550 Matching Annotations
  1. Oct 2014
    1. This in turn means that Redis Cluster does not have to take meta data in the data structures in order to attempt a value merge, and that the fancy commands and data structures supported by Redis are also supported by Redis Cluster. So no additional memory overhead, no API limits, no limits in the amount of elements a value can contain, but less safety during partitions.

      A solid trade-off, I think, and says a lot about the intended use cases.

    1. For the record, far as most people have been able to determine, most of what happened to me long ago was triggered by a blog comment I made that said “I’m not moderating my blog comments, but I support those who do and here’s why.” That’s right, Blog. Comment. Moderation. Just a tiny hop, really, from that to full-blown DMCA takedowns. Easy mistake.
    2. Some of those who seek to stop and/or ruin you are misguided/misinformed but well-intended. They actually believe in a cause, and they believe you (or rather the Koolaid you’re serving) threatens that cause.

      A very honest and compassionate observation.

    3. The very best/worst trolls can even make the non-sociopaths believe "for the lulz" is itself a noble cause.

      Yes! That's the worst. I've never liked "for the lulz". This point should be more widely understood and its effects more widely regarded as harmful. This language tries to hide destruction behind whimsy so that those who oppose are opposing "fun", but the fun is not evenly distributed and for the victims is often not fun at all.

    1. Ask.fm hosted open discussions regarding the practicalities of getting to Syria or Iraq.

      Fine. So what?

    2. Details on the EU dinner are sparse. But there is increasing concern over the role social media plays in disseminating extremist propaganda, as well as being used as a direct recruitment tool. However, there is also a significant worry that placing strict controls on social networks could actually hinder counter-terrorism efforts. "The further underground they go, the harder it is to gleam information and intelligence," said Jim Gamble, a security consultant, and former head of the Child Exploitation and Online Protection Centre (Ceop). "Often it is the low level intelligence that you collect that you can then aggregate which gives you an analysis of what's happening." Mr Gamble was formerly head of counter-terrorism in Northern Ireland. There were, he said, parallels to be drawn. "There's always a risk of becoming too radical and too fundamentalist in your approach when you're trying to suppress the views of others that you disagree with. "In Northern Ireland, huge mistakes were made when the government tried to starve a political party of the oxygen of publicity. I would say that that radically backfired."
    1. Users would influence authorization by supplying a custom authorization policy that might deal internally in "principals", but needn't do that if it's unnecessary (if there are no group memberships). We would move the ACL checking code to a library of some kind that would be used by authentication policy implementers as necessary, and we'd supply a default authorization policy that just didn't consider group memberships at all.

      Identify asymmetrical information needs within modules. For instance, where one set of a functions primarily manages an object's life-cycle but another set its properties. Doing so allows you to isolate assumptions and can reveal places where concerns can be broken apart.

    2. If the user wants to control the horizontal and vertical of authorization, they have to override both the authentication policy and the authorization policy because both rely on persistent storage local to the application itself. This is bad.

      One should ask themselves whether two ostensibly separate concerns need to share a third. Can the dependency graph be made more flat by having some modules treat an entity as more opaque than another. To make an analogy in terms of languages that have "friend" class protection levels: not everyone should be your bff.

    3. Why, exactly, are these choices wrong? The "groupfinder" is a "knob on a knob". A Pyramid authentication policy is already replaceable wholesale; you can write a custom authentication policy and use it as necessary. However, because writing a custom authentication policy no fun, the default authentication policies themselves have become miniframeworks by allowing (really, requiring) a user to pass a "groupfinder" function. This is a common source of confusion. It would be much better if there was only one "knob" for a user to turn: registering a custom authentication policy, rather than two (allowing a custom authentication policy or allowing them to use the groupfinder miniframework with stock authentication policies). But for it to be feasible for a nonexpert user to create an authentication policy, the contract of the policy itself needs to be simpler.

      Passing lots of options, particularly ones that are not simple properties but callbacks or objects with complex interfaces, is sometimes an anti-pattern. It may mean that the two objects are not conceptually distinct for developer, and their interfaces should be combined.

  2. Sep 2014
    1. The researchers linguistically coded job descriptions found in a U.S. Department of Labor database that were predominately populated for masculine-themed words such as active, ambitious, analytical, competitive, dominate, challenging, confident, decisive, determined, independent, leader, objective, etc., as well as feminine-themed words such as committed, connected, cooperative, dependable, interpersonal, loyal, responsible, supportive, trust, etc. The results confirmed that job descriptions for male-dominated jobs contained more masculine-themed words associated with male stereotypes than job descriptions from female-dominated jobs and vice versa.

      I wish society would spend more time dismantling the gender coding of these words than wringing its hands over the repercussions of using them with their present connotations. We clearly can't ignore how the words we choose make people feel, but I can't help feeling like we do so sometimes at the cost of addressing deeper structural issues.

      It seems sexist to me that these researchers begin from the assumption that these words are gendered.

    1. Amicus brief in Anthony Douglas Elonis v. United States, including a long section describing the origins and history of hip hop, calling for the court to take serious caution when ruling on the actual or real intent to harm communicated (or not) by potentially hyperbolic lyrics and braggadocio.

    2. What level of knowledge of rap and understanding of its complicated conventions is a defendant-speaker to assume, in advance of communication, that a hypothetically reasonable person possesses in order to properly understand a rap message? Because the answer is anything but clear and because a speaker’s First Amendment rights should not hang on what amounts to guesswork about an audience’s hypothetically reasonable knowledge of a complex artistic and political genre of expression, the actual subjective intent of the defendant-speaker must be considered in both the First Amendment and statutory true threats analyses.
    1. minimum wages that destroy jobs

      I'm sure this is just being brought in here as an example of something rather split-brained that voters do, but I believe it's not well established that higher minimum wages "destroy jobs".

    1. Starts off on a difficult foot by attempting to deny common conceptions about how advertising works, and even legitimizes their function, but comes full circle to strong indictment of the insidiousness of brand ubiquity.

    2. Avoiding ads doesn't help much either. Because brand images are part of the cultural landscape we inhabit, when we block ads or fast-forward through them, we're missing out on valuable cultural information, alienating ourselves from the zeitgeist. This puts us in danger of becoming outdated, unfashionable, and otherwise socially hapless. We become like the kid who wears his dad's suit to his first middle-school dance.

      Unless you accumulate friends who also avoid ads, who think you're less cool for having allowed yourself to be exposed to them or for deploying them too conspicuous as social signaling, at least when that brand is not favored by that scene. Ironically, of course, most scenes are simply favoring different brands, because it's hard to accumulate any significant set of material trappings that aren't branded.

    3. You can see such hope glimmering whenever someone admonishes you to "think critically" about advertising.

      Shit... that's what I just implied above.

    4. If I decide I want to be more outgoing, I could just print a personalized ad for myself with the slogan "Be more social" imposed next to a supermodel or private jet, or whatever image of success or happiness I think would motivate me the most.

      The issue with this straw person is that there's a very real repulsion people experience at perceiving themselves being manipulated. Advertising works best when we aren't thinking much about its effects.

    5. So why do brands limit themselves to one central message?

      I think some don't. Absolut is one that comes to mind. Coke is one.

    6. Admittedly Chevron does attempt, in the US, to carve out a brand image for itself, but the brand is largely based on a promise of quality rather than an arbitrary emotional or lifestyle association. The argument I'm making is that, if inception actually works, then we would expect to see a lot more of it in the (rather large) market for gas stations.

      And to strengthen the author's point, I think Chevron has ramped up it's branding not as an attempt to distinguish itself from other brands but to repair the damage its brand has incurred as the result of environmental activists raising awareness of its ecological and social injustices.

    7. Q: Have you ever seen an ad for bed sheets? Can you even name a brand of bed sheet? If ads work by emotional inception, wouldn't you expect to have seen at least a few ads trying to incept you with the idea that Brand X bed sheets are going to brighten your day?

      This might have more to do with the fact that one can often touch many fabrics in the store when purchasing bedsheets, but you only get to open the bottle of sport drink that you purchase.

    8. So if an ad works by inception, we should expect the value (to the advertiser) to scale linearly with the size of the audience. On the other hand, if an ad works by cultural imprinting, we should expect its value (to the advertiser) to scale more than linearly with the size of the audience.
    9. Unlike inception proper (which I don't think actually exists), cultural imprinting is fully compatible with the Homo economicus model of human decision-making. It leaves our goals fully intact (typically: wanting the respect of our peers), and by imprinting itself on the external cultural landscape, merely changes the optimal means of pursuing those goals. The result is the same — we buy more of the products being advertised — but the pathways of influence are different.

      Starting to recover my attention and release my ire, because it's evident now that the author may not be defending advertising as not manipulative, but actually trying to articulate the mechanisms more thoughtfully.

    10. Similarly, internet search ads and banner ads are inimical to cultural imprinting because the internet is so fragmented. Everyone lives in his or her own little online bubble. When I see a Google search ad, I have no idea whether the rest of my peers have seen that ad or not.

      Your "peers" are no longer the people you see in physical reality, but they're still there, and the specter of their judgment is still powerful.

    11. Any product enjoyed or discussed in the presence of your peers is ripe for cultural imprinting.

      When I'm reading a good article like this, I like to do it with a cold Dr. Pepper in my hand.

    12. Cultural imprinting is the mechanism whereby an ad, rather than trying to change our minds individually, instead changes the landscape of cultural meanings — which in turn changes how we are perceived by others when we use a product. Whether you drink Corona or Heineken or Budweiser "says" something about you. But you aren't in control of that message; it just sits there, out in the world, having been imprinted on the broader culture by an ad campaign.

      Yes! Whence the emotional inception. If you don't buy that product that says you're super cool you are then filled with anxiety about whether you're cool. Etc.

      What's being described here isn't some other way in which advertising works other than emotional inception, it's the mechanism of that inception.

    13. The same way an engagement ring is an honest token of a man's commitment to his future spouse, an expensive ad campaign is an honest token of a company's commitment to its product line.

      Gah! Awful.

      As soon as you think such a signal is valuable, it becomes a tool of deception.

      That's why we've seen some backlash against flashy promotion toward a nostalgic, faux low budget, "authentic" aesthetic.

    14. If Disney were ever to violate this trust — by putting too much violence in its movies, for instance — consumers would get angry and (at the margin) buy fewer of Disney's products.

      How does confirmation bias play into this? Can Disney violate that trust with some margin of comfort? If consumers are (as here assumed) primed to receive family friendly entertainment they are less likely to notice when that expectation is violated than when they are when it's confirmed.

    15. First, a lot of ads work simply by raising awareness. These ads are essentially telling customers, "FYI, product X exists. Here's how it works. It's available if you need it." Liquid Draino, for example, is a product that thrives on simple awareness, because drains don't clog all that frequently, and if you don't know what Liquid Draino is and what it does, you won't think to use it. But this mechanism is pervasive. Almost every ad works, at least in part, by informing or reminding customers about a product. And if it makes a memorable impression, even better.

      A central pillar of my hatred for advertising is the fact that awareness does work and the ability to raise awareness is strongly correlated with marketing budget. Products therefore beat competition by virtue of starting with larger advertising budgets, not be being better products.

    1. All Palestinians are exposed to non-stop monitoring without any legal protection. Junior soldiers can decide when someone is a target for the collection of information. There is no procedure in place to determine whether the violation of the individual’s rights is necessarily justifiable. The notion of rights for Palestinians does not exist at all. Not even as an idea to be disregarded.
    1. But when their martyr's death never came despite several decades of opportunity (and after Ti died of cancer), Do did what any self-chose second coming would: Cover a manifesto in word art, stick it on the internet, and SEO the shit out of it.

      I'm just going to assume from now on that anyone who emails me offering SEO services is actually a cult leader.

    1. usage overhead

      Awesome. We're actually probably not far off from being able to separate NoteD from the front end.

    2. non-employees

      :+1:

    1. Aerospike supports SSDs from Intel, Micron, Fusion-IO, Violin Memory, Samsung and others, but some work better than others.

      Okay. So then it does seem to bypassing the normal kernel code paths for these devices. I find it hard to believe that this project has produced a better filesystem than any of the existing ones. It definitely seems like one part of the design is to throw out the possibility to do consistent snapshots, use network attached storage, etc, in favor of the database-supplied replication. I'm not sure that's the best thing. That means that you cannot, for instance, easily snapshot and back up a dataset to offsite, cheap, rotational media. Without serialized writes and consistent cursors one couldn't even write a client that could confidently read and store the data in another system for backup.

      Maybe I'm being too conservative and the right idea is to just embrace flash media and the database replication as backup. I'm hesitant.

    2. Fast restart. If a server is temporarily taken down, this capability restores the index from a saved copy, eliminating delays due to index rebuilding.

      This point seems to be in direct contradiction to the claim above that "Indexes (primary and secondary) are always stored in DRAM for fast access and are never stored on Solid State Drives (SSDs) to ensure low wear."

    3. Unlike other databases that use the linux file system that was built for rotational drives, Aerospike has implemented a log structured file system to access flash – raw blocks on SSDs – directly.

      Does this really mean to suggest that Aerospike bypasses the linux block device layer? Is there a kernel driver? Does this mean I can't use any filesystem I want and know how to administrate? Is the claim that the "linux file system" (which I take to mean, I guess, the virtual file system layer) "built for rotation drives" even accurate? We've had ram disks for a long, long time. And before that we've had log structured filesystems, too, and even devices that aren't random access like tape drives. Seems like dubious claims all around.

    1. I think that the nature of the psychedelic experience is challenging to the rationalists’ basis of Western ideas.

      I don't agree and don't want to see psychedelics welcomed into mainstream culture through glorification of the extra-logical. It's this sort of attitude that allowed exploitative, self-proclaimed gurus to thrive in the psychedelic scene. By all means, take a journey with a psychedelic, but then come back and process it and put it in perspective with what you think you know about your life and reality and continue to think critically about your relationships and your needs.

    1. It shouldn’t come as a surprise that trans activists are so fervent and vocal in their fight for their rights and recognition when we see mainstream publications like The New Yorker giving page space to arguing about whether we even exist. While our situation is improving slowly, every single bit of progress is fought bitterly for; with few protections in place for us, trans people are still engaged in a fight for survival.

      I really don't understand the conflict at this point. That there exist two communities with differing definitions of "woman" is irrelevant and orthogonal to the discussion of how every individual should be entitled to the same protections, safety, benefits and well-being. The New Yorker piece is not giving space to an argument that trans women do not exist. That's absurd.

    2. Considering how little of the essay Ms Goldberg devoted to the words of trans activists, undermining the credibility of one of the few she does quote with unnecessary references to her sexual history is disgusting and unprofessional.

      Isn't it Jeffreys who did the attacking? The parenthetical underscores the main purpose of the essay, which is to demonstrate the existence of tension between these groups.

    3. Well-designed, peer-reviewed medical studies have demonstrated significant increases in wellbeing for trans people undergoing transition, and very low levels of regret.

      This last doesn't seem to directly address the issue of regret. It's focus seems to be on sexual health and functioning. That's not to say it isn't helpful here, but mainly to point out that the author here and the author of the New Yorker piece appear to be talking past one another.

  3. Aug 2014
    1. Of course, the radical feminist position that masculinity is natural and healthy, and femininity artificial and harmful, is also inherently sexist

      Of course. That's an important theme. It's as though it's being suggested here that radical feminists chose this view, when I think it's more correct to say that they are reacting to it.

    2. In contrast, she mentions and quotes a total of four trans women (zero from books), and two of them are quoted to supporting the radical feminist position.

      Might one argue that since these feminists feel their fight has been co-opted and, despite the many ways trans individuals are less assured of their safety and rights than cis women, the radical feminist is actually the more oppressed insofar as identity politics has left them behind? In which case, might we celebrate that time is given to this minority rather than criticize the piece for being one-sided?

    3. frequently providing physical descriptions

      I count only three instances, none of which are offensively dwelling on appearance in the way that media often is scrutinizing women's bodies. One of these descriptions is particularly well meaning: it is given only to color the story of abandoned transition with the image of hormone-induced stubble. To mention that there are physical descriptions of any of the activists in the piece here is obvious pandering.

    1. First, I must confess that over the past few years I have been gravely disappointed with the white moderate. I have almost reached the regrettable conclusion that the Negro's great stumbling block in his stride toward freedom is not the White Citizen's Counciler or the Ku Klux Klanner, but the white moderate, who is more devoted to "order" than to justice; who prefers a negative peace which is the absence of tension to a positive peace which is the presence of justice; who constantly says: "I agree with you in the goal you seek, but I cannot agree with your methods of direct action"; who paternalistically believes he can set the timetable for another man's freedom; who lives by a mythical concept of time and who constantly advises the Negro to wait for a "more convenient season."

      Feeling a lot of this frustration at white liberals these days.

    1. One thing that was happening at that time was the media was portraying punk as this extremely self-destructive, nihilistic kind of sadomasochist kind of nonsense. Which then really created a lot of unpleasantness in terms of straight society towards punks. But even worse, people who were really into nihilistic and sadomasochistic and self-destructive tendencies said, “Oh I must be a punk!” and started coming to shows.

      Dischord Records founder Ian MacKaye on media coverage of the D.C. punk scene

    1. "The police department told us flat out, 'You're foolish, and you'll regret it,'" says Jerry Santilli, American Paradigm's co-founder.

      Oh, if only we could disregard the police more often how much better off we'd be.

  4. Jul 2014
    1. At a recent gathering in Berlin, we considered the idea of attaching a suggested action, like a petition or campaign, to web articles. The hope was to facilitate action at the moment people encounter issues online.

      I like this idea!

  5. May 2014
    1. The Summary Card can be used for many kinds of web content, from blog posts and news articles, to products and restaurants.

      We should have Twitter cards for Hypothes.is.

    1. Hypothes.is developers

      If you run into any problems, we're here to help.

      Just ask on our user forum or email support@hypothes.is.

      Info also at the bottom of this article.

    1. Usage-based pricing, where you pay for the capacity that you use, would properly incentivize ISPs to support net neutrality

      YES!!! And if people want to oppose this on the basis that Internet access is an important element of basic literacy then we can invest it in like we once did with libraries and public educational institutions. Subsidize access to reference websites, etc. The libraries of the future could be free, but you must pay for frivolous cat videos. I'm all for this.

    1. At each consensus round, a single validator is chosen to propose a block. Any deterministic algorithm based on the existing blockchain history can be used to compute a total ordering of validators, but we want one that gives more priority to those with more voting power such that validators with less voting power have less chances to disrupt the responsiveness of the system.

      This part is not super clear to me, at least on first read. How can a deterministic validator be chosen? What if that validator is no longer participating? Might not different participants have different views of the range of validators participating?

    2. // calculate sorted list of validators: sortedValidators = nil for each block: for each validator: validator.accum_power += validator.power if sortedValidators != nil: sortedValidators[0].accumPower -= validator.power sortedValidators = sort(validators, fn(v) f v.accumPower g )

      This code block could be clearer.

      What is validator.accum_power initialized to? Where does the non-nil condition of sortedValidators ever happen?

      I think the answer to the first is "0" and the second is that in round 0 the sorting is simply by power, but the sorting changes after each subsequent block.

    3. We don’t know what  actually is, so T is merely a guess that is baked in

      I bet it could be measured/estimated in practice and nodes could get more or less optimistic about transaction success, perhaps dynamically.

    4. Like the algorithm as proposed by Dwork et al, it can tolerant of up to 1 = 3 byzantine voting power.
      • strike "as"
      • s/tolerant/tolerate/
    5. Our algorithm is based on algorithm 2’

      Is this a typo or is this "two prime"?

    6. Bonded coins cannot be used in any transaction except for an unbonding transaction, afterwards the coins remain locked in the unbonding period of X blocks.

      Is an unbonding period necessary? What falls apart?

    7. A transaction is valid if it follows the rules of our protocol (e.g. sufficient funds to send, etc). Valid transactions are grouped into blocks. A block is valid if all the transactions in the block are valid. Validators are users with accounts that have bonded coins. We say that a validator has voting power in the amount of the bonded coins. Validators are good if the validator acts according to the protocol. Other validators are considered byzantine . Blocks are proposed and then committed into the blockchain by validators using the consensus algorithm. The network is responsive if transactions that pay sufficient fees get committed in a timely manner.

      A few words about what it means for coins to be "bonded" might be helpful here. I wasn't familiar with the concept of surety before reading this and it might have helped me.

    8. Other protocols (e.g. proof-of-stake protocols) have been proposed by the cryptocurrency community to solve this problem, but they typically suffer from the fallacy of false choices; nodes have nothing to lose by contributing to multiple blockchains, so consensus is not guaranteed. Unless there is actually “something at stake”, all participants would be incentivized to sign any block that they encounter to earn fees. Yet other protocols suffer from assumptions of good behavior on the part of some participants, but these assumptions don’t hold when the participants are financially motivated.

      Easy citation win here. Call them out specifically!

    1. The little-discussed fact is that it’s super uncomfortable to be loved when the feeling is not mutual (see my song Please). So uncomfortable, in fact, that many of us would rather act like callous, cold-hearted assholes than be in the same room as the person who loves us. We panic, we get distant, we deny any interest or care for the other person, we stop returning their texts. But that’s not an aversion to love, or to the lover; it’s the attachment and expectation being hurled in our direction with such intensity.

      What is attachment? Why would we ever prefer people to be detached? So what if someone is attached? Can't we resolve to fail to satisfy their wants without feeling guilty, rather than request that they temper their wants or somehow remain cool and detached from them?

    2. "I love you. No big deal."

    1. Justice Kennedy’s advice for atheists and others who object to such prayers is “just leave the room.” My initial response is that anyone who takes their faith seriously and takes prayer seriously should also consider leaving the room.
  6. Apr 2014
    1. Crockford, perhaps the foremost authority on the lingering questions raised by the Boston bombings, sees the FBI’s failure to look into Tamerlan’s journey as part of a larger institutional problem. “Millions of people are listed in government databases as potential terrorist threats,” says Crockford. “The FBI has the legal authority to approach anyone for an interview, at any time. Tamerlan’s case confirms what we have long suspected: The databases are so large that they are practically useless. When everyone is a suspect, no one is a suspect.”

      Not sure whether I find this comforting is disconcerting. Assume you're in the database. Is it just a lottery then whether or not you get harassed, questioned, or subjected to surveillance?

    1. Israel, the Jewish State, is predicated on a decisive and stable Jewish majority of at least 70 percent. Any lower than that and Israel will have to decide between being a Jewish state and a democratic state. If it chooses democracy, then Israel as a Jewish state will cease to exist. If it remains officially Jewish, then the state will face an unprecedented level of international isolation, including sanctions, that might prove fatal.
    1. Slideline

      Everyone loves buzzwords.

    2. Tap or click and hold anywhere in the text, and your favorite study tools—highlighting, notes, and copying—pop up. Also try adding notes to any card, like a quiz or video. On iPad, your notebook saves these notes, your bookmarks, and anything you’ve starred in one searchable study guide. On the web, it’s easy to see your annotations on the right side of the browser window.

      Someone needs to re-invent these patterns. I'm not sure they're the best. We're (Hypothes.is) not any better, yet, of course.

    1. Or should the sourceURI property be restricted to existing URLs ?

      I'm not sure I understand the question.

      Maybe it's important to be pedantic here about URI instead of URL? It would be perfectly acceptable to use a URN here.

    1. Science has provided the swiftest communication between individuals; it has provided a record of ideas and has enabled man to manipulate and to make extracts from that record so that knowledge evolves and endures throughout the life of a race rather than that of an individual.

      Definitely sounds like what we're doing here.

  7. Mar 2014
    1. The latest ordinances—and the increased police force—were bolstered by a wealthy community looking to preserve the cultural epicenter they’d paid through the nose to live in, missing the point that the original community existed solely because of a lack of such ordinances.

      Isn't it always this way.

    1. California-headquartered Google also owns VirusTotal, a website that analyses files and websites to check for malicious content.

      Right... cause this detail here was really important... #sarcasm

    1. The types of fear our society (and parents, and friends) inflict upon us—fear of being the last single friend, fear of being an older parent, sometimes just fear of being judged or talked about—are the types that lead us to settle for a not-so-great partnership.

      If you're afraid of being your last single friend the bigger problem is that you have given up on the idea that you might continue to make new friends.

    1. It seems that millennials are individualists who have confidence in their own futures and an aversion to relying on other people for their own success.

      This is the part that scares me. My generation might buy the austerity narrative.

    1. It’s almost too easy to point this out at Wisdom 2.0. Most of the workshops offer lifestyle and consumer choices that are meant to help people heal from the harm, emptiness, and unsustainability associated with living under capitalism, but it does so without offering an analysis of where this disconnection comes from. The conference presents an evolution in consciousness of the wealthiest among us as the antidote to suffering rather than the redistribution of wealth and power.

      Preach!

    2. The city doesn’t keep track of how many people live in these apartments, but the Anti-Eviction Mapping Project estimates up to 3580 residents were no-fault evicted in 2013.

      Ok, well, that is a large number!

    3. The invisibility of the crisis in San Francisco right now is reminiscent of that of the AIDS epidemic.

      Whoa, wait, the fuck?

    1. I’d rather see a culture in which we get paid a reasonable fee for things that we enjoy doing, than one in which we get paid poorly to do things we hate.

      Duh?

    2. To some, a financial exchange cheapens the transaction; in my view, it enables it.

      I never said it cheapens the transaction. I said it makes it not sharing.

    3. Ultimately, whether or not you see “renting" and “sharing" as mutually exclusive depends on how you define the terms.

      You can make up your own definitions of things, but that sort of undermines the whole project of communicating.

    4. I even offered airport pickups for an extra fee.

      This is the crux of what I was defending on Twitter. This is not gifting. A gift is given without the expectation of payment. That's the definition.

    5. Airbnb represented something important: a way to quantify the transaction. It didn’t change the fact that we still treated our guests like friends, shared dinner and drinks, and welcomed them into our social lives. Many of them still kept in touch with us after their stay.

      And none of this makes it any less renting. You share dinner and drinks. You rent the room.

    6. how can I, an advocate of communal living and the Burning Man gift economy, support an industry that seems predominantly capitalist at heart

      Swallow hard, accept the incongruence, and recognize that you still engage in capitalist behavior, in addition to, gifting.

    1. The amount of computation Eve needs to do this depends upon how uncertain she is, and on the nature of the clues.

      Eve wasn't introduced here, but you can understand her as "an attacker". The name is chosen as a reference to "eavesdropping".

    1. http://bouncycastle.org/download/bcprov-jdk16-146.jar

      This should almost certainly say "https".

    2. We need an authenticity infrastructure when there is no way to have advance knowledge of what SSL certificate a client should expect to see, but your app knows where it will be connecting, and it knows exactly what it should expect.

      Succinct way to highlight this distinction.

    3. Google is already doing this. They have an “app” called Chrome, and when their app makes SSL connections to their own services, it checks to make sure that the certificates it sees are the ones it knows Google is using. They call this “pinning,” and you should do it for your mobile apps.
    1. A day of lost work pursuing the wrong solution is something that is acceptable from a learning point of view.

      Almost without exception. Just Say No to death marches.

    1. But staff at Georgetown University, which sponsored the Tuesday cybersecurity forum, took the microphone away from a Guardian reporter who attempted to ask Alexander if the NSA had missed the signs of Russia’s invasion and occupation of Ukraine, which appeared to take Obama administration policymakers by surprise.

      Doesn't strike me as a useful question.

    1. Second, the fact that radical nationalist components were among the beneficiaries of the Kiev revolution left no doubt about Ukraine's future foreign and security policy and its domestic policies.

      ... policies like __ ?

  8. Feb 2014
    1. Do you tell them what tactics to use when fighting oppression?

      I have trouble with this point. I've been called out for doing this before and I sort of disagreed with the person.

      If the manner in which someone brings up tactics suggests an "I know better than you do" attitude, then that's what is really at issue. The idea that allies have no valid input on tactics, though, relegates them to a passive, cheerleader role, ignoring the active work they should do, and denies that they might possess sufficient empathy and perspective-taking ability to make useful suggestions.

  9. theaccidentalmissionary.wordpress.com theaccidentalmissionary.wordpress.com
    1. God is not a behavioral psychologist.

      This hits the core of everything wrong with popular narratives of relating with God. If religion has as a purpose the fostering of community through morality it fails to achieve where it retreats to rewards and punishment as a means of control.

    1. It's important to understand the problems your customers are experiencing, and this is a great way for everyone to get a good handle on that. But it's also important for everyone in the company to understand how the product works - something that non-technical members of the team might have less of an understanding of, as they're not in its guts day in and day out. By ensuring that everyone takes support phone calls (if you take calls) and emails, you ensure good product & customer knowledge throughout the team.

      For OSS I read this as everyone on the mailing list, everyone on IRC.

    2. As the technical lead, you have a lot of responsibilities and pressures on your shoulders. You need to make sure your product or service is technically as good as it can be. You need to ensure that the technical side of the operation is able to meet business objectives. You need to be a product manager, ensuring that . You need to be a software architect, and an infrastructure architect, and a technical designer, and a lead developer. As you grow, you need to be a product manager, ensuring that everyone in the engineering team understands the business goals, and ensuring that everyone in the business team understands the technical challenges (and progress).

      Well, fuck.

    1. eMacs

      This is capitalized like the Apple computer but I wonder if it was meant as the text editor.

    1. #meetingname Provide a friendly name which can be used as a variable in the filename patterns. For example, you can set filenamePattern = '%(channel)s/%%Y/%(meetingname)s.%%F-%%H.%%M' to allow #meetingname to categorize multiple types of meeting occurring in one channel.

      So we can have the same bot run multiple meetings, and provide log a log index in a different place.

    1. They don’t lead to better hiring outcomes as Google learned. Its senior vice president for people operations, Laszlo Bock, said last June in an interview with New York Times

      I don't see what the types of "brainteaser" problems in the referenced article have to do with the kind of question exemplified at the start of this one.

    1. When the user is at the center everyone benefits, including content creators whether they are publishers or marketers.

      Why are users not publishers? That has long felt like the problem to me.

    1. The first 15 years or so of life are just tutorial missions, which suck. There’s no way to skip these.
    1. Where I differ from Peter is in my belief that if you regard alcoholics and drug addicts not as bad people but as sick people then we can help them to get better.
    2. Drugs and alcohol are not my problem, reality is my problem, drugs and alcohol are my solution.

      So much wisdom here.

    1. Dr. Weisman knows how to bridge the gap between science and marketing.

      "Dr. Weisman knows how to utilize his scientific credentials to undermine the scientific process."

    1. Innovative Science Solutions, a consulting firm that specializes in “product defense” and strategies that “give you the power to put your best data forward.”

      This is evil stuff. A business predicated on the idea that data does not speak for itself is practically the definition of anti-science.

  10. Jan 2014
    1. Security and privacy are also issues where annotation systems should meet user expectations.

      This sentence feels a little out of place here, to me.

    1. This is the contradiction of the Google Bus, and it’s one that should resonate across the country. The Google Bus is the embodiment of a system that indemnifies the actions of corporations while increasingly criminalizing and punishing individuals. Google and its ilk have always known that they could break the law right up until the day they were invited to make new laws. That is the power of corporate wealth, and in San Francisco as in the rest of the country, it rules supreme.
    2. Far from recovering money lost to free riders, the enforcement program is actually a huge money loser – the POWER study found that in 2009, the enforcement program cost $9.5 million and only recovered $1 million in revenue.

      Yes. This. This is why we should not enforce and why I give the officers hell every time I see them.

    1. Let’s create a fund, where everyone agrees to put, say, 25 percent of their annual bonuses into it, and we’ll use that to help some of the people who actually need the money that we’ve been so rabidly chasing. Together, maybe we can make a real contribution to the world.

      No! Just leave! What you propose is just more rationalizing! Why pull the punch in the last paragraph??!?

    1. I recently signed up for the TSA pre-check program, and I think the increased level of surveillance is totally worth it in return for more pleasant air travel.

      It's unfortunate that this is presented here this way. The reaction I wish the public to have is to say that the TSA checks are unnecessary and wasteful and that we should have pleasant air travel without increased surveillance.

    1. an event remarkably well attended by women and minority programmers

      Would that this were unremarkable...

    2. Inevitably at such an event, in such a venue the conversation often turned to the future of the library.

      Kill unlimited data plans. Do realistic pricing of bandwidth that doesn't incentivize abuse. Make libraries publicly funded repositories with bandwidth metering exemptions.

    3. Many of the projects that sprang up chose to use Hypothes.is or Annotator in some fashion, and I walked away with a ton of feedback—most notably the need for better documentation on the API, an authentication API, and a request for a groups API that would allow 3rd party applications to easily create groups for social reading applications.

      Authentication API is coming this month, including an API for registering OAuth consumers. Basic Group support should follow in a similar time-frame. The combination thereof is a simple permission mash of consumer-as-group, so 3rd-party services could treat their users as a separate cohort from the rest of Hypothes.is.

    4. Medium style paragraph level comments and great annotations.

      We need another term for this other than "Medium-style".

    1. And that’s why I welcome doge, and LOLcats, and every other atrocity visited upon the English language by the Internet. They’re anarchic. They’re juvenile. They’re a horrific mess. And they make it clear that we can and do shape the language however we want, rather than being shaped by it, for the sake of greater beauty, truth, and endlessly repetitive ironic comic gold.

      Except that they have no place in a serious publication. The reason is that, while SWE (at least according to DFW, and probably defensibly so) is propagated by the Establishment, the Establishment also offers a guarantee of a public education which teaches SWE. What we see in conversational parts of the Internet is a language which reflects its people: The bitcoin-hungry cyberlibertarians do not use the same language on Twitter as the Lil JoJo and Chief Keef gangsters do despite both using Twitter. So unless you think it's cool to write a serious publication in a language only available to those with copious amounts of free time to spend on the Internet then we should still use SWE or we're just being a new kind of elitist, one which is so blindly optimistic about a techno-utopia that it doesn't even stop to consider who's left out. That's a much more dangerous elite than the one that at least tries to make policies which provide open access to its inner circle.

    2. It still has its place — Wikipedia, say, and a few other sources whose pretensions of authority are still deemed acceptable, like maybe The Economist — but it is not the standard mode of our ongoing online discourse. It is out of place there. It is incorrect.

      And if the writers of "TechCrunch" considered that publication to be one of those places I would take it more seriously and consider it less conversational, less a glorified gossip rag and more an actual journalistic endeavor.

    3. I submit to you that, increasingly, this is how Clinical Standard Written English sounds to the Reddit-reading masses: orthodox, lifeless, soulless, a parade of pale impersonal zombie words drained of blood by some linguistic vampire, if you’ll pardon the mixed horror-movie metaphor. I’m not saying it actually is, necessarily; I’m saying that even well-written CSWE is, to many, fatally undercut by being CSWE.

      This is the challenge of being truly critical: to read the propositions and not the language. If people are suspicious of the motives of someone who uses SWE it is because they do not trust themselves to look beyond the form.

    4. This is the weird thing the Internet has done to language: Standard Written English — or, at least, its most fundamentalist form, Clinical Standard Written English — has actually become incorrect in most online contexts.

      I think it's more proper to say that we can divide writing, whether on the Internet or otherwise, into conversation and didactic/journalistic. The former can use whatever it wants. The latter should probably still be SWE and is taken more seriously when it is.

    5. And nowadays — this is where things get interesting — people who write in CSWE actually mark themselves as untrustworthy by doing so.

      I would contest this claim. I don't see where it comes from. What is inherently untrustworthy about having learned the lessons of the Establishment? Are we so radical and progressive in America now that we must openly rebel through language and distance ourselves from formal education lest we be taken as incapable of progressive thought, merely sockpuppets of the Establishment? I call bullshit.

    1. But study after study has shown that no one is immune from the motivating effects of acknowledgement and thanks.

      Study after study has also shown that one should not confuse this with consistent praise, the offer thereof, or more tangible rewards (or punishments) laid out ahead of time as contingencies. For more, read "Punished By Rewards" by Alfie Kohn.

    2. Forget the empty platitudes

      These might even be harmful.

  11. Dec 2013
    1. The NSA’s director, General Keith Alexander, told CBS that granting Snowden amnesty would reward the leaks and potentially incentivize future ones.

      Gasp You mean to say it would promote the sort of whisteblowing Obama praised (before it made his government look bad)?

    1. I mean, if MDMA (for instance) genuinely helps to make us into better, more compassionate people

      A dubious claim, but perhaps not important to note in this context.

    1. Perhaps, instead of giving in to the frantic us-or-them discourse proffered by the media (Funeral selfies! Handshakes! Ted Cruz!), it's time that we acknowledge that conservative and liberal politicians spend more time together, and have more in common with one another, than we’d like to believe.

      Perhaps the reading public would not "like to believe" but is rather made to believe because it is a politically convenient for those in power (the major parties).

    1. This would be more persuasive, however, if, as Justin James has highlighted, so many open-source developers weren't paid to write open-source code.

      But then "Open Source" breaks down as a thing along which you can usefully assess diversity. This fact flies in the face of the previous paragraph ("Open-source projects, by contrast, don't have HR directors"). When people are paid to write open source software they are paid by companies, the same companies that, as the author points out, have HR departments.

    1. This of course makes the life of someone writing Emoji-handling code more difficult, as pretty much all the boilerplate you’ll find out there assumes a single UTF-8 codepoint per character glyph (since after all, this was the problem that Unicode was supposed to solve to begin with).
    1. The irony that the very raison d’être of a university—education!—is also its most disposable aspect seems lost on everyone (perhaps because nobody studies English, philosophy, or French anymore, so nobody recognizes irony or knows what a raison d’être is).

      I lol'd.

    1. Here I would like to interject a prayer: Please don’t use email for sharing links anymore unless you know that’s the recipient’s preference. Email is designed for communication. We usually deal with it using specialized communication tools. It’s not a good place to read articles, and it’s an especially bad place to discuss things, because conversations there can’t be left or muted.

      Pedantic note: some e-mail clients do allow you to mute a thread. Gmail is one of these.

    2. Let’s be real: most people use their profiles to talk about themselves, but they also share links there that they think will support or inform community relationships. When they’re right, I think some of the best online discussion of reading material happens in this forum.

      Yes! I totally agree. This is one of the reasons I'm in the annotation game. The best conversations are often with the people you know and trust, but they may not be as attentive to the same sources as you that serendipity finds you discussing in the same comment stream, unless you take it off the publisher page and on to your social network. This dichotomy needs to be collapsed. Bring your network with you.

    1. Well-intentioned (and grammatically correct) though it may be, changing pronouns has very little impact on inclusivity. When you’re starting from a default position of exclusivity, when people automatically associate you with the tone-deaf cringefests that are one of open source’s worst problems, when people see your community and your leadership and find very few diverse participants, when your actions don’t illustrate how people can play a role if they won’t prove themselves better coders than those already involved, hanging up a sign saying “no one is disallowed” is not going to be enough. Saying you want to be inclusive does not create a culture of inclusivity.

      Actions, not words.

    2. I do not maintain any big open source projects, but in talking to people who do it’s become my understanding that the bulk of the work is sifting through issues and pull requests, not actually coding. The former is the thing they consider hardest, the thing that burns them out, their most overwhelming responsibility.
  12. Nov 2013
    1. The Blob (possibly the worst movie ever ever ever)
    1. Clearly, Meyer’s sentence variety is lacking compared to Collins and Rowling. But in her defense, repeatedly starting sentences off the same way doesn’t mean the prose is bad—it just means it’s repetitive. Hemingway uses the same 50 openings (“There was a,” “He did not”) in 5.3 percent of all sentences in The Sun Also Rises.

      The paragraph before this compares the percentage of sentences each author starts with that author's most common three-word opening. To compare this with the percentage accounted for by Hemingway's fifty most common openings is pretty useless.

  13. Oct 2013
    1. large sunny letters slept an old cat with a neon yellow tail

      It's tail was actual neon? Like it's a cyborg cat?

    1. Do we really want a world where the Internet works like cable TV?

      I'm not sure this comparison is clear. What about cable TV is problematic? I'm usually free to use whatever television I want with whatever provider, although the limitation is usually that I require the provider's set-top box. Is that what you're referring to?

    1. Three things are required to fully guarantee a repeatable installation using requirements files.

      "Ensuring Repeatability"

  14. Sep 2013
    1. Much as it is not the criminal defense lawyer's place to judge their client regardless of how guilty they are, it is not the doctor's place to force experimental treatment upon a patient regardless of how badly the research is needed, and it is not the priest's place to pass worldly judgement on their flock, it is not the programmer's place to try and decide whether the user is using the software in a "good" way or not.

      Taking this to heart / putting it on my wall.

    1. The privilege-pushers have a view of structure (thus of patriarchy) that is so vague that some of them dismiss the notion of a structural view of oppression as at best, academic bullshit, and at worst, a way for an individual to dodge examination of her own privilege.

      I struggle a bit with this because I don't know to view structural oppression as anything but, to borrow a phrase from earlier in the article, "just the way things are" without insisting that it emerges from the way people behave. What is the structure if not an organization of individuals? What is the hope for revolution if not a tipping point? To suggest that the actors are classes rather than individuals pushes the question back without answering it: "What are classes if not collections of individuals?"

    1. True, it would be more altruistic to donate to the schools of poorer children, but it is human instinct for parents to support the education of their children.

      "Human instinct" or the fault of nucleic, agrarian, post-hunter-gatherer culture?

  15. Aug 2013
    1. If you were to make an annotation of the HTML wouldn't you want to see that annotation when viewing the PDF, and vice-versa? Unfortunately, this won't work if you are following the tried and true pattern of querying for annotations only using the URL that you happen to be looking at in your browser.

      I love the work you did here, @edsu.

    2. The annotation support in Mosaic was not to be, but twenty years on we can see a vast proliferation of annotation services that use its key insight of grouping annotations by URL. The simple act of copy/pasting a URL into your Facebook status box, entering some text, and hitting post, creates an annotation by you, about the Web resource with that URL. The same applies to URLs you use in Twitter or App.net status updates, or when you save a bookmark with some tags, or a brief note in Pinboard, Digg, Delicious or Connotea. Of course, the Web would be a better place if all these services shared annotations in a compatible way, with agreed upon standards. But it is remarkable that Web architecture has allowed this ecosystem of annotation to grow organically, with little coordination, using the very simple concept of annotation by URL.

      And now that we've had 20 years to see what works in practice, we can finally get on with a standard and more general implementations!