Submarine Cable Map
The Submarine Cable Map is a free and regularly updated resource from TeleGeography.
The Submarine Cable Map is a free and regularly updated resource from TeleGeography.
Los cables submarinos en Canarias que conectan las islas entre sí son los siguientes. Entre paréntesis se indica el año de puesta en servicio:
Además, las islas están conectadas con el exterior por los siguientes sistemas:
It’s probably good to have some clarity on why centralized platforms emerged to begin with, and in my mind the explanation is pretty simple:
…there is nothing particularly “distributed” about the apps themselves: they’re just normal react websites. The “distributedness” refers to where the state and the logic/permissions for updating the state lives: on the blockchain instead of in a “centralized” database.
One thing that has always felt strange to me about the cryptocurrency world is the lack of attention to the client/server interface. When people talk about blockchains, they talk about distributed trust, leaderless consensus, and all the mechanics of how that works, but often gloss over the reality that clients ultimately can’t participate in those mechanics.
With the shift to mobile, we now live firmly in a world of clients and servers – with the former completely unable to act as the latter – and those questions seem more important to me than ever.
This was surprising to me. So much work, energy, and time has gone into creating a trustless distributed consensus mechanism, but virtually all clients that wish to access it do so by simply trusting the outputs from these two companies without any further verification. It also doesn’t seem like the best privacy situation. Imagine if every time you interacted with a website in Chrome, your request first went to Google before being routed to the destination and back. That’s the situation with ethereum today. All write traffic is obviously already public on the blockchain, but these companies also have visibility into almost all read requests from almost all users in almost all dApps.
Instead of storing the data on-chain, NFTs instead contain a URL that points to the data. What surprised me about the standards was that there’s no hash commitment for the data located at the URL. Looking at many of the NFTs on popular marketplaces being sold for tens, hundreds, or millions of dollars, that URL often just points to some VPS running Apache somewhere. Anyone with access to that machine, anyone who buys that domain name in the future, or anyone who compromises that machine can change the image, title, description, etc for the NFT to whatever they’d like at any time (regardless of whether or not they “own” the token). There’s nothing in the NFT spec that tells you what the image “should” be, or even allows you to confirm whether something is the “correct” image.
I think this is very similar to the situation with email. I can run my own mail server, but it doesn’t functionally matter for privacy, censorship resistance, or control – because GMail is going to be on the other end of every email that I send or receive anyway. Once a distributed ecosystem centralizes around a platform for convenience, it becomes the worst of both worlds: centralized control, but still distributed enough to become mired in time. I can build my own NFT marketplace, but it doesn’t offer any additional control if OpenSea mediates the view of all NFTs in the wallets people use (and every other app in the ecosystem).
If we do want to change our relationship to technology, I think we’d have to do it intentionally. My basic thoughts are roughly:
Centralized platforms follow a predictable life cycle. At first, they do everything they can to recruit users and third-party complements like creators, developers, and businesses.
They do this to strengthen their network effect. As platforms move up the adoption S-curve, their power over users and third parties steadily grows.
When they hit the top of the S-curve, their relationships with network participants change from positive-sum to zero-sum. To continue growing requires extracting data from users and competing with (former) partners.
Famous examples of this are Microsoft vs. Netscape, Google vs. Yelp, Facebook vs. Zynga, Twitter vs. its third-party clients, and Epic vs. Apple.
Cuando la batalla política se lleva a cabo en el territorio del conocimiento, no tiene nada de extraño que aparezca, además de las típicas disputas entre los expertos, un estrafalario rechazo al conocimiento en general, que adopta hoy formas muy diversas de escepticismo y credulidad, como la desinformación, el negacionismo o las teorías conspiratorias.
Hay un populismo antitecnológico, que sospecha de la ciencia y el desafecto frente a la representación, pero hay también un populismo epistémico que consiste en procesar una fe ciega en que la política puede ser disuelta en los datos, las cifras, las evidencias científicas y el saber experto.
…deseo de despojar a la política de lo político, es decir, de la gestión de intereses en conflicto, la toma de decisiones con un saber insuficiente y el esfuerzo por lograr compromisos sostenibles.
The EJAtlas is a work in progress. Newly documented cases and information are continuously added to the platform. However, many are still undocumented and new ones arise. Please note that the absence of data does not indicate the absence of conflict.
Not all audio files are created equal. Sometimes, they’re too quiet, too loud, or just off. When you find yourself with a problematic audio file, you aren’t stuck just dealing with it. FFmpeg, a powerful open-source audio utility can help. It can adjust the volume of your files and normalize them to get rid of unpleasant fluctuations in volume. What’s even better, it’s fully scriptable and even baked into Python scripts that streamline the whole thing.
Batch processing in Audacity requires the use of a chain. A chain is a set of preconfigured commands that can be applied to projects or audio files. In this tutorial, you’ll learn how to create a chain to normalize audio with Audacity.
A free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries.
LineageOS unofficial fork with built-in
microG gapps implementation.
Our ROM has built-in microG free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries.
This enables you to use every Google service you need without keeping another closed-source binary blob in your Android system.
The Spacebuster is build on the basis of a step van and a big inflatable space coming out of the back of the van fitting up to 80 persons in it. People enter the bubble through the passenger’s door of the van walking through to the back down a ramp right into the inflated space. The bubble is supported by air pressure generated by a fan underneath the ramp. The membrane of the bubble is translucent so people on the inside can see schematically what´s going on outside and vice versa. So the membrane acts as a semi permeable border between the public and the more private.
…start off by writing “@reboot.” The reboot
command is key here as it tells the cron on reboot this command to run every single time. Directly after reboot, add the full file path to the bash script.
@reboot /home/derrik/startupscript.sh
Que ce soit par marque, par gamme de prix ou pour un usage précis, Frandroid vous propose toute l’année des guides d’achat pour vous aider à choisir le meilleur smartphone en fonction de votre budget et de votre besoin.
Dedico mi vida a denunciar que Internet (lo digital), no es un espacio diferente a la realidad; es parte de la realidad. Dedico la vida a explicar que si permitimos que se cree un estado de excepción en Internet, el paso a que se traslade al resto de los ámbitos de la vida es solo uno.
«Discurso de odio» es una expresión perversa: trabajar contra el «discurso del odio» (donde «odio» es solo un atributo subordinado a «discurso»), es trabajar en primer lugar contra «el discurso» y, por tanto, contribuir a la narrativa que recorta la libertad de expresión y no a la que erradica las discriminaciones.
Con Xnet llevamos años defendiendo el derecho al anonimato. Pero así como el derecho a la libertad de expresión no es la obligación de nadie a escuchar, el derecho al anonimato es el derecho a que puedas tú mismo garantizar tu propio anonimato sin ser criminalizado por hacerlo. Nada más. Obviamente no significa que se deba perseguir quien dice que el mismo gato está en la foto de tu perfil anónimo y del que no lo es.
Por otra parte, si acosas o insultas en la red, el juez manda a que se averigüe quien eres; se averigua y persigue el delito. Fin del melodrama.
When it comes to protecting your sensitive personal data, or your organization’s data, the different terminology and jargon can often be an issue.
This is why we’ve compiled this A-Z data privacy glossary s in the hopes that it might help you improve your data security.
Les effets les plus fréquents ou les plus graves survenus en France après vaccination ont été mis en évidence dans les enquêtes de pharmacovigilance. L’Agence nationale de sécurité du médicament publie des rapports détaillés rendant compte de ces enquêtes, vaccin par vaccin.
DART pondrá a prueba una propuesta defensiva de larga data impactando un objeto llamado Dimorphos para medir cuánto se puede alterar su velocidad y trayectoria.
Es el primer intento de desviar un asteroide con el propósito de aprender a proteger la Tierra, aunque este asteroide en particular no presenta ninguna amenaza.
“It will have zero income tax forever, zero capital gains tax. Invest here and make all the money you want. We’re fine,” Bukele said.
This announcement closed “Bitcoin Week,” a large Bitcoin conference that drew hundreds of foreign investors. The tax-free, “techy,” and ecological Bitcoin City — the first of its kind — will be funded by Bitcoin bonds and powered by geothermal energy from a nearby volcano. Crypto mining, the process of creating new bitcoin through intensive cryptographic puzzles, is a notoriously energy-intensive process that has been criticized for increasing global emission rates in vulnerable areas.
La lista TOP500 se publica dos veces al año y registra los supercomputadores más potentes del año. Solo ha habido un cambio en los diez primeros puestos, y es uno curioso y con un poco de sorna.
Se trata de la llegada la lista del supercomputador Voyager-EUS2, que ha desarrollado Microsoft Azure y que cuenta con una potencia de 30 petaflops por segundo. Todo estupendo, pero lo realmente curioso es que el supercomputador de Microsoft no funciona con Windows, sino con Linux.
https://www.youtube.com/watch?v=3useDNoOHxU
Cette annonce s’adresse aux passionné.e.s d’informatique
qui cherchent une co-location à Toulouse centre ville
Les profils recherchés sont des étudiant.e.s en informatique,
ou tout autre personne passionnée par les ordinateurs et
les réseaux (pas de gamers pas contre)
Usually, installing a .deb package on Debian is straightforward; however, this time, it requires just a bit more work given in Debian 11 Bullseye; the package “libappindicator3-1” is only available in Buster and Sid for the moment. Installing this is also necessary for other applications such as Discord and many more.
The whole point being made was that we all have been taught geography mainly based on the Mercator projection – as the background in daily television news, the cover of my school atlas, in general the ubiquitous depiction of the planet.
But the basic fact is that a three-dimensional sphere being shown as a single two-dimensional flat image will always be subject to a conversion loss: something has to give…
The reason why Mercator was such an important advance is simple: on it one can draw straight lines to account for travel routes – in the days of the gigantic merchant fleets and naval battles an immensely valuable attribute.
…decenas de revistas, cuentos, webs y aplicaciones comerciales con una estética similar a la de la ilustración que decora este artículo. A ese estilo se le conoce como «Alegria» o «Corporate Memphis». Es un producto de la precarización y la devaluación del trabajo y tiene decenas de variantes y versiones, todas igualmente exánimes y repetitivas.
El resultado es un cambio cualitativo. Cualquiera puede hacer una ilustración dentro de los códigos visuales del «Corporate Memphis». Ya no es solo que el ilustrador -uno de los últimos artesanos- se haya proletarizado, ni siquiera que una vez proletarizado haya sido expulsado de la oficina y se haya precarizado al extremo vendiendo horas de trabajo en una plataforma. Ahora el ilustrador como tal es ya innecesario.
La automatización combinatoria de un código estándar de imágenes pre-diseñadas permitirá que ilustrar se convierta en una tarea más del desarrollador web. Una entre otras muchas que ya se han automatizado o están en camino de hacerlo. Porque el desarrollador es el primero que ha sufrido la estandarización y procedimentación automatizada de su trabajo. Ahora, Inteligencia Artificial mediante, está siendo alienado incluso de la algoritmia.
Routes were withdrawn, Facebook’s DNS servers went offline, and one minute after the problem occurred, Cloudflare engineers were in a room wondering why 1.1.1.1 couldn’t resolve facebook.com and worrying that it was somehow a fault with our systems.
With those withdrawals, Facebook and its sites had effectively disconnected themselves from the Internet.
The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. Put on the Internet in 1991 by Quentin Stafford-Fraser and Paul Jardetzky, it was migrated to the web in 1993 becoming the world’s first webcam.
To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international notoriety as a feature of the fledgling World Wide Web, until it was retired in 2001.
The tricky bit, as a new study called An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples, is working out which code is OK and which isn’t.
After analysing real code from Stack Overflow, the researchers found a small but still significant number of examples where this happened over a 10-year period to 2018.
The team reviewed 72,483 C++ code snippets for weaknesses defined by the industry Common Weakness Enumeration (CWE) guidelines, finding 69 representing 29 different types of security flaw, most often CWE-150 (‘Improper neutralization of space, meta, or control sequence’).
I’d be fascinated to see a study that compared cutting and pasting code – which carries the small risk of copying and pasting security errors – with coders who don’t copy and paste code and solve unfamiliar problems by always writing their own solution.
Solving the problem yourself carries three possible penalties: #1 it will take longer; #2 there is a good chance that the code (which solves a problem the developer is not well versed in solving) will make it in to the world without ever being reviewed by another person; and #3 if it does go unreviewed, there is a good chance the developer will never learn of their mistake and could well end up repeating it, even cutting and pasting it, into other projects.
scrumblr is a web-based simulation of a physical agile kanban board that supports real-time collaboration. it is built using node.js, websockets (using socket.io), CSS3, and jquery. i hope you like it.
What can we do when faced with a world where people lie as a way of shaping the world to their own ends? First, we have to get smart. Disinformation – the conscious, intentional spreading of false information – is not an accident. It’s a strategy. When we encounter information that is surprising, unsettling, or even a little too comfortable, we need to ask ourselves a set of questions: How does the author know this is true? What is s/he trying to persuade me of? Who benefits if I believe this to be true? How can I check this information against other sources I trust?
…disinformation wants to keep us powerless, fighting to assert that’s true rather than challenging those who are in power.
Web scraper is a technique for extracting structured information from a web page. With Python, you can build a efficient web scraper by using BeautifulSoup, requests and other libraries. However, these solution is not fast enough. In this article, I will show you some tips to build a super fast web scraper with Python.
…a boom in conservative Christian schooling, driven nationwide by a combination of pandemic frustrations and rising parental anxieties around how schools handle education on issues including race and the rights of transgender students.
When the pandemic swept across the country in the spring of 2020, many parents turned to home-schooling.
Others wanted or needed to have their children in physical classrooms. In many parts of the country, private schools stayed open even as public schools moved largely online. Because many parents were working from home, they got a historically intimate look at their children’s online classes — leading to what some advocates for evangelical schools call “the Zoom factor.”
More significant, said Mr. Laats, are the words that conservative schools do not use, like “inclusion” and “diversity,” in contrast with a growing number of public and private schools. About 68 percent of students at conservative Christian private schools are white, according to the Education Department, a figure that is comparable to other categories of private schools but significantly higher than public schools.
If many conservative Protestant schools in the 1960s and 1970s were founded to keep white children away from certain people, then the goal today is keeping children away from certain ideas, said J. Russell Hawkins, a professor of humanities and history at Indiana Wesleyan University. “But the ideas being avoided are still having to do with race,” he said.
Deana Wright enrolled her children in Smith Mountain Lake in July, soon after speaking at a school board meeting in Franklin County. She and her husband did not want their children to keep wearing masks in school, and she had also started reading about what her district was teaching about race. She was “shocked” to come across terms like “cultural competency” and “educational equity” — euphemisms, as she saw it, for critical race theory.
“We’re just so grateful that the Christian academy is here,” she said.
Virtual whiteboard for sketching hand-drawn like diagrams. Collaborative and end-to-end encrypted.
Are you interested in integrating media making into your classroom? Making media, such as videos, narrated slideshows and online maps, can be an engaging way for students to demonstrate knowledge and build critical thinking skills. Find instructions, videos, worksheets and rubrics for implementing media-making projects with students. We also have self-paced professional development courses that you can take to learn media production!
Al día siguiente, la ciudad amanece en llamas con las iglesias grafiteadas: “Lxs negrxs tenemos todo el derecho de incendiar un país que construímos gratis”, citando un tweet de @solomongeorgio quien hablaba sobre la protestas por el asesinato de George Floyd en 2020. Al igual que ese cuadro del Prado, este país ha sido construido por cuerpos negros e indígenas que garantizaron el Estado de bienestar de la blanquitud española. “We don’t choose this future”.
Fantasear no significa olvidar, significa reelaborar las narrativas del dolor. Retornar lo arrancado. Devolver lo robado. España es especialista en devoluciones en caliente, estrategia política del sistema de control migratorio que implica la expulsión y devolución de personas migrantes en el instante en el que atraviesan la frontera del Estado. España devuelve a los cuerpos “que no pertenecen” a este territorio, pero aún no devuelve todo lo que no pertenece a este territorio.
El tiempo postpandémico no existe para nosotrxs porque hemos vivido desde hace siglos en este mundo pandémico antinegro, antiindígena y antitrans. Nosotrxs sabemos que “there are black people in the future” (Alisha B. Wormsley) porque “el amor y la libertad negra residen más allá del cuerpo” (Walidah Imarisha: Rewriting the Future: Using Science Fiction to Re-Envision Justice, 2015). No hay espacio o tiempo que nos contenga, no hay Museo que nos encarcele porque siempre nos fugaremos.
Ibai Llanos y Gerard Piqué han liderado un evento donde 31 hombres y una mujer de diferentes países compiten para ganar el Mundial de Globos. ¿Cómo se ha convertido un vídeo viral de un juego casero en un evento mediático que ha congregado a marcas y a miles de personas?
El evento contó con el apoyo de numerosas marcas comerciales y los datos de audiencia son bastante llamativos: la emisión de Twitch asciende en estos momentos a más de 8,5 millones de visualizaciones y casi 500.000 espectadores de media durante todo el streaming. El peruano Francesco de la Cruz se impuso en la final al alemán Jan Spiess. El presidente de Perú felicitó por Twitter al ganador. La cuenta de los JJOO en español también se hizo eco. Y hasta la BBC ha publicado un artículo sobre el tema. Un éxito.