110 Matching Annotations
  1. Last 7 days
    1. the real problem is what we're layering the web on we shouldn't be doing the web over this kind of just simple file distribution system that works over TCP and you have to work really hard to put over anything else we should be putting the web over a distribution system that can deal with the distributed case that is offline first and uh this is are kind of like stats showing the usage of mobile apps versus uh the web and so on so this is a very real real thing

      for - quote / insight - We shouldn't be doing the web over this simple file distribution system that works over TCP - Juan Benet - IPFS

  2. Oct 2024
    1. That this talent for organization and management is rare among men is proved by the fact that it invariably secures for its possessor enormous rewards, no matter where or under what laws or conditions.

      for - critique - extreme wealth a reward for rare management skills - Andrew Carnegie - The Gospel of Wealth - Mondragon counterexample - to - stats - Mondragon pay difference between highest and lowest paid - article - In this Spanish town, capitalism actually works for the workers - Christian Science Monitor - Erika Page - 2024, June 7

      critique - extreme wealth a reward for rare management skills - Andrew Carnegie - The Gospel of Wealth - Mondragon counterexample - This is invalidated today by large successful cooperatives such as Mondragon

      to - stats - Mondragon corporation - comparison of pay difference between highest paid and lowest paid - https://hyp.is/QAxx-o14Ee-_HvN5y8aMiQ/www.csmonitor.com/Business/2024/0513/income-inequality-capitalism-mondragon-corporation

  3. Sep 2024
    1. In practice when people use ||, they do mean ?? (whatever its spelling). It just so happens that most of the time, it does what you want, because you happen to not be dealing with Booleans. But the semantics you mean to express is not about "truthness", but about "nilness". And occasionally you get bitten because false does exist, and behaves differently.
  4. Aug 2024
  5. Jul 2024
  6. May 2024
  7. Sep 2023
    1. This allows reading your email offline without the need for your mail reader (MUA) to support IMAP operations. Need an attachment from a message without internet connection? No problem, the message is still there.
  8. Jun 2023
  9. May 2023
  10. Mar 2023
  11. Sep 2022
    1. Can copyright vest in an AI? The primary objective of intellectual property law is to protect the rights of the creators of intellectual property.10 Copyright laws specifically aim to: (i) promote creativity and encourage authors, composers, artists and designers to create original works by affording them the exclusive right to exploit such work for monetary gain for a limited period; and (ii) protect the creators of the original works from unauthorised reproduction or exploitation of those works.

      Can copyright vest in an AI?

      The primary objective of intellectual property law is to protect the rights of the creators of intellectual property.10 Copyright laws specifically aim to: (i) promote creativity and encourage authors, composers, artists and designers to create original works by affording them the exclusive right to exploit such work for monetary gain for a limited period; and (ii) protect the creators of the original works from unauthorised reproduction or exploitation of those works.

    1. To my knowledge, conferring copyright in works generated by artificial intelligence has never been specifically prohibited. However, there are indications that the laws of many countries are not amenable to non-human copyright. In the United States, for example, the Copyright Office has declared that it will “register an original work of authorship, provided that the work was created by a human being.” This stance flows from case law (e.g. Feist Publications v Rural Telephone Service Company, Inc. 499 U.S. 340 (1991)) which specifies that copyright law only protects “the fruits of intellectual labor” that “are founded in the creative powers of the mind.” Similarly, in a recent Australian case (Acohs Pty Ltd v Ucorp Pty Ltd), a court declared that a work generated with the intervention of a computer could not be protected by copyright because it was not produced by a human.

      To my knowledge, conferring copyright in works generated by artificial intelligence has never been specifically prohibited. However, there are indications that the laws of many countries are not amenable to non-human copyright. In the United States, for example, the Copyright Office has declared that it will “register an original work of authorship, provided that the work was created by a human being.” This stance flows from case law (e.g. Feist Publications v Rural Telephone Service Company, Inc. 499 U.S. 340 (1991)) which specifies that copyright law only protects “the fruits of intellectual labor” that “are founded in the creative powers of the mind.” Similarly, in a recent Australian case (Acohs Pty Ltd v Ucorp Pty Ltd), a court declared that a work generated with the intervention of a computer could not be protected by copyright because it was not produced by a human.

    1. With the advent of AI software, computers — not monkeys — will potentially create millions of original works that may then be protected by copyright, under current law, for more than 100 years.

      With the advent of AI software, computers — not monkeys — will potentially create millions of original works that may then be protected by copyright, under current law, for more than 100 years.

  12. Aug 2022
    1. When Vladimir Nabokov died in 1977, he left instructions for his heirs to burn the 138 handwritten index cards that made up the rough draft of his final and unfinished novel, The Original of Laura. But Nabokov’s wife, Vera, could not bear to destroy her husband’s last work, and when she died, the fate of the manuscript fell to her son. Dmitri Nabokov, now seventy-five—the Russian novelist’s only surviving heir, and translator of many of his books—has wrestled for three decades with the decision of whether to honor his father’s wish or preserve for posterity the last piece of writing of one of the greatest writers of the twentieth century.

      Nabokov's wishes were that his heirs burn the index cards on which he had handwritten the beginning of his unfinished novel The Original of Laura. His wife Vera, not able to destroy her husband's work, couldn't do it, so the decision fell to their son Dimitri. Having translated many of his father's works previously, Dimitri Nabokov ultimately allowed Penguin the right to publish the unfinished novel.

    1. And if you still need a why–I’ll let this quote from Seneca answer it (which I got from my own reading and notes): “We should hunt out the helpful pieces of teaching and the spirited and noble-minded sayings which are capable of immediate practical application–not far far-fetched or archaic expressions or extravagant metaphors and figures of speech–and learn them so well that words become works.”
  13. Jul 2022
    1. It feels like « removing spring » is one of those unchallenged truths like « always remove Turbolinks » or « never use fixtures ». It also feels like a confirmation bias when it goes wrong.

      "unchallenged truths" is not really accurate. More like unchallenged assumption.

    1. I have always liked the weaving loom as a metaphor for weaving the absolute and relative together into one cloth. The absolute can be the warp, the relative can be the woof, and the shuttle or the jade works , can spin them all together into one cloth. It’s not that we have to make them into one cloth, they are always manifesting together in simultaneous realization . The jade works is the activity of life itself, the total dynamic functioning of the activity of the universe. Sometimes translated as: The Whole Works. Always right here. All-at-oneness.

      Weaving loom analogy! In life, weave the absolute and the relative into one clothes. The absolute is the warp The relative is the woof the Jade Works is the shuttle spinning appearances into one beautiful tapestry. one beautiful simultaneous realization The Whole Works!

      OR

      The absolute and relative are two sides of the same coin

    2. Dogen is constantly and repeatedly trying to knock us off our intellectual center and interrupt our thinking.  He does not confirm any one solid view of so-called reality. He doesn’t want us to get stuck to one side or the other in the dynamic pivoting of life’s opposite. Do not cling to the absolute or the relative truth. They dynamically and mutually work with each other. Dogen would describe this interaction as “The Whole Works.”

      This is a nice way to describe this process...."repeatedly trying to knock us out of our intellectual center and interrupt our (one sided) thinking."

      We should observe this inherent property of our thinknig process, its one-sided nature.

  14. May 2022
    1. I think RSpec should provide around(:context)/around(:all). Not because of any particular use case, but simply for API consistency. It's much simpler to tell users "there are 3 kinds of hooks (before, after and around) and each can be used with any of 3 scopes (example, context and suite)". Having some kinds of hooks work with only some kinds of scopes makes the API inconsistent and forces us to add special case code to emit warnings and also write extra documentation for this fact.
  15. Apr 2022
  16. Nov 2021
    1. Even if #foo is originally on the page and then removed and replaced with a #foo which contains baz after a short wait, Capybara will still figure this out.
    2. As long as you stick to the Capybara API, and have a basic grasp of how its waiting behaviour works, you should never have to use wait_until explicitly.
    3. Let’s make that really clear, Capybara is ridiculously good at waiting for content.
    4. apybara could have easily figured out how to wait for this content, without you muddying up your specs with tons of explicit calls to wait_until. Our developer could simply have done this: page.find("#foo").should have_content("login failed")
  17. Oct 2021
    1. And on any given day, developing with Svelte and its reactive nature is simply a dream to use. You can tell Svelte to track state changes on practically anything using the $: directive. And it’s quite likely that your first reactive changes will produce all the expected UI results.
  18. Sep 2021
  19. Aug 2021
  20. Jul 2021
    1. Hayek draws attention to the fact that the most relevant knowledge for economic decision-making is not the general knowledge of the economist or philosopher, but rather the dispersed, local, and often tacit knowledge of myriad individuals in an economy

      will big data change the situation? What used to be impossible now starts to seem likely.

  21. Jun 2021
  22. May 2021
  23. Apr 2021
  24. Mar 2021
    1. With all this “monetization” happening around Trailblazer, we will also make sure that all free and paid parts of the project grow adult and maintan an LTS - or long-term support - status. Those are good news to all you users out there having been scared to use gems of this project, not knowing whether or not they’re being maintained, breaking code in the future or making your developers addicted to and then cutting off the supply chain. Trailblazer 2.1 onwards is LTS, and the last 1 ½ years of collaboration have proven that.
  25. Feb 2021
    1. Literally, everything in this example can go wrong. Here’s an incomplete list of all possible errors that might occur: Your network might be down, so request won’t happen at all The server might be down The server might be too busy and you will face a timeout The server might require an authentication API endpoint might not exist The user might not exist You might not have enough permissions to view it The server might fail with an internal error while processing your request The server might return an invalid or corrupted response The server might return invalid json, so the parsing will fail And the list goes on and on! There are so maybe potential problems with these three lines of code, that it is easier to say that it only accidentally works. And normally it fails with the exception.
  26. Jan 2021
    1. A robust solution is always the most desirable—in a time of crisis, it might even save a life. This might sound hyperbolic, but having a stable copy of something that works offline could make all the difference in a time of need.
  27. Nov 2020
  28. Oct 2020
  29. Sep 2020
  30. Aug 2020
    1. As a web designer, I hate that "log in" creates a visual space between the words. If you line up "Log In Register" - is that three links or two? This creates a Gestalt problem, meaning you have to really fiddle with spacing to get the word groupings right, without using pipe characters.

      Sure, you can try to solve that problem by using a one-word alternative for any multi-word phrase, but that's not always possible: there isn't always a single word that can be used for every possible phrase you may have.

      Adjusting the letter-spacing and margin between items in your list isn't that hard and would be better in the long run since it gives you a scalable, general solution.

      "Log in" is the only correct way to spell the verb, and the only way to be consistent with 1000s of other phrasal verbs that are spelled with a space in them.

      We don't need nor want an exception to the general rule just for "login" just because so many people have made that mistake.

  31. Jul 2020
  32. May 2020
    1. Add-ons must function only as described, and should provide an appealing user experience. Based on the description of the add-on, a user must be able to understand and use the add-on’s features without requiring expert knowledge.
  33. Dec 2019
    1. Confusingly, all the distributions I use (Ubuntu, RHEL and Cygwin) had some type of check (testing $- or $PS1) to ensure the current shell is interactive. I don’t like cargo cult programming so I set about understanding the purpose of this code in my .bashrc.
    1. No, clumsily working around the root account in situations where it is absolutely appropriate to use it is not for good reasons. This is just another form of cargo cult programming - you don't really understand the concept behind sudo vs root, you just blindly apply the belief "root is bad, sudo is good" because you've read that somewhere.
    1. Cargo cult programming is a style of computer programming characterized by the ritual inclusion of code or program structures that serve no real purpose.
  34. Dec 2018
    1. though it found me suffering under a more severe attack than usual of my old grievance, spasmodic bile, and hardly able to crawl from my bed to the sofa

      Diana's seems to be a bit exaggerated in her account which reminds me of Mary's letters of her "illness" to Anne in Persuasion and hypochondriac Mr. Woodhouse in Emma.

  35. Jun 2018
  36. ktakahata.github.io ktakahata.github.io
    1. That gentleman’s pamphlet

      Colonel Martyn's An Essay upon Plantership

    1. best known for his The Night Before Christmas[1][2] for Narrator and Orchestra and his fifteen-minute miniature opera Hamlet

      old

  37. Dec 2017
    1. (3)

      Has the Earth's sixth mass extinction already arrived? A. D. Barnosky, N. Matzke, S. Tomiya, G. O. U. Wogan, B. Swartz, T. B. Quental, C. Marshall, J. L. McGuire, E. L. Lindsey, K. C. Maguire, B. Mersey, E. A. Ferrer

      This article suggests that the current rate of species extinction is higher than what has been expected in the past (compared against fossil records). The authors propose that this elevated rate of extinction may possibly be the beginning of the 6th known mass extinction event on earth.

      This extinction would drastically lower biodiversity by killing off many species that would otherwise function as carbon sinks. The release of such massive amounts of carbon might have dramatic effects upon the environment.

      SC

    2. (1).

      Past and present of sediment and carbon biogeochemical cycling models By:Mackenzie, FT (Mackenzie, FT); Lerman, A (Lerman, A); Andersson, AJ (Andersson, AJ) This is a secondary study of the history of the carbon cycle, with particular respect to the onset of industrialization as well as the dynamic role the ocean plays in carbon storage. Prior to industrialization, the ocean was a net source of CO2 emissions due to the net carbon differences between photosynthesis and respiration. However, the massive CO2 releases from the burning of fossil fuels have made the ocean into a net carbon sink.

      This citation is referring to the storage of carbon within calcium carbonate (CaCO3), or limescale within the ocean. This limescale comprises most of the 'rocks' in reference.

      SC

  38. Oct 2017
  39. Sep 2017
    1. Anita Allen

      Anita Allen

      • spatial
      • informational
      • decisional
      • reputational
      • associational
    2. Roger Clarke

      Clarke's maslow pyramid classification

      • bodily privacy
      • spatial privacy
      • privacy of communication
      • privacy of personal data
    3. Alan Westin

      Westin's four states of privacy - solitude, intimacy, anonymity, reservation

    4. dangers of privacy when it is used to cover up physical harm done to women by perpetrating their subjection.

      Feminist critique of privacy

    5. privacy should be protected only when access to information would reduce its value such as when a student is allowed access to a letter of recommendation for admission, rendering such a letter less reliable. According to Posner, privacy when manifested as control over information about oneself, is utilised to mislead or manipulate others

      Economic critique of privacy - posner

    6. Judith Jarvis Thomson,in an article published in 1975, noted that while there is little agreement on the content of privacy, ultimately privacy is a cluster of rights which overlap with property rights or the right to bodily security. In her view, the right to privacy is derivative in the sense that a privacy violation is better understood as violation of a more basic right

      Reductionist critique of privacy - JJ Thomson used by respondents to support the argument that privacy itself is not a right, but privacy violations may lead to other violations.

    7. rights which individuals while making a social compact to create a government, reserve to themselves, are natural rights because they originate in a condition of nature and survive the social compact

      Patterson on natural rights surviving the social contract

    8. The idea that individuals can have rights against the State that are prior to rights created by explicit legislation has been developed as part of a liberal theory of law propounded by Ronald Dworkin

      Rights predating the recognition through explicit legislation (Dworkin)

    9. Aristotle’s distinction between the public and private realms can be regarded as providing a basis for restricting governmental authority to activities falling within the public realm.

      Aristotle's Public v private sphere. Role of government restricted to public sphere. Early conception of a sphere of rights (?) repelling state action

    10. Mill posited that the tyranny of the majority could be reined by the recognition of civil rights such as the individual right to privacy, free speech, assembly and expression

      Mill's conception of civil liberties to counter majoritarian actions

    11. traced the recognition of an inviolable zone to an inalienable right to property. Property is construed in the broadest sense to include tangibles and intangibles and ultimately to control over one’s conscience itself

      Madison's propertarian view of privacy

    12. in reality not the principle of private property, but that of an inviolate personality

      Warren & Brandeis - Early conception that privacy rests not in places, but in persons

  40. Aug 2017
  41. May 2017
    1. “Our Communities.” CPDC, Edgewater Terrace Apartments, www.cpdc.org/communities/edgewood-terrace-the-vantage-and-the-parke/. Accessed 19 Feb. 2017.
  42. Dec 2016
  43. Nov 2016
    1. “Advisory Neighborhood Commission 5E.” N.p., n.d. Web. 18 Nov. 2016. Barnard, Anne. “Beirut, Also the Site of Deadly Attacks, Feels Forgotten.” The New York Times 15 Nov. 2015. NYTimes.com. Web. 16 Nov. 2016.

      Double space this or try to do something to make more readable.

  44. Oct 2016
  45. Jul 2016
    1. Effective Copyright Policy: Copyrights encourage creativity and incentivize innovators to invest knowledge, time, and money into the generation of myriad forms of content. However, the copyright system has languished for many decades, and is in need of administrative reform to maximize its benefits in the digital age. Hillary believes the federal government should modernize the copyright system by unlocking—and facilitating access to—orphan works that languished unutilized, benefiting neither their creators nor the public. She will also promote open-licensing arrangements for copyrighted material and data supported by federal grant funding, including in education, science, and other fields. She will seek to develop technological infrastructure to support digitization, search, and repositories of such content, to facilitate its discoverability and use.   And she will encourage stakeholders to work together on creative solutions that remove barriers to the seamless and efficient licensing of content in the U.S. and abroad.

      "Effective Copyright Policy" section of "Hillary Clinton’s Initiative on Technology & Innovation". Note, especially, the position on orphan works.

  46. Apr 2015
    1. hypothesis.js

      hypothesis.js is injected into the page by embed.js using either the browser's plugin API or (in the case of the bookmarklet) the DOM API. (embed.js was in turn injected by the browser plugin or bookmarklet).

      hypothesis.js is the "bootstrap" code that connects up and starts the various components of the Hypothesis app.

    2. app: jQuery('link[type="application/annotator+html"]').attr('href'),

      Here we find the <link rel="sidebar" ... that embed.js injected into the page. We pass it into the constructor method of Annotator.Host below.

    3. window.annotator = new Klass(document.body, options);

      Calling the Annotator.Host construct, passing an options object including our sidebar link.

    4. Annotator.noConflict().$.noConflict(true);

      Having created our Annotator instance and added our custom plugins etc to it, we inject Annotator into the page.

    1. layout.app_inject_urls

      app_inject_urls is the list of scripts and stylesheets that we're going to inject into the page. This comes from layouts.py, which in turn gets it from assets.yaml.

      Most importantly these URLs to be injected include a minified version of hypothesis.js.

    2. var baseUrl = document.createElement('link'); baseUrl.rel = 'sidebar'; baseUrl.href = '{{ app_uri or request.resource_url(context, 'app.html') }}'; baseUrl.type = 'application/annotator+html'; document.head.appendChild(baseUrl);

      Finally, we inject a <link rel="sidebar" type="application/annotator+html" href=".../app.html"> into the <head> of the document. This is the HTML page for the contents of the sidebar/iframe. This link will be picked up by hypothesis.js later.

    3. if (resources.length) { var url = resources.shift(); var ext = url.split('?')[0].split('.').pop(); var fn = (ext === 'css' ? injectStylesheet : injectScript); fn(url, next); }

      This loop is where we actually call injectScript() or injectStylesheet() on each of the resource URLs defined above.

    4. var injectScript = inject.script || function injectScript(src, fn) {

      And we do the same thing for injecting scripts as we did for injecting stylesheets - we either use the function passed in by the browser plugin, or when called by the bookmarklet we fall back on the DOM API.

    5. var injectStylesheet = inject.stylesheet || function injectStylesheet(href, fn) {

      hypothesisInstall() will use the inject.stylesheet() function passed in to it to inject stylesheets into the page or, if no function was passed in, it'll fallback on the default function defined inline here.

      The default method just uses the DOM's appendChild() method, but this method may fail if the site we're trying to annotate uses the Content Security Policy.

      That's why when we're using one of the browser plugins rather than the bookmarklet, we pass in the browser API's method for injecting a stylesheet instead.

      This is why the bookmarklet doesn't currently work on GitHub, for example, but the Chrome plugin does.

    6. embed.js

      embed.js is responsible for "embedding" the different components of the Hypothesis frontend application into the page.

      First, either bookmarklet.js or one of the browser plugins injects a <script> tag to embed.js into the page, then embed.js runs.

      This way the code in embed.js is shared across all bookmarklets and browser plugins, and the bookmarklets and plugins themselves have very little code.

    1. app.appendTo(@frame)

      And we inject our <iframe> into ... the frame? (@frame is a <div> that wraps our <iframe>, it's defined and injected into the page in guest.coffee).

    2. app = $('<iframe></iframe>') .attr('name', 'hyp_sidebar_frame') .attr('seamless', '') .attr('src', src)

      Finally, this is where we create the <iframe> element that is the Hypothesis sidebar!

    1. embed = document.createElement('script'); embed.setAttribute('src', embedUrl); document.body.appendChild(embed);

      Here we construct the actual <script> element, set its src URL, and inject it into the page using the DOM's appendChild() method.

    2. var embedUrl = '{{request.resource_url(context, "embed.js")}}';

      The whole job of the bookmarket is to inject a <script src=".../embed.js"> element into the current page. The src URL of this script element points to embed.js, another Pyramid template rendered by the server-side Hypothesis app.

    3. bookmarklet.js

      bookmarklet.js is the Pyramid template (rendered by our server-side Pyramid app) for the Hypothesis bookmarklet. This little bit of JavaScript (after being rendered by Pyramid) is what the user actually drags to their bookmarks bar as a bookmarklet.

  47. Feb 2014
  48. Jan 2014
    1. The academic publisher Elsevier has contributed to many U.S. Congressional representatives, pushing the Elsevier-supported Research Works Act, which among other things would have forbidden any effort by any federal agency to ensure taxpayer access to work financed by the federal government without permission of the publisher.

      What other legislation has Elsevier pushed?