- Jun 2020
-
twitter.com twitter.com
-
Firass Abiad on Twitter: “1.8 Is our #Covid19 situation in 🇱🇧 getting out of control? Several recent observations can help answer this question:” / Twitter. (n.d.). Twitter. Retrieved June 29, 2020, from https://twitter.com/firassabiad/status/1276784177178869762
-
-
psyarxiv.com psyarxiv.com
-
Bieleke, M., Martarelli, C., & Wolff, W. (2020). Boredom makes it difficult, but it helps to have a plan: Investigating adherence to social distancing guidelines during the COVID-19 pandemic. https://doi.org/10.31234/osf.io/enzbv
-
-
www.thelancet.com www.thelancet.com
-
Leung, K., Wu, J. T., Liu, D., & Leung, G. M. (2020). First-wave COVID-19 transmissibility and severity in China outside Hubei after control measures, and second-wave scenario planning: A modelling impact assessment. The Lancet, 0(0). https://doi.org/10.1016/S0140-6736(20)30746-7
-
-
psyarxiv.com psyarxiv.com
-
Yonemitsu, F., Ikeda, A., Yoshimura, N., Sasaki, K., Takashima, K., Qian, K., … Yamada, Y. (2020, May 4). Warning “Don’t spread” vs. “Don’t be a spreader” to prevent the COVID-19 pandemic. https://doi.org/10.31234/osf.io/u4z3e
-
-
roadtolarissa.com roadtolarissa.com
-
You Regress It: Have Masks Prevented 66,000 Infections in New York City? (n.d.). Retrieved June 17, 2020, from https://roadtolarissa.com/regression-discontinuity
-
-
www.newscientist.com www.newscientist.com
-
Bender, M. (2020, June 12). Coronavirus second waves emerge in several US states as they reopen. New Scientist. https://www.newscientist.com/article/2246057-coronavirus-second-waves-emerge-in-several-us-states-as-they-reopen/
-
-
www.iza.org www.iza.org
-
Mitze, T., Kosfeld, R., Rode, J., & Wälde, K. (2020). Face Masks Considerably Reduce COVID-19 Cases in Germany: A Synthetic Control Method Approach (No. 13319). Institute of Labor Economics (IZA).
-
-
www.un.org www.un.org
-
Nations, U. (n.d.). We need to act now to avoid the worst impacts of our efforts to control the pandemic. United Nations; United Nations. Retrieved June 10, 2020, from https://www.un.org/en/coronavirus/we-need-act-now-avoid-worst-impacts-our-efforts-control-pandemic
-
-
-
Tann, W. J.-W., Chang, E.-C., & Hooi, B. (2020). SHADOWCAST: Controlling Network Properties to Explain Graph Generation. ArXiv:2006.03774 [Cs, Stat]. http://arxiv.org/abs/2006.03774
-
-
psyarxiv.com psyarxiv.com
-
Pescetelli, N., Cebrian, M., & Rahwan, I. (2020, February 10). Real-time Internet Control of Situated Human Agents. https://doi.org/10.31234/osf.io/xn7sr
-
-
www.theguardian.com www.theguardian.com
-
Phillips, D. (2020, June 7). Brazil stops releasing Covid-19 death toll and wipes data from official site. The Guardian. https://www.theguardian.com/world/2020/jun/07/brazil-stops-releasing-covid-19-death-toll-and-wipes-data-from-official-site
-
-
jamanetwork.com jamanetwork.com
-
Cheng, H.-Y., Jian, S.-W., Liu, D.-P., Ng, T.-C., Huang, W.-T., Lin, H.-H., & for the Taiwan COVID-19 Outbreak Investigation Team. (2020). Contact Tracing Assessment of COVID-19 Transmission Dynamics in Taiwan and Risk at Different Exposure Periods Before and After Symptom Onset. JAMA Internal Medicine. https://doi.org/10.1001/jamainternmed.2020.2020
-
- May 2020
-
-
Yuan, L. (2020, May 27). Amnesia Nation: Why China Has Forgotten Its Coronavirus Outbreak. The New York Times. https://www.nytimes.com/2020/05/27/business/china-coronavirus-amnesia.html
-
-
coronavirusexplained.ukri.org coronavirusexplained.ukri.org
-
explained, C. the science. (n.d.). Coronavirus: The science explained. Retrieved May 11, 2020, from https://coronavirusexplained.ukri.org/en/
-
-
www.youtube.com www.youtube.com
-
Net-COVID Session3A: Human mobility and control measures in the COVID-19 epidemic by Sam Scarpino. (n.d.). Retrieved April 27, 2020, from https://www.youtube.com/watch?v=BrrGxJT6-iA&feature=youtu.be
-
-
www.sjdm.org www.sjdm.org
-
[Jdm-society] Decision on re-opening economies. (n.d.). Retrieved April 21, 2020, from http://www.sjdm.org/mail-archive/jdm-society/2020-April/008496.html
-
-
psyarxiv.com psyarxiv.com
-
Malik, S. (2020). Knowledge of COVID-19 Symptoms and Prevention among Pakistani Adults: A Cross-sectional Descriptive Study [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/wakmz
-
-
-
The Government of Japan. (2020 March 09). Expert meeting on the novel coronavirus disease control (Summary version). https://www.mhlw.go.jp/content/10900000/000608425.pdf
-
-
twitter.com twitter.com
-
Natalie E. Dean, PhD on Twitter
-
-
www.thelancet.com www.thelancet.com
-
Rybniker, J., & Fätkenheuer, G. (2020). Importance of precise data on SARS-CoV-2 transmission dynamics control. The Lancet Infectious Diseases, S1473309920303595. https://doi.org/10.1016/S1473-3099(20)30359-5
-
-
-
Hodgson, C. (2020, May 13). WHO’s chief scientist offers bleak assessment of challenges ahead. https://www.ft.com/content/69c75de6-9c6b-4bca-b110-2a55296b0875
-
-
en.wikipedia.org en.wikipedia.org
-
Although working together towards a common goal tends to cause an increased feeling of agency, the inflation of control could have many unforeseen consequences.
-
Thinkers have only just begun to empirically explore the many factors that cause a person to feel as though they are in control
-
-
www.thelancet.com www.thelancet.com
-
Jordana, J., & Triviño-Salazar, J. C. (2020). Where are the ECDC and the EU-wide responses in the COVID-19 pandemic? The Lancet, S0140673620311326. https://doi.org/10.1016/S0140-6736(20)31132-6
-
-
www.nature.com www.nature.com
-
Lakens, D. (2020). Pandemic researchers—Recruit your own best critics. Nature, 581(7807), 121–121. https://doi.org/10.1038/d41586-020-01392-8
-
-
www.imperial.ac.uk www.imperial.ac.uk
-
New report models Italy’s potential exit strategy from COVID-19 lockdown (2020 May 05). Imperial News | Imperial College London. https://www.imperial.ac.uk/news/189351/new-report-models-italys-potential-exit/
-
-
www.nejm.org www.nejm.org
-
Arons, M. M., Hatfield, K. M., Reddy, S. C., Kimball, A., James, A., Jacobs, J. R., Taylor, J., Spicer, K., Bardossy, A. C., Oakley, L. P., Tanwar, S., Dyal, J. W., Harney, J., Chisty, Z., Bell, J. M., Methner, M., Paul, P., Carlson, C. M., McLaughlin, H. P., … Jernigan, J. A. (2020). Presymptomatic SARS-CoV-2 Infections and Transmission in a Skilled Nursing Facility. New England Journal of Medicine, NEJMoa2008457. https://doi.org/10.1056/NEJMoa2008457
-
-
medium.com medium.com
-
What is more frightening than being merely watched, though, is being controlled. When Facebook can know us better than our parents with only 150 likes, and better than our spouses with 300 likes, the world appears quite predictable, both for governments and for businesses. And predictability means control.
"Predictability means control"
-
-
epthinktank.eu epthinktank.eu
-
Dumbrava, C. & Sabbati, G. (2020, March 30). The impact of coronavirus on Schengen borders. European Parliamentary Research Service Blog. https://epthinktank.eu/2020/03/30/the-impact-of-coronavirus-on-schengen-borders/
-
-
www.sucesos.pe www.sucesos.pe
-
Las rondas campesinas no solo actúan en la región cajamarquina, sino también en los poblados de las zonas altas de Piura y Lambayeque, donde se han producido escasos casos de contagio, en contraste con las ciudades cercanas al mar donde existen un alarmante número de infectados.
Hipótesis: si existe la presencia de Rondas Campesinas, existe un mayor control social y menos contagiados, lo que no pasa en los territorios donde no existe la presencia de R.C.(Costa Norte).
-
-
developers.google.com developers.google.com
-
Although it can minimize the overhead of third-party tags, it also makes it trivial for anyone with credentials to add costly tags.
-
-
www.iubenda.com www.iubenda.com
-
Consent means offering individuals real choice and control. Genuine consent should put individuals in charge, build trust and engagement, and enhance your reputation.
-
-
www.digitalocean.com www.digitalocean.com
-
What is a better name for this topic than "access control"?
Tags
Annotators
URL
-
-
jamanetwork.com jamanetwork.com
-
Steinbrook, R. (2020). Contact Tracing, Testing, and Control of COVID-19—Learning From Taiwan. JAMA Internal Medicine. https://doi.org/10.1001/jamainternmed.2020.2072
-
-
-
Inglesby, T. V. (2020). Public Health Measures and the Reproduction Number of SARS-CoV-2. JAMA. https://doi.org/10.1001/jama.2020.7878
-
-
-
Kaplan, E. H., & Forman, H. P. (2020). Logistics of Aggressive Community Screening for Coronavirus 2019. JAMA Health Forum, 1(5), e200565–e200565. https://doi.org/10.1001/jamahealthforum.2020.0565
-
-
-
they sought to eliminate data controllers and processors acting without appropriate permission, leaving citizens with no control as their personal data was transferred to third parties and beyond
-
-
kantarainitiative.org kantarainitiative.org
-
“Until CR 1.0 there was no effective privacy standard or requirement for recording consent in a common format and providing people with a receipt they can reuse for data rights. Individuals could not track their consents or monitor how their information was processed or know who to hold accountable in the event of a breach of their privacy,” said Colin Wallis, executive director, Kantara Initiative. “CR 1.0 changes the game. A consent receipt promises to put the power back into the hands of the individual and, together with its supporting API — the consent receipt generator — is an innovative mechanism for businesses to comply with upcoming GDPR requirements. For the first time individuals and organizations will be able to maintain and manage permissions for personal data.”
-
Its purpose is to decrease the reliance on privacy policies and enhance the ability for people to share and control personal information.
-
-
psyarxiv.com psyarxiv.com
-
Mullarkey, M. C., Dobias, M., Sung, J., Shumake, J., Beevers, C. G., & Schleider, J. L. (2020, May 6). A scalable, single session intervention for perceived control over anxiety during COVID-19. https://doi.org/10.31234/osf.io/qp7c2
-
-
-
Kojaku, S., Hébert-Dufresne, L., & Ahn, Y.-Y. (2020). The effectiveness of contact tracing in heterogeneous networks. ArXiv:2005.02362 [Physics, q-Bio]. http://arxiv.org/abs/2005.02362
-
-
arxiv.org arxiv.org
-
Müller, M., Derlet, P. M., Mudry, C., & Aeppli, G. (2020). Using random testing to manage a safe exit from the COVID-19 lockdown. ArXiv:2004.04614 [Cond-Mat, Physics:Physics, q-Bio]. http://arxiv.org/abs/2004.04614
-
-
statmodeling.stat.columbia.edu statmodeling.stat.columbia.edu
-
Statistical Modeling, Causal Inference, and Social Science. (2020 April 22). Blog Post: New analysis of excess coronavirus mortality; also a question about poststratification. https://statmodeling.stat.columbia.edu/2020/04/22/analysis-of-excess-coronavirus-mortality-also-a-question-about-poststratification/
-
-
psyarxiv.com psyarxiv.com
-
Thorneloe, R., Epton, T., Fynn, W., Daly, M., Stanulewicz, N., Kassianos, A., … Hart, J. (2020, April 30). SCOPING REVIEW OF MOBILE PHONE APP UPTAKE AND ENGAGEMENT TO INFORM DIGITAL CONTACT TRACING TOOLS FOR COVID-19. Retrieved from psyarxiv.com/qe9b6
-
- Apr 2020
-
www.cnbc.com www.cnbc.com
-
But now, I think there’s still some lack of clarity from consumers on exactly what they need to do
-
-
psyarxiv.com psyarxiv.com
-
Dai, B., Fu, D., Meng, G., Qi, L., & Liu, X. (2020, April 25). The effects of governmental and individual predictors on COVID-19 protective behaviors in China: a path analysis model. https://doi.org/10.31234/osf.io/hgzj9
-
-
psyarxiv.com psyarxiv.com
-
Wolff, W., Martarelli, C., Schüler, J., & Bieleke, M. (2020, April 17). High boredom proneness and low trait self-control impair adherence to social distancing guidelines during the COVID-19 pandemic. https://doi.org/10.31234/osf.io/jcf95
-
-
psyarxiv.com psyarxiv.com
-
Vijayaraghavan, P., & SINGHAL, D. (2020, April 13). A Descriptive Study of Indian General Public’s Psychological responses during COVID-19 Pandemic Lockdown Period in India. https://doi.org/10.31234/osf.io/jeksn
-
-
psyarxiv.com psyarxiv.com
-
De Brier, N., Stroobants, S., Vandekerckhove, P., & De Buck, E. (2020, April 23). Factors affecting mental health of health care workers during coronavirus disease outbreaks: a rapid systematic review. https://doi.org/10.31234/osf.io/w9uxs
-
-
www.medrxiv.org www.medrxiv.org
-
Keeling, M. J., Hollingsworth, T. D., & Read, J. M. (2020). The Efficacy of Contact Tracing for the Containment of the 2019 Novel Coronavirus (COVID-19). [Preprint]. Public and Global Health. https://doi.org/10.1101/2020.02.14.20023036
-
-
www.economist.com www.economist.com
-
Coronavirus infections have peaked in much of the rich world. (n.d.). The Economist. Retrieved April 27, 2020, from https://www.economist.com/graphic-detail/2020/04/17/coronavirus-infections-have-peaked-in-much-of-the-rich-world?fsrc=scn/tw/te/bl/ed/dailychartcoronavirusinfectionshavepeakedinmuchoftherichworldgraphicdetail
-
-
jamanetwork.com jamanetwork.com
-
Pan, A., Liu, L., Wang, C., Guo, H., Hao, X., Wang, Q., Huang, J., He, N., Yu, H., Lin, X., Wei, S., & Wu, T. (2020). Association of Public Health Interventions With the Epidemiology of the COVID-19 Outbreak in Wuhan, China. JAMA. https://doi.org/10.1001/jama.2020.6130
-
-
arxiv.org arxiv.org
-
Nanni, M., Andrienko, G., Boldrini, C., Bonchi, F., Cattuto, C., Chiaromonte, F., Comandé, G., Conti, M., Coté, M., Dignum, F., Dignum, V., Domingo-Ferrer, J., Giannotti, F., Guidotti, R., Helbing, D., Kertesz, J., Lehmann, S., Lepri, B., Lukowicz, P., … Vespignani, A. (2020). Give more data, awareness and control to individual citizens, and they will help COVID-19 containment. ArXiv:2004.05222 [Cs]. http://arxiv.org/abs/2004.05222
-
-
-
Thornton, J. (2020). Clinicians are leading service reconfiguration to cope with covid-19. BMJ, m1444. https://doi.org/10.1136/bmj.m1444
-
-
www.technologyreview.com www.technologyreview.com
-
Rotman, D. (2020 April 8). Stop covid or save the economy? We can do both. MIT Technology Review. https://www.technologyreview.com/2020/04/08/998785/stop-covid-or-save-the-economy-we-can-do-both/
-
-
-
Oprichting Media Special Interest Group op initiatief ISOC NL «. (n.d.). Retrieved April 9, 2020, from https://isoc.nl/nieuws/oprichting-media-special-interest-group-op-initiatief-isoc-nl/
-
-
blogs.bmj.com blogs.bmj.com
-
Don’t touch the T-Zone—How to block a key pathway to infection with SARS-CoV-2. (2020, April 3). The BMJ. https://blogs.bmj.com/bmj/2020/04/03/dont-touch-the-t-zone-how-to-block-a-key-pathway-to-infection-with-sars-cov-2/
-
-
www.psf.gov.pk www.psf.gov.pk
-
PSF : Competitive Research Program. (n.d.). Retrieved April 9, 2020, from http://www.psf.gov.pk/crp.aspx
-
-
www.cambridge.org www.cambridge.org
Tags
- communication
- outbreak
- preparation
- is:article
- risk
- involvement
- response
- Korea
- control
- diagnosis
- community
- COVID-19
- lang:en
- rule
Annotators
URL
-
-
www.thelancet.com www.thelancet.com
-
Lancet, T. (2020). COVID-19 in the USA: A question of time. The Lancet, 395(10232), 1229. https://doi.org/10.1016/S0140-6736(20)30863-1
-
-
queue.acm.org queue.acm.org
-
Of course, just because your users want a copy of their data doesn't necessarily mean that they're abandoning your product. Many users just feel safer having a local copy of their data as a backup.
Tags
Annotators
URL
-
-
-
Add back the Gemfile.lock We want to every clone of this repository to have a set of dependencies that we are sure will have green tests. We remove the lock in CI to make sure we are always running tests with the latest version.
-
-
en.wikipedia.org en.wikipedia.org
Tags
Annotators
URL
-
-
time.com time.com
-
“By using a mask, even if it doesn’t do a lot, it moves the locus of control to you, away from the virus. It gives the individual a greater sense of control in this otherwise not-controlled situation.”
-
- Mar 2020
-
www.iubenda.com www.iubenda.com
-
you have less direct control as you must rely on the vendor’s adherence to IAB’s guidelines for compliance.
-
Directly blocking the vendor scripts (using another prior blocking method), then executing them only after consent has been collected. This method requires more implementation work and it’s a bit slower in terms of execution time, but it allows personalized ads to be served from the first page view (where consent hasn’t been collected yet) and gives you more direct and solid control in regards to ensuring compliance.
pros:
- allows personalized ads to be served from the first page view (where consent hasn’t been collected yet)
- gives you more direct and solid control in regards to ensuring compliance.
-
-
matomo.org matomo.org
-
Matomo continues to champion the right for people to be in control of their own information.
Tags
Annotators
URL
-
-
matomo.org matomo.org
-
People believe in us for that reason, and we will continue to champion the right for people to be in control of their data.
-
-
www.cdc.gov www.cdc.gov
-
One of the core organizations leading the charge on COVID-19 mitigation.
-
- Dec 2019
-
swiftodoapp.com swiftodoapp.com
-
Your task list is a plain text file, not some proprietary format owned by a company or locked to a specific application.
-
-
zapier.com zapier.com
-
Best to-do list app for taking control of your to-do list
-
-
www.howtogeek.com www.howtogeek.com
-
For example: I wanted a way to add recurring tasks to my list, so I wrote a simple bash script called goodmorning.sh. It uses the command prompt client to quickly add a bunch of tasks to my todo list of choice. I run this script first thing in the morning every workday, and I like it better than any built-in system I’ve found for recurring tasks, because it’s fully under my control.
-
-
stackoverflow.com stackoverflow.com
-
Arguably, the rails-team's choice of raising ArgumentError instead of validation error is correct in the sense that we have full control over what options a user can select from a radio buttons group, or can select over a select field, so if a programmer happens to add a new radio button that has a typo for its value, then it is good to raise an error as it is an application error, and not a user error. However, for APIs, this will not work because we do not have any control anymore on what values get sent to the server.
-
-
stackoverflow.com stackoverflow.com
-
I really dislike the reasoning as stated in the issue listed above. Since the value is coming over the wire, it should be treated the same as a freetext input where the expectation is to validate in the model and not the controller. This is especially true in APIs where the developers have even less of a say as far as expected input coming from form data (for example).
-
- Nov 2019
-
docdrop.org docdrop.org
-
the issues of violence with race and racism inAmerica
Many letters talked about immigration and gun control. I think this is a huge issue the country is facing now and this study reflects the importance of that issue.
-
- Oct 2019
-
github.com github.com
-
setState({isOpen: true}
-
- Aug 2019
-
www.sciencedirect.com www.sciencedirect.com
-
qPCR
no template control has absolutely no amplification!
-
- Jul 2019
-
medicine.wustl.edu medicine.wustl.edu
-
Unplanned pregnancies are a significant problem in the United States. According to a 2012 Brookings Institution report, more than 90 percent of abortions occur due to unintended pregnancy.
This is crucial to realize the importance of this statistic. Up to 90 percent of abortions that occur could be prevented, if we could help lower unintended pregnancies. After doing a lot of research I found that the, about 90 percent of abortions are unintended statistic, is quite accurate and average across America.
-
- May 2019
-
educationpost.org educationpost.org
-
Their responses were consistently related to autonomy, relatedness or competence.
Responses: Control and independence, Relevance, and Ability or Understanding.
-
-
annotatingausten.sfsuenglishdh.net annotatingausten.sfsuenglishdh.net
-
forbearance
"Patient self-control; restraint and tolerance" (OED).
-
- Apr 2019
-
static1.squarespace.com static1.squarespace.com
-
ontrolstherhetoricalresponse
This is also an issue of power.
-
-
www.goodreads.com www.goodreads.com
-
“The brain-disease model takes control over people’s fate out of their own hands and puts doctors and insurance companies in charge of fixing their problems. Over the past three decades psychiatric medications have become a mainstay in our culture, with dubious consequences.”
-
-
marketurbanism.com marketurbanism.com
-
one way that localities could qualify for grants under the Warren bill is by implementing rent stabilization or rent control.
By making sure renters stay where they are and that landlords cannot get market rent for their properties, it will discourage the building of rental units and encourage the selling of existing rental units.
-
-
en.wikipedia.org en.wikipedia.org
-
Wait list control group
-
- Mar 2019
-
www.microbiologyresearch.org www.microbiologyresearch.org
-
-
The fluorescence signal atCT37±7 corre-sponds to the no-template-control andrepresents bacterial DNA contamination inthe commercially supplied reagents.
-
-
faculty.washington.edu faculty.washington.edu
-
Shneiderman's eight golden rules Here is a better presentation than the one I already posted. This is just black and white text and lists the eight rules together with a description of one or two sentences. Printable. Useful. Rating 5/5
-
- Feb 2019
-
static1.squarespace.com static1.squarespace.com
-
e ma
I can't remember who said this (maybe Stephen King?), but they described writing as a form of telepathy for exactly this reason: transferring ideas from one person to another. This idea is dramatized in Black Robe, a film about Jesuit missionaries in Canada during the 17th century. Worth a watch.
-
- Jan 2019
-
static1.squarespace.com static1.squarespace.com
-
he belief that grammatical categoriesreflect the underlying structure of the world is a continuing seductivehabit of mind worth questioning.
I think this also relates back to the idea that we always feel the need to have control and control others. In a sense, I believe grammar gives us that control.
-
-
www.bitwig.com www.bitwig.com
-
Your hardware modular rig is completely integrated,
Only started playing with Bitwig’s HW/CV integration a few days ago but it’s easy to get inspired by this.
-
all signals are interchangeable so any out port can be connected to any in port
For those of us who’ve had to deal with distinctions between audio and control signals, this is actually pretty major. However, it’s already become something in modular synthesis. People who get started in Eurorack, for instance, may not need to worry nearly as much about different types of signals as those who used Csound or, more importantly for this marketing copy, Cycling ’74 Max.
-
- Sep 2018
-
www.mnemotext.com www.mnemotext.com
-
It would be if he knew he was wrong. I can’t put my finger on it, but I sense something strange about him.
Distrust. Even without any quantifiable proof of there being any error with Hal, it is the distrust that manifests itself in the relationship between the humans and him. This will be one of the most important features of our relationship with sentient machines in the future as well - whether we will be able to trust independently-thinking machines with control of critical aspects of our society.
-
-
www.theatlantic.com www.theatlantic.com
-
In 2007, the pharmaceutical company Bayer gave up on a male contraceptive “that involved an annual implant and a quarterly injection,” as my colleague Olga Khazan reported in 2015. The company, she wrote, “concluded that men would consider the regimen—in the words of a spokesperson—‘not as convenient as a woman taking a pill once a day.’”
I AM FROTHING AT THE MOUTH I AM SO ANGRY
-
College enrollment has historically been higher among women who have access to the pill, and “birth control has been estimated to account for more than 30 percent of the increase in the proportion of women in skilled careers from 1970 to 1990,” the report reads.
But how has their academic performance been [negatively] impacted by bad side effects?
-
he might have mood swings.
Greater aggression? --> more frequent violence toward women?
-
most men wanted to continue using the injectable birth control—more than 80 percent of them said they would choose to use it.*
THIS IS MADDENING
-
“It was believed women would tolerate side effects better than men, who demanded a better quality of life,”
THIS IS SO INCREDIBLY FUCKED UP.
-
- Aug 2018
-
www.nytimes.com www.nytimes.com
-
Legislative staff members had finished rewriting AB 375, and a deal seemed imminent. That Friday, as he drank his morning coffee, Mactaggart decided to read the new bill — the fine print — one more time. He noticed a seemingly minor alteration in one section, the kind of thing most people would skip over. Mactaggart realized it would completely gut what remained of the private right of action. Furious, he called Hertzberg and Chau and told them the deal was off. Neither lawmaker could explain who made the change, Mactaggart told me, but Hertzberg scrambled to fix it. “In most negotiations, you are talking to all these different interest groups,” Hertzberg told me recently. “This is a situation where we had to go and reach out to everyone and bring that information to Mr. Mactaggart and ask him what he wanted to do.”
Here's a case where we ought to consider creating our bills and laws via version control, so we can see exactly who, what, and when things changed along the way. It might mean much less gets done, but there'd be a lot more transparency and accountability.
-
-
emlis.pair.com emlis.pair.com
-
Contrary to paper notes, computer files do not display the traces or versions that led to their final state.
This seems weirdly overstated. How do paper notes maintain versions and traces? Electronic documents contain rich sources of meta data for trace analysis, as well as various options to explicitly demonstrate temporal order and change through formatting.
-
- Jul 2018
-
wendynorris.com wendynorris.com
-
However, as Mark Poster points out, 'the new level of interconnectivity heightens the fragility of the social networks. '·50 The source of control now undermines its execution. For clock time to exist and thus to be measurable and controllable there has to be duration, an interval between two points in time. Without duration there is no before and after, no cause and effect, no stretch of time to be measured. The principles of instantaneity and simultaneity of action across space, as I have shown in chapter 3, are encountered in quantum physics; they have no place in the Newtonian world of causality and bodies in motion, the world chat we as embodied beings inhabit. The control of time that has reached the limit of compression has been shifted into a time world where notions of control are meaningless. More like the realm of myths and mysticism, the electronic world of interchangeable no-where and now-here requires knowledge and modes of being that are alien to the industrial way of life. Other modes of temporal existence, therefore, may hold some viral keys, their 'primitive' understanding of time pointing not ro control but to more appropriate ways of being in the realm of insrantaneity.
Adam argues that control of time is futile in an interconnected network where hyper-compression has effectively rendered duration/intervals of time as unmeasurable.
If temporality cannot be "measured, fixed, regulated or controlled" (see timescapes image), then time cannot be controlled.
Subsequently, we need other approaches to be "in the realm of instantaneity."
-
This control clusrer of the five Cs of time, I have suggested, needs to be differentiated from both time tempering and transcendence, on the one hand, and time knowledge and know-how, on the other, since only in the control cluster is time objectified, externalized and constructed to specific design principles.
"... only in the control cluster is time objectified, externalized and constructed to specific design principles."
Tempering vs knowledge are also important distinctions for the SBTF time-study.
-
This industrial norm, as I suggested above, is fundamentally rooted in clock time and underpinned by naturalized assumptions about not just the capacity but also the need to commodify, compress and control time.
-
the Reformation had a major role to play in the metamorphosis of time from God's gift to commodified, comp�essed, colonized and controlled resource. These four Cs of mdustrial time -comrnodification, compression, colonization and control -will be the focus in these pages, the fifth C of the creation of clock time having been discussed already in the previous chapter. I show their interdependence and id�ntify some of the socio-environmental impacts of those parttcular temporal relations.
Five C's of industrial time: Commodification, compression, colonialization, control, and clock time.
-
-
www.vanityfair.com www.vanityfair.com
-
For now, the Solid technology is still new and not ready for the masses. But the vision, if it works, could radically change the existing power dynamics of the Web. The system aims to give users a platform by which they can control access to the data and content they generate on the Web. This way, users can choose how that data gets used rather than, say, Facebook and Google doing with it as they please. Solid’s code and technology is open to all—anyone with access to the Internet can come into its chat room and start coding.
-
- Jun 2018
-
-
I think there is a need to develop a system to track the draft of a manuscript from the beginning to the end of the process.
If you're drafting in WordPress you can set the number of revisions of your posts to infinite so that you can keep (archive) all of your prior drafts. see: https://codex.wordpress.org/Revisions
-
- May 2018
-
opinionator.blogs.nytimes.com opinionator.blogs.nytimes.com
-
the one that patients and families often have the greatest control over is making decisions that are in the patient’s best interest
A passing on of control over decisions has become an experience that many elders go through as their health declines.
-
- Apr 2018
-
wisc.pb.unizin.org wisc.pb.unizin.org
-
In contemporary debates, gun control advocates often respond to assertion of second amendment individual rights to gun ownership by emphasizing the amendment’s reference to a “well regulated militia.”
Hopefully this suggestion will be accepted in the spirit it is offered (gently!) and if acted upon, would not lengthen the intro too much, but rather help clarify the "anticipatory set" of the reading. Although the first sentence is quite accurate, as someone who has been doing extensive reading on the 2nd Amendment lately, I had to re - read this to be sure I understood the assertion. Bouncing back & forth from references to 1) gun control advocates 2) individual rights to gun ownership and back to 3) reference to a well regulated militia is likely to confuse H.S. readers who may have little interest or grasp of the ideas.
Suggest: First of all - since it is so brief, it might be useful to actually provide the complete wording of Amendment Two. (Perhaps above the green "About this text" box.)
Secondly - a note suggesting that gun control advocates tend to focus upon the "militia" clause while gun owner rights advocates often prefer to focus on the second clause re: right to own.
Thirdly - a (brief) suggestion that the two sides do not even agree upon what constitutes a "militia" and that the context and historical evidence for each side's arguments are lengthy and complex.
The second sentence beginning " In the excerpt below, is critical to help set the context of the reading, however, there seems to be room to minimize the verbiage without losing meaning.
-
- Jan 2018
-
maestriadesarrollo.com maestriadesarrollo.com
-
The Stack es el nuevo nomos o geografía política de la Tierra. Es la dimensión que necesitamos añadir a la tríada analítica del Estado, la sociedad civil y el mercado —así que ahora también tenemos la Plataforma o The Stack—. Dentro de ella la nube y el usuario operan una sub-estructura, que Bratton llama Black Stack, una ‘totalidad computacional’ de hardware y software que produce una geopolítica acelerada y que media y da forma a las economías como a las subjetividades, transformando el significado de lo humano mediante la proliferación de sus habitantes y usuarios no humanos. Más aún, para algunos activistas, las infraestructuras digitales son el ancla y medio esencial de las nuevas tecnologías de gobierno de las poblaciones, más allá de los estados y los mismos intereses económicos, y su propósito no es otro que el control, así se sea bajo la apariencia de la libertad de interacción (Invisible Committee 2014). Esta geo/biopolítica de lo digital tiene profundas implicaciones para el diseño.
-
- Nov 2017
-
Local file Local file
-
Othersmaydismissthesebills,charters,declarations,andmanifestosfortheirlackoflegalorevenperformativeforce.Theymayarguethatregardlessofsuchdeclarations,orevenperhapsinthefaceofthem,statesandcorporationscontinuetocolonizecyberspaceandplaysovereigntygames.TheymayarguethatitisnolongerjuststatessuchasChina,whichpioneeredfilteringandblocking(euphemisticallycalledtheGreatFirewall),butalsoahugerange,includingtheUnitedKingdom,UnitedStates,andEuropeanstatesthatareengagedinthisbattleforcontrol.Moreover,thisisnotastrugglebetweenstatesandtheircitizensbutastruggleinvolvingthecollusionandcomplicityofespeciallyAmericancorporationsinvariousrolesasserviceprovidersorconsultantsforfiltering,blocking,andcensoring.[75]Thesecriticismshaveconsiderablemerits.
-
- Oct 2017
-
Local file Local file
-
inHabboHotelcontrolismodulatedwherenewactionsareconstantlybeingincorporated,aninventivepowerthatisworkingbyinclusion,asFoucaultillustrated,and‘whoseeffectwillbegreaterthanthesumofitscomponentparts’,asDeleuzeargued.
-
Cohenreferstoblockingas‘architecturesofcontrol’and‘regimesofauthorization’thatareauthoritarianinthegenericsensethattheyfavourcompliantobediencetoauthority.[11]Ratherthanexperiencingrules—whichneednotbeexplainedordisclosed—shearguesthatusersexperiencetheireffects,whichconsistofpossibilitiesforactionthatnetworkscreate.Sowhileconcernsaboutthesurveillanceandcollectionofdigitaltracesaremostcontroversial(discussedbelow),thetransparencyofnetworkprocessesandhowaccesstoknowledgeisbeingfilteredarelessvisibleandcontrollable.Filteringalsooccursthroughtheauthorizationsattachedtocontentanddevices
[...] So while sharing is a calling, it is increasingly only within certain regimes of authorization that sharing operates, and in this regard it can be understood as a form of submission.
-
JonathanFranzenaccusesAmazonofturningliterarycultureintoshallowformsofsocialengagementconsistingof‘yakkersandtweetersandbraggers’andTwitterasthe‘ultimateirresponsiblemedium.’[89]Thesemisfiresproduceatleasttwoinfelicities.First,inadvertentlytheyendupascribingmorepowertosuchcorporationsasAmazonorGooglethantheyactuallyhave.WhilemuchattentionisgiventotheautomatedandcomputationalaspectsofGoogle,theworkingsofthesearchengineareunstableandrelyonthedistributed,heterogeneous,anddynamicactionsofnotonlyalgorithmsbutalsoengineers,operators,webmasters,andusers.[90]Second,theyascribelesspowertopeoplethantheyactuallyhave.WhiletherulesofGoogle’salgorithmandfunctionssuchasautocompleteareatightlyheldsecret,Google’soperationisshapedandmediatedbythesearch-and-findbehavioursofcitizensubjects
-
Ifwefocusoncallingsandtheactionstheymobilizeandhowtheymakeactspossible,wealsoshiftourfocusfromafreedomversuscontroldichotomytotheplayofobedience,submission,andsubversion.Thisisaplayconfiguredbytheforcesoflegality,performativity,andimaginarywhichcalluponsubjectstobeopenandresponsibleandthroughwhichmostlygovernmentalbutalsocommercialandnongovernmentalauthoritiestrytomaintaintheirgripontheconductofthosewhoaretheirsubjects.
-
-
www.allsides.com www.allsides.com
-
Trump noticeably avoided talking about gun control when he was asked about it, saying that he would speak on the matter with the police as a general assembly. In 2000, trump had different standpoint on gun control, saying that he wanted a ban on assault guns. Personally I think background checks should be placed on people with accounts of a 1 or more felonies. And that weapons with a lethality higher than a pistol's should be restricted during a person's review as a pistol is enough for self defense.
-
- Sep 2017
-
Local file Local file
-
Deleuzethinksthat,bycontrast,incontrolsocieties‘thekeythingisnolongerasignatureornumberbutacode:codesarepasswords,whereasdisciplinarysocietiesareruled...byprecepts.’[67]Heobservesthat‘thedigitallanguageofcontrolismadeupofcodesindicatingwhetheraccesstosomeinformationshouldbeallowedordenied.’[68]ForDeleuze,controlsocietiesfunctionwithanewgenerationofmachinesandwithinformationtechnologyandcomputers.Forcontrolsocieties,‘thepassivedangerisnoiseandtheactive[dangersare]piracyandviralcontamination.
[...] For Deleuze, ‘[i]t’s true that, even before control societies are fully in place, forms of delinquency or resistance (two different things) are also appearing. Computer piracy and viruses, for example, will replace strikes and what the nineteenth century called “sabotage” (“clogging” the machinery).’
Otras formas de contestación pueden referirse a la creación de narrativas alternativas usando las mismas herramientas que crean las estructuras de control.
-
Deleuzewasnowconvincedthat‘[w]e’removingtowardcontrolsocietiesthatnolongeroperatebyconfiningpeoplebutthroughcontinuouscontrolandinstantcommunication.’[65]Thespaceofcontrolsocietieswasdiffuseanddispersedanddecisivelycyberneticinitsmodesofgovernment.
-
-
Local file Local file
-
Critiquing such claims as sensationalist, recent work identifies a problem of demarcation by which people control access to technical agency and who counts as innovative (Irani, 2015; Lindtner, 2015), illuminating differ-ent and multiple hacking histories. Gabriella Coleman (2011), for example, compares the protest movement Anonymous and the whistle-blowing project WikiLeaks to clarify the varying political sensibilities and practices from which hacking develops
-
-
blog.scienceopen.com blog.scienceopen.com
-
a lack of version control over the vast majority of the research literature makes actually ‘adapting’ papers to include post-publication comments is impossible.
This is also key.
-
- Jun 2017
-
selfdefinition.org selfdefinition.org
-
Self-control
what is self control? controlling your desires, controlling emotions, focusing on meditation, not being distracted,
this is honestly such a virtuous skill which is not easy in this world (kalyug)
-
-
developer.mozilla.org developer.mozilla.orgHTTP 缓存1
-
HTTP/1.1定义的 Cache-Control 头用来区分对缓存机制的支持情况, 请求头和响应头都支持这个属性。通过它提供的不同的值来定义缓存策略。
Request Header与Response Header都支持这个属性 通过调整Cache-Control头可以做出很多缓存策略:
- 完全不支持
- 不缓存内容
- 私有缓存
- 公共缓存
- 缓存过期时间
-
- May 2017
-
-
Every time a customer service assistant shrugs and says “computer says no” or an organization acts in crazy, inflexible ways, odds-are there’s a database underneath which has a limited, rigid view of reality and it’s simply too expensive to fix the software to make the organization more intelligent. We live in these boxes, as pervasive as oxygen, and as inflexible as punched cards.
Isn't it interesting how the rigidity of institutionalised "old economy"-businesses and their management structure as well as their work ethics is, in a way, mimicked by their IT-architecture? Efficiency over effectiveness, stability over flexibility, repetition over creative destruction and innovation. And then came Agile...
-
- Apr 2017
-
waitbutwhy.com waitbutwhy.com
-
But brain interfaces can also put information in. Meaning a clever hacker might be able to change your thoughts or your vote or your identity or make you want to do something terrible you normally wouldn’t ever consider.
"Imperio!" anyone? Regards from the-one-who-should-not-be-named, otherwise known as "Tom Riddle" or "Voldie"...
-
-
static1.squarespace.com static1.squarespace.com
-
"[ d]igital language makes control systems invisible; we no longer experience the visible yet unverifiable gaze, but a network of nonvisualizable digital control"
The speaker at the Ong symposium this year was all about how digitization of books encourages a singular location and instance of a book, and all the problems that entails. That's interesting with this essay, and how Facebook and Google work to encourage a singular instance of a person. Google+, for all it's glaring issues, let you cultivate multiple categories of friends who could see X, Y, or Z, but I only have one facebook profile, for professional colleagues, family, and friends. Youtube doesn't like that I have two Gmail accounts, and tries to switch up which one is ending up on my user history. The language of control suggests guidance, someone directing the system, but there's also the risk of how blind, automated systems guide us.
-
-
www.getfpv.com www.getfpv.com
-
- Jun 2016
-
www.aclu.org www.aclu.org
- May 2016
-
medium.com medium.com
-
A study of housing cost in San Francisco from the 1950s to 2016.
-
- Jan 2016
-
cristal.inria.fr cristal.inria.fr
-
But even from this remove it was possible to glean certain patterns, and one that recurred as regularly as an urban legend was the one about how someone would move into a commune populated by sandal-wearing, peace-sign flashing flower children, and eventually discover that, underneath this facade, the guys who ran it were actually control freaks; and that, as living in a commune, where much lip service was paid to ideals of peace, love and harmony, had deprived them of normal, socially approved outlets for their control-freakdom, it tended to come out in other, invariably more sinister, ways.
-
- Dec 2015
-
medium.com medium.com
-
There are approximately 300M guns (including roughly 6 million AR-15 style rifles) in the possession of 120M gun owners in the US. Yet the gun murder rate has declined from 7.3/100k in the 70's to roughly 3/100k in 2014.
Interesting conversation about gun ownership and gun violence around this reply to the slightly hysterical post, "I'm afraid of Americans"
-
- Oct 2015
-
cms.whittier.edu cms.whittier.edu
-
They succeed in doing so largely because the states underwhich they operate are the “soft-states,” in that despite their oftenauthoritarian disposition and political omnipresence, they lack the nec-essary capacity, the hegemony and technological efficacy, to impose full
control over society."
It's the people that push the boundaries who find out just how strong/weak they really are. It is more about the atmosphere of a disciplinary society aided by the people's fear that's being enacted throughout societies instead of actual and legitimate control.
-
- Aug 2015
-
www.sciencealert.com www.sciencealert.com
-
control group
- control group 控制变量组
-
-
zesty.ca zesty.ca
-
In order to avoid the confused deputy problem, asubject must be careful to maintain the associationbetween each authority and its intended purpose. Using the key analogy, one could imagine immediatelyattaching a label to each key upon receiving it, wherethe label describes the purpose for which the key is tobe used. In order to know the purpose for a key, thesubject must understand the context in which the key is received; for example, labelling is not possible if keysmagically appear on the key ring without the subject’sknowledge.
-
Even if one can distinguish the keys, decidingto try all available keys puts one at risk of becoming aconfused deputy.
-
We would argue that the “true” capability model is the object-capability model, because all known major capability systems take the object-based approach (forexamples, see [1, 4, 9, 11, 16, 17, 19, 21]). In all ofthese systems, a capability is an object reference–not something that behaves like a key or ticket in the realworld. Definitive books on capability-based systems[6, 16] also describe these systems from the object-capability perspective, and explicitly characterize themas “object-based”.
-
The claim that capability systemsin general cannotenforce the *-Property appears to be based on themisunderstanding that capabilities and data are notdistinguishable.
-
Theonly capability Bob holds to a lower level is a readcapability, so the *-Property is enforced. The onlycapability Alice holds to a higher level is a writecapability, so the Simple Security Property is enforced
This paragraph would be clearer if the capabilities were written out fully:
The only capability Bob holds to a lower level is a "read data" capability, so the *-Property is enforced. The only capability Alice holds to a higher level is a "write data" capability, so the Simple Security Property is enforced.
Maybe. But it still seems confused. As though the properties are in the wrong sentences.
Nonetheless, both properties are enforced.
-
we examine three different models thathave been used to describe capabilities, and define a set of seven security properties that capture the distinctions among them
-
- Jul 2015
-
-
leaves the grassroots movements exactly where they started from
Only, it wastes their time, setting them back, testing their resolve. Had they not had the distraction and the illusion of a supposed solution they could have been busier doing things themselves.
-
- Jun 2015
-
-
"Was wir sehen können, ist, dass 1,4 Milliarden Menschen eine Plattform zu einem mehr oder weniger zentralen Teil ihres Lebens gemacht haben, die von einem Menschen an der Spitze gesteuert wird", nämlich Mark Zuckerberg. "Niemand ist uns bisher so nahe an uns herangekommen."
-
- Feb 2015
- Nov 2013
-
caseyboyle.net caseyboyle.net
-
The intellect has now thrown the token of bondage from itself. At other times it endeavors, with gloomy officiousness, to show the way and to demonstrate the tools to a poor individual who covets existence; it is like a servant who goes in search of booty and prey for his master. But now it has become the master and it dares to wipe from its face the expression of indigence.
This drive controls us.
-
- Oct 2013
-
rhetoric.eserver.org rhetoric.eserver.org
-
The causes of our deliberately intending harmful and wicked acts contrary to law are (1) vice, (2) lack of self-control
I agree.
-
Not all voluntary acts are deliberate, but all deliberate acts are conscious -- no one is ignorant of what he deliberately intends.)
-