Omary, A. (2020). The COVID-19 Pandemic Mental Health Crisis Ahead [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/xju6y
- Jun 2020
-
psyarxiv.com psyarxiv.com
-
www.windowscentral.com www.windowscentral.com
-
but it launched with a plethora of issues that resulted in users rejecting it early on. Edge has since struggled to gain traction, thanks to its continued instability and lack of mindshare, from users and web developers.
-
-
docs.gitlab.com docs.gitlab.com
-
You can add a table of contents to a Markdown file, wiki page, or issue/merge request description, by adding the tag [[_TOC_]] on its own line. It will appear as an unordered list that links to the various headers.
-
-
www.engadget.com www.engadget.com
-
The app was still stuck in beta testing years after its debut, and the creators had to ignore bug reports and feature requests due to the limited resources.
-
-
signal.org signal.org
-
-
The EARN IT act turns Section 230 protection into a hypocritical bargaining chip. At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesn’t comply with these recommendations will lose their Section 230 protection.
-
Broadly speaking, Section 230 of the Communications Decency Act protects online platforms in the United States from legal liability for the behavior of their users. In the absence of this protection, many of the apps and services that are critical to the way the internet functions today may have never been created in the first place – or they couldn’t have been created in America.
-
-
-
A year’s worth of cajoling back and forth has ultimately resulted in the EARN-IT bill wending its way through the U.S. system, a bill that, if passed, would see messaging services become legally responsible for the content on their platforms. While not mandating backdoors, per se, without some form of probes into message content, the argument runs that the punitive risks become unsurvivable.
-
there’s a bill tiptoeing through the U.S. Congress that could inflict the backdoor virus that law enforcement agencies have been trying to inflict on encryption for years... The choice for tech companies comes down to weakening their own encryption and endangering the privacy and security of all their users, or foregoing protections and potentially facing liability in a wave of lawsuits.
-
-
www.forbes.com www.forbes.com
-
Once the platforms introduce backdoors, those arguing against such a move say, bad guys will inevitably steal the keys. Lawmakers have been clever. No mention of backdoors at all in the proposed legislation or the need to break encryption. If you transmit illegal or dangerous content, they argue, you will be held responsible. You decide how to do that. Clearly there are no options to some form of backdoor.
-
-
www.forbes.com www.forbes.com
-
Such is the security of this architecture, that it has prompted law enforcement agencies around the world to complain that they now cannot access a user’s messages, even with a warrant. There is no backdoor—the only option is to compromise one of the endpoints and access messages in their decrypted state.
-
-
www.forbes.com www.forbes.com
-
As EFF has warned, “undermining free speech and privacy is not the way to protect children.”
-
Despite its opposition, EARN-IT is the clearest threat yet to end-to-end encryption, given this clever twist in pushing the onus onto the platforms to avoid transmitting illegal content, rather than mandating a lawful interception approach.
-
“not only jeopardizes privacy and threatens the right to free expression, but also fails to effectively protect children from online exploitation.”
-
Tiring of the privacy and safety debate, those behind EARN-IT have proposed making the platforms responsible for the content they transmit, encrypted or not. This would mean, as explained by Sophos, that tech companies “either weaken their own encryption and endanger the privacy and security of all their users, or forego protections and potentially face liability in a wave of lawsuits.”
-
-
en.wikipedia.org en.wikipedia.org
-
The Digital Millennium Copyright Act (DMCA) has notable safe-harbor provisions which protect Internet service providers from the consequences of their users' actions. (Similarly, the EU directive on electronic commerce provides a similar provision of "mere conduit" which, while not exactly the same, serves much the same function as the DMCA safe harbor in this instance.)
-
-
news.sky.com news.sky.com
-
The US president has claimed the social media platform is "interfering in the 2020 presidential election" and "completely stifling FREE SPEECH" after it added a warning to two of his tweets on Tuesday.
-
-
-
All Telegram apps are open sourced and the company itself is not for profit, however, their backend is not open source which has raised some eyebrows.
-
-
telegra.ph telegra.ph
-
Unlike Telegram, WhatsApp is not open source, so there’s no way for security researchers to easily check whether there are backdoors in its code. Not only does WhatsApp not publish its code, they do the exact opposite: WhatsApp deliberately obfuscates their apps’ binaries to make sure no one is able to study them thoroughly.
-
-
www.ons.gov.uk www.ons.gov.uk
-
Coronavirus (COVID-19) Infection Survey pilot—Office for National Statistics. (n.d.). Retrieved June 2, 2020, from https://www.ons.gov.uk/peoplepopulationandcommunity/healthandsocialcare/conditionsanddiseases/bulletins/coronaviruscovid19infectionsurveypilot/england14may2020
Tags
- England
- age
- household
- bulletin
- risk of infection
- survey
- infection rate
- community
- likelihood
- UK
- COVID-19
- testing
- lang:en
- is:report
Annotators
URL
-
-
zoonosen.charite.de zoonosen.charite.de
-
Jones, T.C., Mühlemann, B., Veith, T., Zuchowski, M., Hofmann, J., Stein, A., Edelmann, A., Corman, V.M., & Drosten, C. (2020). An analysis of SARS-CoV-2 viral load by patient age. Charité Berlin. https://zoonosen.charite.de/fileadmin/user_upload/microsites/m_cc05/virologie-ccm/dateien_upload/Weitere_Dateien/analysis-of-SARS-CoV-2-viral-load-by-patient-age.pdf
-
-
www.theguardian.com www.theguardian.com
-
McKie, R., Editor, S., Helm, and T., & Editor, P. (2020, May 17). Scientists divided over coronavirus risk to children if schools reopen. The Observer. https://www.theguardian.com/world/2020/may/17/scientists-divided-over-coronavirus-risk-to-children-if-schools-reopen
-
-
psyarxiv.com psyarxiv.com
-
McPhetres, Jonathon. ‘Preregistration Is for Planning’, 1 June 2020. https://doi.org/10.31234/osf.io/cj5mh.
-
- May 2020
-
psyarxiv.com psyarxiv.com
-
Prinzing, M., De Freitas, J., & Fredrickson, B. (2020). The lay concept of a meaningful life: The role of subjective and objective factors in attributions of meaning [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/6sx4t
-
-
www.thelancet.com www.thelancet.com
-
Perkins, Gavin D., and Keith Couper. ‘COVID-19: Long-Term Effects on the Community Response to Cardiac Arrest?’ The Lancet Public Health 0, no. 0 (27 May 2020). https://doi.org/10.1016/S2468-2667(20)30134-1.
-
-
-
Battiston, P., Kashyap, R., & Rotondi, V. (2020, May 11). Trust in science and experts during the COVID-19 outbreak in Italy. https://doi.org/10.31235/osf.io/5tch8
-
-
www.theguardian.com www.theguardian.com
-
Boseley, S. (2020, May 12). Millions with health conditions at risk from Covid-19 “if forced back to work.” The Guardian. https://www.theguardian.com/world/2020/may/12/millions-with-health-conditions-at-risk-from-covid-19-if-forced-back-to-work
-
-
docs.gitlab.com docs.gitlab.com
-
To conjoin if, changes, and exists clauses with an AND, use them in the same rule.
-
-
kellysutton.com kellysutton.com
-
www.cs.utexas.edu www.cs.utexas.edu
-
The task of "making a thing satisfying our needs" as a single responsibility is split into two parts "stating the properties of a thing, by virtue of which it would satisfy our needs" and "making a thing guaranteed to have the stated properties". Business data processing systems are sufficiently complicated to require such a separation of concerns and the suggestion that in that part of the computing world "scientific thought is a non-applicable luxury" puts the cart before the horse: the mess they are in has been caused by too much unscientific thought.
Dijkstra suggested that instead of concerning ourselves with a software system that meets the user's needs, we should first separate our concerns.
We should first concern ourselves with the user's needs and draw up careful specifications – properties to which the system should adhere should it satisfy the user's needs.
With those specifications in hand we can concern ourselves with making a system guaranteed to have stated properties.
The problem with this thinking, which the software industry would later discover, is that a user's needs cannot be accurately or completely determined before building the system. We learn more about what is needed by the process of building.
This is an instance of the [[Separation of concerns]] not working.
This is also why the industry has settled on a technique to build iteratively (Agile), always leaving the option open to change course.
-
Some time ago I visited the computing center of a large research laboratory where they were expecting new computing equipment of such a radically different architecture, that my colleagues had concluded that a new programming language was needed for it if the potential concurrency were to be exploited to any appreciable degree. But they got their language design never started because they felt that their product should be so much like FORTRAN that the casual user would hardly notice the difference "for otherwise our users won't accept it". They circumvented the problem of explaining to their user community how the new equipment could be used at best advantage by failing to discover what they should explain. It was a rather depressing visit.... The proper technique is clearly to postpone the concerns for general acceptance until you have reached a result of such a quality that it deserves acceptance. It is the significance of your message that should justify the care that you give to its presentation, it may be its "unusualness" that makes extra care necessary.
When you've developed an idea, you will typically want to communicate that idea so that it can be understood and used more generally. Dijkstra calls this reaching "general acceptance".
To do so, you must communicate the idea in a way so that it can be properly understood and used. For certain ideas this becomes a challenging problem in and of itself.
Many forgo this challenge, and instead of figuring out what new language they need to invent to most accurately communicate the idea, they use legacy language and end up communicating their idea less effectively, in pursuit of general acceptance.
Dijkstra says that the proper way of dealing with this dilemma is to separate your concerns. You separate your concern of the solution from the concern of communicating the solution.
When you've reached a solution that is of such high quality that it deserves communicating – and only then – do you concern yourself with its presentation.
-
-
stackoverflow.com stackoverflow.com
-
using SSH is likely the best approach because personal access tokens have account level access
personal access tokens have account level access ... which is more access (possibly access to 10s of unrelated projects or even groups) than we'd like to give to our deploy script!
-
-
about.gitlab.com about.gitlab.com
-
In some contexts, "ops" refers to operators. Operators were the counterparts to Developers represented in the original coining of the term DevOps.
I have always believed the Ops was short for Operations, not Operators.
https://en.wikipedia.org/wiki/DevOps even confirms that belief.
-
-
www.thelancet.com www.thelancet.com
-
Jordan, R. E., & Adab, P. (2020). Who is most likely to be infected with SARS-CoV-2? The Lancet Infectious Diseases, S1473309920303959. https://doi.org/10.1016/S1473-3099(20)30395-9
-
-
www.thelancet.com www.thelancet.com
-
Liu, Y., Eggo, R. M., & Kucharski, A. J. (2020). Secondary attack rate and superspreading events for SARS-CoV-2. The Lancet, 395(10227), e47. https://doi.org/10.1016/S0140-6736(20)30462-1
-
-
about.gitlab.com about.gitlab.com
-
For the past few years, we've run GitLab.com as our free SaaS offering, featuring unlimited public and private repositories, unlimited contributors, and access to key features, like issue tracking, code review, CI, and wikis. None of those things are changing! We're committed to providing an integrated solution that supports the entire software development lifecycle at a price where everyone can contribute. So what's changing? Over time, the usage of GitLab.com has grown significantly to the point where we now have over two million projects hosted on GitLab.com and have seen a 16x increase in CI usage over the last year.
-
-
www.catb.org www.catb.org
-
In interface design, always do the least surprising thing
-
-
about.gitlab.com about.gitlab.com
-
With a single file in the repository, everyone with read access can see the contents, making it much more inviting to improve and review the build scripts.
-
-
secrecyresearch.com secrecyresearch.com
-
Beyer-Hunt, S., Carter, J., Goh, A., Li, N., & Natamanya, S.M. (2020, May 14) COVID-19 and the Politics of Knowledge: An Issue and Media Source Primer. SPIN. https://secrecyresearch.com/2020/05/14/covid19-spin-primer/
-
-
www.theatlantic.com www.theatlantic.com
-
manically inventive figure—really brilliant in many ways—with no particular training in design, but an intense interest in how people work.
-
-
www.bbc.com www.bbc.com
-
"At the company's headquarters they created the bureaucracy to process information and make decisions about things that were taking place thousands of miles away."
-
-
www.typescriptlang.org www.typescriptlang.org
-
This file that really does nothing but manage other project files is often called a “solution” in some environments.
-
-
en.wikipedia.org en.wikipedia.org
-
presentation was nearly always considered separately, rather than being embedded in the markup itself
-
This concept is variously referred to in markup circles as the rule of separation of presentation and content, separation of content and style, or of separation of semantics and presentation.
-
First proposed as a somewhat less unwieldy catchall phrase to describe the delicate art of "separating document structure and contents from semantics, presentation, and behavior"
-
-
www.bamboohr.com www.bamboohr.com
-
A few of our 17,000+ customers
-
-
www.collinsdictionary.com www.collinsdictionary.com
-
a new generation of dictionaries that were based on real examples of English - the type of English that people speak and write every day
-
-
-
Nigam, S. (2020). COVID-19: INDIA’S RESPONSE TO DOMESTIC VIOLENCE NEEDS RETHINKING. https://doi.org/10.31234/osf.io/4bpny
-
-
letsencrypt.org letsencrypt.org
-
Allowing port 80 doesn’t introduce a larger attack surface on your server, because requests on port 80 are generally served by the same software that runs on port 443.
-
-
en.wikipedia.org en.wikipedia.org
-
Collective agency occurs when people act together, such as a social movement
-
cooperation between two subjects with a mutual feeling of control is what James M. Dow, Associate Professor of Philosophy at Hendrix College, defines as "joint agency."
-
Individual agency is when a person acts on his/her own behalf
-
describes three types of agency: individual, proxy, and collective
-
-
www.digital-democracy.org www.digital-democracy.org
-
The words that you have not spoken; you are their owner. The words you have spoken, they own you.
-
-
www.darpa.mil www.darpa.mil
-
Moreover, common search practices miss information in the deep web—the parts of the web not indexed by standard commercial search engines
-
-
www.digitalocean.com www.digitalocean.com
-
We believe in the power of open source software. That’s why we participate in, contribute to, and support the open source community so strongly.
-
-
developers.google.com developers.google.com
-
You can enable an app-level opt out flag that will disable Google Analytics across the entire app.
-
-
ltcwrk.com ltcwrk.com
-
Table of Contents
The ideas included here are just a start. The hope is that the community helps add, refine, even remove ideas that don't meet our bar. If you see some ideas or disciplines that you think are missing, let us know! https://ltcwrk.com/contact/
Tags
Annotators
URL
-
-
github.com github.com
-
Sites Built with React-Static
-
-
maxdemarzi.com maxdemarzi.com
-
twitter.com twitter.com
-
Roko Mijic - Twitter
-
-
www.ncbi.nlm.nih.gov www.ncbi.nlm.nih.gov
-
Bi, Q., Wu, Y., Mei, S., Ye, C., Zou, X., Zhang, Z., Liu, X., Wei, L., Truelove, S. A., Zhang, T., Gao, W., Cheng, C., Tang, X., Wu, X., Wu, Y., Sun, B., Huang, S., Sun, Y., Zhang, J., … Feng, T. (2020). Epidemiology and transmission of COVID-19 in 391 cases and 1286 of their close contacts in Shenzhen, China: A retrospective cohort study. The Lancet Infectious Diseases, S1473309920302875. https://doi.org/10.1016/S1473-3099(20)30287-5
-
-
pubmed.ncbi.nlm.nih.gov pubmed.ncbi.nlm.nih.gov
-
Yi, C., Aihong, W., Keqin, D., Haibo, W., Jianmei, W., Hongbo, S., Sijia,W., & Guozhang, X. (2020) The epidemiological characteristics of infection in close contacts of COVID-19 in Ningbo city. Chinese Journal of Epidemiology. Vol. 41 Issue (0):0-0. http://dx.doi.org/10.3760/cma.j.cn112338-20200304-00251
-
-
-
Database of public health guidance on COVID-19. (2020 May 14). HIQA. https://www.hiqa.ie/reports-and-publications/health-technology-assessment/covid-19-public-health-guidance-database
-
-
www.health.gov.au www.health.gov.au
-
Coronavirus (COVID-19) in Australia – Pandemic Health Intelligence Plan [Text]. (2020, May 6). Australian Government Department of Health. https://www.health.gov.au//resources/publications/coronavirus-covid-19-in-australia-pandemic-health-intelligence-plan
-
-
about.gitlab.com about.gitlab.com
-
Out of Scope The following details what is outside of the scope of support for GitLab.com customers with a subscription.
-
The GitLab.com support team does offer support for: Account specific issues (unable to log in, GDPR, etc.) Broken features/states for specific users or repositories Issues with GitLab.com availability
-
Out of Scope The following details what is outside of the scope of support for self-managed instances with a license.
-
-
support.gitlab.com support.gitlab.com
-
Community Forum For free and trial users, or if the question is out of scope.
-
-
gitlab.com gitlab.com
-
This also ties in the "Single Source Of Truth", where even if I craft descriptive commit messages I will probably have to describe what I did in the MR comments anyways, so that feels like duplicate work.
-
I think this goes against the Keep It Simple mentality and the Low Level Of Shame that we should have when we contribute.
-
-
gitlab.com gitlab.com
-
Code Owners allows for a version controlled single source of truth file outlining the exact GitLab users or groups that own certain files or paths in a repository.
-
-
www.osano.com www.osano.com
-
quantum blockchain
Do they really use a quantum blockchain? What exactly do they mean by that? Probably just a buzzword they're using to attract interest but aren't actually meaning literally.
-
Did the marketing team create a new landing page that isn't searchable? Osano is aware of hidden pages and keeps you in the loop about what is loaded where – everywhere on your site.
How would it "know" about hidden pages unless the site owner told them about their existence? (And if that is the case, how is this anything that Osano can claim as a feature or something that they do?) If it is truly hidden, then a conventional bot/spider wouldn't find it by following links.
-
-
-
Most web browsers are set by default to protect your privacy unless you opt for tracking yourself. For example, Internet Explorer automatically enables its “Do Not Track” option and Google Chrome blocks any 3rd-party cookies by default.
-
-
www.grammarly.com www.grammarly.com
-
In other places, such as Great Britain and Canada, labelled is a more common spelling than labeled.
-
-
onlinelibrary.wiley.com onlinelibrary.wiley.com
-
Sood, L., & Sood, V. (2020). Being African American and Rural: A Double Jeopardy from Covid‐19. The Journal of Rural Health, jrh.12459. https://doi.org/10.1111/jrh.12459
-
-
onlinelibrary.wiley.com onlinelibrary.wiley.com
-
Zahnd, W. E. (2020). The COVID‐19 Pandemic Illuminates Persistent and Emerging Disparities among Rural Black Populations. The Journal of Rural Health, jrh.12460. https://doi.org/10.1111/jrh.12460
Tags
- social determinants of health
- black people
- demographics
- is:article
- health equity
- rural health
- racial disparity
- infection rate
- USA
- COVID-19
- African American
- inadequately prepared
- testing
- outbreak
- death rate
- inequality
- healthcare
- internet
- hospital
- telehealth
- access to care
- screening
- lang:en
Annotators
URL
-
-
developers.google.com developers.google.com
-
Although it can minimize the overhead of third-party tags, it also makes it trivial for anyone with credentials to add costly tags.
-
A "tag" is a snippet of code that allows digital marketing teams to collect data, set cookies or integrate third-party content like social media widgets into a site.
This is a bad re-purposing of the word "tag", which already has specific meanings in computing.
Why do we need a new word for this? Why not just call it a "script" or "code snippet"?
-
-
weather.com weather.com
-
These options have almost deceptively similar wordings, with only subtle difference that is too hard to spot at a glance (takes detailed comparison, which is fatiguing for a user):
- can use your browser’s information for providing advertising services for this website and for their own purposes.
- cannot use your browser’s information for purposes other than providing advertising services for this website.
If you rewrite them to use consistent, easy-to-compare wording, then you can see the difference a little easier:
- can use your browser’s information for providing advertising services for this website and for their own purposes.
- can use your browser’s information for providing advertising services for this website <del>and for their own purposes</del>.
Standard Advertising Settings
This means our ad partners can use your browser’s information for providing advertising services for this website and for their own purposes.
Do Not Share My Information other than for ads on this website
This means that our ad partners cannot use your browser’s information for purposes other than providing advertising services for this website.
-
-
www.britannica.com www.britannica.com
-
Taxonomy, in a broad sense the science of classification, but more strictly the classification of living and extinct organisms—i.e., biological classification.
I don't think the "but more strictly" part is strictly accurate.
Wikipedia authors confirm what I already believed to be true: that the general sense of the word is just as valid/extant/used/common as the sense that is specific to biology:
https://en.wikipedia.org/wiki/Taxonomy_(general) https://en.wikipedia.org/wiki/Taxonomy_(biology)
-
-
www.iubenda.com www.iubenda.com
-
The GDPR permits data transfers of EU resident data outside of the European Economic Area (EEA) only when in compliance with set conditions.
-
In order to comply with privacy laws, especially the GDPR, companies need to store proof of consent so that they can demonstrate that consent was collected. These records must show: when consent was provided;who provided the consent;what their preferences were at the time of the collection;which legal or privacy notice they were presented with at the time of the consent collection;which consent collection form they were presented with at the time of the collection.
-
Because consent under the GDPR is such an important issue, it’s mandatory that you keep clear records and that you’re able to demonstrate that the user has given consent; should problems arise, the burden of proof lies with the data controller, so keeping accurate records is vital.
-
Keeping comprehensive records that include a user ID and the data submitted together with a timestamp. You also keep a copy of the version of the data-capture form and any other relevant documents in use on that date.
-
they’ve contested its accuracy
-
Territorial point of view
-
-
www.dataprotection.ie www.dataprotection.ie
-
www.quora.com www.quora.com
-
Customizability is a popular word that arose of jargon in software and computer related circles . It is not yet a formally recognized and would not be correct utilized it is not yet a formally recognized and would not be correct utilized in formal writing outside of its common reference to the flexibility of a design and it's ability to be altered to fit the user.
-
-
www.netlifycms.org www.netlifycms.org
-
The folks at Netlify created Netlify CMS to fill a gap in the static site generation pipeline. There were some great proprietary headless CMS options, but no real contenders that were open source and extensible—that could turn into a community-built ecosystem like WordPress or Drupal. For that reason, Netlify CMS is made to be community-driven, and has never been locked to the Netlify platform (despite the name).
Kind of an unfortunate name...
-
-
www.civicuk.com www.civicuk.com
-
after nearly 10 years of continuous improvement
Not necessarily a good or favorable thing. It might actually be preferable to pick a younger software product that doesn't have the baggage of previous architectural decisions to slow them down. Newer projects can benefit from both (1) the mistakes of previously-originated projects and (2) the knowledge of what technologies/paradigms are popular today; they may therefore be more agile and better able to create something that fits with the current state of the art, as opposite to the state of the art from 10 years ago (which, as we all know, was much different: before the popularity of GraphQL, React, headless CMS, for example).
Older projects may have more technical debt and have more legacy technologies/paradigms/integrations/decisions that they now have the burden of supporting.
-
open source
So open-source that there is no link to the source code and a web search for this product did not reveal where the source code is hosted.
They're obviously using this term merely as a marketing term without respect for the actual meaning/principles of open source.
-
-
en.wikipedia.org en.wikipedia.org
-
"linked data" can and should be a very general term referring to any structured data that is interlinked/interconnected.
It looks like most of this article describes it in that general sense, but sometimes it talks about URIs and such as if they are a necessary attribute of linked data, when that would only apply to Web-connected linked data. What about, for example, linked data that links to each other through some other convention such as just a "type" and "ID"? Maybe that shouldn't be considered linked data if it is too locally scoped? But that topic and distinction should be explored/discussed further...
I love its application to web technologies, but I wish there were a distinct term for that application ("linked web data"?) so it could be clearer from reading the word whether you meant general case or not. May not be a problem in practice. We shall see.
Granted/hopefully most use of linked data is in the context of the Web, so that the links are universal / globally scoped, etc.
-
-
about.gitlab.com about.gitlab.com
-
This change was made because GitLab License Management is now renamed to GitLab License Compliance. After review with users and analysts, we determined that this new name better indicates what the feature is for, aligns with existing market terminology, and reduces confusion with GitLab subscription licensing features.
-
-
-
Dunn, C. G., Kenney, E., Fleischhacker, S. E., & Bleich, S. N. (2020). Feeding Low-Income Children during the Covid-19 Pandemic. New England Journal of Medicine, 382(18), e40. https://doi.org/10.1056/NEJMp2005638
Tags
- children
- solution
- low-income
- social distancing
- is:article
- health effect
- National School Lunch Program
- federal aid
- adaptation
- School Breakfast Program
- USA
- financial assistance
- COVID-19
- psychological distress
- funding
- government
- transmission reduction
- federal nutrition
- food
- access
- risk of infection
- lang:en
- food insecurity
Annotators
URL
-
-
-
Pinto, S. F., & Ferreira, R. S. (2020). Analyzing course programmes using complex networks. ArXiv:2005.00906 [Physics]. http://arxiv.org/abs/2005.00906
-
-
www.economicmodeling.com www.economicmodeling.com
-
www.zillow.com www.zillow.com
-
www.nma.art www.nma.art
-
Thickness of the neck
However you represent the head, whether it is relatively simply yet characteristic, or incredibly refined, you can now identify the start of the neck from the chin. The digastric plane is the bottom plane, it gives the head thickness. It will be useful when drawing the head from other angles - the biggest hurdles is working in a flat 2d plane while seeking to depict volume.
The gesture from the chin to the bottom of the neck is curved and downward. It is better to make the neck a little too long than too short. You then come from the bottom of the skull, the key here will be not to make the back of the neck too skinny.
Notice that the neck starts very low in the front and very high in the back. Think of your shirt collars, it sits high in the back and low at the front.
-
-
stackoverflow.com stackoverflow.com
-
Sure, anti-spam measures such as a CAPTCHA would certainly fall under "legitimate interests". But would targeting cookies? The gotcha with reCAPTCHA is that this legitimate-interest, quite-necessary-in-today's-world feature is inextricably bundled with unwanted and unrelated Google targeting (cookiepedia.co.uk/cookies/NID) cookies (_ga, _gid for v2; NID for v3).
-
-
complianz.io complianz.io
-
A complete snapshot of the user’s browser window at that moment in time will be captured, pixel by pixel (!)
-
-
www.fastcompany.com www.fastcompany.com
-
This kind of cookie-based data collection happens elsewhere on the internet. Giant companies use it as a way to assess where their users go as they surf the web, which can then be tied into providing better targeted advertising.
-
For instance, Google’s reCaptcha cookie follows the same logic of the Facebook “like” button when it’s embedded in other websites—it gives that site some social media functionality, but it also lets Facebook know that you’re there.
-
-
en.wikipedia.org en.wikipedia.org
-
For convenience, conventions have been developed about the precedence of the logical operators, to avoid the need to write parentheses in some cases. These rules are similar to the order of operations in arithmetic. A common convention is:
-
-
en.wikipedia.org en.wikipedia.org
-
www.iubenda.com www.iubenda.com
-
Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.
Answers the question I had above: https://hyp.is/tpgdQo_4EeqPcm-PI0G2jA/www.iubenda.com/en/help/5640-email-newsletter-compliance-guide
-
It’s always best practice to either simply follow the most robust legislations or to check the local anti-spam requirements specific to where your recipients are based.
-
-
gdpr-info.eu gdpr-info.eu
-
the data subject has explicitly consented to the proposed transfer, after having been informed of the possible risks of such transfers for the data subject due to the absence of an adequacy decision and appropriate safeguards;
-
In the absence of an adequacy decision pursuant to Article 45(3), or of appropriate safeguards pursuant to Article 46, including binding corporate rules, a transfer or a set of transfers of personal data to a third country or an international organisation shall take place only on one of the following conditions:
These conditions are individually sufficient and jointly necessary (https://hyp.is/e0RRFJCfEeqwuR_MillmPA/en.wikipedia.org/wiki/Necessity_and_sufficiency).
Each of the conditions listed is a sufficient (but, by itself, not necessary) condition for legal transfer (T) of personal data to a third country or an international organisation. In other words, if any of those conditions is true, then legal transfer is also true.
On the other hand, the list of conditions (C; let C be the disjunction of the conditions a-g: a or b or c ...) are jointly necessary for legal transfer (T) to be true. That is:
- T cannot be true unless C (one of a or b or c ...) is true
- if C is false (there is not one of a or b or c ... that is true), then T is false
- T ⇒ C
- C ⇐ T
-
-
en.wikipedia.org en.wikipedia.org
-
generic-sounding term may be interpreted as something more specific than intended: I want to be able to use "data interchange" in the most general sense. But if people interpret it to mean this specific standard/protocol/whatever, I may be misunderstood.
The definition given here
is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.
limits it to things that were previously communicated on paper. But what about things for which paper was never used, like the interchange of consent and consent receipts for GDPR/privacy law compliance, etc.?
The term should be allowed to be used just as well for newer technologies/processes that had no previous roots in paper technologies.
-
-
-
it has been inferred by many that the validity of consent could degrade over time
-
Where a processing activity is necessary for the performance of a contract.
Would a terms of service agreement be considered a contract in this case? So can you just make your terms of service basically include consent or implied consent?
-
“Is consent really the most appropriate legal basis for this processing activity?” It should be taken into account that consent may not be the best choice in the following situations:
-
-
wayks.com wayks.com
-
statutory rights of withdrawal from your purchase contract
-
Tags
Annotators
URL
-
-
www.peeringdb.com www.peeringdb.com
-
-
www.kalypsomedia.com www.kalypsomedia.com
-
eu.battle.net eu.battle.net
-
www.avira.com www.avira.com
-
www.iubenda.com www.iubenda.com
-
EU law prohibits the personal data of EU citizens from being transferred outside the EU to countries which do not ensure an adequate level of protection for that data.
-
This framework serves the purpose of protecting Europeans’ personal data after the transfer to the US and correlates with GDPR requirements for Cross Boarder Data Transfers.
-
-
www.iubenda.com www.iubenda.com
-
Though not always legally required, terms & conditions (also called ToS – terms of service, terms of use, or EULA – end user license agreement) are pragmatically required
-
It’s useful to remember that under GDPR regulations consent is not the ONLY reason that an organization can process user data; it is only one of the “Lawful Bases”, therefore companies can apply other lawful (within the scope of GDPR) bases for data processing activity. However, there will always be data processing activities where consent is the only or best option.
-
-
www.iubenda.com www.iubenda.com
-
If you’re a controller based outside of the EU, you’re transferring personal data outside of the EU each time you collect data of users based within the EU. Please make sure you do so according to one of the legal bases for transfer.
Here they equate collection of personal data with transfer of personal data. But this is not very intuitive: I usually think of collection of data and transfer of data as rather different activities. It would be if we collected the data on a server in EU and then transferred all that data (via some internal process) to a server in US.
But I guess when you collect the data over the Internet from a user in a different country, the data is technically being transferred directly to your server in the US. But who is doing the transfer? I would argue that it is not me who is transferring it; it is the user who transmitted/sent the data to my app. I'm collecting it from them, but not transferring it. Collecting seems like more of a passive activity, while transfer seems like a more active activity (maybe not if it's all automated).
So if these terms are equivalent, then they should replace all instances of "transfer" with "collect". That would make it much clearer and harder to mistakenly assume this doesn't apply to oneself. Or if there is a nuanced difference between the two activities, then the differences should be explained, such as examples of when collection may occur without transfer occurring.
-
-
www.iubenda.com www.iubenda.com
-
Though not always legally required, a Terms & Conditions (T&C) document (also known as a Terms of Service, End-user license agreement or a Terms of Use agreement) is often necessary for the sake of practicality and safety. It allows you to regulate the contractual relationship between you and your users and is therefore essential for, among other things, setting the terms of use and protecting you from potential liabilities.
-
For this reason, it’s always advisable that you approach your data processing activities with the strictest applicable regulations in mind.
-
Meet specific requirements if transferring data outside of the EAA. The GDPR permits data transfers of EU resident data outside of the European Economic Area (EEA) only when in compliance with set conditions.
-
-
ico.org.uk ico.org.uk
-
the GDPR restricts transfers of personal data outside the EEA, or the protection of the GDPR, unless the rights of the individuals in respect of their personal data is protected in another way
-
-
www.itgovernance.co.uk www.itgovernance.co.uk
-
Neither encryption nor pseudonymisation require technical knowledge to implement.
-
-
www.iubenda.com www.iubenda.com
-
it buys, receives, sells, or shares the personal information of 50,000 or more consumers annually for the business’ commercial purposes. Since IP addresses fall under what is considered personal data — and “commercial purposes” simply means to advance commercial or economic interests — it is likely that any website with at least 50k unique visits per year from California falls within this scope.
-
-
-
That’s because the Google Translate extension uses some internal Google-only APIs (Mozilla also does the same thing).
-
-
-
What I don't like is how they've killed so many useful extensions without any sane method of overriding their decisions.
-
I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
-
The only reason why your workaround isn't blocked as well is because it has additional steps that don't explicitly breach Mozilla's policies. But it certainly defeats the spirit of it.
-
What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
-
They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
-
I will need to find a workaround for one of my private extensions that controls devices in my home network, and its source code cannot be uploaded to Mozilla because of my and my family's privacy.
Tags
- allowing security constraints to be bypassed by users
- trust
- bypassing technical constraints
- good point
- the owner of a device/computer should have freedom to use it however they wish
- empowering people
- software freedom
- censorship
- Mozilla
- trade-offs
- balance
- balance of power
- security
- key point
- digital rights
- good example
- freedom of user to override specific decision of an authority/vendor (software)
- in the spirit of the law
- privacy
- empowering individual users
- Orwellian
Annotators
URL
-
-
extensionworkshop.com extensionworkshop.com
-
potentially dangerous APIs may only be used in ways that are demonstrably safe, and code within add-ons that cannot be verified as behaving safely and correctly may need to be refactored
-
If the add-on is a fork of another add-on, the name must clearly distinguish it from the original and provide a significant difference in functionality and/or code.
-
-
github.com github.com
-
Apparently Firefox does have translation built-in, it's just not enabled due to lack of usage agreement / API keys. https://hg.mozilla.org/mozilla-central/rev/a3eb8e502006
-
Thank you for letting me know about this move by Google. Definitely something to watch. While I agree with Google's position from an end user experience perspective, it unfortunately puts Firefox at a further disadvantage since Mozilla does not have its own language translation initiatives.
-
Mozilla does not permit extensions distributed through https://addons.mozilla.org/ to load external scripts. Mozilla does allow extensions to be externally distributed, but https://addons.mozilla.org/ is how most people discover extensions. The are still concerns: Google and Microsoft do not grant permission for others to distribute their "widget" scripts. Google's and Microsoft's "widget" scripts are minified. This prevents Mozilla's reviewers from being able to easily evaluate the code that is being distributed. Mozilla can reject an extension for this. Even if an extension author self-distributes, Mozilla can request the source code for the extension and halt its distribution for the same reason.
Maybe not technically a catch-22/chicken-and-egg problem, but what is a better name for this logical/dependency problem?
Tags
- Firefox
- security
- proprietary hosted services as a competitive advantage
- catch-22/chicken-and-egg problem
- self-hosting JavaScript/etc. assets instead of loading from external host
- use of proprietary hosted services
- translation
- annoying restrictions
- security: unobfuscated source code
- problems
- disadvantages/drawbacks/cons
- discontinued products/services
- competition
- depending on assets from an external host
Annotators
URL
-
-
bugzilla.mozilla.org bugzilla.mozilla.org
-
www.revnote.io www.revnote.io
-
100MB storage
Destul de puțin...
-
500Kb max file size
Foarte puțin puțin 500 kb max. file size.... măcar 1 Mb...
-
- Apr 2020
-
bitwarden.com bitwarden.com
-
We believe that being open source is one of the most important features of Bitwarden. Source code transparency is an absolute requirement for security solutions like Bitwarden.
-
-
-
McGann, M., & Speelman, C. (2020). Two Kinds of Theory: What Psychology Can Learn From Einstein [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/sp94q
-
-
psyarxiv.com psyarxiv.com
-
Huang, K., Bernhard, R., Barak-Corren, N., bazerman, m., & Greene, J. D. (2020, April 22). Veil-of-Ignorance Reasoning Favors Allocating Resources to Younger Patients During the COVID-19 Crisis. https://doi.org/10.31234/osf.io/npm4v
-
-
en.wikipedia.org en.wikipedia.org
-
The common law—so named because it was "common" to all the king's courts across England—originated in the practices of the courts of the English kings in the centuries following the Norman Conquest in 1066.[10] The British Empire spread the English legal system to its colonies, many of which retain the common law system today. These "common law systems" are legal systems that give great weight to judicial precedent, and to the style of reasoning inherited from the English legal system.
-
-
www.cnbc.com www.cnbc.com
-
www.cnbc.com www.cnbc.com
-
The data protection officer’s duty is to protect customers’ data, even if that protection goes against other business objectives, meaning there are often different rules on how the executive can be disciplined or dismissed, she said.
-
-
iapp.org iapp.org
-
the cost of reading consent formats or privacy notices is still too high.
-
Third, the focus should be centered on improving transparency rather than requesting systematic consents. Lack of transparency and clarity doesn’t allow informed and unambiguous consent (in particular, where privacy policies are lengthy, complex, vague and difficult to navigate). This ambiguity creates a risk of invalidating the consent.
systematic consents
-
U.K. Information Commissioner Elizabeth Denham clearly states that consent is not the "silver bullet" for GDPR compliance. In many instances, consent will not be the most appropriate ground — for example, when the processing is based on a legal obligation or when the organization has a legitimate interest in processing personal data.
-
data processing limited to purposes deemed reasonable and appropriate such as commercial interests, individual interests or societal benefits with minimal privacy impact could be exempt from formal consent. The individual will always retain the right to object to the processing of any personal data at any time, subject to legal or contractual restrictions.
-
organizations may require consent from individuals where the processing of personal data is likely to result in a risk or high risk to the rights and freedoms of individuals or in the case of automated individual decision-making and profiling. Formal consent could as well be justified where the processing requires sharing of personal data with third parties, international data transfers, or where the organization processes special categories of personal data or personal data from minors.
-
First, organizations must identify the lawful basis for processing prior to the collection of personal data. Under the GDPR, consent is one basis for processing; there are other alternatives. They may be more appropriate options.
-
Furthermore, the consent-based regime creates an obligation to document that consent was lawfully given.
-
the authority found that each digital platform’s privacy policies, which include the consent format, were between 2,500 and 4,500 words and would take an average reader between 10 and 20 minutes to read.
Tags
- burden
- personal data processing: consent not needed
- legal grounds for lawful processing of personal data
- personal data processing: consent
- fatigue
- consent fatigue
- transparency
- clarity
- records/proof of consent
- time requirement
- terms of service/policy documents that people never read
- time wasters
- ambiguity
- legal grounds for lawful processing of personal data: legitimate interests
Annotators
URL
-
-
www.iubenda.comhttps www.iubenda.comhttps
-
be sure to read the complete iubenda privacy policy, part of these terms of service.
-
A miniature / iframe-friendly version of https://www.iubenda.com/en/user/tos/legal?ifr=false
When you first sign up, it displays this in an iframe as https://www.iubenda.com/en/user/tos?ifr=true&height=680, with an "Accept and continue" button you must click to continue
-
-
grammarist.com grammarist.com
-
While Web site is still doing well in the U.S., it is all but dead in the U.K. Current Google News searches limited to U.K. publications find only about one instance of Web site (or web site) for every thousand instances of website. The ratio is similar in Australian and New Zealand publications. In Canada, the ratio is somewhere in the middle—about 20 to one in favor of the one-word form.
-
Exceptions are easily found, however, especially in American sources, where Web site (or web site, without the capital w) appears about once for every six instances of website. This is likely due to the influence of the New York Times, which is notoriously conservative with tech terms. The Times still uses Web site, and many American publications follow suit. Yet even those that often use Web site in their more closely edited sections tend to allow website in their blogs and other web-only sections.
-
-
writingexplained.org writingexplained.org
-
Languages evolve to suit the needs of the people who use them
-
-
ell.stackexchange.com ell.stackexchange.com
-
English tends to build new compound nouns by simply writing them as separate words with a blank. Once the compound is established (and the original parts somewhat "forgotten"), it's often written as one word or hyphenated. (Examples: shoelaces, aircraft...)
-
Web site / website seems to be somewhat in a transitional stage, being seen as an "entity" that web page hasn't reached yet. Depending on which dictionary you check you will find web site and website, but only web page, not webpage.
-
Other languages, German for example, are notorious for very long compunds like this and this, that are made up and written as one word directly. Perhaps the way your native language deals with compounds explains your (or other authors') personal preference and sense of "right"?
-
-
uxmovement.com uxmovement.com
-
A left navigation is faster and more efficient for users to scan. In just three visual fixations, users scan six items in the left navigation compared to the three items scanned in the top navigation. The left navigation also facilitates a vertical scanning direction that is natural for people
-
Because users read items from left to right, the priority direction for reading items is stronger horizontally than vertically.
-
Items in a top navigation do not have equal weight. The leftmost items carry more visual weight than other items because of its placement in the primary optical area (top left). Items in the top left area get more exposure and are often seen as more important than other items.
-
you will have certain items with higher priority than others. Because the user’s topic of interest is more limited in this context, placing items in a top navigation allows users to find what they want faster and easier.
-
-
github.com github.com
-
"When does an astronaut eat?" "At launchtime"
Tags
Annotators
URL
-
-
www.merriam-webster.com www.merriam-webster.com
-
Marginalize provides a striking case of how thoroughly the figurative use of a word can take over the literal one.
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
In informal contexts, mathematicians often use the word modulo (or simply "mod") for similar purposes, as in "modulo isomorphism".
Tags
Annotators
URL
-
-
cdb.reacttraining.com cdb.reacttraining.com
-
It’s true that there are two hard problems in computer science and one of them is naming things. Why? Because good names are important. A good name teaches about purpose and responsibility, so you have to spend some time thinking about it.
-
-
-
Moyers, S. A., & Hagger, M. S. (2020, April 20). Physical activity and sense of coherence: A meta-analysis. https://doi.org/10.31234/osf.io/d9e3k
-
-
-
Leitner, S. (2020, April 18). On the dynamics emerging from pandemics and infodemics. https://doi.org/10.31234/osf.io/nqru6
-
-
jkrishnamurti.org jkrishnamurti.org
-
Competition exists when there is comparison, and comparison does not bring about excellence.
Disagree. It does once you master the "Inner Game" the way John Galway explains it. Competition then is your ally to find the best version of yourself. To do things you did not think you could because your opponent helped you bring this out of you. And so it is in Aikido and value of a good opponent.
-
-
security.stackexchange.com security.stackexchange.com
-
You don't "sanitize your output" you encode it for proper context within the application it is being presented. You encode the output for HTML, HTML Attribute, URL, JavaScript
-
I would call this output encoding instead of sanitization
-
-
www.troyhunt.com www.troyhunt.com
-
This has a usability impact. From a purely "secure all the things" standpoint, you should absolutely take the above approach but there will inevitably be organisations that are reluctant to potentially lose the registration as a result of pushing back
-
I'm providing this data in a way that will not disadvantage those who used the passwords I'm providing.
-
-
www.brucebnews.com www.brucebnews.com
-
Before we get to passwords, surely you already have in mind that Google knows everything about you. It knows what websites you’ve visited, it knows where you’ve been in the real world thanks to Android and Google Maps, it knows who your friends are thanks to Google Photos. All of that information is readily available if you log in to your Google account. You already have good reason to treat the password for your Google account as if it’s a state secret.
-
You already have good reason to treat the password for your Google account as if it’s a state secret. But now the stakes are higher. You’re trusting Google with the passwords that protect the rest of your life – your bank, your shopping, your travel, your private life. If someone learns or guesses your Google account password, you are completely compromised. The password has to be complex and unique. You have to treat your Google account password with the same care as a LastPass user. Perhaps more so, because it’s easier to reset a Google account password. If your passwords are saved in Chrome, you should strongly consider using two-factor authentication to log into your Google account. I’ll talk about that in the next article.
-
-
en.wikipedia.org en.wikipedia.org
-
Computer security[edit] A mistake in just one component can compromise the entire system.
-
-
stackoverflow.com stackoverflow.com
-
Less than 1% of users in the world have Javascript turned off. So honestly, it's not worth anyones time accommodating for such a small audience when a large majority of websites rely on Javascript. Been developing websites for a very long time now, and 100% of my sites use Javascript and rely on it heavily. If users have Javascript turned off, that's their own problem and choice, not mine. They'll be unable to visit or use at least 90% of websites online with it turned off.
-
-
github.com github.com
-
One of the drawbacks of waiting until someone signs in again to check their password is that a user may simply stay signed in for a long time without signing out. I suppose that could be an argument in favor of limiting the maximum duration of a session or remember-me token, but as far as user experience, I always find it annoying when I was signed in and a website arbitrarily signs me out without telling me why.
-