- Last 7 days
-
-
the Bodhisattva vow can be seen as a method for control that is in alignment with, and informed by, the understanding that singular and enduring control agents do not actually exist. To see that, it is useful to consider what it might be like to have the freedom to control what thought one had next.
- for: quote, quote - Michael Levin, quote - self as control agent, self - control agent, example, example - control agent - imperfection, spontaneous thought, spontaneous action, creativity - spontaneity
-
quote: Michael Levin
- the Bodhisattva vow can be seen as a method for control that is in alignment with, and informed by, the understanding that singular and enduring control agents do not actually exist.
-
comment
- adjacency between
- nondual awareness
- self-construct
- self is illusion
- singular, solid, enduring control agent
- adjacency statement
- nondual awareness is the deep insight that there is no solid, singular, enduring control agent.
- creativity is unpredictable and spontaneous and would not be possible if there were perfect control
- adjacency between
- example - control agent - imperfection: start - the unpredictability of the realtime emergence of our next exact thought or action is a good example of this
-
example - control agent - imperfection: end
-
triggered insight: not only are thoughts and actions random, but dreams as well
- I dreamt the night after this about something related to this paper (cannot remember what it is now!)
- Obviously, I had no clue the idea in this paper would end up exactly as it did in next night's dream!
Tags
- example - control agent - imperfection
- quote
- adjacency
- unintended consequences - AI
- spontaneous thought
- creativity - spontaneity
- triggered insight - singular and enduring control agent does not exist
- spontaneous action
- example
- quote - Michael Levin
- adjacency - nondual awareness - full control
- adjacency - illusory self - full control
- triggered insight
- quote - self as control agent
Annotators
URL
-
-
www.heritage.org www.heritage.org
-
Many courts concluded that citizens have no constitutionally protected right to arms at all, and the federal courts never invalidated a single gun control law.
Conflates gun control with denial of 2nd Amendment rights, claims 2nd Amendment was 'all but forgotten". Needs evidence.
-
-
docdrop.org docdrop.org
-
In terms of evolution, animals adapt to their ecological conditions, but as humans, we have been able to control our ecological conditions.
- for: humans vs other animals, personal experience, personal experience - pets, control vs adaptation, human features, quote, quote - Ruth Gates, quote - humans vs animals, quote - control vs adaptation
- quote
- . In terms of evolution, animals adapt to their ecological conditions, but as humans, we have been able to control our ecological conditions.
- author: Ruth Gates
- source: https://www.youtube.com/watch?v=ZJV0Kx7oGxU&t=496s
- comment
- personal experience
- her remark made me think about how often I feel this difference with our pets. They adapt to whatever we do. We control our environment by building something. They just adapt to whatever we build.
- Our pets never build anything, but simply adapt to what we build.
- her remark made me think about how often I feel this difference with our pets. They adapt to whatever we do. We control our environment by building something. They just adapt to whatever we build.
- personal experience
-
- Sep 2023
-
www.science.org www.science.org
-
The scientists behind the new study are planning an eradication campaign in Sicily. With help from authorities, they say they will destroy the known nests, continue to search local areas for more nests, and monitor for several years to make sure no ants escape. They hope to recruit residents across Europe to keep an eye out for more fire ants.
- for: invasive species - red fire ant - control
- comment
- this is an excellent application for citizen science in general, to control invasive species
-
- Aug 2023
-
Local file Local file
-
5 Rs” of OER (Retain, Reuse, Revise, Remix,Redistribute)
One day, "Request update" or "Revision control" will appear on this list too... https://boffosocko.com/2018/08/30/the-sixth-r-of-open-educational-resources-oer/
-
-
en.wikipedia.org en.wikipedia.org
-
In computing, the robustness principle is a design guideline for software that states: "be conservative in what you do, be liberal in what you accept from others". It is often reworded as: "be conservative in what you send, be liberal in what you accept". The principle is also known as Postel's law, after Jon Postel, who used the wording in an early specification of TCP.
https://en.wikipedia.org/wiki/Robustness_principle
Robustness principle: be conservative in what you do, be liberal in what you accept from others.
-
-
www.pewresearch.org www.pewresearch.org
-
The big tech companies, left to their own devices (so to speak), have already had a net negative effect on societies worldwide. At the moment, the three big threats these companies pose – aggressive surveillance, arbitrary suppression of content (the censorship problem), and the subtle manipulation of thoughts, behaviors, votes, purchases, attitudes and beliefs – are unchecked worldwide
- for: quote, quote - Robert Epstein, quote - search engine bias,quote - future of democracy, quote - tilting elections, quote - progress trap, progress trap, cultural evolution, technology - futures, futures - technology, progress trap, indyweb - support, future - education
- quote
- The big tech companies, left to their own devices , have already had a net negative effect on societies worldwide.
- At the moment, the three big threats these companies pose
- aggressive surveillance,
- arbitrary suppression of content,
- the censorship problem, and
- the subtle manipulation of
- thoughts,
- behaviors,
- votes,
- purchases,
- attitudes and
- beliefs
- are unchecked worldwide
- author: Robert Epstein
- senior research psychologist at American Institute for Behavioral Research and Technology
- paraphrase
- Epstein's organization is building two technologies that assist in combating these problems:
- passively monitor what big tech companies are showing people online,
- smart algorithms that will ultimately be able to identify online manipulations in realtime:
- biased search results,
- biased search suggestions,
- biased newsfeeds,
- platform-generated targeted messages,
- platform-engineered virality,
- shadow-banning,
- email suppression, etc.
- Tech evolves too quickly to be managed by laws and regulations,
- but monitoring systems are tech, and they can and will be used to curtail the destructive and dangerous powers of companies like Google and Facebook on an ongoing basis.
- Epstein's organization is building two technologies that assist in combating these problems:
- reference
- seminar paper on monitoring systems, ‘Taming Big Tech -: https://is.gd/K4caTW.
Tags
- quote
- quote - progress trap
- quote - election bias
- progress trap - digital technology
- SEME
- progress trap - Google
- progress trap
- search engine bias
- progress trap - search engine
- search engine manipulation effect
- quote - mind control
- quote - Robert Epstein
- quote -search engine manipulation effect
- quote - tilting elections
- quote SEME
- progress trap - social media
Annotators
URL
-
-
hackernoon.com hackernoon.com
-
Early in 2013, Ronald Robertson, now a doctoral candidate at the Network Science Institute at Northeastern University in Boston, and I discovered that Google isn’t just spying on us; it also has the power to exert an enormous impact on our opinions, purchases and votes.
- for: big tech - bias, big tech - manipulation, big tech - mind control, big tech - influence
- paraphrase
- Early in 2013, Ronald Robertson,
- now a doctoral candidate at the Network Science Institute at Northeastern University in Boston,
- and I discovered that Google isn’t just spying on us;
- it also has the power to exert an enormous impact on our opinions, purchases and votes.
- Early in 2013, Ronald Robertson,
-
he Search Suggestion Effect (SSE), the Answer Bot Effect (ABE), the Targeted Messaging Effect (TME), and the Opinion Matching Effect (OME), among others. Effects like these might now be impacting the opinions, beliefs, attitudes, decisions, purchases and voting preferences of more than two billion people every day.
- for: search engine bias, google privacy, orwellian, privacy protection, mind control, google bias
- title: Taming Big Tech: The Case for Monitoring
- date: May 14th 2018
-
author: Robert Epstein
-
quote
- paraphrase:
- types of search engine bias
- the Search Suggestion Effect (SSE),
- the Answer Bot Effect (ABE),
- the Targeted Messaging Effect (TME), and
- the Opinion Matching Effect (OME), among others. -
- Effects like these might now be impacting the
- opinions,
- beliefs,
- attitudes,
- decisions,
- purchases and
- voting preferences
- of more than two billion people every day.
- types of search engine bias
-
-
datatracker.ietf.org datatracker.ietf.org
Tags
- caching
- wikipedia:en=HTTP_caching
- http:header=cdn-cache-control:no-cache
- http:header=cdn-cache-control:max-age
- urn:ietf:rfc:9213
- http
- http:header=cdn-cache-control:no-store
- http:header=cdn-cache-control:must-revalidate
- http:header=cdn-cache-control
- http:header=cdn-cache-control:private
- cdn
Annotators
URL
-
-
datatracker.ietf.org datatracker.ietf.org
Tags
- http:header=cache-control:no-cache
- http:header=pragma
- http:header=cache-control:no-store
- wikipedia:en=HTTP_caching
- http:header=if-modified-since
- http:header=cache-control:max-stale
- http:header=warning
- http:header=if-range
- http:header=if-none-match
- http:header=cache-control:public
- http:header=cache-control:only-if-cached
- http:header=cache-control:must-understand
- http:header=cache-control:private
- urn:ietf:rfc:9111
- http:code=304
- http
- http:header=if-unmodified-since
- http:header=cache-control:proxy-revalidate
- http:header=cache-control
- caching
- http:header=cache-control:no-transform
- http:header=expires
- http:header=cache-control:min-fresh
- http:header=cache-control:must-revalidate
- http:code=206
- http:header=cache-control:s-maxage
- http:header=age
- http:header=cache-control:max-age
- http:header=if-match
Annotators
URL
-
- Jul 2023
-
www.technologyreview.com www.technologyreview.com
-
Instead of dumping the humidity outdoors, why not have an option to condense it to a water holding tank, thus offsetting the need to purchase water? This sounds like it might even be able to distill water, which would further save money for those who need distilled water for apnea devices and other uses.
-
-
-
In ihrer Serie über Klimasabotage beschäftigt sich die taz gründlich mit der CDU und Untergruppierungen wie dem Wirtschaftsrat und der Mittelstands-Vereinigung. Der Artikel fasts wichtige Informationen über das Lobbyisten-Netzwerk zusammen, das für die Blockade von Klimaschutzmaßnahmen unter Angela Merkel verantwortlich war und heute versucht, die Energiewende zu hintertreiben. https://taz.de/Die-Klimasabotage-der-Union/!5937181/
-
- Jun 2023
-
www.goodreads.com www.goodreads.com
-
Noam Chomsky’s backpocket classic on wartime propaganda and opinion control
Media control is actually a definition/term (that has been coined by Noam Chomsky)
-
-
www.youtube.com www.youtube.com
-
03:54 Attention as most valuable resource (which media can take away)
Tags
Annotators
URL
-
-
www.youtube.com www.youtube.com
-
37:30 Tech companies don't want you to take info into your own notes (see pkm can give agency)
Tags
Annotators
URL
-
-
stackoverflow.com stackoverflow.com
-
Using a property or a method to access the field enables you to maintain encapsulation, and fulfill the contract of the declaring class.
-
Exposing properties gives you a way to hide the implementation. It also allows you to change the implementation without changing the code that uses it (e.g. if you decide to change the way data are stored in the class)
-
-
stackoverflow.com stackoverflow.com
-
Typical control-freak opinion.
-
- May 2023
-
docdrop.org docdrop.org
-
this era began in the mid-20th century before you and I were born with a biomedical Innovation
-
Mary Harrington suggests that
- a starting point for the transhuman age
- was marked by
- the introduction of the birth control pill
-
comment
- while that may mark the first time a technology has radically reshaped human physiology in such a direct way,
- the spirit of transhumanism is inherent in our nature as innovating cognitive beings
- in fact, I find the term "transhuman" self-contradictory and problematic
- as our very nature as innovative beings means we are constantly reinventing and transcending our old behaviors
- while that may mark the first time a technology has radically reshaped human physiology in such a direct way,
-
-
-
github.com github.com
-
Figured it out. Cache-Control header is required.
js const headers = { 'Cache-Control': 'public, max-age=604800' }; const request = new Request('https://foobar.com/') const cacheResponse = new Response('bar',{ headers }) const cache = caches.default await cache.put(request, cacheResponse) const response = await cache.match(request);
-
-
en.wikipedia.org en.wikipedia.org
-
Cultural hegemony is therefore used to maintain consent to the capitalist order, rather than the use of force to maintain order.
-
- Mar 2023
-
simonhearne.com simonhearne.com
-
developers.cloudflare.com developers.cloudflare.com
-
<table><tbody><tr><th colspan="4" rowspan="1">Status</th><th colspan="4" rowspan="1">Description</th></tr><tr><td colspan="5" rowspan="1">HIT</td><td colspan="5" rowspan="1">The resource was found in Cloudflare’s cache.</td></tr><tr><td colspan="5" rowspan="1">MISS</td><td colspan="5" rowspan="1">The resource was not found in Cloudflare’s cache and was served from the origin web server.</td></tr><tr><td colspan="5" rowspan="1">NONE/UNKNOWN</td><td colspan="5" rowspan="1">Cloudflare generated a response that denotes the asset is not eligible for caching. This may have happened because:
- A Worker generated a response without sending any subrequests. In this case, the response did not come from cache, so the cache status will be
none/unknown
.- A Worker request made a subrequest (
fetch
). In this case, the subrequest will be logged with a cache status, while the main request will be logged withnone/unknown
status (the main request did not hit cache, since Workers sits in front of cache).- A Firewall rule was triggered to block a request. The response will come from the edge network before it hits cache. Since there is no cache status, Cloudflare will log as
none/unknown
.- A redirect page rule caused the edge network to respond with a redirect to another asset/URL. This redirect response happens before the request reaches cache, so the cache status is
</td></tr><tr><td colspan="5" rowspan="1">EXPIRED</td><td colspan="5" rowspan="1">The resource was found in Cloudflare’s cache but was expired and served from the origin web server.</td></tr><tr><td colspan="5" rowspan="1">STALE</td><td colspan="5" rowspan="1">The resource was served from Cloudflare’s cache but was expired. Cloudflare could not contact the origin to retrieve an updated resource.</td></tr><tr><td colspan="5" rowspan="1">BYPASS</td><td colspan="5" rowspan="1">The origin server instructed Cloudflare to bypass cache via a Cache-Control header set tonone/unknown
.no-cache
,private
, ormax-age=0
even though Cloudflare originally preferred to cache the asset. BYPASS is returned when enabling Origin Cache-Control. Cloudflare also sets BYPASS when your origin web server sends cookies in the response header.</td></tr><tr><td colspan="5" rowspan="1">REVALIDATED</td><td colspan="5" rowspan="1">The resource is served from Cloudflare’s cache but is stale. The resource was revalidated by either anIf-Modified-Since
header or anIf-None-Match header
.</td></tr><tr><td colspan="5" rowspan="1">UPDATING</td><td colspan="5" rowspan="1">The resource was served from Cloudflare’s cache and was expired, but the origin web server is updating the resource. UPDATING is typically only seen for very popular cached resources.</td></tr><tr><td colspan="5" rowspan="1">DYNAMIC</td><td colspan="5" rowspan="1">Cloudflare does not consider the asset eligible to cache and your Cloudflare settings do not explicitly instruct Cloudflare to cache the asset. Instead, the asset was requested from the origin web server. Use Page Rules to implement custom caching options.</td></tr></tbody></table> - A Worker generated a response without sending any subrequests. In this case, the response did not come from cache, so the cache status will be
-
-
Tags
Annotators
URL
-
-
developers.cloudflare.com developers.cloudflare.com
-
developer.mozilla.org developer.mozilla.org
- Feb 2023
- Jan 2023
-
rhodesmill.org rhodesmill.org
-
-
Hints for Preparing Documents Most documents go through several versions (always more than you expected) before they are finally finished. Accordingly, you should do whatever possible to make the job of changing them easy. First, when you do the purely mechanical operations of typing, type so subsequent editing will be easy. Start each sentence on a new line. Make lines short, and break lines at natural places, such as after commas and semicolons, rather than randomly. Since most people change documents by rewriting phrases and adding, deleting and rearranging sentences, these precautions simplify any editing you have to do later. — Brian W. Kernighan, 1974
—Brian W. Kernighan, 1974 “UNIX for Beginners” [PDF] as Bell Labs Technical Memorandum 74-1273-18 on 29 October 1974.
For easier editing and reuse of sentences, or even portions of lines of text, one can (and should) write sentences or sentence fragments on their own lines in digital contexts.
This way future edits or the ability to more easily cut and paste will far easier in addition to keeping your version control files simpler and easier to read and visually track your changes. (That is in many version control systems, instead of a change appearing to affect an entire paragraph, it will only show on the single line that was changed thereby making the change easier to see.)
This particular affordance may be a particularly useful one for note takers who expect to regularly reuse their notes in other contexts. Many forms of software (including Tex, LaTeX, and even markdown) will autowrap newlines so that a sentence broken up into clauses on multiple lines will properly wrap back into a proper looking single line when printed. Take care that in many Markdown versions adding two spaces at the end of a line will automatically create a newline in your text.
-
-
www.geoffreylitt.com www.geoffreylitt.com
-
Software should be a malleable medium, where anyone can edit their tools to better fit their personal needs. The laws of physics aren’t relevant here; all we need is to find ways to architect systems in such a way that they can be tweaked at runtime, and give everyone the tools to do so.
It's clear that gklitt is referring to the ability of extensions to augment the browser, but: * it's not clear that he has applied the same thought process to the extension itself (which is also software, after all) * the conception of in-browser content as software tooling is likely a large reason why the perspective he endorses here is not more widespread—that content is fundamentally a copy of a particular work, in the parlance of US copyright law (which isn't terribly domain-appropriate here so much as its terminology is useful)
-
-
docdrop.org docdrop.org
-
it really all does 00:06:53 trace back to the start of our what we call civilization our civilization meaning Agriculture and then settlements and cities so prior to that we lived in approximate equilibrium with ecosystems
!- Original source of : polycrisis - According to Prof. Tom Murphy, the original source of our current polycrisis is our collective, human need for control and mastery of our environment starting with civilization building itself, - and has its roots over 10,000 years ago in the beginnings of agriculture
!- Tom Murphy : Comment His thesis is aligned with the work of: - Glenn Albrecht & Gavin Van Horn: Replacing the Anthropocene with the Symbiocene https://hyp.is/go?url=https%3A%2F%2Fhumansandnature.org%2Fexiting-the-anthropocene-and-entering-the-symbiocene%2F&group=world - Buddhist scholar David Loy: On the Emptiness at the heart of the human being that cannot be filled by consumerism & materialism https://hyp.is/go?url=http%3A%2F%2Fdocdrop.org%2Fvideo%2F1Gq4HhUIDDk%2F&group=world - Korean / German philosopher Byung-Chul Han: The Burnout Society https://hyp.is/go?url=http%3A%2F%2Fdocdrop.org%2Fvideo%2FbNkDeUApreo%2F&group=world - Cognitive Scientist, Buddhist scholar Jay Garfield: Losing the Self: https://hyp.is/go?url=http%3A%2F%2Fdocdrop.org%2Fvideo%2FE5lW5XedNGU%2F&group=world
-
-
abc6onyourside.com abc6onyourside.com
-
DeWine said he has talked directly with the director and several members of the six-member Ohio Casino Control Commission, to which the legislature gave the job of regulating the fledgling industry.
Since neither you nor I nor anyone else may dictate whether or not people bet on sports in Ohio, we couldn't have justly granted that authority to the legislature to hand off to the made-up "Ohio Casino Control Commission". We also couldn't have justly granted any authority to "Governor" Mike DeWine.
This is simply corrupt racketeering by the most powerful gang in the state, and their "legions of enforcer" mercenaries to claim a right to impose their opinions on Ohioans when no one else can.
For those confused, it's right there in the Just Powers clause of The Declaration of Independence.
All just Gov power must be granted to it by individuals. They can't just wish power for themselves out of thin air, no matter how many legislators or voters "vote" for the wish to come true.
-
- Dec 2022
-
archive.nytimes.com archive.nytimes.com
-
<small><cite class='h-cite via'>ᔥ <span class='p-author h-card'>John Mount</span> in Good Stationery as a Tool of Thought | MZLabs (<time class='dt-published'>11/30/2022 13:11:31</time>)</cite></small>
-
-
voices.uchicago.edu voices.uchicago.edu
-
Censorship and Information Control During Information RevolutionsExploring how new information technologies from the printing press to the digital age have stimulated new forms of censorship and information control.
https://voices.uchicago.edu/censorship/
Related YouTube channel/videos: https://www.youtube.com/channel/UCeNP7NIWmB70wFBv9QolYkg
-
- Nov 2022
-
medium.com medium.com
-
hat we want is to be able to leave Facebook and still talk to our friends, instead of having many Facebooks.
What about Matrix?
-
-
reason.com reason.com
-
https://reason.com/2022/11/16/suburban-mom-jailed-handcuffed-cps-son-walk-home/
WTF?! And in Texas where people are supposed to be "free".
-
-
medium.com medium.com
-
Fifty years ago, coinciding with the centennial of the release of Darwin’s manuscript, author Morse Peckham collected all six editions into a single “variorum” text. Peckham painstakingly created a reference system that denotes the modifications and changes between editions. The text was created by Peckham’s careful enumeration of every sentence from every edition, copied onto index cards; from these cards, he carefully assembled them into a final text.
-
-
benfry.com benfry.com
-
What a spectacular visualization of Darwin's On the Origin of Species.
Richard Carter will love this if he's not seen it.
-
-
en.wikipedia.org en.wikipedia.org
-
Contents 1 Overview 2 Reasons for failure 2.1 Overconfidence and complacency 2.1.1 Natural tendency 2.1.2 The illusion of control 2.1.3 Anchoring 2.1.4 Competitor neglect 2.1.5 Organisational pressure 2.1.6 Machiavelli factor 2.2 Dogma, ritual and specialisation 2.2.1 Frames become blinders 2.2.2 Processes become routines 2.2.3 Resources become millstones 2.2.4 Relationships become shackles 2.2.5 Values becomes dogmas 3 The paradox of information systems 3.1 The irrationality of rationality 3.2 How computers can be destructive 3.3 Recommendations for practice 4 Case studies 4.1 Fresh & Easy 4.2 Firestone Tire and Rubber Company 4.3 Laura Ashley 4.4 Xerox 5 See also 6 References
Wiki table of contents of the Icarus paradox
-
-
twitter.com twitter.comTwitter1
-
v5: added git and github (thanks @ceejbot), and RSS (thanks @zem42). Taking suggestions for hierarchical/distributed and hierarchical/decentralized.
t Laurie Voss's crowdsourced set of examples of things that have structure & control in the form of the following: - centralized - hierarchical - federated - distributed - decentralized
Picture below:
Link to tweet: https://twitter.com/seldo/status/1486563446099300359?s=20&t=C6z9xUF_YBkOFmfcjfjpUA
-
-
herman.bearblog.dev herman.bearblog.dev
-
The solution I settled on (which I still use to this day) is quick and elegant; as well as super accurate. All the blogs start out as non-discoverable by search engines, and do not show up on the Bear feed until they have been vetted by yours truly. I then set up a Tinder-esque review screen where I can easily approve or block a new blog (as well as blacklist that email address).
-
- Sep 2022
-
dictionary.apa.org dictionary.apa.org
-
-
-
The thing is that people add these jump boxes - pivots between different networks - they want to get data out from the control system to the business network. They want to be able to monitor things.
Jump boxes
Devices that are intentionally added to the industrial control system network to allow access from the business network. These cross the security "air gap" set up between the networks. This is useful, though, for getting performance data from the industrial control system to the monitors and resource trackers on the business network.
-
- Aug 2022
-
www.bmj.com www.bmj.com
-
Torjesen, I. (2021). Covid-19: Omicron may be more transmissible than other variants and partly resistant to existing vaccines, scientists fear. BMJ, 375, n2943. https://doi.org/10.1136/bmj.n2943
-
-
brent-noorda.com brent-noorda.com
-
Editorial: The real reason I wanted Cmm to succeed: to democratize programming. It wouldn’t belong in any business plan, and I seldom mentioned to anyone, but the real reason I wanted Cmm to succeed was not about making money (although paying the mortgage was always important). The real reason was because of the feeling I had when I programmed a computer to perform work for me
-
-
www.npr.org www.npr.org
-
Huang, P. (2021, April 1). How The CDC Is Battling The Pandemic And Working To Regain Public Trust: Shots—Health News: NPR. https://www.npr.org/sections/health-shots/2021/04/01/982761755/inside-the-cdcs-battle-to-defeat-the-virus?utm_campaign=storyshare&utm_source=twitter.com&utm_medium=social
-
-
-
Mertens, G., Lodder, P., Smeets, T., & Duijndam, S. (2021). Fear of COVID-19 predicts vaccination willingness 14 months later. PsyArXiv. https://doi.org/10.31234/osf.io/rt7u4
-
-
twitter.com twitter.com
-
ReconfigBehSci on Twitter: "RT @vmcorman: “...With nearly 5 million children ages 5 to 11 now vaccinated against COVID-19, Centers for Disease Control and Prevention D…” / Twitter. (n.d.). Retrieved December 13, 2021, from https://twitter.com/SciBeh/status/1470066664301637632
-
-
marker.medium.com marker.medium.com
-
Indeed, judging from the accounts of the many employees who have now gone on record about this issue, the “debates” that have been happening at Basecamp are precisely the kinds of conversations that happen when you have a diverse workforce. Different issues affect different people differently, and being able to speak freely about those differences is the hallmark of a healthy culture. But by framing these discussions as “acrimonious debates” rather than “challenging conversations,” Hansson has positioned himself not as a peacemaker, but as a tyrant hell-bent on taking his toys and going home; shutting down discussions rather than holding space for growth and discovery.
-
-
www.google.com www.google.com
-
I was doing some random searches for older material on zettelkasten in German and came across this.
Apparently I've come across this before in a similar context: https://hypothes.is/a/CsgyjAXQEeyMfoN7zLcs0w
The description now makes me want to read it all the more!
This is a book about a box that contained the world. The box was the Picture Academy for the Young, a popular encyclopedia in pictures invented by preacher-turned-publisher Johann Siegmund Stoy in eighteenth-century Germany. Children were expected to cut out the pictures from the Academy, glue them onto cards, and arrange those cards in ordered compartments—the whole world filed in a box of images.
As Anke te Heesen demonstrates, Stoy and his world in a box epitomized the Enlightenment concern with the creation and maintenance of an appropriate moral, intellectual, and social order. The box, and its images from nature, myth, and biblical history, were intended to teach children how to collect, store, and order knowledge. te Heesen compares the Academy with other aspects of Enlightenment material culture, such as commercial warehouses and natural history cabinets, to show how the kinds of collecting and ordering practices taught by the Academy shaped both the developing middle class in Germany and Enlightenment thought. The World in a Box, illustrated with a multitude of images of and from Stoy's Academy, offers a glimpse into a time when it was believed that knowledge could be contained and controlled.
Given the portions about knowledge and control, it might also be of interest to @remikalir wrt his coming book.
-
-
portswigger.net portswigger.net
-
bug bounty program
one ways to counter security flaws in SC is to incentivize bug hunting.
-
-
milk.com milk.com
-
Roughly stated, my overarching career mission is to design, build, and deploy software platforms that put end users in control of their computing and data, in part by making it easy and natural for programmers to create software that honors user desire.
Tags
Annotators
URL
-
- Jul 2022
-
gist.github.com gist.github.com
-
4.3 Understand the great brain battles and how to control them to get what “you” want.
4.3 Understand the great brain battles and how to control them to get what “you” want.
-
-
scattered-thoughts.net scattered-thoughts.net
-
Free as in ...? Points out that freedoms afforded by foss software to the average computer user are effectively the same as proprietary software, because it's too difficult to even find the source and build it, let alone make any changes. Advocates the foss developers should not think only about the things that users are not legally prevented from doing, but about what things they are realistically empowered and supported in doing.
-
- Jun 2022
-
www.scientificamerican.com www.scientificamerican.com
-
surveys indicate that screens and e-readers interfere with two other important aspects of navigating texts: serendipity and a sense of control.
Based on surveys, readers indicate that two important parts of textual navigation are sense of control and serendipity.
http://books.google.com/books/about/Electronic_journal_literature.html?id=YSFlAAAAMAAJ
How does the control over a book frame how we read? What does "power over" a book look like compared to "power with"?
What are the tools for thought affordances that paper books provide over digital books and vice versa?
I find myself thinking about people publishing books in index card/zettelkasten formats. Perhaps Scott Scheper could do this with his antinet book presented in a linear format, but done in index cards with his numbers, links, etc. as well as his actual cards for his index so that readers could also see the power of the system by holding it in their hands and playing with it.
-
-
www.kcet.org www.kcet.org
-
Where are My Children?, Universal's top film of 1916, written and directed by their top director Lois Weber, discussed abortion and birth control. It was added to the National Film Registry in 1993.
See also - Stamp, Shelley. Lois Weber in Early Hollywood. University of California Press, May 2015. ISBN 9780520284463
Watched this last night
-
-
www.nytimes.com www.nytimes.com
-
-
gun rights advocates often push to arm more people, citing prominent examples where a “good guy with a gun” stopped a “bad guy.”
A "good guy with a gun" stopped a "bad guy" on average less than 3% of the time in active shooter situations in 433 events through 2021.
-
“It’s direct, indisputable, empirical evidence that this kind of common claim that ‘the only thing that stops a bad guy with the gun is a good guy with the gun’ is wrong,” said Adam Lankford, a professor at the University of Alabama, who has studied mass shootings for more than a decade. “It’s demonstrably false, because often they are stopping themselves.”
-
-
hybridpedagogy.org hybridpedagogy.org
-
But systems of schooling and educational institutions–and much of online learning– are organized in ways that deny their voices matter. My role is to resist those systems and structures to reclaim the spaces of teaching and learning as voice affirming. Voice amplifying.
Modeling annotation and note taking can allow students to see that their voices matter in conversation with the "greats" of knowledge. We can and should question authority. Even if one's internal voice questions as one reads, that might be enough, but modeling active reading and note taking can better underline and empower these modes of thought.
There are certainly currents within American culture that we can and should question authority.
Sadly some parts of conservative American culture are reverting back to paternalized power structures of "do as I say and not as I do" which leads to hypocrisy and erosion of society.
Education can be used as a means of overcoming this, though it requires preventing the conservative right from eroding this away from the inside by removing books and certain thought from the education process that prevents this. Extreme examples of this are Warren Jeff's control of religion, education, and social life within his Mormon sect.
Link to: - Lawrence Principe examples of the power establishment in Western classical education being questioned. Aristotle wasn't always right. The entire history of Western science is about questioning the status quo. (How can we center this practice not only in science, but within the humanities?)
My evolving definition of active reading now explicitly includes the ideas of annotating the text, having a direct written conversation with it, questioning it, and expanding upon it. I'm not sure I may have included some or all of these in it before. This is what "reading with a pen in hand" (or digital annotation tool) should entail. What other pieces am I missing here which might also be included?
-
-
cristobal.space cristobal.space
-
This is an excellent piece, even though the writing is (probably intentionally) in places too obscure.
Tags
Annotators
URL
-
-
www.nytimes.com www.nytimes.com
-
First, the majority population in eastern Virginia were enslaved blacks. Whites lived in constant fear of slave insurrection. Everyone knew about the 1739 slave rebellion in Stono, S.C., when blacks broke into a store, decapitated the shopkeepers, seized guns and powder, and marched with flying banners, beating drums and cries of “Liberty!” Up to 100 joined the rebellion before being engaged by a contingent of armed, mounted militiamen. Scores died in the ensuing battle.
-
-
The Virginia Declaration of Rights, written by none other than George Mason in 1776 when states controlled the militias, did not have one.
Recall that George Mason was an anti-federalist.
-
Only four of the 13 state Constitutions had such a provision.
Prior to the Bill of Rights, only four of the thirteen state Constitutions had a provision for a right to bear arms.
-
-
teachingamericanhistory.org teachingamericanhistory.org
-
Some minds are agitated by foreign alarms. Happily for us, there is no real danger from Europe; that country is engaged in more arduous business: from that quarter there is no cause of fear: you may sleep in safety forever for them.
When talking about "disciplined armies", "defense", and "militias" at the Virginia Ratifying Convention in 1788, Patrick Henry explicitly says that the United States is not in danger from European powers:
Some minds are agitated by foreign alarms. Happily for us, there is no real danger from Europe; that country is engaged in more arduous business: from that quarter there is no cause of fear: you may sleep in safety forever for them.
-
-
-
“If they neglect or refuse”: “Document: Patrick Henry Speech BeforeVirginia Ratifying Convention (June 5, 1788),” Teaching American History.
-
Professor Carl Bogus: Carl T. Bogus, “Was Slavery a Factor in the SecondAmendment?” e New York Times, May 24, 2018.
Professor Carl Bogus: Carl T. Bogus, “Was Slavery a Factor in the Second Amendment?” The New York Times, May 24, 2018. https://www.nytimes.com/2018/05/24/opinion/second-amendment-slavery-james-madison.html
-
Patrick Henry and George Mason: Dave Davies, “Historian Uncovers eRacist Roots of the 2nd Amendment,” NPR, June 2, 2021.
https://www.npr.org/2021/06/02/1002107670/historian-uncovers-the-racist-roots-of-the-2nd-amendment
Transcript: https://www.npr.org/transcripts/1002107670 Audio: <audio src="">
<audio controls> <source src="https://ondemand.npr.org/anon.npr-mp3/npr/fa/2021/06/20210602_fa_01.mp3" type="audio/mpeg"> <br />
Your browser doesn't support HTML5 audio. Here is a link to the audio instead.
</audio>
-
-
www.carltbogus.com www.carltbogus.comGuns1
-
https://www.carltbogus.com/guns
Some fascinating research articles here on gun control and the Second Amendment.
Tags
Annotators
URL
-
-
www.theatlantic.com www.theatlantic.com
-
-
The lower courts consistently point to one paragraph in particular from the Heller decision. Nothing in the opinion, Scalia wrote, shouldbe taken to cast doubt on longstanding prohibitions on the possession of firearms by felons and the mentally ill, or laws forbidding the carrying of firearms in sensitive places such as schools and government buildings, or laws imposing conditions and qualifications on the commercial sale of arms.This paragraph from the pen of Justice Scalia, the foremost proponent of constitutional originalism, was astounding. True, the Founders imposed gun control, but they had no laws resembling Scalia’s list of Second Amendment exceptions. They had no laws banning guns in sensitive places, or laws prohibiting the mentally ill from possessing guns, or laws requiring commercial gun dealers to be licensed. Such restrictions are products of the 20th century. Justice Scalia, in other words, embraced a living Constitution.
-
A sign of the NRA’s new determination to influence electoral politics was the 1980 decision to endorse, for the first time in the organization’s 100 years, a presidential candidate. Their chosen candidate was none other than Ronald Reagan,
-
In the 1960s, the NRA once again supported the push for new federal gun laws. After the assassination of President John F. Kennedy in 1963 by Lee Harvey Oswald, who had bought his gun through a mail-order ad in the NRA’s American Rifleman magazine, Franklin Orth, then the NRA’s executive vice president, testified in favor of banning mail-order rifle sales. “We do not think that any sane American, who calls himself an American, can object to placing into this bill the instrument which killed the president of the United States.”
-
When Congress was considering the first significant federal gun law of the 20th century—the National Firearms Act of 1934, which imposed a steep tax and registration requirements on “gangster guns” like machine guns and sawed-off shotguns—the NRA endorsed the law. Karl Frederick and the NRA did not blindly support gun control; indeed, they successfully pushed to have similar prohibitive taxes on handguns stripped from the final bill, arguing that people needed such weapons to protect their homes. Yet the organization stood firmly behind what Frederick called “reasonable, sensible, and fair legislation.”
-
In the 1920s and ’30s, the NRA was at the forefront of legislative efforts to enact gun control. The organization’s president at the time was Karl T. Frederick, a Princeton- and Harvard-educated lawyer known as “the best shot in America”—a title he earned by winning three gold medals in pistol-shooting at the 1920 Summer Olympic Games. As a special consultant to the National Conference of Commissioners on Uniform State Laws, Frederick helped draft the Uniform Firearms Act, a model of state-level gun-control legislation.
-
General Daniel E. Sickles, the commanding Union officer enforcing Reconstruction in South Carolina, ordered in January 1866 that “the constitutional rights of all loyal and well-disposed inhabitants to bear arms will not be infringed.” When South Carolinians ignored Sickles’s order and others like it, Congress passed the Freedmen’s Bureau Act of July 1866, which assured ex-slaves the “full and equal benefit of all laws and proceedings concerning personal liberty … including the constitutional right to bear arms.”
-
After losing the Civil War, Southern states quickly adopted the Black Codes, laws designed to reestablish white supremacy by dictating what the freedmen could and couldn’t do. One common provision barred blacks from possessing firearms. To enforce the gun ban, white men riding in posses began terrorizing black communities. In January 1866, Harper’s Weekly reported that in Mississippi, such groups had “seized every gun and pistol found in the hands of the (so called) freedmen” in parts of the state. The most infamous of these disarmament posses, of course, was the Ku Klux Klan.
-
More controversially, the laws restricted importation of “Saturday Night Specials”—the small, cheap, poor-quality handguns so named by Detroit police for their association with urban crime, which spiked on weekends. Because these inexpensive pistols were popular in minority communities, one critic said the new federal gun legislation “was passed not to control guns but to control blacks.”
-
The very next day, Congress passed the Omnibus Crime Control and Safe Streets Act of 1968, the first federal gun-control law in 30 years. Months later, the Gun Control Act of 1968 amended and enlarged it.
-
Newton had discovered, during classes at San Francisco Law School, that California law allowed people to carry guns in public so long as they were visible, and not pointed at anyone in a threatening way.In February of 1967, Oakland police officers stopped a car carrying Newton, Seale, and several other Panthers with rifles and handguns. When one officer asked to see one of the guns, Newton refused. “I don’t have to give you anything but my identification, name, and address,” he insisted. This, too, he had learned in law school.
-
A 1792 federal law mandated every eligible man to purchase a military-style gun and ammunition for his service in the citizen militia. Such men had to report for frequent musters—where their guns would be inspected and, yes, registered on public rolls.
-
It was May 2, 1967, and the Black Panthers’ invasion of the California statehouse launched the modern gun-rights movement.
Tags
- 1792
- Karl T. Frederick
- read
- Black Codes
- racist policies
- Ku Klux Klan
- Gun Control Act of 1968
- Civil Rights movement
- Reconstruction
- lobbying
- Freedmen's Bureau Act of 1866
- gun control
- Antonin Scalia
- Second Amendment
- gangsters
- National Rifle Association
- Daniel E. Sickles
- Karl Frederick
- Uniform Firearms Act
- Huey Newton
- 1935
- District of Columbia vs Heller
- California
- slavery
- Ronald Reagan
- endorsements
- National Firearms Act of 1934
- Omnibus Crime Control and Safe Streets Act of 1968
- 1968
- 1866
- militias
- Black Panthers
- Constitutional originalism
- Saturday Night Specials
- 1967
- American history
- Franklin Orth
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
-
Governor Ronald Reagan, who was coincidentally present on the capitol lawn when the protesters arrived, later commented that he saw "no reason why on the street today a citizen should be carrying loaded weapons" and that guns were a "ridiculous way to solve problems that have to be solved among people of good will." In a later press conference, Reagan added that the Mulford Act "would work no hardship on the honest citizen."
-
The Mulford Act was a 1967 California bill that prohibited public carrying of loaded firearms without a permit.[2] Named after Republican assemblyman Don Mulford, and signed into law by governor of California Ronald Reagan, the bill was crafted with the goal of disarming members of the Black Panther Party who were conducting armed patrols of Oakland neighborhoods, in what would later be termed copwatching.[3][4] They garnered national attention after Black Panthers members, bearing arms, marched upon the California State Capitol to protest the bill.
WTF!
-
- May 2022
-
www.cnsnews.com www.cnsnews.com
-
Blog Tucker Carlson: Biden Giving WHO Power to 'Deploy Proactive Countermeasures Against Misinformation and Social Media Attacks' By Craig Bannister | May 20, 2022 | 10:39am EDT Tucker Carlson (Screenshot) Pres. Biden has found a new way to censor free speech – by giving the World Health Organization (WHO) control of Americans’ speech – Fox News Host Tucker Carlson warned on Thursday. After dissolving his “Disinformation Governance Board, due to public outcry, Biden is preparing to sign WHO’s new World Pandemic Treaty, giving a global operational control and power – through ‘proactive countermeasures’ - to combat what it deems “disinformation,“ Carlson explained, citing a WHO working group's draft text:#stickypbModal625{ position : relative; z-index : 30; margin:0px px; padding: 9px; background: rgba(0,0,0,0.0);} @media only screen and (max-width: 1024px) {#stickypbModal625 { flex-wrap: wrap;}} googletag.cmd.push(function() { googletag.display("div-hre-CNS-News-625"); }); “So, what would this ‘operational control’ mean? “Let’s be specific. Right off the bat, the treaty demands ‘National and global coordinated actions to address the misinformation, disinformation, and stigmatization that undermines public health.’ “Oh! Here we go! Right to censorship: ‘People are criticizing us, and for public health reasons, that can't be allowed. If you criticize us, people will die.’ “So, you saw yesterday that the Biden administration, in the face of universal laughter and derision, had to fire the head of its new Ministry of Truth - but they found another way to do it: ‘W.H.O. Secretariat to build capacity to deploy proactive countermeasures against misinformation and social media attacks.’” “So, they are going to get to censor anybody who doesn't agree with what they do, as they control the intimate details of your life,” Carlson explained: “And they will control those details. Under this treaty, the World Health Organization will get to establish vaccine passports and regulate travel. World Health organization will ‘Develop standards for producing a digital version of the international certificate of vaccination and prophylactics.’ “Okay. “So you may think, ‘Well, it is just about COVID and I went along with mandatory vaccines and vaccine passports at the time, how bad could it be?’ [Laughs] First of all, if you went along with that, you should be repenting right about now. But, it is not just about COVID because the W.H.O. Will be in charge of ‘The digitalization of all health forms.’ The World Health Organization will also ‘Share real-time information about travel measures.’ “So you are going to find out exactly when you are allowed to get on a bus or train or airplane, or how about your bicycle, will they regulate that too? Maybe. Now the World Health Organization has sought this authority for years. Of course. Who doesn't want more power?” Carlson then played a foreboding comment by W.H.O. Director-General Tedros Adhanom Ghebreyesu. “Here’s Tedros back in April of 2020: “People in countries with stay-at-home orders are understandably frustrated with being confined to their homes for weeks on end. But the world will not and cannot go back to the way things were. There must be a new normal. A world that is healthier, safer, and better prepared.” Americans should question relinquishing control over their lives to an unelected person and global authority they had no say in choosing, Carlson said:#stickypbModal711{ position : relative; z-index : 30; margin:0px px; padding: 9px; background: rgba(0,0,0,0.0);} @media only screen and (max-width: 1024px) {#stickypbModal711 { flex-wrap: wrap;}} googletag.cmd.push(function() { googletag.display("div-hre-CNS-News-711"); }); “Okay, so there’s a guy with a long and documented history of subverting public health, who is clearly a liar, who is acting as an agent for the Chinese government, and you have to ask yourself, ‘Did I vote for that guy? Is he one of my elected representatives in this democracy? How did he get power over where I can travel and when?’ “Good question.”
Summary of Tucker's televised evening talk show.
-
-
www.linkedin.com www.linkedin.com
-
as if the only option we had to eat was factory-farmed fast food, and we didn’t have any way to make home-cooked meals
See also An app can be a home-cooked meal along with this comment containing RMS's remarks with his code-as-recipe metaphor in the HN thread about Sloan's post:
some of you may not ever write computer programs, but perhaps you cook. And if you cook, unless you're really great, you probably use recipes. And, if you use recipes, you've probably had the experience of getting a copy of a recipe from a friend who's sharing it. And you've probably also had the experience — unless you're a total neophyte — of changing a recipe. You know, it says certain things, but you don't have to do exactly that. You can leave out some ingredients. Add some mushrooms, 'cause you like mushrooms. Put in less salt because your doctor said you should cut down on salt — whatever. You can even make bigger changes according to your skill. And if you've made changes in a recipe, and you cook it for your friends, and they like it, one of your friends might say, “Hey, could I have the recipe?” And then, what do you do? You could write down your modified version of the recipe and make a copy for your friend. These are the natural things to do with functionally useful recipes of any kind.
Now a recipe is a lot like a computer program. A computer program's a lot like a recipe: a series of steps to be carried out to get some result that you want. So it's just as natural to do those same things with computer programs — hand a copy to your friend. Make changes in it because the job it was written to do isn't exactly what you want. It did a great job for somebody else, but your job is a different job. And after you've changed it, that's likely to be useful for other people. Maybe they have a job to do that's like the job you do. So they ask, “Hey, can I have a copy?” Of course, if you're a nice person, you're going to give a copy. That's the way to be a decent person.
-
-
www.mindprod.com www.mindprod.comSCID1
-
Show me a switch statement as if it had been handled with a set of subclasses. There is underlying deep structure here. I should be able to view the code as if it had been done with switch or as if it had been done with polymorphism. Sometimes you are interested in all the facts about Dalmatians. Sometimes you are interested in comparing all the different ways different breeds of dogs bury their bones. Why should you have to pre-decide on a representation that lets you see only one point of view?
similar to my strawman for language skins
Tags
Annotators
URL
-
-
www.dreamsongs.com www.dreamsongs.comOUP Book1
-
the very existence of a master plan means, by definition, that the members of the community can have little impact on the future shape of their community,
-
- Apr 2022
-
winnielim.org winnielim.org
-
Since most of our feeds rely on either machine algorithms or human curation, there is very little control over what we actually want to see.
While algorithmic feeds and "artificial intelligences" might control large swaths of what we see in our passive acquisition modes, we can and certainly should spend more of our time in active search modes which don't employ these tools or methods.
How might we better blend our passive and active modes of search and discovery while still having and maintaining the value of serendipity in our workflows?
Consider the loss of library stacks in our research workflows? We've lost some of the serendipity of seeing the book titles on the shelf that are adjacent to the one we're looking for. What about the books just above and below it? How do we replicate that sort of serendipity into our digital world?
How do we help prevent the shiny object syndrome? How can stay on task rather than move onto the next pretty thing or topic presented to us by an algorithmic feed so that we can accomplish the task we set out to do? Certainly bookmarking a thing or a topic for later follow up can be useful so we don't go too far afield, but what other methods might we use? How can we optimize our random walks through life and a sea of information to tie disparate parts of everything together? Do we need to only rely on doing it as a broader species? Can smaller subgroups accomplish this if carefully planned or is exploring the problem space only possible at mass scale? And even then we may be under shooting the goal by an order of magnitude (or ten)?
-
-
video.ibm.com video.ibm.com
-
Advisory Committee on Immunization Practices- ACIP. (n.d.). Retrieved April 27, 2022, from https://video.ibm.com/channel/VWBXKBR8af4
-
-
standardebooks.org standardebooks.org
-
Why is Standard Ebooks sending
content-security-policy: default-src 'self';
? This is not an appropriate use. (And it keeps things like the Hypothesis sidebar from loading.)
-
-
journals.plos.org journals.plos.org
-
ROI in the left hemisphere. Handedness was measured
-
ROI around the S1/M1
-
ROI in the visual cortex.
-
hemispheric specialization and creative thinking, thePCC/preCUN coordinates were located in both hemispheres
-
keep their eyes closed during the scan
-
Excluded from participation were professional visualartists and art historians, as well as people suffering from seriousphysical or mental disorders or taking psychotropic drugs
Tags
Annotators
URL
-
-
www.colbyrussell.com www.colbyrussell.com
-
except its codebase is completely incomprehensible to anyone except the original maintainer. Or maybe no one can seem to get it to build, not for lack of trying but just due to sheer esotericism. It meets the definition of free software, but how useful is it to the user if it doesn't already do what they want it to, and they have no way to make it do so?
Kartik made a similar remark in an older version of his mission page:
Open source would more fully deliver on its promise; are the sources truly open if they take too long to grok, so nobody makes the effort?
https://web.archive.org/web/20140903010656/http://akkartik.name/about
-
-
www.donnelly-house.net www.donnelly-house.net
-
work-around
Bookmarklets and the JS console seem to be the workaround.
For very large customizations, you may run into browser limits on the effective length of the bookmarklet URI. For a subset of well-formed programs, there is a way to store program parts in multiple bookmarklets, possibly loaded with the assistance of a separate bookmarklet "bootloader", although this would be tedious. The alternative is to use the JS console.
In FIrefox, you can open a given script that you've stored on your computer by pressing Ctrl+O/Cmd+O, selecting the file as you would in any other program, and then pressing Enter. (Note that this means you might need to press Enter twice, since opening the file in question merely puts its contents into the console input and does not automatically execute it—sort of a hybrid clipboard thing.) I have not tested the limits of the console input for e.g. input size.
As far as I know, you can also use the JS console to get around the design of the dubious WebExtensions APIs—by ignoring them completely and going back to the old days and using XPCOM/Gecko "private" APIs. The way you do is is to open about:addons by pressing Ctrl+Shift+A (or whatever), opening or pasting the code you want to run, and then pressing Enter. This should I think give you access to all the old familiar Mozilla internals. Note, though, that all bookmarklet functionality is disabled on about:addons (not just affecting bookmarklets that would otherwise violate CSP by loading e.g. an external script or dumping an inline one on the page`).
-
CSP is taking away too much of the user's power and control over their browser use
-
-
Local file Local file
-
I end up with responsibility (friends complaining to me about this, that, and the other) without control (I can't affect any of those things)
-
- Mar 2022
-
hackeducation.com hackeducation.com
-
"Who controls the past controls the future. Who controls the present controls the past," as Rage Against the Machine sang in their 1999 song "Testify." OK, actually it's a quote from George Orwell's 1984, but hey.
-
-
www.medrxiv.org www.medrxiv.org
-
Blachere, F. M., Lemons, A. R., Coyle, J. P., Derk, R. C., Lindsley, W. G., Beezhold, D. H., Woodfork, K., Duling, M. G., Boutin, B., Boots, T., Harris, J. R., Nurkiewicz, T., & Noti, J. D. (2021). Face mask fit modifications that improve source control performance (p. 2021.09.16.21263642). medRxiv. https://doi.org/10.1101/2021.09.16.21263642
-
-
blog.petrieflom.law.harvard.edu blog.petrieflom.law.harvard.edu
-
Reichel, C. (2022, March 1). Please Keep Your Masks On. Bill of Health. http://blog.petrieflom.law.harvard.edu/2022/02/28/please-keep-your-masks-on/
-
- Feb 2022
-
www.youtube.com www.youtube.com
-
indie_SAGE. (2022, February 11). Indie_SAGE 11.02.2022. https://www.youtube.com/watch?v=0GC9QsKfrNc
-
-
www.ncbi.nlm.nih.gov www.ncbi.nlm.nih.gov
-
Smith, G. C. S., & Pell, J. P. (2003). Parachute use to prevent death and major trauma related to gravitational challenge: Systematic review of randomised controlled trials. BMJ : British Medical Journal, 327(7429), 1459–1461.
-
-
gh.bmj.com gh.bmj.com
-
Meyerowitz-Katz, G., Bhatt, S., Ratmann, O., Brauner, J. M., Flaxman, S., Mishra, S., Sharma, M., Mindermann, S., Bradley, V., Vollmer, M., Merone, L., & Yamey, G. (2021). Is the cure really worse than the disease? The health impacts of lockdowns during COVID-19. BMJ Global Health, 6(8), e006653. https://doi.org/10.1136/bmjgh-2021-006653
-
-
Local file Local file
-
The unified approachhas the advantage, that the enterprise has more control overthe data and quality, and the data querying is significantlyfaster.
-
-
bugs.ruby-lang.org bugs.ruby-lang.org
-
"Context" manipulation is one of big topic and there are many related terminologies (academic, language/implementation specific, promotion terminologies). In fact, there is confusing. In few minutes I remember the following related words and it is good CS exam to describe each :p Thread (Ruby) Green thread (CS terminology) Native thread (CS terminology) Non-preemptive thread (CS terminology) Preemptive thread (CS terminology) Fiber (Ruby/using resume/yield) Fiber (Ruby/using transfer) Fiber (Win32API) Generator (Python/JavaScript) Generator (Ruby) Continuation (CS terminology/Ruby, Scheme, ...) Partial continuation (CS terminology/ functional lang.) Exception handling (many languages) Coroutine (CS terminology/ALGOL) Semi-coroutine (CS terminology) Process (Unix/Ruby) Process (Erlang/Elixir) setjmp/longjmp (C) makecontext/swapcontext (POSIX) Task (...)
-
-
psyarxiv.com psyarxiv.com
-
Bjørkheim, Sebastian, and Bjørn Sætrevik. ‘Risk of Infection and Appeal to Public Benefit Increase Compliance with Infection Control Measures’. PsyArXiv, 12 January 2022. https://doi.org/10.31234/osf.io/myv4t.
-
-
psyarxiv.com psyarxiv.com
-
Pauer, S., Rutjens, B., & Harreveld, F. van. (2022). Trust is good, control is better: The role of trust and personal control in response to risk. PsyArXiv. https://doi.org/10.31234/osf.io/dvb5x
-
-
twitter.com twitter.com
-
Deepti Gurdasani. (2022, January 29). Going to say this again because it’s important. Case-control studies to determine prevalence of long COVID are completely flawed science, but are often presented as being scientifically robust. This is not how we can define clinical syndromes or their prevalence! A thread. [Tweet]. @dgurdasani1. https://twitter.com/dgurdasani1/status/1487366920508694529
-
-
www.kas.de www.kas.deuntitled1
-
The main function of the bride price is to prevent divorce
Tags
Annotators
URL
-
- Jan 2022
-
www.biorxiv.org www.biorxiv.org
-
Hirose, R., Itoh, Y., Ikegaya, H., Miyazaki, H., Watanabe, N., Yoshida, T., Bandou, R., Daidoji, T., & Nakaya, T. (2022). Differences in environmental stability among SARS-CoV-2 variants of concern: Omicron has higher stability [Preprint]. Microbiology. https://doi.org/10.1101/2022.01.18.476607
-