Which is why the XQuartz/&c. user experience on macOS really really surprised me. It's absolutely unusable. Inkscape for macOS basically may was well not exist as far as my experience with it goes.
Are there other comparable GTK+ apps that work well under macOS or is this a common story?
How in the heck did Canonical squander such an incredible opportunity to be the de facto standard for Ubuntu/FOSS code hosting by letting Launchpad stale so badly?
They freaking built it into their distribution of apt with PPA shortcuts, etc.
They seem to want to differentiate themselves as (e.g. "not photoshop" in gimp's case) but seem to equate that with "ignoring good ui/ux design".
1. I believe it began with the hacker getting DOB/SSN.2. Called wireless provider, and hacker forward all calls and texts to a burn phone. Eventually, the hacker ported my wireless phone to another provider/number (not sure which), and the phone registered to my provider did not work anymore. The landline phone was also forwarding calls to another number.*3. Hacker gained access to email (as that email was also within the telco's site). At the beginning, the hacker did not reset the password. After I changed the email's password, hacker was still gaining access to our emails and he/she eventually reset the email blocking my access. (reason was all the text and calls was forwarding to his/her burn phone so he/she can reset the pass anytime)5. Requested 2FA from bank.6. Gained access to bank account.
This was over a course of 3 months. It was a nightmare to resolve and paranoia still remained. The hacker later on went opening several bank accounts. Fortunately, this was discovered early. The entire situation was communicated to the FBI, local police, and bank institutions, but I do not think anyone cared.
*I saw two numbers that were being used within my wireless account site to forward the calls.
After leaving the party with my youngest, I went to the grocery store, and then on home. When I got home my wife was gone, which I expected since she was picking up the older kids from the party.
Throughout this afternoon I had not been checking my phone in an attempt to be a bit less connected on the weekends.
About half an hour later my wife comes home totally freaked out and frazzled.
Apparently after I had left, someone went into a T-Mobile store and somehow convinced the associate that my number was theirs. I had received a couple of texts from T-Mobile with a pin number where the store associate had attempted to do something, but I was not aware of them until later.
Once this person had my number, they called my bank, reset my online password, and transferred all of our money from various accounts into one of my checking accounts. The bank then put a hold on everything (thank god).
My wife happened to have been paying bills online while this was happening, and saw it all go down. Her first thought was to call me, then when I didn't answer to call the mom throwing the birthday party.
Birthday party mom told my wife I had left, so my wife assumed that myself and our 3 year old were being mugged or something. The police were involved and she spent a good amount of time freaking out trying to find me.
All in all I had a pretty good afternoon :P
For real tho, it was a freaking mess. Took weeks to get our accounts safe, and we try to avoid using phone numbers for 2fa now.
1. Do NOT secure your sensitive accounts (facebook, primary email, bank accounts, twitter, etc) with your telco phone #. Telco Phone number is NOT secure!
"Create a brand new Gmail email account. Do not connect it to any of your existing email accounts. (When signing up for a new Gmail, you dont need to enter a phone number or current email, although there are fields for you to do so. Leave them blank.) Once youve created the new island-unto-itself email address, create a new Google Voice number." Use this Google Voice # to secure your primary accounts, and don't have your telco # listed in any of those accounts.
But, make sure your New Gmail account is super secure, with a security key, as mentioned in the article.
2. Check the password recovery methods for all your sensitive accounts and make sure the answers aren't duplicated from any other site. Actually, it's best to remove them, if you can.
If any security experts want to chime in, please do.
As I required to upgrade my Micro SIM to a Nano SIM, I went to one of my provider's shops and asked for a Nano SIM for phone number X. I was then asked to verbally confirm my name and address and that's it. No ID card confirmation, no nothing. "Here you go sir, your new SIM card will be active within a few minutes. Can I help you with anything else?". What. the.
I also find it odd Facebook, and other sites will let you signup solely with a phone number. There's prepaid cell phone providers that recycle phone numbers, etc. Just seems so stupid to rely on a phone number for authentication alone, but two factor I'm okay with since you still need to know the password. Twitter has a developer product where you can be texted a code to login using only a phone number, which to me just seems wrong to do.
It'd be nice if trying to port a number, change important info, etc if they had to actually call you or text you first to confirm. But one of the problems is people will lose their phones, and need a new sim or phone... That I think I'd have a requirement to actually visit the store - but that doesn't work to well with prepaid phone providers without physical stores selling via other stores like Walmart, Target, etc. Maybe in that case without nearby stores, partner with your retailers to verify ID or fax a ID in.
Conversation with one of my banks the other day:
Them: Can we please verify a code sent to your phone number?
Me: Umm, sure, although that won't verify anything. Use something else to verify that it's me.
Them: Can you please verify your phone number?
Me: Umm, I don't know what phone number I used with you? Try XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, and XXX-XXX-XXXX? They all belong to me depending on where I am.
Them: Can we use XXX-XXX-XXXX? Do you have this phone with you right now so we can we send a text message with a verification code?
Me: Send your insecure SMS to any of my numbers. They all go to my e-mail inbox. [I don't need to have my "phone" with me -- my "phones" are virtual.]
The problem is that the phone company owns your phone number and you just get access as part of a service. Unlike a domain name where you own it.
If we change the law we'd bring more accountability.
1) Ban SMS as a second factor for high risk targets like banks.
2) Telecom companies should require social security number or uniquely identifying information to provide account access.
Yes, it's a problem that security questions turn hacking into a simple public records search.
BUT most terms of service have a line like 'you warrant that you've been entirely truthful with us' or something. If you give the wrong security question to your bank, they potentially have grounds to freeze your money or screw you later.
Why isn't the answer 'consumers have the power -- punish services that don't support FIDO by not using them'.
At best this article is saying 'don't connect anything to anything'.
The best way he came up with to secure services that insist on using SMS for 2FA (or credential reset) was to register the number of a pre-paid phone for those services.
Inconvenient? YES. But a pre-paid phone number can not be ported by a negligent (or willfully criminal!) operator.
I have had two phones die on me that was my 2FA device, plus OS upgrades, so I have gone through resetting 10-20 2FA accounts a few times. Though with upgrades usually I foresaw that and downgraded my 2FA before hand.
All I wish for was that resetting 2FA would be a very very slow step by step process and spammingly broadcasted to all emails, sms, postal etc associated with the account. But I know for cost cutting customer services departments that wont happen.
I have enabled proper 2FA on my Google account with U2F, but I haven't disabled everything else yet because I only have one token, and I still need something like TOTP for stuff that uses Google accounts, but doesn't support U2F.
As a closely related remark, I wish U2F would just get popular enough, it's pretty convenient, isn't vulnerable against the kind of attack SMS-based 2FA is, and protects against phishing. But almost nobody outside Google supports it, and OS/Application support is rather incomplete or requires additional setup.
Users aren't warned enough about the fact that everything fails, and they will have to go through 2FA deactivation/account recovery process sooner or later. They must be really reminded to DO BACK UP the recovery code(s). With "back up" as in "keep not just somewhere, but where you can actually find it, when you'll need it". (But not in your password manager)
This is true for SMS 2FA as well, but completely losing the number (as long as one's a paying customer) must be significantly less common than losing a device.
She just replied well we could change the sim to your name, didn't even check with the original owner and 5 minutes later I was on my way with new sim.
There was no authentication at all. Literally anyone could have walked in gave my name and phone no and would have gained access to my phone. I stopped using my phone for 2FA since then.
In China your phone number is pretty much as valuable as all your password combined, all services are solely linked to it.
Even though phone companies ask for id before issuing a SIM card, I'm pretty sure a tiny bribe is enough to get past most store clerks
Kraken published a highly useful blog post on it. Do give it a read.http://blog.kraken.com/post/153209105847/security-advisory-m...
I wonder what other scams are being incubated in lesser-known parts of the world, that are waiting to be unleashed.
If I use a 2FA app like the Google one and lose my phone, I need to have the codes ready. If I were to use my phone number, I kind of don't need that since I just get a new sim and a new phone. But at the same time that is not safe now.
So what is the solution here? I liked the idea of something like DUO but not enough places use it.
Even given that, since it relies upon human choice and behavior, and does nothing versus attackers with assets within the phone company, it seems a bad idea to have 2FA via SMS.
Get the 2nd factor
I really hate the weird sounds and interruptions. It feels like a podcast designed to appeal to the masses, and to "overdo" every aspect of what a podcast should be.
I hope this is read as "constructive feedback", because that's the intention.
I listed to 10-12 podcasts a week, and I have never experienced this "repellence" to a single podcast, like this one. I believe this is the style of other podcasts of this series, if I recall correctly.
Am I the only one, or is there anybody else that shares the same feelings about it?
The sheer thought of that just blew my mind a little.
It could drive the whole world mad.
I'm in my 40s. Incredibly old for HN standards. And yet, I feel no nostalgia for the "good ol' times." I mean, don't get me wrong I'm sure there's a lot of things that set me apart from newer generations -- I don't get Snapchat at all ;) -- but I don't see me being happier by being put in a house set up to look and feel like the 90s/80s.
Is it maybe because we as programmers tend to be less prone to be stuck to the past? Just wondering
There were lots of things I could do in my 20s (e.g. refuse to use gasoline-powered city transportation, refuse to patronize places that used disposable cutlery, refuse to use non-free software, etc.) that I can't do when I'm in my 30s because people around me would think I'm a stubborn idiot, jeopardizing my career at a point where I have not yet established myself. It's very easy to tell a colleague, advisor, anyone at school that you're going to bike to the destination or take electric-powered transit [because you don't believe in a fossil fuel future]. It's very difficult to say the same thing to an investor, co-founder, employee, customer, or whoever is offering you a ride in their car, without feeling like an ass. I'm basically forced to be "normal" during work times and fit into the mould of society. I can only be myself on evenings and weekends.
I can only imagine how much more "being normal" I need to do if I had kids, pets, tenants, or whatever. I don't have any of those at the moment. The other night I was pondering over potential improvements to our music and mathematical notation systems while staring at the Milky Way. (I didn't come to anything conclusive, but I love thinking outside the boxes that society defines for us.)
10 years ago, I could truly be myself 24 hours a day. I was basically learning all kinds of things about the world by doing that. Now, I only get about 5 hours a day to be myself. The rest of the time, I need to conform. The lack of "me" time itself may be contribute to some degree of mental rot/aging, apart from the biological component.
How we feel and what we think of ourselves affects our levels of Testosterone, Cortisol, Serotonin, etc. Even a 5 minute conversation can give you a T boost of 30%+ ... or believing that you're perceived as high status alters your Serotonin. Those hormones in turn make you more vital.
So who knows what was the reason... maybe more social interaction with strangers? Or simply putting their mind into a different, better place?
Which is to say, I'm dubious as hell of this result: For something this click-baity, at this point in the history of psychology research, I'mma need some serious replication before I give itan ounce of belief.
I think the computing party is just getting started. Non-trivial domestic AI will be here within a couple of years, personal robotics 5-10 years after that.
The current ad mania sucks, but it's going to have to evolve or die.
I don't miss much of the past. Pocket phone computers, tablets, GPS, video calling, massive data storage, and the potential of renewables and distributed energy grids are all awesome. Like.
Even social has its moments.
The real problems are cultural and political. There's been some movement there, but not nearly enough. The system has nearly enough energy to go through a phase change soon, and that's when things will get really interesting.
Moi? The body and mind are both subject to: Use it or lose it. We also, as humans, tend to assimulate into the norm around us, be it smoking, obesity, and now I guess perhaps youth.
Finally, I have to wonder about the effects of essentially being on holiday. In addition, perhaps the group discussions energized them? That is instead of waiting to die, they had more reason to live? In any case, interesting.
But ultimately the end is the same. You can't reliably exercise your way to 90, even. The majority of people who are exceptionally fit die before reaching that milepost in the environment of the last 90 years of medical technology. The future of health and longevity in later life will be increasingly determined by medical technology, and nothing else. Aging is damage, and that damage can be repaired given suitable biotechnologies to do so.
DNA methylation patterns correlating strongly with age are a very promising tool when it comes to assessing treatments for the processes of aging. Companies offer various implementations now - see Osiris Green for a cheaper example, to pick one. In the SENS view of aging as accumulated molecular damage, epigenetic changes are a reaction to that damage; a secondary or later process in aging. We'll find out over the next few years how the rejuvenation therapy of senescent cell clearance does against this measure, now that things are moving along there.
But you shouldn't think it impossible to construct useful metrics of biological age more simply. There are a number of excellent papers from the past few years in which researchers assemble weighted algorithms using bloodwork, grip strength, and other simple tests as a basis into something that nears the level of discrimination of the epigenetic clock.
When it comes to a biomarker of aging, there are lots of promising candidates. Researchers will spend a lot of time arguing before they come to any sort of pseudo-standard for that task. Industry (today meaning the companies developing senolytic therapies for the clinic) will overtake them and, I'd wager, adopt one of the epigenetic clocks because it basically works well enough to get along with, and can be cheap in some forms.
'aging' is the word you are searching for
One of the interesting points, that is often overlooked in ML is model deployment. They mention tensorflow, which has a model export feature that you can use as long as your client can run the tensorflow runtime. But they don't seem to be using that b/c they said they just exported the weights and are using it go which would seem to imply you did some type of agnostic export of raw weight values. The nice part of the TF export feature is that it can be used to recreate your architecture on the client. Bu they did mention Keras too which allows you to export your architecture in a more agnostic way as it can work on many platform such as Apples new CoreML which can run Keras models.
Also, I wonder if they checked how a feed-forward NN that operates on the contents of a sliding window (e.g. as in the first approach above) compares with their RNN results. I am curious about this, as it would give us a hint whether the RNN's internal state encodes something that is not a simple transformation of the window contents. If this turns out to be the case, I'd then be interested in figuring out what the internal state "means"; i.e. whether there is anything there that we humans can recognize.
[edited to increase clarity]
Updates in the past are "recorded and discarded", updates in the future queue up. First, let's see if we can run our peers out of memory with a few (billion) quick future updates. Funny thing, gzip; it's so easy to compress highly repetitive patterns. Could also just try and spam the historical log too, could we fill the disk as well as working memory?
Do you have an operating window of less than, say, 300ms? Heaven help the poor client from Sidney who keeps trying to update a master in London. Their updates will always be discarded (I'm not certain, but the docs read as if this occurs even when updating a value which hasn't been overwritten by a future state). Darn you, speed of light; why can't you be just a little faster?
I guess you can only hope that your clients all decide to be honest and never change your code. Or get their state counter (or clock) too far out of sync.
- It fixes several critical bugs that happened during the performance rewrite. Example: If a server crashed and had its data wiped, there wound up being some sync issues. But this release fixes those.
- First time for us to hit 2K table inserts/second synced end-to-end across a federated (browser <-> server <-> server <-> browser) network topology. This load test was running on low end hardware, so expect better results on better hardware.
- These tests are now available for anyone to run, using our distributed testing framework called PANIC, which simulates failure cases (inspired by Aphyr's Jepsen.io tests). Code and docs for it at https://github.com/gundb/panic-server .
- - If you want to run (or write your own) please read through this well-commented 300LOC test: https://github.com/amark/gun/blob/master/test/panic/load.js .
- - The test that was added in this release simulates what happens to GUN in a split brain network partition during a server loss. We expect the data to converge once the network heals (it previously was not, but now does). The PANIC test for this is here: https://github.com/amark/gun/blob/master/test/panic/holy-gra... (Warning: not commented, please see the previous test to understand what is going on)
Happy to answer any other questions. For anybody using GUN, this is one of the most important releases and upgrading is strongly recommended.
We're getting even better numbers on other devices: Android phone, ~5M ops/sec. Macbook Air, Chrome, ~30M ops/sec. Macbook Pro, Chrome Canary, ~80M ops/sec. Lenovo netbook, IE6, ~100K ops/sec [...] These numbers represent a breakthrough in performance not possible with other databases.
Next time post on a weekday so you'll get maximum criticism.
They should've implemented scylladb on top gundb, not amateur-designed-by-kernel-hackers seastar-framework.
Do reavaluate your time, seriously & sincerly.
Now there seems to be a package to do this (https://github.com/staltz/gun-asyncstorage), but I am still unsure about how production ready this is. Any thoughts in general or experiences with Gun and react-native?
Any conflicts? How?
A much better approach (or at least, what I use) would be to set up the repo somewhere private with --bare and set a receive hook to checkout HEAD to the htdocs folder, this way the htdocs only has the content and you get the extra feature that you can sneak extra commands on the checked out source (such as building/minifying) without changing the original source
here's one of the blogpost's authors. Although it has been a while since we published the blogpost, I'll try to answer any questions or listen to any suggestions.
shameless plug: I've developed a service that you run to check against vulnerabilities in your apps/servers and it has a free plan (https://my.gauntlet.io/registration.html) in case you're interested (https://gauntlet.io).
If your history has sensitive info, see about rewriting the history. If that's not possible, maybe fork the repo, remove the sensitive info, and get the team to switch to the fork. If that's not possible either, make the sensitive info meaningless (reset your DB passwork, revoke the API tokens, etc).
And don't just stop with .git: Delete any folder/file that's not required to operate the app in production.
Step one: stop randomly smearing crap around. Prod should only have files that came from a .deb or .rpm signed by the legit build process, because that's how you know your system is reproducible and has everything it should and nothing else.
Hasn't dvcs-ripper  been around for longer? It supports other VCSes as well.
Also, the article fails to mention that a simple `git clone` would usually work as well, although that tends to be blocked in similar CTF challenges.
Not that you should have .git exposed on your public webserver anyway. I do remember participating in a CTF that had a problem like this a few years ago, it's possible that it was the same one the author mentioned.
For example, static websites for open source projects, et al.
So if I post my website's sourcecode on github, I'm equally vulnerable? I could see problems if said checkout contained a credential cache, but that doesn't seem to be mentioned.
I disagree. I find that OK implies some consent or agreement.
In Chinese there's a word I don't know how to write but sounds something like "uh" that means more "I acknowledge" without implying agreement. Actually, I don't know if it's a word, but I hear it a lot.
Whether it exists in Chinese or not, I wish English had a word more neutral than OK or uh-huh. "I acknowledge what you said" is too clunky.
Thankfully the thumbs up gesture is pretty pervasive there.
Cargo in the harbour, is not lost at sea, or in transit.
Instead it is safe and sound, or O.K.
The author writes
"I dont consider Windows good enough. Historically there have been to many ways to compromise a Windows-based computer, and new techniques keep showing up with alarming regularity."
And then later
"I am writing this on my newest computer, a Late 2008 Aluminum MacBook running OS X 10.11 El Capitan"
If you're going to knock Windows on a lack of security, at the very least do as much as you can do to protect yourself on a Mac. Note the long list of security fixes in the latest version of MacOS https://support.apple.com/en-us/HT201222
My 2011 Macbook Pro is still perfectly usable for everything a normal person would want to do with a computer. So is my parents' 2012(?) Mac Mini. I just bumped the RAM up to 8GB on both of those computers and they are just fine for web browsing, word processing, and HD video playback.
I suspect that Apple's problem selling iPads is related to this -- my iPad Air 2 is never noticeably slow doing any task, and I know people with pre-Air iPads who are perfectly happy with them. These are people who have plenty of money to buy a new iPad and would do so if theirs felt slow; they just don't notice any drawbacks to using an older one.
This is actually a bad idea - the 2011 15/17" MacBook Pros have dying graphics chips, that Apple stoppped repairing at the end of last year.
In my opinion - computers should still have a boot to basic with a simple interface to vga graphics and passable sound. Something like pico-8 but a better editor with VI bindings. :-)
It's a good thing we have the raspberry pi.
Also his mention of Windows security is a little tired.
I think I'm trying to run too much locally, so these days I am still getting a lot done using cloud VM's.
Huh? Out of the box resolution is 1440x900 and maxes out at 1680x1050 (without using a 3rd party application like SwitchResX). Apple used to set the default to 1280x800 but this is no longer the case.
Are there any hacks that can convince macOS (or the older versions of OS X described in this article) not to treat the display as HiDPI? Yeah, I realize the machine will abruptly feel like it needs a magnifying glass to use, but in a pinch (laptop on lap <2ft from eyes) it might work for some (insert standard disclaimers here about eyes being non-replaceable and needing to last the distance).
The late-2015 21 iMac is ~$1.5k+, and "has a multi-core Geekbench score of 5623."
Then the late-2011 17 MacBook Pro which is ~$1.3k checks in with a "9240 Geekbench score".
Is there some datapoint I'm missing here?
+1 for https://sultan.readthedocs.io/en/latest/sultan-examples.html...
I think it would be interesting if you could iterate on the results of "ls -l", where each row is represented by an object.
Imagine writing a wrapper for "grep". It may work in one environment, but if you need portability, you're going to quickly realize that there are nuances in implementation and the actual calling interface. Now you're handling branching logic in your application code based on platform, version, etc.
Interfacing with a command line tool shouldn't be thought of much different than a remote HTTP/ReST API talking text/plain instead of application/json. You're looking for your "client wrapper" to handle argument validation, parsing, versioning, etc.
This project looks interesting too, will give it a try.
BTW: Has anyone news on Fabric 2 ?
Anyone know how the name came about?
Which was super useful for controlling some utilities that wanted to be run in an interactive bash shell.
Nice stuff though
(I know why not to use plumbum)
This line triggered me.
Use wayland (with gnome) everyday myself but wanted to point out that wayland started almost 10 years ago :) The adoption has taken forever though partly because of the infinite legacy of X11 and lack of support from big players like nvidia.
For those unaware, SirCmpwn is responsible for sway - https://github.com/SirCmpwn/sway - which aims to be an i3 compatible compositor for Wayland. In my experience it's not production ready yet, but it's definitely a pretty cool project to keep an eye on if you do use i3.
Also, how great a name is Robert Foss for someone who writes open source code for a living...
Also I guess they could have just as well built that with a Pick and Place machine out of an electronics manufacturing company, but I guess UdK has an emphasis on things being hand-made and looking artsy.
Edit: Not sure how big is it in total though. Maybe someone not on mobile can share.
I see word meaning as an action similar to object recognition in vision - we have to infer meaning because the actual word itself is a family of meanings. Most of the time it's used one word - one embedding, even in word2vec which is the standard method used in papers.
Of course word sense disambiguation is an old topic of research and there are many methods. The translation task is probably the ultimate word-disambiguation application - it shows how much work is still to do after word embedding, in order to understand the meaning of words. If words had unique meanings, we could have done translation with simple dictionary substitutions.
For instance, suppose a tribe of headstrong individuals who would never back down in an argument, and would resort to violence before losing face. It might be beneficial for random personality variation to exist to allow them to settle such a debate nonviolently. Maybe one individual randomly becomes able to laugh off conflict, or becomes more meek, or is more easy going.
It's kinda like how four cars that pull up to a four way stop at the same instant decide who goes: some randomness in the timing of their reactions leads to one pulling out a little before the others, and they're allowed to go, gracefully resolving the deadlock. Four naively designed AIs might get stuck in that situation (of course, simultaneity is implausible, but there are similar cases that might be more realistic).
I'm sure many aspects of an individuals development are largely determined by genetics and big picture environment (anything else would be non-adaptive). But it kind of seems obvious that within the range of reasonably adaptive differences, the outcome is likely often chaotic. That should be the default presumption, and absent some clear reason to expect otherwise, is what they should have expected.
This then still leaves open possibility that different behaviour is cause by genetic mutations but this variation it much more amplified that presumed previously.
I would be happy if somebody with more knowledge finds time to comment on this.
Anyway, both of those were dry at one point and the water of the oceans broke through. The Black sea went from low lying valley (akin to the dead sea valley, but much bigger) to open sea in less than a week.
I don't know, but that even seems to me must have been pretty spectacular (to watch from a SAFE distance).
Having seen both, I'm not sure that doubling and tripling Niagara would make it larger than Iguazu Falls...probably taller, but Iguazu is really, really wide.
Eastern Washington's Scablands are pretty impressive relics.
I imagine Satya no longer has this policy as CEO. Are there any division head level or higher execs in Microsoft which copied this policy? I imagine it works best as a mid-level manager where there are at least 50-100 people below you but not 10's of thousands.
I would hope Bill Gates doesn't have such a delicate ego that he couldn't handle losing a game a ping pong
For others who might have the same issue:
Bagpipe enables ISP administrators to express BGP policies in a domain-specific specification language and verify that he ISPs router configurations implement these policies.
For the permutation group, you get matrices instead of numbers for the Fourier coefficients. The matrices themselves have nice interpretations (eg, interactions of unordered pairs or ordered triples of elements in the permutation), but the actual entries of the matrices are all but impossible to motivate, imho. (Much like how it's easier to understand the magnitude of a regular Fourier coefficient than the phase.)
Why does Deep Learning work? - A perspective from Group Theory -- https://arxiv.org/abs/1412.6621
semigroupMembership :: Endo -> Bool
The latter is much more interesting.
Of course when you are as politically connected and as well known as Professor Church, you can afford to burn people on these impractical efforts, which of course cements your reputation as being successful at doing the marginally possible (or unuseful but with a wowworthy headline), which attracts grad students and postdocs who either blindly or cynically chase working for someone who will improve their reputation, and also makes it possible to further secure funding for crazy projects that anyone else would be laughed at for pursuing (if they were unsensible enough to do in the first place).
Hopefully, the neurodiversity movement will come up with better ways to convince people that they are different rather than broken and with better framings for how to help them interact effectively with the rest of society without trying to force fit them to some mold of "normal."
If you could eliminate the disorder while leaving the remainder of the brain untouched, they'd be better off, full stop.
Of course you can't, we all have to work more or less with the neurology and physiology we've got, and given that, it's good to build in flexibility and understanding and the accommodations that we see in modern society.
I think there's huge value in being compassionate for every kind of person - imagine if Mr. Church were kept from his work by the disorder?
I do it (not narcoleptic, just like to sleep whenever the mood strikes). Sometimes 2 naps during the working day, almost always at least one. 10-15 minutes tops usually, just barely fall asleep then back awake.
This should be tolerated at work I think.
Many glass mills need to be within a certain mile radius of the factories they supply because of this. NYT missed this in the article.
I always assumed that multi-national companies tend to send executives from their headquarters for strategic decision making, and only hire local managers for execution.
I don't know if history offers any good solutions here though.
That investment is everywhere - in our stock market, in our government debt, in our real estate and in our Ohio Windshield plants.
Every time you buy an iPhone, you're handing China hundreds of dollars which they then invest in America.
We very literally gave them a Windshield plant in exchange for consumer goods.
This is exactly why these regulations need to exist and be enforced as strictly and evenhandedly as possible. If they didn't exist, your competitors will implement any measure, including ones that compromise worker safety, to undercut your prices. Market forces will attempt to shape this industry to be the leanest it can possibly be.
Capitalism can grind fungible labor into a literal pulp if it is allowed.
A corporate executive is assigned to help improve the efficiency of a small-town brewery in this comedy inspired by the Johnny Paycheck song. When the small town turns out to be his old hometown, however, the executive finds himself torn between his loyalties to his company and his old friends.
If you want a manufacturing industry, workers WILL get killed on site. Workers WILL get cancer from dangerous chemicals. There's no free lunch. Everyone knows this, but somehow we care more about a high school dropout getting exposed to fumes in a factory than one that ODs on heroin because he has zero job prospects.
Either blue collar workers die at 65-70 after a lifetime of work related exposure, or they die at 30 due to drug overdose. Those are your 2 and only 2 choices.