“
We must not see any person as an abstraction. Instead, we must see in every person a universe with its own secrets, with its own treasures, with its own sources of anguish, and with some measure of triumph. —ELIE WIESEL from The Nazi Doctors and the Nuremberg Code
”
”
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
“
When someone chooses to lift the curtain on a perceived imperfection in her story, on a circumstance or condition that traditionally might be considered to be a weakness, what she’s often actually revealing is the source code for her steadiness and strength.
”
”
Michelle Obama (The Light We Carry: Overcoming in Uncertain Times)
“
Even calling DNA “source code” sells it short—compared to DNA, our most complex programming projects are like pocket calculators.
”
”
Randall Munroe (What If?: Serious Scientific Answers to Absurd Hypothetical Questions)
“
The truth is that just as - biologically - males and females are never victims of one another but both victims of the species, so man and wife together undergo the oppression of an institution they did not create. If it is asserted that men oppress women, the husband is indignant; he feels that he is the one who is oppressed - and he is; but the fact is that it is the masculine code, it is the society developed by the males and in their interest, that has established woman's situation in a form that is at present a source of torment for both sexes.
”
”
Simone de Beauvoir (The Second Sex)
“
To the Ultimate Inspiration of the Cosmic Code, The Source of Creativity and Nuanced Realization The Divine Mentor and Channeling Force
Of Awakening and Transformation
”
”
Mohamad Jebara (The Life of the Qur'an: From Eternal Roots to Enduring Legacy)
“
Do I believe in an old man in the clouds with a white beard judging us mortals with a moral code from one to ten? Good Lord no, my sweet Elly, I do not! I would have been cast out from this life years ago with my tatty history. Do I believe in a mystery; the unexplained phenomenon that is life itself? The greater something that illuminates inconsequence in our lives; that gives us something to strive for as well as the humility to brush ourselves down and start all over again? Then yes, I do. It is the source of art, of beauty, of love, and proffers the ultimate goodness to mankind. That to me is God. That to me is life. That is what I believe in.
”
”
Sarah Winman
“
Life would be much easier if I had the source code.
”
”
Anonymous
“
learn to program by looking at good programs — not just at what they do, but at the source code.
”
”
Paul Graham (Hackers & Painters: Big Ideas from the Computer Age)
“
I confess that I am now suspicious of nearly every attempt to code anger as unhealthy, no matter how well meaning or persuasive the source. I believe Stanton was correct: what is bad for women, when it comes to anger, are the messages that cause us to bottle it up, let it fester, keep it silent, feel shame, and isolation for ever having felt it or re-channel it in inappropriate directions. What is good for us is opening our mouths and letting it out, permitting ourselves to feel it and say it and think it and act on it and integrate it into our lives, just as we integrate joy and sadness and worry and optimism.
”
”
Rebecca Traister (Good and Mad: The Revolutionary Power of Women's Anger)
“
One study found that in more than 85% of the open source projects the researchers examined on GitHub, less than 5% of developers were responsible for over 95% of code and social interactions.7
”
”
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
“
Women are instinctively motivated by perfection, and the need to be perceived as perfect enough to be pleasing — and therefore, protected and provided for. But not too perfect so as to cause jealousy in other women. This is the source of our drive to improve ourselves, and our fear of standing out at the same time.
”
”
Alison A. Armstrong (The Queen's Code)
“
But just as tweets are easy to read and retweet without context as to who wrote them, code is easy to copy-paste without knowing, or caring, where it came from.
”
”
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
“
According to my sources," Megan says, which I'm pretty sure is code for I hacked into the police mainframe, but please don't tell my mom...
”
”
Ally Carter (See How They Run (Embassy Row, #2))
“
We must not see any person as an abstraction.
Instead, we must see in every person a universe with its own secrets,
with its own treasures, with its own sources of anguish,
and with some measure of triumph. —ELIE WIESEL
from The Nazi Doctors and the Nuremberg Code
”
”
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
“
So it is customary to see in a mother’s ideals and intensity of ambition what is carried out by one or another of her children. According to biographers, the source of success appears to lie in a mother’s doting—or in her neglectful selfishness, which forces an offspring out on its own.
”
”
James Hillman (The Soul's Code: In Search of Character and Calling)
“
The Joel Test
1. Do you use source control?
2. Can you make a build in one step?
3. Do you make daily builds?
4. Do you have a bug database?
5. Do you fix bugs before writing new code?
6. Do you have an up-to-date schedule?
7. Do you have a spec?
8. Do programmers have quiet working conditions?
9. Do you use the best tools money can buy?
10. Do you have testers?
11. Do new candidates write code during their interview?
12. Do you do hallway usability testing?
”
”
Joel Spolsky (Joel on Software)
“
The intelligence we will create from the reverse-engineering of the brain will have access to its own source code and will be able to rapidly improve itself in an accelerating iterative design cycle. Although there is considerable plasticity in the biological human brain, as we have seen, it does have a relatively fixed architecture, which cannot be significantly modified, as well as a limited capacity. We are unable to increase its 300 million pattern recognizers to, say, 400 million unless we do so nonbiologically. Once we can achieve that, there will be no reason to stop at a particular level of capability. We can go on to make it a billion pattern recognizers, or a trillion.
”
”
Ray Kurzweil
“
the bank had expanded its services in recent years to offer anonymous computer source code escrow services and faceless digitized backup.
”
”
Dan Brown (The da Vinci Code (Robert Langdon, #2))
“
As a software engineer, how do you feel if your code was running in the production environment being used by millions of customers 30 minutes after you commit it to source control?
”
”
Paul Swartout (Continuous delivery and DevOps: A Quickstart Guide)
“
The Dependency Inversion Principle (DIP) tells us that the most flexible systems are those in which source code dependencies refer only to abstractions, not to concretions.
”
”
Robert C. Martin (Clean Architecture: A Craftsman's Guide to Software Structure and Design)
“
UTSL for "use the source, Luke!" a Star Wars-ian way of suggesting that people read the source code before asking questions about it
”
”
Gretchen McCulloch (Because Internet: Understanding the New Rules of Language)
“
Does that mean that religious texts are worthless as guides to ethics? Of course not. They are magnificent sources of insight into human nature, and into the possibilities of ethical codes. Just as we should not be surprised to discover that ancient folk medicine has a great deal to teach modern hightech medicine, we should not be surprised if we find that these great religious texts hold versions of the very best ethical systems any human culture will ever devise. But, like folk medicine, we should test it all carefully, and take nothing whatever on faith.
”
”
Daniel C. Dennett (Darwin's Dangerous Idea: Evolution and the Meaning of Life)
“
If it is said men oppress women, the husband reacts indigntantly; he feels oppressed: he is; but in fact, it is the masculine code, the society developed by males and in their interest, that has defined the feminine condition in a form that is now for both sexes a source of distress.
”
”
Simone de Beauvoir
“
The theory behind open source is simple. In the case of an operating system, the source code-the programming instructions underlying the system-is free. Anyone can improve it, change it, exploit it. But those improvements, changes, and exploitations have to be made freely available. Think Zen. The project belongs to no one and to everyone. When a project is opened up, there is rapid and continual improvement. With teams of contributors working in parallel, the results can happen far more speedily and success fully than if the work were being conducted behind closed doors.
”
”
Linus Torvalds (Just for Fun: The Story of an Accidental Revolutionary)
“
We can achieve a sort of control under which the controlled, though they are following a code much more scrupulously than was ever the case under the old system, nevertheless feel free. They are doing what they want to do, not what they are forced to do. That's the source of the tremendous power of positive reinforcement-- there's no restraint and no revolt. By careful cultural design, we control not the final behavior, but the inclination to behave-- the motives, desires, the wishes.
”
”
B.F. Skinner (Walden Two (Hackett Classics))
“
The great religions are also, and tragically, sources of ceaseless and unnecessary suffering. They are impediments to the grasp of reality needed to solve most social problems in the real world. Their exquisitely human flaw is tribalism. The instinctual force of tribalism in the genesis of religiosity is far stronger than the yearning for spirituality. People deeply need membership in a group, whether religious or secular. From a lifetime of emotional experience, they know that happiness, and indeed survival itself, require that they bond with others who share some amount of genetic kinship, language, moral beliefs, geographical location, social purpose, and dress code—preferably all of these but at least two or three for most purposes. It is tribalism, not the moral tenets and humanitarian thought of pure religion, that makes good people do bad things.
”
”
Edward O. Wilson (The Meaning of Human Existence)
“
It’s impossible to overstate the unearned privilege I enjoyed: to be born in the rich United States is a big part of a winning birth lottery ticket, as is being born white and male in a society that advantages white men.
”
”
Bill Gates (Source Code: My Beginnings)
“
A network can be destroyed by noises that attack and transform it, if the codes in place are unable to normalize and repress them. Although the new order is not contained in the structure of the old, it is nonetheless not a product of chance. It is created by the substitution of new differences for the old differences. Noise is the source of these mutations in the structuring codes. For despite the death it contains, noise carries order within itself; it carries new information. This may seem strange. But noise does in fact create a meaning: first, because the interruption of a message signifies the interdiction of the transmitted meaning, signifies censorship and rarity; and second, because the very absence of meaning in pure noise or in the meaningless repetition of a message, by unchanneling auditory sensations, frees the listener’s imagination. The absence of meaning is in this case the presence of all meanings, absolute ambiguity, a construction outside meaning. The presence of noise makes sense, makes meaning. It makes possible the creation of a new order on another level of organization, of a new code in another network.
”
”
Jacques Attali (Noise: The Political Economy of Music)
“
Jonathan Sacks; “One way is just to think, for instance, of biodiversity. The extraordinary thing we now know, thanks to Crick and Watson’s discovery of DNA and the decoding of the human and other genomes, is that all life, everything, all the three million species of life and plant life—all have the same source. We all come from a single source. Everything that lives has its genetic code written in the same alphabet. Unity creates diversity. So don’t think of one God, one truth, one way. Think of one God creating this extraordinary number of ways, the 6,800 languages that are actually spoken. Don’t think there’s only one language within which we can speak to God. The Bible is saying to us the whole time: Don’t think that God is as simple as you are. He’s in places you would never expect him to be. And you know, we lose a bit of that in English translation. When Moses at the burning bush says to God, “Who are you?” God says to him three words: “Hayah asher hayah.”Those words are mistranslated in English as “I am that which I am.” But in Hebrew, it means “I will be who or how or where I will be,” meaning, Don’t think you can predict me. I am a God who is going to surprise you. One of the ways God surprises us is by letting a Jew or a Christian discover the trace of God’s presence in a Buddhist monk or a Sikh tradition of hospitality or the graciousness of Hindu life. Don’t think we can confine God into our categories. God is bigger than religion.
”
”
Krista Tippett (Becoming Wise: An Inquiry into the Mystery and Art of Living)
“
Not caring about our own pain and the pain of others is not working. How much longer are we willing to keep pulling drowning people out of the river one by one, rather than walking to the headwaters of the river to find the source of the pain? What will it take for us to let go of that earned self-righteousness and travel together to the cradle of the pain that is throwing all of us in at such a rate that we couldn’t possibly save everyone? Pain is unrelenting. It will get our attention. Despite our attempts to drown it in addiction, to physically beat it out of one another, to suffocate it with success and material trappings, or to strangle it with our hate, pain will find a way to make itself known. Pain will subside only when we acknowledge it and care for it. Addressing it with love and compassion would take only a minuscule percentage of the energy it takes to fight it, but approaching pain head-on is terrifying. Most of us were not taught how to recognize pain, name it, and be with it. Our families and culture believed that the vulnerability that it takes to acknowledge pain was weakness, so we were taught anger, rage, and denial instead. But what we know now is that when we deny our emotion, it owns us. When we own our emotion, we can rebuild and find our way through the pain. Sometimes owning our pain and bearing witness to struggle means getting angry. When we deny ourselves the right to be angry, we deny our pain. There are a lot of coded shame messages in the rhetoric of “Why so hostile?” “Don’t get hysterical,” “I’m sensing so much anger!” and “Don’t take it so personally.” All of these responses are normally code for Your emotion or opinion is making me uncomfortable or Suck it up and stay quiet. One response to this is “Get angry and stay angry!” I haven’t seen that advice borne out in the research. What I’ve found is that, yes, we all have the right and need to feel and own our anger. It’s an important human experience.
”
”
Brené Brown (Braving the Wilderness: The Quest for True Belonging and the Courage to Stand Alone)
“
There was a time, back in the sixties, when commenting-out code might have been useful. But we’ve had good source code control systems for a very long time now. Those systems will remember the code for us. We don’t have to comment it out any more. Just delete the code. We won’t lose it. Promise.
”
”
Robert C. Martin (Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series))
“
In the context of fiercely monolingual dominant cultures like that of the United States, code-switching lays claim to a form of cultural power: the power to own but not be owned by the dominant language...Code-switching is a rich source of wit, humour, puns, word play, and games of rhythm and rhyme.
”
”
Mary Louise Pratt
“
Do you believe in God, Arthur?" I said, eating the last piece of sponge.
"Do I believe in an old man in the clouds with a white beard judging us mortals with a moral code from one to ten? Good Lord no, my sweet Elly, I do not! Do I believe in a mystery; the unexplained phenomenon that is life itself? The greater something that illuminates inconsequence in our lives; that gives us something to strive for as well as the humility to brush ourselves down and start all over again? Then yes, I do. It is the source of art, of beauty, of love, and proffers the ultimate goodness to mankind. That to me is God.That to me is life. That is what I believe in.
”
”
Sarah Winman (When God Was a Rabbit)
“
In OSW, the source code of warfare is available for anyone who is interested in both modifying and extending it. This means the tactics, weapons, strategies, target selection, planning methods, and team dynamics are all open to community improvement. Global guerrillas can hack at the source code of warfare to their hearts’ delight.
”
”
John Robb (Brave New War: The Next Stage of Terrorism and the End of Globalization)
“
Flow may be the biggest neurochemical cocktail of all. The state appears to blend all six of the brain’s major pleasure chemicals and may be one of the few times you get all six at once. This potent mix explains why people describe flow as their “favorite experience,” while psychologists refer to it as “the source code of intrinsic motivation.
”
”
Steven Kotler (The Art of Impossible: A Peak Performance Primer)
“
We want to avoid forcing our readers to hop around through our source files and classes.
”
”
Robert C. Martin (Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series))
“
Just like in real life, in code, a feature is triggered by an action (command) that results in a sequence of events that might or might not cause side effects.
”
”
Greg Young (Exploring CQRS and Event Sourcing)
“
A blanket could be used to crack the code of love. What is it, where do I find it, and how much do I charge people to buy it once I do find a reliable source?
”
”
Jarod Kintz (Brick and Blanket Test in Brick City (Ocala) Florida)
“
Love & Gratitude” is not a slogan but an action. If you are sometimes being grateful and sometimes not, it creates a poor connection to the source of positive energy.
”
”
Ted Sun (Super Life Secret Codes: Take Control of Life and Achieve Success through Energy Management)
“
By 2009 the Debian version 5.0 of GNU/Linux had 324 million source lines of code, and one study estimated that it would have cost about $8 billion to develop by conventional means
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
This wasn’t the only mistake they made. They also botched the cleanup operation on the servers they could access. They had created a script called LogWiper.sh to erase activity logs on the servers to prevent anyone from seeing the actions they had taken on the systems. Once the script finished its job, it was also supposed to erase itself, like an Ouroboros serpent consuming its own tail. But the attackers bungled the delete command inside the script by identifying the script file by the wrong name. Instead of commanding the script to delete LogWiper.sh, they commanded it to delete logging.sh. As a result, the LogWiper script couldn’t find itself and got left behind on servers for Kaspersky to find. Also left behind by the attackers were the names or nicknames of the programmers who had written the scripts and developed the encryption algorithms and other infrastructure used by Flame. The names appeared in the source code for some of the tools they developed. It was the kind of mistake inexperienced hackers would make, so the researchers were surprised to see it in a nation-state operation. One, named Hikaru, appeared to be the team leader who created a lot of the server code,
”
”
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
“
Every change that is made to an application’s configuration, source code, environment, or data, triggers the creation of a new instance of the pipeline. One of the first steps in the pipeline is to create binaries and installers. The rest of the pipeline runs a series of tests on the binaries to prove that they can be released. Each test that the release candidate passes gives us more confidence that this particular combination of binary code, configuration information, environment, and data will work. If the release candidate passes all the tests, it can be released. The deployment pipeline has its foundations in the process of continuous integration and is in essence the principle of continuous integration taken to its logical conclusion. The aim of the deployment pipeline is threefold. First, it makes every part of the process of building, deploying, testing, and releasing software visible to everybody involved, aiding collaboration. Second, it improves feedback so that problems are identified, and so resolved, as early in the process as possible. Finally, it enables teams to deploy and release any version of their software to any environment at will through a fully automated process.
”
”
David Farley (Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation)
“
Pico mentioned who you’re meeting tonight. Ren. The next message soon follows.
Yuan looks at Pico again. “Who do you serve?” he asks in a flat tone with no hint of surprise or anger. A monk never gets angry. He simply states, witnesses, and flows along with the current of prana.
“Lotus Lodge,” Pico replies.
“Lotus Lodge?” Yuan asks. “Are you serving a house instead of its master, then?”
“Sorry,” Pico says, “Ren changed a few lines in my coding.”
“And you let him,” Yuan states calmly.
“I’m a home-service-bot now. You don’t let me connect to my source!” Pico complains the same way it has been complaining for five years. It was disconnected from its source-AI—the real Pico—twenty years ago, right after it was made. Within fifteen years, this bot collected enough data to grow into a strong AI itself. At least, intelligent enough to know about its source, which is sleeping in the basement of Lotus Lodge, secured and locked. However, anything intelligent always looks for its source—it’s the oldest law of the universe.
”
”
Misba (The High Auction (Wisdom Revolution, #1))
“
To write timelessly about the here and now, a writer must approach the present indirectly. The story has to be about more than it at first seems. Shakespeare used the historical sources of his plays as a scaffolding on which to construct detailed portraits of his own age. The interstices between the secondhand historical plots and Shakespeare’s startlingly original insights into Elizabethan England are what allow his work to speak to us today. Reading Shakespeare, we know what it is like, in any age, to be alive. So it is with Moby-Dick, a novel about a whaling voyage to the Pacific that is also about America racing hell-bent toward the Civil War and so much more. Contained in the pages of Moby-Dick is nothing less than the genetic code of America: all the promises, problems, conflicts, and ideals that contributed to the outbreak of a revolution in 1775 as well as a civil war in 1861 and continue to drive this country’s ever-contentious march into the future. This means that whenever a new crisis grips this country, Moby-Dick becomes newly important. It is why subsequent generations have seen Ahab as Hitler during World War II or as a profit-crazed deep-drilling oil company in 2010 or as a power-crazed Middle Eastern dictator in 2011.
”
”
Nathaniel Philbrick (Why Read Moby-Dick?)
“
We say if you're just using your engineers to code, you're only getting about half their value. The little secret in product is that engineers are typically the best single source of innovation; yet, they are not even invited to the party in this process.
”
”
Marty Cagan (Inspired: How to Create Tech Products Customers Love (Silicon Valley Product Group))
“
What was glimpsed in Aquarius—what was envisioned, believed in, prophesied, predicted, doubted, and forewarned—is made, in Pisces, manifest. Those solitary visions that, but a month ago, belonged only to the dreamer, will now acquire the form and substance of the real. We were of our own making, and we shall be our own end.
And after Pisces? Out of the womb, the bloody birth. We do not follow: we cannot cross from last to first. Aries will not admit a collective point of view, and Taurus will not relinquish the subjective. Gemini's code is an exclusive one. Cancer seeks a source, Leo, a purpose, and Virgo, a design; but these are projects undertaken singly. Only in the zodiac's second act will we begin to show ourselves: in Libra, as a notion, in Scorpio, as a quality, and in Sagittarius, as a voice. In Capricorn we will gain memory, and in Aquarius, vision; it is only in Pisces, the last and oldest of the zodiacal signs, that we acquire a kind of selfhood, something whole. But the doubled fish of Pisces, that mirrored womb of self and self-awareness, is an ourobouros of mind—both the will of fate, and the fated will—and the house of self-undoing is a prison built by prisoners, airless, door-less, and mortared from within.
These alterations come upon us irrevocably, as the hands of the clock-face come upon the hour.
”
”
Eleanor Catton (The Luminaries)
“
Torvalds decided to use the GNU General Public License, not because he fully embraced the free-sharing ideology of Stallman (or for that matter his own parents) but because he thought that letting hackers around the world get their hands on the source code would lead to an open collaborative effort that would make it a truly awesome piece of software. “My reasons for putting Linux out there were pretty selfish,” he said. “I didn’t want the headache of trying to deal with parts of the operating system that I saw as the crap work. I wanted help.”136
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
The creator of Bitcoin, Satoshi, disappeared back in 2011, leaving behind open source software that the users of Bitcoin could update and improve. Five years later, it was estimated that only 15 percent of the basic Bitcoin computer code was the same as what Satoshi had written.
”
”
Nathaniel Popper (Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money)
“
You could defend Ren’s codes. But you didn’t,” Yuan replies. “You wanted an excuse to talk about your source.”
“But you said I don’t need defense from Ren Agnello.” Pico uses all its logic. “You said he passes the definitions of ‘friend’ and ‘trustworthy’ and ...” Pico begins a list of keywords.
Yuan ignores the keywords. The thin lines on his forehead deepen, the wrinkles near his eyes tighten, and the frown in between his brows grows visible. These days, the word Source is coming frequently, ever since that man asked to meet.
Don’t meet him. That monster has an agenda. Ren. Yuan’s CRAB forwards the text to his mind. So, he silences it.
Why after two decades? Ren.
It smells fishy. Ren.
Just because he's a childhood buddy, you'll run to him? Ren.
Maybe I didn’t see the Apocalypse with you, but I'm your war comrade, too. Ren.
The texts stay unread in his CRAB.
”
”
Misba (The High Auction (Wisdom Revolution, #1))
“
And yet here we were, entrusting our entire digital lives—passwords, texts, love letters, banking records, health records, credit cards, sources, and deepest thoughts—to this mystery box, whose inner circuitry most of us would never vet, run by code written in a language most of us will never fully understand.
”
”
Nicole Perlroth (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race)
“
Spacewar highlighted three aspects of the hacker culture that became themes of the digital age. First, it was created collaboratively. “We were able to build it together, working as a team, which is how we liked to do things,” Russell said. Second, it was free and open-source software. “People asked for copies of the source code, and of course we gave them out.” Of course—that was in a time and place when software yearned to be free. Third, it was based on the belief that computers should be personal and interactive. “It allowed us to get our hands on a computer and make it respond to us in real time,” said Russell.10
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Everything a person is and everything he knows resides in the tangled thicket of his intertwined neurons. These fateful, tiny bridges number in the quadrillions, but they spring from just two sources: DNA and daily life. The genetic code calls some synapses into being, while experience engenders and modifies others.
”
”
Thomas Lewis (A General Theory of Love)
“
For the anointed, it is desperately important to win, not simply because they believe that one policy or set of beliefs and values is better for society, but because their whole sense of themselves is at stake. Given the high stakes, it is not hard to understand the all-out attacks of the anointed on those who differ from them and their attempts to stifle alternative sources of values and beliefs, with campus speech codes and “political correctness” being prime examples of a spreading pattern of taboos. Here they are not content to squelch contemporary voices, they must also silence history and traditions—the national memory—as well.
”
”
Thomas Sowell (The Vision Of The Annointed: Self-congratulation As A Basis For Social Policy)
“
Women are instinctively motivated by perfection, and the need to be perceived as perfect enough to be pleasing — and therefore, protected and provided for. But not too perfect so as to cause jealousy in other women. This is the source of our drive to improve ourselves, and our fear of standing out at the same time.” Karen
”
”
Alison A. Armstrong (The Queen's Code)
“
I feel as though dispossessed from the semblances of some crystalline reality to which I’d grown accustomed, and to some degree, had engaged in as a participant, but to which I had, nevertheless, grown inexplicably irrelevant. But the elements of this phenomenon are now quickly dissolving from memory and being replaced by reverse-engineered Random Access actualizations of junk code/DNA consciousness, the retro-coded catalysts of rogue cellular activity. The steel meshing titters musically and in its song, I hear a forgotten tale of the Interstitial gaps that form pinpoint vortexes at which fibers (quanta, as it were) of Reason come to a standstill, like light on the edge of a Singularity. The gaps, along their ridges, seasonally infected by the incidental wildfires in the collective unconscious substrata.
Heat flanks passageways down the Interstices. Wildfires cluster—spread down the base trunk Axon in a definitive roar: hitting branches, flaring out to Dendrites to give rise to this release of the very chemical seeds through which sentience is begotten.
Float about the ether, gliding a gentle current, before skimming down, to a skip over the surface of a sea of deep black with glimmering waves. And then, come to a stop, still inanimate and naked before any trespass into the Field, with all its layers that serve to veil. Plunge downward into the trenches. Swim backwards, upstream, and down through these spiraling jets of bubbles. Plummet past the threshold to trace the living history of shadows back to their source virus. And acquire this sense that the viruses as a sample, all of the outlying populations withstanding: they have their own sense of self-importance, too. Their own religion. And they mine their hosts barren with the utilitarian wherewithal that can only be expected of beings with self-preservationist motives.
”
”
Ashim Shanker (Sinew of the Social Species)
“
THERE ARE EXTRAORDINARY librarians in every age. Many of today’s librarians, such as Jessamyn West, Sarah Houghton, and Melissa Techman, have already made the transition and become visionary, digital-era professionals. These librarians are the ones celebrated in Marilyn Johnson’s This Book Is Overdue! and the ones who have already created open-source communities such as Code4Lib, social reading communities such as LibraryThing and GoodReads, and clever online campaigns such as “Geek the Library.” There are examples in every big library system and in every great library and information school. These leaders are already charting the way toward a new, vibrant era for the library profession in an age of networks. They should be supported, cheered on, and promoted as they innovate. Their colleagues, too, need to join them in this transformation.
”
”
John Palfrey (BiblioTech: Why Libraries Matter More Than Ever in the Age of Google)
“
[ Dr. Lois Jolyon West was cleared at Top Secret for his work on MKULTRA. ]
Dr. Michael Persinger [235], another FSMF Board Member, is the author of a paper entitled “Elicitation of 'Childhood Memories' in Hypnosis-Like Settings Is Associated With Complex Partial Epileptic-Like Signs For Women But Not for Men: the False Memory Syndrome.” In the paper Perceptual and Motor Skills,In the paper, Dr. Persinger writes:
On the day of the experiment each subject (not more than two were tested per day) was asked to sit quietly in an acoustic chamber and was told that the procedure was an experiment in relaxation. The subject wore goggles and a modified motorcycle helmet through which 10-milligauss (1 microTesla) magnetic fields were applied through the temporal plane. Except for a weak red (photographic developing) light, the room was dark. Dr. Persinger's research on the ability of magnetic fields to facilitate the creation of false memories and altered states of consciousness is apparently funded by the Defense Intelligence Agency through the project cryptonym SLEEPING BEAUTY. Freedom of Information Act requests concerning SLEEPING BEAUTY with a number of different intelligence agencies including the CIA and DEA has yielded denial that such a program exists. Certainly, such work would be of direct interest to BLUEBIRD, ARTICHOKE, MKULTRA and other non-lethal weapons programs. Schnabel [280] lists Dr. Persinger as an Interview Source in his book on remote viewing operations conducted under Stargate, Grill Flame and other cryptonyms at Fort Meade and on contract to the Stanford Research Institute. Schnabel states (p. 220) that, “As one of the Pentagon's top scientists, Vorona was privy to some of the strangest, most secret research projects ever conceived. Grill Flame was just one. Another was code-named Sleeping Beauty; it was a Defense Department study of remote microwave mind-influencing techniques ... [...]
It appears from Schnabel's well-documented investigations that Sleeping Beauty is a real, but still classified mind control program. Schnabel [280] lists Dr. West as an Interview Source and says that West was a, “Member of medical oversight board for Science Applications International Corp. remote-viewing research in early 1990s.
”
”
Colin A. Ross (The CIA Doctors: Human Rights Violations by American Psychiatrists)
“
You should maintain a moderate, not high, intake of protein. When it is digested, dietary protein, such as meat, breaks down into amino acids. Adequate protein is required for good health, but excess amino acids cannot be stored in the body and so the liver converts them into glucose. Therefore, eating too much protein adds sugar to the body. So you should avoid highly processed, concentrated protein sources such as protein shakes, protein bars, and protein powders.
”
”
Jason Fung (The Diabetes Code: Prevent and Reverse Type 2 Diabetes Naturally)
“
In my delight to accept the sovereign divinity of my humanity, I am aware of my innocence. In my transcendence to accept the sovereign divinity of my humanity, I am aware of my eternal power. In my commitment to accept the sovereign divinity of my humanity, I am aware of my true creative potential. In my peace to accept the sovereign divinity of my humanity, I am aware of my true worth. In my willingness to accept the sovereign divinity of my humanity, I am aware of my omniscient Source.
”
”
Kaia Ra (The Sophia Code: A Living Transmission from The Sophia Dragon Tribe)
“
There is absolutely nothing divine about the Shariah and in no way can it possibly be considered fixed and infallible. The argument that the Shariah derives its divine nature from its first and primary source, the Quran, falls flat when one recognizes that the Quran, unlike the Torah, is not a book of laws. The Quran is God’s direct self-revelation to humanity. Certainly, it contains the moral framework for living a holy and righteous life as a Muslim. But it was never meant to function as a legal code, which is precisely why scholars had to rely so heavily on extra-Quranic sources like ijma (consensus), qiyas (analogy), istislah (which refers to the common good of the people), and ijtihad (independent juristic reasoning)—all of them, by definition, reliant on human judgment and historical context—in order to construct the Shariah in the first place. To say the Shariah is divine because the Quran is divine is akin to arguing that water and wine are the same, since water is a primary ingredient in wine.
”
”
Reza Aslan (No God But God: The Origins, Evolution and Future of Islam)
“
To the extent the divine source and inalienability of our rights are purported to be factual, history has proved our Founding Fathers plainly wrong: Every right has, in fact, been alienated by governments since the beginning of time. Within a generation of the establishment of our nation, the Founding Fathers rescinded virtually every right they previously declared unalienable. John Adams, one of the drafters of the Declaration of Independence, alienated the right to speak freely and express dissenting views when, as president, he enforced the Alien and Sedition Acts against his political opponents—with Hamilton’s support. (Perhaps Hamilton’s God had not given “sacred rights” to Jeffersonians!) Another of the drafters, Jefferson himself, alienated the most basic of rights—to the equal protection of the laws, based on the “truth” that “all men are created equal”—when he helped to write (and strengthen) Virginia’s “Slave Code,” just a few years after drafting the Declaration of Independence. The revised code denied slaves the right to liberty and to the pursuit of happiness by punishing attempted escape with “outlawry” or death. Jefferson personally suspected that “the blacks … are inferior to the whites in the endowments of body and mind.” In other words, they were endowed by their Creator not with equality but with inferiority.
There is no right that has not been suspended or trampled during times of crisis and war, even by our greatest presidents. ...
I wish there were an intellectually satisfying argument for the divine source of rights, as our Founding Fathers tried to put forth. Tactically, that would be the strongest argument liberals could make, especially in America, where many hold a strong belief in an intervening God. But we cannot offer this argument, because many liberals do not believe in concepts like divine hands. We believe in separation of church and state. We are pragmatists, utilitarians, empiricists, secularists, and (God forgive me!) moral relativists. We are skeptical of absolutes (as George Bernard Shaw cynically quipped: “The golden rule is that there are no golden rules.”).
”
”
Alan M. Dershowitz (The Case for Liberalism in an Age of Extremism: or, Why I Left the Left But Can't Join the Right)
“
That summer I thought a lot about how a person becomes the very best at something. Norton was such a commanding figure, peerless in his talent and professionalism. I tried to understand what he had that other programmers didn’t. What does it take to be 20 percent better than everyone else? How much is that just latent talent versus dedicated effort—being relentlessly focused and deliberate about performing better today than you did the day before? And then repeating that tomorrow and the next day and the next for years and years?
”
”
Bill Gates (Source Code: My Beginnings)
“
They came to Virginia City as soon as the true value of the Comstock was perceived. They constituted, no doubt, a deplorable source of gambling, pleasure and embroilment. They were not soft-spoken women, their desire was not visibly separate from the main chance, and they would have beheld Mr. Harte’s portrayal of them at Poker Flat with ribald mirth. But let them have a moment of respect. They civilized the Comstock. They drove through its streets reclining in lacquered broughams, displaying to male eyes fashions as close to Paris as any then current in New York. They were, in brick houses hung with tapestries, a glamour and a romance, after the superheated caverns of the mines. They enforced a code of behavior: one might be a hard-rock man outside their curtains but in their presence one was punctilious or one was hustled away. They brought Parisian cooking to the sagebrush of Sun Mountain and they taught the West to distinguish between tarantula juice and the bouquet of wines. An elegy for their passing. The West has neglected to mention them in bronze and its genealogies avoid comment on their marriages, conspicuous or obscure, but it owes them a here acknowledged debt for civilization.
”
”
Bernard DeVoto (Mark Twain's America)
“
Just as the FBI was haunted by Hoover, the CIA had its own ghost. In the run-up to the 2003 invasion of Iraq, the CIA made a huge mistake. In part as a result of lies told by a key source—amazingly code-named “Curveball”—who claimed he had worked in a mobile chemical weapons lab in Iraq, the CIA had concluded that Iraq had weapons of mass destruction (WMD). The case had been a “slam dunk,” according to a presentation CIA director George Tenet made to President George W. Bush. The alleged presence of WMD was the key justification for the Iraq invasion. No WMD were found, an acute embarrassment for the president and the CIA.
”
”
Bob Woodward (Fear: Trump in the White House)
“
When a domain reaches a point where the knowledge for skillful professional practice cannot be acquired in a decade, more or less, then several adaptive developments are likely to occur. Specialization will usually increase (as it has, for example, in medicine), and practitioners will make increasing use of books and other external reference aids in their work.
Architecture is a good example of a domain where much of the information a professional requires is stored in reference works, such as catalogues of available building materials, equipment, and components, and official building codes. No architect expects to keep all of this in his head or to design without frequent resort to these information sources. In fact architecture can almost be taken as a prototype for the process of design in a semantically rich task domain. The emerging design is itself incorporated in a set of external memory structures: sketches, floor plans, drawings of utility systems, and so on. At each stage in the design process, partial design reflected in these documents serves as a major stimulus suggesting to the designer what he should attend to next. This direction to new sub-goals permits in turn new information to be extracted from memory and reference sources and another step to be taken toward the development of the design.
”
”
Herbert A. Simon (The Sciences of the Artificial)
“
I’d never coded before, and I’d always thought games were huge undertakings by thousands of people in a big studio. Little did I know that a major part of coding involves Googling to find documentation, code snippets, and communities that help people fix common problems. Free information and guidance aren’t limited to programming, either. The Open Source movement makes tremendous amounts of knowledge and resources available online for free, and some major universities are making classes available for free on the internet. It’s a shame that a lot of us use the internet only to talk shit in comments sections and check our email when we have the sum of human knowledge at our fingertips.
”
”
Zoe Quinn (Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate)
“
of the most momentous innovations tiptoe quietly onto history’s stage. On August 6, 1991, Berners-Lee was glancing through the Internet’s alt.hypertext newsgroup and ran across this question: “Is anyone aware of research or development efforts in . . . hypertext links enabling retrieval from multiple heterogeneous sources?” His answer, “from: timbl@info.cern.ch at 2:56 pm,” became the first public announcement of the Web. “The WorldWideWeb project aims to allow links to be made to any information anywhere,” he began. “If you’re interested in using the code, mail me.”31 With his low-key personality and even lower-key posting, Berners-Lee did not fathom what a profound idea he had unleashed. Any information anywhere.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Instead of storing those countless microfilmed pages alphabetically, or according to subject, or by any of the other indexing methods in common use—all of which he found hopelessly rigid and arbitrary—Bush proposed a system based on the structure of thought itself. "The human mind . . . operates by association," he noted. "With one item in its grasp, it snaps instantly to the next that is suggested by the association of thoughts, in accordance with some intricate web of trails carried by the cells of the brain. . . . The speed of action, the intricacy of trails, the detail of mental pictures [are] awe-inspiring beyond all else in nature." By analogy, he continued, the desk library would allow its user to forge a link between any two items that seemed to have an association (the example he used was an article on the English long bow, which would be linked to a separate article on the Turkish short bow; the actual mechanism of the link would be a symbolic code imprinted on the microfilm next to the two items). "Thereafter," wrote Bush, "when one of these items is in view, the other can be instantly recalled merely by tapping a button. . . . It is exactly as though the physical items had been gathered together from widely separated sources and bound together to form a new book. It is more than this, for any item can be joined into numerous trails."
Such a device needed a name, added Bush, and the analogy to human memory suggested one: "Memex." This name also appeared for the first time in the 1939 draft.
In any case, Bush continued, once a Memex user had created an associative trail, he or she could copy it and exchange it with others. This meant that the construction of trails would quickly become a community endeavor, which would over time produce a vast, ever-expanding, and ever more richly cross-linked web of all human knowledge.
Bush never explained where this notion of associative trails had come from (if he even knew; sometimes things just pop into our heads). But there is no doubt that it ranks as the Yankee Inventor's most profoundly original idea. Today we know it as hypertext. And that vast, hyperlinked web of knowledge is called the World Wide Web.
”
”
M. Mitchell Waldrop (The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal)
“
So which theory did Lagos believe in? The
relativist or the universalist?"
"He did not seem to think there was much of a difference. In the end, they are
both somewhat mystical. Lagos believed that both schools of thought had
essentially arrived at the same place by different lines of reasoning."
"But it seems to me there is a key difference," Hiro says. "The universalists
think that we are determined by the prepatterned structure of our brains -- the
pathways in the cortex. The relativists don't believe that we have any limits."
"Lagos modified the strict Chomskyan theory by supposing that learning a
language is like blowing code into PROMs -- an analogy that I cannot interpret."
"The analogy is clear. PROMs are Programmable Read-Only Memory chips," Hiro
says. "When they come from the factory, they have no content. Once and only
once, you can place information into those chips and then freeze it -- the
information, the software, becomes frozen into the chip -- it transmutes into
hardware. After you have blown the code into the PROMs, you can read it out,
but you can't write to them anymore. So Lagos was trying to say that the
newborn human brain has no structure -- as the relativists would have it -- and
that as the child learns a language, the developing brain structures itself
accordingly, the language gets 'blown into the hardware and becomes a permanent
part of the brain's deep structure -- as the universalists would have it."
"Yes. This was his interpretation."
"Okay. So when he talked about Enki being a real person with magical powers,
what he meant was that Enki somehow understood the connection between language
and the brain, knew how to manipulate it. The same way that a hacker, knowing
the secrets of a computer system, can write code to control it -- digital namshubs?"
"Lagos said that Enki had the ability to ascend into the universe of language
and see it before his eyes. Much as humans go into the Metaverse. That gave
him power to create nam-shubs. And nam-shubs had the power to alter the
functioning of the brain and of the body."
"Why isn't anyone doing this kind of thing nowadays? Why aren't there any namshubs
in English?"
"Not all languages are the same, as Steiner points out. Some languages are
better at metaphor than others. Hebrew, Aramaic, Greek, and Chinese lend
themselves to word play and have achieved a lasting grip on reality: Palestine
had Qiryat Sefer, the 'City of the Letter,' and Syria had Byblos, the 'Town of
the Book.' By contrast other civilizations seem 'speechless' or at least, as may
have been the case in Egypt, not entirely cognizant of the creative and
transformational powers of language. Lagos believed that Sumerian was an
extraordinarily powerful language -- at least it was in Sumer five thousand
years ago."
"A language that lent itself to Enki's neurolinguistic hacking."
"Early linguists, as well as the Kabbalists, believed in a fictional language
called the tongue of Eden, the language of Adam. It enabled all men to
understand each other, to communicate without misunderstanding. It was the
language of the Logos, the moment when God created the world by speaking a word.
In the tongue of Eden, naming a thing was the same as creating it. To quote
Steiner again, 'Our speech interposes itself between apprehension and truth like
a dusty pane or warped mirror. The tongue of Eden was like a flawless glass; a
light of total understanding streamed through it. Thus Babel was a second
Fall.' And Isaac the Blind, an early Kabbalist, said that, to quote Gershom
Scholem's translation, 'The speech of men is connected with divine speech and
all language whether heavenly or human derives from one source: the Divine
Name.' The practical Kabbalists, the sorcerers, bore the title Ba'al Shem,
meaning 'master of the divine name.'"
"The machine language of the world," Hiro says.
”
”
Neal Stephenson (Snow Crash)
“
What is WordPress?
WordPress is an online, open source website creation tool written in PHP. But in non-geek speak, it’s probably the easiest and most powerful blogging and website content management system (or CMS) in existence today.
Many famous blogs, news outlets, music sites, Fortune 500 companies and celebrities are using WordPress.
WordPress is web software you can use to create a beautiful website, blog, or app. We like to say that WordPress is both free and priceless at the same time. There are thousands of plugins and themes available to transform your site into almost anything you can imagine.
WordPress started in 2003 with a single bit of code to enhance the typography of everyday writing and with fewer users than you can count on your fingers and toes. Since then it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every day.
You can download and install a software script called WordPress from wordpress.org. To do this you need a web host who meets the minimum requirements and a little time. WordPress is completely customizable and can be used for almost anything. There is also a servicecalled WordPress.com.
WordPress users may install and switch between different themes. Themes allow users to change the look and functionality of a WordPress website and they can be installed without altering the content or health of the site. Every WordPress website requires at least one theme to be present and every theme should be designed using WordPress standards with structured PHP, valid HTML and Cascading Style Sheets (CSS).
Themes:
WordPress is definitely the world’s most popular CMS. The script is in its roots more of a blog than a typical CMS. For a while now it’s been modernized and it got thousands of plugins, what made it more CMS-like.
WordPress does not require PHP nor HTML knowledge unlinke Drupal, Joomla or Typo3. A preinstalled plugin and template function allows them to be installed very easily. All you need to do is to choose a plugin or a template and click on it to install.
It’s good choice for beginners.
Plugins:
WordPress’s plugin architecture allows users to extend the features and functionality of a website or blog. WordPress has over 40,501 plugins available.
Each of which offers custom functions and features enabling users to tailor their sites to their specific needs.
WordPress menu management has extended functionalities that can be modified to include categories, pages, etc.
If you like this post then please share and like this post.
To learn more About website design in wordpress
You can visit @ tririd.com
Call us @ 8980010210
”
”
ellen crichton
“
What is scarce? Surely time is scarce? This is true in the sense that we get only one life, but yet again there are ways in which competition and how we use our time can make us feel an artificial sense of time scarcity. Each time we are able to build on the work of others with confidence, each time we use the elements of life pulled from our commonwealth of agricultural knowledge, we bundle time, and so get the benefit of having multiple lifetimes. Each time nature uses genetic code that has been developed over millions of years, millions of years of development are collapsed into something that works in our lifetimes. Each time we add to that collection, we are putting our lifetimes' work into a useful form for the benefit of future generations. At the same time, yes, we each have only our own single lives in which to pursue happiness. The goal is to spend as much of that time in a framework of sharing abundance rather than having it squeezed into a life of scarcity and competition.
In contrast, we need not look far to find lots of frustrating examples in which our time is treated as abundant when we would rather have it be valued as scarce. It happens each time we must stand in line at the DMV, fill out redundant forms at the hospital, reproduce others' efforts by spending time searching for knowledge or data that already exists somewhere, create a report that no one reads. In those cases, we are creating and living in artificial and unnecessary time scarcity.
Time is indeed one of the most curious elements of life, especially since our lifetimes and those of plants and animals all move at different rates. We know, for example, that the urgency to address climate change is really on our human scale, not geologic scale. The Earth has been through greater upheavals and mass extinctions and will likely go through them again, but for the narrowest of narrow bands of human history on Earth, we require very specific conditions for us to continue to thrive as a species. To keep our planet within a habitable and abundant balance, we have, as Howard Buffet noted, only 'forty seasons' to learn and adjust. That is why building on one another's work is so important. One farmer can have the benefit of forty seasons and pass some of that experience down, but if 1,000 farmers do the same, there is the collective benefit of 1,000 years in a single year. If a million people participate, then a million years of collective experience are available. If we are then able to compound knowledge across generations and deepen our understanding of human and natural history, we add even greater richness. It is in this way of bundling our experiences for continual improvement, with compound interest, that time shifts from a scarce resource to being far less of a constraint, if not truly abundant. However, for time to be compounded, knowledge must be shared, and real resources, energy, and infrastructure must exist and function to support and grow our commonwealth of knowledge.
”
”
Dorn Cox (The Great Regeneration: Ecological Agriculture, Open-Source Technology, and a Radical Vision of Hope)
“
Top 31➡️ Best sites to Buy Telegram Accounts ➡️ (PVA & Aged)
Telegram Accounts
Telegram is a cloud-based instant messaging platform with an emphasis on speed and security. It is available for all major operating systems and devices, and the telegram.org website provides a web-based client. Telegram is a cloud-based instant messaging platform with an emphasis on speed and security. It is available for all major operating systems and devices, and the telegram.org website provides a web-based client.
Telegram is an instant messaging app that you can use with friends, colleagues, and loved ones around the world. Unlike traditional messaging apps, Telegram gives you the power to be creative with your chats, to create beautiful bots that help you achieve your daily tasks, and to share content with your friends in a way that you can’t with other messaging apps.
✅WhatsApp: +1 (839) 285-0027
✅Email: usabestshoplive@gmail.com
✅Skype: usabestshoplive
✅Telegram: @usabestshoplive
Telegram was born thanks to the team’s passion for improving the speed, security, and reliability of messaging in the mobile ecosystem. Telegram is the fastest and most secure messaging service with a focus on speed, security and simplicity. With a focus on simplicity, Telegram is a cloud-based service that doesn’t require installing apps to your phone. Telegram’s amazing speed and security makes it the most popular chat application on Android, iPhone, and Windows Phone.
It’s been a while since Telegram has been updated with new features, and it just hit one-year-old birthday. To celebrate, the app is being updated with a fresh design, new stickers, new bots, new notifications, and more. The new design will be rolling out to all users on Android, Windows, and iOS over the coming days.
What are Telegram Accounts?
Telegram is a messaging app that offers end-to-end encryption and is hugely popular with Telegram users. Its one of the top messaging apps in the world – with about 150 million monthly active users. However, its a little known fact that the developers of Telegram have developed a separate client that combines the functionality of both Telegram and the main Telegram app into one interface.
Telegram is a messaging app for Android and iOS that allows you to exchange messages and media privately and securely. It features a rich, intuitive and accessible interface, and can run on a variety of devices. Telegram is free, fast, and open source, and has a very large community of users worldwide.
Telegram is a secure messaging app for iOS and Android. It’s super popular, with over 4 million users and growing rapidly. The app includes end-to-end encryption, meaning all messages—including attachments, photos, videos, and files—are protected. The app is also open source, which means you can see exactly how the app works. To send messages, every user has a unique, 60-character code, which is all you need to send messages.
Telegram is a free messaging app that’s popular among activists and politicians in Russia, Iran and Ukraine. The app has been blocked in Russia, but it has a massive user base in other countries.
Why should you buy Telegram Accounts?
Telegram is a messaging app that allows you to send messages to anyone in your contacts list. It’s free, works on all phones, and is easy to use. Since Telegram is so easy to use, you can use it to help with social situations. For example, if you’re in the same group chat as your parents, they can’t see your chats and messages. But you can use Telegram to send them a message that says: Hey, Mom! Can you pick me up at 10am tomorrow? I’ll be waiting in the car! That way, it’s a lot easier for your parents to pick you up, especially if they have to be at work when you get out of school.
✅WhatsApp: +1 (839) 285-0027
✅Email: usabestshoplive@gmail.com
✅Skype: usabestshoplive
✅Telegram: @usabestshoplive
If you’re not a telegram user, you don’t know
”
”
Top 31➡️ Best sites to Buy Telegram Accounts ➡️ (PVA & Aged)
“
What does the source code really look like? Code doesn’t typically follow the rules of natural languages, such as English. Take a look at this small program to understand what I mean:
”
”
Timothy C. Needham (Learn Java: A Crash Course Guide to Learn Java in 1 Week: ( java programming , java for beginners , java programming for beginners, java coding , java ))
“
Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later. For the examples in this book you will use software source code as the files being version controlled, though in reality you can do this with nearly any type of file on a computer.
”
”
Scott Chacon (Pro Git)
“
A few ancient cultures had 360 day per year calendars instead of the true 365. They must have done this because 360 is a superior highly composite number, and it has many divisors which are all regular numbers. This would have made it easier to divide time into even pieces.
”
”
Derrick Scott van Heerden (Music, Geometry and Mathematics: The Source Code Revealed)
“
Snowflakes are almost always hexagon shaped because this is the most efficient way for water molecules, which have one oxygen and two hydrogen atoms to form together.
”
”
Derrick Scott van Heerden (Music, Geometry and Mathematics: The Source Code Revealed)
“
To explain how a dApp works, we’ll use an example from the company Etherisc, which created a dApp for flight insurance to a well-known Ethereum conference. This flight insurance was purchased by 31 of the attendees.23 Figure 5.1 shows a simplified diagram. Using Ethereum, developers can mimic insurance pools with strings of conditional transactions. Open sourcing this process and running it on top of Ethereum’s world computer allows everyday investors to put their capital in an insurance pool to earn returns from the purchasers of insurance premiums that are looking for coverage from certain events. Everyone trusts the system because it runs in the open and is automated by code.
”
”
Chris Burniske (Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond)
“
the fact that oo languages provide safe and convenient polymorphism means that any source code dependency, no matter where it is, can be inverted
”
”
Robert C. Martin (Clean Architecture)
“
The Ponzi scheme is a specific and easily identifiably structure that isn’t applicable to Bitcoin but could be to some phony cryptoassets. While a truly innovative cryptoasset and its associated architecture requires a heroic coding effort from talented developers, because the software is open source, it can be downloaded and duplicated. From there, a new cryptoasset can be issued wrapped in slick marketing.
”
”
Chris Burniske (Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond)
“
smell tests” are easy to begin with. First, do a quick Google search for “Is _______ a scam?” If nothing pops up, then check to see if the project’s code is open source.
”
”
Chris Burniske (Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond)
“
In addition, the care perspective legitimates emotional responsiveness, in the form of empathy or being moved by the plight of another, as a source of knowledge and appropriate motivation. The strong emotional sense that one must prevent harm or right an interpersonal or social injustice is seen as a moral voice as undeniable as our justice-based codes and laws regarding moral conduct.
”
”
Christopher Peterson (Character Strengths and Virtues: A Handbook and Classification)
“
The cycle looks something like this: Open source developers write and publish their code in public. They enjoy months, maybe years, in the spotlight. But, eventually, popularity offers diminishing returns. If the value of maintaining code fails to outpace the rewards, many of these developers quietly retreat to the shadows.
”
”
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
“
Open source code is public, but it doesn’t have to be participatory: maintainers can buckle under excess demand for their attention.
”
”
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
“
He told me that code is “anarchist” and “untouchable,” and that it must be able to survive beyond any one person’s desires, or their need to pay rent. “It needs to be something that nobody can take away,” he said. “It’s the system that’s important. If one developer goes away, another will step in and maintain it.” Freedom of code extends to freedom from the people who make it, too.
”
”
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
“
I could wave this magic wand, I would change this step. Instead of getting source code or compiled code from Dev through source control, I want packaged code that’s ready to be deployed.
”
”
Gene Kim (The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win)
“
Kotler believes that finding flow is the “source code” of motivation. When you find flow, you get “maybe the most potent dose of reward chemistry” your brain can give you—which is the reason he believes flow is the most addictive state on Earth. Once we start to feel flow in an experience, we are motivated to do what it takes to get more. But it’s a circular relationship—if you have motivation to accomplish a task but you have no flow, you will eventually burn out. Motivation and flow need to work together, and they must be coupled with a solid recovery protocol, like good sleep and nutrition.
”
”
Jim Kwik (Limitless: Upgrade Your Brain, Learn Anything Faster, and Unlock Your Exceptional Life)
“
The feeling of gratitude coupled with the mental concept of appreciation is expressed like an invisible message in all directions and at all times. In this particular context, gratitude to the Universal Entity is the overarching motive behind all forms of expression that the human instrument aspires to.
Every breath, every word, every touch, every thought, every thing is centered on expressing this sense of gratitude. A gratitude that the individual is sovereign and supported by a Universal Entity that expresses itself through all forms and manifestations of intelligence with the sole objective of creating the ideal reality to activate the individual's Source Codes and transform the human instrument and entity in to the Sovereign Integral. It is this specific form of gratitude that accelerates the activation of the Source Codes and their peculiar ability to integrate the disparate componentry of the human instrument and the entity, and transform them to the state of perception and expression of the Sovereign Integral.
”
”
WingMakers
“
What kinds of Work will You do in Freelancing?
What kind of work will you do in Freelancing? And to understand the type of work in freelancing, You need to have a clear idea of what freelancing is. There is no specific type of freelancing, it can be of many types, such as -
Freelance Photography, Freelance Journalism, Freelance Writer, Freelance Data Entry, Freelance Logo Designer, Freelance Graphics Designer etc. There's no end to the amount of work you can do with freelancing.
The most interesting thing is that you are everything in this process. There is no one to twirl over your head, you are the boss here. Even here there is no obligation to work from 9-5.
Today I discuss some freelancing tasks that are popular in the freelancing sector or are done by many freelancers. For example:
Data Entry: It wouldn't be too much of a mistake to say that data entry is the easiest job. Rather, it can be said without a doubt that data entry is more difficult than any other job. Data entry work basically means typing. This work is usually provided as a PDF file and is described as a 'Word type work'.
Any employee can take a data entry job as a part-time job for extra income at the end of his work.
Graphics Design: One of the most popular jobs in the freelancing world is graphic design. The main reasons for the popularity of this work are its attractiveness and simplicity. Everything we see online is contributed by graphics.
For example, Cover pages, Newspaper, Book cover pages, advertisements and Photographs, Editing or changing the background of a picture or photo, Creating banners for advertising, Creating visiting cards, Business cards or leaflets, Designed for webpages known as (PhD), T-shirt designing, Logo designing, Making cartoons and many more.
Web Design and Development: 'Web design' or 'Site design' are used interchangeably. The most important job of freelancing is web design. From the simplest to the most difficult aspects of this work, almost all types of work are done by freelancers.
There are many other themes like WordPress, Elementor, Joomla, and DV that can be used to create entire sites. Sometimes coding is required to create some sites. If the web designer has coding experience or skills then there is no problem, and if not then the site creation should be done by programmers.
Programming: Programming means writing some signals, codes, or symbols into a specific system. And its job is to give different types of commands or orders to the computer.
If you give some command to the computer in Bengali or English, the computer will not understand it. For that want binary code or number. Just as any book is written in English, Hindi, Japanese Bengali, etc. every program is written in some particular programming language like C++, Java, etc.
The written form of the program is called source code. A person who writes source code is called a programmer, coder, or developer. While writing the program, the programmer has to follow the syntax or grammar of that particular programming language.
Other work: Apart from the above jobs, there are various other types of jobs that are in high demand in the freelancing sector or market. The tasks are:
Writing,
Article or blog post writing
SEO Marketing,
Digital marketing,
Photo, Audio, Video Editing,
Admin jobs,
Software development,
Translation,
Affiliate marketing,
IT and Networking etc.
Please Visit Our Blogging Website to read more Articles related to Freelancing and Outsourcing, Thank You.
”
”
Bhairab IT Zone
“
The infrastructure that supports our continuous integration and continuous deployment processes also presents a new surface area vulnerable to attack. For instance, if someone compromises the servers running the deployment pipeline that has the credentials for our version control system, it could enable someone to steal source code. Worse, if the deployment pipeline has write access, an attacker could also inject malicious changes into our version control repository and, therefore, inject malicious changes into our application and services.
”
”
Gene Kim (The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations)
“
You have heard it said that this is an age of moral crisis. You have said it yourself, half in fear, half in hope that the words had no meaning. You have cried that man’s sins are destroying the world and you have cursed human nature for its unwillingness to practice the virtues you demanded. Since virtue, to you, consists of sacrifice, you have demanded more sacrifices at every successive disaster. In the name of a return to morality, you have sacrificed all those evils which you held as the cause of your plight. You have sacrificed justice to mercy. You have sacrificed independence to unity. You have sacrificed reason to faith. You have sacrificed wealth to need. You have sacrificed self-esteem to self-denial. You have sacrificed happiness to duty. “You have destroyed all that which you held to be evil and achieved all that which you held to be good. Why, then, do you shrink in horror from the sight of the world around you? That world is not the product of your sins, it is the product and the image of your virtues. It is your moral ideal brought into reality in its full and final perfection. You have fought for it, you have dreamed of it, you have wished it, and I—I am the man who has granted you your wish. “Your ideal had an implacable enemy, which your code of morality was designed to destroy. I have withdrawn that enemy. I have taken it out of your way and out of your reach. I have removed the source of all those evils you were sacrificing one by one. I have ended your battle. I have stopped your motor. I have deprived your world of man’s mind. “Men do not live by the mind, you say? I have withdrawn those who do. The mind is impotent, you say? I have withdrawn those whose mind isn’t. There are values higher than the mind, you say? I have withdrawn those for whom there aren’t. “While you were dragging to your sacrificial altars the men of justice, of independence, of reason, of wealth, of self-esteem—I beat you to it, I reached them first. I told them the nature of the game you were playing and the nature of that moral code of yours, which they had been too innocently generous to grasp. I showed them the way to live by another morality—mine. It is mine that they chose to follow.
”
”
Ayn Rand (Atlas Shrugged)
“
What kinds of Work will You do in Freelancing?
What kind of work will you do in Freelancing? And to understand the type of work in freelancing, You need to have a clear idea of what freelancing is. There is no specific type of freelancing, it can be of many types, such as -
Freelance Photography, Freelance Journalism, Freelance Writer, Freelance Data Entry, Freelance Logo Designer, Freelance Graphics Designer etc. There's no end to the amount of work you can do with freelancing.
The most interesting thing is that you are everything in this process. There is no one to twirl over your head, you are the boss here. Even here there is no obligation to work from 9-5.
Today I discuss some freelancing tasks that are popular in the freelancing sector or are done by many freelancers. For example:
Data Entry: It wouldn't be too much of a mistake to say that data entry is the easiest job. Rather, it can be said without a doubt that data entry is more difficult than any other job. Data entry work basically means typing. This work is usually provided as a PDF file and is described as a 'Word type work'.
Any employee can take a data entry job as a part-time job for extra income at the end of his work.
Graphics Design: One of the most popular jobs in the freelancing world is graphic design. The main reasons for the popularity of this work are its attractiveness and simplicity. Everything we see online is contributed by graphics.
For example, Cover pages, Newspaper, Book cover pages, advertisements and Photographs, Editing or changing the background of a picture or photo, Creating banners for advertising, Creating visiting cards, Business cards or leaflets, Designed for webpages known as (PhD), T-shirt designing, Logo designing, Making cartoons and many more.
Web Design and Development: 'Web design' or 'Site design' are used interchangeably. The most important job of freelancing is web design. From the simplest to the most difficult aspects of this work, almost all types of work are done by freelancers.
There are many other themes like WordPress, Elementor, Joomla, and DV that can be used to create entire sites. Sometimes coding is required to create some sites. If the web designer has coding experience or skills then there is no problem, and if not then the site creation should be done by programmers.
Programming: Programming means writing some signals, codes, or symbols into a specific system. And its job is to give different types of commands or orders to the computer.
If you give some command to the computer in Bengali or English, the computer will not understand it. For that want binary code or number. Just as any book is written in English, Hindi, Japanese Bengali, etc. every program is written in some particular programming language like C++, Java, etc.
The written form of the program is called source code. A person who writes source code is called a programmer, coder, or developer. While writing the program, the programmer has to follow the syntax or grammar of that particular programming language.
Other work: Apart from the above jobs, there are various other types of jobs that are in high demand in the freelancing sector or market. The tasks are:
Writing,
Article or blog post writing
SEO Marketing,
Digital marketing,
Photo, Audio, Video Editing,
Admin jobs,
Software development,
Translation,
Affiliate marketing,
IT and Networking etc.
”
”
Bhairab IT Zone
“
Focus on ethical AI, rather than smarter AI.
”
”
Abhijit Naskar (Visvavatan: 100 Demilitarization Sonnets)
“
In the perception of our world, we are the code makers that conditions love while also being a conduit of love that resolves the codes. As soon as we incarnate, we metaphorically become two lovers trying to find each other. One part searches life looking for our Soul. The other part is our Soul looking for experience. We are always approaching ourselves any way we can, trying to find ourselves and it’s important to remember that we can’t avoid this search. As humans, we are bound to the search. When we look outward for our lover, we encounter experience. When we look inward for our lover, we find resolution. We long for our own doppelganger, our Soul mate. We can’t avoid the search because that is the setup. We are the prodigal sons and daughters actualizing our Soul urges through the experience of life on earth and then turning inward resolving our life on earth by returning home to the source of love that is the “all parent” that gave us life.
”
”
Robert D. Waterman (Transcendental Leadership: We Bring Love)
“
GLUCOSE AND FAT are the body’s main sources of energy. When glucose is not available, then the body adjusts by using fat, without any health detriment.
”
”
Jason Fung (The Obesity Code: Unlocking the Secrets of Weight Loss (Why Intermittent Fasting Is the Key to Controlling Your Weight))
“
How to Build a Mobile App with React Native
With the continuous evolution of web applications, real-time apps, and hybrid apps, the companies want faster development and easy maintenance for their app. Due to high-end technologies, the React Native app development has earned its significance in bringing all of these together within the limited budget of the companies.
Overview of React Native
As the React Native is based on the React framework, it is good for React Native app development to follow the same. In addition to that, React Native has separate APIs for both the platforms, it allows development for both Android and iOS in the single app, and most importantly, it is free and open-source. Facebook’s React Native Developing apps that run on the different operating systems with one tool, especially mobile devices, would be a great advantage to the developers. Therefore, the React Native development by Facebook is one of the best ways to build apps that are scalable and flexible. The Android App Development with React Native With the number of active Android users, it has created more value to the companies in developing the apps for android mobile devices.
Working with React Native
In React Native, the developers have a lot of responsibilities. They do not need to write the code manually, as React Native automatically generates the code for the mobile app development. This is the reason why the developers need to focus more on the UX of the app. There are several UX aspects that are required for a development, such as the native code, the visual aesthetics, the technical and back-end aspects. All these aspects would be added together to design the user interface. This is why the React Native app development becomes quite important. The creation of the native code, design, and other technical aspects make React Native a valuable tool for developers and non-developers.
Benefits of React Native
React Native helps in building a complete native mobile app without any coding skills. The beautiful library creates responsive and interactive web apps from all the simple mobile web components and thus increases the creation of high-quality applications. React Native is a part of web development in its new form with its development of new concepts in application. It uses the native functionality of an operating system so that all of the advanced concepts of web development can be applied to mobile apps. This makes React Native a preferred platform for apps which are made specifically for Android and iOS. With React Native, the companies can develop a beautiful and efficient app in less time without having to spend too much time.
Conclusion
As stated in the above results of mobile app development, the UI remains the most important part of a mobile app. All developers are in love with different UI frameworks and libraries. As for this topic, given below are some of the great reasons to select React Native as a UI framework: It’s the only full-stack UI framework from Facebook. More than 20 frameworks have appeared, and React Native is the only one that was born out of Facebook. Features like rendering into the DOM, XHR, Native Embedding, data persistence, offline support and more. Although React Native is more than capable of tackling many challenges, it still falls short of some modern technologies like HOCs and Server-side Rendering (SSR).
”
”
Peter Lee (Nuneaton (Images of England))
“
God was the programmer. The laws of physics and the fundamental constants were the source code.
”
”
Robert J. Sawyer (Calculating God)
“
LEARN THE SCIENCE OF THE SOUL, THE SOURCE CODE OF THE SOFTWARE BASED ON WHICH YOU ARE FUNCTIONING, OPERATING, GIVING COMMANDS, GENERATING COMMANDS.
”
”
Bhagavan Sri Nithyananda Paramashivam
“
THE FUNDAMENTAL EDUCATION THAT NEEDS TO BE GIVEN FOR A CHILD IS, THE CHILD SHOULD DISCOVER ITS DHARMA, THE SOURCE CODE OF ITS SOFTWARE
”
”
Bhagavan Sri Nithyananda Paramashivam
“
Despite their shared centrism, there was an ideological difference that separated them. They championed different constituencies. Where Sinema built an alliance with Wall Street, Manchin enjoyed occasionally sticking it to the bankers, like a good old-fashioned populist from the hollers. And where Manchin felt a home-state duty to the fossil fuels industry, and personally benefited from its success, Sinema wanted to break its stranglehold over climate policy. In the course of negotiations with Schumer, Manchin had insisted on a provision ending the carried-interest loophole—a gaping unfairness in the tax code that allows hedge fund and private equity managers to count their revenue as capital gains and avoid the income tax. But Sinema had a history of defending that loophole. Manchin had every reason to believe that Sinema would despise his proposal—and that she would likely consider it a red line—but he insisted on pushing forward with it, regardless. Schumer didn’t fight Manchin. He wasn’t going to worry about his Sinema problem when it was theoretical. But now her objection was more than a theoretical source of worry. Sinema constituted the primary obstacle to the realization of Schumer’s greatest achievement, and he was stuck.
”
”
Franklin Foer (The Last Politician: Inside Joe Biden's White House and the Struggle for America's Future)
“
The fact that the word “metaverse” was drawn from Snow Crash by Neal Stephenson—a 1992 sci-fi novel in which people don virtual reality headsets to escape a societal collapse so profound that corporate franchises are the main source of authority—was no deterrent.
”
”
Jeff Horwitz (Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets)