2,421 Matching Annotations
  1. Last 7 days
    1. Oral history questions for Richard Polt on typewriter collecting:

      Over the years Joe Van Cleave has done a handful of videos on selectivity and downsizing of one's typewriter collection including: <br /> - The Minimal Complete Typewriter Collection https://www.youtube.com/watch?v=0Ej6kd1FsnE <br /> - Culling the Herd https://www.youtube.com/watch?v=h_ueHE3Whjk <br /> - Downsizing Your Typewriter Collection https://www.youtube.com/watch?v=Eic4lNE0l3Y

      And Sarah Everett has one "what's your deserted island typewriter?" (if I had to pick 5 typewriters....) https://www.youtube.com/watch?v=PFqJa9kD-v0

      All this to ask Richard: what your downsizing experience has been? What were the criteria by which you chose what to keep? Did you more closely focus your collection into an area, era, style, other? Are you primarily keeping the things you tend to use more frequently? Things in better condition? You started out with how many to end up with how many? If you could start your collecting over from scratch what would you change? Are there things you wouldn't get the second time around? Things you would have spent more time focusing on? What will you continue to collect and at what rate? Naturally, collecting is a very personal thing with respect to individual's specific tastes and experiences (and frequently space!), but I suspect answers to some of these may help others, especially those who are just starting into collecting, or who have a dozen or two machines but who might find value on where and how to potentially focus their efforts. It may also help other collectors and their families who are dealing with appropriately disposing of significant collections, especially in cases where a deceased collector was very passionate and the family just wants to be rid of them quickly (i.e. ideas like Swedish death cleaning and related).

      I'm sure reflections on these would be an interesting typecast, but if it's easier to do something like an oral history interview, I'm happy to collect these and a few dozen more questions into an interview format if you've got 30-60 minutes in the coming months to devote to a remote audio/video interviews/mini-podcast or YouTube episode or something similar?

    1. Differentiating between an Underwood SS and the Underwood Rhythm Touch:

      comment to James Grooms at https://typewriterdatabase.com/show.23202.typewriter

      James, perhaps it's hiding somewhere else in the comments on the database, but I'm curious if you've come across definitive differences between the Underwood SS and the Underwood Rhythm Touch models which have separate pages within the database:<br /> - SS https://typewriterdatabase.com/Underwood.SS.4.bmys - Rhythm Touch https://typewriterdatabase.com/Underwood.Rhythm+Touch.4.bmys

      Most of my Google searches don't return anything definitive or with actual sourcing of any sort.

      The main page has the SS starting in May 1946 and the Rhythm Touch beginning in July of that year, but doesn't seem to specify between the two in any substantive way. Neither of the two models seems to have had a name printed on it.

      Your description here uses both designators, but knowing your penchant for newspaper and magazine advertisements, I would suspect you may have seen specific differentiators.

      This Facebook post has some handwaving differentiators: https://www.facebook.com/groups/TypewriterCollectors/posts/10161712887224678/ but none seem definitive or sourced. It also uses the phrase carriage shift, though presumably with these models Underwood had moved to a segment/basket shift on their standards.

      Other than the chrome side detailing moving from 3 strips to 5 as you've noted, one of the few differentiators I can see in this era is the shift from the shorter carriage return lever to the longer armed version around 1948 which Robert Messenger notes in https://oztypewriter.blogspot.com/2012/11/on-this-day-in-typewriter-history_25.html. However that same page also has an advertisement on it with the words Rhythm Touch featuring a short armed (older style) carriage return.

      Is there really a difference between the SS and the Rhythm Touch or are they the same model with the phrase "Rhythm Touch" used as a marketing tag to compete potentially with Smith-Corona's "Floating Shift"?

      Thanks!

  2. May 2026
  3. Apr 2026
    1. Meanwhile, in reality, the only 'official' MeshCore is the github repo. It's the source of truth in terms of what is MeshCore, and Andy has never contributed to that.

      大多数人认为拥有商标或域名的人自然拥有项目的'官方'地位,但作者坚持只有GitHub仓库才是真正的'官方'来源,这挑战了知识产权与项目官方身份之间的常规认知。

    1. I can hear the rabid Elon fan defending him about Tesla patents or the Twitter algorithm or something, but those are not serious open source projects.

      大多数人认为埃隆·马斯克的开源贡献(如特斯拉专利)是值得称赞的,但作者认为这些并非真正的开源项目,暗示马斯克的开源承诺是表面性的,与真正的开源精神(如Linux和Kubernetes)有本质区别。

    1. Open weight (read: free) models are widely available and good enough that most people probably couldn't tell the difference.

      主流观点认为付费的云端LLM服务在质量上显著优于免费开源模型,但作者声称开源模型已经好到大多数用户无法分辨差异,这挑战了付费服务价值主张的核心,暗示AI行业可能面临价值重估。

    1. DeepSeek V4 exceeds them all on coding, math, and STEM problems, making it one of the strongest open-source models ever released.

      大多数人认为开源AI模型在性能上无法匹敌闭源商业模型,但作者认为DeepSeek V4在多个关键领域超越了其他开源模型,甚至与顶级闭源模型相当。这挑战了'开源必然意味着性能妥协'的行业共识,暗示开源模型正在迅速缩小与商业模型的差距。

    1. Gemma 4 E4B matches or exceeds GPT-4o across multiple benchmarks including MATH, GSM8K, GPQA Diamond & HumanEval

      这一性能对比结果令人惊讶,表明开源模型已经能够闭源模型的性能,这可能打破AI领域的封闭生态,促进更广泛的研究合作和创新,同时降低企业采用AI的门槛。

    2. Gemma 4 E4B matches or exceeds GPT-4o across multiple benchmarks including MATH, GSM8K, GPQA Diamond & HumanEval.

      令人惊讶的是:Google的Gemma 4 E4B作为免费模型竟然在多个基准测试中超越了或匹敌了GPT-4o这一业界领先的商业模型。这表明开源和免费AI模型的质量已经达到了商业级别,打破了AI领域由少数大公司垄断的格局。

    1. The playbook is familiar: wrap an existing open-source project in a user-friendly interface, build a user base, raise money, then figure out monetization.

      这句话揭示了Ollama背后的VC驱动模式,这是一种典型的'包装开源项目-获取用户-融资-变现'的商业模式,这种模式往往最终会与开源项目的价值观产生冲突,正如Ollama从本地转向云服务的转变所展示的。

    1. OpenAI has introduced GPT-5.4-Cyber, a more permissive version of its flagship model built for defensive security work, expanding access to thousands of verified users through its Trusted Access for Cyber initiative.

      OpenAI推出专门针对网络安全防御的GPT-5.4-Cyber模型,并采用比Anthropic更开放的方法,这反映了AI安全领域的竞争新格局。这种开放与限制之间的平衡,将决定AI在关键安全领域的应用广度和深度,可能重塑网络安全行业的工作方式。

    1. On GDPval-AA, M2.7 achieves an ELO score of 1495, the highest among open-source models.

      这一数据点揭示了MiniMax M2.7在开源模型中的领先地位,1495的ELO分数表明其在复杂推理任务上已接近或达到顶级商业模型的水平,这对开源AI生态系统的发展具有深远影响。

    1. The license looks MIT at first glance but it is not MIT. Non commercial use is free with no restrictions. Commercial use requires prior written authorization from MiniMax.

      这种看似开源实则有限制的许可证策略代表了AI领域的一种新兴模式 - '伪开源'。它允许社区参与和评估,但限制了商业应用,可能阻碍了模型的广泛采用和创新。这种做法引发了一个重要问题:在AI模型日益成为基础设施的时代,开源的定义和边界应该如何重新定义?

    1. Open-source development is starting to redistribute participation, with contributions from the rest of the world now outpacing Europe and approaching the United States on GitHub.

      这一趋势表明AI开发的民主化进程正在加速,传统创新中心的主导地位正在被挑战。开源运动正在重塑全球AI创新格局,使更多国家和参与者能够参与AI发展,可能导致更多元、更具包容性的AI生态系统。

    1. While our production codebase has significantly diverged, including major rewrites of core systems like authentication and data handling, we want to ensure there is still a truly open version available.

      这一声明揭示了开源软件商业化的复杂现实。Cal.com选择保留开源版本但生产代码闭源,反映了开源社区面临的一个两难境地:如何在保持开放精神的同时,保护核心业务免受AI驱动的安全威胁。这种混合模式可能成为未来开源软件的发展方向。

    2. We hope that one day we can return to open source as the security landscape evolves. But for now, we have to put our customers first.

      这一声明揭示了开源与商业利益之间的艰难平衡。Cal.com的决定代表了开源社区面临的一个严峻现实:在AI安全威胁下,企业可能不得不牺牲开源原则来保护用户数据。这引发了一个重要问题:开源社区如何应对AI带来的安全挑战?

    3. Being open source is increasingly like giving attackers the blueprints to the vault. When the structure is fully visible, it becomes much easier to identify weaknesses and exploit them.

      这个比喻非常有力地揭示了开源与安全之间的根本矛盾。透明度本是开源的优势,但在AI时代却变成了致命弱点,这迫使我们重新思考开源软件的安全模型,以及如何在保持透明的同时有效防御自动化攻击。

    4. AI can be pointed at an open source codebase and systematically scan it for vulnerabilities.

      这是一个令人警醒的观察,揭示了AI技术如何从根本上改变了安全威胁的格局。AI自动化扫描使攻击门槛大幅降低,从需要专业技能转变为任何人都能使用的工具,这可能导致开源软件面临前所未有的安全挑战。

    5. Being open source is increasingly like giving attackers the blueprints to the vault. When the structure is fully visible, it becomes much easier to identify weaknesses and exploit them.

      令人惊讶的是:作者将开源软件比作给攻击者提供保险库蓝图,这种比喻揭示了开源与安全之间的根本矛盾。在AI时代,完全可见的代码结构使弱点识别变得前所未有的容易,这挑战了传统上认为开源更安全的观念。

    6. AI uncovered a 27-year-old vulnerability in the BSD kernel, one of the most widely used and security-focused open source projects, and generated working exploits in a matter of hours.

      令人惊讶的是:AI能够在几小时内发现并利用一个存在了27年的BSD内核漏洞,这展示了AI在安全领域的惊人能力。这个事实揭示了传统安全审计方法在面对AI加速攻击时的脆弱性,即使是像BSD这样经过长期审查的开源项目也无法幸免。

    1. Someone just dropped an open source alternative to Claude Managed Agents.

      令人惊讶的是:Claude Managed Agents竟然已经有了开源替代品,这表明AI助手管理工具的生态系统正在迅速发展,从专有解决方案向开源模式转变,这可能改变企业使用AI助手的方式。

    1. Meta is reportedly preparing to release its first AI models led by Alexandr Wang, with plans to open-source some versions while keeping its largest and most powerful systems closed.

      令人惊讶的是:Meta聘请了Alexandr Wang领导AI模型开发,但策略发生了重大转变,从之前的完全开放转向部分开放,保留最大和最强大的系统闭源。这表明即使是最大的开源支持者也在根据市场现实调整策略,在开放、安全和商业利益之间寻求新的平衡。

    1. Anthropic is committing up to $100M in usage credits for Mythos Preview across these efforts, as well as $4M in direct donations to open-source security organizations.

      令人惊讶的是:Anthropic为Project Glasswing项目投入了高达1亿美元的模型使用积分和400万美元的直接捐款,用于支持开源安全组织。这种大规模的资金投入反映了AI安全威胁的严重性和解决这一问题的紧迫性。

    2. In the past, security expertise has been a luxury reserved for organizations with large security teams. Open source maintainers—whose software underpins much of the world's critical infrastructure—have historically been left to figure out security on their own.

      大多数人认为开源社区有足够的安全能力和资源来维护关键基础设施。但作者明确指出开源维护者一直被单独应对安全问题,暗示了开源安全状况比普遍认为的要脆弱得多。

    1. The Apache 2.0 License permits full commercial use of the software to which it is applied. Open models that are released under the Apache 2.0 License aren't subject to any sort of prohibitive use policy or usage caps and can be freely used and adapted, including for commercial projects generating revenue.

      令人惊讶的是:Apache 2.0许可证对商业应用的开放程度令人印象深刻,它不仅允许完全的商业使用,还没有任何使用限制或上限。这意味着基于Apache 2.0许可证的AI模型可以自由地用于创收的商业项目,为开发者提供了极大的商业灵活性。

    1. NVIDIA Ising provides open base models, a training framework, and workflows for fine-tuning, quantization, and deployment. The pre-trained models deliver top performance out of the box, and because everything is open, users can also specialize for their own hardware and noise characteristics while keeping proprietary QPU data on-site.

      令人惊讶的是:NVIDIA选择将其量子AI模型完全开源,包括权重、训练框架和数据集。这种开放策略与科技巨头通常的封闭做法形成鲜明对比,表明量子计算领域可能比其他AI领域更注重开放协作,这可能加速整个行业的发展。

    1. Studying forks and other backends was more productive than searching arxiv. ik_llama.cpp and the CUDA backend directly informed two of the five final optimizations.

      令人惊讶的是:在实际项目中,研究分支代码和其他后端实现比查阅学术论文更有价值。这揭示了AI代理在实践中的学习偏好,也表明开源社区的实际贡献往往比理论研究更能提供直接可用的优化方案。

    1. focusing on the ~1.5K mainline open models from the likes of Alibaba's Qwen, DeepSeek, Meta's Llama

      令人惊讶的是:开源语言模型生态系统已经发展出约1500个主流模型,其中包括阿里巴巴的Qwen、DeepSeek和Meta的Llama等知名模型。这一数字表明,开源AI领域已经形成了相当规模和多样性的生态系统,远超许多人的想象。

    2. focusing on the ~1.5K mainline open models from the likes of Alibaba's Qwen, DeepSeek, Meta's Llama

      令人惊讶的是:开源语言模型生态系统已经发展到约1500个主流模型的规模,这远超许多人的想象。阿里巴巴、DeepSeek等中国公司与Meta这样的科技巨头共同塑造了这个庞大而多样化的生态系统,显示了开源AI的蓬勃发展。

    1. AI companies needed human openness to build their models, but will also kill the openness because the relationship is one-sided.

      点出了AI时代知识生产的根本悖论。大模型的知识基础源于人类曾经无私的公开分享,但这种提取式的单向关系最终会摧毁开源与分享的激励结构。当“公开思考”成为被剥削的源头,人类知识的公共生态将不可避免地走向枯竭。

    1. All experiments were carried out using Python, and the source code is available at https://github.com/kwkwon13/a-posteriori-conv-diff-siac.

      一篇发表在 arXiv 的纯数学论文提供了完整的 Python 源码——这在数值分析领域仍属少数,但正在成为趋势。令人印象深刻的是实验规模:均匀 N×N 网格(N 最大 128)、五个不同粘性系数、两种多项式次数,在二维空间上的完整参数扫描。可复现性不只是 AI 领域的议题,数学论文同样值得这样的透明度标准。

    1. Gemma 4 models undergo the same rigorous infrastructure security protocols as our proprietary models.

      「与专有模型相同的安全协议」——这句话针对的是企业和主权机构客户,暗示 Google 正在用开源模型打「安全牌」吸引政府和监管严格行业。对于不愿依赖 OpenAI/Anthropic 闭源 API 的企业,E2B/E4B 提供了一条「可审计、可部署、可监管」的路径,而 Google DeepMind 的安全背书是这条路的核心说服力。

    2. Run models on your own hardware for efficient development and deployment.

      Gemma 4 采用 Apache 2.0 许可证,是 Google 开源模型历史上最宽松的授权——此前 Gemma 系列的许可证在商业使用上存在模糊地带。这次转变意味着 E2B/E4B 可以被任何企业无限制地商业部署在自有硬件上,直接与 Llama 4 和 Qwen 3.5 在许可证层面实现对等竞争,开源生态博弈格局由此改变。

    1. We release the AURA model together with a real-time inference framework to facilitate future research

      大多数人认为先进的视频理解模型通常会被商业公司保留作为专有技术,但作者选择开源模型和实时推理框架。这一反直觉的决策挑战了AI研究中常见的封闭做法,表明作者更注重推动领域发展而非商业利益,这可能加速整个视频理解领域的技术进步。

    1. By using SAM, the Alta team has been able to process more than 20 million images without incurring exorbitant costs, allowing them to focus on building the best possible product for their users.

      大多数人可能认为初创公司需要依赖昂贵的第三方API来处理大量图像,但作者通过使用开源SAM模型,实现了大规模图像处理而不产生巨额成本。这一观点挑战了'高质量AI服务必须昂贵'的行业共识,展示了开源模型在成本效益方面的优势。

    1. Byte for byte, the most capable open models

      大多数人认为开源模型在性能上无法与闭源/专有模型相提并论,但作者声称Gemma 4是'字节对字节最强大的开源模型',挑战了这一行业共识。这暗示开源模型在特定指标上已经超越了商业闭源模型,是一个非传统的观点。

  4. Mar 2026
    1. Endovenous ablation is contraindicated or relatively unsuitable when venous anatomy precludes catheter-based treatment, specifically: aneurysmal dilation of the GSV close to the saphenofemoral junction, subcutaneous location of truncal veins above the saphenous fascia and close to the skin, and significant tortuosity of the GSV or SSV. [1] In these scenarios, high ligation and stripping is recommended as the preferred alternative (grade 1 strong recommendation

    1. whatever client they choose just as they can use their browser of choice

      Comment by Janneke_Adema: Comment by danallosso: Interesting -- what would it look like to have a shared annotation layer that could be accessed by a variety of tools?

    2. In terms of defining the “open” in open web annotation, I tend to take a standards approach: the Hypothes.is tool is built upon, and our organization advocates for, open standards in web annotation.

      Comment by Janneke_Adema: Comment by chrisaldrich: This explanation also highlights an additional idea of open itself. I have heard many in the W3C space criticize the open standard of web annotation arrived at because of the ultimate monoculture of the space. Most of the participants of the process were all related to Hypothes.is in some way and the result was a single product that implemented the standard. To my knowledge no other companies, groups, or individual programmers have separately implemented the standard.

      In this sense, while the "standard" is openly defined, it isn't as open as other standards which were mote slowly evolved and implemented gradually and more broadly by various programming languages and disparate groups.

    1. There is a fruitful argument for the cost of these more “traditional” publishing houses, as they spend a good amount of time with editing, formatting, and distribution (often in paper form)

      Comment by Janneke_Adema: One of the complaints I hear more and more often from academics is that traditional publishing houses are actually no longer doing this work. Editing and formatting are increasingly outsourced to academics themselves (as are indexing etc.) and even marketing is something publishers ask authors to so themselves using their social media profiles and academic brands. This is one of the issues many scholar-led publishing initiatives are trying to address, by highlighting for example the various processes that go into creating a scholarly publication and giving these due recognition. Mattering Press is at the forefront of this:https://www.matteringpress.org/

      http://www.csisponline.net/2014/06/18/from-openness-to-openings-reflections-on-the-experiments-in-knowledge-production-workshop/

    1. It indicates the motion or distance between upper a lower case letters on the typeface.

      https://www.facebook.com/groups/olympiasg1/posts/1506621080656301/

      also:

      Greg Riutzel:<br /> That's how I see it. I measured it once. I put the ribbon in stencil, typed a lower case "h" and marked approx where the top of the type slug was on the paper. Then repeated with an upper case "H". The marks were just a tad over 7.5 mm apart checking with a rule. No precision of course but close.

      The number printed on the ring in the basket of Olympia typewriters, just above and to the left of the word "De Luxe" is the distance from the baseline of the bottom slug character to the baseline of the top slug character.

      In many instances it will be 7.6. I'm curious what other typefaces show and if this thesis holds?

  5. Feb 2026
    1. Airbnb picks Alibaba’s Qwen over ChatGPT in a win for Chinese open-source AIAirbnb ‘relies heavily’ on Alibaba’s Qwen models to power its AI customer service agent, CEO Brian Chesky says

      Even US firms are using Chinese models because they are so much cheaper. They do not use them for everything, but where they can get away with lower cost options they will.

    1. Low-cost Chinese AI models forge ahead, even in the US, raising the risks of a US AI bubble Nvidia’s latest earnings report reassured some. But Chinese AI models are fast gaining a following around the world, underlining concerns over an ‘AI bubble’ centered on high-investment, high-cost US models.
    1. Some of those users became contributors, adding their expertise to the development of the project

      Las iniciativas que se amplían y permiten ver múltiples perspectivas, crecen debido a que el talento se puede esconder en las manos que no tienen la oportunidad.

  6. Jan 2026
    1. I had written that the only thing that all the different cultures hadin common was the human brain. Indigenous cultures, separated byvast spans of space and time, did not teach their incredibly similarmemory tools to one another. They must all use the same methodsfor innately human reasons.

      are they really innate?


      Some of my question is a tad rhetoric as I suspect that this current book is making an argument that there is a genetic basis for why/how it all works the way it does. It's also a question I know that Kelly has had buzzing around for a while.

      Large swaths of these practices have been taught and handed down from one person to another and from one group to another for millennia as well, but the other question is if they've been independently re-discovered across time or if they've changed/evolved the way in which languages have shifted over these same time frames.

    1. The kings had, however, begun to realizeits potential for extending communication, in an almost magical way,beyond what could be accomplished with the spoken word. Writingcould perpetually and eternally address an audience on a king’sbehalf; the words were always there, even when the king was notthinking about them. Given that the population was almost entirelyilliterate, such an audience was mostly made up of gods. Thestatuette of the king’s personal god (or sometimes of the kinghimself), inscribed with the same text as the tablet, could thereforepray continuously in a way that a real person could not.

      Is there stronger evidence that this form of permanent writing to an audience of gods was being done? Sources?

    2. The tablet wasfound by archaeologists in the foundations of the temple of Inannain Lagash, called the Ibgal. This extensive complex was oval inshape, as were many Early Dynastic temples in other cities, with alarge courtyard and a platform on which Inanna’s temple wasconstructed.

      What is the general history of oval-shaped architecture? Is there an explicit link between the Oval shape of the complex at Ibgal, the temple (or house) of Inanna in Lagash and the oval office at the White House?

      Keep in mind that modern knowledge of large portions of the Ancient Near East only surfaced after the 1800s, so the tradition would have required intermediaries from the ANE into other cultures to be passed down to the building of the White House in 1792.

    3. facts that no one couldconceivably commit to memory.

      This statement belies the power of orality and the size of built communities without literacy. It's more a question of understanding how it was done and how communities either trusted (or didn't) those who memorized the materials.

      Another factor is how long one needed to remember various facts, especially if for commerce and over what spaces?

      Were there stratifications of society based on the power of memory here? Compare the anthropology and archaeology with the studies by Lynne Kelly.

    1. Martin → chrisaldrich Yes, Chris, I even came across this site. Porstmanns Karteikunde was actually the publication that inspired my early Zettelkasten activities back when I was still a schoolboy, nearly half a century ago. And of course, Luhmann would have learned this kind of administrative practice in his first job, since it was widely used in offices at the time. I’ve always wondered whether he ever taught anything about it while working in Speyer.

      Martin reports having used Porstmanns Karteikunde in his youth circa 1975 when it was widely used in offices.

      Open question: Did Luhmann teach zettelkasten practices while at Speyer?

      (via https://forum.zettelkasten.de/profile/chrisaldrich)

    1. 3:58 "GrapheneOS ist das sicherste, bisher nie von einem Geheimdienst gehackte Betriebssystem."

      nein. selbst mit 100% open-source software, die man selber kompiliert mit einem open-source compiler, selbst damit hast du:<br /> closed-source hardware, closed-source firmware, closed-source netzwerktreiber, hardware backdoors in CPUs und GPUs, kompromittierende abstrahlung.<br /> also mit GrapheneOS kannst du deine attack surface nur verkleinern, aber sicher nicht auf null reduzieren.<br /> es ist auch immer die frage, was ist dein threat model, also wie mächtig sind deine gegner, und wie wichtig bist du.<br /> für state-level actors wie NSA oder Mossad bist du praktisch immer angreifbar.<br /> das betrifft praktisch alle consumer-grade hardware, und echte sicherheit hast du nur mit military-grade hardware, aber die kannst du nicht kaufen, genauso wie militärwaffen.<br /> opsec für anfänger... dabei haben wir 1000 andere probleme die jetzt wichtiger sind, vor allem selbstversorgung.

  7. Dec 2025
    1. Le Sneakernet : Repenser le Partage de Données à l'Ère de la Big Tech

      Résumé Exécutif

      Face à la mainmise croissante des géants de la technologie (Big Tech) sur les données personnelles et les infrastructures numériques, un mouvement alternatif émerge : le sneakernet.

      Ce concept, qui désigne le partage physique de fichiers hors ligne, s'oppose directement au modèle centralisé et commercial de l'internet actuel.

      Des collectifs d'artistes et d'activistes développent des initiatives concrètes pour réhabiliter des pratiques d'échange de données autonomes, locales et matérielles.

      Les principales conclusions de l'analyse des sources sont les suivantes :

      Le Problème Central : Les données hébergées sur des plateformes comme Google Drive, iCloud ou Instagram n'appartiennent pas aux utilisateurs mais aux entreprises qui les stockent.

      Celles-ci contrôlent l'accès, peuvent en modifier les conditions et exploitent les informations de navigation, créant une forte dépendance et un risque de surveillance.

      La Solution Sneakernet : Ce "réseau basket" repose sur l'échange physique de données (via clés USB, par exemple) à la "vitesse des jambes".

      Il représente une démarche de reprise de contrôle sur la circulation de l'information, en marge des infrastructures traditionnelles.

      Les Initiatives Clés :

      Les "Data-Foires" de l'Outdoor Computer Club : Des événements où les participants échangent des fichiers sur un ordinateur collectif, souvent alimenté par des sources d'énergie autonomes, promouvant une gestion consciente des ressources et une vision de la technologie comme un "commun".   

      Le projet "Dead Drops" d'Aram Bartholl : Un réseau mondial et participatif de clés USB scellées dans des murs, fonctionnant comme des "boîtes aux lettres mortes" anonymes pour l'échange de fichiers.   

      Les serveurs DIY du collectif Actinomy : Des ateliers pour construire ses propres mini-serveurs portables, permettant un hébergement local et privé, créant ainsi une "chambre à soi" numérique indépendante des grandes plateformes.

      La Philosophie Sous-jacente : Le mouvement critique "l'obésité de la donnée" et la course à la vitesse.

      Il propose de retrouver un "affect par rapport aux données" en privilégiant des échanges plus lents, plus intentionnels et en réutilisant des technologies plus anciennes pour répondre à des enjeux politiques actuels comme la surveillance.

      En conclusion, le sneakernet n'est pas une simple nostalgie technologique, mais une réponse politique et pratique à la structure de pouvoir de l'internet moderne.

      Il démontre que des alternatives artisanales et autonomes existent déjà pour échapper au contrôle des plateformes et repenser notre rapport à la technologie et aux données.

      1. La Problématique : Dépendance et Perte de Contrôle à l'Ère Numérique

      Le modèle dominant de l'internet actuel, contrôlé par un nombre restreint de grandes entreprises technologiques, pose un problème fondamental de souveraineté sur les données personnelles.

      Propriété des Données : Une fois stockés en ligne sur des services comme Google Drive, iCloud ou postés sur des réseaux sociaux, les fichiers, photos et documents "deviennent la propriété des plateformes numériques qui les hébergent."

      La perception de possession par l'utilisateur est une illusion, car ce dernier perd le contrôle direct sur ses propres créations.

      Contrôle de l'Accès : Les entreprises qui gèrent l'accès et le stockage (telles qu'Amazon, Microsoft, Oracle, Google et Meta) ont le pouvoir unilatéral de "décider de nous faire payer plus cher ou carrément de nous couper cet accès."

      Exploitation des Informations : L'acceptation des cookies autorise les entreprises à utiliser les informations de navigation des utilisateurs, transformant leurs goûts et intérêts en données monétisables.

      Dépendance Structurelle : La facilité d'utilisation de l'internet à haut débit et du stockage "infini" sur le cloud a créé une telle dépendance que l'on "n'imagine même plus comment faire sans".

      Cette situation est décrite comme une "mainmise des big tech sur nos vies."

      2. Le Sneakernet : Une Alternative au Réseau Global

      En réponse à cette centralisation, le sneakernet propose un paradigme radicalement différent, fondé sur l'échange physique et déconnecté.

      Définition : Le terme "sneakernet" signifie littéralement "réseau basket".

      Il désigne un réseau d'échange physique fonctionnant "à la vitesse des jambes".

      C'est "l'antithèse de l'internet actuel", où les données transitent par des infrastructures de câbles et d'ondes.

      Contrôle et Matérialité : Le principal avantage est le contrôle total sur le chemin de l'information.

      Comme le souligne un participant, "on a le contrôle sur par où l'information elle passe, dans ta poche, dans ta main et dans sa poche et donc en ça c'est hors du réseau."

      Une "Innovation" Rétro-Technologique : Le mouvement propose d'utiliser des technologies plus anciennes pour répondre aux problématiques contemporaines.

      Un organisateur explique : "Nous, on imagine qu'en prenant peut-être des technologies plus anciennes, on propose une autre vision de l'innovation."

      Cette approche est justifiée par le fait qu'elle a "du sens par rapport à ce qui se passe politiquement aujourd'hui autour de l'internet."

      3. Initiatives et Projets Phares

      Plusieurs collectifs d'artistes et d'activistes ont mis en place des projets concrets pour matérialiser les principes du sneakernet.

      Les "Data-Foires" de l'Outdoor Computer Club

      Ce collectif, dont les organisateurs utilisent les pseudonymes "Jeff Bisou" et "Xavier Nul", organise des événements d'échange de données hors ligne appelés "data-foires".

      Concept : Un ordinateur est installé dans un lieu (par exemple, une forêt), où les participants peuvent déposer et récupérer des données via des clés USB.

      Autonomie Énergétique : L'installation est souvent alimentée par des "batteries au lithium, de récupération" connectées à un convertisseur qui fournit un courant standard de 230 volts.

      Cette démarche soulève des questions sur la gestion collective de l'électricité, perçue non "comme une ressource infinie" mais en fonction des besoins réels.

      Contenus Partagés : Les échanges sont hétéroclites, incluant :

      ◦ Musique, logiciels, brochures. 

      ◦ Scans 3D.   

      ◦ Un documentaire de Mathieu Rigouste, "Nous sommes des champs de bataille".  

      ◦ Une thèse scientifique sur un hydrogel supramoléculaire utilisé pour cultiver des cellules cancéreuses.  

      ◦ Le site d'une maison d'édition, présenté en avant-première.

      Limites et Modération : Le système n'est pas parfait, avec la présence de "pas mal de fichiers corrompus" et de transferts incomplets.

      Cependant, la modération se fait "de manière fluide vu que tout le monde est là en présentiel", permettant de retrouver plus facilement une personne malveillante.

      Philosophie : L'initiative promeut l'idée de "penser l'ordinateur comme un commun".

      Le partage d'une machine unique s'oppose à l'usage individuel habituel et transforme la relation à la technologie en une pratique collective.

      Dead Drops par Aram Bartholl : Un Réseau d'Échange Anonyme

      Initié en 2010 par l'artiste et professeur d'art numérique Aram Bartholl, ce projet est l'une des incarnations les plus connues du sneakernet.

      Concept : Des centaines de clés USB sont scellées dans des murs et autres lieux publics à travers le monde, formant un "réseau d'échanges ouvert".

      Le nom "Dead Drops" est une référence aux "boîtes aux lettres mortes" utilisées en espionnage pour déposer des documents de façon anonyme.

      Caractère Participatif : Chacun peut installer une "dead drop" dans sa ville, contribuant ainsi à l'expansion du réseau.

      Évolution Politique : Initialement artistique, le projet a acquis une nouvelle signification militante avec la montée en puissance de Big Tech.

      Il invite désormais à s'interroger sur les moyens d'échapper "à la dépendance vis-à-vis des plateformes numériques, mais aussi à leur surveillance".

      Serveurs DIY du Collectif Actinomy : Reprendre le Contrôle de l'Hébergement

      Pour atteindre une autonomie complète, le collectif Actinomy, basé à Brême, propose d'apprendre à construire soi-même des serveurs locaux et privés.

      Concept : Lors d'ateliers "do-it-yourself", les participants fabriquent de "petits serveurs informatiques portables en forme de porte-clés".

      Fonctionnement : Ces mini-serveurs ne peuvent héberger qu'une page internet légère, accessible uniquement via un réseau Wi-Fi local très restreint.

      Le site n'est pas visible sur l'internet mondial mais sur un "petit réseau parallèle".

      Objectif : Cette démarche vise une "reprise de contrôle sur ses informations".

      Elle est comparée à la création de "sa propre chambre à soi dans la grande maison de l'Internet mondiale", en opposition aux immenses fermes de serveurs centralisées qui tournent 24/7.

      4. Principes et Philosophie du Mouvement Sneakernet

      Au-delà des aspects techniques, le sneakernet est porteur d'une vision critique et d'une philosophie alternative de la technologie.

      Critique de "l'Obésité de la Donnée" : Le mouvement remet en question la logique du "toujours plus" (plus de vitesse, plus de stockage).

      Il s'interroge : "Est-ce qu'on veut juste envoyer des fichiers hyper lourds le plus vite possible et tout, ou est-ce que on veut retrouver un certain affect par rapport aux données ?"

      Valorisation de la Donnée Précieuse : Dans un contexte de transfert physique, les participants ont tendance à apporter une "petite quantité de données", généralement celles qui "leur semblent précieuses", une sélectivité qui se perd avec le haut débit.

      L'Ordinateur comme un "Commun" : Le partage d'une seule machine lors des data-foires transforme l'ordinateur d'un objet personnel en une ressource collective, modifiant la relation individuelle à la technologie.

      Conscience Énergétique et Matérielle : L'utilisation de systèmes d'alimentation autonomes et de récupération force à une réflexion sur la gestion collective de l'énergie et sur l'empreinte matérielle des infrastructures numériques.

      Sécurité par la Proximité : La présence physique des participants lors des échanges crée une forme d'autorégulation et de responsabilité qui n'existe pas dans les interactions en ligne anonymes.

      5. Conclusion : Une Vision Alternative pour l'Avenir Numérique

      Le mouvement sneakernet, bien qu'il puisse paraître "utopique ou rétrograde", constitue une critique pertinente et une alternative tangible à l'écosystème numérique actuel.

      Il démontre que l'autonomie face aux grandes plateformes est possible.

      Le futur, selon cette perspective, pourrait impliquer de "moins stocker, moins partager et héberger en local pour vraiment échapper au contrôle des grandes plateformes".

      Ces alternatives artisanales et autonomes ne sont pas de simples expérimentations ; elles représentent une proposition politique concrète face aux défis de la surveillance et de la centralisation du pouvoir numérique.

    1. Their portability and verifiable nature make them a flexible and accessible way to recognize and communicate skills (Bowen & Thomas, 2014)

      Even before they were actually portable, a key benefit was rooted in portability and verifiability (and, to what purpose: "flexible and accessible way to recognize and communicate skills"). That is the WHY. And that ethos has been lost (or never acquired) by too many. There could be opportunity to refocus and zoom way in on the why and the key benefits.

    1. Fig. 3: View of selected dividers in ZK 19: “Religion – Myth”, “Mythology pragmatic”, “Venus and her entourage”, “Ancient Superstition Afterlife”, “Mysteries”. © Warburg Institute

      Somewhat curious of the dates/times of the creation of these tabbed cards. Surely made in the 20th century, but since Warburg was likely creating notes in the late 1800s, where does this sit with respect to the invention of the tab card in 1894 claimed by Progressive Indexing and Filing (Remington Rand, 1950, p205)?

    2. In a much cited anecdote by Fritz Saxl, Warburg’s long-term academic collaborator and first director of the Warburg Institute, we find Aby “standing tired and distressed, bent over his boxes with a packet of index cards, trying to find for each one the best place within the system”.[6]

      [6] Fritz Saxl, The History of Warburg’s Library (1886-1944) cited in Gombrich 1970, p. 329; Marchand 2023, p. 186; Steiner 2013, p. 155; Wedepohl 2014, p. 389.

      It's only in a physical card system one might worry a bit about "best place" for a card. Some of it is down to one's future self being able to find it, but cross-references could have been placed or an amanuensis might have created an exact copy for multiple copies in many locations.

      What does Ernst Bernheim have to say on the topic of filing?

  8. Nov 2025
    1. open field situation in Spain, then you will, uh, end up at the end of the growing season with four kilograms per square meter. If you do this in a high tech greenhouse in the Netherlands at the moment, you will end up with 80 kilograms

      for - comparison - food production - open field vs greenhouse - 4 kg / sq. meter - open field - 80 kg / sq. meter and 25% of open field water.- greenhouse

    1. He is the gloomy Lord of theDead in some, in others akind helpful spirit; he is animposing warrior and a littlefairy-king; he is fatal andterrible to people, and is saidto fetch them after theirdeath to his palace foreternal banquets; he is a black magician, a wicked demon, akin to andconfused with the devil, and he plays pleasant little tricks which show hisgood humour; he is quoted as an arbiter in disputes, and his name is usedin curses.

      Inspired by this section, though not specifically suggested:

      In Greek, Roman, and even Christian (saint) traditions, most gods (saints), were closely associated with one or potentially a few attributes which made it easier to give them short hand identifications and also to use them in mnemonic traditions. It would seem that in Celtic traditions, that the gods (or heroes) were better delineated people with broader and fuller characters which didn't play into this sort of mnemonic/oral piece in the same way.

      Donn in Irish traditions seems to fit this mold. What other evidences could be brought to bear to back this up?

  9. Oct 2025
    1. I use the end-pa-pers at the back of the book to makea personal index of the author's pointsin the order of their appearance

      The making of a personal index is a first step in building a mesh of knowledge. In just a few years, Vannevar Bush will speak of "associative trails" a phrase he uses twice in "As We May Think" (The Atlantic, July 1945), but of potentially more import is his phrase "associative indexing" which lays way to either juxtaposing or linking two ideas (either similar or disjoint) together. It bears asking the question of of whether it's more valuable to index and juxtapose similar ideas or disjoint ideas which may more frequently lead to better, more useful, and more relevant and rich future ideas.

      It affords an immediate step, however, to associative indexing, the basic idea of which is a provision whereby any item may be caused at will to select immediately and automatically another. This is the essential feature of the memex. The process of tying two items together is the important thing. Bush, Vannevar. 1945. “As We May Think.” The Atlantic 176: 101–8. https://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/ (October 22, 2022). #

    1. ✍️ Systems I Use: Commonplace Book Zettelkasten

      Someone who indicates that they use both "commonplace book" and "zettelkasten" systems. I'm curious how they differentiate the two, particularly because they seem to both be done on index cards.

      Sort of sounds like zettles are her own ideas vs. commonplace for the ideas of others.

      At 4:40 she seems to use linear numbering on her zettels and not Luhmann-artig numbering.

  10. Sep 2025
    1. In calling the structure of the chromosome fibres a code-script

      from where does he draw the idea "code-script"? Is it from the developing information theory of the time? Somewhere else?

      There is definitely the idea of a code running in the sense of programming, which was likely not a common conceptualization at the time.


      On p. 22 he uses the phrase "law-code" which is likely the closer meaning of code he's using and not the sense of genetic code as understood much later when DNA and the underlying protein coding sequences were unraveled.

      Morse code may also be a tangential underlying meaning of his sense of "code" as something unknown but potentially revealable.

    2. Why shouldan organ like our brain, with the sensorial system attached toit, of necessity consist of an enormous number of atoms, inorder that its physically changing state should be in close andintimate correspondence with a highly developed thought?
    3. The large and important and very much discussed question is:How can the events in space and time which take place withinthe spatial boundary of a living organism be accounted for byphysics and chemistry?

      the question on which he'll be focusing the book

      Come back when we're done to see how well he may have answered it.

    1. Perhaps we should expect to see more elections that are eitherextremely close or extremely lopsided from here on out. If opposingSiren Servers are well run, they might achieve parity, while if one isbetter than the other, its advantage ought to be dramatic. It’s too earlyto say, since big data and politics haven’t mixed long enough togenerate much data as yet. It’s like climate change was for a long time—not enough data yet to really say—though it does look like we’reseeing this pattern.

      are we seeing patterns? who/what are the big influencers?

    2. While we have yet to see how Google’s book scanning will play out, amachine-centric vision of the project might encourage software that treats books as grist for the mill,decontextualized snippets in one big database, rather than separate expressions from individual writers. Inthis approach, the contents of books would be atomized into bits of information to be aggregated, and theauthors themselves, the feeling of their voices, their differing perspectives, would be lost. Needless to say,this approach would hide its tracks so that it would be hard to send a nanopayment to an author who hadbeen aggregated.

      Alternately, where is the value in a slip box?

    1. The free-software movement is driving legions of programmers to create thousands of open-source projects, including operating systems. Sites like http://freshmeat.net/ and http://distrowatch.com/ provide portals to many of these projects. As we stated earlier, open-source projects enable students to use source code as a learning tool. They can modify programs

      The free software movement encourages programmers to create many open source projects, including operating systems. These projects are helpful for students because they can read the source code, learn from it, and even change it to practice. Websites like Freshmeat.net and DistroWatch.com are very useful because they collect and share lots of information about open-source software. Freshmeat.net lets people find new software updates, while DistroWatch.com gives details and comparisons of different Linux distributions. Both websites are good resources for learning, exploring, and supporting the open source community.

  11. Aug 2025
  12. Jul 2025
    1. Abstract

      In May & June 2025, Duke University Libraries (DUL) staff successfully implemented Anubis, a configurable open source web application firewall (WAF), in order to stave off persistent onslaughts of AI-related bot scraping activity. During this pilot period (May 1 - June 10, 2025), aggressive bot scraping led to extended outages for three critical library platforms (Duke Digital Repository, Archives & Manuscripts, and the Books & Media Catalog), and in each case, implementing Anubis mitigated the problem.

      Permalink

      https://hdl.handle.net/10161/32990

      Citation

      Aery, Sean (2025). Anubis Pilot Project Report - June 2025. Retrieved from https://hdl.handle.net/10161/32990.

  13. Jun 2025
    1. Governments must prohibit planned obsolescence and champion the right to repair. Current hardware business models encourage devices, including servers needed for AI, to break prematurely in a practice called planned obsolescence. Industry and policymakers should incentivise circularity and longevity to extend the life of existing hardware. Furthermore, the right to repair and freely modify technology products should be strengthened.

      Aligns with motivations for open source tech.

  14. May 2025
    1. Anthropic researchers said this was not an isolated incident, and that Claude had a tendency to “bulk-email media and law-enforcement figures to surface evidence of wrongdoing.”

      for - question - progress trap - open source AI models - for blackmail and ransom - Could a bad actor take an open source codebase and twist it to do harm like find out about an rogue AI creator's adversary, enemy or victim and blackmail them? - progress trap - open source AI - criminals - exploit to identify and blackmail victiims

    1. for - adjacency - Michelin star - Michelin tires - I never made the connection until now! Wow! - key insight - Michelin stars - a scam

      summary - This documentary was very eye-opening - As a foodie, I've always viewed the Michelin start system as representing the best and most creative culinary ideas - It's shocking and disappointing to see how exploitative it is - This expose does tie together many feelings of cognitive dissonance I've seen surrounding it - For example, I saw the cartoon character pose a few times but I never made the connection that it was the same avatar as the Michelin tire's avatar - Then when I saw the history and the two brothers who started the Michelin tire company, it suddenly made sense - It is a pay-to-play, Euro-colonialist system that performs cultural appropriation

      alternative to - Michelin Guide - This revelation is disheartening as it destroys a myth I have long lived with - It also raises an opportunity in the form of a question - ? - Can we create a global open-source guide that is based on authentic, unbiased culture?

  15. Apr 2025
  16. Mar 2025
    1. for - Indyweb dev - open source AI - text to graph - from - search - image - google - AI that converts text into a visual graph - https://hyp.is/KgvS6PmIEe-MjXf4MH6SEw/www.google.com/search?sca_esv=341cca66a365eff2&sxsrf=AHTn8zoosJtp__9BMEtm0tjBeXg5RsHEYA:1741154769127&q=AI+that+converts+text+into+visual+graph&udm=2&fbs=ABzOT_CWdhQLP1FcmU5B0fn3xuWpA-dk4wpBWOGsoR7DG5zJBjLjqIC1CYKD9D-DQAQS3Z598VAVBnbpHrmLO7c8q4i2ZQ3WKhKg1rxAlIRezVxw9ZI3fNkoov5wiKn-GvUteZdk9svexd1aCPnH__Uc8IUgdpyeAhJShdjgtFBxiTTC_0C5wxBAriPcxIadyznLaqGpGzbn_4WepT8N6bRG3HQLK-jPDg&sa=X&ved=2ahUKEwju5oz8ovKLAxW6WkEAHaSVN98QtKgLegQIEhAB&biw=1920&bih=911&dpr=1 - to - example - open source AI - convert text to graph - https://hyp.is/UpySXvmKEe-l2j8bl-F6jg/rahulnyk.github.io/knowledge_graph/

    1. Nach den Erfahrungen mit den Angriffen der ersten Trump-Administration auf die Wissenschaft haben Wissenschaftler:innen in den USA verschiedene Maßnahmen zum Schutz wissenschaftlicher Institutionen ergriffen. Die New York TImes berichtet ausführlich über diese scientific integrity policies, die wissenschaftliche Arbeit öffentlich beobachtbar machen, aber politische Einflussnahme ausschließen sollen. Die Biden- und schon die Obama-Administration haben scientific integrity policies gefördert. Zu den Maßnahmen gehören die Benennung von Verantwortlichen für wissenschaftliche Integrität in Behörden und Kollektivverträge, die die Disziplinierung von Forschenden erschweren.

      Zum „War on Science“ schon der ersten Trump-Regierung gehörte außer Entlassungen von Wissenschaftler:innen auch die Anordnung der Verfälschung von Forschungsergebnissen. https://www.nytimes.com/2025/01/17/climate/trump-government-scientists.html

  17. Feb 2025
  18. Jan 2025
    1. I often come acrosssubmissions that neglect to read and/or fairly cite its own source materials.

      this comment really made me pause and consider the amount of times I have cited an article or piece without reading the entirely of it, simply because a particular passage or section well supported what I was writing about. I know many people who find sources for their papers, rather than building their papers around the sources & reading the material first, and I think this shows the current regard of academia for the importance of creating (writing) vs engaging (reading)

    1. was sitting with a climate denier, a collapsist, a deep adaptationist, and an impact investor. You can say a greenwasher if you want to be mean about it. Anyway, they were talking peacefully and respectfully, and I thought, "Wow, this is more than what I thought. This is not just money. This is, there's community there

      for - open space for perspectival knowing - SOURCE - Youtube Ma Earth channel interview - Devcon 2024 - Cosmo Local Commoning with Web 3 - Michel Bauwens - 2025, Jan 2

  19. Dec 2024
    1. something really interesting also happened. Because I was genuinely interested in them, they started to get curious about me.

      for - progressive queer visits Trump rally - genuine and open curiosity of the other is reciprocated - from TED Talk - Can curiosity heal division? - Scott Shigeoka - 2024 Dec

    1. shi-ne

      for - definition - Shi-ne - Shamatha without object - open awareness - the Tibetan meditation practice of becoming aware of our habitual tendency to reify and essentialize phenomena, experiencing them as having independent, non-relational reality of their own, both for - inner phenomena (thoughts and emotions) - outer phenomena (sensations) - It also goes by two other names - Shamatha without object - open awareess - from Medium article - Heart Sutra and the nyams of Dzogchen - Aleander Vezhnevets - 2022, Sept 7 - adjacency - Tibetan shi-ne meditation - insight into our habit of reifying reality into objects - object permanence in child psychology - feral children and role of language enculturation in our constructed reality - Deep Humanity BEing journeys to give insight into deeper layer of phenomenological experience

      adjacency - between - Tibetan shi-ne meditation - insight into our habit of reifying reality into objects - object permanence in child psychology - Dr. Oliver Sacks medical case histories - feral children and absence of enculturation on human experience of reality - potential Deep Humanity BEing journeys to penetrate early deep conceptual layer - new relationship - question - Is shi-ne, in one sense attempting to get us to penetrate our deep conditioning of object permanence in our early child development years? - Before we mastered object permanence, we essentially experienced really as an undivided whole, a gestalt - To understand how non-trivial construction of object permanence is, we can read the late Dr. Oliver Sacks writing on his medical case studies of patients whose medical conditions caused them to experience reality in the danger way ordinary people do - The study of feral children also provides important insights into linguistic conditioning's role in our construction of reality - This area can inspire many important Deep Humanity BEing journeys relating - our habitual propensity to reify - object permanence - Shi-ne meditation and to offer us a way to penetrate our early deep conditioning of object permanence - Doing so allows us to get in touch with a pure, unconditioned, more primordial experience of reality free from layers of deep conceptualisation

    1. the first one is the paradox of pronouncement. And here we recognize that language is both incredibly useful for us and is evocative and helps us create and and see and be in this reciprocal exchange. And we also are trying to open to a non dual embodied cognition that is beyond the written word and beyond the hegemony of the written word, and indeed the hegemony of the English written word

      for - paradoxes - first one - pronouncement - the written word - evocative - but also hegemonic - especially the English language - there are other oral traditions - try to open nondual embodied cognition using English - Post Capitalist Philanthropy Webinar 1 - Alnoor Ladna - Lynn Murphy - 2023

  20. Nov 2024
    1. Whereas Otlet and Kaiser were in substantial agreement on both thedesirability of information analysis and its technological implementation inthe form of the card system, they parted company on the question of howindex files were to be organized. Both men favored organizing informationunits by subject, but differed as to the type of KO framework that shouldgovern file sequence: Otlet favored filing according to the classificatory orderof the UDC, whereas Kaiser favored filing according to the alphabeticalorder of the terms used to denote subjects

      Compare the various organizational structures of Otlet, Kaiser, and Luhmann.


      Seemingly their structures were dictated by the number of users and to some extent the memory of those users with respect to where to find various things.

      Otlet as a multi-user system with no single control mechanism or person, other than the decimal organizing standard (in his case a preference for UDC), was easily flexible for larger groups. Kaiser's system was generally designed, built and managed by one person but intended for use by potentially larger numbers of people. He also advised a conservative number of indexing levels geared toward particular use-cases (that is a limited number of heading types or columns/rows from a database perspective.) Finally, Luhmann's was designed and built for use by a single person who would have a more intimate memory of a more idiosyncratic system.

    1. Over a few weeks, I came to comprehend that the sound of one hand clapping is an illusion. The hand’s movement mimics clapping, but the only way to make the illusion a reality is to add a second hand. The sound of one hand clapping can be imagined, but the clap doesn’t exist until another hand is present. With that realization, I recognized the koan’s question as a way to understand the Buddhist doctrine of emptiness (śūnyavāda in Sanskrit), which says that no individual thing or person has any intrinsic existence, but exists only relationally, dependent on everything else. The concept of an individual nature is, like one hand clapping, an illusion.

      How does this speak to (or not) the idea of coherence in quantum mechanics?

    2. As some research shows, knotty life questions without clear answers can evoke a dark mood without any clear biological explanation. This can be particularly difficult for adolescents, pondering for the first time big questions about fate and death, emptiness and meaninglessness, guilt and condemnation.

      Is this a possible reason why reading great books in youth is so useful?

    1. Just this week I co-facilitated such a process in Colombia, last week in Brazil at the pre-opening events in Rio (G20), and also with other colleagues earlier this year in Chile (cross-sector), and in Indonesia (with the newly elected government and cabinet).

      for - Indyweb dev - Presencing Institute - U-lab - natural application - weaving together these subnets with mindplexes via open source SRG complexity mapping tools in the Indyweb

    1. Poverty, by America

      the title of the book implies an ownership of poverty (by America)... there's also an implication of authorial voice as if America is a "creator", but specifically a creator of poverty as much as it is a creator of wealth

      In the framing of toxic capitalism, it's almost as if one of the things America is good at manufacturing is poverty.

      If we've outsourced most of our manufacturing sector, why not also include poverty?!?

    1. Résumé de la vidéo [00:00:04][^1^][1] - [01:04:37][^2^][2]:

      Cette vidéo est un webinaire sur la co-construction d'un événement Festisol au sein d'un collectif. Elle présente divers intervenants et projets axés sur les communs en santé, notamment en Afrique.

      Moments forts: + [00:00:04][^3^][3] Introduction et objectifs du webinaire * Présentation des intervenants * Importance des communs en santé * Objectifs de la session + [00:01:00][^4^][4] Présentation de la communauté Africa Osh * Conception de matériel open source * Collaboration entre chercheurs et amateurs * Projets en Afrique + [00:18:01][^5^][5] Discussion sur la gestion des communautés * Importance de l'animation communautaire * Financement et bénévolat * Exemples de projets européens + [00:32:01][^6^][6] Présentation du projet Elsa dott Ayo * Solutions de santé basées sur OpenStreetMap * Validation des données * Stratégies de collecte de fonds + [00:52:01][^7^][7] Intervention de Médard Bayazon * Réseau des fablabs francophones d'Afrique de l'Ouest * Projets de santé et d'éducation * Collaboration Nord-Sud

      Résumé de la vidéo [01:04:39][^1^][1] - [01:24:42][^2^][2]:

      Cette vidéo traite de la co-construction d'événements Festisol au sein d'un collectif, en mettant l'accent sur les partenariats, la mobilisation des ressources, et l'importance de l'humain dans les projets.

      Points forts : + [01:04:39][^3^][3] Mobilisation des ressources * Ouverture à tous types de partenariats * Importance de démontrer l'efficacité des projets * Exemples de projets réussis pendant la crise du coronavirus + [01:06:01][^4^][4] Croissance des fablabs francophones * Expansion rapide du réseau en Afrique de l'Ouest * Importance de la solidarité et des communs * Défis liés à la propriété intellectuelle + [01:08:04][^5^][5] Exemples concrets d'Oxfam * Importance de centrer les projets sur l'humain * Utilisation du téléphone pour améliorer l'accès aux services de santé * Stratégies pour surmonter les obstacles culturels et logistiques + [01:15:03][^6^][6] Stratégies avancées pour la santé * Déplacement des sages-femmes vers les villages * Utilisation de l'échographie mobile et de l'énergie solaire * Formation des marraines pour créer des liens avec les bénéficiaires + [01:21:00][^7^][7] Importance de l'appropriation des projets * Adaptation des solutions techniques aux réalités locales * Partage des résultats et des méthodes * Impact des projets sur les communautés locales

  21. Oct 2024
    1. They ensure wonderful rapidity. A whole bookof thirty thousand words I have prepared (though ofcourse only roughly) in two hours, by the Card-System.Such a pace would have been impossible otherwise.This does not include any of the Dictation ; it merelyincludes the Collection and Selection of Ideas, andtheir Arrangement. The System is a wonderful savingof time,

      What work exactly does Miles include in his description of preparation of a 30,000 word book in two hours?

      He specifically excludes dictation. He does include selection of ideas and arrangement. He also says it includes "collection", but I'm supposing that he's taking a larger tranche of cards from a possibly massive collection and collecting only those he needs right now? Certainly the reading, thinking, and collecting work can't be included in this two hours of work.

      Does he have a better definition of what he means by collection?

    2. When theyhave been finished they may be spread out on a tableor on several tables. If you can get a table with pegs,or something to mark the divisions between the packets,it will be so much the better.

      How is he using pegs on a table exactly? Is this something like the Brothers Grimm, but table-based rather than wall based?

    3. Connecting Linkbetween twoSentences orParagraphs,

      Miles, 1905 uses an arrow symbol with a hash on it to indicate a "connecting link between two Sentences or Paragraphs, etc."

      It's certainly an early example of what we would now consider a hyperlink. It actively uses a "pointer" in it's incarnation.

      Are there earlier examples of these sorts of idea links in the historical record? Surely there were circles and arrows on a contiguous page, but what about links from one place to separate places (possibly using page numbers?) Indexing methods from 11/12C certainly acted as explicit sorts of pointers.

    4. Objections to the Card-System,

      Miles lists the following objections: - expense - inconvenience - unusual (new, novel)

      Notice that he starts not with benefits or affordances, but with the objections.

      What would a 2024 list of objections look like? - anachronism - harder than digital methods - lack of easier search - complexity - ... others?

    1. Beyond the cards mentioned above, you should also capture any hard-to-classify thoughts, questions, and areas for further inquiry on separate cards. Regularly go through these to make sure that you are covering everything and that you don’t forget something.I consider these insurance cards because they won’t get lost in some notebook or scrap of paper, or email to oneself.

      Julius Reizen in reviewing over Umberto Eco's index card system in How to Write a Thesis, defines his own "insurance card" as one which contains "hard-to-classify thoughts, questions, and areas for further inquiry". These he would keep together so that they don't otherwise get lost in the variety of other locations one might keep them

      These might be akin to Ahrens' "fleeting notes" but are ones which may not easily or even immediately be converted in to "permanent notes" for one's zettelkasten. However, given their mission critical importance, they may be some of the most important cards in one's repository.

      link this to - idea of centralizing one's note taking practice to a single location

      Is this idea in Eco's book and Reizen is the one that gives it a name since some of the other categories have names? (examples: bibliographic index cards, reading index cards (aka literature notes), cards for themes, author index cards, quote index cards, idea index cards, connection cards). Were these "officially" named and categorized by Eco?

      May be worthwhile to create a grid of these naming systems and uses amongst some of the broader note taking methods. Where are they similar, where do they differ?


      Multi-search tools that have full access to multiple trusted data stores (ostensibly personal ones across notebooks, hard drives, social media services, etc.) could potentially solve the problem of needing to remember where you noted something.

      Currently, in the social media space especially, this is not a realized service.

  22. Sep 2024
    1. You need to understand that the person you are reaching out to has probably spent 100s of hours working on this project, for free. They do not owe you anything. The maintainers are extending a courtesy by giving away their work for free and then making themselves available to support it. The point is, you should try and be nice when filing for support. The maintainer of the project has literally no obligation to help you.
    1. Foam is an open-source alternative to RoamResearch and Obsidian, and it works on the basis of Git version control system and Visual Studio Code code editor.

      for - notetaking software - Obsidian - Roam Research - open source alternative to - Foam

      notetaking software - Obsidian - Roam Research - open source alternative to - Foam - Microsoft owns Github and Foam is served from Github

      to - Foam - https://hyp.is/Pf6tKnXBEe-rkdcD0hmZGA/foambubble.github.io/foam/

    1. when a open AI developed a gp4 and they wanted to test what this new AI can do they gave it the task of solving capture puzzles it's these puzzles you encounter online when you try to access a website and the website needs to decide whether you're a human or a robot now uh gp4 could not solve the capture but it accessed a website task rabbit where you can hire people online to do things for you and it wanted to hire a human worker to solve the capture puzzle

      for - AI - progress trap - example - no morality - Open AI - GPT4 - could not solve captcha - so hired human at Task Rabbit to solve - Yuval Noah Harari story

    1. Résumé de la vidéo [00:00:08][^1^][1] - [00:29:08][^2^][2]:

      Ce webinaire présente une formation sur la création de ressources respectueuses du droit d'auteur, organisée par l'Université de Perpignan via Domitia. Sylvain Chatry, maître de conférences en droit, explique les objectifs pédagogiques, la structure du cours et les compétences acquises.

      Moments forts: + [00:03:03][^3^][3] Introduction de la formation * Présentation par Sylvain Chatry * Objectifs de la formation * Public cible + [00:05:28][^4^][4] Contenu de la formation * Identification des droits de propriété intellectuelle * Différence entre droit d'auteur et copyright * Conditions de protection par le droit d'auteur + [00:12:23][^5^][5] Respect des droits d'exploitation * Importance de demander des autorisations * Conditions d'utilisation des œuvres protégées * Précautions à prendre lors de l'intégration de contenus + [00:14:00][^6^][6] Structure et durée du cours * Micro-certification de 3 semaines * 15 heures de travail réparties sur 3 semaines * Évaluation par quiz et tâche de certification + [00:20:57][^7^][7] Questions des participants * Coût de la formation * Accessibilité et prérequis * Sessions futures et disponibilité des cours

      N'hésitez pas à poser d'autres questions si vous en avez!