Sasha Constanza-Chock about crypto currencies and NFTs
I’m not at all ‘anti-crypto.’ I’m a big fan of cryptography. I am, however, anti- tax evasion, money laundering, ponzi schemes, multi-level marketing, and needless waste of energy.
I’m also anti- silver bulletism, anti-technosolutionism, and anti-convincing everyday people to invest their scarce capital in unregulated sectors where it’s very easy for them to lose everything with no recourse.
Additionally, I’m anti- focusing tons of energy on convincing everyday people that salvation lies in speculation.
Finally: WHAT IF the same amount of time and energy put into convincing everyday people to invest in cryptocurrencies, NFTs, and DAOs went into convincing everyone to move their money to credit unions, invest in local businesses & land trusts, & directly support artists?
GeoJSON with p5js
I usually handle GIS data in GIS software off course. In this blog post, I’d like to try visualize GIS data with p5.js!
De la tienda al vertedero: ropa descartable en el desierto de Atacama
En Chile, montañas de ropa que otros países ya no quieren han convertido un rincón del desierto de Atacama en un basurero.
How to enable HTTP/2 support in Apache
Enable HTTP/2 module
Apache’s HTTP/2 support comes from the mod_http2 module. Enable it from:
a2enmod http2
apachectl restart
If above commands do not work in your system (which is likely the case in CentOS/RHEL), use LoadModule directive in httpd configuration directory to enable http2 module.
Add HTTP/2 Support
We highly recommend you enable HTTPS support for your web site first. Most web browser simply do not support HTTP/2 over plain text. Besides, there are no excuses to not use HTTPS anymore. HTTP/2 can be enabled site-by-site basis. Locate your web site’s Apache virtual host configuration file, and add the following right after the opening
Protocols h2 http/1.1
Instrucciones para el autodespacho aduanaero en Canarias
Bueno cansado de que Correos me cobrase el trámite aduanero y después de leer en algunos foros que era posible el autodespacho pero no veía del todo claro cómo hacerlo me decidí a hacerlo por mi mismo.
Este documento pretende ser una guía donde les voy a explicar los pasos exactos, documentación a entregar y lugares a los que dirigirse.
Este trámite es válido para todos aquellos envíos que recibamos de la U.E., incluyendo la España peninsular. Además podrán calcular cuanto van a tener que pagar y así ver si les sale rentable hacerlo o no.
Digital Audio Basics: Audio Sample Rate and Bit Depth
The sound wave is converted into data through a series of snapshot measurements, or samples. A sample is taken at a particular time in the audio wave, recording amplitude. This information is then converted into digestible, binary data.
The system takes these measurements at a speed called the audio sample rate, measured in kilohertz. The audio sample rate determines the range of frequencies captured in digital audio.
Six bonnes raisons pour (se) construire des paysages sonores
L’écoute, dans un cadre d’action collective est donc, dans l’idée de construction relationnelle, au cœur du processus.
Marcher ensemble.
Écouter ensemble.
Faire ensemble…
Plutôt agir que parler, même si la parole est source d’enseignement, d’échanges et de transmission, d’invention même, l’action de terrain reste la meilleure façon de faire vivre et évoluer des idées, des projets. Et donc ici, de construire des paysages sonores dignes de ce nom. Écoutables.
L’expérimentation, ou l’expérienciation, le fait d’acquérir des connaissances par l’expérience personnelle, sont donc moteurs dans ces constructions audio-paysagères.
Submarine Cable Map
The Submarine Cable Map is a free and regularly updated resource from TeleGeography.
Cables submarinos en las Islas Canarias
Los cables submarinos en Canarias que conectan las islas entre sí son los siguientes. Entre paréntesis se indica el año de puesta en servicio:
- Cables interinsulares de Telefónica: salvo en el caso de El Hierro, su configuración en anillos evita que una isla quede desconectada por la rotura de un cable.
- Transcan 2 – S1: Gran Canaria – Fuerteventura (1990)
- Transcan 2 – S2: Fuerteventura – Lanzarote (1990)
- Pencan 5 – S2 (TFE-GC): Tenerife – Gran Canaria (1992)
- Tegopa – S1: Tenerife – La Gomera (1995)
- Tegopa – S2: La Gomera – La Palma (1995)
- Candalta 1: Tenerife – Gran Canaria (1999)
- Transcan 3: Gran Canaria – Lanzarote (1999)
- Telapa: Tenerife – La Palma (2004)
- Gomera-Hierro: La Gomera – El Hierro (2007)
- Candalta 2: Tenerife – Gran Canaria (2010)
- Cable Submarino de Canarias: dispone de dos cables submarinos entre Tenerife y Gran Canaria (2002).
- Canalink: dispone de dos cables submarinos entre Tenerife y Gran Canaria y uno entre Tenerife y La Palma (2011).
Además, las islas están conectadas con el exterior por los siguientes sistemas:
- Telefónica dispone de tres cables submarinos, dos conectan Cádiz con Tenerife (PENCAN 6 y PENCAN 8) y el tercero (PENCAN 7) con Gran Canaria. Los dos últimos fueron ampliados en 2015 con tecnología 100G.
- Canalink dispone de un sistema de cable submarino que conecta Tenerife con Cádiz; este cable dispone de un ramal que conecta con Marruecos.
- La isla de Tenerife está conectada al sistema ACE (Africa Coast to Europe), consorcio con participación de Orange.
- La isla de Gran Canaria está conectada al sistema WACS (West African Cable System), consorcio con participación de Vodafone.
My first impressions of web3
It’s probably good to have some clarity on why centralized platforms emerged to begin with, and in my mind the explanation is pretty simple:
- People don’t want to run their own servers, and never will.
- A protocol moves much more slowly than a platform. This isn’t a funding issue. If something is truly decentralized, it becomes very difficult to change, and often remains stuck in time. That is a problem for technology, because the rest of the ecosystem is moving very quickly, and if you don’t keep up you will fail.
…there is nothing particularly “distributed” about the apps themselves: they’re just normal react websites. The “distributedness” refers to where the state and the logic/permissions for updating the state lives: on the blockchain instead of in a “centralized” database.
One thing that has always felt strange to me about the cryptocurrency world is the lack of attention to the client/server interface. When people talk about blockchains, they talk about distributed trust, leaderless consensus, and all the mechanics of how that works, but often gloss over the reality that clients ultimately can’t participate in those mechanics.
With the shift to mobile, we now live firmly in a world of clients and servers – with the former completely unable to act as the latter – and those questions seem more important to me than ever.
This was surprising to me. So much work, energy, and time has gone into creating a trustless distributed consensus mechanism, but virtually all clients that wish to access it do so by simply trusting the outputs from these two companies without any further verification. It also doesn’t seem like the best privacy situation. Imagine if every time you interacted with a website in Chrome, your request first went to Google before being routed to the destination and back. That’s the situation with ethereum today. All write traffic is obviously already public on the blockchain, but these companies also have visibility into almost all read requests from almost all users in almost all dApps.
Instead of storing the data on-chain, NFTs instead contain a URL that points to the data. What surprised me about the standards was that there’s no hash commitment for the data located at the URL. Looking at many of the NFTs on popular marketplaces being sold for tens, hundreds, or millions of dollars, that URL often just points to some VPS running Apache somewhere. Anyone with access to that machine, anyone who buys that domain name in the future, or anyone who compromises that machine can change the image, title, description, etc for the NFT to whatever they’d like at any time (regardless of whether or not they “own” the token). There’s nothing in the NFT spec that tells you what the image “should” be, or even allows you to confirm whether something is the “correct” image.
I think this is very similar to the situation with email. I can run my own mail server, but it doesn’t functionally matter for privacy, censorship resistance, or control – because GMail is going to be on the other end of every email that I send or receive anyway. Once a distributed ecosystem centralizes around a platform for convenience, it becomes the worst of both worlds: centralized control, but still distributed enough to become mired in time. I can build my own NFT marketplace, but it doesn’t offer any additional control if OpenSea mediates the view of all NFTs in the wallets people use (and every other app in the ecosystem).
If we do want to change our relationship to technology, I think we’d have to do it intentionally. My basic thoughts are roughly:
- We should accept the premise that people will not run their own servers by designing systems that can distribute trust without having to distribute infrastructure.
- We should try to reduce the burden of building software.
Why Web3 Matters
Centralized platforms follow a predictable life cycle. At first, they do everything they can to recruit users and third-party complements like creators, developers, and businesses.
They do this to strengthen their network effect. As platforms move up the adoption S-curve, their power over users and third parties steadily grows.
When they hit the top of the S-curve, their relationships with network participants change from positive-sum to zero-sum. To continue growing requires extracting data from users and competing with (former) partners.
Famous examples of this are Microsoft vs. Netscape, Google vs. Yelp, Facebook vs. Zynga, Twitter vs. its third-party clients, and Epic vs. Apple.
La sociedad del desconocimiento
Cuando la batalla política se lleva a cabo en el territorio del conocimiento, no tiene nada de extraño que aparezca, además de las típicas disputas entre los expertos, un estrafalario rechazo al conocimiento en general, que adopta hoy formas muy diversas de escepticismo y credulidad, como la desinformación, el negacionismo o las teorías conspiratorias.
Hay un populismo antitecnológico, que sospecha de la ciencia y el desafecto frente a la representación, pero hay también un populismo epistémico que consiste en procesar una fe ciega en que la política puede ser disuelta en los datos, las cifras, las evidencias científicas y el saber experto.
…deseo de despojar a la política de lo político, es decir, de la gestión de intereses en conflicto, la toma de decisiones con un saber insuficiente y el esfuerzo por lograr compromisos sostenibles.
Environmental Justice Atlas. Mapping Environmental Justice
The EJAtlas is a work in progress. Newly documented cases and information are continuously added to the platform. However, many are still undocumented and new ones arise. Please note that the absence of data does not indicate the absence of conflict.
Adjust and Normalize Your Music Files with FFMPEG
Not all audio files are created equal. Sometimes, they’re too quiet, too loud, or just off. When you find yourself with a problematic audio file, you aren’t stuck just dealing with it. FFmpeg, a powerful open-source audio utility can help. It can adjust the volume of your files and normalize them to get rid of unpleasant fluctuations in volume. What’s even better, it’s fully scriptable and even baked into Python scripts that streamline the whole thing.
How to Batch Normalize Audio with Audacity
Batch processing in Audacity requires the use of a chain. A chain is a set of preconfigured commands that can be applied to projects or audio files. In this tutorial, you’ll learn how to create a chain to normalize audio with Audacity.
MicroG Project
A free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries.
LineageOS for MicroG. The full Android experience without Google Apps
LineageOS unofficial fork with built-in
microG gapps implementation.
Our ROM has built-in microG free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries.
This enables you to use every Google service you need without keeping another closed-source binary blob in your Android system.
Spacebuster. Raumlabor
The Spacebuster is build on the basis of a step van and a big inflatable space coming out of the back of the van fitting up to 80 persons in it. People enter the bubble through the passenger’s door of the van walking through to the back down a ramp right into the inflated space. The bubble is supported by air pressure generated by a fan underneath the ramp. The membrane of the bubble is translucent so people on the inside can see schematically what´s going on outside and vice versa. So the membrane acts as a semi permeable border between the public and the more private.
How to Run Bash Script as Root During Startup on Linux
…start off by writing “@reboot.” The reboot
command is key here as it tells the cron on reboot this command to run every single time. Directly after reboot, add the full file path to the bash script.
@reboot /home/derrik/startupscript.sh
Guides d’achat smartphones
Que ce soit par marque, par gamme de prix ou pour un usage précis, Frandroid vous propose toute l’année des guides d’achat pour vous aider à choisir le meilleur smartphone en fonction de votre budget et de votre besoin.
La insostenible tecnofobia de la izquierda: discurso de odio, fake news y anonimato; el deje Corcuera de la « nueva » política en la era digital
Dedico mi vida a denunciar que Internet (lo digital), no es un espacio diferente a la realidad; es parte de la realidad. Dedico la vida a explicar que si permitimos que se cree un estado de excepción en Internet, el paso a que se traslade al resto de los ámbitos de la vida es solo uno.
« Discurso de odio » es una expresión perversa: trabajar contra el « discurso del odio » (donde « odio » es solo un atributo subordinado a « discurso »), es trabajar en primer lugar contra « el discurso » y, por tanto, contribuir a la narrativa que recorta la libertad de expresión y no a la que erradica las discriminaciones.
Con Xnet llevamos años defendiendo el derecho al anonimato. Pero así como el derecho a la libertad de expresión no es la obligación de nadie a escuchar, el derecho al anonimato es el derecho a que puedas tú mismo garantizar tu propio anonimato sin ser criminalizado por hacerlo. Nada más. Obviamente no significa que se deba perseguir quien dice que el mismo gato está en la foto de tu perfil anónimo y del que no lo es.
Por otra parte, si acosas o insultas en la red, el juez manda a que se averigüe quien eres; se averigua y persigue el delito. Fin del melodrama.
Data Privacy Glossary (A-Z)
When it comes to protecting your sensitive personal data, or your organization’s data, the different terminology and jargon can often be an issue.
This is why we’ve compiled this A-Z data privacy glossary s in the hopes that it might help you improve your data security.
Covid-19 : quels sont les principaux effets indésirables des vaccins ?
Les effets les plus fréquents ou les plus graves survenus en France après vaccination ont été mis en évidence dans les enquêtes de pharmacovigilance. L’Agence nationale de sécurité du médicament publie des rapports détaillés rendant compte de ces enquêtes, vaccin par vaccin.
DART: la NASA lanza la primera misión de defensa planetaria que busca desviar un asteroide con un impacto
DART pondrá a prueba una propuesta defensiva de larga data impactando un objeto llamado Dimorphos para medir cuánto se puede alterar su velocidad y trayectoria.
Es el primer intento de desviar un asteroide con el propósito de aprender a proteger la Tierra, aunque este asteroide en particular no presenta ninguna amenaza.
‘Bitcoin City’ in El Salvador seen through local memes
“It will have zero income tax forever, zero capital gains tax. Invest here and make all the money you want. We’re fine,” Bukele said.
This announcement closed “Bitcoin Week,” a large Bitcoin conference that drew hundreds of foreign investors. The tax-free, “techy,” and ecological Bitcoin City — the first of its kind — will be funded by Bitcoin bonds and powered by geothermal energy from a nearby volcano. Crypto mining, the process of creating new bitcoin through intensive cryptographic puzzles, is a notoriously energy-intensive process that has been criticized for increasing global emission rates in vulnerable areas.
Is No-Code the Future of Creating Websites?
Pros of No-Code Platforms
- An immediate solution to problems you have in terms of website development because you will be able to create software solutions without having to hire expert programmers.
- Regardless of your degree, career, or position in a business, you can now build a website by yourself that will add value to your craft or business.
- Building a website is faster and cheaper. Hiring developers will cost you a lot of money and with no-code, you will be able to cut the cost.
- It will save you months and months of working since you can now build a website straight away without the need to code.
- You will have creative freedom on what you want to add to your website since the process is more visual.
- Obviously, with no-code, web developers will have less on their plates and can focus more on streamlining processes or creating new innovations.
Cons of No-Code Platforms
- Security breaches with no-code are unavoidable, and once the platform you are using is affected by this factor, your website will be compromised as well.
- You don’t have the full authority with using no-code networks, so basically you are taking a risk in using such platforms.
- You will not be able to customize software using the no-code platform.
- You have to adapt your business process based on the capability feature of the no-code network or platform you are using.
El supercomputador de Microsoft entra en la lista TOP500, pero la ironía es que no funciona con Windows, sino con Linux
La lista TOP500 se publica dos veces al año y registra los supercomputadores más potentes del año. Solo ha habido un cambio en los diez primeros puestos, y es uno curioso y con un poco de sorna.
Se trata de la llegada la lista del supercomputador Voyager-EUS2, que ha desarrollado Microsoft Azure y que cuenta con una potencia de 30 petaflops por segundo. Todo estupendo, pero lo realmente curioso es que el supercomputador de Microsoft no funciona con Windows, sino con Linux.
l Podcast en Comic Sans – 2×04 – ‘Cruz mas Cruz’, con Pepe Cruz Novillo Jr
https://www.youtube.com/watch?v=3useDNoOHxU
Hackappart
Cette annonce s’adresse aux passionné.e.s d’informatique
qui cherchent une co-location à Toulouse centre ville
Les profils recherchés sont des étudiant.e.s en informatique,
ou tout autre personne passionnée par les ordinateurs et
les réseaux (pas de gamers pas contre)
How to Install Slack on Debian 11 Bullseye
Usually, installing a .deb package on Debian is straightforward; however, this time, it requires just a bit more work given in Debian 11 Bullseye; the package “libappindicator3-1” is only available in Buster and Sid for the moment. Installing this is also necessary for other applications such as Discord and many more.
The true size of Africa
The whole point being made was that we all have been taught geography mainly based on the Mercator projection – as the background in daily television news, the cover of my school atlas, in general the ubiquitous depiction of the planet.
But the basic fact is that a three-dimensional sphere being shown as a single two-dimensional flat image will always be subject to a conversion loss: something has to give…
The reason why Mercator was such an important advance is simple: on it one can draw straight lines to account for travel routes – in the days of the gigantic merchant fleets and naval battles an immensely valuable attribute.
«Corporate Memphis»: ¿Por qué todas las webs parecen iguales?
…decenas de revistas, cuentos, webs y aplicaciones comerciales con una estética similar a la de la ilustración que decora este artículo. A ese estilo se le conoce como «Alegria» o «Corporate Memphis». Es un producto de la precarización y la devaluación del trabajo y tiene decenas de variantes y versiones, todas igualmente exánimes y repetitivas.
El resultado es un cambio cualitativo. Cualquiera puede hacer una ilustración dentro de los códigos visuales del «Corporate Memphis». Ya no es solo que el ilustrador -uno de los últimos artesanos- se haya proletarizado, ni siquiera que una vez proletarizado haya sido expulsado de la oficina y se haya precarizado al extremo vendiendo horas de trabajo en una plataforma. Ahora el ilustrador como tal es ya innecesario.
La automatización combinatoria de un código estándar de imágenes pre-diseñadas permitirá que ilustrar se convierta en una tarea más del desarrollador web. Una entre otras muchas que ya se han automatizado o están en camino de hacerlo. Porque el desarrollador es el primero que ha sufrido la estandarización y procedimentación automatizada de su trabajo. Ahora, Inteligencia Artificial mediante, está siendo alienado incluso de la algoritmia.
Understanding How Facebook Disappeared from the Internet
Routes were withdrawn, Facebook’s DNS servers went offline, and one minute after the problem occurred, Cloudflare engineers were in a room wondering why 1.1.1.1 couldn’t resolve facebook.com and worrying that it was somehow a fault with our systems.
With those withdrawals, Facebook and its sites had effectively disconnected themselves from the Internet.
Trojan Room coffee pot
The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. Put on the Internet in 1991 by Quentin Stafford-Fraser and Paul Jardetzky, it was migrated to the web in 1993 becoming the world’s first webcam.
To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international notoriety as a feature of the fledgling World Wide Web, until it was retired in 2001.
Copy-and-paste sharing on Stack Overflow spreads insecure code
The tricky bit, as a new study called An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples, is working out which code is OK and which isn’t.
After analysing real code from Stack Overflow, the researchers found a small but still significant number of examples where this happened over a 10-year period to 2018.
The team reviewed 72,483 C++ code snippets for weaknesses defined by the industry Common Weakness Enumeration (CWE) guidelines, finding 69 representing 29 different types of security flaw, most often CWE-150 (‘Improper neutralization of space, meta, or control sequence’).
I’d be fascinated to see a study that compared cutting and pasting code – which carries the small risk of copying and pasting security errors – with coders who don’t copy and paste code and solve unfamiliar problems by always writing their own solution.
Solving the problem yourself carries three possible penalties: #1 it will take longer; #2 there is a good chance that the code (which solves a problem the developer is not well versed in solving) will make it in to the world without ever being reviewed by another person; and #3 if it does go unreviewed, there is a good chance the developer will never learn of their mistake and could well end up repeating it, even cutting and pasting it, into other projects.
scrumblr. Collaborative Online Scrum Tool Using Websockets, Node.js, jQuery, and CSS3
scrumblr is a web-based simulation of a physical agile kanban board that supports real-time collaboration. it is built using node.js, websockets (using socket.io), CSS3, and jquery. i hope you like it.