9 Matching Annotations
  1. Aug 2025
    1. Themed logs are still more useful than daily notes<br /> by [[Eleanor Konik]]<br /> accessed on 2025-08-18T09:19:49

      On ordering notes in particular ways. Presumably search and indexing are the important factors here, but potentially also has something to say about context and the immediacy of neighborhoods.

      Personal preference may be the biggest determination.

      She focuses on where she'll search for things rather than indexing them where they start and then searching and concatenating them later (or digitally).

      She uses the "everything has it's place" idea to commonplace more traditionally (or at least in an Obsidian digital context).

      She also tangentially touches on the idea of where to place the work when taking notes. Toss it into a pile or deal with it now and the work it may take to clean up later.

      Some interesting and potentially useful idiosyncratic evidence here, but nothing new or earth shattering.

  2. Nov 2024
  3. Oct 2023
    1. Father emptied a card le for Margot and me and lled it withindex cards that are blank on one side. This is to become ourreading le, in which Margot and I are supposed to note down thebooks we’ve read, the author and the date. I’ve learned two newwords: “brothel” and “coquette.” I’ve bought a separate notebookfor new words.

      —Anne Frank (1929-1945), diary entry dated Saturday, February 27, 1943 (age 13)

      Anne Frank was given an empty card file by her father who filled it with index cards that were blank on one side. They were intended to use it as a "reading file" in which she and Margot were "supposed to note down the books we've read, the author and the date."


      In the same entry she mentioned that she'd bought a separate notebook for writing down new words she encountered. Recent words she mentions encountering were "brothel" and "coquette".

  4. Nov 2021
  5. Apr 2021
  6. Mar 2021
  7. Mar 2020
    1. As a condition of use of this site, all users must give permission for CIVIC to use its access logs to attempt to track users who are reasonably suspected of gaining, or attempting to gain, unauthorised access. All log file information collected by CIVIC is kept secure and no access to raw log files is given to any third party.