30 Matching Annotations
  1. Jun 2020
    1. The EARN IT act turns Section 230 protection into a hypocritical bargaining chip. At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesn’t comply with these recommendations will lose their Section 230 protection.
    2. Broadly speaking, Section 230 of the Communications Decency Act protects online platforms in the United States from legal liability for the behavior of their users. In the absence of this protection, many of the apps and services that are critical to the way the internet functions today may have never been created in the first place – or they couldn’t have been created in America.
    1. A year’s worth of cajoling back and forth has ultimately resulted in the EARN-IT bill wending its way through the U.S. system, a bill that, if passed, would see messaging services become legally responsible for the content on their platforms. While not mandating backdoors, per se, without some form of probes into message content, the argument runs that the punitive risks become unsurvivable.
    2. there’s a bill tiptoeing through the U.S. Congress that could inflict the backdoor virus that law enforcement agencies have been trying to inflict on encryption for years... The choice for tech companies comes down to weakening their own encryption and endangering the privacy and security of all their users, or foregoing protections and potentially facing liability in a wave of lawsuits.
    1. Once the platforms introduce backdoors, those arguing against such a move say, bad guys will inevitably steal the keys. Lawmakers have been clever. No mention of backdoors at all in the proposed legislation or the need to break encryption. If you transmit illegal or dangerous content, they argue, you will be held responsible. You decide how to do that. Clearly there are no options to some form of backdoor.
    1. Despite its opposition, EARN-IT is the clearest threat yet to end-to-end encryption, given this clever twist in pushing the onus onto the platforms to avoid transmitting illegal content, rather than mandating a lawful interception approach.
    2. Tiring of the privacy and safety debate, those behind EARN-IT have proposed making the platforms responsible for the content they transmit, encrypted or not. This would mean, as explained by Sophos, that tech companies “either weaken their own encryption and endanger the privacy and security of all their users, or forego protections and potentially face liability in a wave of lawsuits.”
    1. The Digital Millennium Copyright Act (DMCA) has notable safe-harbor provisions which protect Internet service providers from the consequences of their users' actions. (Similarly, the EU directive on electronic commerce provides a similar provision of "mere conduit" which, while not exactly the same, serves much the same function as the DMCA safe harbor in this instance.)
  2. Apr 2020
    1. Spikes Spikes are a type of exploration Enabler Story in SAFe. Defined initially in Extreme Programming (XP), they represent activities such as research, design, investigation, exploration, and prototyping. Their purpose is to gain the knowledge necessary to reduce the risk of a technical approach, better understand a requirement, or increase the reliability of a story estimate. Like other stories, spikes are estimated and then demonstrated at the end of the Iteration. They also provide an agreed upon protocol and workflow that Agile Release Trains (ARTs) use to help determine the viability of Epics. Details Agile and Lean value facts over speculation. When faced with a question, risk, or uncertainty, Agile Teams conduct small experiments before moving to implementation, rather than speculate about the outcome or jump to a Solution. Teams may use spikes in a variety of situations: Estimate new Features and Capabilities to analyze the implied behavior, providing insight about the approach for splitting them into smaller, quantifiable pieces Perform feasibility analysis and other activities that help determine the viability of epics Conduct basic research to familiarize them with a new technology or domain Gain confidence in a technical or functional approach, reducing risk and uncertainty Spikes involve creating a small program, research activity, or test that demonstrates some aspect of new functionality. Technical and Functional Spikes Spikes primarily come in two forms: technical and functional. Functional spikes – They are used to analyze overall solution behavior and determine: How to break it down How to organize the work Where risk and complexity exist How to use insights to influence implementation decisions Technical spikes – They are used to research various approaches in the solution domain. For example: Determine a build-versus-buy decision Evaluate the potential performance or load impact of a new user story Evaluate specific technical implementation approaches Develop confidence about the desired solution path Some features and user stories may require both types of spikes. Here’s an example: “As a consumer, I want to see my daily energy use in a histogram so that I can quickly understand my past, current, and projected energy consumption.” In this case, a team might create both types of spikes: A technical spike to research how long it takes to update a customer display to current usage, determining communication requirements, bandwidth, and whether to push or pull the data A functional spike – Prototype a histogram in the web portal and get some user feedback on presentation size, style, and charting Guidelines for Spikes Since spikes do not directly deliver user value, use them sparingly. The following guidelines apply. Quantifiable, Demonstrable, and Acceptable Like other stories, spikes are put in the Team Backlog, estimated, and sized to fit in an iteration. Spike results are different from a story because spikes typically produce information rather than working code. They should develop only the necessary data to identify and size the stories that drive it confidently. The output of a spike is demonstrable, both to the team and to any other stakeholders, which brings visibility to the research and architectural efforts, and also helps build collective ownership and shared responsibility for decision-making. The Product Owner accepts spikes that have been demoed and meet its acceptance criteria. Timing of Spikes Since they represent uncertainty in one or more potential stories, planning for both the spike and the resulting stories in the same iteration is sometimes risky. However, if it’s small and straightforward, and a quick solution is likely to be found, then it can be quite efficient to do both in the same iteration. The Exception, Not the Rule Every user story has uncertainty and risk; that’s the nature of Agile development. The team discovers the right solution through discussion, collaboration, experimentation, and negotiation. Thus, in one sense, every user story contains spike-like activities to identify the technical and functional risks. The goal of an Agile team is to learn how to address uncertainty in each iteration. Spikes are critical when high uncertainty exist, or there are many unknowns.  
  3. Mar 2020
    1. A safe name

      "a safe name" could mean that the name was used to protect her for discrimination, A name that they see as is safe to use in their eyes.

    1. Most companies are throwing cookie alerts at you because they figure it’s better to be safe than sorry When the GDPR came into effect, companies all over the globe — not just in Europe — scrambled to comply and started to enact privacy changes for all of their users everywhere. That included the cookie pop-ups. “Everybody just decided to be better safe than sorry and throw up a banner — with everybody acknowledging it doesn’t accomplish a whole lot,” said Joseph Jerome, former policy counsel for the Privacy & Data Project at the Center for Democracy & Technology, a privacy-focused nonprofit.
  4. Oct 2019
  5. Sep 2019
  6. Aug 2019
  7. May 2019
    1. However, SAFe is a flow-based system. Its economics are optimized by job-sequencing rather than theoretical job return on investment (or worse, first-come, first-served job selection, loudest voice, or other historical patterns).

      Depending on one's situation (in the RCMPSP space), FCFS has been shown to be the most efficacious priority rule in terms of project (not portfolio) flow (shortest make span).

  8. Feb 2019
    1. 1) develop more educators, advocates, and community leaders who can leverage and advance the web as an open and public resource, and 2) impact policies and practices to ensure the web remains a healthy open and public resource for all.

      Teaching people how to use the internet safely can allow for the internet to continue to be a place that helps someone obtain information, communicate with others, and express their knowledge to others. Providing a safe environmet for people to do these things is important for successful internet usage.

  9. Jan 2019
    1. 计算机领域在分布式处理过程中追求高效、一致。对错误数据记录的修复和更正,通常会另行设计一套机制来保证。相对传统数据库,区块链由于需要保证事后数据的不可篡改,引入了共识机制,为错误的出现和修复提供更多的容忍度。这一重要思想通常被许多区块链设计者所忽略,众多项目纷纷追求提高短交易及确认速度,这会导致弱化甚至牺牲其他节点对数据的验证过程。同时,更早更快的确认也会带来问题。参与生成数据的节点需要满足生成数据不能出错等更严苛要求,导致现在很多区块链项目的在落地过程中出现困难。因为系统使用方会背上了数据必须一次性正确输入的包袱,需要非常保守和谨慎地选择上链数据。最终,区块链落地应用范围的狭窄,许多存在出错可能性的数据难以结合区块链的优点参与业务升级改造。

      <big>评:</big><br/><br/> 传统数据库与区块链式处理,哪个才是更佳的业务模式?这个问题的回答早已在我们的日常工作中得以体现,但却迫于某种难以逾越的权力边界而成了难言之隐。「事中容错,事后一致」是一种颇为崇高的境界,甚至可以从中一窥理想社会的光耀图景,但人们目前尚未能大规模应用这套 workflow,究其原因,并非目标遥远,而是由于决策权被少部分人掌控着,和数据打交道的主体只是把数据当作本职工作,并未主动贡献、积极参与。系统使用方背上的不是「数据必须一次性正确输入」的包袱,他们直面的,是将权利拱手让人后的自责,是与民主开放的理想世界背道而驰的困惑。

  10. Oct 2018
    1. Another innovation is the use of enzymes at room temperature to build esters, chemical compounds used to make cosmetic ingredients such as emollients, which soften skin, and emulsifiers, which bind oily and watery components into a homogeneous mix.

      4th Principle: Designing Safer Chemicals By designing safer chemicals the beauty industry can still solve the beauty concerns consumers want to address while keeping the toxicity to the environment as the first priority of the product production

  11. Jan 2018
    1. Irwin Consulting Services Review - How to ensure a safe mountain climbing this winter

      This holiday season, many people are taking advantage of the cold weather to do some extreme activities like mountain climbing. But with this kind of activity, you are very much required to gather all the necessary items and be well-informed in advance in making sure of your survival and safety. If you are with your close friends, family members and colleagues, you are also responsible for their wellbeing, thus you are really needed to be equipped with proper safety equipment and survival skills.

      As one of the groups that are committed to public safety, Irwin Consulting Services would like you to be committed to your own safety and to the people you held close to your heart as well, whether you are inside or outside your home, always bear in mind of that responsibility.

      The appearance of snowy mountains can be a lovely and calming sight because of its pure whiteness. And different kinds of activities await you in such mountains where you can choose between snowshoeing, skiing or other related activities. But no matter how beautiful those mountains look like, they can still bring danger to you and other people around you, so protect your safety by having all the crucial equipment and learning all the required survival skills.

      Determine the final list of activities you wanted to perform on the mountain and then know if each can be conducted at the place safely. You must also ensure that your planned venture suits your fitness level. With this kind of activity, you must never leave home without informing the people close to your heart about your plan. We can’t erase the possibility of it being dangerous, so tell them about the location of the mountain, the date of your return, and other situations where they really need to call the authorities for help in finding you.

      When it comes to climbing a mountain, the local authorities will surely suggest or require you to join a group or form a group composed of two or more people to guarantee the safety of everyone concerned. When a person gets injured, the other group members can take care of him or her. But if you really wanted to be alone and face the challenges by yourself, Irwin Consulting Services reminds you that this involves some risks so better be equipped with every item or product necessary for your survival. Before going to the place, spend an hour or two in front of your laptop or computer learning about the important information about the mountain.

      If you’re only planning to stay when there’s still sunlight, you might not bother to carry some light sources with you. But we don’t know the exact things that could happen to you throughout the day where a situation might surface that requires you to camp for the night, thus include this on the scenarios that may occur on your trip and bring light sources with you.

      In case of an unfortunate event and you were lost in the woods, never panic and don’t put your mind in disarray. It would be best to collect your thoughts and stay calm and warm. Ensure that you were visible from the sky once you called for help so that rescuers on a helicopter could see you quickly. If ever you needed an urgent help, never hesitate to call the authorities right away so that they could find you before it gets dark.

      Majority of countries around the world has their own emergency hotline number that is similar to 9-1-1 of the United States where you can contact for help even without any signal on your phone because such can activate any cell tower. Before you leave your home to begin your adventure, make sure that your phone is fully charged and bring some spare batteries with you or good power banks as well. If you can avail a satellite phone, then have one to get help even in no-cell-service places.

      Be prepared with avalanche safety equipment too. Avalanche can be the biggest threat of a serene snowy mountain, so it would be best to be equipped with the proper equipment such as a transceiver, probe, and shovel. You must also have good knowledge about those items to survive this kind of emergency situation. Learn how to navigate through the terrain to help you mitigate an avalanche exposure.

      Irwin Consulting Services has been a part of different efforts in the United States in improving public safety, and because of its many years of endeavor in this field, the group had seen many cases proving that accidents were inevitable and sometimes unprecedented, so always be prepared in case of unwanted events and situations to protect yourself and other people.

  12. Dec 2017
    1. Irwin Consulting Services Review - Keep your home and family safe against wildfires with these tips

      The wildfires reported this year conclude some of the biggest wildfires happened in different areas such as in Los Angeles, British Columbia, and Montana. Wildfires can leave a lot of destroyed homes and properties and even fatalities fast. Its furious flames can spread out on a large scale, making it difficult for firefighters and local authorities to get rid of it. It is often terrifying to witness a huge natural calamity taking place within your area and its results were indeed distressing to see. A wildfire and the path that it is going to take can’t be accurately predicted, which calls for utmost preparation to every household to avoid such grave danger.

      But despite this, local authorities and various organizations from many places around the globe are committed to keeping the public safe from the threats of natural calamities. Irwin Consulting Services also belong to those who work hard for the public safety. This post was specifically prepared by them to help every household in keeping their home safe from wildfires.

      Make adjustments to your roofs

      Think about having rated “A” fire-resistant roofs to further protect your home. Roofs are undeniably the weak-spot of a house when it comes to fires so you must begin making better adjustments on it first. You must also clean the roof on a regular basis to avoid a lot of dead leaves piling up the place and being a fuel to fires.

      Create changes to your windows

      To better protect your home, your windows should be upgraded to become stronger against fires as well. Choose heat-resistant materials in doing upgrades to your windows. A wildfire that is not yet reaching your home can already show its effects through its extreme heat. That heat can enter the windows and create a fire on drapes and nearby furniture already. Irwin Consulting Services would like you to have fire-rated glasses on your windows and non-combustible shutters too.

      Settle on a good location

      Choose a convenient location to spend the rest of your lives with your family. Make sure that it is a safe neighborhood and is not prone to frequent fires. You are advised to conduct a thorough research to determine the best location for your family.

      Put some modifications on the site layout

      Ensure at least 30 meters of distance and incombustible material between the green lands and your home by having wider driveways, patios and low-growing fire-retardant plants. This way, you’re also helping firefighters in bringing their heavy and big equipment near your house in case of fire emergencies.

      Maintain a clean surrounding around the green areas

      Gather dead and decaying wood and put them away because such can fuel a fire. Get rid of fallen and dead branches too. Think about cutting the branches that were too close to your roof or overhangs it. Make cleaning around the green areas around your home a habit.

      Be wary of embers

      Eaves and vents openings were the most susceptible parts to flying embers. Once the embers entered through those parts, it could start a fire inside your home. In order to better protect your house, screen those openings and make sure they were properly maintained. Do not forget about cleaning the gutters as well.

      Protect your home and your family to the best of your ability and always be prepared for immediate dangers of natural calamities. Trust organizations such as Irwin Consulting Group in helping local authorities in making sure of a safe neighborhood. But aside from their expertise, self-preparation and readiness could save and protect your entire family as well.

  13. Apr 2017
  14. Sep 2015