best practice: what are the most common signs / icons for chat interactions?

As noted, there are different icons used in different applications. This makes it difficult to determine a universally understood standard. I remember Jakob Nielsen saying "Users spent most of their time on other websites." With this in mind, this is what i would do:

  1. Identify the target user group for the application you are designing for Y
  2. Understand which messaging / chat tool they are most used to, so
  3. Design icons very similar to the most popular messenger for the target group


By number of users, WhatsApp seems to be the most widely used messenger worldwide [data]. But if your target group is primarily based in China, chances are they use WeChat a lot. So you can use WeChat to inspire your icon designs. Those designs could be tested with real users to see if they understand the interactions, supported by the icons.

You can also consider text only as an alternative to icons, or icons along with a text label.

Cryptography: tool to try to decrypt a string by brute force using common algorithms?

I have a string that I think is encoded with a fairly basic algorithm, but instead of testing them 1 by 1, I am wondering if there is a tool / website that can try to decode it using multiple algorithms and display all results.

Is there something like this?

Trump told the whole world that this coronavirus was nothing more than the common flu, how can it not be his fault for deceiving the world?

I don't believe everything I read and hear. Believing that an ignorant man is your prerogative.

When I first heard about the coronavirus it was not from Trump. I saw a video of a Chinese doctor who died in China of the coronavirus. After watching the video, I thought it sucked. Now the rest of the government leaders around the world are going to be wrong.

Then I saw a video of 1 infected person returning to my country, and then I saw other videos of more infected people returning to my country, and my government leader approved it.

The first person who returned to my country infected other people, and I was waiting patiently to see a video of what was happening, and then I saw a video of how that person infected other people.

[ Law & Ethics ] Open-ended question: What legal principles apply when a data breach discloses personal financial information? Common law negligence? What statutes govern this?

[Law and Ethics] Open-ended question: What legal principles apply when a data breach discloses personal financial information? Common law negligence? What statutes govern this?

Why does Facebook recommend my friend to my other friends despite having nothing in common and having my list hidden?

I am using Facebook only as an easy means of contact (mainly messenger).
I have my privacy settings as low as possible, with everything visible only to me. Basically, everything that could be disabled to post, I did.

I recently saw that my good friend I met on the internet (and he has no relationship with any of my other friends! He doesn't even live in the same part of the country) appeared in my real life friend's "recommended friends", even though I don't really have any special contact with him through Facebook. He's just on my friends list, I'm not even texting him or anything.
Of course, on the recommended list there was a note that there was a mutual friend, but it didn't show who because it was hiding my friends list.

If he has my a bit private internet friend recommended (for some reason i can't even think of), it means all my friends can recommend it too. It bothers me a bit because I've disabled my friends list for a reason, I don't want others to see my friends at all, and when they see that there is only one mysterious mutual friend, then you can easily assume it's me because there aren't many people like me who disable everything.

I could understand if there was more than one mutual friend, but it's just me, with everything hidden and he's a person who would rather not want to float around my real life friends. They could easily invite them and then they would see them on my friends list, because it shows mutual friends. I think it is a matter of privacy and there should be an option to NOT share some of your friends with everyone around you. I'm pretty sure there are hundreds of other friends that could be recommended, who actually have something in common.

Is there a way to prevent this from happening other than removing them?

Various official websites in common use

I found a batch of websites that can send you virtual links. You can put your website keywords in the search box of those websites, search your own keywords and the results page will generate a virtual link form website. See my blog for more details. Https://

SQL Server 2012: common table expression (CTE) that returns more rows than it should

I have a life table with 121 rows and 3 columns (age, male and female). I have to search all 121 rows taking gender into account. If the gender is "Male", I look for the "Male" column of the life table as qx and the "Female" column as qy and vice versa.

However, I need to calculate a fourth column, vx, whose value starts with 1 and the subsequent values ​​are calculated as follows, using the previous value of vx:

vx = (vx / (1 - @interestRate)^age)

Age always ranges from 0 to 120, increased by one at each step.

I do not know CTEs well, therefore I am taking small steps to accomplish my tasks with this new method. and i need help

When I try to calculate vx, the query returns 7381 instead of 121.

Here is my CTE:

DECLARE @gender VARCHAR(10) = 'MALE'
DECLARE @interestRate NUMERIC(7, 5) = 0.0354

;WITH cte AS (
            WHEN @gender = 'MALE' THEN
        END AS qx,
            WHEN @gender = 'MALE' THEN
        END AS qy,
        CAST(1.0 AS NUMERIC(7, 5)) AS vx
    FROM LifeTable AS lt


        cte.Age + 1,
        CAST((vx / (1 + @interestRate)) AS NUMERIC(7, 5)) AS vx
    FROM cte

    WHERE cte.Age < 120


I'm a little tired because I spent the afternoon trying to figure this out, it's already dark, so my question might be taken as a low effort, but I really need your help to see where I am making mistakes.

c # – How to use Common Data Model (CDM) schema in my .Net Core application

I would like my application to benefit from a common data schema to facilitate analysis and integration with other systems (Power BI and Dynamics come to mind). I have found the Common Data Model (CDM) Schema from Microsoft and I want to better understand how this is used in practice with a .Net application. The "How To" information released by Microsoft appears to focus on Power Apps, but not on what an implementation would look like for other frameworks.

On the Github page, I've found resources for C # projects, which include object interfaces (they're not entity-specific interfaces, as far as I can tell) and some tools (adapters and testing).
Also, in the Microsoft documentation I have found definitions of the entities.

Now I would like to understand the best way to benefit from the CDM scheme:

  1. Do I write my own classes / entities whose properties are in line with the linked documentation on how entities should look? Or are these entities available as classes in a namespace provided by Microsoft?
  2. a) If I write my own classes, can I choose which properties to implement? Or can I only take advantage of common functionality when I implement 100% of the listed properties? b) How do I support properties outside of those defined by Microsoft and still have these properties working outside of my application?
    c) If I can omit properties, will the functionality outside my application (PowerBi, etc.) fail smoothly when the expected properties are not available?
  3. It is not obvious to me which interfaces (as provided in Github) should be implemented for which entities (as listed in Microsoft's hosted documentation), how do I know what to implement for which entity?

I'd be very happy if someone can supply relevant resources (.Net related?) Outside of the two I listed since I can't find much on this topic.

Reading and processing XML files from a Common Vulnerability and Exposure (CVE) base with Python

Using the list.txt and cve.xml attachments, develop a Python script that:

1) open and read the extension file ".xml" available at the end;

2) Search the file for all occurrences of CVE IDs in the format: "", where YYYY is the year, with 4 digits, and NNNN is the CVE number, which can be 4, 5, 6, or 7 digits;

3) Confirm that the CVEs retrieved from the file exist in a locally stored list (file "list.txt"). If this CVE is not in the list.txt, the script should include it at the end of the list, saving 01 (one) "CVE-YYYY-NNNN" field per line; Y

4) Print "New CVE Found: CVE-xxxx-yyyy" on the screen for each new CVE saved in the file "list.txt". If a new CVE is not found in the ".xml" file, print "No new CVE" on the screen.



I was only able to open the XML file:

import xml.etree.ElementTree as ET

tree = ET.parse('cve.xml')

Could anyone help?

I think you can also solve it simply by using regex. If someone can show you both solutions, it will be a great help in my learning!

common lisp: my solution to the 100 prisoners challenge

I ran into the 100 prisoners problem in the Rosetta Code. I thought it would be fun to add a Common Lisp solution, see below.

Before posting my solution, I'd like to receive feedback on my code. I have used to-do lists because I think it is more natural in CL and performance is not a problem here.

Thank you for your comments!

(defparameter *samples* 10000)
(defparameter *prisoners* 100)
(defparameter *max-guesses* 50)

(defun range (n)
  "Returns a list from 0 to N."
     for i below n
     collect i))

(defun nshuffle (list)
  "Returns a shuffled LIST."
     for i from (length list) downto 2
     do (rotatef (nth (random i) list)
                 (nth (1- i) list)))

(defun build-drawers ()
  "Returns a list of shuffled drawers."
  (nshuffle (range *prisoners*)))

(defun strategy-1 (drawers p)
  "Returns T if P is found in DRAWERS under *MAX-GUESSES* using a random strategy."
     for i below *max-guesses*
     thereis (= p (nth (random *prisoners*) drawers))))

(defun strategy-2 (drawers p)
  "Returns T if P is found in DRAWERS under *MAX-GUESSES* using an optimal strategy."
     for i below *max-guesses*
     for j = p then (nth j drawers)
     thereis (= p (nth j drawers))))

(defun 100-prisoners-problem (strategy &aux (drawers (build-drawers)))
  "Returns T if all prisoners find their number using the given STRATEGY."
  (every (lambda (e) (eql T e))
         (mapcar (lambda (p) (funcall strategy drawers p)) (range *prisoners*))))

(defun sampling (strategy)
     repeat *samples*
     for result = (100-prisoners-problem strategy) 
     count result))

(defun compare-strategies ()
  (format t "Using a random strategy in ~4,2F % of the cases the prisoners are free.~%" (* (/ (sampling #'strategy-1) *samples*) 100))
  (format t "Using an optimal strategy in ~4,2F % of the cases the prisoners are free.~%" (* (/ (sampling #'strategy-2) *samples*) 100)))