207 Matching Annotations
  1. Last 7 days
    1. We can't use algorithms to filter for quality because they're not designed to. They're designed to steer you towards whatever's most profitable for their creators.That puts the onus on us, as users, to filter out the noise and that is increasingly difficult.
  2. Feb 2024
    1. Die Selbstverpflichtungen der Regierungen zur Dekarbonisierung reichen bei weitem nicht aus. Ein Bericht, der von den Vereinten Nationen als Grundlage für die kommende COP28 publiziert wurde, ergibt, dass 2030 etwa 20 bis 23 Gigatonnen mehr CO<sub>2</sub> emittiert werden sollen, als mit dem 1,5 °-Ziel verträglich wäre. Zum ersten Mal wird in einem offiziellen UN-Dokument das Ende der Nutzung fossiler Brennstoffe gefordert. https://www.theguardian.com/environment/2023/sep/08/un-report-calls-for-phasing-out-of-fossil-fuels-as-paris-climate-goals-being-missed

      Bericht: https://unfccc.int/sites/default/files/resource/EMBARGOED_DRAFT_Sythesis-report-of-the-technical-dialogue-of-the-first-global-stocktake.pdf

      Bericht: https://unfccc.int/documents/631600

    1. Der CO<sub>2</sub>-Gehalt der Atmosphäre wird 2024 weiter steigen, so dass die vom IPCC erarbeiteten Pfade, um das 1,5°-Ziel einzuhalten, nicht mehr eingehalten werden können. Das ergibt sich aus einer Studie des britischen Met Office, die sich auf die Daten des Mauna Loa-Observatoriums in Hawai stützt. (Die obere Grenze der Unsicherheitsbereiche dieser Pfade ist erreicht, selbst wenn der El-Niño-Einfluss abgezogen wird. Ein Einhalten der Pfade würde ein sofortiges Absinken des CO<sub>2</sub>-Gehalts erfordern.) https://www.liberation.fr/environnement/climat-les-concentrations-de-co2-cette-annee-menacent-la-limite-de-15c-daugmentation-globale-des-temperatures-20240119_6JIALPQDBNADFGNHS4MVDXR5QA/?redirected=1

      Animation: https://youtu.be/RYPDvTWDi0E?si=wWEUnypFxQO8M9D7

      Bericht: https://www.metoffice.gov.uk/research/climate/seasonal-to-decadal/long-range/forecasts/co2-forecast-for-2024

  3. Jan 2024
    1. Wirth himself realized the problems of Pascal and his later languages are basically improved versions of Pascal -- Modula, Modula-2, and Oberon. But these languages didn't even really displace Pascal itself let alone C -- but maybe if he had named them in a way that made it clear to outsiders that these were Pascal improvements they would have had more uptake.

      Modula and Oberon should have been codenames rather than independent projects.

    1. 每個語言都有自己的一組音位,這也就是這個語言的語音系統[4],音位可用來研究某個特定語言中如何將音組合成詞。音位有時被譯為「音素」[5],然而音素一詞在中文裡的用法較為混亂,不一定都是指音位。

      很高興看到台、中、港兩國三地的維基百科,不約而同把phoneme正名為「音位」而非「音素」。另外,星馬澳也如此。唯一「不合群」的漢字用法是日語,稱之為「音素」,這對台灣的譯名影響不小。

      建議從今起,大家努力建立共識,一概把phoneme稱作「音位」、把phonemics稱作「音位學」,一勞永逸,與有歧義的詞「音素」區分開來。

      很不幸,在台灣、正體中文的文獻中,「音素」一詞既可能指phone,也可能指phoneme,而區分兩者的能力又是語音學(phonetics)、音位學(phonemics)的重頭戲!因爲術語詞彙的翻譯不統一而造成學習和理解的混亂,得不償失。

      很支持臺灣雙語無法黨提倡PA(phonemic awareness音位意識)的宗旨,但黨主席蕭博士對外一貫把PA中的phoneme稱作「音素」,就容易和phone(亦可稱「音素」)混淆。建議一起努力大聲說出「音位」。

  4. Dec 2023
  5. Oct 2023
    1. Messages are delineated by newlines. This means, in particular, that the JSON encoding process must not introduce newlines within a message. Note however that newlines are used in this document for readability.

      Better still: separate messages by double linefeed (i.e., a blank line in between each one). It only costs one byte and it means that human-readable JSON is also valid in all readers—not just ones that have been bodged to allow non-conformant payloads under special circumstances (debugging).

  6. Sep 2023
    1. If IFS is unset, or its value is exactly <space><tab><newline>, the default, then any sequence of IFS characters serves to delimit words. If IFS has a value other than the default, then sequences of the whitespace characters space and tab are ignored at the beginning and end of the word, as long as the whitespace character is in the value of IFS (an IFS whitespace character). Any character in IFS that is not IFS whitespace, along with any adjacent IFS whitespace characters, delimits a field. A sequence of IFS whitespace characters is also treated as a delimiter. If the value of IFS is null, no word splitting occurs.
    1. It seems that the method is a direct equivalent of a.fdiv(b).ceil, and as such, annoyingly unnecessary, but fdiv, due to floating point imprecision, might produce surprising results in edge cases
    1. As "module" is more generic concept than "class", the name misleadingly implies that either this method doesn't returns refined modules, or modules can't be refined. This is obviously not true and trivially disproved: module Refs refine Enumerable do def foo = puts 'foo' end end Refs.refinements[0].refined_class #=> Enumerable. Which is, well, not a class. # The refinement is usable, so it is not a mute concept: using Refs [1, 2, 3].foo # prints "foo" successfully I believe we refer to "modules" when some feature applies to modules and classes. Unless there is some deeper consideration for the current naming (I don't see justification in #12737, but I might miss something), the method should be renamed or aliased.
  7. Aug 2023
    1. Another way I get inspiration for research ideas is learning about people's pain points during software development Whenever I hear or read about difficulties and pitfalls people encounter while I programming, I ask myself "What can I do as a programming language researcher to address this?" In my experience, this has also been a good way to find new research problems to work on.
  8. Jul 2023
    1. "It's easier to ask forgiveness than it is to get permission."

      "It's easier to ask forgiveness than it is to get permission."

    1. Also, for those who for some reason prefer curly brackets over Python-style indenting, it is also possible to write:

      Good and sensible.

  9. May 2023
    1. articulates requirements for readability sating that identifiers must be: Any printable characters from the Universal Character Set of ISO/IEC 10646 (ISO 2012):UTF-8 encoding is required; Case insensitive:Only ASCII case folding is allowed.

      {UTF-8} {ASCII Case Folding}

    1. almost all beginners to RDF go through a sort of "identity crisis" phase, where they confuse people with their names, and documents with their titles. For example, it is common to see statements such as:- <http://example.org/> dc:creator "Bob" . However, Bob is just a literal string, so how can a literal string write a document?

      This could be trivially solved by extending the syntax to include some notation that has the semantics of a well-defined reference but the ergonomics of a quoted string. So if the notation used the sigil ~ (for example), then ~"Bob" could denote an implicitly defined entity that is, through some type-/class-specific mechanism associated with the string "Bob".

  10. Jan 2023
    1. Now, if you try to parse a date (using the pandas.to_datetime() function) that lies outside this range, we get the above ParseError.

      The datetime type in pandas can only take values inside a given range, for example, dates less than 1677-09-21 and greater than 2262-04-11 cannot be used in Pandas. Is this due to the bit size the datetime[ns] type uses in Pandas?

    1. The popular recommendation is that there should be between 40 and 75 characters per line. The findings of multiple studies conclude that "short line lengths are easier to read". Regarding learning and information retention: "Subjects reading the narrow paragraphs had better retention than those reading the wide paragraphs"
    1. Patch based systems are idiotic, that's RCS, that is decades old technology that we know sucks (I've had a cocktail, it's 5pm, so salt away).Do you understand the difference between pass by reference and pass by value?

      Larry makes a similar analogy (pass by value vs pass by reference) to my argument about why patches are actually better at the collaboration phase—pull requests are fragile links. Transmission of patch contents is robust; they're not references to external systems—a soft promise that you will service a request for the content when it comes. A patch is just the proposed change itself.

    1. how important is the concrete syntax of their language in contrast to

      how important is the concrete syntax of their language in contrast to the abstract concepts behind them what I mean they say can someone somewhat awkward concrete syntax be an obstacle when it comes to the acceptance

  11. Nov 2022
    1. The creators of Scrivener have taken a process that formerly had to be done manually by writers, and built a system of cues that make it easy and natural.
    1. The paradox of information systems[edit] Drummond suggests in her paper in 2008 that computer-based information systems can undermine or even destroy the organisation that they were meant to support, and it is precisely what makes them useful that makes them destructive – a phenomenon encapsulated by the Icarus Paradox.[9] For examples, a defence communication system is designed to improve efficiency by eliminating the need for meetings between military commanders who can now simply use the system to brief one another or answer to a higher authority. However, this new system becomes destructive precisely because the commanders no longer need to meet face-to-face, which consequently weakened mutual trust, thus undermining the organisation.[10] Ultimately, computer-based systems are reliable and efficient only to a point. For more complex tasks, it is recommended for organisations to focus on developing their workforce. A reason for the paradox is that rationality assumes that more is better, but intensification may be counter-productive.[11]

      From Wikipedia page on Icarus Paradox. Example of architectural design/technical debt leading to an "interest rate" that eventually collapsed the organization. How can one "pay down the principle" and not just the "compound interest"? What does that look like for this scenario? More invest in workforce retraining?

      Humans are complex, adaptive systems. Machines have a long history of being complicated, efficient (but not robust) systems. Is there a way to bridge this gap? What does an antifragile system of machines look like? Supervised learning? How do we ensure we don't fall prey to the oracle problem?

      Baskerville, R.L.; Land, F. (2004). "Socially Self-destructing Systems". The Social Study of Information and Communication Technology: Innovation, actors, contexts. Oxford: Oxford University Press. pp. 263–285

    1. @stephen@social.stephenfry.com

      This is where it starts getting ridiculous.

      First, rather than social.stephenfry.com, stephenfry.com should be sufficient. Look at email. I can set my MX records to point wherever I want. I don't actually have to have a server with A records to field the email traffic.

      Secondly, the @stephen part is superfluous, too! This is something where Mastodon et al had years (decades!) of hindsight to take care of this, and they still messed it up.

  12. Oct 2022
  13. Sep 2022
    1. Such schemas cannot easily be refactored without removing the benefits of sharing. Refactoring would require forking a local copy, which for schemas intended to be treated as an opaque validation interface with internal details that may change, eliminates the benefit of referencing a separately maintained schema in the first place.
    1. The LISP part, though, is not going well. Porting clever 1970s Stanford AI Lab macros written on the original SAIL machine to modern Common LISP is hard. Anybody with a knowledge of MACLISP want to help?
  14. Aug 2022
  15. Jun 2022
    1. Want to animate navigations between pages? You can’t (yet). Want to avoid the flash of white? You can’t, until Chrome fixes it (and it’s not perfect yet). Want to avoid re-rendering the whole page, when there’s only a small subset that actually needs to change? You can’t; it’s a “full page refresh.”

      an impedance mismatch, between what the Web is (infrastructure for building information services that follow the reference desk model—request a document, and the librarian will come back with it) versus what many Web developers want to be (traditional app developers—specifically, self-styled product designers with near 100% autonomy and creative control over the "experience")—and therefore what they want the Web browser to be (the vehicle that makes that possible, with as little effort as possible on the end of the designer–developer)

    1. Technical specs have immense benefits to everyone involved in a project: the engineers who write them, the teams that use them, even the projects that are designed off of them

      Benefits: 1. as developer, easy to solve problem 2. as team, easy to do team work 3. as Project manager, easy postmortems

  16. May 2022
    1. Because we didn’t have real marketing people, we updated the product to became more and more interesting to us, the developers, and less interesting to potential buyers.
    1. an acknowledgement of network effects: LP is unlikely to ever catch on enough to be the majority, so there needs to be a way for a random programmer using their preferred IDE/editor to edit a "literate" program

      This is part of the reason why I advocate for language skins for comparatively esoteric languages like Ada.

  17. Apr 2022
  18. Mar 2022
    1. You should link abundantly to other content. Wikipedia articles provide some of the best examples of “every page is page one” style.
  19. Jan 2022
    1. The nature of technical writing is explained in "The nature of technical writing". Technical communication is something we do every day without even noticing. Having strong communication skills is beneficial in all areas of one's life, from personal to professional. From a business standpoint, communication is key to every transaction. Communicating effectively allows others and yourself to understand information at a faster and more accurate rate. A lack of communication skills leads to frequent misunderstandings and frustration.

    2. Technical communication/writing is something that has been around for a very long time. The earliest examples belong to Aristotle and his dictionary of "philosophical terms" and his summary of the "Doctrines of Pythagoras". World War I is considered the "Golden Age" of technical writing due to advances in medicine and aerospace.

    1. What does a Functional Design have to offer? https://en.itpedia.nl/2019/01/16/wat-heeft-een-functioneel-ontwerp-te-bieden/ A functional design is a specification of the functions of the software that the end_users have agreed to. Many companies have a software_developer handbook that describes what topics a functional design should cover. This article looks at the steps of functional design in the context of software development.

  20. Nov 2021
  21. dictionary.cambridge.org dictionary.cambridge.org
    1. an example of a product, especially a computer program or piece of recorded music, given or shown to someone to try to make them buy or support it: a software demo

      I prefer this to the Merriam-Webster definition.

  22. Oct 2021
    1. user n. When referring to the reader, use "you" instead of "user." For example, "The user must..." is incorrect. Use "You must..." instead. If referring to more than one user, calling the collection "users" is acceptable, such as "Other users may want to access your database."
  23. Sep 2021
    1. Do not use articles in front of product names. For example, do not write "the JBoss Enterprise Application Platform was..."
    1. Vice versa, many researchers and practitioners who are mainly interested in human-centered social constructs choose to ignore the to them often alienating world of technical systems design.
    2. human-centered aspects that predominate in community informatics, like ethics, legitimacy, empowerment, and socio-technical design
    3. socio-technical
  24. Aug 2021
    1. "Whether those slashes were forward slashes or back slashes didn't affect how the Web worked," he says, "but it does affect how other developers react to it
  25. Jun 2021
  26. May 2021
    1. Hey, I'm a PhD in [field] and do [whatever] professionally. Before calling you, I've narrowed down the problem to [something on their end], so that's what needs to be addressed. If I could speak to an engineer about [specific problem], that'd be great; but if we've gotta walk through the script, let's just knock it out quickly. If they end up requiring the script, then the best way to use your expertise is to run through it quickly. Keep the chit-chat to a minimum and just do the stuff efficiently. If they start describing how to perform some step, you might interrupt them with, "Got it, just a sec.", then let them know once you're ready for the next step.
    2. So what can you do to demonstrate your technical knowledge? Well, you are doing the right thing by using the correct technical terms. That will give an indication to the person handling the ticket. Explicitly explaining your role as the administrator or developer should also help.
    3. From experience I can say that professionals will be more forgiving if you go through things at a basic level than amateurs who have no idea what you're talking about, so people will probably err on the side of caution and not assume the customer has a high level of expertise.
  27. Apr 2021
    1. (Yes, I realize from a technical, end-user perspective this really doesn't matter.)

      The word "technical" in this sentence doesn't seem to belong or to clarify anything. I think it would be clearer without it.

      But I think I understand what he's saying, which is that technical details don't matter to the end user. They only know/see/care if it works or not.

    1. If you want to run a full fletched linux OS on the ipad an option is to jailbreak the ipad and try to install linux. This is hard because Apple does not want you to and a failed installation might render the ipad useless. Also you will not be able to run any iOS apps anymore obviously.

      new tag?: jailbreaking a device

  28. Mar 2021
    1. I consider systemd/user as a good alternative for dex's autostart functionality and switched to it recently. In particular, systemd solves the issue of dex losing control over the started processes which causes processes to live longer than the X session which could cause additional annoyances like reboots taking a lot of time because the system is waiting for the processes to terminate.
    1. Refactoring is a means of addressing the problem of software rot. It is described as the process of rewriting existing code to improve its structure without affecting its external behaviour.
  29. Feb 2021
    1. The Subprocess macro will go through all outputs of the nested activity, query their semantics and search for tracks with the same semantic.
    1. Fewer screenshots means less maintenance work. If the product changes, the screenshots must change too, to remain helpful and prevent confusion. Lots of screenshots plus frequent product changes can cost a lot of time: keeping the docs in sync with the product can become unmanageable. A middle-ground approach is using text descriptions of UI elements, like “Click the START button”, as it’s easier to keep text descriptions matching the UI. And well-designed user interfaces and UI microcopy often mean that users don’t need screenshots to find their way through the product.
  30. Jan 2021
    1. JSONP is a relic of the past and shouldn’t be used due to numerous limitations (e.g., being able to send GET requests only) and many security concerns (e.g., the server can respond with whatever JavaScript code it wants — not necessarily the one we expect — which then has access to everything in the context of the window, including localStorage and cookies).
    1. The debate about whether a button or link should be used to download a file is a bit silly, as the whole purpose of a link has always been to download content. HTML is a file, and like all other files, it needs to be retrieved from a server and downloaded before it can be presented to a user. The difference between a Photoshop file, HTML, and other understood media files, is that a browser automatically displays the latter two. If one were to link to a Photoshop .psd file, the browser would initiate a document change to render the file, likely be all like, “lol wut?” and then just initiate the OS download prompt. The confusion seems to come from developers getting super literal with the “links go places, buttons perform actions.” Yes, that is true, but links don’t actually go anywhere. They retrieve information and download it. Buttons perform actions, but they don’t inherently “get” documents. While they can be used to get data, it’s often to change state of a current document, not to retrieve and render a new one. They can get data, in regards to the functionality of forms, but it continues to be within the context of updating a web document, not downloading an individual file. Long story short, the download attribute is unique to anchor links for a reason. download augments the inherent functionality of the link retrieving data. It side steps the attempt to render the file in the browser and instead says, “You know what? I’m just going to save this for later…”
  31. Dec 2020
  32. Nov 2020
    1. this is treated as debt work for of us and that's usually tackled during the first week in the milestone (roughly the first week in the month)
  33. Oct 2020
    1. Look at their Readme:

      Well we have had a great time adding field validations, but there are validations that are tied up to the whole record we are editing than to a given field, for instance let's face this scenario:
      
      - You are not allowed to transfer more than 1000 € to Switzerland using this form (for instance: you have to go through another form where some additional documentation is required).
      
      - The best place to fire this validation is at record level.
      
      - Record validation functions accept as input parameter that whole form record info, and return the result of the validation (it accepts both flavours sync and promise based), let's check the code for this validator:
      
      ...
      
    1. And if they are a technical debt - how do measure up how much you can borrow so you can afford the repayments?
    2. debt ... which is not a straight bad thing but something that could provide some "short term financing" get us to survive the project (how many of us could afford to buy a house without taking out the mortgage?).
    3. But recently I started to think about default values as some sort of a technical debt ... which is not a straight bad thing but something that could provide some "short term financing" get us to survive the project
  34. Sep 2020
    1. Customers care more about the value our application adds to their lives than the programming language or framework the application is built with. Visible Technical Debt such as bugs and missing features and poor performance takes precedence over Hidden Technical Debt such as poor test code coverage, modularity or removing dead code
    2. In the real world — the time to pay off technical debt is scarce — in most of the time fueled by the fear of the unknown. The management loves to milk the cow but not to change the litter. The developers on another hand avoid modernizing legacy code — to avoid trouble in case anything breaks.
    3. You are in crossroad to make a big decision: keep increasing the tech debt or start the migration before it is too late.
  35. Aug 2020
  36. Jun 2020
  37. May 2020
    1. This task disables two-factor authentication (2FA) for all users that have it enabled. This can be useful if GitLab’s config/secrets.yml file has been lost and users are unable to log in, for example.
    1. AppCache was standardized in the Offline Web applications section of the HTML specification. The standard is formally referred to as application caches. New Web applications should be built around Service Workers. Existing applications that use AppCache should migrate to Service Workers. AppCache access was removed from insecure origins in M70. This intent addresses AppCache usage in secure origins.

      First and foremost, AppCache is a deprecated standard with serious architectural concerns. Second, Chrome's AppCache implementation is a security and stability liability. AppCache is documented as deprecated and under removal in MDN and in the WHATWG standard, and marked as obsolete in W3C’s HTML 5.1. It is incompatible with CORS, making it unfriendly for usage with CDNs. Overall, AppCache was changed in over 400 Chromium CLs in 2018-2019. It has imposed a tax on all of Chrome’s significant architectural efforts: Mojofication, Onion Souping, and the Network Service. The security benefits of the removal are covered under Security Risks.

    1. Though GDPR is primarily a legal challenge, a technological response was also necessary to meet the transparency and control requirements that arise as a result of GDPR implementation.
    1. after nearly 10 years of continuous improvement

      Not necessarily a good or favorable thing. It might actually be preferable to pick a younger software product that doesn't have the baggage of previous architectural decisions to slow them down. Newer projects can benefit from both (1) the mistakes of previously-originated projects and (2) the knowledge of what technologies/paradigms are popular today; they may therefore be more agile and better able to create something that fits with the current state of the art, as opposite to the state of the art from 10 years ago (which, as we all know, was much different: before the popularity of GraphQL, React, headless CMS, for example).

      Older projects may have more technical debt and have more legacy technologies/paradigms/integrations/decisions that they now have the burden of supporting.

    1. It would be best to offer an official way to allow installing local, unsigned extensions, and make the option configurable only by root, while also showing appropiate warnings about the potential risks of installing unsigned extensions.
    2. I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
    3. As I see it, we've got 3 solutions in front of us currently to have in-line translation:
    4. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    5. It should be possible to implement the functionality of page-translator via a more popular extension that is designed to inject arbitrary data into websites, including remote code, e.g. https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/ .
    6. I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
    7. We must consider introducing sensible default options in Firefox, while also educating users and allowing them to override certain features, instead of placing marginal security benefits above user liberties and free choice.
    1. To load one temporarily go to about:debugging, "This Firefox" and click "Load temporary add-on from file". More permanently: many (most?) Linux distributions allow unsigned extensions to be placed in /usr/lib/firefox/browser/extensions/ and they will automatically be loaded, provided they have valid names (e.g. dodgy@unsignedextension.com.xpi).
  38. Apr 2020
    1. Running the same code in the browser and on the server in order to avoid code duplication is a very different problem. It is simply a matter of good development practices to avoid code duplication. This however is not limited to isomorphic applications. A utility library such as Lodash is “universal”, but has nothing to do with isomorphism. Sharing code between environments does not give you an isomorphic application. What we’re referring to with Universal JavaScript is simply the fact that it is JavaScript code which is environment agnostic. It can run anywhere. In fact most JavaScript code will run fine on any JavaScript platform.
    2. Having the server render the HTML on first page load is the functional part, the thing that provides for a better user experience. The technical part is where we use the same code in both environments, which no user ever asked for, but makes a developer’s life easier (at least in theory).
    1. The result, all too often, is that we decide (often unconsciously) that the sweeping change just isn't worth it, and leave the undesirable pattern untouched for future versions of ourselves and others to grumble about, while the pattern grows more and more endemic to the code base.
  39. Mar 2020
  40. Feb 2020
  41. Jan 2020
  42. Dec 2019
    1. Do the technical administrators have to be the same people doing the social organizing? I think the answer as of June 2019 is, sadly, yes. If you have 2 people with root access to the server and 2 people managing the community aspects, you'll end up with imbalances in that group of 4. You will end up with technical administrators who feel like code monkeys who never get the gratitude that the community organizers get, or you'll end up with community organizers who feel like glorified babysitters while the techies have all the real power. You might even end up with a situation where both are true. I think that if you're dedicated to this sort of project though, you could start with something like that 2 and 2, and then the techies could teach the organizers the technical skills, and the organizers could teach the techies the organizing skills.
  43. Sep 2019
  44. Aug 2019
  45. Feb 2019
  46. Jan 2019
  47. www.at-the-intersection.com www.at-the-intersection.com
    1. Kind of the technical philosophy is everything that happens in the market is captured in the data and so any headline moves will be captured pretty much instantaneously or in a few minutes in the charts.
    2. Yeah, uh, I would say for reallocating, I'm, yeah. So I would say on Gemini I do Bitcoin, ethereum, and that's kind of like the longer term things.
    3. Uh, I definitely have some other, you know, mostly it's mostly I use ta very, very ta heavy. Um, I will, but I'll always keep the fundamentals in mind, especially for the medium to long term.
    4. I really try to focus on technicals cause I mean, yeah, the technicals is, is supposed to be representative, at least from an historical standpoint of the sentiment, right? Like if it's, if it's losing, if people are losing faith in it, then you'll probably see where did it go down? You'll see the price get affected by it. Um, and I tried to just trade on that. I try to minimize my sources all over the place.
    5. So depending on where you're trading, you could put more emphasis on where the other, when when you're doing fundamental analysis on a stock, there's a lot more information going into that, you know, potential company valuation. Um, whereas I would argue most cryptocurrencies heavily lack fundamentals at all.
    6. I personally try to trade based on technicals only. I'll read stuff for more general and for information. Um, but I guess the way I look at is like technical is this more short term? And fundamentals is more longterm.
    7. Uh, yeah, I'm in a few groups. There's a couple of the crypto focused, uh, the also have been just, I wouldn't say [inaudible], but have put more emphasis on, you know, since we're technical traders, there's a reason not to take advantage of, uh, the market opportunities and traditional as they pop up. So we've been focused mainly on just very few inverse etfs to short the s&p to short some major Chinese stocks, um, doing some stuff with, uh, oil, gas. And then there's some groups that I'm in that are specifically focused on just traditional, uh, that are broken up or categorized by what they're trading.
    1. I respect the idealism of blockchain developers who, I believe, are sincere in their faith that they are building a better world. But I am confounded by their inability to see that they are falling victim to exactly the same fallacies their hacker forebears embraced: this notion that we can code ourselves out of the deep holes we’ve dug; that we are building utopias in our virtualities that will finesse away the imperfections of human character.

      <big>评:</big><br/><br/>将区块链与互联网发展史作同类比较,的确能发现相似的轨迹,但也难逃倚老卖老的嫌疑。从何时起,我们给自己立下了「后来者无论成功与失败,始终跑在前人滑破的气流里」这一金科玉律?值得一提的是,见证时代前沿发展的进步主义者,在世界观上大多并不前沿,甚至很前现代。<br/><br/>试问:你渴望完美无缺的人设吗?若是,那你又可否期待「能加速该进程」的技术横空出世?自渡与普渡,向来是技术社群必须直面的哲学迷思。

    1. Contrary to mainstream thinking that this new technology is unregulated, it’s really quite the opposite. These systems apply the strictest of rules under highly deterministic and predictable models that are regulated through mathematics. In the future, industry will be regulated not just by institutions and committees but by algorithms and mathematics. The new technology will gradually out-regulate the regulators and, in many cases, make them obsolete because the new system offers more certainty. Antonopoulos explains that “the opposite of authoritarianism is not chaos, but autonomy.”

      <big>评:</big><br/><br/>1933 年德国包豪斯设计学院被纳粹关闭,大部分师生移民到美国,他们同时也把自己的建筑风格带到了美利坚。尽管人们在严格的几何造型上感受到了冷漠感,但是包豪斯主义致力于美术和工业化社会之间的调和,力图探索艺术与技术的新统一,促使公众思考——「如何成为更完备的人」?而这一点间接影响到了我们现在所熟知的美国式人格。<br/><br/>区块链最终会超越「人治」、达到「算法自治」的状态吗?类似的讨论声在人工智能领域同样不绝于耳。「绝对理性」站到了完备人格的对立面,这种冰冷的特质标志着人类与机器交手后的败退。过去有怀疑论者担心,算法的背后实际上由人操控,但随着「由算法生成」的算法,甚至「爷孙代自承袭」算法的出现,这样的担忧逐渐变得苍白无力——我们有了更大的焦虑:是否会出现 “blockchain-based authoritarianism”?

    1. CTP is a key method for reflective design, since it offers strategies to bring unconscious values to the fore by creating technical alternatives. In our work, we extend CTP in several ways that make it particularly appropriate for HCI and critical computing.

      Ways in which Senger, et al., describe how to extend CTP for HCI needs:

      • incorporate both designer/user reflection on technology use and its design

      • integrate reflection into design even when there is no specific "technical impasse" or metaphor breakdown

      • driven by critical concerns, not simply technical problems

    2. CTP synthesizes critical reflection with technology production as a way of highlighting and altering unconsciously-held assumptions that are hindering progress in a technical field.

      Definition of critical technical practice.

      This approach is grounded in AI rather than HCI

      (verbatim from the paper) "CTP consists of the following moves:

      • identifying the core metaphors of the field

      • noticing what, when working with those metaphors, remains marginalized

      • inverting the dominant metaphors to bring that margin to the center

      • embodying the alternative as a new technology

  48. Dec 2018
    1. Our under-standing of the gap is driven by technological exploration through artifact cre-ation and deployment, but HCI and CSCW systems need to have at their corea fundamental understanding of how people really work and live in groups, or-ganizations, communities, and other forms of collective life. Otherwise, wewill produce unusable systems, badly mechanizing and distorting collabora-tion and other social activity.

      The risk of CSCW not driving toward a more scientific pursuit of social theory, understanding, and ethnomethodology and instead simply building "cool toys"

    2. The gap is also CSCW’s unique contribution. CSCW exists intellectually atthe boundary and interaction of technology and social settings. Its unique intel-lectual importance is at the confluence of technology and the social, and its

      CSCW's potential to become a science of the artificial resides in the study of interactions between society and technology

    3. Nonetheless, it has been argued here that theunique problem of CSCW is the social–technical gap. There is a fundamentalmismatch between what is required socially and what we can do technically.Human activity is highly nuanced and contextualized. However, we lack thetechnical mechanisms to fully support the social world uncovered by the socialfindings of CSCW. This social–technical gap is unlikely to go away, although itcertainly can be better understood and perhaps approached.

      Factors involved in the socio-technical gap:

      Social needs vs technical capacity

      Human activity

      Technical mechanisms continue to lag social insights

    4. Nonetheless, several guiding questions are required based on thesocial–technical gap and its role in any CSCW science of the artificial:• When can a computational system successfully ignore the need fornuance and context?• When can a computational system augment human activity withcomputer technologies suitably to make up for the loss in nuance andcontext, as argued in the approximation section earlier?• Can these benefits be systematized so that we know when we are add-ing benefit rather than creating loss?• What types of future research will solve some of the gaps betweentechnical capabilities and what people expect in their full range of so-cial and collaborative activities?

      Questions to consider in moving CSCW toward a science of the artificial

    5. The final first-order approximation is the creation of technical architecturesthat do not invoke the social–technical gap; these architectures neither requireaction nor delegate it. Instead, these architectures provide supportive oraugmentative facilities, such as advice, to users.

      Support infrastructures provide a different type of approximation to augment the user experience.

    6. Another approximation incorporates new computational mechanisms tosubstitute adequately for social mechanisms or to provide for new social issues(Hollan & Stornetta, 1992).

      Approximate a social need with a technical cue. Example in Google Docs of anonymous user icons on page indicates presence but not identity.

    7. First-order approximations, to adopt a metaphor from fluid dynamics, aretractable solutions that partially solve specific problems with knowntrade-offs.

      Definition of first-order approximations.

      Ackerman argues that CSCW needs a set of approximations that drive the development of initial work-arounds for the socio-technical gaps.

      Essentially, how to satisfy some social requirements and then approximate the trade-offs. Doesn't consider the product a solution in full but something to iterate and improve

      This may have been new/radical thinking 20 years ago but seems to have been largely adopted by the CSCW community

    8. Similarly, an educational perspective would argue that programmers andusers should understand the fundamental nature of the social requirements.

      Ackerman argues that CS education should include understanding how to design/build for social needs but also to appreciate the social impacts of technology.

    9. CSCW’s science, however, must centralize the necessary gap between whatwe would prefer to construct and what we can construct. To do this as a practi-cal program of action requires several steps—palliatives to ameliorate the cur-rent social conditions, first-order approximations to explore the design space,and fundamental lines of inquiry to create the science. These steps should de-velop into a new science of the artificial. In any case, the steps are necessary tomove forward intellectually within CSCW, given the nature of the social–tech-nical gap.

      Ackerman sets up the steps necessary for CSCW to become a science of the artificial and to try to resolve the socio-technical gap:

      Palliatives to ameliorate social conditions

      Approximations to explore the design space

      Lines of scientific inquiry

    10. Ideological initiatives include those that prioritize the needs of the peopleusing the systems.

      Approaches to address social conditions and "block troublesome impacts":

      Stakeholder analysis

      Participatory design

      Scandinavian approach to info system design requires trade union involvement

    11. Simon’s (1969/1981) book does not address the inevitable gaps betweenthe desired outcome and the means of producing that outcome for anylarge-scale design process, but CSCW researchers see these gaps as unavoid-able. The social–technical gap should not have been ignored by Simon.Yet, CSCW is exactly the type of science Simon envisioned, and CSCW couldserve as a reconstruction and renewal of Simon’s viewpoint, suitably revised. Asmuch as was AI, CSCW is inherently a science of the artificial,

      How Ackerman sees CSCW as a science of the artificial:

      "CSCW is at once an engineering discipline attempting to construct suitable systems for groups, organizations, and other collectivities, and at the same time, CSCW is a social science attempting to understand the basis for that construction in the social world (or everyday experience)."

    12. At a simple level,CSCW’s intellectual context is framed by social constructionism andethnomethodology (e.g., Berger & Luckmann, 1966; Garfinkel, 1967), systemstheories (e.g., Hutchins, 1995a), and many large-scale system experiences (e.g.,American urban renewal, nuclear power, and Vietnam). All of these pointed tothe complexities underlying any social activity, even those felt to be straightfor-ward.

      Succinct description of CSCW as social constructionism, ethnomethodlogy, system theory and large-scale system implementation.

    13. Yet,The Sciences of the Artificialbecame an an-them call for artificial intelligence and computer science. In the book he ar-gued for a path between the idea for a new science (such as economics orartificial intelligence) and the construction of that new science (perhaps withsome backtracking in the creation process). This argument was both charac-teristically logical and psychologically appealing for the time.

      Simon defines "Sciences of the Artificial" as new sciences/disciplines that synthesize knowledge that is technically or socially constructed or "created and maintained through human design and agency" as opposed to the natural sciences

    14. The HCI and CSCW research communitiesneed to ask what one might do to ameliorate the effects of the gap and to fur-ther understand the gap. I believe an answer—and a future HCI challenge—is toreconceptualize CSCW as a science of the artificial. This echoes Simon (1981)but properly updates his work for CSCW’s time and intellectual task.2

      Ackerman describes "CSCW as a science of the artificial" as a potential approach to reduce the socio-technical gap

    15. As Heilbroner (1994) and other researchers have argued, technological tra-jectories are responsive to social direction. I make the case that they may alsobe responsive to intellectual direction.1Indeed, a central premise of HCI isthat we should not force users to adapt.

      Ackerman concludes the discussion about socio-technical gaps that people should not be forced to adapt to technology.

      Technology can and should respond to social and intellectual direction.

      Cites Heilbroner (1994) who writes about technological determinism that I should take a look at

      http://www.f.waseda.jp/sidoli/Heilbroner_1994.pdf

    16. The coevolutionary form of this argument is that we adapt resources in theenvironment to our needs. If the resources are capable of only partial satisfac-tion, then we slowly create new technical resources to better fit the need.

      Another argument that social practices should adapt and evolve alongside technology. Ackerman raises concerns about this viewpoint becoming "invisible" and simply accepted or assumed as a norm without question.

    17. A second argument against the significance of the gap is historically based.There are several variants: that we should adapt ourselves to the technology orthat we will coevolve with the technology.

      Alternatively, humans should adapt or coevolve with intractable technologies. Ackerman cites neo-Taylorism (an economic model that describes work produced by redundant processes and splintered socio-technical activities)

    18. A logically similar argument is that the problem is with the entire vonNeumann machine as classically developed, and new architectures will ame-liorate the gap. As Hutchins (1995a) and others (Clark, 1997) noted, the stan-dard model of the computer over the last 30 years was disembodied, separatedfrom the physical world by ill-defined (if defined) input and output devices.

      This related argument that neural network designed systems will overcome the socio-technical gap created by highly architected computer systems that are explicit and inflexible. Ackerman argues here, too, that the advances have not yet arrived and the gap has endured.

      Quick summary of von Neumann architecture

      https://en.wikipedia.org/wiki/Von_Neumann_architecture

    19. First, it could be that CSCW researchers merely have not found the properkey to solve this social–technical gap, and that such a solution, using existingtechnologies, will shortly exist.

      One argument against the socio-technical gap is that future advances in technology will solve the problem. Ackerman argues this is unlikely since the gap has existed for more than 20 years despite attempts to bridge the gap.

    20. Theproblem, then, was centered by social scientists in the process of design. Cer-tainly, many studies in CSCW, HCI, information technology, and informa-tion science at least indirectly have emphasized a dichotomy betweendesigners, programmers, and implementers on one hand and the social ana-lyst on the other.

      Two different camps on how to resolve this problem:

      1) Change more flexible social activity/protocols to better align with technical limitations 2) Make systems more adaptable to ambiguity

    21. In particular, concurrency control problems arise when the software, data,and interface are distributed over several computers. Time delays when ex-changing potentially conflicting actions are especially worrisome. ... Ifconcurrency control is not established, people may invoke conflicting ac-tions. As a result, the group may become confused because displays are incon-sistent, and the groupware document corrupted due to events being handledout of order. (p. 207)

      This passage helps to explain the emphasis in CSCW papers on time/duration as a system design concern for workflow coordination (milliseconds between MTurk hits) versus time/representation considerations for system design

    22. Moreover,one of the CSCW findings was that such categorization (and especially howcategories are collapsed into meta-categories) is inherently political. The pre-ferred categories and categorization will differ from individual to individual.

      Categories have politics.

      See: Suchman's 1993 paper

      https://pdfs.semanticscholar.org/764c/999488d4ea4f898b5ac5a4d7cc6953658db9.pdf

    23. Because some of the idealization must be ignored to pro-vide a working solution, this trade-off provides much of the tension in anygiven implementation between “technically working” and “organizationallyworkable” systems. CSCW as a field is notable for its attention and concern tomanaging this tension.

      Nice summation of the human and technical tensions in CSCW

    24. Incentives are critical.

      Costs, motives, and incentives drive collaboration. Again, refer to peer production literature here from Benkler and Mako, and Kittur, Kraut, et al

    25. People not only adapt to their systems, they adapt their systems to theirneeds

      Another reference to matching technology to design heuristics -- user control and system/real world needs.

    26. There appears to be a critical mass problem for CSCW systems

      Perpetual problem but is critical mass more of market issue (large vs niche need and who will pay for it) or a technical issue (meets need vs low adoption due to being ahead of its time)?

    27. The norms for using a CSCW system are often actively negotiatedamong users.

      Community norms are well-discussed in the crowdsourcing and peer production literature.

      See: Benkler, Mako and Kittur, Kraut, et al

    28. Visibility of communication exchanges and of information enableslearning and greater efficiencies

      Evokes the distributed cognition literature as well peer production, crowdsourcing, and collective intelligence practices.

    29. eople prefer to know who else is present in a shared space, and they usethis awareness to guide their work

      Awareness, disclosure, and privacy concerns are key cognitive/perception needs to integrate into technologies. Social media and CMCs struggle with this knife edge a lot.

      It's also seems to be a big factor in SBTF social coordination that leads to over-compensating and pluritemporal loading of interactions between volunteers.

    30. Exceptions are normal in work processes.

      More specific reference to workflow as a prime CSCW concern. Exceptions, edge cases, and fluid roles need to be accommodated by technology.

    31. Members of organizations sometimes have differing (and multiple)goals, and conflict may be as important as cooperation in obtaining is-sue resolutions (Kling, 1991). Groups and organizations may not haveshared goals, knowledge, meanings, and histories (Heath & Luff,1996; Star & Ruhleder, 1994).

      A lot to unpack here as this bullet gets at the fundamental need for boundary objects (Star's work) to traverse sense-making, meanings, motives, and goals within artifacts.

    32. One finding of CSCW is that it is sometimes easier and better toaugment technical mechanisms with social mechanisms to control,regulate, or encourage behavior (Sproull & Kiesler, 1991)

      HCI / interface design heuristics re: user controls, etc.

      See: https://www.nngroup.com/articles/ten-usability-heuristics/

    33. because people of-ten lack shared histories and meanings (especially when they are indiffering groups or organizations), information must berecontextualized to reuse experience or knowledge. Systems often as-sume a shared understanding of information.

      References Goffman's work on identity and representation.

      Touches again on Suchman's work on context in situations.

    34. Yet, systems often have considerable difficulty han-dling this detail and flexibility.

      This remains a problem in HCI/CSCW nearly two decades after this paper was published.

      Why?

      Do the theories and models (symbolic vs non-symbolic) not adequately describe the human-side of the technical interaction? Or the technical-side of the human behavior/motive/need?

      Is the gap less nuance in (detail about) behavior and more a function of humans are fickle, contradictory, and illogical.

    35. Social activity is fluid and nuanced, and this makes systems techni-cally difficult to construct properly and often awkward to use.

      CSCW assumption.

      See also: Suchman's 1987 situated action book and contests in Vera and Simon's 1993 paper

      Gist of SA is that HCI (and its breakdowns) must be studied in real-life situations, knowing is inseparable from doing, and cognition can't be separated from context.

      Good summary here:

      https://en.wikipedia.org/wiki/Situated_cognition

      https://books.google.com/books?hl=en&lr=&id=AJ_eBJtHxmsC&oi=fnd&pg=PR7&dq=suchman&ots=KrKpjGFHGV&sig=hmJ_pyJymoEweA_XDFWdMedSL4s#v=onepage&q=suchman&f=false

      https://www.sciencedirect.com/science/article/abs/pii/S0364021305800084

      https://onlinelibrary.wiley.com/doi/epdf/10.1207/s15516709cog1701_5

    36. March and Simon’s (1958; Simon, 1957) limited rational actormodel underlies CSCW

      Refers to Simon's argument that "decision makers have limited information processing capabilities" due to cognitive constraints that limit computational thinking, memory and recall.

      Instead of searching for the best outcome, people use a "good enough" standard. (see Tapia and Moore 2014 crisis informatics paper).

      "Satisficing" describes the process of ending the search for possible decisions once an option achieves a "good enough" alternative. (see Palen, Vieweg and Anderson, 2010 everyday analysts paper)

      See: http://oxfordre.com/politics/view/10.1093/acrefore/9780190228637.001.0001/acrefore-9780190228637-e-405

    37. I also arguelater that the challenge of the social–technical gap creates an opportunity to re-focus CSCW as a Simonian science of the artificial (where a science of the arti-ficial is suitably revised from Simon’s strictly empiricist grounds).

      Simonian Science of the Artificial refers to "a physical symbol system that has the necessary and sufficient means for intelligent action."

      From Simon, Herbert, "The Sciences of the Artificial," Third Edition (1996)

    38. In summary, they argue that human activity is highly flexible,nuanced, and contextualized and that computational entities such as informa-tion sharing, roles, and social norms need to be similarly flexible, nuanced, andcontextualized.

      CSCW assumptions about social activity

    39. Thesocial–technical gapis the divide between what we know we must support sociallyand what we can support technically. Exploring, understanding, and hopefullyameliorating this social–technical gap is the central challenge for CSCW as afield and one of the central problems for human–computer interaction.

      primary challenge for CSCW scholars and practitioners

  49. Oct 2018
    1. The facsimile was printed on Factum Arte”s purpose-built flatbed printer (figure 34). This is based on an Epson Pro 9600 digital printer. The printer uses pigment inks in seven colors (cyan, light cyan, magenta, light magenta, yellow, black and light black). The bed is fixed, and the print heads move up and down the bed on linear guides. The movement of the heads is accurate to a few microns, and their height can be adjusted during printing. This made it possible to print the image in pigment onto gesso-coated canvas. The gesso coating, a mixture of animal glue, calcium carbonate, and precipitated chalk, used no metal oxides. The texture on the surface of the 16-ounce Irish flax was made from flax fibers and threads mixed with gesso. Due to its history Le Nozze di Cana has a complex and unusual surface. To reproduce this appearance, each piece of canvas was coated with a layer of animal glue, a layer of gesso and fibers, and then two layers of gesso. Acetate sheets printed with the Phase One photographic data were used, with a pin registration system, to ensure accurate placement of the texture on the prepared canvas. Each panel was then printed twice in perfect register. The first layer to be printed was the information recorded on the Phase One photographs. The second layer was the scanner data. The overprinting resulted in accurate color matching and a control of the tonal values of the painting. The entire image was divided into printing files, with io centimetres of overlap. The printed panels were varnished with a satin Golden acrylic varnish with UVLS (an ultraviolet filter)

      fascinating to read how the process of reproducing a copy was created, sounds like it was a far more technical and thought process. perhaps more so than the original, which may take away from the 'aura' had i known this information before seeing the copy.

    2. Factum Arte built a non-contact color scanning sys tem that uses a large format CCD and integrated LED lights. The system records at a scale of i s i at a maximum resolution of i,2oo dots per inch (dpi). The scanning unit is mounted on a telescopic mast, which is operated by an air pump and can accurately position the scanning unit on the vertical axis.

      Charge-coupled device (CCD) with digital imaging sensors, also called Scanography. Find details on http://www.factum-arte.com/pag/38/A-facsimile-of-the-Wedding-at-Cana-by-Paolo-Veronese

  50. Feb 2017
    1. Not only were his subjects idiosyncratic, but his style was poetic, aphoristic, dra~atic, and colorful.

      As far as our readings go, did we not just establish technical writing as the new fad?

  51. Jul 2015
    1. I began to wonder if by merely assessing the mechanistic aspects of cataloging work we were missing out on an opportunity to include broader social concepts in our assessment and planning processes

      yes, this! I'm really interested in this

    1. TECHNICAL DEBT: A lot of new code is written very very fast, because that’s what the intersection of the current wave of software development (and the angel investor / venture capital model of funding) in Silicon Valley compels people to do. Funders want companies to scale up, quickly, and become monopolies in their space, if they can, through network effects — a system in which the more people use a platform, the more valuable it is. Software engineers do what they can, as fast as they can. Essentially, there is a lot of equivalent of “duct-tape” in the code, holding things together. If done right, that code will eventually be fixed, commented (explanations written up so the next programmer knows what the heck is up) and ported to systems built for the right scale — before there is a crisis. How often does that get done? I wager that many wait to see if the system comes crashing down, necessitating the fix. By then, you are probably too big to go down for too long, so there’s the temptation for more duct tape. And so on.