10 Matching Annotations
  1. Jul 2022
    1. “We have certain events to relate,” Mr. Franklin proceeded; “and we have certain persons concerned in those events who are capable of relating them. Starting from these plain facts, the idea is that we should all write the story of the Moonstone in turn–as far as our own personal experience extends, and no farther. We must begin by showing how the Diamond first fell into the hands of my uncle Herncastle, when he was serving in India fifty years since. This prefatory narrative I have already got by me in the form of an old family paper, which relates the necessary particulars on the authority of an eye-witness. The next thing to do is to tell how the Diamond found its way into my aunt’s house in Yorkshire, two years ago, and how it came to be lost in little more than twelve hours afterwards. Nobody knows as much as you do, Betteredge, about what went on in the house at that time. So you must take the pen in hand, and start the story.”

      Mr. Franklin suggests that more first- and third-person narrators i.e., characters in the story, be included to tell the tale about the Diamond and its disappearance. But how reliable is the evidence that each one has to offer? This is probably at the heart of this detective story.

  2. Jun 2021
    1. Giving peers permission to engage in dialogue about race and holding a lofty expectation that they will stay engaged in these conversations throughout the semester or year is the first of the four agreements for courageous conversation. While initially, some participants may be eager to enter into these conversations, our experience indicates that the more personal and thus risky these topics get, the more difficult it is for participants to stay committed and engaged." Singleton and Hays

  3. Feb 2021
  4. Jan 2021
  5. Sep 2020
  6. Oct 2019
    1. ) Blockchain MemoryWe let LL be the blockchain mem-ory space, represented as the hastable L:{0,1}256→{0,1}NL:\{0,1\}^{256}\rightarrow \{0, 1\}^{N}, where N≫N \gg 256 and can store sufficiently-large documents. We assume this memory to be tamperproof under the same adversarial model used in Bitcoin and other blockchains. To intuitively explain why such a trusted data-store can be implemented on any blockchain (including Bitcoin), consider the following simplified, albeit inefficient, implementation: A blockchain is a sequence of timestamped transactions, where each transaction includes a variable number of output addresses (each address is a 160-bit number). LL could then be implemented as follows - the first two outputs in a transaction encode the 256-bit memory address pointer, as well as some auxiliary meta-data. The rest of the outputs construct the serialized document. When looking up L[k]L[k], only the most recent transaction is returned, which allows update and delete operations in addition to inserts.

      This paragraph explains how blockchain hides one's individual identity and privacy, while giving them a secure way of using the funds. In my opinion lot hacker ransomware are done using block-chain technology coins, this and one more paragraph here is really interesting to read about how blockchain helps protect personal data. and i also related this this hacking and corruption or money laundering

  7. Jul 2019
  8. Apr 2019
    1. ​Technology is in constant motion. If we try to ignore the advances being made the world will move forward without us. Instead of trying to escape change, there needs to be an effort to incorporate technology into every aspect of our lives in the most beneficial way possible. If we look at the ways technology can improve our lives, we can see that technology specifically smartphones, have brought more benefits than harm to the academic and social aspects of teenagers lives, which is important because there is a constant pressure to move away from smart devices from older generations. The first aspect people tend to focus on is the effect that technology has on the academic life of a teen. Smartphones and other smart devices are a crucial part of interactive learning in a classroom and can be used as a tool in increasing student interest in a topic. For example, a popular interactive website, Kahoot, is used in many classrooms because it forces students to participate in the online quiz, while teachers can gauge how their students are doing in the class. Furthermore, these interactive tools are crucial for students that thrive under visual learning, since they can directly interact with the material. This can be extended to students with learning disabilities, such as Down Syndrome and Autism,​ research has shown that using specialized and interactive apps on a smart device aids learning more effectively than technology free learning. Picture Picture Another fear regarding technology is the impact it has on the social lives of young adults, but the benefits technology has brought to socializing outweighs any possible consequences. The obvious advantage smartphones have brought to social lives is the ability to easily communicate with people; with social media, texting, and calling all in one portable box there is no longer a struggle to be in contact with family and friends even if they are not in your area. Social media can also be used for much more In recent years, social media has been a key platform in spreading platforms and movements for social change. Because social media websites lower the barrier for communicating to large groups of people, it has been much easier to spread ideas of change across states, countries, or the world. For example, after Hurricane Sandy tore apart the northeastern United States, a movement called "Occupy Sandy" in which people gathered to provide relief for the areas affected was promoted and organized through social media. Other movements that have been possible because of social media include #MeToo, March for Our Lives, #BlackLivesMatter, and the 2017 Women's March. ​