9,047 Matching Annotations
  1. Apr 2020
    1. Q. I would like a copy of my data from a breach, can you please send it to me? A. No, I cannot Q. I have a breach I would like to give you in exchange for “your” breach, can you please send it to me? A. No, I cannot Q. I’m a security researcher who wants to do some analysis on the breach, can you please send it to me? A. No, I cannot Q. I’m making a searchable database of breaches; can you please send it to me? A. No, I cannot Q. I have another reason for wanting the data not already covered above, can you please send it to me? A. No, I cannot
    1. Direct democracy was not what the framers of the United States Constitution envisioned for the nation. They saw a danger in tyranny of the majority. As a result, they advocated a representative democracy in the form of a constitutional republic over a direct democracy. For example, James Madison, in Federalist No. 10, advocates a constitutional republic over direct democracy precisely to protect the individual from the will of the majority
    2. Those who hold and those who are without property have ever formed distinct interests in society. Those who are creditors, and those who are debtors, fall under a like discrimination. A landed interest, a manufacturing interest, a mercantile interest, a moneyed interest, with many lesser interests, grow up of necessity in civilized nations, and divide them into different classes, actuated by different sentiments and views. The regulation of these various and interfering interests forms the principal task of modern legislation, and involves the spirit of party and faction in the necessary and ordinary operations of the government.
    1. At Brown’s sentencing, Judge Lindsay was quoted as saying “What took place is not going to chill any 1st Amendment expression by Journalists.” But he was so wrong. Brown’s arrest and prosecution had a substantial chilling effect on journalism. Some journalists have simply stopped reporting on hacks from fear of retribution and others who still do are forced to employ extraordinary measures to protect themselves from prosecution.
    2. Having said all that, I think this is completely absurd that I have to write an entire article justifying the release of this data out of fear of prosecution or legal harassment. I had wanted to write an article about the data itself but I will have to do that later because I had to write this lame thing trying to convince the FBI not to raid me.
    3. I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us.
    4. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    1. Google figures that since it has a big (encrypted) database of all your passwords, it might as well compare them against a 4-billion-strong public list of compromised usernames and passwords that have been exposed in innumerable security breaches over the years. Any time Google hits a match, it notifies you that a specific set of credentials is public and unsafe and that you should probably change the password.
    1. If you are concerned about privacy and looking for a bullet-proof solution then the only way to go is open-source software. For example, there was another incident with a proprietary file "encrypter" for Android/iOS which used the simplest possible "encryption" on earth: XORing of data that is as easy to crack a monkey could do that. Would not happen to an open-source software. If you're worried about the mobile app not being as reliable (backdoors etc.) as the desktop app: compile it yourself from sources. https/github.com/MiniKeePass/MiniKeePass You can also compile the desktop version yourself. Honestly, I doubt most people, including you and me, will bother.
    1. The data is stored in log files to ensure the functionality of the website. In addition, the data serves us to optimize the website and to ensure the security of our information technology systems. An evaluation of the data for marketing purposes does not take place in this context. The legal basis for the temporary storage of the data and the log files is Art. 6 para. 1 lit. f GDPR. Our legitimate interests lie in the above-mentioned purposes.
    1. Devise-Two-Factor only worries about the backend, leaving the details of the integration up to you. This means that you're responsible for building the UI that drives the gem. While there is an example Rails application included in the gem, it is important to remember that this gem is intentionally very open-ended, and you should build a user experience which fits your individual application.
    1. In mainstream press, the word "hacker" is often used to refer to a malicious security cracker. There is a classic definition of the term "hacker", arising from its first documented uses related to information technologies at MIT, that is at odds with the way the term is usually used by journalists. The inheritors of the technical tradition of the word "hacker" as it was used at MIT sometimes take offense at the sloppy use of the term by journalists and others who are influenced by journalistic inaccuracy.
    2. there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"
    1. Now, if we think of the tasks that we perform throughout the day as consuming separate "bands" of time, then the term makes perfect sense. Being "out of bandwidth" would indicate that you do not have enough unallocated "bands of time" in your day to complete the task. Using the term bandwidth to describe time maps more closely (in my opinion) to the original definition, than the current definition describing data capacity does.
    1. It's typically a lot easier for software engineers to pull data out of a service that they use than it is for regular users. If APIs are available, we engineers can cobble together a program to pull our data out. Without APIs, we can even whip up a screen scraper to get a copy of the data. Unfortunately, for most users this is not an option, and they're often left wondering if they can get their data out at all.
    1. 1Password wasn’t built in a vacuum. It was developed on top of open standards that anyone with the right skills can investigate, implement, and improve. Open tools are trusted, proven, and constantly getting better. Here’s how 1Password respects the principles behind the open tools on which it relies:

      I found it ironic that this proprietary software that I have avoided using because it is proprietary software is touting the importance of open tools.

    1. Bioengineered skin substitutes have evolved from keratinocyte monolayers to dermal equivalents to split-thickness products with a pseudo-epidermis, and most recently, to products containing both epidermal and dermal components that resemble the three-dimensional structure and function of normal skin (see Table 9-11). Indicated for use with standard compression therapy in the treatment of venous insufficiency ulcers and for the treatment of neuropathic diabetic foot ulcers, these bilayered skin equivalents also are being used in a variety of wound care settings.
    1. Now that he had no work to hold, he laid the knuckles of the right hand in the hollow of the left, and then the knuckles of the left hand in the hollow of the right, and then passed a hand across his bearded chin, and so on in regular changes, without a moment's intermission. The task of recalling him from the vagrancy into which he always sank when he had spoken, was like recalling some very weak person from a swoon, or endeavouring, in the hope of some disclosure, to stay the spirit of a fast-dying man. “Did you ask me for my name?” “Assuredly I did.” “One Hundred and Five, North Tower.” “Is that all?” “One Hundred and Five, North Tower.”

      Maybe the shoemaker had forgotten his name from prison?

    1. Chart of accounts numbering involves setting up the structure of the accounts to be used, as well as assigning specific codes to the different general ledger accounts. The numbering system used is critical to the ways in which financial information is stored and manipulated. The first type of numbering to determine for a chart of accounts involves their structure. This is the layout of an account number, and involves the following components:Division code - This is typically a two-digit code that identifies a specific company division within a multi-division company. It is not used by a single-entity company. The code can be expanded to three digits if there are more than 99 subsidiaries.Department code - This is usually a two-digit code that identifies a specific department within a company, such as the accounting, engineering, or production departments.Account code - This is usually a three digit code that describes the account itself, such as fixed assets, revenue, or supplies expense.For example, a multi-division company with several departments in each company would probably use chart of accounts numbering in this manner: xx-xx-xxxAs another example, a single-division company with multiple departments could dispense with the first two digits, and instead uses the following numbering scheme: xx-xxxAs a final example, a smaller business with no departments at all could just use the three digit code assigned to its accounts, which is: xxxOnce the coding structure is set, the numbering of accounts can take place. This is the three-digit coding referred to previously. A company can use any numbering system that it wants; there is no mandated approach. However, a common coding scheme is as follows:Assets - Account codes 100-199Liabilities - 200-299Equity accounts - 300-399Revenues - 400-499Expenses - 500-599 As a complete example of the preceding outline of numbering, a parent company assigns the "03" designator to one of its subsidiaries, the "07" designator to the engineering department, and "550" to the travel and entertainment expense. This results in the following chart of accounts number:03-07-550
    1. This is a great time to individualize instruction and have students work at different paces. You don’t want 100-120 papers coming at you all at one time. Spread it out, and it will keep you from getting short-tempered with your students.

      As the educational system operates today, many teachers easily put in 60 hours of work per week. But when you teach remotely, it sounds like work becomes much more manageable.

      Do I want to become a teacher? If I can teach like this I do—and no, not because it seems easier but because it seems easier AND more effective.

    2. Then there is the option of getting students to talk to each other online on discussion boards and videoconferences. Some students adapt to it quickly and like it. Some don’t, because it feels impersonal. You have to be patient with that and give them some time and space to adjust.

      Introverts v extroverts. Oil and water. They've always differed, always will. Maybe this virtual, personalized learning movement will finally allow introverts to stop feeling so defeated in the presence of extroverts who live so much more loudly than they do. Finally, they'll be able to live peacefully in their own mind, undisturbed by the stress of feelings like you need to be more extroverted to fit in.

      Btw: I'm not encouraging each party to distance themselves from each other all the time. What I am saying is that when value is trying to be distributed, distribute it however it'll best be received. Then, later, once teaching time is over, they can socialize in traditional ways... IF that's what they want to do.

    3. Rizga: How have you been translating this online?Moore: It depends on the student. Some students work very well asynchronously. They are very comfortable working alone on a draft; I make color-coded comments in a word document or their PDF, and then I send it back. Some students need me to explain things to them in person before I send them the comments; we’ll do a video or audio chat. Others need even more interaction: I’ll hook them up to a videoconference, and we’ll go through all the comments together. Some students I need to refer to a grammar-brushup program or a YouTube video on how to do some of the mechanical stuff like uploading papers online.

      Sounds like Mrs. Moore deserves a raise! This woman knows what's up! She represents the future while living in a community that (probably) latches on to tradition.

      Any of you big city school systems reading this? If you are, hire her. You can probably pay her less than what your other teachers are earning and still give her a bump in pay compared to what she's earning in Mississippi.

    4. We are in the midst of the most sweeping education experiment in history. The coronavirus pandemic has forced the majority of the U.S.’s 3.6 million educators to find ways to teach without what most of them consider the core part of their craft—the daily face-to-face interactions that help them elicit a child’s burning desire to investigate something; detect confusion or a lack of engagement; and find the right approach, based on a student’s body language and participation in the classroom, to help students work through their challenges.

      There's a reason education fails so often: teachers teach students as if they all have identical interests and learning styles.

      There's no such thing as a one-size-fits all solution to any problem. Everyone knows that. Even dumb people do. Yet there are our educators, the people we're supposed to depend on to set the table for our lives, to show us what's important, what we she commit to memory for the rest of our life or else that life's gonna die having led a dumb life, because you didn't do what you were told to do way back when: understand everything the teacher told you to understand, yeah, even if you didn't give a fuck about what's coming out of her mouth. Learn that shit anyway.

      Oh, and learn it how I say you should learn it too. Sit in that seat, lock your eyes on me, and take notes at a speed that's equal to or faster than the rate of my speech... just like all the students around you are (trying) to do... because everyone learns new information in the same way... right?

    1. Tangential wounds of the internal jugular vein should be repaired by lateral venorrhaphy, but extensive wounds are efficiently addressed by ligation. However, it is not advisable to ligate both jugular veins due to potential intracranial hypertension.

      for tangential inj of int jugular vein lateral vonorrhaphy is used and for extensive damages, ligation, but not bilaterally to preventing IC HTN.

    2. The typical clinical course of an epidural hematoma is an initial loss of consciousness, a lucid interval, and recurrent loss of consciousness with an ipsilateral fixed and dilated pupil. While decompression of subdural hematomas may be delayed, epidural hematomas require evacuation within 70 minutes.
    1. Indications for operative treatment of thoracic injuries Initial tube thoracostomy drainage of >1000 mL (penetrating injury) or >1500 mL (blunt injury) Ongoing tube thoracostomy drainage of >200 mL/h for 3 consecutive hours in noncoagulopathic patients Caked hemothorax despite placement of two chest tubes Great vessel injury (endovascular techniques may be used in selected patients) Pericardial tamponade Cardiac herniation Massive air leak from the chest tube with inadequate ventilation Tracheal or main stem bronchial injury diagnosed by endoscopy or imaging Open pneumothorax Esophageal perforation Air embolism

      1000ml drainage (penetrating), >1500mlm (blunt) from tube. >200mL/h for 3h nonstop drainage in noncoagulopathic px. caked hemothorax after two chest tubes.great vessels inj. pericardial tamp. hernia of heart. inadequate ventilation with massive air leak.main stem or tracheal damage (imaginf or endoscopy). open pneumothorax. perforation of esophagus. air embolism

    1. Isthere any way of using these annotations (cryptic jottings,emphasis symbols, underlining and highlighting) in theDocuverse?

      For example, I think one could sum the highlight in each specific section. If many people highlighted a passage, then the highlight color is higher. That way one would be able to discover passages that many people found important/interesting. Although, it may also bias others to do the same. As usual.

    1. Google's move to release location data highlights concerns around privacy. According to Mark Skilton, director of the Artificial Intelligence Innovation Network at Warwick Business School in the UK, Google's decision to use public data "raises a key conflict between the need for mass surveillance to effectively combat the spread of coronavirus and the issues of confidentiality, privacy, and consent concerning any data obtained."
  2. Mar 2020
    1. of the six lawful, GDPR-compliant ways companies can get the green light to process individual personal data, consent is the “least preferable.” According to guidelines in Article 29 Working Party from the European Commission, "a controller must always take time to consider whether consent is the appropriate lawful ground for the envisaged processing or whether another ground should be chosen instead." 
    2. “It is unfortunate that a lot of companies are blindly asking for consent when they don’t need it because they have either historically obtained the consent to contact a user,” said digital policy consultant Kristina Podnar. “Or better yet, the company has a lawful basis for contact. Lawful basis is always preferable to consent, so I am uncertain why companies are blindly dismissing that path in favor of consent.”
    1. I discuss the flaws of this in regards to spreadsheets in Spreadsheets Are Sabotaging Your Business. In brief, when people inevitably started using the more complex formulas available, they unknowingly broke the fundamental design concept of paper spreadsheets: that humans can understand what’s happening between the cells.
    1. Don't be discouraged when you get feedback about a method that isn't all sunshine and roses. Facets has been around long enough now that it needs to maintain a certain degree of quality control, and that means serious discernment about what goes into the library. That includes having in depth discussions the merits of methods, even about the best name for a method --even if the functionality has been accepted the name may not.

      about: merits

    1. Second, you cannot simply add the cookie language to your existing Terms and Conditions because you need to gain consent specifically for the use of cookies. This means, if you already have users who have agreed to your T&Cs, after adding the cookie language you will need to prompt them to review and agree to the new T&Cs.
    1. If your agreement with Google incorporates this policy, or you otherwise use a Google product that incorporates this policy, you must ensure that certain disclosures are given to, and consents obtained from, end users in the European Economic Area along with the UK. If you fail to comply with this policy, we may limit or suspend your use of the Google product and/or terminate your agreement.
    1. Emerging Theories of Learning and the Role of Technology

      This article discusses the social changes introduced by new technologies and how educational environments are trying to prepare students to enter a technologically advanced workforce through integration of technology with curriculum. The author challenges traditional theories of learning by discussing how cognition is situated in the digital, 21st-century learner, and that technology integration should focus on the importance of community within learning environments. Although the article challenges the traditional ideas of technology integration, it fails to provide actionable ways in which educators could infuse technology into their own curriculum. Rating: 6/10

    1. Theories and Frameworks for Online Education: Seeking an Integrated Model

      This article, written by Anthony G. Picciano of City University of New York Graduate Center and Hunter College, seeks to create a theoretical framework by which to posit online education according to learning theories and their specific application. Beginning with a brief outline of the primary learning theories, the author then tries to position each theory within the online learning environment and the practical implications that follow before suggesting an integrated model that combines features of each theory. One of the primary benefits of this article is the way in which the authors show how the theories of learning might be mutated for individual, educational environmental needs. Rating: 7/10

    1. Research in Educational Technology

      This textbook, published by the Oklahoma State University Library ePress, contains a chapter which summarizes the main views of knowledge in educational technology research, including postpositivism, constructivism, advocacy, and pragmatism, as well as each view's research traditions. The chapter suggests an approach to evaluating research articles through the lenses of a consistent learning theory coupled, methodologies that support that learning theory, and the conclusions that are drawn by the researchers supported through their methodologies. This chapter would help educators evaluate how and why they might include technology into their course curriculum. Rating: 7/10

    1. Q. Why does Rubinius not support frozen and tainted? A. Rubinius has better features; frozen and tainted are considered harmful. To elaborate... Both frozen and tainted depend on strewing checks throughout the source code. As a classic weak-link system, only one of those checks needs to be misplaced for the guarantees offered by either to fail. Since the number of checks is high, and as new code is written new checks need to be considered, the features inherently constitute unbounded complexity and unbounded risk.
    1. How do you leverage browser cache when Google’s very own Analytics.js has it’s expiry time set to 2 hours? How do you minimize DNS requests when Google advices you to copy their tracking code, linking to an externally hosted Javascript file?If that isn’t bad enough already, Google’s advice is to avoid hosting the JavaScript file locally. And why? To ensure you get access to new features and product updates.
    2. Why should I host analytics.js locally?The Complete Analytics Optimization Suite for WordPress gives you the best of both worlds. After activation it automagically downloads the latest version of analytics.js from Google’s servers, places the necessary tracking code in your WordPress theme’s header and keeps the local Javascript file up-to-date using an adjusted version of Matthew Horne’s update analytics script and wp_cron(). This way you can minimize DNS requests, leverage browser cache, track your visitors and still follow Google’s recommendation to use the latest features and product updates.
    1. Birds of Prey: Black Mask's Suit is Trending Everywhere

      Bringing characters on to the big screen, DC Comics has been a step ahead of Marvel Comics, it's longtime rival, in terms of giving cinematic life to its underrated super villains like Roman Sionis Black Mask.

      Featured in Harley Quinn: Birds of Prey, Black Mask is a crime lord who rules over the underground world of the city of Gotham. Kind of a maniac who loves taking delight in torturing the innocents, Roman is one of the ugliest men to live in Batman's city.

      As the story goes on and Black Mask is featured in Birds of Prey, you can rush to the nearby cinema to watch the DC Comics' latest film based on the supervillain character of Harley Quinn while knowing more about one of the biggest criminal-minded figures to exist in Gotham.

      Although Birds of Prey has already been watched by thousands of DC Comics fans, many have taken it to social media and other online forums to admire the wardrobes of each and every character featured in the film.

      While Harley Quinn's multi-colored wardrobe has already received millions of likes on social media, Black Mask's corporate slave like an outfit is also earning a considerable number of likes and comments for the masterminds behind it.

      A mind blogging attire featuring a unique pattern, the so-called Black Mask Birds of Prey Suit is a wardrobe better than many of the rivals of the supervillain. Specifically, when you compare it with the formal wardrobe given to Batman or Superman, you tend to find a great difference allowing the former to look better than the latter.

      The difference is so striking that, regardless of the nature of the character, you might prefer Roman's suit with your eyes closed. Ironically, despite the fact, Roman is an ugly creature with no beautiful face to show the world, his style, and manly attitude while meeting his counterparts or rivals put him on top of the list of the worth-following characters in the world of DC Comics.

      You check out every other wardrobe rocked by the supervillain and you will find an immense level of creativity dominating his clothing style. This absolutely indicates, the bad guy cares about his physical features and tries his level best to get rid of the ugliness showered to him by an accident during his birth. Every other outfit of Black Mask is surely the result of the inferiority complex surrounding the supervillain from the very first day and often making him think like a useless creature with nobody to love him which makes him put on the luxurious wear to overcome the destructive thought patterns while allowing him to deal with the unworthy phenomenon of inferiority.

      Although it should be very clear, ever since the wealthy character Roman has been featured in Harley Quinn's solo film, the number of his fans has jumped from thousands to millions with most of them are among the die-hard fans of his passion for fashion.

      The very well developed, finely designed and greatly stitched black suit sported by Black Mask is a great piece to be considered for formal parties and get together events with the formal clothing theme. Regardless of who the suit has been inspired from, you could choose to try it for a fascinating yet hot appearance while hoping to be admired by the self-proclaimed fashion gurus in your friend list. If there is anything worthy that Roman's character has given to his fans and that could be added to an apparel collection as something special reminding of him then it's his sizzling hot suit with perfection dominating it from bottom to the top.

    1. a complete snapshot of the user's browser window at that moment in time will be captured, pixel by pixel.

      Is this even technically possible?

      If it were:

      • how are they not disclosing this better, since it seems like a privacy concern since there could be any amount of private data in that form, that would what, get sent to Google??
      • wouldn't that be a lot of pixels (a lot of data to upload), which would take a lot of time to upload, especially at high screen resolutions?
    1. While we recognise that analytics can provide you with useful information, they are not part of the functionality that the user requests when they use your online service – for example, if you didn’t have analytics running, the user could still be able to access your service. This is why analytics cookies aren’t strictly necessary and so require consent.
    1. We are not sensible, free thinking decision making people. As an individual I imagine that you will say "Yes I am". That's the beauty of the entire system. Consciously individuals believe that they are in control and make their own choices and yet I have met and experienced very few who have full autonomy
    2. Facebook does not even offer an absolute opt out of targeted advertising on its platform. The ‘choice’ it gives users is to agree to its targeted advertising or to delete their account and leave the service entirely. Which isn’t really a choice when balanced against the power of Facebook’s platform and the network effect it exploits to keep people using its service.
    3. Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
    1. Though not always legally required, terms & conditions (also called ToS – terms of service, terms of use, or EULA – end user license agreement) are pragmatically required. It governs the contractual relationship between you and your users and sets the way in which your product, service or content may be used, in a legally binding way. It is therefore essential for protecting your content from a copyright perspective as well as protecting you from potential liabilities. They typically contain copyright clauses, disclaimers and terms of sale, allow you to set governing law, list mandatory consumer protection clauses, and more.
    1. For instance, a strict interpretation of the law would require publishers to get opt-in consent by individual vendor, rather than an 'Accept All' pop-up prompt. The approach that publishers and ad tech vendor are taking is that a mass opt-in button - with an option to dive deeper and toggle consent by vendor - follows the "spirit of the law". This stance is increasingly coming under fire, though, especially as seen by a new study by researchers at UCL, MIT, and Aarhus University.
    1. Alert: New office locations are now accepting reservations for license and permit transactions at the Adam Clayton Powell Jr. State Office Building in Harlem, Empire State College in Selden, and Shirley A. Chisholm State Office Building in Brooklyn.

      General information types of products Location of service

    1. Get phrasebooks to start studying basic terminology. Phrasebooks are lists of expressions made for travelers to foreign countries. These lists give you an example of the sentence structure a language uses and what kind of words are useful. Find a phrasebook in the language you wish to learn and treat it as a foundation you can build upon as you learn more.
    2. There is no use learning the word for “aardvark” in Swahili if you are never likely to use it. Think of words you use all the time and get familiar with them first.[2] X Research source For example, if you’re an exchange student in Russia, you might need to introduce yourself, ask for directions, and order food. While you might need to know the Swahili word for “aardvark” someday, you can learn it at a later date when the time comes.
    1. "I have read and agree to the terms and conditions” may well be the most common lie in the history of civilization. How many times do you scroll and click accept without a second thought? You’re not alone. Not only they go unread, but they also include a self-updating clause requiring you to go back and review those documents for changes. You’re agreeing to any changes, and their consequences, indefinitely. 
    1. that permission must be freely obtained. Ergo, a free choice must be offered.So, in other words, a “data for access” cookie wall isn’t going to cut it. (Or, as the DPA puts it: “Permission is not ‘free’ if someone has no real or free choice. Or if the person cannot refuse giving permission without adverse consequences.”)
    1. And, frankly, we’re abetting this behavior. Most users just click or tap “okay” to clear the pop-up and get where they’re going. They rarely opt to learn more about what they’re agreeing to. Research shows that the vast majority of internet users don’t read terms of service or privacy policies — so they’re probably not reading cookie policies, either. They’re many pages long, and they’re not written in language that’s simple enough for the average person to understand.
    2. Most companies are throwing cookie alerts at you because they figure it’s better to be safe than sorry When the GDPR came into effect, companies all over the globe — not just in Europe — scrambled to comply and started to enact privacy changes for all of their users everywhere. That included the cookie pop-ups. “Everybody just decided to be better safe than sorry and throw up a banner — with everybody acknowledging it doesn’t accomplish a whole lot,” said Joseph Jerome, former policy counsel for the Privacy & Data Project at the Center for Democracy & Technology, a privacy-focused nonprofit.
    1. There have been rumblings, for example, that Germany’s hate speech law goes too far in clamping down on free speech. MacKinnon said there is “real concern among human rights groups that this is going to lead to over-censorship” and put too much power in the decision of private employees about what to leave up and what to take down. “When in doubt, you censor it, whether or not it’s really actually illegal.
    1. Yes, it’s been deprecated. Why? Because too few people were using it to make it worth the time, money, and energy to maintain. In truth, although I sometimes disagree with the operator changes, I happen to agree with this one. Maintaining ALL of the synonyms takes real time and costs us real money. Supporting this operator also increases the complexity of the code base. By dropping support for it we can free up a bunch of resources that can be used for other, more globally powerful changes.
  3. Feb 2020
    1. A Theory of Justice

      A Theory of Justice is a 1971 work of political philosophy and ethics by the philosopher John Rawls, in which the author addresses the problem of distributive justice (the socially just distribution of goods in a society). The theory uses an updated form of Kantian philosophy and a variant form of conventional social contract theory. Rawls's theory of justice is fully a political theory of justice as opposed to other forms of justice discussed in other disciplines and contexts.

      The resultant theory was challenged and refined several times in the decades following its original publication in 1971. A significant reappraisal was published in the 1985 essay "Justice as Fairness", and a subsequent book under the same title, within which Rawls further developed his two central principles for his discussion of justice. Together, they dictate that society should be structured so that the greatest possible amount of liberty is given to its members, limited only by the notion that the liberty of any one member shall not infringe upon that of any other member. Secondly, inequalities – either social or economic – are only to be allowed if the worst off will be better off than they might be under an equal distribution. Finally, if there is such a beneficial inequality, this inequality should not make it harder for those without resources to occupy positions of power – for instance, public office.[1]

      First published in 1971, A Theory of Justice was revised in 1975, while translated editions were being released in the 1990s it was further revised in 1999. In 2001, Rawls published a follow-up study titled Justice as Fairness: A Restatement.

      https://en.wikipedia.org/wiki/A_Theory_of_Justice

    1. If you plan to be out of the office for more than 48 hours, update your GitLab.com status with your out of office dates by clicking on your profile picture and selecting "Edit Status." For Example: 'OOO Back on 2018-06-28.' Don't forget to change it back upon your return, and be aware that this information is publicly accessible.
    1. Ack - Better than grep. Without Ack, Ag would not exist. ack.vim Exuberant Ctags - Faster than Ag, but it builds an index beforehand. Good for really big codebases. Git-grep - As fast as Ag but only works on git repos. ripgrep Sack - A utility that wraps Ack and Ag. It removes a lot of repetition from searching and opening matching files.
    1. We check in our code at the entry point of a pipeline, version control (Git and Github in our case), and then it’s taken through a series of steps aimed at assuring quality and lowering risk of releases. Automation helps us keep these steps out of our way while maintaining control through fast feedback loops (context-switching is our enemy). If any step of the pipeline breaks (or fails) we want to be alerted in our communication channel of choice (in our case Slack), and it needs to happen as quickly as possible while we’re in the right context.
    1. To never block or remove features from k6 in order to make them exclusive to Load Impact’s SaaS productStrive not to delay introduction of new features in the k6 OSS tool, if the feature was planned to appear both there and in Load Impact’s SaaS productTo never introduce into the k6 OSS tool any artificial limits designed to promote conversion to Load Impact’s SaaS productTo work with the community, participating in and prioritize building the functionality the k6 community wants, making it the prefered tool for load testing
    2. With k6, our goal has always been to create the best load testing tool for the modern working developer and that we do this in collaboration with the k6 community. Our revenue will not come from k6 directly, but from premium value creating offers based on k6. These offers will be made available at https://loadimpact.com. Load Impact premium offers will have focus on providing further simplicity, productivity and ease to use functionality.
    1. Finally, the utility of video lessons can be maximized by matching modality to content. By using both the audio/verbal channel and the visual/pictorial channel to convey new infor-mation, and by fitting the particular type of information to the most appropriate channel, instructors can enhance the germane cognitive load of a learning experience.

      matching modality to content. So if you want to talk about history, or a book, or just some reflection, it makes less sense to do it over video, but if you want to talk about art history maybe you want to have a video component or be primarily video

    2. Weeding, or the elimination of interesting but extraneous information that does not contribute to the learning goal, can provide further benefits. For example, music, complex back-grounds, or extra features within an animation require the learner to judge whether he or she should be paying attention to them, which increases extraneous load and can reduce learn-ing.

      Weeding + definition, removing flash and bells and whistles that might cause the student to be distracted

    3. Signaling, which is also known as cueing (deKoning et al., 2009), is the use of on-screen text or symbols to highlight important information. For example, signaling may be provided by the appearance of two or three key words (Mayer and John-son, 2008; Ibrahim et al., 2012), a change in color or contrast (deKoning et al., 2009), or a symbol that draws attention to a region of a screen (e.g., an arrow; deKoning et al., 2009).

      Signaling definition + examples

    1. Top 10 Important Online Marketing Tools for Entrepreneurs 4.0 Thank you for your rating! Why not leave a message? Any additional feedback or questions are welcome below. Your Name Your Email Address Phone Number Message the Author Cancel By Shiv | Contact Author less than a minute ago Marketing tools are like a helping hand for many entrepreneurs. As time is money using online marketing tools make your job easy and fast and also saves money. Marketing tools are like a helping hand that makes your job so easy. These tools are designed in such a way that it saves you time, effort and money. Apart from finding customers, one of the most difficult problems faced by entrepreneurs is to save time and manage cash flow. Using tools for marketing your business ensures you meet your goal on time. Here are the top 10 most important online marketing tools for entrepreneurs- Hubspot- Inbound Marketing Tool If you want to buy one tool to grow your business exponentially, this is the tool you should buy. Hubspot offers an inbound marketing tool that promises you with attracting leads, converting them and closing the deal. This tool acts as a funnel for your business that narrows downs your audience into your customers and finally generates revenue out of them. You can get started using the Hubspot tool with just $113 per month. You can also get online tutorials on how to use Hubspot tools online or you can always call or email their support team to help you out. Freelancing Graphic Design Platform by EveryDesigns Marketing is impossible without good designs. In marketing, we have a lot of promotional content that uses heavy design work to attract customers. We, humans, are visual animals and it is easier to influence us visually rather than any other means. You can use the EveryDesigns platform to get designs for your business. It is a one-stop destination for your business to get any graphic design services. The innovation that they offer in their services is by organizing a contest for your designs where multiple designers work from around the world. You choose the best design submitted by designers and pay for only that design. You get multiple design options to choose from, along with a 100% money-back guarantee. MailChimp- Email Marketing MailChimp is the best tool when it comes to email marketing. As an entrepreneur, you know how important email marketing is. If you strategize your email marketing outreach, you can attract very valuable customers to your business website. The best part is that it provides some of its features for free, which is enough for a startup or small business to get started and if you want to buy the paid version, then it is as low as $10 per month. Zoom- Conference Meeting Tool Zoom is a web as well as an app-based conference meeting organization tool that helps you in connecting with different team members throughout the world. You can also use this tool to organize a webinar and post it on youtube by recording it. You can pretty much do anything, it is a better version of skype where you can whiteboard as well. The basic version can be used for free and the paid version with pro features starets at $20 for each member. Klusster- Publication Community Kluster is a tool used by digital marketers to spread content and attract customers to their website. Kluster offers a platform to publish content written by you and promote business. As an entrepreneur, you should understand the importance of the backlink for your website. Klusster is one such platform providing quality publications for businesses. The best part it's free. Grammarly-Content Optimization Tool As a marketer or entrepreneur, you know the power of content marketing. It is the most powerful way of branding your business. Creating content can be tough but, the most important thing is creating grammatically correct content. That’s where Grammarly comes and saves the day. It automatically suggests your corrections for every mistake you made. The basic version is free and the paid version with advanced features is $30. You can really see the difference in your writing after using Grammarly. Zoho Social-Social Media Marketing Tool Social media is a platform that has numerous potential and if you are not using social media then you are missing out on a huge opportunity. There are around 4.3 billion social media users and the primary rule of business is where there are people, there is business. Zoho Social is a social media management tool that helps you in promoting your business on multiple social media channels. You can use different channels like Facebook, Twitter Instagram, etc. and post your content, images using one app. UberSuggest- Digital Marketing Tool UberSuggest is a free digital marketing tool provided by Neil Patel Digital. This tool is best for a digital marketer who does not want to spend a big amount of money on buying digital marketing tools. This tool is very easy to use and offers many features that are enough for you to get started with your website’s SEO. Yoast SEO- WordPress Plugin for SEO Yoast SEO is a plugin that you can install on your WordPress site. This tool is a well-researched tool that recommends you SEO corrections that you should make in order to rank your website for specific keywords. It is the best on-page SEO management tool and comes with a one-time price tag of $89 for one website. You can also subscribe to their service starting from $19 per month where you get all the premium features with multiple plugins in one. If you do not want to buy Yoast SEO Plugin then you can also use the free version of the plugin but it is recommended that you should use the premium version if you want to stay ahead off of your competitors. Google- Search Engine & Other Tools You heard it right. Google is a tool that everyone uses and earlier in this post, I’ve said where there are people there is business, therefore, you should also use it. Google's market share when it comes to search engines is 80-90%. As an entrepreneur, you should aim for ranking your website higher in the high volume search keywords. To do that, you would need your website to be optimized according to the Google guidelines and recommendations. Google Offers multiple tools like search console, analytics, tag manager, etc to manage and optimize your website. You should use these tools to make your website better. Conclusion You can use these tools to have leverage over your competitors and quickly increase sales for your business. You are an entrepreneur and time is money for you, therefore, you should use these tools to save time and money. Comment below, what tool are you using to manage your business along with pricing and if you are using any of the above-mentioned tools, tell us your experience. Tags marketing tools / List of best marketing tools

      Marketing tools are like a helping hand for many entrepreneurs. As time is money using online marketing tools make your job easy and fast and also saves money. Top 10 Important Online Marketing Tools for Entrepreneurs

    1. Exchange value

      Exchange value appears as the property of a commodity that is exchangeable for other commodities. It also presupposes societies who produce commodities and exchange them. While all societies have things with use values, exchange value is relative to a specific time and place.

      Additionally, exchanging commodities must also presupposes a way to determine proportionality between different commodities, so that they can be exchanged in the first place.

      Exchange therefore requires some other measure that stands above the two commodities meant to be exchanged. If there were no ways in which iron and corn were found similar to a society, for example, then we would not exchange them and they would have no exchange value.

      Marx will contend that what each commodity must contain crystalized within it is value (formally) and that the substance of value is labor (viz. the common factor of both iron and corn is labor). Marx will call this kind of labor abstract labor.

  4. Jan 2020
    1. the phenomenal form

      In Fowkes, the 'form of appearance' or the Erscheinungsform.

      Exchange value is the 'form of appearance' of something contained in it, yet distinguishable from it--this 'third thing' will turn out to be 'socially necessary labor time'.

      Book Two of Hegel's Science of Logic, the Doctrine of Essence, begins with a chapter on 'Der Schein,' which appears in A.V. Miller's translation as "Illusory Being" (Hegel, Science of Logic, trans. by A.V. Miller, pp. 393-408).

      Here, Hegel describes "schein" as "reflected immediacy, that is immediacy which is only by means of its negation and which when contrasted with its mediation is nothing but the empty determination of the immediacy of negated determinate being," (p. 396).

      Hegel goes on to remark that "Schein" is "the phenomenon [Phänomen] of skepticism, and the Appearance [Erscheinung] of idealism," (p. 396).

      In describing exchange value as the 'Erscheinungsform' of 'something contained in it, yet distinguishable from it'--which will be labor--Marx is clearly flirting with the terminology surrounding "Illusory Being" in the Science of Logic, which suggests labor as the 'thing-in-itself' of the exchange value. Exchange-value is the reflected immediacy that conceals the congealed labor that it is its essence.

      The passage as a whole is suggestive of how exchange value will wend its way through Marx's demonstration, unfolding from itself determinations of itself.

      Before presenting a long, difficult quotation from Hegel, I think the most straightforward way to present this reference to Hegel is to say present the argument as follows:

      In Kantian idealism, we find that the 'thing-in-itself' cannot become an object of knowledge; consciousness only ever has immediate access to the form of appearance, the 'sensible form' of a 'thing-in-itself' which never presents itself to consciousness. In referring to the value form as the 'form of appearance' of something else which does not appear, Marx is saying that just as idealism subordinates the objectivity of the world to its appearance for consciousness, exchange-value represents immediately an essence that it suppresses, and implicitly, denies the possibility of knowledge of this essence.

      Hegel writes, "Skepticism did not permit itself to say 'It is'; modern idealism did not permit itself to regard knowledge as a knowing of the thing-in-itself; the illusory being of skepticism was supposed to lack any foundation of being, and in idealism the thing-in-itself was not supposed to enter into knowledge. But at the same time, skepticism admitted a multitude of determinations of its illusory being, or rather its illusory being had for content the entire manifold wealth of the world. In idealism, too, Appearance [Erscheinung] embraces within itself the range of these manifold determinateness. This illusory being and this Appearance are immediately thus manifoldly determined. This content, therefore, may well have no being, no thing or thing-in-itself at its base; it remains on its own account as it is; the content has only been transferred from being into an illusory being, so that the latter has within itself those manifold determinateness, which are immediate, simply affirmative, and mutually related as others. Illusory being is, therefore, itself immediately determinate. It can have this or that content; whatever content it has, illusory being does not posit this itself but has it immediately. The various forms of idealism, Leibnizian, Kantian, Fichtean, and others, have not advanced beyond being as determinateness, have not advanced beyond this immediacy, any more than skepticism did. Skepticism permits the content of its illusory being to be given to it; whatever content it is supposed to have, for skepticism it is immediate. The monad of Leibniz evolves its ideas and representations out of itself; but it is not the power that generates and binds them together, rather do they arise in the monad like bubbles; they are indifferent and immediate over against one another and the same in relation to the monad itself. Similarly, the Kantian Appearance [Erscheinung] is a given content of perception; it presupposes affections, determinations of the subject, which are immediately relatively to themselves and to the subject. It may well be that the infinite obstacle of Fichte's idealism has no underlying thing-in-itself, so that it becomes purely a determinateness in the ego; but for the ego, this determinateness which it appropriates and whose externality it sublates is at the same time immediate, a limitation of the ego, which it can transcend but which has in it an element of indifference, so that although the limitation is in the ego, it contains an immediate non-being of the ego." (p. 396-397).

      In Lenin's notebooks on Hegel's Science of Logic, these sections provoke a considerable degree of excitement. Lenin's 'Conspectus of Hegel's Science of Logic' can be accessed via Marxists.org here:

      https://www.marxists.org/archive/lenin/works/1914/cons-logic/ch02.htm