5,164 Matching Annotations
  1. May 2020
    1. Thickness of the neck

      However you represent the head, whether it is relatively simply yet characteristic, or incredibly refined, you can now identify the start of the neck from the chin. The digastric plane is the bottom plane, it gives the head thickness. It will be useful when drawing the head from other angles - the biggest hurdles is working in a flat 2d plane while seeking to depict volume.

      The gesture from the chin to the bottom of the neck is curved and downward. It is better to make the neck a little too long than too short. You then come from the bottom of the skull, the key here will be not to make the back of the neck too skinny.

      Notice that the neck starts very low in the front and very high in the back. Think of your shirt collars, it sits high in the back and low at the front.

    1. The Microsoft Calculator program uses the former in its standard view and the latter in its scientific and programmer views.
    1. In natural languages, some apparent tautologies may have non-tautological meanings in practice. In English, "it is what it is" is used to mean 'there is no way of changing it'.[1] In Tamil, vantaalum varuvaan literally means 'if he comes, he will come', but really means 'he just may come'.[2]
    2. In the context of first-order logic, a distinction is maintained between logical validities, sentences that are true in every model, and tautologies, which are a proper subset of the first-order logical validities. In the context of propositional logic, these two terms coincide.

      A distinction is made between the kind of logic (first-order logic) where this other distinction exists and propositional logic, where the distinction doesn't exist (the two terms coincide in that context).

    1. Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.
    2. It’s always best practice to either simply follow the most robust legislations or to check the local anti-spam requirements specific to where your recipients are based.
    1. the data subject has explicitly consented to the proposed transfer, after having been informed of the possible risks of such transfers for the data subject due to the absence of an adequacy decision and appropriate safeguards;
    2. In the absence of an adequacy decision pursuant to Article 45(3), or of appropriate safeguards pursuant to Article 46, including binding corporate rules, a transfer or a set of transfers of personal data to a third country or an international organisation shall take place only on one of the following conditions:

      These conditions are individually sufficient and jointly necessary (https://hyp.is/e0RRFJCfEeqwuR_MillmPA/en.wikipedia.org/wiki/Necessity_and_sufficiency).

      Each of the conditions listed is a sufficient (but, by itself, not necessary) condition for legal transfer (T) of personal data to a third country or an international organisation. In other words, if any of those conditions is true, then legal transfer is also true.

      On the other hand, the list of conditions (C; let C be the disjunction of the conditions a-g: a or b or c ...) are jointly necessary for legal transfer (T) to be true. That is:

      • T cannot be true unless C (one of a or b or c ...) is true
      • if C is false (there is not one of a or b or c ... that is true), then T is false
      • T ⇒ C
      • C ⇐ T
    1. generic-sounding term may be interpreted as something more specific than intended: I want to be able to use "data interchange" in the most general sense. But if people interpret it to mean this specific standard/protocol/whatever, I may be misunderstood.

      The definition given here

      is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.

      limits it to things that were previously communicated on paper. But what about things for which paper was never used, like the interchange of consent and consent receipts for GDPR/privacy law compliance, etc.?

      The term should be allowed to be used just as well for newer technologies/processes that had no previous roots in paper technologies.

    1. EU law prohibits the personal data of EU citizens from being transferred outside the EU to countries which do not ensure an adequate level of protection for that data.
    2. This framework serves the purpose of protecting Europeans’ personal data after the transfer to the US and correlates with GDPR requirements for Cross Boarder Data Transfers.
    1. While this is illegal and can result in criminal and civil penalties, your cooperation may make you eligible for up to a US$50,000 reward.

      Might not this motivate someone to conspire with someone else, one to commit the crime and one to collect the reward? Probably mitigated by a contingency that the reward may only be collected if criminal is successfully charged and prosecuted?

    1. Meet specific requirements if transferring data outside of the EAA. The GDPR permits data transfers of EU resident data outside of the European Economic Area (EEA) only when in compliance with set conditions.
    1. the GDPR restricts transfers of personal data outside the EEA, or the protection of the GDPR, unless the rights of the individuals in respect of their personal data is protected in another way
    1. The qualifier of ‘certain circumstances’ is important to highlight here, because it’s often the context in which information exists that determines whether it can identify someone.
    1. it buys, receives, sells, or shares the personal information of 50,000 or more consumers annually for the business’ commercial purposes. Since IP addresses fall under what is considered personal data — and “commercial purposes” simply means to advance commercial or economic interests — it is likely that any website with at least 50k unique visits per year from California falls within this scope.
    1. The only reason why your workaround isn't blocked as well is because it has additional steps that don't explicitly breach Mozilla's policies. But it certainly defeats the spirit of it.
    2. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
    3. They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
    4. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    5. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    1. If the add-on is a fork of another add-on, the name must clearly distinguish it from the original and provide a significant difference in functionality and/or code.
  2. Apr 2020
    1. If you're wearing the same shoes as I have so many times before where you're trying to make yourself heard and do what you ultimately believe is in the organisation's best interests
    2. many organisations block torrents (for obvious reasons) and I know, for example, that either of these options would have posed insurmountable hurdles at my previous employment
    3. Actually, I probably would have ended up just paying for it myself due to the procurement challenges of even a single-digit dollar amount, but let's not get me started on that
    4. Many of them have made poor password choices stretching all the way back to registration, an event that potentially occurred many years ago.
    1. It’s true that there are two hard problems in computer science and one of them is naming things. Why? Because good names are important. A good name teaches about purpose and responsibility, so you have to spend some time thinking about it.
    1. Why not have blogs take better advantage of the ways we already interact?

      I think it's largely because blogging has been left behind as a social tool of the early web. I think the average web user perceives blogging in a sort of negative light as an old technology, but I think we're about to have (or perhaps already are having) a second blogging renaissance in reaction to the pitfalls of microblogging.

    1. Less than 1% of users in the world have Javascript turned off. So honestly, it's not worth anyones time accommodating for such a small audience when a large majority of websites rely on Javascript. Been developing websites for a very long time now, and 100% of my sites use Javascript and rely on it heavily. If users have Javascript turned off, that's their own problem and choice, not mine. They'll be unable to visit or use at least 90% of websites online with it turned off.
    1. Other sites could absolutely spend time crawling for new lists of breached passwords and then hashing and comparing against their own. However this is an intensive process and I'm sure both Facebook and Google have a team dedicated to account security with functions like this.
    2. Before embarking on the effort to scrape the web for new password breaches and compare against your entire user database you also need to consider the ROI. The beauty of the pwned passwords API and this, and other, implementations of it is that you can get a good improvement in your account security with comparatively little engineering effort.
    1. The tyranny of the majority (or tyranny of the masses) is an inherent weakness to majority rule in which the majority of an electorate pursues exclusively its own interests at the expense of those in the minority. This results in oppression of minority groups comparable to that of a tyrant or despot
    1. Direct democracy was not what the framers of the United States Constitution envisioned for the nation. They saw a danger in tyranny of the majority. As a result, they advocated a representative democracy in the form of a constitutional republic over a direct democracy. For example, James Madison, in Federalist No. 10, advocates a constitutional republic over direct democracy precisely to protect the individual from the will of the majority
    1. Having said all that, I think this is completely absurd that I have to write an entire article justifying the release of this data out of fear of prosecution or legal harassment. I had wanted to write an article about the data itself but I will have to do that later because I had to write this lame thing trying to convince the FBI not to raid me.
    2. I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us.
    3. it reminds me of IT security best practices. Based on experience and the lessons we have learned in the history of IT security, we have come up with some basic rules that, when followed, go a long way to preventing serious problems later.
    4. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    5. The fact is that it doesn’t matter if you can see the threat or not, and it doesn’t matter if the flaw ever leads to a vulnerability. You just always follow the core rules and everything else seems to fall into place.
    1. This isn’t the first time Kerckhoffs’ Principle has come up. I specifically discussed it when talking about creating good, strong Master Passwords, when I said that we should use a system for coming up with Master Passwords that doesn’t lose its strength if the attacker knows the system that we used
    2. Kerckhoffs’ Principle states that you should assume that your adversary knows as much about the system you use as you do. This is why – despite what I may have said on April Fools Day last year – security experts are skeptical of security systems that hide the details of how they operate. They are particularly skeptical of systems that derive their security from keeping the details of how they work secret. I could go on at great length about why openness about the system improves security. Indeed, my first draft of this article did go on at great length.
    1. the Add functions seem to work generically over various types when looking at the invocations, but are considered to be two entirely distinct functions by the compiler for all intents and purposes
    1. Devise-Two-Factor only worries about the backend, leaving the details of the integration up to you. This means that you're responsible for building the UI that drives the gem. While there is an example Rails application included in the gem, it is important to remember that this gem is intentionally very open-ended, and you should build a user experience which fits your individual application.
    1. When you simply accept that "hacker" means "malicious security cracker", you give up the ability to use the term to refer to anything else without potential confusion.
    1. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    1. Well, as a home user, I also belong to an investment club with 10 members. I also have a medium size family who I like to send photo's to, and my son is on a soccer team. all those have greater than 5 people on the list. sooooooooo..... once again, the people with valid use of the internet have to 'deal' with those that abuse it.
    1. the Web has be­come many things, but doc­u­ments and, by ex­ten­sion, pub­li­ca­tions, have re­mained close to the heart of the Web.
    1. Traditional annotations are marginalia, errata, and highlights in printed books, maps, picture, and other physical media
    1. sur-veillance has been to imagine them as equally affecting all users.

      but with our society's biases built in.

    2. User subjects and data objects are treated as programmable matter, which is to say extractable matter.

      yes.

    1. Before repair of the injury is attempted, hemorrhage should be controlled; injuries to the atria can be clamped with a Satinsky vascular clamp, whereas digital pressure is used to occlude the majority of ventricular wounds. Foley catheter occlusion of larger stellate lesions is described, but even minimal traction may enlarge the original injury.

      bleeding control is first. satinsky clamp can be used for atria inj but for ventricular, mostly digital pressure is used. minimal stretch may enlarge inj (Foley)

    2. The most common injuries from both blunt and penetrating thoracic trauma are hemothorax and pneumothorax. More than 85% of patients can be definitively treated with a chest tube. The indications for thoracotomy include significant initial or ongoing hemorrhage from the tube thoracostomy and specific imaging-identified diagnoses (Table 7-10). One caveat concerns the patient who presents after a delay. Even when the initial chest tube output is 1.5 L, if the output ceases and the lung is reexpanded, the patient may be managed nonoperatively if hemodynamically stable.

      chest tube can treat 85% of hemo/pneumothoraxes, if significant bleeding from tube thoracostomy initially or ongoing was present, thoracotomy is indicated. patient delayed presentation is a caveat. nonop manageing is possible in stable patient with ceased output and rexpanded lungs even after 1.5 L output.

    3. Because treatment must be instituted during the latent period between injury and onset of neurologic sequelae, diagnostic imaging is performed based on identified risk factors (Fig. 7-55).91 After identification of an injury, antithrombotics are administered if the patient does not have contraindications (intracranial hemorrhage, falling hemoglobin level with solid organ injury or complex pelvic fractures). Heparin, started without a loading dose at 15 units/kg per hour, is titrated to achieve a PTT between 40 and 50 seconds or antiplatelet agents are initiated (aspirin 325 mg/d or clopidogrel 75 mg/d). The types of antithrombotic treatment appear equivalent in published studies to date, and the duration of treatment is empirically recommended to be 6 months.

      diagnostic imaging before onset of neurologic complications while taking

    4. Early recognition and management of these injuries is paramount because patients treated with antithrombotics have a stroke rate of <1% compared with stroke rates of 20% in untreated patients.

      antithrombotics for blunt inj of carotid and vertebral art decreases stroke rates from 20 to 1%

    5. Tangential wounds of the internal jugular vein should be repaired by lateral venorrhaphy, but extensive wounds are efficiently addressed by ligation. However, it is not advisable to ligate both jugular veins due to potential intracranial hypertension.

      for tangential inj of int jugular vein lateral vonorrhaphy is used and for extensive damages, ligation, but not bilaterally to preventing IC HTN.

    6. The final stages of this sequence are caused by blood accumulation that forces the temporal lobe medially, with resultant compression of the third cranial nerve and eventually the brain stem.
    7. Penetrating injuries to the head may require operative intervention for hemorrhage control, evacuation of blood, skull fracture fixation, or debridement.
    8. The burr hole is made on the side of the dilated pupil to decompress the intracranial space. After stabilization, the patient is transferred to a facility with neurosurgical capability for formal craniotomy.
    1. The handler can be a method or a Proc object passed to the :with option. You can also use a block directly instead of an explicit Proc object.

      Example of: letting you either pass a proc (as a keyword arg in this case) or as a block.

  3. Mar 2020
    1. There is no system that is equally well-suited to significantly different scenarios.
    2. The higher the load on the system, the more important it is to customize the system set up to match the requirements of the usage scenario, and the more fine grained this customization becomes. There is no system that is equally well-suited to significantly different scenarios. If a system is adaptable to a wide set of scenarios, under a high load, the system will handle all the scenarios equally poorly, or will work well for just one or few of possible scenarios.
    1. If a website/app collects personal data, the Data Owner must inform users of this fact by way of a privacy policy. All that is required to trigger this obligation is the presence of a simple contact form, Google Analytics, a cookie or even a social widget; if you’re processing any kind of personal data, you definitely need one.
    1. In short, a website needs a consent-management platform if any of the following activities are taking place:
    2. Regardless of where an organization is based (in the EU or otherwise), its website must meet regulatory obligations when processing EU/EEA citizens’ data or the business will face financial penalties.
    1. If your website installs any non-technical cookies, e.g. via script like Google Analytics or via a Facebook share button
    2. If your website can be visited by European users
    1. Don't be discouraged when you get feedback about a method that isn't all sunshine and roses. Facets has been around long enough now that it needs to maintain a certain degree of quality control, and that means serious discernment about what goes into the library. That includes having in depth discussions the merits of methods, even about the best name for a method --even if the functionality has been accepted the name may not.

      about: merits

    2. When submitting new methods for consideration, it is best if each method (or tightly related set of methods) is in it's own pull request. If you have only one method to submit then a simple commit will do the trick. If you have more than one it best to use separate branches. Let me emphasizes this point because it makes it much more likely that your pull request will be merged. If you submit a bunch of methods in a single pull request, it is very likely that it will not be merged even if methods you submitted are accepted!
    1. prove that your interpretation of EU laws (“My Privacy Policy covers everything, explicit consent isn’t required, I don’t have to give my visitors any kind of control because they can block cookies before visiting my site,” etc) is right
    1. Dictators and tyrants routinely begin their reigns and sustain their power with the deliberate and calculated destruction of art

      Art terrifies tyrants! Here's one tiny small example, but there are unfortunately hundreds of thousands examples of this.

    1. Do you consider visitor interaction with the home page video an important engagement signal? If so, you would want interaction with the video to be included in the bounce rate calculation, so that sessions including only your home page with clicks on the video are not calculated as bounces. On the other hand, you might prefer a more strict calculation of bounce rate for your home page, in which you want to know the percentage of sessions including only your home page regardless of clicks on the video.
    1. Rather than using NFS for this task, use explicit data duplication, via one of the long-established mechanisms designed for this purpose.
    1. I enjoy dissent and debate among commenters, and criticism of my views is also always welcome; you are even free to call me an assclown, a dupe, a partisan ignoramus — whatever you like, as long as you don't insult other commenters.
    1. I've been meaning to remind readers that I do read the comments. Some time ago, one disappointed commenter mused that others' reflections seemed to go (as I recall) "into a void," because I remained silent to each. Perhaps I was ignoring readers' remarks? I assure you that is not the case. I read them all — although on this site, for some reason, "all" means somewhat sparse — and I find them nearly all remarkable in their perceptiveness. I especially welcome, and enjoy, intelligent disagreement. I choose not to respond, however, only because of my editorial philosophy, which holds that the comment section is, rightfully, for commenters — and commenters alone. I've already had my say, and it seems to me rather rude to take another whack in reply. Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in. So, I beg you not to take my silence personally.
    2. Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in.
    1. However, we recognise there are some differing opinions as well as practical considerations around the use of partial cookie walls and we will be seeking further submissions and opinions on this point from interested parties.
    2. While we recognise that analytics can provide you with useful information, they are not part of the functionality that the user requests when they use your online service – for example, if you didn’t have analytics running, the user could still be able to access your service. This is why analytics cookies aren’t strictly necessary and so require consent.
    1. These cookies are used from AddThis social sharing widget in order to make sure you see the updated count when you share a page.

      Why do they not mention the other 5 or so AddThis cookies, or the fact that according to Cookiepedia AddThis is engaged in Targeting/Advertising?

    1. Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
    2. has shone a spotlight on the risks that flow from platforms that operate by systematically keeping their users in the dark.
    1. Rojas-Lozano claimed that the second part of Google’s two-part CAPTCHA feature, which requires users to transcribe and type into a box a distorted image of words, letters or numbers before entering its site, is also used to transcribe words that a computer cannot read to assist with Google’s book digitization service. By not disclosing that, she argued, Google was getting free labor from its users.
    1. For instance, a strict interpretation of the law would require publishers to get opt-in consent by individual vendor, rather than an 'Accept All' pop-up prompt. The approach that publishers and ad tech vendor are taking is that a mass opt-in button - with an option to dive deeper and toggle consent by vendor - follows the "spirit of the law". This stance is increasingly coming under fire, though, especially as seen by a new study by researchers at UCL, MIT, and Aarhus University.
    1. The business had a policy that you should report safety incidents when you see them. The process around that was you fill out a form and fax it to a number and someone will take action on it. The safety manager in this company saw that and decided to digitize this workflow and optimize it. Once this process was put into place, the number of safety incidents reported increased 5 times. The speed at which safety incidents were addressed increased by 60%.
    1. Get phrasebooks to start studying basic terminology. Phrasebooks are lists of expressions made for travelers to foreign countries. These lists give you an example of the sentence structure a language uses and what kind of words are useful. Find a phrasebook in the language you wish to learn and treat it as a foundation you can build upon as you learn more.
    1. This makes it easy to use Markdown to write about HTML code. (As opposed to raw HTML, which is a terrible format for writing about HTML syntax, because every single < and & in your example code needs to be escaped.)
    1. For several reasons the Simple backend shipped with Active Support only does the "simplest thing that could possibly work" for Ruby on Rails3 ... which means that it is only guaranteed to work for English and, as a side effect, languages that are very similar to English. Also, the simple backend is only capable of reading translations but cannot dynamically store them to any format.That does not mean you're stuck with these limitations, though. The Ruby I18n gem makes it very easy to exchange the Simple backend implementation with something else that fits better for your needs, by passing a backend instance to the I18n.backend= setter.
  4. Feb 2020
    1. In 1968, Garrett Hardin, a biologist, published an article about social dilemmas in the journal Science, called ‘The Tragedy of the Commons’.
    1. We believe load test scripts should be plain code to get all the benefits of version control, as opposed to say unreadable and tool generated XML.

      Saw another comment lamenting the use of ugly/unreasonable XML files:

      https://github.com/flood-io/ruby-jmeter

      Tired of using the JMeter GUI or looking at hairy XML files?

    2. Hence why we built k6, the load testing tool we’ve always wanted ourselves!
    3. But, let’s be pragmatic for a second, the 80/20 rule states that you get 80% of the value from 20% of the work and a couple of simple tests are vastly better than no tests at all. Start small and simple, make sure you get something out of the testing first, then expand the test suite and add more complexity until you feel that you’ve reached the point where more effort spent on realism will not give enough return on your invested time.
    1. The rational expectation and thelearning-from-price literatures argue that equilibrium prices are accurate becausethey reveal and aggregate the information of all market participants. The MarketSelection Hypothesis,MSH, proposes instead that prices become accurate becausethey eventually reflect only the beliefs of the most accurate agent. The Wisdomof the Crowd argument,WOC, however suggests that market prices are accuratebecause individual, idiosyncratic errors are averaged out by the price formationmechanism

      Three models (arguments for) drivers of market efficiency

  5. Jan 2020
    1. no difference

      The nature of the wants that commodities satisfy makes no difference. This is perhaps somewhat surprising to readers, given the extent to which everyday critiques of capitalist society often center around the role that consumerism plays and the subjective effects that this produces, namely, the way that consumer society creates all sorts of desires (as well as the obverse--many will defend capitalism on the grounds that it is able to satisfy our inordinate appetite for novelty by producing an enormous proliferation of desirable commodities). Yet, for Marx, the nature of these desires "makes no difference."

      It is worth pointing out that the critique of the appetites that consumer society spawns is by no means new (a rather early moment in the history of consumer society). We find it already on display in Book II of Plato's Republic. In looking to shift the terrain of the analysis of justice from the individualistic, social contractualist theory of justice elaborated by Glaucon, Socrates founds a 'city' based on the idea that no one is self-sufficient, that human beings have much need of one another, and that the various crafts--farming, weaving cloth, etc.--fare best when each person specializes in that craft to which they are most suited by nature. After sketching out a kind of idyllic, pastoral community based on the principle of working together to satisfy our natural appetites, Socrates aristocratic companion Glaucon objects, describing this city as a 'city fit for pigs'. At this point, Socrates conjures what he calls the 'luxurious city', at which point a whole host of social ills are unleashed in order to satisfy Glaucon's desire for the luxuries to which he is accustomed. Currency and trade are introduced, along with a more complex division of labor (and wage labor!), and quite quickly, war. On the basis of the principle of 'one person, one craft', Socrates argues that making war is itself a craft that requires specialization (and thus a professional army).

      For Plato, this represents the beginning of class society, as the profession military becomes a class distinct from the class of producers and merchants.

      Plato thus anticipates a version of a view that becomes one of the key theses of the Marxist theory of the state, namely, the idea that the state exists only in societies that have become "entangled in an insoluble contradiction within itself" and which are "cleft into irreconcilable antagonisms which it is powerless to dispel," (Engels, The Origin of the Family, Private Property, and the State). The state emerges as "a power apparently standing above society...whose purpose is to moderate the conflict and keep it within the bounds of 'order'" Engels writes, "this power arising out of society, but placing itself above it, and increasingly separating itself from it, is the state." Lenin cites this passage in the first pages of State and Revolution in order to critique the 'bourgeois' view that the state exists in order to reconcile class interests. In Lenin's reading of Marx, the state exists as "an organ of classs domination, an organ of oppression of one class by another," a view articulated in The Communist Manifesto, (cf. V.I. Lenin, State and Revolution in V.I.Lenin: Collected Works, Vol. 25, pp. 385-497).

      Marx cites this same passage from Republic in a long footnote to his discussion of the Division of Labor and Manufacture on pp. 487-488, which also happens to be the sole place in Capital where Marx cites Plato.

      The fact that Marx here expresses indifference to the particular appetites that commodities satisfy is thus intriguing and ambiguous. Given that this question both clearly animates Plato's discussion of the origin of class society in Republic and, additionally serves as an alternative to the social contractarian view of justice that descends from Glaucon through Hobbes and the 18th century 'Robinsonades', this seemingly technical point also touches upon questions concerning Marx's engagement with both classical and modern political theory.

      If for Plato, the unruly appetites represent the seed of which class-divided society is the fruit, Marx's dismissal of the question of the nature of the appetites that are satisfied by commodities points to exchange-value and the social forms that it unleashes as being key dimensions of the particular form that class-antagonism takes in capitalist society.

    2. prevails

      In the original German, 'prevails' is rendered "herrscht." Herrscht shares a common root with the ordinary German word Herr (Mister, or, more evocatively, Master). 'Lordship' (as, in the chapter of Hegel's Phenomenology of Spirit, on 'Lordship and Bondage' is rendered Herrschaft.)

      My own reading of Capital tends to center upon the question of domination in capitalist societies, and throughout chapter 1 (in particular, in The Fetishism of Commodities and the Secret Thereof) Marx is especially attuned to the distinguishing how the forms of domination that are prevalent in capitalist societies are distinct from the relations of "personal dependence" that characterize pre-capitalist modes of production.

      It seems prudent, therefore, to take note of the way that the seemingly innocuous notion of 'prevalence' is, for Marx, in his original formulation, already evocative of the language of mastery, domination, perhaps even something like 'hegemony'.

      Furthermore, the capitalist mode of production prevails--it predominates. Yet, as Louis Althusser observes in his discussion of the concept of the 'mode of production' in On the Reproduction of Capitalism, every concrete social formation can be classified according to the mode of production that is dominant (that prevails--herrscht). In order to dominate, something must implicitly be dominated, or subordinate. "In every social formation," Althusser writes, "there exists more than one mode of production: at least two and often many more." Althusser cites Lenin, who in his analysis of the late 19th c. Russian social formation, observes that four modes of production can be distinguished (Louis Althusser, On the Reproduction of Capitalism, Verso 2014, p. 19.)

      In our analysis of social formations, the concrete specificity of each can be articulated by carefully examining the multiplicity of modes of production that coincide within it, and examine the way in which capitalism tends to dominate a multiplicity of subordinate modes of production that, on the one hand, survive from past modes of production but which may also, on the other, be emerging in the present (i.e. communism). Thus even if capitalism tends towards the formation of a contiguous world-system dominated by its particular imperatives, this does not mean that this process is homogenous or unfolds in the same way in each instance.

      For some commentators, capitalism is defined by the prevalence of wage labor and the specific dynamics that obtain therefrom. Yet this has often led to confusion over, whether, in analyzing the North American social formation prior to 1865, in which slavery coexists with wage-labor, the mode of production based on slave-labor is pre-capitalist. Yet as we find here in ch. 1, what determines the commodity as a commodity is not that it is the product of wage labor, rather that it is produced for exchange. As Marx writes on p. 131, "He who satisfies his own need with the product of his own labor admittedly creates use-values, but not commodities. Insofar as the slave-system in North America produced commodities (cotton, tobacco, etc.) for exchange on the world market, the fact that these commodities were produced under direct conditions of domination does not have any bearing on whether or not we identify this system of production as 'capitalist'. Wage-labor is therefore not likely the determinative factor; the determinative factor is the production of commodities for exchange. It is only insofar as commodities confront one another as exchange-values that the various modes of useful labor appear as expressions of a homogenous common substance, labor in the abstract

      It is in this sense that we can observe one of the ways that the capitalist mode of production prevails over other modes of production, as it subordinates these modes of production to production for exchange, and thus the law of value, regardless of whether wage-labor represents the dominant form of this relation. Moreover, it provides a clue to how we can examine, for example, the persistence of unwaged work within the family, which has important consequences for Social Reproduction Theory.

      Nonetheless, we can say that insofar as commodities confront each other on the market in a scene of exchange that they implicitly contain some 'third thing' which enables us to compare them as bearers of a magnitude of value. This 'third thing', as Marx's demonstration shows, is 'socially necessary labour time', which anticipates the way that wage-labor will become a dominant feature of capitalist society.

    1. Some questions are only asked by people with a fundamental misunderstanding. The friends who walk into my office and ask, “have you read all of these” miss the point of books.
    2. We tend to treat our knowledge as personal property to be protected and defended. It is an ornament that allows us to rise in the pecking order.
    1. He envisioned vast centers equipped with mics and headphones where people could speak in detail and at length about their experiences, thoughts, and feelings, delivering in the form of monologues what the eavesdroppers could gather only piecemeal.
    2. ferreting-out of secrets is merely one purpose of surveillance; it also disciplines, inhibits, robbing interactions of spontaneity and turning them into self-conscious performances
    1. Customization can be surprisingly homogenizing.
    2. The counterculture was about people’s need to express themselves, to fulfill their individual potential, to live in harmony with nature rather than constantly seeking to overcome its nuisances.
    1. rich self-experience in a solitary state is far less likely to feel lonely when alone.”
    2. “the value of solitude depends on whether an individual can find an interior solitude” within themselves, says Bowker. Everyone is different in that regard: “Some people can go for a walk or listen to music and feel that they are deeply in touch with themselves. Others cannot.”
    3. “Your alone time should not be something that you're afraid of.”
    4. “existentializing moments,” mental flickers of clarity which can occur during inward-focused solitude.
    5. “When people take these moments to explore their solitude, not only will they be forced to confront who they are, they just might learn a little bit about how to out-maneuver some of the toxicity that surrounds them in a social setting.”
    1. remember the moments that plumbed the depths of our emotional life, that made us feel most alive?
    2. rare, exciting, oceanic, deeply moving, exhilarating, elevating experiences that generated an advanced form of perceiving reality,
    3. greater contemplation associated with intense experiences may increase the likelihood that we consider such events self-defining.
    1. I was going through the source for Thin and noticed that instead of using require, Marc-Andre Cournoyer was using a method called autoload to load thin's constituent parts.
  6. Dec 2019
    1. "The replication crisis, if nothing else, has shown that productivity is not intrinsically valuable. Much of what psychology has produced has been shown, empirically, to be a waste of time, effort, and money. As Gibson put it: our gains are puny, our science ill-founded. As a subject, it is hard to see what it has to lose from a period of theoretical confrontation. The ultimate response to the replication crisis will determine whether this bout is postponed or not."

    1. “Every data point was altered to present the best picture possible,”Bob Crowley | Lessons Learned interview | 8/3/2016Tap to view full document Bob Crowley, an Army colonel who served as a senior counterinsurgency adviser to
    1. Tempest and Midixsummer Night’s Dream

      Two of Shakespeare's more fanciful plays, The Tempest and A Midsummer Night's Dream explore the limits of the human form through its characters: the grotesque monster-human hybrid Caliban in The Tempest and the comical Bottom from Midsummer, a human with the head of an ass.

      Shelley is conscious of Frankenstein's play with generic convention, and the role genre has in its agreement with representation of reality. In his review of the first edition in 1818 for Edinburgh Magaizine, Sir Walter Scott seems cognizant of the shift in consciousness. He notes: "The real events of the world have, in our day, too, been of so wondrous and gigantic a kind--the shiftings of the scenes in our stupendous drama have been so rapid and various, that Shakespeare himself, in his wildest flights, has been completely distanced by the eccentricities of actual existence."

    2. renew life

      Victor implies that life can be renewed from death, a theme present in biblical scripture. See Gen. 3:19, 18:27; Job 30:19; Eccl. 3:20) and in the Anglican Book of Common Prayer (Burial Rite 1:485, 2:501).

    3. A new species would bless me as its creator and source

      The religious connotations of the passage connect Victor to the human project of playing God, much as Adam was said to be formed of clay. Historically, Jewish rabbis were also thought to have created golems from clay to seek revenge on enemies. However, following orders literally, the golems inevitably became destructive. Cautionary tales about technology and hubris were not only frequent in Shelley's time but have proliferated. In Karel Čapek's R.U.R (1920), for example, robots confound expectations by violently rebelling against their creators. Cadavers for anatomical training in this period were scarce, and thus a medical education meant to study and extend life also fostered serial killers who committed murders for the sake of selling fresh corpses. Such killing sprees were ended by the Anatomical Act of 1832 in England, which made corpses legally available for medical research.

    4. It was indeed a paradise

      At this moment, the Creature appears more strongly associated with Adam than with Satan, apparently born into a "paradise." However, Shelley's allusion might be to that of the serpent or snake, as in Revelation: "So the great dragon was cast out, that serpent of old, called the Devil and Satan, who deceives the whole world; he was cast out to the earth, and his angels were cast out with him . . . He laid hold of the dragon, that serpent of old, who is the Devil and Satan, and bound him for a thousand years (Rev. 12:9; 20:2).

    5. Shakespeare, in the Tempest and Midv1_ixsummer Night’s Dream

      Despite the comparison of these Shakespeare plays to Greek tragic poetry, The Tempest and A Midsummer Night's Dream are romances, not tragedies. Nonetheless, both romance and tragedy are genres to which this novel is deeply indebted.

    6. I shall kill no albatross,

      This expression is a reference to Samuel Taylor Coleridge's poem "Rime of the Ancient Mariner," in which the Mariner inexplicably slays an albatross. The allusion may imply that Walton will play the role of Coleridge's Wedding Guest instead: he will listen to Victor's long, obsessive story that will ultimately be a confession of guilt, like the Ancient Mariner' tale. Since the poem was not published until September 1798, this reference also places the "17--" date of these letters as the summer of 1799. On the poem's role in the novel, see Beth Lau, "The Rime of the Ancient Mariner and Frankenstein," in Samuel Taylor Coleridge and the Sciences of Life, ed. Nicholas Roe (Oxford: Oxford University Press, 2001): 207-23.

    1. I believe that mere lists of "vote yes" or "vote no" are not very helpful except for sheep: it's important to know why one is urged to vote in any given direction.
    1. Unlike similar tools that are scheduled to take backups at a fixed time of the day, Timeshift is designed to run once every hour and take snapshots only when a snapshot is due. This is more suitable for desktop users who keep their laptops and desktops switched on for few hours daily. Scheduling snapshots at a fixed time on such users will result in missed backups since the system may not be running when the snapshot is scheduled to run. By running once every hour and creating snapshots when due, Timeshift ensures that backups are not missed.
    1. In a nutshell, the King's Keys deck started as an experiment to see what card games would be like if you rebuilt playing cards from the ground up. Instead of using ranks and suits, each card has a number (from one to four), one of four items, and one of four colors. The result is what I call a 4x4x4 deck where 64 playing cards each have a unique combination of these three parts.
    1. It shouldn't be useful to distinguish between requests made by Ajax and other kinds of request. Pretty much any usecase where you'd want to do that is better served by using the Accept header to ask for data in a specific format.
  7. Nov 2019
    1. Learning about this factor will help you best understand whether the extension's developer's interests are aligned or at odd with yours.
    1. Can I ask people to upvote my submission? No. Users should vote for a story because they personally find it intellectually interesting, not because someone has content to promote.
    1. Tea cites Chavisa Woods’s recent memoir of sexism 100 Times, Andrea Lawlor’s Paul Takes the Form of a Mortal Girl and Brontez Purnell’s Since I Laid My Burden Down as examples of books that have fearlessly and artfully tackled themes of power and gender relations, misogyny and sexual violence. “Right now, I think the [publishing] industry is responding to what is happening and saying: ‘Yes we really need these voices, we need these ideas out in the world.’

      So true!

      My review of Chavisa Woods's book is here.

    1. The chapter examines learning and emotion at work andhow emotional intelligence and emotion work affect well-being, identity development, and power relations.The chapter also considers how human resource develop-ment and emotion interact in learning, training, andchange initiatives.
  8. www-chronicle-com.libproxy.nau.edu www-chronicle-com.libproxy.nau.edu
    1. Technology

      This website explores technology news within the field of higher education. The site contains a wide variety of news articles on current issues, trends, and research surrounding the integration of technology in universities and colleges. This includes technology's prevalence in teaching and learning, institutional decisions, and societal trends of higher education. The articles are published by authors for "The Chronicle of Higher Education," a leading newspaper and website for higher education journalism. Rating: 7/10

    1. You want to write maintainable tests for your React components. As a part of this goal, you want your tests to avoid including implementation details of your components and rather focus on making your tests give you the confidence for which they are intended. As part of this, you want your testbase to be maintainable in the long run so refactors of your components (changes to implementation but not functionality) don't break your tests and slow you and your team down.
    2. We try to only expose methods and utilities that encourage you to write tests that closely resemble how your web pages are used.