- Jun 2024
-
docdrop.org docdrop.org
-
Résumé de la vidéo [00:00:04][^1^][1] - [00:16:38][^2^][2]:
La vidéo explore la perception des qualités restauratrices des environnements naturels et urbains à travers le prisme de la vie humaine, en se concentrant sur les liens sociaux, la présence, la peur et la sécurité émotionnelle. Elle souligne l'importance des relations interpersonnelles et de la théorie de l'attachement dans le développement de l'individu.
Points forts: + [00:00:12][^3^][3] Les liens sociaux * L'importance des expériences et des rencontres * L'influence des interactions sur notre bien-être * La notion d'interdépendance et de connexion sociale + [00:02:21][^4^][4] La présence et l'attention * La force de la présence dans les relations parent-enfant * L'impact de la grossesse psychique sur la parentalité * La nécessité d'être pleinement présent dans la vie + [00:07:36][^5^][5] La peur et la sécurité émotionnelle * La peur comme émotion influente dans nos vies * La régulation des peurs pour une vie épanouie * Le besoin fondamental de sécurité émotionnelle + [00:11:50][^6^][6] La théorie de l'attachement * L'importance des premières années de vie dans la construction des relations * L'impact de la qualité des liens et de l'environnement sur le développement * La sécurité émotionnelle comme enjeu sociétal et individuel
-
- Nov 2023
-
en.wikipedia.org en.wikipedia.org
-
Moreover, social logins are often implemented in an insecure way. Users, in this case, have to trust every application which implemented this feature to handle their identifier confidentially.
-
- Sep 2023
-
www.digitalocean.com www.digitalocean.com
-
In many ways, mail server stacks represent a collision between the tools and values of the early internet — self-hosting open source software using well-defined standards and interoperable protocols — and the reality of the modern internet — a few centralized, trusted authorities.
-
- Jun 2023
-
www.lrb.co.uk www.lrb.co.uk
-
Roth asks ‘how might our own reading of early modern sources change if we had access to the oral spheres within which they were embedded and which framed their reception?’
The level of orality in societies can radically change our perceptions of their histories, though quite often this material is missing in our evaluations.
-
- Jan 2023
-
laudatortemporisacti.blogspot.com laudatortemporisacti.blogspot.com
-
Basil Lanneau Gildersleeve, "Brief Mention," American Journal of Philology 20.1 (1899) 108-113 (at 108): With all our advance in scientific astronomy, the average modern man is not so familiar with the sky as was his antique brother, and some of the blunders in modern works of fiction that are scored from time to time in scientific journals would hardly have been possible for a ploughman of antiquity, not to say a sailor. The world needs every now and then a reminder that the modern head holds different things from the ancient brain-pan, not necessarily more.
How painfully true this may have been in 1899, it's now much worse in 2023!
Specialization of knowledge tends to fit the lifeways of the people who hold and maintain it. Changing lifeways means one must lose one or more domains and begin using or curating different domains of knowledge.
In a global world of specialization, humans who specialize are forced to rely more heavily on the experience and veracity of those around them who have also specialized. One may be able to have a Ph.D. in astrophysics, but their knowledge of the state of the art in anthropology or economic policy may be therefore utterly undeveloped. As a result they will need to rely on the knowledge and help of others in maintaining those domains.
This knowledge specialization means that politicians will need to be more open about what they think and say, yet instead politicians seem to be some of the least knowledge about almost anything.
This is just the start of a somewhat well-formed thesis I've developed elsewhere, but not previously written out... more to come...
-
- Apr 2022
-
twitter.com twitter.com
-
Adam Kucharski. (2021, February 6). COVID outlasts another dashboard... Https://t.co/S9kLCva3WQ Illustrates the importance of incentivising sustainable outbreak analytics—If a tool is useful, people will come to rely on it, which creates a dilemma if it can’t be maintained. [Tweet]. @AdamJKucharski. https://twitter.com/AdamJKucharski/status/1357970753199763457
-
- Jan 2022
-
-
An over-reliance on numbers often leads to bias and discrimination.
By their nature, numbers can create an air of objectivity which doesn't really exist and may be hidden by the cultural context one is working within. Be careful not to create an over-reliance on numbers. Particularly in social and political situations this reliance on numbers and related statistics can create dramatically increased bias and discrimination. Numbers may create a part of the picture, but what is being left out or not measured? Do the numbers you have with respect to your area really tell the whole story?
-
- Nov 2021
-
psyarxiv.com psyarxiv.com
-
Walther, A., Eggenberger, L., Grub, J., Ogrodniczuk, J. S., Seidler, Z. E., Rice, S., Kealy, D., Oliffe, J. L., & Ehlert, U. (2021). Examining the role of traditional masculinity and depression in men’s risk for contracting COVID-19. PsyArXiv. https://doi.org/10.31234/osf.io/6rp8u
-
- Apr 2021
-
en.wikipedia.org en.wikipedia.org
-
A good heuristic is to not trust the libraries you did not write either.
-
- Mar 2021
-
www.chevtek.io www.chevtek.io
-
he goes on to talk about third party problems and how you're never guaranteed something is written correctly or that even if it is you don't know if it's the most optimal solution
-
-
news.ycombinator.com news.ycombinator.com
-
-
I suspect you aren't seeing much discussion because those who have a reasonable process in place, and do not consider this situation to be as bad as everyone would have you believe, tend not to comment on it as much.
-
-
www.usenix.org www.usenix.org
-
-
Unfortunately, this open nature also causes security risks, asevidenced by recent incidents of single packages that brokeor attacked software running on millions of computers.
-
- Feb 2021
-
stackoverflow.com stackoverflow.com
-
As soon as you're displaying content from another domain, you're basically trusting that domain not to serve-up malware. There's nothing wrong with iframes per se. If you control the content of the iframe, they're perfectly safe.
-
- Jan 2021
-
askubuntu.com askubuntu.com
-
I'm very (VERY!) tempted to use that ppa, but without offense to it's maintainers... it's just some random ppa. If it had more "traction" I'd use it. Right now it has only 3 maintainers.
-
-
discourse.ubuntu.com discourse.ubuntu.com
-
« Half solved » because, hey, still it’s proprietary so who knows ? You have to trust the software editor then, it’s just moving the trust cursor.
-
- Nov 2020
-
github.com github.com
-
obviously it's too late, but it's a good practice to keep the 3rd party dependencies mirrored in your own infrastructure :) There is NO GUARANTEE that even a huge site (like launchpad for downloading DEBs) won't go down over a period of time.
-
- Aug 2020
-
www.onthegosystems.com www.onthegosystems.com
-
The straightforward solution to integrate WPML with third party translation services was to do it via dedicated plugins. A separate plugin for each company offering translation services could do the trick. However, this approach had a few drawbacks. For example, WPML developers would need to update and test all these plugins whenever the WPML core plugins received an update, and vice versa; when the API used by the external service changed, you needed to incorporate the change to WPML and test it as well.
-
- Jul 2020
-
amp.dev amp.dev
-
If you have worked with emails before, the idea of placing a script into an email may set off alarm bells in your head! Rest assured, email providers who support AMP emails enforce fierce security checks that only allow vetted AMP scripts to run in their clients. This enables dynamic and interactive features to run directly in the recipients mailboxes with no security vulnerabilities! Read more about the required markup for AMP Emails here.
-
- May 2020
-
analytics.google.com analytics.google.com
-
Free data-driven attribution model Use Google’s advanced machine learning to more accurately distribute credit to all ad clicks that led to a conversion
In other words, "just trust us" to magically figure it all out.
I'd trust you more if you explained more about how do it. Maybe if I clicked "Learn more"?
-
-
www.w3.org www.w3.org
-
The "'strict-dynamic'" source expression aims to make Content Security Policy simpler to deploy for existing applications who have a high degree of confidence in the scripts they load directly, but low confidence in their ability to provide a reasonable list of resources to load up front.
-
-
developers.google.com developers.google.com
-
Adding third-party scripts to a page implies a level of trust in the origin. There are some strategies you can take to minimize their impact on performance and security:
-
-
-
Djalante, R., Lassa, J., Nurhidayah, L., Van Minh, H., Mahendradhata, Y., Phuong, N. T. N., … Sinapoy, M. S. (2020, May 2). The ASEAN’s responses to COVID-19: A policy sciences analysis. Retrieved from psyarxiv.com/8347d
-
- Apr 2020
-
forums.tomsguide.com forums.tomsguide.com
-
There is MiniKeePass on the iOS App Store, but I'm not sure if I trust it not to make off with my data. Also, syncing between my PC and the app would be a pain. (1Password has local WiFi sync) There is also KeeFox for Firefox integration, but I'm not sure if I trust that either. In short, I trust KeePass itself, but I'm not sure if I can trust the third-party developers of the mobile app and browser extension.
-
-
www.datatables.net www.datatables.net
-
If you don't receive a reply, even if you do provide all the information required to show the issue, be aware that the forums are a very busy place. There are more than 40 new threads a day asking for assistance and not every one can be freely answered.
-
- Mar 2020
-
www.iubenda.com www.iubenda.com
-
you have less direct control as you must rely on the vendor’s adherence to IAB’s guidelines for compliance.
-
-
www.graphitedocs.com www.graphitedocs.comGraphite1
-
Own Your Encryption KeysYou would never trust a company to keep a record of your password for use anytime they want. Why would you do that with your encryption keys? With Graphite, you don't have to. You own and manage your keys so only YOU can decrypt your content.
-
-
www.iubenda.com www.iubenda.com
-
Please consider that using this method means that you do not directly block the vendor scripts yourself, therefore, the success of this method depends heavily on the individual vendors’ adherence to regulation.
-
- Aug 2019
-
www.ongcindia.com www.ongcindia.com
-
Reliance Capital Equity Fund in which ONGC invested and was an active player in the market. Look at the dates
-