- Apr 2023
-
linrunner.de linrunner.de
-
In particular, with AC connected, a battery with a charge level higher than the stop charge threshold will not be discharged to the stop charge threshold, nor will there be a (cyclic) discharge down to the start charge threshold
Tags
Annotators
URL
-
- Mar 2023
-
www.sciencedirect.com www.sciencedirect.com
-
They also highlighted that high emitters live in all countries, but were concentrated in the USA (3.16 million), causing an average 318 t CO2-e per person, Luxemburg (10,000 individuals emitting 287 t CO2-e/year each), Singapore (50,000, 251 t CO2-e/year), Saudi Arabia (290,000, 247 t CO2-e/year), and Canada (350,000, 204 t CO2-e/year)
Noteworthy countries with the most high carbon net worth individuals (HCNW): - USA - 3.16 million individuals emitting an average 318 t CO2-e/year/person, - Luxemburg: 10,000 individuals emitting an average 287 t CO2-e/year/person, - Singapore: 50,000 individuals emitting 251 t CO2-e/year/person, - Saudi Arabia: 290,000 individuals emitting 247 t CO2-e/year/person, - Canada: 350,000 individuals emitting 204 t CO2-e/year/person
-
-
github.blog github.blog
-
We strongly recommend the use of security keys and TOTPs wherever possible. SMS-based 2FA does not provide the same level of protection, and it is no longer recommended under NIST 800-63B.
-
-
-
We now take an opinionated stance on which second factor you should set up first – you'll no longer be asked to choose between SMS or setting up an authenticator app (known as TOTP), and instead see the TOTP setup screen immediately when first setting up 2FA.
-
-
-
But first, an important note — friends don't let friends use SMS 2FA.
-
-
blog.cmpxchg8b.com blog.cmpxchg8b.com
-
The problem with using SMS-2FA to mitigate this problem is that there’s no reason to think that after entering their credentials, they would not also enter any OTP.
-
discussions about SMS-2FA get heated very quickly. I've found that SMS-2FA deployment or advocacy has been a major professional project for some people, and they take questioning it's efficacy personally
-
I believe that SMS 2FA is wholly ineffective, and advocating for it is harmful.
Would this also appyl to OTP by e-mail??
-
-
www.liberation.fr www.liberation.fr
-
www.liberation.fr www.liberation.fr
-
In Polen hat die Staatsfirma Orlen lange enormer Gewinne mit fossilen Brennstoffen aus Russland gemacht. Damit hat sie sich u.a. in die Regionalpresse eingekauft, um dort Propaganda für die rechtskonservative Regierung zu machen.
-
- Feb 2023
-
aeon.co aeon.co
-
One online company, Books by the Foot, offers to ‘curate a library that matches both your personality and your space’, promising to provide books ‘based on colour, binding, subject, size, height, and more to create a collection that looks great’.
-
- Jan 2023
-
docdrop.org docdrop.org
-
we have committed to spend 6.2 billion dollars we've made that public to give ourselves real Zero by 2030.
!- quotable : Andrew Forrest - Real zero by 2030 : not net zero by 2030
!- question : just transition - can a clean energy transition be just when billionaires are involved in capital centralising investments?
-
-
forum.zettelkasten.de forum.zettelkasten.de
-
Note 9/8j says - "There is a note in the Zettelkasten that contains the argument that refutes the claims on every other note. But this note disappears as soon as one opens the Zettelkasten. I.e. it appropriates a different number, changes position (or: disguises itself) and is then not to be found. A joker." Is he talking about some hypothetical note? What did he mean by disappearing? Can someone please shed some light on what he really meant?
On the Jokerzettel
9/8j Im Zettelkasten ist ein Zettel, der das Argument enthält, das die Behauptungen auf allen anderen Zetteln widerlegt.
Aber dieser Zettel verschwindet, sobald man den Zettelkasten aufzieht.
D.h. er nimmt eine andere Nummer an, verstellt sich und ist dann nicht zu finden.
Ein Joker.
—Niklas Luhmann, ZK II: Zettel 9/8j
Translation:
9/8j In the slip box is a slip containing the argument that refutes the claims on all the other slips. But this slip disappears as soon as you open the slip box. That is, he assumes a different number, disguises himself and then cannot be found. A joker.
Many have asked about the meaning of this jokerzettel over the past several years. Here's my slightly extended interpretation, based on my own practice with thousands of cards, about what Luhmann meant:
Imagine you've spent your life making and collecting notes and ideas and placing them lovingly on index cards. You've made tens of thousands and they're a major part of your daily workflow and support your life's work. They define you and how you think. You agree with Friedrich Nietzsche's concession to Heinrich Köselitz that “You are right — our writing tools take part in the forming of our thoughts.” Your time is alive with McLuhan's idea that "The medium is the message." or in which his friend John Culkin said, "We shape our tools and thereafter they shape us."
Eventually you're going to worry about accidentally throwing your cards away, people stealing or copying them, fires (oh! the fires), floods, or other natural disasters. You don't have the ability to do digital back ups yet. You ask yourself, can I truly trust my spouse not to destroy them?,What about accidents like dropping them all over the floor and needing to reorganize them or worse, the ghost in the machine should rear its head?
You'll fear the worst, but the worst only grows logarithmically in proportion to your collection.
Eventually you pass on opportunities elsewhere because you're worried about moving your ever-growing collection. What if the war should obliterate your work? Maybe you should take them into the war with you, because you can't bear to be apart?
If you grow up at a time when Schrodinger's cat is in the zeitgeist, you're definitely going to have nightmares that what's written on your cards could horrifyingly change every time you look at them. Worse, knowing about the Heisenberg Uncertainly Principle, you're deathly afraid that there might be cards, like electrons, which are always changing position in ways you'll never be able to know or predict.
As a systems theorist, you view your own note taking system as a input/output machine. Then you see Claude Shannon's "useless machine" (based on an idea of Marvin Minsky) whose only function is to switch itself off. You become horrified with the idea that the knowledge machine you've painstakingly built and have documented the ways it acts as an independent thought partner may somehow become self-aware and shut itself off!?!
https://www.youtube.com/watch?v=gNa9v8Z7Rac
And worst of all, on top of all this, all your hard work, effort, and untold hours of sweat creating thousands of cards will be wiped away by a potential unknowable single bit of information on a lone, malicious card and your only recourse is suicide, the unfortunate victim of dataism.
Of course, if you somehow manage to overcome the hurdle of suicidal thoughts, and your collection keeps growing without bound, then you're sure to die in a torrential whirlwind avalanche of information and cards, literally done in by information overload.
But, not wishing to admit any of this, much less all of this, you imagine a simple trickster, a joker, something silly. You write it down on yet another card and you file it away into the box, linked only to the card in front of it, the end of a short line of cards with nothing following it, because what could follow it? Put it out of your mind and hope your fears disappear away with it, lost in your box like the jokerzettel you imagined. You do this with a self-assured confidence that this way of making sense of the world works well for you, and you settle back into the methodical work of reading and writing, intent on making your next thousands of cards.
Tags
- Werner Heisenberg
- ghost in the machine
- Lila
- Heisenberg Uncertainty Principle
- Niklas Luhmann's zettelkasten
- Schrödinger's cat
- Niklas Luhmann
- Erwin Schrödinger
- note collection loss and damage
- fear uncertainty and doubt
- Ghostbusters
- death by zettelkasten
- Claude Shannon
- dataism
- jokerzettel
- useless machines
- fears
Annotators
URL
-
-
impedagogy.com impedagogy.com
-
This
Our calendar paint by number that we call our lives.
Tags
Annotators
URL
-
-
-
Diet YAML is a light weight version of YAML that removes much of the complex aspects of the mainline YAML specification.
-
-
news.ycombinator.com news.ycombinator.com
-
The usefulness of JSON is that while both systems still need to agree on a custom protocol, it gives you an implementation for half of that custom protocol - ubiquitous libraries to parse and generate the format, so the application needs only to handle the semantics of a particular field.
To be clear: when PeterisP says parse the format, they really mean lex the format (and do some minimal checks concerning e.g. balanced parentheses). To "handle the semantics of a particular field" is a parsing concern.
-
-
runestone.academy runestone.academy
-
High level languages are portable meaning they can run on different computers with little or no modifications
-
-
-
paranoia has some surprising behaviour (like overriding ActiveRecord's delete and destroy) and is not recommended for new projects. See discard's README for more details. Paranoia will continue to accept bug fixes and support new versions of Rails but isn't accepting new features.
-
-
kmitov.com kmitov.com
-
But it does not work, because the association with authors will return empty authors for the Material as the materials are also soft deleted.
-
The problem is that Globalize knows nothing about acts_as_paranoid. You can delete a Material, and it should delete the translations, but when you try to recover the Material then there is an error because of how the translations are implemented and the order in which the translations and the Material are recovered. Which record should be recovered first?
-
Remember that the Material has all of its translations for the title in a table that just got soft deleted. So the correct answer is “nil”. The title of the delete material is nil.
-
-
- Dec 2022
-
community.tp-link.com community.tp-link.com
-
This is a terrible idea. At least if there's no way to opt out of it! And esp. if it doesn't auto log out the original user after some timeout.
Why? Because I may no longer remember which device/connection I used originally or may no longer have access to that device or connection.
What if that computer dies? I can't use my new computer to connect to admin UI without doing a factory reset of router?? Or I have to clone MAC address?
In my case, I originally set up via ethernet cable, but after I disconnected and connected to wifi, the same device could not log in, getting this error instead! (because different interface has different mac address)
-
-
docdrop.org docdrop.org
-
what you and I just said compared to the global narratives like net zero by 00:11:29 2050 is maybe blasphemy. It's almost a completely different worldview. And so the net zero very common McKinsey sort of governmental forecast is very different than what we're saying. And I don't think both can be true.
!- contradiction : between mainstream green growth net zero by 205 narrative, and ours
Tags
Annotators
URL
-
- Nov 2022
-
bugs.ruby-lang.org bugs.ruby-lang.org
-
I would like to understand this design then. In my experience it has only served to limit what I can achieve, and gained me no additional benefit.
-
-
stackoverflow.com stackoverflow.com
-
As has been stated elsewhere, in a Capybara test you typically want to do POSTs by submitting a form just like the user would.
-
-
www.suffix.be www.suffix.be
-
So far for the obligatory warning. I get the point, I even agree with the argument, but I still want to send a POST request. Maybe you are testing an API without a user interface or you are writing router tests? Is it really impossible to simulate a POST request with Capybara? Nah, of course not!
-
The Capybara Ruby gem doesn’t support POST requests, the built-in visit method always uses GET. This is by design and with good reason: Capybara is built for acceptance testing and a user would never ask to ‘post’ parameter X and Y to the application. There will always be some kind of interface, a form for example. It makes more sense to simulate what the visitor would really do
-
-
github.com github.com
-
This is ugly by design, as an inducement to test properties instead of specifics.
-
-
billyoppenheimer.com billyoppenheimer.com
-
Throughout this piece Oppenheimer provides examples of notes he wrote which eventually made it into his written output in their entirety.
This has generally been uncommon in the literature, but is a great form of pedagogy. It's subtle, but it makes his examples and advice much stronger than others who write these sorts of essays.
-
-
en.wikipedia.org en.wikipedia.org
-
Some software attempts to hide this by translating the bytes of invalid UTF-8 to matching characters in Windows-1252 (since that is the most likely source of these errors), so that the replacement character is never seen.
-
- Oct 2022
-
www.gutenberg.org www.gutenberg.org
-
Les murs du cabinet de travail, le plancher, le plafond même portaient des liasses débordantes, des cartons démesurément gonflés, des boîtes où se pressait une multitude innombrable de fiches, et je contemplai avec une admiration mêlée de terreur les cataractes de l'érudition prêtes à se rompre. —Maître, fis-je d'une voix émue, j'ai recours à votre bonté et à votre savoir, tous deux inépuisables. Ne consentiriez-vous pas à me guider dans mes recherches ardues sur les origines de l'art pingouin? —Monsieur, me répondit le maître, je possède tout l'art, vous m'entendez, tout l'art sur fiches classées alphabétiquement et par ordre de matières. Je me fais un devoir de mettre à votre disposition ce qui s'y rapporte aux Pingouins. Montez à cette échelle et tirez cette boîte que vous voyez là-haut. Vous y trouverez tout ce dont vous avez besoin. J'obéis en tremblant. Mais à peine avais-je ouvert la fatale boîte que des fiches bleues s'en échappèrent et, glissant entre mes doigts, commencèrent à pleuvoir. Presque aussitôt, par sympathie, les boîtes voisines s'ouvrirent et il en coula des ruisseaux de fiches roses, vertes et blanches, et de proche en proche, de toutes les boîtes les fiches diversement colorées se répandirent en murmurant comme, en avril, les cascades sur le flanc des montagnes. En une minute elles couvrirent le plancher d'une couche épaisse de papier. Jaillissant de leurs inépuisables réservoirs avec un mugissement sans cesse grossi, elles précipitaient de seconde en seconde leur chute torrentielle. Baigné jusqu'aux genoux, Fulgence Tapir, d'un nez attentif, observait le cataclysme; il en reconnut la cause et pâlit d'épouvante. —Que d'art! s'écria-t-il. Je l'appelai, je me penchai pour l'aider à gravir l'échelle qui pliait sous l'averse. Il était trop tard. Maintenant, accablé, désespéré, lamentable, ayant perdu sa calotte de velours et ses lunettes d'or, il opposait en vain ses bras courts au flot qui lui montait jusqu'aux aisselles. Soudain une trombe effroyable de fiches s'éleva, l'enveloppant d'un tourbillon gigantesque. Je vis durant l'espace d'une seconde dans le gouffre le crâne poli du savant et ses petites mains grasses, puis l'abîme se referma, et le déluge se répandit sur le silence et l'immobilité. Menacé moi-même d'être englouti avec mon échelle, je m'enfuis à travers le plus haut carreau de la croisée.
France, Anatole. L’Île Des Pingouins. Project Gutenberg 8524. 1908. Reprint, Project Gutenberg, 2005. https://www.gutenberg.org/cache/epub/8524/pg8524.html
Death by Zettelkasten!!
(Coming soon to a theater near you...)
In the preface to the novel Penguin Island (L'Île des Pingouins. Calmann-Lévy, 1908) by Nobel prize laureate Anatole France, a scholar is drowned by an avalanche of index cards which formed a gigantic whirlpool streaming out of his card index (Zettelkasten).
Link to: Historian Keith Thomas has indicated that he finds it hard to take using index cards for excerpting and research seriously as a result of reading this passage in the satire Penguin Island.<br /> https://hypothes.is/a/rKAvtlQCEe2jtzP3LmPlsA
Translation via: France, Anatole. Penguin Island. Translated by Arthur William Evans. 8th ed. 1908. Reprint, New York, NY, USA: Dodd, Mead & Co., 1922. https://www.google.com/books/edition/Penguin_Island/6UpWAvkPQaEC?hl=en&gbpv=0
Small changes in the translation by me, comprising only adding the word "index" in front of the occurrences of card to better represent the historical idea of fiches used by scholars in the late 1800s and early 1900s, are indicated in brackets.
The walls of the study, the floor, and even the ceiling were loaded with overflowing bundles, paste board boxes swollen beyond measure, boxes in which were compressed an innumerable multitude of small [index] cards covered with writing. I beheld in admiration mingled with terror the cataracts of erudition that threatened to burst forth.
“Master,” said I in feeling tones, “I throw myself upon your kindness and your knowledge, both of which are inexhaustible. Would you consent to guide me in my arduous researches into the origins of Penguin art?"
“Sir," answered the Master, “I possess all art, you understand me, all art, on [index] cards classed alphabetically and in order of subjects. I consider it my duty to place at your disposal all that relates to the Penguins. Get on that ladder and take out that box you see above. You will find in it everything you require.”
I tremblingly obeyed. But scarcely had I opened the fatal box than some blue [index] cards escaped from it, and slipping through my fingers, began to rain down.
Almost immediately, acting in sympathy, the neighbouring boxes opened, and there flowed streams of pink, green, and white [index] cards, and by degrees, from all the boxes, differently coloured [index] cards were poured out murmuring like a waterfall on a mountain-side in April. In a minute they covered the floor with a thick layer of paper. Issuing from their in exhaustible reservoirs with a roar that continually grew in force, each second increased the vehemence of their torrential fall. Swamped up to the knees in cards, Fulgence Tapir observed the cataclysm with attentive nose. He recognised its cause and grew pale with fright.
“ What a mass of art! ” he exclaimed.
I called to him and leaned forward to help him mount the ladder which bent under the shower. It was too late. Overwhelmed, desperate, pitiable, his velvet smoking-cap and his gold-mounted spectacles having fallen from him, he vainly opposed his short arms to the flood which had now mounted to his arm-pits . Suddenly a terrible spurt of [index] cards arose and enveloped him in a gigantic whirlpool. During the space of a second I could see in the gulf the shining skull and little fat hands of the scholar; then it closed up and the deluge kept on pouring over what was silence and immobility. In dread lest I in my turn should be swallowed up ladder and all I made my escape through the topmost pane of the window.
-
-
-
Elizabeth I’s tutor, Roger Ascham (1515–68), promotedlearning-by-doing in The Scholemaster: ‘Bring not up your children in learningby compulsion and feare,’ he said, ‘but by playing and pleasure.’
-
-
unix.stackexchange.com unix.stackexchange.com
-
The bash manual contains the statement For almost every purpose, aliases are superseded by shell functions.
-
-
conteudo.companyhero.com conteudo.companyhero.com
-
Importante fornecer um e-mail válido para a solicitação da nota fiscal.
Tags
- O valor mínimo para comissionamento é de R$100,00. Abaixo disso, ficará em "stand-by" acumulando para pagamento. CNAEs: para emissão da nota fiscal, podem ser utilizados quaisquer CNAEs, exceto consultoria. Os pagamentos ocorrem sempre às segundas. Geramos um lote por semana, portanto, as NFs serão pagas na primeira segunda-feira após o recebimento pelo financeiro. As solicitações de nota podem ocorrer até a terceira semana de cada mês. É muito importante que os CADs mantenham seus cadastros atualizados. E-mail, telefone, etc. Os pagamentos ocorrem no mês subsequente à ativação. Ex: ativação em outubro, receberá em novembro. Só é comissionada a primeira ativação do cliente. Quando um cliente contrata mensal, o pagamento do CAD não se torna recorrente, é apenas na primeira parcela. Não serão comissionadas primeiras ativações que forem advindas de Google ADS.
- Incluir:
Annotators
URL
-
-
www.dentons.com www.dentons.com
-
Inspirée du Règlement général sur la protection des données (RGPD) de l’Union européenne, la nouvelle loi québécoise place la barre plus haut en introduisant de nouvelles normes pour les droits individuels à la vie privée
-
-
-
in many ways, Law 25 is the most stringent of the three regimes
-
Privacy by default: Bill 64’s “confidentiality by default” clause is far broader in scope and significantly more stringent than the “privacy by design” concept under the GDPR. The CCPA does not provide for this concept at all, instead taking an “after-the-event” remedial approach.
-
-
blog.didomi.io blog.didomi.io
-
La confidentialité par défaut : La clause de "confidentialité par défaut" du projet de loi 64 a une portée beaucoup plus vaste et est beaucoup plus stricte que le concept de "confidentialité par conception" prévu par le RGPD. Le CCPA adopte plutôt une approche corrective "après coup".
-
- Sep 2022
-
ccyd.co.uk ccyd.co.uk
-
As I’d watched Momma put ruffles on the hem and cute little tucks around the waist, I knew that once I put it on I’d look like a movie star. (It was silk and that made up for the awful color.) I was going to look like one of the sweet little white girls who were everybody’s dream of what was right with the world. Hanging softly over the black Singer sewing machine, it looked like magic, and when people saw me wearing it they were going to run up to me and say, “Marguerite [sometimes it was ‘dear Marguerite’], forgive us, please, we didn’t know who you were,” and I would answer generously, “No, you couldn’t have
known. Of course I forgive you.”
-
-
r-lang.com r-lang.com
-
R is the implementation of the S programming language combined with lexical scoping semantics inspired by Scheme.
-
The S language is often the driver programming language for research in statistical methodology, and R gives an Open Source route to participation in that activity.
-
-
alphacnc.com alphacnc.com
-
Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.
Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.
- Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.
It can be seen that when the thickness of carbon steel material is less than 2mm, customers who attach great importance to cutting speed can consider using 2000W fiber laser cutting machine, but the 2000W machine is much higher than 1000W in equipment price and operating cost. When the carbon steel material is larger than 2mm, the 2000W machine is not much faster than the 1000W cutting speed. Therefore, the 1000W fiber laser cutting machine is more cost-effective than the 2000W fiber laser cutting machine.
The cutting speed can directly reflect the efficiency of the fiber laser cutting machine. For cutting different materials with different thickness, the cutting speed will also change greatly. The thicker the thickness, the slower the speed!
-
- Aug 2022
-
github.com github.com
-
Extensions from Ruby are noted in the following list.
Tags
Annotators
URL
-
- Jul 2022
-
codes.ohio.gov codes.ohio.gov
-
This section does not apply to any political party or group which has had a place on the ballot in each national and gubernatorial election since the year 1900.
You are only allowed to advocate overthrow of the Government in Ohio if you are a Republican or Democrat.
-
-
gist.github.com gist.github.com
-
5.7 Prioritize by weighing the value of additional information against the cost of not deciding.
5.7 Prioritize by weighing the value of additional information against the cost of not deciding.
-
-
docs.italia.it docs.italia.it
-
Nella licenza ODbL definita come “eventuali termini o misure tecnologiche presenti nel Database, in un Database Derivato, o in tutto o in parte sostanziale dei contenuti che alterano o limitano i termini della Licenza”, intesa, quindi, come divieto di imposizione salvo possibilità di lasciare copia aperta. Nella licenza CC-BY definita come “misure che, in assenza di apposita autorità, possono non essere eluse ai sensi di leggi che adempiono agli obblighi di cui all’articolo 11 del Trattato WIPO sul diritto d’autore adottato il 20 dicembre 1996, e/o accordi internazionali simili”, intesa quindi come divieto di imposizione senza alternative
piccola nota: questo è anche uno dei motivi per cui non c'è compatibilità fra CC-BY 4.0 e ODbL
-
-
github.com github.com
-
# ActiveStorage defaults to security via obscurity approach to serving links # If this is acceptable for your use case then this authenticable test can be # removed. If not then code should be added to only serve files appropriately. # https://edgeguides.rubyonrails.org/active_storage_overview.html#proxy-mode def authenticated? raise StandardError.new "No authentication is configured for ActiveStorage" end
-
-
github.com github.com
-
I think this is important, and I'd love to help making ActiveStorage a more secure place.
Tags
Annotators
URL
-
-
ernestbecker.org ernestbecker.org
-
Kierkegaard has essentially this same view of human existence, a view that Becker praises in The Denial of Death. Because we are this tension of opposites, says Kierkegaard, in order to be authentically human we need to accept the mystery and responsibility of participation in both of these dimensions of reality that constitute life structured by death. Most people fall short of this authenticity, he declares. They flee its difficulties. And there are two basic ways of doing this. People either (1) immerse themselves in the dimension of things that perish, the things and pleasures of the world, which allows them to evade the awareness of death: the attitude summed up in the advice to “eat, drink, and be merry.” Or they (2) cling to some false certainty about immortality, imagining that some kind of immortality is their assured possession, and this too allows them to evade the awareness of death.
Kierkegaard seems to look at death the same way as Becker. If we are authentic, it takes courage, first, but then we recognize it as wisdom. We participate in both the changing, perishable reality as well as the immutable, unchanging reality. Most people are too afraid to reach this point and evade a life structured by death in two major ways of denial of death. First they can live and let live. Enjoy all pleasures today with no regard for tomorrow. Second they can fall into an immortality project
-
- May 2022
-
ig.ft.com ig.ft.com
-
Can you reach net zero by 2050?
Can you reach net zero by 2050 is a game designed by partnership between IEA and Financial Times.
-
-
www.usmcu.edu www.usmcu.edu
-
The hyperthreat can be outmaneuvered by humans reconfiguring their activities in two ways: security by design and security by dispersal. National security in the Anthropocene is increasingly achieved by designing systems and settlements so that enhanced security is incorporated from the start. For example, it can be imagined that each time a person refuels a car with petrol, this action empowers the hyperthreat. This leads to global warming, which creates ocean acidification and in turn reduced fish stocks, while also creating pressures for resource wars, thereby influencing whether a soldier or civilian dies and how much taxpayer resources are required for material security missions. In contrast, zero-emission transportation technologies can “design out” the slow violence and threats associated with a fossil-fuel-intensive lifestyle. This is similar for plastic use, in which case the “threat” is embodied in the high polluting design of consumable products and lifestyle activities. Likewise, other health threats and longer-term costs are embodied in hidden toxins or sugars in food products. Accordingly, peace, health, and a different form of national prosperity can be created through design, which requires a longer-term and mesh-intervention viewpoint. OP VAK has a role to play in achieving security and safety by design by linking apparently benign activities with their devastating impacts.
Linking these many fragmented and long causal chains and tracing them back to the hyperthreat can be a polwerful visualization that brings the hyperthreat to life.
-
-
aeon.co aeon.co
-
the underprivileged are priced out of the dental-treatment system yet perversely held responsible for their dental condition.
How does this happen?
Is it the idea of "personal responsibility" and "pull yourself up by the bootstraps" philosophy combined with lack of any actual support and/or education?
There has to be a better phrase or word to define the perverse sort of philosophy espoused by many in the Republican party about this sort of "personal responsibility".
It feels somewhat akin to the idea of privatize profits and socialize the losses. The social loss is definitely one that is pushed off onto the individual, but who's profiting? Is it really so expensive to fix this problem? Isn't the loss to society and public health akin to the Million Dollar Murray problem?
Wouldn't each individual's responsibility be better tied to the collective good as well as their own outcomes? How can the two be bound together to improve outcomes for everyone all around?
-
-
wordpress.com wordpress.com
-
"I didn't fully understand it at the time, but throughout my time as a freshman at Boston College I've realized that I have the power to alter myself for the better and broaden my perspective on life. For most of my high school experience, I was holding to antiquated thoughts that had an impact on the majority of my daily interactions. Throughout my life, growing up as a single child has affected the way am in social interactions. This was evident in high school class discussions, as I did not yet have the confidence to be talkative and participate even up until the spring term of my senior year."
Tags
- Introduction p.1
- (Major Essay) Introduction paragraph
- In this annotation, I choose to expand on my introduction. Before I explain why I chose the words I did, I should mention that my first draft failed to meet one of the assignment's primary requirements: a "Story like" structure. Finally, I decided to rework my introduction because my first draft did not begin with a clear beginning. Instead, I started by describing the fundamental context of the encounter before detailing my previous experiences. To improve my final edit, I made sure I described my experiences and/or how I felt before they occurred.
Annotators
URL
-
- Apr 2022
-
github.com github.com
-
Instead read this gems brief source code completely before use OR copy the code straight into your codebase.
Tags
- software development: use of libraries vs. copying code into app project
- having a deep understanding of something
- software development: use of libraries: only use if you've read the source and understand how it works
- learning by reading the source
- copy and paste programming
- read the source code
Annotators
URL
-
-
-
Seeing examples of outstanding work motivates students by givingthem a vision of the possible. How can we expect students to produce first-ratework, he asks, when they have no idea what first-rate work looks like?
Showing students examples of work and processes that they can imitate will fuel their imaginations and capabilities rather than stifle them.
-
three steps required to solve the all-importantcorrespondence problem. Step one, according to Shenkar: specify one’s ownproblem and identify an analogous problem that has been solved successfully.Step two: rigorously analyze why the solution is successful. Jobs and hisengineers at Apple’s headquarters in Cupertino, California, immediately got towork deconstructing the marvels they’d seen at the Xerox facility. Soon theywere on to the third and most challenging step: identify how one’s owncircumstances differ, then figure out how to adapt the original solution to thenew setting.
Oded Shenkar's three step process for effective problem solving using imitation: - Step 1. Specify your problem and identify an analogous problem that has been successfully solved. - Step 2. Analyze why the solution was successful. - Step 3. Identify how your problem and circumstances differ from the example problem and figure out how to best and most appropriately adapt the original solution to the new context.
The last step may be the most difficult.
The IndieWeb broadly uses the idea of imitation to work on and solve a variety of different web design problems. By focusing on imitation they dramatically decrease the work and effort involved in building a website. The work involved in creating new innovative solutions even in their space has been much harder, but there, they imitate others in breaking the problems down into the smallest constituent parts and getting things working there.
Link this to the idea of "leading by example".
Link to "reinventing the wheel" -- the difficulty of innovation can be more clearly seen in the process of people reinventing the wheel for themselves when they might have simply imitated a more refined idea. Searching the state space of potential solutions can be an arduous task.
Link to "paving cow paths", which is a part of formalizing or crystalizing pre-tested solutions.
-
-
-
There are project layouts that put implementation files and test files together.
-
- Mar 2022
-
www.iqsdirectory.com www.iqsdirectory.com
-
Drum or bag – a mechanism that requires replacement of the drum or bag that collects the matter.
-
-
github.com github.com
-
This gem is just one concern with one scope. If you want to customize it later you can simply copy the code directly into your project.
-
-
www.reddit.com www.reddit.com
-
I used to maintain a small patch set of issues that affected me and were fixed on the GNOME bugzilla but ignored by main devs. This is was a motivating factor in my switch to to Unity years ago. Sad to hear this situation hasn't improved.
-
I don't want to agree with you, but I tried to make a few polishing contributions to GNOME games and they got ignored after the first developer response (they told me what to fix, I fixed it). They've been stagnant for over 3 years now.
-
Submitting changes and having them accepted by GNOME is an exercise in futility if you aren't a GNOME dev.
-
- Feb 2022
-
www.jacobsen.no www.jacobsen.no
-
Hence an email address/mailbox/addr-spec is "local-part@domain"; "local-part" is composed of one or more of 'word' and periods; "word" can be an "atom" which can include anything except "specials", control characters or blank/space; and specials (the *only* printable ASCII characters [other than space, if you call space "printable"] *excluded* from being a valid "local-part") are: ()<>@,;:\".[] Therefore by the official standard for email on the internet, the plus sign is as much a legal character in the local-part of an email address as "a" or "_" or "-" or most any other symbol you see on the main part of a standard keyboard.
-
There's a common design flaw on many many websites that require an email address to register; most recently I came across this bug on CNet's download.com site: for some reason they don't accept me when I try to register an email address containing a "+", and they then send me back saying my address is invalid. It isn't!
-
"+" is a completely valid character in an email address; as defined by the internet messaging standard published in 1982(!) RFC 822 (page 8 & 9)... Any website claiming anything else is wrong by definition, plus they are prohibiting me and many fellow anti-spam activists from tracking where inbound spam comes from:
-
-
medium.datadriveninvestor.com medium.datadriveninvestor.com
-
Words matter. Don't call your personal knowledge management system a "second brain" as it others something that is a part of you and your thinking.
(Not to mention that it's a marketing term for Tiago Forte's system. See: https://boffosocko.com/2021/07/03/differentiating-online-variations-of-the-commonplace-book-digital-gardens-wikis-zettlekasten-waste-books-florilegia-and-second-brains/#Second%20brain)
-
- Jan 2022
-
docdrop.org docdrop.org
-
Theircontemporary descendants prefer Wendat (pronounced ‘Wen-dot’), noting that ‘Huron’ was originally an insult, meaning(depending on the source) either ‘pig-haired’ or ‘malodorous’.
-
-
www.naturalnews.com www.naturalnews.com
-
these covid concentration camps are going to be ramped up into extermination / death camps
Argument by assertion fallacy and claim of fact: Repeating the claim again and again, does not make it true.
-
Democrats have built death camps in America
Argument by assertion fallacy and claim of fact: Restating this claim once again.
-
covid concentration camps are actually politically-motivated death camps
Argument by assertion fallacy and claim of fact: The article has repeated this claim multiple times.
-
-
www.frontiersin.org www.frontiersin.org
- Nov 2021
-
www.latimes.com www.latimes.com
-
Skimmed opening paragraphs in physical newspaper. Want to revisit. This sounds like the sort of "pulling oneself up by one's bootstraps" that actually works.
-
- Oct 2021
-
www.npmjs.com www.npmjs.comsammy1
Tags
Annotators
URL
-
-
github.com github.com
-
You're right, this discussion is starting to go off on a tangent.
-
Honestly, I think the current discussion has nothing to do with my original issue anymore.
-
-
www.teenvogue.com www.teenvogue.com
-
archive.nytimes.com archive.nytimes.com
-
Employees were ‘free’ to negotiate a work contract to their liking within the context of accepting the ‘prerogatives’ of managers to organised and remunerate their efforts as they saw fit (Fox, 1974).
Tags
Annotators
URL
-
-
certificates.creativecommons.org certificates.creativecommons.org
-
Peers can help you go from No Open Access to some Open Access.
It's difficult to spread Open Access and Free cultural work licenses if blog posts about Open Access are not compatible with Open Access. The article by Anne Young has a non-commercial restriction. It would be nice to contact Anne Young to propose to release her blog post under CC BY-SA license or anyway under a Free cultural work license.
-
- Sep 2021
-
pluralistic.net pluralistic.net
-
The willingness to trade other peoples' fundamental rights for preferential tax treatment fits neatly into all three of these, as does the delusion that somehow this can be resolved with sufficient "personal responsibility."
We know enough about psychology and behavioral economics to know that "personal responsibility" is not going to save us.
This is in even higher relief when we see laws applied in unclosed systems or where other loopholes exist to help the privileged. Frank Wilhot's idea sums things up fairly well:
"Conservatism consists of exactly one proposition, to wit: There must be in-groups whom the law protects but does not bind, alongside out-groups whom the law binds but does not protect."
-
We don't need the threat of repo men to keep you paying your car note – miss a Tesla payment and your car will phone home and lock its doors. When the tow arrives, it will flash its lights, honk its horn and back out of its parking space for repossession.
The technology in advanced cars like the Tesla can be used for repossessing them. Is this an intended or unintended consequence?
-
-
-
avoiding a browser monoculture
-
I have always rooted for Mozilla in preventing Google from obtaining unequivocal control of what has become the most critical software platform in the modern era, one that holds relevance in nearly everyone's life: the web.
-
-
bastillebsd.org bastillebsd.org
-
Highly Secure by Default
Tags
Annotators
URL
-
-
www.huffpost.com www.huffpost.com
-
-
-
Webpacker used to configure Webpack indirectly, which lead to a complicated secondary configuration process. This was done in order to provide default configurations for the most popular frameworks, but ended up creating more complexity than it cured. So now Webpacker delegates all configuration directly to Webpack's default configuration setup.
more trouble than it's worth
- creating more complexity than it cured
Tags
- too complicated
- too hard/complicated/non-trivial
- doing more harm than good
- modern javascript development is complicated
- more trouble than it's worth
- removing feature that is more trouble than it's worth (not worth the effort to continue to maintain / fix bugs caused by keeping it)
- newer/better ways of doing things
- complicated
- changed their mind/opinion
- Why can't this be easier/simpler? Why does it have to be so hard/complicated?
Annotators
URL
-
-
fs.blog fs.blog
-
Author and librarian Nancy Pearl advocates the “Rule of 50.” This entails reading the first 50 pages of a book and then deciding if it is worth finishing. The Rule of 50 has an interesting feature: once you are over the age of 50, subtract your age from 100 and read that many pages. Pearl writes: “And if, at the bottom of Page 50, all you are really interested in is who marries whom, or who the murderer is, then turn to the last page and find out. If it’s not on the last page, turn to the penultimate page, or the antepenultimate page, or however far back you have to go to discover what you want to know.…When you are 51 years of age or older, subtract your age from 100, and the resulting number (which, of course, gets smaller every year) is the number of pages you should read before you can guiltlessly give up on a book.…When you turn 100, you are authorized (by the Rule of 50) to judge a book by its cover.”
-
- Aug 2021
-
hcommons.org hcommons.org
-
To the people of 1833 it was new to have a photography museum today we have selfie museums what was new in 1833 is not new to us in 2021
-
-
www.audiblegenius.com www.audiblegenius.com
-
two notes that are five pitches away from each other, one, two, three, four, five
Out of context, this sounds like an OBOE (off by one error). You typically wouldn’t count the origin: the two notes are four (semitones) away from one another. That becomes quite useful when you think about all of this as sets and, perhaps, start doing some computation with these. In context, it might simplify things for the moment. It’s just a bit strange to keep all of these in mind. The major third (so, the third note in the scale) is “five pitches” away from the root. The perfect fourth would be “six pitches” away. The perfect fifth “eight pitches away”. Major sixth “10 pitches away”. And the major seventh “12 pitches away”. Which means the octave is “13 pitches away”. Could lead to interesting confusion.
-
- Jul 2021
-
ayjay.org ayjay.org
-
Platforms of the Facebook walled-factory type are unsuited to thework of building community, whether globally or locally, becausesuch platforms are unresponsive to their users, and unresponsive bydesign (design that is driven by a desire to be universal in scope). Itis virtually impossible to contact anyone at Google, Facebook,Twitter, or Instagram, and that is so that those platforms can trainus to do what they want us to do, rather than be accountable to ourdesires and needs
This is one of the biggest underlying problems that centralized platforms often have. It's also a solid reason why EdTech platforms are pernicious as well.
-
-
psyarxiv.com psyarxiv.com
-
Mattavelli, S., Corneille, O., & Unkelbach, C. (2021). Truth by Repetition … without repetition: Testing the effect of instructed repetition on truth judgments. PsyArXiv. https://doi.org/10.31234/osf.io/ux3fc
-
- Jun 2021
-
github.com github.com
-
git diff --cached --diff-filter=ACMR --name-only
Tags
Annotators
URL
-
-
www.futures.design www.futures.design
-
Looks like this is the sort of community that would attempt to put into action some of the ideas behind the book Ruined by Design.
Tags
Annotators
URL
-
-
github.com github.com
-
I was inspired by udzura's mock.
-
-
github.com github.com
-
I'm not sure if there's any cost in terms of contributing either, especially when by design git can have any branch as default, and will not hinder your experience when you use something other than master.
git is neutral/unbiased/agnostic about default branch name by design
And that is a good thing
-
The primary branch in git can have any name by design.
-
-
github.com github.com
-
Inspired by ENV! and David Copeland's article on UNIX Environment, env_setting is a slight rewrite of env_bang to provide OOP style access to your ENV.
Tags
Annotators
URL
-
-
www.mutuallyhuman.com www.mutuallyhuman.com
-
For me the diagrams make it easier to talk about what the tests do without getting bogged down by how they do it.
Tags
- communication: focus on what is important
- describe the what without getting bogged down by how (implementation details; too detailed)
- too detailed
- communication: use the right level of detail
- focus on what it should do, not on how it should do it (implementation details; software design)
- communication: effective communication
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
Programmers should be encouraged to understand what is correct, why it is correct, and then propagate.
new tag?:
- understand why it is correct
Tags
- programming languages: learning/understanding the subtleties
- spreading/propagating good ideas
- having a deep understanding of something
- quotable
- annotation meta: may need new tag
- good advice
- programming: understand the language, don't fear it
- combating widespread incorrectness/misconception by consistently doing it correctly
Annotators
URL
-
-
github.com github.com
-
This was inspired heavily by functionality in the CanCan gem
-
-
github.com github.com
-
shouldn't be a just URL it should be for recourceId
He keeps talking about a "resource id" -- which id would this be?
-
-
prettier.io prettier.io
-
Prettier intentionally doesn’t support any kind of global configuration. This is to make sure that when a project is copied to another computer, Prettier’s behavior stays the same. Otherwise, Prettier wouldn’t be able to guarantee that everybody in a team gets the same consistent results.
-
- May 2021
-
hiphopfoundations.org hiphopfoundations.org
-
Please
The song's title was mentioned in Sly and the Family Stone's hit song "Thank You (Falettinme Be Mice Elf Again)” (1969).
https://genius.com/Sly-and-the-family-stone-sing-a-simple-song-lyrics
-
-
www.reddit.com www.reddit.com
-
Also cross-compatibility with mail clients can be hairy, so you should see what the industry experts are doing.
-
-
www.hteumeuleu.com www.hteumeuleu.com
-
also for our closed ones.
closed ones?
-
- Apr 2021
-
github.com github.com
-
Actually, I've decided to stop using labels for a while. A "bug" label gives the impression that someone else is going to fix the problem. We don't have enough volunteers for that (new contributors welcome!). I try to help people working on issues, though. I've spent many hours on this one.
-
-
store.steampowered.com store.steampowered.com
-
What will you do if your country would be under attack by bandits? You will surely transform into a super robot , isn't it?
-
-
-
Going through different search systems brings us some fruits in the form of indistinct mumbling about the untimely closed I/O data streams, TTYs and PTYs (pseudoterminals) and all the rest of it.
-
Apart from some dodgy English (‘let’s don’t’ for example)
-
Pretty good writing for what seems evident to be a non-native speaker of English
-
-
github.com github.com
-
Read the code! No, really. I wrote this code to be read.
-
-
www.metacritic.com www.metacritic.com
-
Incredible Mandy is a great example of design by subtraction, focusing on puzzle-solving and atmosphere and eschewing mechanics which do not contribute to the developer’s singular vision.
-
-
store.steampowered.com store.steampowered.com
-
Inspired by Minesweeper.
-
-
store.steampowered.com store.steampowered.com
-
is a casual indie game inspired by the old Tom & Jerry (NES) game
-
-
github.com github.com
-
There is no request.env in functional tests because the functional tests are supposed to remain at the controller level.
-
- Mar 2021
-
en.wikipedia.org en.wikipedia.org
-
Influenced byC, Smalltalk
-
-
github.blog github.blog
-
Some pesky non-human users (namely computers) have taken to “hotlinking” assets via the raw view feature — using the raw URL as the src for a <script> or <img> tag.
-
The key point is that this is a feature to improve the experience of our human users.
-
-
trailblazer.to trailblazer.to
-
Using operations as test factories is a fundamental concept of Trailblazer to remove buggy redundancy in tests and manual factories.
this doc superseded by: https://trailblazer.to/2.1/docs/trailblazer.html#trailblazer-test-helpers-factory
-
-
askubuntu.com askubuntu.com <