Neuro-fuzzy - Wikipedia

System Architecture
Bloom’s Taxonomy
by Patricia Armstrong Print Version Cite this guide: Armstrong, P. (2010). Bloom’s Taxonomy. Vanderbilt University Center for Teaching. Retrieved [todaysdate] from https://cft.vanderbilt.edu/guides-sub-pages/blooms-taxonomy/. Background Information | The Original Taxonomy | The Revised Taxonomy | Why Use Bloom’s Taxonomy? | Further Information The above graphic is released under a Creative Commons Attribution license. You’re free to...
The TOGAF Standard, Version 9.2 - Architectural Artifacts
How to develop a taxonomy for your information architecture - Optimal Workshop
We run through how to develop a taxonomy for an information architecture.
Taxon - Wikipedia
Payment Request API
This specification standardizes an API to allow merchants (i.e. web sites selling physical or digital goods) to utilize one or more payment methods with minimal integration. User agents (e.g., browsers) facilitate the payment flow between merchant and user.
Taxonomy 101: Definition, Best Practices, and How It Complements Other IA Work
A taxonomy is a backstage structure that complements the visible navigation. Taxonomies support consistent information retrieval by creating formal metadata rules.
Bloom's Taxonomy - Application Category and Examples
Learn about the application category of Bloom's Taxonomy that was developed by educational theorist Benjamin Bloom in the 1950s.
Folksonomy - Wikipedia
Wing Programming Language for the Cloud
Wing is a cloud-oriented programming language. Most programming languages think about computers as individual machines. In Wing, the cloud is the computer.
Anna’s Archive Containers (AAC): standardizing releases from the world’s largest shadow library
Anna’s Archive has become the largest shadow library in the world, requiring us to standardize our releases.
Ditching Databases for Apache Kafka as System of Record
At KOR Financial, using this approach has provided immense flexibility and scalability in our data architecture, and enabled lean and agile operations.
P2PTV - Wikipedia
Peercasting - Wikipedia
Broadcatching - Wikipedia
List of podcast clients - Wikipedia
Miro (video software) - Wikipedia
TLS Tunnel - Pinggy
A TLS tunnel is a secure, end-to-end encrypted channel that enables clients to communicate with servers while preventing malicious eavesdropping. You can easily create a TLS tunnel using Pinggy and connect to your localhost servers securely. You do not need to download anything to create a TLS tunnel.
Guidance for Cell-based Architecture on AWS
Time Series Is out of This World: Data in the Space Sector
While time series data is critical for space industries, managing that data is not always straightforward.
Datalog - Wikipedia
Datalog
Learn Datalog programming for graph reasoning and incremental logic processing.
How to Learn Nix, Part 44: More flakes, unfortunately
Okay. In the last post I got sort of an introduction to flakes, and I even wrote a flake, but I didn’t learn how to… do anything with flakes. My flake provided an overlay, but I have no idea how to make my Nixpkgs actually use that overlay.
I have no idea what “my Nixpkgs” even means anymore. My channel? My flake? Everything I’ve learned about Nix has been turned upside down.
But presumably if we keep reading, these blog posts will explain how to actually put them to use.
Sina Ahmadi's personal website
Data Modeling, RDF, & OWL – Part One: An Introduction To Ontologies
Published in TDAN.com April 2006 [This is the first of three articles discussing the new/old ideas of semantics and ontology and how they affect the way we analyze data. This article introduces the main concepts, and the second article will show an example of converting a data model to the web ontology language, OWL.] Everyone […]
Blaze: A lightweight literate programing preprocessor
⊕I’ve been playing with many literate programming tools since this technique of document-first programming came into my life two years ago.Literate programmi...
Eve
Eve: Programming designed for humans.
Information Hazards - LessWrong
An Information Hazard is some true information that could harm people, or other sentient beings, if known. It is tricky to determine policies on information hazards. Some information might genuinely be dangerous, but excessive controls on information has its own perils.
This tag is for discussing the phenomenon of Information Hazards and what to do with them. Not for actual Information Hazards themselves.
An example might be a formula for easily creating cold fusion in your garage, which would be very dangerous. Alternatively, it might be an idea that causes great mental harm to people.
Bostrom's Typology of Information Hazards
Nick Bostrom coined the term information hazard in a 2011 paper [1] for Review of Contemporary Philosophy. He defines it as follows:
Information hazard: A risk that arises from the dissemination or the potential dissemination of (true) information that may cause harm or enable some agent to cause harm.
Bostrom points out that this is in contrast to the generally accepted principle of information freedom and that, while rare, the possibility of information hazards needs to be considered when making information policies. He proceeds to categorize and define a large number of sub-types of information hazards. For example, he defines artificial intelligence hazard as:
Artificial intelligence hazard: There could be computer-related risks in which the threat would derive primarily from the cognitive sophistication of the program rather than the specific properties of any actuators to which the system initially has access.
The following table is reproduced from Bostrom 2011 [1].
TYPOLOGY OF INFORMATION HAZARDSI. By information transfer mode Data hazard Idea hazardAttention hazardTemplate hazardSignaling hazardEvocation hazardII. By effect TYPESUBTYPEADVERSARIAL RISKSCompetiveness hazardEnemy HazardIntellectual property hazardCommitment hazardKnowing-too-much hazardRISKS TO SOCIAL ORGANIZATION AND MARKETSNorm hazardInformation asymmetry
REST, Webhooks, GraphQL, gRPC, and others: Choosing the Perfect API Architecture for Your…
Explore different API architectures, such as REST, Webhooks, GraphQL, gRPC, and others, to help you choose the right one for your project.
7 Essential Design Principles for Clean and Effective Code
These lesser-known programming principles simplify code, making it shorter, easier to understand, and more flexible and reusable, like…