512 Matching Annotations
  1. May 2020
    1. they sought to eliminate data controllers and processors acting without appropriate permission, leaving citizens with no control as their personal data was transferred to third parties and beyond
    1. “Until CR 1.0 there was no effective privacy standard or requirement for recording consent in a common format and providing people with a receipt they can reuse for data rights.  Individuals could not track their consents or monitor how their information was processed or know who to hold accountable in the event of a breach of their privacy,” said Colin Wallis, executive director, Kantara Initiative.  “CR 1.0 changes the game.  A consent receipt promises to put the power back into the hands of the individual and, together with its supporting API — the consent receipt generator — is an innovative mechanism for businesses to comply with upcoming GDPR requirements.  For the first time individuals and organizations will be able to maintain and manage permissions for personal data.”
    2. Its purpose is to decrease the reliance on privacy policies and enhance the ability for people to share and control personal information.
  2. Apr 2020
    1. Of course, just because your users want a copy of their data doesn't necessarily mean that they're abandoning your product. Many users just feel safer having a local copy of their data as a backup.
    1. “By using a mask, even if it doesn’t do a lot, it moves the locus of control to you, away from the virus. It gives the individual a greater sense of control in this otherwise not-controlled situation.”
  3. Mar 2020
    1. you have less direct control as you must rely on the vendor’s adherence to IAB’s guidelines for compliance.
    2. Directly blocking the vendor scripts (using another prior blocking method), then executing them only after consent has been collected. This method requires more implementation work and it’s a bit slower in terms of execution time, but it allows personalized ads to be served from the first page view (where consent hasn’t been collected yet) and gives you more direct and solid control in regards to ensuring compliance.

      pros:

      • allows personalized ads to be served from the first page view (where consent hasn’t been collected yet)
      • gives you more direct and solid control in regards to ensuring compliance.
    1. Matomo continues to champion the right for people to be in control of their own information.
  4. Dec 2019
    1. For example: I wanted a way to add recurring tasks to my list, so I wrote a simple bash script called goodmorning.sh. It uses the command prompt client to quickly add a bunch of tasks to my todo list of choice. I run this script first thing in the morning every workday, and I like it better than any built-in system I’ve found for recurring tasks, because it’s fully under my control.
    1. Arguably, the rails-team's choice of raising ArgumentError instead of validation error is correct in the sense that we have full control over what options a user can select from a radio buttons group, or can select over a select field, so if a programmer happens to add a new radio button that has a typo for its value, then it is good to raise an error as it is an application error, and not a user error. However, for APIs, this will not work because we do not have any control anymore on what values get sent to the server.
    1. I really dislike the reasoning as stated in the issue listed above. Since the value is coming over the wire, it should be treated the same as a freetext input where the expectation is to validate in the model and not the controller. This is especially true in APIs where the developers have even less of a say as far as expected input coming from form data (for example).
  5. Nov 2019
    1. the issues of violence with race and racism inAmerica

      Many letters talked about immigration and gun control. I think this is a huge issue the country is facing now and this study reflects the importance of that issue.

  6. Oct 2019
  7. Aug 2019
  8. Jul 2019
    1. Unplanned pregnancies are a significant problem in the United States. According to a 2012 Brookings Institution report, more than 90 percent of abortions occur due to unintended pregnancy.

      This is crucial to realize the importance of this statistic. Up to 90 percent of abortions that occur could be prevented, if we could help lower unintended pregnancies. After doing a lot of research I found that the, about 90 percent of abortions are unintended statistic, is quite accurate and average across America.

  9. May 2019
  10. Apr 2019
    1. “The brain-disease model takes control over people’s fate out of their own hands and puts doctors and insurance companies in charge of fixing their problems. Over the past three decades psychiatric medications have become a mainstay in our culture, with dubious consequences.”
    1. one way that localities could qualify for grants under the Warren bill is by implementing rent stabilization or rent control.

      By making sure renters stay where they are and that landlords cannot get market rent for their properties, it will discourage the building of rental units and encourage the selling of existing rental units.

  11. Mar 2019
  12. www.microbiologyresearch.org www.microbiologyresearch.org
    1. The fluorescence signal atCT37±7 corre-sponds to the no-template-control andrepresents bacterial DNA contamination inthe commercially supplied reagents.
  13. Feb 2019
    1. e ma

      I can't remember who said this (maybe Stephen King?), but they described writing as a form of telepathy for exactly this reason: transferring ideas from one person to another. This idea is dramatized in Black Robe, a film about Jesuit missionaries in Canada during the 17th century. Worth a watch.

  14. Jan 2019
    1. he belief that grammatical categoriesreflect the underlying structure of the world is a continuing seductivehabit of mind worth questioning.

      I think this also relates back to the idea that we always feel the need to have control and control others. In a sense, I believe grammar gives us that control.

    1. Your hardware modular rig is completely integrated,

      Only started playing with Bitwig’s HW/CV integration a few days ago but it’s easy to get inspired by this.

    2. all signals are interchangeable so any out port can be connected to any in port

      For those of us who’ve had to deal with distinctions between audio and control signals, this is actually pretty major. However, it’s already become something in modular synthesis. People who get started in Eurorack, for instance, may not need to worry nearly as much about different types of signals as those who used Csound or, more importantly for this marketing copy, Cycling ’74 Max.

  15. Sep 2018
    1. It would be if he knew he was wrong. I can’t put my finger on it, but I sense something strange about him.

      Distrust. Even without any quantifiable proof of there being any error with Hal, it is the distrust that manifests itself in the relationship between the humans and him. This will be one of the most important features of our relationship with sentient machines in the future as well - whether we will be able to trust independently-thinking machines with control of critical aspects of our society.

    1. In 2007, the pharmaceutical company Bayer gave up on a male contraceptive “that involved an annual implant and a quarterly injection,” as my colleague Olga Khazan reported in 2015. The company, she wrote, “concluded that men would consider the regimen—in the words of a spokesperson—‘not as convenient as a woman taking a pill once a day.’”

      I AM FROTHING AT THE MOUTH I AM SO ANGRY

    2. College enrollment has historically been higher among women who have access to the pill, and “birth control has been estimated to account for more than 30 percent of the increase in the proportion of women in skilled careers from 1970 to 1990,” the report reads.

      But how has their academic performance been [negatively] impacted by bad side effects?

    3. he might have mood swings.

      Greater aggression? --> more frequent violence toward women?

    4. most men wanted to continue using the injectable birth control—more than 80 percent of them said they would choose to use it.*

      THIS IS MADDENING

    5. “It was believed women would tolerate side effects better than men, who demanded a better quality of life,”

      THIS IS SO INCREDIBLY FUCKED UP.

  16. Aug 2018
    1. Legislative staff members had finished rewriting AB 375, and a deal seemed imminent. That Friday, as he drank his morning coffee, Mactaggart decided to read the new bill — the fine print — one more time. He noticed a seemingly minor alteration in one section, the kind of thing most people would skip over. Mactaggart realized it would completely gut what remained of the private right of action. Furious, he called Hertzberg and Chau and told them the deal was off. Neither lawmaker could explain who made the change, Mactaggart told me, but Hertzberg scrambled to fix it. “In most negotiations, you are talking to all these different interest groups,” Hertzberg told me recently. “This is a situation where we had to go and reach out to everyone and bring that information to Mr. Mactaggart and ask him what he wanted to do.”

      Here's a case where we ought to consider creating our bills and laws via version control, so we can see exactly who, what, and when things changed along the way. It might mean much less gets done, but there'd be a lot more transparency and accountability.

    1. Contrary to paper notes, computer files do not display the traces or versions that led to their final state.

      This seems weirdly overstated. How do paper notes maintain versions and traces? Electronic documents contain rich sources of meta data for trace analysis, as well as various options to explicitly demonstrate temporal order and change through formatting.

  17. Jul 2018
    1. However, as Mark Poster points out, 'the new level of interconnectivity heightens the fragility of the social net­works. '·50 The source of control now undermines its execu­tion. For clock time to exist and thus to be measurable and controllable there has to be duration, an interval between two points in time. Without duration there is no before and after, no cause and effect, no stretch of time to be measured. The principles of instantaneity and simultaneity of action across space, as I have shown in chapter 3, are encountered in quantum physics; they have no place in the Newtonian world of causality and bodies in motion, the world chat we as embodied beings inhabit. The control of time that has reached the limit of compression has been shifted into a time world where notions of control are meaningless. More like the realm of myths and mysticism, the electronic world of interchangeable no-where and now-here requires knowledge and modes of being that are alien to the industrial way of life. Other modes of temporal existence, therefore, may hold some viral keys, their 'primitive' understanding of time point­ing not ro control but to more appropriate ways of being in the realm of insrantaneity.

      Adam argues that control of time is futile in an interconnected network where hyper-compression has effectively rendered duration/intervals of time as unmeasurable.

      If temporality cannot be "measured, fixed, regulated or controlled" (see timescapes image), then time cannot be controlled.

      Subsequently, we need other approaches to be "in the realm of instantaneity."

    2. This control clusrer of the five Cs of time, I have suggested, needs to be differentiated from both time tempering and transcendence, on the one hand, and time knowledge and know-how, on the other, since only in the control cluster is time objectified, externalized and con­structed to specific design principles.

      "... only in the control cluster is time objectified, externalized and con­structed to specific design principles."

      Tempering vs knowledge are also important distinctions for the SBTF time-study.

    3. This industrial norm, as I suggested above, is fundamen­tally rooted in clock time and underpinned by naturalized assumptions about not just the capacity but also the need to commodify, compress and control time.
    4. the Reformation had a major role to play in the metamor­phosis of time from God's gift to commodified, comp�essed, colonized and controlled resource. These four Cs of mdus­trial time -comrnodification, compression, colonization and control -will be the focus in these pages, the fifth C of the creation of clock time having been discussed already in the previous chapter. I show their interdependence and id�ntify some of the socio-environmental impacts of those parttcular temporal relations.

      Five C's of industrial time: Commodification, compression, colonialization, control, and clock time.

    1. For now, the Solid technology is still new and not ready for the masses. But the vision, if it works, could radically change the existing power dynamics of the Web. The system aims to give users a platform by which they can control access to the data and content they generate on the Web. This way, users can choose how that data gets used rather than, say, Facebook and Google doing with it as they please. Solid’s code and technology is open to all—anyone with access to the Internet can come into its chat room and start coding.
  18. Jun 2018
    1. I think there is a need to develop a system to track the draft of a manuscript from the beginning to the end of the process.

      If you're drafting in WordPress you can set the number of revisions of your posts to infinite so that you can keep (archive) all of your prior drafts. see: https://codex.wordpress.org/Revisions

  19. May 2018
    1. the one that patients and families often have the greatest control over is making decisions that are in the patient’s best interest

      A passing on of control over decisions has become an experience that many elders go through as their health declines.

  20. Apr 2018
    1. In contemporary debates, gun control advocates often respond to assertion of second amendment individual rights to gun ownership by emphasizing the amendment’s reference to a “well regulated militia.”

      Hopefully this suggestion will be accepted in the spirit it is offered (gently!) and if acted upon, would not lengthen the intro too much, but rather help clarify the "anticipatory set" of the reading. Although the first sentence is quite accurate, as someone who has been doing extensive reading on the 2nd Amendment lately, I had to re - read this to be sure I understood the assertion. Bouncing back & forth from references to 1) gun control advocates 2) individual rights to gun ownership and back to 3) reference to a well regulated militia is likely to confuse H.S. readers who may have little interest or grasp of the ideas.

      Suggest: First of all - since it is so brief, it might be useful to actually provide the complete wording of Amendment Two. (Perhaps above the green "About this text" box.)

      Secondly - a note suggesting that gun control advocates tend to focus upon the "militia" clause while gun owner rights advocates often prefer to focus on the second clause re: right to own.

      Thirdly - a (brief) suggestion that the two sides do not even agree upon what constitutes a "militia" and that the context and historical evidence for each side's arguments are lengthy and complex.

      The second sentence beginning " In the excerpt below, is critical to help set the context of the reading, however, there seems to be room to minimize the verbiage without losing meaning.

  21. Jan 2018
    1. The Stack es el nuevo nomos o geografía política de la Tierra. Es la dimensión que necesitamos añadir a la tríada analítica del Estado, la sociedad civil y el mercado —así que ahora también tenemos la Plataforma o The Stack—. Dentro de ella la nube y el usuario operan una sub-estructura, que Bratton llama Black Stack, una ‘totalidad computacional’ de hardware y software que produce una geopolítica acelerada y que media y da forma a las economías como a las subjetividades, transformando el significado de lo humano mediante la proliferación de sus habitantes y usuarios no humanos. Más aún, para algunos activistas, las infraestructuras digitales son el ancla y medio esencial de las nuevas tecnologías de gobierno de las poblaciones, más allá de los estados y los mismos intereses económicos, y su propósito no es otro que el control, así se sea bajo la apariencia de la libertad de interacción (Invisible Committee 2014). Esta geo/biopolítica de lo digital tiene profundas implicaciones para el diseño.
  22. Nov 2017
    1. Othersmaydismissthesebills,charters,declarations,andmanifestosfortheirlackoflegalorevenperformativeforce.Theymayarguethatregardlessofsuchdeclarations,orevenperhapsinthefaceofthem,statesandcorporationscontinuetocolonizecyberspaceandplaysovereigntygames.TheymayarguethatitisnolongerjuststatessuchasChina,whichpioneeredfilteringandblocking(euphemisticallycalledtheGreatFirewall),butalsoahugerange,includingtheUnitedKingdom,UnitedStates,andEuropeanstatesthatareengagedinthisbattleforcontrol.Moreover,thisisnotastrugglebetweenstatesandtheircitizensbutastruggleinvolvingthecollusionandcomplicityofespeciallyAmericancorporationsinvariousrolesasserviceprovidersorconsultantsforfiltering,blocking,andcensoring.[75]Thesecriticismshaveconsiderablemerits.

    Tags

    Annotators

  23. Oct 2017
    1. inHabboHotelcontrolismodulatedwherenewactionsareconstantlybeingincorporated,aninventivepowerthatisworkingbyinclusion,asFoucaultillustrated,and‘whoseeffectwillbegreaterthanthesumofitscomponentparts’,asDeleuzeargued.
    2. Cohenreferstoblockingas‘architecturesofcontrol’and‘regimesofauthorization’thatareauthoritarianinthegenericsensethattheyfavourcompliantobediencetoauthority.[11]Ratherthanexperiencingrules—whichneednotbeexplainedordisclosed—shearguesthatusersexperiencetheireffects,whichconsistofpossibilitiesforactionthatnetworkscreate.Sowhileconcernsaboutthesurveillanceandcollectionofdigitaltracesaremostcontroversial(discussedbelow),thetransparencyofnetworkprocessesandhowaccesstoknowledgeisbeingfilteredarelessvisibleandcontrollable.Filteringalsooccursthroughtheauthorizationsattachedtocontentanddevices

      [...] So while sharing is a calling, it is increasingly only within certain regimes of authorization that sharing operates, and in this regard it can be understood as a form of submission.

    3. JonathanFranzenaccusesAmazonofturningliterarycultureintoshallowformsofsocialengagementconsistingof‘yakkersandtweetersandbraggers’andTwitterasthe‘ultimateirresponsiblemedium.’[89]Thesemisfiresproduceatleasttwoinfelicities.First,inadvertentlytheyendupascribingmorepowertosuchcorporationsasAmazonorGooglethantheyactuallyhave.WhilemuchattentionisgiventotheautomatedandcomputationalaspectsofGoogle,theworkingsofthesearchengineareunstableandrelyonthedistributed,heterogeneous,anddynamicactionsofnotonlyalgorithmsbutalsoengineers,operators,webmasters,andusers.[90]Second,theyascribelesspowertopeoplethantheyactuallyhave.WhiletherulesofGoogle’salgorithmandfunctionssuchasautocompleteareatightlyheldsecret,Google’soperationisshapedandmediatedbythesearch-and-findbehavioursofcitizensubjects
    4. Ifwefocusoncallingsandtheactionstheymobilizeandhowtheymakeactspossible,wealsoshiftourfocusfromafreedomversuscontroldichotomytotheplayofobedience,submission,andsubversion.Thisisaplayconfiguredbytheforcesoflegality,performativity,andimaginarywhichcalluponsubjectstobeopenandresponsibleandthroughwhichmostlygovernmentalbutalsocommercialandnongovernmentalauthoritiestrytomaintaintheirgripontheconductofthosewhoaretheirsubjects.
    1. Trump noticeably avoided talking about gun control when he was asked about it, saying that he would speak on the matter with the police as a general assembly. In 2000, trump had different standpoint on gun control, saying that he wanted a ban on assault guns. Personally I think background checks should be placed on people with accounts of a 1 or more felonies. And that weapons with a lethality higher than a pistol's should be restricted during a person's review as a pistol is enough for self defense.

  24. Sep 2017
    1. Deleuzethinksthat,bycontrast,incontrolsocieties‘thekeythingisnolongerasignatureornumberbutacode:codesarepasswords,whereasdisciplinarysocietiesareruled...byprecepts.’[67]Heobservesthat‘thedigitallanguageofcontrolismadeupofcodesindicatingwhetheraccesstosomeinformationshouldbeallowedordenied.’[68]ForDeleuze,controlsocietiesfunctionwithanewgenerationofmachinesandwithinformationtechnologyandcomputers.Forcontrolsocieties,‘thepassivedangerisnoiseandtheactive[dangersare]piracyandviralcontamination.

      [...] For Deleuze, ‘[i]t’s true that, even before control societies are fully in place, forms of delinquency or resistance (two different things) are also appearing. Computer piracy and viruses, for example, will replace strikes and what the nineteenth century called “sabotage” (“clogging” the machinery).’

      Otras formas de contestación pueden referirse a la creación de narrativas alternativas usando las mismas herramientas que crean las estructuras de control.

    2. Deleuzewasnowconvincedthat‘[w]e’removingtowardcontrolsocietiesthatnolongeroperatebyconfiningpeoplebutthroughcontinuouscontrolandinstantcommunication.’[65]Thespaceofcontrolsocietieswasdiffuseanddispersedanddecisivelycyberneticinitsmodesofgovernment.
    1. Critiquing such claims as sensationalist, recent work identifies a problem of demarcation by which people control access to technical agency and who counts as innovative (Irani, 2015; Lindtner, 2015), illuminating differ-ent and multiple hacking histories. Gabriella Coleman (2011), for example, compares the protest movement Anonymous and the whistle-blowing project WikiLeaks to clarify the varying political sensibilities and practices from which hacking develops

    Tags

    Annotators

    1. a lack of version control over the vast majority of the research literature makes actually ‘adapting’ papers to include post-publication comments is impossible.

      This is also key.

  25. Jun 2017
    1. Self-control

      what is self control? controlling your desires, controlling emotions, focusing on meditation, not being distracted,

      this is honestly such a virtuous skill which is not easy in this world (kalyug)

    1. HTTP/1.1定义的 Cache-Control 头用来区分对缓存机制的支持情况, 请求头和响应头都支持这个属性。通过它提供的不同的值来定义缓存策略。

      Request Header与Response Header都支持这个属性 通过调整Cache-Control头可以做出很多缓存策略:

      1. 完全不支持
      2. 不缓存内容
      3. 私有缓存
      4. 公共缓存
      5. 缓存过期时间
  26. May 2017
    1. Every time a customer service assistant shrugs and says “computer says no” or an organization acts in crazy, inflexible ways, odds-are there’s a database underneath which has a limited, rigid view of reality and it’s simply too expensive to fix the software to make the organization more intelligent. We live in these boxes, as pervasive as oxygen, and as inflexible as punched cards.

      Isn't it interesting how the rigidity of institutionalised "old economy"-businesses and their management structure as well as their work ethics is, in a way, mimicked by their IT-architecture? Efficiency over effectiveness, stability over flexibility, repetition over creative destruction and innovation. And then came Agile...

  27. Apr 2017
    1. But brain interfaces can also put information in. Meaning a clever hacker might be able to change your thoughts or your vote or your identity or make you want to do something terrible you normally wouldn’t ever consider.

      "Imperio!" anyone? Regards from the-one-who-should-not-be-named, otherwise known as "Tom Riddle" or "Voldie"...

    1. "[ d]igital language makes control systems invisible; we no longer experience the visible yet unverifiable gaze, but a network of nonvisualizable digital control"

      The speaker at the Ong symposium this year was all about how digitization of books encourages a singular location and instance of a book, and all the problems that entails. That's interesting with this essay, and how Facebook and Google work to encourage a singular instance of a person. Google+, for all it's glaring issues, let you cultivate multiple categories of friends who could see X, Y, or Z, but I only have one facebook profile, for professional colleagues, family, and friends. Youtube doesn't like that I have two Gmail accounts, and tries to switch up which one is ending up on my user history. The language of control suggests guidance, someone directing the system, but there's also the risk of how blind, automated systems guide us.

  28. Jun 2016
  29. May 2016
  30. Jan 2016
    1. But even from this remove it was possible to glean certain patterns, and one that recurred as regularly as an urban legend was the one about how someone would move into a commune populated by sandal-wearing, peace-sign flashing flower children, and eventually discover that, underneath this facade, the guys who ran it were actually control freaks; and that, as living in a commune, where much lip service was paid to ideals of peace, love and harmony, had deprived them of normal, socially approved outlets for their control-freakdom, it tended to come out in other, invariably more sinister, ways.
  31. Dec 2015
  32. Oct 2015
    1. They succeed in doing so largely because the states underwhich they operate are the “soft-states,” in that despite their oftenauthoritarian disposition and political omnipresence, they lack the nec-essary capacity, the hegemony and technological efficacy, to impose full

      control over society."

      It's the people that push the boundaries who find out just how strong/weak they really are. It is more about the atmosphere of a disciplinary society aided by the people's fear that's being enacted throughout societies instead of actual and legitimate control.

  33. Aug 2015
    1. In order to avoid the confused deputy problem, asubject must be careful to maintain the associationbetween each authority and its intended purpose. Using the key analogy, one could imagine immediatelyattaching a label to each key upon receiving it, wherethe label describes the purpose for which the key is tobe used. In order to know the purpose for a key, thesubject must understand the context in which the key is received; for example, labelling is not possible if keysmagically appear on the key ring without the subject’sknowledge.
    2. Even if one can distinguish the keys, decidingto try all available keys puts one at risk of becoming aconfused deputy.
    3. We would argue that the “true” capability model is the object-capability model, because all known major capability systems take the object-based approach (forexamples, see [1, 4, 9, 11, 16, 17, 19, 21]). In all ofthese systems, a capability is an object reference–not something that behaves like a key or ticket in the realworld. Definitive books on capability-based systems[6, 16] also describe these systems from the object-capability perspective, and explicitly characterize themas “object-based”.
    4. The claim that capability systemsin general cannotenforce the *-Property appears to be based on themisunderstanding that capabilities and data are notdistinguishable.
    5. Theonly capability Bob holds to a lower level is a readcapability, so the *-Property is enforced. The onlycapability Alice holds to a higher level is a writecapability, so the Simple Security Property is enforced

      This paragraph would be clearer if the capabilities were written out fully:

      The only capability Bob holds to a lower level is a "read data" capability, so the *-Property is enforced. The only capability Alice holds to a higher level is a "write data" capability, so the Simple Security Property is enforced.

      Maybe. But it still seems confused. As though the properties are in the wrong sentences.

      Nonetheless, both properties are enforced.

    6. we examine three different models thathave been used to describe capabilities, and define a set of seven security properties that capture the distinctions among them
  34. Jul 2015
    1. leaves the grassroots movements exactly where they started from

      Only, it wastes their time, setting them back, testing their resolve. Had they not had the distraction and the illusion of a supposed solution they could have been busier doing things themselves.

  35. Jun 2015
    1. "Was wir sehen können, ist, dass 1,4 Milliarden Menschen eine Plattform zu einem mehr oder weniger zentralen Teil ihres Lebens gemacht haben, die von einem Menschen an der Spitze gesteuert wird", nämlich Mark Zuckerberg. "Niemand ist uns bisher so nahe an uns herangekommen."
  36. Feb 2015
  37. Nov 2013
    1. The intellect has now thrown the token of bondage from itself. At other times it endeavors, with gloomy officiousness, to show the way and to demonstrate the tools to a poor individual who covets existence; it is like a servant who goes in search of booty and prey for his master. But now it has become the master and it dares to wipe from its face the expression of indigence.

      This drive controls us.

  38. Oct 2013
    1. The causes of our deliberately intending harmful and wicked acts contrary to law are (1) vice, (2) lack of self-control

      I agree.

    2. Not all voluntary acts are deliberate, but all deliberate acts are conscious -- no one is ignorant of what he deliberately intends.)