401 Matching Annotations
  1. Feb 2024
  2. Jan 2024
    1. ZenHub’s Issue dependencies not only help teams visualize relationships between pieces of work, but they save team members a lot of time that would otherwise be lost just hunting down information.
    2. When relying on just a list of GitHub issues and comment references to other Issues, there’s a strong possibility that visibility into how these changes impact other tasks get lost or forgotten.
    3. Tracking dependent relationships between Issues and whether something is blocking another piece of work is important with any project process because it creates a central hub where everyone can communicate what’s needed without relying solely on meetings or comments to uncover important connections.
    1. It's also common to want to compute the transitive closure of these relations, for instance, in listing all the issues that are, transitively, duped to the current one to hunt for information about how to reproduce them.
    2. Marking an issue as as a subtask of another. Having task lists in a description is a great start, but it doesn't help (AFAIK) navigating from child back up the chain to parent. Creating umbrella issues is a very common way to track the top-level focus areas for a release.
    3. The "meaning" will tell Gitlab how to interpret the relation. For example, a "parent/child" relation will have the meaning set to "one is a part of another", and then user may define a "subtask" and "subcomponent" relations to distinguish two situations, but Gitlab will understand because all three will have the same meaning and it can render a tree with three different kinds of edges.
    4. Another example are issue boards. They represent elegant use of a good infrastructure ­— it is all just a smart use of labels. It would be very complex feature without the use of labels.
    5. Issue relations are meant to be the basic infrastructure to build on (at least that is how I meant it when I posted the original feature request). Just like the labels are just a binary relation between a issue and a "label", the relations should be just a ternary relation between two issues and a "label". Then you can build issue task lists on top of the relations like you've built issue boards on top of the labels.
    6. This would be transformational in the scope of what issues can be effectively used for!
    7. subtasks would give insight into how long it will take!
    8. Blockers would give better insight into when an issue can be started,
    9. Our flow is: The reporter reports an issue, and we developers create sub tasks upon that issue... in Redmine, we also had a percentage graph that would reach 100% when all sub-tasks were completed, was a great way about checking 1 item without the need to drill down all subtasks.
    10. We use GitLab to manage software on interconnected embedded systems. What often comes up is this: New functionality on one system changes the protocol in a slightly incompatible way. Software on other systems have to be updated to understand the new protocol, take advantage of the new functionality, and stop complaining about the unexpected data. For this I would create multiple issues: Issues for the new functionality that we need. (Project A) Issue for defining the protocol changes. (Project A) Issue for implementing the protocol changes on the module. (Project A) Issues in related software projects for implementing the changes required to understand the new protocol. (Project B, C, D...)
    11. bugzilla has had the concept of one or more ticket(s) blocking another for quite some time. We used that for over ten years before switching to GitLab and it is a feature I miss. A dependency tree between issues enables planning and workflow. This is can be seen as related to issues boards in that blocked issues should not be able to move ahead until the blockers are at least implemented perhaps reviewed.
    12. It would be useful filter to have, also it would be useful to sort issues using topological order on Board and other issue listings, so the unblocked issues would be first.
    13. Simple relations: [Issue A]---(relation R)--->[Issue B], which is a ternary (A, B, R) relation in a database.
    14. I see specific relations in a similar way as labels. If a "label" is a binary relation between a label and an issue, "relation" between issues would be ternary relation between two issues and a label (from different set than ordinary labels).
    15. One of the reasons that some projects don't use Gitlab's issues and use an external tracking platform is the lack of issues relations. Without relations issues are just flat, no way to actually track progress of big features. No way to create a "meta" issue that depends on 4 other or create subtasks and so on. The same problem exists on Github too. It would surely make a difference if Gitlab offers a full features tracking issue, instead of just flat issues. Relations is a major first step towards that.
  3. Dec 2023
    1. I disagree. What is expressed is an attempt to solve X by making something that should maybe be agnostic of time asynchronous. The problem is related to design: time taints code. You have a choice: either you make the surface area of async code grow and grow or you treat it as impure code and you lift pure synchronous logic in an async context. Without more information on the surrounding algorithm, we don't know if the design decision to make SymbolTable async was the best decision and we can't propose an alternative. This question was handled superficially and carelessly by the community.

      superficially and carelessly?

  4. Nov 2023
    1. Otherwise, M does not respond to works? (NoMethodError) because there was a context switch before the require triggered by autoload returned.
    2. If it passed before I would think it was just lucky timings.
    3. BTW to improve the reliability of that test I believe you would need a sleep (smaller, e.g. of 0.1) between the Thread.new and assert M.works?, otherwise it's likely the M.works? runs first and then the other thread will see the constant is autoloading and wait, and anyway that thread does not check what is defined on M. For the test to fail it needs to be the Thread.new running first and defining the constant but not yet the method, before the main thread keeps running and call the method.
    1. health impacts of violent conflict, bioterrorism, pandemics, and endemic diseases disproportionately affecting certain regions are all linked to health and security
    2. World Health Organization (WHO) and policymakers recognize the importance of health for international peace, stability, and human security.
    3. "responsibility to protect" (R2P).R2P suggests that states have a responsibility to intervene and protect civilians in other states if they are unable or unwilling to do so themselves.Some feminist scholars argue that the language of protection can reinforce gendered and racialized narratives.
    4. International Criminal Court
    5. providers of human security, and that NGOs and international organizations
    6. he United Nations Development Programme and the Commission on Human Security have played important roles in promoting and defining the concept of human security.
  5. Oct 2023
    1. Description: The European Language Social Science Thesaurus (ELSST) is a broad-based, multilingual thesaurus for the social sciences. It is owned and published by the Consortium of European Social Science Data Archives (CESSDA) and its national Service Providers. The thesaurus consists of over 3,000 concepts and covers the core social science disciplines: politics, sociology, economics, education, law, crime, demography, health, employment, information and communication technology and, increasingly, environmental science.

    1. DOIs have a business model. LSIDs currently do not. Without a business model (read funding) we should stick to something that doesn’t have the implementation/adoption impediment of LSIDs and make the best of it (i.e. just have a usage policy for HTTP URIs).
    2. Without some kind of persistence mechanism the only advantage of LSIDs is that they look like they are supposed to be persistent. Unfortunately, because many people are using UUIDs as their object identifiers LSIDs actually look like something you wouldn’t want to look at let alone expose to a user! CoL actually hide them because they look like this: urn:lsid:catalogueoflife.org:taxon:d755ba3e-29c1-102b-9a4a-00304854f820:ac2009
    1. Breaking of links is mostly due to administrative changes at the referencedInternet node

      Benefits

    2. Over time the risk grows that the document is no longer accessible at the loca-tion given as reference. Web servers that follow the HTTP protocol then givethe notorious reply: ‘404 not found’. This resembles the situation of a book in a– very large – library that is not on the shelf at the position indicated in the cata-logue. How is it to be found?

      PID Issues

    1. check character (CC): A check character is incorporated in the assigned identifier to guard against common transcription errors.

      Mitigation

    2. On the other hand, the universal numeric fingerprint (Altman & King 2007) is a PID that supports citation of numeric data in a way that is largely immune to the syntactic formatting and packaging of the data

      Versioning

    3. By contrast, repositories such as figshare (figshare 2016) and Merritt (Abrams et al. 2011) tolerate changes to metadata under the PID assigned originally, but create a new “versioned” PID if the object title or a component file changes, and in the latter case, the original non-versioned PID always references the latest version

      Versioning

    4. The DataONE federated data network (Michener et al. 2011) assigns a PID to immutable data objects and a “series identifier” that resolves to the latest version of an object (DataONE 2015).

      Versioning

    5. At a minimum it implies a prediction about an archive’s commitment and capacity to provide some specific kind of long-term functionality

      Persistence

    6. persistence is purely a matter of service

      Persistence

    1. Content drift describes the case where the resource identified by its URI changes over time and hence, as time goes by, the request returns content that becomes less and less representative of what was originally referenced.

      Content Drift

  6. Sep 2023
    1. The Topic Concentration chart above lends the clearest picture into the implied rationale behind the bans. Namely, the bans are not and have not been about the physical removal of a book from a shelf. The bans instead are meant to: Virtue signal by people in positions of institutional power to voting-age parents interested in school choice, parental rights, and wedge social issues to the detriment of non-voting age students Reject and exclude topics that challenge a perceived status quo from the public discourse (e.g. non-heteronormativity, non-cis identity, non-traditional gender roles, and non-Judeo-Christian books are targeted)
    1. I do not disagree, but I would also like to point out that it can confuse newbies, e. g. when they wonder whether they should use class_eval or instance_eval. Some concepts are not trivial to remember offhand.
  7. Aug 2023
    1. Another surprise was the amount of notecards that are associated with one another. While some cards contain a short one-line joke, other jokes span several cards. These collections of cards had originally been paper-clipped together, but at some point in the life of the gag file the paper clips were removed. This removal was great in terms of preservation because paper clips tend to rust and cause damage to the surface to which they have been attached. But the removal also made it difficult to decipher which cards were originally associated with one another. I was able to use the bend marks on cards as well as rust marks from where a paper clip used to be to record which joke cards were most likely originally paper-clipped together. This association is important to note because some individual cards only hold a portion of a longer joke and therefore do not make sense independently.

      While most of the jokes in Phyllis Diller's gag file were individual, stand-alone cards, the archivist who scanned them noted that there was a surprising number of cards that were associated with one another. (jokerfolgezettel, anyone?) She was able to distinguish jokes which spanned several cards by either their paperclips (when extant), or physical markings (rust/paper bending) which indicated prior paperclipping or other association which had long since been removed.

    2. This joke card has a comic clipped from a newspaper glued to it. During the digitization process, the index card was put in a clear Mylar sleeve to prevent the comic, with its brittle glue, from being damaged or separated from the card.

      The potential separation of newspaper clippings from index cards and their attendant annotations/meta data (due to aging of glue) can be a potential source of note loss when creating a physical card index.

    3. While most of the joke cards are simply index cards with a joke typed on, others are more complicated. Some cards have strips of paper glued to them with longer jokes on those papers. Some cards have entire letter-size sheets of paper containing long jokes stapled to the cards. Some cards have comic strips, cut from the newspaper, glued to the cards. Other cards are not even cards but are just pieces of printer paper with jokes scribbled on them. These irregular cards were not stable enough to be sent through the feed scanner and had to be scanned one-by-one using a flatbed scanner, which slowed my progress.

      Not only a short description of the broad standard form of cards in Phyllis Diller's gag file, but also an enumeration of some of the non-standard cards, many of which are specified because of the issues which they presented in scanning/digitizing for transcription.

    1. “scrape” headshots from theonline directories of nine residential houses so students could vote onwhich of two random photos was “hotter.”
    2. Google’s algorithms
  8. Jul 2023
    1. That, if nothing else, is a reason to worry.
    2. Faith in Google is thus dangerous as the airplane and the automo-bile have proved dangerous in ways their pioneers did not anticipate inthe 1920s. These technologies of mobility and discovery are dangerousnot just because they physically endanger their users but because weuse them recklessly, use them too much, and design daily life aroundthem.
    1. n deciding which ads to display, Google’s algorithms fac-tored in how often advertisements were clicked on as well as the amount bid by theadvertiser

      the Issue with advertising

    2. chat rooms

      when chat rooms were born

  9. Jun 2023
    1. Refinements themselves present a significant hurdle to adoption by virtue of their limitations and overall introduction of conceptual complexity. So it’s a tough sell to recommend this for anything outside of personal projects or places with incredibly strong esoteric Ruby knowledge (like, say, hidden away within Rails).
  10. Mar 2023
    1. Or, did you ever see a dog with a marrowbone in his mouth,—the beast of all other, says Plato, lib. 2, de Republica, the most philosophical? If you have seen him, you might have remarked with what devotion and circumspectness he wards and watcheth it: with what care he keeps it: how fervently he holds it: how prudently he gobbets it: with what affection he breaks it: and with what diligence he sucks it. To what end all this? What moveth him to take all these pains? What are the hopes of his labour? What doth he expect to reap thereby? Nothing but a little marrow

      The description of this scene is insinuating on the importance of the little things which I believe is what the author was trying to convey when asking such questions to seeing a dog with a bone. He even refers to Plato at one point who was known as a philosophical speaker who was wise in such ideas. "Plato says that true and reliable knowledge rests only with those who can comprehend the true reality behind the world of everyday experience." (Macintosh) Platos theory of forms suggested that there is a different reality to everything for each person. That would insinuate that for a dog, that bone is big thing worth his time, while as humans, we see the dog with his bone and think "why bother?".

    1. DeRosa, Robin. Interdisciplinary Studies: A Connected Learning Approach. Rebus Communities, 2016. https://press.rebus.community/idsconnect/.


      found via <br /> Sheridan, Victoria. “A Pedagogical Endeavor.” Inside Higher Ed, August 9, 2017. https://www.insidehighered.com/digital-learning/article/2017/08/09/robin-derosas-oer-pedagogical-endeavor.

      On first blush it looks like I've read portions of some of these chapters as blogposts on the authors' original websites. Should be interesting to see how those are linked/credited.

      Given the writing contained in the book it would be interesting to see Pressbooks and/or the Rebus Community allow support for having the lead of a project be credited as an "editor" on the front page rather than to default them as an "author".

    1. Google Books .pdf document equivalence problem #7884

      I've noticed on a couple of .pdf documents from Google books that their fingerprints, lack thereof, or some other glitch in creating document equivalency all seem to clash creating orphans.

      Example, the downloadable .pdf of Geyer's Stationer 1904 found at https://www.google.com/books/edition/Geyer_s_Stationer/L507AQAAMAAJ?hl=en&gbpv=0 currently has 109 orphaned annotations caused by this issue.

      See also a specific annotation on this document: https://hypothes.is/a/vNmUHMB3Ee2VKgt4yhjofg

  11. Jan 2023
    1. https://github.com/rlaker/Obsidian-for-Academia/issues/1

      Perhaps I can circle back around to add in more of the specifics, both for the documentation and so people better understand what's going on and how things are dovetailed. Until then, the following two articles about setting up and using Obsidian with Zotero are fairly useful templates/walk throughs: - https://www.marianamontes.me/post/obsidian-and-zotero/ - https://nataliekraneiss.com/your-academic-reading-list-in-obsidian/

    1. f you have a sensor kit from Hollandse Luchten, we urge you to disconnect the humidity meter. We recently found out that the humidity

      They quit using these HoLu kits as the data was unrealiable. Here they were removing the humidity sensor as it was causing some problems

  12. Nov 2022
    1. personal (desktop)computers could be used to duplicate proprietary software programs. And concernsassociated with computer crime appeared during this phase because individuals couldnow use computing devices, including remote computer terminals, to break into anddisrupt the computer systems of large organizations.

      groups - Private citizens using personals computers to duplicate software and large orgs.

      issues - duplication and this type peer to peer file transfers are considered theft by many.

    2. included concerns aboutpersonal privacy, intellectual property, and computer crime. Privacy concerns, which hademerged during Phase 1 because of worries about the amount of personal informationthat could be collected by government agencies and stored in a centralized government-owned database, were exacerbated because electronic records containing personal andconfidential information could now also easily be exchanged between two or morecommercial databases in the private sector.

      issues - privacy concerns about privacy and intellectual property. Information could now be exchanged between the government and the private sector

    3. We examine ethical issues that cutacross the spectrum of devices and networked communication systems comprisingcybertechnology, from stand-alone computers to networked systems

      issues - cybernetics is a comprehensive term. It involves mobilization issues, entire systems of communication as well as the internet.

    4. These include concerns affecting privacy, confidentiality, anonym-ity, free speech, defamation, and so forth. For example, did Cutler violate the privacy andconfidentiality of her romantic partners through the remarks she made about them in heronline diary?

      Groups - public, private

      issues - just because something is posted anonymously doesn't mean it is private. Once ties can be made to the personal lives of very real people it all becomes public. So the conduct for what is done anonymously becomes an issue because it's harder to police behavior when there isn't a name attached to it. Who do you hold accountable? And what is the reach of the employer, is it fair for them to have oversight into the more intimate parts of their employees lives.

    5. “Megan Meier is a slut” and “Megan Meier is fat”—began to appear on MySpace.Meier, who was reported to have suffered from low self-esteem and depression, became increas-ingly distressed by the online harassment (cyberbullying) being directed at her

      issues - Harassment and degrading comments become easier to make when it's done online.

    1. I fail to understand how this is such a low priority. Code review is one of the most basic and critical portions of development lifecycle, and prior to discovery of this ticket I literally had to roll an entire other repository manager just to perform that correctly when I discovered entire directories of changes had been omitted from the Gitlab generated MR. We actually found that in order to get the change set fix to apply reliably, that it is required to add "?w=1" to the url even after updating the white space setting.
  13. Oct 2022
  14. Sep 2022
    1. e doubted most students knew they were signing up for long-term monitoring when they clicked to connect to the campus WiFi.

      Intentionally unclear and confusing terms of service

    2. The systems, he added, are isolating for students who don’t own smartphones,

      Impoverished: Not everyone has a smartphone. This makes another hurdle for impoverished people to jump over in order to receive an education.

    3. In Sasha’s case, Benz said, the university sent an adviser to knock on her door

      Sasha, "at risk" student Advisors knock on students' doors if their "at risk" score warrants it.

    4. It also generates a “risk score” for students based around factors such as how much time they spent in community centers or at the gym.

      Who is qualified to design such general parameters to assess an individual's "risk" score?

    5. The tracking systems, they worry, will infantilize students in the very place where they’re expected to grow into adults, further training them to see surveillance as a normal part of living, whether they like it or not.

      Bad Issues: Students losing the a sense of choice, which is an important area through which to grow.

    6. Dozens of schools now use such technology to monitor students’ academic performance, analyze their conduct or assess their mental health.

      Bad: Issues being that this sort of tracking is incredibly invasive, at best.

    7. When Syracuse University freshmen walk into professor Jeff Rubin’s Introduction to Information Technologies class, seven small Bluetooth beacons hidden around the Grant Auditorium lecture hall connect with an app on their smartphones and boost their “attendance points.”

      Syracuse Students Issues:Automatic attendance

    1. And algorithms designed to detect suspicious movement will inevitably flag disabled students and others who do not move in the way the platforms expect, he added.

      Disabled students at risk of being flagged with suspicious movements

    2. Facial recognition systems – which some proctoring platforms use to confirm the identity of the test taker – are less accurate with dark-skinned people, 
    3. bias in facial recognition but also because of the potential for data collection.

      Data Collection Bad tradeoff: privacy for convenience

    4. “There are so many systematic barriers preventing people like me from obtaining these degrees – and this is just another example of tha

      online exams may exacerbate systemic barriers for people with dark skin complexion

    1. access to financials, course schedules and grades, and outstanding fees via voice devices.

      This sort of information is very sensitive. While perhaps convenient to access, how secure is this data through these new technologies?

    1. "crisis many observers expressed concern that environmental issues would be put on the political backburner, treated as a ‘luxury’ that could be addressed only in times of prosperity" (188)

      opposite of patagonia "sale" in which we consider the earth the source of all wealth

    1. This hasn't yet been scheduled, but we're tracking it on our backlog as something we want to do this year. A few months ago, we arranged for additional capacity to address items like this that have waited for so long. Now that additional capacity is available, it's just a matter of scheduling based on relative priority. We're anxious to get this one done, and I hope to soon have a clearer date to post here.
  15. Aug 2022
  16. Jul 2022
    1. Companies set upfarms of servers running Web applications, with a load balancing system to route eachnew request to the least busy server. Storage area networks provided ultra-high-speedconnections between servers and disk pools. The technological lines separating main-frames, minicomputers, and personal computers were starting to blur

      The shift in Web storage

    2. The bigger point here is that Microsoft was never able to turn the Web into a pro-prietary system because it couldn’t match its domination of the browser side of theWeb with similar control over the servers that generated Web pages.
    3. Although the estab-lished Internet Relay Chat system, for exchanging real-time messages in chat roomsproved popular, other consumer-oriented messaging systems sprang up

      advent of chat rooms

    4. to situate thathistory firmly within the broader stories of the Internet and of computing

      Purpose of reading

    1. cornerstone of Lycos's technique was analysis of anchortext, or the descriptions of outbound links on a Web page, to get abetter idea of the meaning of the existing page.
    2. in 1996, it was impossible to create a pure play insearch that was economically viable. The market was still too imma-ture-robust business models were years from fruition.

      Monier was before his time when it came to search being economically viable.

    3. fu the Web took off, so did the basic problem of search.

      This was due to a lack of semantic abilities.

    1. irst Period The Loss of the Diamond (1848) The events related by Gabriel Betteredge, house-steward in the service of Julia, Lady Verinder.

      Change of first-person narrator lo lower class 'house-steward.' Is he more or less reliable as a narrator compared to the first upper class one?

  17. Mar 2022
  18. Feb 2022
    1. Shabari B., a Bengaluru resident, found 2020 challenging. Her daughter, now nine, did not take to online classes well. “She developed anxiety and this manifested in behavioural issues — she began to act out and would be rude to her teachers,” says the 44-year-old. The child missed her friends and her normal school day. Shabari’s younger child, now seven, was affected differently; the long months without seeing a single other person or going outside, affected his relationships with other people. “He used to be very vocal, but now he finds social situations very anxiety provoking,” says Shabari.

      Sisters face-off post-covid schooling behavioral issues

    1. Relations between the Centre and the States ruled by Opposition parties are strained due to various factors, ranging from questions related to GST, the partisan behaviour of central agencies, the Centre’s move to give itself absolute powers in the transfer of IAS, IPS and IFS officers and the overbearing attitude of several Governors.

      what are the issues faced by ruling opposition parties - Centre-state relations 2022 issues

      1. related to GST
      2. partisan behaviour of central agencies
      3. Centre's absolute power - transfer of IPS and IFS officers
      4. overbearing attitude of several Governors
  19. Jan 2022
    1. 5G C-band facility. It says the interference with the aircraft’s radio altimeter could prevent engine and braking systems from transitioning to landing mode, with a potential to affect the aircraft from stopping on the runway.

      5G C-band facility aircraft landing

    1. The ticket which tracks issues using Gmail with Thunderbird (Bug 402793)

      Notice how it was created >= 14 years ago and is still open.

      Notice how they just keep updating it by adding "Depends on:" "No longer depends on:" (cleaner than adding the details of those related/sub issues directly here)

  20. Dec 2021
    1. idea of common tests was initiated by Murli Manohar Joshi as the HRD Minister in the A.B. Vajpayee government. It found some support in the judgment of the Supreme Court in T.M.A. Pai Foundation (2002). NEET was notified by the Medical Council of India (MCI) in 2010 but in 2013, a three-judge majority decision in Christian Medical College Vellore Association vs Union of India and Others had struck down NEET.

      Neet History

  21. Nov 2021
    1. This is actively being worked on - for those interested you can follow the progress in https://github.com/snapcore/snapd/pull/10836
    2. Seeing how this has been treated for 4.5 years makes this seem like a pretty dysfunctional project. Please have mercy on your poor users and fix this.
    3. After 5 years there's still no fix. This is so annoying. I'm now getting rid of all snap packages and installing deb variants instead. Finally I'll purge snap and if these weird decisions keep on going I'll also move to another distro. Common Canonical. Seriously?
  22. Oct 2021
    1. historic temple (Candi no. 11) at the archaeological site of Bujang Valley, Kedah being demolished by a property developer. The developer claimed being unaware of the 1200 years old remains, which are related to the history of Hinduism and Buddhism in Malaysia, were on site.

      Malaysia Case

    2. demolition of Bok House in Jalan Ampang, Kuala Lumpur in 2006 (shortly after NHA 2005 been gazetted) has raised questions about how heritage is being assessed.

      Case

  23. Sep 2021
    1. Sara and Shelbie, the editors of Vo i c e s from the Middle, invited us to say what we want to say, even to be blunt, about where we are and where we’re going in the teaching of language arts.

      Topic/Issue- "Language" - Touching in the subject of where we are, and where we are going in the teaching of language arts.

    1. The number of complaints across the issue tracker and the lack of substantive followup on many of those complaints should be ample evidence that these frustrated users exist and are likely about to leave Fenix behind in droves, if they haven't already.
  24. Jul 2021
  25. Jun 2021
  26. May 2021
  27. Apr 2021
  28. Mar 2021
    1. However, since you haven't yet provided any details about how you built with Qt (Qt isn't officially supported, so you must have used a third party derivative of vim), and you haven't provided any detailed information about what error messages or malfunctions you're having with python-complete, it's not really possible to tell you how to fix the problem and get vim working with Qt.
    1. This issue hasn’t been deemed a high enough priority to be fixed yet. It will be addressed one day, I’m sure. There are many issues in GLib which many people on the internet think are important.
  29. Feb 2021