483 Matching Annotations
  1. Last 7 days
    1. Read [[Martha S. Jones]] in A New Face for an Old Library Catalog

      Discussion on harmful content in library card catalogs and finding aids.

      The methods used to describe archive material can not only be harmful to those using them, but they also provide a useful historical record of what cataloguers may have been thinking contemporaneously as they classified and organized materials.

      This is another potentially useful set of information to have while reading into historical topics from library card catalogs compared to modern-day digital methods.

      Is anyone using version control on their catalogs?

  2. Feb 2024
    1. Zahlen der E-Control zu Strom- und Gasverbrauch und -Produktion in Österreich 2023: Im vergangenen Jahr wurden in Österreich 5% weniger Strom und 12,5% weniger Gas verbraucht als 2022. Österreich exportierte erstmal seit längerer Zeit mehr Strom, als es importierte. https://www.derstandard.de/story/3000000205543/verbrauch-von-strom-und-gas-ist-2023-in-oesterreich-deutlich-gesunken

    1. The experiences of the atomic scientists clearly show the need to takepersonal responsibility, the danger that things will move too fast, andthe way in which a process can take on a life of its own. We can, as theydid, create insurmountable problems in almost no time flat. We mustdo more thinking up front if we are not to be similarly surprised andshocked by the consequences of our inventions.

      Bill Joy's mention that insurmountable problems can "take on a life of [their] own" is a spectacular reason for having a solid definition of what "life" is, so that we might have better means of subverting it in specific and potentially catastrophic situations.

    2. The GNR technologies do not divide clearly into commercial andmilitary uses; given their potential in the market, it’s hard to imaginepursuing them only in national laboratories. With their widespreadcommercial pursuit, enforcing relinquishment will require a verificationregime similar to that for biological weapons, but on an unprecedentedscale. This, inevitably, will raise tensions between our individual pri-vacy and desire for proprietary information, and the need for verifica-tion to protect us all. We will undoubtedly encounter strong resistanceto this loss of privacy and freedom of action.

      While Joy looks at the Biological and Chemical Weapons Conventions as well as nuclear nonproliferation ideas, the entirety of what he's looking at is also embedded in the idea of gun control in the United States as well. We could choose better, but we actively choose against our better interests.

      What role does toxic capitalism have in pushing us towards these antithetical goals? The gun industry and gun lobby have had tremendous interest on that front. Surely ChatGPT and other LLM and AI tools will begin pushing on the profitmaking levers shortly.

  3. Jan 2024
  4. Dec 2023
    1. This dangerous framing is compounded by a generally supine media owned or controlled by the 1%
      • for: 1% - media control
    2. they have the power to hinder progress towards stopping the climate crisis, especially with their control of mainstream media.
      • for: climate crisis - elite control of mainstream media
      • for: climate crisis - voting for global political green candidates, podcast - Planet Critical, interview - Planet Critical - James Schneider - communications officer - Progressive International, green democratic revolution, climate crisis - elite control off mainstream media

      • podcast: Planet Critical

      • host: Rachel Donald
      • title: Overthrowing the Ruling Class: The Green Democratic Revolution

      • summary

        • This is a very insightful interview with James Schneider, communications officer of Progressive International on the scales of political change required to advert our existential Poly / meta / meaning crisis.
        • James sees 3 levels of crisis
          • ordinary crisis emerging from a broken system
          • larger wicked problems that cannot be solved in isolation
          • the biggest umbrella crisis that covers all others - the last remaining decades of the fossil fuel system,
            • due to peak oil but accelerated by
            • climate crisis
        • There has to be a paradigm shift on governance, as the ruling elites are driving humanity off the cliff edge
        • This is not incremental change but a paradigm shift in governance
        • To do that, we have to adopt an anti-regime perspective, that is not reinforcing the current infective administrative state, otherwise, as COVID taught us, we will end up driving the masses to adopt hard right politicians
        • In order to establish the policies that are aligned to the science, the people and politicians have to be aligned.
        • Voting in candidates who champion policies aligned to science is a leverage point.
        • That can only be done if the citizenry is educated enough to vote for such politicians
        • So there are two parallel tasks to be done:
          • mass education program to educate citizens
          • mass program to encourage candidates aligned to climate science to run for political office
  5. Nov 2023
    1. The PSL nor its volunteers prescribe what browsers do with entries or their recognition/handling of entries, default behaviours, or other handling. Browsers do what browsers do, diversely, and the PSL is not the boss of them.
  6. Oct 2023
  7. Sep 2023
    1. the Bodhisattva vow can be seen as a method for control that is in alignment with, and informed by, the understanding that singular and enduring control agents do not actually exist. To see that, it is useful to consider what it might be like to have the freedom to control what thought one had next.
      • for: quote, quote - Michael Levin, quote - self as control agent, self - control agent, example, example - control agent - imperfection, spontaneous thought, spontaneous action, creativity - spontaneity
      • quote: Michael Levin

        • the Bodhisattva vow can be seen as a method for control that is in alignment with, and informed by, the understanding that singular and enduring control agents do not actually exist.
      • comment

        • adjacency between
          • nondual awareness
          • self-construct
          • self is illusion
          • singular, solid, enduring control agent
        • adjacency statement
          • nondual awareness is the deep insight that there is no solid, singular, enduring control agent.
          • creativity is unpredictable and spontaneous and would not be possible if there were perfect control
      • example - control agent - imperfection: start - the unpredictability of the realtime emergence of our next exact thought or action is a good example of this
      • example - control agent - imperfection: end

      • triggered insight: not only are thoughts and actions random, but dreams as well

        • I dreamt the night after this about something related to this paper (cannot remember what it is now!)
        • Obviously, I had no clue the idea in this paper would end up exactly as it did in next night's dream!
    1. Many courts concluded that citizens have no constitutionally protected right to arms at all, and the federal courts never invalidated a single gun control law.

      Conflates gun control with denial of 2nd Amendment rights, claims 2nd Amendment was 'all but forgotten". Needs evidence.

    1. In terms of evolution, animals adapt to their ecological conditions, but as humans, we have been able to control our ecological conditions.
      • for: humans vs other animals, personal experience, personal experience - pets, control vs adaptation, human features, quote, quote - Ruth Gates, quote - humans vs animals, quote - control vs adaptation
      • quote
        • . In terms of evolution, animals adapt to their ecological conditions, but as humans, we have been able to control our ecological conditions.
      • author: Ruth Gates
      • source: https://www.youtube.com/watch?v=ZJV0Kx7oGxU&t=496s
      • comment
        • personal experience
          • her remark made me think about how often I feel this difference with our pets. They adapt to whatever we do. We control our environment by building something. They just adapt to whatever we build.
            • Our pets never build anything, but simply adapt to what we build.
    1. The scientists behind the new study are planning an eradication campaign in Sicily. With help from authorities, they say they will destroy the known nests, continue to search local areas for more nests, and monitor for several years to make sure no ants escape. They hope to recruit residents across Europe to keep an eye out for more fire ants.
      • for: invasive species - red fire ant - control
      • comment
        • this is an excellent application for citizen science in general, to control invasive species
  8. Aug 2023
    1. In computing, the robustness principle is a design guideline for software that states: "be conservative in what you do, be liberal in what you accept from others". It is often reworded as: "be conservative in what you send, be liberal in what you accept". The principle is also known as Postel's law, after Jon Postel, who used the wording in an early specification of TCP.

      https://en.wikipedia.org/wiki/Robustness_principle

      Robustness principle: be conservative in what you do, be liberal in what you accept from others.

    1. The big tech companies, left to their own devices (so to speak), have already had a net negative effect on societies worldwide. At the moment, the three big threats these companies pose – aggressive surveillance, arbitrary suppression of content (the censorship problem), and the subtle manipulation of thoughts, behaviors, votes, purchases, attitudes and beliefs – are unchecked worldwide
      • for: quote, quote - Robert Epstein, quote - search engine bias,quote - future of democracy, quote - tilting elections, quote - progress trap, progress trap, cultural evolution, technology - futures, futures - technology, progress trap, indyweb - support, future - education
      • quote
        • The big tech companies, left to their own devices , have already had a net negative effect on societies worldwide.
        • At the moment, the three big threats these companies pose
          • aggressive surveillance,
          • arbitrary suppression of content,
            • the censorship problem, and
          • the subtle manipulation of
            • thoughts,
            • behaviors,
            • votes,
            • purchases,
            • attitudes and
            • beliefs
          • are unchecked worldwide
      • author: Robert Epstein
        • senior research psychologist at American Institute for Behavioral Research and Technology
      • paraphrase
        • Epstein's organization is building two technologies that assist in combating these problems:
          • passively monitor what big tech companies are showing people online,
          • smart algorithms that will ultimately be able to identify online manipulations in realtime:
            • biased search results,
            • biased search suggestions,
            • biased newsfeeds,
            • platform-generated targeted messages,
            • platform-engineered virality,
            • shadow-banning,
            • email suppression, etc.
        • Tech evolves too quickly to be managed by laws and regulations,
          • but monitoring systems are tech, and they can and will be used to curtail the destructive and dangerous powers of companies like Google and Facebook on an ongoing basis.
      • reference
    1. Early in 2013, Ronald Robertson, now a doctoral candidate at the Network Science Institute at Northeastern University in Boston, and I discovered that Google isn’t just spying on us; it also has the power to exert an enormous impact on our opinions, purchases and votes.
      • for: big tech - bias, big tech - manipulation, big tech - mind control, big tech - influence
      • paraphrase
        • Early in 2013, Ronald Robertson,
          • now a doctoral candidate at the Network Science Institute at Northeastern University in Boston,
        • and I discovered that Google isn’t just spying on us;
          • it also has the power to exert an enormous impact on our opinions, purchases and votes.
    2. he Search Suggestion Effect (SSE), the Answer Bot Effect (ABE), the Targeted Messaging Effect (TME), and the Opinion Matching Effect (OME), among others. Effects like these might now be impacting the opinions, beliefs, attitudes, decisions, purchases and voting preferences of more than two billion people every day.
      • for: search engine bias, google privacy, orwellian, privacy protection, mind control, google bias
      • title: Taming Big Tech: The Case for Monitoring
      • date: May 14th 2018
      • author: Robert Epstein

      • quote

      • paraphrase:
        • types of search engine bias
          • the Search Suggestion Effect (SSE),
          • the Answer Bot Effect (ABE),
          • the Targeted Messaging Effect (TME), and
          • the Opinion Matching Effect (OME), among others. -
        • Effects like these might now be impacting the
          • opinions,
          • beliefs,
          • attitudes,
          • decisions,
          • purchases and
          • voting preferences
        • of more than two billion people every day.
  9. Jul 2023
    1. Instead of dumping the humidity outdoors, why not have an option to condense it to a water holding tank, thus offsetting the need to purchase water? This sounds like it might even be able to distill water, which would further save money for those who need distilled water for apnea devices and other uses.

    1. In ihrer Serie über Klimasabotage beschäftigt sich die taz gründlich mit der CDU und Untergruppierungen wie dem Wirtschaftsrat und der Mittelstands-Vereinigung. Der Artikel fasts wichtige Informationen über das Lobbyisten-Netzwerk zusammen, das für die Blockade von Klimaschutzmaßnahmen unter Angela Merkel verantwortlich war und heute versucht, die Energiewende zu hintertreiben. https://taz.de/Die-Klimasabotage-der-Union/!5937181/

  10. Jun 2023
    1. Noam Chomsky’s backpocket classic on wartime propaganda and opinion control

      Media control is actually a definition/term (that has been coined by Noam Chomsky)

  11. May 2023
    1. this era began in the mid-20th century before you and I were born with a biomedical Innovation
      • Mary Harrington suggests that

        • a starting point for the transhuman age
        • was marked by
        • the introduction of the birth control pill
      • comment

        • while that may mark the first time a technology has radically reshaped human physiology in such a direct way,
          • the spirit of transhumanism is inherent in our nature as innovating cognitive beings
          • in fact, I find the term "transhuman" self-contradictory and problematic
            • as our very nature as innovative beings means we are constantly reinventing and transcending our old behaviors
    1. Figured it out. Cache-Control header is required.

      js const headers = { 'Cache-Control': 'public, max-age=604800' }; const request = new Request('https://foobar.com/') const cacheResponse = new Response('bar',{ headers }) const cache = caches.default await cache.put(request, cacheResponse) const response = await cache.match(request);

  12. Mar 2023
    1. <table><tbody><tr><th colspan="4" rowspan="1">Status</th><th colspan="4" rowspan="1">Description</th></tr><tr><td colspan="5" rowspan="1">HIT</td><td colspan="5" rowspan="1">The resource was found in Cloudflare’s cache.</td></tr><tr><td colspan="5" rowspan="1">MISS</td><td colspan="5" rowspan="1">The resource was not found in Cloudflare’s cache and was served from the origin web server.</td></tr><tr><td colspan="5" rowspan="1">NONE/UNKNOWN</td><td colspan="5" rowspan="1">Cloudflare generated a response that denotes the asset is not eligible for caching. This may have happened because:
    2. A Worker generated a response without sending any subrequests. In this case, the response did not come from cache, so the cache status will be none/unknown.
    3. A Worker request made a subrequest (fetch). In this case, the subrequest will be logged with a cache status, while the main request will be logged with none/unknown status (the main request did not hit cache, since Workers sits in front of cache).
    4. A Firewall rule was triggered to block a request. The response will come from the edge network before it hits cache. Since there is no cache status, Cloudflare will log as none/unknown.
    5. A redirect page rule caused the edge network to respond with a redirect to another asset/URL. This redirect response happens before the request reaches cache, so the cache status is none/unknown.
    6. </td></tr><tr><td colspan="5" rowspan="1">EXPIRED</td><td colspan="5" rowspan="1">The resource was found in Cloudflare’s cache but was expired and served from the origin web server.</td></tr><tr><td colspan="5" rowspan="1">STALE</td><td colspan="5" rowspan="1">The resource was served from Cloudflare’s cache but was expired. Cloudflare could not contact the origin to retrieve an updated resource.</td></tr><tr><td colspan="5" rowspan="1">BYPASS</td><td colspan="5" rowspan="1">The origin server instructed Cloudflare to bypass cache via a Cache-Control header set to no-cache,private, or max-age=0 even though Cloudflare originally preferred to cache the asset. BYPASS is returned when enabling Origin Cache-Control. Cloudflare also sets BYPASS when your origin web server sends cookies in the response header.</td></tr><tr><td colspan="5" rowspan="1">REVALIDATED</td><td colspan="5" rowspan="1">The resource is served from Cloudflare’s cache but is stale. The resource was revalidated by either an If-Modified-Since header or an If-None-Match header.</td></tr><tr><td colspan="5" rowspan="1">UPDATING</td><td colspan="5" rowspan="1">The resource was served from Cloudflare’s cache and was expired, but the origin web server is updating the resource. UPDATING is typically only seen for very popular cached resources.</td></tr><tr><td colspan="5" rowspan="1">DYNAMIC</td><td colspan="5" rowspan="1">Cloudflare does not consider the asset eligible to cache and your Cloudflare settings do not explicitly instruct Cloudflare to cache the asset. Instead, the asset was requested from the origin web server. Use Page Rules to implement custom caching options.</td></tr></tbody></table>
  • Feb 2023
  • Jan 2023
    1. Hints for Preparing Documents Most documents go through several versions (always more than you expected) before they are finally finished. Accordingly, you should do whatever possible to make the job of changing them easy. First, when you do the purely mechanical operations of typing, type so subsequent editing will be easy. Start each sentence on a new line. Make lines short, and break lines at natural places, such as after commas and semicolons, rather than randomly. Since most people change documents by rewriting phrases and adding, deleting and rearranging sentences, these precautions simplify any editing you have to do later. — Brian W. Kernighan, 1974

      —Brian W. Kernighan, 1974 “UNIX for Beginners” [PDF] as Bell Labs Technical Memorandum 74-1273-18 on 29 October 1974.

      For easier editing and reuse of sentences, or even portions of lines of text, one can (and should) write sentences or sentence fragments on their own lines in digital contexts.

      This way future edits or the ability to more easily cut and paste will far easier in addition to keeping your version control files simpler and easier to read and visually track your changes. (That is in many version control systems, instead of a change appearing to affect an entire paragraph, it will only show on the single line that was changed thereby making the change easier to see.)

      This particular affordance may be a particularly useful one for note takers who expect to regularly reuse their notes in other contexts. Many forms of software (including Tex, LaTeX, and even markdown) will autowrap newlines so that a sentence broken up into clauses on multiple lines will properly wrap back into a proper looking single line when printed. Take care that in many Markdown versions adding two spaces at the end of a line will automatically create a newline in your text.

    1. Software should be a malleable medium, where anyone can edit their tools to better fit their personal needs. The laws of physics aren’t relevant here; all we need is to find ways to architect systems in such a way that they can be tweaked at runtime, and give everyone the tools to do so.

      It's clear that gklitt is referring to the ability of extensions to augment the browser, but: * it's not clear that he has applied the same thought process to the extension itself (which is also software, after all) * the conception of in-browser content as software tooling is likely a large reason why the perspective he endorses here is not more widespread—that content is fundamentally a copy of a particular work, in the parlance of US copyright law (which isn't terribly domain-appropriate here so much as its terminology is useful)

    1. it really all does 00:06:53 trace back to the start of our what we call civilization our civilization meaning Agriculture and then settlements and cities so prior to that we lived in approximate equilibrium with ecosystems

      !- Original source of : polycrisis - According to Prof. Tom Murphy, the original source of our current polycrisis is our collective, human need for control and mastery of our environment starting with civilization building itself, - and has its roots over 10,000 years ago in the beginnings of agriculture

      !- Tom Murphy : Comment His thesis is aligned with the work of: - Glenn Albrecht & Gavin Van Horn: Replacing the Anthropocene with the Symbiocene https://hyp.is/go?url=https%3A%2F%2Fhumansandnature.org%2Fexiting-the-anthropocene-and-entering-the-symbiocene%2F&group=world - Buddhist scholar David Loy: On the Emptiness at the heart of the human being that cannot be filled by consumerism & materialism https://hyp.is/go?url=http%3A%2F%2Fdocdrop.org%2Fvideo%2F1Gq4HhUIDDk%2F&group=world - Korean / German philosopher Byung-Chul Han: The Burnout Society https://hyp.is/go?url=http%3A%2F%2Fdocdrop.org%2Fvideo%2FbNkDeUApreo%2F&group=world - Cognitive Scientist, Buddhist scholar Jay Garfield: Losing the Self: https://hyp.is/go?url=http%3A%2F%2Fdocdrop.org%2Fvideo%2FE5lW5XedNGU%2F&group=world

    1. DeWine said he has talked directly with the director and several members of the six-member Ohio Casino Control Commission, to which the legislature gave the job of regulating the fledgling industry.

      Since neither you nor I nor anyone else may dictate whether or not people bet on sports in Ohio, we couldn't have justly granted that authority to the legislature to hand off to the made-up "Ohio Casino Control Commission". We also couldn't have justly granted any authority to "Governor" Mike DeWine.

      This is simply corrupt racketeering by the most powerful gang in the state, and their "legions of enforcer" mercenaries to claim a right to impose their opinions on Ohioans when no one else can.

      For those confused, it's right there in the Just Powers clause of The Declaration of Independence.

      All just Gov power must be granted to it by individuals. They can't just wish power for themselves out of thin air, no matter how many legislators or voters "vote" for the wish to come true.

  • Dec 2022
  • Nov 2022
    1. Fifty years ago, coinciding with the centennial of the release of Darwin’s manuscript, author Morse Peckham collected all six editions into a single “variorum” text. Peckham painstakingly created a reference system that denotes the modifications and changes between editions. The text was created by Peckham’s careful enumeration of every sentence from every edition, copied onto index cards; from these cards, he carefully assembled them into a final text.
    1. Contents 1 Overview 2 Reasons for failure 2.1 Overconfidence and complacency 2.1.1 Natural tendency 2.1.2 The illusion of control 2.1.3 Anchoring 2.1.4 Competitor neglect 2.1.5 Organisational pressure 2.1.6 Machiavelli factor 2.2 Dogma, ritual and specialisation 2.2.1 Frames become blinders 2.2.2 Processes become routines 2.2.3 Resources become millstones 2.2.4 Relationships become shackles 2.2.5 Values becomes dogmas 3 The paradox of information systems 3.1 The irrationality of rationality 3.2 How computers can be destructive 3.3 Recommendations for practice 4 Case studies 4.1 Fresh & Easy 4.2 Firestone Tire and Rubber Company 4.3 Laura Ashley 4.4 Xerox 5 See also 6 References

      Wiki table of contents of the Icarus paradox

    1. v5: added git and github (thanks @ceejbot), and RSS (thanks @zem42). Taking suggestions for hierarchical/distributed and hierarchical/decentralized.

      t Laurie Voss's crowdsourced set of examples of things that have structure & control in the form of the following: - centralized - hierarchical - federated - distributed - decentralized

      Picture below: Link to tweet: https://twitter.com/seldo/status/1486563446099300359?s=20&t=C6z9xUF_YBkOFmfcjfjpUA

    1. The solution I settled on (which I still use to this day) is quick and elegant; as well as super accurate. All the blogs start out as non-discoverable by search engines, and do not show up on the Bear feed until they have been vetted by yours truly. I then set up a Tinder-esque review screen where I can easily approve or block a new blog (as well as blacklist that email address).
  • Sep 2022
    1. The thing is that people add these   jump boxes - pivots between different networks -  they want to get data out from the control system   to the business network. They want to be able to  monitor things.

      Jump boxes

      Devices that are intentionally added to the industrial control system network to allow access from the business network. These cross the security "air gap" set up between the networks. This is useful, though, for getting performance data from the industrial control system to the monitors and resource trackers on the business network.

  • Aug 2022
    1. Editorial: The real reason I wanted Cmm to succeed: to democratize programming. It wouldn’t belong in any business plan, and I seldom mentioned to anyone, but the real reason I wanted Cmm to succeed was not about making money (although paying the mortgage was always important). The real reason was because of the feeling I had when I programmed a computer to perform work for me
    1. Indeed, judging from the accounts of the many employees who have now gone on record about this issue, the “debates” that have been happening at Basecamp are precisely the kinds of conversations that happen when you have a diverse workforce. Different issues affect different people differently, and being able to speak freely about those differences is the hallmark of a healthy culture. But by framing these discussions as “acrimonious debates” rather than “challenging conversations,” Hansson has positioned himself not as a peacemaker, but as a tyrant hell-bent on taking his toys and going home; shutting down discussions rather than holding space for growth and discovery.
    1. I was doing some random searches for older material on zettelkasten in German and came across this.

      Apparently I've come across this before in a similar context: https://hypothes.is/a/CsgyjAXQEeyMfoN7zLcs0w

      The description now makes me want to read it all the more!

      This is a book about a box that contained the world. The box was the Picture Academy for the Young, a popular encyclopedia in pictures invented by preacher-turned-publisher Johann Siegmund Stoy in eighteenth-century Germany. Children were expected to cut out the pictures from the Academy, glue them onto cards, and arrange those cards in ordered compartments—the whole world filed in a box of images.

      As Anke te Heesen demonstrates, Stoy and his world in a box epitomized the Enlightenment concern with the creation and maintenance of an appropriate moral, intellectual, and social order. The box, and its images from nature, myth, and biblical history, were intended to teach children how to collect, store, and order knowledge. te Heesen compares the Academy with other aspects of Enlightenment material culture, such as commercial warehouses and natural history cabinets, to show how the kinds of collecting and ordering practices taught by the Academy shaped both the developing middle class in Germany and Enlightenment thought. The World in a Box, illustrated with a multitude of images of and from Stoy's Academy, offers a glimpse into a time when it was believed that knowledge could be contained and controlled.

      Given the portions about knowledge and control, it might also be of interest to @remikalir wrt his coming book.

    1. Roughly stated, my overarching career mission is to design, build, and deploy software platforms that put end users in control of their computing and data, in part by making it easy and natural for programmers to create software that honors user desire.
  • Jul 2022
    1. Free as in ...? Points out that freedoms afforded by foss software to the average computer user are effectively the same as proprietary software, because it's too difficult to even find the source and build it, let alone make any changes. Advocates the foss developers should not think only about the things that users are not legally prevented from doing, but about what things they are realistically empowered and supported in doing.
  • Jun 2022
    1. surveys indicate that screens and e-readers interfere with two other important aspects of navigating texts: serendipity and a sense of control.

      Based on surveys, readers indicate that two important parts of textual navigation are sense of control and serendipity.

      http://books.google.com/books/about/Electronic_journal_literature.html?id=YSFlAAAAMAAJ


      How does the control over a book frame how we read? What does "power over" a book look like compared to "power with"?

      What are the tools for thought affordances that paper books provide over digital books and vice versa?


      I find myself thinking about people publishing books in index card/zettelkasten formats. Perhaps Scott Scheper could do this with his antinet book presented in a linear format, but done in index cards with his numbers, links, etc. as well as his actual cards for his index so that readers could also see the power of the system by holding it in their hands and playing with it.

    1. Where are My Children?, Universal's top film of 1916, written and directed by their top director Lois Weber, discussed abortion and birth control. It was added to the National Film Registry in 1993.

      See also - Stamp, Shelley. Lois Weber in Early Hollywood. University of California Press, May 2015. ISBN 9780520284463


      Watched this last night

      https://www.kcet.org/shows/lost-la/episodes/dream-factory

    1. gun rights advocates often push to arm more people, citing prominent examples where a “good guy with a gun” stopped a “bad guy.”

      A "good guy with a gun" stopped a "bad guy" on average less than 3% of the time in active shooter situations in 433 events through 2021.

    2. “It’s direct, indisputable, empirical evidence that this kind of common claim that ‘the only thing that stops a bad guy with the gun is a good guy with the gun’ is wrong,” said Adam Lankford, a professor at the University of Alabama, who has studied mass shootings for more than a decade. “It’s demonstrably false, because often they are stopping themselves.”
    1. But systems of schooling and educational institutions–and much of online learning– are organized in ways that deny their voices matter. My role is to resist those systems and structures to reclaim the spaces of teaching and learning as voice affirming. Voice amplifying.

      Modeling annotation and note taking can allow students to see that their voices matter in conversation with the "greats" of knowledge. We can and should question authority. Even if one's internal voice questions as one reads, that might be enough, but modeling active reading and note taking can better underline and empower these modes of thought.

      There are certainly currents within American culture that we can and should question authority.

      Sadly some parts of conservative American culture are reverting back to paternalized power structures of "do as I say and not as I do" which leads to hypocrisy and erosion of society.

      Education can be used as a means of overcoming this, though it requires preventing the conservative right from eroding this away from the inside by removing books and certain thought from the education process that prevents this. Extreme examples of this are Warren Jeff's control of religion, education, and social life within his Mormon sect.

      Link to: - Lawrence Principe examples of the power establishment in Western classical education being questioned. Aristotle wasn't always right. The entire history of Western science is about questioning the status quo. (How can we center this practice not only in science, but within the humanities?)


      My evolving definition of active reading now explicitly includes the ideas of annotating the text, having a direct written conversation with it, questioning it, and expanding upon it. I'm not sure I may have included some or all of these in it before. This is what "reading with a pen in hand" (or digital annotation tool) should entail. What other pieces am I missing here which might also be included?

    1. This is an excellent piece, even though the writing is (probably intentionally) in places too obscure.

    1. First, the majority population in eastern Virginia were enslaved blacks. Whites lived in constant fear of slave insurrection. Everyone knew about the 1739 slave rebellion in Stono, S.C., when blacks broke into a store, decapitated the shopkeepers, seized guns and powder, and marched with flying banners, beating drums and cries of “Liberty!” Up to 100 joined the rebellion before being engaged by a contingent of armed, mounted militiamen. Scores died in the ensuing battle.
    2. The Virginia Declaration of Rights, written by none other than George Mason in 1776 when states controlled the militias, did not have one.

      Recall that George Mason was an anti-federalist.

    3. Only four of the 13 state Constitutions had such a provision.

      Prior to the Bill of Rights, only four of the thirteen state Constitutions had a provision for a right to bear arms.

    1. Some minds are agitated by foreign alarms. Happily for us, there is no real danger from Europe; that country is engaged in more arduous business: from that quarter there is no cause of fear: you may sleep in safety forever for them.

      When talking about "disciplined armies", "defense", and "militias" at the Virginia Ratifying Convention in 1788, Patrick Henry explicitly says that the United States is not in danger from European powers:

      Some minds are agitated by foreign alarms. Happily for us, there is no real danger from Europe; that country is engaged in more arduous business: from that quarter there is no cause of fear: you may sleep in safety forever for them.

    1. “If they neglect or refuse”: “Document: Patrick Henry Speech BeforeVirginia Ratifying Convention (June 5, 1788),” Teaching American History.
    2. Professor Carl Bogus: Carl T. Bogus, “Was Slavery a Factor in the SecondAmendment?” e New York Times, May 24, 2018.

      Professor Carl Bogus: Carl T. Bogus, “Was Slavery a Factor in the Second Amendment?” The New York Times, May 24, 2018. https://www.nytimes.com/2018/05/24/opinion/second-amendment-slavery-james-madison.html

    3. Patrick Henry and George Mason: Dave Davies, “Historian Uncovers eRacist Roots of the 2nd Amendment,” NPR, June 2, 2021.

      https://www.npr.org/2021/06/02/1002107670/historian-uncovers-the-racist-roots-of-the-2nd-amendment

      Transcript: https://www.npr.org/transcripts/1002107670 Audio: <audio src="">

      <audio controls> <source src="https://ondemand.npr.org/anon.npr-mp3/npr/fa/2021/06/20210602_fa_01.mp3" type="audio/mpeg"> <br />

      Your browser doesn't support HTML5 audio. Here is a link to the audio instead.

      </audio>

    1. The lower courts consistently point to one paragraph in particular from the Heller decision. Nothing in the opinion, Scalia wrote, shouldbe taken to cast doubt on longstanding prohibitions on the possession of firearms by felons and the mentally ill, or laws forbidding the carrying of firearms in sensitive places such as schools and government buildings, or laws imposing conditions and qualifications on the commercial sale of arms.This paragraph from the pen of Justice Scalia, the foremost proponent of constitutional originalism, was astounding. True, the Founders imposed gun control, but they had no laws resembling Scalia’s list of Second Amendment exceptions. They had no laws banning guns in sensitive places, or laws prohibiting the mentally ill from possessing guns, or laws requiring commercial gun dealers to be licensed. Such restrictions are products of the 20th century. Justice Scalia, in other words, embraced a living Constitution.
    2. A sign of the NRA’s new determination to influence electoral politics was the 1980 decision to endorse, for the first time in the organization’s 100 years, a presidential candidate. Their chosen candidate was none other than Ronald Reagan,
    3. In the 1960s, the NRA once again supported the push for new federal gun laws. After the assassination of President John F. Kennedy in 1963 by Lee Harvey Oswald, who had bought his gun through a mail-order ad in the NRA’s American Rifleman magazine, Franklin Orth, then the NRA’s executive vice president, testified in favor of banning mail-order rifle sales. “We do not think that any sane American, who calls himself an American, can object to placing into this bill the instrument which killed the president of the United States.”
    4. When Congress was considering the first significant federal gun law of the 20th century—the National Firearms Act of 1934, which imposed a steep tax and registration requirements on “gangster guns” like machine guns and sawed-off shotguns—the NRA endorsed the law. Karl Frederick and the NRA did not blindly support gun control; indeed, they successfully pushed to have similar prohibitive taxes on handguns stripped from the final bill, arguing that people needed such weapons to protect their homes. Yet the organization stood firmly behind what Frederick called “reasonable, sensible, and fair legislation.”
    5. In the 1920s and ’30s, the NRA was at the forefront of legislative efforts to enact gun control. The organization’s president at the time was Karl T. Frederick, a Princeton- and Harvard-educated lawyer known as “the best shot in America”—a title he earned by winning three gold medals in pistol-shooting at the 1920 Summer Olympic Games. As a special consultant to the National Conference of Commissioners on Uniform State Laws, Frederick helped draft the Uniform Firearms Act, a model of state-level gun-control legislation.
    6. General Daniel E. Sickles, the commanding Union officer enforcing Reconstruction in South Carolina, ordered in January 1866 that “the constitutional rights of all loyal and well-disposed inhabitants to bear arms will not be infringed.” When South Carolinians ignored Sickles’s order and others like it, Congress passed the Freedmen’s Bureau Act of July 1866, which assured ex-slaves the “full and equal benefit of all laws and proceedings concerning personal liberty … including the constitutional right to bear arms.”
    7. After losing the Civil War, Southern states quickly adopted the Black Codes, laws designed to reestablish white supremacy by dictating what the freedmen could and couldn’t do. One common provision barred blacks from possessing firearms. To enforce the gun ban, white men riding in posses began terrorizing black communities. In January 1866, Harper’s Weekly reported that in Mississippi, such groups had “seized every gun and pistol found in the hands of the (so called) freedmen” in parts of the state. The most infamous of these disarmament posses, of course, was the Ku Klux Klan.
    8. More controversially, the laws restricted importation of “Saturday Night Specials”—the small, cheap, poor-quality handguns so named by Detroit police for their association with urban crime, which spiked on weekends. Because these inexpensive pistols were popular in minority communities, one critic said the new federal gun legislation “was passed not to control guns but to control blacks.”
    9. The very next day, Congress passed the Omnibus Crime Control and Safe Streets Act of 1968, the first federal gun-control law in 30 years. Months later, the Gun Control Act of 1968 amended and enlarged it.
    10. Newton had discovered, during classes at San Francisco Law School, that California law allowed people to carry guns in public so long as they were visible, and not pointed at anyone in a threatening way.In February of 1967, Oakland police officers stopped a car carrying Newton, Seale, and several other Panthers with rifles and handguns. When one officer asked to see one of the guns, Newton refused. “I don’t have to give you anything but my identification, name, and address,” he insisted. This, too, he had learned in law school.
    11. A 1792 federal law mandated every eligible man to purchase a military-style gun and ammunition for his service in the citizen militia. Such men had to report for frequent musters—where their guns would be inspected and, yes, registered on public rolls.
    12. It was May 2, 1967, and the Black Panthers’ invasion of the California statehouse launched the modern gun-rights movement.
    1. Governor Ronald Reagan, who was coincidentally present on the capitol lawn when the protesters arrived, later commented that he saw "no reason why on the street today a citizen should be carrying loaded weapons" and that guns were a "ridiculous way to solve problems that have to be solved among people of good will." In a later press conference, Reagan added that the Mulford Act "would work no hardship on the honest citizen."
    2. The Mulford Act was a 1967 California bill that prohibited public carrying of loaded firearms without a permit.[2] Named after Republican assemblyman Don Mulford, and signed into law by governor of California Ronald Reagan, the bill was crafted with the goal of disarming members of the Black Panther Party who were conducting armed patrols of Oakland neighborhoods, in what would later be termed copwatching.[3][4] They garnered national attention after Black Panthers members, bearing arms, marched upon the California State Capitol to protest the bill.

      WTF!

  • May 2022
    1. Blog Tucker Carlson: Biden Giving WHO Power to 'Deploy Proactive Countermeasures Against Misinformation and Social Media Attacks' By Craig Bannister | May 20, 2022 | 10:39am EDT Tucker Carlson (Screenshot) Pres. Biden has found a new way to censor free speech – by giving the World Health Organization (WHO) control of Americans’ speech – Fox News Host Tucker Carlson warned on Thursday. After dissolving his “Disinformation Governance Board, due to public outcry, Biden is preparing to sign WHO’s new World Pandemic Treaty, giving a global operational control and power – through ‘proactive countermeasures’ - to combat what it deems “disinformation,“ Carlson explained, citing a WHO working group's draft text:#stickypbModal625{ position : relative; z-index : 30; margin:0px px; padding: 9px; background: rgba(0,0,0,0.0);} @media only screen and (max-width: 1024px) {#stickypbModal625 { flex-wrap: wrap;}} googletag.cmd.push(function() { googletag.display("div-hre-CNS-News-625"); }); “So, what would this ‘operational control’ mean? “Let’s be specific. Right off the bat, the treaty demands ‘National and global coordinated actions to address the misinformation, disinformation, and stigmatization that undermines public health.’ “Oh! Here we go! Right to censorship: ‘People are criticizing us, and for public health reasons, that can't be allowed. If you criticize us, people will die.’  “So, you saw yesterday that the Biden administration, in the face of universal laughter and derision, had to fire the head of its new Ministry of Truth - but they found another way to do it: ‘W.H.O. Secretariat to build capacity to deploy proactive countermeasures against misinformation and social media attacks.’” “So, they are going to get to censor anybody who doesn't agree with what they do, as they control the intimate details of your life,” Carlson explained: “And they will control those details. Under this treaty, the World Health Organization will get to establish vaccine passports and regulate travel. World Health organization will ‘Develop standards for producing a digital version of the international certificate of vaccination and prophylactics.’  “Okay.  “So you may think, ‘Well, it is just about COVID and I went along with mandatory vaccines and vaccine passports at the time, how bad could it be?’ [Laughs] First of all, if you went along with that, you should be repenting right about now. But, it is not just about COVID because the W.H.O. Will be in charge of ‘The digitalization of all health forms.’ The World Health Organization will also ‘Share real-time information about travel measures.’  “So you are going to find out exactly when you are allowed to get on a bus or train or airplane, or how about your bicycle, will they regulate that too? Maybe. Now the World Health Organization has sought this authority for years. Of course. Who doesn't want more power?” Carlson then played a foreboding comment by W.H.O. Director-General Tedros Adhanom Ghebreyesu. “Here’s Tedros back in April of 2020: “People in countries with stay-at-home orders are understandably frustrated with being confined to their homes for weeks on end. But the world will not and cannot go back to the way things were. There must be a new normal. A world that is healthier, safer, and better prepared.” Americans should question relinquishing control over their lives to an unelected person and global authority they had no say in choosing, Carlson said:#stickypbModal711{ position : relative; z-index : 30; margin:0px px; padding: 9px; background: rgba(0,0,0,0.0);} @media only screen and (max-width: 1024px) {#stickypbModal711 { flex-wrap: wrap;}} googletag.cmd.push(function() { googletag.display("div-hre-CNS-News-711"); }); “Okay, so there’s a guy with a long and documented history of subverting public health, who is clearly a liar, who is acting as an agent for the Chinese government, and you have to ask yourself, ‘Did I vote for that guy? Is he one of my elected representatives in this democracy? How did he get power over where I can travel and when?’ “Good question.”

      Summary of Tucker's televised evening talk show.

    1. as if the only option we had to eat was factory-farmed fast food, and we didn’t have any way to make home-cooked meals

      See also An app can be a home-cooked meal along with this comment containing RMS's remarks with his code-as-recipe metaphor in the HN thread about Sloan's post:

      some of you may not ever write computer programs, but perhaps you cook. And if you cook, unless you're really great, you probably use recipes. And, if you use recipes, you've probably had the experience of getting a copy of a recipe from a friend who's sharing it. And you've probably also had the experience — unless you're a total neophyte — of changing a recipe. You know, it says certain things, but you don't have to do exactly that. You can leave out some ingredients. Add some mushrooms, 'cause you like mushrooms. Put in less salt because your doctor said you should cut down on salt — whatever. You can even make bigger changes according to your skill. And if you've made changes in a recipe, and you cook it for your friends, and they like it, one of your friends might say, “Hey, could I have the recipe?” And then, what do you do? You could write down your modified version of the recipe and make a copy for your friend. These are the natural things to do with functionally useful recipes of any kind.

      Now a recipe is a lot like a computer program. A computer program's a lot like a recipe: a series of steps to be carried out to get some result that you want. So it's just as natural to do those same things with computer programs — hand a copy to your friend. Make changes in it because the job it was written to do isn't exactly what you want. It did a great job for somebody else, but your job is a different job. And after you've changed it, that's likely to be useful for other people. Maybe they have a job to do that's like the job you do. So they ask, “Hey, can I have a copy?” Of course, if you're a nice person, you're going to give a copy. That's the way to be a decent person.

  • www.mindprod.com www.mindprod.com
    1. Show me a switch statement as if it had been handled with a set of subclasses. There is underlying deep structure here. I should be able to view the code as if it had been done with switch or as if it had been done with polymorphism. Sometimes you are interested in all the facts about Dalmatians. Sometimes you are interested in comparing all the different ways different breeds of dogs bury their bones. Why should you have to pre-decide on a representation that lets you see only one point of view?

      similar to my strawman for language skins

  • www.dreamsongs.com www.dreamsongs.com
    1. the very existence of a master plan means, by definition, that the members of the community can have little impact on the future shape of their community,
  • Apr 2022
    1. Since most of our feeds rely on either machine algorithms or human curation, there is very little control over what we actually want to see.

      While algorithmic feeds and "artificial intelligences" might control large swaths of what we see in our passive acquisition modes, we can and certainly should spend more of our time in active search modes which don't employ these tools or methods.

      How might we better blend our passive and active modes of search and discovery while still having and maintaining the value of serendipity in our workflows?

      Consider the loss of library stacks in our research workflows? We've lost some of the serendipity of seeing the book titles on the shelf that are adjacent to the one we're looking for. What about the books just above and below it? How do we replicate that sort of serendipity into our digital world?

      How do we help prevent the shiny object syndrome? How can stay on task rather than move onto the next pretty thing or topic presented to us by an algorithmic feed so that we can accomplish the task we set out to do? Certainly bookmarking a thing or a topic for later follow up can be useful so we don't go too far afield, but what other methods might we use? How can we optimize our random walks through life and a sea of information to tie disparate parts of everything together? Do we need to only rely on doing it as a broader species? Can smaller subgroups accomplish this if carefully planned or is exploring the problem space only possible at mass scale? And even then we may be under shooting the goal by an order of magnitude (or ten)?

    1. Why is Standard Ebooks sending content-security-policy: default-src 'self';? This is not an appropriate use. (And it keeps things like the Hypothesis sidebar from loading.)

    1. ROI in the left hemisphere. Handedness was measured
    2. ROI around the S1/M1
    3. ROI in the visual cortex.
    4. hemispheric specialization and creative thinking, thePCC/preCUN coordinates were located in both hemispheres
    5. keep their eyes closed during the scan
    6. Excluded from participation were professional visualartists and art historians, as well as people suffering from seriousphysical or mental disorders or taking psychotropic drugs
    1. except its codebase is completely incomprehensible to anyone except the original maintainer. Or maybe no one can seem to get it to build, not for lack of trying but just due to sheer esotericism. It meets the definition of free software, but how useful is it to the user if it doesn't already do what they want it to, and they have no way to make it do so?

      Kartik made a similar remark in an older version of his mission page:

      Open source would more fully deliver on its promise; are the sources truly open if they take too long to grok, so nobody makes the effort?

      https://web.archive.org/web/20140903010656/http://akkartik.name/about

    1. work-around

      Bookmarklets and the JS console seem to be the workaround.

      For very large customizations, you may run into browser limits on the effective length of the bookmarklet URI. For a subset of well-formed programs, there is a way to store program parts in multiple bookmarklets, possibly loaded with the assistance of a separate bookmarklet "bootloader", although this would be tedious. The alternative is to use the JS console.

      In FIrefox, you can open a given script that you've stored on your computer by pressing Ctrl+O/Cmd+O, selecting the file as you would in any other program, and then pressing Enter. (Note that this means you might need to press Enter twice, since opening the file in question merely puts its contents into the console input and does not automatically execute it—sort of a hybrid clipboard thing.) I have not tested the limits of the console input for e.g. input size.

      As far as I know, you can also use the JS console to get around the design of the dubious WebExtensions APIs—by ignoring them completely and going back to the old days and using XPCOM/Gecko "private" APIs. The way you do is is to open about:addons by pressing Ctrl+Shift+A (or whatever), opening or pasting the code you want to run, and then pressing Enter. This should I think give you access to all the old familiar Mozilla internals. Note, though, that all bookmarklet functionality is disabled on about:addons (not just affecting bookmarklets that would otherwise violate CSP by loading e.g. an external script or dumping an inline one on the page`).

    2. CSP is taking away too much of the user's power and control over their browser use
    1. I end up with responsibility (friends complaining to me about this, that, and the other) without control (I can't affect any of those things)

    Tags

    Annotators

  • Mar 2022