- May 2020
-
-
They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
Tags
- the owner of a device/computer should have freedom to use it however they wish
- good point
- empowering people
- bypassing technical constraints
- digital rights
- answer the "why?"
- empowering individual users
- balance of power
- allowing security constraints to be bypassed by users
- software freedom
Annotators
URL
-
-
extensionworkshop.com extensionworkshop.com
-
If the add-on is a fork of another add-on, the name must clearly distinguish it from the original and provide a significant difference in functionality and/or code.
-
-
www.thelancet.com www.thelancet.com
-
Lohse, S., Pfuhl, T., Berkó-Göttel, B., Rissland, J., Geißler, T., Gärtner, B., Becker, S. L., Schneitler, S., & Smola, S. (2020). Pooling of samples for testing for SARS-CoV-2 in asymptomatic people. The Lancet Infectious Diseases, S1473309920303625. https://doi.org/10.1016/S1473-3099(20)30362-5
-
-
www.thelancet.com www.thelancet.com
-
Makoni, M. (2020). Keeping COVID-19 at bay in Africa. The Lancet Respiratory Medicine, S2213260020302198. https://doi.org/10.1016/S2213-2600(20)30219-8
-
- Apr 2020
-
www.cnbc.com www.cnbc.com
-
www.cnbc.com www.cnbc.com
-
The notices were meant as a jumping-off point where people could begin the journey of understanding how each of their applications and the websites they visit use their data. But, they have probably had the opposite effect
-
-
www.troyhunt.com www.troyhunt.com
-
If you're wearing the same shoes as I have so many times before where you're trying to make yourself heard and do what you ultimately believe is in the organisation's best interests
-
many organisations block torrents (for obvious reasons) and I know, for example, that either of these options would have posed insurmountable hurdles at my previous employment
-
Actually, I probably would have ended up just paying for it myself due to the procurement challenges of even a single-digit dollar amount, but let's not get me started on that
-
Many of them have made poor password choices stretching all the way back to registration, an event that potentially occurred many years ago.
-
-
-
One thing is certain when it comes to navigation trends, users and designers seem to be fed up with completely hidden styles and demand options that work in similar formats on desktops and mobile devices. This might be one of the reasons a vertical pattern is trending.
-
-
cdb.reacttraining.com cdb.reacttraining.com
-
It’s true that there are two hard problems in computer science and one of them is naming things. Why? Because good names are important. A good name teaches about purpose and responsibility, so you have to spend some time thinking about it.
-
-
blog.cjeller.site blog.cjeller.site
-
Why not have blogs take better advantage of the ways we already interact?
I think it's largely because blogging has been left behind as a social tool of the early web. I think the average web user perceives blogging in a sort of negative light as an old technology, but I think we're about to have (or perhaps already are having) a second blogging renaissance in reaction to the pitfalls of microblogging.
-
-
security.stackexchange.com security.stackexchange.com
-
You don't "sanitize your output" you encode it for proper context within the application it is being presented. You encode the output for HTML, HTML Attribute, URL, JavaScript
-
I would call this output encoding instead of sanitization
-
-
stackoverflow.com stackoverflow.com
-
Less than 1% of users in the world have Javascript turned off. So honestly, it's not worth anyones time accommodating for such a small audience when a large majority of websites rely on Javascript. Been developing websites for a very long time now, and 100% of my sites use Javascript and rely on it heavily. If users have Javascript turned off, that's their own problem and choice, not mine. They'll be unable to visit or use at least 90% of websites online with it turned off.
-
-
psyarxiv.com psyarxiv.com
-
Van Tongeren, D. R., DeWall, C. N., Chen, Z., Sibley, C. G., & Bulbulia, J. (2020, April 24). Van Tongeren et al. (2020) JPSP - Religious Residue. https://doi.org/10.1037/pspp0000288
-
-
psyarxiv.com psyarxiv.com
-
Kamorowski, J., de Ruiter, C., Schreuder, M., Ask, K., & Jelicic, M. (2020, April 16). Forensic Mental Health Practitioners’ Use of Structured Risk Assessment Instruments, Views About Bias in Risk Evaluations, and Strategies to Counteract It. https://doi.org/10.31234/osf.io/te5c2
-
-
github.com github.com
-
Other sites could absolutely spend time crawling for new lists of breached passwords and then hashing and comparing against their own. However this is an intensive process and I'm sure both Facebook and Google have a team dedicated to account security with functions like this.
-
Before embarking on the effort to scrape the web for new password breaches and compare against your entire user database you also need to consider the ROI. The beauty of the pwned passwords API and this, and other, implementations of it is that you can get a good improvement in your account security with comparatively little engineering effort.
-
-
www.economist.com www.economist.com
-
Coronavirus infections have peaked in much of the rich world. (n.d.). The Economist. Retrieved April 27, 2020, from https://www.economist.com/graphic-detail/2020/04/17/coronavirus-infections-have-peaked-in-much-of-the-rich-world?fsrc=scn/tw/te/bl/ed/dailychartcoronavirusinfectionshavepeakedinmuchoftherichworldgraphicdetail
-
-
en.wikipedia.org en.wikipedia.org
-
The tyranny of the majority (or tyranny of the masses) is an inherent weakness to majority rule in which the majority of an electorate pursues exclusively its own interests at the expense of those in the minority. This results in oppression of minority groups comparable to that of a tyrant or despot
-
-
en.wikipedia.org en.wikipedia.org
-
Direct democracy was not what the framers of the United States Constitution envisioned for the nation. They saw a danger in tyranny of the majority. As a result, they advocated a representative democracy in the form of a constitutional republic over a direct democracy. For example, James Madison, in Federalist No. 10, advocates a constitutional republic over direct democracy precisely to protect the individual from the will of the majority
-
-
sciencebusiness.net sciencebusiness.net
-
University of Amsterdam scientists launch website that seeks ideal COVID-19 exit strategy. (2020 April 21) Science|Business. https://sciencebusiness.net/network-updates/university-amsterdam-scientists-launch-website-seeks-ideal-covid-19-exit-strategy
-
-
papers.ssrn.com papers.ssrn.com
-
Thunstrom, L., Newbold, S., Finnoff, D., Ashworth, M., & Shogren, J. F. (2020). The Benefits and Costs of Using Social Distancing to Flatten the Curve for COVID-19 (SSRN Scholarly Paper ID 3561934). Social Science Research Network. https://doi.org/10.2139/ssrn.3561934
-
-
gavinmiller.io gavinmiller.io
-
You see entropy is information leaking. When it comes to passwords (and secure systems in general) you want to leak as little information as possible. Otherwise an attacker has information they can use to their advantage.
-
-
www.csoonline.com www.csoonline.com
-
Download the billions of breached passwords and blacklist them all. Attackers have a copy; so should you.
-
-
-
Having said all that, I think this is completely absurd that I have to write an entire article justifying the release of this data out of fear of prosecution or legal harassment. I had wanted to write an article about the data itself but I will have to do that later because I had to write this lame thing trying to convince the FBI not to raid me.
-
I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us.
-
it reminds me of IT security best practices. Based on experience and the lessons we have learned in the history of IT security, we have come up with some basic rules that, when followed, go a long way to preventing serious problems later.
-
As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
-
The fact is that it doesn’t matter if you can see the threat or not, and it doesn’t matter if the flaw ever leads to a vulnerability. You just always follow the core rules and everything else seems to fall into place.
Tags
- collateral damage/impact
- legitimate uses of a feature blocked due to abuse of the same feature
- don't turn innocent people into criminals (through bad laws)
- best practices
- good policy/practice/procedure
- fear of prosecution/legal harassment
- laws/law enforcement agencies are supposed to be protecting us
- researcher rights
- absurd
- security vulnerabilities
- making it easy to do the right thing
- intent to commit/facilitate a crime
- do the right thing
- legitimate activities/uses made illegal due to laws intended only to forbid illegitimate activities
- unintended consequence
- a government for the people?
- journalist rights
- chilling effect
- good intentions
Annotators
URL
-
-
blog.1password.com blog.1password.com
-
This isn’t the first time Kerckhoffs’ Principle has come up. I specifically discussed it when talking about creating good, strong Master Passwords, when I said that we should use a system for coming up with Master Passwords that doesn’t lose its strength if the attacker knows the system that we used
-
Kerckhoffs’ Principle states that you should assume that your adversary knows as much about the system you use as you do. This is why – despite what I may have said on April Fools Day last year – security experts are skeptical of security systems that hide the details of how they operate. They are particularly skeptical of systems that derive their security from keeping the details of how they work secret. I could go on at great length about why openness about the system improves security. Indeed, my first draft of this article did go on at great length.
-
-
en.wikipedia.org en.wikipedia.org
-
"the enemy knows the system"
-
"one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them"
-
-
falcon.readthedocs.io falcon.readthedocs.io
-
“The source code for Falcon is so good, I almost prefer it to documentation. It basically can’t be wrong.”
-
“I feel like I’m just talking HTTP at last, with nothing in the middle. Falcon seems like the requests of backend.”
-
-
en.wikipedia.org en.wikipedia.org
-
the Add functions seem to work generically over various types when looking at the invocations, but are considered to be two entirely distinct functions by the compiler for all intents and purposes
-
-
www.techopedia.com www.techopedia.com
-
A language that features polymorphism allows developers to program in the general rather than program in the specific. $(document).ready(function() { recordAdModuleData(2964, "impressions","Dictionary Ad"); });
-
-
github.com github.com
-
Devise-Two-Factor only worries about the backend, leaving the details of the integration up to you. This means that you're responsible for building the UI that drives the gem. While there is an example Rails application included in the gem, it is important to remember that this gem is intentionally very open-ended, and you should build a user experience which fits your individual application.
-
-
www.techrepublic.com www.techrepublic.com
-
When you simply accept that "hacker" means "malicious security cracker", you give up the ability to use the term to refer to anything else without potential confusion.
-
-
www.troyhunt.com www.troyhunt.com
-
Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
-
-
www.cnet.com www.cnet.com
-
Well, as a home user, I also belong to an investment club with 10 members. I also have a medium size family who I like to send photo's to, and my son is on a soccer team. all those have greater than 5 people on the list. sooooooooo..... once again, the people with valid use of the internet have to 'deal' with those that abuse it.
-
-
www.troyhunt.com www.troyhunt.com
-
If you didn't and this incident is the impetus that causes you to start practising secure password management then that's precisely the outcome I'd hoped for.
-
-
slack-files.com slack-files.com
-
that “it is quite clear thatNietzsche wrote [this work] not as a dialectician.”3
Integrates key words and phrases.
-
-
accessmedicine.mhmedical.com accessmedicine.mhmedical.com
-
Steroids used after the first 3 to 4 days after injury do not affect wound healing as severely as when they are used in the immediate postoperative period.
-
-
www.w3.org www.w3.org
-
the Web has become many things, but documents and, by extension, publications, have remained close to the heart of the Web.
Tags
Annotators
URL
-
-
www.w3.org www.w3.org
-
Traditional annotations are marginalia, errata, and highlights in printed books, maps, picture, and other physical media
Tags
Annotators
URL
-
-
github.com github.com
-
IDEs and standard *nix tools like sed can help, but you typically have to make a trade-off between introducing errors and introducing tedium.
-
that can be partially automated but still require human oversight and occasional intervention
-
Part of why most code -- and most software -- sucks so much is that making sweeping changes is hard.
-
-
lnakamur.files.wordpress.com lnakamur.files.wordpress.com
-
sur-veillance has been to imagine them as equally affecting all users.
but with our society's biases built in.
-
User subjects and data objects are treated as programmable matter, which is to say extractable matter.
yes.
-
-
accessmedicine.mhmedical.com accessmedicine.mhmedical.com
-
Before repair of the injury is attempted, hemorrhage should be controlled; injuries to the atria can be clamped with a Satinsky vascular clamp, whereas digital pressure is used to occlude the majority of ventricular wounds. Foley catheter occlusion of larger stellate lesions is described, but even minimal traction may enlarge the original injury.
bleeding control is first. satinsky clamp can be used for atria inj but for ventricular, mostly digital pressure is used. minimal stretch may enlarge inj (Foley)
-
The most common injuries from both blunt and penetrating thoracic trauma are hemothorax and pneumothorax. More than 85% of patients can be definitively treated with a chest tube. The indications for thoracotomy include significant initial or ongoing hemorrhage from the tube thoracostomy and specific imaging-identified diagnoses (Table 7-10). One caveat concerns the patient who presents after a delay. Even when the initial chest tube output is 1.5 L, if the output ceases and the lung is reexpanded, the patient may be managed nonoperatively if hemodynamically stable.
chest tube can treat 85% of hemo/pneumothoraxes, if significant bleeding from tube thoracostomy initially or ongoing was present, thoracotomy is indicated. patient delayed presentation is a caveat. nonop manageing is possible in stable patient with ceased output and rexpanded lungs even after 1.5 L output.
-
Because treatment must be instituted during the latent period between injury and onset of neurologic sequelae, diagnostic imaging is performed based on identified risk factors (Fig. 7-55).91 After identification of an injury, antithrombotics are administered if the patient does not have contraindications (intracranial hemorrhage, falling hemoglobin level with solid organ injury or complex pelvic fractures). Heparin, started without a loading dose at 15 units/kg per hour, is titrated to achieve a PTT between 40 and 50 seconds or antiplatelet agents are initiated (aspirin 325 mg/d or clopidogrel 75 mg/d). The types of antithrombotic treatment appear equivalent in published studies to date, and the duration of treatment is empirically recommended to be 6 months.
diagnostic imaging before onset of neurologic complications while taking
-
Early recognition and management of these injuries is paramount because patients treated with antithrombotics have a stroke rate of <1% compared with stroke rates of 20% in untreated patients.
antithrombotics for blunt inj of carotid and vertebral art decreases stroke rates from 20 to 1%
-
Tangential wounds of the internal jugular vein should be repaired by lateral venorrhaphy, but extensive wounds are efficiently addressed by ligation. However, it is not advisable to ligate both jugular veins due to potential intracranial hypertension.
for tangential inj of int jugular vein lateral vonorrhaphy is used and for extensive damages, ligation, but not bilaterally to preventing IC HTN.
-
The final stages of this sequence are caused by blood accumulation that forces the temporal lobe medially, with resultant compression of the third cranial nerve and eventually the brain stem.
-
Penetrating injuries to the head may require operative intervention for hemorrhage control, evacuation of blood, skull fracture fixation, or debridement.
-
The burr hole is made on the side of the dilated pupil to decompress the intracranial space. After stabilization, the patient is transferred to a facility with neurosurgical capability for formal craniotomy.
Tags
- formal craniotomy
- blood accumulation that forces the temporal lobe medially
- compression of the third cranial nerve
- Penetrating injuries to the head
- hemorrhage from the tube thoracostomy
- ventricular wounds
- burr hole
- Tangential wounds of the internal jugular vein
- Blunt injury to the carotid or vertebral arteries
- injuries to the atria
- compression of the the brain stem.
- decompress the intracranial space
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
source
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
The handler can be a method or a Proc object passed to the :with option. You can also use a block directly instead of an explicit Proc object.
Example of: letting you either pass a proc (as a keyword arg in this case) or as a block.
-
-
www.freshworks.com www.freshworks.com
-
We prefer Freshconnect for ticket related discussions because it maintains the context and always remains part of the ticket. In Slack, these discussions get lost in threads within channels.
-
- Mar 2020
-
clickhouse.tech clickhouse.tech
-
There is no system that is equally well-suited to significantly different scenarios.
-
The higher the load on the system, the more important it is to customize the system set up to match the requirements of the usage scenario, and the more fine grained this customization becomes. There is no system that is equally well-suited to significantly different scenarios. If a system is adaptable to a wide set of scenarios, under a high load, the system will handle all the scenarios equally poorly, or will work well for just one or few of possible scenarios.
-
-
www.iubenda.com www.iubenda.com
-
you must limit use of the data to the description in the disclosure
-
-
matomo.org matomo.org
-
The relationship is between the website owner (you) and the visitor, with no external sources looking in
-
-
www.iubenda.com www.iubenda.com
-
If a website/app collects personal data, the Data Owner must inform users of this fact by way of a privacy policy. All that is required to trigger this obligation is the presence of a simple contact form, Google Analytics, a cookie or even a social widget; if you’re processing any kind of personal data, you definitely need one.
-
-
www.iubenda.com www.iubenda.com
-
Our Cookie Solution plugins for WordPress, Magento, Joomla! and PrestaShop allow you to automate the blocking of scripts drastically reducing the necessity for direct interventions in the site’s code.
-
-
clearcode.cc clearcode.cc
-
In short, a website needs a consent-management platform if any of the following activities are taking place:
-
Regardless of where an organization is based (in the EU or otherwise), its website must meet regulatory obligations when processing EU/EEA citizens’ data or the business will face financial penalties.
-
-
www.iubenda.com www.iubenda.com
-
If your website installs any non-technical cookies, e.g. via script like Google Analytics or via a Facebook share button
-
If your website can be visited by European users
Tags
Annotators
URL
-
-
www.arch-hive.net www.arch-hive.net
-
Darmok
-
Captain Dathon
-
-
www.quora.com www.quora.com
-
It doesn’t.What it does do is teach AI to recognize various things and fool you into thinking you’re getting better security.When you get something for free, you are the product.
-
-
www.quora.com www.quora.com
-
As technology improves, humans keep integrating these extra abilities into our cyborg selves
-
-
github.com github.com
-
Don't be discouraged when you get feedback about a method that isn't all sunshine and roses. Facets has been around long enough now that it needs to maintain a certain degree of quality control, and that means serious discernment about what goes into the library. That includes having in depth discussions the merits of methods, even about the best name for a method --even if the functionality has been accepted the name may not.
about: merits
-
When submitting new methods for consideration, it is best if each method (or tightly related set of methods) is in it's own pull request. If you have only one method to submit then a simple commit will do the trick. If you have more than one it best to use separate branches. Let me emphasizes this point because it makes it much more likely that your pull request will be merged. If you submit a bunch of methods in a single pull request, it is very likely that it will not be merged even if methods you submitted are accepted!
-
-
hypothes.is hypothes.is
-
Create a note by selecting some text and clicking the button
How to make a note. A 101 with me
-
-
stackoverflow.com stackoverflow.com
-
From error.c
-
My extended dance remix version of why is at
-
-
www.kqed.org www.kqed.org
-
But she's also addicted to her phone."
What we sow is what we reap!
-
-
serverfault.com serverfault.com
-
Is there any reason to NOT have a swap file on CentOS
-
-
www.adrianjock.com www.adrianjock.com
-
prove that your interpretation of EU laws (“My Privacy Policy covers everything, explicit consent isn’t required, I don’t have to give my visitors any kind of control because they can block cookies before visiting my site,” etc) is right
-
-
www.thenation.com www.thenation.com
-
Dictators and tyrants routinely begin their reigns and sustain their power with the deliberate and calculated destruction of art
Art terrifies tyrants! Here's one tiny small example, but there are unfortunately hundreds of thousands examples of this.
-
-
support.google.com support.google.com
-
Do you consider visitor interaction with the home page video an important engagement signal? If so, you would want interaction with the video to be included in the bounce rate calculation, so that sessions including only your home page with clicks on the video are not calculated as bounces. On the other hand, you might prefer a more strict calculation of bounce rate for your home page, in which you want to know the percentage of sessions including only your home page regardless of clicks on the video.
-
-
www.time-travellers.org www.time-travellers.org
-
Rather than using NFS for this task, use explicit data duplication, via one of the long-established mechanisms designed for this purpose.
-
-
www.pmcarpenter.com www.pmcarpenter.com
-
I enjoy dissent and debate among commenters, and criticism of my views is also always welcome; you are even free to call me an assclown, a dupe, a partisan ignoramus — whatever you like, as long as you don't insult other commenters.
-
-
www.pmcarpenter.com www.pmcarpenter.com
-
I've been meaning to remind readers that I do read the comments. Some time ago, one disappointed commenter mused that others' reflections seemed to go (as I recall) "into a void," because I remained silent to each. Perhaps I was ignoring readers' remarks? I assure you that is not the case. I read them all — although on this site, for some reason, "all" means somewhat sparse — and I find them nearly all remarkable in their perceptiveness. I especially welcome, and enjoy, intelligent disagreement. I choose not to respond, however, only because of my editorial philosophy, which holds that the comment section is, rightfully, for commenters — and commenters alone. I've already had my say, and it seems to me rather rude to take another whack in reply. Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in. So, I beg you not to take my silence personally.
-
Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in.
-
-
ico.org.uk ico.org.uk
-
However, we recognise there are some differing opinions as well as practical considerations around the use of partial cookie walls and we will be seeking further submissions and opinions on this point from interested parties.
-
While we recognise that analytics can provide you with useful information, they are not part of the functionality that the user requests when they use your online service – for example, if you didn’t have analytics running, the user could still be able to access your service. This is why analytics cookies aren’t strictly necessary and so require consent.
-
-
www.civicuk.com www.civicuk.com
-
These cookies are used from AddThis social sharing widget in order to make sure you see the updated count when you share a page.
Why do they not mention the other 5 or so AddThis cookies, or the fact that according to Cookiepedia AddThis is engaged in Targeting/Advertising?
-
-
techcrunch.com techcrunch.com
-
Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
-
has shone a spotlight on the risks that flow from platforms that operate by systematically keeping their users in the dark.
-
-
techcrunch.com techcrunch.com
-
All of which means — per EU law — it should be equally easy for website visitors to choose not to be tracked as to agree to their personal data being processed.
-
-
-
For mainly two reasons: I pay for things that bring value to my life, and when something's "free", you're usually really just giving away your privacy without being aware.
-
-
news.humanpresence.io news.humanpresence.io
-
Rojas-Lozano claimed that the second part of Google’s two-part CAPTCHA feature, which requires users to transcribe and type into a box a distorted image of words, letters or numbers before entering its site, is also used to transcribe words that a computer cannot read to assist with Google’s book digitization service. By not disclosing that, she argued, Google was getting free labor from its users.
-
-
-
For instance, a strict interpretation of the law would require publishers to get opt-in consent by individual vendor, rather than an 'Accept All' pop-up prompt. The approach that publishers and ad tech vendor are taking is that a mass opt-in button - with an option to dive deeper and toggle consent by vendor - follows the "spirit of the law". This stance is increasingly coming under fire, though, especially as seen by a new study by researchers at UCL, MIT, and Aarhus University.
-
-
www.forbes.com www.forbes.com
-
The business had a policy that you should report safety incidents when you see them. The process around that was you fill out a form and fax it to a number and someone will take action on it. The safety manager in this company saw that and decided to digitize this workflow and optimize it. Once this process was put into place, the number of safety incidents reported increased 5 times. The speed at which safety incidents were addressed increased by 60%.
-
-
www.frontiersin.org www.frontiersin.org
-
has a surprising connection to the world of aging today.
-
-
www.wikihow.com www.wikihow.com
-
Get phrasebooks to start studying basic terminology. Phrasebooks are lists of expressions made for travelers to foreign countries. These lists give you an example of the sentence structure a language uses and what kind of words are useful. Find a phrasebook in the language you wish to learn and treat it as a foundation you can build upon as you learn more.
-
-
daringfireball.net daringfireball.net
-
This makes it easy to use Markdown to write about HTML code. (As opposed to raw HTML, which is a terrible format for writing about HTML syntax, because every single < and & in your example code needs to be escaped.)
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
For several reasons the Simple backend shipped with Active Support only does the "simplest thing that could possibly work" for Ruby on Rails3 ... which means that it is only guaranteed to work for English and, as a side effect, languages that are very similar to English. Also, the simple backend is only capable of reading translations but cannot dynamically store them to any format.That does not mean you're stuck with these limitations, though. The Ruby I18n gem makes it very easy to exchange the Simple backend implementation with something else that fits better for your needs, by passing a backend instance to the I18n.backend= setter.
-
-
www.idropnews.com www.idropnews.com
-
accuses Apple of seeking to “exclude competition … under the guise of security” by locking down the iPhone and iPad.
-
- Feb 2020
-
opensquare.nyupress.org opensquare.nyupress.org
-
By Any Media Necessary The New Youth Activism
book
-
-
opensquare.nyupress.org opensquare.nyupress.org
-
The Digital Edge How Black and Latino Youth Navigate Digital Inequality
Book
-
-
about.gitlab.com about.gitlab.com
-
We do the smallest thing possible and get it out as quickly as possible.
-
-
www.core-econ.org www.core-econ.org
-
In 1968, Garrett Hardin, a biologist, published an article about social dilemmas in the journal Science, called ‘The Tragedy of the Commons’.
-
-
loadimpact.com loadimpact.com
-
We believe load test scripts should be plain code to get all the benefits of version control, as opposed to say unreadable and tool generated XML.
Saw another comment lamenting the use of ugly/unreasonable XML files:
https://github.com/flood-io/ruby-jmeter
Tired of using the JMeter GUI or looking at hairy XML files?
-
Hence why we built k6, the load testing tool we’ve always wanted ourselves!
-
But, let’s be pragmatic for a second, the 80/20 rule states that you get 80% of the value from 20% of the work and a couple of simple tests are vastly better than no tests at all. Start small and simple, make sure you get something out of the testing first, then expand the test suite and add more complexity until you feel that you’ve reached the point where more effort spent on realism will not give enough return on your invested time.
-
-
www.fmassari.com www.fmassari.com
-
The rational expectation and thelearning-from-price literatures argue that equilibrium prices are accurate becausethey reveal and aggregate the information of all market participants. The MarketSelection Hypothesis,MSH, proposes instead that prices become accurate becausethey eventually reflect only the beliefs of the most accurate agent. The Wisdomof the Crowd argument,WOC, however suggests that market prices are accuratebecause individual, idiosyncratic errors are averaged out by the price formationmechanism
Three models (arguments for) drivers of market efficiency
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
For n < 5 we recommend showing the individual data points.
-
- Jan 2020
-
marxdown.github.io marxdown.github.io
-
no difference
The nature of the wants that commodities satisfy makes no difference. This is perhaps somewhat surprising to readers, given the extent to which everyday critiques of capitalist society often center around the role that consumerism plays and the subjective effects that this produces, namely, the way that consumer society creates all sorts of desires (as well as the obverse--many will defend capitalism on the grounds that it is able to satisfy our inordinate appetite for novelty by producing an enormous proliferation of desirable commodities). Yet, for Marx, the nature of these desires "makes no difference."
It is worth pointing out that the critique of the appetites that consumer society spawns is by no means new (a rather early moment in the history of consumer society). We find it already on display in Book II of Plato's Republic. In looking to shift the terrain of the analysis of justice from the individualistic, social contractualist theory of justice elaborated by Glaucon, Socrates founds a 'city' based on the idea that no one is self-sufficient, that human beings have much need of one another, and that the various crafts--farming, weaving cloth, etc.--fare best when each person specializes in that craft to which they are most suited by nature. After sketching out a kind of idyllic, pastoral community based on the principle of working together to satisfy our natural appetites, Socrates aristocratic companion Glaucon objects, describing this city as a 'city fit for pigs'. At this point, Socrates conjures what he calls the 'luxurious city', at which point a whole host of social ills are unleashed in order to satisfy Glaucon's desire for the luxuries to which he is accustomed. Currency and trade are introduced, along with a more complex division of labor (and wage labor!), and quite quickly, war. On the basis of the principle of 'one person, one craft', Socrates argues that making war is itself a craft that requires specialization (and thus a professional army).
For Plato, this represents the beginning of class society, as the profession military becomes a class distinct from the class of producers and merchants.
Plato thus anticipates a version of a view that becomes one of the key theses of the Marxist theory of the state, namely, the idea that the state exists only in societies that have become "entangled in an insoluble contradiction within itself" and which are "cleft into irreconcilable antagonisms which it is powerless to dispel," (Engels, The Origin of the Family, Private Property, and the State). The state emerges as "a power apparently standing above society...whose purpose is to moderate the conflict and keep it within the bounds of 'order'" Engels writes, "this power arising out of society, but placing itself above it, and increasingly separating itself from it, is the state." Lenin cites this passage in the first pages of State and Revolution in order to critique the 'bourgeois' view that the state exists in order to reconcile class interests. In Lenin's reading of Marx, the state exists as "an organ of classs domination, an organ of oppression of one class by another," a view articulated in The Communist Manifesto, (cf. V.I. Lenin, State and Revolution in V.I.Lenin: Collected Works, Vol. 25, pp. 385-497).
Marx cites this same passage from Republic in a long footnote to his discussion of the Division of Labor and Manufacture on pp. 487-488, which also happens to be the sole place in Capital where Marx cites Plato.
The fact that Marx here expresses indifference to the particular appetites that commodities satisfy is thus intriguing and ambiguous. Given that this question both clearly animates Plato's discussion of the origin of class society in Republic and, additionally serves as an alternative to the social contractarian view of justice that descends from Glaucon through Hobbes and the 18th century 'Robinsonades', this seemingly technical point also touches upon questions concerning Marx's engagement with both classical and modern political theory.
If for Plato, the unruly appetites represent the seed of which class-divided society is the fruit, Marx's dismissal of the question of the nature of the appetites that are satisfied by commodities points to exchange-value and the social forms that it unleashes as being key dimensions of the particular form that class-antagonism takes in capitalist society.
-
prevails
In the original German, 'prevails' is rendered "herrscht." Herrscht shares a common root with the ordinary German word Herr (Mister, or, more evocatively, Master). 'Lordship' (as, in the chapter of Hegel's Phenomenology of Spirit, on 'Lordship and Bondage' is rendered Herrschaft.)
My own reading of Capital tends to center upon the question of domination in capitalist societies, and throughout chapter 1 (in particular, in The Fetishism of Commodities and the Secret Thereof) Marx is especially attuned to the distinguishing how the forms of domination that are prevalent in capitalist societies are distinct from the relations of "personal dependence" that characterize pre-capitalist modes of production.
It seems prudent, therefore, to take note of the way that the seemingly innocuous notion of 'prevalence' is, for Marx, in his original formulation, already evocative of the language of mastery, domination, perhaps even something like 'hegemony'.
Furthermore, the capitalist mode of production prevails--it predominates. Yet, as Louis Althusser observes in his discussion of the concept of the 'mode of production' in On the Reproduction of Capitalism, every concrete social formation can be classified according to the mode of production that is dominant (that prevails--herrscht). In order to dominate, something must implicitly be dominated, or subordinate. "In every social formation," Althusser writes, "there exists more than one mode of production: at least two and often many more." Althusser cites Lenin, who in his analysis of the late 19th c. Russian social formation, observes that four modes of production can be distinguished (Louis Althusser, On the Reproduction of Capitalism, Verso 2014, p. 19.)
In our analysis of social formations, the concrete specificity of each can be articulated by carefully examining the multiplicity of modes of production that coincide within it, and examine the way in which capitalism tends to dominate a multiplicity of subordinate modes of production that, on the one hand, survive from past modes of production but which may also, on the other, be emerging in the present (i.e. communism). Thus even if capitalism tends towards the formation of a contiguous world-system dominated by its particular imperatives, this does not mean that this process is homogenous or unfolds in the same way in each instance.
For some commentators, capitalism is defined by the prevalence of wage labor and the specific dynamics that obtain therefrom. Yet this has often led to confusion over, whether, in analyzing the North American social formation prior to 1865, in which slavery coexists with wage-labor, the mode of production based on slave-labor is pre-capitalist. Yet as we find here in ch. 1, what determines the commodity as a commodity is not that it is the product of wage labor, rather that it is produced for exchange. As Marx writes on p. 131, "He who satisfies his own need with the product of his own labor admittedly creates use-values, but not commodities. Insofar as the slave-system in North America produced commodities (cotton, tobacco, etc.) for exchange on the world market, the fact that these commodities were produced under direct conditions of domination does not have any bearing on whether or not we identify this system of production as 'capitalist'. Wage-labor is therefore not likely the determinative factor; the determinative factor is the production of commodities for exchange. It is only insofar as commodities confront one another as exchange-values that the various modes of useful labor appear as expressions of a homogenous common substance, labor in the abstract
It is in this sense that we can observe one of the ways that the capitalist mode of production prevails over other modes of production, as it subordinates these modes of production to production for exchange, and thus the law of value, regardless of whether wage-labor represents the dominant form of this relation. Moreover, it provides a clue to how we can examine, for example, the persistence of unwaged work within the family, which has important consequences for Social Reproduction Theory.
Nonetheless, we can say that insofar as commodities confront each other on the market in a scene of exchange that they implicitly contain some 'third thing' which enables us to compare them as bearers of a magnitude of value. This 'third thing', as Marx's demonstration shows, is 'socially necessary labour time', which anticipates the way that wage-labor will become a dominant feature of capitalist society.
-
-
www.technologyreview.com www.technologyreview.com
-
What I’m seeing here is the consistent “eliminating the human” pattern.
This seems as apt a name as any.
-
-
-
Some questions are only asked by people with a fundamental misunderstanding. The friends who walk into my office and ask, “have you read all of these” miss the point of books.
-
We tend to treat our knowledge as personal property to be protected and defended. It is an ornament that allows us to rise in the pecking order.
-
-
unix.stackexchange.com unix.stackexchange.com
-
You can but it's difficult. I recommend switching to a different tool.
-
-
www.theatlantic.com www.theatlantic.com
-
He envisioned vast centers equipped with mics and headphones where people could speak in detail and at length about their experiences, thoughts, and feelings, delivering in the form of monologues what the eavesdroppers could gather only piecemeal.
-
ferreting-out of secrets is merely one purpose of surveillance; it also disciplines, inhibits, robbing interactions of spontaneity and turning them into self-conscious performances
-
-
www.nytimes.com www.nytimes.com
-
Customization can be surprisingly homogenizing.
-
The counterculture was about people’s need to express themselves, to fulfill their individual potential, to live in harmony with nature rather than constantly seeking to overcome its nuisances.
-
-
www.theatlantic.com www.theatlantic.com
-
rich self-experience in a solitary state is far less likely to feel lonely when alone.”
-
“the value of solitude depends on whether an individual can find an interior solitude” within themselves, says Bowker. Everyone is different in that regard: “Some people can go for a walk or listen to music and feel that they are deeply in touch with themselves. Others cannot.”
-
“Your alone time should not be something that you're afraid of.”
-
“existentializing moments,” mental flickers of clarity which can occur during inward-focused solitude.
-
“When people take these moments to explore their solitude, not only will they be forced to confront who they are, they just might learn a little bit about how to out-maneuver some of the toxicity that surrounds them in a social setting.”
-
-
www.vox.com www.vox.com
-
ere were positive ideals and goals and projects. People were aiming for something.
-
-
-
When humans are good, it says, we give ourselves license to be bad.
-
-
blogs.scientificamerican.com blogs.scientificamerican.com
-
remember the moments that plumbed the depths of our emotional life, that made us feel most alive?
-
rare, exciting, oceanic, deeply moving, exhilarating, elevating experiences that generated an advanced form of perceiving reality,
-
greater contemplation associated with intense experiences may increase the likelihood that we consider such events self-defining.
-
-
blogs.scientificamerican.com blogs.scientificamerican.com
-
positive relationship between a quiet ego and self-compassion.
-
come to a deeper understanding of common humanity.
-
attempt to see reality as clearly as possible
-
nondefensive form of attention to the present
-
-
www.rubyinside.com www.rubyinside.com
-
I was going through the source for Thin and noticed that instead of using require, Marc-Andre Cournoyer was using a method called autoload to load thin's constituent parts.
-
- Dec 2019
-
societyinmind.com societyinmind.com
-
"The replication crisis, if nothing else, has shown that productivity is not intrinsically valuable. Much of what psychology has produced has been shown, empirically, to be a waste of time, effort, and money. As Gibson put it: our gains are puny, our science ill-founded. As a subject, it is hard to see what it has to lose from a period of theoretical confrontation. The ultimate response to the replication crisis will determine whether this bout is postponed or not."
-
-
www.washingtonpost.com www.washingtonpost.com
-
“Every data point was altered to present the best picture possible,”Bob Crowley | Lessons Learned interview | 8/3/2016Tap to view full document Bob Crowley, an Army colonel who served as a senior counterinsurgency adviser to
Juke the stats.
-
-
frankensteinvariorum.github.io frankensteinvariorum.github.io
-
Tempest and Midixsummer Night’s Dream
Two of Shakespeare's more fanciful plays, The Tempest and A Midsummer Night's Dream explore the limits of the human form through its characters: the grotesque monster-human hybrid Caliban in The Tempest and the comical Bottom from Midsummer, a human with the head of an ass.
Shelley is conscious of Frankenstein's play with generic convention, and the role genre has in its agreement with representation of reality. In his review of the first edition in 1818 for Edinburgh Magaizine, Sir Walter Scott seems cognizant of the shift in consciousness. He notes: "The real events of the world have, in our day, too, been of so wondrous and gigantic a kind--the shiftings of the scenes in our stupendous drama have been so rapid and various, that Shakespeare himself, in his wildest flights, has been completely distanced by the eccentricities of actual existence."
-
renew life
Victor implies that life can be renewed from death, a theme present in biblical scripture. See Gen. 3:19, 18:27; Job 30:19; Eccl. 3:20) and in the Anglican Book of Common Prayer (Burial Rite 1:485, 2:501).
-
A new species would bless me as its creator and source
The religious connotations of the passage connect Victor to the human project of playing God, much as Adam was said to be formed of clay. Historically, Jewish rabbis were also thought to have created golems from clay to seek revenge on enemies. However, following orders literally, the golems inevitably became destructive. Cautionary tales about technology and hubris were not only frequent in Shelley's time but have proliferated. In Karel Čapek's R.U.R (1920), for example, robots confound expectations by violently rebelling against their creators. Cadavers for anatomical training in this period were scarce, and thus a medical education meant to study and extend life also fostered serial killers who committed murders for the sake of selling fresh corpses. Such killing sprees were ended by the Anatomical Act of 1832 in England, which made corpses legally available for medical research.
-
It was indeed a paradise
At this moment, the Creature appears more strongly associated with Adam than with Satan, apparently born into a "paradise." However, Shelley's allusion might be to that of the serpent or snake, as in Revelation: "So the great dragon was cast out, that serpent of old, called the Devil and Satan, who deceives the whole world; he was cast out to the earth, and his angels were cast out with him . . . He laid hold of the dragon, that serpent of old, who is the Devil and Satan, and bound him for a thousand years (Rev. 12:9; 20:2).
-
Shakespeare, in the Tempest and Midv1_ixsummer Night’s Dream
Despite the comparison of these Shakespeare plays to Greek tragic poetry, The Tempest and A Midsummer Night's Dream are romances, not tragedies. Nonetheless, both romance and tragedy are genres to which this novel is deeply indebted.
-
I shall kill no albatross,
This expression is a reference to Samuel Taylor Coleridge's poem "Rime of the Ancient Mariner," in which the Mariner inexplicably slays an albatross. The allusion may imply that Walton will play the role of Coleridge's Wedding Guest instead: he will listen to Victor's long, obsessive story that will ultimately be a confession of guilt, like the Ancient Mariner' tale. Since the poem was not published until September 1798, this reference also places the "17--" date of these letters as the summer of 1799. On the poem's role in the novel, see Beth Lau, "The Rime of the Ancient Mariner and Frankenstein," in Samuel Taylor Coleridge and the Sciences of Life, ed. Nicholas Roe (Oxford: Oxford University Press, 2001): 207-23.
Tags
- poetry
- Percy Shelley
- guilt
- "Rime of the Ancient Mariner"
- Satan
- religion
- Victor
- God
- murder
- The Tempest
- Shakespeare
- Karel Čapek
- robot
- William Godwin
- Lyrical Ballads
- Sir Walter Scott
- romance (genre)
- jk
- Adam
- The Bible
- Samuel Taylor Coleridge
- Eve
- genre
- John Milton
- Romanticism
- A Midsummer Night's Dream
- Genesis
- Book of Common Prayer
- Revelation
Annotators
URL
-
-
unixwiz.net unixwiz.net
-
I believe that mere lists of "vote yes" or "vote no" are not very helpful except for sheep: it's important to know why one is urged to vote in any given direction.
-
-
github.com github.com
-
Unlike similar tools that are scheduled to take backups at a fixed time of the day, Timeshift is designed to run once every hour and take snapshots only when a snapshot is due. This is more suitable for desktop users who keep their laptops and desktops switched on for few hours daily. Scheduling snapshots at a fixed time on such users will result in missed backups since the system may not be running when the snapshot is scheduled to run. By running once every hour and creating snapshots when due, Timeshift ensures that backups are not missed.
-
-
www.kickstarter.com www.kickstarter.com
-
In a nutshell, the King's Keys deck started as an experiment to see what card games would be like if you rebuilt playing cards from the ground up. Instead of using ranks and suits, each card has a number (from one to four), one of four items, and one of four colors. The result is what I call a 4x4x4 deck where 64 playing cards each have a unique combination of these three parts.
-
-
newpipe.schabi.org newpipe.schabi.org
-
Our goal is to make the internet a more free (libre) place and open it for everyone
-
-
github.com github.com
-
It shouldn't be useful to distinguish between requests made by Ajax and other kinds of request. Pretty much any usecase where you'd want to do that is better served by using the Accept header to ask for data in a specific format.
-
-
babeljs.io babeljs.io
-
Therefore, it's easy to search around for tweets/blog posts/talks that say "ES7 Decorators" and find that it's become the accustomed name for it.
-
- Nov 2019
-
www.biorxiv.org www.biorxiv.org
-
Transparent Peer Review
Download the complete Review Process [PDF] including:
- reviews
- authors' reply
- editorial decisions
-
-
www.biorxiv.org www.biorxiv.org
-
Transparent Peer Review
Download the complete Review Process [PDF] including:
- reviews
- authors' reply
- editorial decisions
-
-
www.biorxiv.org www.biorxiv.org
-
Transparent Peer Review
Download the complete Review Process [PDF] including:
- reviews
- authors' reply
- editorial decisions
-
-
-
Transparent Peer Review
Download the complete Review Process [PDF] including:
- reviews
- authors' reply
- editorial decisions
-
-
www.biorxiv.org www.biorxiv.org
-
Transparent Peer Review
Download the complete Review Process [PDF] including:
- reviews
- authors' reply
- editorial decisions
-
-
github.com github.com
-
Learning about this factor will help you best understand whether the extension's developer's interests are aligned or at odd with yours.
-
-
www.youtube.com www.youtube.com
-
news.ycombinator.com news.ycombinator.com
-
Can I ask people to upvote my submission? No. Users should vote for a story because they personally find it intellectually interesting, not because someone has content to promote.
-
-
www.theguardian.com www.theguardian.com
-
Tea cites Chavisa Woods’s recent memoir of sexism 100 Times, Andrea Lawlor’s Paul Takes the Form of a Mortal Girl and Brontez Purnell’s Since I Laid My Burden Down as examples of books that have fearlessly and artfully tackled themes of power and gender relations, misogyny and sexual violence. “Right now, I think the [publishing] industry is responding to what is happening and saying: ‘Yes we really need these voices, we need these ideas out in the world.’
So true!
My review of Chavisa Woods's book is here.
-
-
southbeachrentalsonline.com southbeachrentalsonline.com
-
The Carlyle Web Site
-
-
learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com
-
The chapter examines learning and emotion at work andhow emotional intelligence and emotion work affect well-being, identity development, and power relations.The chapter also considers how human resource develop-ment and emotion interact in learning, training, andchange initiatives.
-
-
academic.oup.com academic.oup.com
-
hoiho (yellow-eyed penguin
The rarest penguin species, and in 2019 voted "New Zealand Bird of the Year" https://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=12284052
-
-
www-chronicle-com.libproxy.nau.edu www-chronicle-com.libproxy.nau.edu
-
Technology
This website explores technology news within the field of higher education. The site contains a wide variety of news articles on current issues, trends, and research surrounding the integration of technology in universities and colleges. This includes technology's prevalence in teaching and learning, institutional decisions, and societal trends of higher education. The articles are published by authors for "The Chronicle of Higher Education," a leading newspaper and website for higher education journalism. Rating: 7/10
-
-
blog.codinghorror.com blog.codinghorror.com
-
Discourse
-
-
kentcdodds.com kentcdodds.com
-
"The more your tests resemble the way your software is used, the more confidence they can give you. "
-
-
testing-library.com testing-library.com
-
You want to write maintainable tests for your React components. As a part of this goal, you want your tests to avoid including implementation details of your components and rather focus on making your tests give you the confidence for which they are intended. As part of this, you want your testbase to be maintainable in the long run so refactors of your components (changes to implementation but not functionality) don't break your tests and slow you and your team down.
-
We try to only expose methods and utilities that encourage you to write tests that closely resemble how your web pages are used.
-
The more your tests resemble the way your software is used, the more confidence they can give you.
-
Most of the damaging features have to do with encouraging testing implementation details. Primarily, these are shallow rendering, APIs which allow selecting rendered elements by component constructors, and APIs which allow you to get and interact with component instances (and their state/properties) (most of enzyme's wrapper APIs allow this).
-
-
www.valentinog.com www.valentinog.com
-
Some time ago I asked on Reddit: “What’s the consensus among the React community for testing React components?” Shawn Wang replied: “testing is an enormously complicated and nuanced topic on which there isn’t a consensus anywhere in JS, much less in React.” I was not trying to find the best library for testing React. Mainly because there isn’t one.
-
- Oct 2019
-
github.com github.com
-
Take MongoDB for example, sure it's an awesome solution for special situations but i could never figure out why so many people were using it by default. I thought I just didn't understand something, but then it turns out that basically a lot of people were just jumping on the bandwagon and using MongoDB where a normal relation db like Postgres would be more appropriate.
-
-
www.rheingold.com www.rheingold.com
-
the WELL
Tags
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
Tags
Annotators
URL
-
-
www.news.com.au www.news.com.au
-
WHEN it comes to the state of the environment, it’s easy to get swept up in the doom and gloom of it all. Global warming, high pollution levels, climate change and waste disposal all dominate the headlines, painting a bleak picture of what’s to come. But just because it seems hopeless doesn’t mean it is.T roubled times call for ingenious solutions, and Australia is home to some of the brightest ecovators in the world, like Robert Pascoe, Managing Director of environmental solutions company Closed Loop.Through its Simply Cups initiative, Closed Loop is tackling Australia’s overwhelming waste problem by teaming up with 7-Eleven to save 70 million coffee cups from landfill this year — equivalent to the number they sell each year. While the most sustainable option is forgoing a disposable cup for a reusable one, some circumstances are beyond your control. Like your inability to remember anything before you’ve had your morning coffee. Which is a bit of a catch 22, isn’t it? That’s why 7-Eleven are installing dedicated coffee cup recycling bins in over 200 of their stores nationally, as well as funding 50 other large-scale locations including offices, universities and construction sites as part of the initiative. Coffee cups are one of the largest contributors to litter waste in Australia, with an estimated one billion ending up in landfill each year because they are not recycled.Yep, unfortunately you read that right: one billion cups.Coffee cups are one of the largest contributors to litter waste in Australia, with an estimated one billion ending up in landfill each year because they are not recycled.“T here’s a lot of misinformation out there,” Mr Pascoe said. “The consumers aren’t at fault because ultimately they don’t know what can be recycled and what can’t. I think if we can get that information out there, then people will demand products that are made from recycled materials.”For the majority of us, learning that our disposable coffee cups fall into the category of what can’t be recycled is both confusing and devastating. But, as Mr Pascoe says: “You can’t unknow something once you know it.”“Part of the problem is they didn’t know they weren’t being recycled. A lot of people said, ‘oh no, I put my coffee cup into the recycling to be recycled’, but of course, they’re not,” he continued.A nd why is that, exactly? It’s because most paper coffee cups are lined with a waterproof plastic that makes them hard to recycle — but not impossible. And that’s where Simply Cups comes in. “We’ve come up with a system that can actually recycle these cups if we keep them separate. We’ve got technology available now to do it, but we have to have coffee cups kept as a separate stream. Or anything that has the plastic lining of milk cartons or juice boxes,” Mr Pascoe said. The technology he’s referring to is “kind of like an organic solvent” that works to separate compound materials. Invented by Dennis Collins in Ballarat, the technology was initially designed to separate the PVC material from the hessian used in truck liners and advertising banners.“Dennis called us and said, ‘I’ve got a solution for your coffee cups’,” Mr Pascoe said. “So now we’re building a plant that can process around 150 million coffee cups per year, which is about 1.5 thousand tonnes. That will only be about 10 per cent of disposable coffee cups alone, so we’re going to need quite a few of these plants eventually. We have the solution, but we really need the coffee cups. “That’s why we started the Simply Cups program.”And that’s where coffee addicts come in. Once they drop their coffee cups into a designated recycling bin, they will then be taken to a processing plant using this new technology. The inner plastic lining of the cups will be removed and then recycled into things like plastic outdoor furniture, safety equipment and food trays.A nother eco-minded initiative helping solve Australia’s waste problem is the anti food-waste website, Yume. The website fights food waste — which is a huge problem in Australia — by allowing consumers to buy surplus and unsold food from restaurants and cafes at half the price. The ‘wholesale marketplace for surplus food that saves you money while saving the planet’ shares the same idea as ‘YWaste’, an app allowing retailers to sell food that would otherwise be thrown away.Over its 40-year history, Patagonia has donated about $114 million to grassroots environmental organisations. Over its 40-year history, Patagonia has donated about $114 million to grassroots environmental organisations. Their advertising has begged consumers not to buy things they don’t need (even their own products) and they’ve implemented a program that repairs their products for free rather than replace them. Their commitment to the environment is reflected in the materials of their products too; wetsuits are made of natural rubber and raincoats are made from recycled plastic bottles. This year, the company launched Patagonia Action Works, a digital platform that aims that aims to connect people with environmental nonprofits, helping them get involved through events, petitions, and volunteering.H &M, too, are doing their bit to close the loop on fashion waste with their global campaign encouraging customers to recycle their clothes. They launched their garment collecting initiative in 2013, asking customers to drop off any unwanted items from their closets. Depending on the condition of the clothing, the items are either distributed to second-hand stores for resale, or recycled into other items like yarn, rags, and insulation materials.And just look at Elon Musk. He’s raking in bajillions of dollars every minute almost exclusively thanks to Tesla and SolarCity, which have disrupted an entire industry. While some snigger at his grand ideas — let’s colonise Mars! — the accomplishments of how he has changed the way we shop for cars are hard to deny.A fter a complicated relationship with French beauty giant L’Oreal, The Body Shop is now in the hands of ethical Brazilian beauty brand Natura, promising to return to its pioneering ethical business.“All of us share the aim of doing business as a transformational force for good and a force for change for society and for the environment. We couldn’t think of a better union to nurture our brand’s commitment to naturality and sustainability,” said the Body Shop’s Communications Manager, Jessica Styles. “In 2016, The Body Shop launched its new sustainability plan, Enrich Not Exploit, supporting the brand’s vision to be the most ethical and sustainable global business in the world.”“All of us share the aim of doing business as a transformational force for good and a force for change for society and for the environment. We couldn’t think of a better union to nurture our brand’s commitment to naturality and sustainability,”Jessica Styles, Body Shop’s Communications Manager The plan set fourteen targets to help The Body Shop become a "truly sustainable business", including powering all its stores with 100 per cent renewable energy, overhauling product packaging by slashing the use of fossil fuel-based wrapping and designing new sustainable innovations. This year there’s a special focus on protecting Red Pandas in Nepal, a species currently on the endangered list.“Now more than ever, companies have the platforms and frameworks to not only voice doing good for the planet and people but to also act on it. The more we see big brands doing their bit, the more it becomes entrenched as something that not only employees but customers should be thinking about,” Styles said. “It’s the big corporations of the world that can help foster and influence this through their own businesses.” Skin care brand Youth to The People has made a conscience decision to use 100 per cent recyclable packaging. Co-founder Joe Cloyes says the decision reflects the brand’s philosophies.“We believe in creating as little waste as possible, we believe in cruelty-free products, and we believe in sourcing the best ingredients for your health and your skin. It's just that simple,” he said. “Modern consumers care about their environment just as much as they care about their healthy skin, and they're very much connected. We have found it's very important to people.”FIND OUT how many cups of coffee you could be recycling EVEry yearHow many cups of coffee do you drink every day?How many days per week do you drink coffee?How many weeks per year do you drink coffee?Calculatecups of coffeecould be recycled These are but a few eco-minded initiatives that offer Australians the chance to do their part in securing a cleaner future for generations to come. For every company that spills millions of gallons of oil into our oceans, there are plenty more companies operating under a socially responsible ethos. They recognise enterprise and environmental responsibility can in fact go hand-in-hand.“I think every organisation should have a sustainability policy,” Mr Pascoe said. “There are plenty of organisations around that can have a positive impact on the environment. We’re talking about the effect they have on the environment, the way they consume energy, and the way they manage their waste. In my world, there’s no such thing as waste.” Over one billion cups end up in landfill each year because they are not recycled. That’s why 7-Eleven has joined forces with Simply Cups to establish cup recycling in Australia. Save your cups by placing them in a Simply Cups bin at any participating 7-Eleven #cuprescue. Story by Erin Bromhead | news.com.au
-
-
stackoverflow.com stackoverflow.com
-
stackoverflow.com stackoverflow.com
-
Let's make the example even easier. function convertDate<T extends string | undefined>(isoDate?: string): T { return undefined } 'undefined' is assignable to the constraint of type 'T' Means: What you return in the function (undefined), matches the constraints of your generic type parameter T (extends string | undefined). , but 'T' could be instantiated with a different subtype of constraint 'string | undefined'. Means: TypeScript does not consider that as safe. What if you defined your function like this at compile time: // expects string return type according to generics // but you return undefined in function body const res = convertDate<string>("2019-08-16T16:48:33Z") Then according to your signature, you expect the return type to be string. But at runtime that is not the case! This discrepancy that T can be instantiated with a different subtype (here string) than you return in the function (undefined) is expressed with the TypeScript error.
-
-
www.typescriptlang.org www.typescriptlang.org
-
Based on examples given in https://github.com/Microsoft/TypeScript/issues/29049
-
-
stackoverflow.com stackoverflow.com
-
Both of the below are valid as far as T extends (...args: any[]) => any goes logFn((a, b) => a + b) logFn((a, b, c) => c) But if you refer back to the example I gave, the inner definition as: return (a, b) => fn(a, b); So option 2. will throw an error here, which is why typescript is warning you about it.
-
-
github.com github.com
-
In the body of the function you have no control over the instantiation by the calling context, so we have to treat things of type T as opaque boxes and say you can't assign to it. A common mistake or misunderstanding was to constraint a type parameter and then assign to its constraint, for example: function f<T extends boolean>(x: T) { x = true; } f<false>(false); This is still incorrect because the constraint only restricts the upper bound, it does not tell you how precise T may really be.
-
-
stackoverflow.com stackoverflow.com
-
P can't be assigned {}, since the Generic Type P can be a more defined (or restricted) type.
-
-
-
This being the City of Ryde, political vendettas are never far from the surface.
That would have to include the vendetta that prompted the call to The Hasbeen, resulting in your misguided story drawing on incomplete facts and coverage dating back to 2014.
Mental note: This is the type of story that will be perfect for robot journalists when The Hasbeen boosts its editorial quality by replacing its newsroom with robots.
Tags
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
you can have a Type that is more specific than a boolean like this
-
-
github.com github.com
-
The value 10 is assignable to the constraint of T, but it is not assignable to this particular instantiation of T. If there was no error I would passing 10 where 3 is expected!
-
-
outline.com outline.com
-
A former union boss jailed over receiving a coal exploration licence from his friend, former NSW Labor minister Ian Macdonald, was an "entrepreneur" who found a "willing buyer" in the disgraced politician, a court has heard.
This is a flawed proposition and both misleading and deceptive in relation to the subject matter, considering its prominence in a court media report of proceedings which largely centre on the propriety or otherwise of an approvals process.
Using a market analogy mischaracterises the process involved in seeking and gaining approval for a proposal based on an innovative occupational health and safety concept.
In this case, the Minister was the appropriate authority under the relevant NSW laws.
And while Mr Maitland could indeed be described as a "entrepreneur", the phrase "willing buyer" taken literally in the context of the process to which he was constrained, could contaminate the reader's perception of the process as transactional or necessitating exchange of funds a conventional buyer and seller relationship.
Based on evidence already tendered in open court, it's already known Mr Maitland sought both legal advice on the applicable process as well as guidance by officials and other representatives with whom he necessarily engaged.
But the concept of finding a "willing buyer", taken literally at it's most extreme, could suggest Mr Maitland was presented with multiple approvals processes and to ultimately reach his goal, engaged in a market force-style comparative assessment of the conditions attached to each of these processes to ultimately decide on which approvals process to pursue.
Plainly, this was not the case. Mr Maitland had sought advice on the process and proceeded accordingly.
The only exception that could exist in relation to the availability of alternative processes could be a situation silimilar to the handling of unsolicited proposals by former Premier Barry O'Farrell over casino licenses which were not constrained by any of the regular transparency-related requirements including community engagement, notification or competitive tender.
Again, this situation does not and could not apply to the process applicable to Mr Maitland's proposal.
The misleading concepts introduced from the outset in this article also represent an aggravating feature of the injustice to which Mr Maitland has been subjected.
To be found criminally culpable in a matter involving actions undertaken in an honest belief they were required in a process for which Mr Maitland both sought advice process and then at no stage was told anything that would suggest his understanding of the process was incorrect, contradicts fundamental principles of natural justice.
-
-
journals.sagepub.com journals.sagepub.com
-
Social Psychological Theory and Research Value Priorities
Read the following section, and briefly describe how liberal (or leftist) thinkers might define the good society and how conservative (or rightist) thinkers might define the good society.
-
What is the good life? What is the good man? The good woman? What is the good society and what is my relation to it? What are my obligations to society? What is best for my children? What is justice? Truth? Virtue? What is my relation to nature, to death, to aging, to pain, to illness? How can I live a zestful, enjoyable, meaningful life? What is my responsibility to my brothers? Who are my brothers? What shall I be loyal to? What must I be ready to die for?—Abraham Maslow
Please reflect and respond to the following questions: What is the good life to you? Who are your brothers (i.e., your people)? What should you be loyal to?
I appreciate your honest reflections (in advance).
-
-
niklasblog.com niklasblog.com
-
The Swedish Royal Court has confirmed that it has been receiving abusive faxes from the fanatical Westboro Baptist Church sect.
More info is found here.
Tags
Annotators
URL
-
-
-
"The Fifteenth Amendment stated that people could not be denied the right to vote based on “race, color, or previous condition of servitude.” This construction allowed states to continue to decide the qualifications of voters as long as those qualifications were ostensibly race-neutral. Thus, while states could not deny African American men the right to vote on the basis of race, they could deny it to women on the basis of sex or to people who could not prove they were literate." Before the 15th amendment women and colored men and women were not allowed to vote but the 15th amendment allowed these privileges and prevented discrimination amongst the rights of someone based on their race and gender and states cannot deny these rights to the people because it is a constitutional law.
Tags
Annotators
URL
-