84 Matching Annotations
  1. Mar 2019
    1. DXtera Institute is a non-profit, collaborative member-based consortium dedicated to transforming student and institutional outcomes in higher education.

      DXtera Institute is a non-profit, collaborative member-based consortium dedicated to transforming student and institutional outcomes in higher education. We specialize in helping higher education professionals drive more efficient access to information and insights for effective decision-making and realize long-term cost savings, by simplifying and removing barriers to systems integration and improving data aggregation and control.

      With partners across the U.S. and Europe, our consortium includes some of the brightest minds in education and technology, all working together to solve critical higher education issues on a global scale.

  2. Feb 2019
    1. World-class print and packaging solutions for enhancing the efficiency of all printing processes from A.T.E., a leading print and packaging equipment system manufacturer in India. We manufacture various equipment like register control system, web video system which is useful in the print and packaging industry.

    1. The Two Sides of the H-LAM/T System

      When I view this diagram, I am reminded of Robert Rosen's Modeling Relation, an image of which is here The Modeling Relation grew out of research in Relational Biology which was the first mathematical biology to recognize that relations among organism components and between those components and the environment are key to understanding complex adaptive systems.

    2. It is the augmentation means that serve to break down a large problem in such a way that the human being can walk through it with his little steps, and it is the structure or organization of these little steps or actions that we discuss as process hierarchies.

      As I begin to read this (as I did back in 2000 when I was introduced to Doug) I begin to think in terms of reductionism as a practice in the face of problems which are highly complex, nonlinear, and which do not submit to chunking.

  3. Jan 2019
    1. For large-scale software systems, Van Roy believes we need to embrace a self-sufficient style of system design in which systems become self-configuring, healing, adapting, etc.. The system has components as first class entities (specified by closures), that can be manipulated through higher-order programming. Components communicate through message-passing. Named state and transactions support system configuration and maintenance. On top of this, the system itself should be designed as a set of interlocking feedback loops.

      This is aimed at System Design, from a distributed systems perspective.

    1. In my opinion if you can get enrolled into a degree program for systems biology then that would be best. However, if you are just exploring the field on your own I would recommend going through these resources.Video lectures by Uri AlonVideo Lectures by Jeff GorePrinciples of Synthetic Biology (at edx)Coursera specialization on systems biology.If you are looking for mathematical intensive start with first 2 and if you are looking for biologically intensive begin with last 2. Either way go through all 4 of them as they provide diverse perspective on systems biology which is very important. As you will move through these materials all the necessary supplementary information like books, papers and softwares will be informed within these materials itself.Hope this helps!
    1. Our extensions also have implications for theories ontrust.

      Bookmarked section for later consideration of proposal studies on how time interacts with trust in time- and safety-critical social coordination.

    2. Therefore, training should focus on learning how toquickly recognize volunteers’ volition in participating inan emergent group, the tasks they might engage in, andthe support they might need to carry out those tasks.Such training could also help people to recognize thebenefits and dangers of generalized trust. It could alsohelp people to quickly evolve a coordination mecha-nism that does not rely on what people know, but oncompiling and communicating a narrative of the actionsthat volunteers take, so that others are able to assess forthemselves what actions they could take to help.

      Majchrzak et al continue to suggest that emergent response training could reconceptualize a new role for emergency management professionals, aside from the default coordination/management. Further, they suggest that citizens could be trained to participate.

    3. ur examination suggests that by expandingthe context in which TMS theory is applied to includeemergent response groups, insights can be gained intotheir internal dynamics. The three indicators of the levelof development of a TMS provide a useful frameworkfor organizing these insights in the exhibit.

    4. The urgency of time may make it too onerous forthe extra effort of articulating actions as they are beingperformed, yet most emergency response requires somecommunication.

      Interaction of time (tempo/pace) and breakdowns in articulation work.

    5. Explicitly articulated narratives mayalso make clearer that multiple sequences of actions maybe occurring simultaneously, thus resolving role conflictsby allowing multiple ways to accomplish a task

      Evokes Schmidt and Bannon's articulation work in CSCW.

    6. Emergent response groups may also use a mechanismof creating a community narrative (Boland and Tenkasi1995), which is a running narrative of the actions takenand not taken, the decisions made, and the theories inuse. Narratives do not represent a single shared under-standing of a domain; rather they represent the mul-tiplicity of events and actions a community is taking,as members are taking them. Narratives may be articu-lated explicitly or understood implicitly.

      SBTF after-action report, as an example. But who is the audience for this narrative?

    7. Whenemergent response groups first come together, membersare likely not to ask one another about who knows what;instead, they are likely to ask about what is knownabout the situation and about the actions taken thus far(Dyer and Shafer 2003, Hale et al. 2005). The cogni-tive structure that they develop for the group centersnot around people, but on action-based scenarios thateither have been or might be carried out. These scenariosinclude decisions, actions, knowledge, events, and feed-back (Vera and Crossan 2005).

      Suggested extensions for TMS theory:

      "1. Tailor the Role of Expertise"

      "2. "Replacing Credibility in Expertise with Trust Through Action"

      "3. "Coordinating Knowledge Processes Without a Shared Metastructure"

    8. On the surface, the lack of sta-ble membership suggests that a shared mental modelmay not be viable or even desired in emergent responsegroups. Time may be too precious to seek consensus onevents and actions, and agreements may make the groupless flexible to accommodate to changing inputs.

      Evokes pluritemporal concerns about tempo, pace and synchronization.

    9. hus, we believe challenges occur in all three indica-tors of the level of development of a TMS—expertisespecialization, credibility, and expertise coordination—requiring a need to consider extending theorizing abouteach indicator for emergent response groups.

      Ways to extend TMS to emergent groups:

      "1. Reconceptualize the Role of Expertise Specialization as a Basis for Task Assignment"

      "2. Assessing Credibility in Emergent Response Groups"

      "3. Expertise Coordination in Emergent Response Groups"

      These extensions evoke boundary objects and invisibility

    10. Moreland and Argote(2003) suggest that the dynamic conditions under whichthese groups form and work together are likely to havenegative effects on the development of transactive mem-ory.

      Are there workflow or technology breakdowns that could help ameliorate the negative effects?

    11. Research on TMS has identified three indicators of thelevel of development of a TMS (Lewis 2003, Morelandand Argote 2003):1.Memory (or expertise) specialization:the tendencyfor groups to delegate responsibility and to specialize indifferent aspects of the task;2.Credibility:beliefs about the reliability of mem-bers’ expertise; and3.Task (or expertise) coordination:the ability of teammembers to coordinate their work efficiently based ontheir knowledge of who knows what in the group.The greater the presence of each indicator, the more de-veloped the TMS and the more valuable the TMS is forefficiently coordinating the actions of group members.

      Three indicators of the level of sophistication of the system:

      • Memory specialization (think trauma/hospital care CSCW studies)

      • Credibility

      • Task coordination

    12. A TMS can be thoughtof as a network of interconnected individual memorysystems and the transfer of knowledge among them(Wegner 1995). Individuals who are part of a TMSassume responsibility for different knowledge domains,and rely on one another to access each other’s expertiseacross domains. Expertise is defined in the TMS litera-ture to broadly include the know-what, know-how, andknow-why of a knowledge domain (Quinn et al. 1996),what Blackler (1995) refers to as embodied competen-cies. Expertise specialization, then, reduces the cognitiveload of each individual and the amount of redundantknowledge in the group, while collectively providingthe dyad or group access to a larger pool of knowl-edge. What makes transactive memory transactive arethe communications (called transactions) among individ-uals that make possible the codifying, storing, retrieving,and updating of information from individual memorysystems. For transactive memory to function effectively,individuals must have a shared conceptualization of whoknows what in the group.

      Majchrzak et al describe how TMS is oeprationalized as a network.

    13. TMS theory, a theoryof group-level cognition, explains how people in collec-tives learn, store, use, and coordinate their knowledge toaccomplish individual, group, and organizational goals.It is a theory about how people in relationships, groups,and organizations learn who knows what, and use thatknowledge to decide who will do what, resulting in moreefficient and effective individual and collective perfor-mance.

      Definition of transactive memory systems theory -- used in org studies to understand how knowledge is coordinated among groups.

  4. Nov 2018
    1. Davis and col-leagues (3) provide useful new data that enhance our un-derstanding of the effects of hospitalists on health sys-tems. In their study of a voluntary hospitalist system at alarge rural nonteaching hospital in Mississippi, theyfound that patients cared for by hospitalists had adjustedhospital stays that were 25% shorter, and costs that were12% less, than patients cared for by nonhospitalist inter-nists. For patients in the highest severity group, these sav-ings were even greater. Annualized, the authors extrapo-late that the hospitalists would have saved $2.5 millionhad they cared for all of the internists’ patients. As withprior studies that found similar reductions in resourceuse (4 –7), these substantial savings were achieved with-out diminishing quality or patient satisfaction. Nor wasthere evidence of cost shifting: hospitalists’ patients wereno less likely to be discharged to home (instead of anotherinstitution such as a skilled nursing facility) than werepatients of primary care internists. We can now state withconsiderable confidence that hospitalists markedly de-crease inpatient costs and lengths of stay with no compro-mise in quality or patient satisfaction.
    1. Five years ago, it was accountable care organizations and value-based purchasing that SHM glommed on to as programs to be embraced as heralding the future. Now it’s the Bundled Payments for Care Improvement initiative (BCPI), introduced by the Center for Medicare & Medicaid Innovation (CMMI) at the Centers for Medicare & Medicaid Services (CMS) back in 2011 and now compiling its first data sets for the next frontier of payments for episodic care. BCPI was mandated by the Patient Protection and Affordable Care Act (ACA) of 2009, which included a provision that the government establish a five-year pilot program by 2013 that bundled payments for inpatient care, according to the American Hospital Association. BCPI now has more than 650 participating organizations, not including thousands of physicians who then partner with those groups, over four models. The initiative covers 48 defined episodes of care, both medical and surgical, that could begin three days prior to admission and stretch 30, 60, or 90 days post-discharge. <img class="file media-element file-medstat-image-flush-right" height="220" width="220" alt="Dr. Weiner" typeof="foaf:Image" src="https://www.the-hospitalist.org/sites/default/files/styles/medium/public/images/weinerweb.jpg" title="" />Dr. Weiner “The reason this is so special is that it is one of the few CMS programs that allows providers to be in the driver’s seat,” says Kerry Weiner, MD, chief medical officer of acute and post-acute services at TeamHealth-‎IPC. “They have the opportunity to be accountable and to actually be the designers of reengineering care. The other programs that you just mentioned, like value-based purchasing, largely originate from health systems or the federal government and dictate the principles and the metrics that as a provider you’re going to be evaluated upon. “The bundled model [BCPI] gives us the flexibility, scale, and brackets of risk that we want to accept and thereby gives us a lot more control over what physicians and physician groups can manage successfully.”
    1. Learning needs analysis of collaborative e-classes in semi-formal settings: The REVIT exampl

      This article explores the importance of analysis of instructional design which seems to be often downplayed particularly in distance learning. ADDIE, REVIT have been considered when evaluating whether the training was meaningful or not and from that a central report was extracted and may prove useful in the development of similar e-learning situations for adult learning.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Instructional Design Strategies for Intensive Online Courses: An Objectivist-Constructivist Blended Approach

      This was an excellent article Chen (2007) in defining and laying out how a blended learning approach of objectivist and constructivist instructional strategies work well in online instruction and the use of an actual online course as a study example.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Learning Needs Analysis of Collaborative E-Classes in Semi-Formal Settings: The REVIT Example.

      This article explores the importance of analysis of instructional design which seems to be often downplayed particularly in distance learning. ADDIE, REVIT have been considered when evaluating whether the training was meaningful or not and from that a central report was extracted and may prove useful in the development of similar e-learning situations for adult learning.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

  5. Oct 2018
    1. 1 reply 1 retweet 5 likes Reply 1 Retweet 1 Retweeted 1 Like 5 Liked 5 Direct message Omar Rizwan‏ @rsnous Feb 16 More Copy link to Tweet Embed Tweet Mute @rsnous Unmute @rsnous Block @rsnous Unblock @rsnous Report Tweet Add to other Moment Add to new Moment Replying to @rsnous @disquiet07 files are a weak lowest-common-denominator interface between programs in different languages (C, Python, Ruby, Swift, VB, bash, etc) in ecosystems with one language (iOS, JS, Lisp, Smalltalk), you often don't see files: you just persist the rich native structures of the language 4 replies 2 retweets 16 likes Reply 4 Retweet 2 Retweeted 2 Like 16 Liked 16 Direct message Gordon Brander‏ @gordonbrander 3h3 hours ago More Copy link to Tweet Embed Tweet Mute @gordonbrander Unmute @gordonbrander Block @gordonbrander Unblock @gordonbrander Report Tweet Add to other Moment Add to new Moment Replying to @rsnous @disquiet07 OTOH — lowest common denominator interfaces allow for emergent behavior. They focus all the constraints in one place, leaving the rest of the system definition open-ended. Like defining the LEGO dot, but not what shape pieces may take. 1 reply 0 retweets 3 likes Reply 1 Retweet Retweeted Like 3 Liked 3 Direct message Omar Rizwan‏ @rsnous 2h2 hours ago More Copy link to Tweet Embed Tweet Mute @rsnous Unmute @rsnous Block @rsnous Unblock @rsnous Report Tweet Add to other Moment Add to new Moment Replying to @gordonbrander @disquiet07 With files, imo the lack of structure 1. forces duplication of functions at the app level (de/serialization, cross-links, …) and 2. prevents coordination for higher-level behavior #1 here seems different from LEGO, but I can't quite articulate it in terms of your analogy 1 reply 0 retweets 2 likes Reply 1 Retweet Retweeted Like 2 Liked 2 Direct message Gordon Brander‏ @gordonbrander 2h2 hours ago Follow Follow @gordonbrander Following Following @gordonbrander Unfollow Unfollow @gordonbrander Blocked Blocked @gordonbrander Unblock Unblock @gordonbrander Pending Pending follow request from @gordonbrander Cancel Cancel your follow request to @gordonbrander More Copy link to Tweet Embed Tweet Mute @gordonbrander Unmute @gordonbrander Mute this conversation Unmute this conversation Block @gordonbrander Unblock @gordonbrander Report Tweet Add to other Moment Add to new Moment Replying to @rsnous @disquiet07 I agree. Low-level interop has a high floor, high ceiling. Higher-level interop (like Smalltalk) has lower floors, because deeper system integration. However, that deeper integration often means you end up more entangled with the system’s strengths and weaknesses.
    1. It has been demonstrated that this formulation is almost equivalent to a SLIM model,[9] which is an item-item model based recommender

      So a pre-trained item model can be used to make such recommendations.

    2. The user's latent factors represent the preference of that user for the corresponding item's latent factors

      The higher the value of the dot product between the two, the higher the preference.

    3. two lower dimensional matrices

      Not necessary (in fact, often not) square. Typically each user is represented by a vector of dimension strictly less than the number of items and vice versa.

    1. Across the technology industry, rank-and-file employees are demanding greater insight into how their companies are deploying the technology that they built. At Google, Amazon, Microsoft and Salesforce, as well as at tech start-ups, engineers and technologists are increasingly asking whether the products they are working on are being used for surveillance in places like China or for military projects in the United States or elsewhere.
  6. Sep 2018
    1. An obvious metaphysical question to raise here is the compatibility or otherwise of religion and transhumanism. In my 1990 essay that first set forth modern transhumanism as a distinct philosophy under that name, I explained how transhumanism (like humanism) can act as a philosophy of life that fulfills some of the same functions as a religion without any appeal to a higher power, a supernatural entity, to faith, and without the other core features of religions (More 1990). The central place accorded to rationalism suggests a tension between transhumanism and religion. But are they actually incompatible? Since rationalism is an approach to acquiring knowledge and says nothing about the content of knowledge, it is possible in principle for a transhumanist to hold some religious beliefs. And some do. The content of some religious beliefs is easier to reconcile with transhumanism than the content of others. Christian transhumanists, while not completely unknown, are very rare (and I know of none who are fundamentalists, and such a combination would surely indicate deep confusion). There are more Mormon transhumanists (although some of these are cultural rather than religious Mormons), perhaps because that religion allows for humans to ascend to a higher, more godlike level, rather than sharply dividing God from man. Several transhumanists describe themselves as Buddhists (presumably of the secular, philosophical type), and there seem to be few obstacles to combining transhumanism with liberal Judaism. However, the vast majority of transhumanists do not identify with any religion. A pilot study published in 2005 found that religious attitudes were negatively correlated with acceptance of transhumanist ideas. Those with strong religious views tended to regard transhumanism as competing with their beliefs (Bainbridge 2005).

      Having a strong belief system is naturally integral for humans. Religion is by far the most common, profound form of human belief systems, so it is relevant to propose the question of transhumanism and religion being incompatible. While it is possible that the basis of each religion can contribute to an individual's probability of simultaneously believing in transhumanism, having a belief system that consists of both beliefs would presumably be rather conflicting for any individual to concurrently believe in.

  7. Aug 2018
    1. ‘In a complexinformation society, with a highly developed divi-sion of intellectual labor, we have no option butrely on information from sources that are usuallytrustworthy.’
  8. Jul 2018
    1. You might not need a design sytem. If you’re the only one at your organisation that cares about the benefits of a design system, you won’t get buy-in, and if you don’t get buy-in, the design system will fail. Maybe there’s something more appropriate for your team? After all, not everyone needs to go to the gym to get fit. There are alternatives.
  9. Dec 2017
  10. Nov 2017
    1. an environment unlike anything they will encounter outside of school

      Hm? Aren’t they likely to encounter Content Management Systems, Enterprise Resource Planning, Customer Relationship Management, Intranets, etc.? Granted, these aren’t precisely the same think as LMS. But there’s quite a bit of continuity between Drupal, Oracle, Moodle, Sharepoint, and Salesforce.

  11. Oct 2017
    1. What is this again? What Google Drive should be. What Dropbox should be. What file systems can be. The way we unify our data access across companies, services, programs, and people. The way I want to live and work.

      I think that this is interesting, but idealistic. The code repo on GitHub is quite active, but how does a technology like this gain traction?

    1. The absence of a need for co-signaling through CD28 for these BiTEs might also be explained by the observation that among all T cell subtypes, CD8+ effector memory cells CD45RO+ (TEM) and CD8+ effector memory CD45RA+ (TEMRA) contribute the most to BiTE activity, whereas naïve T cells do not contribute at all to the killing efficiency.50 It is believed that memory T cells do not require CD28 costimulation for expansion during secondary responses, which could explain the efficiency of BiTEs. However, this dogma has recently been challenged.5

      absence of need for cosignal effector memory cells contribute most to bite activity memory T ells dont require cd28 costimulation for expansion?

  12. Sep 2017
    1. NixOS is a Linux distribution with a unique approach to package and configuration management.

      This is another approach to systems management and software as a services. I don't really understand in detail the difference between NixOS and docker, but googling NixOS vs Docker shows that its a topic that is ripe for a bunfight.

  13. Aug 2017
  14. May 2017
    1. Multi-party Conversational Systems are systems with natural language interactionbetween one or more people or systems. From the moment that an utterance is sent toa group, to the moment that it is replied in the group by a member, several activitiesmust be done by the system: utterance understanding, information search, reasoning,among others. In this paper we present the challenges of designing and building multi-party conversational systems, the state of the art, our proposed hybrid architectureusing both norms and machine learning and some insights after implementing andevaluating one on the finance domain.

      Conversational Systems

  15. Apr 2017
    1. This is why people can play the piano with their fingers but not with their toes.

      That does not really explain why there are very talented musicians that have limb defects, but I suppose that similar to a blind person being able to hear better, their brains adjust (like complex-adaptive systems do) and reassign a new input-element (e.g. the feet) to a left-over motoric system(e.g. the hands).

  16. Mar 2017
    1. There may well be a dominant reading, but this can erode over time if the “interpretive community” (Fish 1980) to which it speaks changes or the message lost entirely if that com-munity is decisively disrupted or displaced.14
  17. Jan 2017
  18. Jul 2016
    1. The average number of articles published was 31 per year with 74% publishing 0–30 articles, and 9% 60 or more. The study also contains interesting data about the workload done, revenues etc.

      Average numbers of articles in OJS journals: 31

      • 74% publish 0-30
      • 9% 60 or more
  19. Jun 2016
    1. And now we’re besties again.

      I can relate. I have deep respect for AK but often find myself flipping back and forth between strong agreement and feeling somewhat off-put by what he writes. That seems like a healthier relationship to have with any public intellectual though than 100% agreement 100% of the time. I'm so glad his writing exists in the world and I'm glad yours does too. Seems like this kind of layered relationship is just part of dealing with complex systems. :-)

  20. May 2016
  21. Apr 2016
  22. Jan 2016
    1. Today, we’re announcing the end of Chrome’s support for Windows XP, as well as Windows Vista, and Mac OS X 10.6, 10.7, and 10.8, since these platforms are no longer actively supported by Microsoft and Apple. Starting April 2016, Chrome will continue to function on these platforms but will no longer receive updates and security fixes.

      Google announcement from 10 Nov 2015.

      Estimate of operating system usage.

      Microsoft security updates for Windows Vista are scheduled to continue until 11 April, 2017.

    1. Stupid models are extremely useful. They are usefulbecause humans are boundedly rational and because language is imprecise. It is often only by formalizing a complex system that we can make progress in understanding it. Formal models should be a necessary component of the behavioral scientist’s toolkit. Models are stupid, and we need more of them.

      Formal models are explicit in the assumptions they make about how the parts of a system work and interact, and moreover are explicit in the aspects of reality they omit.

      -- Paul Smaldino

    2. Microeconomic models based on rational choice theory are useful for developing intuition, and may even approximate reality in a fewspecial cases, but the history of behavioral economics shows that standard economic theory has also provided a smorgasbord of null hypotheses to be struck down by empirical observation.
    3. Where differences between conditions are indicated, avoid the mistake of running statistical analyses as if you were sampling from a larger population.

      You already have a generating model for your data – it’s your model. Statistical analyses on model data often involve modeling your model with a stupider model. Don’t do this. Instead, run enough simulations to obtain limiting distributions.

    4. A model’s strength stemsfromits precision.

      I have come across too many modeling papers in which the model – that is, the parts, all their components, the relationships between them, and mechanisms for change – is not clearly expressed. This is most common with computational models (such as agent-based models), which can be quite complicated, but also exists in cases of purely mathematical models.

    5. However, I want to be careful not to elevate modelers above those scientists who employ other methods.

      This is important for at least two reasons, the first and foremost of which is that science absolutely requires empirical data. Those data are often painstaking to collect, requiring clever, meticulous, and occasionally tedious labor. There is a certain kind of laziness inherent in the professional modeler, who builds entire worlds from his or her desk using only pen, paper, and computer. Relatedly, many scientists are truly fantastic communicators, and present extremely clear theories that advance scientific understanding without a formal model in sight. Charles Darwin, to give an extreme example, laid almost all the foundations of modern evolutionary biology without writing down a single equation.

    6. Ultimately,the theory has been shown to be incorrect, and has been epistemically replaced by the theory of General Relativity. Nevertheless, the theory is able to make exceptionally good approximations of gravitational forces –so good that NASA’s moon missions have relied upon them.

      General Relativity may also turn out to be a "dumb model". https://twitter.com/worrydream/status/672957979545571329

    7. Table 1.Twelve functions served by false models. Adapted with permissionfrom Wimsatt

      Twelve good uses for dumb models, William Wimsatt (1987).

    8. To paraphrase Gunawardena (2014), a model is a logical engine for turning assumptions into conclusions.

      By making our assumptions explicit, we can clearly assess their implied conclusions. These conclusions will inevitably be flawed, because the assumptions are ultimately incorrect or at least incomplete. By examining how they differ from reality, we can refine our models, and thereby refine our theories and so gradually we might become less wrong.

    9. the stupidity of a model is often its strength. By focusing on some key aspects of a real-world system(i.e., those aspectsinstantiated in the model), we can investigate how such a system would work if, in principle, we really couldignore everything we are ignoring. This only sounds absurd until one recognizes that, in our theorizing about the nature of reality –both as scientists and as quotidianhumans hopelessly entangled in myriad webs of connection and conflict –weignore thingsall the time.
    10. The generalized linear model, the work horse ofthe social sciences, models data as being randomly drawn from a distribution whose mean varies according to some parameter. The linear model is so obviously wrong yet so useful that the mathematical anthropologist Richard McElreathhas dubbed it “the geocentric model of applied statistics,”in reference to the Ptolemaic model of the solar system that erroneously placed the earth rather than the sun at the center but nevertheless produced accurate predictions of planetary motion as they appeared in the night sky(McElreath 2015).

      A model that approximates some aspect of reality can be very useful, even if the model itself is flat-out wrong.

      But on the other hand, we can't accept approximation of reality as hard proof that a model is correct.

    11. Unfortunately, my own experience working with complex systems and working among complexity scientistssuggests that we are hardly immune to such stupidity. Consider the case of Marilyn Vos Savantand the Monty Hall problem.

      Many people, including some with training in advanced mathematics, contradicted her smugly. But a simple computer program that models the situation can demonstrate her point.

      2/3 times, your first pick will be wrong. Every time that happens, the door Monty didn't open is the winner. So switching wins 2/3 times.

      http://marilynvossavant.com/game-show-problem/

    12. Mitch Resnick, in his book Turtles, Termites, and Traffic Jams, details his experiences teaching gifted high school students about the dynamics of complex systems using artificial life models (Resnick 1994). He showed them how organized behavior could emerge when individualsresponded only to local stimuli using simple rules, without the need for a central coordinating authority. Resnick reports that even after weeks spent demonstrating the principles of emergence,using computer simulations that the students programmed themselves, many students still refused to believe that what they were seeing could really work without central leadership.
  23. Dec 2015
    1. Mozilla's Firefox OS is just the latest in a long list of mobile operating systems that have struggled to get the attention of consumers, who have typically shied away from upstarts often characterized by a weak selection of apps available. That hard-luck list includes Microsoft's Windows Phone, Samsung's Tizen, Jolla's Sailfish OS, Canonical's Ubuntu, Hewlett-Packard's WebOS and BlackBerry's BlackBerry OS.
    2. "We are definitely working with a good number of partners who desire a non-Android OS to power their mobile devices," Acadine founder and Chief Executive Li Gong told CNET. He declined to detail discussions but said, "We are now the frontrunner in terms of choice in this space."

      Hong Kong-based startup Acadine Technologies may take over development of Firefox OS, as H5OS.

  24. Nov 2015
    1. a study by Stephen Schueller, published last year in the Journal of Positive Psychology, found that people assigned to a happiness activity similar to one for which they previously expressed a preference showed significantly greater increases in happiness than people assigned to an activity not based on a prior preference. This, writes Schueller, is “a model for positive psychology exercises similar to Netflix for movies or Amazon for books and other products.”
    1. The Wall Street Journal reports that Google will be merging Chrome OS into Android, to be released sometime in 2017. Chrome OS runs on netbooks and provides most of its applications through the Web browser. As a result, it is a very secure system -- unlike Android, which has been quite vulnerable. Chrome OS will continue to exist as open source software, but Google will focus on extending Android to run on laptops.

    1. Placing the system at the center of analysis decenters a focus on technology and offers a moresynthetic perspective, bringing into our conception of machines all sorts of nontechnological ele-ments.

      So it is not really about the technology, but more about how we are implementing the use of it throughout the different areas where these systems are constructed.

  25. Oct 2015
    1. 6 But friendship can also form a kind of moral community, whose power should not be underestimated in its reach- ing across.

      If you have a strong enough support system pushing for the same goals (and influenced and tied together by similar morals), you can do anything

    1. Blacks were herded into the sights of unscrupulous lenders who took them for money and for sport.

      These lenders think this is all a game... It sickens me that another human would knowingly exploit someone's inability to establish a legitimate position in the credit system.

    1. Ultimately, Information Systems make connections between people, pieces of information, or events in time. In the best case, the IS does this in a way that is somehow better than a non-digital version of this.

  26. Jun 2015
    1. In my exuberance about all the awesome tweets I was reading, I didn’t think about the thousands of men out there who would be reading the same tweets and feel incensed at the injustice of this one poor man being pilloried for a single comment he made in bad taste. If you don’t look at the situation from the perspective of millions of women who work everyday in a world where unconscious bias against women in science and technology is pervasive, you see only this one man and what happened to him. I hope some people out there, men in particular, who have only been looking at this situation from Tim Hunt’s perspective, will try to open their minds to the way systemic bias impacts your female colleagues and see the whole event from that lens.

      Really interesting point about "blindness" to systemic problems or scenarios!

  27. Oct 2014
    1. IT'S ABOUT THE THINGS YOU SAY AND DO AND HOW THAT PROPAGATES A POSITIVE SOCIAL EFFECT OR A NEGATIVE SOCIAL EFFECT. BUT JUST AS HULK HAS ARGUED MANY TIMES, WE HAVE SUCH A DIFFICULT TIME SEEING OURSELVES AS ANYTHING BUT A PERSON IN A MOMENTARY INTERACTION. AND SO WE ONLY LIKE TO DEBATE THE FAIRNESS OF THAT MYOPIC INTERACTION ITSELF. WE ARE SO DAMN BAD AT SEEING OURSELVES AS PART OF A LARGER TREND / SYSTEM. WE ARE SO BAD AT SEEING WHAT WE ARE ACTUALLY ADVOCATING ON THE WHOLE.
    1. This in turn means that Redis Cluster does not have to take meta data in the data structures in order to attempt a value merge, and that the fancy commands and data structures supported by Redis are also supported by Redis Cluster. So no additional memory overhead, no API limits, no limits in the amount of elements a value can contain, but less safety during partitions.

      A solid trade-off, I think, and says a lot about the intended use cases.

  28. Mar 2014
    1. Delays that are too short cause overreaction, “chasing your tail,” oscillations amplified by the jumpiness of the response. Delays that are too long cause damped, sustained, or exploding oscillations, depending on how much too long. At the extreme they cause chaos. Overlong delays in a system with a threshold, a danger point, a range past which irreversible damage can occur, cause overshoot and collapse.
  29. Feb 2014
    1. Point 3 is almost certainly the one that still bugs Doug. All sorts of mechanisms and utilities are around and used (source code control, registries, WWW search engines, and on and on), but the problem of indexing and finding relevant information is tougher today than ever before, even on one's own hard disk, let alone the WWW.

      I would agree that "the problem of indexing and finding relevant information is tougher today than ever before" ... and especially "on one's own hard disk".

      Vannevar Bush recognized the problem of artificial systems of indexing long before McIlroy pulled this page from his typewriter in 1964, and here we are 50 years later using the same kind of filesystem indexing systems and wondering why it's harder than ever to find information on our own hard drives.

    1. The real heart of the matter of selection, however, goes deeper than a lag in the adoption of mechanisms by libraries, or a lack of development of devices for their use. Our ineptitude in getting at the record is largely caused by the artificiality of systems of indexing. When data of any sort are placed in storage, they are filed alphabetically or numerically, and information is found (when it is) by tracing it down from subclass to subclass. It can be in only one place, unless duplicates are used; one has to have rules as to which path will locate it, and the rules are cumbersome. Having found one item, moreover, one has to emerge from the system and re-enter on a new path. The human mind does not work that way. It operates by association. With one item in its grasp, it snaps instantly to the next that is suggested by the association of thoughts, in accordance with some intricate web of trails carried by the cells of the brain. It has other characteristics, of course; trails that are not frequently followed are prone to fade, items are not fully permanent, memory is transitory. Yet the speed of action, the intricacy of trails, the detail of mental pictures, is awe-inspiring beyond all else in nature.

      With the advent of Google Docs we're finally moving away from the archaic indexing mentioned here. The filesystem metaphor was simple and dominated how everyone manages their data-- which extended into how we developed web content, as well.

      The declaration that Hierarchical File Systems are Dead has led to better systems of tagging and search, but we're still far from where we need to be since there is still a heavy focus on the document as a whole instead of also the content within the document.

      The linearity of printed books is even more treacherously entrenched in our minds than the classification systems used by libraries to store those books.

      One day maybe we'll liberate every piece of content from every layer of its concentric cages: artificial systems of indexing, books, web pages, paragraphs, even sentences and words themselves. Only then will we be able to re-dress those thoughts automatically into those familiar and comforting forms that keep our thoughts caged.

  30. Jan 2014
    1. In all cases, one standard is clear: Each of these vendors is betting very heavily on HTML5-based applications as well as methods to make HTML5 compatibility the basis for their future. Whether made from Java or other language frameworks, HTML5 is the common thread that runs through each of these alternative mobile operating systems. Start with HTML5, and your applications’ portability is almost assured.

      Is there any other reasonable bet than HTML5?! Especially in the smartdevice realm where there is a rich set of HTML5-family features already enabled it makes less and less sense to make native applications except for special edge-cases. And any smartdevice competitors cannot possibly compete against iOS and Android on their own unique native app development format-- so HTML5 would seem the only reasonable place to focus development of new apps. Where Ubuntu succeeds is compatibility with an already well established Linux ecosystem.

  31. Nov 2013
    1. Is this also a narrative system? Narrative can be a powerful rhetorical tool and deterrence rhetoric (particularly through film) projected a certain narrative about the world. It almost seems to exist as stories that create filters or lenses through which the actors see the world; the system exists because they allow it to color their perceptions.