10,000 Matching Annotations
  1. May 2020
    1. how early childhood trauma can set the child up for deviant behavior in adulthood;

      that's kind of what I want to write on. How many serial killers have connections of childhood characteristics that may suggest how became a murderer.

    1. hen a patient is provided with a fully equipped staff there is much less room for error as there are enough nurses to properly rotate through the patient's roo

      This statement is very meaningful knowing that RN's are not alone so that they can count on one another when needed for questions that might arise.

    2. ot only do nurses receive the perks variety, but also with signing bonuses and shift preferences.[16]

      Sounds like all the effort of study is rewarded at the end.

    3. nother advantage of becoming a nurse is that jobs are in high demand. One reason for this has to do with the generation of baby boomers beginning to retire

      Very engrossing to know more about nurses retiring from their generation.

    4. ing became more of an international profession, with RNs travelling to find work or improved working conditions and wages, some countries began implementing standardized language tes

      This sounds very appealing! So, the more knowledge of different languages, the broaden horizons RN's have in the field.

    5. rses must usually meet a minimum practice hours requirement and undertake continuing education to maintain their license

      This sounds a great opportunity to enrich RN's knowledge in the field as well as to stay up to date.

    6. They may be responsible for supervising care delivered by other healthcare workers, including student nurses,

      Something new for me to learn about nurses' directing other healthcare workers in the field. In particular those who are new or lower level of license in the field.

    1. The nurse must also educate the patient on their condition, its side effects, its treatment plan, and how to prevent possible complications

      So, nurse's communication skills with patients is vital to help them understand about their diseases' outcomes.

    2. Oncology nurses have advanced knowledge of assessing the client’s status and from this assessment will help the multi-disciplinary medical team to develop a treatment plan.[

      It sounds like Oncology Nurses' assessment is crucial to provide the right treatments to patients.

    3. The number of patients with cancer is believed to be three-times the number of annual deaths

      What could be the cause of the disease in the country? Why there are a massive number of victims dying as a result of it.

    4. specialized nurse who cares for cancer patients

      Very interesting, I was not aware that not anyone with certification could perform the job, but advance knowledge and experiences are required.

    1. Conscious discipline works with the awareness of our behavior to certain situations and encourages us to learn how to consciously manage our behavior so we can help the child to do the same

      This taught me to a great extension way.

    2. Parents should be encouraged to redirect the child's behavior into something positive,

      By doing that, I wonder if that way the child will forgot about it; and instead, focuses on the positive approach without much effort?

    3. This is in contrast with extrinsic motivation, wherein motivation stems from a desire to avoid punishment or attain a reward. This is what Positive Discipline seeks to avoid, s

      Great information, very clear definition of the phrase "extrinsic motivation."

    4. should be delivered in a kind but firm manner, preserving the trust and mutual respect between the adult and the child.[6]

      Just amazing! Kids learn to be respectful at the same time if they are treated with respect.

    5. Positive Discipline for Teenagers, Positive Discipline A-Z and Positive Discipline in the Classroom (with H. Stephen Glenn). Positive Discipline the First Three Years and Positive Discipline for Preschoolers

      Very engrossing knowing the variety of guiding books according to individual's age.

    6. The focus of positive discipline is to establish reasonable limits and guide children to take responsibility to stay within these limits

      Wow! It totally make sense, so teaching them from an early age would prepare them for the future.

    7. Rather, they are actively involved in helping the child learn how to handle situations more appropriately while remaining calm, friendly and respectful to the children themselves

      Very helpful to know, as I see that positiveness is what makes the difference when instructing a child without harm.

    8. Minority and low-income areas show even higher numbers. 75 percent of crimes committed in the United States are done by high school drop-outs

      Great reflection as a mom of two kids.

  2. Apr 2020
    1. ts hosts will generally survive longer. On the contrary, a meme which shortens the longevity of its hosts will tend to disappear faster. However, as hosts are mortal, retention is not sufficient to perpetuate a meme in the long term; memes also need transmission. Life-forms can transmit information both vertically (from parent to child, via replication of genes) and horizontally (through viruses and other means). Memes can replicate vertically or horizontally within a single biological generation. They may also lie dormant for long periods of time. Memes reproduce by copying from a nervous system to another one, either by communication or imitation. Imitation often involves the copying of an observed behavior of another individual. Communication may be direct or indirect, where mem

      What do they mean by this???

    2. r existence holds as much in the intellectual as in the physical world. A theory is a species of thinking, and its right to exist is coextensive with its power of resisting extinction by its rivals.'[21] "Kilroy was here" was a graffito that became popular in the 1940s, and existed under various names in different countries, illustrating how a meme can be modified through replication. This is seen as one of the first widespread memes in the world[22] Dawkins used the term to refer to any cultural entity that an observer might consider a replicator. He hypothesized that one could view many cultural entities as replicators, and pointed to melodies, fashions and learned skills as examples. Memes generally replicate through exposure to humans, who have evolved as efficient copiers of information and behavior. Because humans do not always copy memes perfectly, and because they may refine, combine or otherwise modify them with other memes to create

      Oh wow this is interesting maybe I will research this issue.

    1. But stress is an unavoidable part of daily life and Reinhold Niebuhr suggests to face it, as if having "the serenity to accept the things one cannot change and having the courage to change the things one can." Part of setting priorities and goals is the emotion "worry," and its function is to ignore the present to fixate on a future that never arrives, which leads to the fruitless expense of one's time and energy

      Just amazing! This is like conversing with a counselor.

    2. ny project development as it determines the project completion time and scope

      So, applying this method of time management, it could help me to accomplish my goal in time..so true.

    3. Germany, Switzerland, and England.[3] People in these cultures tend to place a large value on productive time management, and tend to avoid decisions or actions that would result in wasted time

      Very interesting, and valuable information as I personally think would help me significantly for every decision I make.

    1. from pressures that do not align with a person's knowledge, skills, or expectations. J

      This is so true, especially when someone is new to college for instance.

    2. Occupational stress often stems from pressures that do not align with a person's knowledge, skills, or expectations

      This annotation tool is amazing! Learning about the cause of stress helps me to have a better understanding of it.

    1. The common law—so named because it was "common" to all the king's courts across England—originated in the practices of the courts of the English kings in the centuries following the Norman Conquest in 1066.[10] The British Empire spread the English legal system to its colonies, many of which retain the common law system today. These "common law systems" are legal systems that give great weight to judicial precedent, and to the style of reasoning inherited from the English legal system.
    2. the body of law derived from judicial decisions of courts and similar tribunals.[1][2][3][4][5][6] The defining characteristic of “common law” is that it arises as precedent.

      The way "common law" sounds and is used, I would have thought it meant law that is common (in common between) many countries, laws that can be found on the books in all of these many places. (Kind of like commonwealth.)

      But, although it is common to many countries, that is not its defining characteristic. Its defining characteristic is actually something quite different.

      Since the term is so far removed from what it actually means, I would even go so far as to say it is a mild euphemism.

      Much better names for this exist: judicial precedent or judge-made law are the clearest options. But even "case law" is a better term.

    1. Ebbinghaus is also largely credited with drafting the first standard research report. In his paper on memory, Ebbinghaus arranged his research into four sections: the introduction, the methods, the results, and a discussion section. The clarity and organization of this format was so impressive to contemporaries that it has now become standard in the discipline, and all research reports follow the same standards laid out by Ebbinghaus.
    1. By rendering important parts of the application with the real data on the server-side, an isomorphic application can show a meaningful initial page. On the other hand, client rendering application can’t show any meaningful information until it fetches all external data it needs. In the meantime, the only thing a user will see is a loading indicator.
    1. The company was founded as WeatherBill in 2006 by two former Google employees, David Friedberg and Siraj Khaliq. The company began as a startup focused on helping people and businesses manage and adapt to climate change, by providing weather insurance to ski resorts, large event venues, and farmers. In 2010 it decided to focus exclusively on agriculture, and launched the Total Weather Insurance Product in fall 2010 for corn and soybeans.[2][3] On October 11, 2011, WeatherBill changed its name to The Climate Corporation.[4] In June 2013 the U.S. Department of Agriculture's Risk Management Agency authorized the Climate Corporation to administer federal crop insurance policies for the 2014 crop year.[5] In October, 2013 Monsanto announced that it was acquiring the company for approximately $1.1 billion.[6]

      The Climate Corporation is a digital agriculture company that examines weather, soil and field data to help farmers determine potential yield-limiting factors in their fields.

      "That first year, in 2011, the Climate Corporation generated $60 million in sales, just from selling weather insurance to farmers. Three years later they were insuring 150 million acres of American farmland—the bulk of the Corn Belt—and teaching the farmers how to farm them more efficiently. Six years after venture capitalists valued David Friedberg’s new company at $6 million, Monsanto bought it for $1.1 billion." The Fifth Risk

    1. is a software component that adds a specific feature to an existing computer program. When a program supports plug-ins, it enables customization.

      plug-in

    1. columnar databases are well-suited for OLAP-like workloads (e.g., data warehouses) which typically involve highly complex queries over all data (possibly petabytes). However, some work must be done to write data into a columnar database. Transactions (INSERTs) must be separated into columns and compressed as they are stored, making it less suited for OLTP workloads. Row-oriented databases are well-suited for OLTP-like workloads which are more heavily loaded with interactive transactions. For example, retrieving all data from a single row is more efficient when that data is located in a single location (minimizing disk seeks), as in row-oriented architectures. However, column-oriented systems have been developed as hybrids capable of both OLTP and OLAP operations, with some of the OLTP constraints column-oriented systems face mediated using (amongst other qualities) in-memory data storage.[6] Column-oriented systems suitable for both OLAP and OLTP roles effectively reduce the total data footprint by removing the need for separate systems

      typical applications (adding new users data, or even retrieving user data) are better done in (standard) row-oriented DB. Typical analytics application, such as even simple AVG(whole column) are much slower because the elements of the same column are stored far away from each other in a traditional row-oriented DB, hence increasing disk-access time.

    2. Operations that retrieve all the data for a given object (the entire row) are slower. A row-based system can retrieve the row in a single disk read, whereas numerous disk operations to collect data from multiple columns are required from a columnar database.
    1. Direct democracy was not what the framers of the United States Constitution envisioned for the nation. They saw a danger in tyranny of the majority. As a result, they advocated a representative democracy in the form of a constitutional republic over a direct democracy. For example, James Madison, in Federalist No. 10, advocates a constitutional republic over direct democracy precisely to protect the individual from the will of the majority
    2. In the New England region of the United States, towns in states such as Vermont decide local affairs through the direct democratic process of the town meeting.[22] This is the oldest form of direct democracy in the United States, and predates the founding of the country by at least a century.
    3. Those who hold and those who are without property have ever formed distinct interests in society. Those who are creditors, and those who are debtors, fall under a like discrimination. A landed interest, a manufacturing interest, a mercantile interest, a moneyed interest, with many lesser interests, grow up of necessity in civilized nations, and divide them into different classes, actuated by different sentiments and views. The regulation of these various and interfering interests forms the principal task of modern legislation, and involves the spirit of party and faction in the necessary and ordinary operations of the government.
    1. She argues that if city planners persist in ignoring sidewalk life, residents will resort to three coping mechanisms as the streets turn deserted and unsafe: 1) move out of the neighborhood, allowing the danger to persist for those too poor to move anywhere else, 2) retreat to the automobile, interacting with the city only as a motorist and never on foot, or 3) cultivate a sense of neighborhood "Turf", cordoning off upscale developments from unsavory surroundings using cyclone fences and patrolmen.

      And that is the American city. I keep comparing this scene to Assisi, where it's difficult to imagine such a thing. I'm becoming more and more convinced that traditionalism is best.

    2. Noting that a well-used street is apt to be relatively safe from crime, while a deserted street is apt to be unsafe, Jacobs suggests that a dense volume of human users deters most violent crimes, or at least ensures a critical mass of first responders to mitigate disorderly incidents. The more bustling a street, the more interesting it is for strangers to walk along or watch from inside, creating an ever larger pool of unwitting deputies who might spot early signs of trouble. In other words, healthy sidewalks transform the city's high volume of strangers from a liability to an asset. The self-enforcing mechanism is especially strong when the streets are supervised by their "natural proprietors," individuals who enjoy watching street activity, feel naturally invested in its unspoken codes of conduct, and are confident that others will support their actions if necessary. They form the first line of defense for administering order on the sidewalk, supplemented by police authority when the situation demands it.

      This is even easier in roads built for people instead of for cars.

    3. She instead advocated for dense mixed use development and walkable streets, with the "eyes on the street" of passers-by helping to maintain public order.

      But now we have a partition of commercial and residential, creating entire swaths of town that are dead after 6 o'clock.

    1. The court's decision, which exonerated Hush-A-Phone and prohibited further interference by AT&T toward Hush-A-Phone users, stated that AT&T's prohibition of the device was not "just, fair, and reasonable," as required under the Communications Act of 1934, as the device "does not physically impair any of the facilities of the telephone companies," nor did it "affect more than the conversation of the user."
    1. it is a euphemism; abstract, agentless, and affectless, so that even if people succeeded in associating it with a real act or event, they would be insulated from any feelings of repulsion or moral outrage".
    2. In 1999, "collateral damage" (German: Kollateralschaden) was named the German Un-Word of the Year by a jury of linguistic scholars. With this choice, it was criticized that the term had been used by NATO forces to describe civilian casualties during the Kosovo War, which the jury considered to be an inhuman euphemism.
    3. The term has also been borrowed by the computing community to refer to the refusal of service to legitimate users when administrators take blanket preventative measures against some individuals who are abusing systems. For example, Realtime Blackhole Lists used to combat email spam generally block ranges of Internet Protocol (IP) addresses rather than individual IPs associated with spam, which can deny legitimate users within those ranges the ability to send email to some domains.
    1. prototypical examples for the gift economy's prominence in the technology sector, and its active role in instating the use of permissive free software and copyleft licenses, which allow free reuse of software and knowledge.

      Knowledge (that intangible good) seems like a perfect fit for Weiner's "inalienable possessions": the paradox of keeping while giving.

    1. Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can.

      Software Envelopment

    1. Guédelon Castle (Château de Guédelon) is a castle currently under construction near Treigny, France. The castle is the focus of an experimental archaeology project aimed at recreating a 13th-century castle and its environment using period technique, dress, and material.

      Guédelon Castle (Château de Guédelon)

      More info on HN

    1. After the collapse of Sargon's state, Lagash again thrived under its independent kings (ensis), Ur-Baba and Gudea, and had extensive commercial communications with distant realms

      The Statue of Gudea was most likely commissioned after the collapse of Sargon's state. Gudea was after the Akkadians took over Lagash and Sumer as a whole.

    1. earliest web annotation system.

      Although the paper cited at the end of the following sentence has a section "Related work" listing several previous web annotation tools.

    1. Graphemes are often notated within angle brackets: ⟨a⟩, ⟨B⟩, etc.[8] This is analogous to both the slash notation (/a/, /b/) used for phonemes, and the square bracket notation used for phonetic transcriptions ([a], [b]).
    1. emulate the way the brain links data by association rather than by indexes and traditional, hierarchical storage paradigms,

      The traditional, hierarchical storage paradigms remind me of the old web directories, such as Yahoo Directory.

    1. a user can download his or her own data

      In a platform where one of the main values is collaboration, how important is it that these platforms guarantee that the user will be able to backup his/her data in case he/she wants (or is forced to) move out? Shouldn't this platforms also guarantee that one would be able to download ALL public data (or data the specific user has access to) to make sure he/she will be able to recreate the whole thing if he/she wants (or is forced) to?

    1. The Adi Granth, its first rendition, was compiled by the fifth Sikh Guru Arjan Dev (1563–1606). Guru Gobind Singh, the tenth Sikh Guru, did not add any of his own hymns; however, he added all 115 hymns of Guru Tegh Bahadur, the ninth Sikh Guru, to the Adi Granth and affirmed the text as his successor.[1

      Adi authors

    1. The Dasam Granth includes hymns, mythological tales from Hindu texts,[2] a celebration of the feminine in the form of goddess Durga,[4] erotic fables,[2] an autobiography, letters to others such as the Mughal emperor, as well as reverential discussion of warriors and theology.[3]

      genre

    2. However, many printed versions of the text in the contemporary era skip a major section (40%) because it is considered too graphic and obscene to print for the general audience

      audience, adultered

    3. Most of the writing compiled at Anandpur Sahib was lost while the Guru's camp was crossing the Sirsa river before the Battle of Chamkaur (1704).

      lost work

    1. c-Jun N-terminal kinases (JNKs), were originally identified as kinases that bind and phosphorylate c-Jun on Ser-63 and Ser-73 within its transcriptional activation domain. They belong to the mitogen-activated protein kinase family, and are responsive to stress stimuli, such as cytokines, ultraviolet irradiation, heat shock, and osmotic shock. They also play a role in T cell differentiation and the cellular apoptosis pathway. Activation occurs through a dual phosphorylation of threonine (Thr) and tyrosine (Tyr) residues within a Thr-Pro-Tyr motif located in kinase subdomain VIII. Activation is carried out by two MAP kinase kinases, MKK4 and MKK7, and JNK can be inactivated by Ser/Thr and Tyr protein phosphatases.[1] It has been suggested that this signaling pathway contributes to inflammatory responses in mammals and insects.[citation needed]

      shit

    1. On 29 October 2008, at the International Semantic Web Conference 2008, Freebase released its RDF service for generating RDF representations of Freebase topics, allowing Freebase to be used as linked data.[11]

      Freebase Linked Data

    1. then it takes on any given value between f(a) and f(b) at some point within the interval

      What is the definition of 'any' given value. Is it any value in the co-domain or the range?

      I'm wondering in the context of a function that is defined on rational numbers -> real numbers. Where certain values of real numbers are not possible because the domain is restricted.

      Specific example of \(x^2 - 2\), not taking 0 because domain is restricted to rational numbers discussed here