312 Matching Annotations
  1. Last 7 days
    1. And just a fewyears later, it was jubilantly discovered that machine translation and automaticabstracting were also just around the corner.

      HA!

    Tags

    Annotators

    1. In 1896, Dewey formed a partnership with Herman Hollerith and the Tabulating Machine Company (TMC) to provide the punch cards used for the electro-mechanical counting system of the US government census operations. Dewey’s relationship with Hollerith is significant as TMC would be renamed International Business Machines (IBM) in 1924 and become an important force in the information age and creator of the first relational database.
  2. Aug 2022
  3. Jul 2022
    1. because it only needs to engage a portion of the model to complete a task, as opposed to other architectures that have to activate an entire AI model to run every request.

      i don't really understand this: in z-code thre are tasks that other competitive softwares would need to restart all over again while z-code can do it without restarting...

  4. Jun 2022
    1. A huge amount of Bridgewater's efforts goes into gathering data on credit and equity, and understanding how that affects demand from individual market participants, such as a bank, or from a group of participants (such as subprime-mortgage borrowers). Bridgewater predicted the euro-zone debt crisis by totting up how much debt would need to be refinanced and when; and by examining all the potential buyers of that debt and their ability to buy it. Mr Volcker describes the degree of detail in Mr Dalio's work as “mind-blowing” and admits to feeling sometimes that “he has a bigger staff, and produces more relevant statistics and analyses, than the Federal Reserve.”
    2. “The economy is like a machine.” This machine may look complex but is, he insists, relatively simple even if it is “not well understood”. Mr Dalio models the macroeconomy from the bottom up, by focusing on the individual transactions that are the machine's moving parts. Conventional economics does not pay enough attention to the individual components of supply and, above all, demand, he says. To understand demand properly, you must know whether it is funded by the buyers' own money or by credit from others.
    3. In the early 1980s Mr Dalio started writing down rules that would guide his investing. He would later amend these rules depending on how well they predicted what actually happened. The process is now computerised, so that combinations of scores of decision-rules are applied to the 100 or so liquid-asset classes in which Bridgewater invests. These rules led him to hold both government bonds and gold last year, for example, because the deleveraging process was at a point where, unusually, those two assets would rise at the same time. He was right.
    4. He has even simulated being an investor in markets in those periods by reading daily papers from these eras, receiving data and “trading” as if in real time.

      .

    1. Even if the original webpage disappears, you can often use this informationto locate an archived version using the Wayback Machine, a project of theInternet Archive that preserves a record of websites: https://archive.org/web/.

      It would be useful to suggest here:

      Ideally one's note taking applications would automatically archive web pages to the Internet Archive as you take notes from them. This means that if they should disappear in the future, you'd have recourse to a useful and workable back up.

    1. determine the caliphate; and another group led by Mu'awiya in the Levant, who demanded revenge for Uthman's blood. He defeated the first group in the Battle of the Camel; but in the end,

      this is another post

    1. Discussion of the paper:

      Ghojogh B, Ghodsi A, Karray F, Crowley M. Theoretical Connection between Locally Linear Embedding, Factor Analysis, and Probabilistic PCA. Proceedings of the Canadian Conference on Artificial Intelligence [Internet]. 2022 May 27; Available from: https://caiac.pubpub.org/pub/7eqtuyyc

  5. May 2022
    1. You can now tag citations in @CiteULike with #CITO! Add the tag "cito--(relationship)--permalink". Example:"cito--usesmethodin--423382".
    1. Machine Tags

      A new kind of tags — machine tags — are supported now. A machine tag, e.g. meta:language=python consists of a namespace (meta), a key (language) and a value (python). Everyone can created machine tags, but the meta: namespace is protected and tags in there will be created by the site itself.

      The codesite itself uses machine tags to make various properties of recipes accessible to the search:

      • meta:language

        The programming language of the recipe, e.g. python, perl or tcl.

      • meta:min_$lang_$majorver

        Those tags describe the minimum language version. If a recipe requires Python 2.5 it would have the tag meta:min_python_2=5.

      • meta:license

        The license that was selected by the author, e.g. psf, mit or gpl.

      • meta:loc

        This tag contains a number describing the lines of code in a recipes. It counts only the number of lines in the code block but not any lines in the discussion of in comments. This makes it possible to search for short recipes with less than ten lines or very large ones.

      • meta:score

        The current score of the recipe. This is the same number that is displayed besides the recipe title and can only be influenced by voting on recipes. That way you could even search for down-voted recipes

      • meta:requires

        Stores information about additional requirements of the recipes, e.g. required python modules. You can find recipes using python's collections module that way.

      All those tags cannot be changed directly because they are generated from a recipe's properties.

    1. We also support machine tags that follow the pattern NAMESPACE:KEY=VALUE. For example: geo:lat=43.555 camel:size=medium machine:tag=with space Machine tags are not revealed to the user on the track pages.

  6. Apr 2022
    1. ReconfigBehSci. (2021, July 19). this is how the failure to understand what efficacy means and how it relates to outcomes will be seized on over and over again. Cookie cutter fallacies require cookie cutter clarification by machine tools to be combatted effectively (at least at current levels of moderation) [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1417164191664730112

  7. Mar 2022
    1. "Who controls the past controls the future. Who controls the present controls the past," as Rage Against the Machine sang in their 1999 song "Testify." OK, actually it's a quote from George Orwell's 1984, but hey.
    1. he basic function of an anaesthesia machine is to prepare a gas mixture of precisely known, but variable composition. The gas mixture can then be delivered to a breathing system.
    2. Safe use of anaesthesia machine depends upon an interaction between the basic design of the machine with its safety features and the knowledge and skills of the anaesthesiologist.
    1. So my idea was to create a machine-tag format based on Wikipedia topics, allowing any content creator to tag content with any topic in Wikipedia. By using Wikipedia as an index, this format provides very specific identification of content across a vast knowledge domain. Call it the Dewey Decimal System for the web: “The Wiki Decimal System.” In general, the problem with machine tags is how to make them easy to add for regular folks. Although the format itself is simple, the tags are typically lengthy and require you to know the data ID for what you want to tag. Enter my hack: A web page that takes your text and builds the list of Wikipedia machine tags automatically.
  8. Feb 2022
  9. Jan 2022
      • astro:name=NGC 4565
      • astro:orientation=11.73
      • astro:RA=189.083922302

      The metadata is structured. So structured that we can represent the example machine tags in a table:

      <table> <thead><tr> <th style="text-align:center">namespace</th> <th style="text-align:center">predicate</th> <th style="text-align:center">value</th> </tr> </thead> <tbody> <tr> <td style="text-align:center">astro</td> <td style="text-align:center">name</td> <td style="text-align:center">NGC 4565</td> </tr> <tr> <td style="text-align:center">astro</td> <td style="text-align:center">orientation</td> <td style="text-align:center">11.73</td> </tr> <tr> <td style="text-align:center">astro</td> <td style="text-align:center">RA</td> <td style="text-align:center">189.083922302</td> </tr> </tbody> </table>

      Or in a tree:

        astro
        |-- name
        |   `-- NGC 4565
        |-- orientation
        |   `-- 11.73
        `-- RA
            `-- 189.083922302
      
    1. Formats for Disk Images Another piece of the packaging puzzle is disk image formats. There are many. Each has its own benefits and detriments, but I’m not going to get into those here. Again, this is nowhere near a comprehensive list — just something to help with getting your bearings. I’d like to comment on a couple of the formats that I’ve recently encountered. VDI – VirtualBox’s internal default disk image format is VDI. Nevertheless, this is not what is used by Vagrant boxes. VMDK – One of the most common formats. VMWare’s products use various versions and variations of VMDK disk images. Several versions and variations exist, so it’s very important to understand which one you’re working with and where it can be used.
    2. Open Virtual Appliance (OVA) An OVA is an OVF file packaged together with all of its supporting files (disk images, etc.). You can read about the requirements for a valid OVA package in the OVF specification. Oftentimes people will say “an OVF” and really mean “an OVA.”
    3. File Formats for Virtual Machines Open Virtualization Format (OVF) The OVF Specification provides a means of describing the properties of a virtual system. It is XML based and has generous allowances for extensibility (with corresponding tradeoffs in actual portability). Most commonly, an OVF file is used to describe a single virtual machine or virtual appliance. It can contain information about the format of a virtual disk image file as well as a description of the virtual hardware that should be emulated to run the OS or application contained on such a disk image.
    1. Virtual machines (VMs) revolutionized the data center. With the ability to easily spin up a machine and even roll back to a working state, VMs bring a level of ease IT would never have enjoyed. Rolling back your VM is handled by way of snapshots.

      File Formats for Virtual Machines Open Virtualization Format (OVF)

      The OVF Specification provides a means of describing the properties of a virtual system. It is XML based and has generous allowances for extensibility (with corresponding tradeoffs in actual portability). Most commonly, an OVF file is used to describe a single virtual machine or virtual appliance. It can contain information about the format of a virtual disk image file as well as a description of the virtual hardware that should be emulated to run the OS or application contained on such a disk image.

      Oracle VM VirtualBox can import and export virtual machines in the following formats:

      Open Virtualization Format (OVF). This is the industry-standard format. See Section 1.14.1, “About the OVF Format”.
      
      Cloud service formats. Export to and import from cloud services such as Oracle Cloud Infrastructure is supported. See Section 1.15, “Integrating with Oracle Cloud Infrastructure”. 
      

      1.14.1. About the OVF Format

      OVF is a cross-platform standard supported by many virtualization products which enables the creation of ready-made virtual machines that can then be imported into a hypervisor such as Oracle VM VirtualBox. Oracle VM VirtualBox makes OVF import and export easy to do, using the VirtualBox Manager window or the command-line interface.

      https://www.virtualbox.org/manual/UserManual.html#ovf

      Using OVF enables packaging of virtual appliances. These are disk images, together with configuration settings that can be distributed easily. This way one can offer complete ready-to-use software packages, including OSes with applications, that need no configuration or installation except for importing into Oracle VM VirtualBox.

    1. Here, the card index func-tions as a ‘thinking machine’,67 and becomes the best communication partner for learned men.68

      From a computer science perspective, isn't the index card functioning like an external memory, albeit one with somewhat pre-arranged linked paths? It's the movement through the machine's various paths that is doing the "thinking". Or the user's (active) choices that create the paths creates the impression of thinking.

      Perhaps it's the pre-arranged links where the thinking has already happened (based on "work" put into the system) and then traversing the paths gives the appearance of "new" thinking?

      How does this relate to other systems which can be thought of as thinking from a complexity perspective? Bacteria perhaps? Groups of cells acting in concert? Groups of people acting in concert? Cells seeing out food using random walks? etc?

      From this perspective, how can we break out the constituent parts of thought and thinking? Consciousness? With enough nodes and edges and choices of paths between them (or a "correct" subset of paths) could anything look like thinking or computing?

    1. We are definitely living in interesting times!

      The problem with Machine learning in my eyes seems to be the non-transparency in the field. After all what makes the data we are researching valuable. If he collect so much data why is only .5% being studied? There seems to be a lot missing and big opportunities here that aren't being used properly.

  10. Dec 2021
    1. as of February 2021, Europeana comprises 59%images and 38% text objects, but only 1% sound objects and 2% video objects.3 DPLA iscomposed of 25% images and 54% text, with only 0.3% sound objects, and 0.6% videoobjects.4Another reason, beyond cost, that audiovisual recordings are not widely accessible is the lack ofsufficiently granular metadata to support identification, discovery, and use, or to supportinformed rights determination and access control and permissions decisions on the part ofcollections staff and users.

      Despite concerted efforts, there is a minimal amount of A/V material in Europeana and DPLA. This report details a pilot project to use a variety of machine-generated-metadata mechanisms to augment the human description efforts. Although this paragraph mentions rights determination, it isn't clear from the problem statement whether the machine-generated description includes anything that will help with rights. I would expect that unclear rights—especially for moving image content—would be a significant barrier to the open publication of A/V material.

    1. This comparison is not to claim that the index catalog is already a Turing machine. Comparisons, transfers, and analogies are not that simple. If the elements of a universal discrete machine are present, they still lack the computational logic of an operating system, the development of which constitutes Turing ’ s foundational achievement. What is described here is merely the fact that the card catalog is liter-ally a paper machine, similar to a nontrivial Turing machine only in having similar components — no more, no less.

      I felt some of this missing piece and so included the idea of human interaction as part of the process to make up the balance.

    2. s Alan Turing proved only years later, these machines merely need (1) a (theoretically infi nite) partitioned paper tape, (2) a writing and reading head, and (3) an exact

      procedure for the writing and reading head to move over the paper segments. This book seeks to map the three basic logical components of every computer onto the card catalog as a “ paper machine,” analyzing its data processing and interfaces that may justify the claim, “Card catalogs can do anything!”

      Purpose of the book.

      A card catalog of index cards used by a human meets all the basic criteria of a Turing machine, or abstract computer, as defined by Alan Turing.

  11. Nov 2021
    1. Its main feature isthat it is in a more readable textual format, as compared to the binary format ofmachine code.

      assembly code 和 machine code 相比最大的区别是什么?

    1. In America, of course, we don’t have that kind of state coercion. There are currently no laws that shape what academics or journalists can say; there is no government censor, no ruling-party censor. But fear of the internet mob, the office mob, or the peer-group mob is producing some similar outcomes. How many American manuscripts now remain in desk drawers—or unwritten altogether—because their authors fear a similarly arbitrary judgment? How much intellectual life is now stifled because of fear of what a poorly worded comment would look like if taken out of context and spread on Twitter?

      Fear of cancel culture and social repercussions prevents people from speaking and communicating as they might otherwise.

      Compare this with the right to reach, particularly for those without editors, filtering, or having built a platform and understanding how to use it responsibly.

  12. Oct 2021
    1. ”My expectation is that we will hear many, many nice speeches, we will hear many pledges that - if you really look into the details - are more or less meaningless but they just say them in order to have something to say, in order for media to have something to report about," she said."And then I expect things to continue to remain the same. ... The COPs as they are now will not lead to anything unless there is big, massive pressure from the outside."

      Greta Thunberg on COP26

      In which Greta calls bullshit on the capitalist entropy machine’s attempts to spin the culture of learned helplessness, trained incapacities, and bureaucratic intransigence that is designed to maintain the status quo while pretending to be the world’s saviours through philanthropy, social entrepreneurship, and greenwashing.

      via Twitter

    1. Design for the Real World

      by Victor Papanek

      Papanek on the Bauhaus

      Many of the “sane design” or “design reform” movements of the time, such as those engendered by the writings and teachings of William Morris in England and Elbert Hubbard in the United States, were rooted in a sort of Luddite antimachine philosophy. By contrast Frank Llloyd Wright said as early as 1894 that “the machine is here to stay” and that the designer should “use this normal tool of civilization to best advantage instead of prostituting it as he has hitherto done in reproducing with murderous ubiquity forms born of other times and other conditions which it can only serve to destroy.” Yet designers of the last century were either perpetrators of voluptuous Victorian-Baroque or members of an artsy-craftsy clique who were dismayed by machine technology. The work of the Kunstgewerbeschule in Austria and the German Werkbund anticipated things to come, but it was not until Walter Gropius founded the German Bauhaus in 1919 that an uneasy marriage between art and machine was achieved.

      No design school in history had greater influence in shaping taste and design than the Bauhaus. It was the first school to consider design a vital part of the production process rather than “applied art” or “industrial arts.” It became the first international forum on design because it drew its faculty and students from all over the world, and its influence traveled as these people later founded design offices and schools in many countries. Almost every major design school in the United States today still uses the basic foundation course developed by the Bauhaus. It made good sense in 1919 to let a German 19-year-old experiment with drill press and circular saw, welding torch and lathe, so that he might “experience the interaction between tool and material.” Today the same method is an anachronism, for an American teenager has spent much of his life in a machine-dominated society (and cumulatively probably a great deal of time lying under various automobiles, souping them up). For a student whose American design school slavishly imitates teaching patterns developed by the Bauhaus, computer sciences and electronics and plastics technology and cybernetics and bionics simply do not exist. The courses the Bauhaus developed were excellent for their time and place (telesis), but American schools following this pattern in the eighties are perpetuating design infantilism.

      The Bauhaus was in a sense a nonadaptive mutation in design, for the genes contributing to its convergence characteristics were badly chosen. In boldface type, it announced its manifesto: “Architects, sculptors, painters, we must all turn to the crafts.… Let us create a new guild of craftsmen!” The heavy emphasis on interaction between crafts, art, and design turned out to be a blind alley. The inherent nihilism of the pictorial arts of the post-World War I period had little to contribute that would be useful to the average, or even to the discriminating, consumer. The paintings of Kandinsky, Klee, Feininger, et al., on the other hand, had no connection whatsoever with the anemic elegance some designers imposed on products.

      (Pages 30-31)

  13. Sep 2021
    1. a class of attacks that were enabled by Privacy Badger’s learning. Essentially, since Privacy Badger adapts its behavior based on the way that sites you visit behave, a dedicated attacker could manipulate the way Privacy Badger acts: what it blocks and what it allows. In theory, this can be used to identify users (a form of fingerprinting) or to extract some kinds of information from the pages they visit
  14. Aug 2021
    1. Fukuyama's answer is no. Middleware providers will not see privately shared content from a user's friends. This is a good answer if our priority is privacy. It lets my cousin decide which companies to trust with her sensitive personal information. But it hobbles middleware as a tool for responding to her claims about vaccines. And it makes middleware providers far less competitive, since they will not be able to see much of the content we want them to curate.

      Is it alright to let this sort of thing go on the smaller scale personal shared level? I would suggest that the issue is not this small scale conversation which can happen linearly, but we need to focus on the larger scale amplification of misinformation by sources. Get rid of the algorithmic amplification of the fringe bits which is polarizing and toxic. Only allow the amplification of the more broadly accepted, fact-based, edited, and curated information.

    2. Facebook deploys tens of thousands of people to moderate user content in dozens of languages. It relies on proprietary machine-learning and other automated tools, developed at enormous cost. We cannot expect [End Page 169] comparable investment from a diverse ecosystem of middleware providers. And while most providers presumably will not handle as much content as Facebook does, they will still need to respond swiftly to novel and unpredictable material from unexpected sources. Unless middleware services can do this, the value they provide will be limited, as will users' incentives to choose them over curation by the platforms themselves.

      Does heavy curation even need to exist? If a social company were able to push a linear feed of content to people without the algorithmic forced engagement, then the smaller, fringe material wouldn't have the reach. The majority of the problem would be immediately solved with this single feature.

  15. Jul 2021
    1. Suppose Google were to change what’s on that page, or reorganize its website anytime between when I’m writing this article and when you’re reading it, eliminating it entirely. Changing what’s there would be an example of content drift; eliminating it entirely is known as link rot.

      We don't talk about content drift very much. I like that some sites, particularly wiki sites, actually document their content drift in diffs and surface that information directly to the user. Why don't we do this for more websites? The Wayback machine also has this sort of feature.

  16. Jun 2021
    1. The problem is, algorithms were never designed to handle such tough choices. They are built to pursue a single mathematical goal, such as maximizing the number of soldiers’ lives saved or minimizing the number of civilian deaths. When you start dealing with multiple, often competing, objectives or try to account for intangibles like “freedom” and “well-being,” a satisfactory mathematical solution doesn’t always exist.

      We do better with algorithms where the utility function can be expressed mathematically. When we try to design for utility/goals that include human values, it's much more difficult.

    2. many other systems that are already here or not far off will have to make all sorts of real ethical trade-offs

      And the problem is that, even human beings are not very sensitive to how this can be done well. Because there is such diversity in human cultures, preferences, and norms, deciding whose values to prioritise is problematic.

  17. May 2021
  18. Apr 2021
    1. Machine learning app development has been gaining traction among companies from all over the world. When dealing with this part of machine learning application development, you need to remember that machine learning can recognize only the patterns it has seen before. Therefore, the data is crucial for your objectives. If you’ve ever wondered how to build a machine learning app, this article will answer your question.

    1. The insertion of an algorithm’s predictions into the patient-physician relationship also introduces a third party, turning the relationship into one between the patient and the health care system. It also means significant changes in terms of a patient’s expectation of confidentiality. “Once machine-learning-based decision support is integrated into clinical care, withholding information from electronic records will become increasingly difficult, since patients whose data aren’t recorded can’t benefit from machine-learning analyses,” the authors wrote.

      There is some work being done on federated learning, where the algorithm works on decentralised data that stays in place with the patient and the ML model is brought to the patient so that their data remains private.

  19. Mar 2021
  20. Feb 2021
    1. TRAILBLAZER-WORKFLOW is another dream ‘o mine come true. It allows creating long-term processes (or state machines) based on BPMN diagrams that can be modeled using our editor.
    1. propose to create a new academic discipline called “machine behavior.” It approaches studying AI systems in the same way we’ve always studied animals and humans: through empirical observation and experimentation

      We do this all the time; observe people's behaviour and then make inferences about their intentions.

    1. rethink the intricate, and increasingly inti-mate, configurations of the human and the machine.
    2. take as my focus the study ofhow the effect of machines-as-agents is generated and the latter’s impli-cations for theorizing the human.
  21. Jan 2021
    1. De meeste ongevallen worden door menselijk falen veroorzaakt en kunnen dus vermeden worden. 2.4.5 Apparatuuralarmering Bloedlekdetector: membraanlek; vuile detector; hemolyse als gevolg van: te hoge dialysaattemperatuur; hardwatersyndroom; koperintoxicatie; bloedtransfusie; medicamenteus; dialyse met water (concentraat op). Alarm voor hoge veneuze druk: veneuze lijn geknikt; positie naald niet goed, door het vat heen; stolling in de naald of de bloedlijnen; arm te sterk gebogen; vaatspasme; trombosering van de vene; onjuiste instelling van het alarm; limieten. Alarm voor lage veneuze druk: lucht in het extracorporele circuit; membraanruptuur; lekkage in de bloedlijnen; arteriële naald zuigt vacuüm; tensiedaling; arteriële lijn afgeknikt; bloedpomp staat stil; veneuze bloedlijn is van de naald losgeraakt; veneuze naald is uit het vat gegaan; onjuiste instelling van het alarm; begrenzing; filter van drukmeterlijn is nat. Alarm voor arteriële druk: bloedpomp staat te snel afgesteld; arteriële drukmeting niet goed aangesloten; infuus via arterieel druksysteem; drukmeetsysteem foutief afgesteld; hoge druk in het vat; bloeddrukdaling; arteriële bloedlijn afgeknikt; insufficiëntie van de shunt door: trombose; stenose; hematoom; infectie; positie naald of katheter niet goed; arteriële pool scribner afgeknikt of gestold; vaatspasme; ernstige hypotensie. Geleidbaarheidsmeter: temperatuur dialysaat te laag; concentraattank leeg; temperatuurunit van de machine defect; mengsysteem defect; onjuiste instelling. Luchtbeldetector: schuim in de luchtvanger (bij platzuigen pompsegment of slechte aanvoer); lek in de bloedslangen voor de bloedpomp; losraken van de arteriële lijn; uit het vat gaan van de arteriële naald; verkeerde positie van de luchtvanger in de houder; defect van de luchtbeldetector; afsluiten met lucht; infuus doorgeschoten; onjuiste instelling. Temperatuurmonitor: dialysaatflow is veranderd; onjuiste instelling; defecte thermostaat; defect verwarmingssysteem; stroomuitval; te veel lucht in het dialysaat. Stroomuitvalalarm: zekering doorgebrand; kortsluiting; overschakeling op noodaggregaat. Ultrafiltratiedrukalarm: te hoge ultrafiltratie; te lage ultrafiltratiedruk bij een highfluxnier (positieve TMP); altijd enige ultrafiltratie aanhouden om backfiltration te voorkomen.

      Meest ongevallen tijdens dialyse m.b.t. machine en lijnen

    1. I present the Data Science Venn Diagram… hacking skills, math and stats knowledge, and substantive expertise.

      An understanding of advanced statistics is a must as the methodologies get more complex and new methods are being created such as machine learning

    1. Zappos created models to predict customer apparel sizes, which are cached and exposed at runtime via microservices for use in recommendations.

      There is another company named Virtusize who is doing the same thing like size predicting or recommendation

  22. Dec 2020
    1. No one, not even Mark Zuckerberg, can control the product he made. I’ve come to realize that Facebook is not a media company. It’s a Doomsday Machine.
    2. “There is no chance of human intervention, control, and final decision,” wrote the military strategist Herman Kahn in his 1960 book, On Thermonuclear War, which laid out the hypothetical for a Doomsday Machine.
  23. Nov 2020
    1. Some of the verbs implemented by systemctl are designed to provide a high-level overview in a human readable format. All that information is available over dbus, and/or journalctl, systemctl show. We could provide that information in json format, but there's a second problem. Information and format of information printed by e.g. systemctl status is not stable. Since the output is not suitable for programmatic consumption anyway, there's no need to provide it in a machine readable format.
    1. systemctl show --no-page iptables \ | jq --slurp --raw-input \ 'split("\n") | map(select(. != "") | split("=") | {"key": .[0], "value": (.[1:] | join("="))}) | from_entries'