30 Matching Annotations
  1. Oct 2020
  2. Sep 2020
  3. Aug 2020
    1. Consiglio, C. R., Cotugno, N., Sardh, F., Pou, C., Amodio, D., Zicari, S., Ruggiero, A., Pascucci, G. R., Rodriguez, L., Santilli, V., Tan, Z., Eriksson, D., Wang, J., Lakshmikanth, T., Marchesi, A., Lakshmikanth, T., Campana, A., Villani, A., Rossi, P., … Brodin, P. (2020). The Immunology of Multisystem Inflammatory Syndrome in Children with COVID-19. MedRxiv, 2020.07.08.20148353. https://doi.org/10.1101/2020.07.08.20148353

    1. Salahudeen, A. A., Choi, S. S., Rustagi, A., Zhu, J., O, S. M. de la, Flynn, R. A., Margalef-Català, M., Santos, A. J. M., Ju, J., Batish, A., Unen, V. van, Usui, T., Zheng, G. X. Y., Edwards, C. E., Wagar, L. E., Luca, V., Anchang, B., Nagendran, M., Nguyen, K., … Kuo, C. J. (2020). Progenitor identification and SARS-CoV-2 infection in long-term human distal lung organoid cultures. BioRxiv, 2020.07.27.212076. https://doi.org/10.1101/2020.07.27.212076

  4. Jul 2020
  5. Jun 2020
    1. If easy-to-use software like Signal somehow became inaccessible, the security of millions of Americans (including elected officials and members of the armed forces) would be negatively affected.
  6. May 2020
  7. Apr 2020
    1. The key change here is the removal of an intent to defraud and replacing it with willfully; it will be illegal to share this information as long as you have any reason to know someone else might use it for unauthorized computer access.It is troublesome to consider the unintended consequences resulting from this small change.
    2. The problem is that it is that the laws themselves change the very definition of a criminal and put many innocent professionals at risk.
    3. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    1. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    1. The term has also been borrowed by the computing community to refer to the refusal of service to legitimate users when administrators take blanket preventative measures against some individuals who are abusing systems. For example, Realtime Blackhole Lists used to combat email spam generally block ranges of Internet Protocol (IP) addresses rather than individual IPs associated with spam, which can deny legitimate users within those ranges the ability to send email to some domains.
  8. Sep 2017
    1. even a 1-kiloton blast would be a catastrophic event, having a deadly radius between one-third and one-half that of a 10-kiloton blast
  9. Jul 2017