Skip to main content

Home/ Groups/ TOK Friends
Javier E

Gen Z Never Learned to Read Cursive - The Atlantic - 0 views

  • Who else can’t read cursive? I asked the class. The answer: about two-thirds. And who can’t write it? Even more. What did they do about signatures? They had invented them by combining vestiges of whatever cursive instruction they may have had with creative squiggles and flourishes.
  • Most of my students remembered getting no more than a year or so of somewhat desultory cursive training, which was often pushed aside by a growing emphasis on “teaching to the test.” Now in college, they represent the vanguard of a cursiveless world.
  • the decline in cursive seems inevitable. Writing is, after all, a technology, and most technologies are sooner or later surpassed and replaced.
  • ...15 more annotations...
  • As Tamara Plakins Thornton demonstrates in her book Handwriting in America, it has always been affected by changing social and cultural forces. In 18th-century America, writing was the domain of the privileged.
  • By law or custom, the enslaved were prohibited from literacy almost everywhere
  • The notion of a signature as a unique representation of a particular individual gradually came to be enshrined in the law and accepted as legitimate legal evidence.
  • Writing, though, was much less widespread—taught separately and sparingly in colonial America, most often to men of status and responsibility and to women of the upper classes. Men and women even learned different scripts—an ornamental hand for ladies, and an unadorned, more functional form for the male world of power and commerce.
  • increase in the number of women able to write. By 1860, more than 90 percent of the white population in America could both read and write.
  • Penmanship came to be seen as a marker and expression of the self—of gender and class, to be sure, but also of deeper elements of character and soul.
  • n New England, nearly all men and women could read; in the South, which had not developed an equivalent system of common schools, a far lower percentage of even the white population could do so
  • No, most of these history students admitted, they could not read manuscripts. If they were assigned a research paper, they sought subjects that relied only on published sources.
  • Didn’t professors make handwritten comments on their papers and exams? Many of the students found these illegible. Sometimes they would ask a teacher to decipher the comments; more often they just ignored them.
  • I wondered how many of my colleagues have been dutifully offering handwritten observations without any clue that they would never be read.
  • I asked the students if they made grocery lists, kept journals, or wrote thank-you or condolence letters. Almost all said yes. Almost all said they did so on laptops and phones or sometimes on paper in block letters
  • “There is something charming about receiving a handwritten note,” one student acknowledged. Did he mean charming like an antique curiosity? Charming in the sense of magical in its capacity to create physical connections between human minds? Charming as in establishing an aura of the original, the unique, and the authentic? Perhaps all of these
  • there are dangers in cursive’s loss. Students will miss the excitement and inspiration that I have seen them experience as they interact with the physical embodiment of thoughts and ideas voiced by a person long since silenced by death. Handwriting can make the past seem almost alive in the present.
  • All of us, not just students and scholars, will be affected by cursive’s loss. The inability to read handwriting deprives society of direct access to its own past. We will become reliant on a small group of trained translators and experts to report what history—including the documents and papers of our own families—was about.
  • The spread of literacy in the early modern West was driven by people’s desire to read God’s word for themselves, to be empowered by an experience of unmediated connection. The abandonment of cursive represents a curious reverse parallel: We are losing a connection, and thereby disempowering ourselves.
Javier E

How Kevins Got a Bad Rap in France | The New Yorker - 0 views

  • Traditionally, the bourgeoisie dictated the fashions for names, which then percolated down the social scale to the middle and working classes. By looking out, rather than up, for inspiration, the parents of Kevins—along with Brandons, Ryans, Jordans, and other pop-culture-inspired names that took off in France in the nineteen-nineties—asserted the legitimacy of their tastes and their unwillingness to continue taking cues from their supposed superiors
  • I asked Coulmont if he could think of any other first name that provoked such strong feelings. “The name Mohamed, perhaps,” he replied. “But Kevin triggers reactions from people who reject the cultural autonomy of the popular classes, while Mohamed triggers the reactions of xenophobes.”
  • Kévin Fafournoux received some three hundred messages from Kevins around the country, testifying to their ordeals. Some told of being shunned after introducing themselves at bars, or zapped on dating apps as soon as their names popped up. One Kevin, a psychologist, said that he had agonized about whether to put his full name on the plaque outside his office building. “We find people who have a sense of malaise and who have real problems,” Fafournoux said. Coulmont found that students named Kevin perform proportionally worse on the baccalaureate exam, not because of a stigma surrounding the name but because Kevins tend to be, as he put it, of a “lower social origin.”
  • ...2 more annotations...
  • a watchdog group, claimed that a candidate named Kevin had a ten to thirty per cent lower chance of being hired for a job than a competitor named Arthur.
  • Kevins also have a hard time in such countries as Germany, where the practice of name discrimination is referred to as “Kevinismus,” and an app that purports to help parents avoid it is called the Kevinometer.
Javier E

Opinion | The Book That Explains Our Cultural Stagnation - The New York Times - 0 views

  • The best explanation I’ve read for our current cultural malaise comes at the end of W. David Marx’s forthcoming “Status and Culture: How Our Desire for Social Rank Creates Taste, Identity, Art, Fashion, and Constant Change,” a book that is not at all boring and that subtly altered how I see the world.
  • Marx posits cultural evolution as a sort of perpetual motion machine driven by people’s desire to ascend the social hierarchy. Artists innovate to gain status, and people unconsciously adjust their tastes to either signal their status tier or move up to a new one.
  • “Status struggles fuel cultural creativity in three important realms: competition between socioeconomic classes, the formation of subcultures and countercultures, and artists’ internecine battles.”
  • ...8 more annotations...
  • avant-garde composer John Cage. When Cage presented his discordant orchestral piece “Atlas Eclipticalis” at Lincoln Center in 1964, many patrons walked out. Members of the orchestra hissed at Cage when he took his bow; a few even smashed his electronic equipment. But Cage’s work inspired other artists, leading “historians and museum curators to embrace him as a crucial figure in the development of postmodern art,” which in turn led audiences to pay respectful attention to his work
  • “There was a virtuous cycle for Cage: His originality, mystery and influence provided him artist status; this encouraged serious institutions to explore his work; the frequent engagement with his work imbued Cage with cachet among the public, who then received a status boost for taking his work seriously,” writes Marx.
  • The internet, Marx writes in his book’s closing section, changes this dynamic. With so much content out there, the chance that others will recognize the meaning of any obscure cultural signal declines
  • in the age of the internet, taste tells you less about a person. You don’t need to make your way into any social world to develop a familiarity with Cage — or, for that matter, with underground hip-hop, weird performance art, or rare sneakers.
  • people are, obviously, no less obsessed with their own status today than they were during times of fecund cultural production.
  • the markers of high social rank have become more philistine. When the value of cultural capital is debased, writes Marx, it makes “popularity and economic capital even more central in marking status.”
  • there’s “less incentive for individuals to both create and celebrate culture with high symbolic complexity.”
  • It makes more sense for a parvenu to fake a ride on a private jet than to fake an interest in contemporary art. We live in a time of rapid and disorientating shifts in gender, religion and technology. Aesthetically, thanks to the internet, it’s all quite dull.
Javier E

Some on the Left Turn Against the Label 'Progressive' - The New York Times - 0 views

  • Christopher Lasch, the historian and social critic, posed a banger of a question in his 1991 book, “The True and Only Heaven: Progress and Its Critics.”
  • “How does it happen,” Lasch asked, “that serious people continue to believe in progress, in the face of massive evidence that might have been expected to refute the idea of progress once and for all?”
  • A review in The New York Times Book Review by William Julius Wilson, a professor at Harvard, was titled: “Where Has Progress Got Us?”
  • ...17 more annotations...
  • Essentially, Lasch was attacking the notion, fashionable as Americans basked in their seeming victory over the Soviet Union in the Cold War, that history had a direction — and that one would be wise to stay on the “right side” of it.
  • Francis Fukuyama expressed a version of this triumphalist idea in his famous 1992 book, “The End of History and the Last Man,” in which he celebrated the notion that History with a capital “H,” in the sense of a battle between competing ideas, was ending with communism left to smolder on Ronald Reagan’s famous ash heap.
  • One of Martin Luther King Jr.’s most frequently quoted lines speaks to a similar thought, albeit in a different context: “T​he arc of the moral universe is long, but it bends toward justice.” Though he had read Lasch, Obama quoted that line often, just as he liked to say that so-and-so would be “on the wrong side of history” if they didn’t live up to his ideals — whether the issue was same-sex marriage, health policy or the Russian occupation of Crimea.
  • The memo goes on to list two sets of words: “Optimistic Positive Governing Words” and “Contrasting Words,” which carried negative connotations. One of the latter group was the word “liberal,” sandwiched between “intolerant” and “lie.”
  • So what’s the difference between a progressive and a liberal?To vastly oversimplify matters, liberal usually refers to someone on the center-left on a two-dimensional political spectrum, while progressive refers to someone further left.
  • But “liberal” has taken a beating in recent decades — from both left and right.
  • In the late 1980s and 1990s, Republicans successfully demonized the word “liberal,” to the point where many Democrats shied away from it in favor of labels like “conservative Democrat” or, more recently, “progressive.”
  • “Is the story of the 20th century about the defeat of the Soviet Union, or was it about two world wars and a Holocaust?” asked Matthew Sitman, the co-host of the “Know Your Enemy” podcast, which recently hosted a discussion on Lasch and the fascination many conservatives have with his ideas. “It really depends on how you look at it.”
  • None of this was an accident. In 1996, Representative Newt Gingrich of Georgia circulated a now-famous memo called “Language: A Key Mechanism of Control.”
  • The authors urged their readers: “The words and phrases are powerful. Read them. Memorize as many as possible.”
  • Republicans subsequently had a great deal of success in associating the term “liberal” with other words and phrases voters found uncongenial: wasteful spending, high rates of taxation and libertinism that repelled socially conservative voters.
  • Many on the left began identifying themselves as “progressive” — which had the added benefit of harking back to movements of the late 19th and early 20th centuries that fought against corruption, opposed corporate monopolies, pushed for good-government reforms and food safety and labor laws and established women’s right to vote.
  • Allies of Bill Clinton founded the Progressive Policy Institute, a think tank associated with so-called Blue Dog Democrats from the South.
  • Now, scrambling the terminology, groups like the Progressive Change Campaign Committee agitate on behalf of proudly left-wing candidates
  • In 2014, Charles Murray, the polarizing conservative scholar, urged readers of The Wall Street Journal’s staunchly right-wing editorial section to “start using ‘liberal’ to designate the good guys on the left, reserving ‘progressive’ for those who are enthusiastic about an unrestrained regulatory state.”
  • As Sanders and acolytes like Representative Alexandria Ocasio-Cortez of New York have gained prominence over the last few election cycles, many on the left-wing end of the spectrum have begun proudly applying other labels to themselves, such as “democratic socialist.”
  • To little avail so far, Kazin, the Georgetown historian, has been urging them to call themselves “social democrats” instead — as many mainstream parties do in Europe.“It’s not a good way to win elections in this country, to call yourself a socialist,” he said.
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

Why the very concept of 'general knowledge' is under attack | Times2 | The Times - 0 views

  • why has University Challenge lasted, virtually unchanged, for so long?
  • The answer may lie in a famous theory about our brains put forward by the psychologist Raymond Cattell in 1963
  • Cattell divided intelligence into two categories: fluid and crystallised. Fluid intelligence refers to basic reasoning and other mental activities that require minimal learning — just an alert and flexible brain.
  • ...12 more annotations...
  • By contrast, crystallised intelligence is based on experience and the accumulation of knowledge. Fluid intelligence peaks at the age of about 20 then gradually declines, whereas crystallised intelligence grows through your life until you hit your mid-sixties, when you start forgetting things.
  • that explains much about University Challenge’s appeal. Because the contestants are mostly aged around 20 and very clever, their fluid intelligence is off the scale
  • On the other hand, because they have had only 20 years to acquire crystallised intelligence, their store of general knowledge is likely to be lacking in some areas.
  • In each episode there will be questions that older viewers can answer, thanks to their greater store of crystallised intelligence, but the students cannot. Therefore we viewers don’t feel inferior when confronted by these smart young people. On the contrary: we feel, in some areas, slightly superior.
  • there is a real threat to the future of University Challenge and much else of value in our society, and it is this. The very concept of “general knowledge” — of a widely accepted core of information that educated, inquisitive people should have in their memory banks — is under attack from two different groups.
  • It’s a brilliantly balanced format
  • They argue that all knowledge is contextual and that things taken for granted in the past — for instance, a canon of great authors that everyone should read at school — merely reflect an outdated, usually Eurocentric view of what’s intellectually important.
  • The first comprises the deconstructionists and decolonialists
  • The other group is the technocrats who argue that the extent of human knowledge is now so vast that it’s impossible for any individual to know more than, perhaps, one billionth of it
  • So why not leave it entirely to computers to do the heavy lifting of knowledge storing and recall, thus freeing our minds for creativity and problem solving?
  • The problem with the agitators on both sides of today’s culture wars is that they are forcefully trying to shape what’s accepted as general knowledge according to a blatant political agenda.
  • And the problem with relying on, say, Wikipedia’s 6.5 million English-language articles to store general knowledge for all of us? It’s the tacit implication that “mere facts” are too tedious to be clogging up our brains. From there it’s a short step to saying that facts don’t matter at all, that everything should be decided by “feelings”. And from there it’s an even shorter step to fake news and pernicious conspiracy theories, the belittling of experts and hard evidence, the closing of minds, the thickening of prejudice and the trivialisation of the national conversation.
Javier E

The herd mentality is all around us - 0 views

  • “Personal space” and the idea of being left alone with one’s thoughts can almost be seen as modern add-ons to what humanity is like, and perhaps more typical of WEIRD (Western, educated, industrialized, rich and democratic) societies than others
  • WEIRD-ness being the coinage of Joseph Henrich, an anthropologist at Harvard and the author of “The WEIRDest People in the World: How the West Became Psychologically Peculiar and Particularly Prosperous.” Reviewing the book for The Times, the Tufts University philosophy professor Daniel Dennett described Henrich’s concept thusly:The world today has billions of inhabitants who have minds strikingly different from ours. Roughly, we weirdos are individualistic, think analytically, believe in free will, take personal responsibility, feel guilt when we misbehave and think nepotism is to be vigorously discouraged, if not outlawed.
  • They (the non-WEIRD majority) identify more strongly with family, tribe, clan and ethnic group, think more “holistically,” take responsibility for what their group does (and publicly punish those who besmirch the group’s honor), feel shame — not guilt — when they misbehave and think nepotism is a natural duty.
  • ...7 more annotations...
  • There are signs that at the same time, so many other people are seeking to countenance diversity of thought, disavowing the comforts of the idea that their view is the only legitimate one and fostering an ideal under which our society frames difference of opinion as a norm rather than a threat. We can see it in aspects of linguistic behavio
  • To us WEIRD-os, by contrast, the ever-stronger purchase of individualism in our intellectual, moral and civic development seems natural. But it’s challenging, perhaps unnatural, to be an individual.
  • That realization makes less shocking to me, albeit utterly dismaying, the many dogmatic behaviors exhibited today that seem outwardly irrational or close to it. The kinds of things that make it seem as if so many of us are, so to speak, losing it are actually signs of how difficult it can be to get past what we seem to be hard-wired for. Fanatic beliefs, furious ideologies and even, potentially, a sense of duty to harm people in the name of certain beliefs reflect the eternal temptation of a sense of belonging to a group, of being part of a larger story, of having a guiding sense of purpose.
  • Casual American English, in ways we’re not always conscious of, is more overt in allowing room for disagreement than it used to be. For example, the use of “like” that so bothers purists is in reality a useful discursive hedge, along with phrases such as “sort of,” “kind of” and “you know.” In conversation, these expressions can be read as subtle indications that someone knows that there are other ways to view things, and to be too categorical is to imply a certainty that all may not share.
  • Moral Courage College, an alternative to the D.E.I. ritual, a program offering training in how to productively grapple with the wide range of views and experiences found in most workplaces, as well as colleges, universities and even K-12 schools
  • a method called Diversity Without Division. “This program doesn’t tell anybody what to think or believe,” she has said, “it teaches everybody to lower their emotional defenses so that contentious issues can be turned into constructive conversations and healthy teamwork.”
  • Courage is allowing that your own view may be but one legitimate one among many, that there are no easy answers, and that being your own self is a more gracious existence than joining a herd.
Javier E

Lawsuit Against Fox Is Shaping Up to Be a Major First Amendment Case - The New York Times - 0 views

  • The case threatens a huge financial and reputational blow to Fox, by far the most powerful conservative media company in the country. But legal scholars say it also has the potential to deliver a powerful verdict on the kind of pervasive and pernicious falsehoods — and the people who spread them — that are undermining the country’s faith in democracy.
  • “We’re litigating history in a way: What is historical truth?” said Lee Levine, a noted First Amendment lawyer
  • “Here you’re taking very recent current events and going through a process which, at the end, is potentially going to declare what the correct version of history is.”
  • ...10 more annotations...
  • The case has caused palpable unease at the Fox News Channel, said several people there,
  • Dominion is trying to build a case that aims straight at the top of the Fox media empire and the Murdochs. In court filings and depositions, Dominion lawyers have laid out how they plan to show that senior Fox executives hatched a plan after the election to lure back viewers who had switched to rival hard-right networks, which were initially more sympathetic than Fox was to Mr. Trump’s voter-fraud claims.
  • Libel law doesn’t protect lies. But it does leave room for the media to cover newsworthy figures who tell them. And Fox is arguing, in part, that’s what shields it from liability.
  • “The harm to Dominion from the lies told by Fox is unprecedented and irreparable because of how fervently millions of people believed them — and continue to believe them,”
  • For Dominion to convince a jury that Fox should be held liable for defamation and pay damages, it has to clear an extremely high legal bar known as the “actual malice” standard. Dominion must show either that people inside Fox knew what hosts and guests were saying about the election technology company was false, or that they effectively ignored information proving that the statements in question were wrong — which is known in legal terms as displaying a reckless disregard for the truth.
  • Dominion’s lawyers have focused some of their questioning in depositions on the decision-making hierarchy at Fox News, according to one person with direct knowledge of the case, showing a particular interest in what happened on election night inside the network in the hours after it projected Mr. Trump would lose Arizona.
  • Fox has also been searching for evidence that could, in effect, prove the Dominion conspiracy theories weren’t really conspiracy theories. Behind the scenes, Fox’s lawyers have pursued documents that would support numerous unfounded claims about Dominion, including its supposed connections to Hugo Chávez, the Venezuelan dictator who died in 2013, and software features that were ostensibly designed to make vote manipulation easier.
  • In one interview, Mr. Giuliani falsely claimed that Dominion was owned by a Venezuelan company with close ties to Mr. Chavez, and that it was formed “to fix elections.” (Dominion was founded in Canada in 2002 by a man who wanted to make it easier for blind people to vote.)
  • A spokesman for Dominion declined to comment. In its initial complaint, the company’s lawyers wrote that “The truth matters,” adding, “Lies have consequences.”
  • he hurdle Dominion must clear is whether it can persuade a jury to believe that people at Fox knew they were spreading lies.“Disseminating ‘The Big Lie’ isn’t enough,” said RonNell Andersen Jones, a law professor and First Amendment scholar at the University of Utah’s S.J. Quinney College of Law. “It has to be a knowing lie.”
Javier E

Why The CHIPS and Science Act Is a Climate Bill - The Atlantic - 0 views

  • Over the next five years, the CHIPS Act will direct an estimated $67 billion, or roughly a quarter of its total funding, toward accelerating the growth of zero-carbon industries and conducting climate-relevant research, according to an analysis from RMI, a nonpartisan energy think tank based in Colorado.
  • That means that the CHIPS Act is one of the largest climate bills ever passed by Congress. It exceeds the total amount of money that the government spent on renewable-energy tax credits from 2005 to 2019
  • And it’s more than half the size of the climate spending in President Barack Obama’s 2009 stimulus bill. That’s all the more remarkable because the CHIPS Act was passed by large bipartisan majorities, with 41 Republicans and nearly all Democrats supporting it in the House and the Senate.
  • ...15 more annotations...
  • The law, for instance, establishes a new $20 billion Directorate for Technology, which will specialize in pushing new technologies from the prototype stage into the mass market. It is meant to prevent what happened with the solar industry—where America invented a new technology, only to lose out on commercializing it—from happening again
  • Within a few years, when the funding has fully ramped up, the government will spend roughly $80 billion a year on accelerating the development and deployment of zero-carbon energy and preparing for the impacts of climate change. That exceeds the GDP of about 120 of the 192 countries that have signed the Paris Agreement on Climate Change
  • By the end of the decade, the federal government will have spent more than $521 billion
  • the bill’s programs focus on the bleeding edge of the decarbonization problem, investing money in technology that should lower emissions in the 2030s and beyond.
  • The International Energy Association has estimated that almost half of global emissions reductions by 2050 will come from technologies that exist only as prototypes or demonstration projects today.
  • To get those technologies ready in time, we need to deploy those new ideas as fast as we can, then rapidly get them to commercial scale, Carey said. “What used to take two decades now needs to take six to 10 years.” That’s what the CHIPS Act is supposed to do
  • When viewed with the Inflation Reduction Act, which the House is poised to pass later this week, and last year’s bipartisan infrastructure law, a major shift in congressional climate spending comes into focus. According to the RMI analysis, these three laws are set to more than triple the federal government’s average annual spending on climate and clean energy this decade, compared with the 2010s.
  • Congress has explicitly tasked the new office with studying “natural and anthropogenic disaster prevention or mitigation” as well as “advanced energy and industrial efficiency technologies,” including next-generation nuclear reactors.
  • The bill also directs about $12 billion in new research, development, and demonstration funding to the Department of Energy, according to RMI’s estimate. That includes doubling the budget for ARPA-E, the department’s advanced-energy-projects skunk works.
  • it allocates billions to upgrade facilities at the government’s in-house defense and energy research institutes, including the National Renewable Energy Laboratory, the Princeton Plasma Physics Laboratory, and Berkeley Lab, which conducts environmental-science research.
  • RMI’s estimate of the climate spending in the CHIPS bill should be understood as just that: an estimate. The bill text rarely specifies how much of its new funding should go to climate issues.
  • When you add CHIPS, the IRA, and the infrastructure law together, Washington appears to be unifying behind a new industrial policy, focused not only on semiconductors and defense technology but clean energy
  • The three bills combine to form a “a coordinated, strategic policy for accelerating the transition to the technologies that are going to define the 21st century,”
  • scholars and experts have speculated about whether industrial policy—the intentional use of law to nurture and grow certain industries—might make a comeback to help fight climate change. Industrial policy was central to some of the Green New Deal’s original pitch, and it has helped China develop a commanding lead in the global solar industry.
  • “Industrial policy,” he said, “is back.”
Javier E

Why Rotterdam Wouldn't Allow a Bridge to Be Dismantled for Bezos' Yacht - The New York ... - 0 views

  • explaining the anger that Mr. Bezos and Oceanco, the maker of the three-masted, $500 million schooner, inspired after making what may have sounded like a fairly benign request. The company asked the local government to briefly dismantle the elevated middle span of the Hef, which is 230 feet tall at its highest point, allowing the vessel to sail down the King’s Harbor channel and out to sea.
  • The whole process would have taken a day or two and Oceanco would have covered the costs.AdvertisementContinue reading the main story
  • The bridge, a lattice of moss-green steel in the shape of a hulking “H,” is not actually used by anyone. It served as a railroad bridge for decades until it was replaced by a tunnel and decommissioned in the early 1990s. It’s been idle ever since.
  • ...5 more annotations...
  • In sum, the operation would have been fast, free and disrupted nothing. So why the fuss?
  • “What can you buy if you have unlimited cash? Can you bend every rule? Can you take apart monuments?”
  • “There’s a principle at stake,”
  • The first problem was the astounding wealth of Mr. Bezos.
  • “The Dutch like to say, ‘Acting normal is crazy enough,’
Javier E

Why it's as hard to escape an echo chamber as it is to flee a cult | Aeon Essays - 0 views

  • there are two very different phenomena at play here, each of which subvert the flow of information in very distinct ways. Let’s call them echo chambers and epistemic bubbles. Both are social structures that systematically exclude sources of information. Both exaggerate their members’ confidence in their beliefs.
  • they work in entirely different ways, and they require very different modes of intervention
  • An epistemic bubble is when you don’t hear people from the other side. An echo chamber is what happens when you don’t trust people from the other side.
  • ...90 more annotations...
  • start with epistemic bubbles
  • That omission might be purposeful
  • But that omission can also be entirely inadvertent. Even if we’re not actively trying to avoid disagreement, our Facebook friends tend to share our views and interests
  • An ‘echo chamber’ is a social structure from which other relevant voices have been actively discredited. Where an epistemic bubble merely omits contrary views, an echo chamber brings its members to actively distrust outsiders.
  • an echo chamber is something like a cult. A cult isolates its members by actively alienating them from any outside sources. Those outside are actively labelled as malignant and untrustworthy.
  • In epistemic bubbles, other voices are not heard; in echo chambers, other voices are actively undermined.
  • The way to break an echo chamber is not to wave “the facts” in the faces of its members. It is to attack the echo chamber at its root and repair that broken trust.
  • Looking to others for corroboration is a basic method for checking whether one has reasoned well or badly
  • They have been in the limelight lately, most famously in Eli Pariser’s The Filter Bubble (2011) and Cass Sunstein’s #Republic: Divided Democracy in the Age of Social Media (2017).
  • The general gist: we get much of our news from Facebook feeds and similar sorts of social media. Our Facebook feed consists mostly of our friends and colleagues, the majority of whom share our own political and cultural views
  • various algorithms behind the scenes, such as those inside Google search, invisibly personalise our searches, making it more likely that we’ll see only what we want to see. These processes all impose filters on information.
  • Such filters aren’t necessarily bad. The world is overstuffed with information, and one can’t sort through it all by oneself: filters need to be outsourced.
  • That’s why we all depend on extended social networks to deliver us knowledge
  • any such informational network needs the right sort of broadness and variety to work
  • Each individual person in my network might be superbly reliable about her particular informational patch but, as an aggregate structure, my network lacks what Sanford Goldberg in his book Relying on Others (2010) calls ‘coverage-reliability’. It doesn’t deliver to me a sufficiently broad and representative coverage of all the relevant information.
  • Epistemic bubbles also threaten us with a second danger: excessive self-confidence.
  • An ‘epistemic bubble’ is an informational network from which relevant voices have been excluded by omission
  • Suppose that I believe that the Paleo diet is the greatest diet of all time. I assemble a Facebook group called ‘Great Health Facts!’ and fill it only with people who already believe that Paleo is the best diet. The fact that everybody in that group agrees with me about Paleo shouldn’t increase my confidence level one bit. They’re not mere copies – they actually might have reached their conclusions independently – but their agreement can be entirely explained by my method of selection.
  • Luckily, though, epistemic bubbles are easily shattered. We can pop an epistemic bubble simply by exposing its members to the information and arguments that they’ve missed.
  • echo chambers are a far more pernicious and robust phenomenon.
  • amieson and Cappella’s book is the first empirical study into how echo chambers function
  • echo chambers work by systematically alienating their members from all outside epistemic sources.
  • Their research centres on Rush Limbaugh, a wildly successful conservative firebrand in the United States, along with Fox News and related media
  • His constant attacks on the ‘mainstream media’ are attempts to discredit all other sources of knowledge. He systematically undermines the integrity of anybody who expresses any kind of contrary view.
  • outsiders are not simply mistaken – they are malicious, manipulative and actively working to destroy Limbaugh and his followers. The resulting worldview is one of deeply opposed force, an all-or-nothing war between good and evil
  • The result is a rather striking parallel to the techniques of emotional isolation typically practised in cult indoctrination
  • cult indoctrination involves new cult members being brought to distrust all non-cult members. This provides a social buffer against any attempts to extract the indoctrinated person from the cult.
  • The echo chamber doesn’t need any bad connectivity to function. Limbaugh’s followers have full access to outside sources of information
  • As Elijah Millgram argues in The Great Endarkenment (2015), modern knowledge depends on trusting long chains of experts. And no single person is in the position to check up on the reliability of every member of that chain
  • Their worldview can survive exposure to those outside voices because their belief system has prepared them for such intellectual onslaught.
  • exposure to contrary views could actually reinforce their views. Limbaugh might offer his followers a conspiracy theory: anybody who criticises him is doing it at the behest of a secret cabal of evil elites, which has already seized control of the mainstream media.
  • Perversely, exposure to outsiders with contrary views can thus increase echo-chamber members’ confidence in their insider sources, and hence their attachment to their worldview.
  • ‘evidential pre-emption’. What’s happening is a kind of intellectual judo, in which the power and enthusiasm of contrary voices are turned against those contrary voices through a carefully rigged internal structure of belief.
  • One might be tempted to think that the solution is just more intellectual autonomy. Echo chambers arise because we trust others too much, so the solution is to start thinking for ourselves.
  • that kind of radical intellectual autonomy is a pipe dream. If the philosophical study of knowledge has taught us anything in the past half-century, it is that we are irredeemably dependent on each other in almost every domain of knowledge
  • Limbaugh’s followers regularly read – but do not accept – mainstream and liberal news sources. They are isolated, not by selective exposure, but by changes in who they accept as authorities, experts and trusted sources.
  • we depend on a vastly complicated social structure of trust. We must trust each other, but, as the philosopher Annette Baier says, that trust makes us vulnerable. Echo chambers operate as a kind of social parasite on that vulnerability, taking advantage of our epistemic condition and social dependency.
  • I am quite confident that there are plenty of echo chambers on the political Left. More importantly, nothing about echo chambers restricts them to the arena of politics
  • The world of anti-vaccination is clearly an echo chamber, and it is one that crosses political lines. I’ve also encountered echo chambers on topics as broad as diet (Paleo!), exercise technique (CrossFit!), breastfeeding, some academic intellectual traditions, and many, many more
  • Here’s a basic check: does a community’s belief system actively undermine the trustworthiness of any outsiders who don’t subscribe to its central dogmas? Then it’s probably an echo chamber.
  • much of the recent analysis has lumped epistemic bubbles together with echo chambers into a single, unified phenomenon. But it is absolutely crucial to distinguish between the two.
  • Epistemic bubbles are rather ramshackle; they go up easily, and they collapse easily
  • Echo chambers are far more pernicious and far more robust. They can start to seem almost like living things. Their belief systems provide structural integrity, resilience and active responses to outside attacks
  • the two phenomena can also exist independently. And of the events we’re most worried about, it’s the echo-chamber effects that are really causing most of the trouble.
  • new data does, in fact, seem to show that people on Facebook actually do see posts from the other side, or that people often visit websites with opposite political affiliation.
  • their basis for evaluation – their background beliefs about whom to trust – are radically different. They are not irrational, but systematically misinformed about where to place their trust.
  • Many people have claimed that we have entered an era of ‘post-truth’.
  • Not only do some political figures seem to speak with a blatant disregard for the facts, but their supporters seem utterly unswayed by evidence. It seems, to some, that truth no longer matters.
  • This is an explanation in terms of total irrationality. To accept it, you must believe that a great number of people have lost all interest in evidence or investigation, and have fallen away from the ways of reason.
  • echo chambers offers a less damning and far more modest explanation. The apparent ‘post-truth’ attitude can be explained as the result of the manipulations of trust wrought by echo chambers.
  • We don’t have to attribute a complete disinterest in facts, evidence or reason to explain the post-truth attitude. We simply have to attribute to certain communities a vastly divergent set of trusted authorities.
  • An echo chamber doesn’t destroy their members’ interest in the truth; it merely manipulates whom they trust and changes whom they accept as trustworthy sources and institutions.
  • in many ways, echo-chamber members are following reasonable and rational procedures of enquiry. They’re engaging in critical reasoning. They’re questioning, they’re evaluating sources for themselves, they’re assessing different pathways to information. They are critically examining those who claim expertise and trustworthiness, using what they already know about the world
  • none of this weighs against the existence of echo chambers. We should not dismiss the threat of echo chambers based only on evidence about connectivity and exposure.
  • Notice how different what’s going on here is from, say, Orwellian doublespeak, a deliberately ambiguous, euphemism-filled language designed to hide the intent of the speaker.
  • echo chambers don’t trade in vague, ambiguous pseudo-speech. We should expect that echo chambers would deliver crisp, clear, unambiguous claims about who is trustworthy and who is not
  • clearly articulated conspiracy theories, and crisply worded accusations of an outside world rife with untrustworthiness and corruption.
  • Once an echo chamber starts to grip a person, its mechanisms will reinforce themselves.
  • In an epistemically healthy life, the variety of our informational sources will put an upper limit to how much we’re willing to trust any single person. Everybody’s fallible; a healthy informational network tends to discover people’s mistakes and point them out. This puts an upper ceiling on how much you can trust even your most beloved leader
  • nside an echo chamber, that upper ceiling disappears.
  • Being caught in an echo chamber is not always the result of laziness or bad faith. Imagine, for instance, that somebody has been raised and educated entirely inside an echo chamber
  • when the child finally comes into contact with the larger world – say, as a teenager – the echo chamber’s worldview is firmly in place. That teenager will distrust all sources outside her echo chamber, and she will have gotten there by following normal procedures for trust and learning.
  • It certainly seems like our teenager is behaving reasonably. She could be going about her intellectual life in perfectly good faith. She might be intellectually voracious, seeking out new sources, investigating them, and evaluating them using what she already knows.
  • The worry is that she’s intellectually trapped. Her earnest attempts at intellectual investigation are led astray by her upbringing and the social structure in which she is embedded.
  • Echo chambers might function like addiction, under certain accounts. It might be irrational to become addicted, but all it takes is a momentary lapse – once you’re addicted, your internal landscape is sufficiently rearranged such that it’s rational to continue with your addiction
  • Similarly, all it takes to enter an echo chamber is a momentary lapse of intellectual vigilance. Once you’re in, the echo chamber’s belief systems function as a trap, making future acts of intellectual vigilance only reinforce the echo chamber’s worldview.
  • There is at least one possible escape route, however. Notice that the logic of the echo chamber depends on the order in which we encounter the evidence. An echo chamber can bring our teenager to discredit outside beliefs precisely because she encountered the echo chamber’s claims first. Imagine a counterpart to our teenager who was raised outside of the echo chamber and exposed to a wide range of beliefs. Our free-range counterpart would, when she encounters that same echo chamber, likely see its many flaws
  • Those caught in an echo chamber are giving far too much weight to the evidence they encounter first, just because it’s first. Rationally, they should reconsider their beliefs without that arbitrary preference. But how does one enforce such informational a-historicity?
  • The escape route is a modified version of René Descartes’s infamous method.
  • Meditations on First Philosophy (1641). He had come to realise that many of the beliefs he had acquired in his early life were false. But early beliefs lead to all sorts of other beliefs, and any early falsehoods he’d accepted had surely infected the rest of his belief system.
  • The only solution, thought Descartes, was to throw all his beliefs away and start over again from scratch.
  • He could start over, trusting nothing and no one except those things that he could be entirely certain of, and stamping out those sneaky falsehoods once and for all. Let’s call this the Cartesian epistemic reboot.
  • Notice how close Descartes’s problem is to our hapless teenager’s, and how useful the solution might be. Our teenager, like Descartes, has problematic beliefs acquired in early childhood. These beliefs have infected outwards, infesting that teenager’s whole belief system. Our teenager, too, needs to throw everything away, and start over again.
  • Let’s call the modernised version of Descartes’s methodology the social-epistemic reboot.
  • when she starts from scratch, we won’t demand that she trust only what she’s absolutely certain of, nor will we demand that she go it alone
  • For the social reboot, she can proceed, after throwing everything away, in an utterly mundane way – trusting her senses, trusting others. But she must begin afresh socially – she must reconsider all possible sources of information with a presumptively equanimous eye. She must take the posture of a cognitive newborn, open and equally trusting to all outside sources
  • we’re not asking people to change their basic methods for learning about the world. They are permitted to trust, and trust freely. But after the social reboot, that trust will not be narrowly confined and deeply conditioned by the particular people they happened to be raised by.
  • Such a profound deep-cleanse of one’s whole belief system seems to be what’s actually required to escape. Look at the many stories of people leaving cults and echo chambers
  • Take, for example, the story of Derek Black in Florida – raised by a neo-Nazi father, and groomed from childhood to be a neo-Nazi leader. Black left the movement by, basically, performing a social reboot. He completely abandoned everything he’d believed in, and spent years building a new belief system from scratch. He immersed himself broadly and open-mindedly in everything he’d missed – pop culture, Arabic literature, the mainstream media, rap – all with an overall attitude of generosity and trust.
  • It was the project of years and a major act of self-reconstruction, but those extraordinary lengths might just be what’s actually required to undo the effects of an echo-chambered upbringing.
  • we need to attack the root, the systems of discredit themselves, and restore trust in some outside voices.
  • Stories of actual escapes from echo chambers often turn on particular encounters – moments when the echo-chambered individual starts to trust somebody on the outside.
  • Black’s is case in point. By high school, he was already something of a star on neo-Nazi media, with his own radio talk-show. He went on to college, openly neo-Nazi, and was shunned by almost every other student in his community college. But then Matthew Stevenson, a Jewish fellow undergraduate, started inviting Black to Stevenson’s Shabbat dinners. In Black’s telling, Stevenson was unfailingly kind, open and generous, and slowly earned Black’s trust. This was the seed, says Black, that led to a massive intellectual upheaval – a slow-dawning realisation of the depths to which he had been misled
  • Similarly, accounts of people leaving echo-chambered homophobia rarely involve them encountering some institutionally reported fact. Rather, they tend to revolve around personal encounters – a child, a family member, a close friend coming out.
  • hese encounters matter because a personal connection comes with a substantial store of trust.
  • We don’t simply trust people as educated experts in a field – we rely on their goodwill. And this is why trust, rather than mere reliability, is the key concept
  • goodwill is a general feature of a person’s character. If I demonstrate goodwill in action, then you have some reason to think that I also have goodwill in matters of thought and knowledge.
  • f one can demonstrate goodwill to an echo-chambered member – as Stevenson did with Black – then perhaps one can start to pierce that echo chamber.
  • the path I’m describing is a winding, narrow and fragile one. There is no guarantee that such trust can be established, and no clear path to its being established systematically.
  • what we’ve found here isn’t an escape route at all. It depends on the intervention of another. This path is not even one an echo-chamber member can trigger on her own; it is only a whisper-thin hope for rescue from the outside.
Javier E

DeepMind uncovers structure of 200m proteins in scientific leap forward | DeepMind | Th... - 0 views

  • Highlighter
  • Proteins are the building blocks of life. Formed of chains of amino acids, folded up into complex shapes, their 3D structure largely determines their function. Once you know how a protein folds up, you can start to understand how it works, and how to change its behaviour
  • Although DNA provides the instructions for making the chain of amino acids, predicting how they interact to form a 3D shape was more tricky and, until recently, scientists had only deciphered a fraction of the 200m or so proteins known to science
  • ...7 more annotations...
  • In November 2020, the AI group DeepMind announced it had developed a program called AlphaFold that could rapidly predict this information using an algorithm. Since then, it has been crunching through the genetic codes of every organism that has had its genome sequenced, and predicting the structures of the hundreds of millions of proteins they collectively contain.
  • Last year, DeepMind published the protein structures for 20 species – including nearly all 20,000 proteins expressed by humans – on an open database. Now it has finished the job, and released predicted structures for more than 200m proteins.
  • “Essentially, you can think of it as covering the entire protein universe. It includes predictive structures for plants, bacteria, animals, and many other organisms, opening up huge new opportunities for AlphaFold to have an impact on important issues, such as sustainability, food insecurity, and neglected diseases,”
  • In May, researchers led by Prof Matthew Higgins at the University of Oxford announced they had used AlphaFold’s models to help determine the structure of a key malaria parasite protein, and work out where antibodies that could block transmission of the parasite were likely to bind.
  • “Previously, we’d been using a technique called protein crystallography to work out what this molecule looks like, but because it’s quite dynamic and moves around, we just couldn’t get to grips with it,” Higgins said. “When we took the AlphaFold models and combined them with this experimental evidence, suddenly it all made sense. This insight will now be used to design improved vaccines which induce the most potent transmission-blocking antibodies.”
  • AlphaFold’s models are also being used by scientists at the University of Portsmouth’s Centre for Enzyme Innovation, to identify enzymes from the natural world that could be tweaked to digest and recycle plastics. “It took us quite a long time to go through this massive database of structures, but opened this whole array of new three-dimensional shapes we’d never seen before that could actually break down plastics,” said Prof John McGeehan, who is leading the work. “There’s a complete paradigm shift. We can really accelerate where we go from here
  • “AlphaFold protein structure predictions are already being used in a myriad of ways. I expect that this latest update will trigger an avalanche of new and exciting discoveries in the months and years ahead, and this is all thanks to the fact that the data are available openly for all to use.”
Javier E

There Is More to Us Than Just Our Brains - The New York Times - 0 views

  • we are less like data processing machines and more like soft-bodied mollusks, picking up cues from within and without and transforming ourselves accordingly.
  • Still, we “insist that the brain is the sole locus of thinking, a cordoned-off space where cognition happens, much as the workings of my laptop are sealed inside its aluminum case,”
  • We get constant messages about what’s going on inside our bodies, sensations we can either attend to or ignore. And we belong to tribes that cosset and guide us
  • ...14 more annotations...
  • we’re networked organisms who move around in shifting surroundings, environments that have the power to transform our thinking
  • Annie Murphy Paul’s new book, “The Extended Mind,” which exhorts us to use our entire bodies, our surroundings and our relationships to “think outside the brain.”
  • In 2011, she published “Origins,” which focused on all the ways we are shaped by the environment, before birth and minute to minute thereafter.
  • “In the nature-nurture dynamic, nurture begins at the time of conception. The food the mother eats, the air she breathes, the water she drinks, the stress or trauma she experiences — all may affect her child for better or worse, over the decades to come.”
  • a down-to-earth take on the science of epigenetics — how environmental signals become catalysts for gene expression
  • the parallel to this latest book is that the boundaries we commonly assume to be fixed are actually squishy. The moment of a child’s birth, her I.Q. scores or fMRI snapshots of what’s going on inside her brain — all are encroached upon and influenced by outside forces.
  • awareness of our internal signals, such as exactly when our hearts beat, or how cold and clammy our hands are, can boost our performance at the poker table or in the financial markets, and even improve our pillow talk
  • “Though we typically think of the brain as telling the body what to do, just as much does the body guide the brain with an array of subtle nudges and prods. One psychologist has called this guide our ‘somatic rudder,’
  • The “body scan” aspect of mindfulness meditation that has been deployed by the behavioral medicine pioneer Jon Kabat-Zinn may help people lower their heart rates and blood pressure,
  • techniques that help us pinpoint their signals can foster well-being
  • Tania Singer has shown how the neural circuitry underlying compassion is strengthened by meditation practice
  • our thoughts “are powerfully shaped by the way we move our bodies.” Gestures help us understand spatial concepts; indeed, “without gesture as an aid, students may fail to understand spatial ideas at all,”
  • looking out on grassy expanses near loose clumps of trees and a source of water helps us solve problems. “Passive attention,” she writes, is “effortless: diffuse and unfocused, it floats from object to object, topic to topic. This is the kind of attention evoked by nature, with its murmuring sounds and fluid motions; psychologists working in the tradition of James call this state of mind ‘soft fascination.’”
  • The chapters on the ways natural and built spaces reflect universal preferences and enhance the thinking process felt like a respite
« First ‹ Previous 341 - 360 of 6446 Next › Last »
Showing 20 items per page