6,339 Matching Annotations
  1. Aug 2020
    1. As a web designer, I hate that "log in" creates a visual space between the words. If you line up "Log In Register" - is that three links or two? This creates a Gestalt problem, meaning you have to really fiddle with spacing to get the word groupings right, without using pipe characters.

      Sure, you can try to solve that problem by using a one-word alternative for any multi-word phrase, but that's not always possible: there isn't always a single word that can be used for every possible phrase you may have.

      Adjusting the letter-spacing and margin between items in your list isn't that hard and would be better in the long run since it gives you a scalable, general solution.

      "Log in" is the only correct way to spell the verb, and the only way to be consistent with 1000s of other phrasal verbs that are spelled with a space in them.

      We don't need nor want an exception to the general rule just for "login" just because so many people have made that mistake.

    1. With more and more productivity apps creating their own messaging systems, users suddenly face a new problem: Multiple inboxes. You now have to check notifications in Github, Trello, Google Docs and half a dozen (if not more) other tools in your productivity stack.

      The multiple inbox problem.

    1. Elinor Ostrom’s 8 Principles for Managing a Commons by On the Commons

      I found this article to be a succinct description of the 8 key principles for managing The Commons. It made me curious to explore more about the range of research that Elinor Ostrom undertook about the Commons. (June 2020 cohort CC Cert)

    1. Decentralized Social Networks vs. The TrollsDerek CaelinIn the summer of 2019, the alt-right social network Gab migrated to the decentralized "Fediverse" of social networks after being booted from mainstream financial services and hosting solutions. Almost immediately, Gab was met by a dedicated movement to isolate it. The movement was largely successful; within a year, the Gab CTO announced they would leave the Fediverse. This talk will cover how moderators, activists, and developers in the Fediverse used human moderators, strong moderation tools, representative codes of conduct, and no small amount of organization to promote healthy online spaces.We’ll review how some of the challenges faced by centralized platforms, which struggle with their own size and scale, have been addressed in networks of smaller, community run, more moderated servers. In the debate over how to make a healthier internet, the open platforms and open protocols in the model of the Fediverse may have some of the best resources to isolate bad actors, including Gab.
    1. It’s understandable that in order to relax, users need to know they’re not being overheard – though there is a less playful side to this. If groups are perceived as a place to say what you really think, away from the constraints of public judgement or “political correctness”, then it follows that they are also where people turn to share prejudices or more hateful expressions, that are unacceptable (or even illegal) elsewhere.

      The idea of public judgement or "political correctness" here is exactly the definition of a modern digital pale, around which technology is being used to extend people's thoughts.

    2. The ongoing rise of WhatsApp, and its challenge to both legacy institutions and open social media, poses a profound political question: how do public institutions and discussions retain legitimacy and trust once people are organised into closed and invisible communities? The risk is that a vicious circle ensues, in which private groups circulate ever more information and disinformation to discredit public officials and public information, and our alienation from democracy escalates.
    3. WhatsApp groups can not only breed suspicion among the public, but also manufacture a mood of suspicion among their own participants. As also demonstrated by closed Facebook groups, discontents – not always well-founded – accumulate in private before boiling over in public. The capacity to circulate misinformation and allegations is becoming greater than the capacity to resolve them.
    1. I went against the grain, applying other tools that people have written over the years to directly perform the job at hand which do not involve entering a program for awk or a shell to run, with answers like https://unix.stackexchange.com/a/574309/5132 and https://unix.stackexchange.com/a/578242/5132 . Others have done similar. https://unix.stackexchange.com/a/584274/5132 and https://unix.stackexchange.com/a/569600/5132 are (for examples) answers that show alternative tools to answers employing shell script and (yet again) awk programs, namely John A. Kunze's jot and rs (reshape), which have been around since 4.2BSD for goodness' sake!
  2. Jul 2020
    1. "that text has been removed from the official version on the Apache site." This itself is also not good. If you post "official" records but then quietly edit them over time, I have no choice but to assume bad faith in all the records I'm shown by you. Why should I believe anything Apache board members claim was "minuted" but which in fact it turns out they might have just edited into their records days, weeks or years later? One of the things I particularly watch for in modern news media (where no physical artefact captures whatever "mistakes" are published as once happened with newspapers) is whether when they inevitably correct a mistake they _acknowledge_ that or they instead just silently change things.
    1. Lastly, in order for a statement to be defamatory, it must be unprivileged. You cannot sue for defamation in certain instances when a statement is considered privileged. For example, when a witness testifies at trial and makes a statement that is both false and injurious, the witness will be immune to a lawsuit for defamation because the act of testifying at trial is privileged.
    1. The meta charset information must also be the first child of the <head> tag. The reason this tag must be first is to avoid re-interpreting content that was added before the meta charset tag.

      But what if another tag also specified that it had to be the first child "because ..."? Maybe that hasn't happened yet, but it could and then you'd have to decide which one truly was more important to put first? (Hopefully/probably it wouldn't even matter that much.)

    1. If you have worked with emails before, the idea of placing a script into an email may set off alarm bells in your head! Rest assured, email providers who support AMP emails enforce fierce security checks that only allow vetted AMP scripts to run in their clients. This enables dynamic and interactive features to run directly in the recipients mailboxes with no security vulnerabilities! Read more about the required markup for AMP Emails here.
    1. Why did Rails team decide they need to implement their own "version" of Timecop?

      On the one hand, that's great to reduce dependencies, but on the other hand, small dependencies are great (and rails already has lots of them), it just bloats ActiveSupport more, and creates a needless "duplication" of an already popular de facto standard for this problem -- one which (unlike Timecop) can't be easily used outside of the Rails/ActiveSupport ecosystem. It doesn't seem different enough to warrant creating it...

      Timecop: Works with Rails and non-Rails

      ActiveSupport::Testing::TimeHelpers: for use outside rails, requires dependency on bigger gem, AS.

    1. This model is the most flexible and open-ended of the four; your goal as an instructor is not to design a full-fledged semester of material, activities, and assessments. Rather, your goal is to work with your class to design and become a learning community, working collaboratively and individually towards your determined learning goals. For this to work you should have: a set of possible/preferred learning objectives for your classa library of course materials, preferably with as much as possible in digital formata suggested list of digital tools and technologies that you’re comfortable from with a list of possible assignment/project/assessment ideas that are related to your learning objectivesa willingness to experiment and invite your students into the teaching & learning process. At the onset of class you will need to facilitate a conversation among you and your students about how the class will unfold. This can be done in small groups f2f, via an online communication tool, or in a hybrid mix of both. As a community you should plan on addressing the following: what are our objectives as a learning community? what kind of work could we engage in to meet these objectives? what physical/virtual spaces would we like to work in? how/when do we want to meet in these spaces?how do we want to measure (assess) if an objective has been met?what rules and policies should govern our work? how will we work virtually and respect everyone’s boundaries and personal situations? how will we work f2f and respect public health recommendations and personal situations? You will probably need to spend at least the first 1-2 weeks answering these questions together and then designing a plan for your course. Make sure you and your students talk through various complications: what if the university’s policies about meeting f2f change? what if classes are forced to move entirely virtual/remote? what someone (students or professor!) gets sick?

      This is the one for me!!!!

    2. Finally, these are NOT meant to be comprehensive. Instead, imagine these models along a continuum of opportunity. Your challenge is to determine where your courses could fit between and among the proposals.  

      I'm wondering how much or how little faculty will need to change their curriculum/delivery depending on the various inevitable changes that we can't exactly predict will happen this school year. For those faculty member purposefully switching online, what changes have they made already, and what changes will become necessary in the near future?

    1. So when Avdi took to air some of those grievances on Twitter, the natural thing happened that always happens when you feel your work is attacked: The core contributor group got defensive! That’s a mischaracterization! Where are the completed bug reports!? You know the drill, if you’ve ever worked on something, poured your heart into it, and then seen it criticized online. There’s that immediate, knee-jerk reaction of a sting. But it doesn’t have to sting.
  3. Jun 2020
    1. Prismatic gets a percentage of the revenue increase that it generates for publishers, while developers pay a flat monthly fee based on usage, Cross says. It’s still working out pricing for hedge fund API usage. (As a point of comparison, the revenue model for the old Prismatic was the same as the current model for publishers. “We just meant for it to be more like Adsense/Adwords where we ran all this in our own consumer products too,” Cross notes.)

      the plague of monetisation

    1. pattern of conflict modulation during one correct response is 489 orthogonal to the pattern during another correct response

      i.e. it is not a 'general boosting' effect -> only on average the activity of neurons can still increase, but it is all about upregulating the relevant neurons for this correct response

    2. amplification hypothesis, conversely, does not predict a unified conflict 341 detection axis in the population. Instead, it makes a prediction that is exactly contrary to 342 the epiphenomenal view: that conflict should shift population activity along task-variable 343 coding dimensions, but in the opposite direction. That is, conflict is predicted to amplify 344 task-relevant neural responses

      conflict means more control will be exterted. Heavier representation of whatever info it is that dACC encodes that 'pushes' for the correct action. This function of dACC would be in line with the context layer!?

    3. At the population level, then, the epiphenomenon hypothesis330 predicts that conflict should decrease the amount of information about the correct response 331 and shift neuronal population activity down along the axis in firing rate space that encodes 332 this response

      Because less % of neurons 'fighting' for the correct response are active, at least in total.

    4. Furthermore, the population of cells whose responses were significantly 244 affected by Eriksen conflict was almost entirely non-overlapping with the population 245 significantly affected by Simon conflict (specifically, only one cell was significantly 246 modulated by both)

      Really separate representations for different aspects of the current task-set?

    5. (n=15/145) neurons had significantly different firing rates between Simon and no-196 (which was not certified by peer review) is the author/funder. All rights reserved. No reuse allowed without permission. The copyright holder for this preprintthis version posted March 15, 2020. . https://doi.org/10.1101/2020.03.14.991745doi: bioRxiv preprint

      No significant main effect but more single cells had a significant effect...? -> also directionality is not all positive, some positive some negative

    6. A small number of individual 187 neurons also had different activity levels on Eriksen conflict and no conflict trials (8.2%, 188 n=12/145 neurons, within-cell t-test)

      Note the difference between 'averaged over all neurons' (first report) or 'within one specific neuron' (this report)

    7. Subtracting this expectation from the observed pattern 723 of activity left the residual activity that could not be explained by the linear co-activation 724 of task and distractor conditions

      So this is what to analyze: If this still covaries with conflict in some way it means we go beyond epiphenomenal?

    1. Just as journalists should be able to write about anything they want, comedians should be able to do the same and tell jokes about anything they please

      where's the line though? every output generates a feedback loop with the hivemind, turning into input to ourselves with our cracking, overwhelmed, filters

      it's unrealistic to wish everyone to see jokes are jokes, to rely on journalists to generate unbiased facts, and politicians as self serving leeches, err that's my bias speaking

    1. Some large tech behemoths could hypothetically shoulder the enormous financial burden of handling hundreds of new lawsuits if they suddenly became responsible for the random things their users say, but it would not be possible for a small nonprofit like Signal to continue to operate within the United States. Tech companies and organizations may be forced to relocate, and new startups may choose to begin in other countries instead.
    1. In 2013, the Signal Protocol was introduced, which is based on OTR Messaging and the Silent Circle Instant Messaging Protocol (SCIMP). It brought about support for asynchronous communication ("offline messages") as its major new feature, as well as better resilience with distorted order of messages and simpler support for conversations with multiple participants.[11] OMEMO, introduced in an Android XMPP client called Conversations in 2015, integrates the Double Ratchet Algorithm used in Signal into the instant messaging protocol XMPP ("Jabber") and also enables encryption of file transfers. In the autumn of 2015 it was submitted to the XMPP Standards Foundation for standardisation.
    1. The issue, though—and it’s a big one, is that the SMS infrastructure is inherently insecure, lending itself to so-called “man-in-the-middle attacks.” Messages run through network data centres, everything can be seen—security is basic at best, and you are vulnerable to local carrier interception when travelling.
    1. OK, so what about regular messages? Turns out they are not encrypted after all. Where Signal implements the security and privacy protocols right from the start, Telegram separates the two and offers an additional option. The problem is that not everyone is aware of the Secret Chat option and first-time users may send sensitive information in the regular chat window unknowingly.
    1. They face huge challenges,

      No shit. Just think of all the literacy modalities that someone younger has to deal with. Memes. Data visualizations. Tweets. Tiktok vids. Instagram stories. Digital annotation. Video annotation. YouTubes. Akkkk. Emojis. Gifs. Think of all the lateral communication modalities written, read, spoken that our students face daily. And the success with which most of them navigate these...well, it is extraordinary.

  4. May 2020
    1. Contact Big and successful businesses are built on a talented workforce this is not just a saying but a solid fact. Hiring an employee is one of the most important tasks for a business and it becomes even more critical when it comes to hiring the right employee.  From Mark Zuckerberg to Richard Brandson every billionaire has similar thoughts when it comes to building the team and every one of them has one thing in common, they always seek quality, punctuality, and skills in an employee. Hiring an employee could be challenging also it may seem like a play of fate and this is a very common feeling but, having a guide or tips on how to hire the right employee could help you in tons. So, here is the list of 7 best tips on hiring the right employee. Make a Plan No matter what you do, planning is the very first step when it comes to achieving a goal. A written plan which contains essential components of the hiring like job descriptions, a skill required, Pay grade, timing, etc. is needed to hire a person. The plan that you make for hiring must contain various details regarding the requirement of the job. The details that would want to add in the plan is as follows-  Title  The post or title of the job that you’re looking for should also be given clearly. Someone who’s educated enough to be a CEO wouldn’t want to be a normal worker. Hence, the specifications of the position while looking for a new candidate should be clear.  Pay Grade  For hiring the new employees, you should first and foremost be true about the pay grade. Pay grades facilitate the employment process by providing a fixed framework of salary ranges, as opposed to a free negotiation. So, you should just align with the grading system to let your company work smoothly.  Reporting Person Reporting Person means the person who prepares reports on updates, progresses, accomplishments, etc. of the employees as well as the company in total. While hiring new employees, you should first submit their resumes to this person so that he can well-prepare a report and it gets easier for you to decide.  Timings You should also clearly mention the shift timings while looking out or hiring new employees. The working hours, the holidays, the relaxations should be clearly told to them and see if they can work with it or not.  Department Name You should also clearly defined the department for which you’re trying to hire the new employees. Human resource departments are often organized along with functions and may be hierarchical in nature. Common units in human resource departments include recruiting, training and development, compensation and benefits administration, health and safety, and employee and labor relations.  Job Summary, Purpose/Value A job summary is a brief, general statement regarding the important functions and responsibilities that comes with a job. Job summaries hold a huge role in enticing a qualified candidate to apply for the position and an employee’s performance of his or her responsibilities.  Challenges With a job, comes its challenges. So you should explain the kind of challenges that your newly appointed employee is going to face and mentally prepare. If your plan contains details like these then it becomes easy for you to post job requirements on job portals as well so, having a written plan on the hiring process is very important. Internal Job Rotation When we talk about hiring, we always think about finding a new person and use his services but, internal job rotation is something that no one thinks of and in certain conditions the best choice. If someone from your Department “A” has skills and talent to handle Department “B” then why not promote him/her to department “B”. There are many reasons why internal job rotation is better than hiring a new person, but to name a few- employee retention encourages development, eliminates boredom, and much more. Culture Fit If you want to hire the right employee, you need to make sure that they’ll fit in the company culture, your team, as well as the job. The best way to do that is by setting up a good interview panel. The interview panel is the one who asks questions and reviews the profile of the person to be hired. So asking a few cultural questions, liking, interest, hobbies, etc. helps the interview panel in deciding whether they’ll be a good match for our business or not. Go Beyond the Resumes Resumes are the best-foot-forward of a person. You need to go beyond that. A resume contains a person’s experiences, education, the last job is done, and much more but a person is much more than a piece of paper so, analyzing a person on the bases of personality, attitude, and style of speaking should also be analyzed thoroughly. Background reference Background reference is a very critical part of the hiring process. It is done to ensure that whoever you are hiring has a clean record. You can use the information provided by the employee like aadhaar card, social security number, etc. we can identify whether the person seeking a job is criminal or not. You can get police verification done along with enquiring with the previous employer. Competency Mapping Competency mapping is a process of identifying the competencies of an employee based on education and skills. When a person does a job basically he is using his skills and experiences in the job to get a favorable outcome. As a business manager or CEO, your job is to help your employee in bringing the best out of them and that can be easily done by working on their skills, education, and experience. Many business hire special corporate training specialists to train their employees and motivate them to achieve a better result in the job they do. When you are hiring a person it becomes hard for you to identify the competency of a person, at such situations you need to look at their previous work, question them on technical grounds, and watch their skill in action by conducting a test. Choose a Good Employment Agency Many small businesses often hire an employment agency to make their recruitment easy but they often miss out on key information on identifying a good employment agency. Basically, there are three types of recruitment agencies which are as follows- General Recruitment AgencyStaff Recruitment AgencyExecutive Recruitment AgencyAll in one agency Genera Recruiting Agency helps you find industry-based staff meaning this agency focuses on a niche industry like healthcare, engineering, etc. A staff recruitment agency is focused on temporary staffing solutions, this type of recruiting is done for seasonal businesses or project-based hiring. Executive Recruitment Agency is the agency that helps businesses in recruiting in executive positions like CEO, CFO, and Managers, etc. You can categorize the top-level position to C-level positions in this type of recruiting. As the name suggests, All in one recruitment agency is the agency that provides all these services like Yunic Solutions, We provide multiple recruitment services in every industry. After selecting the type of agency, you can decide your budget and go about researching the best recruitment agencies. Hiring the right employee in a nutshell Hiring the right employee is all about the experience. For some people, the first employee could be the right employee and for some people no employee is the right employee.But in general, Hiring is a core HR process that is essential for business and requires dedicated time and effort.

      Hiring the right employee is very important for any business. You can use these 7 tips on hiring the right employee to ensure you get the best quality team.

    1. The Map is Not the Terrain

      As George Box said, "All models are false, some are useful." Understanding the importance and value of mental models is vital, but it must be balanced with an understanding that they are, at best, an approximate representation of reality, not reality itself - the map is not the terrain

    1. idea hangers

      Another analogy is thinking of the latticework as a skeleton. The skeleton serves as a strong framework which our muscles, ligaments, and tendons hang and attach. Weak skeleton = weak body and, similarly, weak latticework = weak understanding. Just like our body, we need to train in order to make our skeleton strong, flexible, robust. The Latticework requires the same dedication but will result in a robust method of thinking and understanding.

    1. What I think we're lacking is proper tooling, or at least the knowledge of it. I don't know what most people use to write Git commits, but concepts like interactive staging, rebasing, squashing, and fixup commits are very daunting with Git on the CLI, unless you know really well what you're doing. We should do a better job at learning people how to use tools like Git Tower (to give just one example) to rewrite Git history, and to produce nice Git commits.
    1. "linked data" can and should be a very general term referring to any structured data that is interlinked/interconnected.

      It looks like most of this article describes it in that general sense, but sometimes it talks about URIs and such as if they are a necessary attribute of linked data, when that would only apply to Web-connected linked data. What about, for example, linked data that links to each other through some other convention such as just a "type" and "ID"? Maybe that shouldn't be considered linked data if it is too locally scoped? But that topic and distinction should be explored/discussed further...

      I love its application to web technologies, but I wish there were a distinct term for that application ("linked web data"?) so it could be clearer from reading the word whether you meant general case or not. May not be a problem in practice. We shall see.

      Granted/hopefully most use of linked data is in the context of the Web, so that the links are universal / globally scoped, etc.

    1. Thickness of the neck

      However you represent the head, whether it is relatively simply yet characteristic, or incredibly refined, you can now identify the start of the neck from the chin. The digastric plane is the bottom plane, it gives the head thickness. It will be useful when drawing the head from other angles - the biggest hurdles is working in a flat 2d plane while seeking to depict volume.

      The gesture from the chin to the bottom of the neck is curved and downward. It is better to make the neck a little too long than too short. You then come from the bottom of the skull, the key here will be not to make the back of the neck too skinny.

      Notice that the neck starts very low in the front and very high in the back. Think of your shirt collars, it sits high in the back and low at the front.

    1. In the context of first-order logic, a distinction is maintained between logical validities, sentences that are true in every model, and tautologies, which are a proper subset of the first-order logical validities. In the context of propositional logic, these two terms coincide.

      A distinction is made between the kind of logic (first-order logic) where this other distinction exists and propositional logic, where the distinction doesn't exist (the two terms coincide in that context).

    1. Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.

      Answers the question I had above: https://hyp.is/tpgdQo_4EeqPcm-PI0G2jA/www.iubenda.com/en/help/5640-email-newsletter-compliance-guide

    1. In the absence of an adequacy decision pursuant to Article 45(3), or of appropriate safeguards pursuant to Article 46, including binding corporate rules, a transfer or a set of transfers of personal data to a third country or an international organisation shall take place only on one of the following conditions:

      These conditions are individually sufficient and jointly necessary (https://hyp.is/e0RRFJCfEeqwuR_MillmPA/en.wikipedia.org/wiki/Necessity_and_sufficiency).

      Each of the conditions listed is a sufficient (but, by itself, not necessary) condition for legal transfer (T) of personal data to a third country or an international organisation. In other words, if any of those conditions is true, then legal transfer is also true.

      On the other hand, the list of conditions (C; let C be the disjunction of the conditions a-g: a or b or c ...) are jointly necessary for legal transfer (T) to be true. That is:

      • T cannot be true unless C (one of a or b or c ...) is true
      • if C is false (there is not one of a or b or c ... that is true), then T is false
      • T ⇒ C
      • C ⇐ T
    1. generic-sounding term may be interpreted as something more specific than intended: I want to be able to use "data interchange" in the most general sense. But if people interpret it to mean this specific standard/protocol/whatever, I may be misunderstood.

      The definition given here

      is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.

      limits it to things that were previously communicated on paper. But what about things for which paper was never used, like the interchange of consent and consent receipts for GDPR/privacy law compliance, etc.?

      The term should be allowed to be used just as well for newer technologies/processes that had no previous roots in paper technologies.

    1. it buys, receives, sells, or shares the personal information of 50,000 or more consumers annually for the business’ commercial purposes. Since IP addresses fall under what is considered personal data — and “commercial purposes” simply means to advance commercial or economic interests — it is likely that any website with at least 50k unique visits per year from California falls within this scope.
    1. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.