eric ripa 5 years ago • updated 5 years ago 1
Today we can launch Sublime Text with --data to use a custom data dir location. It would be good to have the option to set for example $SUBLIME_DATA to a custom location to make this change "permanent".

This would make it easier to use Sublime Text in a multi-user environment (like a Citrix/VNC terminal service type of corporate environment) where only one central installation of Sublime is present and each user have their own data directory. 
Илья 5 years ago 0

Here is an example of what is happening now:

.class {


So when I'm typing ".class {" SublimeText automatically inserts "}" (which is correct). Then I press Enter and get this:

.class {



But what I really want is (attention to the closing bracket - it's indented by additional tab):

.class {



I've even seen (ok, it was only once) in some editor special setting for this. Now I start using SublimeText (which is cool!) and I feel that it can be customized in a such way but I'm not quite sure how.

Efrain Hensley 4 years ago 0
Too many consumers feel that their debts are overwhelming and there is nothing they can do other than file a bankruptcy. Due to lack of information, many consumers turn prematurely to bankruptcy. We can help you avoid bankruptcy by settling your unsecured debts on your behalf.

dannie s 5 years ago 0
It would be nice to have the functionality that was in MultiEdit for DOS/Windows - open files list with selection ability (or maybe quicksearch), called by customizable hotkey.
Antoine Hebert 6 years ago • updated by Jon Skinner 5 years ago 1
I use sublime text on Windows and Linux and some shortcuts are different which is always confusing me. Specially the multiple selection which is shift+alt+down on linux ans ctrl+alt+down on windows.
Jon Skinner 6 years ago
Key bindings are the same between Windows and Linux, except where platform conventions dictate otherwise (e.g. Ctrl+Q to quit on linux), or where the window manager will typically eat the key bindings on Linux.
Mathieu Breton 6 years ago 0

Could TextMate support the Dart language (for the syntax colorization)

Tomáš Ivánek 6 years ago 0
It would be cool to add a ability to trash folders and ability to delete unempty folders from sidebar
Jeff Yeo 7 years ago • updated 7 years ago 1
It's especially big deal when the file is like 8000 lines long.
Resize the tab window size just a bit and I will be looking at a whole new different place in the file.
I don't think the way it is now is beneficial to anyone.

Please make it so that current view is kept still as I adjust the tab size. 
Greg Corrigan 5 years ago 0

May be just a Linux issue, but when I go to "Open Recent", the menu is not properly escaping the file names listed, so underscores become alt+[letter] key combination indicators.

For example, the file stats_controller is listed as statscontroller, with the "c" in the middle underlined.

It does open the file properly. Just needs to be escaped properly in the menu control, and unescaped when executing the fopen()

Hari K T 6 years ago • updated by Sven Axelsson 6 years ago 1
Automatic docbloc comments

adding the above and pressing enter should generate the docblox comments.

Eg :

     * @param type $hello
     * @param type $world
     * @return type
    public function helloWorld( $hello , $world)
Netbeans has the functionality, not sure whether I am missing something in Sublime
Romain Goncalves 6 years ago • updated 6 years ago 0
Situation : 
  • File type : .js
  • I have a class description comment at the start of my file :
     * Class description
  • I have a big comment block at the end of the file (classic /* ... */)

How to reproduce : with that similar file structure, select multiple lines, and use the "Toggle Comment" shortcut (Ctrl+/ on my machine)

At first you think nothing has happened, and if you try it again, it will comment your lines. But what you may not have noticed is the effects of the first shortcut use : it removed the "/*" at the start the file and the "*/" at the end, causing execution issues.

I can reproduce the bug on 2 computers (build 2126 on one and 2181 on the other) with the same effects. Both computers use Windows XP Pro x86

Eugene Wolfson 6 years ago • updated by Jon Skinner 6 years ago 1
Michael Seiwald 6 years ago • updated 6 years ago 0
It's currently not possible to paste over a visual selection like in Vim with 'p'. I works with Ctrl+v btw.
Jocelyn Turcotte 6 years ago • updated 6 years ago 1
I'm usually working with projects containing a lot of files, and to make sure that the file I want gets to the top I have to type most of the file name which is around 10 to 15 characters each time I want to open a file.

So it would be cool to be able to configure aliases which would also show matches for the aliased text.
For example if I have a directory structure with the following path under the project directory, containing 10 files:
dirA/dirB/dirC/dirD/<10 files here>

Then if I could alias "dd" = "dirA/dirB/dirC/dirD/", I could get those files to the top just by typing "dd" + 1-3 chars of the file name for the one I want to open.
This would also allow aliasing a specific file's full path to a few chars to which I could append "@" to get a list of it's symbols immediately.

If the alias text is matched itself in some files path, those matches could also be shown in the list under the aliased matches (which I think should have priority to the top).
Suraj Reddy 6 years ago • updated by lanzz 6 years ago 1
It'd be helpful to press a button to "touch" a file/update it's last edited date.

This is very helpful for rails testing where you have a process watching a file for changes that runs a test whenever the file changes.

Sometimes you want to re-run the test without actually changing a file.
Stefan Pausch 6 years ago 0
It would be nice if the "Clone File" would jump to the exact view/line as the origin file.
annette cerise 4 years ago 0
(1888 PressRelease) Westhill Consulting is an international financial advisory firm based in Jakarta, Indonesia. Below is a guide to Initial Public Offerings (IPO's) intended to simplify the jargon and remove the fear that IPO's involve higher risk as compared to usual investments.

Westhill Consulting is a market leader in the Financial Services category. Here is a guide to Initial Public Offerings (IPO's) intended to simplify the jargon and remove the fear that IPO's involve higher risk as compared to usual investments.

Westhill Consulting is a reputable investment advisory firm based in Jakarta Indonesia, dedicated to providing you the most advantageous investments based on how you want your portfolio managed for the private middle market.

You might be wondering how you can increase the profits you make from your market investing strategies. If you're searching for the most profitable forms of investing that are available today, you should definitely investigate the possibilities of using Initial Public Offering (IPO) investments.

A simple description of an IPO includes the fact that you're buying a business that is just entering the open marketplace. The moment the IPO is released to the public is the first time anyone has the ability to buy the company openly, and this will surely give you a good idea on where the stock itself resides when it comes to the value of the offering. You can wage it is preparing for a large rise in its value because they are just releasing their stock to the public.

Though most of the Initial Public Offering stocks skyrocket after they are first released, you must keep in mind that they are hardly a definite investment. Because of this, there are several factors you must definitely examine before you place your capital into this type of investment.

One of the first factors you must take into consideration before investing into the stock you are interested in is the basic fact that once the stock is available on the market you can't guess if there will be a great deal demand or a total lack.

Because of this, you must do your best to ascertain every bit of information available about the company before making a purchase.

As you comb the market for the best IPOs available today, you must consider the fact that IPOs are usually offered only to the market when a company plans on expansion. There are other instances where companies only want to increase their ability to borrow capital, but IPOs are mostly released to increase the amount of funds they have available for expansion plans.
It may look like a company which is preparing to expand is a sure bet on the stock market. However, that is not really the case. IPO stocks are usually considered as high-risk investments. That is why if you want to secure your investments to a degree, you must explore the overall performance of the company's operations in the long run.

When you have analyzed the essentials of the company you are interested on, you must also try to guess where the capital generated from the IPO will be used by the company. If you think the company's only choice is to put their capital into expansion activities, you can be sure that the stock value will increase over time because of the expanding capabilities of the business operation. As you examine the essentials of the company and estimate where the capital will be going once the IPO is sold to the public, you can make a reasonable evaluation of how the stocks are going to fare in the future. Being one of the top advisory firms in the industry, we gain the confidence of our clients by acting with integrity on all our business decisions.

Westhill Consulting practices a specific valuation procedure to determine how much a profitable business is worth and determine possible market opportunities.
skyeschmeitz 4 years ago 0
Koyal Private Training Group
What Private Detectives and Investigators Do
Private detectives and investigators find facts and analyze information about legal, financial, and personal matters. They offer many services, including verifying people's backgrounds, finding missing persons, and investigating computer crimes.

Work Environment
Private detectives and investigators work in many places, depending on the case. Some spend more time in offices doing computer searches, while others spend more time in the field conducting interviews and performing surveillance. They often work irregular hours. About 1 in 5 were self-employed in 2012.

How to Become a Private Detective or Investigator
Private detectives and investigators mostly need several years of work experience in law enforcement. Workers must also have a high school diploma, and the vast majority of states require private detectives and investigators to have a license.

The median annual wage for private detectives and investigators was $45,740 in May 2012.

Job Outlook
Employment of private detectives and investigators is projected to grow 11 percent from 2012 to 2022, about as fast as the average for all occupations. Demand for private detectives and investigators will stem from security concerns and the need to protect confidential information. Strong competition can be expected for jobs.

Similar Occupations
Compare the job duties, education, job growth, and pay of private detectives and investigators with similar occupations.

More Information, Including Links to O*NET
Learn more about private detectives and investigators by visiting additional resources, including O*NET, a source on key characteristics of workers and occupations.
haideeloidie 4 years ago in Plugin announcements 0

Today’s commentary

Yesterday, Google announced that it would buy privately-held Nest Labs for $3.2 billion. This was Google’s second largest acquisition ever. Nest is a smart thermostat and smoke alarm-maker which promises to give Google a leg up in the fast expanding home automation market. But the acquisition also highlights the degree to which communications technology is now embedded in ordinary devices. The benefit is convenience. The risk is privacy.

Since this is a thought piece, I am putting it outside the paywall.

Last week cryptography expert Bruce Schneier wrote an interesting piece on the NSA at the Atlantic, arguing that the intelligence agency threatens national security. His argument in a nutshell was that the NSA – in its zeal to undermine security for espionage purposes - made the digital world vulnerable to any attacker, including foreign governments and common hacker criminals. Schneier pointed to the NSA’s “collect-everything mentality” as being at the heart of the security vulnerability. And I believe this is important when thinking about embedded technology in the context of the Google acquisition.

Embedded technology or embedded systems are computer systems that operate within larger devices in order to make them ‘smart’ and more technologically advanced. Think of electronic watches, baby monitors, refrigerators or washing machines. These articles are by their very nature mechanical/electronic. But in today’s world, they also contain tiny little computers in order to enhance their functionality and ease of use. Embedded systems of this sort are literally ubiquitous. The Nest acquisition gives Google entree into this embedded technology market in its most important application, home automation.

The problem with embedded systems is that they are a major security and privacy risk. In another Bruce Schneier post, he explains:

“We’re at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself — as with the Internet of Things. These embedded computers are riddled with vulnerabilities, and there’s no good way to patch them.

It’s not unlike what happened in the mid-1990s, when the insecurity of personal computers was reaching crisis levels. Software and operating systems were riddled with security vulnerabilities, and there was no good way to patch them. Companies were trying to keep vulnerabilities secret, and not releasing security updates quickly. And when updates were released, it was hard — if not impossible — to get users to install them. This has changed over the past twenty years, due to a combination of full disclosure — publishing vulnerabilities to force companies to issue patches quicker — and automatic updates: automating the process of installing updates on users’ computers. The results aren’t perfect, but they’re much better than ever before.

But this time the problem is much worse, because the world is different: All of these devices are connected to the Internet. The computers in our routers and modems are much more powerful than the PCs of the mid-1990s, and the Internet of Things will put computers into all sorts of consumer devices. The industries producing these devices are even less capable of fixing the problem than the PC and software industries were.

If we don’t solve this soon, we’re in for a security disaster as hackers figure out that it’s easier to hack routers than computers. At a recent Def Con, a researcher looked at thirty home routers and broke into half of them — including some of the most popular and common brands.”

Schneier focuses on the security risk. And that’s a big problem because these embedded technology products are never updated by end users, making them vulnerable to hackers, especially if they are internet-enabled. But then there is the privacy risk too. A lot of ink has been spilled over GPS and WiFi tracking for example. For retailers, tracking customers in-store will soon be the norm. But these tracking mechanisms can be used across retailers too in the same way tracking cookies are used across the Internet. Turnstyle Solutions has set up a WiFi tracking mechanism in downtown Toronto that uses sensors at 200 different stores, allowing the company to create a mosaic of 2 million people and their shopping habits – in the hopes of serving them with proto-Minority Report-style advertising.

We see the emerging location tracking technology developing in cars too at this year’s Detroit auto show. The Guardian reported on privacy problems:
the US government accountability office (GAO) found inconsistencies in the way automakers handle data from car owners, raising fears of privacy breaches. The study looked at information collected by Chrysler, Ford, General Motors, Honda, Nissan and Toyota as well as navigation device-makers Garmin and TomTom and map and navigation app developers Google and Telenav.

“Without clear disclosures about the purposes, consumers may not be able to effectively judge whether the uses of their location data might violate their privacy,” the report noted.

Now, note, that these technologies are geared not just toward enhancing computing power but toward increasing convenience for end users. So the convenience factor is the trojan horse for security and privacy vulnerabilities. Couldn’t the government embed hidden backdoors into these systems? Couldn’t hackers break into the vendors’ computer systems to access our private information? Couldn’t someone or some company or some government use our home automation devices to watch our every move where we live and sleep? The answer to all of these questions is yes. This is what happened with the Target and Neiman Marcus data breaches, affecting 70 million customers with not just stolen credit card information but stolen email addresses, telephone numbers and other personally identifying information.

I don’t have a solution to this problem but I think it will be end up as a mutli-factored problem in a world that is increasingly dependent on always-on computing and internet communications capabilities. The economic and social impact will be in terms of theft, industrial and government espionage, privacy and freedom of speech. it’s hard to tell when, where and how the privacy and security vulnerabilities will be made manifest as serious problems but the NSA spy scandal tells you it already is one. And it is likely to get bigger unless we do find a solution.
Bruce Schneier makes a good case for seeing the security and privacy risks as social in nature. He writes:

Not only is ubiquitous surveillance ineffective, it is extraordinarily costly. I don’t mean just the budgets, which will continue to skyrocket. Or the diplomatic costs, as country after country learns of our surveillance programs against their citizens. I’m also talking about the cost to our society. It breaks so much of what our society has built. It breaks our political systems, as Congress is unable to provide any meaningfuloversight and citizens are kept in the dark about what government does. It breaks our legal systems, as laws areignoredorreinterpreted, and people are unable to challenge government actions in court. It breaks our commercial systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the Internet become untrusted. And it breaks our social systems; the loss of privacy, freedom, and liberty is much more damaging to our society than the occasional act of random violence.

And finally, these systems are susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even more extreme examples. Building the surveillance state makes it too easy for people and organizations to slip over the line into abuse.

It’s not just domestic abuse we have to worry about; it’s the rest of the world, too. The more we choose to eavesdrop on the Internet and other communications technologies, the less we are secure from eavesdropping by others.

The end result of not fixing this problem will be an erosion of the legitimacy of government and democracy, something that will eventually create economic upheaval and revolution. One way to hold this at bay is to stop government from exploiting the security and privacy loopholes. But another important factor is for citizens to start taking security and privacy seriously. The trade-off between convenience and privacy/security needs to move more in the direction of security and privacy – and by that I mean we consumers need to force companies to add security into their systems. Two-factor authentication systems and easy to use security protocols. One reason I think Bitcoin is interesting is that it sets up a way for people to interact across the web securely in a way that is independent of the security systems of one individual company. It is the technology behind Bitcoin that provides answers for the future more than the currency, which is a legacy of the increasing distrust of government and the erosion of the legitimacy of democracy.

Eventually, repeated violations of security and the erosion of privacy will lead to a breakdown in society. I think we can have the convenience and the security and the privacy. But we need to take the security and privacy seriously or we won’t get it.