255 Matching Annotations
  1. May 2024
    1. FastCut adds animated captions, b-rolls & sound effects to your videos. FastCut은 동영상에 애니메이션 캡션, 비롤 및 음향 효과를 추가합니다.

  2. Apr 2024
  3. Mar 2024
  4. Feb 2024
  5. Jan 2024
  6. Dec 2023
      • for: plan B, climate futures, dystopian future, civilization collapse

      • title: If We’ve Lost the Climate War, What’s Plan B?

      • subtitle: Why a carbon tax won’t save us, and what’s next.
      • author: Crawford Kilian
      • date: Nov 22, 2023

      • summary

        • a good article that shows the complexity and unpredictability of a collapse scenario and system justification theory, which sounds like the boiling frog syndrome
  7. Nov 2023
    1. <b-table striped hover :items="items"></b-table>

      اگر همه چیت اوکی باشه با گذاشتن یه List از object های JSON خودش میره Header و Data را برات می شونه. * هر Object را داخل یک Row از جدول میزاره. * میاد اون Key های Objcet را به عنوان Header ور میداره.(خود به خود kebab-case را ور میداره و به snake-case و Camel Case تبیل می کند.

  8. Oct 2023
  9. Sep 2023
    1. The non–spore-forming Gram-positive bacilli are a diverse group of aerobic and anaerobic bacteria. This chapter focuses on the aerobic members of this group. The anaerobic, non–spore-forming Gram-positive bacilli such as Propionibacterium species and Actinomyces species are discussed in Chapter 21 on anaerobic infections. Specific genera of both groups, namely, Corynebacterium species and Propionibacterium species, are members of the normal microbiota of skin and mucous membranes of humans and, as such, are frequently contaminants of clinical specimens submitted for diagnostic evaluation. However, among the aerobic Gram-positive bacilli are significant pathogens such as Corynebacterium diphtheriae, an organism that produces a powerful exotoxin that causes diphtheria in humans, and Mycobacterium tuberculosis (see Chapter 23), the causative agent of tuberculosis. Listeria monocytogenes and Erysipelothrix rhusiopathiae are primarily found in animals and occasionally cause severe disease in humans. Nocardia and Rhodococcus species are found in the soil and are significant pathogens among immunocompromised patients.

      The non-spore forming Gram positive bacilli are either aerobic such as( Propionibacterium ,actinomyces)or anaerobic such as (corynebacterial and mycobacterium).anaerobics tend to be irregularly shaped aerobics tends to be regular inshape .

    1. https://www.reddit.com/r/Zettelkasten/comments/10jx7gg/wooden_antinet_zettelkasten/

      Scott Scheper commissioned a two drawer solid wood (cedar) zettelkasten box similar to those from the early 20th century. He had it listed on his website initially for $995 and then later for a reduced $495.

      He created a waitlist sign up for it, ostensibly to test the interest in manufacturing/selling them as a product. To my knowledge he never made any beyond the initial prototype.

      The high cost likely dampened interest compared to the much cheaper primary and secondary markets for these sorts of storage containers.

      See also:<br /> - $995 https://web.archive.org/web/20230124062200/https://www.antinet.org/wooden-antinet-waitlist - $495 reduction https://web.archive.org/web/20230306195625/https://www.antinet.org/wooden-antinet-waitlist

  10. Aug 2023
  11. Jul 2023
    1. a “slanderous and nasty-minded mulattress” for rightly describing rape allegations

      This language actually sounds like Trump, except for "mulatress" which most people probaby wouldn't understand today.

  12. Jun 2023
  13. learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com
    1. And that is part of the larger pattern of the appeal of a new online collectivismthat is nothing less than a resurgence of the idea that the collective is all-wis

      Lanier is saying that the intelligence from the collective is harmful but I feel like throughout my life I have been taught to use other people's knowledge to help me and that teamwork is very important. This made me think of the saying my elementary and middle school teachers have taught me all my life.

  14. May 2023
    1. 39.a člen (prekrški povezanih subjektov) (1) Z globo od 500 do 10.000 eurov se za prekršek kaznuje pravna oseba, če: -        ne določi kontaktne osebe za informacijsko varnost in njenega namestnika ali ne posreduje njunih kontaktnih podatkov pristojnemu nacionalnemu organu (1. točka prvega odstavka 18.a člena tega zakona), -        ne pripravi analize obvladovanja tveganj informacijske varnosti z oceno sprejemljive ravni tveganj (2. točka prvega odstavka 18.a člena tega zakona), -        ne sprejme ali izvaja minimalnega obsega varnostnih ukrepov za zagotavljanje celovitosti, zaupnosti in razpoložljivosti omrežja in informacijskih sistemov, ki upoštevajo posebne potrebe delovnega področja povezanega subjekta (3. točka prvega odstavka 18.a člena tega zakona), -        ne pripravi navodil in postopkov za obvladovanje incidentov informacijske varnosti s protokolom obveščanja CSIRT organov državne uprave (4. točka prvega odstavka 18.a člena tega zakona), -        ne izvede odrejenih ukrepov CSIRT organov državne uprave v svojem informacijsko-komunikacijskem sistemu (četrti odstavek 29. člena tega zakona). (2) Z globo od 500 do 10.000 eurov se za prekršek iz prejšnjega odstavka kaznuje samostojni podjetnik posameznik ali posameznik, ki samostojno opravlja dejavnost. (3) Z globo od 200 do 2.000 eurov se za prekršek iz prvega odstavka tega člena kaznuje odgovorna oseba pravne osebe, samostojnega podjetnika posameznika oziroma posameznika, ki samostojno opravlja dejavnost, ter odgovorna oseba v državnem organu ali samoupravni lokalni skupnosti. 39.b člen (prekrški upravljavca centralnega informacijsko-komunikacijskega sistema) Z globo od 200 do 2.000 eurov se za prekršek kaznuje odgovorna oseba upravljavca centralnega informacijsko-komunikacijskega sistema, če: -        ne omogoča vpogleda v delovanje informacijske infrastrukture centralnega informacijsko-komunikacijskega za CSIRT organov državne uprave (tretji odstavek 29. člena tega zakona), -        ne izvede odrejenih ukrepov CSIRT organov državne uprave v svojem informacijsko-komunikacijskem sistemu (četrti odstavek 29. člena tega zakona).
    2. 34.a člen (nadzor nad povezanimi subjekti) (1) Inšpektor nadzira, ali povezani subjekti izpolnjujejo svoje obveznosti iz prve, druge, tretje in četrte alineje 18.a člena tega zakona, iz odločb, izdanih na podlagi četrtega odstavka 21. člena in četrtega odstavka 22. člena tega zakona, ter ali izvajajo na njihovi podlagi določene ukrepe za varnost omrežij in informacijskih sistemov ter ukrepe, odrejene na podlagi četrtega odstavka 29. člena tega zakona. (2) Inšpektor lahko od povezanih subjektov zahteva, da predložijo informacije, potrebne za oceno varnosti njihovih omrežij in informacijskih sistemov oziroma informacijskih storitev, vključno z dokumentiranimi varnostnimi pravili, ter dokaze o učinkovitem izvajanju varnostnih pravil. Kadar inšpektor zahteva take informacije ali dokaze, navede namen te zahteve in opredeli, katere dodatne informacije so potrebne. (3) Za dokaz o učinkovitem izvajanju varnostnih pravil iz prejšnjega odstavka se šteje ocena varnosti omrežij in informacijskih sistemov, ki jo je za povezane subjekte pripravil kvalificirani revizor. (4) Inšpektor lahko na podlagi ocene varnosti iz prejšnjega odstavka povezanih subjektov izreka ukrepe za odpravo ugotovljenih pomanjkljivosti. 34.b člen (nadzor nad upravljavcem centralnega informacijsko-komunikacijskega sistema) (1) Inšpektor nadzira, ali upravljavec centralnega informacijsko-komunikacijskega sistema izpolnjuje svoje obveznosti iz tretjega odstavka 29. člena tega zakona in ali izvaja ukrepe, odrejene na podlagi četrtega odstavka 29. člena tega zakona. (2) Inšpektor lahko od upravljavca centralnega informacijsko-komunikacijskega sistema zahteva, da predloži potrebne informacije za izvedbo nadzora iz prejšnjega odstavka. Kadar inšpektor zahteva take informacije ali dokaze, navede namen te zahteve in opredeli, katere dodatne informacije so potrebne. (3) Inšpektor lahko na podlagi ocene izpolnjevanja obveznosti in izvajanja ukrepov iz prvega odstavka tega člena izreka ukrepe za odpravo ugotovljenih pomanjkljivosti.
    3. (5) Inšpektor lahko v inšpekcijskem postopku na podlagi obrazloženega predloga zavezanca za podaljšanje rokov za odpravo nepravilnosti in pomanjkljivosti, ki je dan pred potekom roka za izvedbo odrejenih ukrepov, podaljša roke za odpravo nepravilnosti in pomanjkljivosti oziroma izvedbo odrejenih ukrepov, pri tem pa upošteva že izvedene aktivnosti zavezanca za odpravo nepravilnosti in pomanjkljivosti, objektivne okoliščine za zamudo in posledice za javni interes.
    4. , ter nad izvajanjem odrejenih ukrepov iz četrtega dostavka 29. člena tega zakona
    5. (2) CSIRT organov državne uprave poleg drugih nalog, določenih s tem zakonom, izvaja še naslednje naloge: 1.      sprejema priglasitve incidentov, obravnava ter ocenjuje incidente informacijske varnosti v državni upravi in se odziva nanje ter podatke o tem evidentira, hrani in varuje; 2.      zavezancem, za katere je pristojen, nudi metodološko podporo, pomoč in sodelovanje pri pojavitvi incidenta; 3.      spremlja in se odziva na incidente v organih državne uprave in povezanih subjektih; 4.      opozarja, obvešča ter razširja informacije o tveganjih in incidentih informacijske varnosti v državni upravi in povezanih subjektih ter objavlja opozorila o tveganjih in ranljivostih na področju informacijske varnosti; 5.      opravlja dinamične analize tveganja in incidentov informacijske varnosti ter spremlja razmere; 6.      izmenjuje informacije o incidentih informacijske varnosti s skupinami za odzivanje na incidente informacijske varnosti v državi in tujini; 7.      sodeluje z nacionalnim CSIRT in pristojnim nacionalnim organom ter jima na poziv na varen način nudi informacije o izvajanju svojih pristojnosti na podlagi tega zakona.

      močno spremenjen

    6. (3) CSIRT organov državne uprave je za namen učinkovitega izvajanja nalog informacijske in kibernetske varnosti ter kibernetske obrambe pooblaščen za neposredni, nujni in sorazmerni vpogled v delovanje informacijske infrastrukture centralnega informacijsko-komunikacijskega sistema, upravljavec centralnega informacijsko-komunikacijskega sistema pa mu mora to omogočiti. (4) Za namen pravočasnega odzivanja na kibernetske grožnje in preprečevanja škodljivih posledic morebitnega težjega ali kritičnega incidenta ter zaradi izvajanja kibernetske obrambe je CSIRT organov državne uprave pooblaščen, da upravljavcu centralnega informacijsko-komunikacijskega sistema oziroma povezanim subjektom odredi ustrezne, nujne in sorazmerne ukrepe, ki jih morajo ti nemudoma oziroma v postavljenem roku izvesti v svojem informacijsko-komunikacijskem sistemu.
    7. (3) Pristojni nacionalni organ je pristojen za načrtovanje in upravljanje proračunskih virov na področju informacijske varnosti v državni upravi, razen za izvajanje tehničnih nalog informacijske varnosti oziroma kibernetske obrambe pri upravljanju centralnega informacijsko-komunikacijskega sistema oziroma upravljanju informacijsko-komunikacijskih sistemov, namenjenih področju obrambe, varstva pred naravnimi in drugimi nesrečami, policije, internega informacijskega sistema notranjih zadev, obveščevalno-varnostne dejavnosti, zunanjih zadev, preprečevanja in odkrivanja pranja denarja in financiranja terorizma ter opravljanja plačilnega prometa za proračunske uporabnike.
    8. 19.   določi enotno informacijsko varnostno politiko, razen za informacijsko-komunikacijske sisteme, namenjene področju obrambe, varstva pred naravnimi in drugimi nesrečami, policije, internega informacijskega sistema notranjih zadev, obveščevalno-varnostne dejavnosti, zunanjih zadev, preprečevanja in odkrivanja pranja denarja in financiranja terorizma ter opravljanja plačilnega prometa za proračunske uporabnike.
    9. izvajalcev bistvenih storitev in
    10. preprečevanja in
    11. ministrstvo, pristojno za upravljanje informacijsko-komunikacijskih sistemov,
    12. V.a Informacijska varnost povezanih subjektov 18.a člen (obveznosti povezanih subjektov) (1) Povezani subjekti so zavezani za izpolnjevanje obveznosti po tem zakonu, in sicer za: -        določitev kontaktne osebe za informacijsko varnost in njenega namestnika ter za posredovanje njunih kontaktnih podatkov pristojnemu nacionalnemu organu in vsakokratnih sprememb teh podatkov v 15 delovnih dneh od njihovega nastanka, -        pripravo analize obvladovanja tveganj informacijske varnosti z oceno sprejemljive ravni tveganj, -        sprejetje in izvajanje minimalnega obsega varnostnih ukrepov za zagotavljanje celovitosti, zaupnosti in razpoložljivosti omrežja in informacijskih sistemov, ki upoštevajo posebne potrebe delovnega področja povezanega subjekta, ter -        pripravo navodil in postopkov za obvladovanje incidentov informacijske varnosti s protokolom obveščanja CSIRT organov državne uprave, ki mu priglašajo incidente z možnim vplivom na centralno državno informacijsko-komunikacijsko omrežje oziroma sistem (v nadaljnjem besedilu: centralni informacijsko-komunikacijski sistem). (2) Vlada podrobneje določi način izvajanja obveznosti iz prejšnjega odstavka in minimalni obseg varnostnih ukrepov povezanih subjektov glede informacijske varnosti ter metodologijo za pripravo analize obvladovanja tveganj iz druge alineje prejšnjega odstavka. (3) V zvezi s priglasitvijo incidentov povezanih subjektov CSIRT organov državne uprave se smiselno uporabljajo tretji, četrti, peti in šesti odstavek 18. člena tega zakona. (4) Centralni informacijsko-komunikacijski sistem je osrednji državni informacijsko-komunikacijski sistem v upravljanju ministrstva, pristojnega za upravljanje informacijsko-komunikacijskih sistemov, namenjen povezovanju lokalnih omrežij organov državne uprave in drugih subjektov za namene izvrševanja njihovih zakonskih obveznosti ter dostopu do skupnih informacijskih rešitev in informacijsko-komunikacijske infrastrukture preko centraliziranega upravljanja in nadzora. Centralni informacijsko-komunikacijski sistem uporabnikom zagotavlja tudi varen dostop do interneta.
    13. (6) Dnevniški zapisi o delovanju ključnih, krmilnih ali nadzornih informacijskih sistemov ali delov omrežja iz prejšnjega odstavka morajo biti hranjeni na način, ki zagotavlja njihovo avtentičnost, celovitost in razpoložljivost v primeru incidentov.
    14. , lahko pa tudi za daljše obdobje, kadar iz analize obvladovanja tveganj in ocene sprejemljive ravni tveganj izhaja, da bi bilo tveganja ustrezno obvladovati z daljšo hrambo dnevniških zapisov
    15. in preprečevanja
    16. , in -        državni organi, organi lokalnih skupnosti, javne agencije in nosilci javnih pooblastil ter drugi subjekti, ki niso organi državne uprave iz prejšnje alineje ali izvajalci bistvenih storitev iz prve alineje tega odstavka in se povezujejo s centralnim državnim informacijsko-komunikacijskim omrežjem oziroma sistemom (v nadaljnjem besedilu: povezani subjekti).
  15. Apr 2023
  16. Mar 2023
    1. https://www.antinet.org/wooden-antinet-waitlist

      2023-03-06: Noting that the list price on this has now dropped to $495 including shipping. He's also closed the wait list, which I'm guessing was set up to both collect email addresses as well as to test market the demand for such a box at his various price points.

  17. Feb 2023
    1. As noted by the IE SA, the HTML publication of contact information was not considered necessary by Facebook’s Security Team and was subsequently discontinued117. The EDPB considers that the analysis of the principle of data minimisation (Article 5(1)(c) GDPR) is relevant for the necessity assessment on the basis of Article 6(1)(b) GDPR118. Consequently, the EDPB further finds that such analysis should have complemented the LSA’s assessment on the necessity of the processing for the performance of the contract, with specific regard to the publication of the contact information in the HTML source code on the Instagram website. The EDPB considers that the IE SA could not have concluded that the publication of the contact information of child users in the HTML source code may be regarded as

      EDPB rightly smacks the IE SA around a bit for generally cocking this all up.

    1. Kawakatsu, Mari, Philip S. Chodrow, Nicole Eikmeier, and Daniel B. Larremore. “Emergence of Hierarchy in Networked Endorsement Dynamics.” Proceedings of the National Academy of Sciences 118, no. 16 (April 20, 2021): e2015188118. https://doi.org/10.1073/pnas.2015188118.

      Reading with respect to suggestion of:<br /> DeDeo, Simon, and Elizabeth A. Hobson. “From Equality to Hierarchy.” Proceedings of the National Academy of Sciences 118, no. 21 (May 25, 2021): e2106186118. https://doi.org/10.1073/pnas.2106186118.

      See: related notes at https://hypothes.is/a/doCbOKJYEe27O1tS21jybA

  18. Jan 2023
    1. Best B school in Kerala

      Nowadays Kerala is a promising ideal destination for MBA aspirants because the state is a location of many prestigious business schools with excellent MBA programs. Kerala is regarded as the state with the highest rate of literacy in India and as the centre of the nation's education system. Kerala's rapidly expanding economy, which accounts for roughly 4% of all economic activity in India, makes the state an ideal place to pursue an MBA. Marian Institute of Management is the top-ranked MBA school in Kerala with excellent placement rates.

      The MBA programs offered by MIM - The MBA colleges in Kerala with the greatest placement combine top-notch instruction with recruitment to prestigious businesses. Kerala is the top choice for postgraduate study among students all around India. The two-year MBA program develops professionals with entrepreneurial solid skills out of the applicants.

      MBA programs give students a thorough understanding of and training in business operations and business administration management. MBA programs are open to students from all backgrounds, including the humanities, sciences, and business. When a student is looking for jobs at reputable organizations, interpersonal qualities like leadership, problem-solving, analytical ability, goal-oriented, and strong communication may be an advantage. The best placements are at MIM, Kerala's leading MBA school.

      MIM is a part of Marian College, a reputable institution that attracts MBA candidates with its excellent climate and location in the most picturesque hilly region of the Idukki District. This location is blessed with access to global infrastructure, reasonable fees, and a high hiring rate by prestigious firms. Students choose to study at MIM from all across India and other countries as well.

      MIM has been approved by the All-India Council for Technical Education (AICTE), New Delhi, to admit 180 students. The college is approved by the Kerala government and affiliated with Mahatma Gandhi University in Kottayam. The National Board of Accreditation has granted college accreditation (NBA). Since its founding in 2009, the college has had great success placing its graduates in prestigious organizations that offer competitive salaries.

      Best B schools in Kerala, MBA admission

      For more details

      https://miim.ac.in/

    1. I've seen a bunch of people sharing this and repeating the conclusion: that the success is because the CEO loves books t/f you need passionate leaders and... while I think that's true, I don't think that's the conclusion to draw here. The winning strategy wasn't love, it was delegation and local, on the ground, knowledge.

      This win comes from a leader who acknowledges people in the stores know their communities and can see and react faster to sales trends in store... <br /> —Aram Zucker-Scharff (@Chronotope@indieweb.social) https://indieweb.social/@Chronotope/109597430733908319 Dec 29, 2022, 06:27 · Mastodon for Android

      Also heavily at play here in their decentralization of control is regression toward the mean (Galton, 1886) by spreading out buying decisions over a more diverse group which is more likely to reflect the buying population than one or two corporate buyers whose individual bad decisions can destroy a company.

      How is one to balance these sorts of decisions at the center of a company? What role do examples of tastemakers and creatives have in spaces like fashion for this? How about the control exerted by Steve Jobs at Apple in shaping the purchasing decisions of the users vis-a-vis auteur theory? (Or more broadly, how does one retain the idea of a central vision or voice with the creative or business inputs of dozens, hundreds, or thousands of others?)

      How can you balance the regression to the mean with potentially cutting edge internal ideas which may give the company a more competitive edge versus the mean?

  19. Dec 2022
    1. In my line of work as a writer, there’s a near endless stream of new applications coming out that touch different stages in my workflow: e-book readers, notetaking apps, tools for managing PDFs, word processors, bibliographic databases. The problem is that it’s very tricky to switch horses midstream with these kinds of tools, which means you have a natural tendency to get locked into a particular configuration, potentially missing out on better approaches.

      Steven Johnson indicates that it can be difficult to change workflows, tools, apps, etc.

    2. I quickly found myself in the ironic situation of spending so much time building a tool to help with my schoolwork that I stopped actually doing my schoolwork.

      Early example of being overwhelmed by one's tool.

  20. Nov 2022
  21. Oct 2022
    1. It occurs to me that keeping a “wish-list” of intellectual/creative challenges, even if you’re not exactly sure yet what the exact subject matter will be for those challenges, would be a productive routine to have, for writers and non-writers alike.
  22. Aug 2022
    1. In addition to Australia, Europe and the U.S., ADS-B mandates are in effect in Colombia, India, Indonesia, Malaysia, New Zealand, Papua New Guinea, South Africa, Taiwan and Vietnam. Regulatory activity is ongoing in Canada, China and Saudi Arabia.
    1. Amherst College library described in Colin B. Burke's Information and Intrigue, organized books and cards based on author name. In both cases, the range of books on a shelf was random.

      Information and Intrigue by Colin B. Burke

  23. Jul 2022
    1. difference is that the matrix

      Hi, sorry I may have read inattentively, but how to implement this matrix in code?

  24. Jun 2022
    1. The course Marginalia in Books from Christopher Ohge is just crying out to have an annotated syllabus.

      Wish I could follow along directly, but there's some excellent reference material hiding in the brief outline of the course.


      Perhaps a list of interesting people here too for speaking at https://iannotate.org/ 2022 hiding in here? A session on the history of annotation and marginalia could be cool there.

    2. Matthew Fay (Institute of English Studies, University of London)

      Online

      Short Bio

      Over the years, Matthew has turned his hand to several disciplines, from high school teaching to theatre directing, before taking the MA in the History of the Book at London University. He is now undertaking research for a PhD on an archive formed by his great-grandfather, Frank Fay (1870-1930), an Irish actor and producer, who collaborated with W. B. Yeats and Lady Gregory on the plays that were performed at the Abbey Theatre in Dublin. Matthew is interested in the provenance of books and theatre history.

      Bibliography

      • Thesis: ‘The Fay Archive: Towards a Checklist and Copy-specific Analysis of Key Research Items by W. B. Yeats, J. M. Synge and Lady Gregory.’ (in progress)
  25. May 2022
  26. Apr 2022
    1. Payne, R. P., Longet, S., Austin, J. A., Skelly, D. T., Dejnirattisai, W., Adele, S., Meardon, N., Faustini, S., Al-Taei, S., Moore, S. C., Tipton, T., Hering, L. M., Angyal, A., Brown, R., Nicols, A. R., Gillson, N., Dobson, S. L., Amini, A., Supasa, P., … Zawia, A. A. T. (2021). Immunogenicity of standard and extended dosing intervals of BNT162b2 mRNA vaccine. Cell, 184(23), 5699-5714.e11. https://doi.org/10.1016/j.cell.2021.10.011