961 Matching Annotations
  1. Last 7 days
  2. Sep 2023
    1. If anything in this policy does not fit with your own local policy, you should not use dnswl.org for whitelisting or similar purposes.
    1. "Surrendering" by Ocean Vuong

      1. He moved into United State when he was age of five. He first came to United State when he started kindergarten. Seven of them live in the apartment one bedroom and bathroom to share the whole. He learned ABC song and alphabet. He knows the ABC that he forgot the letter is M comes before N.

      2. He went to the library since he was on the recess. He was in the library hiding from the bully. The bully just came in the library doing the slight frame and soft voice in front of the kid where he sit. He left the library, he walked to the middle of the schoolyard started calling him the pansy and fairy. He knows the American flag that he recognize on the microphone against the backdrop.

    1. Recent work has revealed several new and significant aspects of the dynamics of theory change. First, statistical information, information about the probabilistic contingencies between events, plays a particularly important role in theory-formation both in science and in childhood. In the last fifteen years we’ve discovered the power of early statistical learning.

      The data of the past is congruent with the current psychological trends that face the education system of today. Developmentalists have charted how children construct and revise intuitive theories. In turn, a variety of theories have developed because of the greater use of statistical information that supports probabilistic contingencies that help to better inform us of causal models and their distinctive cognitive functions. These studies investigate the physical, psychological, and social domains. In the case of intuitive psychology, or "theory of mind," developmentalism has traced a progression from an early understanding of emotion and action to an understanding of intentions and simple aspects of perception, to an understanding of knowledge vs. ignorance, and finally to a representational and then an interpretive theory of mind.

      The mechanisms by which life evolved—from chemical beginnings to cognizing human beings—are central to understanding the psychological basis of learning. We are the product of an evolutionary process and it is the mechanisms inherent in this process that offer the most probable explanations to how we think and learn.

      Bada, & Olusegun, S. (2015). Constructivism Learning Theory : A Paradigm for Teaching and Learning.

    1. I'd suggest that you play around a little bit with a vanilla app. Create a brand new app without any additional files, just what rails new generates. See how bin/rails runner Models raises an error because there is no models directory in autoload_paths. Now, put config.autoload_paths += %W(#{config.root}/app) in config/application.rb and observe how bin/rails runner Models just returns a prompt. With the confidence of having that running, then transalate to your app.
  3. Aug 2023
    1. async vs. sync depends exactly on what you are doing in what context. If this is in a network service, you need async. For a command line utility, sync is the appropriate paradigm in most simple cases, but just knee-jerk saying "async is better" is not correct. My snippet is based on the OP snippet for context.
    1. ExxonMobil, the world’s biggest oil company, knew as early as 1981 of climate change – seven years before it became a public issue, according to a newly discovered email from one of the firm’s own scientists. Despite this the firm spent millions over the next 27 years to promote climate denial.

      Exxon knew as early as 1981 of climate change, and since has been actively denying and distracting from the real issue - burning fossil fuels

    1. The oil giant Exxon privately “predicted global warming correctly and skilfully” only to then spend decades publicly rubbishing such science in order to protect its core business, new research has found.

      Exxon knew from their climate scientists

    1. The Massachusetts high court on Tuesday ruled that the US’s largest oil company, ExxonMobil, must face a trial over accusations that it lied about the climate crisis and covered up the fossil fuel industry’s role in worsening environmental devastation.

      Exxon must face trial for climate crimes, Exxon Knew

  4. Jul 2023
    1. avoid taking notes. Pay attention to what you are hearing and participate in the discussion to help keep your focus.

      This is really good advice. Although, I recently heard that sometimes just scribbling, even non-sense, can actually be beneficial to retaining the information you are hearing. I haven't been able to put it to practice but would love to over the course of this program.

  5. Jun 2023
    1. Are protected members/fields really that bad? No. They are way, way worse. As soon as a member is more accessible than private, you are making guarantees to other classes about how that member will behave. Since a field is totally uncontrolled, putting it "out in the wild" opens your class and classes that inherit from or interact with your class to higher bug risk. There is no way to know when a field changes, no way to control who or what changes it. If now, or at some point in the future, any of your code ever depends on a field some certain value, you now have to add validity checks and fallback logic in case it's not the expected value - every place you use it. That's a huge amount of wasted effort when you could've just made it a damn property instead ;) The best way to share information with deriving classes is the read-only property: protected object MyProperty { get; } If you absolutely have to make it read/write, don't. If you really, really have to make it read-write, rethink your design. If you still need it to be read-write, apologize to your colleagues and don't do it again :) A lot of developers believe - and will tell you - that this is overly strict. And it's true that you can get by just fine without being this strict. But taking this approach will help you go from just getting by to remarkably robust software. You'll spend far less time fixing bugs.

      In other words, make the member variable itself private, but can be abstracted (and access provided) via public methods/properties

    2. As soon as you make a member not-private, you are stuck with it, forever and ever. It's your public interface now.
    1. I just wanted to tweak Java's BufferedReader to handle custom line delimiters. Thanks to private fields I have to clone the entire class rather than simply extending it and overriding readLine().
    2. I'm not saying never mark methods private. I'm saying the better rule of thumb is to "make methods protected unless there's a good reason not to".
    3. Marking methods protected by default is a mitigation for one of the major issues in modern SW development: failure of imagination.
    4. The old wisdom "mark it private unless you have a good reason not to" made sense in days when it was written, before open source dominated the developer library space and VCS/dependency mgmt. became hyper collaborative thanks to Github, Maven, etc. Back then there was also money to be made by constraining the way(s) in which a library could be utilized. I spent probably the first 8 or 9 years of my career strictly adhering to this "best practice". Today, I believe it to be bad advice. Sometimes there's a reasonable argument to mark a method private, or a class final but it's exceedingly rare, and even then it's probably not improving anything.
  6. May 2023
    1. This ensures that GetResponse and our customers comply with Anti-Spam laws.

      IMHO, the customer should be able to opt out of this automatic adding if they want more/full control over the footer. Then they can take on the responsibility themselves.

    1. Figure 2.3 The fi xation of paper slips. (From Wellisch 1981, p. 12.)

      This is essentially a version of a modern pinboard with ribbons which are used to hold various pieces onto the board!

      Also similar in functionality to Post-it Notes, but with string instead of glue.

    1. Stop to think about "normal app" as like desktop app. Android isn't a desktop platform, there is no such this. A "normal" mobile app let the system control the lifecycle, not the dev. The system expect that, the users expect that. All you need to do is change your mindset and learn how to build on it. Don't try to clone a desktop app on mobile. Everything is completely different including UI/UX.

      depends on how you look at it: "normal"

    1. Bond

      A bond is a fixed-income instrument that represents a loan made by an investor to a borrower (typically corporate or governmental). A bond could be thought of as an I.O.U. between the lender and borrower that includes the details of the loan and its payments. Bonds are used by companies, municipalities, states, and sovereign governments to finance projects and operations. Owners of bonds are debtholders, or creditors, of the issuer.

  7. Apr 2023
    1. In recent git versions, git restore is supposed to be a "better" way to revert undesired local changes than the overloaded checkout. Great, that sounds reasonable - a nice simple purpose-built tool for a common operation.
    1. will fail to give them credit for brilliant talents and excellent dispositions.

      I am confused on who Frederick Douglas referred to as the people who will fail to give these women credit for brilliant talents and excelent dispositons. Was he talking about the audience at the convention or was he talking about people in the general population?

    2. Among these was a declaration of sentiments, to be regarded as the basis of a grand movement for attaining all the civil, social, political and religious rights of woman.

      What were these sentiments? I am curious about how they constructed and pushed forth with their views and points. Fedrick Douglas mentioned that some of these women read their greivances; I have a question for these women. Were any of the sentiments more important than the others, and why?

    3. Many who have at last made the discovery that negroes have some rights as well as other members of the human family, have yet to be convinced that woman is entitled to any.

      So basically a black woman had to fight for her rights because she is black AND because she is a woman? A black woman had two barriers that held them from being treated like a decent human being, and not one or the other. Of course there were other circumstances and disadvantages but race and gender were big at this time.

  8. Mar 2023
    1. https://www.3m.co.uk/3M/en_GB/post-it-notes/ideas/articles/make-the-leap-from-to-do-to-done-with-the-scrum-methodology/

      "The Scrum method" described here, similar to the Kanban method, the Memindex method, tickler systems, or other card index as productivity systems, seems to be a productized name for selling Post-it Notes.

      Scrum method consists of a project broken down into "story" rows with "to do" items in columns which progress along to "in process", "to verify", and finally "done".

      Other productized names (particular to the note taking space): Antinet zettelkasten, Linking Your Thinking, Second Brain, etc.

    2. The Scrum method, which is powered by Post-it® Products, breaks up a project into bite-sized modules. It helps to track each task through various stages of completion, and ensures that everyone on the team is aware of progress and updates. It can help turn thoughts into actions, and actions into achievement.

      Seeing this, I can't help but think about some of the ads from the early 1900s for filing cabinets and card indexes which had similar named methodologies for productivity, but which were also advertisements for purchasing the associated physical goods.

      Examples: Shaw-Walker, Yawman & Erbe, etc.

    1. As I said above, the deciding factor is what is meant by syntax. If the request was sent with a Content Type of application/json, then yes, the request is syntactically valid because it's valid JSON syntax, but not semantically valid, since it doesn't match what's expected. (assuming a strict definition of what makes the request in question semantically valid or not). If, on the other hand, the request was sent with a more specific custom Content Type like application/vnd.mycorp.mydatatype+json that, perhaps, specifies exactly what fields are expected, then I would say that the request could easily be syntactically invalid, hence the 400 response.
    1. We now take an opinionated stance on which second factor you should set up first – you'll no longer be asked to choose between SMS or setting up an authenticator app (known as TOTP), and instead see the TOTP setup screen immediately when first setting up 2FA.
    1. discussions about SMS-2FA get heated very quickly. I've found that SMS-2FA deployment or advocacy has been a major professional project for some people, and they take questioning it's efficacy personally
    2. We have a finite pool of good will with which we can advocate for the implementation of new security technologies. If we spend all that good will on irritating attackers, then by the time we’re ready to actually implement a solution, developers are not going to be interested.
    1. the issues I've always had with it: No support. As in, no one in Google's support organization has any clue about what this app does. No support group discussions as far as I can tell ("Smart Lock" is too generic to really find anything). That's not surprising, because while I've figured out how it works/what it does in my use case, there's really no clear documentation on it - like what it even does, really.
    1. {{#discriminator.mappedModels}} {{#-first}} {{#vendorExtensions.x-useDeduction}} @JsonTypeInfo(use = JsonTypeInfo.Id.DEDUCTION) {{/vendorExtensions.x-useDeduction}} {{^vendorExtensions.x-useDeduction}}
    1. The Beyond Oil and Gas Alliance (BOGA) is an international alliance of governments and stakeholders working together to facilitate the managed phase-out of oil and gas production.
    1. Small Collision Probabilities

      How probable is for some git hash-ids (some chars, not the full length) to collide:

      • for a small project with ~100 commits:

        • 8 digits (32bits): 1/million
        • 7 digits (28bits): 1/54,000
        • 6 digits (24bits): 1/3,400
      • for a big project: with ~10.000 commits:

        • 8 digits: 1/100
        • 7 digits: 1/6
        • 6 digits: ~1

      As confirmed with the vecto repo, with these ipython commands: ```ipython

      !git rev-list --all --count 14042 def collissions(k,N): ...: return 1 - e((-k(k-1)/(2N)))

      collissions(14042, 16**6) 0.9971938358691735 !git rev-list --all | cut -c -6 | sort | uniq -cd 2 5af40d 2 6a6c62 2 914c24 2 d83979 2 e8060f

      collissions(14042, 16**7) 0.3073608000674162 !git rev-list --all | cut -c -7 | sort | uniq -cd 2 e8060f9

      collissions(14042, 16**8) 0.022691464724788335 !git rev-list --all | cut -c -8 | sort | uniq -cd <nothing> ```

    1. In the new collection, The Good It Promises, The Harm It Does, activists and scholars address the deeper problems that EA poses to social justice efforts. Even when EA is pursued with what appears to be integrity, it damages social movements by asserting that it has top-down answers to complex, local problems, and promises to fund grass-roots organizations only if they can prove that they are effective on EA’s terms.
  9. Feb 2023
    1. De UvA gaat voorlopig geen nieuwe onderzoekssamenwerkingen met Shell of soortgelijke bedrijven aan.

      UvA gaat voorlopig geen nieuwe onderzoekssamenwerkingen met Shell of soorgelijke bedrijven aan.

  10. Jan 2023
    1. https://www.youtube.com/watch?v=NPqjgN-pNDw


      When did the switch in commonplace book framing did the idea of "second brain" hit? (This may be the first time I've seen it personally. Does it appear in other places?) Sift through r/commonplace books to see if there are mentions there.


      By keeping one's commonplace in an analog form, it forces a greater level of intentionality because it's harder to excerpt material by hand. Doing this requires greater work than arbitrarily excerpting almost everything digitally. Manual provides a higher bar of value and edits out the lower value material.

    1. 个人学习可能取决于他人行为的主张突出了将学习环境视为一个涉及多个互动参与者的系统的重要性
    1. https://omnivore.app/<br /> Open source version of readwise

      Originally bookmarked from phone on Sun 2023-01-15 11:25 PM

      updated: 2023-01-17 with tag: "accounts"

    1. The fate of Luetzerath embodies Germany's battle to ditch coal to meet its climate commitments and also keep the lights on following Russia's squeeze on gas supplies.

      Sky news on Luetzerath with strong picture

    1. Die Braunkohle unter dem Dorf Lützerath (Kreis Heinsberg) wird nicht benötigt, um die Energieversorgung in Deutschland sicherzustellen.

      Lützerath kohle nicht gebraucht

    1. Am 1. Dezember wurde im Bundestag der Deal des vorgezogenen Kohleausstiegs zwischen Robert Habeck, NRW-Ministerin Mona Neubaur und RWE-Chef Krebber angenommen(1).

      luetzerathlebt.info - aktuelle situation

    1. Wir sind die Initiative „Lützerath Lebt“ und mittlerweile seit circa zwei Jahren in Lützerath aktiv. Unser Protest vor Ort entstand als RWE im Juni 2020 die Landstraße (L277) zwischen Lützerath und Keyenberg abgerissen hat.

      Was ist Lützerath lebt?

    1. what i want you to do is to now imagine somebody whose body you would like to have 00:28:23 as your own either for a few minutes or maybe long term i'm not going to ask you why you want that body i don't want to get that deep into your psyche and that might be very personal um 00:28:35 but i'll tell you whose body i'd like to have and for how long just to give you a warm-up feel for this i really would like to have usain bolt's body of a few years ago for 9.6 seconds 00:28:47 because i would love to know what it feels like to run 100 meters that fast now when i form that does i think it's a coherent desire how do i why do i think that because i really do desire it i would love it i'd pay a lot of money to 00:28:59 do that um but what i don't want is to be usain bolt because usain bolt is already the same bolt and that doesn't do me any good um what i want is to be me 00:29:12 j with usain bolt's body so i can know what it feels like to run really really fast now i'm not claiming that this is a coherent desire i'm not claiming that it's 00:29:24 possible for me to remain jay and have usain bolt's body but i am claiming that i can desire it and if you are anything like me for some body or other you can desire to 00:29:36 have it for some time or other if you can form that desire then you in deep in your gut don't believe that you are your body you believe that you have a body and that 00:29:48 you might have a different body just like you might have a different hat or a different cat and if you believe that then you really do believe that whatever you are you are not your body 00:30:01 now you might think well that's obviously true i've never thought i was my body um but maybe on my mind i don't think you really believe that either and i want to do the same thought 00:30:13 experiment to convince you of that now i want you to think about somebody's mind that you'd really like to have maybe not for a long time maybe only for a few minutes um i'll tell you mine again i'm really 00:30:25 big and divulging you know hyper sharing over sharing personal secrets um i would really love to have stephen hawking's mind when he was still alive of course not now um and i'd like to have it only for about five or ten 00:30:36 minutes because what i would really like is to be able to really understand quantum gravity and i can't really understand it but if i had stephen hawking's mind for a few minutes then i could understand it now i obviously 00:30:48 don't want to be stephen hawking for one thing he's dead for another thing he was already stephen hawking and it didn't do me a damn bit of good what i want is to be me jay with his mind so that i can 00:31:00 use it to understand quantum gravity um i think that'd be really cool again i'm not claiming this is coherent i'm not claiming that it's possible but i am claiming that it's a 00:31:11 psychologically possible state to be in to crave somebody else's mind and if you like me can form that desire then you like me deep in your gut do not believe that you are your mind 00:31:25 you believe that you're something that has a mind just like you have a body um and that you possessed that mind and you could still be you with another mind and another body i mean just imagine having 00:31:37 the same bolts body in stephen hawking's mind that would be totally cool then i could understand quantum gravity while setting a new record for the 100 meter sprint um but that's not going to happen alas 00:31:50 um the moral of these experiments um takes us right back to chandragiri serpent i think the moral of these experiments is that deep down at an atavistic gut 00:32:02 level we believe that we are something that stands behind our minds and our bodies that thing is the self the thing that is not the mind in the body but possesses the mind in the body that's the thing 00:32:14 that sean decurity identifies as the serpent in the wall our arguments are going to be aimed at that not at our bodies not as our minds not as our personal identities they're 00:32:27 going to be aimed at that self that we really atavistically believe stands behind all of those that's the illusion that's the thing that causes us to be incompetent morally that causes us to be 00:32:41 confused about our own identities and to be confused about our role and our place in the world

      !- BEing journey Gedanken : imagine yourself to have different body, different mind - if you can imagine this, then you believe you ARE NOT the body or mind, but the SELF that HAS the body or mind - examples of imagining having another mind or body: what would it be like to be there mind of wife? My husband? My child? My friend? My enemy? My dog? My cat? A bat ( Thomas Hagel)? Isn't this imagination salient for empathising? To imagine being another person, don't we need to imagine being in their mind and body to imagined experiencing like they do?

  11. Dec 2022
    1. I have yet to see a Snapd or Flatpak build of Audacity that I'm happy with. Those builds are beyond our control as they are made by 3rd parties. I do find it mildly annoying that Flatpak direct users that have problems with their builds to us.

      annotation meta: may need new tag: the runaround?

    1. The only negative to this method is that it may not ALWAYS work. If the data is faulty, or the link is inaccurately provided by the sender, Gmail won’t be able to recognise and include the unsubscribe button in Gmail.
    2. You may find this link isn’t available straight away, after a few emails one should appear, this is a common technique with mailing list providers.
    1. Here are some recommended unsubscribe methods: Include a prominent link in the message that takes recipients to a page for unsubscribing. Let recipients review the individual mailing lists they’re subscribed to. Let them unsubscribe from lists individually, or all lists at once. Automatically unsubscribe recipients who have multiple bounced messages. Periodically send a confirmation message to recipients to make sure they still want to get your messages.
    2. Let recipients easily unsubscribe Always give recipients a way to unsubscribe from your messages. Make unsubscribing easy. Letting people opt out of your messages can improve message open rates, click-through rates, and sending efficiency.
    3. Make sure recipients can easily subscribe
    1. Many mail systems allow recipients to report mail as spam or junk, and mail streams from senders whose mail is often reported as junk tend to have poor deliverability. Hence, the mailers want to make it as easy as possible for recipients to unsubscribe; if an unsubscription process is too difficult, the recipient's alternative is to report mail from the sender as junk until the mail no longer appears in the recipient's inbox.
    1. If a contact ever reaches out and is no longer receiving messages because they accidentally marked one of your campaigns as spam, you can reach out to Product Support. We can remove them from the suppression list for you. 

      why not allow user to do it directly instead of force to contact support? If they'll remove it for you because you said the user asked you to... why not just let you remove the suppression yourself? Mailgun lets you directly delete suppressions via their API.

    1. Let’s say the recipient is considering unsubscribing. He or she may be too busy to search through the email to find the unsubscribe link, so he or she just clicks “Report as SPAM” to stop the emails from coming. This is the last thing any marketer wants to see happen. It negatively impacts sender reputation, requiring extra work to improve email deliverability. With the list-unsubscribe header, you will avoid getting into this kind of trouble in the first place.
  12. Nov 2022
    1. In our system, events are generated by physical hosts and follow different routes to the event storage. Therefore, the order in which they appear in the storage and become retrievable - via the events API - does not always correspond to the order in which they occur. Consequently, this system behavior makes straight forward implementation of event polling miss some events. The page of most recent events returned by the events API may not contain all the events that occurred at that time because some of them could still be on their way to the storage engine. When the events arrive and are eventually indexed, they are inserted into the already retrieved pages which could result in the event being missed if the pages are accessed too early (i.e. before all events for the page are available). To ensure that all your events are retrieved and accounted for please implement polling the following way:
    1. In v3, svelte-preprocess was able to type-check Svelte components. However, giving the specifics of the structure of a Svelte component and how the script and markup contents are related, type-checking was sub-optimal. In v4, your TypeScript code will only be transpiled into JavaScript, with no type-checking whatsoever. We're moving the responsibility of type-checking to tools better fit to handle it, such as svelte-check, for CLI and CI usage, and the VS Code extension, for type-checking while developing.
    1. engineers and product people just hate working on features “sold” by the sales department without asking them in an effort to meet objectives for bonuses.

      Allmost all corporations isolate sales from development, and that's a root cause of the decline (see Microsoft's dissapointing software products, eg. Teams).

    1. The most significant problem of a code review is asynchronous ping-pong of quite difficult questions/answers. This is inefficient, but also makes people frustrated.

      Indeed it's disheartening to await for a code-review.

    1. How to reveal if developers are micromanaged? Ask the following.How do you handle bugs? Do you handle these as a team or an individual solves them?What’s your on-call policy? Do you have one?Do developers feel in control of the tasks? Do you have clear task scopes?

      Nice Qs no2 to the interviewer (and to the team members!).

    2. What can you use to find out fake agile practices?Ask the following questions:How do you handle bugs? Are bugs resolved as a team or an individual handles them?How often do you release software? What’s your release cadence?Do you have a product owner, scrum masters? How is communication to the client done?What’s your code review process? How many required approvals do you have? What’s the last comment you left on a code review?What’s your take on tech debt? How would you classify tech debt?Tell me more about testing practices. Do you use Sonar or other static analysis tools? Do you use integration, unit tests? Do you have a dedicated team of testers?How do you handle issues? Do you have an issue tracker?

      Nice Qs no1 to the interviewer (and to the team members!).

    1. The answer lies in an important and helpful rule of reading that is generally overlooked.That rule is simply this: In tackling a difficult book for the firsttime, read it through without ever stopping to look up orponder the things you do not understand right away.
    1. highly recommended that the resulting image be just one concern per container; predominantly this means just one process per container, so there is no need for a full init system

      container images: whether to use full init process: implied here: don't need to if only using for single process (which doesn't fork, etc.)

    1. Doing everything PID 1 needs to do and nothing else. Things like reading environment files, changing users, process supervision are out of scope for Tini (there are other, better tools for those)
    2. As to whether you should be using Tini.
    1. If you want a queueing system that uses X, use a queuing system that uses X! Sidekiq's mantra is simple and efficient. Redis is both. Abstracting data storage is neither.
  13. Oct 2022
    1. https://www.youtube.com/watch?v=mI3yiPA6npA

      Generally interesting and useful, but is broadly an extended advertisement for JetPens products.

      Transparent sticky notes allow one to take notes on them, but the text is still visible through the paper.

      One can use separate pages to write notes and then use washi tape to tape the notes to the page in a hinge-like fashion similar to selectively interleaving one's books.

    1. Handwriting + Zettelkasten

      I've used Livescribe pens/paper for note taking (including with audio) before, and they've got OCR software to digital workflows. Or for the paper motivated, one could use their larger post it notes and just stick them to index cards as a substrate for your physical ZK with digitally searchable back ups? Now that I've thought about it and written this out, I may have to try it to see if it's better than my prior handwritten/digital experiments.