The process is increasingly divorced from real-world events. Amessage is fine-tuned and tested. Feedback signals are fed intostatistics engines. Just as big data in business can function with lowerstandards of veracity than big data in science, so can big data inpolitics.
- Sep 2025
-
Local file Local file
-
-
Perhaps we should expect to see more elections that are eitherextremely close or extremely lopsided from here on out. If opposingSiren Servers are well run, they might achieve parity, while if one isbetter than the other, its advantage ought to be dramatic. It’s too earlyto say, since big data and politics haven’t mixed long enough togenerate much data as yet. It’s like climate change was for a long time—not enough data yet to really say—though it does look like we’reseeing this pattern.
are we seeing patterns? who/what are the big influencers?
-
In our digital revolution, we might depose an old sort ofdysfunctional center of power only to erect a new one that is equallydysfunctional. The reason is that online opposition to traditional powertends to promote new Siren Servers that in the long run are unlikely tobe any better.
-
While we have yet to see how Google’s book scanning will play out, amachine-centric vision of the project might encourage software that treats books as grist for the mill,decontextualized snippets in one big database, rather than separate expressions from individual writers. Inthis approach, the contents of books would be atomized into bits of information to be aggregated, and theauthors themselves, the feeling of their voices, their differing perspectives, would be lost. Needless to say,this approach would hide its tracks so that it would be hard to send a nanopayment to an author who hadbeen aggregated.
Alternately, where is the value in a slip box?
-
But the problem with freestanding concentrations of power is that you never know who will inherit them. Ifsocial networking has the power to synchronize great crowds to dethrone a pharaoh, why might it not alsocoordinate lynchings or pogroms?
-
Siren Servers are not interchangeable. While they allshare certain traits (narcissism, hyperamplified risk aversion, andextreme information asymmetry), they also represent particular, morespecialized philosophies
-
Individual Siren Servers can die and yet the Siren Server patternperseveres, and it is that pattern that is the real problem. Thesystematic decoupling of risk from reward in the rising informationeconomy is the problem, not any particular server.
-
At least oldmedia, even in its decline and with all its problems, still offers a careerpath.
-
You are to be the neutral facilitator
-
Make Others Pay for Entropy
-
if you want to build a world-class, persistent Siren Server. In addition, you have to inject some sortof punishing network effect.
-
network effects tend to create a single Sirenic presence,a monopoly for that particular kind of data or pattern of use.
what general patterns do siren servers follow? are they all the same within some set of metrics?
-
Whenever there is a networked race to the bottom, there is a SirenServer that connects people and owns the master database aboutwho they are. If they knew each other, comprehensively, they mightorganize a union or some other form of levee.
-
This is a key sign of a Siren Server. The lowly non-Sirens are asresponsible as possible, while the Siren Server presides from an arm’slength.
-
It’s not always necessary that the data be made absolutelyunavailable; sometimes data can just be decontextualized enough tobecome less valuable. Facebook provides a fine example. If a greatdeal of personal creativity and life experience has been added to thesite, it’s hard to give all that up. Even if you capture every little thingyou had uploaded, you can’t save it in the context of interactions withother people. You have to lose a part of yourself to leave Facebookonce you become an avid user. If you leave, it will become difficult forsome people to contact you at all.
-
- Feb 2025
- Aug 2024
-
pinokio.computer pinokio.computerPinokio1
-
https://pinokio.computer/<br /> Pinokio is a browser that lets you install, run, and programmatically control ANY application, automatically.
-
- Jun 2024
-
datatracker.ietf.org datatracker.ietf.org
-
Capabilities per server: Is a given server participating in the room allowed to...
Servers should just relay messages.
-
- Jul 2021
-
proxy.webshare.io proxy.webshare.io
Tags
Annotators
URL
-
- May 2021
-
github.com github.com
-
I want to avoid nginx overhead (especially if they have tons of alias and rewrites) for in-server communication. Basically, you can have sveltekit server, backend server and nginx server, in that case, communicate inside your internal network will be very expensive like: browser->nginx server(10.0.0.1)->sveltekit server(10.0.0.3)->nginx server(10.0.0.1)->backend server(10.0.0.2) instead just: browser->nginx server(10.0.0.1)->sveltekit server(10.0.0.3)->backend server(10.0.0.2)
-
- Feb 2021
-
blog.alexgleason.me blog.alexgleason.me
-
Looks like a reasonable primer on running your own server farm at home.
-
- Oct 2020
-
github.com github.com
- Aug 2020
-
ropensci.org ropensci.org
-
‘OSF: A Project Management Service Built for Research - ROpenSci - Open Tools for Open Science’. Accessed 10 August 2020. https://ropensci.org/blog/2020/08/04/osf/.
-
- Mar 2020
-
www.iubenda.com www.iubenda.com
-
The fastest way to preventively block the scripts that require prior consent is to install a module on your own server that we have developed for Apache, IIS and NGNIX. After the initial configuration, the module will autonomously block all the resources that are subject to prior consent, on all sites on that server that are using the Cookie Solution.
-
- Feb 2020
-
blog.engrxiv.org blog.engrxiv.org
-
which they estimate to be $230,000 per year.
There is some good discussion on HN about the realistic nature of this estimated expense and how it is not likely out-of-line with what it should be and may actually be quite reasonable.
-
- Oct 2019
-
www.rubyraptor.org www.rubyraptor.org
- Nov 2018
-
www.experts-exchange.com www.experts-exchange.com
-
ALTER DATABASE SET trustworthy on
Database may have to me made trustworthy to initiate linked server connection
-
-
support.microsoft.com support.microsoft.com
-
n the Advanced Security Settings dialog box, make sure that SELF is listed under Permission entries. If SELF is not listed, click Add, and then add SELF.Under Permission entries, click SELF, and then click Edit.In the Permission Entry dialog box, click the Properties tab.On the Properties tab, click This object only in the Apply onto list, and then click to select the check boxes for the following permissions under Permissions:Read servicePrincipalNameWrite servicePrincipalName
Permissions needed for AD account to write SPN name
-
rant delegation permission to the SQL Server service account domain user account.
Computer and SQL service accounts need to be grated delegation permissions in AD users and computers
-
-
docs.microsoft.com docs.microsoft.com
-
The client and server computers must be part of the same Windows domain, or in trusted domains. A Service Principal Name (SPN) must be registered with Active Directory, which assumes the role of the Key Distribution Center in a Windows domain. The SPN, after it is registered, maps to the Windows account that started the SQL Server instance service. If the SPN registration has not been performed or fails, the Windows security layer cannot determine the account associated with the SPN, and Kerberos authentication will not be used.
2 main criteria for linked servers to pass through AD credentials
- be on the same domain
- have an SPN registered for the AD account running the SQL service
-