## Constructing a monad via type synonyms of a particular kind

We can define a reader/environment monad on the simply-typed lambda calculus, using the following three equations, where $$r$$ is some fixed type, $$\alpha$$ is any type (I subscript some terms with their types), $$\mathbb{M}$$ is the proposed monadic type modality), $$\eta$$ is the unit of the monad and $$\mu:\mathbb{M} \mathbb{M}\alpha → \mathbb{M}\alpha$$ is the join of the monad:

$$\mathbb{M} \thinspace α = r → α \hspace{1cm} ∀α$$ $$\eta \, a_{\alpha} = \lambda c_{r}.\; a \hspace{2cm} ∀a_{\alpha}$$ $$\mu\,b_{\mathbb{M}\mathbb{M} \alpha} = λc_{r}.\; b_{\mathbb{M}\mathbb{M}\alpha}\, c\, c \hspace{1cm} ∀b_{\mathbb{M}\mathbb{M} \alpha}$$

Can we always construct a reader monad by type synonyms of the form $$r = x$$, for arbitrary function types $$x$$ (for example, where $$x$$ is $$(\beta \to t) \to t$$), for some type $$\beta$$?

## Can we know which client side script is performing a particular action on a website?

Recently in an website I had noticed that the data which is received from the server is not the data that is being displayed.I think it would have been modified on client-side. So, Is there any way by which I can know which action is being performed by which script?

## How to simplify polynomial to get to particular factor?

If I have an expression like this

ex = -l + l t - 2 t^2 + T + (l - 2 t) y 

This can be written as

ex1 = -l + (l - 2 t) (t + y) + T 

However, if I try

FullSimplify[ex] 

I get

T + l (-1 + t + y) - 2 t (t + y) 

How can I get the form of ex1 without having to manually copy, paste and modify?

## In an Arm TrustZone based Trusted Application (TA), how can a remote party tie an output to a particular TA?

I’ve been looking at the following figure which shows, with Arm TrustZone architecture, resources of a system can be divided into a Rich Execution Environment (REE) and a Trusted Execution Environment (TEE).

Here I’m trying to understand the following: Suppose a remote party wants a particular trusted application (TA) running in TEE to do some computation on his input. How can this remote party be ensured that the computation is actually done by the correct TA ?

## How to Limit The Number of Verified Links for Particular Platforms?

I want to build a project with blog comments, web 2.0s and article links.
However I want the max number of verified links to be 1000, 100 and 50 respectively.
How can I do this?

## What programming language to learn for this particular project?

I have a vast batch script cluster that monitors my downloads directory. When it ‘detects’ a completed download, it processes it (using various external command line tools), then moves it to a directory where similarly named files reside. Other functions include duplicate media finder which can use combination of partial filename, media duration and size to find them quickly. The cluster consists of around 20 different functions, big and small. I have much more ideas to expand this into a proper offline media center with extensive automated management features.

I have a dire need to evolve this into a graphical user interface, first of all, and I am faced with the problem of choosing a programming language for it. I do not know any other languages but am willing to learn a new one just for this passion project alone. What language would be THE programming language of choice for something like this, for someone like me, and why? Keep in mind I have never used programming tools other than Notepad++.

## Does Message allow me to ensure I am talking to a particular person?

Message:

You point your finger toward a creature within range and whisper a message. The target (and only the target) hears the message and can reply in a whisper that only you can hear.

You can cast this spell through solid objects if you are familiar with the target and know it is beyond the barrier. Magical silence, 1 foot of stone, 1 inch of common metal, a thin sheet of lead, or 3 feet of wood blocks the spell. The spell doesn’t have to follow a straight line and can travel freely around corners or through openings.

Alice casts Message towards a creature. She believes that creature to be her friend Bob.

The creature is, however, actually the villainous Eve merely disguised as Bob. Can Alice preclude Eve from hearing the Message?

## What official adventure gives this particular story award?

awhile ago (last spring) I played a 5e AL adventure and received a story award, I believe it was called ‘home sweet home’, in which each adventurer recieved a home in the city the adventure took place in – but I don’t remember what the name of the city or adventure was.

Does anyone know, or know how to find out?

## Is there a tool to see every WordPress site that’s using a particular plugin?

Is there a tool to see every WordPress site that’s using a particular plugin? For example: if I wanted to know every website in the world that is currently (or historically) using Yoast SEO.

I realize this would probably be a third party tool, so I don’t know if it’s appropriate for this forum. But, I figured it’s a good place to ask seeing as it’s related to WordPress.