15 Matching Annotations
  1. Apr 2020
    1. Perhaps, for example, a Pwned Password is only allowed if multi-step verification is enabled. Maybe there are certain features of the service that are not available if the password has a hit on the pwned list.
  2. Mar 2020
    1. This is because the standard version of Google Analytics has a monthly limit of 10 million interactions per property. When a site exceeds this limit, they may start to forcibly exclude data that you send to them from being processed.  In effect, your data could become sampled, without any indication within the interface that it is doing so.  If data is being sampled, you’re not getting a clear picture of your site users and their behaviors.
    1. Did you know accurate data reporting is often capped? Meaning once your website traffic reaches a certain limit, the data then becomes a guess rather than factual.This is where tools like Google Analytics becomes extremely limited and cashes in with their GA360 Premium suite. At Matomo, we believe all data should be reported 100% accurately, or else what’s the point?
  3. Jul 2019
    1. Another solution might be to limit on the number of times a tweet can be retweeted.

      This isn't too dissimilar to an idea I've been mulling over and which Robin Sloan wrote about on the same day this story was released: https://platforms.fyi/

  4. Mar 2019
    1. You can see there that these skills are easy to learn in the context of what the human has to learn anyway about using the tools, and that they provide for much greater flexibility in finding convenient ways to use the tools to help shape materials.

      I think knowing the limits of tools is as important as their mastery.

  5. Jun 2018
    1. The preservation of meets and joins, and hence whether a monotone map sustainsgenerative effects, is tightly related to the concept of a Galois connection, or moregenerally an adjunction.
    2. In his work on generative effects, Adam restricts his attention to maps that preservemeets, even while they do not preserve joins. The preservation of meets implies that themapbehaves well when restricting to a subsystem, even if it can throw up surpriseswhen joining systems
    3. n [Ada17], Adam thinks of monotone maps as observations. A monotone map:P!Qis a phenomenon ofPas observed byQ. He defines generative effects of such a mapto be its failure to preserve joins (or more generally, for categories, its failure topreserve colimits)
    4. Example1.61.Consider the two-element setPfp;q;rgwith the discrete ordering.The setAfp;qgdoes not have a join inPbecause ifxwas a join, we would needpxandqx, and there is no such elementx.Example1.62.In any posetP, we havep_pp^pp.Example1.63.In a power set, the meet of a collection of subsets is their intersection,while the join is their union. This justifies the terminology.Example1.64.In a total order, the meet of a set is its infimum, while the join of a set isits supremum.Exercise1.65.Recall the division ordering onNfrom Example 1.29: we say thatnmifndivides perfectly intom. What is the meet of two numbers in this poset? Whatabout the join?

      These are all great examples. I htink 1.65 is gcd and lcm.

    5. These notions will have correlates in category theory, called limits and colimits,which we will discuss in the Chapter 3. For now, we want to make the definition ofgreatest lower bounds and least upper bounds, called meets and joins, precise.
  6. Sep 2017
    1. State does have a legitimate interest when it monitors the web to secure the nation against cyber attacks and the activities of terrorists.

      Legitimate state interest

    2. Apart from national security, the state may have justifiable reasons for the collection and storage of data. In a social welfare state, the government embarks upon programmes which provide benefits to impoverished and marginalised sections of society. There is a vital state interest in ensuring that scarce public resources are not dissipated by the diversion of resources to persons whodo not qualify as recipients

      Limits on privacy, national security and public good

    3. narrow tailoring of the regulation to meet the needs of a compelling interest

      Narrow tailoring + compelling interest test

  7. Mar 2017
    1. Language enforces a closure: we must say one thing or the other; we choose, and make our narrativ

      So this counters Cixous--the female body is multiple, always expanding, encompassing everything, and language should do the same. But Corder says language just can't do that. The limits of language seems to be the theme of our readings this week.

  8. Nov 2015
    1. The confrontation with technology at the level of creation is what distinguishes electronic literature from, for example, e-books, digitized versions of print works, and other products of print authors “going digital.” Electronic literature often intersects with conceptual and sound arts, but reading and writing remain central to the literary arts. These activities, unbound by pages and the printed book, now move freely through galleries, performance spaces, and museums. Electronic literature does not reside in any single medium or institution.

      I think this passage is THE clue. IRL I work on classic, 19th and 20th definitions of differents kinds of art. It usually turns around the limits of different arts, that come with the medium they are exposed in. The artist from the 20th century loved breaking that limits. From that point of view, e-lit has broken it all. It has improved the medium and it has even questioned the limits of creation itself. (I think analytic art critics wont like my point of view...). E-lit has lots of issues as an art and this is great. (Sorry for my awful english! Feel free to do as many corrections as you want!)