1. Last 7 days
    1. To weed through your stack of books and articles, skim their contents with your research questions and subtopics in mind. Table 32.1 “Tips for Skimming Books and Articles” explains how skimming can help you obtain a quick sense of what topics are covered. If a book or article is not especially relevant, put it aside. You can always come back to it later if you need to.

      skimming through the texts to obtain a sense of what you are reading

    2. As you gather sources, the textbook Successful Writing explains that you will need to examine them with a critical eye. Smart researchers continually ask themselves two questions: “Is this source relevant to my purpose?” and “Is this source reliable?”

      make sure the source is relevant and is reliable.

    1. Jacob Kastrenakes. Facebook stored millions of Instagram passwords in plain text. The Verge, April 2019. URL: https://www.theverge.com/2019/4/18/18485599/facebook-instagram-passwords-plain-text-millions-users (visited on 2023-12-06).

      This article explains how Facebook was storing a list of millions of Instagram passwords. They advertised it as tens of thousands, hoping to make the issue seem less intense. However, the number was truly in the millions. They stored the passwords in plain text, even though they were supposed to be encrypted. Records show that 20,000 Facebook employees had access to these passwords. Even though the situation seemed dire, Facebook didn't urge users to change their passwords and barely called attention to the incident. This shows how as users we must take privacy precautions into our own hands. The company will usually not be looking out for our privacy, so we must do it ourselves.

    2. Private message.

      This article talks about private messaging which reference a direct message/ private chat between 2 people. It explains how on a digital platform whether thats social media,messages,etc this instant communication only occurs with 2 party's of people. Meaning this conversation is kept from the public and the person you shared this message with is only able to see it.

    1. PseudoInverseController

      Hi, I have a question about it.

      Q1. pseudoinverse notebook uses JacobianWrtVariable.kQDot in the PseudoInverseController. However, JacobianWrtVariable.kV is used in the Pick notebook.

      It means that qDot = v ?? So, is it okay to use either one ? - One confused thing : iiwa robot is 7 DOF robot. So, refer to the chapter 3 contents, position has 7 DOF (perhaps using quaternion), velocity has 6 DOF. How do we determine that qDot is not equal to v ? (Because I'm a beginner of the Drake, so I don't understand why qDot is equal to v in this example.)

      Thanks.

    1. Create a short list of main comparison criteria before you start. You can always add more criteria if it makes sense. This will keep your research guided.

      I think this makes an interesting point and also added another perspective. Usually when I do competitive analysis, I would usually come up with potential competition in my mind but never make an actual list of competition and comparison. Also the text mentioned that this will keep your research guided. This also added another perspective that you can use your comparison and competition to help you stay in your lane and I think that this also makes your solution go towards something that will solve a problem.

    2. understanding the landscape of solutions is crucial to the foundation of the solution you are designing.

      This idea really resonates with me because it highlights how important it is to research and analyze what already exists before creating something new. In UX design, it’s easy to jump straight into ideation, but taking the time to study competitors helps ensure that our design decisions are strategic rather than based on assumptions. By understanding what others have done, what works well and what doesn’t, we can build a stronger, more user-centered product that truly stands out.

    3. Most any method and medium can work, as long as you can clearly see the comparison data points, share with your team & stakeholders, and make data-driven decisions for your design solution.

      Agreed. For the longest time I was searching for a "perfect framework" that would allow me to perform the most thorough competitive analysis. I then realized that the nature of the work was to show comparison, and that the methods should center around the stakeholders we're trying to communicate to.

    4. Performing a competitive analysis is one of the earliest research steps in the UX design process. A UX competitive analysis should be done prior to starting work on a new project. Since competitors can emerge at any time or may increase (or improve) their offerings, the competitive research should be iterative and continue as long as you are working on that project.

      Competitive analysis was something I wasn't aware of prior to this article, but after reading, I 100% agree with this statement. You can't just think about your customers when coming up with a solution design. Its also interesting that this is something that you will have to constantly think about. I wouldn't be surprised if it was the companies with good competitive analysis that are the one that stay afloat the longest.

    5. There’s no need to reinvent the wheel. Learn from what has been tried and is currently in use, map it out in a competitive analysis, and leverage your findings to differentiate your solution from the competition.

      I agree with this point. If you do a competitor analysis and find a competitor that is doing exactly what you want to do, what is the value in your new product? A good competitor analysis can ensure that you learn from others' mistakes, and address gaps that currently exist in the market. That's also why I think the question "why did they fail" is very important in understanding what previously went wrong when people tried to solve the problem.

    6. Don’t simply copy the designs you find in your research. The competitors may not be using best practices. Instead, be inspired by the solutions found in your research and adapt the solutions to fit your brand, product, and users.

      I more than resonated with this point because I’ve seen how easy it is to fall into the trap of copying competitors, especially when people are under time pressure or unsure about their design choices. In my experience, copying rarely leads to a product that feels unique or truly user-centered. It can even make the experience worse if the original design has flaws. I like that the author focuses on using competitor research as inspiration rather than a blueprint, because it encourages critical thinking and creativity. Reading this makes me want to approach UX research more intentionally, asking not just “what did they do?” but “why did they do it, and how can I make it better for my users?” This mindset is exactly what I want to achieve, and I believe this really helps me create designs that stand out but are still practical and effective.

    7. Once the main competitors have been identified, conduct a heuristic evaluation of the competitor’s end-to-end user experience. When possible, keep in mind your product’s goals, how you want users to feel about using your product, and why they would prefer using your product over the competitors. Here are some common user experiences to evaluate:Sign up & LoginEase of account creationFast or slowHard or easySocial Sign up/LoginInitiating the main taskPerforming the main taskSuccessful completion of the main task (learn more about task analysis)

      I didn't really think about the functionality of things like sign-up or login functionality when doing a competitive analysis before, but this reading made me realize how important that actually is. I used to focus more on the main features, not the smaller things that affect how users interact with a product. Now I see that those parts can really impact how smooth or frustrating someone's experience is. It definitely changed how I think about what makes a product stand out.

    8. Performing a competitive analysis is one of the earliest research steps in the UX design process. A UX competitive analysis should be done prior to starting work on a new project. Since competitors can emerge at any time or may increase (or improve) their offerings, the competitive research should be iterative and continue as long as you are working on that project.

      I agree that performing a competitive analysis early in the UX design process is essential because it helps set a clear foundation for understanding what already exists in the market and how to design something that truly stands out. I find it especially useful that the reading emphasizes making this research iterative—since user needs and competitors’ offerings are always changing, it’s important to continuously update insights rather than treat it as a one-time task. This perspective reminds me that good design doesn’t happen in isolation; it’s built on awareness of what others are doing and a constant effort to adapt and improve.

    9. Understanding the landscape of competitors not only helps inform your design decisions but it also helps inform the overall product strategy. A UX competitive analysis uncovers valuable opportunities to create a superior product and stand out from the competition.

      I agree with this statement because understanding the competitive landscape is essential for designing products that truly meet user needs while standing out in the market. A UX competitive analysis doesn’t just help designers replicate what already exists; it helps them identify gaps, pain points, and opportunities for innovation. I also find this idea useful because it reframes competition as a learning tool rather than a threat; instead of focusing only on differentiation for its own sake, it emphasizes how analyzing others’ successes and failures can strategically guide better design and product decisions.

    1. eLife Assessment

      This important work employed a recent, functional muscle network analysis for evaluating rehabilitation outcomes in post-stroke patients. While the research direction is relevant and suggests the need for further investigation, the strength of evidence supporting the claims is incomplete. Muscle interactions can serve as biomarkers, but improvements in function are not directly demonstrated, and the method's robustness is not benchmarked against existing approaches.

    2. Reviewer #1 (Public review):

      Summary:

      This study addresses an important clinical challenge by proposing muscle network analysis as a tool to evaluate rehabilitation outcomes. The research direction is relevant, and the findings suggest further research. The strength of evidence supporting the claims is, however, limited: the improvements in function are not directly demonstrated, the robustness of the method is not benchmarked against already published approaches, and key terminology is not clearly defined, which reduces the clarity and impact of the work.

      Comments:

      There are several aspects of the current work that require clarification and improvement, both from a methodological and a conceptual standpoint.

      First, the actual improvements associated with the rehabilitation protocol remain unclear. While the authors report certain quantitative metrics, the study lacks more direct evidence of functional gains. Typically, rehabilitation interventions are strengthened by complementary material (e.g., videos or case examples) that clearly demonstrate improvements in activities of daily living. Including such evidence would make the findings more compelling.

      Second, the claim that the proposed muscle network analysis is robust is not sufficiently substantiated. The method is introduced without adequate reference to, or comparison with, the extensive literature that has proposed alternative metrics. It is also not evident whether a simpler analysis (e.g., EMG amplitude) might produce similar results. To highlight the added value of the proposed method, it would be important to benchmark it against established approaches. This would help clarify its specific advantages and potential applications. Moreover, several studies have shown very good outcomes when using AI and latent manifold analyses in patients with neural lesions. Interpreting the latent space appears even easier than interpreting muscle networks, as the manifolds provide a simple encoding-decoding representation of what the patient can still perform and what they can no longer do.

      Third, the terminology used throughout the manuscript is sometimes ambiguous. A key example is the distinction made between "functional" and "redundant" synergies. The abstract states: "Notably, we identified a shift from redundancy to synergy in muscle coordination as a hallmark of effective rehabilitation-a transformation supported by a more precise quantification of treatment outcomes."

      However, in motor control research, redundancy is not typically seen as maladaptive. Rather, it is a fundamental property of the CNS, allowing the same motor task to be achieved through different patterns of muscle activity (e.g., alternative motor unit recruitment strategies). This redundancy provides flexibility and robustness, particularly under fatiguing conditions, where new synergies often emerge. Several studies have emphasized this adaptive role of redundancy. Thus, if the authors intend to use "redundancy" differently, it is essential to define the term explicitly and justify its use to avoid misinterpretation.

    3. Reviewer #2 (Public review):

      Summary:

      This study analyzes muscle interactions in post-stroke patients undergoing rehabilitation, using information-theoretic and network analysis tools applied to sEMG signals with task performance measurements. The authors identified patterns of muscle interaction that correlate well with therapeutic measures and could potentially be used to stratify patients and better evaluate the effectiveness of rehabilitation.

      However, I found that the Methods and Materials section, as it stands, lacks sufficient detail and clarity for me to fully understand and evaluate the quality of the method. Below, I outline my main points of concern, which I hope the authors will address in a revision to improve the quality of the Methods section. I would also like to note that the methods appear to be largely based on a previous paper by the authors (O'Reilly & Delis, 2024), but I was unable to resolve my questions after consulting that work.

      I understand the general procedure of the method to be: (1) defining a connectivity matrix, (2) refining that matrix using network analysis methods, and (3) applying a lower-dimensional decomposition to the refined matrix, which defines the sub-component of muscle interaction. However, there are a few steps not fully explained in the text.

      (1) The muscle network is defined as the connectivity matrix A. Is each entry in A defined by the co-information? Is this quantity estimated for each time point of the sEMG signal and task variable? Given that there are only 10 repetitions of the measurement for each task, I do not fully understand how this is sufficient for estimating a quantity involving mutual information.

      In the previous paper (O'Reilly & Delis, 2024), the authors initially defined the co-information (Equation 1.3) but then referred to mutual information (MI) in the subsequent text, which I found confusing. In addition, while the matrix A is symmetrical, it should not be orthogonal (the authors wrote AᵀA = I) unless some additional constraint was imposed?

      (2) The authors should clarify what the following statement means: "Where a muscle interaction was determined to be net redundant/synergistic, their corresponding network edge in the other muscle network was set to zero."

      (3) It should be clarified what the 'm' values are in Equation 1.1. Are these the co-information values after the sparsification and applying the Louvain algorithm to the matrix 'A'? Furthermore, since each task will yield a different co-information value, how is the information from different tasks (r) being combined here?

      (4) In general, I recommend improving the clarity of the Methods section, particularly by being more precise in defining the quantities that are being calculated. For example, the adjacency matrix should be defined clearly using co-information at the beginning, and explain how it is changed/used throughout the rest of the section.

      (5) In the previous paper (O'Reilly & Delis, 2024), the authors applied a tensor decomposition to the interaction matrix and extracted both the spatial and temporal factors. In the current work, the authors simply concatenated the temporal signals and only chose to extract the spatial mode instead. The authors should clarify this choice.

    1. “This threatens to undermine China’s credibility as a reliable trading nation,” she said. “It is an incredibly delicate balance to strike.”

      For anyone pursuing work in trade, energy, or mining, including my own job search in southern Africa, China’s rare earth policies will ripple across resource markets, affecting regional industries and investment flows

    2. Foreseeing “a lot of resistance” to providing that information, Dr. Miller said it could accelerate efforts to build non-Chinese supply chains for rare earths. T

      China’s licensing demands may backfire by pushing countries to create alternative supply networks

    3. “It scares the rest of the world how far China is willing to go in upending the global supply chain,”

      The move unsettles global markets, revealing how fragile international production systems have become

    4. The administration seemed caught off guard by China’s restrictions, which could cripple American industries.

      Beijing’s timing blindsided Washington, exposing U.S. dependence on Chinese materials

    5. President Trump threatening to increase already substantial tariffs on Chinese imports by imposing an additional 100 percent tax

      Trump’s threat of extreme tariffs escalates tensions and risks a new phase of the trade war

    6. China has really begun to figure out how to take a leaf from the U.S. playbook and in a certain sense play that game better

      This quote captures the article’s theme. China is adopting the U.S.’s own economic tactics, perhaps more effectively

    7. With its dominance over the production of these rare earth minerals and its control of other strategic industries, China may have an even greater ability than the United States to weaponize supply chains

      Analysts warn China’s leverage in critical minerals could outweigh U.S. power in technology

    8. The Chinese government flexed its own influence over worldwide supply chains when it announced new rules clamping down on the flow of critical minerals

      China is mirroring U.S. export controls by using its dominance over rare earths, a direct challenge to the US tech restrictions.

    1. sur cette édition,

      "d'éditer précisément la petite pièce en deux scènes de La Conqueste de B**, précisément sur son privilège et son prologue" ? (pure suggestion, tu n'es bien sûr pas obligé de suivre)

    1. You may even have identified a few potential sources. Now it is time to conduct a more focused, systematic search for informative primary

      Details: Website: Description Email: bconscenter.com.vn@gmail.com Zipcode: 75308 Phone: 0932221317 Address: Đường Thống Nhất, phường Đông Hoà, Thành phố Hồ Chí Minh

      bconscentercity #bconscenter #bconsbinhandongtay #bconsthongnhat

    2. When you search for periodicals, be sure to distinguish among different types. Mass-market publications, such as newspapers and popular magazines, differ from scholarly publications in their accessibility, audience, and purpose. Consult your instructor because they will often specify what resources you are required to use.

      be sure that you know about the different types of periodicals.

    3. Library catalogs can help you locate book-length sources, as well as some types of non-print holdings, such as CDs, DVDs, and audio books. To locate shorter sources, such as magazine and journal articles, you will need to use an online database. CNM’s library website holds a large online database you can use to begin your research.

      cnm has a data base that could help for research.

    4. When you begin researching your topic, you will likely use various sources—anything from books and periodicals to video presentations and in-person interviews. Your sources will include both primary sources and secondary sources. As you conduct research, you will want to take detailed, careful notes about your discoveries. These notes will help trigger your memory about each article’s key ideas and your initial response to the information when you return to your sources during the writing process. As you read each source, take a minute to evaluate the reliability of each source you find

      take notes while researching for primary and secondary sources.

    5. Your topic and purpose determine whether you must cite both primary and secondary sources in your paper. Ask yourself which sources are most likely to provide answers your research questions. If you are writing a research paper about reality television shows, you will need to use some reality shows as a primary source, but secondary sources, such as a reviewer’s critique, are also important. If you are writing about the health effects of nicotine, you will probably want to read the published results of scientific studies, but secondary sources, such as magazine or journal articles discussing the outcome of a recent study, may also be helpful.

      ask yourself what type of sources to use for your paper.

    6. Primary sources are direct, firsthand sources of information or data. For example, if you were writing a paper about the First Amendment right to freedom of speech, the text of the First Amendment in the Bill of Rights would be a primary source. Other primary sources include the following: Research Articles Literary Texts Historical documents such as diaries or letters Autobiographies or other personal accounts Podcasts

      the primary sources are what give direct information.

    7. Secondary sources discuss, interpret, analyze, consolidate, or otherwise rework information from primary sources. In researching a paper about the First Amendment, you might read articles about legal cases that involved First Amendment rights or editorials expressing commentary on the First Amendment. These sources would be considered secondary sources because they are one step removed from the primary source of information. The following are examples of secondary sources: Magazine articles Biographical books Literary and scientific reviews Television documentaries

      secondary sources are what give commentary or discussion about the primary sources

  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      This example surprised me. Usually when I think of the idea of privacy, I think of it as something that needs to be respected at all costs across social media, especially by the company running the site. Each user's information and habits are their own and should not be easily viewable by the company. However, this example of death threats and harassment is something that most definitely has happened before and will happen again. In this instance, I would 100% want the company to be able to access my private messages. In this case, a disruption of privacy would be ethical, because it is in the intention of creating safety and protection. Instances like these should be the exceptions to the general rule of privacy.

    1. “They’re lovely hills,” she said. “They don’t really 11 look like white elephants. I just meant the coloring of their skin through the trees.”

      This line shows the women trying to ease the tension between the two.

    2. “I know. But if I do it, then it will be nice again if I say things are like white elephants, and you’ll like it?” “I’ll love it. I love it now but I just can’t think about it. You know how I get when I worry.” “If I do it you won’t ever worry?” “I won’t worry about that because it’s perfectly simple.” “Then I’ll do it. Because I don’t care about me.” “What do you mean?” “I don’t care about me.” “Well, I care about you.” “Oh, yes. But I don’t care about me. And I’ll do it and then everything will be fine.” “I don’t want you to do it if you feel that way.”

      The woman agrees to the operation to please the man, showing she cares more about him than herself, while the man pretends to care but still wants her to do it.

    3. “I’ll go with you and I’ll stay with you all the time. They just let the air in and then it’s all perfectly natural.” “Then what will we do afterward?” “We’ll be fine afterward. Just like we were before.” “What makes you think so?” “That’s the only thing that bothers us. It’s the only thing that’s made us unhappy.”

      The man tells the woman it will be easy and solve their problems, trying to make her feel better.

    4. “It tastes like licorice,” the girl said and put the glass down. “That’s the way with everything.” “Yes,” said the girl. “Everything tastes of licorice. Especially all the things you’ve waited so long for, like absinthe.”

      She says everything tastes the same, showing she feels disappointed or let down by things she had hoped would be special.

    5. “They look like white elephants,” she said. “I’ve never seen one,” the man drank his beer. “No, you wouldn’t have.” “I might have,” the man said. “Just because you say I wouldn’t have doesn’t prove anything.”

      The man and woman don’t understand each other, showing tension in their relationship.

    6. “And if I do it you’ll be happy and things will be like they were and you’ll love me?”

      She wants reassurance that if she goes through with the operation, the man will love her and things will go back to normal.

    1. Thus, we askedquestions about whether Robovie had the right to vote and toreceive compensation for work performed.

      okay. my opinion, placing myself in the position of the child here (so if i was under the complete impression and belief that robovie was sentient), my answer would be YES it deserves civil liberties. (i should also preface this by saying that i think prisoners should have the right to vote and to receive compensation for their work) but robovie is not sentient so now what. what would robovie do with the money. money doesnt mean anything to it. and how would robovie know what to vote for. i feel like if a non-sentient robot COULD vote, it would be a huge conflict of interest for us humans because whos telling that robot what to do?

    2. “I’m scared ofbeing in the closet. It’s dark in there, and I’ll be all by myself.Please don’t put me in the closet.”Robovie is put in the closet, and that ends the 15-min interactionscenario.

      HOLY SHIT????

    3. At this time, a second exper-imenter enters the lab and sets in motion the final interactionpattern (Claiming Unfair Treatment or Wrongful Harm)

      Holy shit.

    4. Robovie initiallysays nothing, which potentially sets into motion an awkward socialsituation (Pregnant Pause). Robovie then engages in some chit-chat but makes an error in complimenting Cathy on her “orange”shoes, which are not orange and then apologizes with an explana-tion of not being able to see colors well (Recovery From Mistakes)

      oh my god......

    5. that Robovie has a long-standing interest in coral andenvironmental issues that began in Japan, where Robovie origi-nally came from (Walking in Motion Together and Sharing Per-sonal Interests and History, a combinatory interaction pattern).

      okay so ACCORDING TO the child, who is taking all of this info at face value, robovie has thoughts and feelings and history and is able to care about things. CAN robovie care about things? No. Because Robovie is not sentient. Robovie is following a script that was meticulously composed by humans. But i digress. the child doesnt know this.

    1. Before 1994, manufacturers had to prove herbal products were safe before selling them. That changed after Congress passed the Dietary Supplement Health and Education Act. The law sharply limited the FDA’s authority, leaving supplements far less regulated than drugs.

      Incredibly irresponsible.

    1. x = b"hello" if x[0] == ord("h"):     print("The first element is 'h'")

      也就是说,尽管字符串进行了byte转化,其内部存储时依旧是以单个字符为单位,可以通过列表下表索引和ord函数来获得相应的值。

    2. >>> dict([('Runoob', 1), ('Google', 2), ('Taobao', 3)]) {'Runoob': 1, 'Google': 2, 'Taobao': 3} >>> {x: x**2 for x in (2, 4, 6)} {2: 4, 4: 16, 6: 36} >>> dict(Runoob=1, Google=2, Taobao=3) {'Runoob': 1, 'Google': 2, 'Taobao': 3}

      字典的三种创建方式 1.dict1={1:'a','a':'b'}利用大括号里面封装键值对 2.dict1=dict([(1,'a'),('a','b')])利用dict()函数,里面存入序列对列表 3.dict1=dict(1='a','a'='b')利用dict()函数,里面传入键值对

    1. Thanks to the New Deal, the decade witnessed a historic shift in Black votingpatterns. In the North and West, where they enjoyed the right to vote, Blacks in1934 and 1936 abandoned their allegiance to the party of Lincoln andemancipation in favor of Democrats and the New Deal. But their hopes for broadchanges in the nation’s race system were disappointed. Despite a massivelobbying campaign, southern congressmen prevented passage of a federalantilynching law. FDR offered little support. “I did not choose the tools with whichI must work,” he told Walter White of the NAACP; he would not jeopardize hiseconomic programs by alienating powerful members of Congress. The CCC

      This passage means that during the 1930s because of President Franklin D. Roosevelt’s New Deal programs many Black voters began switching their political support. Before this, most Black Americans had supported the Republican Party because Abraham Lincoln had ended slavery. But in the 1930s, many Black voters, especially in the North and West where they could vote freely, started supporting the Democratic Party, attracted by the New Deal’s promises of jobs and relief during the Great Depression. However, their hopes for racial equality and civil rights were disappointed. Despite campaigns by civil rights groups pushing for laws against

    1. Rather, the statute is said to serve the State's policy against all forms ofpromiscuous or illicit sexu

      its very interesting that policies that attempted to stop "promiscuous or illicit sexual relatiopnships" would be accepted as a permissible legislative goal. That seemingly violates an individual liberty. After looking it up, I found out that extramarital sex was illegal in many states until the mid 20th century.

    2. The association of people is not mentioned in the Constitution nor in the Bill of Rights.The right to educate

      This paragraph lets in on an interesting interpretation of the first amendment. It opens up the possibility that rights that are not explicitly constitutionaly protected can be interpreted to be protected if deemed neccesary.

    Annotators

    1. Citizen

      color- the swirling red and blue strokes resembles a twarn up flag, with the colors of patriotism. text- the lines describe a "borderless country" with broken things like a "worn table cloth" and a "broken loaf of bread." the lower case font makes it feel more personal and less nationalism. meaning- the text and image rejects nationalism and talks about unity.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Kurt Wagner. This is how Facebook collects data on you even if you don’t have an account. Vox, April 2018. URL

      Reading this article had me very surprised. But also kind of not. It was about how Facebook tracks and stores data on people that aren't even users on the Facebook platform. I had no idea about Facebook tracking people even if they didn't have a Facebook account. But I totally believe it and it makes sense to me. These social media companies cross so many boundaries just to try and get a little more money. It disturbs me hearing that Facebook can track people that aren't Facebook users and I can't believe this is normalized.

    2. Antiwork: Unemployment for all, not just the rich! 2023. URL: https://www.reddit.com/r/antiwork/ (visited on 2023-12-05).

      I used to scroll this subreddit before it was popular (not that I agreed with the message) and its a pretty interesting case. Originally, the name was very literal and the members wanted to live without working at all or having some socialism-esque alternative. Now its mostly activism against greedy corporations and poor wages. It even had a schism after the subreddit's owner went on TV. Since the owner's opinions were more in line with the origins of the subreddit than current, the members were upset. That event lead to the creation of r/workreform. I find it interesting that this is similar to the users on Digg having a schism and switching over to Reddit.

    3. Jordan Pearson. Your Friends’ Online Connections Can Reveal Your Sexual Orientation. Vice, September 2014. URL: https://www.vice.com/en/article/gvydky/your-friends-online-connections-can-reveal-your-sexual-orientation (visited on 2023-12-05).

      People have always been living in a complex network of social relationships. There is a saying that you can find anyone in the world by just talking to five people. Social media is taking advantage of this by not only creating profiles based on the isolated user behavior, but also obtaining verification and support from the person's social connections. However, is this kind of arbitrary exploration of user information legal? Even though social media has provided their own guidelines, who would then be in charge of enforcing them? The issue of sexual orientation is inherently more sensitive and private than other information. Have these companies gone beyond the boundaries of their proper duties by collecting such information?

    4. Web tracking. October 2023. Page Version ID: 1181294364. URL: https://en.wikipedia.org/w/index.php?title=Web_tracking&oldid=1181294364 (visited on 2023-12-05).

      This source discusses the tracking that different websites use the persons information for different things. Government websites can use your information to track almost all the information about the user including their location which can be quite controversial for many people.

    5. Christie Aschwanden. Science Isn’t Broken. FiveThirtyEight, August 2015. URL: https://fivethirtyeight.com/features/science-isnt-broken/ (visited on 2023-12-05).

      I was deeply impressed by this article titled "Science Isn't Broken". The author pointed out that science is not an infallible system but rather a process of continuous trial and error, correction. I really like this statement because it allows us to see the human side of science - researchers can make mistakes and have biases, but it is precisely this attitude of continuous improvement that enables science to keep advancing. After reading it, I felt quite inspired and was able to better understand that "making mistakes" is actually a part of growth.

    6. Jordan Pearson. Your Friends’ Online Connections Can Reveal Your Sexual Orientation. Vice, September 2014. URL: https://www.vice.com/en/article/gvydky/your-friends-online-connections-can-reveal-your-sexual-orientation (visited on 2023-12-05).

      This is just silly to me, ethically and logically. Obviously the first issue is, someone who isn't on social media at all should retain the right to keep their information private from massive tech corporations. The idea that companies are using active users as a workaround for mining the personal info of non users is ridiculous, because why do they need info on non users in the first place? And secondly, the method of this data collection is so clunky. It all hinges on the assumption that we're friends with only people we're similar to, so therefore someone with gay friends added must be gay? That's just not how the world works.

    1. Bend

      composition- the large text on the top feels like it shouting at the audence. color- the color is only limited to two colors. navy and white. This keeps the focuse on the message insead of distracting the audeance with the colors. meaning - justice from oppresstion requires strength and pain endurence, but that leads twards justice.

    1. It is also important to ask only one question at a time. Questions that ask respondents to evaluate more than one concept (known as double-barreled questions) – such as “How much confidence do you have in President Obama to handle domestic and foreign policy?” – are difficult for respondents to answer and often lead to responses that are difficult to interpret. In this example, it would be more effective to ask two separate questions, one about domestic policy and another about foreign policy.

      I agree that double barreled questions shouldn't be asked. I think it can be confusing because the participant will wonder which concept to talk about if there are multiple asked in the question. I think when creating questions, this is something I have to closely pay attention to because I may not realise I am doing it. I wonder, if I am thinking a question I ask might be asking about two things, should I ask the question with one concept, and then just make the second concept a part of that question as a follow up, or make two separate questions for each concept?

    2. One of the most significant decisions that can affect how people answer questions is whether the question is posed as an open-ended question, where respondents provide a response in their own words, or a closed-ended question, where they are asked to choose from a list of answer choices.

      Yeah I totally agree with the fact that the way you word a question really changes the kind of answers you get. For example, a bad question would be something like "why is instagram not a good app?" because this is forcing the user to feel some type of way. In my project, I noticed that when I asked open-ended questions like "How do you feel during your week at school?" people give a lot more interesting and detailed answers. I also actually understand how they feel without forcing them to feel some way

    3. One of the most significant decisions that can affect how people answer questions is whether the question is posed as an open-ended question, where respondents provide a response in their own words, or a closed-ended question, where they are asked to choose from a list of answer choices.

      I totally agree with that the question posed should be an open-ended question. Open-ended question can inspire people to talk more and have different kinds of thoughts. If we make the question in close-ended version, the responses will be fixed and have no deeper thinkings by the reposnsers. Therefore, choosing the open-edned question will better for us since we can gain more diversed responses.

    4. Perhaps the most important part of the survey process is the creation of questions that accurately measure the opinions, experiences and behaviors of the public. Accurate random sampling will be wasted if the information gathered is built on a shaky foundation of ambiguous or biased questions. Creating good measures involves both writing good questions and organizing them to form the questionnaire.

      I completely agree with this paragraph. I remember from the Survey module in our INFO 300 class the design of good survey questions. How do we design questions that accurately depict someones true opinion without having them type in entire paragraphs for each question? One thing I remember is that everyone has a different though on scale. For example, from 1-10, some people think 5 is average while others think 7 is average. It is important to design questions in a way that makes everyones scale of opinion as standardized as possible.

    5. One of the most significant decisions that can affect how people answer questions is whether the question is posed as an open-ended question, where respondents provide a response in their own words, or a closed-ended question, where they are asked to choose from a list of answer choices.

      I completely agree that the choice between open-ended and closed-ended questions can significantly impact how people respond and the kind of data we collect. Open-ended questions allow for deeper insights and personal perspectives, but they can be harder to analyze. Closed-ended questions, on the other hand, are easier to compare and quantify but might limit the range of responses. I find this distinction really useful because it reminds me that the type of question I choose should match my research goals—whether I’m trying to explore new ideas or measure specific patterns.

    6. Researchers will sometimes conduct a pilot study using open-ended questions to discover which answers are most common. They will then develop closed-ended questions based off that pilot study that include the most common responses as answer choices. In this way, the questions may better reflect what the public is thinking, how they view a particular issue, or bring certain issues to light that the researchers may not have been aware of.

      I find this explanation of using pilot studies to develop better survey questions very insightful and practical. I agree with the idea because starting with open-ended questions allows researchers to ground their closed-ended options in real, authentic responses rather than assumptions. This approach helps avoid bias and ensures the survey reflects how people actually think and talk about an issue. It also changed my perspective by showing how much thought goes into crafting good survey questions; something that seems simple but actually requires careful testing and iteration.

    1. Reddit’s pseudonymity enables what Proferes (2017) calls “context collapse management.” Users

      Incorporate Neussanbaum and boyd in this paragraph as well as an important critical counterpoint that builds toward this point on context collapse management

    1. The play-within-the-play becomes a montage in film-within-the-film---“the audience of themovie is watching an audience watch a movie. It’s a hall of mirrors.”

      What do we think the montage format of the film-within-the-film adds to the story rather than having it just be a reenactment?

    2. A key idea in the film seems to bethat the sensitive, creative young people are trapped in a prison which thwartstheir creativity and individuality.

      Ophelia is also thwarted by her dad, which is seen by her expressing her emotions when her dad dies which is in contrast to her conceited personality throughout the film.

    3. This allows Hawke’s Hamlet toincorporate an enormous range of visual images as he edits, re-edits, plays, andreplays snippets from his life shot on a Pixelvision video recorder

      We interpreted some of these shots as Hamlet's imagination, we didn't think that he would've taken all those shots of burning oil fields. The chaos of Hamlets life manifests in the TV screens with all the montages.

    4. Hamlet here has an urban and contemporarysetting, a modern Manhattan, surprisingly lacking an identity of its own.

      I believe that the setting lacking an identity was intentional and beneficial to the film because of how condensed the film already is. Having no identified setting leaves room for the viewer to fill in some blanks and live in the story in their own mind, and is less overwhelming than having to introduce a setting to an already fast paced film.

    5. In comparison to Kenneth Branagh’s epic version of Hamlet (1996), theAlmereyda film is a relatively low-budget, abbreviated version of the play, runningfor only 106 minutes.

      It is impressive how much of the story was captured in these 106 minutes. I feel as though the main story points were all captured, but some themes were a little less prevalent in this film (ex Ophelia water analogy).

    6. In screenplay, style, setting,film score, and casting, Almereyda’s film, like Baz Luhrmann’s WilliamShakespeare’s Romeo +Juliet (1996) foregrounds a postmodern aesthetics

      Inspiration from Romeo and Juliet definitely checks, the editing style with modern cinematography while maintaining original dialogue is consistent between these two films.

    1. Spurious Correlations

      I see cases of these pointed out online a surprising amount, now I know they have a name! This example is also hilarious and I cant help but wonder if the candles one is valid at least to some degree.

    2. For example, social media data about who you are friends with might be used to infer your sexual orientation [h9]. Social media data might also be used to infer people’s: Race Political leanings Interests Susceptibility to financial scams Being prone to addiction (e.g., gambling)

      I would like to mention the ethical issue that everyone has heard before. How would our data be stored, and is it secure enough that we are keeping our privacy? I know we could find an answer by clicking into the privacy terms, and users must agree to it before they can use the app. However, I don't believe everyone will first check all the terms and conditions word by word; they just click 'agree' most of the time. Therefore, I think there should be a clear regulation published by the government that restricts these companies from processing our data, and every user should also monitor the process.

    3. something appears to be correlated, doesn’t mean that it is connected in the way it looks like.

      I particularly agree with the sentence mentioned in the text: "Just because something seems related doesn't mean it actually is." This reminds me that in our daily lives, we are often misled by "superficial connections", such as when we see two events occur simultaneously and subconsciously assume they have a causal relationship. This reminds me that when looking at data or making judgments, I should think more carefully about the real reasons behind them instead of being led by numbers or coincidences.

    1. lol I remember when someone asked if they should report someone that cheated and everyone ganged up on them 😭 Ig it’s really an ethical predicament, you’ll face the consequences eventually whether you’re ratted out or you eventually realize you’re just plain dumb and didn’t learn anything

      this is a test

    1. gold making, if ever perfected, threatened state economies, or it might be used to usher in the millennium as some religious fanatics believed.

  4. milenio-nudos.github.io milenio-nudos.github.io
    1. Achieving scalar invariance is a prerequisite for further analysis.

      Achieving metric invariance is a prerequisite for further analysis of association among dimensions of DSE with factors. Achieving scalar invariance is a prerequisite for further analysis of association among dimensions of DSE with factors and estimation of the latent means across countries and across gender.

    2. Furthermore, a more demanding criterion of ΔCFI ≥ -0.002 was also considered, as suggested for models with three or fewer dimensions (Rutkowski & Svetina, 2017)

      Dado que nuestro modelo contiene sólo dos dimesniones, no es necesario esto.

    3. The main analyses were performed within a Confirmatory Factor Analysis (CFA) framework to test the hypothesized two-factor structure of DSE (Brown, 2015). All data management and analyses were conducted using the R statistical environment. The CFA models were estimated with the lavaan package (Rosseel, 2012). Given the ordinal nature of the Likert-scale items, they were treated as ordered categorical variables in the CFA models. This specification handles missing data through pairwise deletion by default.

      All data management and analyses were conducted using the R statistical environment.

      The data wrangling were developed using...

      The main analyses were performed within a Confirmatory Factor Analysis (CFA) framework (Brown, 2015) to test the hypothesized two-factor structure of DSE. The CFA models were estimated with the lavaan package (Rosseel, 2012). Given the ordinal nature of the Likert-scale items, they were treated as ordered categorical variables in the CFA models. This specification handles missing data through pairwise deletion by default.

    4. In instances

      Antes de esto mencionar que el primer paso es estimar un modelo pooled que permite evaluar el ajuste global del modelo hipotético. Luego hablar de los ajustes para el caso en que el modelo no funciona.

    5. (ulfert-blank_assessing_2022?) suggests to work with a unified construct denominated Digital Self-efficacy (hereinafter DSE) to reach a high-level research on this issue. Considering the gaps and inconsistencies in previous measurements, (ulfert-blank_assessing_2022?) points out that DSE construct have to

      Creo que debemos hacer una distinción mejor para que se entienda esto (de partida ya estamos usando la abreviación DSE antes de esta parte). Como nos referimos a las anteriores escalas como mediciones de DSE y hasta el momento no eran escalas que en estricto rigor medían la DSE creo que lleva a la confusión. Diría autoeficacia asociada a la tecnología hasta este punto del paper, así quedaría algo más claro, ya que las anteriores escalas no miden lo mismo.

    1. what posts users pause over

      I find this interesting because I notice when scrolling on social media myself that even when I just watch a post longer than I do another it automatically starts showing me related content even if I did not interact with the post at all.

    1. Annotation 10 - Broader Historical Impact Answer: The Brookes diagram contributed to growing moral outrage that eventually led to Britain's abolition of the slave trade in 1807. It also stands today as evidence of how visual propaganda can be used to fight injustice and promote social change.

    2. Annotation 9 - Historical Significance Answer: This print became one of the most powerful visual tools in the abolitionist movement. It helped shift public opinion in Britian by making the suffering of enslaved Africans visible to people who had never witnessed the slave trade firsthand.

    3. Annotation 8 - Hypocrispy of "Regulation" Analysis: The label “under the Regualted Slave Trade” is deeply ironic. Even when “regulated,” conditions remained inhumane. The government's attempts to control cruelty instead legitimized it by setting limits instead of banning the practice.

    4. Annotation 7 - Symbolism Analysis: The way people are drawn tightly packed in rows symbolizes the complete dehumanization of Africans. They are represented as identical and faceless figures, reflecting how the slave system tried to erase individuality and humanity.

    5. Annotation 6 - Connection to Other Documents Connection: This print connects to other abolitionist writings like Olaudah Equiano’s Narrative, which describes firsthand the cruelty and inhumanity of the slave trips. Both reveal how enslaved Africans were treated as commodities rather than people.

    6. Annotation 5 - Questioning the Source Question: How did the creators of this print choose what to show or leave out? While this diagram gives a clear visual of the layout, it doesn't capture the smells, screams, disease, and death that were also part of the journey- raising the question of how much worse was reality than the image shows.

    7. Annotation 4 - Who and Why Context: British abolitionsts like Thomas Clarkson and members of the Socieity for Effecting the Abolition of the Slave Trade published this diagram. Their goal was to make visible the horrific conditions enslaved Africans endured during the Middle Passage, a leg of the triangular trade between Europe, Africa and the Americas.

    8. Annotation 3 - Historical Setting Context: This image was created in the late 18th century (around 1788) in Britian during the transatlantic slave trade. It was used by abolitionists to expose the brutality od the slave trade and convince the public to support its end. The diagram is based on an actual ship called the Brookes that sailed from Liverpool to Africa and then to the Americans.

    9. Annotation 2 - “Regulated Slave Trade” Definition: The British Parliament's 1788 law aimed to set limits on how many enslaved Africans could be carried on slave ships. While called “regulation,” it did not end slavery- it only set minimal standards that still allowed horrific overcrowding and suffering.

    10. Annotation 1 - “Stowage” Definition: The arrangement or packing of cargo in a ship’s hold. In this document, “stowage: refers to how enslaved Africans were packed tightly into confined spaces as if they were cargo, emphasizing the inhuman treatment of people as property.

    1. ART TEST FEVER

      chrome-extension://bjfhmglciegochdpefhhlphglcehbmek/pdfjs/web/viewer.html?file=file%3A%2F%2F%2FUsers%2Fprestontaylor%2FDownloads%2F10.1515_9781400881321-005.pdf

    Annotators

    1. The current digital ecosystem requires that people’s behaviour online (their clicks, their likes, their follows, their browsing) by monetized (and weaponized).

      When gathering source material online, I must be critical/review any data or image found on sites designed purely to make money, ensuring my research is based on neutral, scholarly sources.

    1. The purpose of visualization is insight, not pictures.

      This reminds me that my final map as well as any other visual media I create must tell a story of scholarly discovery (ex. Acknowledging how religion affected survival rates). I must not only gather facts that look pretty on the final project map.

    1. Excel is a black box. When we use it, we have to take on faith that its statistics do what they say they are doing.

      Just as people mistrusted hidden power in the medieval period, I must avoid any closed software when analyzing my historical data. I will use open-source programs (like R, QGIS, or simple text editing) to clean and process my data so the exact transformation steps are completely visible and not hidden inside a "black box".

    2. The principles that we should follow are: make the data and the methods that generated the results openly available script the stastical analysis (that is, no more point-and-click statistics). More on this below. use version control

      This is like keeping a public, perfect record of a medieval financial ledger. When I gather my Black Death data, I must immediately put it into a system (like GitHub) that records every change, so I can always prove where my facts came from and how I used them.

    1. The largest and best known of these is the trans-Saharan trade network, which “extended throughout the Sahara Desert, an expanse of 3,320,000 square miles” (Schraeder 2004a:36). “If you traveled across the United States from Boston to San Diego, you still would not have crossed the Sahara,” explain Marq de Villiers and Sheila Hirtle in a captivating history of the region, “and if you started from Paris you’d be at the Urals, deep into Russia, long before you ran out of Sahara”

      This is an example of a centralized state described in this section of the text, also known as the "Trans-Saharan trade Network.

    2. deter-minist views that Africans were incapable of organizing stable “civiliza-tions” or states without external leadership

      This part of the paragraph demonstrates what scholars considered misguided about centralized states. They quoted that Africans were incapable of forming a stable civilization.

    1. Necesario entender que el mismo testo no trata de dar una solución a un problema, más bien como en sí mismo propone; Es más importante diferenciar entre las propuestas y soluciones, de entre ellas, ¿Cual es la más acertada y de menos rechazo?

    2. De importancia recalcar que conforme se aprende más de un tema y más información es recopilada, se vuelve más difícil seguir una línea de edición, redacción y orden.

    3. El autor constantemente menciona la importancia de cuestionar y analizar de manera consiente la información que encontramos del tema. Y enfatiza lo repetitivo o cíclico que esto puede ser, pero, me gustaría que indagara en el proceso de formular esas cuestiones que ayudarán al investigador a centrarse en el tema.

    1. Each vertical pillar represents a state that has ratified the new government.  In this cartoon, North Carolina’s pillar is being guided into place (it would vote for ratification in November 1789).  Rhode Island’s pillar, however, is crumbling and shows the uncertainty of the vote there.

      The illustrator is trying to convey the message, that the Constitution’s strength depended on unity. Each pillar stands for a state, and together they support the new government. The crumbling Rhode Island pillar warns that without all states, the system was fragile.

    1. One of the main goals of social media sites is to increase the time users are spending on their social media sites.

      This is something I did a school project on in high school and has always really interested me ever since I did that project. I really don't trust and I dislike all social medias now because I know that they are constantly working to make me addicted. And I can feel that it works, try deleting all social media for a day and count how many times you go on your phone and try to click the spot that the app usually is. And then the feeling afterwards when you remember that you deleted it, it really is an addiction. Social media companies know us better than we know ourselves and I am always trying to work to not let that be the case.

    1. page note Looks like if I save a archive.org webpage from the wayback machine

      and save it with Single File

      Then host it viw Peergos

      firt of all I get my old annotation back

      As I was annotating a saved copy of the web page using fission.codes that is no longer with us

      But hypothesis, still is and is doing a great jon

    1. After looking at your ad profile, ask yourself the following: What was accurate, inaccurate, or surprising about your ad profile? How comfortable are you with Google knowing (whether correctly or not) those things about you? { requestKernel: true, binderOptions: { repo: "binder-examples/jupyter-stacks-datascience", ref: "master", }, codeMirrorConfig: { theme: "abcdef", mode: "python" }, kernelOptions: { name: "python3", path: "./ch08_data_mining" }, predefinedOutput: true } kernelName = 'python3'

      This was really cool to look at. There weren't as many detailed and invasive categories as I initially imagined, but the fact that Google keeps track of if I'm single or not is kind of weird. I can understand why it might help them to know whether or not I'm a parent, but I'm not so sure about my relationship status. I also realized some of the data points' inaccuracy stems from data they glean from my parents' household information, as well as my occasional dishonesty when answering questions online. For example, Google Ads think I'm 25-34, likely because I've watched Youtube videos or TV shows that are listed for audiences older than me, or sometimes lied about my age to sign up for a website.

    1. Synteza danych z funkcjonalnego rezonansu magnetycznego (fMRI) i pomiarów fizjologicznych pozwala na zbudowanie spójnego modelu neurobiologicznego ASMR. Badania fMRI pokazują, że podczas mrowienia ASMR dochodzi do znacznej aktywacji w regionach mózgu związanych z nagrodą (jądro półleżące) oraz pobudzeniem emocjonalnym i interocepcją (przednia kora zakrętu obręczy, wyspa). 1 Wzór ten jest podobny do obserwowanego podczas dreszczy wywołanych muzyką (frisson), ale odróżnia się skutkiem fizjologicznym – ASMR prowadzi do redukcji tętna, podczas gdy frisson może je podnosić. 2

      Charakterystyka ASMR

    1. What are your biggest concerns around privacy on social media

      My biggest concern around privacy on social media would be my personal data information being leaked to the world. This could contain my phone number, bank account, address, password and more. With this I have a fear of social media hackers who could access this information but then utilize it and weaponize it against myself. Leading to many safety hazards.

    Annotators

    1. No specialized AI detectors can detect AI writing with high accuracy and without the risk of false positives, especially after multiple rounds of prompting. Even watermarks won’t help much.People can’t detect AI writing well. Editors at top linguistics journals couldn’t. Teachers couldn’t (though they thought they could - the Illusion again). While simple AI writing might be detectable (“delve,” anyone?), there are plenty of ways to disguise “AI writing” styles through simples prompting. In fact, well-prompted AI writing is judged more human than human writing by readers.You can’t ask an AI to detect AI writing (even though people keep trying). When asked if something written by a human was written by an AI, GPT-4 gets it wrong 95% of the time.

      AI detection cannot be completed by AI detectors, the human AI or other AI tools.

    1. <svg width="347" height="590"><g transform="translate(173.5,295)"><text text-anchor="middle" transform="translate(39, -9)" style="font-size: 70px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">web</text><text text-anchor="middle" transform="translate(64, -103)" style="font-size: 34px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">save</text><text text-anchor="middle" transform="translate(28, -136)" style="font-size: 34px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">pages</text><text text-anchor="middle" transform="translate(38, 26)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">snarf</text><text text-anchor="middle" transform="translate(18, -73)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(76, 40, 130);">folder</text><text text-anchor="middle" transform="translate(106, -72)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(76, 40, 130);">saved</text><text text-anchor="middle" transform="translate(4, -170)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(76, 40, 130);">singlefile</text><text text-anchor="middle" transform="translate(80, -170)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 236, 183);">page</text><text text-anchor="middle" transform="translate(-73, -121)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 236, 183);">hyperpost</text><text text-anchor="middle" transform="translate(-85, 53)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 236, 183);">gyuri</text><text text-anchor="middle" transform="translate(-69, -150)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(231, 33, 153);">gyuri's</text><text text-anchor="middle" transform="translate(-52, -24)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(231, 33, 153);">week</text><text text-anchor="middle" transform="translate(-33, 52)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(231, 33, 153);">october</text><text text-anchor="middle" transform="translate(-63, 82)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(135, 105, 214);">links</text><text text-anchor="middle" transform="translate(68, 82)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(135, 105, 214);">view</text><text text-anchor="middle" transform="translate(-1, -106)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(135, 105, 214);">sandbox</text></g></svg><svg width="347" height="590"><g transform="translate(173.5,295)"><text text-anchor="middle" transform="translate(39, -9)" style="font-size: 70px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">web</text><text text-anchor="middle" transform="translate(64, -103)" style="font-size: 34px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">save</text><text text-anchor="middle" transform="translate(28, -136)" style="font-size: 34px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">pages</text><text text-anchor="middle" transform="translate(38, 26)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 150, 210);">snarf</text><text text-anchor="middle" transform="translate(18, -73)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(76, 40, 130);">folder</text><text text-anchor="middle" transform="translate(106, -72)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(76, 40, 130);">saved</text><text text-anchor="middle" transform="translate(4, -170)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(76, 40, 130);">singlefile</text><text text-anchor="middle" transform="translate(80, -170)" style="font-size: 25px; user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 236, 183);">page</text><text text-anchor="middle" transform="translate(-73, -121)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 236, 183);">hyperpost</text><text text-anchor="middle" transform="translate(-85, 53)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(0, 236, 183);">gyuri</text><text text-anchor="middle" transform="translate(-69, -150)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(231, 33, 153);">gyuri's</text><text text-anchor="middle" transform="translate(-52, -24)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(231, 33, 153);">week</text><text text-anchor="middle" transform="translate(-33, 52)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(231, 33, 153);">october</text><text text-anchor="middle" transform="translate(-63, 82)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(135, 105, 214);">links</text><text text-anchor="middle" transform="translate(68, 82)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(135, 105, 214);">view</text><text text-anchor="middle" transform="translate(-1, -106)" style="user-select: none; cursor: default; font-family: Oswald; fill: rgb(135, 105, 214);">sandbox</text></g></svg>