40 Matching Annotations
  1. Nov 2023
  2. Sep 2023
    1. 1:41 identifying with a persona, consequence of society/expectations on oneself, & compromising the self

      Persona is fine, as long as you don’t “identify” with it

  3. May 2022
    1. For one test, the researchers trained the neural network with data from an unidentified mobile phone service that detailed 43,606 subscribers’ interactions over 14 weeks. This data included each interaction’s date, time, duration, type (call or text), the pseudonyms of the involved parties and who initiated the communication.

      Graph of Phone Calls/Texts

      One of the tests involved the researcher creating a directed graph of user calls/texts including timestamp, type of interaction (call versus text), and duration. Just based on the pattern of interaction, the AI could be fed the graph of a known individual and be spotted in the anonymized dataset about 15% of the time. Adding the second derivative interactions into the search graph increased the positive result to just over 50%.

  4. Oct 2021
  5. Aug 2021
  6. Jun 2021
  7. Mar 2021
  8. Sep 2020
    1. Blokland, I. V. van, Lanting, P., Ori, A. P., Vonk, J. M., Warmerdam, R. C., Herkert, J. C., Boulogne, F., Claringbould, A., Lopera-Maya, E. A., Bartels, M., Hottenga, J.-J., Ganna, A., Karjalainen, J., Study, L. C.-19 cohort, Initiative, T. C.-19 H. G., Hayward, C., Fawns-Ritchie, C., Campbell, A., Porteous, D., … Franke, L. H. (2020). Using symptom-based case predictions to identify host genetic factors that contribute to COVID-19 susceptibility. MedRxiv, 2020.08.21.20177246. https://doi.org/10.1101/2020.08.21.20177246

  9. Jul 2020
  10. Jun 2020
  11. May 2020
    1. Mei, X., Lee, H.-C., Diao, K., Huang, M., Lin, B., Liu, C., Xie, Z., Ma, Y., Robson, P. M., Chung, M., Bernheim, A., Mani, V., Calcagno, C., Li, K., Li, S., Shan, H., Lv, J., Zhao, T., Xia, J., … Yang, Y. (2020). Artificial intelligence for rapid identification of the coronavirus disease 2019 (COVID-19). MedRxiv, 2020.04.12.20062661. https://doi.org/10.1101/2020.04.12.20062661

  12. Apr 2020
    1. For penetrating thoracic trauma, physical examination, plain posteroanterior and lateral chest radiographs with metallic markings of wounds, and pericardial ultrasound will identify the majority of injuries.44 Injuries of the esophagus and trachea are the exceptions.
  13. Oct 2018
  14. Mar 2017
    1. I want to us to have all sorts of biographies, all sorts of photos of unknown urchins with whom we may connect.

      personal research local

      difficulty of frame - of readability - of length

    1. One minute left. Terry, Keith, Kevin, Susan, Maha, Mia, Jim, Maritta, Marcin, Paul, Teresa, Maxime, Alexis, Camille, Clarissa, Blaise, Leena, Jurgen, Jose, Alan, Howard, Alec, Laura, Christine, Marie Christine, Dave, Bonnie et al -

      time people connection

    2. He chose to live, to believe in himself after watching a short video on Youtube which somehow connected with him in his moment of despair.

      connection storyteller witness youtube

    3. An ex-student came to my class, he has become a successful manager in IKEA in Clermont Ferrand. He came to talk about his experience. We sat down in the comfy chairs in our learning space. His presence resulted in an extraordinary moment of connection. He told the story of how he had been at a cross-roads in his life. He had lived a crisis, he made a conscious decision to live, rather than to die.

      Storyteller connection

    1. What does this say about our desire to connect, to search for meaning?

      Desire to connect

      Desire for meaning.

    2. Half a life later, I am investigating those elements which connect us to the other, which enable us to journey a while with a fellow learner.

      What connects us? What is the story?

    1. Who do children identify with? Superman? Spiderman? Ironman? Barbie? Gandhi?

      International.

    2. I identified immediately with their show. I reckon that this must be like Mr Benn. We need characters who somehow capture our imagination.

      Identification Narrative culture

    3. I like their blogs. I like their comments.

      Mentoring. Identification

    4. Click, Link, Embed. Whatever happened to the three guys. I am already missing their program.

      Identification

      What leads us to a page? What leads us to connect? What leads us to attachment?

    5. That comes as a bit of shock. There are suggested readings, links, that comes as a bit of a shock. This is a course, I had forgotten what a course was. I make a mental note. Please try harder to remember that this is a Course.

      Disconnection

      Courses. Mapping. Focus.

    6. I am not at all sure where we can say we are? I have the impression that it is like being 3 spacemen in spaceships on journeys through the universe who are desperate for connection to others who have meaning for them.

      Attachment Connection Yearning Identification Friendship

    7. First day in class, we had students chatting with a friend of mine working on a Ski Resort in Australia,

      Porous walls. Hybridization. Change narrative

    8. a writer...(now, I come to think of it, I could say that now, I had never assumed that costume before)

      Writer.

      Blogger at least.

    9. I wanted to have adventures, change costumes and live many lives.

      Exploration of the internet and identification

    1. I met with my friend Marcin Kleban. After a twenty minute discussion we started a project of 40 language teachers and learners, he trusted me.. I met with my friend Blaise Ngandeu, I was able to learn about Nexus Analysis from my friend Maritta Riekki.

      connections attachment identification

    2. It was thanks to his blog that I learnt that I could comment safely, the perhaps that I might even blog. I felt as many do I had nothing to say. I could never contribute anything. I still lived with the words of an ex-boss in PR,

      mentoring

  15. Oct 2016
  16. Sep 2016
    1. the risk of re-identification increases by virtue of having more data points on students from multiple contexts

      Very important to keep in mind. Not only do we realise that re-identification is a risk, but this risk is exacerbated by the increase in “triangulation”. Hence some discussions about Differential Privacy.