797 Matching Annotations
  1. May 2020
    1. Free data-driven attribution model Use Google’s advanced machine learning to more accurately distribute credit to all ad clicks that led to a conversion

      In other words, "just trust us" to magically figure it all out.

      I'd trust you more if you explained more about how do it. Maybe if I clicked "Learn more"?

    1. Given the massive amount of stars it had acquired on Github and the fairly quick and easy setup, it seemed very promising. When it comes down to its isomorphic functionality, it’s hard to match. But when it we started using the static export features, we were dropped on our faces with a very ungraceful transition from isomorphic to static that came with a cold side of faulty hot-reloading, strange routing strategies and highly bloated bundles:
    1. The "'strict-dynamic'" source expression aims to make Content Security Policy simpler to deploy for existing applications who have a high degree of confidence in the scripts they load directly, but low confidence in their ability to provide a reasonable list of resources to load up front.
    1. In natural languages, some apparent tautologies may have non-tautological meanings in practice. In English, "it is what it is" is used to mean 'there is no way of changing it'.[1] In Tamil, vantaalum varuvaan literally means 'if he comes, he will come', but really means 'he just may come'.[2]
    1. For this reason, it’s always advisable that you approach your data processing activities with the strictest applicable regulations in mind.
    1. Add-ons must be self-contained and not load remote code for execution
    2. potentially dangerous APIs may only be used in ways that are demonstrably safe, and code within add-ons that cannot be verified as behaving safely and correctly may need to be refactored
    1. Team Chat on any Webpage to Discuss Issues, Feedback: Inverse

      Am instalat extensia și mi-am făcut conturi cu dinu.laurentiu@gmail.com si laurentiu.test01@gmail.com. NU consider că extensia/aplicația este de păstrat... nu arată rău, dar nu aduce NIMIC ÎN PLUS FAȚĂ DE HYPOTHES.IS

    1. Mozilla does not permit extensions distributed through https://addons.mozilla.org/ to load external scripts. Mozilla does allow extensions to be externally distributed, but https://addons.mozilla.org/ is how most people discover extensions. The are still concerns: Google and Microsoft do not grant permission for others to distribute their "widget" scripts. Google's and Microsoft's "widget" scripts are minified. This prevents Mozilla's reviewers from being able to easily evaluate the code that is being distributed. Mozilla can reject an extension for this. Even if an extension author self-distributes, Mozilla can request the source code for the extension and halt its distribution for the same reason.

      Maybe not technically a catch-22/chicken-and-egg problem, but what is a better name for this logical/dependency problem?

    1. Invite other people to your organization Inverse is designed for everyone, but built with groups and teams in mind. Use your organization code in Settings to invite people to your organization.

      Se pot crea echipe (Organizații) care să comenteze împreună pe o anumită pagină web

    1. That app you desperately need in order to function? We probably have it. The vast software libraries of Ubuntu and Flatpak combine to make all of your tools available in a single location, called the Pop!_Shop.
  2. Apr 2020
    1. This has a usability impact. From a purely "secure all the things" standpoint, you should absolutely take the above approach but there will inevitably be organisations that are reluctant to potentially lose the registration as a result of pushing back
    2. I'm providing this data in a way that will not disadvantage those who used the passwords I'm providing.
    3. As such, they're not in clear text and whilst I appreciate that will mean some use cases aren't feasible, protecting the individuals still using these passwords is the first priority.
    1. Before embarking on the effort to scrape the web for new password breaches and compare against your entire user database you also need to consider the ROI. The beauty of the pwned passwords API and this, and other, implementations of it is that you can get a good improvement in your account security with comparatively little engineering effort.
    1. Q. I would like a copy of my data from a breach, can you please send it to me? A. No, I cannot Q. I have a breach I would like to give you in exchange for “your” breach, can you please send it to me? A. No, I cannot Q. I’m a security researcher who wants to do some analysis on the breach, can you please send it to me? A. No, I cannot Q. I’m making a searchable database of breaches; can you please send it to me? A. No, I cannot Q. I have another reason for wanting the data not already covered above, can you please send it to me? A. No, I cannot
    1. There is MiniKeePass on the iOS App Store, but I'm not sure if I trust it not to make off with my data. Also, syncing between my PC and the app would be a pain. (1Password has local WiFi sync) There is also KeeFox for Firefox integration, but I'm not sure if I trust that either. In short, I trust KeePass itself, but I'm not sure if I can trust the third-party developers of the mobile app and browser extension.
    1. The result, all too often, is that we decide (often unconsciously) that the sweeping change just isn't worth it, and leave the undesirable pattern untouched for future versions of ourselves and others to grumble about, while the pattern grows more and more endemic to the code base.
  3. Mar 2020
  4. www.graphitedocs.com www.graphitedocs.com
    1. Own Your Encryption KeysYou would never trust a company to keep a record of your password for use anytime they want. Why would you do that with your encryption keys? With Graphite, you don't have to. You own and manage your keys so only YOU can decrypt your content.
    1. Please consider that using this method means that you do not directly block the vendor scripts yourself, therefore, the success of this method depends heavily on the individual vendors’ adherence to regulation.
    1. On the 29th of May a shepherd was watching his flock on the edge of a green plateau at the foot of Retyezat, which dominates a fertile valley, thickly wooded with straight-stemmed trees, and enriched with cultivation.

      When is this?

    1. Much like the cookies you eat are an asset to humankind, HTTP cookies are an asset to the internet. They help personalize the web experience and make things like online shopping and logging into accounts so much easier and more efficient.
    1. Most companies are throwing cookie alerts at you because they figure it’s better to be safe than sorry When the GDPR came into effect, companies all over the globe — not just in Europe — scrambled to comply and started to enact privacy changes for all of their users everywhere. That included the cookie pop-ups. “Everybody just decided to be better safe than sorry and throw up a banner — with everybody acknowledging it doesn’t accomplish a whole lot,” said Joseph Jerome, former policy counsel for the Privacy & Data Project at the Center for Democracy & Technology, a privacy-focused nonprofit.
    1. There have been rumblings, for example, that Germany’s hate speech law goes too far in clamping down on free speech. MacKinnon said there is “real concern among human rights groups that this is going to lead to over-censorship” and put too much power in the decision of private employees about what to leave up and what to take down. “When in doubt, you censor it, whether or not it’s really actually illegal.
  5. Feb 2020
    1. Someone who took the afternoon off shouldn't feel like they did something wrong. You don't have to defend how you spend your day. We trust team members to do the right thing instead of having rigid rules. Do not incite competition by proclaiming how many hours you worked yesterday. If you are working too many hours talk to your manager to discuss solutions.
    2. We believe great companies sound negative because they focus on what they can improve, not on what is working. Our first question in every conversation with someone outside the company should be: what do you think we can improve?
    1. To never block or remove features from k6 in order to make them exclusive to Load Impact’s SaaS productStrive not to delay introduction of new features in the k6 OSS tool, if the feature was planned to appear both there and in Load Impact’s SaaS productTo never introduce into the k6 OSS tool any artificial limits designed to promote conversion to Load Impact’s SaaS productTo work with the community, participating in and prioritize building the functionality the k6 community wants, making it the prefered tool for load testing
    2. With k6, our goal has always been to create the best load testing tool for the modern working developer and that we do this in collaboration with the k6 community. Our revenue will not come from k6 directly, but from premium value creating offers based on k6. These offers will be made available at https://loadimpact.com. Load Impact premium offers will have focus on providing further simplicity, productivity and ease to use functionality.
    3. We believe the key to Load Impact’s long-term success as a Company is to foster an active community of users around k6 as an open source project. To achieve this long-term goal, it is vital that we do not withhold new features from k6 based on whether or not they compete with our SaaS offering.
    4. Load Impact is a for profit organization, and recognizes that there is a need to balance this requirement with the needs of the k6 open source project. In the longer run, we strongly believe that those two needs will rarely be in conflict.
    1. k6 does not run in Node.js because it would perform poorly while running larger tests.Javascript is not generally well suited for high performance. It's a Go program - to achieve maximum performance - embedding a JavaScript runtime for running tests written in JavaScript.
  6. Jan 2020
    1. prevails

      In the original German, 'prevails' is rendered "herrscht." Herrscht shares a common root with the ordinary German word Herr (Mister, or, more evocatively, Master). 'Lordship' (as, in the chapter of Hegel's Phenomenology of Spirit, on 'Lordship and Bondage' is rendered Herrschaft.)

      My own reading of Capital tends to center upon the question of domination in capitalist societies, and throughout chapter 1 (in particular, in The Fetishism of Commodities and the Secret Thereof) Marx is especially attuned to the distinguishing how the forms of domination that are prevalent in capitalist societies are distinct from the relations of "personal dependence" that characterize pre-capitalist modes of production.

      It seems prudent, therefore, to take note of the way that the seemingly innocuous notion of 'prevalence' is, for Marx, in his original formulation, already evocative of the language of mastery, domination, perhaps even something like 'hegemony'.

      Furthermore, the capitalist mode of production prevails--it predominates. Yet, as Louis Althusser observes in his discussion of the concept of the 'mode of production' in On the Reproduction of Capitalism, every concrete social formation can be classified according to the mode of production that is dominant (that prevails--herrscht). In order to dominate, something must implicitly be dominated, or subordinate. "In every social formation," Althusser writes, "there exists more than one mode of production: at least two and often many more." Althusser cites Lenin, who in his analysis of the late 19th c. Russian social formation, observes that four modes of production can be distinguished (Louis Althusser, On the Reproduction of Capitalism, Verso 2014, p. 19.)

      In our analysis of social formations, the concrete specificity of each can be articulated by carefully examining the multiplicity of modes of production that coincide within it, and examine the way in which capitalism tends to dominate a multiplicity of subordinate modes of production that, on the one hand, survive from past modes of production but which may also, on the other, be emerging in the present (i.e. communism). Thus even if capitalism tends towards the formation of a contiguous world-system dominated by its particular imperatives, this does not mean that this process is homogenous or unfolds in the same way in each instance.

      For some commentators, capitalism is defined by the prevalence of wage labor and the specific dynamics that obtain therefrom. Yet this has often led to confusion over, whether, in analyzing the North American social formation prior to 1865, in which slavery coexists with wage-labor, the mode of production based on slave-labor is pre-capitalist. Yet as we find here in ch. 1, what determines the commodity as a commodity is not that it is the product of wage labor, rather that it is produced for exchange. As Marx writes on p. 131, "He who satisfies his own need with the product of his own labor admittedly creates use-values, but not commodities. Insofar as the slave-system in North America produced commodities (cotton, tobacco, etc.) for exchange on the world market, the fact that these commodities were produced under direct conditions of domination does not have any bearing on whether or not we identify this system of production as 'capitalist'. Wage-labor is therefore not likely the determinative factor; the determinative factor is the production of commodities for exchange. It is only insofar as commodities confront one another as exchange-values that the various modes of useful labor appear as expressions of a homogenous common substance, labor in the abstract

      It is in this sense that we can observe one of the ways that the capitalist mode of production prevails over other modes of production, as it subordinates these modes of production to production for exchange, and thus the law of value, regardless of whether wage-labor represents the dominant form of this relation. Moreover, it provides a clue to how we can examine, for example, the persistence of unwaged work within the family, which has important consequences for Social Reproduction Theory.

      Nonetheless, we can say that insofar as commodities confront each other on the market in a scene of exchange that they implicitly contain some 'third thing' which enables us to compare them as bearers of a magnitude of value. This 'third thing', as Marx's demonstration shows, is 'socially necessary labour time', which anticipates the way that wage-labor will become a dominant feature of capitalist society.

    1. We tend to treat our knowledge as personal property to be protected and defended. It is an ornament that allows us to rise in the pecking order.
    1. Often questions phrased specifically for ignorance of better methods. When there isn't a substantive contextual difference (like here), optimal solutions should get at least as much profile as the question-specific ones.
    2. It is very common that the original poster ask for sed and replies using awk or perl appear. I think it is not on topic
  7. Dec 2019
    1. Superseded by (replacement project): https://github.com/QTodoTxt/QTodoTxt2/


      Before I realized there was a replacement project:

      Blah. Looks good but unmaintained. Too many competing forks.

      Other interesting fork: https://github.com/kmicc/QTodoTxt/tree/dev

      This branch is 17 commits ahead, 201 commits behind QTodoTxt:dev. https://github.com/QTodoTxt/QTodoTxt/compare/master...kmicc:dev https://github.com/kmicc/QTodoTxt/network

    1. A 2009 study of Wikipedia found that most weasel words in it could be divided into three main categories:[13] Numerically vague expressions (for example, "some people", "experts", "many", "evidence suggests") Use of the passive voice to avoid specifying an authority (for example, "it is said") Adverbs that weaken (for example, "often", "probably")
    1. An ssh public key in a ~/.ssh/authorized_keys file can have a command="" option which forces a particular command to be executed when the key is used to authenticate an ssh connection. This is a security control that mitigates against private key compromise. This is great when you only need to execute a single command. But if you need to perform multiple tasks, you would normally need to create and install a separate key pair for each command, or just not bother making use of forced commands and allow the key to be used to execute any command.
    1. TC39 urges caution when using Stage 2-or below proposals, as it might result in inadvertent pressure from the community to keep the implementation as-is instead of improving it for fear of breaking existing code or ecosystem fragmentation (e.g. using a different symbol like # instead of @ for decorators).
    2. It's completely understandable that this happens without realizing it, but continuing to do so sets different expectations for how the language progresses. It's nothing to feel guilty about — we learn as a community and remind one another of how JavaScript works.
    3. Therefore, it's easy to search around for tweets/blog posts/talks that say "ES7 Decorators" and find that it's become the accustomed name for it.
    1. If none of this worked, please comment in this issue and we’ll try to help. Try to create a small reproducing example — you might discover the problem as you’re doing it.
  8. Nov 2019
    1. TrackMeNot is user-installed and user-managed, residing wholly on users' system and functions without the need for 3rd-party servers or services. Placing users in full control is an essential feature of TrackMeNot, whose purpose is to protect against the unilateral policies set by search companies in their handling of our personal information.
    1. Threads are closed to new comments after two weeks, or if the submission has been killed by software, moderators, or user flags.
    1. The thing is that each UI decision depends on countless other UI decisions. A simple example is keybindings. On UNIX/Linux, it’s nearly impossible to pick reasonable default bindings for global desktop navigation because they all conflict with bindings that some app is using. On Windows, the desktop navigation bindings are hardcoded, and no app uses them, because apps know for sure which bindings to avoid.
  9. Oct 2019
    1. Take MongoDB for example, sure it's an awesome solution for special situations but i could never figure out why so many people were using it by default. I thought I just didn't understand something, but then it turns out that basically a lot of people were just jumping on the bandwagon and using MongoDB where a normal relation db like Postgres would be more appropriate.
  10. Sep 2019
    1. students quite often reported choosing their major based on taking introductory courses with particularly dynamic professors.
    1. Because documentation of student learning impacts may not reflect the core objectives of all CTLs — and because this investigation is resource-intensive

      Measuring impact of on student learning outcomes is resource-intensive. This makes me think of the Tracer project.

  11. Aug 2019
    1. I'm working full time on Material-UI since 2019. I was working on it during my free time before that. I hope that I can leverage my full-time involvement in the library to make it really awesome. You are right, the project is well-funded. We hope we can fund the time of more than 1 person full time in the future, with the current growth rate, it should soon be possible. We have 3 people working part-time on the project (Matt, Sebastian and Josh), plus the community behind us (+1,000 code contributors).
    1. That is approximately $10,739 per person.

      That is expensiveness for a middle class family

    2. ObamaCare, is the product of a Conservative Think-Tank. 60% of citizens get private insurance from their employers, 15% receive Medicare (65 and older), and the federal gov’t funds Medicaid for low-income families (the allocation to this fund has been declining).

      Lucky, Trump removed that

    3. Switzerland has mandatory health insurance that covers all residents.

      Almost like the U.S.

    4. France has a mandatory health insurance system that covers 75% of health care spending.

      Even France covers there people health insurance but more than Canada

    5. Canada pays for services provided by a private delivery system. The gov’t pays for 70% of the care.

      Canada pay for the most of there peoples insurance

    6. Countries that Provide Universal Healthcare 32 out of 33 developed countries in the world have universal health care.

      As far as health care the united state is the worse at it.

  12. Jul 2019
    1. Myth: Refugees are all Muslim.

      Do people actually think that? That is ridiculous and so ignorant. People shouldn't stereotype like that. Does the general public really believe that all refugees are from the middle east and are Muslim? I wonder if they know that there are thousands of Christians in the middle east."Christians now make up approximately 5% of the Middle Eastern population, down from 20% in the early 20th century" That's part of the problem. It's a war on freedom. Religious freedom, basic human rights, and personal desires. Sheesh!

  13. Jun 2019
    1. “I felt like it wasn’t taken care of and it didn’t feel any safer to me and it didn’t feel any safer to (my son),”

      In most cases, many parents in this situation can understand all too well with the safety of their child. According to the school, the case is resolved with a slap on the wrist for the offender. Amy and her son still feels unsafe. Jacob would have to go to school everyday with fear waiting for the next bad thing to happen. Aside from that, parents must also fear the risk of suicide and the mental well being of their child? The result of a case being "resolved."

  14. May 2019
    1. Field Engineer Story

      First field engineer in the field of telecommunications and networks:

      Telecommunication engineering has seen immense advances in the recent years and thus, the role of a field engineer has also evolved. Telecommunication engineering is among the most evolving industries in the world. It is a branch of electrical engineering and it dates back to the 18th century when there were beacons and telegraphs used for communication.

      The first field engineer in the field of telecommunications and networks was Claude Chappe, who was a French engineer. Then we have a long list of field engineers such as Thomas Edison, Carlos Slim, and many more. After the advent of computer networks and the internet in the 20th century, the role of a field engineer completely changed.

      Who created the first telecom company that offers a link between consumer and employees?

      The telecom industry is expected to expand even more in the coming years, but to date, the world's top telecommunication companies have reached a market value of over $50 billion. China Mobile Ltd., Verizon Communications Inc., and AT&T Inc. are the leaders in the world of telecommunication service providers. These companies serve as a link between the consumer and the employees, allowing them to communicate whether they're using traditional wired telephones or mobile phones.

      We created the FE On Demand Freelance Marketplace Platform to streamline engagement between field engineers and businesses looking for them.

  15. Apr 2019
    1. ​Technology is in constant motion. If we try to ignore the advances being made the world will move forward without us. Instead of trying to escape change, there needs to be an effort to incorporate technology into every aspect of our lives in the most beneficial way possible. If we look at the ways technology can improve our lives, we can see that technology specifically smartphones, have brought more benefits than harm to the academic and social aspects of teenagers lives, which is important because there is a constant pressure to move away from smart devices from older generations. The first aspect people tend to focus on is the effect that technology has on the academic life of a teen. Smartphones and other smart devices are a crucial part of interactive learning in a classroom and can be used as a tool in increasing student interest in a topic. For example, a popular interactive website, Kahoot, is used in many classrooms because it forces students to participate in the online quiz, while teachers can gauge how their students are doing in the class. Furthermore, these interactive tools are crucial for students that thrive under visual learning, since they can directly interact with the material. This can be extended to students with learning disabilities, such as Down Syndrome and Autism,​ research has shown that using specialized and interactive apps on a smart device aids learning more effectively than technology free learning. Picture Picture Another fear regarding technology is the impact it has on the social lives of young adults, but the benefits technology has brought to socializing outweighs any possible consequences. The obvious advantage smartphones have brought to social lives is the ability to easily communicate with people; with social media, texting, and calling all in one portable box there is no longer a struggle to be in contact with family and friends even if they are not in your area. Social media can also be used for much more In recent years, social media has been a key platform in spreading platforms and movements for social change. Because social media websites lower the barrier for communicating to large groups of people, it has been much easier to spread ideas of change across states, countries, or the world. For example, after Hurricane Sandy tore apart the northeastern United States, a movement called "Occupy Sandy" in which people gathered to provide relief for the areas affected was promoted and organized through social media. Other movements that have been possible because of social media include #MeToo, March for Our Lives, #BlackLivesMatter, and the 2017 Women's March. ​

    2. The music we listen to highly impacts our decision making, especially as adolescents. Adolescents are extremely impressionable, and the music they listen to has a great impact on how they decide to live their day to day lives. Popular musicians are seen as role models by the people who idolize them, and adolescents may try to represents the songs in which they favor through their actions every day.

      Recent studies have found that adolescents who listen to music that supports substance abuse and violence have a greater chance to act upon what they listen to. What young adults and teenagers listen to through music and popular media will affect their decision making process. Specifically with substance abuse, and there is a direct uptake in use of illegal substances by adolescents who listen to music that promotes such activities. This can cause a whole societal problem considering most of todays popular music among adolescents touches upon substance abuse and violence. Adolescents are extremely impressionable and the music they listen can shape how a person tries to act, or represent themselves.

  16. Mar 2019
    1. Ridesharing platforms canhave several economic benefits.7These platformsincrease the transportation options available to consumers and businessesand are therefore likely to significantly increase consumer welfare. Lyft andUbergivethe consumer multiple different types of rides to choose from.For example, riderscantypicallyrequest a normal car and ride from a partner driver, carpooling at a cheaper price,a ride in a large car,ora luxury car.8These ridesharing platforms may alsoencourage higher utilization of the existing vehicle stock. One study,performed in five cities, found that Uber drivers had higher capacity utilization rates than taxis, likely due to Uber’s more efficient ordering and pricing methods, its larger scale, as well as inefficiencies of taxi regulation (Cramer and Krueger, 2016).Some cities have allocateddedicated parking spots throughout the city to such ridesharing under the assumption that they may generate social benefits (Shaheen, 2010).

      Advantages for ride sharing platforms for the economy with case studies and primary research.

    1. Jack Phillips and ROI. This page describes the Phillips Return on Investment model. The model as presented here is an alternative to Kirkpatrick's model. There's a bulleted list of the components of the model as well as a nice graphic that briefly describes the levels. There is an explanation about how to apply the model, though I think more information would be needed for real world practice. Rating 4/5

    1. This modulefocuses on biases against social groups,which social psychologists sort intoemotional prejudices, mental stereotypes,and behavioral discrimination. Thesethree aspects of bias are related, but theyeach can occur separately from the others(Dovidio & Gaertner, 2010; Fiske, 1998). Forexample, sometimes people have anegative, emotional reaction to a socialgroup (prejudice) without knowing even themost superficial reasons to dislike them(stereotypes).

      The article talks about how prejudice, stereotypes, and discrimination has a correlation, but can happen separately. I do believe that this is true. You can be prejudice, stereotypical and discriminate towards others and not be aware. You see this happen a lot in this society. This are the people that see no wrong in there behavior and thinks society is suppose to keep accepting there behavior. Times have change from the 70's to now.

    1. E-commerce has special requirements when it comes to showing products for sale online. A uniform look and feel to the products, showing the product rather than background, product alignment, image margins and special requirements per product category characterize e-commerce.

      We have top class designers who is expert on graphics design. We provide clipping path. background remove, image retouching service. We are also expert on eCommerce photo editing.

    1. gender stereotypes, or thebeliefs and expectations people holdabout the typical characteristics, preferences,and behaviors of men and women. Aperson’s gender identity refers to theirpsychological sense of being male orfemale.

      I think in today's society a lot of people struggle with gender stereotypes and their identity. Society is set up to believe that the man is masculine and the women is feminine, and that if those traits are switched, then it's wrong. It's hard teaching a child about gender stereotypes because you don't want your child to feel as though he or she can not do certain things, but it happens which "may or may not" cause a crisis with their gender identity. You want the child to explore their options but in this case a lot of parents may not agree because they don't want to cause confusion. According to the article gender stereotypes, or the beliefs and expectations people hold about the typical characteristics, preferences,and behaviors of men and women. A person’s gender identity refers to their psychological sense of being male or female.

  17. Feb 2019
    1. Amazing Article great work go ahead yet hold up hold up pause... I have another article like this observe here

      Amazing Article great work go ahead yet hold up hold up pause... I have another article like this observe here

      Earn Robux.Today is a ROBUX earning website, where Roblox users can earn ROBUX for free!

    1. Understanding by Design

      Notes

      • -prepare you to think in the short-term and long-term teaching
      • -student comment as an entry point on where we want to end up
      • -proactive, autonomous learners
      • -a planning framework
      • -critical and creative thinking- you don't need these skills to make all A's in school
      • -pedagogical effectiveness
      • -critical thinking test- NO GAIN
      • -long-term goals and short-term plan
      • -desired and actual results
      • -strategic thinking- teachers that tell you what to do all the time- doesn't make room for student thought
      • -when we teach, we need to be more goal focused (comment)
      • backward design thinking- long term goal- what follows for assessment (not grading, assessing/ judging how we are doing against the goal, coaching) and what follows for instruction
      • What do we have to do to make our students love what we are teaching them?
      • the textbook is not the course- only used as a resource
      • given our understanding goals, which chapters should be highlighted, skimmed, skipped, re-sequenced?
      • aim for explicit understanding
      • Backward from Goals: Meaning-"I want students to leave having inferred/realized that, now and in the future..."
      • Background from Goals: Transfer - "I want students to leave able to transfer their understanding- on their own- to concrete address current and future situations
      • 3rd day of lesson- textbook is used (not on the first day)
      • the way we do math is bad- this is why people don't like math or they think that they are bad at math- backward design lesson planning expands the pool of interested parties and is differentiatable for individual students
      • it is our jobs as teachers to make the design of the lesson relatable to every student- we are given this backward design plan but we must figure out how to plan our lesson to make sure that every child is learning- DESIGN CHALLENGE
      • Intellectual engagement- finding ways to help students that are uninterested in the content to want to be engaged in the content
      • Incentivize- incentives to learning the information
  18. Jan 2019
  19. www.at-the-intersection.com www.at-the-intersection.com
    1. Same with trading view. I'm okay with not trading through there. I'd rather not trade through a third party if I can trade directly on the exchange. It just mitigates risks from a trading side.
    2. Gemini was easy when I first got into Crypto. Any cash you have in there has FDIC insurance up to 250. No other exchanges were providing that. I also noticed they were pretty selective about which currencies they put on there.
    3. Yeah, because Gemini trusted US dollar exchange. It's actually one of the only ones regulated and licensed by the state of New York, which has some of the strictest regulations in the world.
    4. I just don't like buying on there. So if I don't have to go into the application, i prefer not to. [inaudible] to Coinbase pro is also, it's poorly set up in my opinion. I don't know why i use it, but usually I'm just going in there to withdraw money.
    5. Even though they've been having some issues in the last few weeks, um, to just get it at the price that I want immediately and then, because it's connected to my api in three commas.
    6. And as far as binance goes, they just have a track record, uh, where there was some type of hack to some degree.
    7. Uh, I have a lot of exchanges, but as the market stiped down, I only use coinbase pro, bitrix, and binance, uh, mainly because of the liquidity and safety.
    8. I'm most likely just in the finance application itself to make sure things execute quickly.
    1. Modifies a list to be sorted

      ? Like modifies to be sorted, like what does that mean? Sorts it? by what criteria?

    2. Note that when two integers are divided, the result is a floating point.

      note: check up what a floating point exactly means Googled : How floating-point numbers work The idea is to compose a number of two main parts:

      A significand that contains the number’s digits. Negative significands represent negative numbers. An exponent that says where the decimal (or binary) point is placed relative to the beginning of the significand. Negative exponents represent numbers that are very small (i.e. close to zero).

  20. Nov 2018
    1. Davis and col-leagues (3) provide useful new data that enhance our un-derstanding of the effects of hospitalists on health sys-tems. In their study of a voluntary hospitalist system at alarge rural nonteaching hospital in Mississippi, theyfound that patients cared for by hospitalists had adjustedhospital stays that were 25% shorter, and costs that were12% less, than patients cared for by nonhospitalist inter-nists. For patients in the highest severity group, these sav-ings were even greater. Annualized, the authors extrapo-late that the hospitalists would have saved $2.5 millionhad they cared for all of the internists’ patients. As withprior studies that found similar reductions in resourceuse (4 –7), these substantial savings were achieved with-out diminishing quality or patient satisfaction. Nor wasthere evidence of cost shifting: hospitalists’ patients wereno less likely to be discharged to home (instead of anotherinstitution such as a skilled nursing facility) than werepatients of primary care internists. We can now state withconsiderable confidence that hospitalists markedly de-crease inpatient costs and lengths of stay with no compro-mise in quality or patient satisfaction.
  21. Oct 2018
  22. Aug 2018
  23. Jun 2018
    1. global technology firm with social and economic justice at its very core

      Social Justice Pillar.

      Global IT Solutions: Your Quality Solutions Partner.

      1. emphasis on partnership and collaboration
      2. technologies influencing client business decisions
  24. Apr 2018
    1. The fraught United States presidential election cycle of 2016 has revealed a country divided along geographical and ideological lines. It has also bolstered a narrative of haves and have-nots, pitting the so-called coastal elites against “heartland” America.

  25. Mar 2018
    1. Here in your Lordships’ House we are very fortunate to have a considerable number of noble and learned Lords who give us the benefit of their expertise. I have noticed that they often disagree, and very strongly. Therefore, surely keeping these issues in the Bill would save an awful lot of legal time and legal argument and would be better for the Government. I say that in a spirit of total helpfulness and support.
  26. Feb 2018
    1. Abhráin

      The formatting of e-books on Internet Archive does not allow hypothesis.is users to annotate the books’ text. In annotating Hyde’s Love Songs of Connacht for the EN6009 Annotate-A-Thon, I have attached annotations to the text beneath the scanned images. Extracts and corresponding page numbers are placed at the beginning of each annotation, in order to properly contextualize my responses.

  27. Nov 2017
    1. China is expected to become a bigger export market for Cambodian rice, with reports suggesting China will import 200,000 tonnes of rice per year from Cambodia, according to a May 15 report from the Foreign Agricultural Service (FAS) of the U.S. Department of Agriculture (USDA).

      China is the big market for Cambodia exports rice

    1. We need to provide useful guidance. We need to point students in those directions where we think that they can be successful, by suggesting applications they should install and use, by offering ideas of what elements to include on their sites, by providing feedback as they explore their own digital presence, but after that we need to be able to step back and get out of the way.

      Part of the reason it can be so difficult to step back is that students really expect us not to do so.

    2. how to balance supporting a system as complex as Domain of One’s Own without dictating how people use it
    3. every moment in which we walk a student through a fix is a deeply teachable moment
    1. Embracing an Entrepreneurial Culture on Campus go.nmc.org/uni(Tom Corr, University Affairs, 4 May 2016.) The Ontario Network of Entrepreneurs is gaining global recognition for its efforts to bolster students’ business skills through investing in multiple campus events and programs. For example, the success of Ontario Centres of Excellence has led to the establishment of similar innovation hubs throughout North America, the UK, Australia, and Asia.

      What’s fascinating here is that the province might be cutting a major part of the funding for the Ontario Centres of Excellence, particularly the part which has to do with Entrepreneurship Programs. (My current work is associated with Lead To Win, a Campus-Linked Accelerator out of Carleton University.)

  28. Oct 2017
    1. Trump noticeably avoided talking about gun control when he was asked about it, saying that he would speak on the matter with the police as a general assembly. In 2000, trump had different standpoint on gun control, saying that he wanted a ban on assault guns. Personally I think background checks should be placed on people with accounts of a 1 or more felonies. And that weapons with a lethality higher than a pistol's should be restricted during a person's review as a pistol is enough for self defense.

  29. Sep 2017
    1. State does have a legitimate interest when it monitors the web to secure the nation against cyber attacks and the activities of terrorists.

      Legitimate state interest

    2. Apart from national security, the state may have justifiable reasons for the collection and storage of data. In a social welfare state, the government embarks upon programmes which provide benefits to impoverished and marginalised sections of society. There is a vital state interest in ensuring that scarce public resources are not dissipated by the diversion of resources to persons whodo not qualify as recipients

      Limits on privacy, national security and public good

    3. narrow tailoring of the regulation to meet the needs of a compelling interest

      Narrow tailoring + compelling interest test

  30. Jul 2017
    1. Firefox add-on technology is modernizing

      Note: Starting in Firefox 57, which will be released in November 2017, only add-ons built with this new technology will work in Firefox. These are indicated by the “Compatible with Firefox 57+” label on addons.mozilla.org (AMO). Add-ons built with the old technology are labeled “Legacy” on the about:addons tab. If an add-on does not have the "Compatible with 57+" label, or has the "Legacy" label, the developer may be in the process of transitioning to the new technology. You may find developer contact information on the right side of the add-on listing on AMO.

  31. Jun 2017
  32. May 2017
  33. Apr 2017
    1. Ye say that the interest of the master is a sufficient protection to the slave. In the fury of man’s mad will, he will wittingly and with open eyes sell his own soul to the Devil to get his ends; and will he be more careful of his neighbor’s body?

      Having a master's favor could mean a much better life, and since Legree hated Tom it meant that he wanted to kill him even though it likened him to sin.

  34. Mar 2017
    1. not a student of science fiction, I placed a query on the CompuServe science fiction forum -- I suppose that such a query might in some modest way resemble the brother Grimm's interrogation of bearers of folktale.

      Comparison of asking listserv to informants

  35. Jan 2017
    1. Frictionial sliding refers to the movement on a preexisting surface when shear surface exceeds sliding resistance.

      Frictional force is function of normal force. Frictional force is independent of the area of contact and independent of material used- weight of the block is dependent. whys is that?

      There is roughness to every surface which anchor the surface in the asperities. ifthe block is heavier ore areas will touch and increase how anchored the object is to the surface.

      A scaled up pool ball has higher topographical area than our own planet does if pool ball was size of earth.

      Table with legs on carpet= contact points sliding along a surface

  36. Dec 2016
  37. Oct 2016
    1. review your own investment in pleasure. Itemize the things that you are attempting to acquire or secure for yourself. Look at the investment. Look at the reward. Ask yourself, "Is this reward worthy of the investment?"
    1. Earn money with your music simply selling your tracks on MIXUPLOAD Upload WAV files to participate in wordlwide music catalogue & get more opportunities

      Earn money with your music simply selling your tracks on MIXUPLOAD Upload WAV files to participate in wordlwide music catalogue & get more opportunities

    1. Which single sign-on services do you integrate with? Technically, single sign-on can work with any IDP that is SAML 2.0 compliant -- this includes services like Okta, Ping Identity, OneLogin, and Bitium.

      single sign-on

  38. Sep 2016
      1. No central marketplace for foreign exchange. Rather, currency trading is conducted electronically over-the-counter (OTC), which means that all transactions occur via computer networks between traders around the world, rather than on one centralized exchange.
      2. The market is open 24 hours a day, five and a half days a week, and currencies are traded worldwide Thus the currency is traded form MON to FRI
    1. Activities such as time spent on task and discussion board interactions are at the forefront of research.

      Really? These aren’t uncontroversial, to say the least. For instance, discussion board interactions often call for careful, mixed-method work with an eye to preventing instructor effect and confirmation bias. “Time on task” is almost a codeword for distinctions between models of learning. Research in cognitive science gives very nuanced value to “time spent on task” while the Malcolm Gladwells of the world usurp some research results. A major insight behind Competency-Based Education is that it can allow for some variance in terms of “time on task”. So it’s kind of surprising that this summary puts those two things to the fore.

  39. Aug 2016
    1. But those crying the loudest to stop the lock-out laws fail to provide an adequate alternative.

      Response piece "No Surprise The Young Don't Support Lock-Out Laws" (31 Aug 2016) at Stony Roads mentions this statement.

      There are some terrible personal opinions in this article that really push a tired and very under constructive rhetoric.

      'Those crying the loudest to stop the lock-out laws fail to provide an adequate alternative'.

      This quote alone shows a lack of research into Matt Barrie's 70 page submission, any consideration into the views of the people who went to the effort of writing 1 of the 1,856 submissions to State parliament, or simply the lack of effort to type in google, 'alternative solutions to lockout laws'.

      The reference to "Matt Barrie's 70 page submission" can be supposed as that included in the article posted by Matt Barrie on LinkedIn, "The death of Sydney's nightlife and collapse of its night time economy" (03 April 2016), submission titled "A Detailed Submission to the Callinan Inquiry on Liquor Laws". That submission/article is mainly about the circumstances under which the lock-out laws were proposed and enacted, as well as the results of those laws so far (with considerable detail on political and statistical manipulations and misrepresentations), and not so much about providing alternatives, however it does suggest that the lock-out laws themselves are far from an adequate solution.

      Note that Matt Barrie's submission was covered fairly well by the SMH in their own article, "Sydney lockout laws a dismal failure, Matt Barrie writes in 70-page submission" (04 April 2016). The article by Jennifer Duke this annotation is for is, by stark contrast, little more than anecdotal or purely "personal opinion".

      The group named Keep Sydney Open is probably representative of "those crying the loudest", having organised public rallies attended by many thousands of people (estimates of 10,000 to 15,000). The Huffington Post interviewed spokesperson, Tyson Koh, for the article "Sydney Lockout Laws Have Had A 'Massive Effect' On Community, Jobs" (13 Feb 2016):

      Koh pointed to a number of alternate strategies used in places like New York, Vancouver and Amsterdam to combat late-night violence.

      Twenty four-hour public transport, more visible policing in nightlife precincts, staggered venue closing times and introducing later dining and retail hours all had merit, he said.

      "There's a lot of things that are available to us that will improve safety and enable people to go out to all hours."

    1. Upload the files

      If you are using WampServer locally, copy the Wordpress directory to the www directory of your WampServer installation. To find out where that is, click on the WampServer icon in the system tray (notification area in Windows 7), and then click on the 'www directory' listing in the menu. Once where you know where that is, you can copy and paste it to that location. There are other options, but this is the most convenient to get up and running with WordPress quickly.

  40. Jul 2016
  41. Jun 2016
    1. his has certainly been the tendency in rhetoric and composition, whose primary debate has been between two opposing methods for simplifying the complexity of writ ing.

      On-going debate

  42. May 2016
  43. Feb 2016
    1. Educators

      Just got to think about our roles, in view of annotation. Using “curation” as a term for collecting URLs sounds like usurping the title of “curator”. But there’s something to be said about the role involved. From the whole “guide on the side” angle to the issue with finding appropriate resources based on a wealth of expertise.

  44. Jan 2016
    1. learning as a process

      learning as a process that develops the __.

      You fill in the blank with your own expertise NOT HERS or any others. If this all about power and control then the ends and means must be about that as well, even to the point of arguing individually for the idea that content is king.

  45. Nov 2015
    1. A similar project that explores the potential and limits of POD is AND's Variable Format: 'a sample book, a model, a serial system that explores the technological margins of print on demand and how reading is informed by the materiality of the book object'.

      This project has been conceived by Lynn Harris, published by AND and designed by Åbäke with Pierre Pautler:

      http://www.andpublishing.org/variable-format/and-variable-format/

  46. Oct 2015
  47. Sep 2015
    1. Download Digital Me's badge canvas

      Might be a bit difficult to do but it’d be nice to have an interactive version of the canvas, wizard-style. Going through the canvas with others does wonders to everyone’s understanding of what and why badging matters. But there’s a bit of handholding involved, in my experience.

  48. Aug 2015
  49. May 2015
    1. Peoplelokbacktotheirtimeasdualisticthinkers,andto theirfaiththatiftheyjustputenoughefortintoproblem solvingsolutionswouldalwaysapear,asagoldeneraof certainty.Anintelectualapreciationoftheimportanceof contextuality and ambiguity comes to exist alongside an emotional craving for revealed truth.

    2. However, by usinglearningcomunitiesastheforuminwhichtheycan comparetheirownjourneysascriticalyreflectivelearners, adult educators realize that what they thought were idiosyncratic incremental fluctuations in energy and comitment,privatemoralesapingdefeatssuferedin isolation,andcontext-specificbarierspreventingchange, areoftenfeaturesthatareparaleledinthelivesof coleagues.Thisknowledge,evenifitfailstograntany insightsintohowthesefelingsorbarierscanbe ameliorated,canbethediferencebetwenresolvingtowork forpurposefulchangewhenevertheoportunityarises,and falingpreytoamixtureofstoicismandcynicisminwhich staying within comfortably defined boundaries of thought and action becomes the overwhelming concern.

    1. esta ficha, pero cualquier otra parte de la página mantiene una línea de baja interacción por parte del usuario: por ejemplo, al no poder subrayar alguna de las partes del texto, la funcionalidad de hypotesys queda reducida a referirse a algún concepto en particular. Claro, ha de pensarse que el cut and paste tiene contrapeso en propiedad intelectual solo qe también merma el potencial de hipervínculos para el aprovechamiento de la información de manera académica. Unas de cal .... En este caso quedan a debate las palabras referidas a "De esta manera los indígenas protegieron a la deidad de su destrucción"

  50. Mar 2015
    1. lowRISC is producing fully open hardware systems. From the processor core to the development board, our goal is to create a completely open computing eco-system. Our open-source SoC (System-on-a-Chip) designs will be based on the 64-bit RISC-V instruction set architecture. Volume silicon manufacture is planned as is a low-cost development board. There are more details on our plans in these slides from a recent talk lowRISC is a not-for-profit organisation working closely with the University of Cambridge and the open-source community.
    1. an objective set for the Sprint that can be met through the implementation of Product Backlog. It provides guidance to the Development Team on why it is building the Increment. It is created during the Sprint Planning meeting. The Sprint Goal gives the Development Team some flexibility regarding the functionality implemented within the Sprint. The selected Product Backlog items deliver one coherent function, which can be the Sprint Goal. The Sprint Goal can be any other coherence that causes the Development Team to work together rather than on separate initiatives.

      an objective set for the Sprint that can be met through the implementation of Product Backlog. It provides guidance to the Development Team on why it is building the Increment. It is created during the Sprint Planning meeting. The Sprint Goal gives the Development Team some flexibility regarding the functionality implemented within the Sprint. The selected Product Backlog items deliver one coherent function, which can be the Sprint Goal. The Sprint Goal can be any other coherence that causes the Development Team to work together rather than on separate initiatives.

  51. Feb 2014
    1. These rights are quali- fied, however, by the application of various limitations set forth in the next several sections of the Act, §§107 through 122. Those sections, typically entitled “Limitations on exclusive rights,” include, for example, the principle of “fair use” (§107), permission for limited library archival reproduction, (§108), and the doctrine at issue here, the “first sale” doctrine (§109)
      • §107 - the principle of “fair use”
      • §108 - permission for limited library archival reproduction
      • §109 - the “first sale” doctrine
  52. Aug 2013
    1. In On War, Carl von Clausewitz argues that every battle revolves around a “central hub” of activity—a center of gravity or “heavy point” (Schwerpunkt)—that forms the nodal point of the enemy’s material military power. Info War, however, makes civil society itself the center of gravity. Info War targets not only the physical infrastructure of information (nodes, cables, links, servers, towers, routers, electricity grids)

      Test text.