Thursday, January 23, 2014

daily-all 01/23/2014

Posted from Diigo. The rest of my favorite links are here.

Wednesday, January 22, 2014

daily-all 01/22/2014

Posted from Diigo. The rest of my favorite links are here.

Tuesday, January 21, 2014

daily-all 01/21/2014

  • tags: streaming api libcurl recommendation pattern

    • If you wrote your own streaming API code or maintain a library, make sure your HTTP library supports 1.1 and that you are issuing HTTP 1.1 requests. Popular libraries such as libcurl typically have no problem parsing these responses.
  • "JSPs and servlets Most of the times JSPs are used to show an object in your application. Stapler allows you to associate JSPs to your application classes, as shown in green circles in the above figure. Stapler weaves those JSPs into the URL hierarchy, and when they get requested, Stapler sets up the environment such that they can access the corresponding application object very easily, by the "it" variable (like ${}). Similarly, often you want to run some Java code when a certain URL is requested, as shown in red circles in the above figure. For example, when /project/stapler/delete is requested, you'd like to delete the project and redirect the user to /. With Stapler, this is as easy as defining a method on your application objects. Stapler invokes the method on the right object. Problems That Stapler Solves Servlet (and technologies like JSP/JSF that builds on top of it) can only bind request URLs into your static resources, JSPs, and/or servlets in a very limited way. You can even tell that from the system. For example, the URL to view the archive of a mailing list is /servlets/SummarizeList?listName=announce, the URL to search the archive if /servlets/SearchList?listName=announce, and the URL to manage it is /servlets/MailingListEdit?list=announce. This has some problems. Relative URLs are useless Ordinary servlet/JSP prevents you from using the URL hierarchy to organize your application. In the system, if you want to generate a link from the archive to the search page, you have to put the whole URL including all the parameters. You'll be writing something like /servlets/SearchList?list=${listName}. As your application gets more complicated, the number of parameters will increase, making your application harder and harder to maintain. Stapler allows you to use URLs like list/announce/summarize, list/announce/search, and list/announce/edit. Thus a link from the summary page to the search is simply search. A lot of boiler-plate code Most of the times, the first thing your JSPs and servlets need to do is to locate the object that you'll be working with. This is tedious. Even worse, it needs to be repeated in many places. Stapler takes care of this for you. When your JSP is invoked, you can access the target object by the variable "it". Or when your action method (the equivalent of the servlet) is invoked, it is invoked on the target object. This cuts down a lot of boring boiler-plate code in your application. Recursive Structure Servlets can't handle recursive directory structure very well. In the above figure, I have recursive Folder class that has two JSPs each. The only way to make this work in servlet is to assign unique IDs to each folder and define those JSPs at the top-level. The actual URLs will be very different from the natural tree structure. Stapler maps this very naturally to URLs"

    tags: routing stapler url generator

  • tags: pain attention feelings transformation perception contraintuitive

  • tags: mathematica analysis models simulations sensitivity

Posted from Diigo. The rest of my favorite links are here.

Friday, January 17, 2014

Friday, January 10, 2014

daily-all 01/10/2014

Posted from Diigo. The rest of my favorite links are here.

Wednesday, January 8, 2014

daily-all 01/08/2014

Posted from Diigo. The rest of my favorite links are here.

Tuesday, January 7, 2014

daily-all 01/07/2014

    • Access to a world of infinite information has changed how we communicate, process information, and think.
    • Innovation, creativity, and independent thinking are increasingly crucial to the global economy.
    • To them, knowledge isn’t a commodity that’s delivered from teacher to student but something that emerges from the students’ own curiosity-fueled exploration.
    • To his surprise, the children quickly figured out how to use the machine.
    • “If you put a computer in front of children and remove all other adult restrictions, they will self-organize around it,” Mitra says, “like bees around a flower.”
    • “The bottom line is, if you’re not the one controlling your learning, you’re not going to learn as well.”
  • "eally cool game mechanic because it takes mastery of this commodity production cha"

    tags: economy games game mechanic production investment

    • This holds intrinsic fascination to people of certain personalities (hi!) but it can get really messy really fast if handled poorly and could well alienate players whose focus is more on something like narrative, combat challenges, or characters.
    • I don’t know about you, but this stuff gets me really excited.
    • If there's hope, frankly, I think it's offshore.
    • I am suggesting secure, accountable devices with digital signatures built in. They're cryptographically time-stamped, their voice signals and photographs are cryptographically overwritten, proving their source. They are tamperproofed, and very sternly verifiable, and usable as proven evidence in courts of law.
    • It's alarming when our Congress does dumb things and our institutions look like they're caught all flat-footed, but you know, we don't have some extra, better Congress stashed away in an attic; this is Washington, and this is it. We don't have an extra American population, either; dumb, pampered, red-white-and-blue, whatever, we are them. Adversity has its uses. We're learning a lot about ourselves by going through this. If we can just manage to make some fresh mistakes, we may end up in some place really interesting, better than we had, not all damp, crooked, and muddled, but clearer and more sensible. We should hope for that, and work for that.
  • tags: sterling state world

    • Without a circle of friends -- such as the Well -- trying to get a handle on what's going on may be impossible for any individual who wishes to dis-inter-mediate from official channels -- except for trained researchers, journos, futurists, etc

Posted from Diigo. The rest of my favorite links are here.

Monday, January 6, 2014

daily-all 01/06/2014

    • There are basically four situations why people have affairs. (1) A person has a sex addiction. Are they willing to go to a 12-step program to deal with their addiction? (2) A person gets caught in a slippery situation, is under the influence of drugs or alcohol and they do something they never thought they would do. They usually have great remorse for what happened and vow never to put themselves in that type of situation again. (3) A person seeks revenge or pay back because their partner had an affair. (4) A person is hungry for attention or nurturing, so they connect with someone outside the relationship to fulfill their needs.
    • den Willen zur Sorge um andere

Posted from Diigo. The rest of my favorite links are here.

Sunday, January 5, 2014

daily-all 01/05/2014

  • pdf available

    tags: signals systems person:openheim

    • you’re trying to build a lab
    • Alliander are the specialists when it comes to complex private energy grids and installations.
    • Initially planned to be a Web application, the changing demands in the application's complexity meant that requirements in security and performance could no longer be met.
    • It is primarily designed to be easy to plug into applications to provide adaptive behaviors.
    • To access the information, a person must have the appropriate level of clearance and a need to know.
    • The possible impact must be great, immediate and irreparable.
    • the first director of the NATO Special Operations Forces Coordination Centre (NSCC), where he was charged with enhancing the capabilities and inter-operability of all NATO Special Operations Forces.
    • "We've asked (the command) to become virtual. In other words, we've said, we don't want you to be a standard ... command as you might see from the Napoleonic era. ...We asked them to look (into commercial) companies (to) see how they operate and minimize the headquarters. ... (Many of our units are) already located in the various states around the country, so our first inclination is to leave those in place."
      • distribution
    • options is this idea to operate as a virtual community for awhile.
    • Cyberspace
    • Electronic Warfare
    • Information Operations Center
    • Network Warfare
    • Part of the EC-130J aircraft's mission is to essentially provide an electronic shield around ground forces that deny the enemy the ability to use many of their technological assets against them. The EA-6B aircraft has the ability to jam hostile radar and communications.
  • tags: battle tactics ORBAT mil system

    • composition, but also of tactics and doctrines of the forces through their depiction in the orders of battle
    • fed German intelligence a combination of true and false information
    • deception plan
    • Order of battle belongs more to tactics than strategy.
    • no more than eight to ten subunits and subordinate corps four to six subunits
    • a likely order of battle for a planning document or operations order by assessing the following factors:
    • SUALE: Size, Unit, Activity, Location, Equipment)
    • DRAWD: Defend, Reinforce, Attack, Withdraw, Delay
    • Enemy's Most Likely Course of Action (EMLCOA)
    • behaviour, often based on communications intelligence analysis)
    • each unit should keep track of enemy subunits two echelons below its own
      • overload vector
    • intelligence capabilities in the 21st century have allowed for monitoring even further than two echelons down the chain of command
    • It is however imperative that the collector of information understands that what he collected is "Information", and does not become intelligence until after an analyst has evaluated and verified this information.
    • Collection of read materials, composition of units or elements, dipostion of the same, strength, training, tactics, personalities (leaders) of these units and elements contribute to the overall intelligence value after careful analysis.
      • reduced
    • The U.S. in particular is known to maintain satellites able to intercept cell-phone and pager traffic, usually referred to as the ECHELON system. Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents. In some extraordinary cases, undersea or land-based cables have been tapped, as well.
    • Analysis consists of assessment of an adversary's capabilities and vulnerabilities
    • Analysts generally look for the least defended or most fragile resource
  • tags: power inverter current electric

    • Use in power generation systems such as electric utility companies or solar generating systems to convert DC power to AC power.
    • The inverter must be synchronized with grid frequency and phase and minimize harmonic generation.
  • tags: current power electric

  • tags: electric power current

    • the same amount of power can be transmitted with a lower current by increasing the voltage
    • In practice, higher "pole orders" are commonly used. For example, a 12-pole machine would have 36 coils (10° spacing).
    • For example, a 2-pole machine running at 3600 rpm and a 12-pole machine running at 600 rpm produce the same frequency. This is much more practical for larger machines.
    • with a voltage of 55 V between each power conductor and earth.
    • This low impedance path allows the maximum amount of fault current, causing the overcurrent protection device (breakers, fuses) to trip or burn out as quickly as possible, bringing the electrical system to a safe state.
    • At very high frequencies the current no longer flows in the wire, but effectively flows on the surface of the wire, within a thickness of a few skin depths. The skin depth is the thickness at which the current density is reduced by 63%. Even at relatively low frequencies used for power transmission (50–60 Hz), non-uniform distribution of current still occurs in sufficiently thick conductors. For example, the skin depth of a copper conductor is approximately 8.57 mm at 60 Hz, so high current conductors are usually hollow to reduce their mass and cost.
    • Techniques for reducing AC resistance
  • tags: electric power distribution network networking electricity

  • "chniques to implement them. At this time, Staapl is only practical for the PIC18 architecture. While writing other ports should be straightforward, it is a lot of work. I have some code for the 12 and 14 bit PIC cores, and I’ve been looking into porting staapl to PIC24/30/33 (dsPIC). The main hurdle is writing a peephole optimizer for the new architecture, and a more general assembler/disassembler architecture."

    tags: architecture assembly forth staapl prog:lang:forth microprocessor

  • tags: linux architecture assembly

  • tags: assembly ebooks architecture

  • tags: architecture the_shard person:piano

    • ทีเล่นทีจริง

Posted from Diigo. The rest of my favorite links are here.

Saturday, January 4, 2014

daily-all 01/04/2014

Posted from Diigo. The rest of my favorite links are here.