477 Matching Annotations
  1. May 2023
    1. Annotations will be coded as shown below for easy understanding as to why notes were made. 1. Identify the Genre 2. Examine/Contrast Translation Choices 3. Assess/Contrast Modern Retellings 4. Analyze Rhetorical Strategies 5. Assess Audience Expectations

  2. Apr 2023
    1. Three decades of complacency has meant technology on its own cannot now cut emissions fast enough. A second, accompanying phase, must be the rapid reduction of energy and material consumption

      Key observation

    1. due to the critical role of information in phase-transitions, the primary pathway to global systemic transformation will depend on our ability to process information on our current predicament coherently in order to translate this into adaptive action.

      Key observation - due to the critical role of information in phase-transitions, - the primary pathway to global systemic transformation - will depend on our ability to process information on our current predicament coherently - in order to translate this into adaptive action.

  3. Mar 2023
    1. Dass das ägyptische Wort p.t (sprich: pet) "Himmel" bedeutet, lernt jeder Ägyptologiestudent im ersten Semester. Die Belegsammlung im Archiv des Wörterbuches umfaßt ca. 6.000 Belegzettel. In der Ordnung dieses Materials erfährt man nun, dass der ägyptische Himmel Tore und Wege hat, Gewässer und Ufer, Seiten, Stützen und Kapellen. Damit wird greifbar, dass der Ägypter bei dem Wort "Himmel" an etwas vollkommen anderes dachte als der moderne westliche Mensch, an einen mythischen Raum nämlich, in dem Götter und Totengeister weilen. In der lexikographischen Auswertung eines so umfassenden Materials geht es also um weit mehr als darum, die Grundbedeutung eines banalen Wortes zu ermitteln. Hier entfaltet sich ein Ausschnitt des ägyptischen Weltbildes in seinem Reichtum und in seiner Fremdheit; und naturgemäß sind es gerade die häufigen Wörter, die Schlüsselbegriffe der pharaonischen Kultur bezeichnen. Das verbreitete Mißverständnis, das Häufige sei uninteressant, stellt die Dinge also gerade auf den Kopf.

      Google translation:

      Every Egyptology student learns in their first semester that the Egyptian word pt (pronounced pet) means "heaven". The collection of documents in the dictionary archive comprises around 6,000 document slips. In the order of this material one learns that the Egyptian heaven has gates and ways, waters and banks, sides, pillars and chapels. This makes it tangible that the Egyptians had something completely different in mind when they heard the word "heaven" than modern Westerners do, namely a mythical space in which gods and spirits of the dead dwell.

      This is a fantastic example of context creation for a dead language as well as for creating proper historical context.

    2. Die Auswertung solcher Materialmengen erwies sich als prekär, und im Falle der häufigsten Wörter, z.B. mancher Präpositionen (allein das Wort m "in" ist über 60.000 Mal belegt) oder elementarer Verben mußte man vor den Schwierigkeiten kapitulieren und das Material aussondern.

      The preposition m "in" appears more than 60,000 times in the corpus, a fact which becomes a bit overwhelming to analyze.

    3. Auch das grammatische Verhalten eines Wortes nach Flexion und Rektion ist der Sammlung vollständig zu entnehmen. Und schließlich und vor allen Dingen lag hier der Schlüssel zur Bestimmung der Wortbedeutungen. Statt jeweils ad hoc durch Konjekturen einzelne Textstellen spekulativ zu deuten (das Raten, von dem Erman endlich wegkommen wollte), erlaubte es der Vergleich der verschiedenen Zusammenhänge, in denen ein Wort vorkam, seine Bedeutung durch systematische Eingrenzug zu fixieren oder doch wenigstens anzunähern. Auch in dieser Hinsicht hat sich das Zettelarchiv im Sinne seines Erstellungszwecks hervorragend bewährt.

      The benefit of creating such a massive key word in context index for the Wörterbuch der ägyptischen Sprache meant that instead of using an ad hoc translation method (guessing based on limited non-cultural context) for a language, which was passingly familiar, but not their mother tongue, Adolph Erman and others could consult a multitude of contexts for individual words and their various forms to provide more global context for better translations.

      Other dictionaries like the Oxford English Dictionary attempt to help do this as well as provide the semantic shift of words over time because the examples used in creating the dictionary include historical examples from various contexts.

    4. Dem Konzept nach ist dies ein key word in context (KWIC) Index, ein Typus von Indices, wie sie heute immer noch als Grundoperation der Textdatenverarbeitung erzeugt werden.

      The method used for indexing the Wörterbuch der ägyptischen Sprache and the Thesaurus Linguae Latinae is now generally known as a key word in context (KWIC) index.

    1. Our findings raise the issue of global policy choices, with this research confirming that targeting the high emitters will be key. Staying within temperature limits of 1.5 °C or 2.0 °C is difficult without addressing the consequences of wealth growth.

      key finding - staying within 1.5 or even 2 deg C will be difficult without addressing wealth growth - a significant share of the remaining carbon budget risks being depleted by a very small group of human beings

    2. In this estimate, US$2020 millionaires will deplete 72% of the 1.5 °C carbon budget (400 Gt CO2, 67% chance of staying within temperature range), or 25% of the 2 °C budget (1150 Gt CO2, 67% chance) over the next 30 years.

      key finding - Elite consumption has the potential to make 1.5 Deg C target unreachable - US$2020 millionaires will deplete 72% of the 1.5 °C carbon budget (400 Gt CO2, 67% chance of staying within temperature range), - or 25% of the 2 °C budget (1150 Gt CO2, 67% chance) - over the next 30 years.

    3. The wealthy thus have a significant influence on remaining carbon budgets.

      key observation

    1. do our fears cause us to perceive the world the way we do, and might someone experience the world differently if they were brave enough to face the thing we avoid most?

      Quote - do our fears cause us to perceive the world the way we do, and might someone experience the world differently if they were brave enough to face the thing we avoid most? key question - could we imagine a world where we are free of these fears?

  4. Feb 2023
    1. underestimates by scientists have potentially devastating consequences for humanity’s efforts to react to this threat to our survival.
      • = Key point

      • Underestimates by scientists

      • have potentially devastating consequences
      • for humanity’s efforts -to react to this threat to our survival.
    1. The reason is Rails only reads and creates the session object when it receives the request and writes it back to session store when request is complete and is about to be returned to user.
    1. I am Cuauhtémoc

      Throughout the poem, Joaquin embodies various historical figures from Mexican history, including Cuauhtémoc (the last emperor of Tenochtitlan), Miguel Hidalgo (the father of Mexican Independence), Jose Maria Morelos (military leader during the Mexican War of Independence), Vicente Guerrero (2nd president of Mexico), Benito Juárez (26th president of Mexico), Pancho Villa (General in the Mexican Revolution which overthrew Porfirio Diaz), and Emiliano Zapata (key leader in the Mexican Revolution). All of these people are shown to care deeply about their people and their country, and their lives and deaths are seen as important parts of the story of Mexico and its path to independence and freedom.

      https://www.britannica.com/biography/Cuauhtemoc https://www.britannica.com/biography/Miguel-Hidalgo-y-Costilla https://www.britannica.com/biography/Jose-Maria-Morelos https://www.britannica.com/biography/Vicente-Guerrero https://www.britannica.com/biography/Benito-Juarez https://www.britannica.com/biography/Pancho-Villa-Mexican-revolutionary https://www.britannica.com/biography/Emiliano-Zapata

  5. Jan 2023
    1. we have individual capitalists who try 00:48:45 to make the most profit and this is linked to their capital and productivity so to achieve more in less time and 00:48:57 productivity is linked to energy [Music] the only source of energy to increase profit is carbon oil and gas and this has resulted in a change in our 00:49:15 atmosphere we have to put an entities if we wish to live in our planet can our capitalism do this based on the current data we won't be able to do so 00:49:28 therefore perhaps we should do the following reflection if capitalism is unable to do so either Humanity will die with it or 00:49:42 Humanity will overcome capitalism so that we can live in our planet

      !- Urrego : Key Point - Can capitalism rapidly detour away from fossil fuels? The current data indicates no. So either Humanity does our it drops capitalism

    1. Cartesian

      cartesian thinking views the mind as being seperate from the physical body.

      replicating an experience is not the same as replicating an exact depiction

    2. Inthis world, stars hang in the sky but do not shine; lamps hang from ceilingsbut do not glow . The light is like a messenger that deli vers stars and lampsto the doors of your perception, but magically vanishes at the moment youlet them in

      defining in terms of the negative space?

      seems to emphasize the importance of context when it comes to perception

    1. Despiteappearances, tunicates are more closely related to us than any other invertebrate — they are ourstrange, spineless cousins

      The things we chose to focus on (appearances, species, habits, etc) in order to differentiate "us from them" are not that significant, we are all much more connected and similar than e realize.

    1. The} l)'P1callyopera1c ·" ne1works 10 dc1cc1.analrze, and acru-atc re,pon<e; IO cm 1ronmental even 1,

      The sensors are not only networks of analysis, detection, and responses to environmental events but are ways of describing environments and bringing them into being as sociopolitical worlds that reflect the differing ways of experiencing and navigating planetary zones.

    1. While structural injustice and inequality do impede autonomy by fostering force and fraud, oppression and exploitation, these structural conditions also undermine autonomous self-recognition by impeding the psycho-social development integral to fulfilling the capability to be an autonomous self and agent. This is one convergence of symbiotic theorizing and the recognitional practice of autonomy. Through symbiotic practices, the assistance or “affordances” of the material and social worlds can be drawn on to actualize the inherent potential for autonomous action that resides in each human being.[16]

      !- key insight : autonomy and symbiosis

    1. What is abrogated here is our right to the future tense, which is the essence of free will, the idea that I can project myself into the future and thus make it a meaningful aspect of my present. This is the essence of autonomy and human agency. Surveillance capitalism’s “means of behavioral modification” at scale erodes democracy from within because, without autonomy in action and in thought, we have little capacity for the moral judgment and critical thinking necessary for a democratic society.

      !- surveillance capitalism : key insight -mass behavioral modification takes away autonomy

    1. Susan B. Anthony,

      It is important to know that Susan was one of the people who was for women’s right to vote

  6. Dec 2022
    1. our plan was not thought through in context of the time needed, our industrial capacity, and our ability to supply the raw materials needed. 00:09:04 And so a new plan is needed and a new paradigm is needed.

      !- key claim : our current plan was not well thought through and we need a new plan

  7. Nov 2022
    1. I have DNS settings in my hosts file that are what resolve the visits to localhost, but also preserve the subdomain in the request (this latter point is important because Rails path helpers care which subdomain is being requested)
    1. From the Introduction to Ed25519, there are some speed benefits, and some security benefits. One of the more interesting security benefits is that it is immune to several side channel attacks: No secret array indices. The software never reads or writes data from secret addresses in RAM; the pattern of addresses is completely predictable. The software is therefore immune to cache-timing attacks, hyperthreading attacks, and other side-channel attacks that rely on leakage of addresses through the CPU cache. No secret branch conditions. The software never performs conditional branches based on secret data; the pattern of jumps is completely predictable. The software is therefore immune to side-channel attacks that rely on leakage of information through the branch-prediction unit. For comparison, there have been several real-world cache-timing attacks demonstrated on various algorithms. http://en.wikipedia.org/wiki/Timing_attack

      Further arguments that Ed25519 is less vulnerable to - cache-timing attacks - hyperthreading attacks - other side-channel attacks that rely on leakage of addresses through CPU cache Also boasts - no secret branch conditions (no conditional branches based on secret data since pattern of jumps is predictable)

      Predicable because underlying process that generated it isn't a black box?

      Could ML (esp. NN, and CNN) be a parallel? Powerful in applications but huge risk given uncertainty of underlying mechanism?

      Need to read papers on this

    2. More "sales pitch" comes from this IETF draft: While the NIST curves are advertised as being chosen verifiably at random, there is no explanation for the seeds used to generate them. In contrast, the process used to pick these curves is fully documented and rigid enough so that independent verification has been done. This is widely seen as a security advantage, since it prevents the generating party from maliciously manipulating the parameters. – ATo Aug 21, 2016 at 7:25

      An argument why Ed25519 signature alg & Curve 25519 key exchange alg is more secure; less vulnerable to side attacks since the process that generates is have been purportedly verified and extensively documented.

  8. Oct 2022
    1. facilitate conflict resolution, improve decision-making, and sharpen patient and family assessment skills. 

      IMPORTANT

    2. skills can impact how you perceive yourself and others, communicate with others, cope with change and challenge, and create a culture of safety and collaboration is vital to nursing practice and leadership

      IMPORTANT

  9. Sep 2022
  10. Aug 2022
    1. If akey is lost, this invariably means that the secureddata asset is irrevocably lost

      Counterpart, be careful! If a key is lost, the secured data asset is lost

    2. Theowner of a resource is by definition the one hold-ing the private encryption keys.

      definition of "owner of a resource"

    1. 都是可以根据 RoutingKey 把消息路由到不同的队列

      direct模式下,同一个routingkey可以绑定不同的queue,这样路由器可以分别发送同样的消息到相应的两个queue中

  11. Jul 2022
    1. 4.5 Getting the right people in the right roles in support of your goal is the key to succeeding at whatever you choose to accomplish.

      4.5 Getting the right people in the right roles in support of your goal is the key to succeeding at whatever you choose to accomplish.

  12. May 2022
    1. At the time I wasa a web designer with a focus on usability and user interfaces. I executed Json's design direction for key features of the app and collaborated with him to fill in details of the concept.

    Tags

    Annotators

  13. Apr 2022
    1. Kernel is already defined by Ruby so the module cannot be autoloaded. Also, that file does not define a constant path after the path name. Therefore, Zeitwerk should not process it at all.
    1. The Hori key enters a Hori lock in such a way as to affirm your suspicion that every key you’ve ever inserted into every lock throughout your entire life was a sham. A false combination — jittery, sticky, imprecise. You realize how badly cut, forged by shoddy means, all the keys you own currently are. Using this Hori key and lock combination is similar to how you might have felt the first time you ever touched a masterfully finished piece of wood — shock at that glassy smoothness you didn’t think could be brought out from the material. The key enters. Within perfectly milled chambers, the driver pins — attenuated by precisely tensioned springs — push against the key pins as the key slides forward in the keyway. The driver pins align to a dead-straight shear line and you feel the key settle with a satisfaction of a meticulously-measured thing spooning its Platonic opposite. Then you twist. The movement of the bolt away from the frame is so smooth — the door having been hung by some god of carpentry with the accuracy of a proton collision path — that you gasp, actually gasp, at the mechanism.

      I love the visceral way Craig Mod describes these Hori key/lock mechanisms. Makes me want to go out and buy one.

    1. 9.2. Describe general cell signaling strategies and explore the different types of cell surface receptors and singling molecules.

      9.2 Key Concepts

      Chemical Signaling: * Intracellular vs. Intercellular * types of chemical signaling

      Receptors: * internal vs. surface-cell * categories of surface-cell receptors

      Ligand Molecules: * hydrophobic * water-soluble * nitric oxide (NO)

      Work Cited

      Hinic-Frlog, S., Hanley, J. and Laughton, S. (2020). Introductory Animal Physiology. Missausgua, CA: Pressbooks.

  14. Feb 2022
    1. The remaining problem should be how to declare Ruby-define methods to be 'non-block taking'. Under the current language spec, absence of '& argument' may or may not mean the method would take a block.
    1. No. 1 resource you have inherent in a professor is the latent cognitive capacity to instruct, mentor, and produce original ideas, and that we should take that resource very seriously
  15. Jan 2022
    1. Family child care (FCC) refers to regulated (licensed, certified, or registered) HBCC. Family, friend, and neighbor (FFN) care refers to HBCC that is legally exempt from licensing or other regulation, whether paid or unpaid. FFN care includes care given by grandparents, other relatives, and non-relatives. Home-based child care (HBCC) providers are a heterogeneous population of providers who offer care and education to children in their own or the child’s home. (Although we use “HBCC” throughout the report, we recognize the role providers play both caring for and educating children.) Providers’ HBCC status is fluid, and individuals’ roles may change—those who care for a few children who are related to them, whether with or without pay; those who offer care as a professional occupation and a business; those who care for children over many years; and those who care for children sporadically in response to changing family needs. We assume a variety of factors influence these patterns, which may shift over time.

      Essential knowledge for SECURE lab

    2. HBCC is the most common form of nonparental child care for infants and toddlers

      Notice the particular importance of HBCC for infants and toddlers (i.e., approximately birth to age three years).

    3. HBCC includes regulated (licensed, certified, registered) family child care (FCC) and care legally exempt from regulation (license-exempt) that is provided by family, friends, or neighbors (FFN).

      these are KEY TERMS for our project - learn these terms and acronyms: FCC and FFN are part of HBCC

    1. You have to be doing 80% of the hard work, which means making the conscious effort to avoid the design flaws that will exclude people from using your product
    1. Mabry says if you own a Hyundia or Kia, you better add extra security so you don't become the next target.

      Apparently, there is an issue with key fob security on 2020 Kia Sportage and Hyundai models.

      Also, Columbus Police and 10TV don't know how to spell Hyundai or use spell check.

  16. Dec 2021
    1. only about 1% of carbon atoms are C-13. These are the only ones picked up by this form of NMR. If you had a single molecule of ethanol, then the chances are only about 1 in 50 of there being one C-13 atom in it, and only about 1 in 10,000 of both being C-13. But you have got to remember that you will be working with a sample containing huge numbers of molecules. The instrument can pick up the magnetic effect of the C-13 nuclei in the carbon of the CH3 group and the carbon of the CH2 group even if they are in separate molecules. There's no need for them to be in the same one.

      the author believe that even though the percentage of C-13 is low, but its NMR signal can be captured.

    1. violencia de género

      «Todo acto de violencia sexista que tiene como resultado posible o real un daño físico, sexual o psíquico, incluidas las amenazas, la coerción o la privación arbitraria de libertad, ya sea que ocurra en la vida pública o en la privada».

    2. Esa “formación” del hombre, que lo conduce a una estructura de la personalidad de tipo psicopático

      No existe un perfil único de maltratador. Tampoco se trata de hombres agresivos ni de psicópatas. Nuestro estudio pone en cuestión los estereotipos relacionados hasta ahora con la conducta y los rasgos del maltratador, como puede ser el consumo de sustancias tóxicas y de alcohol, la vivencia de experiencias traumáticas en la edad infantil o los problemas psíquicos. En este último aspecto, los datos del patrón de personalidad de un grupo de maltratadores basados en el inventario clínico multiaxial Millon-II señalan a la compulsividad como rasgo más destacado de estas personas; no obstante, el percentil no supera el grado de normalidad, por lo que se descarta la posibilidad de una psicopatología.

  17. Nov 2021
    1. The Query word can be interpreted as the word for which we are calculating Attention. The Key and Value word is the word to which we are paying attention ie. how relevant is that word to the Query word.

      Finally

    1. That's not how flatpack works; the executable is hidden in a container and you need to set up the whole environment to be able to call it. Delivering a well-isolated, not-to-be-run-from-outside environment is the whole point.
  18. Sep 2021
    1. flavored vaping products

      Breathing in flavored nicotine product through a device. The device is... (need to look up)

      **Need to find a good description of a vape product

    2. Food and Drug Administration

      Important term to understand - What do they do, are they part of the government, how do they regulate things?

    1. COMPLICITY

      I have heard this term used a lot in the last four years. Even when I was unsure what the word precisely meant, I understood it to have negative connotations. OED defines complicity as, "the state of being involved with others in an illegal activity or wrongdoing." If Miller is using the term in this way than that's a pretty risky way to title his piece. It implies that the structure of academia is corrupted.

  19. Aug 2021
    1. So for each word, we create a Query vector, a Key vector, and a Value vector. These vectors are created by multiplying the embedding by three matrices that we trained during the training process.
    1. I'm going to try provide an English text example. The following is based solely on my intuitive understanding of the paper 'Attention is all you need'.

      This is also good

    2. For the word q that your eyes see in the given sentence, what is the most related word k in the sentence to understand what q is about?
    3. So basically: q = the vector representing a word K and V = your memory, thus all the words that have been generated before. Note that K and V can be the same (but don't have to). So what you do with attention is that you take your current query (word in most cases) and look in your memory for similar keys. To come up with a distribution of relevant words, the softmax function is then used.
    1. paradigmatic

      I was not sure what this term meant in this context. After looking the term up on google, the definition that seems to fit is the denotation of the relationship between a set of linguistic items that form mutually exclusive choices in particular syntactic roles.

    1. Isolation ensures that concurrent execution of transactions leaves the database in the same state that would have been obtained if the transactions were executed sequentially
  20. Jun 2021
    1. So, what problem is blockchain solving for identity if PII is not being stored on the ledger? The short answer is that blockchain provides a transparent, immutable, reliable and auditable way to address the seamless and secure exchange of cryptographic keys. To better understand this position, let us explore some foundational concepts.

      What problem is blockchain solving in the SSI stack?

      It is an immutable (often permissionless) and auditable way to address the seamless and secure exchange of cryptographic keys.

  21. May 2021
    1. Moreover, “[r]elations of power are not in a position of exteriority with respect to other types of relationships (economic processes, knowledge rela­tionships, sexual relations), but are immanent in the latter.” Such claims played some role in the rise of a mode of analysis that vastly expands the range of what can be treated as political.

      power is everywhere; in every relationship; this is why the range of what is "political" is actually quite vast

  22. Apr 2021
    1. the concentration is calculated based on the fraction of droplets that is empty (that is, the fraction that does not contain any target DNA).
  23. Mar 2021
    1. Personal and professional development will follow andultimately these very same characteristics and approaches will naturally transfer intopractice and in direct contact with young people

      what we learn when becoming youth workers is transferable to our practice, reflective of the necessity of openness and transparency. when we learn the value of these skills, we can demonstrate their value to the young people, and continue the learning journey together

    2. the better a student/youth worker knows himself/herself the more likely he/shewill be able to help others know themselves;

      the quality of training and the development of skills will impact on the growth of the young person

    Tags

    Annotators

    1. Am sa caabi!

      Prends ta clé!

      am -- used in the imperative: "HERE!", etc. (it's the same word as "to have").

      sa -- your.

      caabi ji -- (Portuguese) key. 🔑

  24. Feb 2021
    1. The key phrase here is “children of a grid container.” The specification defines the creation of a grid on the parent element, which child items can be positioned into. It doesn’t define any styling of that grid, not even going as far as to implement something like the column-rule property we have in Multi-column Layout. We style the child items, and not the grid itself, which leaves us needing to have an element of some sort to apply that style to.
    1. The Black Panther Party chose the name because the panther is known to be an animal that never makes an unprovoked attack, but will defend itself vehemently when attacked, and this was symbolic of what the Black Panther Party for Self-Defense stood for
    2. black unity and black autonomy were at the core of its platform and program
  25. Jan 2021
    1. Alice and Bob can then use a key-derivation function that includes K, K_A, and K_B to derive a symmetric key.

      public keys included in key derivation.

  26. Dec 2020
    1. Universal Grammar (

      The theoretical or hypothetical system of categories, operations, and principles shared by all human languages and considered to be innate, as defined by Chomsky.

    2. syntact

      regarding the formation of sentences

  27. Nov 2020
    1. awk '{print $2}' /etc/ssh/ssh_host_ed25519_key.pub | base64 -d | sha256sum -b | sed 's/ .*$//' | xxd -r -p | base64 | sed 's/.//44g' | awk '{print "SHA256:"$1}'
    1. Assignments to $-prefixed variables require that the variable be a writable store, and will result in a call to the store's .set method.
  28. Oct 2020
    1. Key learnings from this guideYour goal is not to foster the writing habit. Your goal is to fall so in love with ideas that you can’t not write about them. Find your objective and your motivation.Don't fully think through your ideas before writing. It's inefficient. The best way to think is by writing. It compels your brain to connect the dots.Avoid guessing what readers want. Instead, be a proxy: Selfishly entertain and surprise yourself, and you'll entertain and surprise many of them too.Your writing is clear once your thoughts are self-evident.Your writing is succinct once everything unimportant is removed.Your writing is intriguing once the average reader effortlessly makes it to the end. A hook, peak, and satisfying ending are your trifecta of intrigue.Treat feedback as a science. Measure your scores and iterate. Remember that the best feedback often comes from you with fresh eyes.Rewriting your thoughts to be clear, succinct, and intriguing is a lot of work. You won't love writing until you find a way to love rewriting. Make a game out of it.
    1. The readable store takes a function as a second argument which has its own internal set method, allowing us to wrap any api, like Xstate or Redux that has its own built in sub­scrip­tion model but with a slightly different api.
    1. Question: 246 years of disorentation. what is the startsof this disorentation?

      • education system in U.S is only MADE for white ppl --> BLACK ppl confuse; wanting to know more of their history.
    1. marking.

      "Whenever a person delineates a cultural boundary around a particular cultural space in human time"

    2. Afrocentricity becomes a revolutionary idea because it studies ideas, concepts, events, personalities, and political and economic processes from a standpoint of black people as subjects and not as objects, basing all knowledge on the authentic interrogation of location.

      Basically afrocen. Amer. history in the black POV

  29. Sep 2020
    1. Most simple example: <script> import ChildComponent from './Child.svelte'; </script> <style> .class-to-add { background-color: tomato; } </style> <ChildComponent class="class-to-add" /> ...compiles to CSS without the class-to-add declaration, as svelte currently does not recognize the class name as being used. I'd expect class-to-add is bundled with all nested style declarations class-to-add is passed to ChildComponent as class-to-add svelte-HASH This looks like a bug / missing feature to me.
    1. Reactive statements run immediately before the component updates, whenever the values that they depend on have changed.
  30. Aug 2020
    1. only the signals of the hydrogens that are in closecontact to the protein (e5 Å) and receive magnetization transfer

      2 factors lead to saturation transfer: 1. close in space 2. receive magnetization transfer

    Tags

    Annotators

    1. Now, when the user interacts with the keypad, the value of pin in the parent component is immediately updated.

      bind a value to a prop

  31. Jul 2020
    1. There is a simple mathematical relationship between the fraction of droplets that are unoccupied (black bar) and the concentration of target molecules.
    2. Some droplets are lost in transfer steps and others are eliminated by the stringent metrics applied by QuantaSoft Software as the droplets pass through the Droplet Reader, resulting ultimately in data from 12,000–16,000 droplets being used in subsequent concentration calculations
    1. prevent its disclosure to any person not authorized to create the subscriber's digital signature

      So the signature can be used by another entity to create the digital signature if authorized beforehand.

      So if there is a statement that "I authorize [organization] to create a cryptographic key-pair on my behalf, and create the digital signature."

    1. compressed public keypk2={bi t,(t1,t2,t3)∈(Z2e2)3,A∈Fp2,ent_bi t,r∈Z256}
    1. Partitioning the sample into small containers results in a statistical distribu-tion of targets
    2. purifying the target of interest from interfering compounds.
  32. Jun 2020
    1. The bug won’t be fixed today…and by next week, I’ll have forgotten about it - but some time in the future, before our software “goes gold” and gets shipped out to the public - we’ll search through the entire million lines of software for the word “FIXME” - which is unlikely to appear in any other context BECAUSE it’s not a real word!

      BECAUSE it’s not a real word

    1. The necessity ofskRbeing secure for sender authentication is due to HPKEbeing vulnerable to key-compromise impersonation.
    1. In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.
    1. inhibiting both full-length AR andAR splice variants lacking LBD.

      inhibit both FL and ARv7

    Tags

    Annotators

  33. May 2020
    1. export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client"
    2. if [ -z "${DOCKER_HOST:-}" ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
    1. if [ -n "${DOCKER_HOST:-}" ] && _should_tls; then export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" fi
    2. if [ -z "${DOCKER_HOST:-}" ] && [ ! -S /var/run/docker.sock ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
    1. (Thus, for these curves, the cofactor is always h = 1.)

      This means there is no need to check if the point is in the correct subgroup.

    1. It may be the case that several sufficient conditions, when taken together, constitute a single necessary condition (i.e., individually sufficient and jointly necessary)
    1. It’s useful to remember that under GDPR regulations consent is not the ONLY reason that an organization can process user data; it is only one of the “Lawful Bases”, therefore companies can apply other lawful (within the scope of GDPR) bases for data processing activity. However, there will always be data processing activities where consent is the only or best option.
    1. I believe that beginning to distribute tools that patch Firefox and give back power to users and allow them to install unsigned extensions is necessary when an organization is taking away our rights without giving us a compelling reason for doing so.
    2. I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
  34. projects.invisionapp.com projects.invisionapp.com
    1. The fact that you can use single character keys without modifiers to invoke functions such as Comment Mode (C) is an example of a violation of a violation of the WCAG 2.1 Success Criterion, 2.1.4 Character Key Shortcuts.

  35. Apr 2020
    1. So there's a lot of stuff getting hacked and a lot of credentials floating around the place, but then what? I mean what do evil-minded people do with all those email addresses and passwords? Among other things, they attempt to break into accounts on totally unrelated websites
  36. Mar 2020
    1. Designers using these curves should be aware that for each public key, there are several publicly computable public keys that are equivalent to it, i.e., they produce the same shared secrets. Thus using a public key as an identifier and knowledge of a shared secret as proof of ownership (without including the public keys in the key derivation) might lead to subtle vulnerabilities.
    2. Protocol designers using Diffie-Hellman over the curves defined in this document must not assume "contributory behaviour". Specially, contributory behaviour means that both parties' private keys contribute to the resulting shared key. Since curve25519 and curve448 have cofactors of 8 and 4 (respectively), an input point of small order will eliminate any contribution from the other party's private key. This situation can be detected by checking for the all- zero output, which implementations MAY do, as specified in Section 6. However, a large number of existing implementations do not do this.
    3. The check for the all-zero value results from the fact that the X25519 function produces that value if it operates on an input corresponding to a point with small order, where the order divides the cofactor of the curve (see Section 7).
    4. Both MAY check, without leaking extra information about the value of K, whether K is the all-zero value and abort if so (see below).
    1. n

      n is the order of the subgroup and n is prime

    2. an ECC key-establishment scheme requires the use of public keys that are affine elliptic-curve points chosen from a specific cyclic subgroup with prime order n

      n is the order of the subgroup and n is prime

    3. 5.6.2.3.3ECC Full Public-Key Validation Routine
    4. The recipient performs a successful full public-key validation of the received public key (see Sections 5.6.2.3.1for FFCdomain parameters andSection5.6.2.3.3for ECCdomain parameters).
    5. Assurance of public-key validity –assurance that the public key of the other party (i.e., the claimed owner of the public key) has the (unique) correct representation for a non-identity element of the correct cryptographic subgroup, as determined by the
    1. 5.6.2.3.2ECC Full Public-Key Validation Routine
    2. The recipient performs a successful full public-key validation of the received public key (see Sections 5.6.2.3.1 and 5.6.2.3.2).