156 Matching Annotations
  1. Last 7 days
    1. And yes: that’s certainly how a lot of capitalist cultures think about time — as something that can be wasted or optimized. It’s often predicated on the idea that you should be focused on doing one thing, and one thing only, very efficiently: time is money, etc. etc. But that itself, sometimes referred to as a “monochronic” understanding of time, is no more or less “natural” than other ways of conceiving of time, like “polychronic” culture, which understands time as dynamic, flexible, and filled with several tasks at once, each of which will take the time that they need. Monochronic cultures may be more “efficient” in their use of time, but in their treatment of time as a commodity, they lose the richness that comes with allowing tasks, conversations, and interactions to move forward at a more natural and sustainable pace.

      Monochronic: the Greek ‘Chronos’ Polychronic: the Greek ‘Kairos’

  2. Nov 2022
    1. A workspace is a collection of modules on disk that are used as the main modules when running minimal version selection (MVS).

      A workspace is a collection of modules on disk that are used as the main modules when running minimal version selection (MVS).

  3. Oct 2022
    1. If you give a title to your notes, "claim notes" are simply notes with a verb. They invite you to say: "Prove it!" - "The positive impact of PKM" (not a claim) - "PKM has a positive impact in improving writer's block" (claim) A small change with positive mindset consequences

      If you give a title to your notes, "claim notes" are simply notes with a verb.<br><br>They invite you to say: "Prove it!"<br><br>- "The positive impact of PKM" (not a claim)<br>- "PKM has a positive impact in improving writer's block" (claim)<br><br>A small change with positive mindset consequences

      — Bianca Pereira | PKM Coach and Researcher (@bianca_oli_per) October 6, 2022
      <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

      Bianca Pereira coins the ideas of "concept notes" versus "claim notes". Claim notes are framings similar to the theorem or claim portion of the mathematical framing of definition/theorem(claim)/proof. This set up provides the driving impetus of most of mathematics. One defines objects about which one then advances claims for which proofs are provided to make them theorems.

      Framing one's notes as claims invites one to provide supporting proof for them to determine how strong they may or may not be. Otherwise, ideas may just state concepts which are far less interesting or active. What is one to do with them? They require more active work to advance or improve upon in more passive framings.

      link to: - Maggie Delano's reading framing: https://hypothes.is/a/4xBvpE2TEe2ZmWfoCX_HyQ

  4. Sep 2022
    1. the problem with docker builds is the made-up concept of "context". Dockerfiles are not sufficient to define a build, unless they are placed under a strategic directory (aka context), i.e. "/" as an extreme, so you can access any path (note that that's not the right thing to do in a sane project either..., plus it makes docker builds very slow because docker scans the entire context at start).
  5. Jul 2022
    1. let me make a few comments if i may about time from nagarjuna's perspective there is no 01:25:52 time i don't think i can be more brief and how does he support that he says well when you're in the present moment there's no past and there's no future 01:26:06 if you dissect the present moment even to a more granular present moment some of that's going to be passed some of that's going to be yet to come and then you have even a finer more 01:26:18 granular present moment if you keep going on with that granularity you end up having no time you have no past no future and no presence so that's kind of in a nutshell some of the arguments or 01:26:32 logic that knock arjuna nagarjuna uses to establish no time now of course what he means is there's no absolute time there's no time on a some there's no essence of time um there is you know 01:26:46 time from the perspective of of of conventionality um cause and effect is reciprocal so when we have a cause we have an effect or we know there's 01:26:59 going to be an effect but also from the point of view of the effect the result we know that there must have been a cause so this reciprocality is something unique to the highest 01:27:10 school of prasannika majamaka uh within the fourth highest school of majamaca i just wanted to mention that to to round out one of our previous discussions

      Barry points out Nagarjuna's analysis of time leads to the conclusion that there is no absolute present, past or future.

      It is difficult to fathom the full import of what this means. If time exists conventionally but not absolutely, what are the implications of this?

      Also, there are Buddhist arguments that hold that there is no causality because A and B are different, how could A ever cause B? This has not been discussed here yet.

  6. May 2022
    1. suppose when you needed to make a permanent edit to the style sheet on your homepage, you opened up the CSS viewer, made the edit, and the result persists—not just in your browser, but by changing the very style sheet itself
    1. don't invest multiples of the original appetite on a concept that needs rethinking first.

      (a concept that needs rethinking first)

    2. At the time I wasa a web designer with a focus on usability and user interfaces. I executed Json's design direction for key features of the app and collaborated with him to fill in details of the concept.

  7. Feb 2022
    1. I think they are a significant pedagogical idea because they help people understand how these sorts of thing work.

      thought vectors in understanding

  8. Dec 2021
    1. To test whether these distributed representations of meaning are neurally plausible, a number of studies have attempted to learn a mapping between particular semantic dimensions and patterns of brain activation
    1. Concept car projects explore the boundaries of current technologies or showcase what new designs and ideas enable. They are necessary to push the field forward, but usually too rough or incomplete for the rest of the world to depend on.

      via Jess Martin https://jessmart.in/

  9. Nov 2021
    1. Since ROX is a passive fluorescent dye, the main reason it is used in qPCR is for signal normalisation. By normalising the fluorescent signal, this can reduce the variability between technical replicates.

      passive reference ROX purpose

    1. POC vs MVP: What to Choose to Build a Great ProductDmitryCEOMVPHomeBlogEntrepreneurshipPOC vs MVP: What to Choose to Build a Great ProductPublishedNov 10, 2021UpdatedNov 11, 202115 min readWhen it comes to creating a new product or implementing a new feature, you need to test it first. The best way to do so is to check your idea with the appropriate steps. There are several software product stages: PoC, prototype, MVP, etc. What is the difference between proof of concept vs. MVP? Why are these stages essential? When should you build a Minimum Viable Product? This article focuses on two fundamental approaches that help test your idea quickly and create a successful solution.

      When it comes to creating a new product or implementing a new feature, you need to test it first. The best way to do so is to check your idea with the appropriate steps. There are several software product stages: PoC, prototype, MVP, etc.

      What is the difference between proof of concept vs. MVP? Why are these stages essential? When should you build a Minimum Viable Product?

      This article focuses on two fundamental approaches that help test your idea quickly and create a successful solution.

  10. Sep 2021
    1. But it is always important to remember that those are not language concepts. Those are community concepts that only exist in our heads and in the names of some library methods.

      I'm not sure about this. I get what he's saying and agree that singleton methods are nothing but a naming convention for the more fundamental/atomic construct called instance methods (which indeed are the only kind of method that exist in Ruby, depending how you look at it), but I think I would actually say that singleton methods are language concepts because those methods like Object#define_singleton_method, ... are always available in Ruby (without needing to require a standard library first, for example). In other words, I would argue that something belonging in the Ruby core "library" (?) by definition makes it part of the language -- even if it in turn builds on even lower-level Ruby language features/constructs.

    2. Note: when I wrote above that "there is no such thing as X", what I meant was that "there is no such thing as X in the Ruby language". That does not mean that those concepts don't exist in the Ruby community.
  11. Jun 2021
  12. May 2021
  13. Apr 2021
    1. A Gaussian process is a probability distribution over possible functions.

      [[Gaussian process]] is a probability distribution over possible functions.

  14. Mar 2021
    1. The question, 'What is library and information science?' does not elicit responses of the same internal conceptual coherence as similar inquiries as to the nature of other fields, e.g., 'What is chemistry?', 'What is economics?', 'What is medicine?' Each of those fields, though broad in scope, has clear ties to basic concerns of their field. [...] Neither LIS theory nor practice is perceived to be monolithic nor unified by a common literature or set of professional skills. Occasionally, LIS scholars (many of whom do not self-identify as members of an interreading LIS community, or prefer names other than LIS), attempt, but are unable, to find core concepts in common
    1. One day last August 2018, I stumbled upon an online petition that sparked my curiosity - We Want Serverless Ruby. At that time, none of the major cloud providers had first-class support for Ruby in their serverless products. There were ~1400 devs signing that petition, and I wondered if there was something about Ruby that made it unsuitable for FaaS. I decided to roll the sleeves and start building what would be the first PoC of faastRuby.
  15. boardgamegeek.com boardgamegeek.com
    1. Players try to build a village together. As the game goes on each player secretly chooses whether they want to go for a coop victory or a single-player win.
  16. Feb 2021
    1. The Quest for Truth

      The quest for Truth is everywhere and not limited to the economic topics linked here. This is just a topic that started a thought process where I had access to a convenient tool (Hypothesis) to bookmark my thoughts and research.

      Primary thought is: The Quest for Truth. Subcategories would provide a structured topic for the thought. In this case the subcategory would be: US Economy, Inflation

      The TRUTH is a concept comprised of inconsistencies and targets that frequently move.

      Targets (data, methods, people, time, semantics, agenda, demographic, motive, means, media, money, status) hold a position in time long enough to fulfill a purpose or agenda. Sometimes they don't consciously change, but history over time shines light and opens cracks in original narrative that leads to new truth's, real or imagined.

      Verifying and validating certain Truth is very difficult. Why is That?
    1. Examples of different ways of defining forms

      Wow, that's a lot of different ways.

      The inline_form way in particular seems interesting to me, though it's worth noting that that method is just an example, not actually part of this project's code, so it's not really a first-class option like the other options.

    1. For the usage in society, see Second-class citizen.
      1. Ironic that this reference is ostensibly about the usage of "first-class citizen" in society, yet it links to a seemingly-mismatched (by name only, that is) article, entitled "second-class citizen".

      2. Ironic that the first-class (unqualified) article is about the figurative meaning of "citizen" used in computer science, and that the page describing first-class and second-class status of the more literal citizens in society is relegated to what I kind of think is a second-class position in the encyclopedia (because it takes the #2 position numerically, even though it is (at least as is implied in this reference) also about first-class citizens (though the word "first-class" does not appear a single time in that article, so maybe this reference is the one that is more ironic/incorrect).

    2. In programming language design, a first-class citizen (also type, object, entity, or value) in a given programming language is an entity which supports all the operations generally available to other entities. These operations typically include being passed as an argument, returned from a function, modified, and assigned to a variable.
    1. In computer science, a programming language is said to have first-class functions if it treats functions as first-class citizens.
    1. The key phrase here is “children of a grid container.” The specification defines the creation of a grid on the parent element, which child items can be positioned into. It doesn’t define any styling of that grid, not even going as far as to implement something like the column-rule property we have in Multi-column Layout. We style the child items, and not the grid itself, which leaves us needing to have an element of some sort to apply that style to.
  17. Jan 2021
    1. La perspective "technocentrée" selon laquelle les outils technologiques déterminent seuls les processus cognitifs humains
    2. C'est par la théorie socioculturelle, issue des travaux de Vygotski, que nous devons commencer

      Cette théorie nous dit que l’apprentissage et l’acquisition de connaissances résultent de l’interaction sociale.

      Il me semble curieux de savoir comment l'interaction sociale se fait à travers la manipulation des artefacts technologiques, il doit y des interactions sociales forcement.

  18. Nov 2020
    1. This plugin was designed as a proof-of-concept for a feature that's destined for Rails 4. It has only been tested on Rails 3.2+, but may work on earlier versions as well.
  19. Oct 2020
    1. Self-concept also differs from self-esteem: self-concept is a cognitive or descriptive component of one's self (e.g. "I am a fast runner"), while self-esteem is evaluative and opinionated (e.g. "I feel good about being a fast runner").
    2. Self-concept is distinguishable from self-awareness, which refers to the extent to which self-knowledge is defined, consistent, and currently applicable to one's attitudes and dispositions.
    1. Subgroups of the computer underground with different attitudes and motives use different terms to demarcate themselves from each other. These classifications are also used to exclude specific groups with whom they do not agree.
    1. many of students would be far better off earning a vocational degree at a low-cost community college, or using that community college as a spring-board into a more affordable four-year degree, to be paid for with a combination of student loans and (ideally) parental tuition assistance.
    1. Description: Students in four different college level science classes were asked to complete concept maps then reflect on their helpfulness. A majority of the students in endocrinology found concept maps useful while students in neurobiology disagreed. Students were also allowed to state why they felt positively or negatively towards the activity. Through the survey, they found students wanted an answer key, more discussion with peers, and less terms to place on their concept maps. In the conclusion, the authors state concept maps must be appropriately designed for the end goal of the class, there must be adequate feedback from the professor, and students should see the relevance of the topic for the concept map.

      Rating: 7/10

      Reasoning for the rating: The article clearly explains the study and the results. Additionally, the article includes charts and graphs to help readers visiualize the information. This study only uses the data from the surveys and does not delve into the actual usefulness of concept maps as a study guide.

  20. Sep 2020
    1. lead nurturing
    2. Product-oriented content also comes in handy — product overviews (40%), case studies (34%), and landing pages (31%) proved to be effective in generating leads.

      product oriented content

    3. A content marketing funnel is a system that helps a brand to attract potential clients and guide them through their journey from the first interaction to conversion to a paying customer. 
  21. Aug 2020
    1. Now, when the user interacts with the keypad, the value of pin in the parent component is immediately updated.

      bind a value to a prop

  22. Jul 2020
  23. Jun 2020
    1. With this second scheme, the DBMS stores the physical addressof versions in the index entries. This approach is only applicablefor append-only storage, since the DBMS stores the versions in thesame table and therefore all of the indexes can point to them. Whenupdating any tuple in a table, the DBMS inserts the newly createdversion into all the secondary indexes. In this manner, the DBMScan search for a tuple from a secondary index without comparingthe secondary key with all of the indexed versions. Several MVCCDBMSs, including MemSQL and Hekaton, employ this scheme

      Physical Pointers: 只对Append-only storage有用

      问题:“since the DBMS stores the versions in the same table and therefore all of the indexes can point to the”这句话怎么理解

      Likewise, using physical pointers is better for read-intensive workloads because an index entry points to the exact version. But it is slower for update operations because this scheme requires theDBMS to insert an entry into every secondary index for each new version, which makes update operations slower

    2. The main idea of using logical pointers is that the DBMS usesa fixed identifier that does not change for each tuple in its indexentry. Then, as shown in Fig. 5a, the DBMS uses an indirectionlayer that maps a tuple’s identifier to the HEAD of its version chain.This avoids the problem of having to update all of a table’s indexesto point to a new physical location whenever a tuple is modifiedHEADINDEXVERSION CHAINSHEADINDIRECTION(a)Logical PointersHEADINDEXVERSION CHAINSHEAD(b)Physical PointersFigure 5: Index Management– The two ways to map keys to tuples in aMVCC are to use logical pointers with an indirection layer to the versionchain HEAD or to use physical pointers that point to an exact version.(even if the indexed attributes were not changed). Only the mappingentry needs to change each time. But since the index does not pointto the exact version, the DBMS traverses the version chain fromthe HEAD to find the visible version. This approach is compatiblewith any version storage scheme. As we now discuss, there are twoimplementation choices for this mapping

      Logical Pointers:

      logical pointer approach is better for write-intensive workloads, as the DBMS updates the secondary indexes only when a transaction modifies the indexes attributes.

    3. Tuple Id (TupleId):One drawback of thePKeypointers is thatthe database’s storage overhead increases as the size of a tuple’sprimary key increases, since each secondary index has an entirecopy of it. In addition to this, since most DBMSs use an order-preserving data structure for its primary key indexes, the cost ofperforming the additional look-up depends on the number of entries.An alternative is to use a unique 64-bit tuple identifier instead ofthe primary key and a separate latch-free hash table to maintain themapping information to the tuple’s version chain HEAD.

      Logical Pointers: TupleId

    4. Primary Key (PKey):With this, the identifier is the same as thecorresponding tuple’s primary key. When the DBMS retrieves anentry from a secondary index, it performs another look-up in thetable’s primary key index to locate the version chain HEAD. If asecondary index’s attributes overlap with the primary key, then theDBMS does not have to store the entire primary key in each entry.

      Logical Pointers: PKey

    5. Primary key indexes always point to the current version of a tuple.But how often the DBMS updates a primary key index depends onwhether or not its version storage scheme creates new versions whena tuple is updated. For example, a primary key index in the deltascheme always points to the master version for a tuple in the maintable, thus the index does not need to be updated. For append-only,it depends on the version chain ordering:N2Orequires the DBMSto update the primary key index every time a new version is created.If a tuple’s primary key is modified, then the DBMS applies this tothe index as aDELETEfollowed by anINSERT


      Example: N2O

    6. We define anindex entryas a key/value pair, where thekeyis atuple’s indexed attribute(s) and thevalueis a pointer to that tuple.The DBMS follows this pointer to a tuple’s version chain and thenscans the chain to locate the version that is visible for a transaction.The DBMS will never incur a false negative from an index, but itmay get false positive matches because the index can point to aversion for a key that may not be visible to a particular transaction.

      Index entires and false positives

    7. Since MVCC creates new versions when transactions updatetuples, the system will run out of space unless it reclaims the versionsthat are no longer needed.


      GC在长交易不太行:The DBMS’s performance drops in the presence of long-running transactions. This is because all the versions generated during the lifetime of such a transaction cannot be removed until it completes.

    8. In this GC mechanism, the DBMS reclaims storage space attransaction-level granularity. It is compatible with all of the versionstorage schemes. The DBMS considers a transaction as expiredwhen the versions that it generated are not visible to any activetransaction. After an epoch ends, all of the versions that weregenerated by the transactions belonging to that epoch can be safely

      Transaction-level Garbage Collection:

      Downside: "however, is that the DBMS tracksthe read/write sets of transactions for each epoch instead of justusing the epoch’s membership counter"

    9. Cooperative Cleaning (COOP):When executing a transaction,the DBMS traverses the version chain to locate the visible version.During this traversal, it identifies the expired versions and recordsthem in a global data structure. This approach scales well as theGC threads no longer needs to detect expired versions, but it onlyworks for theO2Nappend-only storage. One additional challengeis that if transactions do not traverse a version chain for a particulartuple, then the system will never remove its expired versions. Thisproblem is called “dusty corners” in Hekaton [16]. The DBMSovercomes this by periodically performing a complete GC pass witha separate thread like inVAC.

      Tuple-level GC: COOP

      如果不遍历某一个chain,那么就无法GC而变成dusty corners

    10. Background Vacuuming (VAC):The DBMS uses backgroundthreads that periodically scan the database for expired versions. Asshown in Table 1, this is the most common approach in MVCCDBMSs as it is easier to implement and works with all version stor-age schemes. But this mechanism does not scale for large databases,especially with a small number of GC threads. A more scalableapproach is where transactions register the invalidated versions ina latch-free data structure [27]. The GC threads then reclaim theseexpired versions using the epoch-based scheme described above.Another optimization is where the DBMS maintains a bitmap ofdirty blocks so that the vacuum threads do not examine blocks thatwere not modified since the last GC pass

      Tuple-level GC: VAC

    11. There are two GC implementations for a MVCC that differ onhow the DBMS looks for expired versions. The first approachistuple-levelGC wherein the DBMS examines the visibility ofindividual tuples. The second istransaction-levelGC that checkswhether any version created by a finished transaction is visible


    12. The DBMS registers each newtransaction into the active epoch and increments this counter. Whena transaction finishes, the DBMS removes it from its epoch (whichmay no longer be the current active one) and decrements this counter.If a non-active epoch’s counter reaches zero and all of the previousepochs also do not contain active transactions, then it is safe for theDBMS to reclaim expired versions that were updated in this epoch


    13. An in-memory DBMS can avoid this problem with coarse-grainedepoch-basedmemory management that tracks the versions createdby transactions [44]. There is always one active epoch and an FIFOqueue of prior epochs


    14. The GC process is divided into three steps: (1) detect expiredversions, (2) unlink those versions from their associated chains andindexes, and (3) reclaim their storage space. The DBMS considers aversion as expired if it is either an invalid version (i.e., created byan aborted transaction) or it is not visible to any active transaction.For the latter, the DBMS checks whether a version’send-tsisless than theTidof all active transactions. The DBMS maintainsa centralized data structure to track this information, but this is ascalability bottleneck in a multi-core system



    15. all of the tuple versions for a table are storedin the same storage space. This approach is used in Postgres, aswell as in-memory DBMSs like Hekaton, NuoDB, and MemSQL.To update an existing tuple, the DBMS first acquires an empty slotfrom the table for the new tuple version. It then copies the contentof the current version to the new version. Finally, it applies themodifications to the tuple in the newly allocated version slot.

      Append-only Storage:

      “better for analytical queries that perform large scans because ver-sions are stored contiguously in memory, which minimizes CPUcache misses and is ideal for hardware prefetching”

      但是旧版本需要chase pointer


    16. With this last scheme, the DBMS maintains the master versionsof tuples in the main table and a sequence ofdelta versionsin aseparatedelta storage. This storage is referred to as therollbacksegmentin MySQL and Oracle, and is also used in HyPer. Mostexisting DBMSs store the current version of a tuple in the main table.To update an existing tuple, the DBMS acquires a continuous spacefrom the delta storage for creating a new delta version.

      Delta Storage: 有利于更新操作,因为 “This scheme is ideal forUPDATEoperations that modify a subsetof a tuple’s attributes because it reduces memory allocations”

      但是对于read intensive的工作,却有额外的overhead

    17. the older versions are stored in a separate table. TheDBMS maintain amasterversion of each tuple in the main table andmultiple versions of the same tuple in a separate time-travel table.In some DBMSs, like SQL Server, the master version is the currentversion of the tuple. Other systems, like SAP HANA, store theoldest version of a tuple as the master version to provide snapshotisolation

      Time-Travel Storage

    18. Newest-to-Oldest (N2O):The alternative is to store the newestversion of the tuple as the version chain’s HEAD (see Fig. 3b). Sincemost transactions access the latest version of a tuple, the DBMS doesnot have to traverse the chain. The downside, however, is that thechain’s HEAD changes whenever a tuple is modified. The DBMSthen updates all of the table’s indexes (both primary and secondary)to point to the new version. As we discuss in Sect. 6.1, one canavoid this problem through an indirection layer that provides a singlelocation that maps the tuple’s latest version to physical address. Withthis setup, the indexes point to tuples’ mapping entry instead of theirphysical locations. This works well for tables with many secondaryindexes but increases the storage overhead


    19. The key decision with the append-only scheme is how the DBMSorders the tuples’ version chains. Since it is not possible to maintaina latch-free doubly linked list, the version chain only points in onedirection. This ordering has implications on how often the DBMSupdates indexes whenever transactions modify tuples.Oldest-to-Newest (O2N):With this ordering, the chain’s HEADis the oldest extant version of a tuple (see Fig. 3a). This versionmight not be visible to any active transaction but the DBMS has yetto reclaim it. The advantage ofO2Nis that the DBMS need notupdate the indexes to point to a newer version of the tuple wheneverit is modified. But the DBMS potentially traverses a long versionchain to find the latest version during query processing. This is slowbecause of pointer chasing and it pollutes CPU caches by readingunneeded versions. Thus, achieving good performance withO2Nishighly dependent on the system’s ability to prune old versions


    20. thechain’s HEAD is either the newest or oldest version

      Version Storage: head of chain

    21. A transaction can commit only when all ofthe transactions that it depends on have committed.

      eagerly update

    22. Atransaction is allowed to commit only when its dependency counteris zero, whereupon the DBMS traverses its dependency list anddecrements the counters for all the transactions that are waitingfor it to finish.

      speculative read uncommitted

    23. The serial safety net (SSN) is a newer certifier-based proto-col [45]. Unlike withSSI, which is only applicable to snapshotisolation,SSNworks with any isolation level that is at least as strongasREAD COMMITTED. It also uses a more more precise anomaly de-tection mechanism that reduces the number of unnecessary aborts.SSNencodes the transaction dependency information into meta-data fields and validates a transactionT’s consistency by computinga low watermark that summarizes “dangerous” transactions thatcommitted before theTbut must be serialized afterT[45]. Re-ducing the number of false aborts makesSSNmore amenable toworkloads with read-only or read-mostly transactions

      Serialization Certifier: SSN -- 利于只读/Read-mostly的交易

    24. the DBMS maintains a serialization graphfor detecting and removing “dangerous structures” formed by con-current transactions

      Serialization Certifier

    25. When a transaction commits, the DBMSassigns it a unique timestamp (Tcommit) that is used to update thebegin-tsfield for the versions created by that transaction and thenreleases all of the transaction’s locks.

      MV2PL: when to release locks

    26. Similarly, atransaction is allowed to update a versionBxonly if bothread-cntandtxn-idare set to zero

      MV2PL: when can update

    27. To perform a read operation on a tupleA, the DBMS searches fora visible version by comparing a transaction’sTidwith the tuples’begin-tsfield. If it finds a valid version, then the DBMS incre-ments that tuple’sread-cntfield if itstxn-idfield is equal to zero(meaning that no other transaction holds the write lock)

      MV2PL: when can read

    28. The tuple’swrite lockis thetxn-idfield. For theread lock, the DBMS usesaread-cntfield to count the number of active transactions thathave read the tuple. Although it is not necessary, the DBMS canpacktxn-idandread-cntinto contiguous 64-bit word so that theDBMS can use a single CaS to update them at the same time

      MV2PL: 锁同样大小所以单个CAS就可以执行更新

    29. This protocol uses the two-phase locking (2PL) method [11] toguarantee the transaction serializability. Every transaction acquiresthe proper lock on the current version of logical tuple before it isallowed to read or modify it.


    30. But atransaction cannot read a new version until the other transaction thatcreated it commits. A transaction that reads an outdated version willonly find out that it should abort in the validation phase

      MVOCC: when cannot read

    31. If the transaction passes these checks, it then enters thewrite phasewhere the DBMS installs all the new versions and setstheirbegin-tstoTcommitandend-tstoINF

      Write Phase of MVOCC: end-ts initialized to INF

    32. When a transaction instructs the DBMS that it wants to commit,it then enters thevalidation phase. First, the DBMS assigns thetransaction another timestamp (Tcommit) to determine the serializationorder of transactions. The DBMS then determines whether the tuplesin the transaction’s read set was updated by a transaction that alreadycommitted.

      Validation Phase of MVOCC

    33. TheMVOCCprotocol splits a transaction into three phases.When the transaction starts, it is in theread phase. This is where thetransaction invokes read and update operations on the database. LikeMVTO, to perform a read operation on a tupleA, the DBMS firstsearches for a visible versionAxbased onbegin-tsandend-tsfields.Tis allowed to update versionAxif its write lock is not ac-quired. In a multi-version setting, if the transaction updates versionBx, then the DBMS creates versionBx+1with itstxn-idset toTid

      Read Phase of MVOCC: read operation & creation of new versions

    34. The motivation behind OCCis that the DBMS assumes that transactions are unlikely to conflict,and thus a transaction does not have to acquire locks on tuples whenit reads or updates them.

      MVOCC: optimistic about the conflict

    35. WithMVTO, a transaction always updates the latest version ofa tuple. TransactionTcreates a new versionBx+1if (1) no activetransaction holdsBx’s write lock and (2)Tidis larger thanBx’sread-tsfield. If these conditions are satisfied, then the DBMScreates a new versionBx+1and sets itstxn-idtoTid. WhenTcommits, the DBMS setsBx+1’sbegin-tsandend-tsfields toTidandINF(respectively), andBx’send-tsfield toTid

      MVTO: update create new version based on two conditions and update the begin-ts field on commit

    36. Upon readingAx, the DBMS setsAx’sread-tsfield toTidif its current value is less thanTid. Otherwise, the transaction readsan older version without updating this field

      MVCC: after read

    37. When transactionTinvokes a read operation on logical tupleA,the DBMS searches for a physical version whereTidis in betweenthe range of thebegin-tsandend-tsfields

      MVTO: when can read

    38. The crux ofthis approach is to use the transactions’ identifiers (Tid) to pre-compute their serialization order. In addition to the fields describedin Sect. 2.2, the version headers also contain the identifier of the lasttransaction that read it (read-ts). The DBMS aborts a transactionthat attempts to read or update a version whose write lock is held byanother transaction.


    39. Existing approachesto provide serializable transaction processing use either (1) addi-tional latches in the index [35, 44] or (2) extra validation steps whentransactions commit [27].


    40. Every DBMS includes aconcurrency control protocolthat coor-dinates the execution of concurrent transactions [11]. This protocoldetermines (1) whether to allow a transaction to access or modify aparticular tuple version in the database at runtime, and (2) whether toallow a transaction to commit its modifications.


    41. Tuples:As shown in Fig. 1, each physical version contains fourmeta-data fields in its header that the DBMS uses to coordinatethe execution of concurrent transactions (some of the concurrencycontrol protocols discussed in the next section include additionalfields). Thetxn-idfield serves as the version’s write lock. Everytuple has this field set to zero when the tuple is not write-locked.Most DBMSs use a 64-bittxn-idso that it can use a single compare-and-swap (CaS) instruction to atomically update the value. If atransactionTwith identifierTidwants to update a tupleA, then theDBMS checks whetherA’stxn-idfield is zero. If it is, then DBMSwill set the value oftxn-idtoTidusing a CaS instruction [27, 44].begin-tscolumnsContentHeadertxn-idend-ts...pointerFigure 1: Tuple Format– The basic layout of a physical version of a tuple.Any transaction that attempts to updateAis aborted if thistxn-idfield is neither zero or not equal to itsTid. The next two meta-datafields are thebegin-tsandend-tstimestamps that represent thelifetime of the tuple version. Both fields are initially set to zero. TheDBMS sets a tuple’sbegin-tstoINFwhen the transaction deletesit. The last meta-data field is thepointerthat stores the address ofthe neighboring (previous or next) version (if any)
    42. Transactions:The DBMS assigns a transactionTa unique,monotonically increasing timestamp as its identifier (Tid) whenthey first enter the system. The concurrency control protocols usethis identifier to mark the tuple versions that a transaction accesses.Some protocols also use it for the serialization order of transactions


    43. Foremost is that it canpotentially allow for greater concurrency than a single-version sys-tem.




    44. This is especially true for in-memory DBMSswhere disk is no longer the main bottleneck


    45. A transaction management scheme permits end-users to access adatabase in a multi-programmed fashion while preserving the illu-



    46. this previous work does not reflect recent trends in latch-free [27] and serializable [20] concurrency control, as well as in-memory storage [36] and hybrid workloads [40]


    47. Multi-versioning allows read-only transactionsto access older versions of tuples without preventing read-writetransactions from simultaneously generating newer versions.


    48. but almost every MVCC DBMS uses tuples because itprovides a good balance between parallelism versus the overheadof version tracking
    49. Thebasic idea of MVCC is that the DBMS maintains multiple physicalversions of each logical object in the database to allow operations onthe same object to proceed in parallel.

      How to make sure different physical copies are in sync?

  24. May 2020
  25. Apr 2020
    1. le « devenir-animal » de l’humain

      hum j'aurai besoin d'une rapide définition

    2. devenir humain

      Il faudrait que tu expliques en quelques mots (genre une parenthèse) ce que tu entends par cette expression de devenir humain

  26. Jul 2019
    1. In a simple linear regression model, we model the relationship between both variables by a straight line, formally

      It would be better to start in the following way: "To build simple linear regression model, we hypothesize that the relationship between dependent and independent variable is linear, formally:"

      By saying that, In a simple linear regression model, we model the relationship between both variables by straight line is strictly speaking wrong. Strictly speaking, by straight line we model the relationship between regressors the expected value of the dependent variable given the value of the regressors.

      Then later, you point out that the relationship is not exact because not all points fall on the straight line and because of that you come up with an error terms and you continue in this way util you arrive to the final formulation of the Simple Linear Regression Model. (Which you do well later).

    1. Job says: “The ear trieth words, as the mouth tasteth meat.
    2. the universe, including man and his divine Principle, is harmonious and eternal.
    3. 1. God is All in all. 2. God is good. Good is Mind. 3. God, Spirit, being all, nothing is matter. 4. Life, God, omnipotent Good, deny death, evil, sin, disease. — Disease, sin, evil, death, deny Good, omnipotent God, Life.
    4. The vital part, the heart and Soul of Christian Science, is Love.
    5. there is no pain in Truth, and no truth Inversions. in pain; no nerve in Mind, and no mind in nerve; no matter in Mind, and no mind in matter; no matter in Life, and no life in matter; no matter in Good, and no good in matter.
    6. The Principle of Divine Metaphysics is God; its practice is the power of Truth over error; its rules demonstrate Science.
    7. the awful unreality called evil.
    8. omnipotence, omnipresence, omniscience, — Spirit possessing all power, God's allness learned. filling all space, constituting all Science
    9. I knew the Principle of all harmonious Mind-action to be God
    10. the only realities are the divine Mind Scientific evidence. and idea.
    11. this same mind calls matter, thereby shutting out the true sense of Spirit.
    12. the opposite of Truth — called error, sin, sickness, disease, death — is the false testimony of false material sense; that this false sense evolves, in belief, a subjective state of mortal mind, which this same mind calls matter, thereby shutting out the true sense of Spirit.
    13. Life, Truth, and Love are all-powerful and ever-present
    14. Feeling so perpetually the false consciousness that life inheres in the body, yet remembering that God is A divine discontent. really our Life, we may well tremble, in the prospect of those days wherein we must say, “I have no pleasure in them.”
    15. the revelation of Immanuel, the everpresent God
    16. the demonstrable fact that matter possesses neither sensation nor life;
    17. all real Being is in the divine Mind and idea
  27. Mar 2019
    1. This is a reasonable list of Knowles' assumptions about adult learners -- not as complete or nuanced as one might find in a textbook, but worth having a look at when starting a new project. rating: 3/5

  28. Aug 2018
    1. The sideboard is stylish and dramatic, but it is also quite appropriate for use in a dining room

      digital "side"-demands asks for side storage

  29. Jul 2017
    1. Because it is so important to be seen as competent and productive members of society, people naturally attempt to present themselves to others in a positive light. We attempt to convince others that we are good and worthy people by appearing attractive, strong, intelligent, and likable and by saying positive things to others (Jones & Pittman, 1982; Schlenker, 2003). The tendency to present a positive self-image to others, with the goal of increasing our social status, is known as self-presentation, and it is a basic and natural part of everyday life.

      A short film captures how social interactions influence our complex relationships between self-presentation, self-esteem and self concept in a unique way.

  30. Jun 2017
  31. Nov 2015
    1. I see using the LPP lens to identify the types of participation,how they influence learningand the coproduction of the “learning curriculum”that newcomersand oldtimers engage with in regulating and producing the local “community of practice”thatis the robotics club. Within this I aim to also investigate what physical, and non-physical resources studentshave for participationwithin this community(Nasir, et al., 2008). This an

      You clearly map the trajectory of your paper based on the concepts we learned. Your analytical lens is very clear to me as I understand the concepts in the same way you use them. It's like a concept map, how you linked the ideas.

  32. Feb 2014
    1. Concepts seem to be structurable, in that a new concept can be composed of an organization of established concepts. For present purposes, we can view a concept structure as something which we might try to develop on paper for ourselves or work with by conscious thought processes, or as something which we try to communicate to one another in serious discussion. We assume that, for a given unit of comprehension to be imparted, there is a concept structure (which can be consciously developed and displayed) that can be presented to an individual in such a way that it is mapped into a corresponding mental structure which provides the basis for that individual's "comprehending" behavior. Our working assumption also considers that some concept structures would be better for this purpose than others, in that they would be more easily mapped by the individual into workable mental structures, or in that the resulting mental structures enable a higher degree of comprehension and better solutions to problems, or both.
  33. Nov 2013
    1. schema

      definition: • (in Kantian philosophy) a conception of what is common to all members of a class; a general or essential type or form.

    2. We obtain the concept, as we do the form, by overlooking what is individual and actual; whereas nature is acquainted with no forms and no concepts, and likewise with no species, but only with an X which remains inaccessible and undefinable for us.

      That which is beyond rhetoric is beyond our conceptual reach

    3. In particular, let us further consider the formation of concepts. Every word instantly becomes a concept precisely insofar as it is not supposed to serve as a reminder of the unique and entirely individual original experience to which it owes its origin;

      words are concepts and conceptual

    4. That is to say, this conceptual edifice is an imitation of temporal, spatial, and numerical relationships in the domain of metaphor.


    5. Bees construct a physical world and man constructs a conceptual world.

    6. We obtain the concept, as we do the form, by overlooking what is individual and actual
    7. Every concept arises from the equation of unequal things.
    8. dissolve an image into a concept.

      Do we lose something in this dissolution?

    9. A concept becomes a word based on its relationship to other cases.