- Last 7 days
-
www.youtube.com www.youtube.com
-
if I send you a Google doc and we start all collaborating in the same same thing and it's amazing we're sharing all this data um it's kind of silly that we have to move the updates through the backb to some server out there and shipping them back here when we now have really sophisticated algorithms that can do um you know smart Conflict Free resolution that allows us to collaborate in real time and yet we're still moving all the updates to the backbone right this is very silly and it gets worse when you think about the network falling apart
for - internet limitations - example - need for offline or local networking - Google docs used by a local group - unnecessary to communicate to the backbone
-
- Oct 2024
-
www.arabellaadvisors.com www.arabellaadvisors.com
Tags
Annotators
URL
-
- Jun 2024
-
www.youtube.com www.youtube.com
-
The main idea, able to be generalized, I get from this video is that in order to develop any skill, whether it is learning or something else, you need to break it down into its constituents, much like the 4 Component Instruction Design model argues, and figure out where your weak links are.
The more accurately you know the system of your skill, the better you know what to potentially improve on. This requires research, and sometimes asking experts.
Another benefit of networking.
-
- Apr 2024
-
arxiv.org arxiv.org
-
Privacy is realized by the group founder creating a specialkeypair for the group and secretly sharing the private group key with every new group member.When a member is removed from a group or leaves it, the founder has to renew the group’s keypair
Have locks on data is a nice idea.
But given we have dissemination/disclosure among friends only, do we need to encrypt the blocks? Given communication channels are encrypted.
-
However, by doing so the sender mayreveal additional information through the block’s hash pointers, e.g. the identities of other groupmembers
Well, when sharing such a block off-group, you may skip transmitting its deps. In Social Networking that may be alright. And when off-group agent gets accepted to group, he's able to get the stuff below.
However, that does complicate piggybacking, as it'll be seen that the previously off-group agent has some block (but actually he doesn't have its deps).
-
reserved words
Perhaps a sort of protobuf is better.
-
A group creator can invite other agents to become members and remove members atwill.
Goes against democratic principles.
A democratic way will be to raise a BAN poll.
-
Thegrassroots WhatsApp-like protocol WL employs a hypergraph (a graph in which an edge mayconnect any number of vertices). A hyperedge connecting agents 𝑃 ⊂ Π means that the agents in 𝑃are members in a group represented by the hyperedge
I.e., an edge of a hypergraph is a set of vertices.
This is akin to a pub/sub topic.
-
SMS
-
has an IPaddress
Multiaddr could be used instead, to aid connectivity
-
and if located behind a firewall that preventssmartphones from communicating directly,
Huh, such firewalls exist? I thought they can be hole-punched.
-
In particular, adeep-fake payload that is not attributed to its source can be promptly filtered as spam
^
-
However, sinceevery block in GSN is signed, when one breaches privacy within the protocol the breach carriestheir signature so the culprit can be identified.
What stops a culprit to send off-group a message that is not his own? We can only achieve the "culprit detection" by addressing and signing every message we send to A. This is a lot of re-signing. And we won't have a convergent DAG.
-
Furthermore, each block sent includes the most recent IP address of the sender,allowing agents to keep track of their friend’s changing IP addresses.
Perhaps better to attach a new IP address to a message once it does change. What's the point in telling over-and-over the same IP?
-
Every so often, an agent 𝑝sends to every friend 𝑞 every block 𝑝 knows and believes that 𝑞 needs, based on the last blockreceived from 𝑞.
^
-
Agents communicate only with their friends
More like an edge gives a communication path.
A->B (A follows B) - B can talk to A.
A<->B - B can talk to A, A can talk to B.
-
However, their exclusion is not required in social networking, and hence social networking protocolscan be simpler than payment systems protocols
I.e., Equivocation exclusion is not required for social networking.
-
- Jan 2024
-
hypothes.is hypothes.is
-
ting so
Tags
Annotators
URL
-
-
hypothes.is hypothes.is
-
using the sidebar on the right of the screen. Pin the Hypothesis extens
-
up an
Tags
Annotators
URL
-
- Aug 2023
-
www.pewresearch.org www.pewresearch.org
-
At best, we will see new forms of collaboration among large numbers of people toward beneficial ends. The most obvious example is the changing nature of responses to largescale natural disasters. Perhaps we will see this spirit of volunteer and entrepreneurial cooperation emerge to address such pressing issues as climate change (e.g., maybe, the Green New Deal will be crowdsourced)
- for: TPF, crowdsource solutions, climate crisis - commons, polycrisis - commons, quote, quote - crowdsourcing solutions, quote Miles Fidelman, Center for Civic Networking, Protocol Technologies Group, bottom-up, collective action
- quote
- At best, we will see new forms of collaboration among large numbers of people toward beneficial ends.
- The most obvious example is the changing nature of responses to largescale natural disasters.
- Perhaps we will see this spirit of volunteer and entrepreneurial cooperation emerge to address such pressing issues as climate change
- e.g., maybe, the Green New Deal will be crowdsourced.
- author: Miles Fidelman
- founder, Center for Civic Networking
- principal, Protocol Technologies Group
-
- Jan 2023
-
-
Use ssh -f -N -L to run the port-forwarding session in the background.
Tags
Annotators
URL
-
- Dec 2022
-
netsukuku.freaknet.org netsukuku.freaknet.org
-
Netsukuku adopts a modified distance vector routing mechanism that is well integrated in different layers of its hierarchical network topology.
important bit
-
Netsukuku should reasonably work. The most intuitive argument is this: Netsukuku is just trying to automate what the Internet does everyday, that is keeping routes, assigning IP addresses and resolving hostnames.
since this is an idea I also reinvented from first principles but haven't had time to develop, I'm incredulous that they're particularly far along when they say this, but I'm openminded
-
ANDNA (A Netsukuku Domain Name Architecture)
developers have problems naming things but that's ok, it's a moving target right now.
-
A new Netsukuku user needs do little more than install an antenna within range of other local nodes, linking themselves into the network, and run the Netsukuku software on their computer to take advantage of it. The number of interconnected nodes can grow endlessly. If a node is out of the range of any wifi signals, a "virtual tunnel" over their Internet connection will supply the missing radio link.
so it's an actual mesh network on top of the other stuff
-
minimal consumption of CPU and memory resources
hmm, unsure if believe
Tags
Annotators
URL
-
- Nov 2022
-
stackoverflow.com stackoverflow.com
-
Do you know about lacolhost.com? as in, do something like blerg.lacolhost.com:3000/ as your url and it'll resolve to localhost:3000, which is where your tests are running.
-
I've developed additional perspective on this issue - I have DNS settings in my hosts file that are what resolve the visits to localhost, but also preserve the subdomain in the request (this latter point is important because Rails path helpers care which subdomain is being requested) To sum up the scope of the problem as it stands now - I need a way within Heroku/Capybara system tests to both route requests to localhost, but also maintain the subdomain information of the request. I've been able to accomplish one or the other, but haven't found a configuration that provides both yet.
-
- Sep 2022
-
-
So they're vertical divisions and this has an impact on how you design the networks on them. You have what are called "RDPs" - remote distribution points - massive network switches in each one of those fire zones. And to get all of these different signals into the cabins you have what are called "cabin switches" - so every pair of cabins will have a cabin switch that does the TV, the VoIP, the water, the lighting - all of those different things.
Cruise ships are divided into vertical "fire zones"
So they go vertically down the ship, so you don't have to make holes going across to carry those cables.
Vertically down these zones are a series of cabin switches, and the cabin switch does the job of handling the VLAN trunking for access to services.
Tags
Annotators
URL
-
-
www.raspberrypi.com www.raspberrypi.com
-
The raspi-config Tool
-
- Aug 2022
-
cacm.acm.org cacm.acm.org
-
Citation: Kirkpatrick, Keith. The Road to 6G. Communications of the ACM, September 2022, Vol. 65 No. 9, Pages 14-16 10.1145/3546959
Although it is early in the commercial rollout of 5G mobile networks, countries, companies and standards bodies are gearing up for what will be in the next version—so called “6G” mobile network. There are already experimental allocation of high frequency radio bands and testing that has occurred at about 100m distances. The high frequency will mean higher bandwidth, but over shorter distances. There are experiments to make passive graphene reflectors on common surfaces to help with propagation. What may come is a convergence of 6G with WiFi 6 to support connectivity from body-area networks to low earth orbit satellites.
-
- Jul 2022
-
Tags
Annotators
URL
-
- May 2022
-
www.envoyproxy.io www.envoyproxy.io
-
the majority of operational problems that arise when moving to a distributed architecture are ultimately grounded in two areas: networking and observability.
Tags
Annotators
URL
-
- Apr 2022
-
www.internetsociety.org www.internetsociety.org
-
The Internet owes its strength and success to a foundation of critical properties that, when combined, represent the Internet Way of Networking (IWN). This includes: an accessible Infrastructure with a common protocol, a layered architecture of interoperable building blocks, decentralized management and distributed routing, a common global identifier system, and a technology neutral, general-purpose network.
Definition of the Internet Way of Networking
-
-
twitter.com twitter.com
-
Sarah Mojarad. (2020, October 23). What are some of the positive consequences of social media? Would love to hear your stories! [Tweet]. @Sarah_Mojarad. https://twitter.com/Sarah_Mojarad/status/1319722197766733825
Tags
- opportunities
- lang:en
- motivational speaker
- social media
- nursing
- information dissemination
- mental health
- networking
- support
- communications professionals
- lectures
- development
- learning
- webinars
- pandemic
- new data
- scientific projects
- journalist investigations
- is:twitter
- collaboration
- information
- positive consequences
- reports
- resources
- share views
- connections
Annotators
URL
-
- Mar 2022
-
www.linkinglearning.com.au www.linkinglearning.com.au
-
Learning happens when a connection is made between these nodes;
I think that this is a powerful statement - it shows that true learning occurs when we share, experience and learn from each other and through networking.
-
I haven’t so far been able to decide whether it is personal or professional, as in so many cases it appears to be both; professional in nature, personalised to the learner. I may need to begin referring to it as the PPLN (!).
This hints at what I had mentioned above - that while it leads to professional development, the fact that is feeds into our own personal learning to enhance us as individuals shows that there is no wrong or right way to share.
-
- Jan 2022
-
perell.com perell.com
-
My plan is to turn Write of Passage into an independent publishing company, which will become the main growth channel for Write of Passage.
This is a tremendous opportunity for people to leave academia. Imagine being a technical writer, business writer, poet, or creative writer. This could be a good networking opportunity.
-
- Dec 2021
-
scitechdaily.com scitechdaily.com
-
Zewe, A., & Technology, M. I. of. (2021, December 19). MIT Scientists Find Clues to Why Fake News Snowballs on Social Media. SciTechDaily. https://scitechdaily.com/mit-scientists-find-clues-to-why-fake-news-snowballs-on-social-media/
-
- Oct 2021
-
twitter.com twitter.com
-
UCL Centre for Behaviour Change. (2021, October 12). The CBC Conference 2021 programme has just been released and is packed with thought-provoking talks, international keynote speakers, symposia, and plenty of networking opportunities and social exchanges for delegates. Register now! Http://tinyurl.com/5xwa7c27 #cbcconf2021 https://t.co/9iZqPjEEY6 [Tweet]. @UCLBehaveChange. https://twitter.com/UCLBehaveChange/status/1447860878511157252
-
-
cor.europa.eu cor.europa.euEuroPCom1
-
EuroPCom. (n.d.). Retrieved October 10, 2021, from https://cor.europa.eu/en/events/Pages/europcom.aspx
-
- Sep 2021
-
unix.stackexchange.com unix.stackexchange.com
-
If you want to check that the "usual" resolution is working (i.e. the way specified in /etc/nsswitch.conf) you can use getent: getent hosts www.winaproduct.com
-
-
www.reddit.com www.reddit.com
-
It is also why it's implementation in firefox is completely useless, considering that windows/osx/most linux distros plan to add support for DoH/DoT/DNScrypt resolvers in the near future, so firefox doing it itself will provide no additional benefit.
-
- Jul 2021
-
psyarxiv.com psyarxiv.com
-
Bunker, C. J., & Varnum, M. E. W. (2021). How Strong is the Association Between Social Media Use and False Consensus? [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/eyjaq
-
- Jun 2021
-
kit.svelte.dev kit.svelte.dev
-
When fetch runs on the server, the resulting response will be serialized and inlined into the rendered HTML. This allows the subsequent client-side load to access identical data immediately without an additional network request.
-
-
-
I've been thinking more about how to best do this. The preferred way might be to use the same domain and have an application load balancer like nginx split traffic on the URL path (e.g. /api). This is for two reasons. Firstly, you might not necessarily want to cookie the primary/apex domain and have the cookie shared across all subdomains. You also might not want to do CORS because preflight requests add latency and CORS adds complication.
-
- May 2021
-
github.com github.com
-
I don't want to use an extra proxy, it's the wrong architecture design that killed performance.
Tags
Annotators
URL
-
- Feb 2021
-
psyarxiv.com psyarxiv.com
-
Anderson, Ian, and Wendy Wood. ‘Habits and the Electronic Herd: The Psychology behind Social Media’s Successes and Failures’. PsyArXiv, 23 November 2020. https://doi.org/10.31234/osf.io/p2yb7.
-
- Jan 2021
-
tunngle.en.uptodown.com tunngle.en.uptodown.com
Tags
Annotators
URL
-
- Dec 2020
-
twitter.com twitter.com
-
ReconfigBehSci {@SciBeh} (2020) sadly squares with my own impression of social media 'debate' - as someone who works on both argumentation and belief formation across social networks, this strikes me as every bit as big a problem as the spread of conspiracy. Twitter. Retrieved from: https://twitter.com/i/web/status/1308341816333340672
-
-
psyarxiv.com psyarxiv.com
-
Cargnino. M., Neubaum. G., Winter. S., (2020) We're a Good Match: Selective Political Friending on Social Networking Sites. PSyarxiv. Retrieved from: https://psyarxiv.com/9dmgf/
-
- Nov 2020
-
benjaminreinhardt.com benjaminreinhardt.com
-
In order to maximize the effectiveness of your projections, figure out which things you want to be associated with in people’s heads and be excited about them. Nothing is more memorable than distinct excitement. Similarly, try to figure out the things that drive the whomever you’re talking to and incorporate them into your mental representation of that person.
Determine what you want to be known for, present yourself as such, and be excited about those things.
-
-
-
On a user-defined bridge network, containers can resolve each other by name or alias.But, The containers on the default bridge network can only access each other by IP addresses, unless you use the --link option, which is considered legacy.
-
- Oct 2020
-
docs.docker.com docs.docker.com
-
-
In terms of Docker, a bridge network uses a software bridge which allows containers connected to the same bridge network to communicate, while providing isolation from containers which are not connected to that bridge network. The Docker bridge driver automatically installs rules in the host machine so that containers on different bridge networks cannot communicate directly with each other.
-
-
blog.hansenpartnership.com blog.hansenpartnership.com
-
n IPv4 there’s a protocol called dynamic host configuration protocol (DHCP) so as long as you can find a DHCP server you can get all the information you need to connect (local address, router, DNS server, time server, etc). However, this service has to be set up by someone and IPv6 is designed to configure a network without it.
There's no DHCP server involved with handing out IPv6 addresses.
-
-
-
use an intercepting proxy server with a built-in cache
-
Take responsibility for your outgoing network traffic If you install software that interacts with other sites over the network, you should be aware how it works and what kind of traffic it generates. If it has the potential to make thousands of requests to other sites, make sure it uses an HTTP cache to prevent inflicting abuse on other sites.
-
-
www.techfestconf.com www.techfestconf.com
-
Sarah Brown is a Learning Strategist and Designer at Google.
This is an interview with a google employee about what she does to keep Google heading in the right direction for the development and learning of its employees.
9/10
-
- Aug 2020
-
www.youtube.com www.youtube.comYouTube1
-
Webinar: Virtual Networking for Nerds: How to network and find collaborations from afar. (n.d.). Retrieved 10 August 2020, from https://youtu.be/pdZyxs4resc
-
-
www.nature.com www.nature.com
-
Shahal, S., Wurzberg, A., Sibony, I., Duadi, H., Shniderman, E., Weymouth, D., Davidson, N., & Fridman, M. (2020). Synchronization of complex human networks. Nature Communications, 11(1), 3854. https://doi.org/10.1038/s41467-020-17540-7
-
- Jul 2020
-
docs.syncthing.net docs.syncthing.net
-
psyarxiv.com psyarxiv.com
-
Sakakibara, R., & Ozono, H. (2020). Psychological Research on the COVID-19 Crisis in Japan: Focusing on Infection Preventive Behaviors, Future Prospects, and Information Dissemination Behaviors. https://doi.org/10.31234/osf.io/97zye
-
- Jun 2020
-
psyarxiv.com psyarxiv.com
-
Yucel, M., Sjobeck, G., Glass, R., & Rottman, J. (2020). Gossip, Sabotage, and Friendship Network Dataset [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/m6tsx
-
- May 2020
-
www.peeringdb.com www.peeringdb.com
-
-
www.blizzard.com www.blizzard.com
-
arxiv.org arxiv.org
-
Nguyen, C. T., Saputra, Y. M., Van Huynh, N., Nguyen, N.-T., Khoa, T. V., Tuan, B. M., Nguyen, D. N., Hoang, D. T., Vu, T. X., Dutkiewicz, E., Chatzinotas, S., & Ottersten, B. (2020). Enabling and Emerging Technologies for Social Distancing: A Comprehensive Survey. ArXiv:2005.02816 [Physics]. http://arxiv.org/abs/2005.02816
-
- Apr 2020
- Jan 2020
- Dec 2019
-
daniel.haxx.se daniel.haxx.se
-
In today's cruel networked world, we're too often hampered behind (evil) company proxies that restricts how we can use the internet while at work, at a customers' place or even in some cases while at home or at friends'. Not only do proxies restrict what you can do, what protocols that are accepted, what sites you can visit and what TCP ports that are let through, it also allows your company or friend to log and supervise you.
-
- Nov 2019
-
teachonline.asu.edu teachonline.asu.edu
-
Integrating Technology with Bloom’s Taxonomy
This article was published by a team member of the ASU Online Instructional Design and New Media (IDNM) team at Arizona State University. This team shares instructional design methods and resources on the TeachOnline site for online learning. "Integrating Technology with Bloom's Taxonomy" describes practices for implementing 6 principles of Bloom's Digital Taxonomy in online learning. These principles include Creating, Evaluating, Analyzing, Applying, Understanding, and Remembering. The purpose of implementing this model is to create more meaningful and effective experiences for online learners. The author guides instructors in the selection of digital tools that drive higher-order thinking, active engagmenent, and relevancy. Rating 9/10
-
-
-
New technologies make it possible for students to tailor their course schedules, online classes, and brick-and- mortar learning venues to attain targeted degrees.
With society and technology always changing. Learning new technology is key to getting ahead in higher education. Rate: 3/5
-
- Apr 2019
-
-
The people with the strongest networks are the ones who build real relationships because those are the ties that you can count on. Friends always ask me how I know so many people. My superpower is that I have a somewhat photographic memory for faces which helps me to remember people, although this has declined with age. I could remember someone I met only briefly over twenty years ago or see a photo of someone and remember the context (this has definitely freaked people out).
I wonder how many super-networkers have time-space/calendar synesthesia?
-
I hate “networking” as much as the next person.
I happen to love networking... (This from the girl who never talked in high school... Who knew?)
-
-
qmp.cat qmp.cat
-
- Feb 2019
- Jan 2019
-
-
IPFS is the Distributed Web A peer-to-peer hypermedia protocol to make the web faster, safer, and more open.
-
- Dec 2018
-
clalliance.org clalliance.org
-
For me, personally, empathy does not come from responding to a situation en masse, and trusting strangers, but from getting close to people different from myself online, getting to know them enough that I can (however partially) see a different worldview, and then also trust what they say in a 140-character tweet and can engage with them deeply, through layers of context.
-
- Nov 2018
-
www.yammer.com www.yammer.com
-
Yammer is Web 2.0 software which integrates with Microsoft 360 and allows users to communicate together and across the organization. It essentially functions as social networking software for corporations with the ability to collaborate on projects, maintain task lists, store files, documents and pictures all within a private enterprise network. In addition Yammer allows for the sharing of feedback and the management of group projects. Yammer is freemium software with a variety of custom add-ons. Licenses are currently issued for all learner participants and at this time no custom add-ons are necessary.
RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)
-
- Sep 2018
-
www.iozone.org www.iozone.org
-
Analyzing NFS Client Performance with IOzone
Tags
Annotators
URL
-
- Jul 2018
-
www.technologyreview.com www.technologyreview.com
-
Social scientists measure the strength of these links using a variety of indicators, such as how often a person calls another, whether that call is reciprocated, the time the two people spend speaking, and so on. But these indicators are often difficult and time-consuming to measure.
-
- Mar 2018
-
scholarlykitchen.sspnet.org scholarlykitchen.sspnet.org
-
I will be the first and last at the bar where all the interesting conversations happen.
My kinda conference buddy!
-
- Nov 2017
-
www.lrjournal.com www.lrjournal.com
-
Computational drug treatment simulations on projections of dysregulated protein networks derived from the myelodysplastic mutanome match clinical response in patients
-
- Sep 2017
-
rampages.us rampages.us
-
crucial for professional development.
But does it actually work? What does the data say? Can SNA be used to answer that question?
-
-
-
spotter: NG
Tags
Annotators
URL
-
- Nov 2016
-
hypothes.is hypothes.is
-
Past few decades have seen a sea change in the education system, especially with the advent of the information technology. The wave of this new networking technology and it’s amazing capacity for exchanging information on the real-time basis across the borders of the nations have significantly transformed the world of education and along with it the private tutoring system.
-
- Jul 2016
-
cs50.wiki cs50.wiki
-
DNS
ask the actual address of this server
-
- Apr 2016
-
hapgood.us hapgood.us
-
"connected copies" - multiple copies of pages and other files stored across the Web, accessed by name rather than just a single address.
Some examples already exist: git, torrents, federated wiki, various named data networking projects, and the Interplanetary File System.
Distributed copies fight link rot and reduce Internet traffic congestion. More importantly, if the files are freely licensed, easy to copy, and easy to edit, the concept reaches toward the full peer-to-peer potential of the Web.
Tags
Annotators
URL
-
- Jan 2016
-
arstechnica.com arstechnica.com
-
So if the numbers have swayed you, and you want to build your own Homebrew Special, all it takes is a PC with two physical network interfaces. That can be a special mini PC like the one I used here, or it can be any old box you've got lying around that you can cram two network cards into. Don't let the first screenshot intimidate you. Building your own truly fast router isn't that hard to get the hang of. And if you're clamoring for a roadmap, in fact, we'll outline the process all the way from "here is a regular computer" to "here is a router, and here's how you configure it" soon.
Putting together a custom home Internet router.
-
- Dec 2015
-
webtorrent.io webtorrent.io
-
Streaming torrent client for browsers and NodeJS, implemented completely in JavaScript with WebRTC.
Tags
Annotators
URL
-
- Jul 2015
-
news.ycombinator.com news.ycombinator.com
-
Twitter is an "argument machine"
Maybe annotation could put "tweet" sized things into context and thereby avoid the "argument machine."
Rashly assuming anyone will actually take time to read the context and the comment...
Tags
Annotators
URL
-
- May 2015
-
journals.plos.org journals.plos.org
-
Interesting table...but they miss the energy cost of the networking equipment. See [http://www.ncsa.uicu.edu]
-
- Jan 2014
-
www.scottbot.net www.scottbot.net
-
A network can be good but it has be used correctly. It has a specific purpose and a specific function. Using it for other means is abusing its power like a hammer on a screw.
-
Networking can be good but can also be hazardous because they can be abused in different ways. Methodology can also be detrimental when used perversely.
-