De la tienda al vertedero: ropa descartable en el desierto de Atacama
En Chile, montañas de ropa que otros países ya no quieren han convertido un rincón del desierto de Atacama en un basurero.
En Chile, montañas de ropa que otros países ya no quieren han convertido un rincón del desierto de Atacama en un basurero.
Enable HTTP/2 module
Apache’s HTTP/2 support comes from the mod_http2 module. Enable it from:
a2enmod http2
apachectl restart
If above commands do not work in your system (which is likely the case in CentOS/RHEL), use LoadModule directive in httpd configuration directory to enable http2 module.
Add HTTP/2 Support
We highly recommend you enable HTTPS support for your web site first. Most web browser simply do not support HTTP/2 over plain text. Besides, there are no excuses to not use HTTPS anymore. HTTP/2 can be enabled site-by-site basis. Locate your web site’s Apache virtual host configuration file, and add the following right after the opening
Protocols h2 http/1.1
Bueno cansado de que Correos me cobrase el trámite aduanero y después de leer en algunos foros que era posible el autodespacho pero no veía del todo claro cómo hacerlo me decidí a hacerlo por mi mismo.
Este documento pretende ser una guía donde les voy a explicar los pasos exactos, documentación a entregar y lugares a los que dirigirse.
Este trámite es válido para todos aquellos envíos que recibamos de la U.E., incluyendo la España peninsular. Además podrán calcular cuanto van a tener que pagar y así ver si les sale rentable hacerlo o no.

The sound wave is converted into data through a series of snapshot measurements, or samples. A sample is taken at a particular time in the audio wave, recording amplitude. This information is then converted into digestible, binary data.
The system takes these measurements at a speed called the audio sample rate, measured in kilohertz. The audio sample rate determines the range of frequencies captured in digital audio.
L’écoute, dans un cadre d’action collective est donc, dans l’idée de construction relationnelle, au cœur du processus.
Marcher ensemble.
Écouter ensemble.
Faire ensemble…
Plutôt agir que parler, même si la parole est source d’enseignement, d’échanges et de transmission, d’invention même, l’action de terrain reste la meilleure façon de faire vivre et évoluer des idées, des projets. Et donc ici, de construire des paysages sonores dignes de ce nom. Écoutables.
L’expérimentation, ou l’expérienciation, le fait d’acquérir des connaissances par l’expérience personnelle, sont donc moteurs dans ces constructions audio-paysagères.

The Submarine Cable Map is a free and regularly updated resource from TeleGeography.

Los cables submarinos en Canarias que conectan las islas entre sí son los siguientes. Entre paréntesis se indica el año de puesta en servicio:
Además, las islas están conectadas con el exterior por los siguientes sistemas:
It’s probably good to have some clarity on why centralized platforms emerged to begin with, and in my mind the explanation is pretty simple:
…there is nothing particularly “distributed” about the apps themselves: they’re just normal react websites. The “distributedness” refers to where the state and the logic/permissions for updating the state lives: on the blockchain instead of in a “centralized” database.
One thing that has always felt strange to me about the cryptocurrency world is the lack of attention to the client/server interface. When people talk about blockchains, they talk about distributed trust, leaderless consensus, and all the mechanics of how that works, but often gloss over the reality that clients ultimately can’t participate in those mechanics.
With the shift to mobile, we now live firmly in a world of clients and servers – with the former completely unable to act as the latter – and those questions seem more important to me than ever.
This was surprising to me. So much work, energy, and time has gone into creating a trustless distributed consensus mechanism, but virtually all clients that wish to access it do so by simply trusting the outputs from these two companies without any further verification. It also doesn’t seem like the best privacy situation. Imagine if every time you interacted with a website in Chrome, your request first went to Google before being routed to the destination and back. That’s the situation with ethereum today. All write traffic is obviously already public on the blockchain, but these companies also have visibility into almost all read requests from almost all users in almost all dApps.
Instead of storing the data on-chain, NFTs instead contain a URL that points to the data. What surprised me about the standards was that there’s no hash commitment for the data located at the URL. Looking at many of the NFTs on popular marketplaces being sold for tens, hundreds, or millions of dollars, that URL often just points to some VPS running Apache somewhere. Anyone with access to that machine, anyone who buys that domain name in the future, or anyone who compromises that machine can change the image, title, description, etc for the NFT to whatever they’d like at any time (regardless of whether or not they “own” the token). There’s nothing in the NFT spec that tells you what the image “should” be, or even allows you to confirm whether something is the “correct” image.
I think this is very similar to the situation with email. I can run my own mail server, but it doesn’t functionally matter for privacy, censorship resistance, or control – because GMail is going to be on the other end of every email that I send or receive anyway. Once a distributed ecosystem centralizes around a platform for convenience, it becomes the worst of both worlds: centralized control, but still distributed enough to become mired in time. I can build my own NFT marketplace, but it doesn’t offer any additional control if OpenSea mediates the view of all NFTs in the wallets people use (and every other app in the ecosystem).
If we do want to change our relationship to technology, I think we’d have to do it intentionally. My basic thoughts are roughly:

Centralized platforms follow a predictable life cycle. At first, they do everything they can to recruit users and third-party complements like creators, developers, and businesses.
They do this to strengthen their network effect. As platforms move up the adoption S-curve, their power over users and third parties steadily grows.
When they hit the top of the S-curve, their relationships with network participants change from positive-sum to zero-sum. To continue growing requires extracting data from users and competing with (former) partners.
Famous examples of this are Microsoft vs. Netscape, Google vs. Yelp, Facebook vs. Zynga, Twitter vs. its third-party clients, and Epic vs. Apple.
Cuando la batalla política se lleva a cabo en el territorio del conocimiento, no tiene nada de extraño que aparezca, además de las típicas disputas entre los expertos, un estrafalario rechazo al conocimiento en general, que adopta hoy formas muy diversas de escepticismo y credulidad, como la desinformación, el negacionismo o las teorías conspiratorias.
Hay un populismo antitecnológico, que sospecha de la ciencia y el desafecto frente a la representación, pero hay también un populismo epistémico que consiste en procesar una fe ciega en que la política puede ser disuelta en los datos, las cifras, las evidencias científicas y el saber experto.
…deseo de despojar a la política de lo político, es decir, de la gestión de intereses en conflicto, la toma de decisiones con un saber insuficiente y el esfuerzo por lograr compromisos sostenibles.

The EJAtlas is a work in progress. Newly documented cases and information are continuously added to the platform. However, many are still undocumented and new ones arise. Please note that the absence of data does not indicate the absence of conflict.
Not all audio files are created equal. Sometimes, they’re too quiet, too loud, or just off. When you find yourself with a problematic audio file, you aren’t stuck just dealing with it. FFmpeg, a powerful open-source audio utility can help. It can adjust the volume of your files and normalize them to get rid of unpleasant fluctuations in volume. What’s even better, it’s fully scriptable and even baked into Python scripts that streamline the whole thing.
Batch processing in Audacity requires the use of a chain. A chain is a set of preconfigured commands that can be applied to projects or audio files. In this tutorial, you’ll learn how to create a chain to normalize audio with Audacity.
A free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries.
LineageOS unofficial fork with built-in
microG gapps implementation.
Our ROM has built-in microG free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries.
This enables you to use every Google service you need without keeping another closed-source binary blob in your Android system.

The Spacebuster is build on the basis of a step van and a big inflatable space coming out of the back of the van fitting up to 80 persons in it. People enter the bubble through the passenger’s door of the van walking through to the back down a ramp right into the inflated space. The bubble is supported by air pressure generated by a fan underneath the ramp. The membrane of the bubble is translucent so people on the inside can see schematically what´s going on outside and vice versa. So the membrane acts as a semi permeable border between the public and the more private.
…start off by writing “@reboot.” The reboot command is key here as it tells the cron on reboot this command to run every single time. Directly after reboot, add the full file path to the bash script.
@reboot /home/derrik/startupscript.sh
Que ce soit par marque, par gamme de prix ou pour un usage précis, Frandroid vous propose toute l’année des guides d’achat pour vous aider à choisir le meilleur smartphone en fonction de votre budget et de votre besoin.
Dedico mi vida a denunciar que Internet (lo digital), no es un espacio diferente a la realidad; es parte de la realidad. Dedico la vida a explicar que si permitimos que se cree un estado de excepción en Internet, el paso a que se traslade al resto de los ámbitos de la vida es solo uno.
“Discurso de odio” es una expresión perversa: trabajar contra el “discurso del odio” (donde “odio” es solo un atributo subordinado a “discurso”), es trabajar en primer lugar contra “el discurso” y, por tanto, contribuir a la narrativa que recorta la libertad de expresión y no a la que erradica las discriminaciones.
Con Xnet llevamos años defendiendo el derecho al anonimato. Pero así como el derecho a la libertad de expresión no es la obligación de nadie a escuchar, el derecho al anonimato es el derecho a que puedas tú mismo garantizar tu propio anonimato sin ser criminalizado por hacerlo. Nada más. Obviamente no significa que se deba perseguir quien dice que el mismo gato está en la foto de tu perfil anónimo y del que no lo es.
Por otra parte, si acosas o insultas en la red, el juez manda a que se averigüe quien eres; se averigua y persigue el delito. Fin del melodrama.
When it comes to protecting your sensitive personal data, or your organization’s data, the different terminology and jargon can often be an issue.
This is why we’ve compiled this A-Z data privacy glossary s in the hopes that it might help you improve your data security.
Les effets les plus fréquents ou les plus graves survenus en France après vaccination ont été mis en évidence dans les enquêtes de pharmacovigilance. L’Agence nationale de sécurité du médicament publie des rapports détaillés rendant compte de ces enquêtes, vaccin par vaccin.
DART pondrá a prueba una propuesta defensiva de larga data impactando un objeto llamado Dimorphos para medir cuánto se puede alterar su velocidad y trayectoria.
Es el primer intento de desviar un asteroide con el propósito de aprender a proteger la Tierra, aunque este asteroide en particular no presenta ninguna amenaza.
“It will have zero income tax forever, zero capital gains tax. Invest here and make all the money you want. We’re fine,” Bukele said.
This announcement closed “Bitcoin Week,” a large Bitcoin conference that drew hundreds of foreign investors. The tax-free, “techy,” and ecological Bitcoin City — the first of its kind — will be funded by Bitcoin bonds and powered by geothermal energy from a nearby volcano. Crypto mining, the process of creating new bitcoin through intensive cryptographic puzzles, is a notoriously energy-intensive process that has been criticized for increasing global emission rates in vulnerable areas.
La lista TOP500 se publica dos veces al año y registra los supercomputadores más potentes del año. Solo ha habido un cambio en los diez primeros puestos, y es uno curioso y con un poco de sorna.
Se trata de la llegada la lista del supercomputador Voyager-EUS2, que ha desarrollado Microsoft Azure y que cuenta con una potencia de 30 petaflops por segundo. Todo estupendo, pero lo realmente curioso es que el supercomputador de Microsoft no funciona con Windows, sino con Linux.
https://www.youtube.com/watch?v=3useDNoOHxU
Cette annonce s’adresse aux passionné.e.s d’informatique
qui cherchent une co-location à Toulouse centre ville
Les profils recherchés sont des étudiant.e.s en informatique,
ou tout autre personne passionnée par les ordinateurs et
les réseaux (pas de gamers pas contre)
Usually, installing a .deb package on Debian is straightforward; however, this time, it requires just a bit more work given in Debian 11 Bullseye; the package “libappindicator3-1” is only available in Buster and Sid for the moment. Installing this is also necessary for other applications such as Discord and many more.

The whole point being made was that we all have been taught geography mainly based on the Mercator projection – as the background in daily television news, the cover of my school atlas, in general the ubiquitous depiction of the planet.
But the basic fact is that a three-dimensional sphere being shown as a single two-dimensional flat image will always be subject to a conversion loss: something has to give…
The reason why Mercator was such an important advance is simple: on it one can draw straight lines to account for travel routes – in the days of the gigantic merchant fleets and naval battles an immensely valuable attribute.

…decenas de revistas, cuentos, webs y aplicaciones comerciales con una estética similar a la de la ilustración que decora este artículo. A ese estilo se le conoce como «Alegria» o «Corporate Memphis». Es un producto de la precarización y la devaluación del trabajo y tiene decenas de variantes y versiones, todas igualmente exánimes y repetitivas.
El resultado es un cambio cualitativo. Cualquiera puede hacer una ilustración dentro de los códigos visuales del «Corporate Memphis». Ya no es solo que el ilustrador -uno de los últimos artesanos- se haya proletarizado, ni siquiera que una vez proletarizado haya sido expulsado de la oficina y se haya precarizado al extremo vendiendo horas de trabajo en una plataforma. Ahora el ilustrador como tal es ya innecesario.
La automatización combinatoria de un código estándar de imágenes pre-diseñadas permitirá que ilustrar se convierta en una tarea más del desarrollador web. Una entre otras muchas que ya se han automatizado o están en camino de hacerlo. Porque el desarrollador es el primero que ha sufrido la estandarización y procedimentación automatizada de su trabajo. Ahora, Inteligencia Artificial mediante, está siendo alienado incluso de la algoritmia.
Routes were withdrawn, Facebook’s DNS servers went offline, and one minute after the problem occurred, Cloudflare engineers were in a room wondering why 1.1.1.1 couldn’t resolve facebook.com and worrying that it was somehow a fault with our systems.
With those withdrawals, Facebook and its sites had effectively disconnected themselves from the Internet.
The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. Put on the Internet in 1991 by Quentin Stafford-Fraser and Paul Jardetzky, it was migrated to the web in 1993 becoming the world’s first webcam.
To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international notoriety as a feature of the fledgling World Wide Web, until it was retired in 2001.
The tricky bit, as a new study called An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples, is working out which code is OK and which isn’t.
After analysing real code from Stack Overflow, the researchers found a small but still significant number of examples where this happened over a 10-year period to 2018.
The team reviewed 72,483 C++ code snippets for weaknesses defined by the industry Common Weakness Enumeration (CWE) guidelines, finding 69 representing 29 different types of security flaw, most often CWE-150 (‘Improper neutralization of space, meta, or control sequence’).
I’d be fascinated to see a study that compared cutting and pasting code – which carries the small risk of copying and pasting security errors – with coders who don’t copy and paste code and solve unfamiliar problems by always writing their own solution.
Solving the problem yourself carries three possible penalties: #1 it will take longer; #2 there is a good chance that the code (which solves a problem the developer is not well versed in solving) will make it in to the world without ever being reviewed by another person; and #3 if it does go unreviewed, there is a good chance the developer will never learn of their mistake and could well end up repeating it, even cutting and pasting it, into other projects.
scrumblr is a web-based simulation of a physical agile kanban board that supports real-time collaboration. it is built using node.js, websockets (using socket.io), CSS3, and jquery. i hope you like it.
What can we do when faced with a world where people lie as a way of shaping the world to their own ends? First, we have to get smart. Disinformation – the conscious, intentional spreading of false information – is not an accident. It’s a strategy. When we encounter information that is surprising, unsettling, or even a little too comfortable, we need to ask ourselves a set of questions: How does the author know this is true? What is s/he trying to persuade me of? Who benefits if I believe this to be true? How can I check this information against other sources I trust?
…disinformation wants to keep us powerless, fighting to assert that’s true rather than challenging those who are in power.
Web scraper is a technique for extracting structured information from a web page. With Python, you can build a efficient web scraper by using BeautifulSoup, requests and other libraries. However, these solution is not fast enough. In this article, I will show you some tips to build a super fast web scraper with Python.
…a boom in conservative Christian schooling, driven nationwide by a combination of pandemic frustrations and rising parental anxieties around how schools handle education on issues including race and the rights of transgender students.
When the pandemic swept across the country in the spring of 2020, many parents turned to home-schooling.
Others wanted or needed to have their children in physical classrooms. In many parts of the country, private schools stayed open even as public schools moved largely online. Because many parents were working from home, they got a historically intimate look at their children’s online classes — leading to what some advocates for evangelical schools call “the Zoom factor.”
More significant, said Mr. Laats, are the words that conservative schools do not use, like “inclusion” and “diversity,” in contrast with a growing number of public and private schools. About 68 percent of students at conservative Christian private schools are white, according to the Education Department, a figure that is comparable to other categories of private schools but significantly higher than public schools.
If many conservative Protestant schools in the 1960s and 1970s were founded to keep white children away from certain people, then the goal today is keeping children away from certain ideas, said J. Russell Hawkins, a professor of humanities and history at Indiana Wesleyan University. “But the ideas being avoided are still having to do with race,” he said.
Deana Wright enrolled her children in Smith Mountain Lake in July, soon after speaking at a school board meeting in Franklin County. She and her husband did not want their children to keep wearing masks in school, and she had also started reading about what her district was teaching about race. She was “shocked” to come across terms like “cultural competency” and “educational equity” — euphemisms, as she saw it, for critical race theory.
“We’re just so grateful that the Christian academy is here,” she said.

Virtual whiteboard for sketching hand-drawn like diagrams. Collaborative and end-to-end encrypted.
Are you interested in integrating media making into your classroom? Making media, such as videos, narrated slideshows and online maps, can be an engaging way for students to demonstrate knowledge and build critical thinking skills. Find instructions, videos, worksheets and rubrics for implementing media-making projects with students. We also have self-paced professional development courses that you can take to learn media production!