to fulfill the purpose or purposes for which it was collected, to provide our Services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to enforce our agreements, and to comply with applicable laws.  8. SUPPLEMENTAL DISCLOSURES FOR CALIFORNIA RESIDENTS Refer-a-Friend and Similar Incentive Programs . As described above in the How We Use Your Personal Information section ("Share Content with Friends or Colleagues" subsection), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party's data to us depends on whether the referred party ultimately becomes a User or Forem Operator and uses our Services. Said value will be reflected in the incentive offered in connection with each program. Accessibility . This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium's Web Content Accessibility Guidelines, version 2.1* . * If you wish to print this policy, please do so from your web browser or by saving the page as a PDF. California Shine the Light . The California "Shine the Light" law permits users who are California residents to request and obtain from us once a year, free of charge, a list of the third parties to whom we have disclosed their personal information (if any) for their direct marketing purposes in the prior calendar year, as well as the type of personal information disclosed to those parties. Right for Minors to Remove Posted Content . Where required by law, California residents under the age of 18 may request to have their posted content or information removed from the publicly-viewable portions of the Services by contacting us directly as set forth in the "Contact Us" section below or by logging into their account and removing the content or information using our self-service tools. 9. SUPPLEMENTAL NOTICE FOR NEVADA RESIDENTS If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth in the "Contact Us\" section below with the subject line "Nevada Do Not Sell Request" and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A. If you have any questions, please contact us as set forth below. 10. CHILDREN'S INFORMATION The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children. If you are a parent or guardian and believe your child has uploaded personal information to our site without your consent, you may contact us as described in the "Contact Us" section below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child's account if applicable. 11. OTHER PROVISIONS Third-Party Websites or Applications . The Services may contain links to other websites or applications, and other websites or applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk. Changes to Our Privacy Policy . We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect. 12. CONTACT US If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at: support@dev.to . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Parenting — A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Parenting © 2016 - 2026. Navigating the chaos and joy of parenting. Log in Create account
2026-01-13T08:48:40
https://aws.amazon.com/blogs/developer/aws-sdk-for-net-v3-5-preview/#aws-page-content-main
AWS SDK for .NET v3.5 Preview | AWS Developer Tools Blog Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions AWS Developer Tools Blog AWS SDK for .NET v3.5 Preview by Aaron Costley on 06 FEB 2020 in .NET , AWS .NET Development , AWS SDK for .NET , Developer Tools Permalink Share Today, we have published a preview release of version 3.5 of the AWS SDK for .NET. This primary objective of this version is to transition support for all non-Framework versions of the SDK to .NET Standard 2.0. If you are currently using a .NET Framework or .NET Core target, no changes are required. We are doing this to accelerate feature development and offer newer functionality to a greater set of customers going forward. What does this mean for you? Platform Requirements .NET Framework, .NET Core, .NET Standard No changes. You should experience no breakages, and no action is required. Xamarin If you are starting a new project, target .NET Standard 2.0. If you have an existing project, port your existing solution to .NET Standard 2.0. Migration guide Platform support Unity Target the .NET Standard 2.0 or .NET 4.x profiles using Unity 2018.1 or later. As noted in a tutorial blog post , if you are using IL2CPP to build, you must disable code stripping by adding a link.xml file. Universal Windows Platform (UWP) Target your UWP application to version 16299 or later (Fall Creators update, version 1709, released October 2017). Windows Phone, Silverlight These platform targets are discouraged by Microsoft, and are not undergoing active development. Therefore, these platforms have been dropped and there is no migration path. Windows Phone EOL Silverlight EOL Legacy Portable Class Libraries (Profile-Based PCLs) Consider re-targeting your library to .NET Standard, as per guidance from Microsoft . Asynchronous Programming The .NET Standard version of the AWS SDK for .NET only supports asynchronous calls to AWS services. This is preferred pattern for making web calls for performance and scalability. If your application is currently using synchronous calls, the code will need to be changed to use the asynchronous versions. Unity has access to all services Unity has historically only had access to 13 services offered by AWS. With the transition to .NET Standard and use of version 3.5 of the AWS SDK for .NET binaries, Unity customers will have access to all services offered by AWS at the same time and at the same support level as all other supported platforms. Archival of Unity core Unity (since 2018.1) is supported via .NET Standard 2.0. As a result, all-Unity specific code in AWSSDK.Core has been removed. This includes some higher-level functionality that was included in that codebase. To provide a better transition, all the Unity code has been extracted into a GitHub archive repository for reference. If there is missing functionality in the .NET Standard version of the SDK impacting your use of AWS with Unity, please file a feature request. Unity Archive: https://github.com/aws/aws-sdk-unity-net Extraction of Cognito Sync Manager, Mobile Analytics Manager These higher level abstractions allowing easier use of Amazon Cognito Sync and Amazon Mobile Analytics have been removed from the SDK. These libraries will be made available in separate repositories and distributed via new NuGet packages. Amazon Pinpoint is the preferred replacement for Amazon Mobile Analytics. AWS AppSync is the preferred replacement for Amazon Cognito Sync. We are aware that there are gaps in support for these new services in the SDK. If you are affected by the lack of higher-level library code for these services, please upvote the pinned feature issues and add relevant comments. Amazon Pinpoint Higher Level library tracking issue Amazon AppSync Higher Level Library/Amplify support tracking issue Cognito Sync Manager: https://github.com/aws/amazon-cognito-sync-manager-net Mobile Analytics Manager: https://github.com/aws/aws-mobile-analytics-manager-net Try it out! We encourage you to try out the preview to ensure a smooth transition to the new version when it goes GA. The NuGet packages are using the version 3.5.0.0-beta. You will need to enable “preview versions” to get access to this version. The beta is currently based on version 3.3.633.0 of the SDK (Released 2020-01-14). If you need to use DLLs (for example, for Unity), you can get the .NET Standard 2.0 binaries here . If you encounter ANY issues not documented in this post, please file a issue in the aws-sdk-net repository on GitHub. TAGS: .NET , C# , Silverlight , Unity , Universal Windows Platform , Windows , Windows Phone , Xamarin Aaron Costley Resources Developer Resources & Community Open Source Repos Twitch Live Coding Labs on Github Follow  Instagram  Reddit  Twitter  Facebook  LinkedIn  Twitch  Email Updates @charset "UTF-8";[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4{position:relative;transition:box-shadow .3s ease}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover{box-shadow:var(--rg-shadow-gray-elevation-1, 1px 1px 20px rgba(0, 0, 0, .1))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover.rgft_e79955da{box-shadow:var(--rg-shadow-gray-elevation-2, 1px 1px 24px rgba(0, 0, 0, .25))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover{box-shadow:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde{position:relative;transform-style:preserve-3d;overflow:unset!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:before{content:"";position:absolute;inset:0;border-radius:inherit;transform:translateZ(-1px);pointer-events:none;transition-property:filter,inset;transition-duration:.3s;transition-timing-function:ease;background-clip:content-box!important;padding:1px}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_4df65418:hover:before{filter:blur(20px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover:before{filter:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_e90ac70d:active:before{filter:blur(8px)!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_a4f580d2:before{filter:blur(8px)!important}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #fa6f00 0%, #e433ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #0099ff 0%, #5c7fff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #ff1ae0 0%, #ff386a 50%, #fa6f00 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #00bd6b 0%, #00a4bd 50%, #0099ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #00bd6b 0%, #0099ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #ad5cff 0%, #0099ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #ff1ae0 0%, #8575ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:linear-gradient(123deg,#d14600,#c300e0,#6842ff)}[data-eb-6a8f3296] [data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] a.rgft_f7822e54,[data-eb-6a8f3296] button.rgft_f7822e54{--button-size: 44px;--button-pad-h: 24px;--button-pad-borderless-h: 26px;border:2px solid var(--rg-color-background-page-inverted, #0F141A);padding:8px var(--button-pad-h, 24px);border-radius:40px!important;align-items:center;justify-content:center;display:inline-flex;height:var(--button-size, 44px);text-decoration:none!important;text-wrap:nowrap;cursor:pointer;position:relative;transition:all .3s ease}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_094d67e1,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_094d67e1{--button-size: 32px;--button-pad-h: 14px;--button-pad-borderless-h: 16px}[data-eb-6a8f3296] a.rgft_f7822e54>span,[data-eb-6a8f3296] button.rgft_f7822e54>span{color:var(--btn-text-color, inherit)!important}[data-eb-6a8f3296] a.rgft_f7822e54:focus-visible,[data-eb-6a8f3296] button.rgft_f7822e54:focus-visible{outline:2px solid var(--rg-color-focus-ring, #006CE0)!important;outline-offset:4px!important;transition:outline 0s}[data-eb-6a8f3296] a.rgft_f7822e54:focus:not(:focus-visible),[data-eb-6a8f3296] button.rgft_f7822e54:focus:not(:focus-visible){outline:none!important}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_303c672b,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_303c672b{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-primary-bg, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_18409398{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border-color:var(--rg-color-background-page-inverted, #0F141A)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_090951dc{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-background-object, #F3F3F7);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--btn-text-color: var(--rg-color-text-utility, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e{background-image:var(--rg-gradient-a, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-visited-bg, #656871);border-color:var(--rg-color-btn-visited-bg, #656871)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-visited-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5{--btn-text-color: var(--rg-color-btn-disabled-text, #B4B4BB);background-color:var(--rg-color-btn-disabled-bg, #F3F3F7);border-color:var(--rg-color-btn-disabled-bg, #F3F3F7);cursor:default}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f{border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_090951dc{--btn-text-color: var(--rg-color-btn-tertiary-disabled-text, #B4B4BB);background-color:#0000}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e){--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad80,#f8c7ff80 37.79%,#d2ccff80 75.81%,#c2d1ff80)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(248, 199, 255, .5) 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(120, 0, 138, .5) 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] .rgft_8711ccd9{-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;background:#0000;border:none;margin:0}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_5e58a6df{text-align:center}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_b7ada98b{display:block}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_beb26dc7{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}[data-eb-6a8f3296] .rgft_8711ccd9 a{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_8711ccd9 a:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_8711ccd9 a:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_d72bdead .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_8711ccd9 a:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_d72bdead{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_8711ccd9 b,[data-eb-6a8f3296] b.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 strong,[data-eb-6a8f3296] strong.rgft_8711ccd9{font-weight:700}[data-eb-6a8f3296] i.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 i,[data-eb-6a8f3296] em.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 em{font-style:italic}[data-eb-6a8f3296] u.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 u{text-decoration:underline}[data-eb-6a8f3296] code.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 code{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace;border-radius:4px;border:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);color:var(--rg-color-text-secondary, #232B37);padding-top:var(--rg-padding-8);padding-right:var(--rg-padding-8);padding-bottom:var(--rg-padding-8);padding-left:var(--rg-padding-8)}[data-eb-6a8f3296] .rgft_12e1c6fa{display:inline!important;vertical-align:middle}[data-eb-6a8f3296] .rgft_8711ccd9 p img{aspect-ratio:16/9;height:100%;object-fit:cover;width:100%;border-radius:8px;order:1;margin-bottom:var(--rg-margin-4)}[data-eb-6a8f3296] .rgft_8711ccd9 table{table-layout:fixed;border-spacing:0;width:100%}[data-eb-6a8f3296] .rgft_8711ccd9 table td{font-size:14px;border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6)}[data-eb-6a8f3296] .rgft_8711ccd9 table td:first-of-type{border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:first-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:first-of-type{border-top-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:last-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:last-of-type{border-top-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:first-of-type{border-bottom-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:last-of-type{border-bottom-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead),:has(th)) tr:first-of-type td{border-top:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th{color:var(--rg-color-text-primary-inverted, #FFFFFF);min-width:280px;max-width:400px;padding:0;text-align:left;vertical-align:top;background-color:var(--rg-color-background-object-inverted, #232B37);border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6);row-gap:var(--rg-margin-5);column-gap:var(--rg-margin-5);max-width:100%;min-width:150px}@media (min-width: 480px) and (max-width: 767px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:100%;min-width:150px}}@media (min-width: 768px) and (max-width: 1023px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:240px;min-width:180px}}@media (min-width: 1024px) and (max-width: 1279px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:350px;min-width:240px}}@media (min-width: 1280px) and (max-width: 1599px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}@media (min-width: 1600px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}[data-eb-6a8f3296] .rgft_8711ccd9 table th:first-of-type{border-top-left-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:nth-of-type(n+3){border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:last-of-type{border-top-right-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_a1b66739{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26);--icon-color: currentcolor}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_a1b66739 svg{fill:none;stroke:none}[data-eb-6a8f3296] .rgft_a1b66739 path[data-fill]:not([fill]){fill:var(--icon-color)}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]{stroke-width:2}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]:not([stroke]){stroke:var(--icon-color)}[data-eb-6a8f3296] .rgft_3ed66ff4{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26)}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_9124b200{height:10px;width:10px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_98b54368{color:var(--rg-color-text-body, #232B37)}[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_275611e5{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_275611e5{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_275611e5{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_275611e5{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_275611e5{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_007aef8b{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_007aef8b{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_ff19c5f9{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_ff19c5f9{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368 ul{list-style-type:disc;margin-top:2rem}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_9beb7cc5 .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_9beb7cc5{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_d835af5c{color:var(--rg-color-text-title, #161D26)}[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(4.5rem * var(--font-size-multiplier, 1.6));line-height:1.111;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_3e9243e1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_3e9243e1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_54816d41{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_54816d41{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2rem * var(--font-size-multiplier, 1.6));line-height:1.25;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_852a8b78{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_852a8b78{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d{letter-spacing:1.6px;text-transform:uppercase;color:var(--rg-color-text-eyebrow, #161D26)}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_cf5cdf86{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_cf5cdf86{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:2.4;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_c6f92487{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_c6f92487{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751{color:var(--rg-color-text-utility, #161D26)}[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_927d7fd1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_927d7fd1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_100c8a76{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_100c8a76{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_453dc601{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_453dc601{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_949ed5ce{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_949ed5ce{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_949ed5ce{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_949ed5ce{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_949ed5ce{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_5d220f64{color:var(--rg-color-text-heading, #161D26)}[data-eb-6a8f3296] .rgft_5d220f64.rgft_94339b09{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.1;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_5d220f64.rgft_94339b09{font-size:calc(2rem * var(--font-size-multiplier, 1.6));line-height:1.25;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_5d220f64.rgft_94339b09{font-size:calc(1.75rem * var(--font-size-multiplier, 1.6));line-height:1.286;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_5d220f64.rgft_94339b09{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_5d220f64.rgft_94339b09{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_5d220f64.rgft_94339b09{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_5d220f64.rgft_94339b09{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_5d220f64.rgft_94339b09{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_5d220f64.rgft_26b3f3ee{font-size:calc(2rem * var(--font-size-multiplier, 1.6));line-height:1.25;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_5d220f64.rgft_26b3f3ee{font-size:calc(1.75rem * var(--font-size-multiplier, 1.6));line-height:1.286;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_5d220f64.rgft_26b3f3e
2026-01-13T08:48:40
https://support.google.com/chrome/answer/2392709?hl=en&ref_topic=7438325
Delete browsing data in Chrome - Android - Google Chrome Help Skip to main content Google Chrome Help Sign in Google Help Help Center Community Google Chrome Privacy Policy Terms of Service Submit feedback Send feedback on... This help content & information General Help Center experience Next Help Center Community Google Chrome Delete browsing data in Chrome You can delete your Chrome browsing history and other browsing data, like saved form entries, or just delete data from a specific date. What happens to your info Data that can be deleted Browsing history: Deleting your browsing history deletes the following: Web addresses you've visited are removed from the History page. Shortcuts to those pages are removed from the New Tab page. Address bar predictions for those websites are no longer shown. Tabs: Open tabs on your device will be closed. Cookies and site data Cookies: These are files created by websites you visit to make your online experience easier by saving browsing information. Cookies are deleted. Site data: HTML5-enabled storage types including application caches, Web Storage data , Web SQL Database data , and Indexed Database data are deleted. Media licenses: Licenses for HTML5 protected content, like movies or music that you’ve played or downloaded, are deleted. Cached images and files: Chrome remembers parts of pages to help them open faster during your next visit. Text and images from pages you've visited in Chrome are removed. Saved passwords: Passwords you saved are deleted. Autofill form data: Your autofill entries are deleted, including addresses and credit cards. Cards and addresses saved in your Google Account aren't deleted. Site settings: Settings and permissions you give to websites are deleted. For example, if a site can run JavaScript, use your camera, or know your location. Data that doesn't get deleted There are other types of data that are related to your behavior online. These other types of data can be deleted separately: Search history & other Google activity: Searches and other activity on Google services are saved to your Google Account. Learn how to delete Google activity . If you're giving away your device, remember to delete your browsing data and then sign out of Chrome . Delete your browsing data Important: If you delete data saved to your Google Account from your Android device, it gets removed from all devices where you’re signed in to your Google Account. On your Android device, open Chrome . On the right of the address bar, tap More Delete browsing data . To delete browsing history (including open tabs), choose a duration and tap Delete data . The default duration is 15 minutes. To choose more specific types of data you want to delete, tap More options . Select the types of browsing data you want to delete and tap Delete data . If you delete cookies while signed in to Chrome, you won’t be signed out of your Google Account. Tips: To sign out of your Google Account on all websites, sign out of Chrome. To quickly reach the Delete browsing data dialog, in the address bar, type “Delete browsing data” and then tap the Action chip . Learn Chrome Actions to quickly complete tasks . Delete individual items Instead of deleting entire categories of your browsing data, you can pick items to delete: Page you visited Downloaded file Saved password Cookies from a website Autofill entry Related resources Check or delete your Chrome browsing history Delete, allow and manage cookies in Chrome Manage passwords Was this helpful? How can we improve it? Yes No Submit Android Computer iPhone & iPad More Need more help? Try these next steps: Post to the help community Get answers from community members true Help 1 of 7 Delete browsing data in Chrome 2 of 7 Export your data from Chrome 3 of 7 Check or delete your Chrome browsing history 4 of 7 Delete, allow, and manage cookies in Chrome 5 of 7 Manage passwords in Chrome 6 of 7 Reset Chrome settings to default 7 of 7 Learn about on-device site data in Chrome ©2026 Google Privacy Policy Terms of Service Language Afrikaans‎ català‎ dansk‎ Deutsch‎ eesti‎ English (United Kingdom)‎ español‎ español (Latinoamérica)‎ Filipino‎ français‎ hrvatski‎ Indonesia‎ isiZulu‎ italiano‎ Kiswahili‎ latviešu‎ lietuvių‎ magyar‎ Melayu‎ Nederlands‎ norsk‎ polski‎ português‎ português (Brasil)‎ română‎ slovenčina‎ slovenščina‎ suomi‎ svenska‎ Tiếng Việt‎ Türkçe‎ čeština‎ Ελληνικά‎ български‎ русский‎ српски‎ українська‎ ‏ עברית ‏ العربية ‏ فارسی मराठी‎ हिन्दी‎ తెలుగు‎ ไทย‎ አማርኛ‎ 中文(简体)‎ 中文(繁體)‎ 日本語‎ 한국어‎ English‎ Enable Dark Mode Send feedback on... This help content & information General Help Center experience Search Clear search Close search Google apps Main menu var n,aaa=[];function la(a){return function(){return aaa[a].apply(this,arguments)}} function ma(a,b){return aaa[a]=b} var baa=typeof Object.create=="function"?Object.create:function(a){function b(){} b.prototype=a;return new b},na=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a; a[b]=c.value;return a}; function caa(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b >>0)+"_",f=0;return b}); ra("Symbol.iterator",function(a){if(a)return a;a=Symbol("Symbol.iterator");na(Array.prototype,a,{configurable:!0,writable:!0,value:function(){return naa(haa(this))}}); return a}); function naa(a){a={next:a};a[Symbol.iterator]=function(){return this}; return a} ra("Promise",function(a){function b(k){this.o=0;this.oa=void 0;this.ma=[];this.ya=!1;var l=this.ua();try{k(l.resolve,l.reject)}catch(p){l.reject(p)}} function c(){this.o=null} function e(k){return k instanceof b?k:new b(function(l){l(k)})} if(a)return a;c.prototype.ma=function(k){if(this.o==null){this.o=[];var l=this;this.oa(function(){l.qa()})}this.o.push(k)}; var f=oa.setTimeout;c.prototype.oa=function(k){f(k,0)}; c.prototype.qa=function(){for(;this.o&&this.o.length;){var k=this.o;this.o=[];for(var l=0;l =h}}); ra("String.prototype.endsWith",function(a){return a?a:function(b,c){var e=Ua(this,b,"endsWith");b+="";c===void 0&&(c=e.length);c=Math.max(0,Math.min(c|0,e.length));for(var f=b.length;f>0&&c>0;)if(e[--c]!=b[--f])return!1;return f f)e=f;e=Number(e);e =0&&b 56319||b+1===e)return f;b=c.charCodeAt(b+1);return b 57343?f:(f-55296)*1024+b+9216}}}); ra("String.fromCodePoint",function(a){return a?a:function(b){for(var c="",e=0;e 1114111||f!==Math.floor(f))throw new RangeError("invalid_code_point "+f);f >>10&1023|55296),c+=String.fromCharCode(f&1023|56320))}return c}}); ra("String.prototype.repeat",function(a){return a?a:function(b){var c=Ua(this,null,"repeat");if(b 1342177279)throw new RangeError("Invalid count value");b|=0;for(var e="";b;)if(b&1&&(e+=c),b>>>=1)c+=c;return e}}); ra("Array.prototype.findIndex",function(a){return a?a:function(b,c){return oaa(this,b,c).i}}); function Wa(a){a=Math.trunc(a)||0;a =this.length))return this[a]} ra("Array.prototype.at",function(a){return a?a:Wa}); daa("at",function(a){return a?a:Wa}); ra("String.prototype.at",function(a){return a?a:Wa}); ra("String.prototype.padStart",function(a){return a?a:function(b,c){var e=Ua(this,null,"padStart");b-=e.length;c=c!==void 0?String(c):" ";return(b>0&&c?c.repeat(Math.ceil(b/c.length)).substring(0,b):"")+e}}); ra("Promise.prototype.finally",function(a){return a?a:function(b){return this.then(function(c){return Promise.resolve(b()).then(function(){return c})},function(c){return Promise.resolve(b()).then(function(){throw c; })})}}); ra("Array.prototype.flatMap",function(a){return a?a:function(b,c){var e=[];Array.prototype.forEach.call(this,function(f,h){f=b.call(c,f,h,this);Array.isArray(f)?e.push.apply(e,f):e.push(f)}); return e}}); ra("Array.prototype.flat",function(a){return a?a:function(b){b=b===void 0?1:b;var c=[];Array.prototype.forEach.call(this,function(e){Array.isArray(e)&&b>0?(e=Array.prototype.flat.call(e,b-1),c.push.apply(c,e)):c.push(e)}); return c}}); ra("Promise.allSettled",function(a){function b(e){return{status:"fulfilled",value:e}} function c(e){return{status:"rejected",reason:e}} return a?a:function(e){var f=this;e=Array.from(e,function(h){return f.resolve(h).then(b,c)}); return f.all(e)}}); ra("Array.prototype.toSpliced",function(a){return a?a:function(b,c,e){var f=Array.from(this);Array.prototype.splice.apply(f,arguments);return f}}); ra("Number.parseInt",function(a){return a||parseInt});/* Copyright The Closure Library Authors. SPDX-License-Identifier: Apache-2.0 */ var Ya=Ya||{},Za=this||self;function $a(a,b){var c=ab("CLOSURE_FLAGS");a=c&&c[a];return a!=null?a:b} function ab(a,b){a=a.split(".");b=b||Za;for(var c=0;c >>0),raa=0;function saa(a,b,c){return a.call.apply(a.bind,arguments)} function taa(a,b,c){if(!a)throw Error();if(arguments.length>2){var e=Array.prototype.slice.call(arguments,2);return function(){var f=Array.prototype.slice.call(arguments);Array.prototype.unshift.apply(f,e);return a.apply(b,f)}}return function(){return a.apply(b,arguments)}} function eb(a,b,c){eb=Function.prototype.bind&&Function.prototype.bind.toString().indexOf("native code")!=-1?saa:taa;return eb.apply(null,arguments)} function fb(a,b){var c=Array.prototype.slice.call(arguments,1);return function(){var e=c.slice();e.push.apply(e,arguments);return a.apply(this,e)}} function gb(){return Date.now()} function hb(a,b){a=a.split(".");for(var c=Za,e;a.length&&(e=a.shift());)a.length||b===void 0?c[e]&&c[e]!==Object.prototype[e]?c=c[e]:c=c[e]={}:c[e]=b} function jb(a){return a} function kb(a,b){function c(){} c.prototype=b.prototype;a.yh=b.prototype;a.prototype=new c;a.prototype.constructor=a;a.base=function(e,f,h){for(var k=Array(arguments.length-2),l=2;l >6|192;else{if(h>=55296&&h =56320&&k >18|240;e[c++]=h>>12&63|128;e[c++]=h>>6&63|128;e[c++]=h&63|128;continue}else f--}if(b)throw Error("Found an unpaired surrogate");h=65533}e[c++]=h>>12|224;e[c++]=h>>6&63|128}e[c++]=h&63|128}}a=c===e.length?e:e.subarray(0,c)}return a} ;function qb(a){Za.setTimeout(function(){throw a;},0)} ;function rb(a,b){return a.lastIndexOf(b,0)==0} function sb(a){return/^[\s\xa0]*$/.test(a)} var tb=String.prototype.trim?function(a){return a.trim()}:function(a){return/^[\s\xa0]*([\s\S]*?)[\s\xa0]*$/.exec(a)[1]}; function ub(a,b){return a.indexOf(b)!=-1} function Baa(a,b){var c=0;a=tb(String(a)).split(".");b=tb(String(b)).split(".");for(var e=Math.max(a.length,b.length),f=0;c==0&&f b?1:0} ;var Caa=$a(1,!0),xb=$a(610401301,!1);$a(899588437,!1);$a(772657768,!0);$a(513659523,!1);$a(568333945,!0);$a(1331761403,!1);$a(651175828,!1);$a(722764542,!1);$a(748402145,!1);$a(748402146,!1);var Daa=$a(748402147,!0),yb=$a(824648567,!0),Ab=$a(824656860,Caa);$a(3330
2026-01-13T08:48:40
https://bsky.app/profile/oshwassociation.bsky.social
@oshwassociation.bsky.social on Bluesky JavaScript Required This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is. Learn more about Bluesky at bsky.social and atproto.com . Profile OSHWA oshwassociation.bsky.social did:plc:afmuof3wj77f644c2nuqvxup The Open Source Hardware Association (OSHWA) aims to foster technological knowledge and encourage research that is accessible, collaborative and respects user freedom.
2026-01-13T08:48:40
https://docs.python.org/3/license.html#otherlicenses
History and License — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents History and License History of the software Terms and conditions for accessing or otherwise using Python PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 BEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0 CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 CWI LICENSE AGREEMENT FOR PYTHON 0.9.0 THROUGH 1.2 ZERO-CLAUSE BSD LICENSE FOR CODE IN THE PYTHON DOCUMENTATION Licenses and Acknowledgements for Incorporated Software Mersenne Twister Sockets Asynchronous socket services Cookie management Execution tracing UUencode and UUdecode functions XML Remote Procedure Calls test_epoll Select kqueue SipHash24 strtod and dtoa OpenSSL expat libffi zlib cfuhash libmpdec W3C C14N test suite mimalloc asyncio Global Unbounded Sequences (GUS) Zstandard bindings Previous topic Copyright This page Report a bug Show source Navigation index modules | previous | Python » 3.14.2 Documentation » History and License | Theme Auto Light Dark | History and License ¶ History of the software ¶ Python was created in the early 1990s by Guido van Rossum at Stichting Mathematisch Centrum (CWI, see https://www.cwi.nl ) in the Netherlands as a successor of a language called ABC. Guido remains Python’s principal author, although it includes many contributions from others. In 1995, Guido continued his work on Python at the Corporation for National Research Initiatives (CNRI, see https://www.cnri.reston.va.us ) in Reston, Virginia where he released several versions of the software. In May 2000, Guido and the Python core development team moved to BeOpen.com to form the BeOpen PythonLabs team. In October of the same year, the PythonLabs team moved to Digital Creations, which became Zope Corporation. In 2001, the Python Software Foundation (PSF, see https://www.python.org/psf/ ) was formed, a non-profit organization created specifically to own Python-related Intellectual Property. Zope Corporation was a sponsoring member of the PSF. All Python releases are Open Source (see https://opensource.org for the Open Source Definition). Historically, most, but not all, Python releases have also been GPL-compatible; the table below summarizes the various releases. Release Derived from Year Owner GPL-compatible? (1) 0.9.0 thru 1.2 n/a 1991-1995 CWI yes 1.3 thru 1.5.2 1.2 1995-1999 CNRI yes 1.6 1.5.2 2000 CNRI no 2.0 1.6 2000 BeOpen.com no 1.6.1 1.6 2001 CNRI yes (2) 2.1 2.0+1.6.1 2001 PSF no 2.0.1 2.0+1.6.1 2001 PSF yes 2.1.1 2.1+2.0.1 2001 PSF yes 2.1.2 2.1.1 2002 PSF yes 2.1.3 2.1.2 2002 PSF yes 2.2 and above 2.1.1 2001-now PSF yes Note GPL-compatible doesn’t mean that we’re distributing Python under the GPL. All Python licenses, unlike the GPL, let you distribute a modified version without making your changes open source. The GPL-compatible licenses make it possible to combine Python with other software that is released under the GPL; the others don’t. According to Richard Stallman, 1.6.1 is not GPL-compatible, because its license has a choice of law clause. According to CNRI, however, Stallman’s lawyer has told CNRI’s lawyer that 1.6.1 is “not incompatible” with the GPL. Thanks to the many outside volunteers who have worked under Guido’s direction to make these releases possible. Terms and conditions for accessing or otherwise using Python ¶ Python software and documentation are licensed under the Python Software Foundation License Version 2. Starting with Python 3.8.6, examples, recipes, and other code in the documentation are dual licensed under the PSF License Version 2 and the Zero-Clause BSD license . Some software incorporated into Python is under different licenses. The licenses are listed with code falling under that license. See Licenses and Acknowledgements for Incorporated Software for an incomplete list of these licenses. PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 ¶ 1. This LICENSE AGREEMENT is between the Python Software Foundation ("PSF"), and the Individual or Organization ("Licensee") accessing and otherwise using this software ("Python") in source or binary form and its associated documentation. 2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use Python alone or in any derivative version, provided, however, that PSF's License Agreement and PSF's notice of copyright, i.e., "Copyright © 2001 Python Software Foundation; All Rights Reserved" are retained in Python alone or in any derivative version prepared by Licensee. 3. In the event Licensee prepares a derivative work that is based on or incorporates Python or any part thereof, and wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a brief summary of the changes made to Python. 4. PSF is making Python available to Licensee on an "AS IS" basis. PSF MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 6. This License Agreement will automatically terminate upon a material breach of its terms and conditions. 7. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between PSF and Licensee. This License Agreement does not grant permission to use PSF trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party. 8. By copying, installing or otherwise using Python, Licensee agrees to be bound by the terms and conditions of this License Agreement. BEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0 ¶ BEOPEN PYTHON OPEN SOURCE LICENSE AGREEMENT VERSION 1 1. This LICENSE AGREEMENT is between BeOpen.com ("BeOpen"), having an office at 160 Saratoga Avenue, Santa Clara, CA 95051, and the Individual or Organization ("Licensee") accessing and otherwise using this software in source or binary form and its associated documentation ("the Software"). 2. Subject to the terms and conditions of this BeOpen Python License Agreement, BeOpen hereby grants Licensee a non-exclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use the Software alone or in any derivative version, provided, however, that the BeOpen Python License is retained in the Software, alone or in any derivative version prepared by Licensee. 3. BeOpen is making the Software available to Licensee on an "AS IS" basis. BEOPEN MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, BEOPEN MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 4. BEOPEN SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF THE SOFTWARE FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF USING, MODIFYING OR DISTRIBUTING THE SOFTWARE, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 5. This License Agreement will automatically terminate upon a material breach of its terms and conditions. 6. This License Agreement shall be governed by and interpreted in all respects by the law of the State of California, excluding conflict of law provisions. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between BeOpen and Licensee. This License Agreement does not grant permission to use BeOpen trademarks or trade names in a trademark sense to endorse or promote products or services of Licensee, or any third party. As an exception, the "BeOpen Python" logos available at http://www.pythonlabs.com/logos.html may be used according to the permissions granted on that web page. 7. By copying, installing or otherwise using the software, Licensee agrees to be bound by the terms and conditions of this License Agreement. CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 ¶ 1. This LICENSE AGREEMENT is between the Corporation for National Research Initiatives, having an office at 1895 Preston White Drive, Reston, VA 20191 ("CNRI"), and the Individual or Organization ("Licensee") accessing and otherwise using Python 1.6.1 software in source or binary form and its associated documentation. 2. Subject to the terms and conditions of this License Agreement, CNRI hereby grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use Python 1.6.1 alone or in any derivative version, provided, however, that CNRI's License Agreement and CNRI's notice of copyright, i.e., "Copyright © 1995-2001 Corporation for National Research Initiatives; All Rights Reserved" are retained in Python 1.6.1 alone or in any derivative version prepared by Licensee. Alternately, in lieu of CNRI's License Agreement, Licensee may substitute the following text (omitting the quotes): "Python 1.6.1 is made available subject to the terms and conditions in CNRI's License Agreement. This Agreement together with Python 1.6.1 may be located on the internet using the following unique, persistent identifier (known as a handle): 1895.22/1013. This Agreement may also be obtained from a proxy server on the internet using the following URL: http://hdl.handle.net/1895.22/1013". 3. In the event Licensee prepares a derivative work that is based on or incorporates Python 1.6.1 or any part thereof, and wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a brief summary of the changes made to Python 1.6.1. 4. CNRI is making Python 1.6.1 available to Licensee on an "AS IS" basis. CNRI MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, CNRI MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON 1.6.1 WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 5. CNRI SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON 1.6.1 FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON 1.6.1, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 6. This License Agreement will automatically terminate upon a material breach of its terms and conditions. 7. This License Agreement shall be governed by the federal intellectual property law of the United States, including without limitation the federal copyright law, and, to the extent such U.S. federal law does not apply, by the law of the Commonwealth of Virginia, excluding Virginia's conflict of law provisions. Notwithstanding the foregoing, with regard to derivative works based on Python 1.6.1 that incorporate non-separable material that was previously distributed under the GNU General Public License (GPL), the law of the Commonwealth of Virginia shall govern this License Agreement only as to issues arising under or with respect to Paragraphs 4, 5, and 7 of this License Agreement. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between CNRI and Licensee. This License Agreement does not grant permission to use CNRI trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party. 8. By clicking on the "ACCEPT" button where indicated, or by copying, installing or otherwise using Python 1.6.1, Licensee agrees to be bound by the terms and conditions of this License Agreement. CWI LICENSE AGREEMENT FOR PYTHON 0.9.0 THROUGH 1.2 ¶ Copyright © 1991 - 1995, Stichting Mathematisch Centrum Amsterdam, The Netherlands. All rights reserved. Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Stichting Mathematisch Centrum or CWI not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. STICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL STICHTING MATHEMATISCH CENTRUM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ZERO-CLAUSE BSD LICENSE FOR CODE IN THE PYTHON DOCUMENTATION ¶ Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Licenses and Acknowledgements for Incorporated Software ¶ This section is an incomplete, but growing list of licenses and acknowledgements for third-party software incorporated in the Python distribution. Mersenne Twister ¶ The _random C extension underlying the random module includes code based on a download from http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/MT2002/emt19937ar.html . The following are the verbatim comments from the original code: A C-program for MT19937, with initialization improved 2002/1/26. Coded by Takuji Nishimura and Makoto Matsumoto. Before using, initialize the state by using init_genrand(seed) or init_by_array(init_key, key_length). Copyright (C) 1997 - 2002, Makoto Matsumoto and Takuji Nishimura, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Any feedback is very welcome. http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/emt.html email: m-mat @ math.sci.hiroshima-u.ac.jp (remove space) Sockets ¶ The socket module uses the functions, getaddrinfo() , and getnameinfo() , which are coded in separate source files from the WIDE Project, https://www.wide.ad.jp/ . Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Asynchronous socket services ¶ The test.support.asynchat and test.support.asyncore modules contain the following notice: Copyright 1996 by Sam Rushing All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Sam Rushing not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. SAM RUSHING DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL SAM RUSHING BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Cookie management ¶ The http.cookies module contains the following notice: Copyright 2000 by Timothy O'Malley <timo@alum.mit.edu> All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Timothy O'Malley not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Timothy O'Malley DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL Timothy O'Malley BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Execution tracing ¶ The trace module contains the following notice: portions copyright 2001, Autonomous Zones Industries, Inc., all rights... err... reserved and offered to the public under the terms of the Python 2.2 license. Author: Zooko O'Whielacronx http://zooko.com/ mailto:zooko@zooko.com Copyright 2000, Mojam Media, Inc., all rights reserved. Author: Skip Montanaro Copyright 1999, Bioreason, Inc., all rights reserved. Author: Andrew Dalke Copyright 1995-1997, Automatrix, Inc., all rights reserved. Author: Skip Montanaro Copyright 1991-1995, Stichting Mathematisch Centrum, all rights reserved. Permission to use, copy, modify, and distribute this Python software and its associated documentation for any purpose without fee is hereby granted, provided that the above copyright notice appears in all copies, and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of neither Automatrix, Bioreason or Mojam Media be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. UUencode and UUdecode functions ¶ The uu codec contains the following notice: Copyright 1994 by Lance Ellinghouse Cathedral City, California Republic, United States of America. All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Lance Ellinghouse not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. LANCE ELLINGHOUSE DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL LANCE ELLINGHOUSE CENTRUM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Modified by Jack Jansen, CWI, July 1995: - Use binascii module to do the actual line-by-line conversion between ascii and binary. This results in a 1000-fold speedup. The C version is still 5 times faster, though. - Arguments more compliant with Python standard XML Remote Procedure Calls ¶ The xmlrpc.client module contains the following notice: The XML-RPC client interface is Copyright (c) 1999-2002 by Secret Labs AB Copyright (c) 1999-2002 by Fredrik Lundh By obtaining, using, and/or copying this software and/or its associated documentation, you agree that you have read, understood, and will comply with the following terms and conditions: Permission to use, copy, modify, and distribute this software and its associated documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies, and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Secret Labs AB or the author not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. SECRET LABS AB AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANT- ABILITY AND FITNESS. IN NO EVENT SHALL SECRET LABS AB OR THE AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. test_epoll ¶ The test.test_epoll module contains the following notice: Copyright (c) 2001-2006 Twisted Matrix Laboratories. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Select kqueue ¶ The select module contains the following notice for the kqueue interface: Copyright (c) 2000 Doug White, 2006 James Knight, 2007 Christian Heimes All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SipHash24 ¶ The file Python/pyhash.c contains Marek Majkowski’ implementation of Dan Bernstein’s SipHash24 algorithm. It contains the following note: <MIT License> Copyright (c) 2013 Marek Majkowski <marek@popcount.org> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. </MIT License> Original location: https://github.com/majek/csiphash/ Solution inspired by code from: Samuel Neves (supercop/crypto_auth/siphash24/little) djb (supercop/crypto_auth/siphash24/little2) Jean-Philippe Aumasson (https://131002.net/siphash/siphash24.c) strtod and dtoa ¶ The file Python/dtoa.c , which supplies C functions dtoa and strtod for conversion of C doubles to and from strings, is derived from the file of the same name by David M. Gay, currently available from https://web.archive.org/web/20220517033456/http://www.netlib.org/fp/dtoa.c . The original file, as retrieved on March 16, 2009, contains the following copyright and licensing notice: /**************************************************************** * * The author of this software is David M. Gay. * * Copyright (c) 1991, 2000, 2001 by Lucent Technologies. * * Permission to use, copy, modify, and distribute this software for any * purpose without fee is hereby granted, provided that this entire notice * is included in all copies of any software which is or includes a copy * or modification of this software and in all copies of the supporting * documentation for such software. * * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED * WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY * OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. * ***************************************************************/ OpenSSL ¶ The modules hashlib , posix and ssl use the OpenSSL library for added performance if made available by the operating system. Additionally, the Windows and macOS installers for Python may include a copy of the OpenSSL libraries, so we include a copy of the OpenSSL license here. For the OpenSSL 3.0 release, and later releases derived from that, the Apache License v2 applies: Apache License Version 2.0, January 2004 https://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS expat ¶ The pyexpat extension is built using an included copy of the expat sources unless the build is configured --with-system-expat : Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. libffi ¶ The _ctypes C extension underlying the ctypes module is built using an included copy of the libffi sources unless the build is configured --with-system-libffi : Copyright (c) 1996-2008 Red Hat, Inc and others. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. zlib ¶ The zlib extension is built using an included copy of the zlib sources if the zlib version found on the system is too old to be used for the build: Copyright (C) 1995-2011 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu cfuhash ¶ The implementation of the hash table used by the tracemalloc is based on the cfuhash project: Copyright (c) 2005 Don Owens All rights reserved. This code is released under the BSD license: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. libmpdec ¶ The _decimal C extension underlying the decimal module is built using an included copy of the libmpdec library unless the build is configured --with-system-libmpdec : Copyright (c) 2008-2020 Stefan Krah. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. W3C C14N test suite ¶ The C14N 2.0 test suite in the test package ( Lib/test/xmltestdata/c14n-20/ ) was retrieved from the W3C website at https://www.w3.org/TR/xml-c14n2-testcases/ and is distributed under the 3-clause BSD license: Copyright (c) 2013 W3C(R) (MIT, ERCIM, Keio, Beihang), All Rights Reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of works must retain the original copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the original copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the W3C nor the names of its contributors may be used to endorse or promote products derived from this work without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. mimalloc ¶ MIT License: Copyright (c) 2018-2021 Microsoft Corporation, Daan Leijen Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. asyncio ¶ Parts of the asyncio module are incorporated from uvloop 0.16 , which is distributed under the MIT license: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Global Unbounded Sequences (GUS) ¶ The file Python/qsbr.c is adapted from FreeBSD’s “Global Unbounded Sequences” safe memory reclamation scheme in subr_smr.c . The file is distributed under the 2-Clause BSD License: Copyright (c) 2019,2020 Jeffrey Roberson <jeff@FreeBSD.org> Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following con
2026-01-13T08:48:40
https://dev.to/t/communication/page/9
Communication Page 9 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close # communication Follow Hide Tips for talking effectively with your children at every age. Create Post Posts Left menu 👋 Sign in for the ability to sort posts by relevant , latest , or top . Right menu Technical Debt as Risk Matt Eland Matt Eland Matt Eland Follow Dec 24 '19 Technical Debt as Risk # communication # management # codequality # agile 81  reactions Comments 1  comment 9 min read Top 10 Soft Skills for Data Scientists Ayodele (eye-ya-deli) Ayodele (eye-ya-deli) Ayodele (eye-ya-deli) Follow Dec 17 '19 Top 10 Soft Skills for Data Scientists # datascience # softskills # communication # career 6  reactions Comments Add Comment 5 min read How to Give Great Technical Presentations Stephen Fluin Stephen Fluin Stephen Fluin Follow Dec 3 '19 How to Give Great Technical Presentations # techtalks # speaking # angular # communication 70  reactions Comments 2  comments 5 min read 3 Lessons I Learned About Group Decision Making Johannes Scharlach Johannes Scharlach Johannes Scharlach Follow Nov 28 '19 3 Lessons I Learned About Group Decision Making # management # leadership # communication 6  reactions Comments 1  comment 5 min read Soft skills - communication tips Jozef Chmelar Jozef Chmelar Jozef Chmelar Follow Nov 27 '19 Soft skills - communication tips # productivity # communication # softskills # management 13  reactions Comments Add Comment 4 min read Efficient, Eloquent Email Davyd McColl Davyd McColl Davyd McColl Follow Nov 15 '19 Efficient, Eloquent Email # pragmatic # programmer # communication # email 6  reactions Comments Add Comment 5 min read Communication is the key Davyd McColl Davyd McColl Davyd McColl Follow Nov 10 '19 Communication is the key # pragmatic # programmer # communication 7  reactions Comments 1  comment 7 min read The Secret Languages of Culture - and Slack Jesse Martin Jesse Martin Jesse Martin Follow Nov 6 '19 The Secret Languages of Culture - and Slack # culture # slack # communication 6  reactions Comments Add Comment 4 min read How to write good documentation Roelof Jan Elsinga Roelof Jan Elsinga Roelof Jan Elsinga Follow Nov 1 '19 How to write good documentation # documentation # communication # development # programming 19  reactions Comments Add Comment 4 min read 8 tips for breaking down language barriers Dan Silcox Dan Silcox Dan Silcox Follow Oct 23 '19 8 tips for breaking down language barriers # discuss # productivity # communication 8  reactions Comments Add Comment 2 min read Nonviolent Communication in Code Review: Receiving Comments Daniel Kassen Daniel Kassen Daniel Kassen Follow Oct 21 '19 Nonviolent Communication in Code Review: Receiving Comments # eq # communication # empathy 8  reactions Comments Add Comment 7 min read How the ZingSoft Team Uses Notion for Shared Knowledge Management Hibs Hibs Hibs Follow for ZingGrid Oct 17 '19 How the ZingSoft Team Uses Notion for Shared Knowledge Management # productivity # tools # communication # documentation 6  reactions Comments 4  comments 4 min read It's nice to be nice! - Code Reviews Maximilian Koch Maximilian Koch Maximilian Koch Follow Oct 15 '19 It's nice to be nice! - Code Reviews # productivity # communication # codequality # motivation 44  reactions Comments 7  comments 3 min read Composing better emails (with examples from the software development world) Lazarus Lazaridis Lazarus Lazaridis Lazarus Lazaridis Follow Oct 8 '19 Composing better emails (with examples from the software development world) # productivity # communication # email 139  reactions Comments 17  comments 5 min read Communicating Technical Debt Matt Eland Matt Eland Matt Eland Follow Oct 2 '19 Communicating Technical Debt # architecture # communication # codequality # management 98  reactions Comments 13  comments 10 min read 5 Best Layer Alternatives - Rebuild Your Existing Layer Messaging Platform vigneshwaran vigneshwaran vigneshwaran Follow Sep 25 '19 5 Best Layer Alternatives - Rebuild Your Existing Layer Messaging Platform # messaging # chat # collaboration # communication 8  reactions Comments 2  comments 4 min read Tips for Good Communication in Software Development Teams Giancarlo Buomprisco Giancarlo Buomprisco Giancarlo Buomprisco Follow Sep 23 '19 Tips for Good Communication in Software Development Teams # javascript # firstyearincode # beginners # communication 70  reactions Comments Add Comment 8 min read 5 reasons to mentor on exercism.io Nikolai Golub Nikolai Golub Nikolai Golub Follow Sep 24 '19 5 reasons to mentor on exercism.io # programming # mentoring # communication # learning 7  reactions Comments Add Comment 3 min read How I'm trying to become a better communicator Roelof Jan Elsinga Roelof Jan Elsinga Roelof Jan Elsinga Follow Aug 29 '19 How I'm trying to become a better communicator # communication # development # developer # leadership 8  reactions Comments Add Comment 4 min read 🦸‍♂️🔥 How to be a code review superhero Richard Klose Richard Klose Richard Klose Follow Aug 19 '19 🦸‍♂️🔥 How to be a code review superhero # review # communication # learning # team 4  reactions Comments Add Comment 4 min read Missing features are not "bugs" Bryce Dorn Bryce Dorn Bryce Dorn Follow Aug 11 '19 Missing features are not "bugs" # opinion # debugging # communication 4  reactions Comments Add Comment 1 min read The Daily Question Answer Review Routine Adron Hall Adron Hall Adron Hall Follow Jul 22 '19 The Daily Question Answer Review Routine # productivity # communication # community 5  reactions Comments Add Comment 5 min read Book Review: Managing Humans by Michael Lopp Rachel Soderberg Rachel Soderberg Rachel Soderberg Follow Jul 12 '19 Book Review: Managing Humans by Michael Lopp # communication # bookreview # management # engineering 6  reactions Comments 2  comments 5 min read Lost in translation - cooperation with technical people Kjell Clarysse Kjell Clarysse Kjell Clarysse Follow for Bismuth Labs Jul 9 '19 Lost in translation - cooperation with technical people # architecture # codequality # communication # refactoring 7  reactions Comments 1  comment 5 min read Slack for online communities. Cant we do better? What about err.. Forums? Bruno Paz Bruno Paz Bruno Paz Follow Jun 25 '19 Slack for online communities. Cant we do better? What about err.. Forums? # discuss # communication # communities 40  reactions Comments 20  comments 2 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://openapi.tools/categories/learning
Learning | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Learning Whether generating documentation for a third-party API based on traffic, or are trying to "catch up on design-first" at an organization with no OpenAPI at all, these "learning" (or traffic sniffing) tools can help you get there. Learning There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://inveniordm.docs.cern.ch/
Turn-key research data management repository Turn-key research data management repository Home Initializing search GitHub Home What is InvenioRDM? Use Install Operate an Instance Join the Community Maintain and Develop Releases Reference The turn-key research data management repository Quick start Demo site Turn-key research data management repository GitHub Home What is InvenioRDM? What is InvenioRDM? Overview Beautiful UX Highly scalable Customizable Interoperable Powerful Secure Use Use Overview Records Records Upload Published record Export formats Communities Notifications Administration Install Install Overview Install the CLI System requirements Initialize Build, setup & run Explore Stop Troubleshooting & help Operate an Instance Operate an Instance Overview Deployment and other operations Deployment and other operations Infrastructure Deploy Logs Back up search indices Redirect legacy routes Migrate from another repository Customization philosophy Customize look-and-feel Customize look-and-feel Overview Change logo Change templates Change theme Change font Change menus Override React components Themed community Customize metadata model Customize metadata model Enable metadata-only records Optional metadata fields Optional metadata fields Include optional metadata fields Custom fields Custom fields Add field(s) to records Create new type of field Add field(s) to communities UI widgets Custom PIDs schemes Customize vocabularies Customize vocabularies Overview Resource types Affiliations Names Funding Subjects Manage users and roles Configure everything Configure everything Overview Audit logs Authentication Curation checks Collections Compliance info when publishing DOI registration DNB URN registration Emails Emails Submission Capture FAIR Signposting File uploads & storage File uploads & storage Files and versioning Files uploaders Local storage S3 compatible storage Upload limits Jobs/Automated tasks Landing page Language(s) and locale(s) Notifications Notifications Overview Modify notifications Require a community to publish Restrict access to pages Restrict community creation Search Search Change facets/sorting Create search terms mappings Customize search index templates Sitemaps Static pages Add custom code Add custom code Custom Python and JS code Debugging Join the Community Join the Community Overview Onboard Code of conduct Copyright policy Contribute code Contribute code Development process Source code Package Development Pre-release Instance Development Fix a vulnerability Coding style Best practices Best practices Accessibility (a11y) Commits, PRs & reviews CSS/JavaScript React User interface Contribute translations Contribute translations Getting involved as a Translator Internationalization (i18n) and localization (l10n) Contribute documentation Community PR board Roadmap Maintain and Develop Maintain and Develop Overview New maintainers Modules on GitHub High-level architecture High-level architecture Introduction Software Runtime Records Communities Requests Curation Event handling Notifications Recommended reading Lower-level internals Lower-level internals Administration panel Administration views Audit logs Building resources Building services Building serializers Create a database migration Database transaction management Grouping atomic operations Job system Notifications Optimistic concurrency control Sanitize input data Search System Fields Theming Usage statistics Operational tasks Operational tasks Release management Branch management Demo site & docs Docker images Releases Releases Overview Maintenance policy Upgrade policy Security policy Version v13 Version v13 Release Notes v13.0 Upgrade from v12 to v13 Version v12 Version v12 Release Notes v12.0 Upgrade from v11 to v12 Legacy Versions Legacy Versions Version v11 Version v11 Release Notes v11.0 Upgrade from v10 to v11 Version v9 Version v9 Release Notes v9.1 Release Notes v9.0 Migrate Docker images Migrate v9 to OpenSearch Upgrade from v8 to v9 Version v10 Version v10 Release Notes v10.1 Release Notes v10.0 Upgrade from v9 to v10 Migrate Docker images Version v8 Version v8 Release Notes v8.0 Upgrade from v7 to v8 Version v7 Version v7 Release Notes v7.0 Upgrade from v6 to v7 Version v6 Version v6 Release Notes v6.0.5 Upgrade from v6.0.x to v6.0.5 Release Notes v6.0.0 Upgrade from v4 to v6 Version v5 Version v5 Release Notes v5.0 Version v4 Version v4 Release Notes v4.0 Upgrade from v3 to v4 Version v3 Version v3 Release Notes v3.0 Upgrade from v2 to v3 Version v2 Version v2 Release Notes v2.0 Upgrade from v1 to v2 Version v1 Version v1 Release Notes v1.0 Reference Reference Overview CLI CLI Invenio-cli commands Invenio commands Metadata OAI-PMH REST API REST API Overview Quickstart Awards Communities Drafts and Records File transfer Funders Groups Members Names OAI-PMH Sets Requests Reviews Statistics Suggest Users Vocabularies Virtual environments July 23rd, 2025: InvenioRDM v13.0 available! ✨ 🚀 Read the full release notes . What is InvenioRDM? Overview Beautiful UX Highly scalable Customizable Interoperable Powerful Secure Use Overview Records Communities Notifications Administration Install Overview Install the CLI System requirements Initialize Build, setup & run Explore Stop Troubleshooting & help Operate an Instance Overview Deployment and other operations Customization philosophy Customize look-and-feel Customize metadata model Customize vocabularies Manage users and roles Configure everything Add custom code Join the Community Overview Onboard Code of conduct Copyright policy Contribute code Contribute translations Contribute documentation Community PR board Roadmap Maintain and Develop Overview New maintainers Modules on GitHub High-level architecture Lower-level internals Operational tasks Releases Overview Maintenance policy Upgrade policy Security policy Version v13 Version v12 Legacy Versions Reference Overview CLI Metadata OAI-PMH REST API Virtual environments Next Overview Copyright © 2019-2025 CERN, Northwestern University and contributors. Made with Material for MkDocs
2026-01-13T08:48:40
https://pages.awscloud.com/communication-preferences?sc_ichannel=ha&sc_icampaign=acq_awsblogsb&sc_icontent=developer-social
AWS Email Preference Center Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Email Unsubscribe Unsubscribe from all Amazon Web Services (AWS) marketing emails. If you'd like to sign up for AWS emails or customize your preferences, manage your preferences here . Enter the email you'd like to unsubscribe * Required field Email address * Why are you unsubscribing? Too many emails I've stopped using this email I don't recall signing up for this email list Email content isn't relevant to me I already receive notifications at another email By submitting this form, you will be unsubscribed from all marketing emails. You will still receive transactional emails related to your use of AWS services and related offerings. Submit Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Generative AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs & Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon Cookie Preferences © 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T08:48:40
https://support.google.com/chrome?hl=en#topic=7438325
Google Chrome Help Skip to main content Google Chrome Help Sign in Google Help Help Center Community Google Chrome Privacy Policy Terms of Service Submit feedback Send feedback on... This help content & information General Help Center experience Next Help Center Community Google Chrome How can we help you? Browse help topics Get started with Chrome Download and install Google Chrome Create or manage your Google Account in Chrome Sign in and sync in Chrome Make Chrome your default browser Use Chrome at home Sign out of Chrome Check location info & directions in Chrome Use Chrome Actions to learn more about locations About search engine choice screens in Chrome Set up Chrome for iPhone or iPad Create & personalize a profile Import Chrome bookmarks & settings Create a shortcut for Chrome Manage Chrome with multiple profiles Set your homepage and startup page Create, find and edit bookmarks in Chrome Get your bookmarks, passwords, and more on all your devices Browse Chrome as a guest Change the address bar’s position Learn about third-party sign-in Browse the web Manage tabs in Chrome Search the web in Chrome Set default search engine and site search shortcuts Download a file Read pages later & offline Visit a site by turning off Chrome's ad blocker Print from Chrome Browse in Dark mode or Dark theme Share pages in Chrome Share or link to quotes & text in Chrome Use web apps Control your music, videos, and more Test experimental features in Chrome Manage Chrome side panel Customize your New Tab page in Chrome Use the Gemini web app to get answers in Chrome Create shortcuts for websites in Chrome Search with Google Lens in Chrome Adjust microphone volume Customize the Chrome toolbar on your device Browse through your open tabs on your device's app list Install and manage extensions Join Chrome Beta for Android Change your Search browser settings Let Chrome do tasks for you Fill out forms automatically in Chrome Manage your location settings in Chrome Use saved passwords in other iPhone & iPad apps Use virtual card numbers to pay online or in apps Shopping insights and price tracking in Chrome Add event functionality in Chrome for iPhone & iPad Manage PDFs in Chrome Get started with Store reviews in Chrome Install third-party apps from Chrome for iPhone and iPad Manage card benefits with autofill Use buy now, pay later with Chrome autofill Manage payment info in Chrome Manage payment info in Google Pay Privacy in Chrome Understand privacy in Chrome Browse in Incognito mode How Chrome protects your passwords How Chrome keeps your URL & search data private How Chrome Safe Browsing keeps your browsing data private How sign-in with your Google Account works in Chrome How ad privacy works in Chrome How Chrome protects your autofill and password data How your data stays safe when you install and update Chrome How Chrome keeps your usage statistics and crash reports private Delete your history & activity Delete browsing data in Chrome Export your data from Chrome Check or delete your Chrome browsing history Delete, allow, and manage cookies in Chrome Manage passwords in Chrome Reset Chrome settings to default Learn about on-device site data in Chrome Use Google Password Manager Get started with Google Password Manager Manage passwords in Chrome Import or export passwords with Chrome Migrate passwords to Google Play services Manage passkeys in Chrome Use passwords & passkeys across your devices Sign-in to your applications & websites with passkeys Manage your Google Password Manager PIN Create or change your Google Account PIN Change compromised passwords in your Google Account Fix issues with passwords and passkeys Fix payment info issues in Chrome Control your safety Manage Chrome safety and security Check if a site's connection is secure Manage warnings about unsafe sites Lock or erase your lost phone or computer Remove unwanted software & ads Manage your location settings in Chrome Start or stop automatically reporting errors & crashes Check if your Chrome browser is managed Make your account more secure About DMA & your linked services Manage your linked Google services Use Chrome with another device Cast from Chrome to your TV Add Chrome to your iPhone's dock Edit Chrome controls on Mac Touch Bar Connect a website to a Bluetooth device Access another computer with Chrome Remote Desktop Connect a website to a USB, Serial, or HID device Use Chrome in your car with Google Built-in Change Chrome settings Change text, image & video sizes (zoom) Use notifications to get alerts Translate pages and change Chrome languages Use your camera and microphone in Chrome Change site settings permissions Reset Chrome settings to default Accessibility on Chrome Turn Chrome spell check on and off Personalize Chrome performance Manage desktop mode settings Use Reading mode in Chrome Manage your ad privacy in Chrome Use Listen to this page mode in Chrome Give sites permission to MIDI devices in Chrome Use one-click dialing on Google Voice Use AI features in Chrome Use Gemini in Chrome Customize Chrome themes with AI Get started with Help me write in Chrome Search your browsing history in Chrome with AI Use Gemini Live with Gemini in Chrome Ask questions through AI Mode in Chrome Fix problems Make Chrome run better Fix problems with web content Fix connection and loading errors in Chrome Fix problems installing Start or stop automatically reporting errors & crashes Report an issue or send feedback on Chrome Fix issues with sync in Chrome Tips to complete account recovery steps Secure a hacked or compromised Google Account How to recover your Google Account or Gmail Can't sign in to your Google Account Learn about Chrome flags Need more help? Try these next steps: Post to the help community Get answers from community members Get help from the Chrome community Google Chrome Forum Share suggestions, ask questions, and connect with other users and top contributors in the Google Chrome help forum. Latest news and updates Google Chrome Blog Check out the most recent updates and news from the Chrome Blog Google Chrome tips Google Chrome tips From productivity to customization, learn how to get things done more quickly with your browser. ©2026 Google Privacy Policy Terms of Service Language Afrikaans‎ català‎ dansk‎ Deutsch‎ eesti‎ English (United Kingdom)‎ español‎ español (Latinoamérica)‎ Filipino‎ français‎ hrvatski‎ Indonesia‎ isiZulu‎ italiano‎ Kiswahili‎ latviešu‎ lietuvių‎ magyar‎ Melayu‎ Nederlands‎ norsk‎ polski‎ português‎ português (Brasil)‎ română‎ slovenčina‎ slovenščina‎ suomi‎ svenska‎ Tiếng Việt‎ Türkçe‎ čeština‎ Ελληνικά‎ български‎ русский‎ српски‎ українська‎ ‏ עברית ‏ العربية ‏ فارسی मराठी‎ हिन्दी‎ తెలుగు‎ ไทย‎ አማርኛ‎ 中文(简体)‎ 中文(繁體)‎ 日本語‎ 한국어‎ English‎ Enable Dark Mode Send feedback about our Help Center Send feedback on... This help content & information General Help Center experience Google apps Main menu var n,aaa=[];function la(a){return function(){return aaa[a].apply(this,arguments)}} function ma(a,b){return aaa[a]=b} var baa=typeof Object.create=="function"?Object.create:function(a){function b(){} b.prototype=a;return new b},na=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a; a[b]=c.value;return a}; function caa(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b >>0)+"_",f=0;return b}); ra("Symbol.iterator",function(a){if(a)return a;a=Symbol("Symbol.iterator");na(Array.prototype,a,{configurable:!0,writable:!0,value:function(){return naa(haa(this))}}); return a}); function naa(a){a={next:a};a[Symbol.iterator]=function(){return this}; return a} ra("Promise",function(a){function b(k){this.o=0;this.oa=void 0;this.ma=[];this.ya=!1;var l=this.ua();try{k(l.resolve,l.reject)}catch(p){l.reject(p)}} function c(){this.o=null} function e(k){return k instanceof b?k:new b(function(l){l(k)})} if(a)return a;c.prototype.ma=function(k){if(this.o==null){this.o=[];var l=this;this.oa(function(){l.qa()})}this.o.push(k)}; var f=oa.setTimeout;c.prototype.oa=function(k){f(k,0)}; c.prototype.qa=function(){for(;this.o&&this.o.length;){var k=this.o;this.o=[];for(var l=0;l =h}}); ra("String.prototype.endsWith",function(a){return a?a:function(b,c){var e=Ua(this,b,"endsWith");b+="";c===void 0&&(c=e.length);c=Math.max(0,Math.min(c|0,e.length));for(var f=b.length;f>0&&c>0;)if(e[--c]!=b[--f])return!1;return f f)e=f;e=Number(e);e =0&&b 56319||b+1===e)return f;b=c.charCodeAt(b+1);return b 57343?f:(f-55296)*1024+b+9216}}}); ra("String.fromCodePoint",function(a){return a?a:function(b){for(var c="",e=0;e 1114111||f!==Math.floor(f))throw new RangeError("invalid_code_point "+f);f >>10&1023|55296),c+=String.fromCharCode(f&1023|56320))}return c}}); ra("String.prototype.repeat",function(a){return a?a:function(b){var c=Ua(this,null,"repeat");if(b 1342177279)throw new RangeError("Invalid count value");b|=0;for(var e="";b;)if(b&1&&(e+=c),b>>>=1)c+=c;return e}}); ra("Array.prototype.findIndex",function(a){return a?a:function(b,c){return oaa(this,b,c).i}}); function Wa(a){a=Math.trunc(a)||0;a =this.length))return this[a]} ra("Array.prototype.at",function(a){return a?a:Wa}); daa("at",function(a){return a?a:Wa}); ra("String.prototype.at",function(a){return a?a:Wa}); ra("String.prototype.padStart",function(a){return a?a:function(b,c){var e=Ua(this,null,"padStart");b-=e.length;c=c!==void 0?String(c):" ";return(b>0&&c?c.repeat(Math.ceil(b/c.length)).substring(0,b):"")+e}}); ra("Promise.prototype.finally",function(a){return a?a:function(b){return this.then(function(c){return Promise.resolve(b()).then(function(){return c})},function(c){return Promise.resolve(b()).then(function(){throw c; })})}}); ra("Array.prototype.flatMap",function(a){return a?a:function(b,c){var e=[];Array.prototype.forEach.call(this,function(f,h){f=b.call(c,f,h,this);Array.isArray(f)?e.push.apply(e,f):e.push(f)}); return e}}); ra("Array.prototype.flat",function(a){return a?a:function(b){b=b===void 0?1:b;var c=[];Array.prototype.forEach.call(this,function(e){Array.isArray(e)&&b>0?(e=Array.prototype.flat.call(e,b-1),c.push.apply(c,e)):c.push(e)}); return c}}); ra("Promise.allSettled",function(a){function b(e){return{status:"fulfilled",value:e}} function c(e){return{status:"rejected",reason:e}} return a?a:function(e){var f=this;e=Array.from(e,function(h){return f.resolve(h).then(b,c)}); return f.all(e)}}); ra("Array.prototype.toSpliced",function(a){return a?a:function(b,c,e){var f=Array.from(this);Array.prototype.splice.apply(f,arguments);return f}}); ra("Number.parseInt",function(a){return a||parseInt});/* Copyright The Closure Library Authors. SPDX-License-Identifier: Apache-2.0 */ var Ya=Ya||{},Za=this||self;function $a(a,b){var c=ab("CLOSURE_FLAGS");a=c&&c[a];return a!=null?a:b} function ab(a,b){a=a.split(".");b=b||Za;for(var c=0;c >>0),raa=0;function saa(a,b,c){return a.call.apply(a.bind,arguments)} function taa(a,b,c){if(!a)throw Error();if(arguments.length>2){var e=Array.prototype.slice.call(arguments,2);return function(){var f=Array.prototype.slice.call(arguments);Array.prototype.unshift.apply(f,e);return a.apply(b,f)}}return function(){return a.apply(b,arguments)}} function eb(a,b,c){eb=Function.prototype.bind&&Function.prototype.bind.toString().indexOf("native code")!=-1?saa:taa;return eb.apply(null,arguments)} function fb(a,b){var c=Array.prototype.slice.call(arguments,1);return function(){var e=c.slice();e.push.apply(e,arguments);return a.apply(this,e)}} function gb(){return Date.now()} function hb(a,b){a=a.split(".");for(var c=Za,e;a.length&&(e=a.shift());)a.length||b===void 0?c[e]&&c[e]!==Object.prototype[e]?c=c[e]:c=c[e]={}:c[e]=b} function jb(a){return a} function kb(a,b){function c(){} c.prototype=b.prototype;a.yh=b.prototype;a.prototype=new c;a.prototype.constructor=a;a.base=function(e,f,h){for(var k=Array(arguments.length-2),l=2;l >6|192;else{if(h>=55296&&h =56320&&k >18|240;e[c++]=h>>12&63|128;e[c++]=h>>6&63|128;e[c++]=h&63|128;continue}else f--}if(b)throw Error("Found an unpaired surrogate");h=65533}e[c++]=h>>12|224;e[c++]=h>>6&63|128}e[c++]=h&63|128}}a=c===e.length?e:e.subarray(0,c)}return a} ;function qb(a){Za.setTimeout(function(){throw a;},0)} ;function rb(a,b){return a.lastIndexOf(b,0)==0} function sb(a){return/^[\s\xa0]*$/.test(a)} var tb=String.prototype.trim?function(a){return a.trim()}:function(a){return/^[\s\xa0]*([\s\S]*?)[\s\xa0]*$/.exec(a)[1]}; function ub(a,b){return a.indexOf(b)!=-1} function Baa(a,b){var c=0;a=tb(String(a)).split(".");b=tb(String(b)).split(".");for(var e=Math.max(a.length,b.length),f=0;c==0&&f b?1:0} ;var Caa=$a(1,!0),xb=$a(610401301,!1);$a(899588437,!1);$a(772657768,!0);$a(513659523,!1);$a(568333945,!0);$a(1331761403,!1);$a(651175828,!1);$a(722764542,!1);$a(748402145,!1);$a(748402146,!1);var Daa=$a(748402147,!0),yb=$a(824648567,!0),Ab=$a(824656860,Caa);$a(333098724,!1);$a(2147483644,!1);$a(2147483645,!1);$a(2147483646,Caa);$a(2147483647,!0);function Bb(){var a=Za.navigator;return a&&(a=a.userAgent)?a:""} var Cb,Eaa=Za.navigator;Cb=Eaa?Eaa.userAgentData||null:null;function Db(a){if(!xb||!Cb)return!1;for(var b=0;b 0:!1} function Gb(){return Fb()?!1:Eb("Opera")} function Hb(){return Fb()?!1:Eb("Trident")||Eb("MSIE")} function Faa(){return Fb()?Db("Microsoft Edge"):Eb("Edg/")} function Ib(){return Eb("Firefox")||Eb("FxiOS")} function Jb(){return Eb("Safari")&&!(Lb()||(Fb()?0:Eb("Coast"))||Gb()||(Fb()?0:Eb("Edge"))||Faa()||(Fb()?Db("Opera"):Eb("OPR"))||Ib()||Eb("Silk")||Eb("Android"))} function Lb(){return Fb()?Db("Chromium"):(Eb("Chrome")||Eb("CriOS"))&&!(Fb()?0:Eb("Edge"))||Eb("Silk")} ;function Mb(){return xb?!!Cb&&!!Cb.platform:!1} function Nb(){return Mb()?Cb.platform==="Android":Eb("Android")} function Ob(){return Eb("iPhone")&&!Eb("iPod")&&!Eb("iPad")} function Pb(){return Ob()||Eb("iPad")||Eb("iPod")} function Rb(){return Mb()?Cb.platform==="macOS":Eb("Macintosh")} function Gaa(){return Mb()?Cb.platform==="Linux":Eb("Linux")} function Sb(){return Mb()?Cb.platform==="Windows":Eb("Windows")} function Haa(){return Mb()?Cb.platform==="Chrome OS":Eb("CrOS")} ;var Iaa=Array.prototype.indexOf?function(a,b){return Array.prototype.indexOf.call(a,b,void 0)}:function(a,b){if(typeof a==="string")return typeof b!=="string"||b.length!=1?-1:a.indexOf(b,0); for(var c=0;c =0} function Wb(a,b){b=Iaa(a,b);var c;(c=b>=0)&&Array.prototype.splice.call(a,b,1);return c} function Xb(a){var b=a.length;if(b>0){for(var c=Array(b),e=0;e parseFloat(fc)){ec=String(ic);break a}}ec=fc}var Vaa=ec;var Waa=Ib(),Xaa=Ob()||Eb("iPod"),Yaa=Eb("iPad"),Zaa=Eb("Android")&&!(Lb()||Ib()||Gb()||Eb("Silk")),jc=Lb(),$aa=Jb()&&!Pb();var aba={},kc=null,bba=bc||cc,cba=bba||typeof Za.btoa=="function",dba=bba||!$aa&&typeof Za.atob=="function";function lc(a,b){b===void 0&&(b=0);eba();b=aba[b];for(var c=Array(Math.floor(a.length/3)),e=b[64]||"",f=0,h=0;f >2];k=b[(k&3) >4];l=b[(l&15) >6];p=b[p&63];c[h++]=""+r+k+l+p}r=0;p=e;switch(a.length-f){case 2:r=a[f+1],p=b[(r&15) >2]+b[(a&3) >4]+p+e}return c.join("")} function nc(a,b){if(cba&&!b)a=Za.btoa(a);else{for(var c=[],e=0,f=0;f 255&&(c[e++]=h&255,h>>=8);c[e++]=h}a=lc(c,b)}return a} function oc(a,b){if(cba&&!b)a=Za.btoa(unescape(encodeURIComponent(a)));else{for(var c=[],e=0,f=0;f >6|192:((h&64512)==55296&&f+1 >18|240,c[e++]=h>>12&63|128):c[e++]=h>>12|224,c[e++]=h>>6&63|128),c[e++]=h&63|128)}a=lc(c,b)}return a} function pc(a,b){if(dba&&!b)return Za.atob(a);var c="";fba(a,function(e){c+=String.fromCharCode(e)}); return c} function gba(a){var b=a.length,c=b*3/4;c%3?c=Math.floor(c):ub("=.",a[b-1])&&(c=ub("=.",a[b-2])?c-2:c-1);var e=new Uint8Array(c),f=0;fba(a,function(h){e[f++]=h}); return f!==c?e.subarray(0,f):e} function fba(a,b){function c(p){for(;e >4);k!=64&&(b(h >2),l!=64&&b(k a.o.length&&(e=a.o,c=b.o);if(c.lastIndexOf(e,0)!==0)return!1;for(b=e.length;b =b||(e[a]=c+1,uba())}} ;function Ac(){return typeof BigInt==="function"} ;var Bc=typeof Symbol==="function"&&typeof Symbol()==="symbol";function Dc(a,b,c){return typeof Symbol==="function"&&typeof Symbol()==="symbol"?(c===void 0?0:c)&&Symbol.for&&a?Symbol.for(a):a!=null?Symbol(a):Symbol():b} var vba=Dc("jas",void 0,!0),Ec=Dc(void 0,"0di"),Fc=Dc(void 0,"1oa"),wba=Dc(void 0,"0dg"),Gc=Dc(void 0,Symbol()),xba=Dc(void 0,"0ub"),yba=Dc(void 0,"0ubs"),Hc=Dc(void 0,"0ubsb"),zba=Dc(void 0,"0actk"),Aba=Dc("m_m","Hqa",!0),Bba=Dc(void 0,"vps"),Cba=Dc();var Dba={FT:{value:0,configurable:!0,writable:!0,enumerable:!1}},Eba=Object.defineProperties,Ic=Bc?vba:"FT",Jc,Fba=[];Kc(Fba,7);Jc=Object.freeze(Fba);function Lc(a,b){Bc||Ic in a||Eba(a,Dba);a[Ic]|=b} function Kc(a,b){Bc||Ic in a||Eba(a,Dba);a[Ic]=b} function Gba(a){if(4&a)return 512&a?512:1024&a?1024:0} function Mc(a){Lc(a,34);return a} function Nc(a){Lc(a,8192);return a} function Oc(a){Lc(a,32);return a} ;var Hba={};function Pc(a){return a[Aba]===Hba} function Qc(a,b){return b===void 0?a.ma!==Rc&&!!(2&(a.Aa[Ic]|0)):!!(2&b)&&a.ma!==Rc} var Rc={};function Sc(a,b,c){if(a==null){if(!c)throw Error();}else if(typeof a==="string")a=a?new uc(a,tc):vc();else if(a.constructor!==uc)if(rc(a))a=a.length?new uc(new Uint8Array(a),tc):vc();else{if(!b)throw Error();a=void 0}return a} function Tc(a,b){if(typeof b!=="number"||b =a.length)throw Error();} function Iba(a,b){if(typeof b!=="number"||b a.length)throw Error();} function Uc(a,b,c){this.o=a;this.ma=b;this.thisArg=c} Uc.prototype.next=function(){var a=this.o.next();a.done||(a.value=this.ma.call(this.thisArg,a.value));return a}; Uc.prototype[Symbol.iterator]=function(){return this}; var Vc=Object.freeze({}),Jba=Object.freeze({});function Kba(a,b,c){var e=b&128?0:-1,f=a.length,h;if(h=!!f)h=a[f-1],h=h!=null&&typeof h==="object"&&h.constructor===Object;var k=f+(h?-1:0);for(b=b&128?1:0;b =Qba&&a b.length)return!1;if(a.length f)return!1;if(e >>0;bd=b;cd=(a-b)/4294967296>>>0} function fd(a){if(a >>0;cd=b>>>0}else ed(a)} function Wba(a){var b=dd||(dd=new DataView(new ArrayBuffer(8)));b.setFloat32(0,+a,!0);cd=0;bd=b.getUint32(0,!0)} function hd(a,b){var c=b*4294967296+(a>>>0);return Number.isSafeInteger(c)?c:jd(a,b)} function Xba(a,b){return $c(Ac()?BigInt.asUintN(64,(BigInt(b>>>0) >>0)):jd(a,b))} function kd(a,b){var c=b&2147483648;c&&(a=~a+1>>>0,b=~b>>>0,a==0&&(b=b+1>>>0));a=hd(a,b);return typeof a==="number"?c?-a:a:c?"-"+a:a} function Yba(a,b){return Ac()?$c(BigInt.asIntN(64,(BigInt.asUintN(32,BigInt(b)) >31;c=(c >>31)^e;a(b >>1|b >>1^e;return c(a,b)} function jd(a,b){b>>>=0;a>>>=0;if(b >>24|b >16&65535,a=(a&16777215)+c*6777216+b*6710656,c+=b*8147497,b*=2,a>=1E7&&(c+=a/1E7>>>0,a%=1E7),c>=1E7&&(b+=c/1E7>>>0,c%=1E7),c=b+bca(c)+bca(a));return c} function bca(a){a=String(a);return"0000000".slice(a.length)+a} function ld(a,b){b&2147483648?Ac()?a=""+(BigInt(b|0) >>0)):(b=v(gd(a,b)),a=b.next().value,b=b.next().value,a="-"+jd(a,b)):a=jd(a,b);return a} function md(a){if(a.length >>0,cd=Number(a>>BigInt(32)&BigInt(4294967295));else{var b=+(a[0]==="-");cd=bd=0;for(var c=a.length,e=0+b,f=(c-b)%6+b;f =4294967296&&(cd+=Math.trunc(bd/4294967296),cd
2026-01-13T08:48:40
https://docs.python.org/3/tutorial/controlflow.html#if-statements
4. More Control Flow Tools — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 4. More Control Flow Tools 4.1. if Statements 4.2. for Statements 4.3. The range() Function 4.4. break and continue Statements 4.5. else Clauses on Loops 4.6. pass Statements 4.7. match Statements 4.8. Defining Functions 4.9. More on Defining Functions 4.9.1. Default Argument Values 4.9.2. Keyword Arguments 4.9.3. Special parameters 4.9.3.1. Positional-or-Keyword Arguments 4.9.3.2. Positional-Only Parameters 4.9.3.3. Keyword-Only Arguments 4.9.3.4. Function Examples 4.9.3.5. Recap 4.9.4. Arbitrary Argument Lists 4.9.5. Unpacking Argument Lists 4.9.6. Lambda Expressions 4.9.7. Documentation Strings 4.9.8. Function Annotations 4.10. Intermezzo: Coding Style Previous topic 3. An Informal Introduction to Python Next topic 5. Data Structures This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 4. More Control Flow Tools | Theme Auto Light Dark | 4. More Control Flow Tools ¶ As well as the while statement just introduced, Python uses a few more that we will encounter in this chapter. 4.1. if Statements ¶ Perhaps the most well-known statement type is the if statement. For example: >>> x = int ( input ( "Please enter an integer: " )) Please enter an integer: 42 >>> if x < 0 : ... x = 0 ... print ( 'Negative changed to zero' ) ... elif x == 0 : ... print ( 'Zero' ) ... elif x == 1 : ... print ( 'Single' ) ... else : ... print ( 'More' ) ... More There can be zero or more elif parts, and the else part is optional. The keyword ‘ elif ’ is short for ‘else if’, and is useful to avoid excessive indentation. An if … elif … elif … sequence is a substitute for the switch or case statements found in other languages. If you’re comparing the same value to several constants, or checking for specific types or attributes, you may also find the match statement useful. For more details see match Statements . 4.2. for Statements ¶ The for statement in Python differs a bit from what you may be used to in C or Pascal. Rather than always iterating over an arithmetic progression of numbers (like in Pascal), or giving the user the ability to define both the iteration step and halting condition (as C), Python’s for statement iterates over the items of any sequence (a list or a string), in the order that they appear in the sequence. For example (no pun intended): >>> # Measure some strings: >>> words = [ 'cat' , 'window' , 'defenestrate' ] >>> for w in words : ... print ( w , len ( w )) ... cat 3 window 6 defenestrate 12 Code that modifies a collection while iterating over that same collection can be tricky to get right. Instead, it is usually more straight-forward to loop over a copy of the collection or to create a new collection: # Create a sample collection users = { 'Hans' : 'active' , 'Éléonore' : 'inactive' , '景太郎' : 'active' } # Strategy: Iterate over a copy for user , status in users . copy () . items (): if status == 'inactive' : del users [ user ] # Strategy: Create a new collection active_users = {} for user , status in users . items (): if status == 'active' : active_users [ user ] = status 4.3. The range() Function ¶ If you do need to iterate over a sequence of numbers, the built-in function range() comes in handy. It generates arithmetic progressions: >>> for i in range ( 5 ): ... print ( i ) ... 0 1 2 3 4 The given end point is never part of the generated sequence; range(10) generates 10 values, the legal indices for items of a sequence of length 10. It is possible to let the range start at another number, or to specify a different increment (even negative; sometimes this is called the ‘step’): >>> list ( range ( 5 , 10 )) [5, 6, 7, 8, 9] >>> list ( range ( 0 , 10 , 3 )) [0, 3, 6, 9] >>> list ( range ( - 10 , - 100 , - 30 )) [-10, -40, -70] To iterate over the indices of a sequence, you can combine range() and len() as follows: >>> a = [ 'Mary' , 'had' , 'a' , 'little' , 'lamb' ] >>> for i in range ( len ( a )): ... print ( i , a [ i ]) ... 0 Mary 1 had 2 a 3 little 4 lamb In most such cases, however, it is convenient to use the enumerate() function, see Looping Techniques . A strange thing happens if you just print a range: >>> range ( 10 ) range(0, 10) In many ways the object returned by range() behaves as if it is a list, but in fact it isn’t. It is an object which returns the successive items of the desired sequence when you iterate over it, but it doesn’t really make the list, thus saving space. We say such an object is iterable , that is, suitable as a target for functions and constructs that expect something from which they can obtain successive items until the supply is exhausted. We have seen that the for statement is such a construct, while an example of a function that takes an iterable is sum() : >>> sum ( range ( 4 )) # 0 + 1 + 2 + 3 6 Later we will see more functions that return iterables and take iterables as arguments. In chapter Data Structures , we will discuss in more detail about list() . 4.4. break and continue Statements ¶ The break statement breaks out of the innermost enclosing for or while loop: >>> for n in range ( 2 , 10 ): ... for x in range ( 2 , n ): ... if n % x == 0 : ... print ( f " { n } equals { x } * { n // x } " ) ... break ... 4 equals 2 * 2 6 equals 2 * 3 8 equals 2 * 4 9 equals 3 * 3 The continue statement continues with the next iteration of the loop: >>> for num in range ( 2 , 10 ): ... if num % 2 == 0 : ... print ( f "Found an even number { num } " ) ... continue ... print ( f "Found an odd number { num } " ) ... Found an even number 2 Found an odd number 3 Found an even number 4 Found an odd number 5 Found an even number 6 Found an odd number 7 Found an even number 8 Found an odd number 9 4.5. else Clauses on Loops ¶ In a for or while loop the break statement may be paired with an else clause. If the loop finishes without executing the break , the else clause executes. In a for loop, the else clause is executed after the loop finishes its final iteration, that is, if no break occurred. In a while loop, it’s executed after the loop’s condition becomes false. In either kind of loop, the else clause is not executed if the loop was terminated by a break . Of course, other ways of ending the loop early, such as a return or a raised exception, will also skip execution of the else clause. This is exemplified in the following for loop, which searches for prime numbers: >>> for n in range ( 2 , 10 ): ... for x in range ( 2 , n ): ... if n % x == 0 : ... print ( n , 'equals' , x , '*' , n // x ) ... break ... else : ... # loop fell through without finding a factor ... print ( n , 'is a prime number' ) ... 2 is a prime number 3 is a prime number 4 equals 2 * 2 5 is a prime number 6 equals 2 * 3 7 is a prime number 8 equals 2 * 4 9 equals 3 * 3 (Yes, this is the correct code. Look closely: the else clause belongs to the for loop, not the if statement.) One way to think of the else clause is to imagine it paired with the if inside the loop. As the loop executes, it will run a sequence like if/if/if/else. The if is inside the loop, encountered a number of times. If the condition is ever true, a break will happen. If the condition is never true, the else clause outside the loop will execute. When used with a loop, the else clause has more in common with the else clause of a try statement than it does with that of if statements: a try statement’s else clause runs when no exception occurs, and a loop’s else clause runs when no break occurs. For more on the try statement and exceptions, see Handling Exceptions . 4.6. pass Statements ¶ The pass statement does nothing. It can be used when a statement is required syntactically but the program requires no action. For example: >>> while True : ... pass # Busy-wait for keyboard interrupt (Ctrl+C) ... This is commonly used for creating minimal classes: >>> class MyEmptyClass : ... pass ... Another place pass can be used is as a place-holder for a function or conditional body when you are working on new code, allowing you to keep thinking at a more abstract level. The pass is silently ignored: >>> def initlog ( * args ): ... pass # Remember to implement this! ... For this last case, many people use the ellipsis literal ... instead of pass . This use has no special meaning to Python, and is not part of the language definition (you could use any constant expression here), but ... is used conventionally as a placeholder body as well. See The Ellipsis Object . 4.7. match Statements ¶ A match statement takes an expression and compares its value to successive patterns given as one or more case blocks. This is superficially similar to a switch statement in C, Java or JavaScript (and many other languages), but it’s more similar to pattern matching in languages like Rust or Haskell. Only the first pattern that matches gets executed and it can also extract components (sequence elements or object attributes) from the value into variables. If no case matches, none of the branches is executed. The simplest form compares a subject value against one or more literals: def http_error ( status ): match status : case 400 : return "Bad request" case 404 : return "Not found" case 418 : return "I'm a teapot" case _ : return "Something's wrong with the internet" Note the last block: the “variable name” _ acts as a wildcard and never fails to match. You can combine several literals in a single pattern using | (“or”): case 401 | 403 | 404 : return "Not allowed" Patterns can look like unpacking assignments, and can be used to bind variables: # point is an (x, y) tuple match point : case ( 0 , 0 ): print ( "Origin" ) case ( 0 , y ): print ( f "Y= { y } " ) case ( x , 0 ): print ( f "X= { x } " ) case ( x , y ): print ( f "X= { x } , Y= { y } " ) case _ : raise ValueError ( "Not a point" ) Study that one carefully! The first pattern has two literals, and can be thought of as an extension of the literal pattern shown above. But the next two patterns combine a literal and a variable, and the variable binds a value from the subject ( point ). The fourth pattern captures two values, which makes it conceptually similar to the unpacking assignment (x, y) = point . If you are using classes to structure your data you can use the class name followed by an argument list resembling a constructor, but with the ability to capture attributes into variables: class Point : def __init__ ( self , x , y ): self . x = x self . y = y def where_is ( point ): match point : case Point ( x = 0 , y = 0 ): print ( "Origin" ) case Point ( x = 0 , y = y ): print ( f "Y= { y } " ) case Point ( x = x , y = 0 ): print ( f "X= { x } " ) case Point (): print ( "Somewhere else" ) case _ : print ( "Not a point" ) You can use positional parameters with some builtin classes that provide an ordering for their attributes (e.g. dataclasses). You can also define a specific position for attributes in patterns by setting the __match_args__ special attribute in your classes. If it’s set to (“x”, “y”), the following patterns are all equivalent (and all bind the y attribute to the var variable): Point ( 1 , var ) Point ( 1 , y = var ) Point ( x = 1 , y = var ) Point ( y = var , x = 1 ) A recommended way to read patterns is to look at them as an extended form of what you would put on the left of an assignment, to understand which variables would be set to what. Only the standalone names (like var above) are assigned to by a match statement. Dotted names (like foo.bar ), attribute names (the x= and y= above) or class names (recognized by the “(…)” next to them like Point above) are never assigned to. Patterns can be arbitrarily nested. For example, if we have a short list of Points, with __match_args__ added, we could match it like this: class Point : __match_args__ = ( 'x' , 'y' ) def __init__ ( self , x , y ): self . x = x self . y = y match points : case []: print ( "No points" ) case [ Point ( 0 , 0 )]: print ( "The origin" ) case [ Point ( x , y )]: print ( f "Single point { x } , { y } " ) case [ Point ( 0 , y1 ), Point ( 0 , y2 )]: print ( f "Two on the Y axis at { y1 } , { y2 } " ) case _ : print ( "Something else" ) We can add an if clause to a pattern, known as a “guard”. If the guard is false, match goes on to try the next case block. Note that value capture happens before the guard is evaluated: match point : case Point ( x , y ) if x == y : print ( f "Y=X at { x } " ) case Point ( x , y ): print ( f "Not on the diagonal" ) Several other key features of this statement: Like unpacking assignments, tuple and list patterns have exactly the same meaning and actually match arbitrary sequences. An important exception is that they don’t match iterators or strings. Sequence patterns support extended unpacking: [x, y, *rest] and (x, y, *rest) work similar to unpacking assignments. The name after * may also be _ , so (x, y, *_) matches a sequence of at least two items without binding the remaining items. Mapping patterns: {"bandwidth": b, "latency": l} captures the "bandwidth" and "latency" values from a dictionary. Unlike sequence patterns, extra keys are ignored. An unpacking like **rest is also supported. (But **_ would be redundant, so it is not allowed.) Subpatterns may be captured using the as keyword: case ( Point ( x1 , y1 ), Point ( x2 , y2 ) as p2 ): ... will capture the second element of the input as p2 (as long as the input is a sequence of two points) Most literals are compared by equality, however the singletons True , False and None are compared by identity. Patterns may use named constants. These must be dotted names to prevent them from being interpreted as capture variable: from enum import Enum class Color ( Enum ): RED = 'red' GREEN = 'green' BLUE = 'blue' color = Color ( input ( "Enter your choice of 'red', 'blue' or 'green': " )) match color : case Color . RED : print ( "I see red!" ) case Color . GREEN : print ( "Grass is green" ) case Color . BLUE : print ( "I'm feeling the blues :(" ) For a more detailed explanation and additional examples, you can look into PEP 636 which is written in a tutorial format. 4.8. Defining Functions ¶ We can create a function that writes the Fibonacci series to an arbitrary boundary: >>> def fib ( n ): # write Fibonacci series less than n ... """Print a Fibonacci series less than n.""" ... a , b = 0 , 1 ... while a < n : ... print ( a , end = ' ' ) ... a , b = b , a + b ... print () ... >>> # Now call the function we just defined: >>> fib ( 2000 ) 0 1 1 2 3 5 8 13 21 34 55 89 144 233 377 610 987 1597 The keyword def introduces a function definition . It must be followed by the function name and the parenthesized list of formal parameters. The statements that form the body of the function start at the next line, and must be indented. The first statement of the function body can optionally be a string literal; this string literal is the function’s documentation string, or docstring . (More about docstrings can be found in the section Documentation Strings .) There are tools which use docstrings to automatically produce online or printed documentation, or to let the user interactively browse through code; it’s good practice to include docstrings in code that you write, so make a habit of it. The execution of a function introduces a new symbol table used for the local variables of the function. More precisely, all variable assignments in a function store the value in the local symbol table; whereas variable references first look in the local symbol table, then in the local symbol tables of enclosing functions, then in the global symbol table, and finally in the table of built-in names. Thus, global variables and variables of enclosing functions cannot be directly assigned a value within a function (unless, for global variables, named in a global statement, or, for variables of enclosing functions, named in a nonlocal statement), although they may be referenced. The actual parameters (arguments) to a function call are introduced in the local symbol table of the called function when it is called; thus, arguments are passed using call by value (where the value is always an object reference , not the value of the object). [ 1 ] When a function calls another function, or calls itself recursively, a new local symbol table is created for that call. A function definition associates the function name with the function object in the current symbol table. The interpreter recognizes the object pointed to by that name as a user-defined function. Other names can also point to that same function object and can also be used to access the function: >>> fib <function fib at 10042ed0> >>> f = fib >>> f ( 100 ) 0 1 1 2 3 5 8 13 21 34 55 89 Coming from other languages, you might object that fib is not a function but a procedure since it doesn’t return a value. In fact, even functions without a return statement do return a value, albeit a rather boring one. This value is called None (it’s a built-in name). Writing the value None is normally suppressed by the interpreter if it would be the only value written. You can see it if you really want to using print() : >>> fib ( 0 ) >>> print ( fib ( 0 )) None It is simple to write a function that returns a list of the numbers of the Fibonacci series, instead of printing it: >>> def fib2 ( n ): # return Fibonacci series up to n ... """Return a list containing the Fibonacci series up to n.""" ... result = [] ... a , b = 0 , 1 ... while a < n : ... result . append ( a ) # see below ... a , b = b , a + b ... return result ... >>> f100 = fib2 ( 100 ) # call it >>> f100 # write the result [0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89] This example, as usual, demonstrates some new Python features: The return statement returns with a value from a function. return without an expression argument returns None . Falling off the end of a function also returns None . The statement result.append(a) calls a method of the list object result . A method is a function that ‘belongs’ to an object and is named obj.methodname , where obj is some object (this may be an expression), and methodname is the name of a method that is defined by the object’s type. Different types define different methods. Methods of different types may have the same name without causing ambiguity. (It is possible to define your own object types and methods, using classes , see Classes ) The method append() shown in the example is defined for list objects; it adds a new element at the end of the list. In this example it is equivalent to result = result + [a] , but more efficient. 4.9. More on Defining Functions ¶ It is also possible to define functions with a variable number of arguments. There are three forms, which can be combined. 4.9.1. Default Argument Values ¶ The most useful form is to specify a default value for one or more arguments. This creates a function that can be called with fewer arguments than it is defined to allow. For example: def ask_ok ( prompt , retries = 4 , reminder = 'Please try again!' ): while True : reply = input ( prompt ) if reply in { 'y' , 'ye' , 'yes' }: return True if reply in { 'n' , 'no' , 'nop' , 'nope' }: return False retries = retries - 1 if retries < 0 : raise ValueError ( 'invalid user response' ) print ( reminder ) This function can be called in several ways: giving only the mandatory argument: ask_ok('Do you really want to quit?') giving one of the optional arguments: ask_ok('OK to overwrite the file?', 2) or even giving all arguments: ask_ok('OK to overwrite the file?', 2, 'Come on, only yes or no!') This example also introduces the in keyword. This tests whether or not a sequence contains a certain value. The default values are evaluated at the point of function definition in the defining scope, so that i = 5 def f ( arg = i ): print ( arg ) i = 6 f () will print 5 . Important warning: The default value is evaluated only once. This makes a difference when the default is a mutable object such as a list, dictionary, or instances of most classes. For example, the following function accumulates the arguments passed to it on subsequent calls: def f ( a , L = []): L . append ( a ) return L print ( f ( 1 )) print ( f ( 2 )) print ( f ( 3 )) This will print [ 1 ] [ 1 , 2 ] [ 1 , 2 , 3 ] If you don’t want the default to be shared between subsequent calls, you can write the function like this instead: def f ( a , L = None ): if L is None : L = [] L . append ( a ) return L 4.9.2. Keyword Arguments ¶ Functions can also be called using keyword arguments of the form kwarg=value . For instance, the following function: def parrot ( voltage , state = 'a stiff' , action = 'voom' , type = 'Norwegian Blue' ): print ( "-- This parrot wouldn't" , action , end = ' ' ) print ( "if you put" , voltage , "volts through it." ) print ( "-- Lovely plumage, the" , type ) print ( "-- It's" , state , "!" ) accepts one required argument ( voltage ) and three optional arguments ( state , action , and type ). This function can be called in any of the following ways: parrot ( 1000 ) # 1 positional argument parrot ( voltage = 1000 ) # 1 keyword argument parrot ( voltage = 1000000 , action = 'VOOOOOM' ) # 2 keyword arguments parrot ( action = 'VOOOOOM' , voltage = 1000000 ) # 2 keyword arguments parrot ( 'a million' , 'bereft of life' , 'jump' ) # 3 positional arguments parrot ( 'a thousand' , state = 'pushing up the daisies' ) # 1 positional, 1 keyword but all the following calls would be invalid: parrot () # required argument missing parrot ( voltage = 5.0 , 'dead' ) # non-keyword argument after a keyword argument parrot ( 110 , voltage = 220 ) # duplicate value for the same argument parrot ( actor = 'John Cleese' ) # unknown keyword argument In a function call, keyword arguments must follow positional arguments. All the keyword arguments passed must match one of the arguments accepted by the function (e.g. actor is not a valid argument for the parrot function), and their order is not important. This also includes non-optional arguments (e.g. parrot(voltage=1000) is valid too). No argument may receive a value more than once. Here’s an example that fails due to this restriction: >>> def function ( a ): ... pass ... >>> function ( 0 , a = 0 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : function() got multiple values for argument 'a' When a final formal parameter of the form **name is present, it receives a dictionary (see Mapping Types — dict ) containing all keyword arguments except for those corresponding to a formal parameter. This may be combined with a formal parameter of the form *name (described in the next subsection) which receives a tuple containing the positional arguments beyond the formal parameter list. ( *name must occur before **name .) For example, if we define a function like this: def cheeseshop ( kind , * arguments , ** keywords ): print ( "-- Do you have any" , kind , "?" ) print ( "-- I'm sorry, we're all out of" , kind ) for arg in arguments : print ( arg ) print ( "-" * 40 ) for kw in keywords : print ( kw , ":" , keywords [ kw ]) It could be called like this: cheeseshop ( "Limburger" , "It's very runny, sir." , "It's really very, VERY runny, sir." , shopkeeper = "Michael Palin" , client = "John Cleese" , sketch = "Cheese Shop Sketch" ) and of course it would print: -- Do you have any Limburger ? -- I'm sorry, we're all out of Limburger It's very runny, sir. It's really very, VERY runny, sir. ---------------------------------------- shopkeeper : Michael Palin client : John Cleese sketch : Cheese Shop Sketch Note that the order in which the keyword arguments are printed is guaranteed to match the order in which they were provided in the function call. 4.9.3. Special parameters ¶ By default, arguments may be passed to a Python function either by position or explicitly by keyword. For readability and performance, it makes sense to restrict the way arguments can be passed so that a developer need only look at the function definition to determine if items are passed by position, by position or keyword, or by keyword. A function definition may look like: def f(pos1, pos2, /, pos_or_kwd, *, kwd1, kwd2): ----------- ---------- ---------- | | | | Positional or keyword | | - Keyword only -- Positional only where / and * are optional. If used, these symbols indicate the kind of parameter by how the arguments may be passed to the function: positional-only, positional-or-keyword, and keyword-only. Keyword parameters are also referred to as named parameters. 4.9.3.1. Positional-or-Keyword Arguments ¶ If / and * are not present in the function definition, arguments may be passed to a function by position or by keyword. 4.9.3.2. Positional-Only Parameters ¶ Looking at this in a bit more detail, it is possible to mark certain parameters as positional-only . If positional-only , the parameters’ order matters, and the parameters cannot be passed by keyword. Positional-only parameters are placed before a / (forward-slash). The / is used to logically separate the positional-only parameters from the rest of the parameters. If there is no / in the function definition, there are no positional-only parameters. Parameters following the / may be positional-or-keyword or keyword-only . 4.9.3.3. Keyword-Only Arguments ¶ To mark parameters as keyword-only , indicating the parameters must be passed by keyword argument, place an * in the arguments list just before the first keyword-only parameter. 4.9.3.4. Function Examples ¶ Consider the following example function definitions paying close attention to the markers / and * : >>> def standard_arg ( arg ): ... print ( arg ) ... >>> def pos_only_arg ( arg , / ): ... print ( arg ) ... >>> def kwd_only_arg ( * , arg ): ... print ( arg ) ... >>> def combined_example ( pos_only , / , standard , * , kwd_only ): ... print ( pos_only , standard , kwd_only ) The first function definition, standard_arg , the most familiar form, places no restrictions on the calling convention and arguments may be passed by position or keyword: >>> standard_arg ( 2 ) 2 >>> standard_arg ( arg = 2 ) 2 The second function pos_only_arg is restricted to only use positional parameters as there is a / in the function definition: >>> pos_only_arg ( 1 ) 1 >>> pos_only_arg ( arg = 1 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : pos_only_arg() got some positional-only arguments passed as keyword arguments: 'arg' The third function kwd_only_arg only allows keyword arguments as indicated by a * in the function definition: >>> kwd_only_arg ( 3 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : kwd_only_arg() takes 0 positional arguments but 1 was given >>> kwd_only_arg ( arg = 3 ) 3 And the last uses all three calling conventions in the same function definition: >>> combined_example ( 1 , 2 , 3 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : combined_example() takes 2 positional arguments but 3 were given >>> combined_example ( 1 , 2 , kwd_only = 3 ) 1 2 3 >>> combined_example ( 1 , standard = 2 , kwd_only = 3 ) 1 2 3 >>> combined_example ( pos_only = 1 , standard = 2 , kwd_only = 3 ) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : combined_example() got some positional-only arguments passed as keyword arguments: 'pos_only' Finally, consider this function definition which has a potential collision between the positional argument name and **kwds which has name as a key: def foo ( name , ** kwds ): return 'name' in kwds There is no possible call that will make it return True as the keyword 'name' will always bind to the first parameter. For example: >>> foo ( 1 , ** { 'name' : 2 }) Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : foo() got multiple values for argument 'name' >>> But using / (positional only arguments), it is possible since it allows name as a positional argument and 'name' as a key in the keyword arguments: >>> def foo ( name , / , ** kwds ): ... return 'name' in kwds ... >>> foo ( 1 , ** { 'name' : 2 }) True In other words, the names of positional-only parameters can be used in **kwds without ambiguity. 4.9.3.5. Recap ¶ The use case will determine which parameters to use in the function definition: def f ( pos1 , pos2 , / , pos_or_kwd , * , kwd1 , kwd2 ): As guidance: Use positional-only if you want the name of the parameters to not be available to the user. This is useful when parameter names have no real meaning, if you want to enforce the order of the arguments when the function is called or if you need to take some positional parameters and arbitrary keywords. Use keyword-only when names have meaning and the function definition is more understandable by being explicit with names or you want to prevent users relying on the position of the argument being passed. For an API, use positional-only to prevent breaking API changes if the parameter’s name is modified in the future. 4.9.4. Arbitrary Argument Lists ¶ Finally, the least frequently used option is to specify that a function can be called with an arbitrary number of arguments. These arguments will be wrapped up in a tuple (see Tuples and Sequences ). Before the variable number of arguments, zero or more normal arguments may occur. def write_multiple_items ( file , separator , * args ): file . write ( separator . join ( args )) Normally, these variadic arguments will be last in the list of formal parameters, because they scoop up all remaining input arguments that are passed to the function. Any formal parameters which occur after the *args parameter are ‘keyword-only’ arguments, meaning that they can only be used as keywords rather than positional arguments. >>> def concat ( * args , sep = "/" ): ... return sep . join ( args ) ... >>> concat ( "earth" , "mars" , "venus" ) 'earth/mars/venus' >>> concat ( "earth" , "mars" , "venus" , sep = "." ) 'earth.mars.venus' 4.9.5. Unpacking Argument Lists ¶ The reverse situation occurs when the arguments are already in a list or tuple but need to be unpacked for a function call requiring separate positional arguments. For instance, the built-in range() function expects separate start and stop arguments. If they are not available separately, write the function call with the * -operator to unpack the arguments out of a list or tuple: >>> list ( range ( 3 , 6 )) # normal call with separate arguments [3, 4, 5] >>> args = [ 3 , 6 ] >>> list ( range ( * args )) # call with arguments unpacked from a list [3, 4, 5] In the same fashion, dictionaries can deliver keyword arguments with the ** -operator: >>> def parrot ( voltage , state = 'a stiff' , action = 'voom' ): ... print ( "-- This parrot wouldn't" , action , end = ' ' ) ... print ( "if you put" , voltage , "volts through it." , end = ' ' ) ... print ( "E's" , state , "!" ) ... >>> d = { "voltage" : "four million" , "state" : "bleedin' demised" , "action" : "VOOM" } >>> parrot ( ** d ) -- This parrot wouldn't VOOM if you put four million volts through it. E's bleedin' demised ! 4.9.6. Lambda Expressions ¶ Small anonymous functions can be created with the lambda keyword. This function returns the sum of its two arguments: lambda a, b: a+b . Lambda functions can be used wherever function objects are required. They are syntactically restricted to a single expression. Semantically, they are just syntactic sugar for a normal function definition. Like nested function definitions, lambda functions can reference variables from the containing scope: >>> def make_incrementor ( n ): ... return lambda x : x + n ... >>> f = make_incrementor ( 42 ) >>> f ( 0 ) 42 >>> f ( 1 ) 43 The above example uses a lambda expression to return a function. Another use is to pass a small function as an argument. For instance, list.sort() takes a sorting key function key which can be a lambda function: >>> pairs = [( 1 , 'one' ), ( 2 , 'two' ), ( 3 , 'three' ), ( 4 , 'four' )] >>> pairs . sort ( key = lambda pair : pair [ 1 ]) >>> pairs [(4, 'four'), (1, 'one'), (3, 'three'), (2, 'two')] 4.9.7. Documentation Strings ¶ Here are some conventions about the content and formatting of documentation strings. The first line should always be a short, concise summary of the object’s purpose. For brevity, it should not explicitly state the object’s name or type, since these are available by other means (except if the name happens to be a verb describing a function’s operation). This line should begin with a capital letter and end with a period. If there are more lines in the documentation string, the second line should be blank, visually separating the summary from the rest of the description. The following lines should be one or more paragraphs describing the object’s calling conventions, its side effects, etc. The Python parser strips indentation from multi-line string literals when they serve as module, class, or function docstrings. Here is an example of a multi-line docstring: >>> def my_function (): ... """Do nothing, but document it. ... ... No, really, it doesn't do anything: ... ... >>> my_function() ... >>> ... """ ... pass ... >>> print ( my_function . __doc__ ) Do nothing, but document it. No, really, it doesn't do anything: >>> my_function() >>> 4.9.8. Function Annotations ¶ Function annotations are completely optional metadata information about the types used by user-defined functions (see PEP 3107 and PEP 484 for more information). Annotations are stored in the __annotations__ attribute of the function as a dictionary and have no effect on any other part of the function. Parameter annotations are defined by a colon after the parameter name, followed by an expression evaluating to the value of the annotation. Return annotations are defined by a literal -> , followed by an expression, between the parameter list and the colon denoting the end of the def statement. The following example has a required argument, an optional argument, and the return value annotated: >>> def f ( ham : str , eggs : str = 'eggs' ) -> str : ... print ( "Annotations:" , f . __annotations__ ) ... print ( "Arguments:" , ham , eggs ) ... return ham + ' and ' + eggs ... >>> f ( 'spam' ) Annotations: {'ham': <class 'str'>, 'return': <class 'str'>, 'eggs': <class 'str'>} Arguments: spam eggs 'spam and eggs' 4.10. Intermezzo: Coding Style ¶ Now that you are about to write longer, more complex pieces of Python, it is a good time to talk about coding style . Most languages can be written (or more concise, formatted ) in different styles; some are more readable than others. Making it easy for others to read your code is always a good idea, and adopting a nice coding style helps tremendously for that. For Python, PEP 8 has emerged as the style guide that most projects adhere to; it promotes a very readable and eye-pleasing coding style. Every Python developer should read it at some point; here are the most important points extracted for you: Use 4-space indentation, and no tabs. 4 spaces are a good compromise between small indentation (allows greater nesting depth) and large indentation (easier to read). Tabs introduce confusion, and are best left out. Wrap lines so that they don’t exceed 79 characters. This helps users with small displays and makes it possible to have several code files side-by-side on larger displays. Use blank lines to separate functions and classes, and larger blocks of code inside functions. When possible, put comments on a line of their own. Use docstrings. Use spaces around operators and after commas, but not directly inside bracketing constructs: a = f(1, 2) + g(3, 4) . Name your classes and functions consistently; the convention is to use UpperCamelCase for classes and lowercase_with_underscores for functions and methods. Always use self as the name for the first method argument (see A First Look at Classes for more on classes and methods). Don’t use fancy encodings if your code is meant to be used in international environments. Python’s default, UTF-8, or even plain ASCII work best in any case. Likewise, don’t use non-ASCII characters in identifiers if there is only the slightest chance people speaking a different language will read or maintain the code. Footnotes [ 1 ] Actually, call by object reference would be a better description, since if a mutable object is passed, the caller will see any changes the callee makes to it (items inserted into a list). Table of Contents 4. More Control Flow Tools 4.1. if Statements 4.2. for Statements 4.3. The range() Function 4.4. break and continue Statements 4.5. else Clauses on Loops 4.6. pass Statements 4.7. match Statements 4.8. Defining Functions 4.9. More on Defining Functions 4.9.1. Default Argument Values 4.9.2. Keyword Arguments 4.9.3. Special parameters 4.9.3.1. Positional-or-Keyword Arguments 4.9.3.2. Positional-Only Parameters 4.9.3.3. Keyword-Only Arguments 4.9.3.4. Function Examples 4.9.3.5. Recap 4.9.4. Arbitrary Argument Lists 4.9.5. Unpacking Argument Lists 4.9.6. Lambda Expressions 4.9.7. Documentation Strings 4.9.8. Function Annotations 4.10. Intermezzo: Coding Style Previous topic 3. An Informal Introduction to Python Next topic 5. Data Structures This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 4. More Control Flow Tools | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:40
https://docs.python.org/3/tutorial/introduction.html#using-python-as-a-calculator
3. An Informal Introduction to Python — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | 3. An Informal Introduction to Python ¶ In the following examples, input and output are distinguished by the presence or absence of prompts ( >>> and … ): to repeat the example, you must type everything after the prompt, when the prompt appears; lines that do not begin with a prompt are output from the interpreter. Note that a secondary prompt on a line by itself in an example means you must type a blank line; this is used to end a multi-line command. You can use the “Copy” button (it appears in the upper-right corner when hovering over or tapping a code example), which strips prompts and omits output, to copy and paste the input lines into your interpreter. Many of the examples in this manual, even those entered at the interactive prompt, include comments. Comments in Python start with the hash character, # , and extend to the end of the physical line. A comment may appear at the start of a line or following whitespace or code, but not within a string literal. A hash character within a string literal is just a hash character. Since comments are to clarify code and are not interpreted by Python, they may be omitted when typing in examples. Some examples: # this is the first comment spam = 1 # and this is the second comment # ... and now a third! text = "# This is not a comment because it's inside quotes." 3.1. Using Python as a Calculator ¶ Let’s try some simple Python commands. Start the interpreter and wait for the primary prompt, >>> . (It shouldn’t take long.) 3.1.1. Numbers ¶ The interpreter acts as a simple calculator: you can type an expression into it and it will write the value. Expression syntax is straightforward: the operators + , - , * and / can be used to perform arithmetic; parentheses ( () ) can be used for grouping. For example: >>> 2 + 2 4 >>> 50 - 5 * 6 20 >>> ( 50 - 5 * 6 ) / 4 5.0 >>> 8 / 5 # division always returns a floating-point number 1.6 The integer numbers (e.g. 2 , 4 , 20 ) have type int , the ones with a fractional part (e.g. 5.0 , 1.6 ) have type float . We will see more about numeric types later in the tutorial. Division ( / ) always returns a float. To do floor division and get an integer result you can use the // operator; to calculate the remainder you can use % : >>> 17 / 3 # classic division returns a float 5.666666666666667 >>> >>> 17 // 3 # floor division discards the fractional part 5 >>> 17 % 3 # the % operator returns the remainder of the division 2 >>> 5 * 3 + 2 # floored quotient * divisor + remainder 17 With Python, it is possible to use the ** operator to calculate powers [ 1 ] : >>> 5 ** 2 # 5 squared 25 >>> 2 ** 7 # 2 to the power of 7 128 The equal sign ( = ) is used to assign a value to a variable. Afterwards, no result is displayed before the next interactive prompt: >>> width = 20 >>> height = 5 * 9 >>> width * height 900 If a variable is not “defined” (assigned a value), trying to use it will give you an error: >>> n # try to access an undefined variable Traceback (most recent call last): File "<stdin>" , line 1 , in <module> NameError : name 'n' is not defined There is full support for floating point; operators with mixed type operands convert the integer operand to floating point: >>> 4 * 3.75 - 1 14.0 In interactive mode, the last printed expression is assigned to the variable _ . This means that when you are using Python as a desk calculator, it is somewhat easier to continue calculations, for example: >>> tax = 12.5 / 100 >>> price = 100.50 >>> price * tax 12.5625 >>> price + _ 113.0625 >>> round ( _ , 2 ) 113.06 This variable should be treated as read-only by the user. Don’t explicitly assign a value to it — you would create an independent local variable with the same name masking the built-in variable with its magic behavior. In addition to int and float , Python supports other types of numbers, such as Decimal and Fraction . Python also has built-in support for complex numbers , and uses the j or J suffix to indicate the imaginary part (e.g. 3+5j ). 3.1.2. Text ¶ Python can manipulate text (represented by type str , so-called “strings”) as well as numbers. This includes characters “ ! ”, words “ rabbit ”, names “ Paris ”, sentences “ Got your back. ”, etc. “ Yay! :) ”. They can be enclosed in single quotes ( '...' ) or double quotes ( "..." ) with the same result [ 2 ] . >>> 'spam eggs' # single quotes 'spam eggs' >>> "Paris rabbit got your back :)! Yay!" # double quotes 'Paris rabbit got your back :)! Yay!' >>> '1975' # digits and numerals enclosed in quotes are also strings '1975' To quote a quote, we need to “escape” it, by preceding it with \ . Alternatively, we can use the other type of quotation marks: >>> 'doesn \' t' # use \' to escape the single quote... "doesn't" >>> "doesn't" # ...or use double quotes instead "doesn't" >>> '"Yes," they said.' '"Yes," they said.' >>> " \" Yes, \" they said." '"Yes," they said.' >>> '"Isn \' t," they said.' '"Isn\'t," they said.' In the Python shell, the string definition and output string can look different. The print() function produces a more readable output, by omitting the enclosing quotes and by printing escaped and special characters: >>> s = 'First line. \n Second line.' # \n means newline >>> s # without print(), special characters are included in the string 'First line.\nSecond line.' >>> print ( s ) # with print(), special characters are interpreted, so \n produces new line First line. Second line. If you don’t want characters prefaced by \ to be interpreted as special characters, you can use raw strings by adding an r before the first quote: >>> print ( 'C:\some \n ame' ) # here \n means newline! C:\some ame >>> print ( r 'C:\some\name' ) # note the r before the quote C:\some\name There is one subtle aspect to raw strings: a raw string may not end in an odd number of \ characters; see the FAQ entry for more information and workarounds. String literals can span multiple lines. One way is using triple-quotes: """...""" or '''...''' . End-of-line characters are automatically included in the string, but it’s possible to prevent this by adding a \ at the end of the line. In the following example, the initial newline is not included: >>> print ( """ \ ... Usage: thingy [OPTIONS] ... -h Display this usage message ... -H hostname Hostname to connect to ... """ ) Usage: thingy [OPTIONS] -h Display this usage message -H hostname Hostname to connect to >>> Strings can be concatenated (glued together) with the + operator, and repeated with * : >>> # 3 times 'un', followed by 'ium' >>> 3 * 'un' + 'ium' 'unununium' Two or more string literals (i.e. the ones enclosed between quotes) next to each other are automatically concatenated. >>> 'Py' 'thon' 'Python' This feature is particularly useful when you want to break long strings: >>> text = ( 'Put several strings within parentheses ' ... 'to have them joined together.' ) >>> text 'Put several strings within parentheses to have them joined together.' This only works with two literals though, not with variables or expressions: >>> prefix = 'Py' >>> prefix 'thon' # can't concatenate a variable and a string literal File "<stdin>" , line 1 prefix 'thon' ^^^^^^ SyntaxError : invalid syntax >>> ( 'un' * 3 ) 'ium' File "<stdin>" , line 1 ( 'un' * 3 ) 'ium' ^^^^^ SyntaxError : invalid syntax If you want to concatenate variables or a variable and a literal, use + : >>> prefix + 'thon' 'Python' Strings can be indexed (subscripted), with the first character having index 0. There is no separate character type; a character is simply a string of size one: >>> word = 'Python' >>> word [ 0 ] # character in position 0 'P' >>> word [ 5 ] # character in position 5 'n' Indices may also be negative numbers, to start counting from the right: >>> word [ - 1 ] # last character 'n' >>> word [ - 2 ] # second-last character 'o' >>> word [ - 6 ] 'P' Note that since -0 is the same as 0, negative indices start from -1. In addition to indexing, slicing is also supported. While indexing is used to obtain individual characters, slicing allows you to obtain a substring: >>> word [ 0 : 2 ] # characters from position 0 (included) to 2 (excluded) 'Py' >>> word [ 2 : 5 ] # characters from position 2 (included) to 5 (excluded) 'tho' Slice indices have useful defaults; an omitted first index defaults to zero, an omitted second index defaults to the size of the string being sliced. >>> word [: 2 ] # character from the beginning to position 2 (excluded) 'Py' >>> word [ 4 :] # characters from position 4 (included) to the end 'on' >>> word [ - 2 :] # characters from the second-last (included) to the end 'on' Note how the start is always included, and the end always excluded. This makes sure that s[:i] + s[i:] is always equal to s : >>> word [: 2 ] + word [ 2 :] 'Python' >>> word [: 4 ] + word [ 4 :] 'Python' One way to remember how slices work is to think of the indices as pointing between characters, with the left edge of the first character numbered 0. Then the right edge of the last character of a string of n characters has index n , for example: +---+---+---+---+---+---+ | P | y | t | h | o | n | +---+---+---+---+---+---+ 0 1 2 3 4 5 6 - 6 - 5 - 4 - 3 - 2 - 1 The first row of numbers gives the position of the indices 0…6 in the string; the second row gives the corresponding negative indices. The slice from i to j consists of all characters between the edges labeled i and j , respectively. For non-negative indices, the length of a slice is the difference of the indices, if both are within bounds. For example, the length of word[1:3] is 2. Attempting to use an index that is too large will result in an error: >>> word [ 42 ] # the word only has 6 characters Traceback (most recent call last): File "<stdin>" , line 1 , in <module> IndexError : string index out of range However, out of range slice indexes are handled gracefully when used for slicing: >>> word [ 4 : 42 ] 'on' >>> word [ 42 :] '' Python strings cannot be changed — they are immutable . Therefore, assigning to an indexed position in the string results in an error: >>> word [ 0 ] = 'J' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment >>> word [ 2 :] = 'py' Traceback (most recent call last): File "<stdin>" , line 1 , in <module> TypeError : 'str' object does not support item assignment If you need a different string, you should create a new one: >>> 'J' + word [ 1 :] 'Jython' >>> word [: 2 ] + 'py' 'Pypy' The built-in function len() returns the length of a string: >>> s = 'supercalifragilisticexpialidocious' >>> len ( s ) 34 See also Text Sequence Type — str Strings are examples of sequence types , and support the common operations supported by such types. String Methods Strings support a large number of methods for basic transformations and searching. f-strings String literals that have embedded expressions. Format String Syntax Information about string formatting with str.format() . printf-style String Formatting The old formatting operations invoked when strings are the left operand of the % operator are described in more detail here. 3.1.3. Lists ¶ Python knows a number of compound data types, used to group together other values. The most versatile is the list , which can be written as a list of comma-separated values (items) between square brackets. Lists might contain items of different types, but usually the items all have the same type. >>> squares = [ 1 , 4 , 9 , 16 , 25 ] >>> squares [1, 4, 9, 16, 25] Like strings (and all other built-in sequence types), lists can be indexed and sliced: >>> squares [ 0 ] # indexing returns the item 1 >>> squares [ - 1 ] 25 >>> squares [ - 3 :] # slicing returns a new list [9, 16, 25] Lists also support operations like concatenation: >>> squares + [ 36 , 49 , 64 , 81 , 100 ] [1, 4, 9, 16, 25, 36, 49, 64, 81, 100] Unlike strings, which are immutable , lists are a mutable type, i.e. it is possible to change their content: >>> cubes = [ 1 , 8 , 27 , 65 , 125 ] # something's wrong here >>> 4 ** 3 # the cube of 4 is 64, not 65! 64 >>> cubes [ 3 ] = 64 # replace the wrong value >>> cubes [1, 8, 27, 64, 125] You can also add new items at the end of the list, by using the list.append() method (we will see more about methods later): >>> cubes . append ( 216 ) # add the cube of 6 >>> cubes . append ( 7 ** 3 ) # and the cube of 7 >>> cubes [1, 8, 27, 64, 125, 216, 343] Simple assignment in Python never copies data. When you assign a list to a variable, the variable refers to the existing list . Any changes you make to the list through one variable will be seen through all other variables that refer to it.: >>> rgb = [ "Red" , "Green" , "Blue" ] >>> rgba = rgb >>> id ( rgb ) == id ( rgba ) # they reference the same object True >>> rgba . append ( "Alph" ) >>> rgb ["Red", "Green", "Blue", "Alph"] All slice operations return a new list containing the requested elements. This means that the following slice returns a shallow copy of the list: >>> correct_rgba = rgba [:] >>> correct_rgba [ - 1 ] = "Alpha" >>> correct_rgba ["Red", "Green", "Blue", "Alpha"] >>> rgba ["Red", "Green", "Blue", "Alph"] Assignment to slices is also possible, and this can even change the size of the list or clear it entirely: >>> letters = [ 'a' , 'b' , 'c' , 'd' , 'e' , 'f' , 'g' ] >>> letters ['a', 'b', 'c', 'd', 'e', 'f', 'g'] >>> # replace some values >>> letters [ 2 : 5 ] = [ 'C' , 'D' , 'E' ] >>> letters ['a', 'b', 'C', 'D', 'E', 'f', 'g'] >>> # now remove them >>> letters [ 2 : 5 ] = [] >>> letters ['a', 'b', 'f', 'g'] >>> # clear the list by replacing all the elements with an empty list >>> letters [:] = [] >>> letters [] The built-in function len() also applies to lists: >>> letters = [ 'a' , 'b' , 'c' , 'd' ] >>> len ( letters ) 4 It is possible to nest lists (create lists containing other lists), for example: >>> a = [ 'a' , 'b' , 'c' ] >>> n = [ 1 , 2 , 3 ] >>> x = [ a , n ] >>> x [['a', 'b', 'c'], [1, 2, 3]] >>> x [ 0 ] ['a', 'b', 'c'] >>> x [ 0 ][ 1 ] 'b' 3.2. First Steps Towards Programming ¶ Of course, we can use Python for more complicated tasks than adding two and two together. For instance, we can write an initial sub-sequence of the Fibonacci series as follows: >>> # Fibonacci series: >>> # the sum of two elements defines the next >>> a , b = 0 , 1 >>> while a < 10 : ... print ( a ) ... a , b = b , a + b ... 0 1 1 2 3 5 8 This example introduces several new features. The first line contains a multiple assignment : the variables a and b simultaneously get the new values 0 and 1. On the last line this is used again, demonstrating that the expressions on the right-hand side are all evaluated first before any of the assignments take place. The right-hand side expressions are evaluated from the left to the right. The while loop executes as long as the condition (here: a < 10 ) remains true. In Python, like in C, any non-zero integer value is true; zero is false. The condition may also be a string or list value, in fact any sequence; anything with a non-zero length is true, empty sequences are false. The test used in the example is a simple comparison. The standard comparison operators are written the same as in C: < (less than), > (greater than), == (equal to), <= (less than or equal to), >= (greater than or equal to) and != (not equal to). The body of the loop is indented : indentation is Python’s way of grouping statements. At the interactive prompt, you have to type a tab or space(s) for each indented line. In practice you will prepare more complicated input for Python with a text editor; all decent text editors have an auto-indent facility. When a compound statement is entered interactively, it must be followed by a blank line to indicate completion (since the parser cannot guess when you have typed the last line). Note that each line within a basic block must be indented by the same amount. The print() function writes the value of the argument(s) it is given. It differs from just writing the expression you want to write (as we did earlier in the calculator examples) in the way it handles multiple arguments, floating-point quantities, and strings. Strings are printed without quotes, and a space is inserted between items, so you can format things nicely, like this: >>> i = 256 * 256 >>> print ( 'The value of i is' , i ) The value of i is 65536 The keyword argument end can be used to avoid the newline after the output, or end the output with a different string: >>> a , b = 0 , 1 >>> while a < 1000 : ... print ( a , end = ',' ) ... a , b = b , a + b ... 0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987, Footnotes [ 1 ] Since ** has higher precedence than - , -3**2 will be interpreted as -(3**2) and thus result in -9 . To avoid this and get 9 , you can use (-3)**2 . [ 2 ] Unlike other languages, special characters such as \n have the same meaning with both single ( '...' ) and double ( "..." ) quotes. The only difference between the two is that within single quotes you don’t need to escape " (but you have to escape \' ) and vice versa. Table of Contents 3. An Informal Introduction to Python 3.1. Using Python as a Calculator 3.1.1. Numbers 3.1.2. Text 3.1.3. Lists 3.2. First Steps Towards Programming Previous topic 2. Using the Python Interpreter Next topic 4. More Control Flow Tools This page Report a bug Show source « Navigation index modules | next | previous | Python » 3.14.2 Documentation » The Python Tutorial » 3. An Informal Introduction to Python | Theme Auto Light Dark | © Copyright 2001 Python Software Foundation. This page is licensed under the Python Software Foundation License Version 2. Examples, recipes, and other code in the documentation are additionally licensed under the Zero Clause BSD License. See History and License for more information. The Python Software Foundation is a non-profit corporation. Please donate. Last updated on Jan 13, 2026 (06:19 UTC). Found a bug ? Created using Sphinx 8.2.3.
2026-01-13T08:48:40
https://dev.to/zeeshanali0704
ZeeshanAli-0704 - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Follow User actions ZeeshanAli-0704 Results-driven Principal Applications Engineer with 9+ years of experience in scalable web app development using React, Angular, Node.js, and KnockoutJS across BFSI, Media, and Healthcare domains. Location INDIA Joined Joined on  Aug 13, 2022 Email address alizeeshan0704@gmail.com Personal website https://zeeshanali-0704.github.io/ github website Pronouns he Work Oracle Three Year Club This badge celebrates the longevity of those who have been a registered member of the DEV Community for at least three years. Got it Close Two Year Club This badge celebrates the longevity of those who have been a registered member of the DEV Community for at least two years. Got it Close Writing Debut Awarded for writing and sharing your first DEV post! Continue sharing your work to earn the 4 Week Writing Streak Badge. Got it Close One Year Club This badge celebrates the longevity of those who have been a registered member of the DEV Community for at least one year. Got it Close 16 Week Writing Streak You are a writing star! You've written at least one post per week for 16 straight weeks. Congratulations! Got it Close 8 Week Writing Streak The streak continues! You've written at least one post per week for 8 consecutive weeks. Unlock the 16-week badge next! Got it Close 2 Week Community Wellness Streak Keep the community conversation going! Post at least 2 comments for 2 straight weeks and unlock the 4 Week Badge. Got it Close 4 Week Writing Streak You've posted at least one post per week for 4 consecutive weeks! Got it Close 1 Week Community Wellness Streak For actively engaging with the community by posting at least 2 comments in a single week. Got it Close More info about @zeeshanali0704 GitHub Repositories ZeeshanAli-0704.github.io CSS Skills/Languages React-Redux , React-Native, JavaScript, jQuery, TypeScript, KnockOut Js, Chai, Mocha, Enzyme, Node.js, Express.js, React Testing Library, Basics of AWS, Webservices, Apache Wicket, JPA, EJB Currently learning Learning..... Currently hacking on systemDesign Post 405 posts published Comment 28 comments written Tag 15 tags followed Polyfil - useReducer ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 11 Polyfil - useReducer # interview # tutorial # javascript # react Comments Add Comment 5 min read Want to connect with ZeeshanAli-0704? Create an account to connect with ZeeshanAli-0704. You can also sign in below to proceed if you already have an account. Create Account Already have an account? Sign in Polyfill - useEffect (React) ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 11 Polyfill - useEffect (React) # javascript # react # tutorial Comments Add Comment 5 min read Polyfill - useState (React) ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 11 Polyfill - useState (React) # javascript Comments Add Comment 4 min read Polyfill - call, apply & bind ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 11 Polyfill - call, apply & bind # javascript # interview Comments Add Comment 4 min read Polyfill - fetch ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 11 Polyfill - fetch # javascript # interview Comments Add Comment 1 min read React Coding Challenge : Stepper Form V1 ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 10 React Coding Challenge : Stepper Form V1 Comments Add Comment 3 min read A Practical Guide to Browser Caching for Web Apps ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 7 A Practical Guide to Browser Caching for Web Apps # performance # tutorial # webdev Comments Add Comment 6 min read The Evolution of the Web: Comparing HTTP/1.1, HTTP/2, and HTTP/3 ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 7 The Evolution of the Web: Comparing HTTP/1.1, HTTP/2, and HTTP/3 # networking # performance # webdev Comments Add Comment 3 min read The Complete Guide to <script> Loading in Modern Web Apps: async, defer, and ES Modules ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 7 The Complete Guide to <script> Loading in Modern Web Apps: async, defer, and ES Modules # html # javascript # performance # webdev 2  reactions Comments 1  comment 5 min read React Coding Challenge : Card Flip Game ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Jan 1 React Coding Challenge : Card Flip Game # webdev # interview # react 1  reaction Comments Add Comment 2 min read React Coding Challenge : TIC-TAC-TOE ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 23 '25 React Coding Challenge : TIC-TAC-TOE # javascript # react # devchallenge # beginners Comments Add Comment 2 min read React Coding Challenge : Image carousel ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 23 '25 React Coding Challenge : Image carousel # webdev # interview Comments Add Comment 2 min read React Coding Challenge : Virtualize List - Restrict DOM element ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 23 '25 React Coding Challenge : Virtualize List - Restrict DOM element # webdev # interview # react Comments Add Comment 4 min read React Coding Challenge : Meeting Calendar ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 22 '25 React Coding Challenge : Meeting Calendar # webdev # interview # react 1  reaction Comments Add Comment 6 min read Frontend System Design: Redux Toolkit vs Zustand vs Jotai ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 21 '25 Frontend System Design: Redux Toolkit vs Zustand vs Jotai # systemdesign # frontend # react # javascript 1  reaction Comments Add Comment 3 min read System Design Interview: Autocomplete / Type-ahead System (Final Part) ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 21 '25 System Design Interview: Autocomplete / Type-ahead System (Final Part) # systemdesign # algorithms # architecture # systemdesignwithzeeshanali Comments Add Comment 5 min read Autocomplete / Type-ahead System for a Search Box - Part 2 ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 21 '25 Autocomplete / Type-ahead System for a Search Box - Part 2 # systemdesign # algorithms # interview # architecture Comments Add Comment 5 min read Autocomplete / Type-ahead System for a Search Box - Part 1 ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 21 '25 Autocomplete / Type-ahead System for a Search Box - Part 1 # architecture # performance # systemdesign 4  reactions Comments Add Comment 3 min read Permutations & Next Permutation ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 20 '25 Permutations & Next Permutation # algorithms # interview # computerscience # tutorial Comments Add Comment 4 min read Fiber in React ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 3 '25 Fiber in React # react # computerscience # architecture # javascript 1  reaction Comments Add Comment 3 min read Simplest possible Redux Thunk example ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 2 '25 Simplest possible Redux Thunk example # frontend # tutorial # javascript # beginners 1  reaction Comments Add Comment 2 min read Frontend System Design: How do you structure Redux for a 200+ screen enterprise application? ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 2 '25 Frontend System Design: How do you structure Redux for a 200+ screen enterprise application? # architecture # javascript # react 1  reaction Comments Add Comment 4 min read FULL REDUX INTERNAL ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 2 '25 FULL REDUX INTERNAL # tutorial # architecture # react # javascript 1  reaction Comments Add Comment 2 min read Modern Web UI ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Dec 1 '25 Modern Web UI # frontend # css # ui # performance 1  reaction Comments Add Comment 7 min read Frontend System Design: Comparison of Web Worker, SharedWorker, and Service Worker ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 29 '25 Frontend System Design: Comparison of Web Worker, SharedWorker, and Service Worker # architecture # javascript # performance 1  reaction Comments Add Comment 5 min read React Coding Challenge : Nested Checkox ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 28 '25 React Coding Challenge : Nested Checkox # javascript # react # interview # ui 2  reactions Comments Add Comment 2 min read React Coding Challenge : React Folder Structure Implementation ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 25 '25 React Coding Challenge : React Folder Structure Implementation 1  reaction Comments Add Comment 3 min read PriorityQueue Implementation in Javascript ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 22 '25 PriorityQueue Implementation in Javascript Comments Add Comment 1 min read React Coding Challenge : Custom Hook - UseState ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 21 '25 React Coding Challenge : Custom Hook - UseState # javascript # react # tutorial Comments Add Comment 2 min read React Coding Challenge : React Context API - Intersection Observer - useReducer ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 20 '25 React Coding Challenge : React Context API - Intersection Observer - useReducer Comments Add Comment 2 min read React Coding Challenge : Debounce in React Functional Component ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 15 '25 React Coding Challenge : Debounce in React Functional Component # webdev # react Comments Add Comment 2 min read LLD: Food Ordering / Delivery system in Java ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 11 '25 LLD: Food Ordering / Delivery system in Java # systemdesignwithzeeshanali # interview # systemdesign 5  reactions Comments Add Comment 15 min read Subarray Problem Types ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 8 '25 Subarray Problem Types # datastructures # interview Comments Add Comment 3 min read Java Collections Cheat Sheet with Examples ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 7 '25 Java Collections Cheat Sheet with Examples # beginners # java # resources # interview Comments Add Comment 3 min read Frontend System Design: Pinterest ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 5 '25 Frontend System Design: Pinterest # systemdesignwithzeeshanali # frontend # interview # fsdzeeshan 5  reactions Comments Add Comment 13 min read Frontend System Design: Scalable CSS Architecture ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Nov 2 '25 Frontend System Design: Scalable CSS Architecture # systemdesignwithzeeshanali # frontend # interview # fsdzeeshan 5  reactions Comments Add Comment 5 min read Frontend System Design: What is the Critical Rendering Path (CRP) ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Oct 31 '25 Frontend System Design: What is the Critical Rendering Path (CRP) # systemdesignwithzeeshanali # frontend # interview # fsdzeeshan 7  reactions Comments 2  comments 7 min read Frontend System Design: CSS, CSSOM, and DOM Rendering in Browser ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Oct 31 '25 Frontend System Design: CSS, CSSOM, and DOM Rendering in Browser # frontend # interview # systemdesignwithzeeshanali # fsdzeeshan 5  reactions Comments Add Comment 4 min read Frontend System Design: Facebook News Feed ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Oct 31 '25 Frontend System Design: Facebook News Feed # frontend # interview # systemdesignwithzeeshanali # fsdzeeshan 6  reactions Comments Add Comment 4 min read Single Points of Failure - Example Case Study ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Oct 30 '25 Single Points of Failure - Example Case Study # systemdesignwithzeeshanali 5  reactions Comments Add Comment 4 min read System Design: How to Avoid Single Points of Failure (SPOFs) ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Oct 30 '25 System Design: How to Avoid Single Points of Failure (SPOFs) # systemdesignwithzeeshanali Comments Add Comment 7 min read How Razorpay Ensures Your Payment Succeeds — Even If Your Internet Drops ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Oct 19 '25 How Razorpay Ensures Your Payment Succeeds — Even If Your Internet Drops # systemdesignwithzeeshanali # interview Comments Add Comment 6 min read Flipkart - Big Billion Days - TechStack ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 24 '25 Flipkart - Big Billion Days - TechStack # systemdesignwithzeeshanali 5  reactions Comments Add Comment 7 min read Load Balancer in System Design – Part 3: Load Balancing Algorithms ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 23 '25 Load Balancer in System Design – Part 3: Load Balancing Algorithms # systemdesignwithzeeshanali Comments Add Comment 4 min read Load Balancer in System Design – Part 2: Types of Load Balancers ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 23 '25 Load Balancer in System Design – Part 2: Types of Load Balancers # systemdesignwithzeeshanali 6  reactions Comments 1  comment 3 min read Database Optimizations: Sharding ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 23 '25 Database Optimizations: Sharding # systemdesignwithzeeshanali 5  reactions Comments Add Comment 3 min read Database Optimizations: Partitioning ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 23 '25 Database Optimizations: Partitioning # systemdesignwithzeeshanali 7  reactions Comments Add Comment 3 min read Database Optimizations: Indexing ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 22 '25 Database Optimizations: Indexing # systemdesignwithzeeshanali 5  reactions Comments Add Comment 4 min read Advanced Job Scheduling System - Part 2 ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 22 '25 Advanced Job Scheduling System - Part 2 # systemdesignwithzeeshanali # systemdesign Comments Add Comment 10 min read Advanced Job Scheduling System: Part 1 ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 22 '25 Advanced Job Scheduling System: Part 1 # systemdesignwithzeeshanali # javascript Comments 1  comment 7 min read Step 7: Design a Rate Limiter - Conclusion-Summary with FAQ's ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 18 '25 Step 7: Design a Rate Limiter - Conclusion-Summary with FAQ's # systemdesignwithzeeshanali # systemdesign 1  reaction Comments Add Comment 5 min read Step 6: Design a Rate Limiter - Using Sorted Set in Redis ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 18 '25 Step 6: Design a Rate Limiter - Using Sorted Set in Redis # systemdesignwithzeeshanali # systemdesign 4  reactions Comments Add Comment 9 min read Step 5: Design a Rate Limiter - Algorithm and Technique ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 18 '25 Step 5: Design a Rate Limiter - Algorithm and Technique # systemdesignwithzeeshanali # systemdesign Comments Add Comment 11 min read Step 4: Design a Rate Limiter - Distributed Environment Challenges ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 18 '25 Step 4: Design a Rate Limiter - Distributed Environment Challenges # systemdesign # systemdesignwithzeeshanali 4  reactions Comments Add Comment 9 min read Step 3: Design a Rate Limiter - High Level Design (HLD) with Distributed Redis ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 18 '25 Step 3: Design a Rate Limiter - High Level Design (HLD) with Distributed Redis # systemdesign # systemdesignwithzeeshanali Comments Add Comment 9 min read Step 2: Design a Rate Limiter High - Level Design (HLD) ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 18 '25 Step 2: Design a Rate Limiter High - Level Design (HLD) # systemdesign # systemdesignwithzeeshanali Comments Add Comment 7 min read Typescript : Generic Data Fetch ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 16 '25 Typescript : Generic Data Fetch # javascript # typescript 1  reaction Comments Add Comment 4 min read JavaScript project to TypeScript ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 15 '25 JavaScript project to TypeScript # javascript # typescript 1  reaction Comments Add Comment 3 min read Difference Between `readonly` and `const` in TypeScript ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 15 '25 Difference Between `readonly` and `const` in TypeScript # javascript # typescript 1  reaction Comments Add Comment 3 min read TypeScript `unknown` vs `any`: Understanding the Key Differences ZeeshanAli-0704 ZeeshanAli-0704 ZeeshanAli-0704 Follow Sep 15 '25 TypeScript `unknown` vs `any`: Understanding the Key Differences # typescript # javascript Comments Add Comment 3 min read loading... 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T08:48:40
https://open.forem.com/new/beginners
New Post - Open Forem Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account Open Forem Close Join the Open Forem Open Forem is a community of 3,676,891 amazing developers Continue with Apple Continue with Google Continue with Facebook Continue with Forem Continue with GitHub Continue with Twitter (X) OR Email Password Remember me Forgot password? By signing in, you are agreeing to our privacy policy , terms of use and code of conduct . New to Open Forem? Create account . 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV Open Forem — A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Home About Contact Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . Open Forem © 2016 - 2026. Where all the other conversations belong Log in Create account
2026-01-13T08:48:40
https://devguide.python.org/documentation/translations/translating/
Translating Contents Menu Expand Light mode Dark mode Auto light/dark, in light mode Auto light/dark, in dark mode Skip to content Python Developer's Guide Python Developer's Guide Getting started Setup and building Fixing “easy” issues (and beyond) Git bootcamp and cheat sheet Lifecycle of a pull request Where to get help Generative AI Development workflow Following Python’s development Changing Python Development cycle Adding to the stdlib Standard library extension modules Changing Python’s C API Changing CPython’s grammar Porting to a new platform Software Bill-of-Materials (SBOM) Python Security Response Team (PSRT) Issues and triaging Issue tracker Triaging an issue GitHub labels GitHub issues for BPO users Triage Team Documentation Getting started Helping with documentation Style guide reStructuredText markup Translations Translating Coordinating Helping with the Developer’s Guide Testing and buildbots Running and writing tests Silence warnings from the test suite Increase test coverage Working with buildbots New buildbot workers Development tools Argument Clinic Tutorial How-to guides GDB support Dynamic analysis with Clang Tools for tracking compiler warnings Core team Responsibilities Accepting pull requests Experts index Team log Motivations and affiliations How to join the core team Memorialization CPython’s internals Status of Python versions Python Contributor’s Guide (draft) [Plan for the Contributor’s Guide] Introduction The CPython project Code of Conduct Roles Governance Generative AI GitHub Directory structure Communication channels Outreach Issues and triaging Issue tracker Triaging an issue GitHub labels Reviewing Triage Team Documentation contributions Getting started Helping with documentation Style guide reStructuredText markup Pull request lifecycle Translating Helping with the Developer’s Guide Code contributions Setup and building Git tips Pull request lifecycle Development workflow Following Python’s development Development cycle Adding to the stdlib Standard library extension modules Changing Python’s C API Changing Python Changing CPython’s grammar Porting to a new platform Software Bill-of-Materials (SBOM) Python Security Response Team (PSRT) Testing and buildbots Running and writing tests Silence warnings from the test suite Increase test coverage Working with buildbots New buildbot workers Development tools Argument Clinic Tutorial How-to guides GDB support Dynamic analysis with Clang Tools for tracking compiler warnings Core team Responsibilities Accepting pull requests Experts index Team log Motivations and affiliations How to join the core team Accessibility, design, and user success Security and infrastructure contributions Workflows Install Git Get the source code Install Dependencies Compile and build Regenerating auto-created files Install Git Using GitHub Codespaces Back to top View this page Edit this page Translating ¶ There are several documentation translations already in production and can be found in the language switcher; others are works in progress. To get started read your repository’s contributing guide, which is generally the README file, and this page. If your language isn’t listed below, feel free to start the translation! See coordination to get started. For more details about translations and their progress, see translations.python.org . Language Coordination team Links Arabic (ar) Abdur-Rahmaan Janhangeer ( @Abdur-rahmaanJ ) GitHub Bengali (bn-IN) Kushal Das ( @kushaldas ) GitHub French (fr) Julien Palard ( @JulienPalard ) AFPy/python-docs-fr , mirror Greek (el) Lysandros Nikolaou ( @lysnikolaou ), Fanis Petkos ( @thepetk ), Panagiotis Skias ( @skpanagiotis ) GitHub Hindi (hi-IN) Sanyam Khurana ( @CuriousLearner ) GitHub Hungarian (hu) GitHub Indonesian (id) Irvan Putra ( @irvan-putra ), Jeff Jacobson ( @jwjacobson ), Lutfi Zuchri ( @lutfizuchri ) GitHub Italian (it) Alessandro Cucci ( @acuccie3 , email ) GitHub , original announcement Japanese (ja) Kinebuchi Tomohiko ( @cocoatomo ), Atsuo Ishimoto ( @atsuoishimoto ) GitHub Korean (ko) 오동권 ( @flowdas ) GitHub Marathi (mr) Sanket Garade ( @sanketgarade , email ) GitHub Lithuanian (lt) Albertas Gimbutas ( @albertas , email ) original announcement Persian (fa) Alireza Shabani ( @revisto ) GitHub Polish (pl) Maciej Olko ( @m-aciek ), Stan Ulbrych ( @StanFromIreland ) GitHub , Transifex , original announcement Brazilian Portuguese (pt-br) Rafael Fontenelle ( @rffontenelle ), Marco Rougeth ( @rougeth ) GitHub , guide , Telegram , article Romanian (ro) Octavian Mustafa ( @octaG-M , email ) GitHub Russian (ru) Daniil Kolesnikov ( @MLGRussianXP , email ) GitHub , original announcement Simplified Chinese (zh-cn) Shengjing Zhu ( @zhsj ), Du, Meng ( @dumeng ) GitHub , Transifex Spanish (es) Raúl Cumplido ( @raulcd ) GitHub Swedish (sv) Daniel Nylander ( @yeager ) GitHub Traditional Chinese (zh-tw) 王威翔 Matt Wang ( @mattwang44 ), Josix Wang ( @josix ) GitHub Turkish (tr) Ege Akman ( @egeakman ) GitHub , RTD Ukrainian (uk) Dmytro Kazanzhy ( @kazanzhy , email ) GitHub , Transifex How to get help ¶ If there is already a repository for your language team (there may be links to Telegrams/Discords in the README ), join and introduce yourself. Your fellow translators will be more than happy to help! General discussions about translations occur on the Python Docs Discord #translations channel and the translations category of the Python Discourse. Style guide ¶ Before translating, you should familiarize yourself with the general documentation style guide . Some translation-specific guidelines are explained below. Translate the meaning ¶ Try to stay as close as possible to the original text. Focus on translating its meaning in the best possible way. Gender neutrality ¶ Many languages use grammatical gender. When possible and natural, prefer gender-neutral or inclusive forms. Aim to reflect the inclusive tone of the English documentation. Roles and links ¶ The Python docs contain many roles ( :role:`target` ) that link to other parts of the documentation. Do not translate reStructuredText roles targets, such as :func:`print` or :ref:`some-section` because it will break the link. If alternate text ( :role:`text <target>` ) is provided, it generally should be translated. You can also introduce alternate text for translation if the target is not a name or term. Links ( `text <target>`_ ) should be handled similarly. If possible, the target should be updated to match the language. See also reStructuredText markup Translation quality ¶ Translators should know both English and the language they are translating to. Translators should aim for a similar level of quality as that of the English documentation. Do not rely solely on machine translation. These tools can be useful to speed up work, but often produce inaccurate or misleading results and should be reviewed by a human. Terminology ¶ The documentation is full of technical terms, some are common in general programming and have translations, whereas others are specific to Python and previous translations are not available. Translation teams should keep the translations of these terms consistent, which is done with glossaries. Some general guidelines for deciding on a translation: Use existing community conventions over inventing new terms. You can use a hybrid English form if users are generally familiar with the English word. For common terms, the English word may be best. Use other translations as a reference as to what they did for the word. Be careful to not translate names. Use your best judgment. When you translate a specific term, record it in your translations glossary to help fellow translators and ensure consistency. Dialects ¶ Some translations receive contributions from people of several different dialects, understandably the language will differ. It is recommended however that translators try to keep files and sections consistent. Code examples ¶ Translate values in code examples, that is string literals, and comments. Don’t translate keywords or names, including variable, function, class, argument, and attribute names. An example of a translated codeblock from the tutorial is provided below: def cheeseshop ( kind , * arguments , ** keywords ): print ( "-- Czy jest może" , kind , "?" ) print ( "-- Przykro mi, nie mamy już sera" , kind ) for arg in arguments : print ( arg ) print ( "-" * 40 ) for kw in keywords : print ( kw , ":" , keywords [ kw ]) Transifex ¶ Important There are many translations in the python-doc organization on Transifex , some of which, however, are not used or do not have a coordination team. Confirm that a coordination team exists before you begin translating. Several language projects use Transifex as their translation interface. Translations on Transifex are carried out via a web interface, similar to Weblate. You should translate the python-newest project. If you are new to Transifex, it is recommended that you take the time to read through the following resources from the Transifex documentation: Getting started as a translator : This covers signing up for an account and joining a translation team. Translating with the Web Editor : This covers getting to the editor, searching and filtering strings, and translating strings. Other Tools in the Editor : This covers the history, glossary, comments, keyboard shortcuts, and more. Starting with the basics : A group of documents with basic information. Within the organization, a project for translating the Python Docs Sphinx Theme can also be found. For further information about Transifex see our documentation . Resources ¶ Some useful resources: Git bootcamp and cheat sheet : Several translations accept contributions by pull requests. Most have their own guide for how to do this, but this can provide useful tips. Translation issues & improvements GitHub project: This project contains issues and pull requests that aim to improve the Python documentation for translations. Python Pootle archive : Pootle is no longer used for translation. Contains translations for old Python versions. Translation FAQ ¶ How do I build a docs translation? ¶ To build a documentation translation for a specific language, you need to have Python installed and a local copy of the CPython repository and translation repository (see table above). The PO files must be placed in a locales/ LANG /LC_MESSAGES/ (replacing LANG with the translation’s language code) folder inside the Doc/ directory of the CPython repository. You can then build with make by adding a SPHINXOPTS="-D language=LANG" variable before the target or by using Sphinx directly and adding a -D language=LANG option. For example: # Build the HTML format of the Polish translation using make make SPHINXOPTS = "-D language=pl" html # Build the HTML format of the Romanian translation using Sphinx directly python -m sphinx -b html . build/html -D language = ro Which version of the Python documentation should I work on? ¶ You should work on the latest branch available to you for translation (this should be the latest non-alpha branch), the translations should then be propagated by your languages coordination team. How do I translate the Python Docs Sphinx Theme? ¶ The Sphinx theme for the Python documentation supports localization. You can translate either on Transifex (see translating on Transifex for more information) or locally by following the steps outlined below. To translate locally, clone the Python Docs Sphinx Theme repository and run the following commands to generate the PO files. Replace LANG with the same language code that is used for the docs translation: python babel_runner.py extract python babel_runner.py init -l LANG The file can then be found at: python-docs-theme/locale/LANG/LC_MESSAGES/python-docs-theme.po After translating, submit your PO file via a pull request to the repository . See our Git bootcamp and cheat sheet for more information about using Git. To update an existing translation after source changes, run: python babel_runner.py update # To update source for all languages python babel_runner.py update -l LANG # To update source just for LANG The coordination team for my language is inactive, what do I do? ¶ If you would like to coordinate, open a pull request in the devguide adding yourself to the table at the top of this page, and ping @python/editorial-board . Next Coordinating Previous Translations Copyright © 2011 Python Software Foundation Made with Sphinx and @pradyunsg 's Furo On this page Translating How to get help Style guide Translate the meaning Gender neutrality Roles and links Translation quality Terminology Dialects Code examples Transifex Resources Translation FAQ How do I build a docs translation? Which version of the Python documentation should I work on? How do I translate the Python Docs Sphinx Theme? The coordination team for my language is inactive, what do I do?
2026-01-13T08:48:40
https://docs.python.org/3/license.html#libffi
History and License — Python 3.14.2 documentation Theme Auto Light Dark Table of Contents History and License History of the software Terms and conditions for accessing or otherwise using Python PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 BEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0 CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 CWI LICENSE AGREEMENT FOR PYTHON 0.9.0 THROUGH 1.2 ZERO-CLAUSE BSD LICENSE FOR CODE IN THE PYTHON DOCUMENTATION Licenses and Acknowledgements for Incorporated Software Mersenne Twister Sockets Asynchronous socket services Cookie management Execution tracing UUencode and UUdecode functions XML Remote Procedure Calls test_epoll Select kqueue SipHash24 strtod and dtoa OpenSSL expat libffi zlib cfuhash libmpdec W3C C14N test suite mimalloc asyncio Global Unbounded Sequences (GUS) Zstandard bindings Previous topic Copyright This page Report a bug Show source Navigation index modules | previous | Python » 3.14.2 Documentation » History and License | Theme Auto Light Dark | History and License ¶ History of the software ¶ Python was created in the early 1990s by Guido van Rossum at Stichting Mathematisch Centrum (CWI, see https://www.cwi.nl ) in the Netherlands as a successor of a language called ABC. Guido remains Python’s principal author, although it includes many contributions from others. In 1995, Guido continued his work on Python at the Corporation for National Research Initiatives (CNRI, see https://www.cnri.reston.va.us ) in Reston, Virginia where he released several versions of the software. In May 2000, Guido and the Python core development team moved to BeOpen.com to form the BeOpen PythonLabs team. In October of the same year, the PythonLabs team moved to Digital Creations, which became Zope Corporation. In 2001, the Python Software Foundation (PSF, see https://www.python.org/psf/ ) was formed, a non-profit organization created specifically to own Python-related Intellectual Property. Zope Corporation was a sponsoring member of the PSF. All Python releases are Open Source (see https://opensource.org for the Open Source Definition). Historically, most, but not all, Python releases have also been GPL-compatible; the table below summarizes the various releases. Release Derived from Year Owner GPL-compatible? (1) 0.9.0 thru 1.2 n/a 1991-1995 CWI yes 1.3 thru 1.5.2 1.2 1995-1999 CNRI yes 1.6 1.5.2 2000 CNRI no 2.0 1.6 2000 BeOpen.com no 1.6.1 1.6 2001 CNRI yes (2) 2.1 2.0+1.6.1 2001 PSF no 2.0.1 2.0+1.6.1 2001 PSF yes 2.1.1 2.1+2.0.1 2001 PSF yes 2.1.2 2.1.1 2002 PSF yes 2.1.3 2.1.2 2002 PSF yes 2.2 and above 2.1.1 2001-now PSF yes Note GPL-compatible doesn’t mean that we’re distributing Python under the GPL. All Python licenses, unlike the GPL, let you distribute a modified version without making your changes open source. The GPL-compatible licenses make it possible to combine Python with other software that is released under the GPL; the others don’t. According to Richard Stallman, 1.6.1 is not GPL-compatible, because its license has a choice of law clause. According to CNRI, however, Stallman’s lawyer has told CNRI’s lawyer that 1.6.1 is “not incompatible” with the GPL. Thanks to the many outside volunteers who have worked under Guido’s direction to make these releases possible. Terms and conditions for accessing or otherwise using Python ¶ Python software and documentation are licensed under the Python Software Foundation License Version 2. Starting with Python 3.8.6, examples, recipes, and other code in the documentation are dual licensed under the PSF License Version 2 and the Zero-Clause BSD license . Some software incorporated into Python is under different licenses. The licenses are listed with code falling under that license. See Licenses and Acknowledgements for Incorporated Software for an incomplete list of these licenses. PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 ¶ 1. This LICENSE AGREEMENT is between the Python Software Foundation ("PSF"), and the Individual or Organization ("Licensee") accessing and otherwise using this software ("Python") in source or binary form and its associated documentation. 2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use Python alone or in any derivative version, provided, however, that PSF's License Agreement and PSF's notice of copyright, i.e., "Copyright © 2001 Python Software Foundation; All Rights Reserved" are retained in Python alone or in any derivative version prepared by Licensee. 3. In the event Licensee prepares a derivative work that is based on or incorporates Python or any part thereof, and wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a brief summary of the changes made to Python. 4. PSF is making Python available to Licensee on an "AS IS" basis. PSF MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 6. This License Agreement will automatically terminate upon a material breach of its terms and conditions. 7. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between PSF and Licensee. This License Agreement does not grant permission to use PSF trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party. 8. By copying, installing or otherwise using Python, Licensee agrees to be bound by the terms and conditions of this License Agreement. BEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0 ¶ BEOPEN PYTHON OPEN SOURCE LICENSE AGREEMENT VERSION 1 1. This LICENSE AGREEMENT is between BeOpen.com ("BeOpen"), having an office at 160 Saratoga Avenue, Santa Clara, CA 95051, and the Individual or Organization ("Licensee") accessing and otherwise using this software in source or binary form and its associated documentation ("the Software"). 2. Subject to the terms and conditions of this BeOpen Python License Agreement, BeOpen hereby grants Licensee a non-exclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use the Software alone or in any derivative version, provided, however, that the BeOpen Python License is retained in the Software, alone or in any derivative version prepared by Licensee. 3. BeOpen is making the Software available to Licensee on an "AS IS" basis. BEOPEN MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, BEOPEN MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 4. BEOPEN SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF THE SOFTWARE FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF USING, MODIFYING OR DISTRIBUTING THE SOFTWARE, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 5. This License Agreement will automatically terminate upon a material breach of its terms and conditions. 6. This License Agreement shall be governed by and interpreted in all respects by the law of the State of California, excluding conflict of law provisions. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between BeOpen and Licensee. This License Agreement does not grant permission to use BeOpen trademarks or trade names in a trademark sense to endorse or promote products or services of Licensee, or any third party. As an exception, the "BeOpen Python" logos available at http://www.pythonlabs.com/logos.html may be used according to the permissions granted on that web page. 7. By copying, installing or otherwise using the software, Licensee agrees to be bound by the terms and conditions of this License Agreement. CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 ¶ 1. This LICENSE AGREEMENT is between the Corporation for National Research Initiatives, having an office at 1895 Preston White Drive, Reston, VA 20191 ("CNRI"), and the Individual or Organization ("Licensee") accessing and otherwise using Python 1.6.1 software in source or binary form and its associated documentation. 2. Subject to the terms and conditions of this License Agreement, CNRI hereby grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use Python 1.6.1 alone or in any derivative version, provided, however, that CNRI's License Agreement and CNRI's notice of copyright, i.e., "Copyright © 1995-2001 Corporation for National Research Initiatives; All Rights Reserved" are retained in Python 1.6.1 alone or in any derivative version prepared by Licensee. Alternately, in lieu of CNRI's License Agreement, Licensee may substitute the following text (omitting the quotes): "Python 1.6.1 is made available subject to the terms and conditions in CNRI's License Agreement. This Agreement together with Python 1.6.1 may be located on the internet using the following unique, persistent identifier (known as a handle): 1895.22/1013. This Agreement may also be obtained from a proxy server on the internet using the following URL: http://hdl.handle.net/1895.22/1013". 3. In the event Licensee prepares a derivative work that is based on or incorporates Python 1.6.1 or any part thereof, and wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a brief summary of the changes made to Python 1.6.1. 4. CNRI is making Python 1.6.1 available to Licensee on an "AS IS" basis. CNRI MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, CNRI MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON 1.6.1 WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 5. CNRI SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON 1.6.1 FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON 1.6.1, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 6. This License Agreement will automatically terminate upon a material breach of its terms and conditions. 7. This License Agreement shall be governed by the federal intellectual property law of the United States, including without limitation the federal copyright law, and, to the extent such U.S. federal law does not apply, by the law of the Commonwealth of Virginia, excluding Virginia's conflict of law provisions. Notwithstanding the foregoing, with regard to derivative works based on Python 1.6.1 that incorporate non-separable material that was previously distributed under the GNU General Public License (GPL), the law of the Commonwealth of Virginia shall govern this License Agreement only as to issues arising under or with respect to Paragraphs 4, 5, and 7 of this License Agreement. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between CNRI and Licensee. This License Agreement does not grant permission to use CNRI trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party. 8. By clicking on the "ACCEPT" button where indicated, or by copying, installing or otherwise using Python 1.6.1, Licensee agrees to be bound by the terms and conditions of this License Agreement. CWI LICENSE AGREEMENT FOR PYTHON 0.9.0 THROUGH 1.2 ¶ Copyright © 1991 - 1995, Stichting Mathematisch Centrum Amsterdam, The Netherlands. All rights reserved. Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Stichting Mathematisch Centrum or CWI not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. STICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL STICHTING MATHEMATISCH CENTRUM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ZERO-CLAUSE BSD LICENSE FOR CODE IN THE PYTHON DOCUMENTATION ¶ Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Licenses and Acknowledgements for Incorporated Software ¶ This section is an incomplete, but growing list of licenses and acknowledgements for third-party software incorporated in the Python distribution. Mersenne Twister ¶ The _random C extension underlying the random module includes code based on a download from http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/MT2002/emt19937ar.html . The following are the verbatim comments from the original code: A C-program for MT19937, with initialization improved 2002/1/26. Coded by Takuji Nishimura and Makoto Matsumoto. Before using, initialize the state by using init_genrand(seed) or init_by_array(init_key, key_length). Copyright (C) 1997 - 2002, Makoto Matsumoto and Takuji Nishimura, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Any feedback is very welcome. http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/emt.html email: m-mat @ math.sci.hiroshima-u.ac.jp (remove space) Sockets ¶ The socket module uses the functions, getaddrinfo() , and getnameinfo() , which are coded in separate source files from the WIDE Project, https://www.wide.ad.jp/ . Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Asynchronous socket services ¶ The test.support.asynchat and test.support.asyncore modules contain the following notice: Copyright 1996 by Sam Rushing All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Sam Rushing not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. SAM RUSHING DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL SAM RUSHING BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Cookie management ¶ The http.cookies module contains the following notice: Copyright 2000 by Timothy O'Malley <timo@alum.mit.edu> All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Timothy O'Malley not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Timothy O'Malley DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL Timothy O'Malley BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Execution tracing ¶ The trace module contains the following notice: portions copyright 2001, Autonomous Zones Industries, Inc., all rights... err... reserved and offered to the public under the terms of the Python 2.2 license. Author: Zooko O'Whielacronx http://zooko.com/ mailto:zooko@zooko.com Copyright 2000, Mojam Media, Inc., all rights reserved. Author: Skip Montanaro Copyright 1999, Bioreason, Inc., all rights reserved. Author: Andrew Dalke Copyright 1995-1997, Automatrix, Inc., all rights reserved. Author: Skip Montanaro Copyright 1991-1995, Stichting Mathematisch Centrum, all rights reserved. Permission to use, copy, modify, and distribute this Python software and its associated documentation for any purpose without fee is hereby granted, provided that the above copyright notice appears in all copies, and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of neither Automatrix, Bioreason or Mojam Media be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. UUencode and UUdecode functions ¶ The uu codec contains the following notice: Copyright 1994 by Lance Ellinghouse Cathedral City, California Republic, United States of America. All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Lance Ellinghouse not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. LANCE ELLINGHOUSE DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL LANCE ELLINGHOUSE CENTRUM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Modified by Jack Jansen, CWI, July 1995: - Use binascii module to do the actual line-by-line conversion between ascii and binary. This results in a 1000-fold speedup. The C version is still 5 times faster, though. - Arguments more compliant with Python standard XML Remote Procedure Calls ¶ The xmlrpc.client module contains the following notice: The XML-RPC client interface is Copyright (c) 1999-2002 by Secret Labs AB Copyright (c) 1999-2002 by Fredrik Lundh By obtaining, using, and/or copying this software and/or its associated documentation, you agree that you have read, understood, and will comply with the following terms and conditions: Permission to use, copy, modify, and distribute this software and its associated documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies, and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Secret Labs AB or the author not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. SECRET LABS AB AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANT- ABILITY AND FITNESS. IN NO EVENT SHALL SECRET LABS AB OR THE AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. test_epoll ¶ The test.test_epoll module contains the following notice: Copyright (c) 2001-2006 Twisted Matrix Laboratories. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Select kqueue ¶ The select module contains the following notice for the kqueue interface: Copyright (c) 2000 Doug White, 2006 James Knight, 2007 Christian Heimes All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SipHash24 ¶ The file Python/pyhash.c contains Marek Majkowski’ implementation of Dan Bernstein’s SipHash24 algorithm. It contains the following note: <MIT License> Copyright (c) 2013 Marek Majkowski <marek@popcount.org> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. </MIT License> Original location: https://github.com/majek/csiphash/ Solution inspired by code from: Samuel Neves (supercop/crypto_auth/siphash24/little) djb (supercop/crypto_auth/siphash24/little2) Jean-Philippe Aumasson (https://131002.net/siphash/siphash24.c) strtod and dtoa ¶ The file Python/dtoa.c , which supplies C functions dtoa and strtod for conversion of C doubles to and from strings, is derived from the file of the same name by David M. Gay, currently available from https://web.archive.org/web/20220517033456/http://www.netlib.org/fp/dtoa.c . The original file, as retrieved on March 16, 2009, contains the following copyright and licensing notice: /**************************************************************** * * The author of this software is David M. Gay. * * Copyright (c) 1991, 2000, 2001 by Lucent Technologies. * * Permission to use, copy, modify, and distribute this software for any * purpose without fee is hereby granted, provided that this entire notice * is included in all copies of any software which is or includes a copy * or modification of this software and in all copies of the supporting * documentation for such software. * * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED * WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY * OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. * ***************************************************************/ OpenSSL ¶ The modules hashlib , posix and ssl use the OpenSSL library for added performance if made available by the operating system. Additionally, the Windows and macOS installers for Python may include a copy of the OpenSSL libraries, so we include a copy of the OpenSSL license here. For the OpenSSL 3.0 release, and later releases derived from that, the Apache License v2 applies: Apache License Version 2.0, January 2004 https://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS expat ¶ The pyexpat extension is built using an included copy of the expat sources unless the build is configured --with-system-expat : Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. libffi ¶ The _ctypes C extension underlying the ctypes module is built using an included copy of the libffi sources unless the build is configured --with-system-libffi : Copyright (c) 1996-2008 Red Hat, Inc and others. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. zlib ¶ The zlib extension is built using an included copy of the zlib sources if the zlib version found on the system is too old to be used for the build: Copyright (C) 1995-2011 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu cfuhash ¶ The implementation of the hash table used by the tracemalloc is based on the cfuhash project: Copyright (c) 2005 Don Owens All rights reserved. This code is released under the BSD license: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. libmpdec ¶ The _decimal C extension underlying the decimal module is built using an included copy of the libmpdec library unless the build is configured --with-system-libmpdec : Copyright (c) 2008-2020 Stefan Krah. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. W3C C14N test suite ¶ The C14N 2.0 test suite in the test package ( Lib/test/xmltestdata/c14n-20/ ) was retrieved from the W3C website at https://www.w3.org/TR/xml-c14n2-testcases/ and is distributed under the 3-clause BSD license: Copyright (c) 2013 W3C(R) (MIT, ERCIM, Keio, Beihang), All Rights Reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of works must retain the original copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the original copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the W3C nor the names of its contributors may be used to endorse or promote products derived from this work without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. mimalloc ¶ MIT License: Copyright (c) 2018-2021 Microsoft Corporation, Daan Leijen Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. asyncio ¶ Parts of the asyncio module are incorporated from uvloop 0.16 , which is distributed under the MIT license: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Global Unbounded Sequences (GUS) ¶ The file Python/qsbr.c is adapted from FreeBSD’s “Global Unbounded Sequences” safe memory reclamation scheme in subr_smr.c . The file is distributed under the 2-Clause BSD License: Copyright (c) 2019,2020 Jeffrey Roberson <jeff@FreeBSD.org> Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following con
2026-01-13T08:48:40
https://openapi.tools/categories/text-editors-extensions
Text Editors | OpenApi.tools, from APIs You Won't Hate Sponsored by Zudoku - Open-source, highly customizable API documentation powered by OpenAPI Get Started Sponsor openapi.tools GitHub Get Started All Tools All Categories Legacy Tools Contributing Sponsors Sponsor Badges Collections Arazzo Support Overlays Support Open Source Tools SaaS Tools OpenAPI Tool Categories Annotations Code generators Converters Data Validators Documentation Domain-Specific Languages (DSLs) Gateways HTTP Clients IDEs and GUI Editors Learning Miscellaneous Mock Servers Monitoring OpenAPI-aware Frameworks Parsers Schema Validators SDK Generators Security Server Implementations Testing Text Editors © 2026 APIs You Won't Hate Get in touch to become a Sponsor . This site is community-driven and OSS , built with Astro and hosted on Netlify . Text Editors Text editors give you visual feedback whilst you write OpenAPI, so you can see what docs might look like. Text Editors There are additional tools in this category, but they only support legacy versions of OpenAPI. If you really need to work with some old OpenAPI descriptions perhaps these legacy tools could be of use * * *
2026-01-13T08:48:40
https://qwik.dev/
Framework reimagined for the edge! 📚 Qwik Documentation Qwik Homepage Search Docs Ecosystem Tutorial Qwik Sandbox Blog Search Auto GitHub @QwikDev Discord Deliver instant apps at scale Build instantly-interactive web apps without effort. npm create qwik@latest Explore the docs Special Sponsor Ship twice as much, twice as fast New Approach to Performance Optimization Instant Loading Resumable Lazy Executing Reduced Rendering Perf that Scales Code Once Because Qwik skips hydration, your applications are instantly interactive. This is accomplished by resumability . Learn More Showcase 94% Builder Velocity 98% Reflect.app 96% Builder.io - Design to Code to Live 95% Burgers on Fleek 97% TatbiqIT 99% Necati Koçlu See more examples You know React? You know Qwik. Developer experience is a core principle of Qwik. Built on top of JSX, functional components and reactivity, learning Qwik is a piece of cake. View Examples Batteries included ⚡️ Instant development with Vite. ⚡ Testing by Vitest and playwright. ⚡ Large ecosystem of tools ready to use. ⚡ Built in extendable styling. Tailwind, Postcss, etc. ⚡ Debugging for SSR, browser, prerendering. ⚡ Ready for Vercel, Netlify, Deno, Cloudflare, Express... Get super powers with the Qwik Optimizer Qwik’s Optimizer can generate JavaScript based on real-user metrics to understand the optimal way to bundle commonly used modules. Online Examples Qwik media Video Qwik First Look - Fireship Code Report Podcast Build Resumable Apps with Qwik Course Qwik School by HiRez.io Presentation Qwik: No hydration & instant-on Course Qwik Crash Course Video Qwik First Impressions Podcast Qwik Chat with Theo Presentation Qwik @ WWC22 See All Built by Performance Nerds Miško Hevery Adam Bradley Manu Almeida Docs Qwik City Ecosystem Playground Integrations Deployments Media Showcase Tutorial Presentations Community Press Made with ❤️ by The Qwik Team MIT License © 2026
2026-01-13T08:48:40
https://www.netlify.com?utm_source=openapi.tools&utm_medium=referral&utm_campaign=nav
Push your ideas to the web | Netlify New: Observability, AI Gateway, and Prerendering Close announcement bar Site navigation Go to homepage Skip to content Search Log in Toggle main menu Platform Toggle platform submenu The Netlify Platform Your app, live instantly. From AI tools or Git to global deployment in seconds. Everything included. Explore the platform Key Features Deploy Previews Agent Runners AI Gateway Functions Storage Observability Security Edge network Solutions Toggle solutions submenu Why Netlify? Customers Agent Experience Partner directory Use Cases Code Agents Company Websites E-commerce Web Apps Large Sites Don’t see your solution? We can help. Chat with a Netlify expert Developers Toggle developers submenu Where to start Docs Developer guides Templates Integrations Build with AI Project kickstarts Astro TanStack Next.js Nuxt Gatsby Wordpress React Vue Svelte Sitecore Jamstack +More Resources Toggle resources submenu Blog Changelog Events Customers Partner directory All resources Pricing Search Contact Log in Sign up Help Push your ideas to the web Build with AI or code, deploy instantly. One platform with everything you need to make real apps live. Get started Contact Sales Platform Everything you need to ship. Nothing you don’t. From vibe coding your first app to serving millions of users, Netlify handles the infrastructure so you can focus on building. No DevOps required. No complex setup. No surprise bills when you scale. Ship instantly Get your app live. Deploy from Bolt, Cursor, GitHub, or anywhere you build. Every change gets a shareable preview link. Deploy from anywhere Instant preview links Update code with Agent Runners See the workflow Build anything Everything your app needs in one place. Create APIs, save images, store data without juggling a ton of services. Marketing sites to AI apps Forms, functions, and APIs ready Database and image storage built-in Explore platform primitives Grows with you From first user to first million, without worry. Your app handles viral moments automatically. No crashes, no replatforming, just growth. Free tier that actually works Managed security Automatic scaling Learn about the platform Primitives Ready to use building blocks. Build APIs, store files, manage data, control performance. No backend setup required—just build and deploy. AI Gateway Serverless functions Data & storage Image CDN Automatic forms Power AI apps with AI Gateway Call OpenAI, Anthropic, or Gemini directly from your code without juggling keys or accounts. Every request is routed through one gateway, with usage tracking and safeguards included. Use AI without managing API keys Switch between 30+ models Monitor usage and costs in one place Read the AI Gateway docs Example: Generate alt text with OpenAI import OpenAI from " openai " ; export default async ( req : Request ) => { if (req . method !== " POST " ) { return new Response ( " Method not allowed " , { status : 405 } ) ; } try { const { description } = await req . json () ; if ( ! description) { return new Response ( " Missing description " , { status : 400 } ) ; } const client = new OpenAI () ; const res = await client . responses . create ( { model : " gpt-5-mini " , input : [ { role : " user " , content : ` Write concise alt text for: ${ description }` }, ] , } ) ; return Response . json ( { altText : res . output_text } ) ; } catch { return new Response ( " Server error " , { status : 500 } ) ; } }; export const config = { path : " /api/alt-text " , }; Build scalable, fullstack apps with Netlify Functions Deploy server-side code that works as API endpoints, runs automatically in response to events, or processes more complex jobs in the background. Send automated email Fetch live data from an API Return dynamic images Validate user input Read the Netlify Functions docs Example: Send email import type { Context , Config } from " @netlify/functions " ; export default async ( req : Request , context : Context ) => { if (req . method !== " POST " ) return new Response ( " Method not allowed " , { status : 405 } ) ; try { const { name , email , message } = await req . json () ; if ( ! name || ! email || ! message) return new Response ( " Missing fields " , { status : 400 } ) ; // Mock email API await fetch ( " https://api.emailservice.com/send " , { method : " POST " , headers : { " Authorization " : ` Bearer ${ Netlify . env . get ( " EMAIL_API_KEY " ) }` , " Content-Type " : " application/json " }, body : JSON . stringify ( { to : " test@example.com " , subject : ` Hello world ` , text : ` Hello ${ name }` } ) } ) ; return Response . json ( { success : true } ) ; } catch { return new Response ( " Server error " , { status : 500 } ) ; } }; Agent-friendly storage for full-stack apps Instantly provision a production-grade database with Netlify DB or use Blobs as a simple key/value store or lightweight database. Store and retrieve blobs and unstructured data for frequent reads and infrequent writes Use serverless databases to create full-stack apps Set up in minutes with the help of a code agent Read the Netlify storage docs Example: Persist user-generated uploads import { getStore } from " @netlify/blobs " ; import type { Context } from " @netlify/functions " ; import { v4 as uuid } from " uuid " ; export default async ( req : Request , context : Context ) => { // Accessing the request as `multipart/form-data`. const form = await req . formData () ; const file = form . get ( " file " ) as File ; // Generating a unique key for the entry. const key = uuid () ; const uploads = getStore ( " file-uploads " ) ; await uploads . set (key , file , { metadata : { country : context . geo . country . name } } ) ; return new Response ( " Submission saved " ) ; }; Better image performance with the Netlify Image CDN Transform images on demand without impacting build times Optimize the size and format of your images Improve both the runtime performance and reliability of your site Read the Netlify Image CDN docs Example: Resize a cached image <!-- Resize an image to 200x200 pixels --> < img src = " /.netlify/images?url=/photo.jpg&w=200&h=200 " alt = " Resized and cached image " > Get information from your users with Netlify Forms Automatic form detection with one HTML attribute Allows you to create forms in Netlify without extra API calls or additional JavaScript Uses HTML forms, a trusted web standard Read the Netlify forms docs Example: Contact us form < form name = " contact " method = " POST " data-netlify = " true " > < p > < label > Your name: < input type = " text " name = " name " /></ label > </ p > < p > < label > Your email: < input type = " email " name = " email " /></ label > </ p > < p > < label > Your job title: < input type = " text " name = " title " /></ label > </ p > < p > < label > Message: < textarea name = " message " ></ textarea ></ label > </ p > < p > < button type = " submit " > Send </ button > </ p > </ form > Start building on Netlify Join millions of developers and teams bringing their ideas online. Get started for free Contact Sales Go to Netlify homepage GitHub LinkedIn Bluesky X (formerly known as Twitter) YouTube Discourse Products Deploy Previews Functions Agent Runners Observability Security Netlify CLI Netlify SDK Pricing Products Deploy Previews Functions Agent Runners Observability Security Netlify CLI Netlify SDK Pricing Resources Docs Status Support Developer guides Changelog Integrations Guides Hire an agency Resources Docs Status Support Developer guides Changelog Integrations Guides Hire an agency Company About Agent Experience Blog Customers Careers Press Company About Agent Experience Blog Customers Careers Press Contact Us Sales Support Status Forums Contact Us Sales Support Status Forums Stay up to date with Netlify news Email UTM Campaign UTM Content UTM Medium UTM Source UTM Term Trust Center Privacy GDPR/CCPA Abuse Cookie Settings © 2026 Netlify Site theme System Dark Light Ask Netlify
2026-01-13T08:48:40
https://docs.sui.io/guides/developer/getting-started/connect#__docusaurus_skipToContent_fallback
Hello, World! | Sui Documentation Skip to main content Sui Documentation Guides Concepts Standards References Search Overview Getting Started Install Sui Install from Source Install from Binaries Configure a Sui Client Create a Sui Address Get SUI from Faucet Hello, World! Connect a Frontend Next Steps Sui Essentials Objects Packages Currencies and Tokens NFTs Cryptography Nautilus Advanced App Examples Dev Cheat Sheet Operator Guides SuiPlay0X1 🗳️ Book Office Hours → 💬 Join Discord → Getting Started Hello, World! On this page Hello, World! You'll build a "Hello, World!" program to learn the fundamentals of programming on Sui. You create programs on Sui by writing and deploying smart contracts to the network. The most basic unit of storage on Sui is an object . Other blockchains typically structure storage using key-value stores. Sui centers storage around objects with unique ID addresses on-chain. Every Sui smart contract is an object that manipulates other objects. Objects can be immutable or mutable: Immutable objects cannot be transferred, changed, or deleted. No one owns them and anyone can access them publicly. Mutable objects can be transferred, changed, and deleted. A Sui address can own them, or they can be shared for public access. Every object's unique ID and version number references it on-chain. Every transaction on the network takes objects as input, then reads, writes, and mutates the inputs to produce new or altered objects as output. Every object knows the hash of the transaction that produced it. When an object is modified by a transaction, the transaction's output writes the object's mutated contents to the same object ID but with a new version number. Sui has limits on the maximum transaction size (128KB) and number of objects (2,048) used in a transaction. For more information on limits, see Building Against Limits in The Move Book. What is Move? ​ Move is the programming language Sui uses to create smart contracts. It is platform agnostic and enables common libraries, tooling, and developer communities across blockchains with vastly different data and execution models. There are three ways to use Move in the context of Sui: Move packages, Move modules, and Move objects. A Sui Move package is also referred to as a Move smart contract. It is a set of Move bytecode published to the Sui network. It is immutable and cannot be changed or removed, however you can upgrade it. Upgrading creates a new version of the package object on-chain, leaving the original intact. All prior versions of a package still exist on-chain. Once you publish it, other packages can import and use the modules it provides. Anyone can view a package's contents and use a Sui Explorer to see how its logic manipulates other objects. Every Move package on Sui includes one or more Sui Move modules that define the package's interaction with on-chain objects. A module's name is always unique within the package that contains it. A Sui Move module governs a Sui Move object , which is typed data from a Sui Move package. Each Move object value is a struct with fields that can contain primitive types, such as integers and addresses, other objects, and non-object structs. Clone "Hello, World!" ​ Prerequisites Install the latest version of Sui . Configure the Sui client . Create a Sui address . Get SUI Testnet tokens . Download and install an IDE. The following are recommended, as they offer Move extensions: VSCode , corresponding Move extension Emacs , corresponding Move extension Vim , corresponding Move extension Zed , corresponding Move extension Alternatively, you can use the Move web IDE , which does not require a download. It does not support all functions necessary for this guide, however. Download and install Git . To demonstrate creating objects, packages, and how to build your first Sui application, start by cloning the "Hello, World!" example: $ git clone \ https://github.com/MystenLabs/sui-stack-hello-world.git $ cd sui-stack-hello-world/move/hello-world In this project, there are two important files that define the package's logic, information, and its dependencies: move/hello-world/sources/greeting.move : Defines the package's logic. In this example, it defines a basic shared greeting object and public functions to interact with it. move/hello-world/Move.toml : The package's configuration file that defines the package name, dependencies, and addresses. Click to open move/hello-world/Move.toml File not found in manifest: move/hello-world/Move.toml . You probably need to run `pnpm prebuild` and restart the site. View the smart contract code ​ Open the greeting.move file in your IDE of choice. You can see the following Move code: File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Code explanation ​ First, this code defines a module called greeting : module hello_world :: greeting { use std :: string ; ... } Then, it defines a public struct called Greeting that contains a unique object ID and text. A struct is a type of resource : File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Then, it defines the function new that makes an API call to the Greeting struct and initializes it with the text "Hello world!" , storing it in a new shared object: File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Lastly, the package defines a function called update_text that can be called to update the text stored in Greeting : File not found in manifest: move/hello-world/sources/greeting.move . You probably need to run `pnpm prebuild` and restart the site. Resource safety ​ A unique aspect of programming applications on Sui is the resource safety enforced by the Move Bytecode Verifier. Move packages must satisfy the following resource safety parameters: All resources must be either moved into global storage or destroyed by the end of a transaction. Resources cannot be copied. In the "Hello, World!" example, the struct Greeting is a resource type. To satisfy the requirement that all resources must be moved or destroyed by the end of a transaction, Greeting is assigned to new_greeting , which the call to transfer::share_object(new_greeting) then moves into global storage. To mutate Greeting , the function update_text takes the input (&mut Greeting) rather than the resource itself. This function satisfies resource safety as the function does not copy the resource and mutates it via a reference. Learn more about the Move Bytecode Verifier. How does this differ from EVM applications? ​ The Ethereum Virtual Machine adopts a gas-based resource safety strategy. Every opcode on an EVM chain has an associated gas price that makes transactions costly, preventing the network from running a single transaction indefinitely. Build the Move package ​ Before you can publish a Move package to the network, you must first build it. Building your package is necessary because the .move source file is a human-readable piece of code, while the network can only understand bytecode. To build your "Hello, World!" package, first confirm your working directory is ~/sui-stack-hello-world/move/hello-world , then run the following command: $ sui move build The build process fetches and compiles the dependencies defined in the Move.toml file. The Move compiler checks your .move code for type errors, syntax errors, and enforces resource safety , then translates your .move code into bytecode that Sui can execute. info You must build your package before you can publish it, but also before you test it. You cannot run tests ( sui move test ) on your code until it has been built. Publish the Move package ​ Now that your package has been built, you need to publish it. After you publish it, other packages and users can use the package's modules and functions by making calls to the package ID. First, confirm your client is configured to use Testnet as the active environment: $ sui client active-env This should return testnet . If it does not return testnet , follow the client configuration instructions before continuing. Then, check your balance of SUI tokens to confirm you have enough to publish to Testnet: $ sui client balance You should have a balance of SUI tokens: ╭────────────────────────────────────────────╮ │ Balance of coins owned by this address │ ├────────────────────────────────────────────┤ │ ╭────────────────────────────────────────╮ │ │ │ coin balance (raw) balance │ │ │ ├────────────────────────────────────────┤ │ │ │ Sui 56804696124 0.50 SUI │ │ │ ╰────────────────────────────────────────╯ │ ╰────────────────────────────────────────────╯ If you do not have a balance, follow the SUI faucet instructions . Now, publish the package to Testnet with the command: $ sui client publish Click to open Output Transaction Digest: 8R39iKKLGPDG3QkW2SrRW3QX71csRP2BLhK9H7oz9SwW ╭──────────────────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Transaction Data │ ├──────────────────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Sender: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ Gas Owner: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ Gas Budget: 9843200 MIST │ │ Gas Price: 1000 MIST │ │ Gas Payment: │ │ ┌── │ │ │ ID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Version: 591332925 │ │ │ Digest: FLC4NXntT7WiHcqCkpDuBUq14DFTfi3EFeUiJcSNHdPu │ │ └── │ │ │ │ Transaction Kind: Programmable │ │ ╭──────────────────────────────────────────────────────────────────────────────────────────────────────────╮ │ │ │ Input Objects │ │ │ ├──────────────────────────────────────────────────────────────────────────────────────────────────────────┤ │ │ │ 0 Pure Arg: Type: address, Value: "0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803" │ │ │ ╰──────────────────────────────────────────────────────────────────────────────────────────────────────────╯ │ │ ╭─────────────────────────────────────────────────────────────────────────╮ │ │ │ Commands │ │ │ ├─────────────────────────────────────────────────────────────────────────┤ │ │ │ 0 Publish: │ │ │ │ ┌ │ │ │ │ │ Dependencies: │ │ │ │ │ 0x0000000000000000000000000000000000000000000000000000000000000001 │ │ │ │ │ 0x0000000000000000000000000000000000000000000000000000000000000002 │ │ │ │ └ │ │ │ │ │ │ │ │ 1 TransferObjects: │ │ │ │ ┌ │ │ │ │ │ Arguments: │ │ │ │ │ Result 0 │ │ │ │ │ Address: Input 0 │ │ │ │ └ │ │ │ ╰─────────────────────────────────────────────────────────────────────────╯ │ │ │ │ Signatures: │ │ mUxqMIofPq+yIzPxxYM+2mSIPTFneDxhWGGxJ7tM02hnRBRy5/FosnnWKxd4OSAjmaw6FNylwVdqUoUlJSxWCQ== │ │ │ ╰──────────────────────────────────────────────────────────────────────────────────────────────────────────────╯ ╭───────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Transaction Effects │ ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Digest: 8R39iKKLGPDG3QkW2SrRW3QX71csRP2BLhK9H7oz9SwW │ │ Status: Success │ │ Executed Epoch: 875 │ │ │ │ Created Objects: │ │ ┌── │ │ │ ID: 0x136e41f505888066f189fb823d710ec96ab4fd75144b3d8008b91d58de85fd12 │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ Version: 591332926 │ │ │ Digest: BGfc1tihsYPTLLozrj58HmRkDeQ1DWZfqeaR4SZDb1cX │ │ └── │ │ ┌── │ │ │ ID: 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1 │ │ │ Owner: Immutable │ │ │ Version: 1 │ │ │ Digest: EtGAG9RHHCsguX4iuX1cbRDvW4QAkJXgDCMJjiufHtxB │ │ └── │ │ Mutated Objects: │ │ ┌── │ │ │ ID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ Version: 591332926 │ │ │ Digest: CiU5KNZALUmuckc2YUFmJq5YXgbB8oG3rs4cnh2rdDXd │ │ └── │ │ Gas Object: │ │ ┌── │ │ │ ID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ Version: 591332926 │ │ │ Digest: CiU5KNZALUmuckc2YUFmJq5YXgbB8oG3rs4cnh2rdDXd │ │ └── │ │ Gas Cost Summary: │ │ Storage Cost: 7843200 MIST │ │ Computation Cost: 1000000 MIST │ │ Storage Rebate: 978120 MIST │ │ Non-refundable Storage Fee: 9880 MIST │ │ │ │ Transaction Dependencies: │ │ 2dkJtqsoQcyCZJvjZnskNVPQeynwVtwCcA9goAru6tTi │ │ 7PStztXyh92keJmrDD1aghHaKVdgCoVkVx4ZmLUfmQeK │ │ Dd9pn1zFcSJjinxQewFd2gQdR4XKsHxFioD5MYnwLZQz │ ╰───────────────────────────────────────────────────────────────────────────────────────────────────╯ ╭─────────────────────────────╮ │ No transaction block events │ ╰─────────────────────────────╯ ╭──────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Object Changes │ ├──────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Created Objects: │ │ ┌── │ │ │ ObjectID: 0x136e41f505888066f189fb823d710ec96ab4fd75144b3d8008b91d58de85fd12 │ │ │ Sender: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ ObjectType: 0x2::package::UpgradeCap │ │ │ Version: 591332926 │ │ │ Digest: BGfc1tihsYPTLLozrj58HmRkDeQ1DWZfqeaR4SZDb1cX │ │ └── │ │ Mutated Objects: │ │ ┌── │ │ │ ObjectID: 0x816e5ec6ff457f18232498b57af8a0e1e219307a3a43fb5df5a4c2198296510c │ │ │ Sender: 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ ObjectType: 0x2::coin::Coin<0x2::sui::SUI> │ │ │ Version: 591332926 │ │ │ Digest: CiU5KNZALUmuckc2YUFmJq5YXgbB8oG3rs4cnh2rdDXd │ │ └── │ │ Published Objects: │ │ ┌── │ │ │ PackageID: 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1 │ │ │ Version: 1 │ │ │ Digest: EtGAG9RHHCsguX4iuX1cbRDvW4QAkJXgDCMJjiufHtxB │ │ │ Modules: greeting │ │ └── │ ╰──────────────────────────────────────────────────────────────────────────────────────────────────╯ ╭───────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Balance Changes │ ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ ┌── │ │ │ Owner: Account Address ( 0x9ac241b2b3cb87ecd2a58724d4d182b5cd897ad307df62be2ae84beddc9d9803 ) │ │ │ CoinType: 0x2::sui::SUI │ │ │ Amount: -7865080 │ │ └── │ ╰───────────────────────────────────────────────────────────────────────────────────────────────────╯ When you publish a Move package to the network, the network uploads and stores the bytecode as a Move package with a unique package ID and version number. The network consumes SUI tokens as gas and processes the transaction on-chain. After successfully executing, the output provides details about the transaction used to publish the package, including the gas cost, transaction digest, dependencies, owner, and sender. For this guide, the most important section is Published Objects , which includes the package's ID, version, and its modules: │ Published Objects: │ │ ┌── │ │ │ PackageID: 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1 │ │ │ Version: 1 │ │ │ Digest: EtGAG9RHHCsguX4iuX1cbRDvW4QAkJXgDCMJjiufHtxB │ │ │ Modules: greeting │ │ └── Both the package ID and module are required to interact with the package from the command line. Take note of both values for future use in the Connecting a Frontend guide. Interact with the Move package ​ Interact with the newly published package by first making a call to the new function that creates a new Greeting object and initialize it with the text "Hello world!" : $ sui client call --package <PACKAGE_ID> --module greeting --function new Replace <PACKAGE_ID> with the package ID the output of the sui client publish command returned. You must include the --package , --module , and --function flags. The output of this call includes a newly created object: ╭───────────────────────────────────────────────────────────────────────────────────────────────────╮ │ Transaction Effects │ ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Digest: 6xB9Foy5vyhXG99xppaCxrNvpPTV3UZsH39zqUKNoGsD │ │ Status: Success │ │ Executed Epoch: 875 │ │ │ │ Created Objects: │ │ ┌── │ │ │ ID: 0x2834aa3d2ed1b5060f4e5d400092544fa9c95430fd894b139b7dfb0312501594 │ │ │ Owner: Shared( 591332927 ) │ │ │ Version: 591332927 │ │ │ Digest: 8xJRijHHp3gNXLExTG98KX5jYAQDVKqsBD8ATFMJXCbA │ │ └── ... To verify that the object contains the text "Hello world!" , make a call to query the object's information: $ sui client object <OBJECT_ID> Replace <OBJECT_ID> with the value under Created Objects, ID: . You should see the object's details, including a value of text: Hello world! : ╭───────────────┬──────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮ │ objectId │ 0x2834aa3d2ed1b5060f4e5d400092544fa9c95430fd894b139b7dfb0312501594 │ │ version │ 591332927 │ │ digest │ 8xJRijHHp3gNXLExTG98KX5jYAQDVKqsBD8ATFMJXCbA │ │ objType │ 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1::greeting::Greeting │ │ owner │ ╭────────┬──────────────────────────────────────────╮ │ │ │ │ Shared │ ╭────────────────────────┬─────────────╮ │ │ │ │ │ │ │ initial_shared_version │ 591332927 │ │ │ │ │ │ │ ╰────────────────────────┴─────────────╯ │ │ │ │ ╰────────┴──────────────────────────────────────────╯ │ │ prevTx │ 6xB9Foy5vyhXG99xppaCxrNvpPTV3UZsH39zqUKNoGsD │ │ storageRebate │ 1413600 │ │ content │ ╭───────────────────┬──────────────────────────────────────────────────────────────────────────────────────────╮ │ │ │ │ dataType │ moveObject │ │ │ │ │ type │ 0xa7ed855d30500c485a94c0849f70b508d6b6adf6b0767ab93cc0756c075ecbb1::greeting::Greeting │ │ │ │ │ hasPublicTransfer │ false │ │ │ │ │ fields │ ╭──────┬───────────────────────────────────────────────────────────────────────────────╮ │ │ │ │ │ │ │ id │ ╭────┬──────────────────────────────────────────────────────────────────────╮ │ │ │ │ │ │ │ │ │ │ id │ 0x2834aa3d2ed1b5060f4e5d400092544fa9c95430fd894b139b7dfb0312501594 │ │ │ │ │ │ │ │ │ │ ╰────┴──────────────────────────────────────────────────────────────────────╯ │ │ │ │ │ │ │ │ text │ Hello world! │ │ │ │ │ │ │ ╰──────┴───────────────────────────────────────────────────────────────────────────────╯ │ │ │ │ ╰───────────────────┴──────────────────────────────────────────────────────────────────────────────────────────╯ │ ╰───────────────┴──────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯ Important transaction considerations ​ You cannot send 2 or more transactions simultaneously, otherwise you encounter an error such as: Failed to sign transaction by a quorum of validators because one or more of its objects is reserved for another transaction. If you receive this error, you must wait until the current epoch is over before submitting your transaction again. You can see how long is left in the current epoch using Sui Explorer or another network explorer like SuiScan . To prevent the same object from being modified by multiple transactions at once, your address 'locks' the object to prevent conflicting modifications. If you'd like to batch multiple transaction commands together, you can use programmable transaction blocks . Transactions also have limitations regarding total size, number of objects, and number of inputs. Learn more about limitations in Building Against Limits in The Move Book. Next steps Create a Full Stack dApp Connect a frontend interface to your "Hello, World!" smart contract. Access Sui Data Learn more about accessing data on Sui. Join the Community Join the Sui developer community, try out other example projects, or read more documentation. Edit this page What is Move? Clone "Hello, World!" View the smart contract code Code explanation Resource safety Build the Move package Publish the Move package Interact with the Move package Important transaction considerations © 2026 Sui Foundation | Documentation distributed under CC BY 4.0
2026-01-13T08:48:40
https://bsky.app/profile/survivejs.bsky.social/
@survivejs.bsky.social on Bluesky JavaScript Required This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is. Learn more about Bluesky at bsky.social and atproto.com . Profile survivejs.bsky.social did:plc:fdgbkehpmviqk3aghmoqzinm
2026-01-13T08:48:40