51 Matching Annotations
  1. Jun 2022
    1. Instead of hiking the trail yourself, the trees, rocks and moss move past you in flashes with no trace of what came before and no way to see what lies ahead.

      Just as there are deficits like dyslexia in the literate world, are there those who have similar deficits relating to location in the oral world? What do these look like? What are they called specifically?

      There are definitely memory deficits withing cognitive neuropsychology. Is there a comprehensive list one could look at?

      Some people aren't as good at spatial orientation as others. Women are stereotyped as being less good at direction and direction finding.

    1. the things that cluster up top they were things like um 00:12:21 relationships uh character related things um and then like education but not from i want to go to the most elite school possible just i want to they want to get they want to get training to do things that matter to 00:12:33 them right they wanted purposeful lives and they want to be good people and let me give you one specific example so in the aggregate the number three most important trade-off priority for people this was this was just in the united 00:12:46 states was to be viewed as trustworthy [Music] like and yet they don't think anybody else really cares about it it's the third most important thing to 00:12:59 them and yet they don't think that it's like they think people would prioritize it very very low now think about the problem right i want to be trusted i believe i'm trustworthy but i don't think anybody else really cares and i don't really 00:13:12 think they're trustworthy how does how does a democracy function if we really don't think not only are people untrustworthy but that they don't even care about it and it's just not true so this is the kind of damage that illusions do to 00:13:24 societies

      Collective illusions do great damage to society. Think about political polarization, climate change, the pandemic to name a few crisis marred by polarization.

  2. Apr 2022
  3. Mar 2022
  4. Feb 2022
  5. Jan 2022
  6. Dec 2021
  7. Oct 2021
    1. Wenzel, J., Lampe, J., Müller-Fielitz, H., Schuster, R., Zille, M., Müller, K., Krohn, M., Körbelin, J., Zhang, L., Özorhan, Ü., Neve, V., Wagner, J. U. G., Bojkova, D., Shumliakivska, M., Jiang, Y., Fähnrich, A., Ott, F., Sencio, V., Robil, C., … Schwaninger, M. (2021). The SARS-CoV-2 main protease Mpro causes microvascular brain pathology by cleaving NEMO in brain endothelial cells. Nature Neuroscience, 1–12. https://doi.org/10.1038/s41593-021-00926-1

  8. Sep 2021
  9. Aug 2021
  10. Jul 2021
  11. May 2021
  12. Mar 2021
  13. Feb 2021
  14. Oct 2020
  15. Sep 2020
  16. Aug 2020
    1. Consiglio, C. R., Cotugno, N., Sardh, F., Pou, C., Amodio, D., Zicari, S., Ruggiero, A., Pascucci, G. R., Rodriguez, L., Santilli, V., Tan, Z., Eriksson, D., Wang, J., Lakshmikanth, T., Marchesi, A., Lakshmikanth, T., Campana, A., Villani, A., Rossi, P., … Brodin, P. (2020). The Immunology of Multisystem Inflammatory Syndrome in Children with COVID-19. MedRxiv, 2020.07.08.20148353. https://doi.org/10.1101/2020.07.08.20148353

    1. Salahudeen, A. A., Choi, S. S., Rustagi, A., Zhu, J., O, S. M. de la, Flynn, R. A., Margalef-Català, M., Santos, A. J. M., Ju, J., Batish, A., Unen, V. van, Usui, T., Zheng, G. X. Y., Edwards, C. E., Wagar, L. E., Luca, V., Anchang, B., Nagendran, M., Nguyen, K., … Kuo, C. J. (2020). Progenitor identification and SARS-CoV-2 infection in long-term human distal lung organoid cultures. BioRxiv, 2020.07.27.212076. https://doi.org/10.1101/2020.07.27.212076

  17. Jul 2020
  18. Jun 2020
    1. If easy-to-use software like Signal somehow became inaccessible, the security of millions of Americans (including elected officials and members of the armed forces) would be negatively affected.
  19. May 2020
  20. Apr 2020
    1. The key change here is the removal of an intent to defraud and replacing it with willfully; it will be illegal to share this information as long as you have any reason to know someone else might use it for unauthorized computer access.It is troublesome to consider the unintended consequences resulting from this small change.
    2. The problem is that it is that the laws themselves change the very definition of a criminal and put many innocent professionals at risk.
    3. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    1. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    1. The term has also been borrowed by the computing community to refer to the refusal of service to legitimate users when administrators take blanket preventative measures against some individuals who are abusing systems. For example, Realtime Blackhole Lists used to combat email spam generally block ranges of Internet Protocol (IP) addresses rather than individual IPs associated with spam, which can deny legitimate users within those ranges the ability to send email to some domains.
  21. Sep 2017
    1. even a 1-kiloton blast would be a catastrophic event, having a deadly radius between one-third and one-half that of a 10-kiloton blast
  22. Jul 2017