262 Matching Annotations
  1. Mar 2024
    1. many hospitals started moving their dcom infrastructures to the cloud because it's cheaper it's easier it's faster it's good so they did the shift and they used the Legacy protocol dcom without sufficient security

      Protocol intended for closed networks now found on open cloud servers

  2. Feb 2024
    1. In the following example, a set of mutual_friends is created with the .intersection() method using two sets of friend groups:

      A simple example identifying qualitative similarities using the intersection operator for sets.

    1. Python List append() Method

      This web page offers a brief overview of the append() function for lists in python.

    1. We create a dictionary by placing key: value pairs inside curly brackets {}, separated by commas.

      Creating a dictionary in python with example

  3. Jan 2024
    1. text in draw.io diagrams

      https://youtu.be/3Lru4k9Q55k?si=2TsGAi8iMEMunKii&t=15

      I opened the image in Youtube and then under share link I choose the start at time ootion. Please note the three tags I added. Note, once you have created the required tag of physical-computing it will auotcomplete. Also, you need to hit enter after you type in each tag, be sure to check the tags got added, as you are being graded on your ability to tag web content.

    1. This tutorial will cover the Diagram editor and the Board editor; both have similar features and functionality.

      Very helpful for getting a grasp on connecting shapes and forming neater flow charts

    1. Mosaic was the first browser to explore the concept of collaborative annotation in 1993[2

      her is some evidence that I am being honest

    1. Visual Studio Code has integrated source control management (SCM) and includes Git support out-of-the-box. Many other source control providers are available through extensions on the VS Code Marketplace

      This is an excellent resource for learing about Git integration with VS Code

    1. More, essentially all research in self-reference for decades has been in artificial intelligence, which is the device around which this plot turns. The language of AI is LISP, the name of the archvillain. In the heyday of LISP machines, the leading system was Flavors LISP Object Oriented Programming or: you guessed it -- Floop. I myself worked on a defense AI program that included the notion of a `third brain,' that is an observer living in a world different than (1) that of the world's creator, and (2) of the characters.
  4. Dec 2023
  5. Oct 2023
    1. In many ways, computing security has regressed since the Air Force report on Multics was written in June 1974.
    1. Imagine having your own self-contained knowledge manipulator in a portable package the size andshape of an ordinary notebook. How would you use it if it had enough power to outrace yoursenses of sight and hearing, enough capacity to store for later retrieval thousands of page-equivalentsof reference materials, poems, letters, recipes, drawings, animations, musical scores, waveforms,dynamic simulations, and anything else you would like to create, remember, and change?

      Fascinating how Even though we did realized some of this with the mobile phone we still have a system that's so fragmented that it's fundamentally getting in the way of progress

  6. Sep 2023
    1. Back in the day, the de facto standard for sending binaries across electronic mail was uuencode. It still exists, but has numerous usability problems; if at all possible, you should send MIME attachments instead, unless you specifically strive to be able to communicate with the late 1980s.
    1. Essentially, @mac.com is legacy users and was in place from the debut of osX to late 2000s. It required a annual paid subscription to have an email address, lol. Then the short-lived mobileMe era happened, which lasted only a couple years before Apple retracted and replaced it with iCloud, a much more sweeping service. MobileMe was also a paid subscription and included primordial versions of photo sharing and web hosting, etc. The iCloud era starting in 2012 finally ushered in free email addresses and free operating system updates. That's when the business model of large tech companies turned more into user accumulation wars to see who can attract the most subscribers and retain them in their ecosystem of products.
  7. Aug 2023
  8. Jul 2023
    1. only a small fraction of the features of each component, and your program con-sumes 10 or 100 times the hardware resources of a fully custom program, butyou write 10% or 1% of the code you would have written 30 years ago.

      You use only a small fraction of the features of each component, and your program consumes 10 or 100 times the hardware resources of a fully custom program, but you write 10% or 1% of the code you would have written 30 years ago.

  9. Jun 2023
    1. What disturbs me sometimes is that many people in software engineering approach debugging like empirical science. Run experiments, gather data, fit some curve, essentially. In the end, a program is a product of the mind. It's pure logic, and fundamentally it's understandable, unlike the real world which can at every turn have new surprises for you. We should think more and measure less.

      I feel, in some circumstances, the opposite way.

      The problem, as Feynman pointed out, is that it's very easy to fool yourself.

      So much of software development practices are driven by people loosely (read: unrigorously) reasoning about things. Few people form hypotheses for which we can articulate some means of proving or disproving what is being claimed.

  10. May 2023
  11. Mar 2023
    1. Ganguli, Deep, Askell, Amanda, Schiefer, Nicholas, Liao, Thomas I., Lukošiūtė, Kamilė, Chen, Anna, Goldie, Anna et al. "The Capacity for Moral Self-Correction in Large Language Models." arXiv, (2023). https://doi.org/https://arxiv.org/abs/2302.07459v2.

      Abstract

      We test the hypothesis that language models trained with reinforcement learning from human feedback (RLHF) have the capability to "morally self-correct" -- to avoid producing harmful outputs -- if instructed to do so. We find strong evidence in support of this hypothesis across three different experiments, each of which reveal different facets of moral self-correction. We find that the capability for moral self-correction emerges at 22B model parameters, and typically improves with increasing model size and RLHF training. We believe that at this level of scale, language models obtain two capabilities that they can use for moral self-correction: (1) they can follow instructions and (2) they can learn complex normative concepts of harm like stereotyping, bias, and discrimination. As such, they can follow instructions to avoid certain kinds of morally harmful outputs. We believe our results are cause for cautious optimism regarding the ability to train language models to abide by ethical principles.

    1. “We call on the field to recognize that applications that aim to believably mimic humans bring risk of extreme harms,” she co-wrote in 2021. “Work on synthetic human behavior is a bright line in ethical Al development, where downstream effects need to be understood and modeled in order to block foreseeable harm to society and different social groups.”

      Synthetic human behavior as AI bright line

      Quote from Bender

  12. Feb 2023
    1. If you already have an instance of your model, you can start a transaction and acquire the lock in one go using the following code: book = Book.first book.with_lock do # This block is called within a transaction, # book is already locked. book.increment!(:views) end
    1. B/ Mainline kernel offers many ways to increase desktop responsiveness without the need to patch or reconfig it. Many tweaks can be activated using the cfs-zen-tweaks you can download and just run but I would advise you just read the very simple code and learn how each of the tweaks impact. Don't hesitate to lower the priority of your cpu-bound processes (compilations, simulations...) and increase the priority of your interactive tasks thanks to the renice command and even change their scheduling policy using chrt Ultimately, you can always pin interrupts to dedicated cpus (setting desired values in /proc/irq/[irq_id]/smp_affinity) , having one in charge of the keyboard and the mouse, another one for the graphic adaptor a third one for the sound card and a fourth one housekeeping for all the possible remaining. Just plenty of solutions left opened without changing a byte in your distro-kernel.
  13. Dec 2022
    1. designers are fickle beasts, and for all their feel-good bloviation about psychology and user experience, most are actually just operating on a combination of trend and whimsy

      the attitude of software designers that gripped the early 2010s described succinctly

    1. Indeed, but the proliferation of general purpose keyboards with OS/2 logo keys has never come to pass... I think most of the keys are either windoze or half-eaten apples...
  14. Nov 2022
    1. (note: this is not the reason why Jenkins uses Tini, they use it for signal reaping, but it was used in the RabbitMQ image for that reason).
    1. Well, actually, some ligatures do have legacy codes, but solely for backwards compatibility with outdated encodings from the long-gone, dark ages of eight-bit computing. E.g. f_f can have the U+FB00 LATIN SMALL LIGATURE FF code point. If ‘eight-bit’ does not tell you anything, please erase everything you read within these parentheses from your memory immediately, keep calm and continue reading.
  15. Oct 2022
  16. Sep 2022
    1. The Field Notes journal serves as RAM, the index cards as HDD, metaphorically speaking...(brain is CPU).

      Den analogizes their note taking system to computing on 2010-11-11 8:43 PM.

    1. If the program provides accurate real-time feedback about how user manipulations affect program state, it reduces user errors and surprises. A good GUI provides this service.
    1. Because rbspy is a sampling profiler (not a tracing profiler), it actually can't tell you how times a function was called -- it just reports "hey, I observed your program 100,000 times, and 98,000 of those times it was in the calculate_thing function". ruby-prof is a tracing profiler for Ruby, which can tell you exactly how many times each function was called at the cost of being higher overhead.
    2. it's useful to understand the difference between "self time" and "total time" spent in a function
  17. Aug 2022
    1. Especially if CouchDB were an integrated part of the browser

      It's always funny/interesting to read these not-quite-projections about overhyped tech from a far enough vantage point, but this sounds a little like what I've advocated for in the past, which is resurrecting Google Gears.

    1. Editorial: The real reason I wanted Cmm to succeed: to democratize programming. It wouldn’t belong in any business plan, and I seldom mentioned to anyone, but the real reason I wanted Cmm to succeed was not about making money (although paying the mortgage was always important). The real reason was because of the feeling I had when I programmed a computer to perform work for me
    1. And it’s like, no, no, you know? This is an adaptation thing. You know, computers are almost as old as television now, and we’re still treating them like, “ooh, mysterious technology thing.” And it’s like, no, no, no! Okay, we’re manipulating information. And everybody knows what information is. When you bleach out any technical stuff about computers, everybody understands the social dynamics of telling this person this and not telling that person that, and the kinds of decorum and how you comport yourself in public and so on and so forth. Everybody kind of understands how information works innately, but then you like you try it in the computer and they just go blank and you know, like 50 IQ points go out the window and they’re like, “doh, I don’t get it?” And it’s the same thing, it’s just mediated by a machine.
    1. Mobile Network Hacking, IP Edition. by Karsten Nohl, Luca Melette & Sina Yazdanmehr. Black Hat. London. December 2-5, 2019. 47 minute video. https://www.blackhat.com/eu-19/briefings/schedule/index.html#mobile-network-hacking-ip-edition-17617

      Mobile networks have gone through a decade of security improvements ranging from better GSM encryption to stronger SIM card and SS7 configurations. These improvements were driven by research at this and other hacking conferences.

      Meanwhile, the networks have also mushroomed in complexity by integrating an ever-growing number of IT technologies from SIP to WiFi, IPSec, and most notably web technologies.

      This talk illustrates the security shortcomings when merging IT protocols into mobile networks. We bring back hacking gadgets long thought to be mitigated, including intercepting IMSI catchers, remote SMS intercept, and universal caller ID spoofing.

      We explore which protection measures are missing from the mobile network and discuss how to best bring them over from the IT security domain into mobile networks.

    1. Roughly stated, my overarching career mission is to design, build, and deploy software platforms that put end users in control of their computing and data, in part by making it easy and natural for programmers to create software that honors user desire.
    1. This very much appears to be a bug or design flaw in puma - The fact that a persistent connection ties up a thread on the chance a request might come over that connection seems like not great behavior. This would really only be an issue when puma is run with no workers (which wouldn't be done in production) but it still seems a little nuts.
  18. Jul 2022
    1. The definition of “super app” is fuzzy, but companies and their leaders most often use it to describe a state of cramming ever more features and functions into their apps—often ones adjacent to, but distinct from, their core functionality. So, for example, a financial-tech super app might start with payments and bolt on buy-now-pay-later, cryptocurrency and in-app storefronts. For social media, it could mean incorporating things like shopping. And for a delivery and ride-hailing company, it might mean adding new modes of transportation or other categories of goods for drivers to convey.

      Definition of "super-app"

      Not yet common in the U.S., but exemplified by WeChat in China. This is a response to the decline in mobile app user tracking and the corresponding ad-tech. It is about capturing more time and attention from mobile computing uers.

    1. the question you were asking was what is mind or consciousness so here we're using the words synonymously um and from a buddhist perspective uh there are 01:11:50 six what we call primary minds and then there's a whole slew of secondary minds and some of the more common systems include 51 in the secondary minds now please understand that mind like 01:12:04 everything else that exists in the world doesn't exist permanently it exists there are a few exceptions okay but essentially everything that exists in the world um is not permanent therefore 01:12:18 it's changing moment to moment therefore everything exists as a continuum including mind so that means there'll be a moment of mind followed by a next moment of mind etc 01:12:31 and the next moment of mind is determined primarily but not solely by the previous moment of mind so from that we can extrapolate a continuum an infinite continuum and mind is an 01:12:43 infinite continuum from perspective of buddhism and that means that we've had that implies suggests rebirth and it suggests we've had ultimate we've had infinite rebirths there's been no beginning 01:12:56 and so this then comes up again with the notion of a beginning creator if you will a so-called you know god there are some some problems here to resolve this um 01:13:07 and so mind is a continuum it's infinite now each moment of mind is made up of a primary mind and a constellation of secondary minds these six primary or the five as you read from nagarjuna the five 01:13:22 sensory minds of seeing hearing smelling tasting touching tactile right these five plus what's sometimes called the mental consciousness and that has live different levels of subtlety on the 01:13:34 grossest level is thinking if we go a little bit deeper a little bit more so little subtler we have dream mind which seems like these senses are active but actually 01:13:46 when we're sleeping the senses are inactive so it's just something coming from our sixth or mental consciousness it seems like the senses are active in dream mind that dream mind is a little more subtle than a wake mind awake 01:13:59 thinking mind and then if we go more subtle we're talking now again about awake mind we we talk about intuition when we're in intuition we're not thinking right it's a non-conceptual 01:14:11 mind uh in that sense and deeper yet our minds we call non-conceptual and non-dual where there's no awareness of a subject or an object so subject object non-duality so 01:14:25 that's kind of the rough sort of you know lay of the land

      Barry provides a brief summary of what the word "mind" means from a Buddhist philosophy perspective and says that there are six primary minds and 51 secondary minds.

      The 6 primary minds are the 5 senses plus mental consciousness, which itself consists of the coarse thinking (conceptual) mind, the intuitive mind (these two could be roughly mapped to Daniel Kahnaman's fast and slow system respectively), as well as the dreaming mind.

      Barry also conveys an interpretation of reincarnation based on the concept that the mind is never the same from one moment to the next, but is rather an ever changing continuum. The current experience of mind is GENERALLY most strongly influenced by the previous moments but also influenced by temporally distant memories. This above interpretation of reincarnation makes sense, as the consciousness is born anew in every moment. It is also aligned to the nature of the Indyweb interpersonal computing ecosystem, in which access to one's own private data store, the so-called Indyhub, allows one to experience the flow of consciousness by seeing how one's digital experience, which is quite significant today, affects learning on a moment to moment basis. In other words, we can see, on a granular level, how one idea, feeling or experience influences another idea, experience or feeling.

  19. Jun 2022
    1. The experts were asked to independently provide a comprehensive list of levers and leverage points for global sustainability, based on the potential for disproportionate effects to address and reverse the deterioration of nature while meeting societal needs. They were asked to consider actions by the full range of possible actors, and both top-down and bottom-up effects across various sectors. The collection of all responses became our initial set of levers and leverage points. Ensuing processes were then informed by five linked conceptualizations of transformative change identified by the experts (Chan et al., 2019): ● Complexity theory and leverage points of transformation (Levin et al., 2013; Liu et al., 2007; Meadows, 2009); ● Resilience, adaptability and transformability in social–ecological systems (Berkes, Colding, & Folke, 2003; Folke et al., 2010); ● A multi-level perspective for transformative change (Geels, 2002); ● System innovations and their dynamics (Smits, Kuhlmann, & Teubal, 2010; OECD, 2015) and ● Learning sustainability through ‘real-world experiments’ (Geels, Berkhout, & van Vuuren, 2016; Gross & Krohn, 2005; Hajer, 2011).

      Set of levers and leverage points identified by the authors.

      Creating an open public network for radical collaboration, which we will call the Indyweb, can facilitate bottom-up engagement to both educate the public on these levers as well as be an application space to crowdsource the public to begin sharing local instantiations of these levers.

      An Indyweb that is in the form of an interpersonal space in which each individual is the center of their data universe, and in which they can see all the data from their diverse digital interactions across the web and in real life all consolidated in one place offers a profound possibility for both individual and collective learning. Such an Indyweb would bring the relational nature of the human being, the so called "human INTERbeing" alive, and would effortlessly emerge the human INTERbeing explicitly as the natural form merely from its daily use. One can immediately see the relational nature of individual learning, how it is so entangled with collective learning, and would be reinforced with each social interaction on the web or in real life. This is what is needed to track both individual inner transformation (IIT) as well as collective outer transformation (COT) towards a rapid whole system change mobilization. Accelerated by a program of open access Deep Humanity (DH) knowledge that plumbs the very depth of what it is to be human, this can accelerate the indirect drivers of change and provide practical tools for granular monitoring of both IIT and COT.

      Could we use AI to search for levers and leverage points?

    1. Cloud costs can be up to 5X higher than traditional on-premise infrastructure. And that while the cloud promise is so beautiful. What is going on? This article gives you more insight into the other side of the coin and shows you that the cloud promise is not the full story.

      Cloud costs are 5X higher than on-premise costs

      Cloud costs can be up to 5X higher than traditional on-premise infrastructure. And that while the cloud promise is so beautiful. What is going on? This article gives you more insight into the other side of the coin and shows you that the cloud promise is not the full story.

  20. May 2022
    1. a society-wide hyperconversation. This hyperconversation operationalizes continuous discourse, including its differentiation and emergent framing aspects. It aims to assist people in developing their own ways of framing and conceiving the problem that makes sense given their social, cultural, and environmental contexts. As depicted in table 1, the hyperconversation also reflects a slower, more deliberate approach to discourse; this acknowledges damaged democratic processes and fractured societal social cohesion. Its optimal design would require input from other relevant disciplines and expertise,

      The public Indyweb is eminently designed as a public space for holding deep, continuous, asynchronous conversations with provenance. That is, if the partcipant consents to public conversation, ideas can be publicly tracked. Whoever reads your public ideas can be traced.and this paper trail is immutably stored, allowing anyone to see the evolution of ideas in real time.

      In theory, this does away with the need for patents and copyrights, as all ideas are traceable to the contributors and each contribution is also known. This allows for the system to embed crowdsourced microfunding, supporting the best (upvoted) ideas to surface.

      Participants in the public Indyweb ecosystem are called Indyviduals and each has their own private data hub called an Indyhub. Since Indyweb is interpersonal computing, each person is the center of their indyweb universe. Through the discoverability built into the Indyweb, anything of immediate salience is surfaced to your private hub. No applications can use your data unless you give exact permission on which data to use and how it shall be used. Each user sets the condition for their data usage. Instead of a user's data stored in silos of servers all over the web as is current practice, any data you generate, in conversation, media or data files is immediately accessible on your own Indyhub.

      Indyweb supports symmathesy, the exchange of ideas based on an appropriate epistemological model that reflects how human INTERbeings learn as a dynamic interplay between individual and collective learning. Furthermore, all data that participants choose to share is immutably stored on content addressable web3 storage forever. It is not concentrated on any server but the data is stored on the entire IPFS network:

      "IPFS works through content adddressibility. It is a peer-to-peer (p2p) storage network. Content is accessible through peers located anywhere in the world, that might relay information, store it, or do both. IPFS knows how to find what you ask for using its content address rather than its location.

      There are three fundamental principles to understanding IPFS:

      Unique identification via content addressing Content linking via directed acyclic graphs (DAGs) Content discovery via distributed hash tables (DHTs)" (Source: https://docs.ipfs.io/concepts/how-ipfs-works/)

      The privacy, scalability, discoverability, public immutability and provenance of the public Indyweb makes it ideal for supporting hyperconversations that emerge tomorrows collectively emergent solutions. It is based on the principles of thought augmentation developed by computer industry pioneers such as Doug Englebart and Ted Nelson who many decades earlier in their prescience foresaw the need for computing tools to augment thought and provide the ability to form Network Improvement Communities (NIC) to solve a new generation of complex human challenges.

    1. Maybe Mozilla could buy up Glitch and integrate it natively inside Firefox? Maybe BeakerBrowser will get enough traction and look beyond the P2P web? Maybe the Browser Company will do something like this?

      Before Keybase died, I had hopes that they would do something kind of like this. It'd work by installing worker services in the Keybase client and/or also allow you to connect to network-attached compute like AWS or DigitalOcean (or some Keybase-operated service) to seamlessly process worker requests when your laptop was offline. The main draw would be a friendly UI in the Keybase client for managing your workers. Too bad!

  21. Apr 2022
  22. Mar 2022
    1. The flotsam and jetsam of our digital queries and transactions, the flurry of electrons flitting about, warm the medium of air. Heat is the waste product of computation, and if left unchecked, it becomes a foil to the workings of digital civilization. Heat must therefore be relentlessly abated to keep the engine of the digital thrumming in a constant state, 24 hours a day, every day.

      "Cloud Computing" has a waste stream, and one of the waste streams is heat exhaust from servers. This is a poetic description of that waste stream.

  23. Feb 2022
    1. 9/8g Hinter der Zettelkastentechnik steht dieErfahrung: Ohne zu schreiben kann mannicht denken – jedenfalls nicht in anspruchsvollen,selektiven Zugriff aufs Gedächtnis voraussehendenZusammenhängen. Das heißt auch: ohne Differenzen einzukerben,kann man nicht denken.

      Google translation:

      9/8g The Zettelkasten technique is based on experience: You can't think without writing—at least not in contexts that require selective access to memory.

      That also means: you can't think without notching differences.

      There's something interesting about the translation here of "notching" occurring on an index card about ideas which can be linked to the early computer science version of edge-notched cards. Could this have been a subtle and tangential reference to just this sort of computing?

      The idea isn't new to me, but in the last phrase Luhmann tangentially highlights the value of the zettelkasten for more easily and directly comparing and contrasting the ideas on two different cards which might be either linked or juxtaposed.


      Link to:

      • Graeber and Wengrow ideas of storytelling
      • Shield of Achilles and ekphrasis thesis

      • https://hypothes.is/a/I-VY-HyfEeyjIC_pm7NF7Q With the further context of the full quote including "with selective access to memory" Luhmann seemed to at least to make space (if not give a tacit nod?) to oral traditions which had methods for access to memories in ways that modern literates don't typically give any credit at all. Johannes F.K .Schmidt certainly didn't and actively erased it in Niklas Luhmann’s Card Index: The Fabrication of Serendipity.

    1. It was not until the 14th century that scientists created the first sophisticated astronomical clocks.
    2. the first precision-geared mechanism known is a relatively simple—yet impressive for the time—geared sundial and calendar of Byzantine origin dating to about C.E. 600.

      The first known precision-geared mechanism is a sundial and calendar of Byzantine origin dating to circa 600 C.E.

  24. Jan 2022
    1. What is End User Computing (EUC)? Thanks to the progressive introduction of DevOps, attention to the role of the end user in software development and testing has increased significantly. It is now important to think like an end user when we develop and test software. After all, that's what we're all doing it for.

      What is End User Computing (EUC)? Thanks to the progressive introduction of DevOps, attention to the role of the end user in software development and testing has increased significantly. It is now important to think like an end user when we develop and test software. After all, that's what we're all doing it for.

    1. Zimmerman, M. I., Porter, J. R., Ward, M. D., Singh, S., Vithani, N., Meller, A., Mallimadugula, U. L., Kuhn, C. E., Borowsky, J. H., Wiewiora, R. P., Hurley, M. F. D., Harbison, A. M., Fogarty, C. A., Coffland, J. E., Fadda, E., Voelz, V. A., Chodera, J. D., & Bowman, G. R. (2021). SARS-CoV-2 simulations go exascale to predict dramatic spike opening and cryptic pockets across the proteome. Nature Chemistry, 13(7), 651–659. https://doi.org/10.1038/s41557-021-00707-0

    1. Here, the card index func-tions as a ‘thinking machine’,67 and becomes the best communication partner for learned men.68

      From a computer science perspective, isn't the index card functioning like an external memory, albeit one with somewhat pre-arranged linked paths? It's the movement through the machine's various paths that is doing the "thinking". Or the user's (active) choices that create the paths creates the impression of thinking.

      Perhaps it's the pre-arranged links where the thinking has already happened (based on "work" put into the system) and then traversing the paths gives the appearance of "new" thinking?

      How does this relate to other systems which can be thought of as thinking from a complexity perspective? Bacteria perhaps? Groups of cells acting in concert? Groups of people acting in concert? Cells seeing out food using random walks? etc?

      From this perspective, how can we break out the constituent parts of thought and thinking? Consciousness? With enough nodes and edges and choices of paths between them (or a "correct" subset of paths) could anything look like thinking or computing?

    1. The essay is most famous for its description of a hypothetical information-retrieval system, the Memex, a kind of mechanical Evernote, in which a person's every "book, record, or communication" was microfilmed and cataloged.

      It really kills me that there's so much hero worship of all this, particularly given the information processing power of index card systems at the time. I don't really think it took such a leap to image automating such a system given the technological bent of the time.

      Of course actually doing it is another thing, but conceptualizing the idea at the time would have be de rigueur.

  25. Dec 2021
    1. Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

      Edge Computing: What It Is and Why It Matters0 https://en.itpedia.nl/2021/12/29/edge-computing-what-it-is-and-why-it-matters/ Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

    1. Green computing, or green information technology, is the practice of environmentally sustainable computing. In this article we take a closer look at: * Greening the workplace. * A green workplace business case. * Opportunities to make Data Centers greener by: - ​​Other IT equipment. - The cooling of IT spaces. - The data center buildings.

      Green computing : Workplace and data center, a real business case https://en.itpedia.nl/2021/12/11/green-computing-werkplek-datacenter-business-case/ Green computing, or green information technology, is the practice of environmentally sustainable computing. In this article we take a closer look at: Greening the workplace. A green workplace business case. * Opportunities to make Data Centers greener by: - ​​Other IT equipment. - The cooling of IT spaces. - The data center buildings.

    1. In § 3, I explain that to have a life of its own, a card index must be provid-ed with self-referential closure.

      In order to become a free-standing tool, the card index needed to have self-referential closure.

      This may have been one of the necessary steps for the early ideas behind computers. In addition to the idea of a clockwork universe, the index card may have been a step towards early efforts at creating the modern computer.

  26. Nov 2021
    1. Do you have a high-quality and almost irresistible application in your bag? Your potential customers will not enjoy your app to the full if they cannot access it easily and quickly. That is why you need to consider how to choose the right SaaS hosting provider carefully. In this article, we will review different SaaS cloud hosting options and their strengths and weaknesses. Read on to find out how to make hosting for your SaaS application reliable, cost-effective, and scalable.

      Do you have a high-quality and almost irresistible application in your bag? Your potential customers will not enjoy your app to the full if they cannot access it easily and quickly. That is why you need to consider how to choose the right SaaS hosting provider carefully.

      In this article, we will review different SaaS cloud hosting options and their strengths and weaknesses. Read on to find out how to make hosting for your SaaS application reliable, cost-effective, and scalable.

    1. 10 Best SaaS Startups in 2022 for Your InspirationDmitryCEOStartupSaaSHomeBlogEntrepreneurship10 Best SaaS Startups in 2022 for Your InspirationPublishedJul 29, 2020UpdatedNov 5, 202111 min readToday, the SaaS industry is gaining momentum. According to research, 80% of businesses already use at least one SaaS application. Hence, building a SaaS company is currently a skyrocketing business idea. To help you find inspiration and launch the best SaaS startup ever, in this article you will find 10 great examples of SaaS startups you can learn from. All of them produce valuable and fast-growing products for now. Likewise, Growthlist and AngelList marked them as promising SaaS startups of 2021-2022. Without further ado, let’s take a closer look at them.

      Today, the SaaS industry is gaining momentum. According to research, 80% of businesses already use at least one SaaS application. Hence, building a SaaS company is currently a skyrocketing business idea.

      To help you find inspiration and launch the best SaaS startup ever, in this article you will find 10 great examples of SaaS startups you can learn from. All of them produce valuable and fast-growing products for now. Likewise, Growthlist and AngelList marked them as promising SaaS startups of 2021-2022.

      Without further ado, let’s take a closer look at them.

  27. Oct 2021
    1. As a result, cloud-rendering servers typically face utilization issues due to the need to plan for peak demand. A cloud-gaming service might require 75,000 dedicated servers for the Cleveland area at 8PM Sunday night, but only 4,000 at 4AM Monday. As a consumer, you can purchase a $400 GPU and let it sit offline as much as you want, but data-center economics are oriented toward optimizing for demand.

      Power generation metaphors; peak vs off-peak demand; can off-peak generation be stored / repurposed? What would a computing power battery look like?

    2. And even at ultra-low latency, it makes little sense to stream (versus locally process) AR data given the speed at which a camera moves and new input data is received (i.e. literally the speed of light and from only a few feet away). Given the intensive computational requirements of AR, it’s therefore likely our core personal/mobile devices will be able to do a ‘good enough’ job at most real-time rendering.

      Data streaming rates, computing power, video displays, etc, all the technologies will progress at different rates, and this differential will play a role in determining the best solution for advancing

    1. Ungar, around @1:00:00:

      I try to explain to people that the notion of compiler is broken. Of course I learned this from Smalltalk, but what we want to build is experiences--artificial realities that convince you that your source code is real. It's directly executed. There's no lag between editing and running[...] The environment stresses things in your program, not tools--which is another rant I have. It's this whole idea that we want to put you in an artificial reality--I got that from Randy [Smith]--in which it's easy and natural and low-cognitive-burden to get the computer to do what you want it to do, rather than running language translators that turn weird strings of text into bits the machine can run

    1. Leading SaaS Trends for 2021 You Shouldn’t MissDmitryChief Executive OfficerSaaSTrendsHomeBlogTechnologyLeading SaaS Trends for 2021 You Shouldn’t MissDec 1, 202012 min readNowadays, different kinds of businesses are extensively moving to the cloud. O’Reilly reports that 88% of the respondent companies had used cloud services before lockdown and expect their further growth by Q2 2021. Therefore, SaaS application development looks also like a profitable venture today. Yet, to stay afloat in the cloud arena, you need to arm your offering with precise technology and fresh tools. In other words, you need to keep your eye on the future of SaaS. To help you deploy the promptest cloud solutions, in this post, I collected the top SaaS trends for 2021.

      SaaS application development looks also like a profitable venture today. Yet, to stay afloat in the cloud arena, you need to arm your offering with precise technology and fresh tools. In other words, you need to keep your eye on the future of SaaS.

      To help you deploy the promptest cloud solutions, in this post, I collected the top SaaS trends for 2021.

  28. Sep 2021
    1. From my point of view, this approach will help you to write cleaner code. Also, it will help to maintain the project. For instance, moving a file from the current directory to another will cause fewer problems, because every file uses an absolute path instead of a relative one. Last but not least, it helps you during development.
    1. This is not dumb at all. It is exceedingly common to use aliases. It's not about being lazy, it's about writing portable code.
  29. Aug 2021
    1. Rubyists don't call these things annotations. One of the things I like doing is to find common techniques that cross languages, for me this is a common technique and 'annotation' seems like a good generic word for it. I don't know if Rubyists will agree.
    1. Grötschel, an expert in optimization, observes that a benchmark production planning model solved using linear programming would have taken 82 years to solve in 1988, using the computers and the linear programming algorithms of the day. Fifteen years later – in 2003 – this same model could be solved in roughly 1 minute, an improvement by a factor of roughly 43 million. Of this, a factor of roughly 1,000 was due to increased processor speed, whereas a factor of roughly 43,000 was due to improvements in algo-rithms
    1. SaaS vs PaaS vs IaaS: Choosing the Best Cloud Computing ModelAlina NechvolodE-Commerce & SaaS StrategistSaaSHomeBlogTechnologySaaS vs PaaS vs IaaS: Choosing the Best Cloud Computing ModelJun 12, 202011 min readThe usage of cloud computing has long been a standard practice for businesses. More and more companies harness the power of the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) models. Thus, they can save on hardware and protect their sensitive information from hacking and internal data theft. In this article, we discuss the SaaS vs PaaS vs IaaS models and define their principal differences. What are the core parameters for comparison? They include primary characteristics, usage, the main benefits, and drawbacks.

      The usage of cloud computing has long been a standard practice for businesses. More and more companies harness the power of the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) models. Thus, they can save on hardware and protect their sensitive information from hacking and internal data theft.

      In this article, we discuss the SaaS vs PaaS vs IaaS models and define their principal differences. What are the core parameters for comparison? They include primary characteristics, usage, the main benefits, and drawbacks.

    1. What seems more problematic is divergence between drivers. For example, capybara-webkit and poltergeist support several of the same things. Let's take resizing the window as an example. In capybara-webkit this is page.driver.resize_window(x, y) and in poltergeist it's page.driver.resize(x, y). This means that if a user wants to switch from one to the other they have to change their code. Now I don't know if selenium does or doesn't support resizing the window, but supposing it doesn't I think there's still a lot of value in the capybara project deciding what the blessed API is, because then all the drivers that support that feature can implement it using the same API, increasing portability.
  30. Jul 2021
    1. The difference between PUT and POST is that PUT is idempotent: calling it once or several times successively has the same effect (that is no side effect), whereas successive identical POST requests may have additional effects, akin to placing an order several times.
    1. Idempotent just means that following a link twice has exactly the same effect on persistent state as clicking it once. It does not mean that following the link must not change state, just that after following it once, following it again must not change state further. There are good reasons to avoid GET requests for changing state, but that’s not what idempotent means.
    1. as a more experienced user I know one can navigate much more quickly using a terminal than using the hunt and peck style of most file system GUIs

      As an experienced user, this claim strikes me as false.

      I often start in a graphical file manager (nothing special, Nautilus on my system, or any conventional file explorer elsewhere), then use "Open in Terminal" from the context menu, precisely because of how much more efficient desktop file browsers are for navigating directory hierarchies in comparison.

      NB: use of a graphical file browser doesn't automatically preclude keyboard-based navigation.

    1. They were input laboriously by hand either on punched cards, with each card holding up to eighty characters or one line of text (uppercase letters only), or on paper tape, where lower-case letters were perhaps possible but which could not be read in any way at all by a human being. Father Busa has stories of truckloads of punched cards being transported from one center to another in Italy. All computing was carried out as batch processing, where the user could not see the results at all until printout appeared when the job had run.

      It may be of interest to some that the first 'computer' used punch cards and tape; it was the Jacquard loom. Here is a link to information about the Jacquard loom and it's influence on computing. http://www.columbia.edu/cu/computinghistory/jacquard.html

  31. Jun 2021
  32. May 2021
    1. I want to avoid nginx overhead (especially if they have tons of alias and rewrites) for in-server communication. Basically, you can have sveltekit server, backend server and nginx server, in that case, communicate inside your internal network will be very expensive like: browser->nginx server(10.0.0.1)->sveltekit server(10.0.0.3)->nginx server(10.0.0.1)->backend server(10.0.0.2) instead just: browser->nginx server(10.0.0.1)->sveltekit server(10.0.0.3)->backend server(10.0.0.2)
    1. Why are there so many programming languages and frameworks? Everyone has their own opinion on how something should be done. Some of these systems, like AOL, Yahoo, etc... have been around for a decade, and probably not updated much.
    2. Simple fact is that HTML support is different in them because mail clients are so old, or others are allowed to operate in browsers where not all CSS or even HTML can be applied in a secure manner. Older clients have outdated browsers that you'll likely NEVER see brought up to standards; what with Opera's standalone aging like milk, and thunderbird lagging behind the firefox on which it's even built. Don't even get me STARTED on older clients like Eudora or Outlook.
  33. Apr 2021
    1. In many computing contexts, "TTY" has become the name for any text terminal, such as an external console device, a user dialing into the system on a modem on a serial port device, a printing or graphical computer terminal on a computer's serial port or the RS-232 port on a USB-to-RS-232 converter attached to a computer's USB port, or even a terminal emulator application in the window system using a pseudoterminal device.

      It's still confusing, but this at least helps/tries to clarify.

    1. Some add a wildcard character to the name to make an abbreviation like "Un*x"[2] or "*nix", since Unix-like systems often have Unix-like names such as AIX, A/UX, HP-UX, IRIX, Linux, Minix, Ultrix, Xenix, and XNU. These patterns do not literally match many system names, but are still generally recognized to refer to any UNIX system, descendant, or work-alike, even those with completely dissimilar names such as Darwin/macOS, illumos/Solaris or FreeBSD.
  34. Mar 2021
    1. Athena is still in production use at MIT. It works as software (currently a set of Debian packages)[2] that makes a machine a thin client, that will download educational applications from the MIT servers on demand
  35. Feb 2021
    1. With the introduction of CPUs which ran faster than the original 4.77 MHz Intel 8088 used in the IBM Personal Computer, programs which relied on the CPU's frequency for timing were executing faster than intended. Games in particular were often rendered unplayable. To provide some compatibility, the "turbo" button was added. Engaging turbo mode slows the system down to a state compatible with original 8086/8088 chips.
    1. Space: Suppose we had infinite memory, then cache all the data; but we don't so we have to decide what to cache that is meaningful to have the cache implemented (is a ??K cache size enough for your use case? Should you add more?) - It's the balance with the resources available.
  36. Jan 2021
    1. Prior to the adoption of the Cross-Origin Resource Sharing (CORS) standard, JSONP was the only option to get a JSON response from a server of a different origin.
  37. Nov 2020
    1. Portable... your .name address works with any email or web service. With our automatic forwarding service on third level domains, you can change email accounts, your ISP, or your job without changing your email address. Any mail sent to your .name address arrives in any email box you choose.
    1. In July 2010, Microsoft let go Jimmy Schementi, one of two remaining members of the IronRuby core team, and stopped funding the project.[19][20] In October 2010 Microsoft announced the Iron projects (IronRuby and IronPython) were being changed to "external" projects and enabling "community members to make contributions without Microsoft's involvement or sponsorship by a Microsoft employee".
    1. will only apply up the chain

      Should this "up the chain" be "down the chain"?

      In terms of a tree, I think of the caller/consumer/thing that imports this file as "up" and the things that I call/import as "down".

      That is more consistent with a tree, but not a stack trace (or any stack), I suppose, which has most recently called thing at the top ("up"), and the consumer of that at the bottom ("down").

    1. React didn't support rendering arrays without a wrapper for most of its existence 16.0.0 (September 26, 2017): Components can now return arrays and strings from render.
  38. Oct 2020
    1. Final Form makes the assumption that your validation functions are "pure" or "idempotent", i.e. will always return the same result when given the same values.
    2. Final Form makes the assumption that your validation functions are "pure" or "idempotent", i.e. will always return the same result when given the same values. This is why it doesn't run the synchronous validation again (just to double check) before allowing the submission: because it's already stored the results of the last time it ran it.
    1. In agent-oriented programming the antonym is depender, though in general usage the common term dependent is used instead. There is no common language equivalent for dependee', however – other metaphors are used instead, such as parent/child. The circumlocutions “A depends on B” and “B is depended on by A” are much more common in general use than “A is the depender, B is the ' dependee ”.
    1. I think it is still problematic since many people in the software industry use and understand "dependency" to mean the thing on which something depends (as indicated by this and other answers). So saying "being a dependency" indicates to those people the thing on which something depends, which is the opposite of the way I think of it (and what it means according to the dictionary).
    1. There may be times that required owned elements are missing, for example, while editing or while loading a data set. When a widget is missing required owned elements due to script execution or loading, authors MUST mark a containing element with aria-busy equal to true. For example, until a page is fully initialized and complete, an author could mark the document element as busy.

      "busy" here seems to = "loading" in most other programming contexts

    1. Longstanding controversy surrounds the meaning of the term "hacker". In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks[5] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).
    1. In React 0.12 time frame we did a bunch of small changes to how key, ref and defaultProps works. Particularly, they get resolved early on in the React.createElement(...) call. This made sense when everything was classes, but since then, we've introduced function components. Hooks have also make function components more prevalent. It might be time to reevaluate some of those designs to simplify things (at least for function components).
    1. Node doesn't have a DOM available. So in order to render HTML we use string concatenation instead. This has the fun benefit of being quite efficient, which in turn means it's great for server rendering!
    1. Facebook’s React has an optional language extension that enables you to embed HTML inside JavaScript. This extension can make your code more concise, but it also breaks compatibility with the rest of the JavaScript ecosystem. ECMAScript 6 will have template strings [1], which enable you to implement JSX (or something close to it) inside the language.
    1. But is overhead always bad? I believe no — otherwise Svelte maintainers would have to write their compiler in Rust or C, because garbage collector is a single biggest overhead of JavaScript.
    1. I don't understand the need for the name "Open–closed principle". It doesn't seem meaningful or clear to me.

      Can't we just call it "extensibility" or "easily extendable"? Doesn't "extensibility" already imply that we are extending it (adding new code on top of it, to interoperate with it) rather than modifying its source code?

    1. State changes flow from the roots of this graph (which we call atoms) through pure functions (which we call selectors) and into components.
    1. The misspelling of referrer originated in the original proposal by computer scientist Phillip Hallam-Baker to incorporate the field into the HTTP specification.[4] The misspelling was set in stone by the time of its incorporation into the Request for Comments standards document RFC 1945; document co-author Roy Fielding has remarked that neither "referrer" nor the misspelling "referer" were recognized by the standard Unix spell checker of the period.
  39. Sep 2020
    1. detach, as an api, should be declarative (ensure the node is detached) instead of imperative (detach the node), allowing it to be called multiple times by performing a noop if the node is already detached. This way, it won't matter if the node is removed from the DOM from outside of svelte.
    1. If you're using webpack with svelte-loader, make sure that you add "svelte" to resolve.mainFields in your webpack config. This ensures that webpack imports the uncompiled component (src/index.html) rather than the compiled version (index.mjs) — this is more efficient.
    1. Why do we use bundlers again?Historically, bundlers have been used in order to support CommonJS files in the browser, by concatenating them all into a single file. Bundlers detected usages of require() and module.exports and wrap them all with a lightweight CommonJS runtime. Other benefits were allowing you to serve your app as a single file, rather than having the user download several scripts which can be more time consuming.
    1. The appeal of social networks is partly because they let us create documents without thinking about web technology,

      mirrors strongly another comment i made, that our appetites & expectations for computing has outstripped the personal, that we now expect computing to be connective. we want the digital matter we create to exist not just locally, but widely. https://hypothes.is/a/11-k1v7pEeqJ1qdf5kJahQ

    1. you may specify only the form state that you care about for rendering your gorgeous UI. You can think of it a little like GraphQL's feature of only fetching the data your component needs to render, and nothing else.
    1. It was called a "virtual DOM" library because it didn't start out as isomorphic, but actually tied to the DOM from the start. It was an afterthought to make it isomorphic.
  40. Aug 2020
    1. Let us quickly travel back in time to 2016. SWOOSH! We are there. JavaScript landscape looks like this: If you are using a JavaScript framework or want to use a framework, Angular.js is probably something you would choose. But, the news about Angular 2 that will make you rewrite almost everything is just around the corner. Also, this new kid on the block - React.js is coming up and getting ripe. Of course, Vanilla JS and no-framework-folks are there. Not using a framework is still a popular opinion in 2016, but is slowly fading.
  41. Jul 2020
    1. ruby-prof supports excluding specific methods and threads from profiling results. This is useful for reducing connectivity in the call graph, making it easier to identify the source of performance problems when using a graph printer. For example, consider Integer#times: it's hardly ever useful to know how much time is spent in the method itself. We are more interested in how much the passed in block contributes to the time spent in the method which contains the Integer#times call. The effect on collected metrics are identical to eliminating methods from the profiling result in a post process step.
    2. ruby-prof provides two options to specify which threads should be profiled: exclude_threads:: Array of threads which should not be profiled. include_threads:: Array of threads which should be profiled. All other threads will be ignored.
  42. Jun 2020
    1. If those comments are loaded outside of the blog_post association, then attempting to reference the blog_post association from within each comment will result in N blog_posts table queries even if they all belong to the same BlogPost!
    1. In systems engineering and requirements engineering, a non-functional requirement (NFR) is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviors. They are contrasted with functional requirements that define specific behavior or functions

      This is a strange term because one might read "non-functional" and interpret in the sense of the word that means "does not function", when instead the intended sense is "not related to function". Seems like a somewhat unfortunate name for this concept. A less ambiguous term could have been picked instead, but I don't know what that would be.

  43. May 2020
    1. Also known as "serverless", "client-side", or "static" web apps, unhosted web apps do not send your user data to their server. Either you connect your own server at runtime, or your data stays within the browser.

      serverless has another meaning (that does actually use a server) so I prefer the term "unhosted" since it has no such ambiguity.

      See also:

    1. The Journal was a primitive hypertext-based groupware program, which can be seen as a predecessor (if not the direct ancestor) of all contemporary server software that supports collaborative document creation (like wikis). It was used by ARC members to discuss, debate, and refine concepts in the same way that wikis are being used today.
    1. quantum blockchain

      Do they really use a quantum blockchain? What exactly do they mean by that? Probably just a buzzword they're using to attract interest but aren't actually meaning literally.

    1. A quantum blockchain, the pair suggests, would take advantage of entanglement, which in most cases, applies to situations regarding space. But it could also be useful for situations involving time, such as blockchains. In such a blockchain, the pair explains, transaction records could be represented by pairs of entangled photons linked in chronological order. When transfers take place, photons would be created and absorbed by the hubs that comprise a network. But since entangled photons are linked across time, they can be caused to have never existed at the same time.
    1. The folks at Netlify created Netlify CMS to fill a gap in the static site generation pipeline. There were some great proprietary headless CMS options, but no real contenders that were open source and extensible—that could turn into a community-built ecosystem like WordPress or Drupal. For that reason, Netlify CMS is made to be community-driven, and has never been locked to the Netlify platform (despite the name).

      Kind of an unfortunate name...

  44. Apr 2020
    1. Just a subtle clarification here. Safe means no side-effects. Idempotent means the same side effect no matter how many time a service is called. All safe services are inherently idempotent because there are no side effects. Calling GET on a current-time resource multiple times would return a different result each time, but it's safe (and thus idempotent).
    1. In math, idempotence describes only unary functions that you can call on their own output. Math-idempotence is, “If you take the absolute value of a number, and then you take the absolute value of that, the result doesn’t change on the second (or subsequent) operations.” Math.abs is math-idempotent. Math-idempotence only applies to functions of one parameter where the parameter type and return type are the same. Not so useful in programming.
    2. Programming-idempotence is about side effects. It’s about stuff that happens to the outside world when you call a function. Idempotence says “If you’ve called me once, it doesn’t matter whether you called me again.”
    1. I am increasingly concerned when I hear my colleagues refer to themselves with computer metaphors—“I don’t have the bandwidth,” “I have to boot up,” or “I need to recharge.”
    1. In the early 1990s, the creators of Netscape apparently built a function that enabled each web page to be annotated by those visiting it, as a way for viewers to discuss the page’s content. But according to a [1] produced in 2013 by a nonprofit called [Hypothesis][2], the feature was turned off.
    1. for-profit tech companies — most notably Google, Apple, Facebook, and Amazon (GAFA) — built software and services that rapidly outpaced the capabilities of open protocols
    2. Huge web properties were started during this era including Yahoo, Google, Amazon, Facebook, LinkedIn, and YouTube. In the process, the importance of centralized platforms like AOL greatly diminished.