- Oct 2024
-
library.scholarcy.com library.scholarcy.com
-
China Sea as the edge of the world and is used to imagine the margins of the world as a realm of marvels and unknown dangers.
-
Benjamin's travelogue is a product of his imagination, influenced by biblical authority and rumors, rather than actual geographical knowledge.
-
Jewish utopia in the Arabian Peninsula, where 300,000 Jews live in 40 cities and 200 villages, free from the rule of gentiles.
-
personal experience and is likely an insertion made by him or a later editor.
-
universal Jewish community that despite its dispersion among various Muslim and Christian regimes still managed to preserve a strong sense of unity and cohesion
big Jewish community is the focus of his travel, he doesnt notice other things, rest is fictious
-
"a day's journey" to indicate close social interactions among Jewish communities,
-
rather a way to link places along a real but somewhat abstracted route.
-
travel times in the Sefer masa'ot may be unrealistic.
-
medieval understanding of travel writing.
-
mprecise unit of "a day's journey" and the parasang, an ancient Persian unit of measurement
-
partiality for southern French communities,
appreciates its literary purposes
-
geography is experienced through human movement on specific routes.
-
Book of Travels as a literary work rather than a positivist account,
-
literary grid that allows the author to reflect on the medieval world from a Jewish perspective.
-
-
www.youtube.com www.youtube.com
-
1:10:56 Your checking account is your bank's I.O.U. It is their liability that they owe you. 1:11:08 When you repay a loan, THE MONEY DISAPPEARS
-
- Dec 2023
-
developers.google.com developers.google.com
-
This describes account linking from the opposite direction than I'm used to: starting with the Google App, which requests your app to share data from your service with Google.
As it says on https://developers.google.com/identity/account-linking overview:
The secure OAuth 2.0 protocol lets you safely link a user's Google Account with their account on your platform, thereby granting Google applications and devices access to your services.
-
-
developers.google.com developers.google.com
-
Use cases
-
-
developers.google.com developers.google.com
-
To perform account linking with OAuth and Google Sign-In, follow these general steps: First, ask the user to give consent to access their Google profile. Use the information in their profile to check if the user account exists. For existing users, link the accounts. If you can't find a match for the Google user in your authentication system, validate the ID token received from Google. You can then create a user based on the profile information contained in the ID token.
-
-
developers.google.com developers.google.com
-
A personalized button gives users a quick indication of the session status, both on Google's side and on your website, before they click the button. This is especially helpful to end users who visit your website only occasionally. They may forget whether an account has been created or not, and in which way. A personalized button reminds them that Sign In With Google has been used before. Thus, it helps to prevent unnecessary duplicate account creation on your website.
first sighting: sign-in: problem: forgetting whether an account has been created or not, and in which way
-
-
Tags
Annotators
URL
-
-
developers.google.com developers.google.com
-
For example, if a user's Google Account were compromised, you could temporarily disable Sign In With Google for that user and prevent account recovery emails from being sent to the user's Gmail address.
-
-
developers.google.com developers.google.com
-
After you have verified the token, check if the user is already in your user database. If so, establish an authenticated session for the user. If the user isn't yet in your user database, create a new user record from the information in the ID token payload, and establish a session for the user. You can prompt the user for any additional profile information you require when you detect a newly created user in your app.
-
- Nov 2023
-
developer.okta.com developer.okta.com
-
Users can use multiple Identity Providers to sign in, and Okta can link all of those profiles to a single Okta user. This is called account linking. For example, a user signs in to your app using a different Identity Provider than they used for registration. Account linking can then establish that the user owns both identities. This allows the user to sign in from either account.
-
-
developer.okta.com developer.okta.com
-
When a user signs in, you can link the user’s Facebook account to an existing Okta user profile or choose to create a new user profile using Just-In-Time (JIT) provisioning.
-
-
library.scholarcy.com library.scholarcy.com
-
ut certain groups like the poor, non-Europeans, and the physically and mentally disabled may lack the conditions to develop rationality.
-
rationality in liberal theory and how it can create hierarchies
no
-
xcludes women from the political sphere and confines them to the private sphere.
-
division between the private and political spheres in liberalism, arguing that it allows for hierarchies and domination to go unregulated.
but the gender inequality isn't based upon property so could be changed without impacting the foundation of the theory
-
property means that the interests of servants and other propertyless individuals may not be represented in the rules of the contract.
no
-
- Mar 2023
-
support.google.com support.google.com
-
Is there anyway around the 1 yr limit ? I have been a google user for 10+ years and recently was going to move from Australia to America and as such updated my location. The move however didnt work out and now back in Australia I am unable to access many of the local apps due to my location being locked to the US.
-
-
-
If you can unlink your address from a locked out account and then link it to a new account and add new 2FA factors to new account, and basically set it up again to be a replacement nearly identical to the original... how is that any different / more secure than just using a "reset account" feature that resets the original account (removes 2FA)?
We're still back to the recurring original problem with account security where the security of your account comes down to the security of your linked e-mail account.
-
- Oct 2022
-
www.cits.ucsb.edu www.cits.ucsb.edu
-
Trolls, in this context, are humans who hold accounts on social media platforms, more or less for one purpose: To generate comments that argue with people, insult and name-call other users and public figures, try to undermine the credibility of ideas they don’t like, and to intimidate individuals who post those ideas. And they support and advocate for fake news stories that they’re ideologically aligned with. They’re often pretty nasty in their comments. And that gets other, normal users, to be nasty, too.
Not only programmed accounts are created but also troll accounts that propagate disinformation and spread fake news with the intent to cause havoc on every people. In short, once they start with a malicious comment some people will engage with the said comment which leads to more rage comments and disagreements towards each other. That is what they do, they trigger people to engage in their comments so that they can be spread more and produce more fake news. These troll accounts usually are prominent during elections, like in the Philippines some speculates that some of the candidates have made troll farms just to spread fake news all over social media in which some people engage on.
-
- Jun 2022
-
-
This is equivalent to the famous double-spend problem in designing decentralized currencies, except instead of the goal being to prevent a previous owner of a coin from being able to send it again, here the goal is to prevent the previous key controlling an account from being able to change the key. Just like creating a decentralized currency, doing account management in a decentralized way requires something like a blockchain. A blockchain can timestamp the key change messages, providing common knowledge over whether B or C came first.
Decentralized account management may also run into a problem analogous to the double spend problem. Someone with key A signs a message they are now using key B, and an attacker gets a hold of that key and signs a message they are using key C. An observer has no way of knowing whether the message about B or C happened first.
-
- Mar 2022
-
-
Social Media Conversations in Support of Herd Immunity are Driven by Bots. (n.d.). Federation Of American Scientists. Retrieved March 31, 2022, from https://fas.org/blogs/fas/2020/10/social-media-conversations-in-support-of-herd-immunity-are-driven-by-bots/
Tags
- inorganic activity
- misinformation
- conversation
- online misinformation
- COVID-19
- modeling
- bot
- artificial account
- one-sided automation
- transmission
- herd immunity
- lang:en
- social media
- is:article
Annotators
URL
fas.org/blogs/fas/2020/10/social-media-conversations-in-support-of-herd-immunity-are-driven-by-bots/ -
-
twitter.com twitter.com
-
ReconfigBehSci on Twitter: ‘this really is now a disinformation account. I retweeted posts earlier in the pandemic as part of a balanced spread of opinion. But this will be the last one...’ / Twitter. (n.d.). Retrieved 29 March 2022, from https://twitter.com/SciBeh/status/1478485258395951108
-
-
twitter.com twitter.com
-
Bad Vaccine Takes. (2022, January 26). This account is fake https://t.co/r5SXmzuPQj [Tweet]. @BadVaccineTakes. https://twitter.com/BadVaccineTakes/status/1486445924071129097
-
- Oct 2021
-
-
We will also show you how to de-link your Chrome profile from your Google account(s) by stopping Chrome from syncing with Google in the first place. This will help keep your Chrome profile separate from your Google account and enhance your online privacy.
-
To do that, Chrome automatically links your Chrome profile to a Google account when you sign in to any Google service on the web. That helps Google deliver a ‘seamless experience’ across all devices by letting you sync your history, bookmarks, passwords, etc., across multiple devices. Meanwhile, privacy-conscious users see this as a major threat to their online privacy and advise users to remove their Google account from Chrome.
-
As mentioned already, Chrome automatically signs you in to your Google account every time you sign into a Google service, like Gmail, YouTube, Google Photos, etc. It also links your current Chrome profile to that account. While Google says that it does so to offer a ‘seamless experience’, it is a privacy nightmare for many users.
-
-
www.ghacks.net www.ghacks.net
-
Some Chrome users may like the new functionality as it makes it easier for them to sign in or out of Chrome and Google on the Web. Others may dislike it for privacy and user-choice reasons. Think about it, if you sign in to Chrome you are automatically recognized by any Google property on the web as that Google user.
-
-
support.google.com support.google.com
-
I have all my bookmarks and settings attached to an account which is part of a Gsuite i'm not part of anymore, so i want to resync my chrome with my personal account, but I don't know how to import all the bookmarks and settings from the old Gsuite account to my personal one
I can relate...
-
- May 2021
-
twitter.com twitter.com
-
Nathan Young. (2021, February 3). Can we gather all covid tweets from large UK accounts, anonymise them put them on a website, let the public score them true to false then rank the accounts? [Tweet]. @NathanpmYoung. https://twitter.com/NathanpmYoung/status/1356928462565564416
-
- Oct 2020
-
hypothes.is hypothes.is
-
Get you Hypothes.is API toke here. To sync Hypothes.is notes for readwise.io, copy this API token and paste in the Add Highlights->Sync Highlights->Hypothes.is section in readwise.io.
-
-
arxiv.org arxiv.org
-
Elmas, T., Overdorf, R., Akgül, Ö. F., & Aberer, K. (2020). Misleading Repurposing on Twitter. ArXiv:2010.10600 [Cs]. http://arxiv.org/abs/2010.10600
-
- Jun 2020
-
stanford.app.box.com stanford.app.box.com
-
20200611_China_Report.pdf | Con la tecnología de Box. (n.d.). Retrieved June 18, 2020, from https://stanford.app.box.com/v/sio-twitter-prc-june-2020
-
-
www.washingtonpost.com www.washingtonpost.com
-
Now all that was gone. In theory, they qualified for a $3,400 federal stimulus check, but they had no bank account or address to collect it. In theory, Dave was entitled to unemployment, but as of May only about 43 percent of the state’s 1.1 million claims had been paid.
A few paragraphs later this appears: "She set her phone alarm for midnight so that as Thursday turned to Friday, she could check whether Dave’s first paycheck had hit their account. She could hear the clatter of raccoons foraging in a nearby dumpster and the hum of cars rolling through the drive-through. At 12:01 a.m. she looked to see whether Dave’s paycheck had shown up in his account." First they don't have an account for the stimulus money to go to, then they're getting up at midnight to see if the paycheck had hit their account. In addition, it takes about a week to set up direct deposit with most companies.
-
- Jun 2015
-
pages.shanti.virginia.edu pages.shanti.virginia.edu
-
It's interesting to see how many times, and in how many ways, the narrator uses the word "Account" in this book. We tend to use it as synonymous with "story," but here it really does some like an account-book is at the back of the narrator's mind a lot of the time.
-