465 Matching Annotations
  1. Nov 2024
    1. why I love my wife. By myself, I am the one hand clapping, an illusion of a human. I come fully into personhood only when I am completed by the presence of my mate. She is, for me, the other hand, creating the sound that is our life.

      I'm reminded of Jerry Maguire: "You complete me."

    1. will that not affect the value of the dollar he said no not as long as it is the only World Reserve currency the only currency that has demand people demand it even if they don't want to buy anything from the country which is producing it which is printing it

      for - key strategy - US foreign policy - US dollar don't devalue as long as it is the world's reserve currency - even if they don't want to buy from you - Yanis Varoufakis

    1. DNA simply does not replicate like a crystal you have to have a living organism to enable it to do so

      for - quote - DNA simply does not replicate like a crystal. You have to have a living organism to enable it to do so. - Denis Noble

  2. Oct 2024
    1. China Sea as the edge of the world and is used to imagine the margins of the world as a realm of marvels and unknown dangers.
    2. Benjamin's travelogue is a product of his imagination, influenced by biblical authority and rumors, rather than actual geographical knowledge.
    3. Jewish utopia in the Arabian Peninsula, where 300,000 Jews live in 40 cities and 200 villages, free from the rule of gentiles.
    4. universal Jewish community that despite its dispersion among various Muslim and Christian regimes still managed to preserve a strong sense of unity and cohesion

      big Jewish community is the focus of his travel, he doesnt notice other things, rest is fictious

    5. "a day's journey" to indicate close social interactions among Jewish communities,
    6. rather a way to link places along a real but somewhat abstracted route.
    7. medieval understanding of travel writing.
    8. mprecise unit of "a day's journey" and the parasang, an ancient Persian unit of measurement
    9. geography is experienced through human movement on specific routes.
    10. literary grid that allows the author to reflect on the medieval world from a Jewish perspective.
    1. 1:10:56 Your checking account is your bank's I.O.U. It is their liability that they owe you. 1:11:08 When you repay a loan, THE MONEY DISAPPEARS

    2. 1:09:52 A Bank LOAN is an interest attached to your own ability to pay back something that did not exist before you borrowed it

      1:09:59 A bank officer ACQUIRES the loan in order to charge interest on it

    3. 34:12 taxes are imposed by a government that is only payable in their currency and they make a law that puts you in jail if you do not pay their tax

    1. he English education does notencourage learners to think. They are generally told toreproduce the ideas of others, and, unless the questioncomes straight out of the Text-book, they often findthemselves quite unable to answer it.

      This statement follows the broad thesis that imitation is far easier than innovation.

  3. Sep 2024
    1. they all seem to use the "fake it till you make it" strategy (mentalism, mind over matter)<br /> but most are stuck in the "fake it" phase, because the british/US empire is too strong

    1. There are no refunds for open-source. If you go in with the attitude that you are owed something, you will be thoroughly disappointed.
    2. On behalf of all open-source developers and project maintainers, I ask you try and be polite the next time you ask for support. Try to remember that there is a real human being on the other side of the screen, and they actually want to help you.
    1. My long term vision for Falcon is to make a web application platform which trivializes server deployment. Ideally, a web application can fully describe all its components: HTTP servers, databases, periodic jobs, background jobs, remote management, etc. Currently, it is not uncommon for all these facets to be handled independently in platform specific ways. This can make it difficult to set up new instances as well as make changes to underlying infrastructure. I hope Falcon can address some of these issues in a platform agnostic way.
    1. we're not called to like everybody but we are called to love everybody i i have a a practice um and it involves taking the image of two people one whom i love deeply and who i like deeply and i take my son for instance that i love him that i feel one with him goes without saying but i also like him very much i then take a second image of someone who i dislike intensely vladimir putin

      for - BEing journey - meditate on two polar images - apply nondual love - can you recognize the sacred? - the shared being of both? - Rupert Spira

      BEing journey - meditate on two polar images - apply nondual love - can you recognize the sacred? - the shared being of both? - Rupert Spira

      adjacency - between - Rupert Spira's exercise to identify the Common Human Denominator (CHD) of the sacred in both - abused-abuser relationship - adjacency relationship - Rupert's exercise can lead to compassion if we study the abused-abuser relationship deeply and bring it to bear - The coexistence of - the feeling of anger arising from the suffering the abuser causes - the feeling of sadness arising from the suffering the abuser has suffered earlier in life - creates a mixture of feelings in the same person - Also can help to think of the mechanism by which the abused-abuser cycle continually becomes reconstructed and perpetuated in the world

      reference - untreated childhood abuse of children - they can grow up to become dictators - such as Putin, Trump and Kim Jong Un - https://hyp.is/LOhh4mqvEe-mU3_0EcDYiQ/acestoohigh.com/2022/03/02/how-vladimir-putins-childhood-is-affecting-us-all/

    1. IEP Process: Common Errors

      “fixes” to ensure you don’t make these errors

      I studied a case involving Child find, Referral & Evaluation. The details of the case are: 23 IDELR 411, 23 LRP 3306, W.B., Parent of the Minor, E.J., on her own behalf and on behalf of her son, E.J., Appellants v. Joan Matula; Mary Angela Engelhardt; Judy Beach; Catherine Brennan; Patricia Cericola; Dr. Gary Danielson; Ann Pearce; Kathleen Mahony; Carol Burns; Florence Noctor; Dr. Jeffrey Osowski; New Jersey State Board of Education; Warren County Department of Education; Mary Lou Varley; Mansfield Board of Education; State of New Jersey, Department of Education Division of Special Education; Employees of the Mansfield Township Board of Education, Appellees, 67 F.3d 484, U.S. Court of Appeals, Third Circuit, 95-5033, October 17, 1995 deals with a case related to Child Find, Referral and Evaluation related to IDEA, FAPE, Section 504, and NJ State rules implementing IDEA. This is an appeal of a lower court (Administrative Law Judge) judgment for a case filed when the parent is not satisfied with school boards processes and conclusions of her son’s Child Find, Referral and Evaluation. It is a complex case.

      In my analysis of an earlier case, I expressed my fear that as a special education teacher and a member of the IEP team of our school, I could potentially be a defendant in a similar case. Strangely this is such a case. Several teachers including 1st grade teacher Mary Angela Engelhardt and 2nd grade teacher were defendants in this case. This should serve as a warning to all the teachers that they should adhere to the IDEA. The court in its scathing indictment specifically signaled teacher Mary Angela Engelhardt and wrote:

      “This decision would not be complete without a comment on Mansfield's seemingly endless attacks on the parent, W.B. Evidently, Mansfield believes not only that W.B. is overly persistent, but also that she is trying to wear down the district to obtain services to which E.J. is not entitled. In my view, however, W.B. was essentially correct about the major points in dispute in these proceedings including evaluation, classification and placement. Nonetheless, the district has consistently denied W.B.'s reasonable, appropriate, and meritorious requests related to E.J.'s education. The basic dynamic of this entire dispute is that the district has denied W.B.'s meritorious requests and W.B. has been left with no alternative to an enormously burdensome struggle in order to obtain E.J.'s rights under IDEA. In my view, the burden placed on W.B. was unnecessary, unwarranted and largely the product of the district's unwillingness to recognize and appreciate E.J.'s neurological impairments despite ample reliable evidence thereof.”

      Another point that caught my attention is the willful dragging of their feet by the school officials and lower courts routinely (2:1) siding with the school districts. The judgment states:

      “As to classification, despite the findings of the independent evaluation, in November the CST concluded that E.J. was perceptually impaired but not neurologically impaired. The distinction is important, because the former classification would result in a lower level of IDEA services for E.J. than the latter. W.B. attempted to persuade the school to reclassify her son as neurologically impaired, and in December 1992, Mansfield cross-petitioned to have E.J. classified as perceptually impaired.”

  4. Aug 2024
    1. how do you know if, if, and when you are part of a larger cognitive system, right?

      for - question - how do you know when you are part of a larger cognitive system? - answer - adjacency - synchronicity - lower level example - two neurons talking to each other - Michael Levin - Mark Solms foundation theory of affect

      question - how do you know when you are part of a larger cognitive system? - answer - adjacency - synchronicity - lower level example - two neurons talking to each other - Michael Levin - Mark Solms foundation theory of affect

      adjacency - between - answer - synchronicity - lower level example - two neurons talking to each other - Michael Levin - Mark Solms foundational theory of affect - adjacency relationship - This is a very interesting question and Michael Levin provides a very interesting answer - First, it is very interesting that Mark Solms points out that affect is foundational to cognition - This is evident once we begin to think of the fundamental goals of any individual of any species is to optimize survival - The positive or negative affects that we feel are a feedback signal that measures how successful we are in our efforts to survive - Hence, it is more accurate to ask: - How do you know if and when you are part of a larger affective-cognitive system? - Levin illustrates the multi-level nature of simultaneous consciousness by looking at two neurons "in dialogue" with each other, and potentially speculating about a "higher level of consciousness", which is in fact, the level you and I operate at and take for granted - This speculative question is very important for it also can be generalized to the next layer up, - Do collectives of humans, each one experiencing itself a unified, cohesive inner perspective, constitute a higher level "collective consciousness"? - If we humans experience feelings and thinking whilst we have a well defined physical body, then - what does a society feel and think whilst not having such a well defined physical body?

    1. THE most frustrating part is trying to convince ppl they've been fooled, it's 99% impossible in my experience.

      blame pacifism, where all feel smart, where all consequences are postponed to "later".<br /> "all you can do is warn them. if they dont listen, move on so you can warn others."

  5. Jul 2024
  6. Apr 2024
    1. I got no actual help from my long Verizon Support chat session and I kept asking if there is a block list they use that they could check (or a whitelist I could be added to...but fat chance) my IP for, since that is clearly what the error is calling out, but they never acknowledged that particular part of my questions, just ignored it.
    1. When people ask Ruefle why she wastes time with the erasures, she has one of the greatest responses I’ve ever heard: “Because it’s fun and I love it. That’s why.”
  7. Mar 2024
    1. do you seriously think the Future Of Interaction should be a single finger?

      The next time you make breakfast, pay attention to the exquisitely intricate choreography of opening cupboards and pouring the milk — notice how your limbs move in space, how effortlessly you use your weight and balance. The only reason your mind doesn't explode every morning from the sheer awesomeness of your balletic achievement is that everyone else in the world can do this as well. With an entire body at your command

      References

      Victor, B. (2011). A brief rant on the future of interaction design. Tomado de https://worrydream.com/ABriefRantOnTheFutureOfInteractionDesign/

  8. Feb 2024
  9. Jan 2024
    1. Instance methods Instances of Models are documents. Documents have many of their own built-in instance methods. We may also define our own custom document instance methods. // define a schema const animalSchema = new Schema({ name: String, type: String }, { // Assign a function to the "methods" object of our animalSchema through schema options. // By following this approach, there is no need to create a separate TS type to define the type of the instance functions. methods: { findSimilarTypes(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); } } }); // Or, assign a function to the "methods" object of our animalSchema animalSchema.methods.findSimilarTypes = function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); }; Now all of our animal instances have a findSimilarTypes method available to them. const Animal = mongoose.model('Animal', animalSchema); const dog = new Animal({ type: 'dog' }); dog.findSimilarTypes((err, dogs) => { console.log(dogs); // woof }); Overwriting a default mongoose document method may lead to unpredictable results. See this for more details. The example above uses the Schema.methods object directly to save an instance method. You can also use the Schema.method() helper as described here. Do not declare methods using ES6 arrow functions (=>). Arrow functions explicitly prevent binding this, so your method will not have access to the document and the above examples will not work.

      Certainly! Let's break down the provided code snippets:

      1. What is it and why is it used?

      In Mongoose, a schema is a blueprint for defining the structure of documents within a collection. When you define a schema, you can also attach methods to it. These methods become instance methods, meaning they are available on the individual documents (instances) created from that schema.

      Instance methods are useful for encapsulating functionality related to a specific document or model instance. They allow you to define custom behavior that can be executed on a specific document. In the given example, the findSimilarTypes method is added to instances of the Animal model, making it easy to find other animals of the same type.

      2. Syntax:

      Using methods object directly in the schema options:

      javascript const animalSchema = new Schema( { name: String, type: String }, { methods: { findSimilarTypes(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); } } } );

      Using methods object directly in the schema:

      javascript animalSchema.methods.findSimilarTypes = function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); };

      Using Schema.method() helper:

      javascript animalSchema.method('findSimilarTypes', function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); });

      3. Explanation in Simple Words with Examples:

      Why it's Used:

      Imagine you have a collection of animals in your database, and you want to find other animals of the same type. Instead of writing the same logic repeatedly, you can define a method that can be called on each animal instance to find similar types. This helps in keeping your code DRY (Don't Repeat Yourself) and makes it easier to maintain.

      Example:

      ```javascript const mongoose = require('mongoose'); const { Schema } = mongoose;

      // Define a schema with a custom instance method const animalSchema = new Schema({ name: String, type: String });

      // Add a custom instance method to find similar types animalSchema.methods.findSimilarTypes = function(cb) { return mongoose.model('Animal').find({ type: this.type }, cb); };

      // Create the Animal model using the schema const Animal = mongoose.model('Animal', animalSchema);

      // Create an instance of Animal const dog = new Animal({ type: 'dog', name: 'Buddy' });

      // Use the custom method to find similar types dog.findSimilarTypes((err, similarAnimals) => { console.log(similarAnimals); }); ```

      In this example, findSimilarTypes is a custom instance method added to the Animal schema. When you create an instance of the Animal model (e.g., a dog), you can then call findSimilarTypes on that instance to find other animals with the same type. The method uses the this.type property, which refers to the type of the current animal instance. This allows you to easily reuse the logic for finding similar types across different instances of the Animal model.

      Certainly! Let's go through each part and explain it in simple terms: ### 1. `this` in Mongoose: - **What is `this`?** In JavaScript, `this` refers to the current context or object. In Mongoose, particularly within methods and middleware functions, `this` represents the instance (document) the function is currently operating on. - **Why is it used?** `this` is used to access and modify the properties of the current document. For example, in a Mongoose method, `this` allows you to refer to the fields of the specific document the method is called on. ### 2. Example: Let's use the `userSchema.pre("save", ...)`, which is a Mongoose middleware, as an example: ```javascript userSchema.pre("save", async function (next) { if (!this.isModified("password")) { next(); } else { this.password = await bcrypt.hash(this.password, 10); next(); } }); ``` - **Explanation in Simple Words:** - Imagine you have a system where users can sign up and set their password. - Before saving a new user to the database, you want to ensure that the password is securely encrypted (hashed) using a library like `bcrypt`. - The `userSchema.pre("save", ...)` is a special function that runs automatically before saving a user to the database. - In this function: - `this.isModified("password")`: Checks if the password field of the current user has been changed. - If the password is not modified, it means the user is not updating their password, so it just moves on to the next operation (saving the user). - If the password is modified, it means a new password is set or the existing one is changed. In this case, it uses `bcrypt.hash` to encrypt (hash) the password before saving it to the database. - The use of `this` here is crucial because it allows you to refer to the specific user document that's being saved. It ensures that the correct password is hashed for the current user being processed. In summary, `this` in Mongoose is a way to refer to the current document or instance, and it's commonly used to access and modify the properties of that document, especially in middleware functions like the one demonstrated here for password encryption before saving to the database.

    Tags

    Annotators

    URL

  10. Dec 2023
    1. the guardian says uh sapiens is extremely interesting and well expressed but it is quote overwhelmed by carelessness exaggeration 00:46:55 and sensationalism there's a kind of vandalism in Harari sweeping judgments and recklessness about causal connections uh a critical review in current affairs says uh the author is a 00:47:08 gifted Storyteller but he sacrifices science for sensationalism work riddled with errors a historian who in many ways is and here's that word quote a fraud 00:47:19 about science
      • for: question - Yuval Noah Harari - How do you address your critics?
    1. Given the security implications of getting the implementation correct, we strongly encourage you to use OAuth 2.0 libraries when interacting with Google's OAuth 2.0 endpoints. It is a best practice to use well-debugged code provided by others, and it will help you protect yourself and your users. For more information, see Client libraries.
  11. Nov 2023
  12. Oct 2023
    1. Usage seems to us peculiarly a matter of ear. Everyone has his own set of rules, his own list of horribles.
    1. when your lover or your partner says to you or maybe you say it to your partner 00:37:21 you never tell me that you love me
      • for: example, example - double bind, you never tell me that you love me

      • example: double bind

        • you never tell me that you love me
        • parent encouraging children to be independent but then asking them " don't you love me?"
        • encouraging children to speak their mind but then having standardized test scores
        • having to work to stay alive but sacrificing being with our children, aged parents or other loved ones in order to do so
        • maintaining our current precarious lives working at destructive and meaningless jobs in order to survive
      • comment

        • these examples seem to be more indicative of contradiction than multiple contexts
  13. Sep 2023
    1. If anything in this policy does not fit with your own local policy, you should not use dnswl.org for whitelisting or similar purposes.
    1. Even though I commented earlier i have to side with Chris. A ZK is best suited for argumentative and essay like work, not creative one like poetry.Maybe this is something that we need to discuss as a community as hole: it’s seems that a lot of people try to fit their needs to a system that (in my opinion) it’s neither intended or works for those kinds of projects.

      reply to Efficient_Eart_8773 at https://www.reddit.com/r/Zettelkasten/comments/16ad43u/comment/jzaas4l/?utm_source=reddit&utm_medium=web2x&context=3

      Though depending on your needs and desires, you can really do both to effectuate the outcomes you'd like to have. The secret is knowing which affordances, structures, and methods suit your desired outcomes. (Of course if you're going to dump your box out and do massive rearrangements or take large portions out and want to refile them for other needs, then you're going to have to give them numbers and do that re-filing work.)

      I've seen snippets of saved language in Thoreau's journal (commonplace) which were re-used in other parts of his journal which ultimately ended up in a published work. As he didn't seem to have a significant index, one can only guess that he used occasional browsing or random happenstance delving into it to have moved it from one place to another.

      As ever, what do you need and what will best get you there?


      Link to:<br /> What Got You Here Won't Get You There

    1. Different brain-imaging techniques provide scientists with insight into different aspects of how the human brain functions.

      The content here is scant. This is listed as a Student Outcome, so is there some additional content we need to supplement future assessment questions?

  14. Aug 2023
  15. Jun 2023
    1. Morrison Robblee, 25, a middle school teacher in Massachusetts, resigned after facing antisemitic harassment by a 12-year-old student who allegedly made made hateful drawings, including a Hitler sketch, and gave him an insulting note.Courtesy of Morrison Robble

      the handwriting says:

      Dear Mr. Robblee<br /> I personally<br /> hate you and you weird.<br /> No cap, man bun!.<br /> So I switched.<br /> Telling a teacher<br /> I don’t appreciate you : )

    1. Are protected members/fields really that bad? No. They are way, way worse. As soon as a member is more accessible than private, you are making guarantees to other classes about how that member will behave. Since a field is totally uncontrolled, putting it "out in the wild" opens your class and classes that inherit from or interact with your class to higher bug risk. There is no way to know when a field changes, no way to control who or what changes it. If now, or at some point in the future, any of your code ever depends on a field some certain value, you now have to add validity checks and fallback logic in case it's not the expected value - every place you use it. That's a huge amount of wasted effort when you could've just made it a damn property instead ;) The best way to share information with deriving classes is the read-only property: protected object MyProperty { get; } If you absolutely have to make it read/write, don't. If you really, really have to make it read-write, rethink your design. If you still need it to be read-write, apologize to your colleagues and don't do it again :) A lot of developers believe - and will tell you - that this is overly strict. And it's true that you can get by just fine without being this strict. But taking this approach will help you go from just getting by to remarkably robust software. You'll spend far less time fixing bugs.

      In other words, make the member variable itself private, but can be abstracted (and access provided) via public methods/properties

    1. I'm not saying never mark methods private. I'm saying the better rule of thumb is to "make methods protected unless there's a good reason not to".
    2. Marking methods protected by default is a mitigation for one of the major issues in modern SW development: failure of imagination.
    3. I can't count the number of times I've been wrong about whether or not there will ever be a need to override a specific method I've written.
    4. The old wisdom "mark it private unless you have a good reason not to" made sense in days when it was written, before open source dominated the developer library space and VCS/dependency mgmt. became hyper collaborative thanks to Github, Maven, etc. Back then there was also money to be made by constraining the way(s) in which a library could be utilized. I spent probably the first 8 or 9 years of my career strictly adhering to this "best practice". Today, I believe it to be bad advice. Sometimes there's a reasonable argument to mark a method private, or a class final but it's exceedingly rare, and even then it's probably not improving anything.
    1. The same day, Menashe licensed 56 pictures through iStockphoto– for about $1 each.

      This is interesting because I feel like the istockphoto company has gotten so many more contributors over the years that the rates have gone down drastically. I attached a website stating how much a person gets paid per photo on average which is a lot less than what the article is saying.

  16. May 2023
    1. ISO 8601 specifies the use of uppercase letter T to separate the date and time. PostgreSQL accepts that format on input, but on output it uses a space rather than T, as shown above. This is for readability and for consistency with RFC 3339 as well as some other database systems.
    1. Stop to think about "normal app" as like desktop app. Android isn't a desktop platform, there is no such this. A "normal" mobile app let the system control the lifecycle, not the dev. The system expect that, the users expect that. All you need to do is change your mindset and learn how to build on it. Don't try to clone a desktop app on mobile. Everything is completely different including UI/UX.

      depends on how you look at it: "normal"

  17. Apr 2023
    1. Although CAN-SPAM hasn't resulted in less spam, the law gives authorities a new tool in the fight against spam, Lochart said. "It's a good thing we have a law, so when we find some of these roaches, we can prosecute them," he said.
    2. Spammers, apparently in response to CAN-SPAM, changed tactics this year, said Andrew Lochart, director of product marketing at Postini. More spammers are using so-called zombie networks -- computers hijacked with Trojan horse programs -- to send spam, and spammers are using increasingly sophisticated directory harvest attacks to spam corporate mail servers, he sai
    3. CAN-SPAM also prohibits private citizens from suing spammers, instead allowing only state attorneys general or Internet service providers to file civil suits
    1. Commtouch found that 80 percent of spam e-mail didn't include valid return e-mail addresses and more than 40 percent contained subject lines that weren't related to the text of the e-mail.
    2. "There's been no reduction in the volume of spam," says Scott Chasin, MX Logic's chief technology officer. "In fact, the exact opposite--our spam rates are actually going up."
    3. Less than 1 percent of spam e-mail sent to U.S. inboxes this month complies with a national antispam law that went into effect January 1, according to two spam filtering vendors.
  18. Mar 2023
    1. If the ego is mentally constituted by this dualistic way of thinking, the ego should be able to die without physical death.

      -In Other Words - Die before you die -Paraphrase - If the ego is mentally constituted by this dualistic way of thinking, - the ego should be able to die without physical death. - That is precisely the claim of Buddhism: - the sense of self can disappear, - but there remains something else - that cannot die, - because it was never born. - Anatma is the "middle way" - between - the extremes of eternalism (the self survives death) and - annihilationism (the self is destroyed at death). - Buddhism resolves the problem of life-and-death - by deconstructing it. - The evaporation of it is dualistic way of thinking - reveals what is prior to it, - which has many names, - the most common being "the unborn."

    1. When you call 'foo' in Ruby, what you're actually doing is sending a message to its owner: "please call your method 'foo'". You just can't get a direct hold on functions in Ruby in the way you can in Python; they're slippery and elusive. You can only see them as though shadows on a cave wall; you can only reference them through strings/symbols that happen to be their name. Try and think of every method call 'object.foo(args)' you do in Ruby as the equivalent of this in Python: 'object.getattribute('foo')(args)'.
  19. Feb 2023
    1. Approaching this project, I felt committed to writing a story that could stand on its own; a story that achieved the same things I want ANY of my stories to achieve; a story to which the response might be not, “I see what you did there”, but: “I loved this!”

      "I see what you did there" as a genre of writing is interesting for its cleverness, but many authors will prefer readers to love their work instead of admiring their cleverness in one part.

  20. Jan 2023
    1. This seems to have an interesting relation to the tradition of wassailers and "luck visitors" traditions or The Christmas Mummers (1858). The song We Wish You a Merry Christmas (Roud Folk Song Index #230 and #9681) from the English West Country (Cornwall) was popularized by Arthur Warrell (1883-1939) in 1935. It contains lyrics "We won't go until we get some" in relation to figgy pudding and seems very similar in form to Mari Lwyd songs used to gain access to people's homes and hospitality. An 1830's version of the song had a "cellar full of beer" within the lyrics.

      I'm curious if the Roud Folk Song Index includes any Welsh songs or translations that have similar links? Perhaps other folk song indices (Child Ballads?) may provide clues as well?

    1. that's a decade off your life

      !- smoking : aging impacts - 10 years off your life

    2. how much does alcohol smoking or marijuana or psychedelics actually affect lifespan

      !- David Sinclair ; aging researcher interview - aging effects of smoking

  21. Dec 2022
    1. this has a few sections we're going to first talk about snakes and 00:12:58 elephants then about this idea of the atman it's the sanskrit name for itself the self that's the english word and the soul or suitcase we might say in christian theology then i will introduce 00:13:10 you to my favorite illusion because it's fun and it will help us to get a fix on what we're doing and then i will argue that in fact you do really think that you have a self so there is a point to all of this there 00:13:21 would be no point if we didn't think we had self there would be no point in refuting them and then we'll fight try to ask why you think you have a self so that's what we're going to do in the first part of tonight's talk

      !- who do you think you are : has sections - snakes and elephants - the atman - favorite illusion - argument: you really do think you have a self - why you think you have a self

    1. This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.
    1. Imagine what happens when subscribers change activities, interests, or focus. As a result, they may no longer be interested in the products and services you offer. The emails they receive from you are now either ‘marked as read’ in their inbox or simply ignored. They neither click the spam reporting button nor attempt to find the unsubscribe link in the text. They are no longer your customers, but you don’t know it.
  22. Nov 2022
    1. In our system, events are generated by physical hosts and follow different routes to the event storage. Therefore, the order in which they appear in the storage and become retrievable - via the events API - does not always correspond to the order in which they occur. Consequently, this system behavior makes straight forward implementation of event polling miss some events. The page of most recent events returned by the events API may not contain all the events that occurred at that time because some of them could still be on their way to the storage engine. When the events arrive and are eventually indexed, they are inserted into the already retrieved pages which could result in the event being missed if the pages are accessed too early (i.e. before all events for the page are available). To ensure that all your events are retrieved and accounted for please implement polling the following way:
    1. partnerships, networking, and revenue generation such as donations, memberships, pay what you want, and crowdfunding

      I have thought long about the same issue and beyond. The triple (wiki, Hypothesis, donations) could be a working way to search for OER, form a social group processing them, and optionally support the creators.

      I imagine that as follows: a person wants to learn about X. They can head to the wiki site about X and look into its Hypothesis annotations, where relevant OER with their preferred donation method can be linked. Also, study groups interested in the respective resource or topic can list virtual or live meetups there. The date of the meetups could be listed in a format that Hypothesis could search and display on a calendar.

      Wiki is integral as it categorizes knowledge, is comprehensive, and strives to address biases. Hypothesis stitches websites together for the benefit of the site owners and the collective wisdom that emerges from the discussions. Donations support the creators so they can dedicate their time to creating high-quality resources.

      Main inspirations:

      Deschooling Society - Learning Webs

      Building the Global Knowledge Graph

      Schoolhouse calendar

    1. Donations

      To add some other intermediary services:

      To add a service for groups:

      To add a service that enables fans to support the creators directly and anonymously via microdonations or small donations by pre-charging their Coil account to spend on content streaming or tipping the creators' wallets via a layer containing JS script following the Interledger Protocol proposed to W3C:

      If you want to know more, head to Web Monetization or Community or Explainer

      Disclaimer: I am a recipient of a grant from the Interledger Foundation, so there would be a Conflict of Interest if I edited directly. Plus, sharing on Hypothesis allows other users to chime in.

    1. Until now, we had a lot of code. Although we were using a plugin to help with boilerplate code, ready endpoints, and webpages for sign in/sign up management, a lot of adaptations were necessary. This is when Doorkeeper comes to the rescue. It is not only an OAuth 2 provider for Rails but also a full OAuth 2 suite for Ruby and related frameworks (Sinatra, Devise, MongoDB, support for JWT, and more).
    1. The answer lies in an important and helpful rule of reading that is generally overlooked.That rule is simply this: In tackling a difficult book for the firsttime, read it through without ever stopping to look up orponder the things you do not understand right away.
    1. Well, actually, some ligatures do have legacy codes, but solely for backwards compatibility with outdated encodings from the long-gone, dark ages of eight-bit computing. E.g. f_f can have the U+FB00 LATIN SMALL LIGATURE FF code point. If ‘eight-bit’ does not tell you anything, please erase everything you read within these parentheses from your memory immediately, keep calm and continue reading.
  23. Oct 2022
  24. Sep 2022
    1. Some people eventually realize that the code quality is important, but they lack of the time to do it. This is the typical situation when you work under pressure or time constrains. It is hard to explain to you boss that you need another week to prepare your code when it is “already working”. So you ship the code anyway because you can not afford to spent one week more.
    2. To see if you are writing good code, you can question yourself. how long it will take to fully transfer this project to another person? If the answer is uff, I don’t know… a few months… your code is like a magic scroll. most people can run it, but no body understand how it works. Strangely, I’ve seen several places where the IT department consist in dark wizards that craft scrolls to magically do things. The less people that understand your scroll, the more powerfully it is. Just like if life were a video game.
    3. So make sure to write your documentation, but do not explain your spells.
    4. This is so clear that you don’t even need comments to explain it.
    5. Another type of comments are the ones trying to explain a spell.
    6. Do not explain your spells, rewrite them.
    7. people usually forgets about one of the greatest advantages of Open Source. YOU can fix the issue. You can download the source code and dig deep into the code allow you to keep moving. Also, you can merge this changes back to the original repository so others doesn’t have to fix it again. win-win relationship.
    1. If anyone can completely refactor the JSON Schema description for OpenAPI v3.0 to accurately describe the schema in all its glory, without using this new keyword, then please do so, but I would kindly ask you to test the theory first.
    2. This is a distillation of the results of 230+ comments on #515, not to mention the 300+ comments spread across several other older issues that fed into that one. I know it's long. Please don't complain unless you can offer a shorter write-up. :-)
    1. Booleans and nil can be compared by identity and therefore the `be` matcher is preferable as it is a more strict test.

      a rare case of "because you can, you should"?