2,215 Matching Annotations
  1. Oct 2020
    1. Graeber has a great deal more to say about money and its unique capacityto store value, and also about the ideology of the market with its highlyindividuated notion of human desires (e.g. 2001: 257). His analysis opensup an intriguing question. If in market societies money is a measure, amedium and above all an end in itself (2001: 66) and value-for-moneydominates what we conventionally call the economy, how do other valuescoexist with this monetarized realm and its rationality of quantificationand self-interest? Graeber points out that, in our view of society, marketprinciples can be balanced by family values and altruistic charity (2001:257), but he views these as just ‘two sides of the same false coin’

      In this capitalistic society money makes the world go round. Graeber has a pessimistic view in regards to the idea that family and altruism can balance out greed because he believes that they are in direct conflict to capitalism. Graeber expands further on his thoughts

    1. t’s not clear why the sequence of the vaccines only mattered in girls, partly because there has been very little research into how male and female immune systems are different. “Somehow immunology has been blind to sex,” says Aaby. “If you read research about mortality in low income countries, there is no such thing as boys and girls – there are children. So we perceive that they have to be the same, and they are definitely not the same.”

      Take away: "Immune training" or bystander effects from other vaccinations may help to fight off Covid-19 or other infections, in spite of not being specific to that pathogen. Some of these effects are sex-specific.

      Claim: "Somehow immunology has been blind to sex"

      The evidence: This is not entirely true- there is actually a LOT of research into sex differences in the immune response, and it is well-known that women can generally mount stronger Th1-type immune responses against viral infections than men. This is thought to be partially linked to estrogen cycling, and partly due to the fact that women have 2 active copies of genes associated with immunity because those are encoded on the X chromosomes. Men only have 1 copy, and thus they don't generally mount as strong an inflammatory response. However, women are also more prone to autoimmune diseases as a consequence of having stronger inflammatory responses than men, which is seen in diseases such as multiple sclerosis, rheumatoid arthritis, and lupus.

      Sources: (https://www.nature.com/articles/nri.2016.90).

  2. Sep 2020
    1. let:hovering={active}

      It seems like it should be the other way around:

      let:active={hovering}
      

      to make it look like a regular let assignment.

      It's only when you consider what/how let:hovering on its own means/works that it makes a bit more sense that it is the way it is. When it's on its own, it's a little clearer that it's saying to "make use of" an available slot prop having the given name. (Very much like bind, where the LHS is also the name of the prop we're getting the data from.) Obviously we have to identify which prop we're wanting to use/pull data from, so that seems like the most essential/main/only thing the name could be referring to. (Of course, as a shortcut (in this shorthand version), and for consistency, it also names the local variable with the same name, but it wouldn't have to.)

      Another even simpler way to remember / look at it:

      1. Everything on the left hand of an prop/attribute [arg] corresponds to something in the component/element that you're passing the [arg] to. Usually it's a prop that you're passing in, but in this case (and in the case of bind:) it's more like a prop that you're pulling out of that component, and attaching to. Either way, the name on the LHS always corresponds to an export let inside that named component.
      2. Everything on the right side corresponds to a name/variable in the local scope. Usually it passes the value of that variable, but in the case of a let: or bind: it actually "passes the variable by reference" (not the value) and associates that local variable with the LHS (the "remote" side).

      Another example is bind: You're actually binding the RHS to the value of the exported prop named on the LHS, but when you read it (until you get used to it?) it can look like it's saying bind a variable named LHS to the prop on the RHS.

    1. Basically, the idea is that a train tried to start with the caboose brakes stuck on. After releasing the caboose, the train still could not start. The problem was that when the train attempted to start with the caboose brake on, it stretched all the inter-car couplings so that the whole train was just like one big car. At this point, the friction from the engine train wheels was not enough to get the whole thing going. Instead, you need to just get one car moving at a time - this is why there is space between the couplings.
    1. I don't understand why it just launches the mutation once and then it throws the error Function called outside component initialization, the only way to make it work is to do something like $: result = mutation(...) but it doesn't make sense, I don't want to run the mutation after each keystroke.
    2. We’re still working on idiomatic Svelte APIs so this one’s also on our list to figure out what the best way forward is
    1. I think Svelte's approach where it replaces component instances with the component markup is vastly superior to Angular and the other frameworks. It gives the developer more control over what the DOM structure looks like at runtime—which means better performance and fewer CSS headaches, and also allows the developer to create very powerful recursive components.
    1. I was… not one of those assigned to watch our chosen one, so I can’t say much about exactly what happened within the walls of that house, but it seems the fight scarred the place in a way far deeper than simple fire. A scar in reality, that I believe has since been compounded by the interferences of other powers.
    2. Regardless, the effect it had on Agnes was unanticipated. As far as we could tell, she had destroyed the place utterly. And yet she remained bound to it, tied to it in some vital way. I knew when Arthur told me she had kept Raymond Fielding’s hand, that he was worried. But none of us could know what you were going to do.
    1. I was now about to form another being of whose dispositions I was alike ignorant; she might become ten thousand times more malignant than her mate and delight, for its own sake, in murder and wretchedness.

      No one knows what someone will be like after they've been brought into the world, but we don't lament every single person who is born. When someone you know is having a kid you don't say to them: "remember H.H. Holmes? Are you sure you want to have kid? They might be ten thousand times worse than H.H. Holmes!" Because that would be ridiculous.

    1. Your styles are scoped to the component. No more leakage, no more unpredictable cascade.
    2. It's fashionable to dislike CSS. There are lots of reasons why that's the case, but it boils down to this: CSS is unpredictable. If you've never had the experience of tweaking a style rule and accidentally breaking some layout that you thought was completely unrelated — usually when you're trying to ship — then you're either new at this or you're a much better programmer than the rest of us.
    3. It gets worse when you're working on a team. No-one dares touch styles authored by someone else, because it's often unclear what they're doing, what markup they apply to, and what disasters will unfold if you remove them. The consequence of all this is the append-only stylesheet. There's no way of knowing which code can safely be removed, so it's common to undo some existing style with another, more specific style — even on relatively small projects.
    1. I didn’t quite understand that until I saw this tweet from Ryan Florence, who is a genius when it comes to explaining the React programming model in ways that normal people can understand — ‘the question is not when does this effect run, the question is with which state does this effect synchronize with?’

    1. When the woman saw that the fruit of the tree was good for food and pleasing to the eye, and also desirable(AT) for gaining wisdom, she took some and ate it.

      Despite being told by God that she and her husband were not allowed to eat the fruit from the tree of the knowledge of good and evil, Eve gave into her temptations. The idea of the "forbidden fruit" has been carried into other pieces of literature, using an apple to symbolize a character's temptation leading to downfall.

      For example, in the fairy tale, Snow White and the Seven Dwarfs, when Snow White eats the poisoned apple, offered by the evil witch, who parallels the serpent, she falls into a death-like sleep.

    1. While I am not homosexual, I have always felt that discrimination against homosexuality is completely ludicrous because I think people should love who they love. This belief that I have has giving me an idea for my research topic for my bibliography project where I look over the state of homosexuality in 2020. I decided to annotate this article because it gave a lot of good information about the state of homosexuality in 2020 and it has some links to other articles about homosexuality.

    1. Considerable research indicates that college students are bothmore likely to persist and to perform at high academic levelswhen they perceive themselves to be members of a cooperativeand supportive learning community (Kuh, 2009; Tinto, 2006;Zhao & Ku, 2004)

      For another study, being a member of a cooperative and supportive learning environment may moderate the rates for persistence and academic performance in college.

    1. This giant machine can be your best friend as long as you’re good for the business. But if you accidentally happen to get in its way, it’ll simply screw you over and won’t even notice. If tomorrow a corporate lawyer decides they need to cover their corporate ass more tightly — be it international sanctions, dodging any potential lawsuits from vocal minorities, or anything else — they won’t think twice: they’ll readily dispose of anyone and betray any “ideals” you might have thought they stand for.
    1. A final strand of the development of the prosperity gospel was the development of charismatic Pentecostal churches in America. An umbrella term for a decentralized group of churches — comprising over 700 denominations — Pentecostal churches are characterized by an emphasis on what is known as “spiritual gifts” (or charisms, from which the term “charismatic” is drawn). A worshipful Christian might experience, for example, the gift of healing, or might suddenly start speaking “in tongues.” This tradition of worship meant that, for a believer, the idea that God would manifest Himself to the faithful in concrete, miraculous ways in the here and now was more prevalent than it would be in, say, a mainline Episcopalian church. In addition, the decentralized nature of these churches also meant that individual leaders, many of whom practiced faith healing or similar practices, had a particularly strong effect on their congregations and could build up individual personal followings.

      Take a look at the potential relationship with these ideas and those described by Colin Woodard in American Nations and the overlap with Kevin Phillips' viewpoints.

  3. Aug 2020
    1. Allows batch updates by silencing notifications while the fn is running. Example: form.batch(() => { form.change('firstName', 'Erik') // listeners not notified form.change('lastName', 'Rasmussen') // listeners not notified }) // NOW all listeners notified
    1. Chen, Y., Yang, W.-H., Huang, L.-M., Wang, Y.-C., Yang, C.-S., Liu, Y.-L., Hou, M.-H., Tsai, C.-L., Chou, Y.-Z., Huang, B.-Y., Hung, C.-F., Hung, Y.-L., Chen, J.-S., Chiang, Y.-P., Cho, D.-Y., Jeng, L.-B., Tsai, C.-H., & Hung, M.-C. (2020). Inhibition of Severe Acute Respiratory Syndrome Coronavirus 2 main protease by tafenoquine in vitro. BioRxiv, 2020.08.14.250258. https://doi.org/10.1101/2020.08.14.250258

    1. The timescales on which a system’s processes run have critical consequences for its ability to predict and adapt to the future.

      A layer of architecture that is too slow to change: technical debt. (Pace layering)

    2. We also know that if individuals are bad at collecting good information – if they misinterpret data due to their own biases or are overconfident in their assessments – an aggregation mechanism can compensate.

      "wisdom of crowds"

    1. Salahudeen, A. A., Choi, S. S., Rustagi, A., Zhu, J., O, S. M. de la, Flynn, R. A., Margalef-Català, M., Santos, A. J. M., Ju, J., Batish, A., Unen, V. van, Usui, T., Zheng, G. X. Y., Edwards, C. E., Wagar, L. E., Luca, V., Anchang, B., Nagendran, M., Nguyen, K., … Kuo, C. J. (2020). Progenitor identification and SARS-CoV-2 infection in long-term human distal lung organoid cultures. BioRxiv, 2020.07.27.212076. https://doi.org/10.1101/2020.07.27.212076

    1. I don't doubt that we will soon treat the process of logging in as a figurative point of entry, meaning that log into will make full conceptual sense (cf you don't physically delve into a problem or pile into an argument, yet both are correct grammatically because they are semantically [i.e. figuratively])
    1. Ruby is the programming language used in Translation Proxy. For Sarah, Object Oriented Design “done the Ruby way” is so enjoyable and is the part of her work that she likes most.
    1. Hewitt, J., Carter, B., Vilches-Moraga, A., Quinn, T. J., Braude, P., Verduri, A., Pearce, L., Stechman, M., Short, R., Price, A., Collins, J. T., Bruce, E., Einarsson, A., Rickard, F., Mitchell, E., Holloway, M., Hesford, J., Barlow-Pay, F., Clini, E., … Guaraldi, G. (2020). The effect of frailty on survival in patients with COVID-19 (COPE): A multicentre, European, observational cohort study. The Lancet Public Health, 5(8), e444–e451. https://doi.org/10.1016/S2468-2667(20)30146-8

    1. Alfred Russel Wallace, who came up with the idea of natural selection independently of Charles Darwin, was an implacable opponent of the smallpox vaccine during the late 19th Century

      Being an anti-vaxxer makes sense from an evolutionary standpoint.

      Fixing any disease that could kill an individual before his/her childbearing age is only helping weaknesses (diseases) propagate in the human populous.

  4. Jul 2020
    1. The meta charset information must also be the first child of the <head> tag. The reason this tag must be first is to avoid re-interpreting content that was added before the meta charset tag.

      But what if another tag also specified that it had to be the first child "because ..."? Maybe that hasn't happened yet, but it could and then you'd have to decide which one truly was more important to put first? (Hopefully/probably it wouldn't even matter that much.)

    1. A growing number of platforms, vendors, and partners support the AMP Project by providing custom components or offering integration with AMP pages within their platforms.

      I guess AMP is actually open-source software, but it still feels like it's something non-standard. I guess it's just an alternative open standard to the "main" web open standards.

    1. If you have worked with emails before, the idea of placing a script into an email may set off alarm bells in your head! Rest assured, email providers who support AMP emails enforce fierce security checks that only allow vetted AMP scripts to run in their clients. This enables dynamic and interactive features to run directly in the recipients mailboxes with no security vulnerabilities! Read more about the required markup for AMP Emails here.
    1. Because the Web IDE is based on the Monaco Editor, you can find a more complete list of supported languages in the Monaco languages repository. Under the hood, Monaco uses the Monarch library for syntax highlighting.
    1. Introducing Module#const_source_locationUsing Method#source_location made finding the location of any method fairly easy. Unfortunately, there wasn’t an equivalent for constants. This meant that unless the constant you needed to find was defined in your codebase, finding its source location was not easy.
    1. In your environment you may want to always configure internationalization, routers, user data etc. If you have many different React roots it can be a pain to set up configuration nodes all over the place. By creating your own wrapper you can unify that configuration into one place.
  5. Jun 2020
    1. According to our understanding of the inconsistencies, the feature was likely trying to support too many edge cases. All caching strategies have weaknesses and eventually break down if the usage is not properly scoped.
    1. For the longest time, whenever I read the news, I’ve often felt the depressing sensation of lacking the background I need to understand the stories that seem truly important. Day after day would bring front pages with headlines trumpeting new developments out of city hall, and day after day I’d fruitlessly comb through the stories for an explanation of their relevance, history or import. Nut grafs seemed to provide only enough information for me to realize the story was out of my depth.
    1. Links can sidestep this debate by seamlessly offering context and depth. The journalist can break a complex story into a non-linear narrative, with links to important sub-stories and background. Readers who are already familiar with certain material, or simply not interested, can skip lightly over the story. Readers who want more can dive deeper at any point. That ability can open up new modes of storytelling unavailable in a linear, start-to-finish medium.

      storytelling: digital, not digitised

    1. I don’t want the product with the best content overall, I want the product that is going to serve me up the best content every single time, regardless of whether or not it was created in-house.

      discovery, aggregation, curation. narrator

    1. Just as journalists should be able to write about anything they want, comedians should be able to do the same and tell jokes about anything they please

      where's the line though? every output generates a feedback loop with the hivemind, turning into input to ourselves with our cracking, overwhelmed, filters

      it's unrealistic to wish everyone to see jokes are jokes, to rely on journalists to generate unbiased facts, and politicians as self serving leeches, err that's my bias speaking

    1. I could get a lot more done in an 8-9 hour day with a PC and a desk phone than I get done now in a 9-10 hour day with a laptop /tablet / smartphone, which should allow me to be more a lot more productive but just interrupt me. I don't want the mobile flexibility to work anywhere. It sucked in management roles doing a full day then having dinner with friends and family then getting back to unfinished calls and mails. I much prefer to work later then switch off totally at home.
    1. One thing that would certainly be a game-changer would be some form of standardized RCS end-to-end encryption that allows secure messages to be sent outside Google Messages.
    2. The answer, of course, is end-to-end encryption. The way this works is to remove any “man-in-the-middle” vulnerabilities by encrypting messages from endpoint to endpoint, with only the sender and recipient holding the decryption key. This level of messaging security was pushed into the mass-market by WhatsApp, and has now become a standard feature of every other decent platform.
    3. The issue, though—and it’s a big one, is that the SMS infrastructure is inherently insecure, lending itself to so-called “man-in-the-middle attacks.” Messages run through network data centres, everything can be seen—security is basic at best, and you are vulnerable to local carrier interception when travelling.
    1. When you make a call using Signal, it will generate a two-word secret code on both the profiles. You will speak the first word and the recipient will check it. Then he will speak the second word and you can check it on your end. If both the words match, the call has not been intercepted and connected to the correct profile
  6. May 2020
    1. We’ve dived deep here, with a series of different pull requests that optimize certain pathological cases involving large unions, intersections, conditional types, and mapped types.
    1. Although working together towards a common goal tends to cause an increased feeling of agency, the inflation of control could have many unforeseen consequences.
    2. Thinkers have only just begun to empirically explore the many factors that cause a person to feel as though they are in control
    1. they’re a new media form, with different possibilities from either essays or code, and with striking opportunities to go much further

      we run with what we have

      that author of Cognitive Productivity, created some tagging systems "confined" by his tool at hand

      people using twitter threads to branch out thoughts e.g. visa, and https://twitter.com/PeterorjustP/status/1139267256263872518

      people got hooked on roam because it allows "graph thinking", linking concepts (#roamcult)

      people enjoy andy's evergreen notes because it stacks like a paper, intuitive

      people enjoy sketchnotes and sketch summaries for talks, books because it's not as linear, easy to absorb

      people absorb tutorial and demos in videos better than text (at least I do) -- effective. e.g. knovigator, worldbrain, roam...

      youtube / instructional vids / media helps internalisation of tacit knowledge more (that basketball whiz kid who got the footwork down from studying on youtube)

      people enjoying figma because the UX is the best so far. miro as well.

    1. Part of the problem of social media is that there is no equivalent to the scientific glassblowers’ sign, or the woodworker’s open door, or Dafna and Jesse’s sandwich boards. On the internet, if you stop speaking: you disappear. And, by corollary: on the internet, you only notice the people who are speaking nonstop.

      This quote comes from a larger piece by Robin Sloan. (I don't know who that is though)

      The problem with social media is that the equivalent to working with the garage door open (working in public) is repeatedly talking in public about what you're doing.

      One problem with this is that you need to choose what you want to talk about, and say it. This emphasizes whatever you select, not what would catch a passerby's eye.

      The other problem is that you become more visible by the more you talk. Conversely, when you stop talking, you become invisible.

    1. Google encouraging site admins to put reCaptcha all over their sites, and then sharing the resulting risk scores with those admins is great for security, Perona thinks, because he says it “gives site owners more control and visibility over what’s going on” with potential scammer and bot attacks, and the system will give admins more accurate scores than if reCaptcha is only using data from a single webpage to analyze user behavior. But there’s the trade-off. “It makes sense and makes it more user-friendly, but it also gives Google more data,”
    2. This kind of cookie-based data collection happens elsewhere on the internet. Giant companies use it as a way to assess where their users go as they surf the web, which can then be tied into providing better targeted advertising.
    3. For instance, Google’s reCaptcha cookie follows the same logic of the Facebook “like” button when it’s embedded in other websites—it gives that site some social media functionality, but it also lets Facebook know that you’re there.
    1. With this method, you can ensure the email address receiving your communication actually belongs to the person giving the consent and hereby further ensure that you avoid high unsubscribe rates, retain the integrity of your list and the reputation of your address. This method of registration is considered best practice in many countries, especially Germany and in the EU in general.
    2. Generally, these laws apply to any service targeting residents of the region, which effectively means that they may apply to your business whether it’s located in the region or not.
    1. Generally, such legislations apply to any service targeting residents of the region, which effectively means that they may apply to your business whether it’s located in the region or not
    2. These rules usually apply to any company selling to EU residents but may vary for international sellers on a case-by-case basis. It is worth noting, however, that in recent cases US courts have chosen to uphold the applicable EU law.
    1. The only reason why your workaround isn't blocked as well is because it has additional steps that don't explicitly breach Mozilla's policies. But it certainly defeats the spirit of it.
  7. Apr 2020
    1. many organisations block torrents (for obvious reasons) and I know, for example, that either of these options would have posed insurmountable hurdles at my previous employment
    2. Actually, I probably would have ended up just paying for it myself due to the procurement challenges of even a single-digit dollar amount, but let's not get me started on that
    1. the security risk argument doesn't make sense. Numerous social media and forum sites support HTML and they don't seem particularly prone to security issues.
    1. This repository contains the parts of the RubyMotion product that are opensource. It does not contain the full product, which can be purchased at www.rubymotion.com.
    1. They are proof that our openness about our data formats means that you do not have to fear data lock-in.
    2. It’s this third way that we avoid lock-in that is relevant to today’s topic. Our data format design is specified well enough so that people with no connection to AgileBits can write software to be able to handle it.
    1. Of course, just because your users want a copy of their data doesn't necessarily mean that they're abandoning your product. Many users just feel safer having a local copy of their data as a backup.
    2. If you don't—or can't—lock your users in, the best way to compete is to innovate at a breakneck pace. Let's use Google Search as an example. It's a product that cannot lock users in: users don't have to install software to use it; they don't have to upload data to use it; they don't have to sign two-year contracts; and if they decide to try another search engine, they merely type it into their browser's location bar, and they're off and running.
    3. it is far preferable to spend your engineering effort on innovation than it is to build bigger walls and stronger doors that prevent users from leaving
    4. Want to keep your users? Just make it easy for them to leave.
    5. Users are starting to realize, however, that as they store more and more of their personal data in services that are not physically accessible, they run the risk of losing vast swaths of their online legacy if they don't have a means of removing their data.
    1. 1Password wasn’t built in a vacuum. It was developed on top of open standards that anyone with the right skills can investigate, implement, and improve. Open tools are trusted, proven, and constantly getting better. Here’s how 1Password respects the principles behind the open tools on which it relies:

      I found it ironic that this proprietary software that I have avoided using because it is proprietary software is touting the importance of open tools.

    1. Patients with diffuse cerebral edema resulting in excessive ICP may require a decompressive craniectomy, although a recent AAST multicenter trial questioned the benefits.
    2. The goal of resuscitation and management in patients with head injuries is to avoid hypotension (SBP of <100 mmHg) and hypoxia (partial pressure of arterial oxygen of <60 or arterial oxygen saturation of <90%).
    1. “By using a mask, even if it doesn’t do a lot, it moves the locus of control to you, away from the virus. It gives the individual a greater sense of control in this otherwise not-controlled situation.”
  8. Mar 2020
    1. Piwik PRO uses a fork of Piwik open-source software (similarly to RedHat using the Linux kernel and multiple open source tools), however we currently seamlessly integrate a part of open source Piwik in our proprietary platform via APIs. Moreover, Piwik PRO controls all the changes to the code used in its Analytics Suite and since 2016 has been maintaining and developing its own fork of “Piwik” alongside the proprietary modules of Analytics Suite.
    1. That outcome, in fact, is why the General Data Protection Regulation has been introduced. GDPR is being billed by the EU as the biggest shake-up of data privacy regulations since the birth of the web, saying it sets new standards in the wake of the recent Facebook data harvesting scandal.
    1. The mean time taken in the group II (bromelain) was 335.30 seconds which was nearly equal to the mean time of group I (papain) of 352.33 seconds.

      This is slightly longer than normal teeth brushing sessions, but the frequency of brushing implies that my bromelain/papain toothpaste is more than adequate to deal with dental caries. Additionally, carries prior to tooth extraction are generally going to be small, meaning that a single brushing session might remove them.

    1. Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in.
    1. Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
    2. has shone a spotlight on the risks that flow from platforms that operate by systematically keeping their users in the dark.
    3. The deceitful obfuscation of commercial intention certainly runs all the way through the data brokering and ad tech industries that sit behind much of the ‘free’ consumer Internet. Here consumers have plainly been kept in the dark so they cannot see and object to how their personal information is being handed around, sliced and diced, and used to try to manipulate them.
    4. design choices are being selected to be intentionally deceptive. To nudge the user to give up more than they realize. Or to agree to things they probably wouldn’t if they genuinely understood the decisions they were being pushed to make.
    1. For instance, a strict interpretation of the law would require publishers to get opt-in consent by individual vendor, rather than an 'Accept All' pop-up prompt. The approach that publishers and ad tech vendor are taking is that a mass opt-in button - with an option to dive deeper and toggle consent by vendor - follows the "spirit of the law". This stance is increasingly coming under fire, though, especially as seen by a new study by researchers at UCL, MIT, and Aarhus University.
  9. Feb 2020
    1. If immediate admission is not possible, start emergency treatment in primary care

      1) lie flat

      2) pilocarpine drops

      • 2% in blue eyes
      • 4% in brown eyes

      3) acetazolamide 500 mg orally

    1. k6 does not run in Node.js because it would perform poorly while running larger tests.Javascript is not generally well suited for high performance. It's a Go program - to achieve maximum performance - embedding a JavaScript runtime for running tests written in JavaScript.
  10. Jan 2020