(For identification, we will refer to this as the Neo-Whorfian hypothesis.)
x
(For identification, we will refer to this as the Neo-Whorfian hypothesis.)
x
We assume that it is our H-LAM/T system (Human using Lauguage, Artifacts, Methodology, in which he is Trained)
H-LAM/T
for "We shape tools and the tools shape us"
Bun + Andale + SQLite + HTMXhesxenon/realworld-htmx
The mother of all demo appsSee how the exact same application is built using different libraries and frameworks

Effortlessly convert Spotify links to your preferred streaming service
preferred service

HTMX with Bun: A Real World App
for htmx realworld app
Less is more
yep
It was too difficult and expensive to get things done.
expensive to get things done
graphic from the original LinkedIn post by Adrian McPhee,
ported from a React front end to an htmx front end: OpenUnited.
Another Real World React -> htmx Port
This codebase was created to demonstrate a fully fledged fullstack application built with Laravel + HTMX that adheres to the RealWorld spec
x
The mother of all demo appsSee how the exact same application is built using different libraries and frameworks.

Termas are of two main kinds: earth treasures and intention, or mind, treasures. A teaching concealed as an intention treasure appears directly within the mind of the tertön in the form of sounds or letters to fulfill the enlightened intention of Padmakara.
intention treasures
for - - terton - tertön - out-tuition - holding a specific intent
tertön
![]()
treasure revealers known as tertöns
for outtentions
![]()
as a result, one can situate the khôra and, if necessary, lend it a topology, but one can never give it axiomatic form."[12]
khora can bemm mapped topology but not axions
Yes where the map is the territory
Khôra About this resultShareShareFacebookWhatsAppXEmailClick to copy linkShare linkLink copiedClaim this knowledge panelSend feedback (function(){var id='fld_gsJpZtDiHv6o9u8Pi7GJuAI_2';document.getElementById(id).setAttribute("lta",Date.now());})();window._setImagesSrc=function(f,c){function h(a){a.onerror=function(){a.style.display="none"};a.setAttribute("data-deferred","2");c.substring(0,5)!=="data:"&&a.setAttribute("data-defe","1");a.src=c;var g;((g=google.c)==null?0:g.di)&&a.decode()}for(var d=0;d<f.length;++d){var b=f[d],e=document.getElementById(b)||document.querySelector('img[data-iid="'+b+'"]');e?(b=void 0,((b=google.c)==null?0:b.setup)&&google.c.setup(e),h(e)):(google.iir=google.iir||{},google.iir[b]=c)}};typeof window.google==="undefined"&&(window.google={});(function(){var s='data:image/jpeg;base64,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';var ii=['dimg_gsJpZtDiHv6o9u8Pi7GJuAI_1'];_setImagesSrc(ii,s);})();(function(){var eid='fld_gsJpZtDiHv6o9u8Pi7GJuAI_2';var a=Date.now(),b=document.getElementById(eid);if(b){var c=b.getAttribute("lta");google.c.maft(c?Number(c):a,b)};})();#rhs.N4Xssf .ss6qqb{width:455px}.ss6qqb .epKdHc{align-items:center;column-gap:16px;display:flex;flex-direction:row-reverse;justify-content:space-between;padding:0 0 16px;margin-top:16px;margin-left:20px}.ss6qqb .PKDVJd{color:var(--IXoxUe);display:inline-block;font-size:12px}.TzHB6b{font-size:14px}#rhs .ss6qqb .cLjAic{margin:20px 16px 0}#rhs .u7yw9 .cLjAic{border-bottom:1px solid var(--gS5jXb);margin:24px 0 0 20px;padding-bottom:20px}#rhs .ss6qqb .cLjAic.LMRCfc,.ss6qqb .cLjAic.LMRCfc{margin-top:0}#rhs .u7yw9 .cLjAic:last-child{border:0;padding-bottom:0}.IVvPP .JNkvid .HnYYW,.Jb0Zif .JNkvid .HnYYW{overflow:hidden;padding:0}.cLjAic{margin-bottom:44px}.ss6qqb .JNkvid .HnYYW{font-family:Google Sans,arial,sans-serif-medium,sans-serif;font-size:22px;line-height:24px;padding-left:0}.Jb0Zif .cLjAic{margin:44px 0}.ss6qqb .cLjAic{margin-top:16px;margin-bottom:0}.Jb0Zif.IVvPP .LMRCfc,.IVvPP .LMRCfc,.Hwkikb.LMRCfc{margin-top:6px}.Jb0Zif.IVvPP .jHARG,.IVvPP .jHARG,.Hwkikb.jHARG{margin-bottom:16px}.Jb0Zif .LMRCfc{margin-top:16px}.IVvPP .T9EeC,.ss6qqb .T9EeC{align-items:center}.ss6qqb .WeviRb,.IVvPP .WeviRb{top:0}.ss6qqb .PmPt7d{border-top:1px solid rgba(0,0,0,.12);padding:8px 16px}.kp-wholepage-osrp .j6mBxc a,.kp-wholepage-osrp .j6mBxc a:active,.kp-wholepage-osrp .j6mBxc a:link,.kp-wholepage-osrp .j6mBxc a:visited{color:var(--IXoxUe);text-decoration:underline}.ss6qqb .JlDOsc:not(:last-of-type){border-bottom:1px solid rgba(0,0,0,.12)}.ss6qqb .LJqTIc .UgLoB,.ss6qqb .LJqTIc .FXMOpb{min-height:48px}.WFxqwc{font-size:14px}.ss6qqb .EA2Itc .HnYYW{font-family:Google Sans,arial,sans-serif;font-size:16px;line-height:24px;padding:0 0 8px}.yTFeqb .BGdUVb{margin:0 16px 16px}.ss6qqb .yTFeqb .BGdUVb{margin-bottom:18px}.BGdUVb{padding-top:8px}#center_col .yTFeqb .BGdUVb{padding-top:0}#main .ss6qqb .BGdUVb{margin:0 0 16px}#main .ss6qqb.u7yw9 .BGdUVb{margin:0;padding-top:0}#center_col .ss6qqb .yTFeqb:not(.oJxARb){margin-top:16px}.IVvPP .WY0eLb .yTFeqb,.IVvPP .yTFeqb.WY0eLb{width:372px}.IVvPP .WY0eLb .Gv6QPb.yTFeqb,.IVvPP .Gv6QPb.yTFeqb.WY0eLb{width:457px}.IVvPP.k5T88b .WY0eLb .yTFeqb,.IVvPP.k5T88b .yTFeqb.WY0eLb{width:372px}.IVvPP.k5T88b .WY0eLb .Gv6QPb.yTFeqb,.IVvPP.k5T88b .Gv6QPb.yTFeqb.WY0eLb{width:457px}.IVvPP .yTFeqb:not(first-card).nBWfrd{border:none;border-top:1px solid rgba(0,0,0,.12);border-radius:0}.xGj8Mb{display:flex;flex-direction:column}.wDYxhc{clear:both}.cUnQKe .wDYxhc,.related-question-pair .wDYxhc,.M8OgIe .fm06If .wDYxhc{clear:none}.Wnoohf .xpdclose .wDYxhc.xsZWvb,.Wnoohf .xpdopen .wDYxhc.EfDVh{padding-bottom:0}#rhs .dG2XIf .xpdclose .LKPcQc,#rhs .dG2XIf .xpdopen .viOShc{padding-top:0}#rhs .Wnoohf .xpdopen .yp1CPe,#rhs .OJXvsb .xpdclose .siXlze{padding-bottom:15px}#rhs .Wnoohf .xpdclose .wDYxhc.xsZWvb,#rhs .Wnoohf .xpdopen .wDYxhc.EfDVh{padding-bottom:0}#rhs .Wnoohf .xpdclose .wDYxhc.xsZWvb.ecRggb,#rhs .Wnoohf .xpdopen .wDYxhc.EfDVh.ecRggb,#rhs .dG2XIf .ecRggb{padding-bottom:15px}.hb8SAc{overflow:hidden;margin:13px 0 6px;}.Jb0Zif .hb8SAc,.IVvPP .hb8SAc{line-height:1.58}.ss6qqb .hb8SAc{margin:0}.hb8SAc{color:#4d5156}.NJLBac{white-space:nowrap} DescriptionIn semiotics, Khôra is the space that gives a place for being. The term has been used in philosophy by Plato to designate a receptacle, a space, a material substratum, or an interval. Wikipedia
Terma (Tibetan: གཏེར་མ, Wylie: gter ma; "hidden treasure") are various forms of hidden teachings that are key to Vajrayana and Tibetan Buddhist and Bon spiritual traditions. In the Vajrayana Nyingma school tradition, two lineages occur: an oral kama lineage and a revealed terma lineage.
hidden treasure
Translating Khora

the standard model of distributed
st
client Centric consistency
c
exponentially
? Could do better
factorization uh and that's a technique uh for kind kind of compressing your intermediate relations that you generate in the query plans when the joins are many to many
Factorisation in the query plan
do not deviate from that common wisdom of how to develop high level query languages
Ooh wisdom?
the only way we know of how to develop high level query languages is to base them on relational um algebra
Ooh
all boil down and compile down to relational operators like joints filters scans group byes and Aggregates
Ooh
columnar systems like olap systems like duct DB they do a lot more optimizations during ingestion
Olap
the key is to know what joints will happen
Wrong
compressed Sparrow based join
Sparse row
predefining a join meaning that you tell the system a prior these are Edge records
A priory
adjacency list index
Join index
a Tre based index
Tree based index
there's a choice of what is a more natural data model for what I want to do
Natural data model is intent driven
fundamental trade of about what do you want to optimize for
'Tain't necessarily so
particular string in them maybe the word transfer
X
being fast on many to many queries
many to many queries
thinking of these patterns as sort of graph forms
Patterns graph forms
you can ask questions about the properties of the path so whenever you are and that's usually a byproduct of asking recursive uh queries and incidentally the very first database in history was motivated by recursive queries like that this is a system called iids just for again people who are interested in the history of data
Network model IMS
Hierarchical model
these are the two very natural data models logical data models
the problem with databases is that they provide a model
it is not data we want we want info-structure with implic(it|ate) order that is not imposed but as a by product of articulationt intentional com(munica|puta)tional affordances
ILIKE F PLUS 2/16 GB Kék Kártyafüggetlen Okostelefon
ILIKE K7 7" 32GB WiFi Fekete Tablet

The iPhone’s future looks a lot like Android, and the only way that changes is if Apple tries something new.

iLike was an online service that allowed users to download and share music.
music sharing 2009


Design and Evaluation of IPFS: A Storage Layer for the Decentralized Web
storage layer for the decvntralized Web
(infoset) for the data that flows across, services that deal with the data that flows
info sets services data that flows
The whole inheritance story is usually refactored away for very pragmatic reasons
inheritance refactored away
Why Objects Suck
![]()
I think objects are overrated.
![]()
database-as-model
models concern with what there is
what we need to focus on what we need to make of it
Ted quickly posted a followup entry
bridge the gap between "sets" and "objects"
abandon Sets! as wholly inapropriate ideas to ground computing
computability theory is totall bunk because it uses ideas from mathematics dealing with complete infinities
see Cantor's diagonal argument
where we all know that in real computational system we are dealing with strictly finite even if google sized structures and processes where
there is a complete enumeration of all possible "sub collections" 2 to the Nth of them
bring relational concepts (which, at heart, are set-based)
its the old problem of mathemtaical concepts that rely in completed infinities and ignore the strict finiteness of computing devices
which abstracts away from ordering itmes, which again are at the heart of computation
the conditional in LISP is a great examaple
or Prolog's way of sequenctially attempting to process claues
A similar problem arises with the mathematical concept of a graph again baed on sets imposing a representation that is not appropriate for computational task
an alternative representation that deals with
association lists is what would be closer what can exist on a machine
acepting, nay exploit that ordering, that's what matters!
try to abstract away from it at 1's peril
People do not seem to get it. The beaty of computers is that they are about construction not abstraction
Abstractions are always embedded in a concrete substrate of info-communication0interaction-processing flows
service gateway
separation of services from the data is the original sin
domain model
Here lies the run. We are crasting reifying Object Models independent of intended processes which is impossible.
The objects arise mutually with the necessary intentional processes that togehter afcomplish whea twe need intended!
Since Information is intertwingled and by adding just one new entity and/or link/connection"relation" the gestalt itself can change totally invalidating earlier assumptions and openning up new possibilities
what is needd is a way of keeping the co-evolution of inf-communication-processing structure in coherence as we go along
much anticipated blog entry analyzing the ORM problem in minute detail.
https://k51qzi5uqu5dg96x17d3gstxn4ehbt6nuv5x6m53costcdf6qyefryxnqcs6wo.ipns.dweb.link/annote.htm?p=./pages/blog.codinghorror.com_object-relational-mapping-is-the-vietnam-of-computer-science_
a battle-scarred veteran of the ORM wars
yes I am
there is no good solution to the object/relational mapping problem.
we started out with a concept of relation that was not mathematical but conceptual associations with explicitly stated meaningful names and ways or traversing and interpreting the information in specific intended ways.
Once you had associative complexes accessibale you can always provide alternative interpretations and in fact adjust the structure as needed, refactor and create new associative complexes that treated info structures in a situated whole together with the means of presenting, reasoning, processing interpreting etc
Before COD's 'relational' model came information was processed and retrived via traversing meaningful associations We had NoSQL that is to say we did not just have constratints but the processes correspongind to situational intent could be invoked on the fly with the ability to check for constraine
Imposing constratint at write were necessary so taht memory/storga locations can be resued
No when data= infomrations/code can be stored immutably and retrieved by contant addresses and paths we can have true object model without trying to do the impossible and map the relational model into the object model. It is impossible because it imposes a separation of and enclusure of information from the means of presenting and morphing it whre these two should co-evolve

• NaN / NaN • NaN / NaN Back HU Skip navigation Search Search Sign in HU {"@context":"https://schema.org","@type":"VideoObject","description":"Lecia Louise covers Jimi Hendrix's 'Angel' during lock down in her home studio space. \n\nDownload Lecia's songs for free at www.lecialouisemusic.com\n\nThank you :-D","duration":"PT416S","embedUrl":"https://www.youtube.com/embed/3sNQIScibXo","interactionCount":"78845","name":"Jimi Hendrix (cover) 'Angel' by Lecia Louise","thumbnailUrl":["https://i.ytimg.com/vi/3sNQIScibXo/maxresdefault.jpg"],"uploadDate":"2020-07-07T02:54:22-07:00","genre":"Music","author":"Lecia Louise"} Jimi Hendrix (cover) 'Angel' by Lecia LouiseSearchWatch LaterShareCopy linkInfoShoppingFree music downloads hereTap to unmute2xIf playback doesn't begin shortly, try restarting your device.Pull up for precise seekingMore from Lecia Louise•You're signed outVideos that you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.CancelConfirmUp nextLiveUpcomingCancelPlay nowShareInclude playlistAn error occurred while retrieving sharing information. Please try again later.0:001:15 / 6:55•Watch full videoLive••Scroll for details Jimi Hendrix (cover) 'Angel' by Lecia Louise
Jimi Hendrix – Blue Wild Angel: Jimi Hendrix Live At The Isle Of Wight

Fly on through the sky
for angel lyrics
What is a CID?
A content identifier, or CID, is a label used to point to material in IPFS. It doesn't indicate where the content is stored, but it forms a kind of address based on the content itself. CIDs are short, regardless of the size of their underlying content.
CIDs are based on the content’s cryptographic hash. That means:
Any difference in the content will produce a different CID. The same content added to two different IPFS nodes using the same settings will produce the same CID. IPFS uses the sh
Content Identifiers (CIDs)
gloss C~ID
content identifier


We did not want to sell out on our principles and more funding appeared a lot harder to find than expected.
![]()
Each node maintains full index
full index
Introducing the Filebase Switch & Save Program


IPNS and IPFS revolutionize internet data storage and management. This guide explores their functions and Filebase's integration, providing an affordable, user-friendly platform.

Elastic provider
https://hypothes.is/a/XlAwGCNKEe-_biuG3XU8Kw
Datalog
![]()
for datomic
What is Holarchy
![]()
data-of-record applications
nice phrasing
Introduction

https://www.crunchbase.com/person/jonathan-edwards
![]()
ipfs://bafybeidnsof2vzhyyevpph3aqq3ydzhpxge7cxazyvk5luk5l4kvkapzli/
document-oriented transactional replicated database in the 80’s.
document-oriented transactional replicated database
universal Hyperdocument Universal Users
Universal info-communication-coomputationak permanent evergreen co-evolutionary infrastructure for
co-evolving autopoietic integral metadesigned born mutliplayer collaboragtive personal first interpersonal networks
https://www.subtext-lang.org/AboutMe.htm

He specializes in being tragically ahead of his time.
tragically ahead of his time
He specializes in being tragically ahead of his time.
tragically ahead of his time
yeah
Transcript takes the vision of end-user programming as in HyperCard and reimagines it on the phone, designed to do the things you want to do with a phone: mediate and structure conversations. The experience is more like editing a document than programming, but hidden inside this Trojan Horse is a highly distilled yet fully capable programming language. I will demo an early prototype of Transcript and discuss our vision of bringing programming to everyone.
This is IndyWeb with TrilMarks
with a DSL inside
What you need is a tool as easy to learn as a spreadsheet or HyperCard, but one designed to build ad-hoc social applications.
HyperCard or spreasheet to build ad hoc social applications
Transcript: End-User Programming Of Social Apps
IndyWeb yes
Jonathan Edwards
![]()
Simplifying Events since 2011

Subtext is an ongoing experiment in radically simplified programming. It is radical in that I am willing to throw away everything we know about programming and start from scratch
Programming , the very idea considered harmful. Can software be liberated from programming per se.
https://cryptpad.fr/pad/#/3/pad/view/4ed3203237745f09bf6699a7e71750fe/
Who am I?

I am a programmer.
I have been programming since 1969.
I was a cofounder of IntraNet.
I am currently a Research Fellow at MIT with the software design group Researcher at HARC independent researcher. https://www.subtext-lang.org/AboutMe.htm
My research project is subtext. My blog is Alarming Development.
I seek to better understand the creative act of programming, and to help liberate it from the primitive state of our art.
https://hypothes.is/a/lEiggiGEEe-CKycnoBe4uw
via
context
Example Centric Programming
irredeemably nondeterministic
redeemable
combine the full power of
combine the full power of - an app framework like Rails or Android
with the simplicity and usability of - a spreadsheet.
Subtext is not a Domain Specific Language but rather a - general purpose language
designed from the ground up to make - application programming
radically simpler and easier.
This erodes modularity
models constraints modularity
inherent conflict
that's why things will never work
models are trully intertwingled modules encapsulate
separating models with cross cutting concerns and providing modules and layers that constrain limit cross cuting
aspects orientation won't help either
we need models and capabnlities needed to effect intents need to coevolve coevolve the three together intent model component
That's why MVC is just a broken idea Period
Model View Controller
That's why Dijkstra's goto Considered Harmfull was the most harmful idea that ever influence thinking. tha nature of everything is interwinglularity spagetty code. Named Jumps. Yes imposing structure can seemingly create order but it bound to be a self limitting one. Need the ability to organic growth
But coor-dination of side effects inherently cross-cuts modules, lead-ing to much complexity and fragility.
problem is the brokennes of the MVC concept
oh and modules
cross-cutting is the norm
spagetti flow
https://cryptpad.fr/pad/#/2/pad/view/RxCm9V8ktMBn7J6L-1q+pW4Y103n7oBjz5Rv7mU53KU/
coherent re-action,
what we need is coherent intentional actions and intentional/presentational transparency
articulation not automation
with universal ways of truning articulation to coherent actions and reflect that in coherent changes in presentation at each relevant point
Presentatioonal State transition
Put the User into the Picture not jyust the User Agemnt
The keyidea is to find an ordering of all events (called reactions)that is coherent, meaning that each reaction is executed be-fore all others that it has any side effects upon. Coherentordering is undecidable in genera
solution coherent actions!
formulate actions with self-coherehnce
can be cross cutting all it needs to be complete coherent consistent meaningfyul intentionally fit for purpose
as experiuenced by the human actor
Unfortunately, attempts to ban-ish side effects from programming languages
That was not what Backus was promoting at all
total misunderstanding by the field
globalside effects destroy both referential transparency
Global State with maning/intentful reprodduucible retractable transitions can ensure presentational transparencey. referrential transparency is another bad idea to itself
event-driven programming can create more coordinationproblems than it solves
coordintation problems
Phasing is an ad hoc solution
layers of layers
MVC
broken conception
controller to coor-dinate change
MVC
Firstly, interaction is aside effect. The whole purpose of user input is to changethe persistent state of the application. The issue can not beside-stepped
purpose of input is to change persistent state
presented state
dynamically typed muta-ble tree
dynamically typed mutable tree
DAG on IPFS
as is the common sense notion of mutable state
mutable state chains
chain them
much of the power of imperative programming isretained
power of imperative programming retained
Coherent re-action is a new model of change-driven computation that co-ordinates effects automatically
coherent re-action
Taoist Inner Alchemy

Sounds of SAND A podcast from Science and Nonduality

science and non duality
Sounds of SAND
The British involvement: Enron [India] revisited

indranet
ENRON –THE POWER TO DO IT ALL, CHS’ Indranet Journal, Vol 3, No 2-4,1994

Herman Rodrigues, who produced the Indranet journal for many years
indranet
the journal Indranet


Install Ubuntu desktop
In the longer term, examplecentrism has implications for the design of future programminglanguages
the logic of this leads to the death of programming languges
union of programming language andenvironment
Example Centric Programming attempts to improve programming by making it more concrete. This is not a new idea: it has also inspired a variety of programming language research. Self [23][26] eloquently and elegantly espoused concreteness and immediacy in the union of programming language and environment.
example-enlightened editor
debug the nill page
from https://hyp.is/G8ym_CGFEe-r9YMH5TdzYg/www.subtext-lang.org/
Example Centric Programming
x


Example-Based Live Programming for Everyone: Building Language-agnostic Tools for Live Programming with LSP and GraalVM
Live Progranninbg for everyone
for Lively Kernel for the Web
Onward! is more radical, more visionary, and more open than other conferences to ideas that are well-argued but not yet proven. We welcome different ways of thinking about, approaching, and reporting on programming language and software engineering research
radical visionary open
well-argued but not yet proven
different ways of - thinking - approaching - reporting
programming languages
software entineering
Analogy-Making as a Core Primitive in the Software Engineering Toolbox
analogy-making
Intrepydd: Performance, Productivity and Portability for Data Science Application Kernels
application kernels
End-User Software Customization by Direct Manipulation of Tabular Data
meta-design
are we trying to add to human knowledge, or are we providing entertainment for jaded developers?
add to human knowledge
or
entertainment for jaded developers
I and many people I know who are doing interesting work
I and many people I know who are - doing interesting work
have been repelled by the - bullshit parts of Academics: - the gatekeeping, - the compartmentalization, - the performative rigor.
Many of us have chosen to - not play those games
and instead make our own way = as independent researchers.
I’ve been in this fight for 20+ years now and
I’m going to give you some advice you probably neither expect nor want to hear:
To: the crazy ones, the misfits, the rebels, the troublemakers, the ones who see things differently
You meant the Mad ones
https://www.goodreads.com/quotes/3831-the-only-people-for-me-are-the-mad-ones-the
“[...]the only people for me are the mad ones, the ones who are mad to live, mad to talk, mad to be saved, desirous of everything at the same time, the ones who never yawn or say a commonplace thing, but burn, burn, burn like fabulous yellow roman candles exploding like spiders across the stars and in the middle you see the blue centerlight pop and everybody goes “Awww!”

Operational Version Control
observes changes to typed data structures by recording high-level operations performed in a GUI or API.
for - integral design & development
Operational Version Control

Let us meet on SocialHub!
ActivityPub
A Social Inbox for Decentralized Publishing and ActivityPub.
complete it with a personal first interpersonal intercommunity trust networks of Your Own
from https://hyp.is/hK-n3CBjEe-xnw943exusg/github.com/hyphacoop/api.distributed.press/tree/main/ansible
a minimal implementation of an ActivityPub Inbox and Outbox.
experience the web as it was meant to be.
experience the web as it measnt to be
an extension of Your Mind
your own and all Others you connect with


12,895 instances big and small 6,448,939 users across the globe 608,690,572 statuses on anything and everything

Welcome to the Internet of Peers
Internet of Peers
Build, share & extend unstoppable, zero-infrastructure P2P applications for Desktop, Terminal & Mobile.
x

No arbitrary limits just better apps that can be shipped instantly
apps shipped instantly
The Peer-to-Peer Company


HTML Web Components are Just JavaScript? I’m still getting used to this

Intro to Lit Step 1 / 8
x
Shareable Components
<svg aria-hidden="true" part="svg"><use href="/images/home/components.svg#main"></use></svg>
Lit 0 simple.Fast Web Components

@lit-labs/ssr-client - A set of client-side support modules for rendering Lit components and templates on the server using @lit-labs/ssr.
lit components templates rendered on the server
At Lit's core is a boilerplate-killing component base class that provides reactive state, scoped styles, and a declarative template system that's tiny, fast and expressive.
sounds interesting
Download YouTube Videos via SSyoutube.com

all of our growth is purely organic and uh we got to almost 900 million users uh without uh having to spend anything on ads to promote teleg

900 million users
word of mouth invite friends
bot spending anything on ads

https://docdrop.org/video/1Ut6RouSs0w/#annotations:f56uuiHPEe-7Pc-fQdBaOw
https://via.hypothes.is/https://www.youtube.com/watch?v=1Ut6RouSs0w

Telegram Creator on Elon Musk, Resisting FBI Attacks, and Getting Mugged in California


Representational State Transfer (REST)
contrast that with BigIdea Presentational State Transition with Human Actor in the Loop = not automation people centered interactions
instead of transferring state
transition state for the User By the User and communicate
self-coherent, consitent complete states in a local first offline first Named Info Storage
That is globally accessible
. Figure 5-10

Put the User into the picture
with local-first offline first owned
State undergoing Represenatationsl State Transitions
Not transferring stateless represenations of a state
What a hopeless idea that was
on the page that it effects
intentionally transparent coherent, meaningful state transitions tat are themsleves immutable ind linked
bnoth in chronological term and with everything else that b ares upon the transition
unconstrained invocation of recorded permanent verifialble code and information connected to the Human Actor's responsible for creating holding them
constraining messages to be self-descriptive: interaction is stateless between requests,
oops

Onward! Papers
x
But to get to that future someone needs to solve hard problems in ways currently unimagined, and then communicate those discoveries to others who can appreciate them and improve upon them
solve hard problems
in ways currently unimagined
they are what carry a conversation between researchers iterating and refining new ideas. That is how progress actually happens, “by standing on the shoulders of giants”.
try transpublishing
To the crazy ones

The Death of Computer Languages, The Birth of Intentional Programming
we all know that's crazy talk
crazy talk
your API magically becomes usable from a browser if it just uses HTML as its format
API usable from the browser if it uses HTML as its format
UI is a nice side effect
for using HTML as a data exchange format
saved from url=(0046)https://dev.to/aralroca/from-node-to-deno-5gpn

mitigate cross-origin cache fingerprinting
https://orenlab.sise.bgu.ac.il/p/RobustFingerprinting-TDSC.pdf
https://hyp.is/5ys5EiFxEe-ES99vQ8nNEQ/orenlab.sise.bgu.ac.il/p/RobustFingerprinting-TDSC.pdf
With ESM and cross-origin caching
cross origin caching
that happens if resources are loaded from ipfs
third-party libraries can be loaded, cached, and shared across sites
loaded cached accross site
No more single-line changes blowing out your applications entire cached bundle.
no more single change blow up
No more bundling dependencies with source code
no more bundling
אוניברסיטת בן גוריוןhttps://orenlab.sise.bgu.ac.il › RobustFingerprintin...אוניברסיטת בן גוריוןhttps://orenlab.sise.bgu.ac.il › RobustFingerprintin...PDFby A Shusterman · Cited by 154 — A well-studied mitigation approach from the domain of network-based cache fingerprinting involves creating spurious network activity to mask the
to https://orenlab.sise.bgu.ac.il/p/RobustFingerprinting-TDSC.pdf
Website Fingerprinting Through the CacheOccupancy Channel and its Real World Practicality
from https://hyp.is/aRZeJiFxEe-YB-u-fDSyPA/www.pika.dev/about
TrailHub Capability Conduit powering HyperBlog - Gyuri Lajos
