5,534 Matching Annotations
  1. Aug 2020
    1. I will have to look at code to be sure but the rule that */* trumps all is applied only when the request is not an ajax request. So if you are making ajax request then you should be good.
    2. The problem is that opting out of mime type negotiation simply because there is a catch-all in there is wrong according to the specifications of HTTP.
    1. More information about CC and open licensing

      Additional Resource: I would like to recommend adding Uploading Godzone https://www.tohatoha.org.nz/2018/11/uploading-godzone/

      A non-North American view of how community members view and use CC licenses to contribute to the Commons.

    2. Elinor Ostrom’s 8 Principles for Managing a Commons by On the Commons

      I found this article to be a succinct description of the 8 key principles for managing The Commons. It made me curious to explore more about the range of research that Elinor Ostrom undertook about the Commons. (June 2020 cohort CC Cert)

    1. Stallman has also stated that considering the practical advantages of free software is like considering the practical advantages of not being handcuffed, in that it is not necessary for an individual to consider practical reasons in order to realize that being handcuffed is undesirable in itself.
    1. Decentralized Social Networks vs. The TrollsDerek CaelinIn the summer of 2019, the alt-right social network Gab migrated to the decentralized "Fediverse" of social networks after being booted from mainstream financial services and hosting solutions. Almost immediately, Gab was met by a dedicated movement to isolate it. The movement was largely successful; within a year, the Gab CTO announced they would leave the Fediverse. This talk will cover how moderators, activists, and developers in the Fediverse used human moderators, strong moderation tools, representative codes of conduct, and no small amount of organization to promote healthy online spaces.We’ll review how some of the challenges faced by centralized platforms, which struggle with their own size and scale, have been addressed in networks of smaller, community run, more moderated servers. In the debate over how to make a healthier internet, the open platforms and open protocols in the model of the Fediverse may have some of the best resources to isolate bad actors, including Gab.
    1. It’s understandable that in order to relax, users need to know they’re not being overheard – though there is a less playful side to this. If groups are perceived as a place to say what you really think, away from the constraints of public judgement or “political correctness”, then it follows that they are also where people turn to share prejudices or more hateful expressions, that are unacceptable (or even illegal) elsewhere.

      The idea of public judgement or "political correctness" here is exactly the definition of a modern digital pale, around which technology is being used to extend people's thoughts.

    2. The ongoing rise of WhatsApp, and its challenge to both legacy institutions and open social media, poses a profound political question: how do public institutions and discussions retain legitimacy and trust once people are organised into closed and invisible communities? The risk is that a vicious circle ensues, in which private groups circulate ever more information and disinformation to discredit public officials and public information, and our alienation from democracy escalates.
    3. WhatsApp groups can not only breed suspicion among the public, but also manufacture a mood of suspicion among their own participants. As also demonstrated by closed Facebook groups, discontents – not always well-founded – accumulate in private before boiling over in public. The capacity to circulate misinformation and allegations is becoming greater than the capacity to resolve them.
    1. Then when giving answers I'm even less certain. For example I see occasional how-to questions which (IMO) are ridiculously complex in bash, awk, sed, etc. but trivial in python, (<10 lines, no non-standard libraries). On such questions I wait and see if other answers are forthcoming. But if they get no answers, I'm not sure if I should give my 10 lines of python or not.
    2. I went against the grain, applying other tools that people have written over the years to directly perform the job at hand which do not involve entering a program for awk or a shell to run, with answers like https://unix.stackexchange.com/a/574309/5132 and https://unix.stackexchange.com/a/578242/5132 . Others have done similar. https://unix.stackexchange.com/a/584274/5132 and https://unix.stackexchange.com/a/569600/5132 are (for examples) answers that show alternative tools to answers employing shell script and (yet again) awk programs, namely John A. Kunze's jot and rs (reshape), which have been around since 4.2BSD for goodness' sake!
    3. There is an observable widespread tendency to give an awk answer to almost everything, but that should not be inferred as a rule to be followed, and if there's (say) a Python answer that involves less programming then surely that is quite on point as an answer for a readership of users.
    1. Java may have been designed as a completely object oriented language, but when Java SE 8 was released in 2014, it added Lambda expressions (aka closures), which added some functional programming elements. Not every problem is best served by OOP, and by adding Lambdas, Java became more flexible. 
  2. Jul 2020
    1. Ruby has some really nice libraries for working with linked data. These libraries allow you to work with the data in both a graph and resource-oriented fashion, allowing a developer to use the techniques that best suit his or her use cases and skills.
    1. "that text has been removed from the official version on the Apache site." This itself is also not good. If you post "official" records but then quietly edit them over time, I have no choice but to assume bad faith in all the records I'm shown by you. Why should I believe anything Apache board members claim was "minuted" but which in fact it turns out they might have just edited into their records days, weeks or years later? One of the things I particularly watch for in modern news media (where no physical artefact captures whatever "mistakes" are published as once happened with newspapers) is whether when they inevitably correct a mistake they _acknowledge_ that or they instead just silently change things.
    1. "AOO is not, and isn't designed to be, the 'super coolest open source office suite with all the latest bells and whistles,'" Jagielski continued. "Our research shows that a 'basic,' functional office suite, which is streamlined with a 'simple' and uncluttered, uncomplicated UI, serves an incredible under-represented community.
    1. Due to social media, it's now easier than ever to make a defamatory statement. That's because social media services like Twitter and Facebook allow you to instantly "publish" a statement that can reach millions of people.
    2. Lastly, in order for a statement to be defamatory, it must be unprivileged. You cannot sue for defamation in certain instances when a statement is considered privileged. For example, when a witness testifies at trial and makes a statement that is both false and injurious, the witness will be immune to a lawsuit for defamation because the act of testifying at trial is privileged.
    1. The meta charset information must also be the first child of the <head> tag. The reason this tag must be first is to avoid re-interpreting content that was added before the meta charset tag.

      But what if another tag also specified that it had to be the first child "because ..."? Maybe that hasn't happened yet, but it could and then you'd have to decide which one truly was more important to put first? (Hopefully/probably it wouldn't even matter that much.)

    1. If you have worked with emails before, the idea of placing a script into an email may set off alarm bells in your head! Rest assured, email providers who support AMP emails enforce fierce security checks that only allow vetted AMP scripts to run in their clients. This enables dynamic and interactive features to run directly in the recipients mailboxes with no security vulnerabilities! Read more about the required markup for AMP Emails here.
    1. Why did Rails team decide they need to implement their own "version" of Timecop?

      On the one hand, that's great to reduce dependencies, but on the other hand, small dependencies are great (and rails already has lots of them), it just bloats ActiveSupport more, and creates a needless "duplication" of an already popular de facto standard for this problem -- one which (unlike Timecop) can't be easily used outside of the Rails/ActiveSupport ecosystem. It doesn't seem different enough to warrant creating it...

      Timecop: Works with Rails and non-Rails

      ActiveSupport::Testing::TimeHelpers: for use outside rails, requires dependency on bigger gem, AS.

    1. These seem to be better reasons to support sub-nanosecond resolution. I think either storing picoseconds or storing sec fraction as 64-bit integer are better approaches than storing a rational. However, either change would be very invasive, and it seems unlikely to be worth the effort.
    1. Even having useCallback() returning the same function instance, it doesn’t bring any benefits because the optimization costs more than not having the optimization.
    1. We need to teach youth to fish for mentors and we need to stock the pond with more mentors.

      I like this analogy

    1. This model is the most flexible and open-ended of the four; your goal as an instructor is not to design a full-fledged semester of material, activities, and assessments. Rather, your goal is to work with your class to design and become a learning community, working collaboratively and individually towards your determined learning goals. For this to work you should have: a set of possible/preferred learning objectives for your classa library of course materials, preferably with as much as possible in digital formata suggested list of digital tools and technologies that you’re comfortable from with a list of possible assignment/project/assessment ideas that are related to your learning objectivesa willingness to experiment and invite your students into the teaching & learning process. At the onset of class you will need to facilitate a conversation among you and your students about how the class will unfold. This can be done in small groups f2f, via an online communication tool, or in a hybrid mix of both. As a community you should plan on addressing the following: what are our objectives as a learning community? what kind of work could we engage in to meet these objectives? what physical/virtual spaces would we like to work in? how/when do we want to meet in these spaces?how do we want to measure (assess) if an objective has been met?what rules and policies should govern our work? how will we work virtually and respect everyone’s boundaries and personal situations? how will we work f2f and respect public health recommendations and personal situations? You will probably need to spend at least the first 1-2 weeks answering these questions together and then designing a plan for your course. Make sure you and your students talk through various complications: what if the university’s policies about meeting f2f change? what if classes are forced to move entirely virtual/remote? what someone (students or professor!) gets sick?

      This is the one for me!!!!

    2. c

      Apologies for highlighting whole swaths of paragraphs but it can't be helped sometimes lol.

    3. Finally, these are NOT meant to be comprehensive. Instead, imagine these models along a continuum of opportunity. Your challenge is to determine where your courses could fit between and among the proposals.  

      I'm wondering how much or how little faculty will need to change their curriculum/delivery depending on the various inevitable changes that we can't exactly predict will happen this school year. For those faculty member purposefully switching online, what changes have they made already, and what changes will become necessary in the near future?

    1. So when Avdi took to air some of those grievances on Twitter, the natural thing happened that always happens when you feel your work is attacked: The core contributor group got defensive! That’s a mischaracterization! Where are the completed bug reports!? You know the drill, if you’ve ever worked on something, poured your heart into it, and then seen it criticized online. There’s that immediate, knee-jerk reaction of a sting. But it doesn’t have to sting.
  3. Jun 2020
    1. Prefactoring is the application of experience to the creation of new software systems. Its relationship to its namesake refactoring is that lessons learned from refactoring are part of that experience.
    1. Prismatic gets a percentage of the revenue increase that it generates for publishers, while developers pay a flat monthly fee based on usage, Cross says. It’s still working out pricing for hedge fund API usage. (As a point of comparison, the revenue model for the old Prismatic was the same as the current model for publishers. “We just meant for it to be more like Adsense/Adwords where we ran all this in our own consumer products too,” Cross notes.)

      the plague of monetisation

    1. pattern of conflict modulation during one correct response is 489 orthogonal to the pattern during another correct response

      i.e. it is not a 'general boosting' effect -> only on average the activity of neurons can still increase, but it is all about upregulating the relevant neurons for this correct response

    2. higher when Ericksen conflict was present (Figure 2A)

      Yeah, in single neurons you can show the detection of general conflict this way, and it was not partitionable into different responses...

    3. with Ericksen conflict than it was for trials without Ericksen

      what about simon?

      This does mean: Conflict increases representation shifting response toward correct action!

    4. AUC

      This axis has more predictive power when there is conflict than when there is no conflict (task is already so easy that the information is not needed, or at least a lot less?)

    5. amplification hypothesis, conversely, does not predict a unified conflict 341 detection axis in the population. Instead, it makes a prediction that is exactly contrary to 342 the epiphenomenal view: that conflict should shift population activity along task-variable 343 coding dimensions, but in the opposite direction. That is, conflict is predicted to amplify 344 task-relevant neural responses

      conflict means more control will be exterted. Heavier representation of whatever info it is that dACC encodes that 'pushes' for the correct action. This function of dACC would be in line with the context layer!?

    6. At the population level, then, the epiphenomenon hypothesis330 predicts that conflict should decrease the amount of information about the correct response 331 and shift neuronal population activity down along the axis in firing rate space that encodes 332 this response

      Because less % of neurons 'fighting' for the correct response are active, at least in total.

    7. Neurons that were tuned for a specific correct response were 298 often tuned to prefer the same Simon/Ericksen distractor response

      DLPFC is tuned to action-outcomes? -> in single neurons!

    8. neurons did not encode the distractor response

      So on trials with a unique distractor response, that action-outcome was not represented at all? It's interesting but then where does the actual conflict take place?

    9. significant 270 proportion of neurons were selective for the correct response

      So desired action-outcome is represented. I think that was already known about dACC.

    10. Furthermore, the population of cells whose responses were significantly 244 affected by Eriksen conflict was almost entirely non-overlapping with the population 245 significantly affected by Simon conflict (specifically, only one cell was significantly 246 modulated by both)

      Really separate representations for different aspects of the current task-set?

    11. additive model was a better fit to the data than other, more 205 flexible models

      So separate statistical significance testing shows effect for Eriksen, not for Simon, but regression model shows through model comparison that it's best to ascribe to them the same effect...

    12. (n=15/145) neurons had significantly different firing rates between Simon and no-196 (which was not certified by peer review) is the author/funder. All rights reserved. No reuse allowed without permission. The copyright holder for this preprintthis version posted March 15, 2020. . https://doi.org/10.1101/2020.03.14.991745doi: bioRxiv preprint

      No significant main effect but more single cells had a significant effect...? -> also directionality is not all positive, some positive some negative

    13. A small number of individual 187 neurons also had different activity levels on Eriksen conflict and no conflict trials (8.2%, 188 n=12/145 neurons, within-cell t-test)

      Note the difference between 'averaged over all neurons' (first report) or 'within one specific neuron' (this report)

    14. activity was higher on Ericksen conflict 185 trials than on no conflict trials

      for Eriksen flankers there is a main effect of conflict (vs no-conflict). Simon was not statistically significant. Was it mainly a power issue?

    15. 4917.0 (1) 5826.5 (1)*

      Additive model is the winner in single cell firing rates -> coding simply for the notion of conflict? cf. the population coding from dimensionality reduction!

    16. Subtracting this expectation from the observed pattern 723 of activity left the residual activity that could not be explained by the linear co-activation 724 of task and distractor conditions

      So this is what to analyze: If this still covaries with conflict in some way it means we go beyond epiphenomenal?

    1. More information about the Commons

      Additional Resource: I would like to recommend adding State of the Commons https://stateof.creativecommons.org/

      I found it really helpful to have visualisations, and to also spend time digging into the data, playing with different tools and exploring links for the Global Network chapters.

    1. The web is an amazing tool in bringing us together. Yet some of the best and brightest minds of our generation are working on how to get more people to click on ads. Imagine what technology could be capable of if it focused all that energy on the problems in our communities instead.
    1. Just as journalists should be able to write about anything they want, comedians should be able to do the same and tell jokes about anything they please

      where's the line though? every output generates a feedback loop with the hivemind, turning into input to ourselves with our cracking, overwhelmed, filters

      it's unrealistic to wish everyone to see jokes are jokes, to rely on journalists to generate unbiased facts, and politicians as self serving leeches, err that's my bias speaking

    1. A well-formatted and descriptive commit message is very helpful to others for understanding why the change was made, so please take the time to write it.
    1. Some large tech behemoths could hypothetically shoulder the enormous financial burden of handling hundreds of new lawsuits if they suddenly became responsible for the random things their users say, but it would not be possible for a small nonprofit like Signal to continue to operate within the United States. Tech companies and organizations may be forced to relocate, and new startups may choose to begin in other countries instead.
    1. e present a protocol for secure online com-munication, called “off-the-record messaging”, which hasproperties better-suited for casual conversation than do sys-tems like PGP or S/MIME.
    1. "Off-the-Record Communication, or, Why Not To Use PGP"
    2. In 2013, the Signal Protocol was introduced, which is based on OTR Messaging and the Silent Circle Instant Messaging Protocol (SCIMP). It brought about support for asynchronous communication ("offline messages") as its major new feature, as well as better resilience with distorted order of messages and simpler support for conversations with multiple participants.[11] OMEMO, introduced in an Android XMPP client called Conversations in 2015, integrates the Double Ratchet Algorithm used in Signal into the instant messaging protocol XMPP ("Jabber") and also enables encryption of file transfers. In the autumn of 2015 it was submitted to the XMPP Standards Foundation for standardisation.
    1. the OTR protocol also reveals used MAC keys as part of the next message, after they have already been used to authenticate previously received messages, and will not be re-used
    1. The answer, of course, is end-to-end encryption. The way this works is to remove any “man-in-the-middle” vulnerabilities by encrypting messages from endpoint to endpoint, with only the sender and recipient holding the decryption key. This level of messaging security was pushed into the mass-market by WhatsApp, and has now become a standard feature of every other decent platform.
    2. The issue, though—and it’s a big one, is that the SMS infrastructure is inherently insecure, lending itself to so-called “man-in-the-middle attacks.” Messages run through network data centres, everything can be seen—security is basic at best, and you are vulnerable to local carrier interception when travelling.
    1. When you make a call using Signal, it will generate a two-word secret code on both the profiles. You will speak the first word and the recipient will check it. Then he will speak the second word and you can check it on your end. If both the words match, the call has not been intercepted and connected to the correct profile
    2. OK, so what about regular messages? Turns out they are not encrypted after all. Where Signal implements the security and privacy protocols right from the start, Telegram separates the two and offers an additional option. The problem is that not everyone is aware of the Secret Chat option and first-time users may send sensitive information in the regular chat window unknowingly.
    1. And that’s where the real problem may lie—not with student semi-literacy but with that of their teachers.
    2. They face huge challenges,

      No shit. Just think of all the literacy modalities that someone younger has to deal with. Memes. Data visualizations. Tweets. Tiktok vids. Instagram stories. Digital annotation. Video annotation. YouTubes. Akkkk. Emojis. Gifs. Think of all the lateral communication modalities written, read, spoken that our students face daily. And the success with which most of them navigate these...well, it is extraordinary.

  4. May 2020
    1. Margaret Sullivan on Twitter: “.@TheAtlantic to cut staff by 68 positions, or 17 percent, in response to current economy, per chairman David Bradley statement” / Twitter. (n.d.). Twitter. Retrieved May 31, 2020, from https://twitter.com/sulliview/status/1263461467262779393

    2. Margaret Sullivan on Twitter: “.@TheAtlantic to cut staff by 68 positions, or 17 percent, in response to current economy, per chairman David Bradley statement” / Twitter. (n.d.). Twitter. Retrieved May 31, 2020, from https://twitter.com/Sulliview/status/1263461467262779393

    1. This policy allows the test suite to stay green while letting individual teams decide when they would like to put in the effort to write more deterministic tests. They may choose to do so right away, or delay until they work on the feature again.
    2. doing the wrong thing quickly is a good way to bankrupt us and our customers
    3. The order is important.
    4. there’s 3 steps to building software: Make it work Make it right Make it fast
    5. “Make it work” means shipping something that doesn’t break. The code might be ugly and difficult to understand, but we’re delivering value to the customer and we have tests that give us confidence. Without tests, it’s hard to answer “Does this work?”
    1. given the popularity and the fact that I'm not convinced we shouldn't have first-class support for this
    2. Even given all that, I haven't decided to close the door on offering this support in the future. If it was my opinion that we were not going to accept this ever, I would have closed the issue.
    1. The administration and its allies fear that the more people gravitate toward the successful, free-market self-insurance approach, the worse their government-engineered health “reform” will look. We’re already seeing the beginning of this trend.
    1. Contact Big and successful businesses are built on a talented workforce this is not just a saying but a solid fact. Hiring an employee is one of the most important tasks for a business and it becomes even more critical when it comes to hiring the right employee.  From Mark Zuckerberg to Richard Brandson every billionaire has similar thoughts when it comes to building the team and every one of them has one thing in common, they always seek quality, punctuality, and skills in an employee. Hiring an employee could be challenging also it may seem like a play of fate and this is a very common feeling but, having a guide or tips on how to hire the right employee could help you in tons. So, here is the list of 7 best tips on hiring the right employee. Make a Plan No matter what you do, planning is the very first step when it comes to achieving a goal. A written plan which contains essential components of the hiring like job descriptions, a skill required, Pay grade, timing, etc. is needed to hire a person. The plan that you make for hiring must contain various details regarding the requirement of the job. The details that would want to add in the plan is as follows-  Title  The post or title of the job that you’re looking for should also be given clearly. Someone who’s educated enough to be a CEO wouldn’t want to be a normal worker. Hence, the specifications of the position while looking for a new candidate should be clear.  Pay Grade  For hiring the new employees, you should first and foremost be true about the pay grade. Pay grades facilitate the employment process by providing a fixed framework of salary ranges, as opposed to a free negotiation. So, you should just align with the grading system to let your company work smoothly.  Reporting Person Reporting Person means the person who prepares reports on updates, progresses, accomplishments, etc. of the employees as well as the company in total. While hiring new employees, you should first submit their resumes to this person so that he can well-prepare a report and it gets easier for you to decide.  Timings You should also clearly mention the shift timings while looking out or hiring new employees. The working hours, the holidays, the relaxations should be clearly told to them and see if they can work with it or not.  Department Name You should also clearly defined the department for which you’re trying to hire the new employees. Human resource departments are often organized along with functions and may be hierarchical in nature. Common units in human resource departments include recruiting, training and development, compensation and benefits administration, health and safety, and employee and labor relations.  Job Summary, Purpose/Value A job summary is a brief, general statement regarding the important functions and responsibilities that comes with a job. Job summaries hold a huge role in enticing a qualified candidate to apply for the position and an employee’s performance of his or her responsibilities.  Challenges With a job, comes its challenges. So you should explain the kind of challenges that your newly appointed employee is going to face and mentally prepare. If your plan contains details like these then it becomes easy for you to post job requirements on job portals as well so, having a written plan on the hiring process is very important. Internal Job Rotation When we talk about hiring, we always think about finding a new person and use his services but, internal job rotation is something that no one thinks of and in certain conditions the best choice. If someone from your Department “A” has skills and talent to handle Department “B” then why not promote him/her to department “B”. There are many reasons why internal job rotation is better than hiring a new person, but to name a few- employee retention encourages development, eliminates boredom, and much more. Culture Fit If you want to hire the right employee, you need to make sure that they’ll fit in the company culture, your team, as well as the job. The best way to do that is by setting up a good interview panel. The interview panel is the one who asks questions and reviews the profile of the person to be hired. So asking a few cultural questions, liking, interest, hobbies, etc. helps the interview panel in deciding whether they’ll be a good match for our business or not. Go Beyond the Resumes Resumes are the best-foot-forward of a person. You need to go beyond that. A resume contains a person’s experiences, education, the last job is done, and much more but a person is much more than a piece of paper so, analyzing a person on the bases of personality, attitude, and style of speaking should also be analyzed thoroughly. Background reference Background reference is a very critical part of the hiring process. It is done to ensure that whoever you are hiring has a clean record. You can use the information provided by the employee like aadhaar card, social security number, etc. we can identify whether the person seeking a job is criminal or not. You can get police verification done along with enquiring with the previous employer. Competency Mapping Competency mapping is a process of identifying the competencies of an employee based on education and skills. When a person does a job basically he is using his skills and experiences in the job to get a favorable outcome. As a business manager or CEO, your job is to help your employee in bringing the best out of them and that can be easily done by working on their skills, education, and experience. Many business hire special corporate training specialists to train their employees and motivate them to achieve a better result in the job they do. When you are hiring a person it becomes hard for you to identify the competency of a person, at such situations you need to look at their previous work, question them on technical grounds, and watch their skill in action by conducting a test. Choose a Good Employment Agency Many small businesses often hire an employment agency to make their recruitment easy but they often miss out on key information on identifying a good employment agency. Basically, there are three types of recruitment agencies which are as follows- General Recruitment AgencyStaff Recruitment AgencyExecutive Recruitment AgencyAll in one agency Genera Recruiting Agency helps you find industry-based staff meaning this agency focuses on a niche industry like healthcare, engineering, etc. A staff recruitment agency is focused on temporary staffing solutions, this type of recruiting is done for seasonal businesses or project-based hiring. Executive Recruitment Agency is the agency that helps businesses in recruiting in executive positions like CEO, CFO, and Managers, etc. You can categorize the top-level position to C-level positions in this type of recruiting. As the name suggests, All in one recruitment agency is the agency that provides all these services like Yunic Solutions, We provide multiple recruitment services in every industry. After selecting the type of agency, you can decide your budget and go about researching the best recruitment agencies. Hiring the right employee in a nutshell Hiring the right employee is all about the experience. For some people, the first employee could be the right employee and for some people no employee is the right employee.But in general, Hiring is a core HR process that is essential for business and requires dedicated time and effort.

      Hiring the right employee is very important for any business. You can use these 7 tips on hiring the right employee to ensure you get the best quality team.

    1. Docker 19.03 does this automatically # by setting the DOCKER_HOST in # https://github.com/docker-library/docker/blob/d45051476babc297257df490d22cbd806f1b11e4/19.03/docker-entrypoint.sh#L23-L29
    1. Use tools in preference to unskilled help to lighten a programming task, even if you have to detour to build the tools and expect to throw some of them out after you've finished using them.
    1. The Map is Not the Terrain

      As George Box said, "All models are false, some are useful." Understanding the importance and value of mental models is vital, but it must be balanced with an understanding that they are, at best, an approximate representation of reality, not reality itself - the map is not the terrain

    1. The Rabbit Hole

      I also have a sister site, The Rabbit Hole (https://blas.com/), that you might find interesting. Many of the ideas were derived from the books I've read and summarized here

    1. idea hangers

      Another analogy is thinking of the latticework as a skeleton. The skeleton serves as a strong framework which our muscles, ligaments, and tendons hang and attach. Weak skeleton = weak body and, similarly, weak latticework = weak understanding. Just like our body, we need to train in order to make our skeleton strong, flexible, robust. The Latticework requires the same dedication but will result in a robust method of thinking and understanding.

    1. What I think we're lacking is proper tooling, or at least the knowledge of it. I don't know what most people use to write Git commits, but concepts like interactive staging, rebasing, squashing, and fixup commits are very daunting with Git on the CLI, unless you know really well what you're doing. We should do a better job at learning people how to use tools like Git Tower (to give just one example) to rewrite Git history, and to produce nice Git commits.
    2. If we can encourage people to create clean commits as they go, the example as you showed above should be far less common, because cleaning up such history as an after-math is most of the time almost impossible.
    1. This task disables two-factor authentication (2FA) for all users that have it enabled. This can be useful if GitLab’s config/secrets.yml file has been lost and users are unable to log in, for example.
    1. The "'strict-dynamic'" source expression aims to make Content Security Policy simpler to deploy for existing applications who have a high degree of confidence in the scripts they load directly, but low confidence in their ability to provide a reasonable list of resources to load up front.
    1. Eric Schmidt, former Google CEO and Chairman, famously said “Google’s policy on a lot of these things is to get right up to the creepy line, but not cross it.” But for most people, that line was crossed by Google, Facebook, and others long ago.
    1. Unscrupulous providers are incentivized to use inefficient or malicious means to increase break/fix work and thus increase their revenue.
    1. "linked data" can and should be a very general term referring to any structured data that is interlinked/interconnected.

      It looks like most of this article describes it in that general sense, but sometimes it talks about URIs and such as if they are a necessary attribute of linked data, when that would only apply to Web-connected linked data. What about, for example, linked data that links to each other through some other convention such as just a "type" and "ID"? Maybe that shouldn't be considered linked data if it is too locally scoped? But that topic and distinction should be explored/discussed further...

      I love its application to web technologies, but I wish there were a distinct term for that application ("linked web data"?) so it could be clearer from reading the word whether you meant general case or not. May not be a problem in practice. We shall see.

      Granted/hopefully most use of linked data is in the context of the Web, so that the links are universal / globally scoped, etc.

    1. This change was made because GitLab License Management is now renamed to GitLab License Compliance. After review with users and analysts, we determined that this new name better indicates what the feature is for, aligns with existing market terminology, and reduces confusion with GitLab subscription licensing features.
    1. Welcome, continue to LINER

      Destul de simpatică aplicația, doar că varianta FREE e destul de limitată

    1. Thickness of the neck

      However you represent the head, whether it is relatively simply yet characteristic, or incredibly refined, you can now identify the start of the neck from the chin. The digastric plane is the bottom plane, it gives the head thickness. It will be useful when drawing the head from other angles - the biggest hurdles is working in a flat 2d plane while seeking to depict volume.

      The gesture from the chin to the bottom of the neck is curved and downward. It is better to make the neck a little too long than too short. You then come from the bottom of the skull, the key here will be not to make the back of the neck too skinny.

      Notice that the neck starts very low in the front and very high in the back. Think of your shirt collars, it sits high in the back and low at the front.

    1. The Microsoft Calculator program uses the former in its standard view and the latter in its scientific and programmer views.
    1. In natural languages, some apparent tautologies may have non-tautological meanings in practice. In English, "it is what it is" is used to mean 'there is no way of changing it'.[1] In Tamil, vantaalum varuvaan literally means 'if he comes, he will come', but really means 'he just may come'.[2]
    2. In the context of first-order logic, a distinction is maintained between logical validities, sentences that are true in every model, and tautologies, which are a proper subset of the first-order logical validities. In the context of propositional logic, these two terms coincide.

      A distinction is made between the kind of logic (first-order logic) where this other distinction exists and propositional logic, where the distinction doesn't exist (the two terms coincide in that context).

    1. Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.
    2. It’s always best practice to either simply follow the most robust legislations or to check the local anti-spam requirements specific to where your recipients are based.
    1. the data subject has explicitly consented to the proposed transfer, after having been informed of the possible risks of such transfers for the data subject due to the absence of an adequacy decision and appropriate safeguards;
    2. In the absence of an adequacy decision pursuant to Article 45(3), or of appropriate safeguards pursuant to Article 46, including binding corporate rules, a transfer or a set of transfers of personal data to a third country or an international organisation shall take place only on one of the following conditions:

      These conditions are individually sufficient and jointly necessary (https://hyp.is/e0RRFJCfEeqwuR_MillmPA/en.wikipedia.org/wiki/Necessity_and_sufficiency).

      Each of the conditions listed is a sufficient (but, by itself, not necessary) condition for legal transfer (T) of personal data to a third country or an international organisation. In other words, if any of those conditions is true, then legal transfer is also true.

      On the other hand, the list of conditions (C; let C be the disjunction of the conditions a-g: a or b or c ...) are jointly necessary for legal transfer (T) to be true. That is:

      • T cannot be true unless C (one of a or b or c ...) is true
      • if C is false (there is not one of a or b or c ... that is true), then T is false
      • T ⇒ C
      • C ⇐ T
    1. generic-sounding term may be interpreted as something more specific than intended: I want to be able to use "data interchange" in the most general sense. But if people interpret it to mean this specific standard/protocol/whatever, I may be misunderstood.

      The definition given here

      is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.

      limits it to things that were previously communicated on paper. But what about things for which paper was never used, like the interchange of consent and consent receipts for GDPR/privacy law compliance, etc.?

      The term should be allowed to be used just as well for newer technologies/processes that had no previous roots in paper technologies.

    1. EU law prohibits the personal data of EU citizens from being transferred outside the EU to countries which do not ensure an adequate level of protection for that data.
    2. This framework serves the purpose of protecting Europeans’ personal data after the transfer to the US and correlates with GDPR requirements for Cross Boarder Data Transfers.
    1. While this is illegal and can result in criminal and civil penalties, your cooperation may make you eligible for up to a US$50,000 reward.

      Might not this motivate someone to conspire with someone else, one to commit the crime and one to collect the reward? Probably mitigated by a contingency that the reward may only be collected if criminal is successfully charged and prosecuted?

    1. Meet specific requirements if transferring data outside of the EAA. The GDPR permits data transfers of EU resident data outside of the European Economic Area (EEA) only when in compliance with set conditions.
    1. the GDPR restricts transfers of personal data outside the EEA, or the protection of the GDPR, unless the rights of the individuals in respect of their personal data is protected in another way
    1. The qualifier of ‘certain circumstances’ is important to highlight here, because it’s often the context in which information exists that determines whether it can identify someone.
    1. it buys, receives, sells, or shares the personal information of 50,000 or more consumers annually for the business’ commercial purposes. Since IP addresses fall under what is considered personal data — and “commercial purposes” simply means to advance commercial or economic interests — it is likely that any website with at least 50k unique visits per year from California falls within this scope.
    1. The only reason why your workaround isn't blocked as well is because it has additional steps that don't explicitly breach Mozilla's policies. But it certainly defeats the spirit of it.
    2. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
    3. They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
    4. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    5. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    1. If the add-on is a fork of another add-on, the name must clearly distinguish it from the original and provide a significant difference in functionality and/or code.
  5. Apr 2020