157 Matching Annotations
  1. Last 7 days
  2. Nov 2020
    1. awk '{print $2}' /etc/ssh/ssh_host_ed25519_key.pub | base64 -d | sha256sum -b | sed 's/ .*$//' | xxd -r -p | base64 | sed 's/.//44g' | awk '{print "SHA256:"$1}'
    1. Assignments to $-prefixed variables require that the variable be a writable store, and will result in a call to the store's .set method.
    1. the concentration is calculated based on the fraction of droplets that is empty (that is, the fraction that does not contain any target DNA).
  3. Oct 2020
    1. Key learnings from this guideYour goal is not to foster the writing habit. Your goal is to fall so in love with ideas that you can’t not write about them. Find your objective and your motivation.Don't fully think through your ideas before writing. It's inefficient. The best way to think is by writing. It compels your brain to connect the dots.Avoid guessing what readers want. Instead, be a proxy: Selfishly entertain and surprise yourself, and you'll entertain and surprise many of them too.Your writing is clear once your thoughts are self-evident.Your writing is succinct once everything unimportant is removed.Your writing is intriguing once the average reader effortlessly makes it to the end. A hook, peak, and satisfying ending are your trifecta of intrigue.Treat feedback as a science. Measure your scores and iterate. Remember that the best feedback often comes from you with fresh eyes.Rewriting your thoughts to be clear, succinct, and intriguing is a lot of work. You won't love writing until you find a way to love rewriting. Make a game out of it.
    1. The readable store takes a function as a second argument which has its own internal set method, allowing us to wrap any api, like Xstate or Redux that has its own built in sub­scrip­tion model but with a slightly different api.
    1. Question: 246 years of disorentation. what is the startsof this disorentation?

      • education system in U.S is only MADE for white ppl --> BLACK ppl confuse; wanting to know more of their history.
    1. marking.

      "Whenever a person delineates a cultural boundary around a particular cultural space in human time"

    2. Afrocentricity becomes a revolutionary idea because it studies ideas, concepts, events, personalities, and political and economic processes from a standpoint of black people as subjects and not as objects, basing all knowledge on the authentic interrogation of location.

      Basically afrocen. Amer. history in the black POV

  4. Sep 2020
    1. Most simple example: <script> import ChildComponent from './Child.svelte'; </script> <style> .class-to-add { background-color: tomato; } </style> <ChildComponent class="class-to-add" /> ...compiles to CSS without the class-to-add declaration, as svelte currently does not recognize the class name as being used. I'd expect class-to-add is bundled with all nested style declarations class-to-add is passed to ChildComponent as class-to-add svelte-HASH This looks like a bug / missing feature to me.
    1. Reactive statements run immediately before the component updates, whenever the values that they depend on have changed.
  5. Aug 2020
    1. only the signals of the hydrogens that are in closecontact to the protein (e5 Å) and receive magnetization transfer

      2 factors lead to saturation transfer: 1. close in space 2. receive magnetization transfer

    Tags

    Annotators

    1. Now, when the user interacts with the keypad, the value of pin in the parent component is immediately updated.

      bind a value to a prop

  6. Jul 2020
    1. There is a simple mathematical relationship between the fraction of droplets that are unoccupied (black bar) and the concentration of target molecules.
    2. Some droplets are lost in transfer steps and others are eliminated by the stringent metrics applied by QuantaSoft Software as the droplets pass through the Droplet Reader, resulting ultimately in data from 12,000–16,000 droplets being used in subsequent concentration calculations
    1. prevent its disclosure to any person not authorized to create the subscriber's digital signature

      So the signature can be used by another entity to create the digital signature if authorized beforehand.

      So if there is a statement that "I authorize [organization] to create a cryptographic key-pair on my behalf, and create the digital signature."

    1. compressed public keypk2={bi t,(t1,t2,t3)∈(Z2e2)3,A∈Fp2,ent_bi t,r∈Z256}
    1. Partitioning the sample into small containers results in a statistical distribu-tion of targets
    2. purifying the target of interest from interfering compounds.
  7. Jun 2020
    1. The bug won’t be fixed today…and by next week, I’ll have forgotten about it - but some time in the future, before our software “goes gold” and gets shipped out to the public - we’ll search through the entire million lines of software for the word “FIXME” - which is unlikely to appear in any other context BECAUSE it’s not a real word!

      BECAUSE it’s not a real word

    1. The necessity ofskRbeing secure for sender authentication is due to HPKEbeing vulnerable to key-compromise impersonation.
    1. In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.
    1. inhibiting both full-length AR andAR splice variants lacking LBD.

      inhibit both FL and ARv7

    Tags

    Annotators

  8. May 2020
    1. export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client"
    2. if [ -z "${DOCKER_HOST:-}" ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
    1. if [ -n "${DOCKER_HOST:-}" ] && _should_tls; then export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" fi
    2. if [ -z "${DOCKER_HOST:-}" ] && [ ! -S /var/run/docker.sock ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
    1. (Thus, for these curves, the cofactor is always h = 1.)

      This means there is no need to check if the point is in the correct subgroup.

    1. It may be the case that several sufficient conditions, when taken together, constitute a single necessary condition (i.e., individually sufficient and jointly necessary)
    1. It’s useful to remember that under GDPR regulations consent is not the ONLY reason that an organization can process user data; it is only one of the “Lawful Bases”, therefore companies can apply other lawful (within the scope of GDPR) bases for data processing activity. However, there will always be data processing activities where consent is the only or best option.
    1. I believe that beginning to distribute tools that patch Firefox and give back power to users and allow them to install unsigned extensions is necessary when an organization is taking away our rights without giving us a compelling reason for doing so.
    2. I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
  9. projects.invisionapp.com projects.invisionapp.com
    1. The fact that you can use single character keys without modifiers to invoke functions such as Comment Mode (C) is an example of a violation of a violation of the WCAG 2.1 Success Criterion, 2.1.4 Character Key Shortcuts.

  10. Apr 2020
    1. So there's a lot of stuff getting hacked and a lot of credentials floating around the place, but then what? I mean what do evil-minded people do with all those email addresses and passwords? Among other things, they attempt to break into accounts on totally unrelated websites
  11. Mar 2020
    1. Designers using these curves should be aware that for each public key, there are several publicly computable public keys that are equivalent to it, i.e., they produce the same shared secrets. Thus using a public key as an identifier and knowledge of a shared secret as proof of ownership (without including the public keys in the key derivation) might lead to subtle vulnerabilities.
    2. Protocol designers using Diffie-Hellman over the curves defined in this document must not assume "contributory behaviour". Specially, contributory behaviour means that both parties' private keys contribute to the resulting shared key. Since curve25519 and curve448 have cofactors of 8 and 4 (respectively), an input point of small order will eliminate any contribution from the other party's private key. This situation can be detected by checking for the all- zero output, which implementations MAY do, as specified in Section 6. However, a large number of existing implementations do not do this.
    3. The check for the all-zero value results from the fact that the X25519 function produces that value if it operates on an input corresponding to a point with small order, where the order divides the cofactor of the curve (see Section 7).
    4. Both MAY check, without leaking extra information about the value of K, whether K is the all-zero value and abort if so (see below).
    1. n

      n is the order of the subgroup and n is prime

    2. an ECC key-establishment scheme requires the use of public keys that are affine elliptic-curve points chosen from a specific cyclic subgroup with prime order n

      n is the order of the subgroup and n is prime

    3. 5.6.2.3.3ECC Full Public-Key Validation Routine
    4. The recipient performs a successful full public-key validation of the received public key (see Sections 5.6.2.3.1for FFCdomain parameters andSection5.6.2.3.3for ECCdomain parameters).
    5. Assurance of public-key validity –assurance that the public key of the other party (i.e., the claimed owner of the public key) has the (unique) correct representation for a non-identity element of the correct cryptographic subgroup, as determined by the
    1. 5.6.2.3.2ECC Full Public-Key Validation Routine
    2. The recipient performs a successful full public-key validation of the received public key (see Sections 5.6.2.3.1 and 5.6.2.3.2).
    3. Assurance of public-key validity – assurance that the public key of the other party (i.e., the claimed owner of the public key) has the (unique) correct representation for a non-identity element of the correct cryptographic subgroup, as determined by the domain parameters (see Sections 5.6.2.2.1 and 5.6.2.2.2). This assurance is required for both static and ephemeral public keys.
    1. Misusing public keys as secrets: It might be tempting to use a pattern with a pre-message public key and assume that a successful handshake implies the other party's knowledge of the public key. Unfortunately, this is not the case, since setting public keys to invalid values might cause predictable DH output. For example, a Noise_NK_25519 initiator might send an invalid ephemeral public key to cause a known DH output of all zeros, despite not knowing the responder's static public key. If the parties want to authenticate with a shared secret, it should be used as a PSK.
    2. Channel binding: Depending on the DH functions, it might be possible for a malicious party to engage in multiple sessions that derive the same shared secret key by setting public keys to invalid values that cause predictable DH output (as in the previous bullet). It might also be possible to set public keys to equivalent values that cause the same DH output for different inputs. This is why a higher-level protocol should use the handshake hash (h) for a unique channel binding, instead of ck, as explained in Section 11.2.
    3. The public_key either encodes some value which is a generator in a large prime-order group (which value may have multiple equivalent encodings), or is an invalid value. Implementations must handle invalid public keys either by returning some output which is purely a function of the public key and does not depend on the private key, or by signaling an error to the caller. The DH function may define more specific rules for handling invalid values.
    1. WireGuard excludes zero Diffie-Hellman shared secrets to avoid points of small order, while Noiserecommends not to perform this check
    1. This check strikes a delicate balance: It checks Y sufficiently to prevent forgery of a (Y, Y^x) pair without knowledge of X, but the rejected values for X are unlikely to be hit by an attacker flipping ciphertext bits in the least-significant portion of X. Stricter checking could easily *WEAKEN* security, e.g. the NIST-mandated subgroup check would provide an oracle on whether a tampered X was square or nonsquare.
    2. X25519 is very close to this ideal, with the exception that public keys have easily-computed equivalent values. (Preventing equivalent values would require a different and more costly check. Instead, protocols should "bind" the exact public keys by MAC'ing them or hashing them into the session key.)
    3. Curve25519 key generation uses scalar multiplication with a private key "clamped" so that it will always produce a valid public key, regardless of RNG behavior.
    4. * Valid points have equivalent "invalid" representations, due to the cofactor, masking of the high bit, and (in a few cases) unreduced coordinates.
    5. With all the talk of "validation", the reader of JP's essay is likely to think this check is equivalent to "full validation" (e.g. [SP80056A]), where only valid public keys are accepted (i.e. public keys which uniquely encode a generator of the correct subgroup).
    6. (1) The proposed check has the goal of blacklisting a few input values. It's nowhere near full validation, does not match existing standards for ECDH input validation, and is not even applied to the input.
    1. If Alice generates all-zero prekeys and identity key, and pushes them to the Signal’s servers, then all the peers who initiate a new session with Alice will encrypt their first message with the same key, derived from all-zero shared secrets—essentially, the first message will be in the clear for an eavesdropper.
    2. arguing that a zero check “adds complexity (const-time code, error-handling, and implementation variance), and is not needed in good protocols.”
    1. While we recognise that analytics can provide you with useful information, they are not part of the functionality that the user requests when they use your online service – for example, if you didn’t have analytics running, the user could still be able to access your service. This is why analytics cookies aren’t strictly necessary and so require consent.
    2. PECR always requires consent for non-essential cookies, such as those used for the purposes of marketing and advertising. Legitimate interests cannot be relied upon for these cookies.
    1. “meet the minimal requirements that we set based on European law” — which they define as being “if it has no optional boxes pre-ticked, if rejection is as easy as acceptance, and if consent is explicit.”
    2. All of which means — per EU law — it should be equally easy for website visitors to choose not to be tracked as to agree to their personal data being processed.
    3. Consent to tracking must also be obtained prior to a digital service dropping or accessing a cookie; only service-essential cookies can be deployed without asking first.
    4. When consent is being relied upon as the legal basis for processing web users’ personal data
  12. Dec 2019
    1. One of the more clever aspects of the agent is how it can verify a user's identity (or more precisely, possession of a private key) without revealing that private key to anybody.
  13. Nov 2019
    1. const setRefs = useRef(new Map()).current; const { children } = props; return ( <div> {React.Children.map(children, child => { return React.cloneElement(child, { // v not innerRef ref: node => { console.log('imHere'); return !node ? setRefs.delete(child.key) : setRefs.set(child.key, node)

      Illustrates the importance of having unique keys when iterating over children, since that allows them to be used as unique keys in a Map.

    1. Each time the ID changes, the EmailInput will be recreated and its state will be reset to the latest defaultEmail value. (Click here to see a demo of this pattern.) With this approach, you don’t have to add key to every input. It might make more sense to put a key on the whole form instead. Every time the key changes, all components within the form will be recreated with a freshly initialized state. In most cases, this is the best way to handle state that needs to be reset.
    1. The thing is that each UI decision depends on countless other UI decisions. A simple example is keybindings. On UNIX/Linux, it’s nearly impossible to pick reasonable default bindings for global desktop navigation because they all conflict with bindings that some app is using. On Windows, the desktop navigation bindings are hardcoded, and no app uses them, because apps know for sure which bindings to avoid.
  14. Oct 2019
    1. However, if more control is needed, you can pass any of these pieces of state as a prop (as indicated above) and that state becomes controlled. As soon as this.props[statePropKey] !== undefined, internally, downshift will determine its state based on your prop's value rather than its own internal state.
    2. refKey: if you're rendering a composite component, that component will need to accept a prop which it forwards to the root DOM element. Commonly, folks call this innerRef. So you'd call: getRootProps({refKey: 'innerRef'}) and your composite component would forward like: <div ref={props.innerRef} />
  15. Aug 2019
    1. some of the key questions of microbial community assembly, maintenance and function could be answered by intensively studying one (or a few) synthetic model community
    1. I think that if we had this tool in Blackboard we might reach a tipping point among faculty users so that Hypothes.is would bleed back out into folk’s everyday browser use and from there back into the classroom. And from there into the communities we live and share within.

      You've probably hit on our most secret desire here. That we could have this kind of cross-cutting impact.

  16. May 2019
  17. Mar 2019
    1. Procedure The test aimed to find the relationship of study anxiety and academic performance among engineering students. Immediately participants giving a test, testing also aims to select trainees who have been identified in high anxiety and low academic performance were to participate in this training. The participants came to the lab and fill in the questionnaire include the S-Anxiety scale (STAI Form Y-1) and T-Anxiety scale (STAI Form Y-1). The STAI has 40 items of question and took approximately 20 minutes to complete. The students first read and answered if they had problems the researcher will guide students to answer the questions. This test was based on the faculty, after two weeks who have high levels of anxiety and low academic performance were offered to participate in this study. Result of the test was used to find out correlation between anxiety and academic performance.

      The authors explain the steps and procedures of the study and gives information about the way the research experiment will be executed. This is primary evidence as it is new information formulated and analysed by the authors to generate useful outcomes.

    Tags

    Annotators

  18. Dec 2017
  19. Jul 2017
    1. of key institutions -the family and the education system -in capitalistsociety

      Key institutions in Superstructure includes family and the education system. They are considered the two most important component in society.

    2. Education

      Key Institution. Site of the normalization of discreet groupings of information and production, unequal social relations and powerlessness of the subordinate, production for profit - through learning for grades vs learning to learn, and undermining of the original act (learning or production).

    1. Key Institutions and their Roles

      families and education

      families are a unit of consumption that accept the quo and reproduce inequality – children of the rich grow rich, while the children of the poor remain poor.

      education supports the existing distribution of power and wealth. maintains order, control and ensures dominant culture is passed on. reflects organization of production

  20. May 2017
    1. 818❙Baradtoricity

      Historicity - historical actuality; historical authenticity

    2. This will require anunderstanding of the nature of the relationship between discursive prac-tices and material phenomena, an accounting of “nonhuman” as well as“human” forms of agency, and an understanding of the precise causalnature of productive practices that takes account of the fullness of matter’simplication in its ongoing historicity

      We need to understand the influence of language and matter together in order to more properly understand the world around us as well as fully understand the history of matter's influence on the development of culture and society.

    3. In this article, I offer an elaboration of performativity—amaterialist, naturalist, and posthumanist elaboration—that allows matter itsdue as an active participant in the world’s becoming, in its ongoing “intra-activity.”4It is vitally important that we understand how matter matters.

      Barad aims to argue why and how "matter matters" in the world and why language has been given too much power in the development of society at the expense of matter.

    1. “By essentially endorsing Duterte’s murderous war on drugs, Trump is now morally complicit in future killings,” said John Sifton, the Asia advocacy director of Human Rights Watch. “Although the traits of his personality likely make it impossible, Trump should be ashamed of himself.”

      quote from John Sifton.

  21. Apr 2017
    1. amalgamation

      Amalgamation

      The action or process of uniting or merging two or more things.

    2. Although thc standard models of rhetorical situation can tell us much about the elements that are involved in a particular situation, these same models can also mask the fluidity of rhetoric.

      It seems like Edbauer is attempting to reverse what Quintillian did many years ago by compartmentalizing rhetoric, which in his mind would be a better way to understand it and practice it. However, rhetoricians have since argued that this has been problematic to the field, with which I think Edbauer would agree. In order to display a truer form of rhetoric, Edbauer wants to create a model that will showcase all of its aspects.

    3. agglomeration
    1. natureofthosecontextsinwhichspeakersorwriterscreaterhetoricaldiscourse:

      We have discussed "context" itself in depth in this class, but I like thinking about the "nature" of context itself. Bitzer argues that a rhetorical situation is the nature of the context in which rhetorical discourse is created, and indicates that he will explore more deeply what exactly a rhetorical situation is.

    2. rhetoricaladdressgivesexistencetothesituation;onthecon-trary,itisthesituationwhichcallsthediscourseintoexistence.

      A situation determines the necessity of discourse; discourse does not give existence to a situation. In other words, proper rhetoric comes about as a result of a situation and is required to address certain problems, questions, etc. You don't speak just to speak, in order to engage rhetoric appropriately there must be a prior reason to do so.

    1. Parallel universes then, is an inappropriate metaphor; perpendicu~ far universes is perhaps a more accurate visual description.

      Suggests again that black and white rhetorics are not completely separate, but instead intersect and therefore influence one another.

    2. antanaclasis
    3. vertiginous
    4. Black rhetoric is not utterly divorced from white rhetoric.

      This is an important point to remember—just as context and culture influence rhetoric, so too do diverging rhetorics influence one another and incorporate aspects generally considered a part of a particular rhetorical tradition.

  22. Mar 2017
    1. I 1say that I know Jane Austen's intentions with the sentence, at least in its main lines. But can I really call what I know in this sense knowledge? It is clearly subjective, it cannot be proved by any deductive chain of reasoning or by any ordinary laboratory experiment, and it is obviously doubtable both in the sense that many readers will not see it and can doubt it honestly and in the sense that anyone who is determined to doubt what cannot be demonstrated can say he doubts it.

      This sums up the beauty of literature--the different interpretations that each reader can glean from what the author writes. Booth argues that this is not knowledge, because it is subjective to each individual who reads and interprets the material; knowledge, Booth says, should be more widely accepted and generally uncontested.

    2. t the goal of all thought and argument is to emulate the purity and objec-tivity and rigor of science, in order to protect oneself from the errors that passion and desire

      Booth disagrees with the Enlightenment ideas of rhetoric, reflected by rhetoricians such as Astell and Hume, that the goal of rhetoric is to be as logical and rational as possible and disregard the importance of emotion, which he defines here as scientism.

    1. hreshold of the existence of signs. Yet even here, things are not so simple, and the meaning of a term like "the existence of signs" requires elu-cidation. What does one mean when one say!, that there are signs, and that it is enough for there to be signs for there to be a statement? What spe-cial status should be given to that verb to be?

      The existence of the statement proves that signs exist. However, they are not one in the same: first, one must determine what he or she means by "signs;" then, he or she must determine exactly the connotation of "to be" for something "to be a statement" or "to be a sign," because this distinction can change the meaning one assigns to what a statement or a sign is.

    2. scansions
    3. conditions necessary for the appear-ance of an object of discourse, the historical con-ditions required if one is to "say anything" about it, and if several people are to say different things about it, the conditions necessary if it is to exist in relation to other objects, if it is to establish with them relations of resemblance,

      Foucault argues that rhetorical objects are contingent upon many conditions in order to enter the historical discussion. He also mentions that the time in history that a rhetorical object is being discussed influences what is said about it, because the cultural practices vary throughout time and influence those living in that time period and the way they think.

    1. The completeness of any reference varies; it is more or less close and clear, it "grasps" its object in greater or Jes~ degree.

      There is ambiguity within meaning in terms of the accuracy of certain symbols; e.g. some symbols are more accurate than others, but that is not necessarily clear at first glance. It must be studied and researched in order to determine what definition is the most accurate.

    1. So that A may become non-A. But not merely by a leap from one state to the other. Rather, we must take A back into the ground of its existence, the logical substance that is its causal ancestor, and on to a point where it is con-substantial with non-A; then we may return, this time emerging with non-A instead.

      The idea that in order to reinvent something, you must take it back to its basic form. Once it is in its basic form, you can better understand it; once you have an understanding of it, only then can you transform it into something else.

  23. Feb 2017
    1. and if we consider that the same process must have gone on with the words of our mother tongue from childhood upwards, we shall clearly see that the earliest learnt and of-tenest used words, will, other things equal, call up images with less loss of time and energy than their later learnt synonyms.

      Spencer states that the simple words we first learn as children are more efficient than the synonyms we learn later in life. There are less connections to be made with the original word that we use, and therefore using original language is more economic.

    1. I rejoice, because I am persuaded that the rights of woman, like the rights of slaves, need only be examined to he un-derstood and asserted, even hy some of those, who arc now endeavoring lo smother the irre-pressible desire for mental and spiritual freedom which glows in the breast of many, who hardly dare to speak their sentiments.

      She's ecstatic that women, like the slaves, will be able to fight for more rights and free themselves from oppression, even if that end result is still far down the road. At least people are starting to "wake up" to how subservient and lower class women are seen as in this time, even those most adamant on keeping those customs.

    2. Until our inlercourse is purified by the \ \ forgelfulness of sex,-until we rise above the present low and sordid views which entwine themselves around our social and domestic inter-change of senliment and feelings, we never can derive lhat benefit from each other's society which it is the design of our Creacor that we should.

      Grimke is saying that we will not live to our full potential, what God has destined for us, if we continue to live our lives in extreme separation between the sexes. Interesting point to suggest that society was living against what God manifested for humanity.

    1. Wherefore, my respected friends, let us no longer talk of prejudice, till prejudice becomes extinct at home. Let us no longer talk of opposition, till we cease to oppose our own. For while these evils exist. to talk is like giving breath to the air, and labor to the wind.

      Discussing prejudice ironically keeps it alive; it is only through action and relationships that prejudice can be phased out.

      This sentiment is slightly concerning, though. If one never discusses how they may be prejudiced against, will they ever be able to recognize it and act appropriately? Can prejudice by solved through action and character alone?

    2. f such women as are here described have t-.... once existed, be no longer astonished then, my s brethren and friends, that God at this eventful pe-5~ riod should raise up your own females to strive, ~' by their example both in public and private, to · assist those who arc endeavoring stop the strong current of prejudice that flows so profusely against us at present. No longer ridicule their ef-forts, it will be counted for sin. For God makes use of feeble means sometimes, to bring about his most exalted purposes.

      Here, Stewart is arguing that in many past respected societies (Greek, Roman, Jewish), women were well-respected in a religious sense. As a reference to her earlier claim, that she was visited by the Holy Spirit and therefore had the temerity and the right to speak publicly on religious grounds. I do find it interesting that she said: "For God makes use of feeble means sometimes, to bring about his most exalted purposes." Her use of the word "feeble" is interesting, because it seems like she is ascribing to the expected gender roles/personalities, in that women are the "softer sex," and not perceived as strong or powerful.

    3. Take us generally as a people, we