152 Matching Annotations
  1. Last 7 days
  2. Jul 2021
    1. ReconfigBehSci on Twitter: ‘@ToddHorowitz3 I think that attribution is hard to make. I have no doubt they’re systematically promoted by bad faith actors, but I think it’s much harder to feel confident about all those who repeat them. But the rather extensive public discussion of efficacy does make this case seem unlikely’ / Twitter. (n.d.). Retrieved 15 July 2021, from https://twitter.com/SciBeh/status/1415364895046963205

    1. As I studied Edwards’ writings and insights, I realized that I might be sitting at the feet of not only Edwards’ intellectual genius but his organizational genius, too. 

      For what I expect to be a coming description of Jonathan Edwards' commonplace book, I'm surprised that the page doesn't use the word or even florilegium.

      Everhard here makes in one breath a common error I'm coming to notice. While it might be true that Edwards had some organizational genius, I think it's disingenuous to attribute his output to his intellectual genius. More and more I'm seeing that throughout history those who were thought of as intellectual geniuses really relied on the organization structures of their commonplace books (or similar devices). By writing, thinking, and producing in a commonplace tradition they were able to do far more, think more clearly, and accomplish more.

      This can be linked with the idea also espoused in Robert Greene's Mastery which seems to have some of the similar flavor.

  3. Jun 2021
    1. Controller specs should not be used to write N+1 tests as the controller is only initialized once per example. This could lead to false successes where subsequent “requests” could have queries reduced (e.g. because of memoization).
  4. May 2021
    1. The Last Crusidual. (2021, February 2). @SciBeh @MichaelPaulEdw1 @ToddHorowitz3 @richarddmorey you can’t have any form of evidence. If you concider any form of evidence, than what is talked about than isn’t anymore what the falacy sais. [Tweet]. @islaut1. https://twitter.com/islaut1/status/1356529266519924736

    1. ReconfigBehSci. (2021, February 1). Great list, but I think one of the main problems with “absence of evidence fallacy” is its phrasing: “absence of evid. Is not the same as evidence of absence” is a true statement, “absence of evidence is not evidence of absence” is literally false @richarddmorey [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1356172673651503104

  5. Apr 2021
    1. Thus, the creative freedom of creators is limited.

      And thus draconian methods for making the distribution unnecessarily complicated, siloed, surveillance capitalized, and over-monitized beyond all comprehension are beyond the reach of one or two for profit companies who want to own the entire market like monopolistic giants are similarly limited. (But let's just stick with the creators we're pretending to champion, shall we?)

    1. An example of this would be a button that looks clickable but isn’t, underlined text that doesn’t contain a link, or a TV remote that turns on your lights but not the TV. False affordances are often present by mistake or occur due to lack of effective design techniques.
    2. False affordances occur when a feature of an item suggests a use that the item can’t actually perform.
    1. this game is - well not exactly bad, but it also isn't a very good game of the genre - there are some riddles and puzzles that can give you quite the headache. I like hard puzzles, I like games where all isn't quite obvious - but I also like a barrier-free gaming experience.
    1. these events can break the flow of the game and force the player to repeat sections until they master the event, adding false difficulty to the game.
  6. Mar 2021
    1. Parking Attendant is a glorified app game that somehow landed into the Steam Store

      you mean mobile app game?

    1. semantic domain or semantic field

      What, then, is the difference between a semantic domain and a semantic field? The way they are used here, it's almost as if they are listing them in order to emphasis that they are synonyms ... but I'm not sure.

      From the later examples of basketball (https://hyp.is/ynKbXI1BEeuEheME3sLYrQ/en.wikipedia.org/wiki/Semantic_domain) and coffee shop, however, I am pretty certain that semantic domain is quite different from (broader than) semantic field.

    1. ReconfigBehSci. (2020, November 3). As debate on ‘saving the economy versus saving lives’ marches on, it’s worth noting that this type of contrast actually has a name in fallacy research: Https://t.co/N8U4ABWTuh it’s also worth noting that there is now a substantial number of research articles on the topic. 1/n [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1323603017179013130

    1. Tried to buy keyg at its 90% off sales price but no matter what payment method I choose I keep getting a "Due to processing fees the minimum amount is 100 cents."I'm trying to figure out if there is any way around this, and if not then why can you list a game at a price below $1 if it isn't actually possible for it to be bought at said price?
  7. Feb 2021
    1. Some people believed I argued that object orientation is bad simply because extends has problems, as if the two concepts are equivalent. That's certainly not what I thought I said, so let me clarify some meta-issues.

      first sighting: meta-issue 

  8. Jan 2021
    1. Copy these 5 resources to a directory named 'magpierss' in the same directory as your PHP script.

      This whole page assumes/presumes that your site is using PHP. That hardly seems like a safe assumption to me. This page should at least qualify, "If your site uses PHP, then you can do..."

    1. When enough people make false promises, words stop meaning anything, then there are no answers just better and better lies.
    2. Negative people run their life engine on the fuel supply of fake praises & false promises and thrive. A positive person can drive them off & out by just cutting down this supply chain pipeline.
  9. Dec 2020
  10. Nov 2020
    1. I'm still calling this v1.00 as this is what will be included in the first print run.

      There seems to be an artificial pressure and a false assumption that the version that gets printed and included in the box be the "magic number" 1.00.

      But I think there is absolutely nothing bad or to be ashamed of to have the version number printed in the rule book be 1.47 or even 2.0. (Or, of course, you could just not print it at all.) It's just being transparent/honest about how many versions/revisions you've made. 

  11. Oct 2020
    1. Their trailer said "A video game for the home computer". Not sure why they said that instead of PC, but it was a refreshing new term for it.

    1. The false promise of your source code repository is that everything it contains is “good.” To complete your task, just find something that does something similar, copy, modify, and you’re done. Looking inside the same repository seems like a safety mechanism for quality but, in fact, there is no such guarantee.
    1. This is a very dangerous practice as each optimization means making assumptions. If you are compressing an image you make an assumption that some payload can be cut out without seriously affecting the quality, if you are adding a cache to your backend you assume that the API will return same results. A correct assumption allows you to spare resources. A false assumption introduces a bug in your app. That’s why optimizations should be done consciously.
    1. balloons

      I remember the false positive Leo Laporte reported in his home security system when it thought a balloon floating by was an intruder in his home.

    1. Half-freedom," as this sys- tem came to be called,

      I cannot stress how much this pisses me off. They gave black people "half freedom." That's how vicious and cruel slave owners were. They couldn't even fathom giving them full freedom.

  12. Sep 2020
  13. Aug 2020
  14. Jul 2020
  15. Jun 2020
  16. May 2020
    1. Allowing port 80 doesn’t introduce a larger attack surface on your server, because requests on port 80 are generally served by the same software that runs on port 443.
    1. These options have almost deceptively similar wordings, with only subtle difference that is too hard to spot at a glance (takes detailed comparison, which is fatiguing for a user):

      1. can use your browser’s information for providing advertising services for this website and for their own purposes.
      2. cannot use your browser’s information for purposes other than providing advertising services for this website.

      If you rewrite them to use consistent, easy-to-compare wording, then you can see the difference a little easier:

      1. can use your browser’s information for providing advertising services for this website and for their own purposes.
      2. can use your browser’s information for providing advertising services for this website <del>and for their own purposes</del>.

      Standard Advertising Settings

      This means our ad partners can use your browser’s information for providing advertising services for this website and for their own purposes.

      Do Not Share My Information other than for ads on this website

      This means that our ad partners cannot use your browser’s information for purposes other than providing advertising services for this website.

    1. as well as those of the country your site targets

      This is assuming your site only targets one country!?

      What if you want to target the whole world? Isn't that what most sites would like to target?

  17. Apr 2020
    1. While risking false positives, Bloom filters have a substantial space advantage over other data structures for representing sets
    2. More generally, fewer than 10 bits per element are required for a 1% false positive probability, independent of the size or number of elements in the set.
    1. If you force people to frequently change their passwords, they will use bad passwords.
    2. Stop forcing users to change their passwords every 30, 60, or 90 days, and stop forcing users to include a mixture of uppercase, lowercase, and special charactersForcing users to change their passwords should only happen if there is reason to believe an organization has been breached, or if a new third-party data breach affects employees or users.