14 Matching Annotations
  1. Apr 2023
    1. The specialist modelling groups (referred to as Integrated Assessment Modelling, or IAMs) have successfully crowded out competing voices, reducing the task of mitigation to price-induced shifts in technology – some of the most important of which, like so-called “negative emissions technologies”, are barely out of the laboratory.

      Question - Who is controlling and advocating - the dominant techno-based NET narrative? - This narrative creates many scenarios that carry strong colonialist assumptions that perserve existing inequalities - Whilst IAM scientists strive to work with integrity, the fundamental framing narrative constrains their work to support ethically questionable recommendations - reference the work of Kanitkar et al.https://theprint.in/environment/why-indian-scientists-are-critiquing-ipcc-report-unfair-burden-on-developing-countries/1298871/

  2. Jan 2023
  3. Jun 2022
  4. bafybeiccxkde65wq2iwuydltwmfwv733h5btvyrzqujyrt5wcfjpg4ihf4.ipfs.dweb.link bafybeiccxkde65wq2iwuydltwmfwv733h5btvyrzqujyrt5wcfjpg4ihf4.ipfs.dweb.link
    1. Efforts to incorporate, even in a limited way, some of these issues and introduce moresevere damage functions and different assumptions on technology or distribution generatemarkedly different conclusions about the optimum trajectories.

      Including these catastrophic risks dramatically alters the conclusions and optimum trajectories.

    2. the world has been much morefocused than the IAMs on a different set of issues, the risks of catastrophic consequences.These potentially catastrophic risks are in large measure assumed away in the IAMs.

      Assumptions of catastrophic risks have not been included in the IAMs.

    3. Designing policy for climate change requires analyses which integrate the interrelationshipbetween the economy and the environment. We argue that, despite their dominance in theeconomics literature and influence in public discussion and policymaking, the methodologyemployed by Integrated Assessment Models (IAMs) rests on flawed foundations, which becomeparticularly relevant in relation to the realities of the immense risks and challenges of climatechange, and the radical changes in our economies that a sound and effective response require. Weidentify a set of critical methodological problems with the IAMs which limit their usefulness anddiscuss the analytic foundations of an alternative approach that is more capable of providinginsights into how best to manage the transition to net-zero emissions

      The claim of this paper is that the current (2022) Integrated Assessment Models (IAMs) used by IPCC and therefore policymakers is inadequate due to shortcomings in predicting risk. The paper offers the analytic foundations for an alternative model.

  5. May 2020
    1. You can use organizational units (OUs) to group accounts together to administer as a single unit. This greatly simplifies the management of your accounts.

      AWS Organization Unit

  6. Apr 2020
    1. IAM authorizers–All requests are required to be signed using the AWS Version 4 signing process (also known as SigV4). The process uses your AWS access key and secret key to compute an HMAC signature using SHA-256. You can obtain these keys as an AWS Identity and Access Management (IAM) user or by assuming an IAM role. The key information is added to the Authorization header, and behind the scenes, API Gateway takes that signed request, parses it, and determines whether or not the user who signed the request has the IAM permissions to invoke your API.

    1. Identity-based policies are attached to an IAM user, group, or role. These policies let you specify what that identity can do (its permissions). For example, you can attach the policy to the IAM user named John, stating that he is allowed to perform the Amazon EC2 RunInstances action. The policy could further state that John is allowed to get items from an Amazon DynamoDB table named MyCompany. You can also allow John to manage his own IAM security credentials. Identity-based policies can be managed or inline. Resource-based policies are attached to a resource. For example, you can attach resource-based policies to Amazon S3 buckets, Amazon SQS queues, and AWS Key Management Service encryption keys. For a list of services that support resource-based policies, see AWS Services That Work with IAM.

      Identity-Based Policies and Resource-Based Policies

  7. Jul 2019
    1. A resource owner may willingly delegate access to a resource by granting an access token to an attacker's malicious client.

      Looking for a good term for the business function that OAuth helps to implement: access delegation management?

  8. Oct 2018
  9. Feb 2018
    1. The word "iambic" refers to the type of foot that is used, known as the iamb, which in English is an unstressed syllable followed by a stressed syllable.

      Is there really a correct way of saying something? According to the Iambic Pentameter, there are more than a few ways of distinguishing the stressed syllable within a word. "Iambic" in particular refers to the first syllable pf a word as stressed. Well, what about those with non-similar accents? If a person from Los Angeles were to attempt to say the same word as someone from Virginia just in different accents, I ask which syllable would be stressed more than the other?

  10. May 2014