Ditching Databases for Apache Kafka as System of Record
At KOR Financial, using this approach has provided immense flexibility and scalability in our data architecture, and enabled lean and agile operations.
A TLS tunnel is a secure, end-to-end encrypted channel that enables clients to communicate with servers while preventing malicious eavesdropping. You can easily create a TLS tunnel using Pinggy and connect to your localhost servers securely. You do not need to download anything to create a TLS tunnel.
How to Learn Nix, Part 44: More flakes, unfortunately
Okay. In the last post I got sort of an introduction to flakes, and I even wrote a flake, but I didn’t learn how to… do anything with flakes. My flake provided an overlay, but I have no idea how to make my Nixpkgs actually use that overlay.
I have no idea what “my Nixpkgs” even means anymore. My channel? My flake? Everything I’ve learned about Nix has been turned upside down.
But presumably if we keep reading, these blog posts will explain how to actually put them to use.
Data Modeling, RDF, & OWL – Part One: An Introduction To Ontologies
Published in TDAN.com April 2006 [This is the first of three articles discussing the new/old ideas of semantics and ontology and how they affect the way we analyze data. This article introduces the main concepts, and the second article will show an example of converting a data model to the web ontology language, OWL.] Everyone […]
Blaze: A lightweight literate programing preprocessor
⊕I’ve been playing with many literate programming tools since this technique of document-first programming came into my life two years ago.Literate programmi...
An Information Hazard is some true information that could harm people, or other sentient beings, if known. It is tricky to determine policies on information hazards. Some information might genuinely be dangerous, but excessive controls on information has its own perils.
This tag is for discussing the phenomenon of Information Hazards and what to do with them. Not for actual Information Hazards themselves.
An example might be a formula for easily creating cold fusion in your garage, which would be very dangerous. Alternatively, it might be an idea that causes great mental harm to people.
Bostrom's Typology of Information Hazards
Nick Bostrom coined the term information hazard in a 2011 paper [1] for Review of Contemporary Philosophy. He defines it as follows:
Information hazard: A risk that arises from the dissemination or the potential dissemination of (true) information that may cause harm or enable some agent to cause harm.
Bostrom points out that this is in contrast to the generally accepted principle of information freedom and that, while rare, the possibility of information hazards needs to be considered when making information policies. He proceeds to categorize and define a large number of sub-types of information hazards. For example, he defines artificial intelligence hazard as:
Artificial intelligence hazard: There could be computer-related risks in which the threat would derive primarily from the cognitive sophistication of the program rather than the specific properties of any actuators to which the system initially has access.
The following table is reproduced from Bostrom 2011 [1].
TYPOLOGY OF INFORMATION HAZARDSI. By information transfer mode Data hazard Idea hazardAttention hazardTemplate hazardSignaling hazardEvocation hazardII. By effect TYPESUBTYPEADVERSARIAL RISKSCompetiveness hazardEnemy HazardIntellectual property hazardCommitment hazardKnowing-too-much hazardRISKS TO SOCIAL ORGANIZATION AND MARKETSNorm hazardInformation asymmetry
Complexity Theory’s 50-Year Journey to the Limits of Knowledge | Quanta Magazine
How hard is it to prove that problems are hard to solve? Meta-complexity theorists have been asking questions like this for decades. A string of recent results has started to deliver answers.
LongFi USA is building a strong network in your area, why not get paid to help build the world's first decentralized LongFi network for Internet Of Things devices.
The Architect’s Guide to Thinking about Hybrid/Multicloud
Going multicloud should not lead to a ballooning IT budget and inability to hit milestones. It should help you manage costs and accelerate the roadmap.