699 Matching Annotations
  1. Last 7 days
  2. Jun 2021
  3. May 2021
    1. If you're already an admin for the zone in question, then the proper way to get that information is to log on to the DNS server or DNS control console and read it right from there. If you're not an admin for the zone, you're not supposed to have that information. Note that the person you are talking to on the phone is almost certainly not a DNS zone admin, so they also should not have that information. If they somehow did have it, they definitely shouldn't give it out over the phone. This is for your protection.
    2. DNS zone information is sensitive. Many years ago it was possible for anyone to query a DNS server and literally get back all the records at once, but that was a security issue. Now you have to be an admin for the zone to get that info.
    3. "Put as much information about the problem itself into the email". This is where you show your ability to know what is important and relevant and establish your technical level. Don't be brief, don't imply, and break it down Barney style so the person receiving it knows to escalate your ticket.
    4. Look for certain questions that have been asked every time, and put those answers into the initial email you send about the new problem. Try to add things that make the potential problem sound local. The more information you give them that you know they will be asking for in their script, the faster you will get someone who can help you. And they will thank you for it.
    5. If you email helpdesk (us specifically), if you use appropriate technical detail you will probably get someone who knows what they're doing, and will greatly appreciate it. If you call, you will get me only. I will ask you lots of questions, with awkward pauses in between while I write my notes, and at the end of it I probably won't be able to help you. Technical detail is still welcome, but there are some questions I will ask you anyway even if they sound useless to you
    6. Put as much information about the problem itself into the email, within reason. No need to write a paragraph, that takes time away from you and from us. Bullet points are perfect (preferred).
    1. Career decision making involves so much uncertainty that it’s easy to feel paralysed. Instead, make some hypotheses about which option is best, then identify key uncertainties: what information would most change your best guess?

      We tend to think that uncertainties can't be weighted in our decision-making, but we bet on uncertainties all the time. Rather than throw your hands up and say, "I don't have enough information to make a call", how can we think deliberately about what information would reduce the uncertainty?

    1. These “Songline” stories are ancient, exhibit little variation over long periods of time, and are carefully learned and guarded by the Elders who are its custodians [7].

      What is the best way we could test and explore error correction and overwriting in such a system from an information theoretic standpoint?

    1. I can refer to a section of page in a book by using #(booknr)p(pagenr)(section), for example #8p113a. There are four sections in my journals: A (upper left), B (down left), C (upper right), D (down right).

      An interesting page/section reference method.

    1. Petrus Ramus

      Just making note of the fact that Petrus Ramus was the advisor of Theodor Zwinger and apparently influcnced Jean Bodin, about whom Ann M. Blair writes about in Too Much to Know: Managing Scholarly Information Before the Modern Age.

      I suspect these influences may impinge on my work on the history of memory and its downfall due to Ramism since the late 1500s and which impacts the history of information.

    1. We still do not understand how information practices from the worlds of learning, finance, industry, and administration cross-pollinated. From the fourteenth century onward, accountants developed complex instructions for note-taking to describe holdings and transactions, as well for the recording of numbers and calculations. By the seventeenth century, merchants, and indeed ship captains, engineers, and state administrators, were known to travel with trunks of memoranda, massive inventories, scrap books, and various ledgers and log books that mixed descriptive notes and numbers. By the eighteenth century, tables and printed forms cut down on the need for notes and required less description and more systematic numerical notes. Notaries also were master information handlers, creating archives for their legal and financial documents and cross-referencing catalogue systems.

      I'm noticing no mention here of double entry book keeping or the accountant's idea of waste books.

      There's also no mention of orality or memory methods either.

    2. Humanists had the tools and even the concepts to invent the cross-referenced thematic library catalogue, but they did not do so. We do not know why it took several hundred years and the Italian director of the British Museum, Antonio Panizzi, to create a truly modern reference catalogue through his “Ninety-One Cataloguing Rules” in 1841.

      Origin of the modern reference catalogue...

    3. Why did a figure such as Leibniz fail to use his own tools? Perhaps messiness was the source of his creativity. This is a fact of intellectual originality with which Google must still grapple—libraries, after all, allow for the type of manageable disorder which is often the spark of creativity.

      Manageable disorder, messiness, and even chaos can be the source of boundless creativity.

      There's an idea in complexity theory that the most interesting things happen at the edge of chaos.

    4. Ideally, skilled readers organized notes into personal “arks of study,” or data chests. Vincent Placcius’s De arte excerpendi contains an engraving of a note cabinet, or scrinia literaria, in which notes are attached to hooks and hung on bars according to thematic organization, as well as various drawers for the storage of note paper, hooks, and possibly writing supplies. Both Placcius and later Leibniz built such contraptions, though none survives today. While these organizational tools cannot be directly linked to modern computers, it is difficult not to compare them. Placcius’s design looks strikingly like the old punch-card computation machines that date from the 1880s, and the first mainframes, such as the 1962 IBM 7090.

      "arks of study" being used as early data chests or stores is a fascinating conceptualization

    5. Conrad Gesner, the German author of the founding work of modern bibliography, the boldly titled Bibliotheca Universalis, claimed to list all known extant books in learned languages (Greek, Hebrew, and Latin) of eighteen thousand indexed authors. While he complained of a “harmful abundance of books,” he nonetheless gained his fame by cataloguing them.

      Add to the timeline

    6. In effect, Too Much to Know is a reference book about reference books, containing chapters on early “information management,” note-taking, reference genres and “finding devices,” compiling, and the impact of reference books.

      I love all of these various topics.

    7. The humanist remedy for information overload was to produce an unprecedented number of manuals about how to read books. They outlined what Blair calls the four S’s of early modern information management: storage, sorting, selection, summary.

      I'd love to have a list of these and some of their similarities. What would oral cultures have done? How would/did they manage their overflow of information, besides overwriting the new/improved and forgetting the old/unuseful?

    8. Vincent de Beauvais’s Speculum maius, in 1255, was the most ambitious compilation of summaries and excerpts of its time, containing some 4.5 million words.
    9. To extract knowledge successfully from reading was to “deflower” a book, as explained by the preface to the twelfth-century Libri deflorationum.

      Libri deflorationum

    10. Scholars such as Robert Darnton, Peter Burke, and Anthony Grafton have written about the long and colorful history of information.

      Some scholars to delve more deeply into. I've seen all three of these names in the past and have read some of their works.

    1. Schmitt, H.-J., Booy, R., Aston, R., Van Damme, P., Schumacher, R. F., Campins, M., Rodrigo, C., Heikkinen, T., Weil-Olivier, C., Finn, A., Olcén, P., Fedson, D., & Peltola, H. (2007). How to optimise the coverage rate of infant and adult immunisations in Europe. BMC Medicine, 5, 11. https://doi.org/10.1186/1741-7015-5-11

    1. Jonathan Rothberg 🦋. (2021, March 2). Testing works. I test daily. Insist on HOME testing. @michaelmina_lab @JoeBiden Research suggests B.1.526 needs to be closely watched “for its ability to evade both monoclonal antibody and, to a certain extent, the vaccine-induced antibody,” said Fauci [Tweet]. @JMRothberg. https://twitter.com/JMRothberg/status/1366755339912306688

  4. Apr 2021
    1. Implementation of a hospital information system in Limpopo Province

      failure of hospital information systems have affected people in Limpopo province as they still have to use the old school method for data collection about their patients. these will make it harder for leadership to monitor the progress of the strategies that they are using.

    2. The lessons learnt are applicable to the installation of all hospital information systems.

      There was no clear indication on the use of health information system in South Africa until couple of lessons were learnt when the hospitals were underperforming.

    1. This post articulates a lot of what I've been thinking about for the past 18 months or so, but it adds the additional concept of community integration.

      Interestingly, this aligns with the early, tentative ideas around what the future of In Beta might look like as a learning community, rather than a repository of content.

    1. Astreintes des chefs d'établissements scolaires 9e législature Question écrite n° 03237 de M. Philippe Madrelle (Gironde - SOC) publiée dans le JO Sénat du 26/01/1989 - page 118 M. Philippe Madrelle appelle l'attention de M. le ministre d'Etat, ministre de l'éducation nationale, de la jeunesse et des sports, sur les différentes modalités d'astreintes auxquelles sont assujettis les chefs d'établissements scolaires. Il lui demande de bien vouloir lui préciser si les chefs d'établissements sont obligés d'assurer d'une manière permanente la garde des bâtiments administratifs, pédagogiques et des logements de fonction de l'établissement où ils exercent leur activité professionnelle. Par ailleurs, il lui demande si cette astreinte est susceptible de s'étendre à d'autres personnels de l'établissement. Réponse du ministère : Éducation publiée dans le JO Sénat du 04/05/1989 - page 713 Réponse. - En plus de leurs responsabilités définies par le décret n° 85-924 du 30 août 1985 relatives au bon fonctionnement des établissements durant les périodes de présence des élèves, afin d'assurer la sécurité des personnes et des biens, les chefs d'établissement doivent assurer également un certain nombre d'obligations pendant les congés scolaires. La réglementation applicable en ce domaine conduit le chef d'établissement, dans le respect des dispositions statutaires en matière de congés annuels, à organiser durant les vacances une permanence qui répond à des objectifs précis : garantir le renseignement des familles et notamment prévoir l'inscription des élèves, permettre aux services académiques d'effectuer le travail préparatoire pour les rentrées scolaires, assurer l'encadrement du personnel de service pour la conduite des travaux d'entretien ou de réfection qui ne peuvent s'effectuer qu'en dehors de la présence des élèves, permettre la réponse de l'étab lissement aux sollicitations extérieures que peut appeler la politique d'ouverture du service public de l'éducation nationale. Il relève de la responsabilité du chef d'établissement d'établir à cet effet un service de vacances dans lequel, pour la période des vacances scolaires d'été, sa présence est notamment impérative deux semaines après la sortie des élèves et deux semaines avant leur rentrée. Sont astreints également au service des vacances, outre les chefs d'établissement, leurs adjoints, les personnels d'éducation ainsi que les personnels affectés au service d'intendance. S'agissant du gardiennage pendant la période de fermeture, il appartient au chef d'établissement de proposer à l'inspecteur d'académie, directeur des services départementaux de l'éducation, les modalités de mise en place de ce service et les éventuelles solutions de remplacement. Enfin, compte tenu des conséquences de l'organisation du service de vacances sur le fonctionnement des établissements, le chef d'établissement doit tenir informé selon le cas le président du conseil régional ou général du dispositif retenu.
    1. A reproduction of Carroll’snotes on his number alphabet will be found in Warren Weaver’s arti-cle “Lewis Carroll: Mathematician,” inScientific Americanfor April1956.)

      I need to track down this reference and would love to see what Weaver has to say about the matter.

      Certainly Weaver would have spoken of this with Claude Shannon (or he'd have read it).

  5. Mar 2021
    1. Take control of it for yourself.

      quite in contrast to the 2021 Congressional Investigation into Online Misinformation and Disinformation which places the responsibility on major platforms (FB, Twitter, YouTube) to moderate and control content.

    1. Because “open” may face a similar fate as befell “design” and “innovation,” terms that are alternatively inspiring and incomprehensible, both motivation and muddled jargon.

      "Information" is another word that might fit into this group of over-saddled words.

    1. The question, 'What is library and information science?' does not elicit responses of the same internal conceptual coherence as similar inquiries as to the nature of other fields, e.g., 'What is chemistry?', 'What is economics?', 'What is medicine?' Each of those fields, though broad in scope, has clear ties to basic concerns of their field. [...] Neither LIS theory nor practice is perceived to be monolithic nor unified by a common literature or set of professional skills. Occasionally, LIS scholars (many of whom do not self-identify as members of an interreading LIS community, or prefer names other than LIS), attempt, but are unable, to find core concepts in common
    2. Some believe that computing and internetworking concepts and skills underlie virtually every important aspect of LIS, indeed see LIS as a sub-field of computer science!
    1. Documentation science gradually developed into the broader field of information science.
    1. He introduces the idea of the apophatic: what we can't put into words, but is important and vaguely understood. This term comes from Orthodox theology, where people defined god by saying what it was not.

      Too often as humans we're focused on what is immediately in front of us and not what is missing.

      This same thing plagues our science in that we're only publishing positive results and not negative results.

      From an information theoretic perspective, we're throwing away half (or more?) of the information we're generating. We might be able to go much farther much faster if we were keeping and publishing all of our results in better fashion.

      Is there a better word for this negative information? #openquestions

    1. Another example: a list (<ul> or <ol>) should generally be used to group similar items (<li>). You could use a div for the group and a <span> for each item, and style each span to be on a separate line with a bullet point, and it might look the way you want. But "this is a list" conveys more information.
    1. ReconfigBehSci. (2020, November 5). In 4 days: SciBeh workshop ‘Building an online information environment for policy relevant science’ Join us! Topics: Crisis open science, interfacing to policy, online discourse, tools for research curation talks, panels, hackathons https://t.co/SPeD5BVgj3… I https://t.co/kQClhpHKx5 [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1324286406764744704

    1. ReconfigBehSci on Twitter: ‘1 week to the SciBeh workshop “Building an online information environment for policy relevant science” Join us, register now! Topics: Crisis open science, interfacing to policy, online discourse, tools for research curation talks, panels, hackathons https://t.co/Gsr66BRGcJ https://t.co/uRrhSb9t05’ / Twitter. (n.d.). Retrieved 2 March 2021, from https://twitter.com/SciBeh/status/1323207455283826690

  6. Feb 2021
    1. allowing you to limit what invoked tasks or nested activies “see” and what they propagate to the caller context.
    2. a method that doesn’t have access to variables outside its scope
    1. The term encapsulation is often used interchangeably with information hiding. Not all agree on the distinctions between the two though; one may think of information hiding as being the principle and encapsulation being the technique. A software module hides information by encapsulating the information into a module or other construct which presents an interface.
    1. The main purpose of this book is to go one step forward, not onlyto use the principle of maximum entropy in predicting probabilitydistributions, but to replace altogether the concept of entropy withthe more suitable concept of information, or better yet, the missinginformation (MI).

      The purpose of this textbook

    2. Thereare also a few books on statistical thermodynamics that use infor-mation theory such as those by Jaynes, Katz, and Tribus.

      Books on statistical thermodynamics that use information theory.

      Which textbook of Jaynes is he referring to?

    3. Levine, R. D. and Tribus, M (eds) (1979),The Maximum Entropy Principle,MIT Press, Cambridge, MA.

      Book on statistical thermodynamics that use information theory, mentioned in Chapter 1.

    4. Katz, A. (1967),Principles of Statistical Mechanics: The Informational TheoryApproach,W.H.Freeman,London.

      Books on statistical thermodynamics that use information theory.

    1. Programming to an interface means that when you are presented with some programming interface (be it a class library, a set of functions, a network protocol or anything else) that you keep to using only things guaranteed by the interface. You may have knowledge about the underlying implementation (you may have written it), but you should not ever use that knowledge.
    1. Any representation of information such as a chart, diagram or table. Multiple views of the same information are possible, such as a bar chart for management and a tabular view for accountants.
    1. sigma代数涵盖了“一切可能事件的一切可能组合”


    2. 所以这个sigma代数越大,那么信息就越多


      • sigma代数的大小如何理解?
      • 信息的定义?
    1. Tiger tiger burning bright. In the forest of the night. The falcon cannot hear the falconer. Things fall apart. When the stars threw down their spears what rough beast .

      This is a mix of lines from two poems - "Tyger" by William Blake and "The Second Coming" by William Butler Yeats.

    1. Searches and hashtags in social media are much less reliable as verification tools because you could be fishing within the "bubble" (or "echo chamber") of those who share common interests, fears and prejudices—and are more likely to be perpetuating myths and rumors.
  7. Jan 2021
    1. Group Rules from the Admins1NO POSTING LINKS INSIDE OF POST - FOR ANY REASONWe've seen way too many groups become a glorified classified ad & members don't like that. We don't want the quality of our group negatively impacted because of endless links everywhere. NO LINKS2NO POST FROM FAN PAGES / ARTICLES / VIDEO LINKSOur mission is to cultivate the highest quality content inside the group. If we allowed videos, fan page shares, & outside websites, our group would turn into spam fest. Original written content only3NO SELF PROMOTION, RECRUITING, OR DM SPAMMINGMembers love our group because it's SAFE. We are very strict on banning members who blatantly self promote their product or services in the group OR secretly private message members to recruit them.4NO POSTING OR UPLOADING VIDEOS OF ANY KINDTo protect the quality of our group & prevent members from being solicited products & services - we don't allow any videos because we can't monitor what's being said word for word. Written post only.

      Wow, that's strict.

    1. Muzzey had hoped that the advancement of technology might make the process easier over time, that tools like ContentID could streamline things for artists. But he says it hasn’t. “I’ve had to come to terms with the fact that this isn’t a blip: this is the new normal, and it’s getting worse, not better,” he says. “Part of that problem is that people like me don’t realize their stuff is out there or think I’m not famous, so how can it be possible, not realizing that if you have a Soundcloud page, your music has been ripped, put into torrents, probably in a TV show in China somewhere, and that’s just how that world works. You don’t realize it until it’s revealed to you layer by layer.”

      There's an interesting information imbalance that creators have with online content. It's easy for their content to travel around, but it's much harder for them to tell where that content has been.

      It would be interesting if more systems used webmention then text creators could include invisible links as a possible solution for those who are too lazy to reformat or strip them out in content farm manner.