POPULARITY
Welcome to the Alfalfa Podcast
Unlock the secrets to thriving in tech leadership with the insights of Mark Herschberg, whose own leap from physics aficionado to influential CTO unveils the vast scope of skills beyond engineering might. As Mark joins us, he lays bare the complex tapestry of success in the tech industry, pointing to the indispensable value of capabilities like leadership, networking, and communication. His own pivot from MIT to the startup world and beyond serves as a beacon for those charting their course through the tech sector, highlighting the merit of understanding company-wide goals and the impact of one's individual role. Venturing through Mark's transition from the trenches of coding to the strategic vistas of management during the tech boom of '99, we uncover the strategies that bridge effective teamwork and the essence of recognizing the human component in software projects. Mark's reflection on his progression, akin to outgrowing childhood's Lego structures, showcases the enriching challenges found in leading people and shaping business strategies. His candid anecdotes from the frontline narrate the hard-won lessons on the importance of adapting communication styles to foster robust team dynamics, even in the most remote of working environments. The episode culminates with a deep dive into the innovative strides made by MIT's skills training program, where Mark's collaboration has been pivotal. He shares how marrying industry experience with academic rigor equips the next wave of professionals with the tools for career success. Through this narrative, listeners glimpse the continuous interplay between evolving educational methods, like role-playing, and the real-world demands of the tech industry, encapsulating the journey of professional efficacy from classroom to boardroom.Support the show
In today's episode:What's with all the panic? Can't they rig elections?Joe Manchin flirts with a third-party campaign for presidentGeorgia election fraud comes back front and centerMatt Taibbi goes global with the UK files on government/big tech censorshipKathy Hochul gets dystopian with the backing of the UnipartyPanic in Ukraine as the aid dries upThe Regime interest in providing full narrative support to Israel.Connect with Be Reasonable: https://linktr.ee/imyourmoderatorHear the show when it's released. Become a paid subscriber at imyourmoderator.substack.comVisit the show's sponsors:Make life more comfortable: mypillow.com/reasonableDiversify your assets: kirkelliottphd.com/reasonableOther ways to support the work:ko-fi.com/imyourmoderatorbtc via coinbase: 3MEh9J5sRvMfkWd4EWczrFr1iP3DBMcKk5Merch site: https://cancelcouture.myspreadshop.com/Follow the podcast info stream: t.me/imyourmoderatorOther social platforms: Twitter, Truth Social, Gab, Rumble, or Gettr - @imyourmoderator Become a member at https://plus.acast.com/s/be-reasonable-with-your-moderator-chris-paul. Hosted on Acast. See acast.com/privacy for more information.
In today's episode:What's with all the panic? Can't they rig elections?Joe Manchin flirts with a third-party campaign for presidentGeorgia election fraud comes back front and centerMatt Taibbi goes global with the UK files on government/big tech censorshipKathy Hochul gets dystopian with the backing of the UnipartyPanic in Ukraine as the aid dries upThe Regime interest in providing full narrative support to Israel.Connect with Be Reasonable: https://linktr.ee/imyourmoderatorHear the show when it's released. Become a paid subscriber at imyourmoderator.substack.comVisit the show's sponsors:Make life more comfortable: mypillow.com/reasonableDiversify your assets: kirkelliottphd.com/reasonableOther ways to support the work:ko-fi.com/imyourmoderatorbtc via coinbase: 3MEh9J5sRvMfkWd4EWczrFr1iP3DBMcKk5Merch site: https://cancelcouture.myspreadshop.com/Follow the podcast info stream: t.me/imyourmoderatorOther social platforms: Twitter, Truth Social, Gab, Rumble, or Gettr - @imyourmoderator Become a member at https://plus.acast.com/s/be-reasonable-with-your-moderator-chris-paul. Hosted on Acast. See acast.com/privacy for more information.
Steve Bianchi Chief People Officer at ECARX, sits down to tackle the tough subject of Information Flow, in this final part to the Clarity theme trilogy. People need to have access to the right information to enable them to do their jobs effectively. This needs to include primary information for task execution and supporting information to provide context. The contextual information offers room for more creative ideas as to how task responsibilities can evolve
We are now only a few weeks away from the start of the Synod on Synodality in Rome, and Synod officials have announced that the media will have limited access to the Synod's sessions. This raises the question: Is a Tightly-Controlled Information Flow the Best Way to Go? This week on Register Radio we talk with Russell Shaw one of the great veterans of the Catholic Press about the Synod, secrecy, and the state of Catholic media.
We are now only a few weeks away from the start of the Synod on Synodality in Rome, and Synod officials have announced that the media will have limited access to the Synod's sessions. This raises the question: Is a Tightly-Controlled Information Flow the Best Way to Go? This week on Register Radio we talk with Russell Shaw one of the great veterans of the Catholic Press about the Synod, secrecy, and the state of Catholic media.
Amanda Bridge shares her journey into UX writing, starting at Procore Technologies and later joining HubSpot as a senior content designer.Challenges of setting up a UX writing discipline within a large team and starting from scratch are discussed.Amanda's impactful work on HubSpot's Academy product to improve course applicability is highlighted.The potential impact of AI on UX writing is explored, with Amanda believing that AI will take over copywriting tasks, allowing content designers to focus on strategy and conversation within features.AI writing tools like Writer's Figma plugin are introduced, enabling content designers to add terms and snippets, promoting system-wide thinking in design and creating content consistency.The benefits and challenges of being embedded in specific product teams at HubSpot are discussed.Factors to consider when hiring a content designer, such as company size and product complexity, are mentioned.To enhance collaboration with designers, Amanda suggests content designers take an Intro to Product Design course or watch YouTube videos on design principles.The importance of content designers knowing how to work with design tools and manage copy within those tools is emphasized.The central theme of the episode, "Advocating for Your Content" encourages content designers to champion their craft and promote the value of content design within their organizations. Join our free UX Writing course: https://course.uxwritinghub.com/free_courseJoin our free AI for UX course: https://course.uxwritinghub.com/free-course-ai-for-uxAmanda Bridge: https://www.linkedin.com/in/amandabridge/
Moving Forward with Hope - Narcissistic Abuse Recovery Podcast
In this re-released episode of the podcast, host Lynn delves into the topic of stonewalling and explores why narcissists employ this manipulative tactic. Stonewalling is a means for narcissists to halt or diminish the flow of information during conversations, and it manifests in various ways.The episode identifies six forms of stonewalling, including abruptly walking away from a conversation, feigning busyness to avoid engagement, ignoring or giving the silent treatment, minimizing or discrediting, and preventing the conversation from being about the other person. These behaviors are not isolated incidents but rather chronic patterns of behavior.Lynn explains that narcissists reject closeness and intimacy, viewing them as negative and critical. They are averse to hearing feedback, disinterested in their partner's thoughts or passions, and only concerned with what the other person can do for them. Sharing openly and honestly within the relationship is met with disdain, as the narcissist lacks accountability, empathy, and the willingness to change.Narcissists feel uncomfortable when the focus shifts away from themselves and onto their partner. They want to maintain their desired narrative and reputation, which can be challenged by their partner's personal stories and experiences. Additionally, stonewalling serves as a means for the narcissist to conceal their past actions, their true nature, and their lack of care for their partner.The episode also explores the impact of stonewalling on the targeted individual. It generates shock, confusion, and a sense of questioning the relationship. Trust is eroded, feelings of insignificance and unappreciation arise, and the target may find themselves feeling alone and pitted against their partner. Ultimately, stonewalling can contribute to the breakdown of the relationship. Support the showThank you for listening! Stay connected with us here: https://linktr.ee/lynnnicholsEnjoying the Show? Show your Support and Buy Lynn a coffee here. Monthly Subscriptions Now Available: Learn More Here
Information Flow Tracking (IFT) is a useful tool to reason about security of a system. It can be applied at different levels of abstraction - starting from operating system all the way to gate-level circuits through various representations of software and hardware. In this talk, we will focus on IFT at the register transfer level (RTL) representation of hardware and discuss how IFT can be applied to find various types of RTL security vulnerabilities. We will discuss an inductive formulation of the problem based on leakage alert and propagation alert that offers a scalable solution and micro-architecture-level design insights compared to more traditional formulations. We will end the talk by outlining some of the research challenges that we need to address to push the boundary further. About the speaker: Dr. Sayak Ray is a Security Researcher at Intel Corporation. His area of research includes tools and automation for security validation, security challenges in FPGA, heterogeneous computing and data center networking. Dr. Ray regularly publishes at design automation conferences and journals. He has served on technical program committees of various conferences such as DAC and ICCAD. Before joining Intel in 2016, he was a Post-doctoral Research Associate at Princeton University. Dr. Ray obtained his PhD from UC Berkeley in 2013.
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2023.03.08.531516v1?rss=1 Authors: Kang, J. U., Mooshagian, E., Snyder, L. H. Abstract: Many studies infer the role of neurons by asking what information can be decoded from their activity or by observing the consequences of perturbing their activity. An alternative approach is to consider information flow between neurons. We applied this approach to the Parietal Reach Region (PRR) and the Lateral Intraparietal area (LIP) in posterior parietal cortex. Two complementary methods show that, across a range of reaching tasks, information flows primarily from PRR to LIP but not vice versa. This suggests that PRR determines the spatial goals of coordinated eye and arm movements and instructs LIP of those goals. Based on these findings, we conclude that PRR and LIP operate in a parallel rather than hierarchical manner to plan arm and eye movements, respectively. Similar methodology can be applied to other areas to infer their relative relationships. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2022.12.20.521265v1?rss=1 Authors: Lopez, J. M. D., Mateos, D. M., Restrepo, J. F. Abstract: The study of brain dynamics under normal or pathological conditions has proven to be a difficult task, there is no unified consensus on how it should be studied. In this article we present a methodology based on Transfer Entropy to characterize the information flow between different brain hemispheres in eyes-open (EO) and eyes-closed (EC) resting states in healthy subjects, with an experimental setup that resembles the technical conditions found in a clinical setting. We have estimated the Transfer Entropy between the Hilbert phases of bandpass filtered EEG channels. We have designed a methodology to analyze the interhemispheric and intrahemispheric information flow in both conditions. Our results suggest an increased information transfer in the EC condition for the alpha, beta1 and beta2 frequency bands. Furthermore, we do not observe a preferred direction of interhemispheric information movement in both conditions. In conclusion, there is evidence of a significant difference in the brain's information transfer dynamics between EO and EC resting states. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC
I'm joined by Stephen Wilson, accomplished data protection innovator, researcher, analyst and advisor who leads Digital Safety and Privacy efforts at Constellation Research and is Managing Director of Lockstep Technologies. In our conversation, we discuss the importance of information value chains, the emergence of data sharing platforms, discuss why data should be like clean drinking water, and explore the problems with "data ownership."--------Thank you to our sponsor, Privado, the developer-friendly privacy platform--------Stephen explains the push for more data sharing and to establish user-centric business models that deliver value for businesses and benefits for individuals. We discuss emerging tools that assure the orderliness, fairness, and transparency of information value chains and why Stephen aims to take data processing "out of the shadows" with his research.Lastly, we discuss key Facebook & Google EU court cases that addresses collection & use of facial biometrics from people without sufficient consent and the challenges that Google and search engines have with addressing "the right to be forgotten." Plus, we discuss the privacy expectations within the ‘digital town square,' particularly through the lens of Twitter and Facebook. ---------Listen to the episode on Apple Podcasts, Spotify, iHeartRadio, or on your favorite podcast platform.---------Topics Covered:Stephen's assertion that privacy is about restraint: what you choose to not know.The rise of data sharing platforms to facilitate and scale global information value chains.How if data is like “crude oil,” then it requires safe handling, and why we should treat data like "clean drinking water" instead.The importance of data quality, data originality, and data lineage.Stephen's analysis of the growing market for “Data Protection as a Service," which includes: data clean rooms, privacy APIs, and more.Why you don't need to own your own data to get good privacy outcomes.Resources Mentioned:Read the 2021 Data for Better Lives report (World Bank) Privado.ai Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.Shifting Privacy Left Media Where privacy engineers gather, share, & learnBuzzsprout - Launch your podcast Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Copyright © 2022 - 2024 Principled LLC. All rights reserved.
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2022.11.18.517011v1?rss=1 Authors: Toyoshima, Y., Sato, H., Nagata, D., Kanamori, M., Jang, M. S., Kuze, K., Oe, S., Teramoto, T., Iwasaki, Y., Yoshida, R., Ishihara, T., Iino, Y. Abstract: Recent development of large-scale activity imaging of neuronal ensembles provides opportunities for understanding how activity patterns are generated in the brain and how information is transmitted between neurons or neuronal ensembles. However, methodologies for extracting the component properties that generate overall dynamics are still limited. In this study, the results of time-lapse 3D imaging (4D imaging) of head neurons of the nematode C. elegans were analyzed by hitherto unemployed methodologies. By combining time-delay embedding with independent component analysis, the whole-brain activities were decomposed to a small number of component dynamics. Results from multiple samples, where different subsets of neurons were observed, were further combined by matrix factorization, revealing common dynamics from neuronal activities that are apparently divergent across sampled animals. By this analysis, we could identify components that show common relationships across different samples and those that show relationships distinct between individual samples. We also constructed a network model building on time-lagged prediction models of synaptic communications. This was achieved by dimension reduction of 4D imaging data using the general framework gKDR (gradient kernel dimension reduction). The model is able to decompose basal dynamics of the network. We further extended the model by incorporating probabilistic distribution, resulting in models that we call gKDR-GMM and gKDR-GP. The models capture the overall relationships of neural activities and reproduce the stochastic but coordinated dynamics in the neural network simulation. By virtual manipulation of individual neurons and synaptic contacts in this model, information flow could be estimated from whole-brain imaging results. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC
Guest Courtney Miller | Hongbo Fang Panelists Richard Littauer | Eriol Fox Show Notes Hello and welcome to Sustain! The podcast where we talk about sustaining open source for the long haul. We are super excited to talk to our guests today on the topic of toxicity in open source. Today, we have joining us, Courtney Miller and Hungbo Fang, who are both PhD students at Carnegie Mellon University. We asked them to come on because we were curious about their work, and they came highly recommended by Bogdan Vasilescu. We'll hear more about Courtney's talk and her paper on her award-winning work exploring toxicity in open source communities, and we'll find out the work Hongbo has done focusing on information flow and where people talk about open source. Download this episode now to learn more! [00:02:49] Courtney tells us about the talk she gave at the Linux Open Source Summit on her work exploring toxicity in open source communities. [00:03:55] We find out if there was a data set that was used to find the information. [00:05:08] Hongbo focuses on information flow and where do people talk about open source, and he tells us what his involvement is with this work. [00:06:57] Courtney tells us what she saw within the hundred issues and how she broke them down and tagged them to get to the conclusions she had. [00:08:44] We hear how Courtney used the technical definition of toxicity introduced by Google's Perspective API tool to inform the decisions of what toxicity means. [00:12:01] Eriol wants to know whether Courtney's had thoughts or intentions of looking into the content moderation space to see if there's any similarities between what's happening there. [00:14:29] Richard wonders what we can do to improve the state of toxicity in open source and wonders if she has any future work that can make this better. [00:16:08] Hongbo shares his thoughts about the future and what we can do to solve this from a quantitative angle. [00:17:02] Based on Courtney's work, we find out if she thinks AI has improved, if she has hope, and Hongbo shares his thoughts as well. [00:19:20] Eriol wants to know how community members can help researchers by talking about things that are less referenced in the paper, and how Courtney thinks about tackling some of the harder to read parts of toxicity with new emerging spaces. [00:24:54] We find out if there's a place where open source could have a restorative justice around toxicity and what action is there for the open source community to move from talking about our experiences of toxicity to how we can heal. [00:27:40] Hongbo explains what his work is mainly focused on, how he's holding this space, and suggestions he has for the future on how we can improve information flow. [00:34:31] Richard talks about a paper called, The Tyranny of Structurelessness by Jo Freeman, and wonders if Hongbo has any suggestions for how to help open source projects with information gap issues. [00:39:33] Find out where you can follow Courtney, Hongbo, and their work online. Quotes [00:12:11] "Open source toxicity is not new, it's very old. The long-term effects of this toxicity, especially in open source, is why I was really moved to do this research.” [00:14:56] “If you can identify toxic comments, and deal with them, instead of making the maintainers spend the emotional labor every time dealing with this stuff – [that] can be very helpful.” [00:15:17] “Maintainers are often toxic in their own projects.” [00:15:40] “We have issue templates – what about issue response templates?” [00:25:47] “If a community has leadership that tolerates certain things, it's going to happen. If the community has leadership that does not tolerate certain things, it's not going to happen.” Spotlight [00:41:21] Eriol's spotlight is Digital Safety Snacks by Pen America. [00:41:58] Richard's spotlight is an article he read called, The Opposite of Rape Culture is Nurturance Culture by Nora Samaran. [00:42:40] Hongbo's spotlight is the book, Roads and Bridges: The Unseen Labor Behind Our Digital Infrastructure by Nadia Eghbal. [00:43:32] Courtney's spotlight is the book, Working in Public: The Making and Maintenance of Open Source Software by Nadia Eghbal, and the tool, Betty. Links SustainOSS (https://sustainoss.org/) SustainOSS Twitter (https://twitter.com/SustainOSS?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) SustainOSS Discourse (https://discourse.sustainoss.org/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) Richard Littauer Twitter (https://twitter.com/richlitt?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) Eriol Fox Twitter (https://twitter.com/EriolDoesDesign) Courtney Miller Twitter (https://twitter.com/courtneyelta?lang=en) Courtney Miller-GitHub (https://courtney-e-miller.github.io/) Courtney Miller LinkedIn (https://www.linkedin.com/authwall?trk=gf&trkInfo=AQGvhLpJ5bQFGAAAAYK81Q-A0uWlwtLgwE79a-9Evj7n8RNvlxcJ-ev6jmZWyxl-7O3juI8yF9SLUUwAQQ8Xs_d3Re5brEfG26DUUnt2ZH3YGYXmQGAaEhwNubkkw1Ilf5Ottjo=&original_referer=&sessionRedirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fcourtney-e-miller%2F) Hongbo Fang Twitter (https://twitter.com/fang_hongbo?lang=en) Hongbo Fang LinkedIn (https://www.linkedin.com/in/hongbo-fang-358ba615b) Sustain Podcast-Episode 40: How Open Source Maintainers Don't Get Rich with Bogdan Vasilescu (https://podcast.sustainoss.org/guests/bogdan-vasilescu) Perspective API (https://perspectiveapi.com/) Christian Kästner (https://www.cs.cmu.edu/~ckaestne/) Kat Lo Twitter (https://twitter.com/lolkat) Meedan Twitter (https://twitter.com/Meedan) Open Source Diversity (https://opensourcediversity.org/) The Tyranny of Structurelessness by Jo Freeman (https://www.jofreeman.com/joreen/tyranny.htm) “Did You Miss My Comment or What?” Understanding Toxicity in Open Source Discussions (paper) (https://www.cs.cmu.edu/afs/cs.cmu.edu/Web/People/ckaestne/pdf/icse22_toxicity.pdf) Roads and Bridges (https://www.roadsbridges.com/) Sustain Podcast-Episode 51: Working in Public: Nadia Eghbal and her new book about Making and Sustaining Open Source Software (https://podcast.sustainoss.org/guests/nadia) Nadia Asparouhova (Eghbal) Website (https://nadia.xyz/) Digital Safety Snacks by Pen America (https://pen.org/event-series/digital-safety-snacks/) The Opposite of Rape Culture is Nurturance Culture by Nora Samaran (https://norasamaran.com/2016/02/11/the-opposite-of-rape-culture-is-nurturance-culture-2/) Roads and Bridges: The Unseen Labor Behind Our Digital Infrastructure by Nadia Eghbal (https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/) Working in Public: The Making and Maintenance of Open Source Software by Nadia Eghbal (https://press.stripe.com/working-in-public) Betty (https://github.com/leopard-ai/betty) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guests: Courtney Miller and Hongbo Fang.
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Refine Blogpost Day #3: The shortforms I did write, published by Self-Embedded Agent on September 16, 2022 on The AI Alignment Forum. Today was Refine's third blogpost day. I find it hard to write blogposts. The voice of the inner critic is too loud. The voice of Adam Shimi too is powerful. I'm caught between a rock and a hard place. so I wrote some shortforms: Dutch Book Fundamentalism I: the bets we are willing to offer and take don't just constrain our beliefs - they are our beliefs Two shortforms on Imprecise Probability (related to InfraBayesianism): Imprecise Probability I: the Bid-Ask Spread measures Adversariality I enumerate some examples where the bid-ask spread is a rational measure of adversarial action. Bid-ask spread is a fundamental notion of rational belief and action, not just an accidental feature of trading. Concept splintering in Imprecise Probability: Aleatoric and Epistemic Uncertainty. when we move from standard probability theory to imprecise probability theory concepts in the old probability theory 'splinter' into distinct 'aleatoric' and 'epistemic' concepts in the new imprecise probability theory Speculations on the correct notion of Information Flow Some speculations on the correct definition of Information Flow. A major obstacle are collections of random variables XORed variables and higher-order dependencies. Shannon information theory does not deal well with these. I speculate on how and whether factored sets, cyclic causality and information cohomology might help. Thanks for listening. To help us out with The Nonlinear Library or to learn more, please visit nonlinear.org.
https://psychiatry.dev/wp-content/uploads/speaker/post-9501.mp3?cb=1662637993.mp3 Playback speed: 0.8x 1x 1.3x 1.6x 2x Download: Abnormal Information Flow in Schizophrenia Is Linked to Psychosis – PubMed Yingxin Jia et al. Schizophrenia Bulletin. 2022. Prior research has shownFull EntryAbnormal Information Flow in Schizophrenia Is Linked to Psychosis – PubMed
Tune in as we gauge the public view on all things that have to do with the Southern Tier
While we have made huge steps in transferring information into processes of data analysis, there is still a huge reliance upon hard-to-process document-based information. One of the biggest culprits of this is the healthcare industry. For decades, they have been using this outdated, insecure method of managing patients' private information, which has led to multiple issues, such as data breaches. The restraints of paper-based forms and documents are further highlighted by the problems that arise throughout workflows: misplaced document-based information; slow delivery times as information has to be passed through multiple different parties. Simplifying Processes of Data Analysis On this podcast, Greg Council, VP Marketing and Product Management at Parascript, joins us to discuss the processes of document-based information and why current systems are so outdated. He also outlines how we can best move to a more automated form of operating and what it means to view document processing from an insurance perspective. Listen and learn about: Fundamentals of the healthcare and health insurance market Key challenges around claims-to-payment, also known as revenue cycle management, and the inclusion of documents in the workflow process The impact of numerous parties being involved in a manual automation process The role of NLP in converting complex document-based information into structured data Auto-adjudication and its importance within an automated workflow The implications of non-structured electronic data interchange (EDI) in terms of cost, time, and process Practical advice on where to start with document automation
Your status meetings are an old holdover from less useful business practices. Do away with status meetings, and instead get to the core of your discussion faster.
ヒュー・トレンチャード (Hugh Trenchard)の論文を中心として、超生命体としてのプロトンの性質について高木さん、ざいこうさん(@Zaikou)とお話しました。 お便りはTwitterのハッシュタグ #sxsradio か、番組のTwitterDMまで。番組をサポートする投げ銭はPatreonページ まで Instagramもやっています。取材の際の写真やsxsradioチームの近況をフォローしてください。 Show Notes B.B. Base 牧場しぼりアフォガート 木祖村中止、レースディレクターの藤森さんのコメント。無念が感じられます 西薗のNTTコミュニケーション科学基礎研究所オープンハウス展示 名古屋大学論文 自転車競技における集団秩序の定量化に成功 ~繰り返される駆け引きと離合集散~ 謎の個人研究者 Hugh Trenchard イギリスのウェブ雑誌 cyclistでの特集記事(2021/2/21) 複雑系 自己組織化 相転移 2005 Self-organized coupling and synchronization in bicycle pelotons during mass-start bicycle racing. Trenchard, Hugh. "Self-organized coupling dynamics and phase transitions in bicycle pelotons." 2009 AAAI Fall Symposium Series. 2009. Trenchard, Hugh. "Information Flow and the Distinction Between Self-Organized and Top-Down Dynamics in Bicycle Pelotons." AAAI Fall Symposium: Complex Adaptive Systems. 2011. Trenchard, Hugh, et al. "Collective behavior and the identification of phases in bicycle pelotons." Physica A: Statistical Mechanics and its Applications 405 (2014): 92-103. Trenchard, Hugh. "The peloton superorganism and protocooperative behavior." Applied Mathematics and Computation 270 (2015): 179-192. Energy saving mechanisms, collective behavior and the variation range hypothesis in biological systems: A review (2016) 「群れ」の科学 複雑系―科学革命の震源地・サンタフェ研究所の天才たち (新潮文庫) 歴史は「べき乗則」で動く――種の絶滅から戦争までを読み解く複雑系科学 (ハヤカワ文庫NF―数理を愉しむシリーズ) Special Thanks to 小泉享亮 様 Atsushi Yamamoto 様 Common Sense様
Datuk Dr Musa Mohd Nordin, Consultant Paediatrician discusses the merits of the 2-week lockdown, and potential complementary measures to strengthen the government’s fight against the pandemic. Image Credit: AkuAlip | Shutterstock.com
We unstack:► Multicoin's open finance thesis► What are decentralized super networks?► Web 2.0 apps in the West v. superapps in China► How is WeChat used as a crypto community building tool in China?► Structure of information flow across Western and Chinese social media platforms► Cultural mentalities shaping crypto market structure► What contributes to building an "unforkable moat"? Uniswap v. Sushiswap case study► Core parts of DeFi ecosystem Mable thinks will be around/be disrupted► Is there a strong NFT movement in China?+ much more!LINKS How Cultural Differences Drive User Adoption in DeFiBridging Cultural Gaps in 2021: Crypto in China and the USExploring the Design Space of Liquidity MiningMable's Twitter @Mable_JiangMulticoin's Twitter @multicoincapFOLLOW AMBER GROUP Twitter: https://twitter.com/ambergroup_ioEmail: contact@ambergroup.ioWebsite: https://www.ambergroup.io/DISCLOSURE The Crypto Unstacked Podcast is meant for informational purposes only and should not be considered as financial or investment advice. Nothing expressed in this podcast should be construed as a solicitation, recommendation, endorsement or offer by Amber Group to buy or sell any financial products. Information expressed by the host or guest in this podcast does not necessarily reflect the views of Amber Group.#AmberGroup #Multicoin #OpenFinance #DeFi #China #CUPofCrypto #CryptoUnstacked
In this episode, Eduard's talk covers different topics in software testing, including test design, human aspects of testing and testing of embedded systems. This is a talk initially given to the students taking the Embedded Systems 1 course at Mälardalen University in September 2020. Some useful links: https://www.amazon.com/Introduction-Software-Testing-Paul-Ammann/dp/0521880386 http://www.es.mdh.se/publications/5493-Information_Flow_in_Software_Testing____An_Interview_Study_with_Embedded_Software_Engineering_Practitioners http://www.es.mdh.se/publications/5864-Towards_a_Model_of_Testers__Cognitive_Processes__Software_Testing_as_a_Problem_Solving_Approach
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.08.10.245241v1?rss=1 Authors: Karimi-Rouzbahani, H., Remezani, F., Woolgar, A., Rich, A., Ghodrati, M. Abstract: Humans are fast and accurate when they recognize familiar faces. Previous neurophysiological studies have shown enhanced representations for the dichotomy of familiar vs. unfamiliar faces. As familiarity is a spectrum, however, any neural correlate should reflect graded representations for more vs. less familiar faces along the spectrum. By systematically varying familiarity across stimuli, we show a neural familiarity spectrum using electroencephalography. We then evaluated the spatiotemporal dynamics of familiar face recognition across the brain. Specifically, we developed a novel informational connectivity method to test whether peri-frontal brain areas contribute to familiar face recognition. Results showed that feed-forward flow dominates for the most familiar faces and top-down flow was only dominant when sensory evidence was insufficient to support face recognition. These results demonstrate that perceptual difficulty and the level of familiarity influence the neural representation of familiar faces and the degree to which peri-frontal neural networks contribute to familiar face recognition. Copy rights belong to original authors. Visit the link for more info
What does optimal performance look like for construction? What about your company? What steps will ensure everyone is on the same page while working on a project? Join host Todd and guest Clay Smith of eVolve MEP as they discuss the need for proper information flow in an organization, flattening and streamlining the communication process, and the danger in “flying blind” while on the jobsite. In addition, Todd and Clay discuss what’s in store for MEP Force—and what you can expect from it now that it’s virtual.Clay Smith is the CEO of eVolve MEP and the COO of Applied Software. He has been successful in delivering outstanding results in operations, software development, and technical consulting. He thrives in leading high-growth, cloud-based, and disruptive businesses that blend a customer-centric vision with strong technology innovation. With a focus on results and relationships, he is skilled in expanding business ventures quickly while at the same time building winning cultures that create sustainable results. Thanks for listening! Please be sure to leave a rating and/or review and follow up our social accounts. Podcast listeners can register for MEP Force Virtual for ONLY $99 with the code BTG99. Register Today. Sign up for newsletterFollow us on LinkedInBridging the Gap Podcast WebsiteTodd’s LinkedIn Thank you to our sponsors!Applied SoftwareApplied Software LinkedIn Other Relevant Links:eVolve MEP WebsiteClay Smith’s Linkedin
Everything I am talking about is public knowledge and I do not speak for, or against, any company. Hope you enjoy. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/james-sweet9/support
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.07.09.194969v1?rss=1 Authors: Aref Pariz, Ingo Fischer, Alireza Valizadeh, Claudio Mirasso Abstract: Brain networks exhibit very variable and dynamical functional connectivity and flexible configurations of information exchange despite their overall fixed structure (connectome). Brain oscillations are hypothesized to underlie time-dependent functional connectivity by periodically changing the excitability of neural populations. In this paper, we investigate the role that the connection delay and the frequency detuning between different neural populations play in the transmission of signals. Based on numerical simulations and analytical arguments, we show that the amount of information transfer between two oscillating neural populations can be determined solely by their connection delay and the mismatch in their oscillation frequencies. Our results highlight the role of the collective phase response curve of the oscillating neural populations for the efficacy of signal transmission and the quality of the information transfer in brain networks.Author summary Collective dynamics in brain networks is characterized by a coordinated activity of their constituent neurons that lead to brain oscillations. Many evidences highlight the role that brain oscillations play in signal transmission, the control of the effective communication between brain areas and the integration of information processed by different specialized regions. Oscillations periodically modulate the excitability of neurons and determine the response those areas receiving the signals. Based on the communication trough coherence (CTC) theory, the adjustment of the phase difference between local oscillations of connected areas can specify the timing of exchanged signals and therefore, the efficacy of the communication channels. An important factor is the delay in the transmission of signals from one region to another that affects the phase difference and timing, and consequently the impact of the signals. Despite this delay plays an essential role in CTC theory, its role has been mostly overlooked in previous studies. In this manuscript, we concentrate on the role that the connection delay and the oscillation frequency of the populations play in the signal transmission, and consequently in the effective connectivity, between two brain areas. Through extensive numerical simulations, as well as analytical results with reduced models, we show that these parameters have two essential impacts on the effective connectivity of the neural networks: First, that the populations advancing in phase to others do not necessarily play the role of the information source; and second, that the amount and direction of information transfer dependents on the oscillation frequency of the populations.View Full Text Copy rights belong to original authors. Visit the link for more info
Risk incidents in the US ramped up considerably over the last few months as has the news coverage. Sometimes it’s hard to understand what’s really unfolding and what it means for communities and people. In today’s episode, we focus on the recent civil unrest incidents in the United States; more specifically, we talk about how we cover these protests for our clients, where our data comes from, how we ensure it’s accurate and valuable, and how the data plays into our overall analysis of regional unrest. Please join John Raines, Justin Valentino, and Hugo Foster as we discuss why data is critical to find out what’s really happening on the ground. John Raines, Ph.D., Principal Global Risks Adviser and Head of North America, Economics & Country Risk, IHS Markit https://ihsmarkit.com/experts/raines-john.html Hugo Foster, Principal Analyst, Country Risk – Applied Intelligence, IHS Markit https://ihsmarkit.com/experts/foster-hugo.html Justin Valentino, Senior Analyst, Country Risk, IHS Markit https://ihsmarkit.com/experts/valentino-justin.html
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.06.01.127399v1?rss=1 Authors: Conrad, M., Jolivet, R. B. Abstract: Information theory has become an essential tool of modern neuroscience. It can however be difficult to apply in experimental contexts when acquisition of very large datasets is prohibitive. Here, we compare the relative performance of two information theoretic measures, mutual information and transfer entropy, for the analysis of information flow and energetic consumption at synapses. We show that transfer entropy outperforms mutual information in terms of reliability of estimates for small datasets. However, we also show that a detailed understanding of the underlying neuronal biophysics is essential for properly interpreting the results obtained with transfer entropy. We conclude that when time and experimental conditions permit, mutual information might provide an easier to interpret alternative. Finally, we apply both measures to the study of energetic optimality of information flow at thalamic relay synapses in the visual pathway. We show that both measures recapitulate the experimental finding that these synapses are tuned to optimally balance information flowing through them with the energetic consumption associated with that synaptic and neuronal activity. Our results highlight the importance of conducting systematic computational studies prior to applying information theoretic tools to experimental data. Copy rights belong to original authors. Visit the link for more info
What function do the different attention heads serve in multi-headed attention models? In this episode, Lena describes how to use attribution methods to assess the importance and contribution of different heads in several tasks, and describes a gating mechanism to prune the number of effective heads used when combined with an auxiliary loss. Then, we discuss Lena's work on studying the evolution of representations of individual tokens in transformers model. Lena's homepage: https://lena-voita.github.io/ Blog posts: https://lena-voita.github.io/posts/acl19_heads.html https://lena-voita.github.io/posts/emnlp19_evolution.html Papers: https://arxiv.org/abs/1905.09418 https://arxiv.org/abs/1909.01380
"Digitizing Information Flow in Supply Chain: Rob Turner with Fujitsu" Supply Chain Now Radio, Episode 231 Broadcast Live from eft’s Logistics CIO Forum, a Reuters Event In Austin, TX This episode features Rob Turner. Robert Turner is a 25 year veteran in the Content Management / Capture industry. Robert understands the need for businesses to develop a digital transformation strategy to keep them ahead of the competition, help streamline internal processes and improve revenue outcomes. A frequent public speaker, Robert uses the creative energy of 20+ years playing music to "perform" anytime he is presenting to customers or partners. Learn more about Fujitsu: www.fcpa.com Upcoming Events & Resources Mentioned in this Episode Connect with Robert on LinkedIn: https://www.linkedin.com/in/robert-turner-124b703/ Connect with Greg on LinkedIn: https://www.linkedin.com/in/gswhite/ Connect with Scott on LinkedIn: https://www.linkedin.com/in/scottwindonluton/ SCNR to Broadcast Live at CSCMP Atlanta Roundtable Event: https://tinyurl.com/y43lywrd Reverse Logistics Association Conference & Expo: https://rla.org/event/80 SCNR to Broadcast Live at MODEX 2020: https://www.modexshow.com/ SCNR to Broadcast Live at AME Atlanta 2020 Lean Summit: https://www.ame.org/ame-atlanta-2020-lean-summit 2020 Atlanta Supply Chain Awards: https://www.atlantasupplychainawards.com/ SCNR on YouTube: https://tinyurl.com/scnr-youtube The Latest Issue of the Supply Chain Pulse: https://conta.cc/2rLkO5Y Check Out News From Our Sponsors The Effective Syndicate: https://www.theeffectivesyndicate.com/blog Spend Management Experts: https://spendmanagementexperts.com/ APICS Atlanta: https://apicsatlanta.org TalentStream: https://talentstreamstaffing.com/ Verusen: https://www.verusen.com/ Georgia Manufacturing Alliance: https://www.georgiamanufacturingalliance.com/ ProPurchaser.com: https://tinyurl.com/y6l2kh7g Supply Chain Real Estate: https://supplychainrealestate.com/ Vector Global Logistics: http://vectorgl.com/ This episode was hosted by Greg White and Scott Luton. For more information, please visit our dedicated show page at www.supplychainnowradio.com/episode-231
DuByne creator of the ADAPT 2030 channel on YouTube discusses energetic changes in consciousness and frequency on Earth as the Sun moves into its 400-year cycle affecting global crop production, the economy and everyone on our planet. This is an energetic timeline for what you can expect from now to 2023 as society resets. China forbids sharing of weather & crop condition information Weather stories now need to be state approved to share in Chinese social media Bottom 15% of global population will not be able to afford doubling food prices EBT food assistance will not cover basic food costs by 2023 2019 is the last year we have stable harvest seasons on the planet EU Article 13 & Article 11 were not open to public debate Hollywood pre-programming for hungry people wandering the streets Gutenberg printing press forbidden by the Ottoman Empire EU Copyright Directive is not working EU data and policy regulations The push to copy write scientific data so you cannot share it about the Grand Solar Minimum ADAPT 2030 Climate Revolution https://payhip.com/b/3sVi Support the ADAPT 2030 Mini Ice Age Conversations Podcast by Visiting my Sponsors: True Leaf Market Heirloom and Organic Seeds My Patriot Supply Long Term & Emergency Food ADAPT 2030 AMAZON SHOP ADAPT 2030 (PATREON) **ADAPT 2030 Social Media** ADAPT 2030 YouTube Channel OilSeedCrops.org HOME Page
PETE SANTILLI MORNING NEWS BREAKEpisode #1596 - Thursday August 08, 2019 - 6PMLive Broadcast Link - https://youtu.be/iqA71Vopl3s TECNO-TYRANNY! - FACEBOOK MAKES MOVE TO TOTALLY CONTROL NEWS & INFORMATION FLOW - 1596-6P Facebook Inc. is offering news outlets millions of dollars for the rights to put their content in a news section that the company hopes to launch later this year, according to people familiar with the matter. Representatives from Facebook have told news executives they would be willing to pay as much as $3 million a year to license entire stories, headlines and previews of articles from news outlets, the people said. The outlets pitched by Facebook on its news tab includeWalt DisneyCo.’s ABC News, Wall Street Journal parent Dow Jones, The Washington Post and Bloomberg, the people said. GUEST: Irvin Baxter is the founder and president of Endtime Ministries. He is a television and radio talk-show host, author, publisher, and international prophecy teacher Irvin felt God call him to start traveling as an evangelist at the age of 19. He began pastoring when he was 26, and continued for 34 years until he made the decision to devote all of his time to Endtime Ministries.Endtime Ministries focuses on explaining world events from a biblical perspective. The ministry’s purpose is to prove that we are now at the end of the era of human government and very near the beginning of the prophesied Kingdom of God.https://www.endtime.com/ E-Militia Article: TECNO-TYRANNY! – FACEBOOK MAKES MOVE TO TOTALLY CONTROL NEWS & INFORMATION FLOW – 1596-6P http://ow.ly/mrfX30pjZ6r Support our show by supporting our sponsors❗GORILLA MIND: Maximize Brain Focus, Concentration & Energy: http://petelive.tv/gorilla Show notes & headline links: https://thepetesantillishow.com/
12 FSA offices in Wisconsin reopen again today for limited sevice to farmers as the government shutdown continues. Bryce Knorr, Commodity Specialist with Farm Futures, says the information slow down to the market place is becoming increasingly frustrating as Brazil's harvest moves forward. See omnystudio.com/listener for privacy information.
References: Gord Fishell’s laboratory Leena on Google Scholar Leena on Twitter The cerebral cortex – Wikipedia A primer on the interneurons in the cortex – By Leena on ‘Knowing Neurons’ The publication of the discovery of Rosehip neurons (Please contact IndSciComm if access not available) Intro and Outro music – Let’s start at the beginning by Lee Rosevere from Music for Podcasts on Free Music Archive
Japanese electric-vehicles developer and manufacturer GLM was keen to explore overseas markets but limited financial capacity and insufficient knowledge of their targets posed major challenges. Fortunately, GLM was supported by a Hong Kong investor who provided funds and connected the company with business partners to help overseas expansion. After operating in Hong Kong for more than a year, the company’s CEO Hiroyasu Koma realised free flow of information was another Hong Kong advantage.
For a century, the belief was that genetic information built organisms, never the other way around. A new paper by Denis Noble definitively proves otherwise. The paper is called “Central Dogma or Central Debate.” In this interview, Denis explains the revolution that is going on in genetics. See acast.com/privacy for privacy and opt-out information.
Credit title: Subject Matter Expert: David Michael Bourne, B.A., M.Sc. Dokumenter: Binus University Uploaded by: Knowledge Management and Innovation Binus University
Users routinely type sensitive data such as passwords, credit card numbers, and even SSN into their mobile phone apps and browsers. Rich functionality combined with weak security mechanisms makes protecting users' data a challenging. In this talk, I will present a few case studies of applying information flow security to protecting users' data in Android, the Chromium browser, and the IFTTT framework. For these systems, we show that dynamic coarse-grained taint tracking, even though it allows implicit flows, can be retrofitted into existing systems to defend users' data from common attacks. I will explain the challenges in striking a balance between preserving key functionality of legacy systems and ensuring formally provable security guarantees and discuss how different modeling techniques affect noninterference proofs. About the speaker: Dr. Jia is an Assistant Research Professor in the ECE Department at Carnegie Mellon University. Dr. Jia received her PhD in Computer Science from Princeton University. She received her BE in Computer Science and Engineering from the University of Science and Technology in China. Dr. Jia's research interests are in formal aspects of software security, in particular, applying formal approaches to constructing software systems with known security guarantees.
Users routinely type sensitive data such as passwords, credit card numbers, and even SSN into their mobile phone apps and browsers. Rich functionality combined with weak security mechanisms makes protecting users’ data a challenging. In this talk, I will present a few case studies of applying information flow security to protecting users’ data in Android, the Chromium browser, and the IFTTT framework. For these systems, we show that dynamic coarse-grained taint tracking, even though it allows implicit flows, can be retrofitted into existing systems to defend users’ data from common attacks. I will explain the challenges in striking a balance between preserving key functionality of legacy systems and ensuring formally provable security guarantees and discuss how different modeling techniques affect noninterference proofs.
Curiosity is the Key to Information Flow - Directing the Sales Flow - Part 12
No Blank Screens, London
Sep 18 2013 Information Flow and Learning in Healthcare: Social Quality Improvement Guests: Brian McGowan and Jeff Cohn
Fakultät für Mathematik, Informatik und Statistik - Digitale Hochschulschriften der LMU - Teil 01/02
With the growing amount of data handled by Internet-enabled mobile devices, the task of preventing software from leaking confidential information is becoming increasingly important. At the same time, mobile applications are typically executed on different devices whose users have varying requirements for the privacy of their data. Users should be able to define their personal information security settings, and they should get a reliable assurance that the installed software respects these settings. Language-based information flow security focuses on the analysis of programs to determine information flows among accessed data resources of different security levels, and to verify and formally certify that these flows follow a given policy. In the mobile code scenario, however, both the dynamic aspect of the security environment and the fact that mobile software is distributed as bytecode pose a challenge for existing static analysis approaches. This thesis presents a language-based mechanism to certify information flow security in the presence of dynamic environments. An object-oriented high-level language as well as a bytecode language are equipped with facilities to inspect user-defined information flow security settings at runtime. This way, the software developer can create privacy-aware programs that can adapt their behaviour to arbitrary security environments, a property that is formalized as "universal noninterference". This property is statically verified by an information flow type system that uses restrictive forms of dependent types to judge abstractly on the concrete security policy that is effective at runtime. To verify compiled bytecode programs, a low-level version of the type system is presented that works on an intermediate code representation in which the original program structure is partially restored. Rigorous soundness proofs and a type-preserving compilation enable the generation of certified bytecode programs in the style of proof-carrying code. To show the practical feasibility of the approach, the system is implemented and demonstrated on a concrete application scenario, where personal data are sent from a mobile device to a server on the Internet.
By working together, cells can overcome the loss of information as it flows through a signaling network.
Examining the the importance of a well managed supply chain for big business.
Ebusiness technologies: foundations and practice - for iPod/iPhone
Transcript -- Examining the the importance of a well managed supply chain for big business.
Ebusiness technologies: foundations and practice - for iPad/Mac/PC
Transcript -- Examining the the importance of a well managed supply chain for big business.
Examining the the importance of a well managed supply chain for big business.
Most people now realize that computer security is hard. However, many people do not realize that creating a correct security policy is hard. Creating an accurate security policy is on the order of complexity of developing software in general. In particular how can you show the policy is correct? The focus of this seminar is to look at tools and techniques for showing that the mandatory security policy based on type enforcement meets its objectives. The approach breaks down the security policy objectives so that they can be studied in terms of information flows. The policies are specified for the Security Enhanced Linux type enforcement mechanism. Type enforcement and mandatory access control will also be discussed. About the speaker: Dan Thomsen is a Senior Research Scientist at Tresys Technology. In his seventeen year career, Mr. Thomsen has provided contributions to a wide range of computer security programs. They include the increasing the security and survivability of the Joint Battlespace Infosphere, security assessment for the Cougaar agent system, development of the high security LOCK multilevel security platform, secure database research, and Internet vulnerability analysis. Mr. Thomsen was also the principle investigator responsible for the creation of the Napoleon policy management framework. Mr. Thomsen has published over twenty technical papers on computer security topics including type enforcement and role based access control. Mr. Thomsen currently serves as the program chair for the Annual Computer Security Applications Conference (ACSAC). Mr. Thomsen has a M.S. in Computer Science from the University of Minnesota and a B.A in Computer Science and Math from the University of Minnesota - Duluth. He is a senior member of IEEE and a member of IFIP working group 11.3 on Data and Application Security.
Most people now realize that computer security is hard. However, many people do not realize that creating a correct security policy is hard. Creating an accurate security policy is on the order of complexity of developing software in general. In particular how can you show the policy is correct?The focus of this seminar is to look at tools and techniques for showing that the mandatory security policy based on type enforcement meets its objectives. The approach breaks down the security policy objectives so that they can be studied in terms of information flows. The policies are specified for the Security Enhanced Linux type enforcement mechanism. Type enforcement and mandatory access control will also be discussed.