The collapse of complex human societies remains poorly understood and
current theories fail to model important features of historical examples of collapse.
Relationships among resources, capital, waste, and production form the basis for an
ecological model of collapse in which production fails to meet maintenance
requirements for existing capital. Societies facing such crises after having depleted
essential resources risk catabolic collapse, a self-reinforcing cycle of contraction
converting most capital to waste. This model allows key features of historical
examples of collapse to be accounted for, and suggests parallels between successional
processes in nonhuman ecosystems and collapse phenomena in human societies.
Chessable uses science-backed learning techniques to help boost your retention by up to 95%. So you can play the opening like a book... the middlegame like a magician... and the endgame like a machine.
SSH port forwarding explained in a clean and visual way. How to use local and remote port forwarding. What sshd settings may need to be adjusted. How to memorize the right flags.
Webfonts were great when most computers only had a handful of good fonts pre-installed. Thanks to font creation and buying by Apple, Microsoft, Google, and other folks, most computers have good - no, great - fonts installed, and they're a great option if you want to not load a separate font.
NFT art is bad for the environment, and bad for artists, but critics and supporters of NFT art are both missing a key fact: it's also just bad art. Whether Beeple or Bugmeyer, it's time the stars of the NFT revolution experienced some real art criticism.
NFTs are emblematic of capitalism’s growing retreat from productive activity — and the wealthy’s desire to extend their dominion into the digital ether. They’re worse than useless.
The Online Writing Lab (OWL) at Purdue University houses writing resources and instructional material, and we provide these as a free service of the Writing Lab at Purdue. Students, members of the community, and users worldwide will find information to assist with many writing projects.
APA Style guidelines encourage writers to fully disclose essential information and allow readers to dispense with minor distractions, such as inconsistencies or omissions in punctuation, capitalization, reference citations, and presentation of statistics.
The diction Install diction package contains a tool called style, which analyses the surface characteristics of the writing style of a document. It prints various readability grades, length of words, sentences and paragraphs. It can further locate sentences with certain characteristics.
This project provides CSS files and a template for using Pandoc Pandoc is a “universal document converter.” It is particularly good at generating HTML and LaTeX\LaTeXLATEX from Markdown.
to generate standalone HTML files. It supports most features Pandoc Markdown has to offer, and some extras. The default look can be tweaked via CSS variables, and it does not need JavaScript, even for side notes.
CTparental is a free and open-source parental control tool used to control computer usage or internet browsing. It comes with a simple and easy-to-use web interface powered by a Lighttpd web server. The idea of CTparental tool comes from other tools such as, iptables, dnsmasq, and inguardian privoxy.
Unlike most introductions to JavaScript, these lessons present an even mix of browser programming and server programming. We give each topic only shallow coverage; if you want to know more, there are many other free tutorials you can dive into once you’ve mastered the basics, some of which are both up-to-date and well designed.
This article presents a model for describing the architecture of software-intensive systems, based on the useof multiple, concurrent views. This use of multiple views allows to address separately the concerns of thevarious ‘stakeholders’ of the architecture: end-user, developers, systems engineers, project managers, etc.,and to handle separately the functional and non functional requirements. Each of the five views is described,together with a notation to capture it. The views are designed using an architecture-centered, scenario-driven, iterative development process.
This site contains code repositories with documentation, and lots of resources. Logging, textFinder, blockingQueue, threadPool, comm, fileSystem, errorHandling, modelling and design patterns.
The 7th edition of the National Intelligence Council’s Global Trends report. Published every four years since 1997, Global Trends assesses the key trends and uncertainties that will shape the strategic environment for the United States during the next two decades.
The theory entails that consciousness is a fundamental quantity, that it is graded, that it is present in infants and animals, and that it should be possible to build conscious artifacts.
Integrated information theory (IIT) attempts to identify the essential properties of consciousness (axioms) and, from there, infers the properties of physical systems that can account for it (postulates). Based on the postulates, it permits in principle to derive, for any particular system of elements in a state, whether it has consciousness, how much, and which particular experience it is having. IIT offers a parsimonious explanation for empirical evidence, makes testable predictions, and permits inferences and extrapolations.
Integrated information theory (IIT) is a theoretical framework for understanding consciousness developed by Dr. Giulio Tononi and collaborators at the Wisconsin Institute for Sleep and Consciousness at the University of Wisconsin–Madison.
Integrated information theory starts from the essential properties of phenomenal experience, from which it derives the requirements for the physical substrate of consciousness. It argues that the physical substrate of consciousness must be a maximum of intrinsic cause–effect power and provides a means to determine, in principle, the quality and quantity of experience. The theory leads to some counterintuitive predictions and can be used to develop new tools for assessing consciousness in non-communicative patients.
Tauri is a framework for building tiny, blazing fast binaries for all major desktop platforms. Developers can integrate any front-end framework that compiles to HTML, JS and CSS for building their user interface.
This page gives brief, visual reference for the most common commands in git. Once you know a bit about how git works, this site may solidify your understanding.
Fonts matter more than we may realize; they’re as important a choice in determining the visual impact and informational flow of a web page as the color scheme or the navigation layout.
This website is a single HTML file. It simply uses the #anchor suffix (from 1992) and the :target CSS selector to show and hide pages/content. This setup is databaseless, javascriptless, and buildshit-free, so you can edit your website with a text editor and upload it somewhere like a normal person.
Here are a few things you should know about complex systems, result of a worldwide collaborative effort from leading experts, practitioners and students in the field.
The documentation system outlined here is a simple, comprehensive and nearly universally-applicable scheme. It is proven in practice across a wide variety of fields and applications.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware. - Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist
Modern JavaScript Tutorial: simple, but detailed explanations with examples and tasks, including: closures, document and events, object oriented programming and more.
Governments are back on their anti-encryption bullshit again. Between the U.S. Senate's "EARN IT" Act, the E.U.'s slew of anti-encryption proposals, and Australia's new anti-encryption law, it's become clear that the authoritarians in office view online privacy as a threat to their existence. Normally, when the governments increase their anti-privacy sabre-rattling, technologists start talking more…
We're very excited to release Pyston v2, a faster and highly compatible implementation of the Python programming language. Version 2 is 20% faster than stock Python 3.8 on our macrobenchmarks. More importantly, it is likely to be faster on your code. Pyston v2 can reduce server costs, reduce user latencies, and improve developer productivity. Pyston…
Freetype, included in the font stack on Unix, is quite complex. There are so many layers to get it to do what it does that it's easy to get lost. From finding the font, to actually rendering it, and everything in between. Like most of the world, I use a rather low screens definition (1366x768 with 96 dpi) and rather old-ish laptop, unlike some f...
The import of the free will theorem is that it is notonly current quantum theory, but the world itself that is non-deterministic, so that no future theory can return us to a clockwork universe.
SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. In this article, we are going to break down each step of the algorithm as simple as we can and work through a real-life example by hand.
For over half a century, worldwide growth in affluence has continuously increased resource use and pollutant emissions far more rapidly than these have been reduced through better technology. The affluent citizens of the world are responsible for most environmental impacts and are central to any future prospect of retreating to safer environmental conditions. We summarise the evidence and present possible solution approaches. Any transition towards sustainability can only be effective if far-reaching lifestyle changes complement technological advancements. However, existing societies, economies and cultures incite consumption expansion and the structural imperative for growth in competitive market economies inhibits necessary societal change. Current environmental impact mitigation neglects over-consumption from affluent citizens as a primary driver. The authors highlight the role of bottom-up movements to overcome structural economic growth imperatives spurring consumption by changing structures and culture towards safe and just systems.