386 Matching Annotations
  1. Last 7 days
  2. Sep 2023
    1. "Surrendering" by Ocean Vuong

      1. He moved into United State when he was age of five. He first came to United State when he started kindergarten. Seven of them live in the apartment one bedroom and bathroom to share the whole. He learned ABC song and alphabet. He knows the ABC that he forgot the letter is M comes before N.

      2. He went to the library since he was on the recess. He was in the library hiding from the bully. The bully just came in the library doing the slight frame and soft voice in front of the kid where he sit. He left the library, he walked to the middle of the schoolyard started calling him the pansy and fairy. He knows the American flag that he recognize on the microphone against the backdrop.

    1. Recent work has revealed several new and significant aspects of the dynamics of theory change. First, statistical information, information about the probabilistic contingencies between events, plays a particularly important role in theory-formation both in science and in childhood. In the last fifteen years we’ve discovered the power of early statistical learning.

      The data of the past is congruent with the current psychological trends that face the education system of today. Developmentalists have charted how children construct and revise intuitive theories. In turn, a variety of theories have developed because of the greater use of statistical information that supports probabilistic contingencies that help to better inform us of causal models and their distinctive cognitive functions. These studies investigate the physical, psychological, and social domains. In the case of intuitive psychology, or "theory of mind," developmentalism has traced a progression from an early understanding of emotion and action to an understanding of intentions and simple aspects of perception, to an understanding of knowledge vs. ignorance, and finally to a representational and then an interpretive theory of mind.

      The mechanisms by which life evolved—from chemical beginnings to cognizing human beings—are central to understanding the psychological basis of learning. We are the product of an evolutionary process and it is the mechanisms inherent in this process that offer the most probable explanations to how we think and learn.

      Bada, & Olusegun, S. (2015). Constructivism Learning Theory : A Paradigm for Teaching and Learning.

  3. Aug 2023
    1. Shrine was heavily inspired by Refile and Roda. From Refile it borrows the idea of "backends" (here named "storages"), attachment interface, and direct uploads. From Roda it borrows the implementation of an extensible plugin system.
    1. We are in the midst of a remarkable social and civic experiment: democracy by device
      • for: democracy - by device, quote, quote - Barry Chudakov, quote - democracy by device
      • quote
        • We are in the midst of a remarkable social and civic experiment, democracy by device
      • author: Barry Chudakov
  4. Jul 2023
    1. the graph you see here shows the two Alternatives we have 00:12:22 either we really radically reduce emissions and come to Net Zero by 2040 with limited overshoot
      • for: bend the curve, planetary boundaries, planetary tipping points, 1.5 Degree, overshoot 1.5 Degree C

      • two alternatives

        • come to net zero by 2040 with limited overshoot
        • come to net zero by 2060 with 3 decades of overshoot to 1.6, 1.7 Deg C
      • first alternative is no longer viable
  5. Jun 2023
    1. By the 1980s the adage had implausibly been reassigned to Benjamin Franklin. The 1986 book “Approaches and Methods in Language Teaching” by Jack C. Richards and Theodore S. Rodgers contained the following passage:[12]1986 (Seventh Printing 1991), Approaches and Methods in Language Teaching: A Description and Analysis by Jack C. Richards and Theodore S. Rodgers, Chapter 7: The Silent Way, Quote Page 100, Cambridge … Continue reading These premises are succinctly represented in the words of Benjamin Franklin: Tell me and I forget, teach me and I remember, involve me and I learn.

      The misattribution of this quote often seen in educational settings likely stems from Richards & Rodgers from 1986.

      See also: - https://hypothes.is/a/cKMkaAZQEe6dq0fkeyNabA - https://hypothes.is/a/YWrJKgZPEe6dy2sJU5KcSw

    2. Several English renderings have been published over the years. The following excerpt is from “Xunzi: The Complete Text” within chapter 8 titled “The Achievements of the Ru”. The translator was Eric L. Hutton, and the publisher was Princeton University Press in 2014. Emphasis added to excerpts:[1]2014 Copyright, Xunzi: The Complete Text, Translated by Eric L. Hutton, Chapter 8: The Achievements of the Ru, Quote Page 64, Princeton University Press, Princeton, New Jersey. (Verified with … Continue reading Not having heard of it is not as good as having heard of it. Having heard of it is not as good as having seen it. Having seen it is not as good as knowing it. Knowing it is not as good as putting it into practice. Learning arrives at putting it into practice and then stops . . .

      The frequent educational quote "Tell me and I forget, teach me and I remember, involve me and I learn.", often misattributed to Benjamin Franklin, is most attributable to 3rd century Confucian philosopher Kunzi (Xun Kuang or 荀子) who wrote:

      Not having heard of it is not as good as having heard of it. Having heard of it is not as good as having seen it. Having seen it is not as good as knowing it. Knowing it is not as good as putting it into practice. Learning arrives at putting it into practice and then stops . . .

      The translation of which appears in Xunzi: The Complete Text, Translated by Eric L. Hutton, Chapter 8: The Achievements of the Ru, Quote Page 64, Princeton University Press, Princeton, New Jersey. 2014.

      Variations of the sentiment and attributions have appeared frequently thereafter.

  6. May 2023
    1. It is unfortunate that the German word for a box of notes is the same as the methodology surrounding Luhmann.

      reply to dandennison84 at https://forum.zettelkasten.de/discussion/comment/17921/#Comment_17921

      I've written a bit before on The Two Definitions of Zettelkasten, the latter of which has been emerging since roughly 2013 in English language contexts. Some of it is similar to or extends @dandennison84's framing along with some additional history.

      Because of the richness of prior annotation and note taking traditions, for those who might mean what we're jokingly calling ZK®, I typically refer to that practice specifically as a "Luhmann-esque zettelkasten", though it might be far more appropriate to name them a (Melvil) "Dewey Zettelkasten" because the underlying idea which makes Luhmann's specific zettelkasten unique is that he was numbering his ideas and filing them next to similar ideas. Luhmann was treating ideas on cards the way Dewey had treated and classified books about 76 years earlier. Luhmann fortunately didn't need to have a standardized set of numbers the way the Mundaneum had with the Universal Decimal Classification system, because his was personal/private and not shared.

      To be clear, I'm presently unaware that Dewey had or kept any specific sort of note taking system, card-based or otherwise. I would suspect, given his context, that if we were to dig into that history, we would find something closer to a Locke-inspired indexed commonplace book, though he may have switched later in life as his Library Bureau came to greater prominence and dominance.

      Some of the value of the Dewey-Luhmann note taking system stems from the same sorts of serendipity one discovers while flipping through ideas that one finds in searching for books on library shelves. You may find the specific book you were looking for, but you're also liable to find some interesting things to read on the shelves around that book or even on a shelf you pass on the way to find your book.

      Perhaps naming it and referring to it as the Dewey-Luhmann note taking system or the Dewey-Luhmann Zettelkasten may help to better ground and/or demystify the specific practices? Co-crediting them for the root idea and an early actual practice, respectively, provides a better framing and understanding, especially for native English speakers who don't have the linguistic context for understanding Zettelkästen on its own. Such a moniker would help to better delineate the expected practices and shape of a note taking practice which could be differentiated from other very similar ones which provide somewhat different affordances.

      Of course, as the history of naming scientific principles and mathematical theorems after people shows us, as soon as such a surname label might catch on, we'll assuredly discover someone earlier in the timeline who had mastered these principles long before (eg: the "Gessner Zettelkasten" anyone?) Caveat emptor.

  7. Apr 2023
    1. In particular, with AC connected, a battery with a charge level higher than the stop charge threshold will not be discharged to the stop charge threshold, nor will there be a (cyclic) discharge down to the start charge threshold
  8. Mar 2023
    1. They also highlighted that high emitters live in all countries, but were concentrated in the USA (3.16 million), causing an average 318 t CO2-e per person, Luxemburg (10,000 individuals emitting 287 t CO2-e/year each), Singapore (50,000, 251 t CO2-e/year), Saudi Arabia (290,000, 247 t CO2-e/year), and Canada (350,000, 204 t CO2-e/year)

      Noteworthy countries with the most high carbon net worth individuals (HCNW): - USA - 3.16 million individuals emitting an average 318 t CO2-e/year/person, - Luxemburg: 10,000 individuals emitting an average 287 t CO2-e/year/person, - Singapore: 50,000 individuals emitting 251 t CO2-e/year/person, - Saudi Arabia: 290,000 individuals emitting 247 t CO2-e/year/person, - Canada: 350,000 individuals emitting 204 t CO2-e/year/person

    1. We strongly recommend the use of security keys and TOTPs wherever possible. SMS-based 2FA does not provide the same level of protection, and it is no longer recommended under NIST 800-63B.
    1. We now take an opinionated stance on which second factor you should set up first – you'll no longer be asked to choose between SMS or setting up an authenticator app (known as TOTP), and instead see the TOTP setup screen immediately when first setting up 2FA.
    1. The problem with using SMS-2FA to mitigate this problem is that there’s no reason to think that after entering their credentials, they would not also enter any OTP.
    2. discussions about SMS-2FA get heated very quickly. I've found that SMS-2FA deployment or advocacy has been a major professional project for some people, and they take questioning it's efficacy personally
    3. I believe that SMS 2FA is wholly ineffective, and advocating for it is harmful.

      Would this also appyl to OTP by e-mail??

    1. In Polen hat die Staatsfirma Orlen lange enormer Gewinne mit fossilen Brennstoffen aus Russland gemacht. Damit hat sie sich u.a. in die Regionalpresse eingekauft, um dort Propaganda für die rechtskonservative Regierung zu machen.

  9. Feb 2023
    1. One online company, Books by the Foot, offers to ‘curate a library that matches both your personality and your space’, promising to provide books ‘based on colour, binding, subject, size, height, and more to create a collection that looks great’.
  10. Jan 2023
    1. we have committed to spend 6.2 billion dollars we've made that public to give ourselves real Zero by 2030.

      !- quotable : Andrew Forrest - Real zero by 2030 : not net zero by 2030

      !- question : just transition - can a clean energy transition be just when billionaires are involved in capital centralising investments?

    1. Note 9/8j says - "There is a note in the Zettelkasten that contains the argument that refutes the claims on every other note. But this note disappears as soon as one opens the Zettelkasten. I.e. it appropriates a different number, changes position (or: disguises itself) and is then not to be found. A joker." Is he talking about some hypothetical note? What did he mean by disappearing? Can someone please shed some light on what he really meant?

      On the Jokerzettel

      9/8j Im Zettelkasten ist ein Zettel, der das Argument enthält, das die Behauptungen auf allen anderen Zetteln widerlegt.

      Aber dieser Zettel verschwindet, sobald man den Zettelkasten aufzieht.

      D.h. er nimmt eine andere Nummer an, verstellt sich und ist dann nicht zu finden.

      Ein Joker.

      —Niklas Luhmann, ZK II: Zettel 9/8j


      9/8j In the slip box is a slip containing the argument that refutes the claims on all the other slips. But this slip disappears as soon as you open the slip box. That is, he assumes a different number, disguises himself and then cannot be found. A joker.

      Many have asked about the meaning of this jokerzettel over the past several years. Here's my slightly extended interpretation, based on my own practice with thousands of cards, about what Luhmann meant:

      Imagine you've spent your life making and collecting notes and ideas and placing them lovingly on index cards. You've made tens of thousands and they're a major part of your daily workflow and support your life's work. They define you and how you think. You agree with Friedrich Nietzsche's concession to Heinrich Köselitz that “You are right — our writing tools take part in the forming of our thoughts.” Your time is alive with McLuhan's idea that "The medium is the message." or in which his friend John Culkin said, "We shape our tools and thereafter they shape us."

      Eventually you're going to worry about accidentally throwing your cards away, people stealing or copying them, fires (oh! the fires), floods, or other natural disasters. You don't have the ability to do digital back ups yet. You ask yourself, can I truly trust my spouse not to destroy them?,What about accidents like dropping them all over the floor and needing to reorganize them or worse, the ghost in the machine should rear its head?

      You'll fear the worst, but the worst only grows logarithmically in proportion to your collection.

      Eventually you pass on opportunities elsewhere because you're worried about moving your ever-growing collection. What if the war should obliterate your work? Maybe you should take them into the war with you, because you can't bear to be apart?

      If you grow up at a time when Schrodinger's cat is in the zeitgeist, you're definitely going to have nightmares that what's written on your cards could horrifyingly change every time you look at them. Worse, knowing about the Heisenberg Uncertainly Principle, you're deathly afraid that there might be cards, like electrons, which are always changing position in ways you'll never be able to know or predict.

      As a systems theorist, you view your own note taking system as a input/output machine. Then you see Claude Shannon's "useless machine" (based on an idea of Marvin Minsky) whose only function is to switch itself off. You become horrified with the idea that the knowledge machine you've painstakingly built and have documented the ways it acts as an independent thought partner may somehow become self-aware and shut itself off!?!


      And worst of all, on top of all this, all your hard work, effort, and untold hours of sweat creating thousands of cards will be wiped away by a potential unknowable single bit of information on a lone, malicious card and your only recourse is suicide, the unfortunate victim of dataism.

      Of course, if you somehow manage to overcome the hurdle of suicidal thoughts, and your collection keeps growing without bound, then you're sure to die in a torrential whirlwind avalanche of information and cards, literally done in by information overload.

      But, not wishing to admit any of this, much less all of this, you imagine a simple trickster, a joker, something silly. You write it down on yet another card and you file it away into the box, linked only to the card in front of it, the end of a short line of cards with nothing following it, because what could follow it? Put it out of your mind and hope your fears disappear away with it, lost in your box like the jokerzettel you imagined. You do this with a self-assured confidence that this way of making sense of the world works well for you, and you settle back into the methodical work of reading and writing, intent on making your next thousands of cards.

    1. The usefulness of JSON is that while both systems still need to agree on a custom protocol, it gives you an implementation for half of that custom protocol - ubiquitous libraries to parse and generate the format, so the application needs only to handle the semantics of a particular field.

      To be clear: when PeterisP says parse the format, they really mean lex the format (and do some minimal checks concerning e.g. balanced parentheses). To "handle the semantics of a particular field" is a parsing concern.

    1. paranoia has some surprising behaviour (like overriding ActiveRecord's delete and destroy) and is not recommended for new projects. See discard's README for more details. Paranoia will continue to accept bug fixes and support new versions of Rails but isn't accepting new features.
    1. But it does not work, because the association with authors will return empty authors for the Material as the materials are also soft deleted.
    2. The problem is that Globalize knows nothing about acts_as_paranoid. You can delete a Material, and it should delete the translations, but when you try to recover the Material then there is an error because of how the translations are implemented and the order in which the translations and the Material are recovered. Which record should be recovered first?
    3. Remember that the Material has all of its translations for the title in a table that just got soft deleted. So the correct answer is “nil”. The title of the delete material is nil.
  11. Dec 2022
    1. This is a terrible idea. At least if there's no way to opt out of it! And esp. if it doesn't auto log out the original user after some timeout.

      Why? Because I may no longer remember which device/connection I used originally or may no longer have access to that device or connection.

      What if that computer dies? I can't use my new computer to connect to admin UI without doing a factory reset of router?? Or I have to clone MAC address?

      In my case, I originally set up via ethernet cable, but after I disconnected and connected to wifi, the same device could not log in, getting this error instead! (because different interface has different mac address)

    1. what you and I just said compared to the global narratives like net zero by 00:11:29 2050 is maybe blasphemy. It's almost a completely different worldview. And so the net zero very common McKinsey sort of governmental forecast is very different than what we're saying. And I don't think both can be true.

      !- contradiction : between mainstream green growth net zero by 205 narrative, and ours

  12. Nov 2022
    1. So far for the obligatory warning. I get the point, I even agree with the argument, but I still want to send a POST request. Maybe you are testing an API without a user interface or you are writing router tests? Is it really impossible to simulate a POST request with Capybara? Nah, of course not!
    2. The Capybara Ruby gem doesn’t support POST requests, the built-in visit method always uses GET. This is by design and with good reason: Capybara is built for acceptance testing and a user would never ask to ‘post’ parameter X and Y to the application. There will always be some kind of interface, a form for example. It makes more sense to simulate what the visitor would really do
    1. Throughout this piece Oppenheimer provides examples of notes he wrote which eventually made it into his written output in their entirety.

      This has generally been uncommon in the literature, but is a great form of pedagogy. It's subtle, but it makes his examples and advice much stronger than others who write these sorts of essays.

    1. Some software attempts to hide this by translating the bytes of invalid UTF-8 to matching characters in Windows-1252 (since that is the most likely source of these errors), so that the replacement character is never seen.
  13. Oct 2022
    1. Les murs du cabinet de travail, le plancher, le plafond même portaient des liasses débordantes, des cartons démesurément gonflés, des boîtes où se pressait une multitude innombrable de fiches, et je contemplai avec une admiration mêlée de terreur les cataractes de l'érudition prêtes à se rompre. —Maître, fis-je d'une voix émue, j'ai recours à votre bonté et à votre savoir, tous deux inépuisables. Ne consentiriez-vous pas à me guider dans mes recherches ardues sur les origines de l'art pingouin? —Monsieur, me répondit le maître, je possède tout l'art, vous m'entendez, tout l'art sur fiches classées alphabétiquement et par ordre de matières. Je me fais un devoir de mettre à votre disposition ce qui s'y rapporte aux Pingouins. Montez à cette échelle et tirez cette boîte que vous voyez là-haut. Vous y trouverez tout ce dont vous avez besoin. J'obéis en tremblant. Mais à peine avais-je ouvert la fatale boîte que des fiches bleues s'en échappèrent et, glissant entre mes doigts, commencèrent à pleuvoir. Presque aussitôt, par sympathie, les boîtes voisines s'ouvrirent et il en coula des ruisseaux de fiches roses, vertes et blanches, et de proche en proche, de toutes les boîtes les fiches diversement colorées se répandirent en murmurant comme, en avril, les cascades sur le flanc des montagnes. En une minute elles couvrirent le plancher d'une couche épaisse de papier. Jaillissant de leurs inépuisables réservoirs avec un mugissement sans cesse grossi, elles précipitaient de seconde en seconde leur chute torrentielle. Baigné jusqu'aux genoux, Fulgence Tapir, d'un nez attentif, observait le cataclysme; il en reconnut la cause et pâlit d'épouvante. —Que d'art! s'écria-t-il. Je l'appelai, je me penchai pour l'aider à gravir l'échelle qui pliait sous l'averse. Il était trop tard. Maintenant, accablé, désespéré, lamentable, ayant perdu sa calotte de velours et ses lunettes d'or, il opposait en vain ses bras courts au flot qui lui montait jusqu'aux aisselles. Soudain une trombe effroyable de fiches s'éleva, l'enveloppant d'un tourbillon gigantesque. Je vis durant l'espace d'une seconde dans le gouffre le crâne poli du savant et ses petites mains grasses, puis l'abîme se referma, et le déluge se répandit sur le silence et l'immobilité. Menacé moi-même d'être englouti avec mon échelle, je m'enfuis à travers le plus haut carreau de la croisée.

      France, Anatole. L’Île Des Pingouins. Project Gutenberg 8524. 1908. Reprint, Project Gutenberg, 2005. https://www.gutenberg.org/cache/epub/8524/pg8524.html

      Death by Zettelkasten!!

      (Coming soon to a theater near you...)

      In the preface to the novel Penguin Island (L'Île des Pingouins. Calmann-Lévy, 1908) by Nobel prize laureate Anatole France, a scholar is drowned by an avalanche of index cards which formed a gigantic whirlpool streaming out of his card index (Zettelkasten).

      Link to: Historian Keith Thomas has indicated that he finds it hard to take using index cards for excerpting and research seriously as a result of reading this passage in the satire Penguin Island.<br /> https://hypothes.is/a/rKAvtlQCEe2jtzP3LmPlsA

      Translation via: France, Anatole. Penguin Island. Translated by Arthur William Evans. 8th ed. 1908. Reprint, New York, NY, USA: Dodd, Mead & Co., 1922. https://www.google.com/books/edition/Penguin_Island/6UpWAvkPQaEC?hl=en&gbpv=0

      Small changes in the translation by me, comprising only adding the word "index" in front of the occurrences of card to better represent the historical idea of fiches used by scholars in the late 1800s and early 1900s, are indicated in brackets.

      The walls of the study, the floor, and even the ceiling were loaded with overflowing bundles, paste board boxes swollen beyond measure, boxes in which were compressed an innumerable multitude of small [index] cards covered with writing. I beheld in admiration mingled with terror the cataracts of erudition that threatened to burst forth.

      “Master,” said I in feeling tones, “I throw myself upon your kindness and your knowledge, both of which are inexhaustible. Would you consent to guide me in my arduous researches into the origins of Penguin art?"

      “Sir," answered the Master, “I possess all art, you understand me, all art, on [index] cards classed alphabetically and in order of subjects. I consider it my duty to place at your disposal all that relates to the Penguins. Get on that ladder and take out that box you see above. You will find in it everything you require.”

      I tremblingly obeyed. But scarcely had I opened the fatal box than some blue [index] cards escaped from it, and slipping through my fingers, began to rain down.

      Almost immediately, acting in sympathy, the neighbouring boxes opened, and there flowed streams of pink, green, and white [index] cards, and by degrees, from all the boxes, differently coloured [index] cards were poured out murmuring like a waterfall on a mountain-side in April. In a minute they covered the floor with a thick layer of paper. Issuing from their in exhaustible reservoirs with a roar that continually grew in force, each second increased the vehemence of their torrential fall. Swamped up to the knees in cards, Fulgence Tapir observed the cataclysm with attentive nose. He recognised its cause and grew pale with fright.

      “ What a mass of art! ” he exclaimed.

      I called to him and leaned forward to help him mount the ladder which bent under the shower. It was too late. Overwhelmed, desperate, pitiable, his velvet smoking-cap and his gold-mounted spectacles having fallen from him, he vainly opposed his short arms to the flood which had now mounted to his arm-pits . Suddenly a terrible spurt of [index] cards arose and enveloped him in a gigantic whirlpool. During the space of a second I could see in the gulf the shining skull and little fat hands of the scholar; then it closed up and the deluge kept on pouring over what was silence and immobility. In dread lest I in my turn should be swallowed up ladder and all I made my escape through the topmost pane of the window.

    1. Elizabeth I’s tutor, Roger Ascham (1515–68), promotedlearning-by-doing in The Scholemaster: ‘Bring not up your children in learningby compulsion and feare,’ he said, ‘but by playing and pleasure.’
    1. Importante fornecer um e-mail válido para a solicitação da nota fiscal.
    1. in many ways, Law 25 is the most stringent of the three regimes
    2. Privacy by default: Bill 64’s “confidentiality by default” clause is far broader in scope and significantly more stringent than the “privacy by design” concept under the GDPR. The CCPA does not provide for this concept at all, instead taking an “after-the-event” remedial approach. 
    1. La confidentialité par défaut : La clause de "confidentialité par défaut" du projet de loi 64 a une portée beaucoup plus vaste et est beaucoup plus stricte que le concept de "confidentialité par conception" prévu par le RGPD. Le CCPA adopte plutôt une approche corrective "après coup".
  14. Sep 2022
    1. As I’d watched Momma put ruffles on the hem and cute little tucks around the waist, I knew that once I put it on I’d look like a movie star. (It was silk and that made up for the awful color.) I was going to look like one of the sweet little white girls who were everybody’s dream of what was right with the world. Hanging softly over the black Singer sewing machine, it looked like magic, and when people saw me wearing it they were going to run up to me and say, “Marguerite [sometimes it was ‘dear Marguerite’], forgive us, please, we didn’t know who you were,” and I would answer generously, “No, you couldn’t have

      known. Of course I forgive you.”

    1. R is the implementation of the S programming language combined with lexical scoping semantics inspired by Scheme.
    2. The S language is often the driver programming language for research in statistical methodology, and R gives an Open Source route to participation in that activity.
    1. Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.

      Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.

      • Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.

      It can be seen that when the thickness of carbon steel material is less than 2mm, customers who attach great importance to cutting speed can consider using 2000W fiber laser cutting machine, but the 2000W machine is much higher than 1000W in equipment price and operating cost. When the carbon steel material is larger than 2mm, the 2000W machine is not much faster than the 1000W cutting speed. Therefore, the 1000W fiber laser cutting machine is more cost-effective than the 2000W fiber laser cutting machine.

      The cutting speed can directly reflect the efficiency of the fiber laser cutting machine. For cutting different materials with different thickness, the cutting speed will also change greatly. The thicker the thickness, the slower the speed!

  15. Aug 2022
  16. Jul 2022
    1. This section does not apply to any political party or group which has had a place on the ballot in each national and gubernatorial election since the year 1900.

      You are only allowed to advocate overthrow of the Government in Ohio if you are a Republican or Democrat.

    1. Nella licenza ODbL definita come “eventuali termini o misure tecnologiche presenti nel Database, in un Database Derivato, o in tutto o in parte sostanziale dei contenuti che alterano o limitano i termini della Licenza”, intesa, quindi, come divieto di imposizione salvo possibilità di lasciare copia aperta. Nella licenza CC-BY definita come “misure che, in assenza di apposita autorità, possono non essere eluse ai sensi di leggi che adempiono agli obblighi di cui all’articolo 11 del Trattato WIPO sul diritto d’autore adottato il 20 dicembre 1996, e/o accordi internazionali simili”, intesa quindi come divieto di imposizione senza alternative

      piccola nota: questo è anche uno dei motivi per cui non c'è compatibilità fra CC-BY 4.0 e ODbL

    1. # ActiveStorage defaults to security via obscurity approach to serving links # If this is acceptable for your use case then this authenticable test can be # removed. If not then code should be added to only serve files appropriately. # https://edgeguides.rubyonrails.org/active_storage_overview.html#proxy-mode def authenticated? raise StandardError.new "No authentication is configured for ActiveStorage" end
    1. Kierkegaard has essentially this same view of human existence, a view that Becker praises in The Denial of Death. Because we are this tension of opposites, says Kierkegaard, in order to be authentically human we need to accept the mystery and responsibility of participation in both of these dimensions of reality that constitute life structured by death. Most people fall short of this authenticity, he declares. They flee its difficulties. And there are two basic ways of doing this. People either (1) immerse themselves in the dimension of things that perish, the things and pleasures of the world, which allows them to evade the awareness of death: the attitude summed up in the advice to “eat, drink, and be merry.” Or they (2) cling to some false certainty about immortality, imagining that some kind of immortality is their assured possession, and this too allows them to evade the awareness of death.

      Kierkegaard seems to look at death the same way as Becker. If we are authentic, it takes courage, first, but then we recognize it as wisdom. We participate in both the changing, perishable reality as well as the immutable, unchanging reality. Most people are too afraid to reach this point and evade a life structured by death in two major ways of denial of death. First they can live and let live. Enjoy all pleasures today with no regard for tomorrow. Second they can fall into an immortality project

  17. May 2022
    1. The hyperthreat can be outmaneuvered by humans reconfiguring their activities in two ways: security by design and security by dispersal. National security in the Anthropocene is increasingly achieved by designing systems and settlements so that enhanced security is incorporated from the start. For example, it can be imagined that each time a person refuels a car with petrol, this action empowers the hyperthreat. This leads to global warming, which creates ocean acidification and in turn reduced fish stocks, while also creating pressures for resource wars, thereby influencing whether a soldier or civilian dies and how much taxpayer resources are required for material security missions. In contrast, zero-emission transportation technologies can “design out” the slow violence and threats associated with a fossil-fuel-intensive lifestyle. This is similar for plastic use, in which case the “threat” is embodied in the high polluting design of consumable products and lifestyle activities. Likewise, other health threats and longer-term costs are embodied in hidden toxins or sugars in food products. Accordingly, peace, health, and a different form of national prosperity can be created through design, which requires a longer-term and mesh-intervention viewpoint. OP VAK has a role to play in achieving security and safety by design by linking apparently benign activities with their devastating impacts.    

      Linking these many fragmented and long causal chains and tracing them back to the hyperthreat can be a polwerful visualization that brings the hyperthreat to life.

    1. the underprivileged are priced out of the dental-treatment system yet perversely held responsible for their dental condition.

      How does this happen?

      Is it the idea of "personal responsibility" and "pull yourself up by the bootstraps" philosophy combined with lack of any actual support and/or education?

      There has to be a better phrase or word to define the perverse sort of philosophy espoused by many in the Republican party about this sort of "personal responsibility".

      It feels somewhat akin to the idea of privatize profits and socialize the losses. The social loss is definitely one that is pushed off onto the individual, but who's profiting? Is it really so expensive to fix this problem? Isn't the loss to society and public health akin to the Million Dollar Murray problem?

      Wouldn't each individual's responsibility be better tied to the collective good as well as their own outcomes? How can the two be bound together to improve outcomes for everyone all around?

    1. "I didn't fully understand it at the time, but throughout my time as a freshman at Boston College I've realized that I have the power to alter myself for the better and broaden my perspective on life. For most of my high school experience, I was holding to antiquated thoughts that had an impact on the majority of my daily interactions. Throughout my life, growing up as a single child has affected the way am in social interactions. This was evident in high school class discussions, as I did not yet have the confidence to be talkative and participate even up until the spring term of my senior year."

  18. Apr 2022
    1. Seeing examples of outstanding work motivates students by givingthem a vision of the possible. How can we expect students to produce first-ratework, he asks, when they have no idea what first-rate work looks like?

      Showing students examples of work and processes that they can imitate will fuel their imaginations and capabilities rather than stifle them.

    2. three steps required to solve the all-importantcorrespondence problem. Step one, according to Shenkar: specify one’s ownproblem and identify an analogous problem that has been solved successfully.Step two: rigorously analyze why the solution is successful. Jobs and hisengineers at Apple’s headquarters in Cupertino, California, immediately got towork deconstructing the marvels they’d seen at the Xerox facility. Soon theywere on to the third and most challenging step: identify how one’s owncircumstances differ, then figure out how to adapt the original solution to thenew setting.

      Oded Shenkar's three step process for effective problem solving using imitation: - Step 1. Specify your problem and identify an analogous problem that has been successfully solved. - Step 2. Analyze why the solution was successful. - Step 3. Identify how your problem and circumstances differ from the example problem and figure out how to best and most appropriately adapt the original solution to the new context.

      The last step may be the most difficult.

      The IndieWeb broadly uses the idea of imitation to work on and solve a variety of different web design problems. By focusing on imitation they dramatically decrease the work and effort involved in building a website. The work involved in creating new innovative solutions even in their space has been much harder, but there, they imitate others in breaking the problems down into the smallest constituent parts and getting things working there.

      Link this to the idea of "leading by example".

      Link to "reinventing the wheel" -- the difficulty of innovation can be more clearly seen in the process of people reinventing the wheel for themselves when they might have simply imitated a more refined idea. Searching the state space of potential solutions can be an arduous task.

      Link to "paving cow paths", which is a part of formalizing or crystalizing pre-tested solutions.

  19. Mar 2022
    1. I used to maintain a small patch set of issues that affected me and were fixed on the GNOME bugzilla but ignored by main devs. This is was a motivating factor in my switch to to Unity years ago. Sad to hear this situation hasn't improved.
    2. I don't want to agree with you, but I tried to make a few polishing contributions to GNOME games and they got ignored after the first developer response (they told me what to fix, I fixed it). They've been stagnant for over 3 years now.
    3. Submitting changes and having them accepted by GNOME is an exercise in futility if you aren't a GNOME dev.
  20. Feb 2022
    1. Hence an email address/mailbox/addr-spec is "local-part@domain"; "local-part" is composed of one or more of 'word' and periods; "word" can be an "atom" which can include anything except "specials", control characters or blank/space; and specials (the *only* printable ASCII characters [other than space, if you call space "printable"] *excluded* from being a valid "local-part") are: ()<>@,;:\".[] Therefore by the official standard for email on the internet, the plus sign is as much a legal character in the local-part of an email address as "a" or "_" or "-" or most any other symbol you see on the main part of a standard keyboard.
    2. There's a common design flaw on many many websites that require an email address to register; most recently I came across this bug on CNet's download.com site: for some reason they don't accept me when I try to register an email address containing a "+", and they then send me back saying my address is invalid. It isn't!
    3. "+" is a completely valid character in an email address; as defined by the internet messaging standard published in 1982(!) RFC 822 (page 8 & 9)... Any website claiming anything else is wrong by definition, plus they are prohibiting me and many fellow anti-spam activists from tracking where inbound spam comes from:
  21. Jan 2022
    1. Theircontemporary descendants prefer Wendat (pronounced ‘Wen-dot’), noting that ‘Huron’ was originally an insult, meaning(depending on the source) either ‘pig-haired’ or ‘malodorous’.
    1. these covid concentration camps are going to be ramped up into extermination / death camps

      Argument by assertion fallacy and claim of fact: Repeating the claim again and again, does not make it true.

    2. Democrats have built death camps in America

      Argument by assertion fallacy and claim of fact: Restating this claim once again.

    3. covid concentration camps are actually politically-motivated death camps

      Argument by assertion fallacy and claim of fact: The article has repeated this claim multiple times.

  22. Nov 2021
  23. Oct 2021
    1. Peers can help you go from No Open Access to some Open Access.

      It's difficult to spread Open Access and Free cultural work licenses if blog posts about Open Access are not compatible with Open Access. The article by Anne Young has a non-commercial restriction. It would be nice to contact Anne Young to propose to release her blog post under CC BY-SA license or anyway under a Free cultural work license.

  24. Sep 2021
    1. The willingness to trade other peoples' fundamental rights for preferential tax treatment fits neatly into all three of these, as does the delusion that somehow this can be resolved with sufficient "personal responsibility."

      We know enough about psychology and behavioral economics to know that "personal responsibility" is not going to save us.

      This is in even higher relief when we see laws applied in unclosed systems or where other loopholes exist to help the privileged. Frank Wilhot's idea sums things up fairly well:

      "Conservatism consists of exactly one proposition, to wit: There must be in-groups whom the law protects but does not bind, alongside out-groups whom the law binds but does not protect."

    2. We don't need the threat of repo men to keep you paying your car note – miss a Tesla payment and your car will phone home and lock its doors. When the tow arrives, it will flash its lights, honk its horn and back out of its parking space for repossession.

      The technology in advanced cars like the Tesla can be used for repossessing them. Is this an intended or unintended consequence?

    1. Author and librarian Nancy Pearl advocates the “Rule of 50.” This entails reading the first 50 pages of a book and then deciding if it is worth finishing. The Rule of 50 has an interesting feature: once you are over the age of 50, subtract your age from 100 and read that many pages. Pearl writes: “And if, at the bottom of Page 50, all you are really interested in is who marries whom, or who the murderer is, then turn to the last page and find out. If it’s not on the last page, turn to the penultimate page, or the antepenultimate page, or however far back you have to go to discover what you want to know.…When you are 51 years of age or older, subtract your age from 100, and the resulting number (which, of course, gets smaller every year) is the number of pages you should read before you can guiltlessly give up on a book.…When you turn 100, you are authorized (by the Rule of 50) to judge a book by its cover.”
  25. Aug 2021
    1. two notes that are five pitches away from each other, one, two, three, four, five

      Out of context, this sounds like an OBOE (off by one error). You typically wouldn’t count the origin: the two notes are four (semitones) away from one another. That becomes quite useful when you think about all of this as sets and, perhaps, start doing some computation with these. In context, it might simplify things for the moment. It’s just a bit strange to keep all of these in mind. The major third (so, the third note in the scale) is “five pitches” away from the root. The perfect fourth would be “six pitches” away. The perfect fifth “eight pitches away”. Major sixth “10 pitches away”. And the major seventh “12 pitches away”. Which means the octave is “13 pitches away”. Could lead to interesting confusion.

  26. Jul 2021
    1. Platforms of the Facebook walled-factory type are unsuited to thework of building community, whether globally or locally, becausesuch platforms are unresponsive to their users, and unresponsive bydesign (design that is driven by a desire to be universal in scope). Itis virtually impossible to contact anyone at Google, Facebook,Twitter, or Instagram, and that is so that those platforms can trainus to do what they want us to do, rather than be accountable to ourdesires and needs

      This is one of the biggest underlying problems that centralized platforms often have. It's also a solid reason why EdTech platforms are pernicious as well.

  27. Jun 2021
    1. Looks like this is the sort of community that would attempt to put into action some of the ideas behind the book Ruined by Design.

    1. I'm not sure if there's any cost in terms of contributing either, especially when by design git can have any branch as default, and will not hinder your experience when you use something other than master.

      git is neutral/unbiased/agnostic about default branch name by design

      And that is a good thing

    2. The primary branch in git can have any name by design.
    1. Inspired by ENV! and David Copeland's article on UNIX Environment, env_setting is a slight rewrite of env_bang to provide OOP style access to your ENV.
    1. Prettier intentionally doesn’t support any kind of global configuration. This is to make sure that when a project is copied to another computer, Prettier’s behavior stays the same. Otherwise, Prettier wouldn’t be able to guarantee that everybody in a team gets the same consistent results.
  28. May 2021