Skip to main content

Home/ Digital Civilization/ Group items tagged control

Rss Feed Group items tagged

Brian Earley

Rene Descartes perceptions of philosophy - 0 views

  • As Descartes said, “Those who set about giving precepts must esteem themselves more skilful than those to whom they advance them”
  • In other words, someone might alter the truth solely so they could come up with something to say, while the real truth might not be capable of being expressed so easily, it can only be observed. Some things in life are too complicated to express, but however there are going to be people who believe they can express those things, even though they cannot accurately do so.
    • Brian Earley
       
      I have read scientific journals wherein the author reports on complex interactions or relationships on the molecular level. Often I believe that they really cannot accurately do so. Perhaps scientific journals would be better if they were accompanied by videos. That would make them more like blog posts.
  • ...16 more annotations...
  • are the emotions which are based off of your opinions even real, since they are based off of opinions?
  • Your perception is going to determine what it is that you feel, that is, your conscious and unconscious perception of what is going on is
  • For it seemed to me that I might meet with much more truth in the reasonings that each man makes on the matters that specially concern him, and the issue of which would very soon punish him if he made a wrong judgment, than in the case of those made by a man of letters in his study touching speculations that lead to no result, and that bring about no other consequences to himself excepting that he will be all the more vain the more they are removed from common sense, since in this case proves to him to have employed so much more ingenuity and skill trying to make them seem probable.
  • More especially did I reflect in each matter that came before me as to anything that could make it subject to suspicion of doubt, and give occasion for mistake, and I rooted out of my mind all the errors that might have formerly crept in. Not that indeed I imitated the skeptics, who only doubt for the sake of doubting, and pretend to by always uncertain; for, on the contrary, my design was only to provide myself with good ground for assurance, and to reject the quicksand and mud in order to find the rock or clay.”
  • since emotional intelligence is not completely concrete, it can be subject to skeptics
  • “how do I know that anything is even real”
  • Accordingly I shall now suppose, not that a true God, who as such must be supremely good and the fountain of truth, but that some malignant genius exceedingly powerful and cunning has devoted all his powers in the deceiving of me; I shall suppose that the sky, the earth, colors, shapes, sounds and all external things are illusions and impostures of which this evil genius has availed himself for the abuse of my credulity…”
  • I am, I exist. This is certain. How often? As often as I think. For it might indeed be that if I entirely ceased to think, I should thereupon altogether cease to exist. I am not at present admitting anything which is not necessarily true; and, accurately speaking, I am therefore [taking myself to be] only a thinking thing, that is to say, a mind, an understanding or reason-terms the significance of which has hitherto been unknown to me. I am, then a real thing, and really existent. What thing? I have said it, a thinking thing
  • So it really is thought that makes him who he is, since he is thinking about himself all of the time, in addition to thinking about and in regular life.
  • Thought determines who someone is because your thoughts are controlled, and all your thoughts over your lifetime caused your emotional development, which causes you to be who you are.
  • So it is easy to say that your thoughts understand and/or control who you are, but it is much harder to say that your emotions understand and/or control who you are.
  • I recognize it is impossible that He should ever deceive me, since in all fraud and deception there is some element of imperfection. The power of deception may indeed seem to be evidence of subtlety or power; yet unquestionably the will to deceive testifies to malice and feebleness, and accordingly cannot be found in God.
    • Brian Earley
       
      I think people in "The Matrix" would love Descartes
  • “To laugh often and much; To win the respect of intelligent people and the affection of children; To earn the appreciation of honest critics and endure the betrayal of false friends; To appreciate beauty, to find the best in others; To leave the world a bit better, whether by a healthy child, a garden patch, or a redeemed social condition; To know even one life has breathed easier because you have lived. This is to have succeeded”
  • conclusive as to whether or not pleasing other people infinitely is going to be self-beneficial, it could be considered a perfect thing to do since it is positively contributing to life.
    • Brian Earley
       
      The conclusion for me from this commentary is that thoughts are what make us who we are. Therefore, we must put a lot of our energy into controlling our thoughts so we can become what we want to be.
    • Brian Earley
       
      On my mission, I taught a lady that was offended to the point of tears when a member called the Prophet, the 'mouthpiece' of the Lord. She thought it as a very degrading term to call such a respectable man. Perceptions determine feelings.
  •  
    This commentary explains the unique observations that Rene Descartes made of observations. I feel like I have had similar thoughts at times. I feel comforted knowing a dead French guy thought the same way that I think.
Gideon Burton

I Heard You Like Feedback Loops | Oscillator, Scientific American Blog Network - 1 views

  •  
    A basic introduction to control theory and cybernetics (now applied to biology)
Katherine Chipman

Ethics and Law on the Electronic Frontier, Spring 2002 | OER Commons - 0 views

  • The interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. Topics include: intellectual property and copyright control, privacy and government surveillance, and freedom of expression and content control.
Greg Williams

Teaching in Social and Technological Networks « Connectivism - 0 views

  • What is the role of a teacher?
    • Greg Williams
       
      And what is the role of education? Hard to know what the teacher should be doing if we can't answer that
  • How can we achieve clear outcomes through distributed means? How can we achieve learning targets when the educator is no longer able to control the actions of learners?
  • control is being replaced with influence.
  • ...2 more annotations...
  • A curator is an expert learner.
  • they don’t adhere to traditional in-class teacher-centric power structures. A curator balances the freedom of individual learners with the thoughtful interpretation of the subject being explored.
Parker Woody

Boolean Data Type - 0 views

  • Most control structures use a test expression that executes either selection (as in the: if then else) or iteration (as in the while; do while; or for loops) based on the truthfulness or falseness of the expression. Thus, we often talk about the Boolean expression that is controlling the structure. Within many programming languages, this expression must be a Boolean expression and is governed by a tight set of rules. However, in C++ every data type can be used as a Boolean expression because the value of any data type within C++ can be demoted into a Boolean value.
Katherine Chipman

Alsos:The Atomic Age: Historical Overview - 0 views

  • scientists unraveled the structure of the atom, revealing the electron and proton. 
  • in 1938 fission of uranium atoms by neutrons was carried out in Germany. The energy associated with fission opened the possibility for powerful weapons and also the production of energy for civilian use.
  • The United Nations attempted to develop a policy for control of nuclear weapons, but the United States and the Soviet Union could not agree. This was but one component of the emerging Cold War between the two nations. Citizens of all nations saw the power of nuclear fission as massive threat as well as a source of useful energy for mankind.
  • ...2 more annotations...
  • In 1963 the Limited Nuclear Test Ban Treaty became the first agreement to control nuclear weapons.
  • The accidents at Three Mile Island in the United States (1979) and Chernobyl, in the Ukraine (1986) had adverse effects on the use of nuclear reactors for producing power
kosmik

Java course in Hyderabad - 0 views

  •  
    If you're looking to learn Java in Hyderabad, Kosmik Technologies is a great place to start. With a team of experienced trainers and state-of-the-art facilities, Kosmik offers a comprehensive Java course that covers all aspects of the programming language. The course starts with an introduction to Java, covering topics like data types, control structures, and arrays. From there, you'll learn about object-oriented programming concepts like classes, objects, inheritance, and polymorphism. You'll also cover more advanced topics like interfaces, collections, and exception handling. The course is designed to be hands-on, with plenty of practical exercises and real-world examples. You'll get to work on projects that simulate real-world scenarios, giving you the opportunity to apply your newfound skills in a practical setting. At Kosmik, the trainers are not only knowledgeable and experienced, but also passionate about teaching. They take the time to explain complex concepts in a way that is easy to understand, and are always available to answer your questions and provide guidance. Overall, if you're looking for a comprehensive Java course in Hyderabad, Kosmik Technologies is an excellent choice. With its experienced trainers, practical approach, and state-of-the-art facilities, you'll get the skills and knowledge you need to succeed in the world of Java programming.
Gideon Burton

Op-Ed Contributor - How the Internet Got Its Rules - NYTimes.com - 2 views

  • We thought maybe we’d put together a few temporary, informal memos on network protocols, the rules by which computers exchange information
  • Less important than the content of those first documents was that they were available free of charge and anyone could write one. Instead of authority-based decision-making, we relied on a process we called “rough consensus and running code.”
  • Still fearful of sounding presumptuous, I labeled the note a “Request for Comments.”
  • ...5 more annotations...
  • the R.F.C.’s themselves took root and flourished. They became the formal method of publishing Internet protocol standards
  • Our intent was only to encourage others to chime in, but I worried we might sound as though we were making official decisions or asserting authority.
  • It probably helped that in those days we avoided patents and other restrictions; without any financial incentive to control the protocols, it was much easier to reach agreement.
  • This was the ultimate in openness in technical design and that culture of open processes was essential in enabling the Internet to grow and evolve as spectacularly as it has
  • we always tried to design each new protocol to be both useful in its own right and a building block available to others. We did not think of protocols as finished products, and we deliberately exposed the internal architecture to make it easy for others to gain a foothold.
  •  
    Stephen D. Crocker explains the early planning documents ("Requests for Comments") and how they exemplified and made possible the open nature of the web.
Gideon Burton

Top Internet engineers warn against SOPA - Post Tech - The Washington Post - 0 views

  • When we designed the Internet the first time, our priorities were reliability, robustness and minimizing central points of failure or control. We are alarmed that Congress is so close to mandating censorship-compliance as a design requirement for new Internet innovations. This can only damage the security of the network, and give authoritarian governments more power over what their citizens can read and publish. The US government has regularly claimed that it supports a free and open Internet, both domestically and abroad. We cannot have a free and open Internet unless its naming and routing systems sit above the political concerns and objectives of any one government or industry. To date, the leading role the US has played in this infrastructure has been fairly uncontroversial because America is seen as a trustworthy arbiter and a neutral bastion of free expression. If the US begins to use its central position in the network for censorship that advances its political and economic agenda, the consequences will be far-reaching and destructive.
Mike Lemon

Calls for longer school years face budget reality - Yahoo! News - 0 views

    • Mike Lemon
       
      Is lengthening the school day or year the answer?
  • Education reformers have long called for U.S. kids to log more time in the classroom so they can catch up with their peers elsewhere in the world, but resistance from leisure-loving teenagers isn't the only reason there is no mass movement to keep schoolchildren in their seats. Such a change could cost cash-strapped state governments and local school districts billions of dollars, strip teachers of a time-honored perk of their profession, and irk officials in states that already bridle at federal intrusion into their traditional control over education.
  • Texas already forbids school from starting before the fourth Monday of August, a provision designed to save money on utility bills and increase business for tourist destinations and other summer attractions. "Ultimately the states, not the federal government, should have the final word on this and other public school decisions," said Lucy Nashed, a spokeswoman for Gov. Rick Perry. In Kansas, sporadic efforts by local districts to extend the school year at even a few schools have been met by parental resistance, said state education commissioner Diane DeBacker.
Katherine Chipman

Inventor Joseph Marie Jacquard - 0 views

  • Jacquard's loom mechanism is controlled by recorded patterns of holes in a string of cards, and allows, what is now known as, the Jacquard weaving of intricate patterns.
  •  
    This explains a little more about Jacquard's loom and its significance.
Daniel Zappala

A Logic Named Joe - 1 views

  • Say you punch "Station SNAFU" on your logic. Relays in the tank take over an' whatever vision-program SNAFU is telecastin' comes on your logic's screen. Or you punch "Sally Hancock's Phone" an' the screen blinks an' sputters an' you're hooked up with the logic in her house an' if somebody answers you got a vision-phone connection. But besides that, if you punch for the weather forecast or who won today's race at Hialeah or who was mistress of the White House durin' Garfield's administration or what is PDQ and R sellin' for today, that comes on the screen too.
    • Daniel Zappala
       
      Joe is Google
  • it made Joe a individual
    • Daniel Zappala
       
      Joe has machine intelligence.
  • But I think he went kinda remote-control exploring in the tank.
    • Daniel Zappala
       
      Joe is using data mining.
  • ...6 more annotations...
  • An' logics can do a Iotta things that ain't been found out yet.
    • Daniel Zappala
       
      In science fiction, machine intelligence launches us into the unknown -- computers might be able to do things that we can't conceive of ourselves!
  • In theory, a censor block is gonna come on an' the screen will say severely, "Public Policy Forbids This Service."
    • Daniel Zappala
       
      Joe disables content filtering services.
  • The screen says, "Service question: What is your name?" She is kinda puzzled, but she punches it. The screen sputters an' then says: "Secretarial Service Demonstration! You—" It reels off her name, address, age, sex, coloring, the amounts of all her charge accounts in all the stores, my name as her husband, how much I get a week, the fact that I've been pinched three times—twice was traffic stuff, and once for a argument I got in with a guy—and the interestin' item that once when she was mad with me she left me for three weeks an' had her address changed to her folks' home. Then it says, brisk: "Logics Service will hereafter keep your personal accounts, take messages, and locate persons you may wish to get in touch with. This demonstration is to introduce the service."
    • Daniel Zappala
       
      More echoes of Google -- privacy vs convenience
  • Then I sweat!
    • Daniel Zappala
       
      Social networking makes it easier to be unfaithful, causes tension in marriages.
  • Logics are civilization! If we shut off logics, we go back to a kind of civilization we have forgotten how to run!
  • That couldn't be allowed out general, of course. You gotta make room for kids to grow up. But it's a pretty good world, now Joe's turned off. Maybe I'll turn him on long enough to learn how to stay in it. But on the other hand, maybe—
    • Daniel Zappala
       
      Technology introduces new moral questions
Mike Lemon

The ENIAC Story - 1 views

  • As in many other first along the road of technological progress, the stimulus which initiated and sustained the effort that produced the ENIAC (electronic numerical integrator and computer)--the world's first electronic digital computer--was provided by the extraordinary demand of war
  • This Department had the responsibility for the design, development, procurement, storage, and issue of all combat materiel and munitions for the Army. In 1939 it was staffed by a relative handful of officers and career civilian employees.
  • One of the extraordinarily important tasks
  • ...7 more annotations...
  • was the preparation of firing and bombing tables for the Army which at that time, of course, included the Army Air Corps.
  • The analyzer installed at Aberdeen had ten integrating units and provisions for two input and two output tables as well. But, despite its value as an important mechanical aid to computation, it had several severe limitations.
  • It was, of course, known that the Moore School of Electrical Engineering of the University of Pennsylvania had a Bush differential analyzer of somewhat larger capacity than the one installed at Aberdeen. As a matter of fact, the one at the Moore School had fourteen integrating units. Therefore one of the first steps taken was the award to the University of Pennsylvania of a contract by the Ordnance Department for the utilization of this device.
  • he original agreement between the United States of America and the trustees of the University of Pennsylvania, dated June 5, 1943, called for six months of "research and development of an electronic numerical integrator and computer and delivery of a report thereon." This initial contract committed $61,700 in U.S. Army Ordnance funds
  • The ENIAC was placed in operation at the Moore School, component by component, beginning with the cycling unit and an accumulator in June 1944. This was followed in rapid succession by the initiating unit and function tables in September 1945 and the divider and square-root unit in October 1945. Final assembly took place during the fall of 1945. By today's standards for electronic computers the ENIAC was a grotesque monster. Its thirty separate units, plus power supply and forced-air cooling, weighed over thirty tons. Its 19,000 vacuum tubes, 1,500 relays, and hundreds of thousands of resistors, capacitors, and inductors consumed almost 200 kilowatts of electrical power. But ENIAC was the prototype from which most other modern computers evolved. It embodied almost all the components and concepts of today's high- speed, electronic digital computers. Its designers conceived what has now become standard circuitry such as the gate (logical "and" element), buffer (logical "or" element) and used a modified Eccles-Jordan flip-flop as a logical, high-speed storage-and-control device.
  • The ENIAC was not originally designed as an internally programmed computer. The program was set up manually by varying switches and cable connections. However, means for altering the program and repeating its iterative steps were built into the master programmer
  • The ENIAC led the computer field during the period 1949 through 1952 when it served as the main computation workhorse for the solution of the scientific problems of the Nation. It surpassed all other existing computers put together whenever it came to problems involving a large number of arithmetic operations. It was the major instrument for the computation of all ballistic tables for the U.S. Army and Air Force.
Katherine Chipman

Take Cover: Living Under a Mushroom Cloud, a collection at the Museum at the Wisconsin ... - 0 views

  • By the late 1950s, officials of the Eisenhower administration, after having seen the results of numerous atomic bomb tests, had a fairly realistic idea of how difficult it would be to survive a nuclear bomb blast. They continued, however, to disseminate somewhat dubious survival information, primarily to give the American public a sense of hope and control over their own lives. They also believed that a public confident of surviving an atomic war would support the federal government's decision to increase its own atomic arsenal, even though its existence could provoke a nuclear war with the Soviet Union.
Katherine Chipman

WGBH American Experience . The Trials of J. Robert Oppenheimer . Then & Now | PBS - 1 views

  • Today, the world is attempting to control nuclear proliferation through diplomacy and treaties. In 1996, the Comprehensive Test Ban Treaty prohibited nations from using bombs for either military or research purposes. Forty-one states with nuclear capabilities have signed the treaty, but it cannot take effect until three more nations join. India, Pakistan, and North Korea are among the countries that have refused. Although the United States has signed the treaty, it has not ratified it yet.
David Potter

Amazon decides Kindle speech isn't worth copyright fight - 0 views

  •  
    The only significant change to the experimental section in the Kindle 2 was the addition of a text-to-speech capability that allowed the Kindle to read content to its users in one of two synthesized voices. Following an extended outcry from some in the publishing business, however, Amazon has backed down and will allow publishers to retain control over whether to expose their texts to this capability
1 - 18 of 18
Showing 20 items per page