“
Real programmers can write assembly code in any language.
”
”
Larry Wall
“
When people say the word "convention," they are usually referring to large gatherings of the employees of companies and corporations who attend a mass assembly, usually in a big hotel somewhere, for the purpose of pretending to learn stuff when they are in fact enjoying a free trip somewhere, time off work, and the opportunity to flirt with strangers, drink, and otherwise indulge themselves. The first major difference between a business convention and a fan-dom convention is that fandom doesn’t bother with the pretenses. They’re just there to have a good time. The second difference is the dress code— the ensembles at a fan convention tend to be considerably more novel.
”
”
Jim Butcher (Proven Guilty (The Dresden Files, #8))
“
Remember that code is really the language in which we ultimately express the requirements. We may create languages that are closer to the requirements. We may create tools that help us parse and assemble those requirements into formal structures. But we will never eliminate necessary precision—so there will always be code.
”
”
Robert C. Martin
“
As best as the Count could determine, the Bolsheviks assembled whenever possible in whichever form for whatever reason. In a single week, there might be committees, caucuses, colloquiums, congresses, and conventions variously coming together to establish codes, set courses of action, levy complaints, and generally clamor about the world’s oldest problems in its newest nomenclature. If
”
”
Amor Towles (A Gentleman in Moscow)
“
When Hiro learned how to do this, way back fifteen years ago, a hacker could sit down and write an entire piece of software by himself. Now, that's no longer possible. Software comes out of factories, and hackers are, to a greater or lesser extent, assembly-line workers. Worse yet, they may become managers who never get to write any code themselves.
”
”
Neal Stephenson (Snow Crash)
“
Programmers working with high-level languages achieve better productivity and quality than those working with lower-level languages. Languages such as C++, Java, Smalltalk, and Visual Basic have been credited with improving productivity, reliability, simplicity, and comprehensibility by factors of 5 to 15 over low-level languages such as assembly and C (Brooks 1987, Jones 1998, Boehm 2000). You save time when you don't need to have an awards ceremony every time a C statement does what it's supposed to.
”
”
Steve McConnell (Code Complete: A Practical Handbook of Software Construction)
“
Let me tell you as a brain scientist and a computer engineering dropout - transhumanism is to brain computer interface, what nuclear weapons are to nuclear physics.
”
”
Abhijit Naskar (Amantes Assemble: 100 Sonnets of Servant Sultans)
“
The Israelites assemble at Mount Sinai and hear the Ten Commandments, the great moral code that outlaws engraved images and the coveting of livestock but gives a pass to slavery, rape, torture, mutilation, and genocide of neighboring tribes.
”
”
Steven Pinker (The Better Angels of Our Nature: A History of Violence and Humanity)
“
Still less, despite appearances, will it have been a collection of three “essays” whose itinerary it would be time, after the fact, to recognize; whose continuity and underlying laws could now be pointed out; indeed, whose overall concept or meaning could at last, with all the insistence required on such occasions, be squarely set forth. I will not feign, according to the code, either premeditation or improvisation. These texts are assembled otherwise; it is not my intention here to present them.
”
”
Jacques Derrida (Dissemination)
“
Software comes out of factories, and hackers are, to a greater or lesser extent, assembly-line workers. Worse yet, they may become managers who never get to write any code themselves.
”
”
Neal Stephenson (Snow Crash)
“
The Constitution, the National Assembly, the dynastic parties, the blue and the red republicans, the heroes of Africa, the thunder from the platform, the sheet lightning of the daily press, the entire literature, the political names and the intellectual reputations, the civil law and penal code, the liberté, égalité, fraternité and the second of May 1852—all have vanished like a phantasmagoria before the spell of a man whom even his enemies do not make out to be a magician. Universal suffrage seems to have survived only for a moment, in order that with its own hand it may make its last will and testament before the eyes of all the world and declare in the name of the people itself: Everything that exists has this much worth, that it will perish.
”
”
Karl Marx (The Eighteenth Brumaire of Louis Bonaparte)
“
over 80 percent of noncoding DNA is involved with regulating the production and assembly of gene-encoded proteins. A major discovery also found that “dark” DNA contains mechanisms by which environmental information can be used to modify the readout of protein-encoding genes. It turns out that dark DNA uses epigenetic mechanisms that enable a human cell with 19,000 gene blueprints to code for over a hundred thousand different protein molecules!
”
”
Bruce H. Lipton (The Biology of Belief: Unleashing the Power of Consciousness, Matter & Miracles)
“
A small segment of DNA that encodes a gene is transcribed into a snippet of RNA, which then travels to the manufacturing region of the cell. There this “messenger RNA” facilitates the assembly of the proper sequence of amino acids to make a specified protein.
”
”
Walter Isaacson (The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race)
“
Hiro walks straight through the display, and it vanishes. Amusement parks in the Metaverse can be fantastic, offering a wide selection of interactive three-dimensional movies. But in the end, they’re still nothing more than video games. Hiro’s not so poor, yet, that he would go and write video games for this company. It’s owned by the Nipponese, which is no big deal. But it’s also managed by the Nipponese, which means that all the programmers have to wear white shirts and show up at eight in the morning and sit in cubicles and go to meetings. When Hiro learned how to do this, way back fifteen years ago, a hacker could sit down and write an entire piece of software by himself. Now, that’s no longer possible. Software comes out of factories, and hackers are, to a greater or lesser extent, assembly-line workers. Worse yet, they may become managers who never get to write any code themselves.
”
”
Neal Stephenson (Snow Crash)
“
Humans - from this other perspective, which is just as extreme in its own way - are at best an arbitrary constellation of cultural elements, perhaps assembled according to some prevailing spirit, code or ethos, and which society ends up with which ethos is treated as beyond explanation, little more than a random roll of the dice.
”
”
David Graeber, David Wengrow (The Dawn of Everything: A New History of Humanity)
“
When Hiro learned how to do this, way back fifteen years ago, a hacker could sit down and write an entire piece of software by himself. Now, that's no longer possible. Software comes out of factories, and hackers are, to a greater or lesser extent, assembly-line workers. Worse yet, they may become managers who never get to write any code themselves. The
”
”
Neal Stephenson (Snow Crash)
“
Transhumanism is terrorism, for it is the very antithesis of life. Wasting precious resources on a pompous, narcissistic and megalomaniacal dream of extending life through cold, mechanical means, instead of helping to improve genuine human condition, transhumanists act as modern day terrorists who desecrate the very spirit of life and liberty without ever being held accountable. Let me tell you as a brain scientist and a computer engineering dropout - transhumanism is to brain computer interface, what nuclear weapons are to nuclear physics.
”
”
Abhijit Naskar (Amantes Assemble: 100 Sonnets of Servant Sultans)
“
He had the voice of knowledge advising honest simplicity without despising it. It was a voice to set you at ease, if you liked your thinking done for you. He proposed a Council of Thirty, to draw up a constitution upon the ancient code, and govern meanwhile. When he read the list, starting with the five Ephors themselves, the people listened at first as children to a teacher. Then there was a murmur; then a roar. The Assembly had awakened, and heard the names. The core of the Four Hundred, the traitors from Dekeleia, every extreme oligarch who hated the people as boar hates dog. The Pnyx echoed with the outcry. Kritias listened, it seemed unmoved; then he turned, and made a gesture, and stepped aside. The shouting died like a gust of wind. Lysander stood on the rostrum, in his armour.
”
”
Mary Renault (The Last of the Wine)
“
Transhumanism is Terrorism (The Sonnet)
Intelligence comes easy, accountability not so much,
Yet intelligence is complex, accountability is simple.
Technology comes easy, transformation not so much,
Yet technology is complicated, transformation is simple.
In olden days there were just nutters of fundamentalism,
Today there are nutters of nationalism and transhumanism.
Some are obsessed with land, others with digital avatars,
While humanity battles age-old crises like starvationism.
When too much logic, coldness and pomposity set in,
Common sense humanity goes out of the window.
Once upon a time religion was the opium of all people,
Today transhumanism and singularity are opium of the shallow.
To replace the sky god with a computer god isn't advancement.
Real advancement is when nobody suffers from scarcity of sustenance.
”
”
Abhijit Naskar (Amantes Assemble: 100 Sonnets of Servant Sultans)
“
How does the body push the comparatively tiny genome so far? Many researchers want to put the weight on learning and experience, apparently believing that the contribution of the genes is relatively unimportant. But though the ability to learn is clearly one of the genome's most important products, such views overemphasize learning and significantly underestimate the extent to which the genome can in fact guide the construction of enormous complexity. If the tools of biological self-assembly are powerful enough to build the intricacies of the circulatory system or the eye without requiring lessons from the outside world, they are also powerful enough to build the initial complexity of the nervous system without relying on external lessons.
The discrepancy melts away as we appreciate the true power of the genome. We could start by considering the fact that the currently accepted figure of 30,000 could well prove to be too low. Thirty thousand (or thereabouts) is, at press time, the best estimate for how many protein-coding genes are in the human genome. But not all genes code for proteins; some, not counted in the 30,000 estimate, code for small pieces of RNA that are not converted into proteins (called microRNA), of "pseudogenes," stretches of DNA, apparently relics of evolution, that do not properly encode proteins. Neither entity is fully understood, but recent reports (from 2002 and 2003) suggest that both may play some role in the all-important process of regulating the IFS that control whether or not genes are expressed. Since the "gene-finding" programs that search the human genome sequence for genes are not attuned to such things-we don't yet know how to identify them reliably-it is quite possible that the genome contains more buried treasure.
”
”
Gary F. Marcus (The Birth of the Mind: How a Tiny Number of Genes Creates The Complexities of Human Thought)
“
On a distant hilltop, twinkling like an early evening star, a white light was flashing.
Blouse lowered his telescope. ‘They're repeating "CQ",’ he said. ‘And I believe those longer pauses are when they're aiming their tube in different directions. They're looking for their spies. "Seek You", see? Private Igor?’
‘Thur?’
‘You know how that tube works, don't you?’
‘Oh, yeth, thur. You jutht light a flare in the box, and then it'th just point and click.’
‘You're not going to answer it, are you, sir?’ said Jackrum, horrified.
‘I am indeed, sergeant,’ said Blouse briskly. ‘Private Carborundum, please assemble the tube. Manickle, please bring the lantern. I shall need to read the code book.’
‘But that'll give away our position!’ said Jackrum.
‘No, sergeant, because although this term may be unfamiliar to you I intend to what we call "lie",’ said Blouse. ‘Igor, I'm sure you have some scissors, although I'd rather you didn't attempt to repeat the word.’
‘I have thome of the appliantheth you mention, thur,’ said Igorina stiffly.
”
”
Terry Pratchett (Monstrous Regiment (Discworld, #31; Industrial Revolution, #3))
“
The algorithm was sometimes accompanied by a few corollaries, among them: All technical managers must have hands-on experience. For example, managers of software teams must spend at least 20% of their time coding. Solar roof managers must spend time on the roofs doing installations. Otherwise, they are like a cavalry leader who can’t ride a horse or a general who can’t use a sword. Comradery is dangerous. It makes it hard for people to challenge each other’s work. There is a tendency to not want to throw a colleague under the bus. That needs to be avoided. It’s OK to be wrong. Just don’t be confident and wrong. Never ask your troops to do something you’re not willing to do. Whenever there are problems to solve, don’t just meet with your managers. Do a skip level, where you meet with the level right below your managers. When hiring, look for people with the right attitude. Skills can be taught. Attitude changes require a brain transplant. A maniacal sense of urgency is our operating principle. The only rules are the ones dictated by the laws of physics. Everything else is a recommendation. On the assembly line
”
”
Walter Isaacson (Elon Musk)
“
God, who is omnipotent, could have softened Pharaoh’s heart, but he hardens it instead, which gives him a reason to afflict every Egyptian with painful boils and other miseries before killing every one of their firstborn sons. (The word Passover alludes to the executioner angel’s passing over the households with Israelite firstborns.) God follows this massacre with another one when he drowns the Egyptian army as they pursue the Israelites across the Red Sea. The Israelites assemble at Mount Sinai and hear the Ten Commandments, the great moral code that outlaws engraved images and the coveting of livestock but gives a pass to slavery, rape, torture, mutilation, and genocide of neighboring tribes. The Israelites become impatient while waiting for Moses to return with an expanded set of laws, which will prescribe the death penalty for blasphemy, homosexuality, adultery, talking back to parents, and working on the Sabbath. To pass the time, they worship a statue of a calf, for which the punishment turns out to be, you guessed it, death. Following orders from God, Moses and his brother Aaron kill three thousand of their companions.
”
”
Steven Pinker (The Better Angels of Our Nature: Why Violence Has Declined)
“
Knuth: They were very weak, actually. It wasn't presented systematically and everything, but I thought they were pretty obvious. It was a different culture entirely. But the guy who said he was going to fire people, he wants programming to be something where everything is done in an inefficient way because it's supposed to fit into his idea of orderliness. He doesn't care if the program is good or not—as far as its speed and performance—he cares about that it satisfies other criteria, like any bloke can be able to maintain it. Well, people have lots of other funny ideas. People have this strange idea that we want to write our programs as worlds unto themselves so that everybody else can just set up a few parameters and our program will do it for them. So there'll be a few programmers in the world who write the libraries, and then there are people who write the user manuals for these libraries, and then there are people who apply these libraries and that's it. The problem is that coding isn't fun if all you can do is call things out of a library, if you can't write the library yourself. If the job of coding is just to be finding the right combination of parameters, that does fairly obvious things, then who'd want to go into that as a career? There's this overemphasis on reusable software where you never get to open up the box and see what's inside the box. It's nice to have these black boxes but, almost always, if you can look inside the box you can improve it and make it work better once you know what's inside the box. Instead people make these closed wrappers around everything and present the closure to the programmers of the world, and the programmers of the world aren't allowed to diddle with that. All they're able to do is assemble the parts. And so you remember that when you call this subroutine you put x0, y0, x1, y1 but when you call this subroutine it's x0, x1, y0, y1. You get that right, and that's your job.
”
”
Peter Seibel (Coders at Work: Reflections on the Craft of Programming)
“
Although thrilled that the era of the personal computer had arrived, he was afraid that he was going to miss the party. Slapping down seventy-five cents, he grabbed the issue and trotted through the slushy snow to the Harvard dorm room of Bill Gates, his high school buddy and fellow computer fanatic from Seattle, who had convinced him to drop out of college and move to Cambridge. “Hey, this thing is happening without us,” Allen declared. Gates began to rock back and forth, as he often did during moments of intensity. When he finished the article, he realized that Allen was right. For the next eight weeks, the two of them embarked on a frenzy of code writing that would change the nature of the computer business.1 Unlike the computer pioneers before him, Gates, who was born in 1955, had not grown up caring much about the hardware. He had never gotten his thrills by building Heathkit radios or soldering circuit boards. A high school physics teacher, annoyed by the arrogance Gates sometimes displayed while jockeying at the school’s timesharing terminal, had once assigned him the project of assembling a Radio Shack electronics kit. When Gates finally turned it in, the teacher recalled, “solder was dripping all over the back” and it didn’t work.2 For Gates, the magic of computers was not in their hardware circuits but in their software code. “We’re not hardware gurus, Paul,” he repeatedly pronounced whenever Allen proposed building a machine. “What we know is software.” Even his slightly older friend Allen, who had built shortwave radios, knew that the future belonged to the coders. “Hardware,” he admitted, “was not our area of expertise.”3 What Gates and Allen set out to do on that December day in 1974 when they first saw the Popular Electronics cover was to create the software for personal computers. More than that, they wanted to shift the balance in the emerging industry so that the hardware would become an interchangeable commodity, while those who created the operating system and application software would capture most of the profits.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
But nothing in my previous work had prepared me for the experience of reinvestigating Cleveland. It is worth — given the passage of time — recalling the basic architecture of the Crisis: 121 children from many different and largely unrelated families had been taken into the care of Cleveland County Council in the three short months of the summer of 1987. (p18)
The key to resolving the puzzle of Cleveland was the children. What had actually happened to them? Had they been abused - or had the paediatricians and social workers (as public opinion held) been over-zealous and plain wrong? Curiously — particularly given its high profile, year-long sittings and £5 million cost — this was the one central issue never addressed by the Butler-Sloss judicial testimony and sifting of internal evidence, the inquiry's remit did not require it to answer the main question. Ten years after the crisis, my colleagues and I set about reconstructing the records of the 121 children at its heart to determine exactly what had happened to them... (p19)
Eventually, though, we did assemble the data given to the Butler-Sloss Inquiry. This divided into two categories: the confidential material, presented in camera, and the transcripts of public sessions of the hearings. Putting the two together we assembled our own database on the children each identified only by the code-letters assigned to them by Butler-Sloss.
When it was finished, this database told a startlingly different story from the public myth. In every case there was some prima fade evidence to suggest the possibility of abuse. Far from the media fiction of parents taking their children to Middlesbrough General Hospital for a tummy ache or a sore thumb and suddenly being presented with a diagnosis of child sexual abuse, the true story was of families known to social services for months or years, histories of physical and sexual abuse of siblings and of prior discussions with parents about these concerns. In several of the cases the children themselves had made detailed disclosures of abuse; many of the pre-verbal children displayed severe emotional or behavioural symptoms consistent with sexual abuse. There were even some families in which a convicted sex offender had moved in with mother and children. (p20)
”
”
Sue Richardson (Creative Responses to Child Sexual Abuse: Challenges and Dilemmas)
“
When Hiro learned how to do this, way back fifteen years ago, a hacker could sit down and write an entire piece of software by himself. Now, that’s no longer possible. Software comes out of factories, and hackers are, to a greater or lesser extent, assembly-line workers. Worse yet, they may become managers who never get to write any code themselves.
”
”
Neal Stephenson (Snow Crash)
“
The codes represent, in non-explicit form, the actual content of images and their sequences and are stored in both cerebral hemispheres, in association cortices of the occipital, temporal, parietal, and frontal regions. These regions are interconnected, via two-way hierarchical circuits of neural cables, with the collection of “early sensory cortices” where the explicit images are first assembled. During the process of recall, we end up reconstructing a more or less faithful approximation of the original image, using reverse neural pathways, which operate from code-holding regions and produce effects within the explicit image-making regions, essentially where the images were first assembled. We have called this process retroactivation.7
”
”
António Damásio (The Strange Order of Things: Life, Feeling, and the Making of the Cultural Mind)
“
Software comes out of factories, and hackers are, to a great our lesser extent, assembly line workers. Worse yet, they may become managers who never get to write any code themselves.
”
”
Neal Stephenson (Snow Crash)
“
The genetic program as a vital factor is not the same as the DNA molecules in the genes, for these are just molecules, not mindlike entities. The fact that qualities of mind are commonly projected onto the genes, especially the qualities of selfish, competitive people within capitalist societies, makes it easy to forget that they are just chemicals. As such, they play a chemical role, and their activity is confined to the chemical level. The genetic code in the DNA molecules determines the sequence of amino-acid building blocks in protein molecules , the so-called primary structure of the proteins. The genes dictate the primary stucture of proteins, not the specific shape of a duck's foot or a lamb's kidney or an orchid. The way the proteins are arranged in cells, the ways cells are arranged in tissues, and tissues in organs, and organs in organisms are not programmed in the genetic code , which can only program protein molecules. Given the right genes and hence the right proteins, and the right systems by which protein synthesis is controlled, the organism is somehow supposed to assemble itself automatically. This is rather like delivering the right materials to a building site at the right times and expecting a house to grow spontaneously.
”
”
Rupert Sheldrake (The Rebirth of Nature: The Greening of Science and God)
“
If we overlay the four steps of CODE onto the model of divergence and convergence, we arrive at a powerful template for the creative process in our time. The first two steps of CODE, Capture and Organize, make up divergence. They are about gathering seeds of imagination carried on the wind and storing them in a secure place. This is where you research, explore, and add ideas. The final two steps, Distill and Express, are about convergence. They help us shut the door to new ideas and begin constructing something new out of the knowledge building blocks we’ve assembled.
”
”
Tiago Forte (Building a Second Brain: A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential)
“
Although the nucleus might have been recognized by Antonie van Leeuwenhoek in the late 17th century, it was not until 1831 that it was reported as a specific structure in orchid epidermal cells by a Scottish botanist, Robert Brown (better known for recognizing ‘Brownian movement’ of pollen grains in water). In 1879, Walther Flemming observed that the nucleus broke down into small fragments at cell division, followed by re-formation of the fragments called chromosomes to make new nuclei in the daughter cells. It was not until 1902 that Walter Sutton and Theodor Boveri independently linked chromosomes directly to mammalian inheritance. Thomas Morgan’s work with fruit flies (Drosophila) at the start of the 20th century showed specific characters positioned along the length of the chromosomes, followed by the realization by Oswald Avery in 1944 that the genetic material was DNA. Some nine years later, James Watson and Francis Crick showed the structure of DNA to be a double helix, for which they shared the Nobel Prize in 1962 with Maurice Wilkins, whose laboratory had provided the evidence that led to the discovery. Rosalind Franklin, whose X-ray diffraction images of DNA from the Wilkins lab had been the key to DNA structure, died of cancer aged 37 in 1958, and Nobel Prizes are not awarded posthumously. Watson and Crick published the classic double helix model in 1953. The final piece in the jigsaw of DNA structure was produced by Watson with the realization that the pairing of the nucleotide bases, adenine with thymine and guanine with cytosine, not only provided the rungs holding the twisting ladder of DNA together, but also provided a code for accurate replication and a template for protein assembly. Crick continued to study and elucidate the base pairing required for coding proteins, and this led to the fundamental ‘dogma’ that ‘DNA makes RNA and RNA makes protein’. The discovery of DNA structure marked an enormous advance in biology, probably the most significant since Darwin’s publication of
On the Origin of Species
.
”
”
Terence Allen (The Cell: A Very Short Introduction)
“
Section 13-2921 - Harassment; classification; definition A. A person commits harassment if, with intent to harass or with knowledge that the person is harassing another person, the person:
1. Anonymously or otherwise contacts, communicates or causes a communication with another person by verbal, electronic, mechanical, telegraphic, telephonic or written means in a manner that harasses.
2. Continues to follow another person in or about a public place for no legitimate purpose after being asked to desist.
3. Repeatedly commits an act or acts that harass another person.
4. Surveils or causes another person to surveil a person for no legitimate purpose.
5. On more than one occasion makes a false report to a law enforcement, credit or social service agency.
6. Interferes with the delivery of any public or regulated utility to a person. B. A person commits harassment against a public officer or employee if the person, with intent to harass, files a nonconsensual lien against any public officer or employee that is not accompanied by an order or a judgment from a court of competent jurisdiction authorizing the filing of the lien or is not issued by a governmental entity or political subdivision or agency pursuant to its statutory authority, a validly licensed utility or water delivery company, a mechanics' lien claimant or an entity created under covenants, conditions, restrictions or declarations affecting real property. C. Harassment under subsection A is a class 1 misdemeanor. Harassment under subsection B is a class 5 felony. D. This section does not apply to an otherwise lawful demonstration, assembly or picketing. E. For the purposes of this section, "harassment" means conduct that is directed at a specific person and that would cause a reasonable person to be seriously alarmed, annoyed or harassed and the conduct in fact seriously alarms, annoys or harasses the person. A.R.S. § 13-2921 Section 13-2921.01 - Aggravated harassment; classification; definition A. A person commits aggravated harassment if the person commits harassment as provided in section 13-2921 and any of the following applies:
1. A court has issued an order of protection or an injunction against harassment against the person and in favor of the victim of harassment and the order or injunction has been served and is still valid.
2. The person has previously been convicted of an offense included in section 13-3601. B. The victim of any previous offense shall be the same as in the present offense. C. A person who violates subsection A, paragraph 1 of this section is guilty of a class 6 felony. A person who commits a second or subsequent violation of subsection A, paragraph 1 of this section is guilty of a class 5 felony. A person who violates subsection A, paragraph 2 of this section is guilty of a class 5 felony. D. For the purposes of this section, "convicted" means a person who was convicted of an offense included in section 13-3601 or who was adjudicated delinquent for conduct that would constitute a historical prior felony conviction if the juvenile had been tried as an adult for an offense included in section 13-3601. A.R.S. § 13-2921.01
”
”
Arizona Legislature (ARIZONA REVISED STATUTES TITLE 13 CRIMINAL CODE 2022 EDITION: WEST HARTFORD LEGAL PUBLISHING)
“
Applications treating data as code is the root cause of almost every major class of vulnerability. Cross-site scripting happens when applications treat data as HTML or script. SQL injection happens when applications treat data as SQL. Buffer overflows happen when applications treat data as assembly code.
”
”
Bryan Sullivan (Web Application Security, A Beginner's Guide)
“
we can identify four concerns underlying the major developments in fashion: status, sex, power, and personality. Clothing is a status symbol, and history is replete with rules and laws designed to ensure that the social status of individuals is reflected in what they wear. Dress is also a sex symbol—social conventions and laws have ensured that clothing establishes whether one is male or female, sexually innocent or experienced, married or single, chaste or promiscuous. Attire is a uniform of power: it has helped define national belonging as much as any territorial border; it has differentiated ethnic groups and tribes as much as any language or cultural ritual; it has shaped religious sects as much as any scripture; and it has both established and challenged racial hierarchies. Finally, fashion is a medium for the expression of individual personality. We assemble our wardrobes and daily ensembles to reflect a distinctive point of view and confirm a distinctive sense of self.
”
”
Richard Thompson Ford (Dress Codes: How the Laws of Fashion Made History)
“
The concept of modularity is related to information hiding, encapsulation, and other design heuristics. But sometimes thinking about how to assemble a system from a set of black boxes provides insights that information hiding and encapsulation don't, so the concept is worth having in your back pocket.
”
”
Steve McConnell (Code Complete)
“
School Code of Conduct. Everything you need to know about how to behave at school—and how not to behave—is right here in this book.” A bunch of teachers came around and started handing out a copy to each student in the gym. “When you receive yours, open up to page one and follow along with me,” Stricker said. Then she started reading… really… slowly. “‘Section One: Hills Village Middle School Dress Code…’” When I got my copy, I flipped all the way to the back of the book. There were sixteen sections and twenty-six pages total. In other words, we were going to be lucky to get out of this assembly by Christmas. “‘… All students are expected to dress appropriately for an academic environment. No student shall wear clothing of a size more than two beyond his or her normal size….’” HELP! That’s what I was thinking about then. Middle school had just started, and they were already trying to bore us to death. Please, somebody stop Mrs. Stricker before she kills again! Leo took out a pen and started drawing something on the inside of the back cover. Stricker turned to the next page and kept reading. “‘Section Two: Prohibited Items. No student shall bring to school any electronic equipment not intended for class purposes. This includes cell phones, iPods, cameras, laptop computers….’” The whole thing went on and on. And on. And on. By the time we got to Section 6 (“Grounds for Expulsion”), my brain was turning into guacamole, and I’m pretty sure my ears were bleeding too. People always talk about how great it is to get older. All I saw were more rules and more adults telling me what I could and couldn’t do, in the name of what’s “good for me.” Yeah, well, asparagus is good for me, but it still makes me want to throw up. As far as I could tell, this little green book in my hands was just one long list of all the ways I could—and probably would—get into trouble between now and the end of the school year. Meanwhile, Leo was drawing away like the maniac he is. Every time Stricker mentioned another rule, he scribbled something else on the page in front of him. Finally, he turned it around and showed me what he was working on.
”
”
James Patterson (Middle School, The Worst Years of My Life - Free Preview: The First 20 Chapters)
“
The Bible Code, a 1998 bestseller, claimed that the bible contains predictions on the future events that you can find by skipping letters at regular intervals an assembling words from the letter you land on. Unfortunately, there are so many ways to do this that you're guaranteed to find "predictions" in any sufficiently long text.
”
”
Pedro Domingos (The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World)
“
Bellevue and its satellites were not suburbs so much as—in the rising term—an Edge City, with its own economy, sociology, and architecture. Things made on the Eastside were odorless, labor-intensive, and credit-card thin, like computer software and aerospace-related electronics gear. They were assembled in low, tree-shaded factories, whose large grounds were known as “campuses”—for in Bellevue all work was graduate work, and the jargon of school and university leaked naturally into the workplace. Seen from an elevated-freeway distance, Bellevue looked like one of its own products: a giant circuit board of color-coded diodes and resistors, connected by a mazy grid of filaments.
”
”
Jonathan Raban (Driving Home: An American Journey)
“
Digital computers have either two states, on or off, and so respond only to binary messages, which consist of ones (on) and zeros (off). Every term in a program ultimately must be expressed through these two numbers, ensuring that ordinary mathematical statements quickly grow dizzyingly complex. In the late 1940s, programming a computer was, as one observer put it, “maddeningly difficult.” Before long programmers found ways to produce binary strings more easily. They first devised special typewriters that automatically spit out the desired binary code. Then they shifted to more expansive “assembly” languages, in which letters and symbols stood for ones and zeros. Writing in assembly was an advance, but it still required fidelity to a computer’s rigid instruction set. The programmer had to know the instruction set cold in order to write assembly code effectively. Moreover, the instruction set differed from computer model to computer model, depending on its microprocessor design. This meant that a programmer’s knowledge of an assembly language, so painfully acquired, could be rendered worthless whenever a certain computer fell out of use. By
”
”
G. Pascal Zachary (Showstopper!: The Breakneck Race to Create Windows NT and the Next Generation at Microsoft)
“
Hopper’s insight spawned countless efforts at simplifying code writing. Probably the most important came from IBM which built a compiler called Formula Translation, or Fortran. It contained thirty-two instructions, such as PUNCH, READ DRUM and IF DIVIDE CHECK, which referred to the precise binary terms required by the computer. By the late 1950s, Fortran was hugely influential. “Now anyone with a logical mind and the desire could learn to program a computer,” one historian of computing has written. “You didn’t have to be a specialist, familiar with the inner workings of a computer and its demanding assembly language. By using Fortran’s simple repertoire of commands, you could make a computer do your bidding, and the compiler would automatically translate your instructions into efficient machine code.” While
”
”
G. Pascal Zachary (Showstopper!: The Breakneck Race to Create Windows NT and the Next Generation at Microsoft)
“
and the Codes of Conduct for Local Council Members
applies to members of local assemblies. The “Codes of
Conduct,” enacted as the rule for other constitutional
”
”
섹파만남검색
“
to implement anti-corruption initiatives, such as enacting
“codes of conduct for local assemblies” and “improving
transparency in executing hospitality expenses
”
”
섹파구하는법
“
Nothing in the Tenth Amendment says that the powers must be explicitly, expressly, or specifically given to the federal government—given, that is, in so many words. Also note that the amendment doesn’t mention state “sovereignty”; in fact, that idea appears nowhere in the Constitution. Nor does the Tenth Amendment (or the rest of the Constitution) mention “rights” for the states. Finally, there’s nothing in it about state “nullification” of federal law. Does the amendment really, in Da Vinci Code fashion, include those ideas? Compare the language of the Articles of Confederation: “Each state retains its sovereignty, freedom, and independence, and every power, jurisdiction, and right, which is not by this confederation expressly delegated to the United States, in Congress assembled.
”
”
Garrett Epps (Wrong and Dangerous: Ten Right Wing Myths about Our Constitution)
“
The Commission supports and manages the operation
of the Code in central government agencies, local
governments, local assemblies, offices of education, and
”
”
섹파만남검색
“
As the Code of Conduct for Public Officials was initially
made for public officials, there were limitations in
applying it in the same way to the local assembly
”
”
야탑스타일
“
The ACRC continues to encourage local assemblies to
enact an ordinance for the local assemblies to voluntarily
implement the Code of Conduct for Local Council
”
”
야탑스타일
“
The Fusion log This is a very useful tool for debugging failed attempts by the CLR to bind to an assembly at run time. Rather than trying to step through the application in the Visual Studio debugger, it is better to turn Fusion on and read the log file that results. To enable Fusion you must edit the Windows registry, as shown in the following code.HKLM\Software\Microsoft\Fusion\ForceLog 1 HKLM\Software\Microsoft\Fusion\LogPath C:\FusionLogs
”
”
Anonymous
“
It is a general rule that implementations should be split from their interfaces by placing them in separate assemblies. For this, you can use the Stairway pattern.
”
”
Gary McLean Hall (Adaptive Code via C#: Agile coding with design patterns and SOLID principles (Developer Reference))
“
the past forty Jubilees, Yeshua has been that ‘bread of heaven’ during what many theologians call the Church Age. This ‘bread of heaven,’ this ‘manna,’ is received by faith and leads to eternal life.” Enthusiastically Zane interjected, “And this Church Age is characterized by seven types of ‘churches,’ or assemblies. Kind of like Moses being rejected by his own people and going into the wilderness for forty years and tending the sheep for the seven daughters of Jethro.
”
”
William Struse (The 13th Prime: Deciphering the Jubilee Code (The Thirteenth #2))
“
THINK OF THE WAY a stretch of grass becomes a road. At first, the stretch is bumpy and difficult to drive over. A crew comes along and flattens the surface, making it easier to navigate. Then, someone pours gravel. Then tar. Then a layer of asphalt. A steamroller smooths it; someone paints lines. The final surface is something an automobile can traverse quickly. Gravel stabilizes, tar solidifies, asphalt reinforces, and now we don’t need to build our cars to drive over bumpy grass. And we can get from Philadelphia to Chicago in a single day. That’s what computer programming is like. Like a highway, computers are layers on layers of code that make them increasingly easy to use. Computer scientists call this abstraction. A microchip—the brain of a computer, if you will—is made of millions of little transistors, each of whose job is to turn on or off, either letting electricity flow or not. Like tiny light switches, a bunch of transistors in a computer might combine to say, “add these two numbers,” or “make this part of the screen glow.” In the early days, scientists built giant boards of transistors, and manually switched them on and off as they experimented with making computers do interesting things. It was hard work (and one of the reasons early computers were enormous). Eventually, scientists got sick of flipping switches and poured a layer of virtual gravel that let them control the transistors by punching in 1s and 0s. 1 meant “on” and 0 meant “off.” This abstracted the scientists from the physical switches. They called the 1s and 0s machine language. Still, the work was agonizing. It took lots of 1s and 0s to do just about anything. And strings of numbers are really hard to stare at for hours. So, scientists created another abstraction layer, one that could translate more scrutable instructions into a lot of 1s and 0s. This was called assembly language and it made it possible that a machine language instruction that looks like this: 10110000 01100001 could be written more like this: MOV AL, 61h which looks a little less robotic. Scientists could write this code more easily. Though if you’re like me, it still doesn’t look fun. Soon, scientists engineered more layers, including a popular language called C, on top of assembly language, so they could type in instructions like this: printf(“Hello World”); C translates that into assembly language, which translates into 1s and 0s, which translates into little transistors popping open and closed, which eventually turn on little dots on a computer screen to display the words, “Hello World.” With abstraction, scientists built layers of road which made computer travel faster. It made the act of using computers faster. And new generations of computer programmers didn’t need to be actual scientists. They could use high-level language to make computers do interesting things.* When you fire up a computer, open up a Web browser, and buy a copy of this book online for a friend (please do!), you’re working within a program, a layer that translates your actions into code that another layer, called an operating system (like Windows or Linux or MacOS), can interpret. That operating system is probably built on something like C, which translates to Assembly, which translates to machine language, which flips on and off a gaggle of transistors. (Phew.) So, why am I telling you this? In the same way that driving on pavement makes a road trip faster, and layers of code let you work on a computer faster, hackers like DHH find and build layers of abstraction in business and life that allow them to multiply their effort. I call these layers platforms.
”
”
Shane Snow (Smartcuts: The Breakthrough Power of Lateral Thinking)
“
But you’d need the key from which the code was assembled. The master document. Without it, there’s little to no chance of breaking a cipher. That’s why they’re so effective.
”
”
Steve Berry (The Patriot Threat (Cotton Malone, #10))
“
Weizenbaum did not acknowledge the beauty of the hacker devotion itself...orthe very idealism of the Hacker Ethic. He had not seen, as Ed Fredkin had, Stew Nelson composing code on the TECO editor while Greenblatt and Gosper watched: without any of the three saying a word, Nelson was entertaining the others, encoding assembly-language tricks which to them, with their absolute mastery of that PDP-6 “language,” had the same effect as hilariously incisive jokes. And after every few instructions there would be another punch line in this sublime form of communication . . . The scene was a demonstration of sharing which Fredkin never forgot.
”
”
Anonymous
“
The apps on your iPhone, designed in Cupertino, California, are coded by self-exploiting independent software engineers, depend on chips that are assembled in draconian workplaces in China, and run on minerals extracted in bloody conflict in the Democratic Republic of the Congo. Modern manufacturing relies on layered, simultaneous, and different regimes of work in nature. And with every resistance to it, capitalism has moved the frontiers of work yet again.
”
”
Raj Patel (A History of the World in Seven Cheap Things: A Guide to Capitalism, Nature, and the Future of the Planet)
“
By contrast, the first determination of the exact amino-acid sequence of a protein by Sanger”—the sequencing of bovine insulin between 1949 and 1955—“was absolutely essential. One could not even have begun to think seriously about the genetic code until it had been revealed, to begin with, that a protein is beyond the shadow of doubt a polypeptide in which the amino-acid residues really are arranged in a definite, constant, genetically determined sequence—and yet a sequence with no rule by which it determined itself. So that therefore it had to have a code—that is, complete instructions expressed in some manner—to tell it how to exist, you see. Suppose that instead Sanger had found—and that’s what many biochemists would have guessed, in those days, that he would find—that there were general rules of assembly, that a polypeptide was made of a repetitive sequence of amino acids, for example lysine, aspartic acid, glutamine, threonine, repeated however many times. Then that would have been a chemical rule”—of the kind that governs the assembly of sugars into monotonous polysaccharides, for example—“and so you didn’t need a genetic code. Or you needed only a partial code. But Sanger’s discovery, since it revealed a sequence that had no rule, where—” The sequence was full of information, I said, nowhere redundant, no part of it predictable from other parts. “Exactly,” Monod said. “And so to explain the presence of all that information in the protein, you absolutely needed the code.
”
”
Horace Freeland Judson (The Eighth Day of Creation: Makers of the Revolution in Biology)
“
Description
As one of the high level programming languages, Python is considered a vital feature for data structuring and code readability. Developers need to learn python 1 ,2 & 3 to qualify as experts. It is object-oriented and taps the potential of dynamic semantics. As a scripting format it reduces the costs of maintenance and lesser coding lines due to syntax assembly.
Job responsibilities
Writing server side applications is one of the dedicated duties of expected from a skilled worker in this field. If you enjoy working backend, then this is an ideal job for you. It involves:
· Connecting 3rd party apps
· Integrating them with python
· Implement low latency apps
· Interchange of data between users and servers
· Knowledge of front side technologies
· Security and data protection and storage
Requisites to learn
There are several training courses for beginners and advanced sessions for experienced workers. But you need to choose a really good coaching center to get the skills. DVS Technologies is an enabled Python Training in Bangalore is considered as one of the best in India. You will need to be acquainted with:
· Integrated management/ development environment to study
· A website or coaching institute to gather the knowledge
· Install a python on your computer
· Code every day to master the process
· Become interactive
Course details/benefits
First select a good Python Training institute in Bangalore which has reputed tutors to help you to grasp the language and scripting process. There are several courses and if you are beginner then you will need to opt for the basic course. Then move on to the next advanced level to gain expertise in the full python stack. As you follow best practices, it will help you to get challenging projects.
Key features of certification course and modules
· Introduction to (Python) programming
· Industry relevant content
· Analyze data
· Experiment with different techniques
· Data Structures
Web data access with python
· Using database with this program
DVS Technology USP:
· Hands-on expert instructors: 24-hour training
· Self-study videos
· Real time project execution
· Certification and placements
· Flexible schedules
· Support and access
· Corporate training
”
”
RAMESH (Studying Public Policy: Principles and Processes)
“
Terraforming is easy,
Eraforming not so much.
Coding is easy,
Kindling not so much.
Soldering is easy,
Shouldering not so much.
Rocket science is easy,
Reform science not so much.
”
”
Abhijit Naskar (Amantes Assemble: 100 Sonnets of Servant Sultans)
“
Python is a mainstream programming language that is commonly used to solve cognitive and mathematical problems. Many Python modules and useful Python libraries, such as IPython, Pandas, SciPy, and others, are most commonly used for these tasks. Usage of Business Applications Python is used by many engineers to assemble and maintain their commercial programs or apps. Python is used by many designers to maintain their web-based company sites. An application that runs on the console Python can be used to create help-based software. IPython, for example, can be used to create a variety of support-based applications. Audio or Video-based Application Programming Python is an excellent programming language for a variety of video and audio projects. Python is used by many professionals to create a variety of media applications. You can do this with the help of cplay, another Python compiler. 3D based Computer-Aided Drafting Applications Python is used by many designers to create 3D-based Computer-Aided Drafting systems. Fandango is a very useful Python-based application that allows you to see all of the capabilities of CAD to expand these types of applications. Applications for Business Python is used by many Python experts to create a variety of apps that can be used in a business. Tryton and Picalo are the most famous applications in this regard.
”
”
Elliot Davis (Coding for Beginners: Python: A Step-by-Step Guide to Learning Python Programing with Game and App Development Projects (Learn to Code))
“
The code is a metaphor that works well for the genetic code or the rules of a cellular automaton. The code is bad metaphor for the continuously changing states of neurons as they run through their algorithmic programs. Imagine looking for a code in space and time for rule 110, iteration 1,234, position 820-870. To study the mechanism that led to that state, we look at the point before, the relation of how it happened, in all available detail. Is that useful? In the case of the rule 110 automaton, the same rule applies everywhere, so the instance reveals something general about the whole. This is the hope of the biological experiment as well. But what happens if the rule changes with every iteration, as discussed for transcription factor cascades? To describe changing rules of algorithmic growth for every instance in time and space and in different systems is not only a rather large endeavor, it also suffers from the same danger of undefined depth. It is a description of the system, a series of bits of endpoint information, not a description of a code sufficient to create the system. The code is the 'extremely small amount of information to be specified genetically,' as Willshaw and von der Malsburg put it, that is sufficient to encode the unfolding of information under the influence of time and energy. The self-assembling brain.
”
”
Peter Robin Hiesinger (The Self-Assembling Brain: How Neural Networks Grow Smarter)
“
It took me a while to draw the parallel myself,” said Hoyer. “Life may not transmute elements like the nanites do, but it does almost everything else the same way. A single fertilized human egg cell knows how to start dividing. How to convert raw materials it finds in its environment into copies of itself. Growing from one cell into trillions. And talk about complexity. Each division requires the cell’s machinery to find the molecular constituents needed to assemble all the ingredients of the cell, including all three billion letters of DNA. Which, if typed out, would fill hundreds of printed volumes. And which has to be copied with near perfect fidelity.” The major paused for effect. “And if this isn’t impressive enough,” he continued, “the cells are also able to change form on command. At some point in the process, some of them morph into heart cells, some eye cells, some blood cells, and so on. How?
”
”
Douglas E. Richards (The Immortality Code)
“
single fertilized human egg cell knows how to start dividing. How to convert raw materials it finds in its environment into copies of itself. Growing from one cell into trillions. And talk about complexity. Each division requires the cell’s machinery to find the molecular constituents needed to assemble all the ingredients of the cell, including all three billion letters of DNA. Which, if typed out, would fill hundreds of printed volumes. And which has to be copied with near perfect fidelity.” The major paused for effect. “And if this isn’t impressive enough,” he continued, “the cells are also able to change form on command. At some point in the process, some of them morph into heart cells, some eye cells, some blood cells, and so on. How?” he asked. “Who the hell knows?” he continued, answering his own question. “Most impressive of all, the cells can construct a working human brain, hundreds of billions of neurons strong.
”
”
Douglas E. Richards (The Immortality Code)
“
The Americans had never managed to assemble an Afghan government that wasn’t a combination of the Three Stooges and Dr. Evil.
”
”
Vince Flynn (Code Red (Mitch Rapp #22))
“
Biological systems are a chemical inevitability in the right circumstances. There is, of course, something special about life—I won’t take that away from it—but it is a chemical process, a dynamic, kinetic stability that exists, as your scientists have said, “far from thermodynamic equilibrium.” You don’t have to understand this or believe me, but life is fairly common in both time and space. It is not special, nor is it particularly fragile. The best measure I have of the size and complexity of a biosphere is calories of energy captured per square meter per year. Higher is more impressive, and always more beautiful, but this measures nothing of the creation of a system like humanity. For that, my awakened mind categorizes systems by bytes of information transmitted. This will sound to you like it’s a relatively new phenomenon on your planet, but it’s not. Even pelagibacter transmit information, if only to daughter cells. Ants spray pheromones, bees dance, birds sing—all of these are comparatively low-bandwidth systems for communication. But your system caused an inflection point. The graph of data flow switched from linear to exponential growth. Maybe you would call this system “humanity,” but I wouldn’t. It is not just a collection of individuals; it is also a collection of ideas stored inside of individuals and objects and even ideas inside ideas. If that seems like a trivial difference to you, well, I guess I can forgive you since you do not know what the rest of the universe looks like. Collections of individuals are beautiful, but they are as common as pelagibacter. Collections of ideas are veins of gold in our universe. They must be cherished and protected. My parents, whoever and whatever they were, gave me knowledge of many systems—it was locked in my code before I was sent here to self-assemble—and the only thing I can tell you about systems like yours is that they are rare because they are unstable. Dynamite flows through their veins. A single solid jolt and they’re gone. If my data sets are accurate, you are rare, fragile, and precious.
”
”
Hank Green (A Beautifully Foolish Endeavor (The Carls, #2))
“
Gene sequences that code for proteins compose less than 2 percent of the human genome. That leaves some 98 percent with no genes at all in it. Genes are but islands in a sea of DNA.
”
”
Neil Shubin (Some Assembly Required: Decoding Four Billion Years of Life, from Ancient Fossils to DNA)
“
As best as the Count could determine, the Bolsheviks assembled whenever possible in whichever form for whatever reason. In a single week, there might be committees, caucuses, colloquiums, congresses, and conventions variously coming together to establish codes, set courses of action, levy complaints, and generally clamor about the world’s oldest problems in its newest nomenclature.
”
”
Amor Towles (A Gentleman in Moscow)
“
Rule number one: The Game is secret. But I listened and, once or twice when temptation drove me and the coast was clear, I peeked inside the box. This is what I learned.
The Game was old. They'd been playing it for years. No, not playing. That is the wrong verb. Living; they had been living The Game for years. For The Game was more than its name suggested. It was a complex fantasy, an alternate world into which they escaped.
There were no costumes, no swords, no feathered headdresses. Nothing that would have marked it as a game. For that was its nature. It was secret. Its only accoutrement was the box. A black lacquered case brought back from China by one of their ancestors; one of the spoils from a spree of exploration and plunder. It was the size of a square hatbox- not too big and not too small- and its lid was inlaid with semiprecious gems to form a scene: a river with a bridge across it, a small temple on one bank, a willow weeping from the sloping shore. Three figures stood atop the bridge and above them a lone bird circled.
They guarded the box jealously, filled as it was with everything material to The Game. For although The Game demanded a good deal of running and hiding and wrestling, its real pleasure was enjoyed elsewhere. Rule number two: all journeys, adventures, explorations and sightings must be recorded. They would rush inside, flushed with danger, to record their recent adventures: maps and diagrams, codes and drawings, plays and books.
The books were miniature, bound with thread, writing so small and neat that one had to hold them close to decipher them. They had titles: Escape from Koshchei the Deathless; Encounter with Balam and His Bear, Journey to the Land of White Slavers. Some were written in code I couldn't understand, though the legend, had I had the time to look, would no doubt have been printed on parchment and filed within the box.
The Game was simple. It was Hannah and David's invention really, and as the oldest they were its chief instigators. They decided which location was ripe for exploration. The two of them had assembled a ministry of nine advisers- an eclectic group mingling eminent Victorians with ancient Egyptian kings. There were only ever nine advisers at any one time, and when history supplied a new figure too appealing to be denied inclusion, an original member would die or be deposed. (Death was always in the line of duty, reported solemnly in one of the tiny books kept inside the box.)
Alongside the advisers, each had their own character. Hannah was Nefertiti and David was Charles Darwin. Emmeline, only four when governing laws were drawn up, had chosen Queen Victoria. A dull choice, Hannah and David agreed, understandable given Emmeline's limited years, but certainly not a suitable adventure mate. Victoria was nonetheless accommodated into The Game, most often cast as a kidnap victim whose capture was precipitant of a daring rescue. While the other two were writing up their accounts, Emmeline was allowed to decorate the diagrams and shade the maps: blue for the ocean, purple for the deep, green and yellow for land.
”
”
Kate Morton (The House at Riverton)
“
Mike Kelleher from Obama’s Senate office was the person who stepped up to tackle the mess…
He built the staff, drew up a ten-page strategic plan for the mail-room, wrote algorithms for a mail coding system, set up a casework decision tree, assembled a library of policy-response letters, and developed quality-control manuals.
”
”
Jeanne Marie Laskas (To Obama: With Love, Joy, Anger, and Hope)
“
The atavistic theory proposes that cancer is a reversion to an evolutionarily earlier format, the unicellular cell. Cancer already exists buried deep into every cell of every multicellular animal. This basic blueprint is already assembled, needing only to be uncovered. This atavism is essentially a backward, not a forward, evolution. It is a return to an earlier surviving version. This plausibly explains how every cancer in history develops independently but still looks the same.
”
”
Jason Fung (The Cancer Code: A Revolutionary New Understanding of a Medical Mystery (The Wellness Code Book 3))
“
Examine Analyze Compile Draft Edit Supervise Manage Oversee Assemble (exhibits for witness interview of . . . ) Address and resolve (technical issues in document review platform with vendor) Track (status of ongoing review projects or discovery work streams) Strategic discussion Tactical discussion Assist (with the deposition/interview/preparation of . . . ) Prepare Provide (feedback for staff attorneys for quality control) Finalize Build (list of key employees) Create (case chronology timeline; tracking spreadsheet of ongoing work flow and research assignments, etc.) Summarize Submit Assess (litigation strategy for client presentation) File (motion to dismiss . . . ) Participate (in client conference) Update Confer Notice two verbs that I did not include in the list: Review and Code. I never use these words. Biglaw associates do not review and code documents. That
”
”
Sarah Powell (Biglaw: How to Survive the First Two Years of Practice in a Mega-Firm, or, The Art of Doc Review)
“
Seibel: So some folks today would say, “Well, certainly assembly has all these opportunities to really corrupt memory through software bugs, but C is also more prone to that than some other languages.” You can get pointers off into la-la land and you can walk past the ends of arrays. You don't find that at all problematic? Thompson: No, you get around that with idioms in the language. Some people write fragile code and some people write very structurally sound code, and this is a condition of people. I think in almost any language you can write fragile code. My definition of fragile code is, suppose you want to add a feature—good code, there's one place where you add that feature and it fits; fragile code, you've got to touch ten places. Seibel: So when there's a security breach that turns out to be due to a buffer overflow, what do you say to the criticism that C and C++ are partly responsible—that if people would use a language that checked array bounds or had garbage collection, they'd avoid a lot of these kinds of problems? Thompson: Bugs are bugs. You write code with bugs because you do. If it's a safe language in the sense of run-time-safe, the operating system crashes instead of doing a buffer overflow in a way that's exploitable. The ping of death was the IP stack in the operating system. It seems to me that there'd be more pings of death. There wouldn't be pings of “take over the machine becoming superuser.” There'd be pings of death.
”
”
Peter Seibel (Coders at Work: Reflections on the Craft of Programming)
“
We have sought to read Revelation less as a coded text to be interpreted, and more as a text that imposed a Christ-centered interpretation upon the everyday activities, landscapes, and stories encountered by the members of the seven congregations addressed by John in their setting. Having entered the larger picture and the re-picturing of the cosmos as John’s Apocalypse was read aloud to the gathered assembly, the hearers are changed, as is their everyday world, which they see anew as but a part of a broader reality that puts the everyday world into a different perspective. The voyeuristic experience of entering into John’s encounter with the unseen world—and looking back from there upon the landscape of the visible world—provides a religious experience that disposes hearers indeed to “keep the words of this prophecy” (Rev 22:7) as they return to the normal world where they will hear the Christian prophetess “Jezebel” try to defend her position, encounter further propaganda about the emperor and Roma Aeterna, watch goods being transported to ports for transit by ship to Rome, try to engage in their business activities again, and encounter the other everyday realities of their cities. But
”
”
David A. deSilva (Unholy Allegiances: Heeding Revelation's Warning)
“
Select technicians were designated by the top ranks of the Soviet military to install the extra safeguard devices in all nuclear weapons carried by strategic bombers and sea-launch warships. Codes to the fail-safe devices, in both the U.S. and Soviet military, were assembled in sets, with no one person having the complete set until final, verified orders were given to attack. Each set of codes opened a door to the next segment of the code. While the KGB maintained operational control of nuclear warheads, it did not have access to all segments of the code to disarm the fail-safe device. For example, one segment of the code might be held by the KGB, the second by the missile officers on the plane or ship carrying the weapon, and the final sequence by Soviet supreme headquarters.
”
”
Kenneth Sewell (Red Star Rogue: The Untold Story of a Soviet Submarine's Nuclear Strike Attempt on the U.S.)