7,345 Matching Annotations
  1. May 2020
    1. Keeping comprehensive records that include a user ID and the data submitted together with a timestamp. You also keep a copy of the version of the data-capture form and any other relevant documents in use on that date.
    2. they’ve contested its accuracy
    3. Territorial point of view
    1. the data subject has explicitly consented to the proposed transfer, after having been informed of the possible risks of such transfers for the data subject due to the absence of an adequacy decision and appropriate safeguards;
    2. In the absence of an adequacy decision pursuant to Article 45(3), or of appropriate safeguards pursuant to Article 46, including binding corporate rules, a transfer or a set of transfers of personal data to a third country or an international organisation shall take place only on one of the following conditions:

      These conditions are individually sufficient and jointly necessary (https://hyp.is/e0RRFJCfEeqwuR_MillmPA/en.wikipedia.org/wiki/Necessity_and_sufficiency).

      Each of the conditions listed is a sufficient (but, by itself, not necessary) condition for legal transfer (T) of personal data to a third country or an international organisation. In other words, if any of those conditions is true, then legal transfer is also true.

      On the other hand, the list of conditions (C; let C be the disjunction of the conditions a-g: a or b or c ...) are jointly necessary for legal transfer (T) to be true. That is:

      • T cannot be true unless C (one of a or b or c ...) is true
      • if C is false (there is not one of a or b or c ... that is true), then T is false
      • T ⇒ C
      • C ⇐ T
    1. generic-sounding term may be interpreted as something more specific than intended: I want to be able to use "data interchange" in the most general sense. But if people interpret it to mean this specific standard/protocol/whatever, I may be misunderstood.

      The definition given here

      is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.

      limits it to things that were previously communicated on paper. But what about things for which paper was never used, like the interchange of consent and consent receipts for GDPR/privacy law compliance, etc.?

      The term should be allowed to be used just as well for newer technologies/processes that had no previous roots in paper technologies.

    1. it has been inferred by many that the validity of consent could degrade over time
    2. Where a processing activity is necessary for the performance of a contract.

      Would a terms of service agreement be considered a contract in this case? So can you just make your terms of service basically include consent or implied consent?

    3. “Is consent really the most appropriate legal basis for this processing activity?” It should be taken into account that consent may not be the best choice in the following situations:
    1. EU law prohibits the personal data of EU citizens from being transferred outside the EU to countries which do not ensure an adequate level of protection for that data.
    2. This framework serves the purpose of protecting Europeans’ personal data after the transfer to the US and correlates with GDPR requirements for Cross Boarder Data Transfers.
    1. Though not always legally required, terms & conditions (also called ToS – terms of service, terms of use, or EULA – end user license agreement) are pragmatically required
    2. It’s useful to remember that under GDPR regulations consent is not the ONLY reason that an organization can process user data; it is only one of the “Lawful Bases”, therefore companies can apply other lawful (within the scope of GDPR) bases for data processing activity. However, there will always be data processing activities where consent is the only or best option.
    1. If you’re a controller based outside of the EU, you’re transferring personal data outside of the EU each time you collect data of users based within the EU. Please make sure you do so according to one of the legal bases for transfer.

      Here they equate collection of personal data with transfer of personal data. But this is not very intuitive: I usually think of collection of data and transfer of data as rather different activities. It would be if we collected the data on a server in EU and then transferred all that data (via some internal process) to a server in US.

      But I guess when you collect the data over the Internet from a user in a different country, the data is technically being transferred directly to your server in the US. But who is doing the transfer? I would argue that it is not me who is transferring it; it is the user who transmitted/sent the data to my app. I'm collecting it from them, but not transferring it. Collecting seems like more of a passive activity, while transfer seems like a more active activity (maybe not if it's all automated).

      So if these terms are equivalent, then they should replace all instances of "transfer" with "collect". That would make it much clearer and harder to mistakenly assume this doesn't apply to oneself. Or if there is a nuanced difference between the two activities, then the differences should be explained, such as examples of when collection may occur without transfer occurring.

    1. Though not always legally required, a Terms & Conditions (T&C) document (also known as a Terms of Service, End-user license agreement or a Terms of Use agreement) is often necessary for the sake of practicality and safety. It allows you to regulate the contractual relationship between you and your users and is therefore essential for, among other things, setting the terms of use and protecting you from potential liabilities.
    2. For this reason, it’s always advisable that you approach your data processing activities with the strictest applicable regulations in mind.
    3. Meet specific requirements if transferring data outside of the EAA. The GDPR permits data transfers of EU resident data outside of the European Economic Area (EEA) only when in compliance with set conditions.
    1. the GDPR restricts transfers of personal data outside the EEA, or the protection of the GDPR, unless the rights of the individuals in respect of their personal data is protected in another way
    1. it buys, receives, sells, or shares the personal information of 50,000 or more consumers annually for the business’ commercial purposes. Since IP addresses fall under what is considered personal data — and “commercial purposes” simply means to advance commercial or economic interests — it is likely that any website with at least 50k unique visits per year from California falls within this scope.
    1. What I don't like is how they've killed so many useful extensions without any sane method of overriding their decisions.
    2. I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
    3. The only reason why your workaround isn't blocked as well is because it has additional steps that don't explicitly breach Mozilla's policies. But it certainly defeats the spirit of it.
    4. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
    5. They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
    6. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    7. I will need to find a workaround for one of my private extensions that controls devices in my home network, and its source code cannot be uploaded to Mozilla because of my and my family's privacy.
    1. potentially dangerous APIs may only be used in ways that are demonstrably safe, and code within add-ons that cannot be verified as behaving safely and correctly may need to be refactored
    2. If the add-on is a fork of another add-on, the name must clearly distinguish it from the original and provide a significant difference in functionality and/or code.
    1. Apparently Firefox does have translation built-in, it's just not enabled due to lack of usage agreement / API keys. https://hg.mozilla.org/mozilla-central/rev/a3eb8e502006
    2. Thank you for letting me know about this move by Google. Definitely something to watch. While I agree with Google's position from an end user experience perspective, it unfortunately puts Firefox at a further disadvantage since Mozilla does not have its own language translation initiatives.
    3. Mozilla does not permit extensions distributed through https://addons.mozilla.org/ to load external scripts. Mozilla does allow extensions to be externally distributed, but https://addons.mozilla.org/ is how most people discover extensions. The are still concerns: Google and Microsoft do not grant permission for others to distribute their "widget" scripts. Google's and Microsoft's "widget" scripts are minified. This prevents Mozilla's reviewers from being able to easily evaluate the code that is being distributed. Mozilla can reject an extension for this. Even if an extension author self-distributes, Mozilla can request the source code for the extension and halt its distribution for the same reason.

      Maybe not technically a catch-22/chicken-and-egg problem, but what is a better name for this logical/dependency problem?

  2. Apr 2020
    1. We believe that being open source is one of the most important features of Bitwarden. Source code transparency is an absolute requirement for security solutions like Bitwarden.
    1. The common law—so named because it was "common" to all the king's courts across England—originated in the practices of the courts of the English kings in the centuries following the Norman Conquest in 1066.[10] The British Empire spread the English legal system to its colonies, many of which retain the common law system today. These "common law systems" are legal systems that give great weight to judicial precedent, and to the style of reasoning inherited from the English legal system.
    1. The data protection officer’s duty is to protect customers’ data, even if that protection goes against other business objectives, meaning there are often different rules on how the executive can be disciplined or dismissed, she said.
    1. the cost of reading consent formats or privacy notices is still too high.
    2. Third, the focus should be centered on improving transparency rather than requesting systematic consents. Lack of transparency and clarity doesn’t allow informed and unambiguous consent (in particular, where privacy policies are lengthy, complex, vague and difficult to navigate). This ambiguity creates a risk of invalidating the consent.

      systematic consents

    3. U.K. Information Commissioner Elizabeth Denham clearly states that consent is not the "silver bullet" for GDPR compliance. In many instances, consent will not be the most appropriate ground — for example, when the processing is based on a legal obligation or when the organization has a legitimate interest in processing personal data.
    4. data processing limited to purposes deemed reasonable and appropriate such as commercial interests, individual interests or societal benefits with minimal privacy impact could be exempt from formal consent. The individual will always retain the right to object to the processing of any personal data at any time, subject to legal or contractual restrictions.
    5. organizations may require consent from individuals where the processing of personal data is likely to result in a risk or high risk to the rights and freedoms of individuals or in the case of automated individual decision-making and profiling. Formal consent could as well be justified where the processing requires sharing of personal data with third parties, international data transfers, or where the organization processes special categories of personal data or personal data from minors.
    6. First, organizations must identify the lawful basis for processing prior to the collection of personal data. Under the GDPR, consent is one basis for processing; there are other alternatives. They may be more appropriate options.
    7. Furthermore, the consent-based regime creates an obligation to document that consent was lawfully given.
    8. the authority found that each digital platform’s privacy policies, which include the consent format, were between 2,500 and 4,500 words and would take an average reader between 10 and 20 minutes to read.
    1. While Web site is still doing well in the U.S., it is all but dead in the U.K. Current Google News searches limited to U.K. publications find only about one instance of Web site (or web site) for every thousand instances of website. The ratio is similar in Australian and New Zealand publications. In Canada, the ratio is somewhere in the middle—about 20 to one in favor of the one-word form.
    2. Exceptions are easily found, however, especially in American sources, where Web site (or web site, without the capital w) appears about once for every six instances of website. This is likely due to the influence of the New York Times, which is notoriously conservative with tech terms. The Times still uses Web site, and many American publications follow suit. Yet even those that often use Web site in their more closely edited sections tend to allow website in their blogs and other web-only sections.
    1. English tends to build new compound nouns by simply writing them as separate words with a blank. Once the compound is established (and the original parts somewhat "forgotten"), it's often written as one word or hyphenated. (Examples: shoelaces, aircraft...)
    2. Web site / website seems to be somewhat in a transitional stage, being seen as an "entity" that web page hasn't reached yet. Depending on which dictionary you check you will find web site and website, but only web page, not webpage.
    3. Other languages, German for example, are notorious for very long compunds like this and this, that are made up and written as one word directly. Perhaps the way your native language deals with compounds explains your (or other authors') personal preference and sense of "right"?
    1. A left navigation is faster and more efficient for users to scan. In just three visual fixations, users scan six items in the left navigation compared to the three items scanned in the top navigation. The left navigation also facilitates a vertical scanning direction that is natural for people
    2. Because users read items from left to right, the priority direction for reading items is stronger horizontally than vertically.
    3. Items in a top navigation do not have equal weight. The leftmost items carry more visual weight than other items because of its placement in the primary optical area (top left). Items in the top left area get more exposure and are often seen as more important than other items.
    4. you will have certain items with higher priority than others. Because the user’s topic of interest is more limited in this context, placing items in a top navigation allows users to find what they want faster and easier.
    1. In informal contexts, mathematicians often use the word modulo (or simply "mod") for similar purposes, as in "modulo isomorphism".
    1. It’s true that there are two hard problems in computer science and one of them is naming things. Why? Because good names are important. A good name teaches about purpose and responsibility, so you have to spend some time thinking about it.
    1. Competition exists when there is comparison, and comparison does not bring about excellence.

      Disagree. It does once you master the "Inner Game" the way John Galway explains it. Competition then is your ally to find the best version of yourself. To do things you did not think you could because your opponent helped you bring this out of you. And so it is in Aikido and value of a good opponent.

    1. This has a usability impact. From a purely "secure all the things" standpoint, you should absolutely take the above approach but there will inevitably be organisations that are reluctant to potentially lose the registration as a result of pushing back
    2. I'm providing this data in a way that will not disadvantage those who used the passwords I'm providing.
    3. As such, they're not in clear text and whilst I appreciate that will mean some use cases aren't feasible, protecting the individuals still using these passwords is the first priority.
    1. Before we get to passwords, surely you already have in mind that Google knows everything about you. It knows what websites you’ve visited, it knows where you’ve been in the real world thanks to Android and Google Maps, it knows who your friends are thanks to Google Photos. All of that information is readily available if you log in to your Google account. You already have good reason to treat the password for your Google account as if it’s a state secret.
    2. You already have good reason to treat the password for your Google account as if it’s a state secret. But now the stakes are higher. You’re trusting Google with the passwords that protect the rest of your life – your bank, your shopping, your travel, your private life. If someone learns or guesses your Google account password, you are completely compromised. The password has to be complex and unique. You have to treat your Google account password with the same care as a LastPass user. Perhaps more so, because it’s easier to reset a Google account password. If your passwords are saved in Chrome, you should strongly consider using two-factor authentication to log into your Google account. I’ll talk about that in the next article.
    1. Less than 1% of users in the world have Javascript turned off. So honestly, it's not worth anyones time accommodating for such a small audience when a large majority of websites rely on Javascript. Been developing websites for a very long time now, and 100% of my sites use Javascript and rely on it heavily. If users have Javascript turned off, that's their own problem and choice, not mine. They'll be unable to visit or use at least 90% of websites online with it turned off.
    1. One of the drawbacks of waiting until someone signs in again to check their password is that a user may simply stay signed in for a long time without signing out. I suppose that could be an argument in favor of limiting the maximum duration of a session or remember-me token, but as far as user experience, I always find it annoying when I was signed in and a website arbitrarily signs me out without telling me why.
    1. Q. I would like a copy of my data from a breach, can you please send it to me? A. No, I cannot Q. I have a breach I would like to give you in exchange for “your” breach, can you please send it to me? A. No, I cannot Q. I’m a security researcher who wants to do some analysis on the breach, can you please send it to me? A. No, I cannot Q. I’m making a searchable database of breaches; can you please send it to me? A. No, I cannot Q. I have another reason for wanting the data not already covered above, can you please send it to me? A. No, I cannot
    1. The tyranny of the majority (or tyranny of the masses) is an inherent weakness to majority rule in which the majority of an electorate pursues exclusively its own interests at the expense of those in the minority. This results in oppression of minority groups comparable to that of a tyrant or despot
    1. Direct democracy was not what the framers of the United States Constitution envisioned for the nation. They saw a danger in tyranny of the majority. As a result, they advocated a representative democracy in the form of a constitutional republic over a direct democracy. For example, James Madison, in Federalist No. 10, advocates a constitutional republic over direct democracy precisely to protect the individual from the will of the majority
    2. Those who hold and those who are without property have ever formed distinct interests in society. Those who are creditors, and those who are debtors, fall under a like discrimination. A landed interest, a manufacturing interest, a mercantile interest, a moneyed interest, with many lesser interests, grow up of necessity in civilized nations, and divide them into different classes, actuated by different sentiments and views. The regulation of these various and interfering interests forms the principal task of modern legislation, and involves the spirit of party and faction in the necessary and ordinary operations of the government.
    1. But recent events have made me question the prudence of releasing this information, even for research purposes. The arrest and aggressive prosecution of Barrett Brown had a marked chilling effect on both journalists and security researchers.
    2. At Brown’s sentencing, Judge Lindsay was quoted as saying “What took place is not going to chill any 1st Amendment expression by Journalists.” But he was so wrong. Brown’s arrest and prosecution had a substantial chilling effect on journalism. Some journalists have simply stopped reporting on hacks from fear of retribution and others who still do are forced to employ extraordinary measures to protect themselves from prosecution.
    3. Having said all that, I think this is completely absurd that I have to write an entire article justifying the release of this data out of fear of prosecution or legal harassment. I had wanted to write an article about the data itself but I will have to do that later because I had to write this lame thing trying to convince the FBI not to raid me.
    4. I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us.
    5. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    6. This principle equally applies to the laws of our country; we should never violate basic rights even if the consequences aren’t immediately evident.
    1. Google figures that since it has a big (encrypted) database of all your passwords, it might as well compare them against a 4-billion-strong public list of compromised usernames and passwords that have been exposed in innumerable security breaches over the years. Any time Google hits a match, it notifies you that a specific set of credentials is public and unsafe and that you should probably change the password.
    1. If you force people to frequently change their passwords, they will use bad passwords.
    2. Stop forcing users to change their passwords every 30, 60, or 90 days, and stop forcing users to include a mixture of uppercase, lowercase, and special charactersForcing users to change their passwords should only happen if there is reason to believe an organization has been breached, or if a new third-party data breach affects employees or users.
    1. And most important: No proprietary encryption software can be fully trusted
    2. If you are concerned about privacy and looking for a bullet-proof solution then the only way to go is open-source software. For example, there was another incident with a proprietary file "encrypter" for Android/iOS which used the simplest possible "encryption" on earth: XORing of data that is as easy to crack a monkey could do that. Would not happen to an open-source software. If you're worried about the mobile app not being as reliable (backdoors etc.) as the desktop app: compile it yourself from sources. https/github.com/MiniKeePass/MiniKeePass You can also compile the desktop version yourself. Honestly, I doubt most people, including you and me, will bother.
    1. The data is stored in log files to ensure the functionality of the website. In addition, the data serves us to optimize the website and to ensure the security of our information technology systems. An evaluation of the data for marketing purposes does not take place in this context. The legal basis for the temporary storage of the data and the log files is Art. 6 para. 1 lit. f GDPR. Our legitimate interests lie in the above-mentioned purposes.
    2. The temporary storage of the IP address by the system is necessary to enable the website to be delivered to the user's computer. For this the IP address of the user must remain stored for the duration of the session.
    3. The legal basis for the processing of personal data using cookies is Art. 6 para. 1 lit. f GDPR. Our legitimate interests lie in the above-mentioned purposes.
    1. Devise-Two-Factor only worries about the backend, leaving the details of the integration up to you. This means that you're responsible for building the UI that drives the gem. While there is an example Rails application included in the gem, it is important to remember that this gem is intentionally very open-ended, and you should build a user experience which fits your individual application.
    1. In mainstream press, the word "hacker" is often used to refer to a malicious security cracker. There is a classic definition of the term "hacker", arising from its first documented uses related to information technologies at MIT, that is at odds with the way the term is usually used by journalists. The inheritors of the technical tradition of the word "hacker" as it was used at MIT sometimes take offense at the sloppy use of the term by journalists and others who are influenced by journalistic inaccuracy.
    2. there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"
    3. terms like "malicious security cracker" are sufficiently evocative and clear that their use actually helps make communication more effective than the common journalistic misuse of "hacker".
    1. Now, if we think of the tasks that we perform throughout the day as consuming separate "bands" of time, then the term makes perfect sense. Being "out of bandwidth" would indicate that you do not have enough unallocated "bands of time" in your day to complete the task. Using the term bandwidth to describe time maps more closely (in my opinion) to the original definition, than the current definition describing data capacity does.
    2. I may be living in a bubble, but my impression is that don't understand that figurative use of bandwidth are way out of the loop.
    1. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    1. Well, as a home user, I also belong to an investment club with 10 members. I also have a medium size family who I like to send photo's to, and my son is on a soccer team. all those have greater than 5 people on the list. sooooooooo..... once again, the people with valid use of the internet have to 'deal' with those that abuse it.
    1. The point is that users should be in control of their data, which means they need an easy way of accessing it. Providing an API or the ability to download 5,000 photos one at a time doesn't exactly make it easy for your average user to move data in or out of a product.
    2. It's typically a lot easier for software engineers to pull data out of a service that they use than it is for regular users. If APIs are available, we engineers can cobble together a program to pull our data out. Without APIs, we can even whip up a screen scraper to get a copy of the data. Unfortunately, for most users this is not an option, and they're often left wondering if they can get their data out at all.
    1. 1Password wasn’t built in a vacuum. It was developed on top of open standards that anyone with the right skills can investigate, implement, and improve. Open tools are trusted, proven, and constantly getting better. Here’s how 1Password respects the principles behind the open tools on which it relies:

      I found it ironic that this proprietary software that I have avoided using because it is proprietary software is touting the importance of open tools.

    1. Steroids used after the first 3 to 4 days after injury do not affect wound healing as severely as when they are used in the immediate postoperative period.
    2. The major effect of steroids is to inhibit the inflammatory phase of wound healing (angiogenesis, neutrophil and macrophage migration, and fibroblast proliferation) and the release of lysosomal enzymes
    3. Large doses or chronic usage of glucocorticoids reduce collagen synthesis and wound strength
    4. HBOT was found to improve graft survival, complete healing of grafts, and lessen infection in patients with a graft
    5. Chronic wounds have a decreased oxygen supply, and for a long time lack of oxygen was recognized as a potential cause of delayed healing.
    6. Oxygen is required for almost all steps of wound healing and is also an important factor in the body’s defense against bacterial infection
    7. In addition to its role in healing, oxygen plays an essential role in the production of reactive oxygen species such as superoxide that are angiogenesis stimulators and are bacteriostatic
    8. At present, only platelet-derived growth factor BB (PDGF-BB) is currently approved by the FDA for treatment of diabetic foot ulcers. Application of recombinant human PDGF-BB in a gel suspension to these wounds increases the incidence of total healing and decreases healing time.
    9. Bioengineered skin substitutes have evolved from keratinocyte monolayers to dermal equivalents to split-thickness products with a pseudo-epidermis, and most recently, to products containing both epidermal and dermal components that resemble the three-dimensional structure and function of normal skin (see Table 9-11). Indicated for use with standard compression therapy in the treatment of venous insufficiency ulcers and for the treatment of neuropathic diabetic foot ulcers, these bilayered skin equivalents also are being used in a variety of wound care settings.
    1. except the one wigged gentleman who looked at the ceiling

      This only emphasizes the fact that literally everybody was looking at him

    2. Now that he had no work to hold, he laid the knuckles of the right hand in the hollow of the left, and then the knuckles of the left hand in the hollow of the right, and then passed a hand across his bearded chin, and so on in regular changes, without a moment's intermission. The task of recalling him from the vagrancy into which he always sank when he had spoken, was like recalling some very weak person from a swoon, or endeavouring, in the hope of some disclosure, to stay the spirit of a fast-dying man. “Did you ask me for my name?” “Assuredly I did.” “One Hundred and Five, North Tower.” “Is that all?” “One Hundred and Five, North Tower.”

      Maybe the shoemaker had forgotten his name from prison?

    3. he women who had left on a door-step the little pot of hot ashes

      does this symbolize something?

    4. rags

      rags is a reoccuring image

    1. Chart of accounts numbering involves setting up the structure of the accounts to be used, as well as assigning specific codes to the different general ledger accounts. The numbering system used is critical to the ways in which financial information is stored and manipulated. The first type of numbering to determine for a chart of accounts involves their structure. This is the layout of an account number, and involves the following components:Division code - This is typically a two-digit code that identifies a specific company division within a multi-division company. It is not used by a single-entity company. The code can be expanded to three digits if there are more than 99 subsidiaries.Department code - This is usually a two-digit code that identifies a specific department within a company, such as the accounting, engineering, or production departments.Account code - This is usually a three digit code that describes the account itself, such as fixed assets, revenue, or supplies expense.For example, a multi-division company with several departments in each company would probably use chart of accounts numbering in this manner: xx-xx-xxxAs another example, a single-division company with multiple departments could dispense with the first two digits, and instead uses the following numbering scheme: xx-xxxAs a final example, a smaller business with no departments at all could just use the three digit code assigned to its accounts, which is: xxxOnce the coding structure is set, the numbering of accounts can take place. This is the three-digit coding referred to previously. A company can use any numbering system that it wants; there is no mandated approach. However, a common coding scheme is as follows:Assets - Account codes 100-199Liabilities - 200-299Equity accounts - 300-399Revenues - 400-499Expenses - 500-599 As a complete example of the preceding outline of numbering, a parent company assigns the "03" designator to one of its subsidiaries, the "07" designator to the engineering department, and "550" to the travel and entertainment expense. This results in the following chart of accounts number:03-07-550
    1. This is a great time to individualize instruction and have students work at different paces. You don’t want 100-120 papers coming at you all at one time. Spread it out, and it will keep you from getting short-tempered with your students.

      As the educational system operates today, many teachers easily put in 60 hours of work per week. But when you teach remotely, it sounds like work becomes much more manageable.

      Do I want to become a teacher? If I can teach like this I do—and no, not because it seems easier but because it seems easier AND more effective.

    2. For my more advanced students, they need to learn research skills: how to locate, evaluate, and use information. Online learning offers great opportunities for that, including with what’s going on in the news right now.

      ...how to function independently in the world too.

    3. Then there is the option of getting students to talk to each other online on discussion boards and videoconferences. Some students adapt to it quickly and like it. Some don’t, because it feels impersonal. You have to be patient with that and give them some time and space to adjust.

      Introverts v extroverts. Oil and water. They've always differed, always will. Maybe this virtual, personalized learning movement will finally allow introverts to stop feeling so defeated in the presence of extroverts who live so much more loudly than they do. Finally, they'll be able to live peacefully in their own mind, undisturbed by the stress of feelings like you need to be more extroverted to fit in.

      Btw: I'm not encouraging each party to distance themselves from each other all the time. What I am saying is that when value is trying to be distributed, distribute it however it'll best be received. Then, later, once teaching time is over, they can socialize in traditional ways... IF that's what they want to do.

    4. Rizga: How have you been translating this online?Moore: It depends on the student. Some students work very well asynchronously. They are very comfortable working alone on a draft; I make color-coded comments in a word document or their PDF, and then I send it back. Some students need me to explain things to them in person before I send them the comments; we’ll do a video or audio chat. Others need even more interaction: I’ll hook them up to a videoconference, and we’ll go through all the comments together. Some students I need to refer to a grammar-brushup program or a YouTube video on how to do some of the mechanical stuff like uploading papers online.

      Sounds like Mrs. Moore deserves a raise! This woman knows what's up! She represents the future while living in a community that (probably) latches on to tradition.

      Any of you big city school systems reading this? If you are, hire her. You can probably pay her less than what your other teachers are earning and still give her a bump in pay compared to what she's earning in Mississippi.

    5. The other big issue is that many of the teachers don’t have the skills to teach online.

      Sorry, but this begs the question...

      Should teachers who don't have the skills to teach online be teaching at all? If they can't, they're either not qualified for the job or they're unwilling to put in the effort required to learn.

    6. We are in the midst of the most sweeping education experiment in history. The coronavirus pandemic has forced the majority of the U.S.’s 3.6 million educators to find ways to teach without what most of them consider the core part of their craft—the daily face-to-face interactions that help them elicit a child’s burning desire to investigate something; detect confusion or a lack of engagement; and find the right approach, based on a student’s body language and participation in the classroom, to help students work through their challenges.

      There's a reason education fails so often: teachers teach students as if they all have identical interests and learning styles.

      There's no such thing as a one-size-fits all solution to any problem. Everyone knows that. Even dumb people do. Yet there are our educators, the people we're supposed to depend on to set the table for our lives, to show us what's important, what we she commit to memory for the rest of our life or else that life's gonna die having led a dumb life, because you didn't do what you were told to do way back when: understand everything the teacher told you to understand, yeah, even if you didn't give a fuck about what's coming out of her mouth. Learn that shit anyway.

      Oh, and learn it how I say you should learn it too. Sit in that seat, lock your eyes on me, and take notes at a speed that's equal to or faster than the rate of my speech... just like all the students around you are (trying) to do... because everyone learns new information in the same way... right?

    7. Then, you have to think about accessibility issues. How will my vision-impaired and deaf students access it? Have I put everything in print? Do I have to put in some audio? There are whole series of checks you have to do for different access issues.

      Sure, new problems will surface. But so will solutions. And hopefully, in the end, there will be fewer problems using the new approach than the old.

    1. The result, all too often, is that we decide (often unconsciously) that the sweeping change just isn't worth it, and leave the undesirable pattern untouched for future versions of ourselves and others to grumble about, while the pattern grows more and more endemic to the code base.
    1. Patients at risk for an esophageal injury should undergo bedside esophagoscopy or soluble contrast esophagography followed by barium examination to look for extravasation of contrast
    2. Widening of the mediastinum on initial anteroposterior chest radiograph, caused by a hematoma around an injured vessel that is contained by the mediastinal pleura, suggests an injury of the great vessels.
    3. Because complete typing and cross-matching takes up to 45 minutes, patients requiring emergent transfusions are given type O-negative RBCs.

      Emergent patients are given O blood group

    4. In either scenario, a massive hemothorax is an indication for operative intervention, but tube thoracostomy is critical to facilitate lung reexpansion, which may improve oxygenation and cardiac performance as well as tamponade venous bleeding.

      improving oxygenation cardiac performance tamponade venous bleeding

    5. Although it may be estimated on chest radiograph, tube thoracostomy is the only reliable means to quantify the amount of hemothorax.
    6. Tangential wounds of the internal jugular vein should be repaired by lateral venorrhaphy, but extensive wounds are efficiently addressed by ligation. However, it is not advisable to ligate both jugular veins due to potential intracranial hypertension.

      for tangential inj of int jugular vein lateral vonorrhaphy is used and for extensive damages, ligation, but not bilaterally to preventing IC HTN.

    7. The typical clinical course of an epidural hematoma is an initial loss of consciousness, a lucid interval, and recurrent loss of consciousness with an ipsilateral fixed and dilated pupil. While decompression of subdural hematomas may be delayed, epidural hematomas require evacuation within 70 minutes.
    8. The partial pressure of carbon dioxide (PCO2) should be maintained in a normal range (35–40 mmHg), but for temporary management of acute intracranial hypertension, inducing cerebral vasoconstriction by hyperventilation to a PCO2 of <30 mmHg is occasionally warranted.
    9. The final stages of this sequence are caused by blood accumulation that forces the temporal lobe medially, with resultant compression of the third cranial nerve and eventually the brain stem.
    10. The goal of resuscitation and management in patients with head injuries is to avoid hypotension (SBP of <100 mmHg) and hypoxia (partial pressure of arterial oxygen of <60 or arterial oxygen saturation of <90%).
    1. Indications for operative treatment of thoracic injuries Initial tube thoracostomy drainage of >1000 mL (penetrating injury) or >1500 mL (blunt injury) Ongoing tube thoracostomy drainage of >200 mL/h for 3 consecutive hours in noncoagulopathic patients Caked hemothorax despite placement of two chest tubes Great vessel injury (endovascular techniques may be used in selected patients) Pericardial tamponade Cardiac herniation Massive air leak from the chest tube with inadequate ventilation Tracheal or main stem bronchial injury diagnosed by endoscopy or imaging Open pneumothorax Esophageal perforation Air embolism

      1000ml drainage (penetrating), >1500mlm (blunt) from tube. >200mL/h for 3h nonstop drainage in noncoagulopathic px. caked hemothorax after two chest tubes.great vessels inj. pericardial tamp. hernia of heart. inadequate ventilation with massive air leak.main stem or tracheal damage (imaginf or endoscopy). open pneumothorax. perforation of esophagus. air embolism

    1. Isthere any way of using these annotations (cryptic jottings,emphasis symbols, underlining and highlighting) in theDocuverse?

      For example, I think one could sum the highlight in each specific section. If many people highlighted a passage, then the highlight color is higher. That way one would be able to discover passages that many people found important/interesting. Although, it may also bias others to do the same. As usual.

    1. Google's move to release location data highlights concerns around privacy. According to Mark Skilton, director of the Artificial Intelligence Innovation Network at Warwick Business School in the UK, Google's decision to use public data "raises a key conflict between the need for mass surveillance to effectively combat the spread of coronavirus and the issues of confidentiality, privacy, and consent concerning any data obtained."
    1. For instance, if an IP address is sent with an ad request (which will be the case with almost any ad request as a consequence of internet protocols), that transmission will not breach any prohibition on sending PII to Google.
    2. Google interprets PII to exclude, for example: pseudonymous cookie IDs pseudonymous advertising IDs IP addresses
    3. data excluded from Google's interpretation of PII may still be considered personal data under the GDPR
  3. Mar 2020
    1. See a full history of user consents and data requests. Use the records to prove your compliance in case of an audit by data protection authorities.
    1. legitimate interest triggers when “processing is necessary for the purposes of the legitimate interests pursued by the controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject
    2. of the six lawful, GDPR-compliant ways companies can get the green light to process individual personal data, consent is the “least preferable.” According to guidelines in Article 29 Working Party from the European Commission, "a controller must always take time to consider whether consent is the appropriate lawful ground for the envisaged processing or whether another ground should be chosen instead." 
    3. “It is unfortunate that a lot of companies are blindly asking for consent when they don’t need it because they have either historically obtained the consent to contact a user,” said digital policy consultant Kristina Podnar. “Or better yet, the company has a lawful basis for contact. Lawful basis is always preferable to consent, so I am uncertain why companies are blindly dismissing that path in favor of consent.”
    1. That outcome, in fact, is why the General Data Protection Regulation has been introduced. GDPR is being billed by the EU as the biggest shake-up of data privacy regulations since the birth of the web, saying it sets new standards in the wake of the recent Facebook data harvesting scandal.
    1. A Portuguese hospital was fined because of inadequate account management practices, such as having five times the number of active accounts than required and giving doctors blanket access to all patient files, irrespective of the doctor's specialty.
    1. These records should include a userid, timestamp, consent proof, record of the consenting action, and the legal documents available to the user at the time of consent, among other things.
    1. when you choose Matomo Cloud, we acknowledge in our Terms that you own all rights, titles, and interest to your users’ data. We obtain no rights from you to your users data. This means we can’t on-sell it to third parties, we can’t claim ownership of it, you can export your data anytime

      Technically impossible for them to sell your data if the data doesn't pass through them at all.

    2. the privacy of your users is respected
    3. The relationship is between the website owner (you) and the visitor, with no external sources looking in
    1. This difference is due to the fact that the Cookie Solution automatically excludes from the counting, the pageviews generated by bots.

      It seems that Google Analytics could/would exclude those as well.

    1. Legitimate interest. When there is a genuine reason for processing personal data without consent. Interpretations of this legal ground may vary, but a good example would be risk assessment or checking children’s age, such as in an online liquor store.
    1. I discuss the flaws of this in regards to spreadsheets in Spreadsheets Are Sabotaging Your Business. In brief, when people inevitably started using the more complex formulas available, they unknowingly broke the fundamental design concept of paper spreadsheets: that humans can understand what’s happening between the cells.