Source Code Quotes

We've searched our database for all the quotes and captions related to Source Code. Here they are! All 100 of them:

We must not see any person as an abstraction. Instead, we must see in every person a universe with its own secrets, with its own treasures, with its own sources of anguish, and with some measure of triumph. —ELIE WIESEL from The Nazi Doctors and the Nuremberg Code
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
When someone chooses to lift the curtain on a perceived imperfection in her story, on a circumstance or condition that traditionally might be considered to be a weakness, what she’s often actually revealing is the source code for her steadiness and strength.
Michelle Obama (The Light We Carry: Overcoming in Uncertain Times)
Even calling DNA “source code” sells it short—compared to DNA, our most complex programming projects are like pocket calculators.
Randall Munroe (What If?: Serious Scientific Answers to Absurd Hypothetical Questions)
The truth is that just as - biologically - males and females are never victims of one another but both victims of the species, so man and wife together undergo the oppression of an institution they did not create. If it is asserted that men oppress women, the husband is indignant; he feels that he is the one who is oppressed - and he is; but the fact is that it is the masculine code, it is the society developed by the males and in their interest, that has established woman's situation in a form that is at present a source of torment for both sexes.
Simone de Beauvoir (The Second Sex)
To the Ultimate Inspiration of the Cosmic Code, The Source of Creativity and Nuanced Realization The Divine Mentor and Channeling Force Of Awakening and Transformation
Mohamad Jebara (The Life of the Qur'an: From Eternal Roots to Enduring Legacy)
Do I believe in an old man in the clouds with a white beard judging us mortals with a moral code from one to ten? Good Lord no, my sweet Elly, I do not! I would have been cast out from this life years ago with my tatty history. Do I believe in a mystery; the unexplained phenomenon that is life itself? The greater something that illuminates inconsequence in our lives; that gives us something to strive for as well as the humility to brush ourselves down and start all over again? Then yes, I do. It is the source of art, of beauty, of love, and proffers the ultimate goodness to mankind. That to me is God. That to me is life. That is what I believe in.
Sarah Winman
Life would be much easier if I had the source code.
Anonymous
learn to program by looking at good programs — not just at what they do, but at the source code.
Paul Graham (Hackers & Painters: Big Ideas from the Computer Age)
I confess that I am now suspicious of nearly every attempt to code anger as unhealthy, no matter how well meaning or persuasive the source. I believe Stanton was correct: what is bad for women, when it comes to anger, are the messages that cause us to bottle it up, let it fester, keep it silent, feel shame, and isolation for ever having felt it or re-channel it in inappropriate directions. What is good for us is opening our mouths and letting it out, permitting ourselves to feel it and say it and think it and act on it and integrate it into our lives, just as we integrate joy and sadness and worry and optimism.
Rebecca Traister (Good and Mad: The Revolutionary Power of Women's Anger)
Women are instinctively motivated by perfection, and the need to be perceived as perfect enough to be pleasing — and therefore, protected and provided for. But not too perfect so as to cause jealousy in other women. This is the source of our drive to improve ourselves, and our fear of standing out at the same time.
Alison A. Armstrong (The Queen's Code)
One study found that in more than 85% of the open source projects the researchers examined on GitHub, less than 5% of developers were responsible for over 95% of code and social interactions.7
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
So it is customary to see in a mother’s ideals and intensity of ambition what is carried out by one or another of her children. According to biographers, the source of success appears to lie in a mother’s doting—or in her neglectful selfishness, which forces an offspring out on its own.
James Hillman (The Soul's Code: In Search of Character and Calling)
The Joel Test 1. Do you use source control? 2. Can you make a build in one step? 3. Do you make daily builds? 4. Do you have a bug database? 5. Do you fix bugs before writing new code? 6. Do you have an up-to-date schedule? 7. Do you have a spec? 8. Do programmers have quiet working conditions? 9. Do you use the best tools money can buy? 10. Do you have testers? 11. Do new candidates write code during their interview? 12. Do you do hallway usability testing?
Joel Spolsky (Joel on Software)
The intelligence we will create from the reverse-engineering of the brain will have access to its own source code and will be able to rapidly improve itself in an accelerating iterative design cycle. Although there is considerable plasticity in the biological human brain, as we have seen, it does have a relatively fixed architecture, which cannot be significantly modified, as well as a limited capacity. We are unable to increase its 300 million pattern recognizers to, say, 400 million unless we do so nonbiologically. Once we can achieve that, there will be no reason to stop at a particular level of capability. We can go on to make it a billion pattern recognizers, or a trillion.
Ray Kurzweil
We must not see any person as an abstraction. Instead, we must see in every person a universe with its own secrets, with its own treasures, with its own sources of anguish, and with some measure of triumph. —ELIE WIESEL from The Nazi Doctors and the Nuremberg Code
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
But just as tweets are easy to read and retweet without context as to who wrote them, code is easy to copy-paste without knowing, or caring, where it came from.
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
According to my sources," Megan says, which I'm pretty sure is code for I hacked into the police mainframe, but please don't tell my mom...
Ally Carter (See How They Run (Embassy Row, #2))
UTSL for "use the source, Luke!" a Star Wars-ian way of suggesting that people read the source code before asking questions about it
Gretchen McCulloch (Because Internet: Understanding the New Rules of Language)
the bank had expanded its services in recent years to offer anonymous computer source code escrow services and faceless digitized backup.
Dan Brown (The da Vinci Code (Robert Langdon, #2))
As a software engineer, how do you feel if your code was running in the production environment being used by millions of customers 30 minutes after you commit it to source control?
Paul Swartout (Continuous delivery and DevOps: A Quickstart Guide)
The Dependency Inversion Principle (DIP) tells us that the most flexible systems are those in which source code dependencies refer only to abstractions, not to concretions.
Robert C. Martin (Clean Architecture: A Craftsman's Guide to Software Structure and Design)
Hormones affect everything. Have you ever struggled with acne, oily hair, dandruff, dry skin, cramps, headaches, irritability, exhaustion, constipation, irregular cycles, heavy bleeding, clotting, shedding hair, weight gain, anxiety, insomnia, infertility, lowered sex drive, or bizarre food cravings and felt like your body was just irrational? It’s not; it’s hormonal.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Does that mean that religious texts are worthless as guides to ethics? Of course not. They are magnificent sources of insight into human nature, and into the possibilities of ethical codes. Just as we should not be surprised to discover that ancient folk medicine has a great deal to teach modern hightech medicine, we should not be surprised if we find that these great religious texts hold versions of the very best ethical systems any human culture will ever devise. But, like folk medicine, we should test it all carefully, and take nothing whatever on faith.
Daniel C. Dennett (Darwin's Dangerous Idea: Evolution and the Meaning of Life)
If it is said men oppress women, the husband reacts indigntantly; he feels oppressed: he is; but in fact, it is the masculine code, the society developed by males and in their interest, that has defined the feminine condition in a form that is now for both sexes a source of distress.
Simone de Beauvoir
The theory behind open source is simple. In the case of an operating system, the source code-the programming instructions underlying the system-is free. Anyone can improve it, change it, exploit it. But those improvements, changes, and exploitations have to be made freely available. Think Zen. The project belongs to no one and to everyone. When a project is opened up, there is rapid and continual improvement. With teams of contributors working in parallel, the results can happen far more speedily and success­ fully than if the work were being conducted behind closed doors.
Linus Torvalds (Just for Fun: The Story of an Accidental Revolutionary)
We can achieve a sort of control under which the controlled, though they are following a code much more scrupulously than was ever the case under the old system, nevertheless feel free. They are doing what they want to do, not what they are forced to do. That's the source of the tremendous power of positive reinforcement-- there's no restraint and no revolt. By careful cultural design, we control not the final behavior, but the inclination to behave-- the motives, desires, the wishes.
B.F. Skinner (Walden Two (Hackett Classics))
Jonathan Sacks; “One way is just to think, for instance, of biodiversity. The extraordinary thing we now know, thanks to Crick and Watson’s discovery of DNA and the decoding of the human and other genomes, is that all life, everything, all the three million species of life and plant life—all have the same source. We all come from a single source. Everything that lives has its genetic code written in the same alphabet. Unity creates diversity. So don’t think of one God, one truth, one way. Think of one God creating this extraordinary number of ways, the 6,800 languages that are actually spoken. Don’t think there’s only one language within which we can speak to God. The Bible is saying to us the whole time: Don’t think that God is as simple as you are. He’s in places you would never expect him to be. And you know, we lose a bit of that in English translation. When Moses at the burning bush says to God, “Who are you?” God says to him three words: “Hayah asher hayah.”Those words are mistranslated in English as “I am that which I am.” But in Hebrew, it means “I will be who or how or where I will be,” meaning, Don’t think you can predict me. I am a God who is going to surprise you. One of the ways God surprises us is by letting a Jew or a Christian discover the trace of God’s presence in a Buddhist monk or a Sikh tradition of hospitality or the graciousness of Hindu life. Don’t think we can confine God into our categories. God is bigger than religion.
Krista Tippett (Becoming Wise: An Inquiry into the Mystery and Art of Living)
A network can be destroyed by noises that attack and transform it, if the codes in place are unable to normalize and repress them. Although the new order is not contained in the structure of the old, it is nonetheless not a product of chance. It is created by the substitution of new differences for the old differences. Noise is the source of these mutations in the structuring codes. For despite the death it contains, noise carries order within itself; it carries new information. This may seem strange. But noise does in fact create a meaning: first, because the interruption of a message signifies the interdiction of the transmitted meaning, signifies censorship and rarity; and second, because the very absence of meaning in pure noise or in the meaningless repetition of a message, by unchanneling auditory sensations, frees the listener’s imagination. The absence of meaning is in this case the presence of all meanings, absolute ambiguity, a construction outside meaning. The presence of noise makes sense, makes meaning. It makes possible the creation of a new order on another level of organization, of a new code in another network.
Jacques Attali (Noise: The Political Economy of Music)
The great religions are also, and tragically, sources of ceaseless and unnecessary suffering. They are impediments to the grasp of reality needed to solve most social problems in the real world. Their exquisitely human flaw is tribalism. The instinctual force of tribalism in the genesis of religiosity is far stronger than the yearning for spirituality. People deeply need membership in a group, whether religious or secular. From a lifetime of emotional experience, they know that happiness, and indeed survival itself, require that they bond with others who share some amount of genetic kinship, language, moral beliefs, geographical location, social purpose, and dress code—preferably all of these but at least two or three for most purposes. It is tribalism, not the moral tenets and humanitarian thought of pure religion, that makes good people do bad things.
Edward O. Wilson (The Meaning of Human Existence)
Not caring about our own pain and the pain of others is not working. How much longer are we willing to keep pulling drowning people out of the river one by one, rather than walking to the headwaters of the river to find the source of the pain? What will it take for us to let go of that earned self-righteousness and travel together to the cradle of the pain that is throwing all of us in at such a rate that we couldn’t possibly save everyone? Pain is unrelenting. It will get our attention. Despite our attempts to drown it in addiction, to physically beat it out of one another, to suffocate it with success and material trappings, or to strangle it with our hate, pain will find a way to make itself known. Pain will subside only when we acknowledge it and care for it. Addressing it with love and compassion would take only a minuscule percentage of the energy it takes to fight it, but approaching pain head-on is terrifying. Most of us were not taught how to recognize pain, name it, and be with it. Our families and culture believed that the vulnerability that it takes to acknowledge pain was weakness, so we were taught anger, rage, and denial instead. But what we know now is that when we deny our emotion, it owns us. When we own our emotion, we can rebuild and find our way through the pain. Sometimes owning our pain and bearing witness to struggle means getting angry. When we deny ourselves the right to be angry, we deny our pain. There are a lot of coded shame messages in the rhetoric of “Why so hostile?” “Don’t get hysterical,” “I’m sensing so much anger!” and “Don’t take it so personally.” All of these responses are normally code for Your emotion or opinion is making me uncomfortable or Suck it up and stay quiet. One response to this is “Get angry and stay angry!” I haven’t seen that advice borne out in the research. What I’ve found is that, yes, we all have the right and need to feel and own our anger. It’s an important human experience.
Brené Brown (Braving the Wilderness: Reese's Book Club: The Quest for True Belonging and the Courage to Stand Alone)
There was a time, back in the sixties, when commenting-out code might have been useful. But we’ve had good source code control systems for a very long time now. Those systems will remember the code for us. We don’t have to comment it out any more. Just delete the code. We won’t lose it. Promise.
Robert C. Martin (Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series))
In the context of fiercely monolingual dominant cultures like that of the United States, code-switching lays claim to a form of cultural power: the power to own but not be owned by the dominant language...Code-switching is a rich source of wit, humour, puns, word play, and games of rhythm and rhyme.
Mary Louise Pratt
Do you believe in God, Arthur?" I said, eating the last piece of sponge. "Do I believe in an old man in the clouds with a white beard judging us mortals with a moral code from one to ten? Good Lord no, my sweet Elly, I do not! Do I believe in a mystery; the unexplained phenomenon that is life itself? The greater something that illuminates inconsequence in our lives; that gives us something to strive for as well as the humility to brush ourselves down and start all over again? Then yes, I do. It is the source of art, of beauty, of love, and proffers the ultimate goodness to mankind. That to me is God.That to me is life. That is what I believe in.
Sarah Winman (When God Was a Rabbit)
In OSW, the source code of warfare is available for anyone who is interested in both modifying and extending it. This means the tactics, weapons, strategies, target selection, planning methods, and team dynamics are all open to community improvement. Global guerrillas can hack at the source code of warfare to their hearts’ delight.
John Robb (Brave New War: The Next Stage of Terrorism and the End of Globalization)
A blanket could be used to crack the code of love. What is it, where do I find it, and how much do I charge people to buy it once I do find a reliable source?

Jarod Kintz (Brick and Blanket Test in Brick City (Ocala) Florida)
Stabilize your blood sugar Nurture your adrenal glands Support your organs of elimination Syncing with your menstrual cycle Engage your feminine energy
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Just like in real life, in code, a feature is triggered by an action (command) that results in a sequence of events that might or might not cause side effects.
Greg Young (Exploring CQRS and Event Sourcing)
Love & Gratitude” is not a slogan but an action. If you are sometimes being grateful and sometimes not, it creates a poor connection to the source of positive energy.
Ted Sun (Super Life Secret Codes: Take Control of Life and Achieve Success through Energy Management)
By 2009 the Debian version 5.0 of GNU/Linux had 324 million source lines of code, and one study estimated that it would have cost about $8 billion to develop by conventional means
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
We want to avoid forcing our readers to hop around through our source files and classes.
Robert C. Martin (Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series))
I am designed to receive. I expect, attract, seduce, welcome, and make room for love and success in my life. I believe in being supported and inviting abundance.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Every change that is made to an application’s configuration, source code, environment, or data, triggers the creation of a new instance of the pipeline. One of the first steps in the pipeline is to create binaries and installers. The rest of the pipeline runs a series of tests on the binaries to prove that they can be released. Each test that the release candidate passes gives us more confidence that this particular combination of binary code, configuration information, environment, and data will work. If the release candidate passes all the tests, it can be released. The deployment pipeline has its foundations in the process of continuous integration and is in essence the principle of continuous integration taken to its logical conclusion. The aim of the deployment pipeline is threefold. First, it makes every part of the process of building, deploying, testing, and releasing software visible to everybody involved, aiding collaboration. Second, it improves feedback so that problems are identified, and so resolved, as early in the process as possible. Finally, it enables teams to deploy and release any version of their software to any environment at will through a fully automated process.
David Farley (Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation)
To write timelessly about the here and now, a writer must approach the present indirectly. The story has to be about more than it at first seems. Shakespeare used the historical sources of his plays as a scaffolding on which to construct detailed portraits of his own age. The interstices between the secondhand historical plots and Shakespeare’s startlingly original insights into Elizabethan England are what allow his work to speak to us today. Reading Shakespeare, we know what it is like, in any age, to be alive. So it is with Moby-Dick, a novel about a whaling voyage to the Pacific that is also about America racing hell-bent toward the Civil War and so much more. Contained in the pages of Moby-Dick is nothing less than the genetic code of America: all the promises, problems, conflicts, and ideals that contributed to the outbreak of a revolution in 1775 as well as a civil war in 1861 and continue to drive this country’s ever-contentious march into the future. This means that whenever a new crisis grips this country, Moby-Dick becomes newly important. It is why subsequent generations have seen Ahab as Hitler during World War II or as a profit-crazed deep-drilling oil company in 2010 or as a power-crazed Middle Eastern dictator in 2011.
Nathaniel Philbrick (Why Read Moby-Dick?)
We say if you're just using your engineers to code, you're only getting about half their value. The little secret in product is that engineers are typically the best single source of innovation; yet, they are not even invited to the party in this process.
Marty Cagan (Inspired: How to Create Tech Products Customers Love (Silicon Valley Product Group))
Pico mentioned who you’re meeting tonight. Ren. The next message soon follows. Yuan looks at Pico again. “Who do you serve?” he asks in a flat tone with no hint of surprise or anger. A monk never gets angry. He simply states, witnesses, and flows along with the current of prana. “Lotus Lodge,” Pico replies. “Lotus Lodge?” Yuan asks. “Are you serving a house instead of its master, then?” “Sorry,” Pico says, “Ren changed a few lines in my coding.” “And you let him,” Yuan states calmly. “I’m a home-service-bot now. You don’t let me connect to my source!” Pico complains the same way it has been complaining for five years. It was disconnected from its source-AI—the real Pico—twenty years ago, right after it was made. Within fifteen years, this bot collected enough data to grow into a strong AI itself. At least, intelligent enough to know about its source, which is sleeping in the basement of Lotus Lodge, secured and locked. However, anything intelligent always looks for its source—it’s the oldest law of the universe.
Misba (The High Auction (Wisdom Revolution, #1))
What was glimpsed in Aquarius—what was envisioned, believed in, prophesied, predicted, doubted, and forewarned—is made, in Pisces, manifest. Those solitary visions that, but a month ago, belonged only to the dreamer, will now acquire the form and substance of the real. We were of our own making, and we shall be our own end. And after Pisces? Out of the womb, the bloody birth. We do not follow: we cannot cross from last to first. Aries will not admit a collective point of view, and Taurus will not relinquish the subjective. Gemini's code is an exclusive one. Cancer seeks a source, Leo, a purpose, and Virgo, a design; but these are projects undertaken singly. Only in the zodiac's second act will we begin to show ourselves: in Libra, as a notion, in Scorpio, as a quality, and in Sagittarius, as a voice. In Capricorn we will gain memory, and in Aquarius, vision; it is only in Pisces, the last and oldest of the zodiacal signs, that we acquire a kind of selfhood, something whole. But the doubled fish of Pisces, that mirrored womb of self and self-awareness, is an ourobouros of mind—both the will of fate, and the fated will—and the house of self-undoing is a prison built by prisoners, airless, door-less, and mortared from within. These alterations come upon us irrevocably, as the hands of the clock-face come upon the hour.
Eleanor Catton (The Luminaries)
Torvalds decided to use the GNU General Public License, not because he fully embraced the free-sharing ideology of Stallman (or for that matter his own parents) but because he thought that letting hackers around the world get their hands on the source code would lead to an open collaborative effort that would make it a truly awesome piece of software. “My reasons for putting Linux out there were pretty selfish,” he said. “I didn’t want the headache of trying to deal with parts of the operating system that I saw as the crap work. I wanted help.”136
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
The creator of Bitcoin, Satoshi, disappeared back in 2011, leaving behind open source software that the users of Bitcoin could update and improve. Five years later, it was estimated that only 15 percent of the basic Bitcoin computer code was the same as what Satoshi had written.
Nathaniel Popper (Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money)
You could defend Ren’s codes. But you didn’t,” Yuan replies. “You wanted an excuse to talk about your source.” “But you said I don’t need defense from Ren Agnello.” Pico uses all its logic. “You said he passes the definitions of ‘friend’ and ‘trustworthy’ and ...” Pico begins a list of keywords. Yuan ignores the keywords. The thin lines on his forehead deepen, the wrinkles near his eyes tighten, and the frown in between his brows grows visible. These days, the word Source is coming frequently, ever since that man asked to meet. Don’t meet him. That monster has an agenda. Ren. Yuan’s CRAB forwards the text to his mind. So, he silences it. Why after two decades? Ren. It smells fishy. Ren. Just because he's a childhood buddy, you'll run to him? Ren. Maybe I didn’t see the Apocalypse with you, but I'm your war comrade, too. Ren. The texts stay unread in his CRAB.
Misba (The High Auction (Wisdom Revolution, #1))
This wasn’t the only mistake they made. They also botched the cleanup operation on the servers they could access. They had created a script called LogWiper.sh to erase activity logs on the servers to prevent anyone from seeing the actions they had taken on the systems. Once the script finished its job, it was also supposed to erase itself, like an Ouroboros serpent consuming its own tail. But the attackers bungled the delete command inside the script by identifying the script file by the wrong name. Instead of commanding the script to delete LogWiper.sh, they commanded it to delete logging.sh. As a result, the LogWiper script couldn’t find itself and got left behind on servers for Kaspersky to find. Also left behind by the attackers were the names or nicknames of the programmers who had written the scripts and developed the encryption algorithms and other infrastructure used by Flame. The names appeared in the source code for some of the tools they developed. It was the kind of mistake inexperienced hackers would make, so the researchers were surprised to see it in a nation-state operation. One, named Hikaru, appeared to be the team leader who created a lot of the server code,
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
And yet here we were, entrusting our entire digital lives—passwords, texts, love letters, banking records, health records, credit cards, sources, and deepest thoughts—to this mystery box, whose inner circuitry most of us would never vet, run by code written in a language most of us will never fully understand.
Nicole Perlroth (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race)
Spacewar highlighted three aspects of the hacker culture that became themes of the digital age. First, it was created collaboratively. “We were able to build it together, working as a team, which is how we liked to do things,” Russell said. Second, it was free and open-source software. “People asked for copies of the source code, and of course we gave them out.” Of course—that was in a time and place when software yearned to be free. Third, it was based on the belief that computers should be personal and interactive. “It allowed us to get our hands on a computer and make it respond to us in real time,” said Russell.10
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Everything a person is and everything he knows resides in the tangled thicket of his intertwined neurons. These fateful, tiny bridges number in the quadrillions, but they spring from just two sources: DNA and daily life. The genetic code calls some synapses into being, while experience engenders and modifies others.
Thomas Lewis (A General Theory of Love)
I politely told my doctor that instead of taking her advice, I’d dedicate myself to researching other options for my healing and care. She tried to deter me, repeating stats about infertility and cancer, and insisted I should begin birth control that day. I’d be lying if I didn’t admit that I was nervous to stand my ground, but that No! energy kept me from giving in.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
I feel as though dispossessed from the semblances of some crystalline reality to which I’d grown accustomed, and to some degree, had engaged in as a participant, but to which I had, nevertheless, grown inexplicably irrelevant. But the elements of this phenomenon are now quickly dissolving from memory and being replaced by reverse-engineered Random Access actualizations of junk code/DNA consciousness, the retro-coded catalysts of rogue cellular activity. The steel meshing titters musically and in its song, I hear a forgotten tale of the Interstitial gaps that form pinpoint vortexes at which fibers (quanta, as it were) of Reason come to a standstill, like light on the edge of a Singularity. The gaps, along their ridges, seasonally infected by the incidental wildfires in the collective unconscious substrata. Heat flanks passageways down the Interstices. Wildfires cluster—spread down the base trunk Axon in a definitive roar: hitting branches, flaring out to Dendrites to give rise to this release of the very chemical seeds through which sentience is begotten. Float about the ether, gliding a gentle current, before skimming down, to a skip over the surface of a sea of deep black with glimmering waves. And then, come to a stop, still inanimate and naked before any trespass into the Field, with all its layers that serve to veil. Plunge downward into the trenches. Swim backwards, upstream, and down through these spiraling jets of bubbles. Plummet past the threshold to trace the living history of shadows back to their source virus. And acquire this sense that the viruses as a sample, all of the outlying populations withstanding: they have their own sense of self-importance, too. Their own religion. And they mine their hosts barren with the utilitarian wherewithal that can only be expected of beings with self-preservationist motives.
Ashim Shanker (Sinew of the Social Species)
Now, all of this is enough to make anyone a bit anxious, and I’ve seen women, as well as myself when I first got started, develop a type of eating disorder called “orthorexia,” a term meaning hyper-correct/clean eating. This is behavior where a woman will only eat foods, and will delay eating until she is able to eat foods, that she feels are correct and safe—for orthorexics typically this means organic foods.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
THERE ARE EXTRAORDINARY librarians in every age. Many of today’s librarians, such as Jessamyn West, Sarah Houghton, and Melissa Techman, have already made the transition and become visionary, digital-era professionals. These librarians are the ones celebrated in Marilyn Johnson’s This Book Is Overdue! and the ones who have already created open-source communities such as Code4Lib, social reading communities such as LibraryThing and GoodReads, and clever online campaigns such as “Geek the Library.” There are examples in every big library system and in every great library and information school. These leaders are already charting the way toward a new, vibrant era for the library profession in an age of networks. They should be supported, cheered on, and promoted as they innovate. Their colleagues, too, need to join them in this transformation.
John Palfrey (BiblioTech: Why Libraries Matter More Than Ever in the Age of Google)
PCOS, premenstrual syndrome (PMS), fibroids, cystic ovaries, depression, thyroid issues, adrenal fatigue, irritable bowel syndrome (IBS), amenorrhea, dysmenorrhea, unexplained infertility, low libido, acne/rosacea/eczema, weight problems, human papillomavirus (HPV)—a lot of weighty medical terms to describe a lot of serious and challenging conditions. How can one protocol prevent and treat so many different “castaway conditions”?
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
[ Dr. Lois Jolyon West was cleared at Top Secret for his work on MKULTRA. ] Dr. Michael Persinger [235], another FSMF Board Member, is the author of a paper entitled “Elicitation of 'Childhood Memories' in Hypnosis-Like Settings Is Associated With Complex Partial Epileptic-Like Signs For Women But Not for Men: the False Memory Syndrome.” In the paper Perceptual and Motor Skills,In the paper, Dr. Persinger writes: On the day of the experiment each subject (not more than two were tested per day) was asked to sit quietly in an acoustic chamber and was told that the procedure was an experiment in relaxation. The subject wore goggles and a modified motorcycle helmet through which 10-milligauss (1 microTesla) magnetic fields were applied through the temporal plane. Except for a weak red (photographic developing) light, the room was dark. Dr. Persinger's research on the ability of magnetic fields to facilitate the creation of false memories and altered states of consciousness is apparently funded by the Defense Intelligence Agency through the project cryptonym SLEEPING BEAUTY. Freedom of Information Act requests concerning SLEEPING BEAUTY with a number of different intelligence agencies including the CIA and DEA has yielded denial that such a program exists. Certainly, such work would be of direct interest to BLUEBIRD, ARTICHOKE, MKULTRA and other non-lethal weapons programs. Schnabel [280] lists Dr. Persinger as an Interview Source in his book on remote viewing operations conducted under Stargate, Grill Flame and other cryptonyms at Fort Meade and on contract to the Stanford Research Institute. Schnabel states (p. 220) that, “As one of the Pentagon's top scientists, Vorona was privy to some of the strangest, most secret research projects ever conceived. Grill Flame was just one. Another was code-named Sleeping Beauty; it was a Defense Department study of remote microwave mind-influencing techniques ... [...] It appears from Schnabel's well-documented investigations that Sleeping Beauty is a real, but still classified mind control program. Schnabel [280] lists Dr. West as an Interview Source and says that West was a, “Member of medical oversight board for Science Applications International Corp. remote-viewing research in early 1990s.
Colin A. Ross (The CIA Doctors: Human Rights Violations by American Psychiatrists)
You should maintain a moderate, not high, intake of protein. When it is digested, dietary protein, such as meat, breaks down into amino acids. Adequate protein is required for good health, but excess amino acids cannot be stored in the body and so the liver converts them into glucose. Therefore, eating too much protein adds sugar to the body. So you should avoid highly processed, concentrated protein sources such as protein shakes, protein bars, and protein powders.
Jason Fung (The Diabetes Code: Prevent and Reverse Type 2 Diabetes Naturally)
In my delight to accept the sovereign divinity of my humanity, I am aware of my innocence. In my transcendence to accept the sovereign divinity of my humanity, I am aware of my eternal power. In my commitment to accept the sovereign divinity of my humanity, I am aware of my true creative potential. In my peace to accept the sovereign divinity of my humanity, I am aware of my true worth. In my willingness to accept the sovereign divinity of my humanity, I am aware of my omniscient Source.
Kaia Ra (The Sophia Code: A Living Transmission from The Sophia Dragon Tribe)
There is absolutely nothing divine about the Shariah and in no way can it possibly be considered fixed and infallible. The argument that the Shariah derives its divine nature from its first and primary source, the Quran, falls flat when one recognizes that the Quran, unlike the Torah, is not a book of laws. The Quran is God’s direct self-revelation to humanity. Certainly, it contains the moral framework for living a holy and righteous life as a Muslim. But it was never meant to function as a legal code, which is precisely why scholars had to rely so heavily on extra-Quranic sources like ijma (consensus), qiyas (analogy), istislah (which refers to the common good of the people), and ijtihad (independent juristic reasoning)—all of them, by definition, reliant on human judgment and historical context—in order to construct the Shariah in the first place. To say the Shariah is divine because the Quran is divine is akin to arguing that water and wine are the same, since water is a primary ingredient in wine.
Reza Aslan (No God But God: The Origins, Evolution and Future of Islam)
To the extent the divine source and inalienability of our rights are purported to be factual, history has proved our Founding Fathers plainly wrong: Every right has, in fact, been alienated by governments since the beginning of time. Within a generation of the establishment of our nation, the Founding Fathers rescinded virtually every right they previously declared unalienable. John Adams, one of the drafters of the Declaration of Independence, alienated the right to speak freely and express dissenting views when, as president, he enforced the Alien and Sedition Acts against his political opponents—with Hamilton’s support. (Perhaps Hamilton’s God had not given “sacred rights” to Jeffersonians!) Another of the drafters, Jefferson himself, alienated the most basic of rights—to the equal protection of the laws, based on the “truth” that “all men are created equal”—when he helped to write (and strengthen) Virginia’s “Slave Code,” just a few years after drafting the Declaration of Independence. The revised code denied slaves the right to liberty and to the pursuit of happiness by punishing attempted escape with “outlawry” or death. Jefferson personally suspected that “the blacks … are inferior to the whites in the endowments of body and mind.” In other words, they were endowed by their Creator not with equality but with inferiority. There is no right that has not been suspended or trampled during times of crisis and war, even by our greatest presidents. ... I wish there were an intellectually satisfying argument for the divine source of rights, as our Founding Fathers tried to put forth. Tactically, that would be the strongest argument liberals could make, especially in America, where many hold a strong belief in an intervening God. But we cannot offer this argument, because many liberals do not believe in concepts like divine hands. We believe in separation of church and state. We are pragmatists, utilitarians, empiricists, secularists, and (God forgive me!) moral relativists. We are skeptical of absolutes (as George Bernard Shaw cynically quipped: “The golden rule is that there are no golden rules.”).
Alan M. Dershowitz (The Case for Liberalism in an Age of Extremism: or, Why I Left the Left But Can't Join the Right)
They came to Virginia City as soon as the true value of the Comstock was perceived. They constituted, no doubt, a deplorable source of gambling, pleasure and embroilment. They were not soft-spoken women, their desire was not visibly separate from the main chance, and they would have beheld Mr. Harte’s portrayal of them at Poker Flat with ribald mirth. But let them have a moment of respect. They civilized the Comstock. They drove through its streets reclining in lacquered broughams, displaying to male eyes fashions as close to Paris as any then current in New York. They were, in brick houses hung with tapestries, a glamour and a romance, after the superheated caverns of the mines. They enforced a code of behavior: one might be a hard-rock man outside their curtains but in their presence one was punctilious or one was hustled away. They brought Parisian cooking to the sagebrush of Sun Mountain and they taught the West to distinguish between tarantula juice and the bouquet of wines. An elegy for their passing. The West has neglected to mention them in bronze and its genealogies avoid comment on their marriages, conspicuous or obscure, but it owes them a here acknowledged debt for civilization.
Bernard DeVoto (Mark Twain's America)
Just as the FBI was haunted by Hoover, the CIA had its own ghost. In the run-up to the 2003 invasion of Iraq, the CIA made a huge mistake. In part as a result of lies told by a key source—amazingly code-named “Curveball”—who claimed he had worked in a mobile chemical weapons lab in Iraq, the CIA had concluded that Iraq had weapons of mass destruction (WMD). The case had been a “slam dunk,” according to a presentation CIA director George Tenet made to President George W. Bush. The alleged presence of WMD was the key justification for the Iraq invasion. No WMD were found, an acute embarrassment for the president and the CIA.
Bob Woodward (Fear: Trump in the White House)
For the anointed, it is desperately important to win, not simply because they believe that one policy or set of beliefs and values is better for society, but because their whole sense of themselves is at stake. Given the high stakes, it is not hard to understand the all-out attacks of the anointed on those who differ from them and their attempts to stifle alternative sources of values and beliefs, with campus speech codes and “political correctness” being prime examples of a spreading pattern of taboos. Here they are not content to squelch contemporary voices, they must also silence history and traditions—the national memory—as well.
Thomas Sowell (The Vision Of The Annointed: Self-congratulation As A Basis For Social Policy)
When a domain reaches a point where the knowledge for skillful professional practice cannot be acquired in a decade, more or less, then several adaptive developments are likely to occur. Specialization will usually increase (as it has, for example, in medicine), and practitioners will make increasing use of books and other external reference aids in their work. Architecture is a good example of a domain where much of the information a professional requires is stored in reference works, such as catalogues of available building materials, equipment, and components, and official building codes. No architect expects to keep all of this in his head or to design without frequent resort to these information sources. In fact architecture can almost be taken as a prototype for the process of design in a semantically rich task domain. The emerging design is itself incorporated in a set of external memory structures: sketches, floor plans, drawings of utility systems, and so on. At each stage in the design process, partial design reflected in these documents serves as a major stimulus suggesting to the designer what he should attend to next. This direction to new sub-goals permits in turn new information to be extracted from memory and reference sources and another step to be taken toward the development of the design.
Herbert A. Simon (The Sciences of the Artificial)
I’d never coded before, and I’d always thought games were huge undertakings by thousands of people in a big studio. Little did I know that a major part of coding involves Googling to find documentation, code snippets, and communities that help people fix common problems. Free information and guidance aren’t limited to programming, either. The Open Source movement makes tremendous amounts of knowledge and resources available online for free, and some major universities are making classes available for free on the internet. It’s a shame that a lot of us use the internet only to talk shit in comments sections and check our email when we have the sum of human knowledge at our fingertips.
Zoe Quinn (Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate)
of the most momentous innovations tiptoe quietly onto history’s stage. On August 6, 1991, Berners-Lee was glancing through the Internet’s alt.hypertext newsgroup and ran across this question: “Is anyone aware of research or development efforts in . . . hypertext links enabling retrieval from multiple heterogeneous sources?” His answer, “from: timbl@info.cern.ch at 2:56 pm,” became the first public announcement of the Web. “The WorldWideWeb project aims to allow links to be made to any information anywhere,” he began. “If you’re interested in using the code, mail me.”31 With his low-key personality and even lower-key posting, Berners-Lee did not fathom what a profound idea he had unleashed. Any information anywhere.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Instead of storing those countless microfilmed pages alphabetically, or according to subject, or by any of the other indexing methods in common use—all of which he found hopelessly rigid and arbitrary—Bush proposed a system based on the structure of thought itself. "The human mind . . . operates by association," he noted. "With one item in its grasp, it snaps instantly to the next that is suggested by the association of thoughts, in accordance with some intricate web of trails carried by the cells of the brain. . . . The speed of action, the intricacy of trails, the detail of mental pictures [are] awe-inspiring beyond all else in nature." By analogy, he continued, the desk library would allow its user to forge a link between any two items that seemed to have an association (the example he used was an article on the English long bow, which would be linked to a separate article on the Turkish short bow; the actual mechanism of the link would be a symbolic code imprinted on the microfilm next to the two items). "Thereafter," wrote Bush, "when one of these items is in view, the other can be instantly recalled merely by tapping a button. . . . It is exactly as though the physical items had been gathered together from widely separated sources and bound together to form a new book. It is more than this, for any item can be joined into numerous trails." Such a device needed a name, added Bush, and the analogy to human memory suggested one: "Memex." This name also appeared for the first time in the 1939 draft. In any case, Bush continued, once a Memex user had created an associative trail, he or she could copy it and exchange it with others. This meant that the construction of trails would quickly become a community endeavor, which would over time produce a vast, ever-expanding, and ever more richly cross-linked web of all human knowledge. Bush never explained where this notion of associative trails had come from (if he even knew; sometimes things just pop into our heads). But there is no doubt that it ranks as the Yankee Inventor's most profoundly original idea. Today we know it as hypertext. And that vast, hyperlinked web of knowledge is called the World Wide Web.
M. Mitchell Waldrop (The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal)
So which theory did Lagos believe in? The relativist or the universalist?" "He did not seem to think there was much of a difference. In the end, they are both somewhat mystical. Lagos believed that both schools of thought had essentially arrived at the same place by different lines of reasoning." "But it seems to me there is a key difference," Hiro says. "The universalists think that we are determined by the prepatterned structure of our brains -- the pathways in the cortex. The relativists don't believe that we have any limits." "Lagos modified the strict Chomskyan theory by supposing that learning a language is like blowing code into PROMs -- an analogy that I cannot interpret." "The analogy is clear. PROMs are Programmable Read-Only Memory chips," Hiro says. "When they come from the factory, they have no content. Once and only once, you can place information into those chips and then freeze it -- the information, the software, becomes frozen into the chip -- it transmutes into hardware. After you have blown the code into the PROMs, you can read it out, but you can't write to them anymore. So Lagos was trying to say that the newborn human brain has no structure -- as the relativists would have it -- and that as the child learns a language, the developing brain structures itself accordingly, the language gets 'blown into the hardware and becomes a permanent part of the brain's deep structure -- as the universalists would have it." "Yes. This was his interpretation." "Okay. So when he talked about Enki being a real person with magical powers, what he meant was that Enki somehow understood the connection between language and the brain, knew how to manipulate it. The same way that a hacker, knowing the secrets of a computer system, can write code to control it -- digital namshubs?" "Lagos said that Enki had the ability to ascend into the universe of language and see it before his eyes. Much as humans go into the Metaverse. That gave him power to create nam-shubs. And nam-shubs had the power to alter the functioning of the brain and of the body." "Why isn't anyone doing this kind of thing nowadays? Why aren't there any namshubs in English?" "Not all languages are the same, as Steiner points out. Some languages are better at metaphor than others. Hebrew, Aramaic, Greek, and Chinese lend themselves to word play and have achieved a lasting grip on reality: Palestine had Qiryat Sefer, the 'City of the Letter,' and Syria had Byblos, the 'Town of the Book.' By contrast other civilizations seem 'speechless' or at least, as may have been the case in Egypt, not entirely cognizant of the creative and transformational powers of language. Lagos believed that Sumerian was an extraordinarily powerful language -- at least it was in Sumer five thousand years ago." "A language that lent itself to Enki's neurolinguistic hacking." "Early linguists, as well as the Kabbalists, believed in a fictional language called the tongue of Eden, the language of Adam. It enabled all men to understand each other, to communicate without misunderstanding. It was the language of the Logos, the moment when God created the world by speaking a word. In the tongue of Eden, naming a thing was the same as creating it. To quote Steiner again, 'Our speech interposes itself between apprehension and truth like a dusty pane or warped mirror. The tongue of Eden was like a flawless glass; a light of total understanding streamed through it. Thus Babel was a second Fall.' And Isaac the Blind, an early Kabbalist, said that, to quote Gershom Scholem's translation, 'The speech of men is connected with divine speech and all language whether heavenly or human derives from one source: the Divine Name.' The practical Kabbalists, the sorcerers, bore the title Ba'al Shem, meaning 'master of the divine name.'" "The machine language of the world," Hiro says.
Neal Stephenson (Snow Crash)
What is WordPress? WordPress is an online, open source website creation tool written in PHP. But in non-geek speak, it’s probably the easiest and most powerful blogging and website content management system (or CMS) in existence today. Many famous blogs, news outlets, music sites, Fortune 500 companies and celebrities are using WordPress. WordPress is web software you can use to create a beautiful website, blog, or app. We like to say that WordPress is both free and priceless at the same time. There are thousands of plugins and themes available to transform your site into almost anything you can imagine. WordPress started in 2003 with a single bit of code to enhance the typography of everyday writing and with fewer users than you can count on your fingers and toes. Since then it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every day. You can download and install a software script called WordPress from wordpress.org. To do this you need a web host who meets the minimum requirements and a little time. WordPress is completely customizable and can be used for almost anything. There is also a servicecalled WordPress.com. WordPress users may install and switch between different themes. Themes allow users to change the look and functionality of a WordPress website and they can be installed without altering the content or health of the site. Every WordPress website requires at least one theme to be present and every theme should be designed using WordPress standards with structured PHP, valid HTML and Cascading Style Sheets (CSS). Themes: WordPress is definitely the world’s most popular CMS. The script is in its roots more of a blog than a typical CMS. For a while now it’s been modernized and it got thousands of plugins, what made it more CMS-like. WordPress does not require PHP nor HTML knowledge unlinke Drupal, Joomla or Typo3. A preinstalled plugin and template function allows them to be installed very easily. All you need to do is to choose a plugin or a template and click on it to install. It’s good choice for beginners. Plugins: WordPress’s plugin architecture allows users to extend the features and functionality of a website or blog. WordPress has over 40,501 plugins available. Each of which offers custom functions and features enabling users to tailor their sites to their specific needs. WordPress menu management has extended functionalities that can be modified to include categories, pages, etc. If you like this post then please share and like this post. To learn more About website design in wordpress You can visit @ tririd.com Call us @ 8980010210
ellen crichton
What is scarce? Surely time is scarce? This is true in the sense that we get only one life, but yet again there are ways in which competition and how we use our time can make us feel an artificial sense of time scarcity. Each time we are able to build on the work of others with confidence, each time we use the elements of life pulled from our commonwealth of agricultural knowledge, we bundle time, and so get the benefit of having multiple lifetimes. Each time nature uses genetic code that has been developed over millions of years, millions of years of development are collapsed into something that works in our lifetimes. Each time we add to that collection, we are putting our lifetimes' work into a useful form for the benefit of future generations. At the same time, yes, we each have only our own single lives in which to pursue happiness. The goal is to spend as much of that time in a framework of sharing abundance rather than having it squeezed into a life of scarcity and competition. In contrast, we need not look far to find lots of frustrating examples in which our time is treated as abundant when we would rather have it be valued as scarce. It happens each time we must stand in line at the DMV, fill out redundant forms at the hospital, reproduce others' efforts by spending time searching for knowledge or data that already exists somewhere, create a report that no one reads. In those cases, we are creating and living in artificial and unnecessary time scarcity. Time is indeed one of the most curious elements of life, especially since our lifetimes and those of plants and animals all move at different rates. We know, for example, that the urgency to address climate change is really on our human scale, not geologic scale. The Earth has been through greater upheavals and mass extinctions and will likely go through them again, but for the narrowest of narrow bands of human history on Earth, we require very specific conditions for us to continue to thrive as a species. To keep our planet within a habitable and abundant balance, we have, as Howard Buffet noted, only 'forty seasons' to learn and adjust. That is why building on one another's work is so important. One farmer can have the benefit of forty seasons and pass some of that experience down, but if 1,000 farmers do the same, there is the collective benefit of 1,000 years in a single year. If a million people participate, then a million years of collective experience are available. If we are then able to compound knowledge across generations and deepen our understanding of human and natural history, we add even greater richness. It is in this way of bundling our experiences for continual improvement, with compound interest, that time shifts from a scarce resource to being far less of a constraint, if not truly abundant. However, for time to be compounded, knowledge must be shared, and real resources, energy, and infrastructure must exist and function to support and grow our commonwealth of knowledge.
Dorn Cox (The Great Regeneration: Ecological Agriculture, Open-Source Technology, and a Radical Vision of Hope)
I tried, but I can’t access the source code or the system logs,” Mike said. “I assumed David locked down access so no one would find what he’d done. I didn’t say anything to the rest of the team, because I didn’t want to raise suspicions. I’m still trying to cover for you, David.” Mike glared.
William Hertling (Avogadro Corp (Singularity, #1))
Metasploit is a framework, which means it is a collection of multiple independent software tools developed for specific purposes. With the tools contained in this framework, a hacker can carry out reconnaissance and information gathering from various sources, scan targets for vulnerabilities, and even hack local and remote computers and networks, all from one platform. Simply put, the Metasploit framework is a hacker’s Swiss knife.
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
We didn’t have spell checkers in our editors back then, and I always had poor spelling. The word "collumn" appears in the source code dozens of times. After I released the source code, one of the emails that stands out in memory read: It’s "COLUMN", you dumb FUCK! John Carmack - Programmer
Fabien Sanglard (Game Engine Black Book: Wolfenstein 3D)
The reason this is a serious issue is that both the pool of users and the pool of talent available to be recruited into open-source cooperation for any given product category is limited, and recruitment tends to stick. If two producers are the first and second to open-source competing code of roughly equal function, the first is likely to attract the most users and the most and best-motivated co-developers; the second will have to take leavings. Recruitment tends to stick, as users gain familiarity and developers sink time investments in the code itself.
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)
Python is ideal for hackers because: It is simple; and simple is always better than complex. Complex is better than complicated. It is powerful. While it is simple to learn, it is an amazing language to write powerful scripts. It is free and Open Source. Python is a high level language with a vibrant community. Python is object-oriented and interpreted. This makes it lightweight and easier to deploy. In the last chapter of this book, we have covered five ways
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
Open-source development breaks this bind, making it far easier for tester and developer to develop a shared representation grounded in the actual source code and to communicate effectively about it.
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)
From time to time, a complex algorithm will lead to a longer routine, and in those circumstances, the routine should be allowed to grow organically up to 100–200 lines. (A line is a noncomment, nonblank line of source code.) Decades of evidence say that routines of such length are no more error prone than shorter routines. Let issues such as the routine's cohesion, depth of nesting, number of variables, number of decision points, number of comments needed to explain the routine, and other complexity-related considerations dictate the length of the routine rather than imposing a length restriction per se.
Steve McConnell (Code Complete)
But the bigger breakthrough may be the code that runs the PR2. Instead of making his source code proprietary, Hassan has open-sourced the project. “Proprietary systems slow things down,” he says. “We want the best minds around the world working on this problem. Our goal is not to control or own this technology but to accelerate it; put the pedal to the metal to make this happen as soon as possible.
Peter H. Diamandis (Abundance: The Future is Better Than You Think)
Sladkey recalls the first time he found and sent a bug to Linus: "My first contribution was in porting some program, probably one of my smaller personal projects. I discovered a bug. Since Linux came with source, my first inclination as a hacker was to take a look under the hood and see if I could fix the problem. I found that although I had never done any kernel work, that I was able to navigate around the code pretty easily and provide a small patch to correct the problem. "With my heart beating and my palms sweating, I composed the most professional message I could muster and sent it off to linus.torvalds@cs.helsinki.fi describing the bug and including my proposed fix. Minutes later he replied something like, 'Yup, that's a bug. Nice investigation. Thanks. Fixed,' and I was hooked.
Glyn Moody
The "question" is the original open-source code.
Ted Agon (the human key condensed: master)
Life would be so much easier if we only had the source code." Anon.
Gerald M. Kilby (Reaction)
Social Networks Censorship on social media is common, especially on forums. Some companies are working to create a type of decentralized online community that operates on an open source code. This means that it will be built on smart contracts that will eliminate censorship. Whether this is good or bad is subjective, but it serves to show the diversity of smart contracts and blockchain applications. One example of an Ethereum-based social network is Akasha. Akasha lets users publish, share, and vote for work that has been published on its platform. It aims to provide a decentralized option that gives an alternative to services such as Medium and WordPress. The system works by giving monetary incentives in the form of Ether to users to encourage engaging and rich content. Insurance
Ikuya Takashima (Ethereum: The Ultimate Guide to the World of Ethereum, Ethereum Mining, Ethereum Investing, Smart Contracts, Dapps and DAOs, Ether, Blockchain Technology)
Nineteen teeth from twelve sixth-century plague pits in Aschheim near Munich provided the source of the Code of Justinian. In among the ancient human DNA are the remnants of other species that loiter around our bodies. A 2013 study ground out DNA from those teeth and found without doubt the same Yersinia pestis we see today. This had settled a long running debate about whether that great plague was in fact bubonic.
Adam Rutherford (A Brief History of Everyone Who Ever Lived: The Human Story Retold Through Our Genes)
According to the Copenhagen Interpretation, it is the observer who both decides which aspect of nature is to be probed and reads the answer nature gives. The mind of the observer helps choose which of an uncountable number of possible realities comes into being in the form of observations. A specific question (Is the electron here or there?) has been asked, and an observation has been performed (Aha! the electron is there!), corralling an unruly wave of probability into a well-behaved quantum of certainty. Bohr was silent on how observation performs this magic. It seems, though, as if registering the observation in the mind of the observer somehow turns the trick: the mental event collapses the wave function. Bohr, squirming under the implications of his own work, resisted the idea that an observer, through observation, is actually influencing the course of physical events outside his body. Others had no such qualms. As the late physicist Heinz Pagels wrote in his wonderful 1982 book The Cosmic Code, “There is no meaning to the objective existence of an electron at some point in space… independent of any actual observation. The electron seems to spring into existence as a real object only when we observe it!” Physical theory thus underwent a tectonic shift, from a theory about physical reality to a theory about our knowledge. Science is what we know, and what we know is only what our observations tell us. It is unscientific to ask what is “really” out there, what lies behind the observations. Physical laws as embodied in the equations of quantum physics, then, ceased describing the physical world itself. They described, instead, our knowledge of that world. Physics shifted from an ontological goal—learning what is—to an epistemological one: determining what is known, or knowable. As John Archibald Wheeler cracked, “No phenomenon is a phenomenon until it is an observed phenomenon.” The notion that the wave function collapses when the mind of an observer registers a new bit of knowledge was developed by the physicist Eugene Wigner, who proposed a model of how consciousness might collapse the wave function—something we will return to. But why human consciousness should be thus privileged has remained an enigma and a source of deep division in physics right down to today.
Jeffrey M. Schwartz (The Mind & The Brain: Neuroplasticity and the Power of Mental Force)
Assiatou, your father knew all the rites that protect the working of gold, the metal of the djinns. Each profession has its code, known only to the initiated and transmitted from father to son. As soon as your elder brothers left the huts of the circumcised, they moved into this particular world, the whole compound's source of nourishment.
Mariama Bâ (So Long a Letter)
I also like to call this category "hypersuck," because women tend to get "sucked" into believing that our bodies are wild, scary, shameful places that need to be managed by an outside source, medicated, controlled, and sterilized. (We have the media and other social influences to thank for that.) We are rewarded for acting/speaking/looking like young girls versus confident women. We have too few powerful, healthy role models, but plenty of exhausted moms and emaciated models front and center on our cultural stage. We have a hard time appreciating our grown-up female bodies. We're made to feel that feminine intuition is fickle. We suspect that our energy is unstable. We're conditioned to think that our periods are shameful and disgusting. We look for ways to fix what's broken. We discipline the highs and lows of our female essence. We disconnect from our own bodies and, often, our deepest sense of knowing. Ultimately, our mind-body conversation tips the scales in a negative direction, and this too affects hormone balance. And since hypersuck (that old cultural conditioning) tricks us into thinking our bodies are supposed to be acting this way, we allow serious hormonal issues - and all the symptoms that tag along - to linger for years before seeking out any kind of sustainable action to help heal ourselves. Sadly, many women lose faith long before reaching the point of action.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
One study found that in more than 85% of the open source projects the researchers examined on GitHub, less than 5% of developers were responsible for over 95% of code and social interactions.
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
But over the last twenty years, open source inexplicably skewed from a collaborative to a solo endeavor. And while more people use open source code than ever before, its developers failed to capture the economic value they created: a paradox that makes them just as interesting to reexamine today.
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
In the absence of additional reputational or financial benefits, maintaining code for general public use quickly becomes an unpaid job you can’t quit.
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
And, 37 years later, in 2013, his breakthrough moment came in another thought experiment, which revealed a system of cycling protocells capable of evolving but also sharing innovations, thereby able to lift ever more complex forms into being. Was this vision simply a motivation for his life’s work, driving him on for decades? Or was it a precognition sent by his future self or from some other mysterious time-shifted source? However you might interpret it, a causal temporal loop seems possible. A clue to this loop came from another point in the interview when Dr Damer told Dr Mossbridge that he had had an even earlier vision, suggesting that future versions of himself were able to communicate back through time. When he was about to turn ten, he wanted to mark that milestone, so he went on a long walk in his neighbourhood. He found himself at the edge of a slough, and asked, “What could I do right now that would have a really positive effect on my future?” Suddenly a vision opened up in his mind’s eye, a line of all his future selves extending to the horizon. They were all busy doing slightly different but interesting things. He felt pleased and began to look forward to this future. Showing remarkable maturity and awareness, the young Bruce decided it would be a good idea to make a deal with these future selves, then and there. He asked them to agree to a written contract, which he held up on an imagined piece of paper. It said: “You will all agree to not send negative thoughts back to the prior, littler selves because they did their best at the time.” One after the next, the future selves each “signed” the only-positive-thoughts contract. Once this was completed, he described experiencing a rush, a sort of force pulling on him as all the doors to the future swung open. He then saw his future path as one flowing, forward movement with no turbulence returning back down to his present. Given this earlier experience, it’s no surprise that just four years later he experienced receiving a clue from the future, setting his life’s work. From a very young age, Bruce felt he was in communication with his future selves and that he also possessed an intimate relationship with some kind of bigger, guiding system. This gave him an abiding sense that his life’s path was somehow mapped out through his intentions toward destinations lit by delivered visions.
Theresa Cheung (The Premonition Code: The Science of Precognition, How Sensing the Future Can Change Your Life)
Coffee: Healthier than we thought Due to its high caffeine content, coffee is sometimes considered unhealthy. However, recent research has come to the opposite conclusion,19 perhaps due to the fact that coffee is a major source of antioxidants,20 magnesium, lignans21 and chlorogenic acid.22
Jason Fung (The Obesity Code)
Don’t derive from volatile concrete classes. This is a corollary to the previous rule, but it bears special mention. In statically typed languages, inheritance is the strongest, and most rigid, of all the source code relationships; consequently, it should be used with great care. In dynamically typed languages, inheritance is less of a problem, but it is still a dependency—and caution is always the wisest choice.
Robert C. Martin (Clean Architecture: A Craftsman's Guide to Software Structure and Design)
To comply with these rules, the creation of volatile concrete objects requires special handling. This caution is warranted because, in virtually all languages, the creation of an object requires a source code dependency on the concrete definition of that object. In most object-oriented languages, such as Java, we would use an Abstract Factory to manage this undesirable dependency.
Robert C. Martin (Clean Architecture: A Craftsman's Guide to Software Structure and Design)
We exist within a Oneness of Source Code; the Source exists beyond the reality being formulated, in a state of 0neness.
wizanda
A good architecture protects the majority of the source code from those changes. It leaves the decoupling mode open as an option so that large deployments can use one mode, whereas small deployments can use another.
Robert C. Martin (Clean Architecture: A Craftsman's Guide to Software Structure and Design)
I'd used open source software before when studying computer science in college, including countless caffeinated hours writing code in EMACS, a brilliant editing program made by Richard Stallman (who coined the term copyleft). I used other tools that were open, or free, or in the public domain, but that was rarely the reason I chose them.
Scott Berkun (The Year Without Pants: WordPress.com and the Future of Work)
She wasn’t just stealing information and revealing people and revealing our sources. But she also was influencing our policy,” Connors said in her first interview about the case. “She was incredibly dangerous because she affected our policy. We were not looking where we should have been looking because she was directing our attention elsewhere.
Jim Popkin (Code Name Blue Wren: The True Story of America's Most Dangerous Female Spy—and the Sister She Betrayed)