353 Matching Annotations
  1. Last 7 days
  2. May 2020
    1. This tightly controlled build environment is sometimes called a "holy build box". The Traveling Ruby project provides such a holy build box.
    1. Insight through making suggests that you’ll need to make simultaneous progress in theory-space and system-space to spot the new implications in their conjoined space. Effective system design requires insights drawn from serious contexts of use: you must constantly instantiate new theoretical ideas in new systems, then observe their impact in some serious context of use.

      Very powerful way of wording the implications of Insights through making and the need for serious contexts of use.

      You need to advance in theory-space as well as in system-space to spot the implications for their conjoined space.

      Pragmatically, you must constantly instantiate new theoretical ideas in the system, then observe the effects in some serious context of use.

    1. As Celtis said, “it helps the memory a great deal, if someone knows the things of the world,”37 and Valentinus followed this advice when he refi lled the table of Celtis with meanings of his own.

      This seems to be very common practice in the modern art as many writers suggest using or modifying techniques so that they suit your experience and lived memory. If a different key word comes to you more quickly, then why not use that instead of one supplied by the creator of the system.

      There's also an echoing of this in Beniowski's idea of notions in "A Handbook of Phrenotypics" on the closeness of ideas.

    2. The only exception is the letter A, which appears in the list – unlike the other vowels – and contains fi ve words beginning with the fi ve vowels: a – abbas (abbot), e – eques (knight), i – institor (tax-collector), o – offi cialis (ecclesiastical judge), and u – usurarius (usurer).

      Here he's interestingly removed the vowels, which is certainly reminiscent of the later Major System structure in at least some respect.

    Tags

    Annotators

  3. Apr 2020
    1. Programming languages and operating systems Stanford CoreNLP is written in Java; recent releases require Java 1.8+. You need to have Java installed to run CoreNLP. However, you can interact with CoreNLP via the command-line or its web service; many people use CoreNLP while writing their own code in Javascript, Python, or some other language. You can use Stanford CoreNLP from the command-line, via its original Java programmatic API, via the object-oriented simple API, via third party APIs for most major modern programming languages, or via a web service. It works on Linux, macOS, and Windows. License The full Stanford CoreNLP is licensed under the GNU General Public License v3 or later. More precisely, all the Stanford NLP code is GPL v2+, but CoreNLP uses some Apache-licensed libraries, and so our understanding is that the the composite is correctly licensed as v3+.
    1. This isn’t the first time Kerckhoffs’ Principle has come up. I specifically discussed it when talking about creating good, strong Master Passwords, when I said that we should use a system for coming up with Master Passwords that doesn’t lose its strength if the attacker knows the system that we used
    2. Kerckhoffs’ Principle states that you should assume that your adversary knows as much about the system you use as you do. This is why – despite what I may have said on April Fools Day last year – security experts are skeptical of security systems that hide the details of how they operate. They are particularly skeptical of systems that derive their security from keeping the details of how they work secret. I could go on at great length about why openness about the system improves security. Indeed, my first draft of this article did go on at great length.
    1. School for many people is a place to get fed, a place to feel safe, a place to get encouraged. It’s a place to be around people who share your desire to learn. Now they are cut off from that, and some of that can’t be duplicated easily online.

      Yes, this is a problem. However... Schools weren't designed to be a safegaurd against poor parenting, but they're treated that way, as if they're a place to escape the idiots they live with.

      Schools shouldn't tolerate this. Instead, they should intervene. They should bring in a third party, someone/an organization specifically designed to help kids who come from broken homes, to help heal how they live when school's not in session. Any measure less than this signals, to me, a school system that's not paying attention to their student's emotional needs, which are, I believe, key to ensuring the child thrives throughout their school years.

    1. Relational databases are designed around joins, and optimized to do them well. Unless you have a good reason not to use a normalized design, use a normalised design. jsonb and things like hstore are good for when you can't use a normalized data model, such as when the data model changes rapidly and is user defined. If you can model it relationally, model it relationally. If you can't, consider json etc.
    2. Joins are not expensive. Who said it to you? As basically the whole concept of relational databases revolve around joins (from a practical point of view), these product are very good at joining. The normal way of thinking is starting with properly normalized structures and going into fancy denormalizations and similar stuff when the performance really needs it on the reading side. JSON(B) and hstore (and EAV) are good for data with unknown structure.
  4. Mar 2020
  5. Feb 2020
    1. All we know for certain, through forensic testing, is that the manuscript likely dates to the 15th century, when books were handmade and rare.

      This may provide some additional proof that it's a memory aid in the potential form of a notebook or commonplace book. What were the likelihoods of these being more common that other books/texts? What other codes were used at the time? Was the major system or a variant in use at the time?

    1. A website called Open Food Facts, run by mostly French volunteers, has started the herculean labour of creating an open database of packaged foods around the world and listing where they fit into on the Nova system.
    1. I use this to keep information about processes that were running at any time during last five days. These are 1-min snapshots so something might get lost but I think it is good enough for me. I want to have some data available when I discover there was a peak in resource usage (I use munin for that). I haven't found a better way to keep track of past processes (tried psacct).
  6. Jan 2020
    1. Indexes are a cornerstone of information retrieval, and the basis for today's modern search engines.
    2. This is known as collapsed forwarding.

      Proxies group a bunch of similar requests, before forwarding the request to app servers.

    3. four of the more important ones are caches, proxies, indexes and load balancers.

      Speeding data retrieval Or reducing latency

    4. benchmark different alternatives, understand how the system will fail, and have a solid plan for when failure happens.

      Managing Failure. Failing gracefully

    5. with the Flickr architecture each shard would need to be updated or searched (or a search service would need to be created to collate that metadata—which is in fact what they do).

      Search service for collating data spread out in shards.

    6. Finally, this separates future concerns, which would make it easier to troubleshoot and scale a problem like slow reads.

      Separation of concern (of components)

    7. Deconstructing a system into a set of complementary services decouples the operation of those pieces from one another. This abstraction helps establish clear relationships between the service, its underlying environment, and the consumers of that service. Creating these clear delineations can help isolate problems, but also allows each piece to scale independently of one another. This sort of service-oriented design for systems is very similar to object-oriented design for programming.

      Service-Oriented-Architecture (SOA)

  7. Dec 2019
    1. It's not for beginners, but it's extremely flexible once you get a handle on things. If sticking to a system is hard for you, I highly recommend giving this system a try.
    2. Best to-do list app for taking control of your to-do list
  • Tags

    Annotators

    URL

  • Tags

    Annotators

    URL

  • Tags

    Annotators

    URL

    1. it is certainly more creditable to cultivate the earth for the sustenance of man, than to be the confidant, and sometimes the accomplice, of his vices; which is v1_117the profession of a lawyer

      (Deleted in 1831). Percy Shelley had suffered negative rulings by the English court system and Mary seems to share his moral judgment on the legal profession. This skepticism will soon be reinforced in the novel by the court's harsh treatment of Justine Moritz.

    1. Now using sudo to work around the root account is not only pointless, it's also dangerous: at first glance rsyncuser looks like an ordinary unprivileged account. But as I've already explained, it would be very easy for an attacker to gain full root access if he had already gained rsyncuser access. So essentially, you now have an additional root account that doesn't look like a root account at all, which is not a good thing.
    1. It is possible to do a successful file system migration by using rsync as described in this article and updating the fstab and bootloader as described in Migrate installation to new hardware. This essentially provides a way to convert any root file system to another one.
    2. rsync provides a way to do a copy of all data in a file system while preserving as much information as possible, including the file system metadata. It is a procedure of data cloning on a file system level where source and destination file systems do not need to be of the same type. It can be used for backing up, file system migration or data recovery.