Simple-Jekyll-Search
A JavaScript library to add search functionality to any Jekyll blog.
idea from this blog post
Promotion: check out Pomodoro.cc
Demo
Getting started
- Place the following code in a file called
search.json
in the root of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:
---
---
[
{
"title" : "Psych 11 Theories Of Personality",
"category" : "",
"tags" : "",
"url" : "/2020/02/06/psych-11-theories-of-personality/",
"date" : "2020-02-06 00:00:00 +0000"
} ,
{
"title" : "Intro Social Psych",
"category" : "",
"tags" : "",
"url" : "/2019/07/21/intro-social-psych/",
"date" : "2019-07-21 00:00:00 +0000"
} ,
{
"title" : "Professor Reading",
"category" : "",
"tags" : "",
"url" : "/2019/05/16/professor-reading/",
"date" : "2019-05-16 00:00:00 +0000"
} ,
{
"title" : "Intro To Economic Research",
"category" : "",
"tags" : "",
"url" : "/2019/03/11/intro-to-economic-research/",
"date" : "2019-03-11 00:00:00 +0000"
} ,
{
"title" : "Intro Public Health",
"category" : "",
"tags" : "",
"url" : "/class/2019/03/04/intro-public-health/",
"date" : "2019-03-04 00:00:00 +0000"
} ,
{
"title" : "Intro Sociology",
"category" : "",
"tags" : "",
"url" : "/class/2019/02/18/intro-sociology/",
"date" : "2019-02-18 00:00:00 +0000"
} ,
{
"title" : "Random Berk Classes",
"category" : "",
"tags" : "",
"url" : "/2018/02/16/random-berk-classes/",
"date" : "2018-02-16 00:00:00 +0000"
} ,
{
"title" : "Hpts Keynote Pat Helland",
"category" : "",
"tags" : "",
"url" : "/misc/talks/2017/10/02/hpts-keynote-pat-helland/",
"date" : "2017-10-02 00:00:00 +0000"
} ,
{
"title" : "Grad Advanced Operating Systems & Distrib. Systems Notes",
"category" : "",
"tags" : "",
"url" : "/class/2016/09/09/Advanced-Operating-Systems-Notes/",
"date" : "2016-09-09 00:00:00 +0000"
} ,
{
"title" : "MapR Talk",
"category" : "",
"tags" : "",
"url" : "/misc/talks/2016/03/22/mapr-talk-march-22-2016/",
"date" : "2016-03-22 00:00:00 +0000"
} ,
{
"title" : "Build-A-Thing",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/27/build-a-thing/",
"date" : "2016-01-27 00:00:00 +0000"
} ,
{
"title" : "Presentation Tricks",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/26/presentation_tricks/",
"date" : "2016-01-26 00:00:00 +0000"
} ,
{
"title" : "How I read",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/14/the-post-8931/",
"date" : "2016-01-14 00:00:00 +0000"
} ,
{
"title" : "Mobile Health Readings",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/14/the-post-8999/",
"date" : "2016-01-14 00:00:00 +0000"
} ,
{
"title" : "How I read",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/14/the-post-8931/",
"date" : "2016-01-14 00:00:00 +0000"
} ,
{
"title" : "Designing Human Centered Systems Notes",
"category" : "",
"tags" : "",
"url" : "/class/2016/01/14/the-post-2300/",
"date" : "2016-01-14 00:00:00 +0000"
} ,
{
"title" : "Psych Foundations for Designing Impact in HCI Readings",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/13/the-post-8956/",
"date" : "2016-01-13 00:00:00 +0000"
} ,
{
"title" : "Systems Design Notes",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/08/the-post-5518/",
"date" : "2016-01-08 00:00:00 +0000"
} ,
{
"title" : "Fun "Facts"",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/07/fun-facts/",
"date" : "2016-01-07 00:00:00 +0000"
} ,
{
"title" : "Tools",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/07/Cool-Tools/",
"date" : "2016-01-07 00:00:00 +0000"
} ,
{
"title" : "Interesting Links",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/01/InterestingLinks/",
"date" : "2016-01-01 00:00:00 +0000"
} ,
{
"title" : "15110 Notes/Explanations",
"category" : "",
"tags" : "",
"url" : "/misc/2015/12/26/15110Links/",
"date" : "2015-12-26 00:00:00 +0000"
} ,
{
"title" : "Reading List",
"category" : "",
"tags" : "",
"url" : "/books/2015/12/25/ReadingList/",
"date" : "2015-12-25 00:00:00 +0000"
} ,
{
"title" : "Books To Acquire",
"category" : "",
"tags" : "",
"url" : "/books/2015/12/25/BooksToGet/",
"date" : "2015-12-25 00:00:00 +0000"
} ,
{
"title" : "Intro to Disk Drive Modeling",
"category" : "",
"tags" : "",
"url" : "/storage%20systems/2015/12/01/IntroToDiskDriveModeling/",
"date" : "2015-12-01 00:00:00 +0000"
} ,
{
"title" : "Evolution of Google FS Talk",
"category" : "",
"tags" : "",
"url" : "/talks/storage%20systems/2015/11/23/GFS-Talk/",
"date" : "2015-11-23 00:00:00 +0000"
} ,
{
"title" : "Types and Programming Language Book Notes",
"category" : "",
"tags" : "",
"url" : "/books/2015/11/22/TypesAndProgLanguages/",
"date" : "2015-11-22 00:00:00 +0000"
} ,
{
"title" : "Storage Systems Readings",
"category" : "",
"tags" : "",
"url" : "/storage%20systems/2015/09/07/StorageSystems/",
"date" : "2015-09-07 00:00:00 +0000"
} ,
{
"title" : "Init",
"category" : "",
"tags" : "",
"url" : "/2015/09/06/Init/",
"date" : "2015-09-06 00:00:00 +0000"
}
]
- configure the library ( options )
Enabling full-text search
Note that the index generated in search.json
does not include the posts’ content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts’ content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add
"content" : ""
to search.json
after the "date"
line to which you must add a comma (,
).
Install with bower
bower install simple-jekyll-search
Setup
You need to place the following code within the layout where you want the search to appear.
For example in _layouts/default.html:
<!-- Html Elements for Search -->
<div id="search-container">
<input type="text" id="search-input" placeholder="search...">
<ul id="results-container"></ul>
</div>
<!-- Script pointing to jekyll-search.js -->
<script src="/bower_components/simple-jekyll-search/dest/jekyll-search.js" type="text/javascript"></script>
Options
Customize SimpleJekyllSearch by passing in your configuration options:
SimpleJekyllSearch({
searchInput: document.getElementById('search-input'),
resultsContainer: document.getElementById('results-container'),
json: '/search.json',
})
The above initialization needs to occur after the inclusion of jekyll-search.js
.
searchInput (Element) [required]
The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.
resultsContainer (Element) [required]
The container element in which the search results should be rendered in. Typically an <ul>
.
json (String|JSON) [required]
You can either pass in an URL to the search.json
file, or the results in form of JSON directly, to save one round trip to get the data.
searchResultTemplate
The template of a single rendered search result.
The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.
E.g.
The template
<li><a href="{url}">{title}</a></li>
will render to the following
<li><a href="/jekyll/update/2014/11/01/welcome-to-jekyll.html">Welcome to Jekyll!</a></li>
If the search.json
contains this data
[
{
"title" : "Welcome to Jekyll!",
"category" : "",
"tags" : "",
"url" : "/jekyll/update/2014/11/01/welcome-to-jekyll.html",
"date" : "2014-11-01 21:07:22 +0100"
}
]
noResultsText
The HTML that will be shown if the query didn’t match anything.
limit
You can limit the number of posts rendered on the page.
fuzzy
Enable fuzzy search to allow less restrictive matching.
exclude
Pass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).
Enable full content search of posts and pages
- Replace ‘search.json’ with the following code:
---
layout: null
---
[
{
"title" : "Psych 11 Theories Of Personality",
"category" : "",
"tags" : "",
"url" : "/2020/02/06/psych-11-theories-of-personality/",
"date" : "2020-02-06 00:00:00 +0000",
"content" : "Chapter 3 : AdlerBook: Overview of Individual Psychology individual psychology presents an optimistic view of people while resting heavily on the notion of social interest, that is, a feeling of oneness with all humankind Freud reduced all motivation to sex and aggression Adler saw people as being motivated mostly by social influences and by their striving for superiority or success Freud assumed that people have little or no choice in shaping their personality Adler believed that people are largely respon- sible for who they are Freud’s assumption that present behavior is caused by past experiences was directly opposed to Adler’s notion that present behavior is shaped by people’s view of the future in contrast to Freud, who placed very heavy emphasis on unconscious components of behavior, Adler believed that psychologically healthy people are usually aware of what they are doing and why they are doing it Biography of Alfred Adler Competed with his brother even when famous Became a physician because of his experiences with death not great friends with Freud; also said that physical deficiencies—not sex— formed the foundation for human motivation (diff from Freud) Introduction to Adlerian Theory The one dynamic force behind people’s behavior is the striving for success or superiority. People’s subjective perceptions shape their behavior and personality. Personality is unified and self-consistent. The value of all human activity must be seen from the viewpoint of social interest. The self-consistent personality structure develops into a person’s style of life. Style of life is molded by people’s creative power. Striving for Success or Superiority The Final Goal The Striving Force as Compensation Striving for Personal Superiority Striving for Success Subjective Perceptions Fictionalism Physical Inferiorities Unity and Self-Consistency of Personality Organ Dialect Conscious and Unconscious Social Interest Origins of Social Interest Importance of Social Interest Style of Life Creative Power Abnormal Development General Description External Factors in Maladjustment - Exaggerated Physical Deficiencies Pampered Style of Life Neglected Style of Life Safeguarding Tendencies - Excuses Aggression Withdrawal Masculine Protest - Origins of the Masculine Protest Adler, Freud, and the Masculine Protest Applications of Individual Psychology - Family Constellation Early Recollections Dreams Psychotherapy Related Research Mini Lecture: Human beings propelled by the Striving Force for Superiority 1) Push to overcome inferiority 2) Pull toward becoming a whole and complete person Pull towards whole makes you feel inferior but then push makes you work harder Adler Personal Life Physical weakness + poor health Felt less capable than brother, but driven as a result Trying to strive for improvement Unhealthy Superiority: Personal Superiority seeks validation by insisting others notice his accomplishments doesn’t care who he hurts to get that validation looks for compliments and admiration tries to bring the attention back to himself Healthy Superiority (Success) measuring accomplishments according to their own feelings of satisfaction and growth innate but must be developed; At birth a potential not an actuality Children early as 4/5 start looking for final goal to lead them to superiority. - Final goal comes about as result of creative power Creativity works in conjunction with heredity (brains/skills/talents) + environment (opportunities/encouragement/feedback) to help create final goal Final goal shapes our behaviors (result of trying to reach this final goal) and hence creates personality Final Goal two possibilities for Final Goal: striving for Personal Superiority (which is unhealthy) or striving for Success (which is healthy) 4/5 yo’s with Preliminary Goals “Fictions”: ideas that have no objective reality to them Preliminary goals guide a person’s life regardless of their ability to provide what the person thinks these Goals will provide. They will build on these further (“style of life”).Law of the Low Doorway Your Goals toward Superiority are ineffective, but you can’t see past your rigidity and you continue to use them to achieve Superiority, you must be able to adjust your Goals in response to the feedback you’re getting - you need to learn from your experiencesHealthy Superiority absolute support towards a child’s growth AND a model for a constructive response to disappointment and “failure” Contrast that to an environment in which a child striving for Superiority encounters jeering and put-downs. Such a child may actually work extra hard to prove his abilities and reach success. Unfortunately, he is angry and resentful for the lack of encouragement in his life, and he will replicate that model of human interaction as he moves toward Personal Superiority.Chapter 4TBDChapter 2 : FreudMini Lecture Freud’s theory focuses on intrapsychic development - looking at how we carry issues from the past and how these issues affect our behaviors today as adults. Freud’s theory = Psychoanalytic theory != Psychodynamic = June Freud: the human mind has 3 levels of awareness: the Conscious - thoughts and feelings we can articulate the Preconscious - holding area for Unconscious thoughts that seek expression at the Conscious the Unconscious hidden sexual and aggressive impulses - particularly the kind of feelings and thoughts that we don’t want to acknowledge in our lives Freud aligned with Darwin: we are genetically designed to seek survival 2 Unconscious motivations pushes to growth or survival Motivation 1: Eros - libido; procreate/survive Motivation 2: Thanatos - life destroying seek sex (survival). “Kill off competitors” Freudian theory: in order to push an anxiety-producing thought back into the Unconscious, the average person will say and/or do things so frantically that his (or her) behavior can be inappropriate or self-destructive cathected: spending a lot of your life-giving energy pushing these feelings back down into the Unconscious The more your libido is cathected, the less life-giving energy you have available to move forward in your lifeBook Overview Overview of Psychoanalytic Theory Sex and Aggression are really popular Freud’s proselytizers were very good at spreading it Freud is a really good speaker Biography of Sigmund Freud Levels of Mental Life Unconscious Preconscious Conscious Provinces of the Mind The Id The Ego The Superego Dynamics of Personality Drives Sex Aggression Anxiety Defense Mechanisms First talked about it in 1926. Normal but can lead to compulsive/neurotic behavior. Principal Defense Mechanisms: Repression Reaction Formation Displacement Fixation Regression Projection Introjection Sublimation Stages of Development Infantile Period Oral Phase Anal Phase Phallic Phase Female Oedipus Complex Male Oedipus Complex Latency Period Genital Period Maturity Applications of Psychoanalytic Theory Freud’s Early Therapeutic Technique Freud’s Later Therapeutic Technique Dream Analysis Freudian Slips Related Research Unconscious Mental Processing Pleasure and the Id, Inhibition and the Ego Repression, Inhibition, and Defense Mechanisms Research on Dreams Critique of Freud Did Freud Understand Women, Gender, and Sexuality? Was Freud a Scientist? Concept of Humanity Key Terms and ConceptsSigmund Freud people searching for a magic drug to lessen pain, he found cocaine tied to psychoanalysisChapter 1 word “personality” originated from the Latin persona personality: a pattern of relatively permanent traits and unique characteristics that give both consistency and individuality to a person’s behavior Traits: contribute to individual differences in behavior, consistency of behavior over time, and stability of behavior across situations Characteristics: unique qualities of an individual that include such attributes as temperament, physique, and intelligence taxonomy : a classification of things according to their natural relationshipsTheoretical Perspectives on Personality: Psychodynamic Theories importance of early childhood experience and on relationships with parents as guiding forces that shape personality development traditionally used dream inter- pretation to uncover the unconscious thoughts, feelings, and impulses as a main form of treatment of neurosis and mental illness. After Freud, these theorists moved away from the importance of sexuality and more toward social and cultural forces. Humanistic-Existential Theories people strive toward meaning, growth, well-being, happi- ness, and psychological health Existential theorists assume that not only are we driven by a search for meaning, but also that negative experiences such as failure, awareness of death, death of a loved one, and anxiety, are part of the human condition and can foster psychological growth Dispositional Theories unique and long-term tendencies to behave in particular ways are the essence of our personality five main trait dimensions in human personality Biological-Evolutionary Theories Behavior, thought, feelings, and personality are influenced by differences in basic genetic, epigenetic, and neurological systems between individuals. Learning-(Social) Cognitive Theories All behaviors are learned through association and/or its consequences (whether it is reinforced or punished). To shape desired behavior we have to understand and then establish the conditions that bring about those particular behaviors. psychology of science :look at personal traits of scientists. The psychology of science studies both science and the behavior of scientists;Dimensions for a Concept of Humanity:Personality theories differ on basic issues concerning the nature of humanity determinism versus free choice pessimism versus optimism causality versus teleology causality holds that behavior is a function of past experiences, whereas teleology is an explanation of behavior in terms of future goals or purposes conscious versus unconscious determinants of behavior biological versus social influences on per- sonality uniqueness versus similaritiesreliability: of a measuring instrument is the extent to which it yields consistent results.Validity : the degree to which an instrument measures what it is supposed to measure. Personality psychologists are concerned with two types of validity: construct validity - Construct validity is the extent to which an instrument measures some hypothetical construct Constructs such as extraversion, aggressiveness, intelligence, and emotional stability have no physi- cal existence; they are hypothetical constructs that should relate to observable behavior. Three important types of construct validity: - convergent validity - A measuring instrument has convergent construct validity to the extent that scores on that instrument correlate highly (converge) with scores on a variety of valid measures of that same construct divergent validity - An inventory has divergent construct validity if it has low or insignificant correlations with other inventories that do not measure that construct For example, an inventory purporting to measure extraversion should not be highly correlated with social desirability, emotional stability, honesty, or self-esteem. discriminant validity - an inventory has discriminant validity if it discriminates between two groups of people known to be different. For example, a personality inventory measuring extraversion should yield higher scores for people known to be extraverted than for people known to be introverted predictive validity - extent that a test predicts some future behavior Quotes / test probably sourced from https://www.amazon.com/Duane-P-Schultz-Theories-Personality/dp/B00HTK3WWM"
} ,
{
"title" : "Intro Social Psych",
"category" : "",
"tags" : "",
"url" : "/2019/07/21/intro-social-psych/",
"date" : "2019-07-21 00:00:00 +0000",
"content" : "Module 2 - Behavior, Attitudes, Culture, Attraction, and IntimacyChapter 5: Attitudes Behavior + Persuasion How the Obama Campaign Effectively Used Persuasion to Defeat John McCain Online Cognitive + Emotional Persuasive Appeals attitude inoculation: technique in which he warned his supporters that an ad attacking him would be coming, at the same time reminding them of ways to counterargue the ad. ABCs of social psychology—affect, behavior, and cognition Theories: self-perception theory and cognitive dissonance theory5.1Objectives1. Define the concept of attitude and explain why it is of such interest to social psychologists.2. Review the variables that determine attitude strength.3. Outline the factors affect the strength of the attitude-behavior relationship. attitude: relatively enduring evaluation of something Some attitudes are more genetically predispositioned attitudes via cognitive, affective, behavioral components. Shaped by inherited, experiences, media, friends and can be shared or individual. attitude strength: importance of attitude (via how quickly comes to mind) attitudes can be increased via reinforcement and are even better when the ABC (affect/behavior/cognition) line up attitude consistency: attitudes tend to guide behavior The theory of planned behavior (Ajzen, 1991; Fishbein & Ajzen, 1975): important variables that affected the attitude-behavior relationship: some factors summarized: - When attitudes are strong, rather than weak - When we have a strong intention to perform the behavior - When the attitude and the behavior both occur in similar social situations When the same components of the attitude (either affect or cognition) are accessible when the attitude is assessed and when the behavior is performed When the attitudes are measured at a specific, rather than a general, level For low self-monitors (rather than for high self-monitors) Usually strong attitudes => strong intentions Attitude-Behavior Consistency: Important the affective vs the cognitive factor more accessible: eg Cognitive vs Affective factors for liking a strawberry jam brand Self-monitoring: individual differences in the tendency to attend to social cues and to adjust one’s behavior to one’s social environment5.2Summary Takeaways Advertising is effective in changing attitudes, and principles of social psychology can help us understandwhen and how advertising works. Social psychologists study which communicators can deliver the most effective messages to which types ofmessage recipients. Communicators are more effective when they help their recipients feel good about themselves. Attractive,similar, trustworthy, and expert communicators are examples of effective communicators. Attitude change that occurs over time, particularly when we no longer discount the impact of a lowcredibility communicator, is known as the sleeper effect. The messages that we deliver may be processed either spontaneously or thoughtfully. When we areprocessing messages only spontaneously, our feelings are more likely to be important, but when we processthe message thoughtfully, cognition prevails. Both thoughtful and spontaneous messages can be effective, in different situations and for different people. One approach to improving an individual’s ability to resist persuasion is to help the person create a strongattitude. Procedures such as forewarning and inoculation can help increase attitude strength and thus reducesubsequent persuasion. Taken together, the evidence for the effectiveness of subliminal advertising is weak, and its effects may belimited to only some people and only some conditions.Module 1 - Intro, Self + BeliefsTextbook: https://open.lib.umn.edu/socialpsychology/"
} ,
{
"title" : "Professor Reading",
"category" : "",
"tags" : "",
"url" : "/2019/05/16/professor-reading/",
"date" : "2019-05-16 00:00:00 +0000",
"content" : "http://people.eecs.berkeley.edu/~bjoern/ https://arxiv.org/abs/1708.03786 Refazer Pt 2: Feedback design system guidelines https://link.springer.com/chapter/10.1007/11678816_22 Design space of conversation agents http://up.csail.mit.edu/other-pubs/soylent.pdf In the loop word processing https://www.researchgate.net/publication/332745318_Heimdall_A_Remotely_Controlled_Inspection_Workbench_For_Debugging_Microcontroller_Projects Remote debug + smart board http://vis.berkeley.edu/papers/eden/ Multitouch to make 3d video sets for pixar videos; Found fingers imprecise, gestures are nice, and it’s easier to sculpt https://escholarship.org/uc/item/55m5773x tl;dr async messaging api/proxy using a javascript library enabled by an embedded device and a mobile device serving as a message proxy to the internet https://people.eecs.berkeley.edu/~bjoern/papers/heimerl-umati-chi2012.pdf snacks for expert community work @ cs grading http://vis.berkeley.edu/papers/protonPlusPlus/protonPlusPlus-UIST2012.pdf touch events recognized via regex language https://dl.acm.org/citation.cfm?id=2984552 in person comments tend to be easier nice because you get sync’d comments to the video and mostly the relevant parts of the video; also accountability for changes/comments https://bid.berkeley.edu/files/papers/dow-shepherd-cscw2012.pdf Having crowd workers assess themselves and have a rubric to do so leads to better work https://dl.acm.org/citation.cfm?id=3053187 How to design teacher hints for programming feedback "
} ,
{
"title" : "Intro To Economic Research",
"category" : "",
"tags" : "",
"url" : "/2019/03/11/intro-to-economic-research/",
"date" : "2019-03-11 00:00:00 +0000",
"content" : "When I forget to bring my notebook to class and have to take notes on laptop :(March 11 2019Replication Exercise (GSI Stephanie Bonds)Intro We’re learning how to do regressions Replicate: The Colonial Origins of Comparative Development Fact: Differences in income/paita and other measures of economic performance across countries Research Q: Effect of institions on economic performance? Hypothe: Better instititions achieve higher levels of income/capitaPremises Diffrerent colonization policies had diff effects on the development of institioutions Extractive states (eg Belgian Congo) transferred resources colony -> host Neo Europes: replicate European institions /w property rights Feasibility of particular seattlementinfluenced colonization strategy (eg more disease prevalence more likely to become “extractive state” Large body of literature that settler mortality rates were key determinant of European settlement. (eg Pilgrims -> US instead Guyana b/c more mortality in latter) Sources of mortality (eg yellow fever and malaria) differentiatly affected European settlers Natives had higher resistance Theory (potential): setler mortality -> settlements -> early institutions -> current institions -> current performanceData Current econ performanc/capita = 1995 Current/past instititional qualitylook at slides because i fell asleep because literally reading the paper on a projecter"
} ,
{
"title" : "Intro Public Health",
"category" : "",
"tags" : "",
"url" : "/class/2019/03/04/intro-public-health/",
"date" : "2019-03-04 00:00:00 +0000",
"content" : "Week 14: Intentional and Unintentional InjuriesGoalsDefine Unintentional injuries are those that occur without a person intending to cause harm Intentional injuries are the result of a deliberate use of violenceWeek 13: Environmental Health including Climate Change waste is badWeek 12: Healthcare Delivery, Insurance and Health PolicyBy the end of this module, you should be able to Describe the eligibility requirements in general terms, and compare the coverage, of three long-standing public health insurance systems: Medicaid (Medi-Cal, in California); Medicare; and CHIP. Discuss briefly the history of healthcare in the United States and how it is evolving. Describe the basic characteristics of Healthy San Francisco program and how it differs from health insurance. Contrast different solutions to provision of healthcare based on insurance system (e.g., mixed public-private system in the U.S., national system in U.K., single-payer system in Canada, and regulated private system in Germany) Characterize the spectrum of healthcare delivery, including public health practice; medical practice; long-term care or practice; and end-of-life care or practice. Give examples of healthcare providers and distinguish their roles, including whether they can practice independently (as medical doctors and oestopaths can, for example) or under the supervision of a provider with higher training; whether they practice in allopathic medicine or alternative/complementary medicine; and generally what they do, as a doctor, nurse, physician’s assistant, allied health or public health professional. Describe different types of healthcare facilities and their functions (inpatient, outpatient, acute care, long-term care). Identify some major concerns with the health care system in the United States. Discuss the various ways of reimbursing health care providers, including the concept of insurance. Explain what a health insurance policy is, including terms like deductible, co-insurance, copayment (copay), fixed indemnity, exclusion, and pre-existing condition. Define managed care (e.g, HMO or PPO) and discuss some of the advantages and disadvantages of managed care. Define the terms health maintenance organization (HMO), preferred provider organization (PPO), and point-of-service option. Discuss what the Affordable Care Act, or ACA (“Obamacare”) does and how it works. Describe Covered California, the healthcare marketplace or exchange set up under the ACA in California. Describe the legal challenges to the law and the Supreme Court decision that upheld the ACA (in basic terms), as well as recent legal challenges that still may reshape the ACA. Compare the ACA with the proposed Republican replacement legislation – while the Republican bills in 2017 failed in the Senate and therefore did not become law, there are new promises from the Republican administration to replace the ACA, so some of these same ideas may be revived. Identify ways that the implementation of the ACA is changing under the Trump Administration, even while the ACA remains in effect.Part 1 : 12.3 Lesson: Healthcare Delivery Safety Net Providers serve un/under insured / public health insurance Healthy SF: SF’s Health Access Program for uninsured SF Residents. socialized medicine: healthcare system that provides universal access (healthcare for everyone) and whose payment system is directly or indirectly controlled by the government. US fairly unique in it’s healthcare “system”. UK (national healthcare), Canada (single payer insurance), Germany/Switzerland/Netherlands ( privately run health insurance + providers ) ACA 2010: Extends coverage, curbs health insurance abuse, initiate QoC improvements Lack of insurance (2012 - 47m+ uninsured) Medicare: All citizens/legal residences > 65yr, who worked enough hours to be eligible; includes care, hospitalizations, prescription drugs. Some disabled condition coverage. Federal Government Medicaid (California: Medi-Cal): Low income, some disabled conditions; medical care/hospitalization/some dental/some inhome. Part fed gov, admin by states. CHIP (California: Healthy Families): Health insurance for children in familiies with income too high to qualify for Medicaid/MediCal but still under a certain amount. State Admin.Week 11: Alcohol, Tobacco and Other DrugsGoalsBy the end of this module, students will be able to Identify personal and community consequences of alcohol and other drug abuse. Describe the trends of alcohol and other drug use by high school students, and by the US population as as whole. Drug use is increasing Highest among people in their late teens and twenties Define drug use, misuse, abuse and dependence. List and discuss risk factors for the abuse of alcohol and other drugs. Explain why alcohol is considered the number one drug abuse problem in the United States (even though tobacco causes more deaths, in the long run). Describe the health risks of tobacco. Define the terms over-the-counter drugs, prescription drugs, controlled substances, and illicit (illegal) drugs, and provide examples. List and explain four elements of drug abuse prevention and control: education, treatment, public policy and enforcement. Give an example of primary, secondary, and tertiary prevention activities in drug abuse prevention and control programs. Summarize the federal government’s drug abuse control efforts (at least, as they are summarized in ICPH). List and describe an effective community-based drug abuse prevention program and an effective school-based drug abuse prevention program. Discuss examples of substance abuse prevention and treatment programs, including workplace prevention programs, voluntary health agencies and self-help support groups. Discuss abstinence and harm reduction as two different frameworks, and some of the different approaches to the treatment of addiction. Discuss some negative health effects of the “war on drugs” Discuss the drivers of the opioid epidemic and its effectsDrug Abuse SpecificsSix Major Groups of Abused Drugs Anabolic Steroids Club Drugs/Designer Drugs Dissociative (Detachment) Drugs Illicit Opiates/Narcotics Illicit Stimulants Psychedelic (Mind-Altering) DrugsAnabolic Steroids (roids, juice, gym candy, pumpers)Synthetic versions of the hormone testosterone.Effects : No intoxication, easier to grow muscleAdministration: Injected, swallowed, Applied to skinDangers: Aggression, Cancer, Heart disease, Stunted growth; Males: prostate cancer, reduced sperm production, shrunken testicles, breast enlargement; Females: menstrual irregularities, development of beard and other masculine characteristicsClub Drugs/Designer DrugsDrugs in this category tend to be used by young adults at bars, concerts, nightclubs, and parties.This class is especially dangerous as some are used in kidnappings, sexually assault, and rape.EffectsIncreased awareness of senses, Mild hallucinations, Increased tactile sensitivity, Empathic feelingsAdministration MethodsSwallowed, Snorted, InjectedDangersAnxiety, Chills, Sweating, Muscle cramping, Sleep disturbances, Depression, Impaired memory, Fatal overdosesDissociative (Detachment) DrugsThese are drugs that give a person the feeling of being separate from their body and environment.EffectsAnalgesiaNumbnessHallucinationsAdministration MethodsSwallowedSmokedInjectedDangersAnxietyTremorsMemory lossNauseaPsychosisAggressionViolenceSlurred SpeechIllicit OpiatesOpiates are a group of HIGHLY addictive drugs from the poppy plant.They are used as pain relievers, anesthetics, and sedatives.Illegal use of prescription opiates are considered illicit opiates.HeroinEffectsEuphoriaDrowsinessAdministration MethodsInjectedSmokedSnortedSwallowedDangersImpaired coordinationSedationSlowed or arrested breathingBloodborne diseases such as hepatitis & HIVAddictionFatal overdosesIllicit StimulantsThese are substances that excite the activity of the brain. eg. Cocaine, Amphetamines, MethamphetaminesEffectsHyperactivity/talkativenessIncreased energy & alertnessReduced appetiteAdministration MethodsSnorted (cocaine only)SmokedInjectedSwallowedDangersAnxietyIrritabilitySuspiciousnessInsomniaIncreased heart beatHeart attackFatal overdosePsychedelicsThese drugs alter your way of thinking and how you see the world. They can be broken up into: Cannabinoids (marijuana, hashish) Hallucinogens (LSD)MarijuanaEffectsEuphoriaRelaxationDistorted Sensory PerceptionAdministration MethodsSmokedSwallowedDangersImpaired Learning & MemoryPanic AttacksLung InfectionsLower Testosterone Levels and Sperm NumbersIn pregnant women, it affects the fetus and results in developmental difficulties in the childHashishActive Ingredient: plant resins from Cannabis Plant(Boom, Gangster, Hash, Hash Oil, Hemp)EffectsEuphoriaRelaxationSlowed reaction timeDistorted sensory perceptionImpaired balance and coordinationAdministration MethodsSmokedSwallowedDangersIncreased heart rate and appetiteImpaired learning & memoryAnxietyPanic attacksPsychosis/coughFrequent respiratory infectionsLSD - Lysergic Acid Diethylamide(Acid, Blotter, Cubes, Microdot, Yellow Sunshine, Blue Heaven)EffectsAltered states of perception and feelingHallucinationsAdministration MethodsSwallowedAbsorbed through mouth tissueDangersImpulsive behaviorFlashbacksHallucinationsChronic mental disordersEmerging TrendsBath SaltsThe term “bath salts” refers to an emerging family of drugs containing one or more synthetic chemicals similar to an amphetamine-like stimulant found naturally in the Khat plant. Remember, these are NOT for human consumption.Krokodil (desomorphine)This flesh eating opioid is similar to heroin but has gained attention due to the major damage it causes to veins and soft tissues in the body.Week 10: Health of Racial/Ethnic Populations, Cultural Competency & Cultural HumilityWeek 9: Older AdultsWeek 8: Midterm and Obesity debateDefine healthy: [18.5, 24.9] BMI overweight: [25,29.9] BMI obese: [30,infinity) BMI Body Mass Index: ratio of height to weightDiscuss Obesity Debate the scientific disagreement about the health impacts of increased size Good nutrition = 5 servings fruit/veg /day. Lean proteins, more whole grains, water Physical activity benefits any activity that Enhances your overall fitness and well-being. E.g. walking to the store for pt. of milk or gardening Benefits:Reducing stress, improving digestion, Increasing blood flow, Lowering blood pressure, improve flexibility, heart health, more. CDC Recommends >= 1 hr/day, 30m/day adults Public health strategies for increasing access to good nutrition and physical activity through community level changes eg Ban fast food, penalize parents of obese kids, tax soda Obesity Bad View: American Weight Trends On average increasing Majority of Americans are overweight/obese Health Inequities: More likely obese: Women -> Men; African Am, Latino, Native Ams, Pac. Islanders -> Whites/Asians; Lower Income -> Higher Income (except African Am/Latino where higher income -> more risk of obesity). Overweight/Obese Increased risk: Coronary heart disease, Type 2 diabetes, Cancers (endometrial, breast, and colon), Hypertension (high blood pressure), Dyslipidemia (for example, high total cholesterol or high levels of triglycerides), stroke, … and moreObesity = Fatphobia and distracting from real issues View Dangers of increased size exaggerated Estimates of negative health impacts flawed. Also possible to be fat + fit/ thin + unfit Suggest widespread cultural bias against fat people Arguments they make: Same period The average weight increased deaths from heart disease stroke decreased life expectancy grown CDC Study: Overweight category longer life expectancy of the normal rate overweight: Greater risk for diabetes + high blood pressure but lower risk osteoporosis/other conditions By stigmatizing Thought we make fat peoples healthcare worse e.g. postponing visits to doctors Health At Every Size alternative paradigm “Except at statistical extremes, body mass index (BMI) - or amount of body fat - only weakly predicts longevity. Most epidemiological studies find that people who are overweight or moderately obese live at least >= long as normal weight people Analysis of the National Health and Nutrition Examination Surveys I, II, and III, … determinedthat greatest longevity was in the overweight category Americans’ Changing Lives study: “when socioeconomic and other risk factors are controlled for, obesity is not a significant risk factor for mortality; and… for those 55 or older, both overweight and obesity confer a significant decreased risk of mortality.” Obesity Paradox: Obesity associated with longer survival in many diseases Assumption: Fat is significantly morbidity risk (causation less established) Weight cycling (lose,gain pretty common): Results in increased inflammation + lots of other things Type 2 Diabetes: Increasing evidence of poverty and marginalization more strongly associated type 2 diabeters, than conventional factors such as weight diet or activity Assumption: Weight loss prolong life. Evidence: Most observational studies suggest weight loss (in obese indiv.) increases risk of premature death Assumption: Anyone can lose weight and keep it off. Evidence: Long-term follow-up studies document majority of individuals regain most weight even if maintain diet/exercise program Assumption: Weight loss is a good goal. But: weight cycling risk to health, loss of bone mass, increased psych stress/cortisol, stigma/discrimination Assumption: Only way to improve health is to lose weight. But: so few people lose + keep off weight. Unknown if obese Individual weight loss reduces disease risk to same level As those who never obese. Most health indicators improved by changing health behaviors Danger of Focus on overweight/obesity: Overtesting healthy overweight, Undertesting unhealthy thin. Negative body image is a health risk. Health At Every Size: Encourages body Acceptance as opposed to weight-loss/Maintenance Reliance on internal processes such as hunger vs diets Supports active embodiments (joyful movement) vs structured exercise Results: Improved eating habits, more frequent/sustainable physical activity, decreased depression, increased metabolic health Obesity Contributors Sleep debt, Changes in breast feeding, Average maternal age (older mom correlates more obese child), Epigenetics (environment in utero affects genes), Heating/cooling (body spends less energy), Certain Pharmaceuticals, Cyclical dieting, Discrimination.7 Health status by Age – of adolescents, young adults, and adultsDefine risk factor: rait, behavior or condition associated with a higher probability of disease or injury protective factor: trait, behavior or condition associated with a lower probability of disease or injury/ faster recovery rate Adolescence: generally described as puberty to maturityGoals Explain why it is important for community health workers to be aware of the different health concerns of the various age groups in the United States.Many health beliefs, attitudes, and behaviors are adopted and consolidated during adolescence. Define by age the groups of adolescents, young adults, and adults.Adolescents and young adults - ages 10-24 yearsAdults - ages 25-64 yearsAges 15-64 considered most productive years Briefly describe key demographic characteristics of adolescents and young adults (2010) 10-24 yr ~ 25% US Pop Increasingly diverse: (2012) 55% non-hispanic white -> 44% (2050) < 18 single parent home ⬆️ Explain what the Youth Risk Behavior Surveillance System (YRBSS) and the Behavioral Risk Factor Surveillance System (BRFSS) are and what type of data they generate. Provide a brief behavioral risk profile for adolescents, young adults (including those attending college), and adults. High Schoolers: - unintentional injuries: seat belt/bicycle helmet/motorcycle helmet use, Drinking+Driving/riding with drunk driver violence: weapons, dating violence, physical fights, forced sexual activity, bullying, suicide ideation/attempts tobacco: Widespread @ highschoolers: majority dependent before 18. smokeless tobacco alcohol: experimentation @ [15-24] drugs: 20% @ marijuana, 20% unprescribed drugs; others (cocaine…) sex: Unintended Pregnancy + STD ~50% hs’ers; Improving rates @ contraceptives Physical activity/sedentary: lack concerning. Males more likely > females; Screen time risk factor; physical activity linked to positive outcomes Overweight: ⬆️ concern for age group. Risk factor @ chronic disease. rise in rate (steady @ 2011-; 17% overweight/obese). Dieting through unhealthy means + eating disorders. College students: - unintentional injuries, violence, tobacco, alcohol/drugs, unint. pregnancies/STDs vs peers: ⬆️ alcohol abuse, ⬇️violence protective factors e.g. school connectedness, community service main issue: alcohol. Adults: - 25 to 64: leading cause cancer: - men: prostate, lung, and colorectal cancer - women: breast, lung, and colorectal cancer - 85% lung cancer ~ smoking Also Cardiovascular diseases leading cause of death Outline the health profiles for the various age groups, listing the major causes of mortality, morbidity, and risk factors for each group (for example, list the 3 leading causes of death, the most common causes of illness or injury, and at least 4 leading risk factors for each group). Most health threats are behavior not disease 3/4 mortality: injuries (motor vehicle crashes, homicide, suicide); Health disparities by race/gender/social class Adolescents/Young Adults highest risk @ STDs (~50%) Give examples of community health strategies for improving the health status of adolescents, young adults, and adults, including the use of health screenings and health promotion. College students @ Alcohol: Change the social norms about alcohol Community-wide measures Sustained over time Foster institutional changes Involve youth and young adults in finding and creating solutions to problematic alcohol use Secondary Prevention: Screening high risk populations. eg hypertension, diabetes, cholesterol Primary, secondary, and tertiary prevention programs a. Exercise and nutrition programs (primary prevention) b. Self or clinical screenings (secondary prevention) c. Medication compliance (tertiary prevention) @seattle washington health care authority primary care: - zumba, food, doctor, help /w healthcare system, help /w languages Discuss tobacco control and prevention, including examples of strategies used to reduce tobacco use, as a means of improving adult health. While the diseases associated with tobacco usually start in adulthood, tobacco use usually starts in adolescence, so many prevention strategies address adolescents and young adults, to preserve adult health. Widespread @ highschoolers: majority dependent before 18. smokeless tobacco. Campaigns /w an effect - Lawsuits (which have attained limits on tobacco marketing practices and funded prevention efforts with money taken from the tobacco industry) Taxes (by changing the cost) Limits on sales to minors, and limits on where tobacco can be sold Smoking bans in public spaces (eg ccsf is tobacco free) Media campaigns: - The Truth Campaign: highlighted manipulation of youths by companies Tobacco use: - varies by age: younger is less now low income, less education more likely to use highest in Native American Discuss e-cigarette usage and vaping of nicotine products as an emerging public health epidemic Considered an epidemic. 20% of hs’ers. 75% high s growth, 50% middle s growth produce ultra fine particles. not harmless. Misc: The racial/ethnic group of high school students most likely to report current cigarette usage is: white americans6 Maternal and Child HealthMaternal and Child Health is one of the oldest disciplines within public healthGoals Define maternal, infant and child healthMaternal, Infant, and Child Health (MIC/MCH) focuses on the health of women of childbearing age - from pre-pregnancy through pregnancy, labor, delivery, and the postpartum period - and that of the child prior to birth through adolescence. A particular attention is placed on the perinatal period - the period just before pregnancy, during pregnancy and birth, and up through the first year of the infant’s life. Explain the importance of maternal, infant and child health as indicators of society’s health MIC/MCH indicates effectiveness of disease prevention and health promotion services Healthy community = healthy moms + babies good Early childhood health -> good later health MIC Mortality rates important national health measure Define family planning and discuss its importance Need to be cognisant of multiple definitions of family Identify consequences of teenage pregnancies blessing and a joy high rates of teen births can also bring a significant social and financial burden on families and even on communities Define legalized abortion and discuss Roe v. Wade and the pro-life and pro-choice movements Define maternal mortality rate and identify some factors that influence it Define prenatal care and discuss the influence this has on pregnancy outcome List major factors that contribute to infant health and mortality Racial Inequalities: { Black women 3x, Am Indian/Alaskan Native 2x } death rate of White, Daily discrimination can increase risk of negative perinatal outcomes Maternal mortality ratios vary significantly by socioeconomic status and geography Identify the leading causes of childhood morbidity (illness/injury) and mortality (death) Discuss the importance of immunizations and health insurance to child health Identify important governmental programs developed to improve maternal and child health Briefly explain what WIC programs are and whom they serve Name several groups that are recognized as advocates for children Define what “low birth weight” means and why it is a health risk Compare the prevalence of low birth weight babies born to African American mothers, compared to white mothers in the United States Discuss factors, including chronic stress, that contribute to high rates of low birth weight births in the African American community Discuss interventions to help prevent low birth weight, including actions that can be taken at the individual level and those at the community or societal level.5 Community Organizing“Communities are not only “where health happens”. It is also often the place where residents take action to alter the conditions that affect their health”Define community organizing: “process by which community members come together to address a shared problem or opportunity, … to attain a change in their shared environment. … often involves working on a policy change at the local level…” community organizing: “defined as the process by which community groups are helped to identify common problems or goals, mobilize resources, and develop and implement strategies for reaching the goals they collectively have set” community capacity: community participation: community building: empowered community:Strategies for community organization planning and policy practice: community capacity development: social advocacy:needs-based vs strengths-based community organizing models:Generalized model for community organizing/building stepsCommon tools or tactics for community organizingCase study of community organizing for healthRole of community health workers in community organizing for healthe.g. their role in informing, involving, collaborating and empowering community residentsempowerment: process by which individuals or communities take control over their lives and environment(re empowerment): Either greater community problem-solving ability / change in conditions/relations of power. Community not strictly defined. Community organizing processes: Confrontational: Social Justice Advocacy/Alinksky Style (Saul Alinsky: Rules for Radicals) Consensus: Build in communities capacity to resolve challenges Using data + working /w Local Gov for new policies: (consensus also) In common: Recognizing the value of prevention and equityEnvironmental Justice: seeks to ensure that the costs of our industrial society (noise, air pollution, water pollution, etc.) do not unfairly fall in a disproportionate way on communities of color and more generally, poor and working class communities (Principles of env justice: http://www.ejnet.org/ej/principles.html)Environmental Health: sub-discipline within Public Health that examines the biological, physical and chemical factors in our environment that affect health.The community action model is an interactive five-step process designed to address the fundamentaldeterminants of population health through a community-based participatory process. The model was initiallydesigned to address the social determinants of tobacco-related health disparities through grassroots effortsfocused on policy and organizational practices and is applicable to other community issues.The steps of CAM are as follows: Step 1: Dialogue of Concern and Issues/Skill-Based Training Step 2: Community Diagnosis Step 3: Analysis Step 4: Plan and Implement Action/Activity Step 5: Sustaining Action/Activity and Evaluate Action. The role of CHWs can be easily defined within the CAMThrough the use of CHWs for capacity building, the concepts of several theories such as the Health Belief Model (HBM), Self-Determination Theory (SDT), Transtheoretical Model (TTM), and self-efficacy are all taking place at different stages when community members interact with CHWs for extended periods of time.Murphy, F., & MSPHyg, M. P. I. A. (Eds.). (2012). Community engagement, organization, and development for public health practice. Springer Publishing Company.CHW Roles: Informing (which can include consulting), Involving, Collaborating, Empowering"
} ,
{
"title" : "Intro Sociology",
"category" : "",
"tags" : "",
"url" : "/class/2019/02/18/intro-sociology/",
"date" : "2019-02-18 00:00:00 +0000",
"content" : "Chapter 8: GenderFeminism: consciousness raising movement to get people to understand that gender is an organizing principle of lifeSex: biological differences that distinguish males from femalesSexuality: desire, sexual preference, sexual identity, and behaviorGender: social position;social arrangements built around normative sex categoriesSex: Process in the Making: Gayle Rubin “The Traffic in Women: Notes on Political Economy of Sex” called social construct of gender categories based on natural sex differences “sex/gender system” Intersex is medical conditionEssentialism: line of thought that explains social phenomena in terms of natural onesBiological determinism: line of thought that explains social behavior in terms of who you are in the natural worldGender: What does it take: Gender systems imply social constructions 2 Gender Systems: Navajo Tribes (nadle), India (hijras) Hegemonic masculinity: condition in which men are dominant and privileged, and this dominance and privilege is invisibleGender roles: sets of behavioral norms assumed to accompany one’s status as a male or femaleThe Woman Question“What explains the nearly universal dominance of men over women”Patriarchy: a nearly universal system involving the subordination of femininity to masculinity Rubin: Sex/Gender System (Biological Sex -> Asymmetric Gender Status) Rosaldo: Because women associated with less prestigious private sphere Ortner: Because women furthermore identified with natureStructural functionalism: theoretical tradition claiming that every society has certain structures (the family, the division of labor, or gender) that exist in order to fulfill some set of necessary functions (reproduction of the species, production of goods, etc.).Early anthropology assumed every society had certain structures (eg family, division of labor). Parson’s Sex Role Theory: Talcott Parsons’s theory that men and women perform their sex roles as breadwinners and wives/ mothers, respectively, because the nuclear family is the ideal arrangement in modern societies, fulfilling the function of reproducing workers. Problem: Tautological (things work because they work) Functionalists presume need for function, preexists phenomenom and that other structures couldnt fill in Doesnt explain changing structures over history Psychoanalytic Theories Freudian theorists have provided perhaps an overly individualistic, psychoanalytic account of sex roles Sigmund Freud: “Anatomy is destiny” (but also family socialization) Kids develop personality structures through parent interactions Nancy Chodorow (1978): “Why Women predominantly caregivers?” - Parents’ unequal involvement in child rearing was partial cause. Mothering by woman is reproduced in the cycle of role socialization. Argued that egalitarian relations possible if men shared the mothering. Carol Gilligan (1982): Women and men have different ways of thinking. Women make major life decisions based on “ethics of care”. Women view world as relationships vs men as rules. Freud assumes a biological reductionist Setting (eg nuclear /w WASP middle class family /w stay@home mother, working father) Also many Freud psychoanalysts assume binary sex/gender systemConflict Theories Socialist feminists claimed that the root of all social relations including relations of production stems from unequal gender relations Variant of essentialism. Posits world divided into two groups: men women pitted against each other in struggle for resources which women always loseMicrointeractionist theories Candace West/Don H Zimmerman “Doing Gender” (1987): Gender is not fixed going into interactions, But a product of those interactions - to be man/woman = perform masculinity/femininity constantly. Social constructionists Review generals is having open-ended scriptsBlack Feminism Black feminists make the case that early liberal feminism was largely by, about, and for white middle-class women eg Betty Friedan in The Feminine Mystique ignored Experiences of thousands of working class and nonwhite women already working, sometimes holding down multiple jobs Black women experience motherhood in ways that differ from the white masculinist ideal of the familyPostmodern Theories Anthropologist Oyeronke Oy Argues the woman question is a product of uniquely Western thought in cannot be applied African societies; System of categories, distinct males and females, indicates western culture logic: biologicMiddle Range Theories Merton called middle range theories: Connect Day-to-day experiences to larger social forces Connell in Gender and Power (1987): Middle ground approach to gender. Used Anthony Giddens’s structuration theory to claim that the social and the personal always depend on each other. Extends structures as a kind of feedback loop, weaving individual practice back to social institutions which in turn influence and socialize individuals into gender beings Question becomes less to explain universal male dominance and more a matter of attempting to account for help people navigate with instructors like genderSociology in the Bedroomhigh level summarized Different norms for behavior re: power dynamics in different cultures Marxist feminists argue sexuaility in American is an expression of unequal binary gender power balance… other thingsChapter 7: StratificationStratification: structured social inequality / systematic inequalities amonung groups of people that arise as intended or unintended consequencs of social processes and relationshipsViews of Inequality: Rousseau: Physical (innate) Social/Political (goods/luxuries/ all the things) If you have 1 pizza and someone has 10 slices and you have 0 but you need some to live you might fight them for it Scottish Enlightenment + Malthus: Inequality as a means for social progress - people do work Malthusian Poverty Trap: Inequality necessary for prevention of overpopulation/starvation Hegel Master-slave dialectic Slave/master dependent on each other Society marching from few master-many slave -> society of more free men/women (equality). Standards of Equality: Ontological Equality: Notion that everyone is created equal at birth Equality of Opportunity: Idea that everyone has an equal change to achieve wealth, social prestige, power because same rules of the game (eg Jim Crow laws are not these; stifles meritocracy) Bourgeous Society: Society of commerce (modern capitalist eg) in which max of profit is primary benefit incentive. Equality of condition: Idea that everyone should have equal starting point (affirmative action) Equality of outcome: position that argues each player must end up with the same amount regardless of the fairness of the game (eg Marxist). Eliminates incentives of the Scottish Enlightenment thinkers. Free Rider Problem (ie Tragedy of the Commons): When more than one person is responsible for getting someone done, the incentive is for each to shirk responsibility and hope others pull weight.Forms of Stratification:Many forms, eg by age (some tribes determines social prestige + honor, vs in the youth obsessed culture of the US it’s the reverse), birth order (inheritance), gender, race, ethnicity. Estate System: politically based, characterized by limited social mobility. Feudal Europe-18th century, American South before Civil War. Political basis. Laws written to enforce eg voting writes only for land owners. eg (clergy,nobility, commoners). Caste System: Religion based, no social mobility. Previously in India (varna system). Class System: Economically based, characterized by cohesive oppositional groups and somewhat loose social mobility. Class depends on economic position. Marx: - every means of production has its own social relations, employing class bourgeoisie, working class proletariat. Class is relational. Contradictionary class locations: 2 classes doesnt adequately capture social world and many people fall in between these pure classes (eg self employed, managers). Weber: Class members distinguishe d by similar commercial marketplace value via property/labor - Distinguished by property/lack of property Marx is antagonistic and exploitive vs Weber is gradated and not relational Status Hierarchy System: based on social prestige. Status determined by what society thonks of the lifestyle of the community to which you belong. Those without property can belong if they have same lifestyle. eg Professors discuss scholarly issues, teach classes and read. They have a certain status even though income varies. Status groups can be other than work eg leisure kind (skate puns) or membership in exclusive organization but tend to be work. Elite-Mass Dichotomy System: System /w Governing Elite, few leaders who broadly hold power. Vilfredo Pareto in Mind and Society thinks +1 C Wright Mills thinks -1 Pareto: Pareto Principle (small, cause large effect, 80/20) Pareto believes in meritocracy Mills: - Argues negative, neither natural/beneficial 3 major institutional forces: Economic, Political, Military. Pareto views elite status as reward for talent, Mills see unequalpower/rewards as determining position. Pareto likes power centralization, Mills warns of dangers and consolidated decision making Mills: coordination among elite entrenched is self increasing. Revolving door Socioeconomic Status: individuals position in stratified social order Upper Class, Middle Class, Poor Middle Class: nonmanual jobs, pay significantly more than poverty line. Definition Debated and expansive Traditionally white collar workers + working class of individuals who work manually Post WW2 led to enrichment of many manual workers Global Inequality: globalization commonly cited inequalities through colonialism and unequal development some explanations geography / strength of social/political institutionsSocial Reproduction vs Social Mobility: social mobility: movement between different positions iwithin a social stratification system horizontal vs vertical structural mobility: inevitable due to changes in the economy exchange mobility: if we hold fixed the changing distribution of jobs, individuals trade jobs not 1-1 but in a way that balances out status attainment model: approach that ranks individuals by socioeconomic status, incl income and educational attainment and seeks to specify attributes characteristic of people who end up in more desirable occupations.sßChapter 6: Deviance + CrimeSociologists: people either deviate or conform:“Why do they deviate” group: personality type, differential association, structural strain, anomie, labeling.“Why do they conform” group: subcultural, control.social control: attempts by society to regulate people’s thoughts and behaviors in ways that limit or punish deviance ; negative/positive sanctions.folkways: traditional behaviors (not formally sanctioned)formal sanctions: laws = negative sanctionsbiological view (biological essentialist): cesare lombroso (1876) - “criminals are subhuman”. suggested physical characteristics. william sheldon 1940/1950psych view: personality as a matter of socialization (deviance is failed socialization). 1967 - Dinitz + Reckless. Containment theory - deviance = impulse controlDeviance varies by cultural norms strain theory (x,y plane) normative theories of suicide altruistic | social integration anomic fatalistic | egoistic social regulation symbolic theories of deviance labeling theory - stigma broken windows theory of deviance Crime: Street Crime White-collar Corporate Reduction Deterrence Theory of Crime Control Goffman’s Total Institution Foucalt on Punishment (reform the soul) - Panopticon US Criminal Justice: balance b/w rehab + punishment - Rockefeller Drug Laws L7Conley Chapter 14 capitalism is a thingL6Conley Chapter 13 education system reinforces social/economic distinctionsL5Conley Chapter 5 dyad,triad. Dyads are most intimate Quantiative Aspects of Groups: Georg Simmel Triad roles: mediator, tertius gaudens (3rd member who benefits from contact/conflict bw other 2), Divide et impera (intentionally drives wedge) larger than a triad? Small groups, parties, large groups. Small group: face to face interaction, unifocal perspective, lack of formal arrangements, certain level of equality party: multifocal. large group: formal structure that mediates structure and status differentiation (eg professor and students) Charles Horton Cooley: primary/secondary groups. Primary: limited membership. intimate f2f relationships that strongly influence attitudes/ideals (eg family/friends) Secondary: impersonal, instrumental relationships. Means to an end. eg labor union Group Conformity. Solomon Asch experiments (1940s): which line longer in group ( powerful usu. majority ) vs out group (stigmatized oft. minority). Significance by ability to define normal vs abnormal reference group: “group that helps us understand .. relative position in society to other group” social network: set of relations/dyads held tgt by individuals tie: content of particular relationship narrative: set of stories in a set of ties (eg university) Embeddedness: “degree to which ties are reinforced through indirect paths within a social network” Strength of weak ties: “notion that relatively weak ties often turn out to be quite valuable because they yield new information” Structural hole: “gap between network clusters, or eventwo individuals, if those individuals (or clusters) have complementary resources”. (possibility of a tie) 6 deg of freedom (stanley milgram) case study: 4% of amish startups fail. social capital. everyone shops there and taboo on bankruptcy high school partner networks. spanning trees. “But the main rule that seemed to govern these relationships was “no cycles of four,” which means you do not date the ex of your ex’s current boyfriend or girlfriend. “. Organization: “any social network that is defined by a common purpose and has a boundary between its membership and the rest of the social world” Organizational culture: “shared beliefs and behaviors within a social group; often used interchangeably with corporate culture” Organizational structure: “the ways in which power and authority are distributed within an organization” interlocking directorates: “phenomenon whereby the members of corporate boards often sit on the boards of directors for multiple companies”. can create a power elite. Dimaggio + Powell: institutional isomorphism: why businesses that evolve in diff ways have similar org structures Isomorphism: “a constraining process that forces one unit in a population to resemble other units that face the same set of environmental conditions” new institutionalism school: (of sociology): develop sociological view of institutions (vs economic)Ferguson: Colvin, Descent Into Madness The New Mexico State Prison Riot inmate on inmate killings Changes 3/4 yr before riot turnover of state leadership; unaccountable administrators inconsistencies in security + discipline growing inmate violence new inmates: submit, snitch, or fight anglo vs chicano fights + fragmented societyVideoshttps://www.youtube.com/watch?v=_wFZ5Dbj8DA social group: collection of people who have something in common and who believe what they have in common is significant aggregate: people @ same place @ same time (eg central park at 3pm categories: particular kind of person across time and space. share characteristics ( eg race ) primary (strong ties; group exists to be group eg family) vs secondary group (shared goal, eg company) group dynamics: how affect each other (indiv <-> groups) leadership types: instrumental (achieve goals) vs expressive (minimize conflict) leadership styles: authoritarian (orders), democratic (consensus), laisse faire (leave to function on own) group conformity: Milgram experiment: teacher and participant. keep administering shocks (even to deadly). Direct telling = non compliance but appeals to shared science group value = compliance. Group compliance: narrowing of thought, one right answer reference groups: groups you compare to groups vs size: bigger = more stable, less intimate. Coalitions also. homogenous group: better inward connections, heterogeneous group: better external connectionsL4 - ExamL3Ferguson: Granfield, MAKING IT BY FAKING IT: Working-Class Students in an Elite Academic Environment they threw away previous things and adapted to environment in addition to forsaking previous beliefs about wanting to help their like kin. Also emphasizing their diverse background did not help in interviews - conformity was key here.Conley Chapter 4Socialization socialization: process by which you learn how to become a functioning member of society socialization: the process by which individuals internalize the values, beliefs, and norms of a given society and learn to function as members of that society. limits of socializations when you’re in a new social situation (e.g. diff kind of party) primary unit: family Human Nature You need to bathroom but not where you can bathroom “Anna” Case Study: Socialization cannot happen after such long isolation; Theories of socialization inapplicableTheories of Socialization Self: the individual identity of a person as perceived by that same person Concept of self is a social process; I: one’s sense of agency, action, or powe Me: self as perceived as an object by the “I”; the self as one imagines others perceive one Cooley: Self emerges from being able to see ourselves as others do Mead: developed on Cooley; me is distinct Theory of social behavior: how others are likely to react to different situations Generalized other: internalized sense of the total expectations of others in a variety of settingsAgents of Socialization Generally families; not always parents -> children sometimes reverse Family social class impacts how their children socialized middle-class parents are more likely to engage in concerted cultivation with formal activities and reason with them over decisions to foster talents Kids in less well-off families pend more time hanging out Middle class kids are able to use logic and reason to support choices by mirroring parents explanations Middle class kids discover confidence that comes achievements School Teachers properly socialize you All schools are not created equal Prep schools link students into elite social networks Peers Peer pressure Adolescents are more open to friends advise them to parents Media ongoing debate; e.g. sesame street: Educational programming for children who don’t have day care or preschool Adult Socialization Ways in which or socialize as an adult. For example working at a restaurant you learn your responsibilities Resocialization: The process by which one’s sense of social values and beliefs and norms are reengineered often deliberately through on intense social process that may take place in a total institution - e.g. living in a new country; or a coed college from a single sex high school; or if you lost completely your memory Total Institution An institution in her 20s totally immersed in that controls all the basics of day-to-day life; No barriers exist between usual spheres of daily life and all activity that occurs in same place and under same single authority; e.g. prisons, boarding schools, college, army Works by placing an immense physical and mental pressure and isolating them Social Interaction Status: Recognizable social position that a individual occupies Role: Duties and behaviors expected to someone who holds a particular status Role Strain: Incompatibility among roles corresponding to a single status Role conflict: tension caused by competing demands between two or more rules pertaining to different statuses Status set: all the statuses one holds simultaneously Ascribed status: status into which one is born; involuntary status Achieved status: status into which one enters; voluntary status Master status: Status within a set that stands out Merton’s Role Theory: Acting within roles/people have roles. Six types of role conflict (from Merton Sociological Ambivalence, pp. 8 - 12) Conflict within an individual’s status set Conflict within the role set Conflict of the multi-cultural Cultural conflict, i.e., between cultural valuesa. This is conflict within the cultural system Conflict between aspirations and opportunity (i.e., no chance to do what you have been taught you ought to) Conflict inherent within the role itself Gender Roles Gender Roles: Behavioral norms assumes to accompany status as male or female West/Dimmerman argue gender status has power/significance Not captured by real theory Gender can constitute a master status Studies show people interact with babies differently depending on gender Larger world socializes boys and girls differently Socialization continues in high schools such as insults; Gender boundary policing can cause catastrophic effectsSocial Construction of Reality Something is real meaningful or valuable when society tells us it is Childhood is the developmental stage was not always so and came after industrial times Teenagers became a Discrete social category after the extension of education during the 1950s Symbolic interactionism: Micro level theory and with shared meanings orientations and assumptions formed the basic motivations behind peoples actions Symbolic interactionism: How Things are socially constructed ( suggests how We interact with others have symbolic meaning meanings) Three Basic Tenets Human beings act towards ideas concepts and values on the basis of meaning that they have for them Meetings are the products of social interactions in human society Meanings are modified and filtered through an interpretive process that each individual uses in dealing with outward signs Useful for Understanding cultural differences and styles of social interaction Dramaturgical Theory Erving Goffman: Language of theater as a paradigm to formally describe the ways in which we interact to maintain social order Dramaturgical Theory: View of social life as a theatrical performance in which we are all actors on metaphorical stages with roles scripts costumes and sets Morals are depression management Role as a student; professor handed out syllabus (prop) and give an outline of the class ( script) and lecture (performance). Talking about Batman would deviate from the script Important distinction between front stage and backstage Face: The esteem in which an individual is held by others Opening the start of an encounter; Closing: The end of any interaction; Civic inattention: Refraining from directly interacting with someone till an opening; Given gestures can signal a closing; Giving off gestures can unconsciously signal true feelings. In Breaches people work hard to repair the mistake so everyone can move forward Goal of social interaction is to Make a good impressionAnd works to ensure that others believe they’re also making a good impressionEthnomethodology Harold Garfinkel (1950/60) Literally “the methods of the people”; approach to studying human interaction focusing on the ways we make sense of our World, Convey this understanding to others and produce a shared social order Famous for breaching experiments: what happens when breaching social norms.New Technologies: What How’s the Internet Done to interaction? new social situations without established social norms eg online chat rooms: new lexicon but difficult to deploy closing brackets Redefining the term stealingConclusion nature versus nurture, generally sociologists: nurture Socialization helps understand how babies become people who attend collegeL2Ferguson: Haunani-Kay Trask, Lovely Hula Hands“Lovely Hula Hands: Corporate Tourism and the Prostitution of Hawaiian Culture” Haiwaiians have less rights than American Indians American’s don’t know where Hawaii is but feel entitled to use it and the destruction of Hawaiian land is by MNCs Prostitution is used as an analytic category/metaphor to convey the degradation of Hawaiian culture and people under tourismAuthor will examine: 1) homeland incl lands,fisheries,sea,skies 2) language and dance 3) familial relationships 4) women In Hawaii there is a younger sibling/elder sibling + chief<-> villagers symbiosism. Aloha is a cultural feeling and practice that works b/w the people and their land Hawaiian language was banned by Americans and only now is making a resurgency (and dance). Hawaiian values are different than those of the traditional west and that annoys many visitors (e.g. shared property and children and open relationships). In contrast the American relationship of people to land is exploitative Tourism is the only job propoganda is spread; “Our language, dance, young poeple and customs of eating are used to ensnare tourists … for $39.95”. Hawaiians are required to be complicit or face unemployment and are frequently forced to leave Hawaii as a result. Chapter 3 Conley Reading3 Culture and Media Does culture or media come first? Culture = Human – Nature, Culture = (Superior) Man – (Inferior) Man, Culture = Man – Machine Matthew Arnold (1822–1888) redefined culture as the pursuit of perfection and broad knowledge of the world in contrast to narrow self-centeredness and material gain. < partly done >Videoshttps://www.youtube.com/watch?v=kGrVhM_Gi8k culture: non-material objects (thoughts,action,language,values…) + objects to form way of life material culture: syntactic things around you (e.g. street signs) nonmaterial culture: semantic meaning assigned + intangibles. e.g. red = stop Societal Sanctions: folkways, mores, tabooshttps://www.youtube.com/watch?v=RV50AV7-Iwc Social Class: Low vs High Culture. Low/Popular Culture: Behaviors/Ideas that are Popular High Culture: Culture popular with society elite Mainstream Culture: cultural patterns broadly aligned with society’s cultural ideas + values - Subculture: cultural patterns that set apart of population segment; e.g. hipsters Counterculture: Pushback on mainstream to change how society functions Cultural Lag: some things take time; e.g. summer vacation (from summer harvest origins) Cultural Diffusion: culture spreads Ethnocentrism: judging one culture by the standards of another (e.g. euro/afrocentrism vs multiculturialism) Structural Functionalist: melting pot of culture forms structure -> good Conflict Theorist: prioritizing a culture = inequalities + disenfranchisement -> bad Symbolic Interactionists: society is about shared reality/culture created L1https://www.youtube.com/watch?v=DbTt_ySTjaY Theoretical Paradigms: Structural Functionalism (Emilie Durkheim): Parts (social structures) work together Conflict Theory: Struggle over scarcity - 1st one: Class conflict (Karl Marx): Means of Production vs Labor; Marx thought central conflict and source of inequality Race-Conflict (WEB DuBois): Conflict b/w difference racial + ethnic groups Gender-Conflic Theory: Social inequalities b/w women + men Symbolic Interactionism (Max Weber): Verstehen (understanding); Focus on individual social situations + their meaning Social Functions: manifest (obvious) + latent (unintended) functions Social Dysfunction: disrupts society (e.g. technology) Macro vs Micro 3 Major Paradigmshttps://www.youtube.com/watch?v=YnCJU6PaCio See the strange in the familiar, study society, how sociology differentiates itself, what sociology can doQuotes/Paraphrases from Conley Book: https://www.amazon.com/You-May-Ask-Yourself-Introduction-dp-039391299X/dp/039391299X& Ferguson Reader: https://www.amazon.com/Mapping-Social-Landscape-Readings-Sociology/dp/150636828X"
} ,
{
"title" : "Random Berk Classes",
"category" : "",
"tags" : "",
"url" : "/2018/02/16/random-berk-classes/",
"date" : "2018-02-16 00:00:00 +0000",
"content" : "Advanced Topics in Computer Systems (262a-f18)Aug 30 2018FSCQ logical block mapping to choose where to put on platter, archival data inside the platter and fast access data on the outsidenever use RAID 5 again lmao4ms to track switch, but much less to read next thing on the block3 modes for a Journaling File System - Writeback, Ordered, Data journaling. (write metadata+journal independently and journal only metadata, ordering, or both first to journal)journals can be stored in different portions of a disk. Ext2/3Comp + Theoretical Immunology (294-E?)“immune repertoire diversity: inference and modeling”paper1: http://www.pnas.org/content/107/12/5405paper2: http://www.pnas.org/content/113/2/274“Typical” zebrafish B cell CDR3 Repertoires28-112k sequences/fish /w primer dep amplification biasD region in zebra fish antibodies - 1-6 antiacidsrestricted to D region which act like clone barcodesCan we say anything about P(\sigma) from the data?Max Entropy ModelMaxEnt model = “least structured model consistent with observables”Restrict to individual and pairwise data so that num of vars ~ 10^3.Takeaways (2nd paper) Clone speciifc vs cell specific fluctuating fitness give different qualitative results in this framework of lymphocyte diversity. may be able to estimate key growth params from clean enough data (fitting power law exp and crossovers)Self notes:via Wikipedia: T cell: “a lymphocyte of a type produced or processed by the thymus gland and actively participating in the immune response” ligand: “an ion or molecule attached to a metal atom by coordinate bonding.” kinetic proofreading: “ Kinetic proofreading allows enzymes to discriminate between two possible reaction pathways leading to correct or incorrect products with an accuracy higher than what one would predict based on the difference in the activation energy between these two pathways”Modeling T Cell Ligand Discrimination (Slides)Jonathan Liu T Cell SignalingT cell activation is fast sensititive and digitalHow can we explain this theoretically?Certain activation < 15sec. Digital - trigger or dont. Question: how do you explain these props theoretically? What kind of network? Two models of activation Conformational change Based on structural interactions Data doesn’t support this Kinetic Proofreading Based on lifetime of PMHC-TCR complex Shown to correlate w T-Cell activation Kinetic Proofreading if you consider a system in thermo eq - fund limit on how Experimental SetupInput specified # of pMHC ligands (concentration not types)Measure output using immunostaining / flow cytometryJargon: Output: ppERK (phosphorylation of extxracellular regulated kinase) Input = pMHC ligand per APC SIINFEKL-K^b, EIINFEKL-K^b, SIIRFEKL-K^b Paper: Altan Bonnet and Germain 2005 Modeling T Cell Antigen Discimination Based on Feedback Control of Digital ERK Resopnses Indiv cell responseVaried input molecules (Graph A)Bimodal # of cells /w high and low ppERK output (Graph B) Pop Response Differing Ligand strength Problems w Kinetic Proofreading Tradeoff bw selectivity and speed Data suggest additional network complexity We need fast response time, Buffering against weak binders, Huge amplification of strong binders.Solution: Pos/Neg Feedback Sample structural change chart generated from some caltech group software Response time depends on concentration of agonist ligand (agonist: something that bind to something) Hierarchical antagonism in signaling mixing non+agonist ligands is slower EIIINFEKL is more antagonist varying concentration of specific binder vs nonspecific binders Varying discrimination based on T cell differentiationAmount of SHP1 (negative feedback) vs (non-)agonist. Conceptual Change amount of neg feedback Change amount of nonspecific binder Change amount of agonist Summary T cell activation incorporates kinetic proofreading w simultaneous positive and negative feedback loops Allows for high speed sensitivity and discrimination Simulated results qualitatively agree w data Discussion Points Can we write a simpler phenomenological model that captures the qualitative behavior? What elements are relevant? How can we generalize? Do we need to consider stochasticity? Can we approach this from a more biophysical perspective? e.g. stat mech of binding Can we experimentally acess specific points in network? Comp + Theoretical Immunologymathematical modeling of affinity maturationFeb 15 2015introduction to AF2 the Kepler Perelson Model (1993)Opera Perelson (1997)Meyan Moremann (2012)I Def AF is the process by which B cells produce antibodies with increased affinity for antigen during immune response.It involves 2 processes (Jeff.) Somatic hypermutation Clonal Selection (select the right something)Cell BioB Cell -> centroblot -> centrocyte (DZ) -> (some not selected, LZ) b cell with increased infinityGerminal Center - distinguish two zones: Dark/Light zone.This started during immune response - very dynamic. The GC has a dynamic morphology You start with a initial reaction triggered by immune response:D0 (reaction) -> D4 (DZ/LZ formed) -> (development) D14 -> dissolves (D21).There is a specific antigen associated with germinal centerDark/Light zone - in the old days, dark: lots of b cells doing something protein so it looked dark in imaging?Questions from this paper: How to explain high efficiency of affinity maturation? (How to achieve a population of BCells w high affinity?) How to explain the special organization of the germinal center?Mathematical Reformulation of 1: How to maximize at the end of the GC reaction chain the global affinity of b cells? -> how to define affinity? coarse grain what is affinity -> define different levels of affinity (K-2,k1,k0,…K2) -> A = \sum b_i K_i (# of b cells in slab i)Idea: Model the pop dynamics of b cells by a system of ODEs dep on the mutation schedule \mu(t), and find \mu that maximze A(T), and T=14 days chosen.(i) -> (i) + (i) (grow) -> (\emptyset) (die) -> (j) (mutate) v (death event, proliferation event) v (mutation event, has M_{ij} that accounts for mutation rate) dB/dT = F(B, \mu(t)). dB_i/dT = b_i 1_B(t) >=1 (t) (...) + \sum_(j != i) n_j 1_{B_j(t)} (t) (...) approximating a discrete difference eq /w a differential eq. M_{ij} = [L_\mu (1-p_s)(1-p_l)] ^ i-j e^{-L\mu (1-\mu s)} / i-j ! (1+r^{j-i}) There are tools that allow to answer the questions with K-P model –Optimal control theory\dot{x} S(t,x,u) u = “command”. Imagine you have a physical system, e.g. thermostat that you can change.x(t_0) = x_0J(u) = K(t_p,x_p) + \integrate_{t_0,t_f} L(t, x(t), u(t)) dtPonteyugims maximum principle (1962) you can maximze ^ quantity - which is basically the global affinity. Under the assumptions \exists v* | \forall u \in V, a) <= J(u) or something. Can write a hamiltonian to optimize u?Consider book Review: Immunology for physicists. Results: Stay between days in these different mutation/non mutation period - looks like shark fins __ ___ __. the period of the fin is days they think. Conclusion: Alteration between periods of rapid mutation and of mutation free growthInterpretation: in the optimal slution the pop first grows quickly as possible uin the something of mutation until the one N = 1/P_A cells prob “Such an optimal schedule can arise naturally from the structure of the GC”. The temporal variation of the \mu*(t) would be implemented by spatial compartimentalizationC1 | C2(delection/mutation) | Proliferation <- can go back supposedly.II ) Paper 2“strategy is difficult to reconcile with temporarl and spatial plethora of cell movement and expansion with the germinal center”Found the actual sitting in the dark zone before light zone is hours not days like they thought. DZ | LZ Start B(t) bcell -> Centroblast(B_i (t)) | -> Centrocyte (C_i(t) ) -> R_i(t) -> F_i(t) folliculardendritic cells (antigens), these antigens can just bind. once get antigen you can live and go out as plasma or you can recycle. competition is in the LZ, can bind with a lower affinityT Follicular helper cells (TFH) ^ discovered in 2005,Stromal cells in DZwant to measure:1) GC Size:Affinity? The is an optimal Pr for total affinity but not the average affinity? What about plasmaIII) chromotaxisCXCL 12 CXCL13^ centroblasts ^ TFH ^ centroblast"
} ,
{
"title" : "Hpts Keynote Pat Helland",
"category" : "",
"tags" : "",
"url" : "/misc/talks/2017/10/02/hpts-keynote-pat-helland/",
"date" : "2017-10-02 00:00:00 +0000",
"content" : "HTPS KeynoteBefore Storage has evolved (from Direct, SAN, Storage clusters + REST API) Computing Evolved Single proc -> Multi -> RPC -> SOA -> Microservices Computing Storage Use Direct File I/O State Durable state + consistency (transactions/updates/message semantics) Session State - multi op transactions; sessions are hard @ microservices inside/outside data outside data is immutable Careful Replacement disks can trash block during write: (old -> trash -> new) hardware fixes careful replacement issue transactions bundle + solve careful replacement workflows need careful transactional replacement nowRead your writes? Strong consistently - (R after W): Even as scales you can r after w Sometime delay if sick/dead (releader election) Weakly consistent (not R after W): No guarantee write update old replica - read old value R/W consistent SLA - skip sick/dead servers Cached Data KV pairs versioned, unsure if newest. Different stores for diff uses!Immutability can fix these - only one version to get.Stateful Sessions And Transactions Stateful sessions worked well for SOA: Distributed Transactions + Across MachinesTransactions, Sessions, Microservice Requests flow to request routing. Session state needed for cross-request TV Microservice Transaction are typically 1 store request No cross request transactionsTheres no substitute for interchangibility"
} ,
{
"title" : "Grad Advanced Operating Systems & Distrib. Systems Notes",
"category" : "",
"tags" : "",
"url" : "/class/2016/09/09/Advanced-Operating-Systems-Notes/",
"date" : "2016-09-09 00:00:00 +0000",
"content" : "Professor Dave Andersen2016-Oct-14Dynamo Paper Eventual Consistency -> Vector Clocks (Bayou) / Red Blue Consistency Consistent Hashing / Chord Gossip Protocols SLOs & 99.9% Percentile Latency Merkle Trees2016-Sept-30The Design and Implementation of a Log-Structured File SystemHow many disks are at $x -> estimate data per second ingestion / disk storage Context Raid: (IBM / Disk Size) Balance Spindles vs $/tb vs trut? RAID Levels Reliability / MTTR / MTBF / MTTF etc. Schroeder RAID6 vs Cross-rack/de Section Remapping is eww (inserts seeks into reads).Reliability Raid vs Tape Storage vs zone replication (buddy data centers!) http://firstround.com/review/the-three-infrastructure-mistakes-your-company-must-not-make/ Monitor everything https://en.wikipedia.org/wiki/Jerry_Saltzer has an undergrad book & class on relability engRAID 0- striping, 1- mirror, 2- ecc, 3- single group, 4/5 sector. https://community.netapp.com/fukiw75442/attachments/fukiw75442/data-ontap-discussions/2334/1/WAFL.pdf Hard drives are not as good as promised Failures correlated MTTRs are increasing (fast + bigger disks) Failures increase (esp during heavy use!)“When you’re operating at googlebooksoft scale” every server cannot be a special snowflake2016-Sept-26Paper: AFS Howard 88AFS: # of users > 5-10k Efficient servers by whole-file caching Server crash -> pause No Net? Maybe local cache if lease Typically 1 user prer file or read only Evaluation?: Benchmark (Modified Andrew Benchmark) Ran commmands - You can see amdahls law’s and don’t have interactions b/w file ops Experience: - Much slower than local Better than 1 server Killed Server Dropbox: 500M ~ users. work offline? Conflict handling / merges Human / Piss someone off Lustre, etc: / Panasas Storage: Sharded in Parallel - 10 Comps. Performance!!! GFS Looks similar -> pushed requirements to apps -> append semanticsNFS More cluster-y Survive crashes Transparent Caching! -> Validate on use. (Block Based) Didn’t have consistent access. 3 second attr cacheHow does local ops do things? Read(fd ..) -> Get a file handle (vol, inode, gen #) -> Make server stateless and idempotent.Q: How make generation #? Q: Why is TCP Better > UDP For Services? Because Firewalls like TCP Better generally2016-Sept-23Paper: Using Model Checking to Find Serious File System Errors Yang 04 Fuzzing is helpful Link against ASAM (address sanitizer) / LibFuzz / AFL - American Fuzzy Lop Industry “State of Art” / Adaptive Fuzzing Filesystems are ugly to fuzz People test general not edge cases Crash/Reboot => long Sometimes true that disks do what you tell it - write [w1, fsync, w2] - you should have w1 if w2, … - disks sometimes consistent - if you do certain things Untested Code in Drivers: Error States What do filesystems look like? Well known superblock -> links to ‘/’ directory or similar, - ‘/’ then has names -> inodes with inodes pointing to blocks. Blocks can point to blocks. - Important Consistent Things - If delete dog (file), you can just delete entry in directory. Bad issue is if name deleted but lost state about ops in file system. You have pointer gone but inodes/blocks are allocated. - How do we know if this happens? FSCK What if we delete inodes, and then crash (dont delete name chunk)? We start overwriting other things if we try to write to it. When deleting you always delete & unlink then do unfree. When you make a new file - first allocate & then link & then names and things. If you do these in order you should have consistent. But large performance penalty for fsync. ext2 so fast vs BSD Fast File System, but loses data - last 30 sec sometimes - wrong order of ops can throw your FS away. JFS - Journaling FS. / ReiserFS also a thing BTRFS is the new cool thing Checksums -> Stop instead of corruption failures Imagine building a soda dispenserCoin -(Insert)-> Select State Select -Water-> DispenseSelect -Soda-> SelectWhat is correctness look like? State always valid, you have to pay, you always get what you ask forBack to Model Checking State Compaction (heuristic) e.g. ignore filenames Hashbased comparisons Explore Efficiently Find Impl Bugs (vs Model Checking usually being correctness) It’s hard to specify correctness (cool paper: SQCK: a declarative file system checker) Fsck was the basis for their correctness? CMC + Stubs. They forwarded syscalls to their state machineSSDs - New FS’s try to do large sequential writes, Disk drivers make Log Structured File Systems, optimize small things - “Turf War”. (So they work with legacy FS).Disks not predictable - There’s a paper by Eric Brewer.Question: DSLs for specifying equality relations i.e. things that are the same in a filesystem?Question: Is disk control algorithms a research area still?Question: No code gen for formal models?2016-Sept-12Admin: {Wed: Time, Clocks; Fri: No Class}Paper: Using Threads in Interactive Systems: A Case Study Hauser 93 SIGOPSPrecursor multithread individual programs to get crisp response. when you have 8+ cores, you need to think how to extract more parallelism. in a modern multisocket there is two cpu’s with a dram and a PCIe each (he calls them sockets b/c cpu’s go in a sockets), connected by a interconnect. Usually ~16 cores/cpu now. L1/L2 cache on core. L3 Cache per socket. (NUMA CPU Design). bigger = slower means segregated memory hierachy (Physics) -> Time to activate a line and length of buses. DRAM/CPU are different fab processes - expand at different rates, you dont want the mini metal interconnects to break as they expand HBM (high bandwidth memory) - stack of dram with a high bandwidth interconnect Most cores can execute 2 threads at a time (hyperthreading) PCIe - peripherical connect interface -> attach flash / NIC / High speed peripheral interconnects to attach additional components. 1000’s of threads to keep cores 100% utilized more energy efficient to buy 2x the cpu’s but things like huffman encoding because not parallelizableProcess vs Thread (in context of paper) Process has Seperate Address space vs Shared (Thread) Process have own resources & permissions whereas Threads share those e.g. open file descriptors Threads are cheaper (not cheap!). ~ 100kb in this, Processes are (~10s of MB). Fibers/Coroutines: “Fiber is smaller than a thread”. Within a process cooperatively process & multischedule. can have 10/100k of these. Preemptive vs Cooperative Threads (os steps in vs thread runs till it gives up control) A process switch requires interrupts, and then run a OS scheduler, and then returning control potentially to a different process: the most expensive thing is to invalidate the TLB :( . Threads require interrupt but doesnt invalidate TLB Application Schedulers on the other hand - Function call, table lookup, function call -> much much cheaper. e.g. Fiber schedulers are app level schedulers. “Rob Pike from the Go team” has a great talk on using gothreads to write a compilerPaper Mark Weiser (an author): one of fathers of ubiquitous computing Kinds of Threads: Transient: - Defer: Another thread to do long tasks Pump: Input transformer Sleeper (time/periodic) Slack (e.g. batching=less work/more efficient). But slack process /w wrong thread priority / not many things to do is degrading of performance. Also possibility for priority inversion. - Ways to attempt to reduce deadlock: Deadlock Checker Thread / Have a thread give up all locks and try to get all of them from scratch. Also partial unrolling / failures within nested calls is painful Task Rejuvenation: If something going wrong just kill it and have another process do the work -> Masks failure. Controversial. - Martin Renard’s Group (MIT): Solution is that anytime you might read from bad data / e.g. segfault -> just return random data and stuff works!-> no one noticed the corruption (in the case of web apps). Micro-reboot Idea (Stanford - Candea / Armando Fox). Q: Is DRAM always next to core on board?2016-Sept-9 - Lecture 2Paper: Implementing Remote Procedure Calls Birrell 1984 RPC Have RPC look like local calls synchronous calls marshal args & copy to foreign server SunRPC popularized RPC. Encoding as JSON/BSON/XML What if we do a remote call with f(a,b) where b is 10gb? > Design defined. Decoupled Marshal from RPC (e.g. ZeroMQ with Protobuf serialization) How do we bind in modern day? Zookeeper Failures Exactly Once is impossible unless you have a reliable component e.g. hard drive - but not possible with just We focus on async communication because real networks are not synch and “life is hard” RPC System seems very interested in low level Bypass Lower Layer OS network stack RDMA Cross-Layer Optimization RPC / General Message Passing used commonly now Distributed Transactional Memory possible over LAN not so much WAN."
} ,
{
"title" : "MapR Talk",
"category" : "",
"tags" : "",
"url" : "/misc/talks/2016/03/22/mapr-talk-march-22-2016/",
"date" : "2016-03-22 00:00:00 +0000",
"content" : "#Mapr TalkMarch 22, 2016 - Tedd Dcooccurence vs matrix factorization result dithering anti-floodexplotation, diversity, speed - not the last fraction of a percent. exploratoion meaning the recommendation results today are the traning data for tomorrow. So if you make the results worse today but the training data better tomorrow - you get a better overall result.Dithering used to reorder recommendation results - reordering is done randomly.Dithering is guaranteed to make offline-performance worse.Dithering also has a near perfect record of making actual performance much better.Hours to implement - non intuitive/academic - very pragmatic.log of rank + gaussian noise and reorder. Pick noise scale to provide desired level of mixing.Exploring the second page - no click through rates after around ~20th (boundary of first page). rank because of order of presentation.floor(t/T) as a seed - stable for a time period. - feeling of novelty.Lesson 1 Exploration is goodBayesian bandits - based on thompson sampling. Very general sequential test. near optimal regret trade-off exploration and exploitationPOssibly best known solution for exploration/exploitation - incredibly SimpleThompson Sampling: Select each shell according to probability that it is the best. Instead of estimating from probability distrbution - let’s just sample instead of estimate. Picks alternatives with the probabilities we want.COnverges faster than epsilon-greedy. (with Gamma-Normal prior). His graph showed outperformance by ~ 4x. Refer to An Empirical Evaluation of Thompson Sampling (Chapelle and Li 2011). - asymptotically optimal - around 10 lines of code.Lesson 2: Exploration is pretty easy to do and pays big benefits.Thompson sampling is used by most ad targeting systems - need to explore to get better training data - kind of over academically because it has an optimality result.The Problem K means clustering is useful for feature extraction or compression. At scale and high dimenion thedesirable number of clusters increases. Very large # of clusters may erquire more asses through the data. Super-linear scaling generally impossibleThe Solution Sketch based algos produce a sketch of the data Streaming k-means uses adaptive dp-means to produce this sketch in the form of many weighted centroids which approx theorig distribution. The size of the sketch grows slowly with increasing data size Many operations such as clustering are welll behaved on sketches Fast and Accurate k-means for large datasets (wong/meyerson/shindler) Revisitng k-means via bayesian nonparametrics (jordan) Lots of clusters are fine Avoids the k-means failure of two seeds being fixed next to each other Sketch with k log k centroids claimedLesson 3: Sketches make big data smallExample 4: Search Abuse.Recommendation: Sparse data around a person, but lots of data from lots of people - learn patterns from crowd extended to a person.E.g. Alice got an apple nd a puppy. Charles got a bicycle. Bob got an apple. - We recommend Bob a puppy.What if everyone get’s a pony including amelia - now what do we recommend? Nothing we cant tell :(.Cooccurrence Analysis is great for this. Different from text search, recommendation search based on using as indicators using cooccurence gives us better results!Lesson 4: Recursive search abuse pays. Search can implement recs which can implement search.Example 5: Something useful? Like something to do with money.Common Point of Compromise:Scenario - Merchant 0 is compromised, leaks account data during compromise, fraud committed elsewhere during exploit, high background level of fraud, limited detection rate of exploits.Goal: Find merchant 0.Metagoal: Screen algos for this task without leaking sensitive data.Simulation Strategy: Pick consumer parameters such as transaction rate, prefs - no details of fraud/fraudsters/transactions/models! Then simulate using compromised period and then have higher probability of fraud during exploit probability. How can this be good? Solution: Simulate failure modes of the real system.Parametric Simulation: Parametric matching of failure signatures allows emulation of complex data properties. Matching on KPI’s and failure modes is pretty good.e.g. Hive was broken - given schema + skew of data - generated something to break query.SummaryWe live in the golden age of newly achieved scale. Scale has lowered the tree - hard problems are much asier, lots of low-hanging fruit all around us.Cheap learning has a huge value.Code available at github.com/tdunning"
} ,
{
"title" : "Build-A-Thing",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/27/build-a-thing/",
"date" : "2016-01-27 00:00:00 +0000",
"content" : "Pseudo Interpreter & Web ServerBuild a lang-NystromGame Building-NystromBuild your own LispBuild a startup: “Why Should You Start a Startup?”"
} ,
{
"title" : "Presentation Tricks",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/26/presentation_tricks/",
"date" : "2016-01-26 00:00:00 +0000",
"content" : "Presentation Tricks Start out with a really interesting story, or statistic or misconception"
} ,
{
"title" : "How I read",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/14/the-post-8931/",
"date" : "2016-01-14 00:00:00 +0000",
"content" : "I personally like a combination of [1] and [2] when reading papers. These are summarized (mostly) in a nice infographic here when reading papers.General Format: (also easier so i can copy & paste)* TOC{:toc}## TitleAuthors*Question Being Answered*: *One sentence answer*: *"Low Level" Notes*: *Questions I have*: *Particularly Interesting Phrases/Points*: "
} ,
{
"title" : "Mobile Health Readings",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/14/the-post-8999/",
"date" : "2016-01-14 00:00:00 +0000",
"content" : "Focused on Mobile / IoT Tech in Healthcare PWC’s The Wearable Future Perspectives on pervasive health from some of the field’s leading researchers Can Mobile Health Tech Transform Health Care?PWC’s The Wearable FuturePWC: located hereReport structured as sort of a survey over wearable tech hence everything here is “low level”.Section 1: Executive Summary Section: Enterprise has a “huge opportunity” Wearables can increase loyalty & productivity and has many applications in enterprise Wearables need to be “anchored in human centered design” Need to be part of an ecosystem to provide value Can change advertising and of course healthcare and generally media presentation Can be used in workforce training & productivity Wearable tech needs to be prescriptive to be useful Privacy/Security & Price point are main concerns There is vast opportunity : their examples are stress reduction, strengthened family connections, improving personal accountability, improved customer serviceSection 2: Wearable Worlds (Dystopia or Utopia):Provides two alternate storiesSection 3: Wearables at a crossroad: Wearable tech products have currently underdelivered - they believe the Apple Watch should be better. Better adoption than a tablet Wearables attached to phone rather than independent.Section 4: Research Methodology: Worked with BAV Consulting (leader in brands/customer research) (Define) Wearable Tech = “Clothing and accessories incorporating computer and advanced electronic technologies” They talked to Panelists, brainstormed and samples 1k consumers of Census National Representation*Section 5: Snapshot of the Wearable Future *: Statistics and usecases, pretty pictures are nice*Section 6: Where wearable tech stands today *:Gives some gender-specific results/example wearablesSection 7: The Business of Wearables: Can be used to differentiate brands. Virgin Airlines using Google Glass for alerting staff of important customers Provide context relevant content while considering a product. People are more excited for wearables from tech brands. Uses in retail and entertainment are popularSection 8: Consumers and Wearables: Ambivalence rules wearables right now Current Mood: We have data… but what do we do with it? Wearables can either be primary or secondary devices - is it independent of a smartphone? The real opportunity is “addressing unmet needs” Secondary possiblity: Directing goal-directed behavior, and info overload filtering Privacy iss till a concern Hitachi has made a communication habit & energy level detecting employee badge!Section 9: What’s next?Recaps the need to embrace tech as a business.Questions/Points: The Wearable Utopia/Dystopia was a great juxtaposition. “Super data” > Big data. this terminology is funny Pg 11 says B2B market will be revolutionized … but how Why the Apple bias? What do they mean by Census National representation (pg 14).: As in a statistically Representative group? Ambivalence rules wearables right now Current Mood: We have data… but what do we do with it?Perspectives on pervasive health from some of the field’s leading researchersDey et al (2011)Question Being Answered: What is pervasive health and what’s happening in it?One sentence answer: Collated opinions - no summary“Low Level” Notes:What is Pervasive Health? Application of pervasive computing tech for healthcare/health Making healthcare available everywhere/everytime Using ubicomp tech to increase medical knowledge / contribute to healthcare delivery Convergence of personal devices, sensing, embedded computing to advance healthcare qualityExample Projects: Mining reality to collect “honest” signals Social signals can assess behavior diseases (e.g. obesity) Continuous sedentary activity type detection Mobile phone weight lost intervention tool using JIT feedback and persuasive theories FitBaby, connecting parents with clinicians and documentation of daily premature-infant living Detection of pressure ulcersThey conclude that the area is is a burgeoning research area and they “expect … [smartphones] .. will be a dominant research and consumer platform for pervasive health” and mention some challenges, e.g. low power, sophisticated sensing, balancing privacy concerns, and treating “in clinically valid ways”.Questions I have:Particularly Interesting Phrases/Points:Can Mobile Health Tech Transform Health Care?Steinhubl et al (2013) [PubMed]Question Being Answered: Can Mobile Health Tech Transform Healthcare?One sentence answer: The potential exists but there are obstacles“Low Level” Notes: 3 powerful drivers: Unsustainability of current healthcare spending Rapid growth of wireless connectivity (>3.2b mobile users) Need for personalized medicine Obstacles: Current health care system complexities & reimbursement incentives Low quality apps (potentially harmful) Possible Use cases now: self - Diagnosing acute symptoms (34% of visits are b/c of acute symptoms. e.g. Viral respiratory tract infections) Recording biometric info Better control chronic issues ( > 50% of US has >= 1 chronic condition - 90% of spending) Hypertension (1/3 adults, 40m office visits, $93b costs): possible improvements: Home monitoring & Blood Pressure Cuffs. All of these can reduce # of doctor visits. Move general doctor time to patients that need it rather than general algorithmic visits.Questions I have: Self diagnosing is generally a contentious point! Otitis Media? : Middle ear inflammatory disease familyParticularly Interesting Phrases/Points:"
} ,
{
"title" : "How I read",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/14/the-post-8931/",
"date" : "2016-01-14 00:00:00 +0000",
"content" : "I personally like a combination of [1] and [2] when reading papers. These are summarized (mostly) in a nice infographic here when reading papers.General Format: (also easier so i can copy & paste)* TOC{:toc}## TitleAuthors*Question Being Answered*: *One sentence answer*: *"Low Level" Notes*: *Questions I have*: *Particularly Interesting Phrases/Points*:"
} ,
{
"title" : "Designing Human Centered Systems Notes",
"category" : "",
"tags" : "",
"url" : "/class/2016/01/14/the-post-2300/",
"date" : "2016-01-14 00:00:00 +0000",
"content" : " Lecture 2 Intro Pre vs Post 1950s Computing Vannevar Bush Grace Hopper Interfaces JCR Licklider Lecture 1 Intro Design Myths! Why is Good Design Important? Lecture 2Class Questions Why do punch cards have diagonal lines? To help them algn if you drop them Absolute vs Relative Pointing? Many early input devices were part of radar systems - why?Class Challenges When were the following invented? GUI Mechanical Computer Electrical Computer TouchScreen Mouse Input device that fits criteria (XYZ positioning)/ XY and rotation in Z axis)Intro Man Machine interfaces preceded HCI Knobs/buttons/slides, good interfaces preceded computers Jacquard Loom (1801) Tabulating machines (1890) knobs/levers/mechanical used till ~1950s (e.g. Charlie Chaplin’s view of the Modern times in 1936) Electronic Interfaced Plugboards (1906-1940). Batch Interfaces (1945-1968; ENIAC 1943-6; Key Punch Machine) Terminals/CLIs (1969-90) Micros (1970s/80s) Pre vs Post 1950s Computing Users had to accomodate computers, and UI was overload Military applications were valuable, pieces came togetherVannevar Bush Influential policy maker, Director of Office of Scientific R&D, foundes NSF. Ideas: Memex (palm pilot/smartphone) / Hyperlinks Augment the power of the human brain now, not just physical abilitiesGrace Hopper Wrote A0 compiler (1950s)Interfaces Joysticks (1908/20’s) Trackball (1942) Light Guns/Pens (1950) Sage (1954) Sketchpad (1963, CMU Alum Ivan Sutherland) Glove Keyboard (1960) Knee Operated Pointers (1960) Touch Screen (1965) Mouse (1964-7) Input TaxonomiesJCR Licklider Man-Computer Symbiosis, HCI ResearcherLecture 1Class Questions What is HCI? What is UX? Why do we care?Class Challenges Make 5 progress bars and try to see if your participants can guess what % full they areIntro Everything has a design criteria and is done within a context HCI: Human: End user/Other people in org/Surrounding Culture Context Computer: Hardware/Software Interaction: User tells computer what it wants, Computer communicates results 3 Legged Stool Analogy (Components of HCI): Computer Science, Design, Behavioral SciencesDesign Myths! Good Design is just cool graphics Good Design is just common sense We can fix the interface at the end (USPS card reader example, and adult swim video about guy trying to use auto mail thing). Marketing takes care of understanding customer needs(There are 5 more we don’t talk about)Why is Good Design Important? 50% of work developing Bad user interfaces cause loss of money, reputation, time, security, lives! UX IS KING hardware isn’t a differentiating factor anymore How do we make good interfaces? Iterative Design (waterfall is eww) Great ideas are often simple: Mouse, Guis, Touchscreens, Emoticons, Hyperlinks, Good ideas stick around: Wheel & Axle, String/Rope/Shoes, Beds, Doors Physical & Human factors change slowly! Culture and tech change alot! (Look at examples of badly designed UIs)Homework: Decorate your tile! … and get markers"
} ,
{
"title" : "Psych Foundations for Designing Impact in HCI Readings",
"category" : "",
"tags" : "",
"url" : "/reading%20papers/2016/01/13/the-post-8956/",
"date" : "2016-01-13 00:00:00 +0000",
"content" : " “A psychologically “embedded” approach to designing games for prosocial causes”“A psychologically “embedded” approach to designing games for prosocial causes”Geoff Kaufman, Mary FlanaganQuestion: How can we engage people with real life scenarios and key societal issues without triggering psychological defenses?One sentence answer: Use methods to hide the message: (1) Intermix on and off topic content, (2) Use game genrres or framing devices to “direct players’ attention/expectations away from the games true aims”“Low Level” Notes:Intro Games have a lasting impact on society Focus on negative impact of games has leaded inconclusive results, hence recent efforts have also looked at the potential for prosocial attitudes to be instilled Other (less successful) approaches Making the user informed. (Turns out this doesnt necessarily cause positive impact). Directness can trigger defenses that blunt persuasiveness or inspire beliefs counter to intended outcome. Embedded Design The Awkwardness Game used obfuscating to reduce stereotypes and bias in STEM domains.Study 1A: Testing effectiveness of Intermixed Strategy Test Method: 309 participants from Middle/High Schools in New England in mixed gender groups. Results Measured using (1) Assigning scientist role to one of 3 female characters, and (2) Rating set of 5 responses to 5 situations with an overt target of biasStudy 1B: Intermixed vs Imbalanced versions Test Method: 232 youths (middle/high school) to Intermixed, Inbalanced, control condition (5,9,0 overtly biased-related cards). Results measured using (1) Degree which someone else can read a drawing of an E on their forehead (2) Perceived measure of sarcasm in a statement.The Buffalo Game: Given a noun and adjective identify a real/fictitious person with those in order to collect cards. (Some interesting pairings: tattooed visionary, saintly merchant)Study 2A: Effectiveness of Obfuscating Test Method: 193 College students assigned to a game/no game of buffalo. Results measured using (1) “list 4 social identity groups important to them (gender, race, ethnicity, religion, profession, hobby group, etc …) then rate how similar the avg member of each group is to the avg member of the other groups from 1 - 9 (extremely similar) these then avged. Lower similarity = higher social identity complexity. (2) Universal Orientation Scale: 20 statements they (1) strongly disagree to (9) strongly agreeStudy 2B: Additional Evidence for 2A’s goal Test Method: same as 2A (201 students) Results measured using (1) Internal Motiation to Repsond without Prejudice Scale.Other Strategies Distancing, Embodied Cognition, Priming, Strategic inversion, Delayed revealGeneral Discussion/Conclusion Embedded Design provides complementary methods, also the idea of precursor gamesQuestions: So wouldn’t you get different biases from the college student population regardless of them playing Buffalo - the no game condition is surprising. Why is the framing part sort of squished at the end of 2B? More “incorrect” uses would be nice / bad scenarios.Interesting Phrases: “Safe space” of perceiving content in “Party” Games."
} ,
{
"title" : "Systems Design Notes",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/08/the-post-5518/",
"date" : "2016-01-08 00:00:00 +0000",
"content" : "General General Paradigms (Reflection) Usernames when logging inScaling Up-Counting Objects-View Counting at Reddit-ELI5 Load Balancing OSComprehensive and biaised comparison of OpenBSD and FreeBSDCloud- Try considering GCE over AWS for in-between region streaming, also significant time-to-first-byte difference and different long-term-cold-storage use cases TimeList of Critical DatesDistributed Use epoll/kqueue not select/poll as they are more scalable CAP is kind of a lie [1] [2] Distributed Systems for New Entrants UUIDs dont have timestamps and mobile UUIDs are badApp Architecture / Ops The 12 Factor AppPerformance Fiddling C Performance Tips Linux Perf + PMC PerformanceText Edge Cases to Keep in Mind. Part 1 – TextRecommenders Two Decades of Recommender Systems at Amazon.comDatabases Large Table PaginationScaling Humans My Heroku values- Adam Wiggins (Heroku Cofounder)Compilation https://github.com/donnemartin/system-design-primerUX https://thestyleofelements.org/the-art-of-the-error-message-9f878d0bff80"
} ,
{
"title" : "Fun "Facts"",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/07/fun-facts/",
"date" : "2016-01-07 00:00:00 +0000",
"content" : "News (2013) China’s parliament: has 83/3000 Billionaries, who after campaigns against extravagance are even more convinced of the need to be within the political tent [1]“This is largely due to the firm’s unusual approach to two dimensions of corporate life. The first of these is time. In an era when executives routinely whinge about pressure to produce short-term results, Amazon is resolutely focused on the distant horizon. Mr Bezos emphasises continual investment to propel its two principal businesses, e-commerce and Amazon Web Services (AWS), its cloud-computing arm.” fromInteresting The suffix -path means Used to form nouns indicating someone with a particular disorder Used to form nouns indicating someone with a particular capability, as a type of remedial treatment There aren’t really “different learning styles”, most people learn similarly [1][2] Hospital Unions exist, and doctors are being outsourced CRISPR was really hard to get published The Zeigarnik Effect “is the tendency to experience intrusive thoughts about an objective that was once pursued and left incomplete” There’s fields called music cognition and affective computing"
} ,
{
"title" : "Tools",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/07/Cool-Tools/",
"date" : "2016-01-07 00:00:00 +0000",
"content" : "Something like an annotated link list for things that could be helpful when developing/designingDesignFuseTools: UI markup language with responsive realtime edits across devicesPrincipleSites for stuffCSPen Test Tools Cheat SheetNematus: a Toolkit for Neural Machine Translation"
} ,
{
"title" : "Interesting Links",
"category" : "",
"tags" : "",
"url" : "/misc/2016/01/01/InterestingLinks/",
"date" : "2016-01-01 00:00:00 +0000",
"content" : "Courses http://schoolofherring.com/videos/ Startup School MOOC Coursera/EDX/UdacityCool Tech Interactive Gym Wall Server room with seismic isolation floor Sorting Legos with NNs Building a Better Dev ChromebookLegal Saved By Supreme Court Alice Ruling (Patent Troll Case Studies) EFF Supreme Court is allergic to MathLife Skills How a car works guide Busy Person patternsReading LeVar Burton Reads Short StoriesHobbies World’s largest library of historical European martial arts booksBusiness https://exponents.co/twilio-market-opportunities-risks/ https://www.wsj.com/articles/the-downside-of-full-pay-transparency-1502676360Humanities + Social SciencesEconomics https://www.gamasutra.com/blogs/RaminShokrizade/20130405/189984/How_I_Used_EVE_Online_to_Predict_the_Great_Recession.phpMathPopularA Mathematician’s LamentSet Theory Arithmetic Representability Constant Time Math (Rotations)Encyclopedic/Lookup/Reference The Matrix CookbookApplied Vickrey Auctions @ Pricing KeyboardsCSDB POSTGRES QUERY PLAN VISUALIZATIONDev Ops ELI5 KerberosASM Visual ARM EmulatorCompilers Growing a Compiler (Self Hosting)FS-ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparisonComp Fi INSIGHTS INTO HIGH FREQUENCY TRADING FROM THE VIRTU INITIAL PUBLIC OFFERINGWebdev CSS AnimationsPL Bootstrapping a Type system Blog: GHC is getting Linear Types A deep dive into Multicore OCaml garbage collectorC Comparing LibC alternativesML/AI Visualizing Caffe Neural Nets Few points on props of Deep Learning that can be trained in Automating Software Development using logic + AI DeepMind teaches itself to walkAI Commercialization Vertical AI Startups“Big Data” Categorized Software PackagesSoftware Packages Stanford Driving SoftwareStartups/YComb Why YCombinator made a differenceLibraries How Libraries Remove BooksNews Trending Github Projs How Ridehailing Impacts Public Transport atlasobscura, quartz, theconversationGeneral Technology/Engineering A Camshaft-Free Engine (Koenigsegg) (Video)Github Projs Markdown->Presentations Tiny Example Renderer Neural DoodlerInfographics2011 Marketing Tech CompaniesDesignProportional vs Lining; Old Style vs Tabular; Right align your tabular data1 2Schoolism Art ClassesWebsites w/o CodingWebflowNews ArticlesA lawyer that spent his career suing DuPont over PFOA-water contaminationWhat (CS) Tech to useWhy not to use Scala - Learning OverheadHiring Considerations when hiring millennialsFood [What It Actually Costs to Open a Restaurant in San Francisco](https://sf.eater.com/2017/6/27/15733554/cost-open-restaurant-robin-adam-tortosa-san-francisco]Physics How to become a GOOD Theoretical PhysicistPhilosophy-Time is a causal arrowInternet Classes/Courses/Univ Linkshttps://github.com/prakhar1989/awesome-courseshttp://courses.cms.caltech.edu/cs179/http://ai.berkeley.edu/home.htmlBlogs (without RSS feeds :( )http://codahale.com/http://www.evanmiller.org/index.htmlhttp://danwang.co/http://elijames.org/Videos/Documentarieshttp://www.hbo.com/documentaries/only-the-dead-see-the-end-of-war/synopsis/about.htmlGuidesMIT Lock Picking GuideLearn a Websec http://chall.tasteless.eu/#History Esperanto as an Asian LanguageEnvironmental Science Toxicity Map of US: NIHBallroom http://www.ballroomguide.com/workshop/latin/cha_cha/three_cha_chas_fwd_back.htmlTech Talks Kafka Mgmt @ LI"
} ,
{
"title" : "15110 Notes/Explanations",
"category" : "",
"tags" : "",
"url" : "/misc/2015/12/26/15110Links/",
"date" : "2015-12-26 00:00:00 +0000",
"content" : "A collection of notes/exercises I made while TAing 15110.Practice ProblemsLab Exam 1 PracticeNotesDictionaries ExplainedEntropyHow To Use Gedit/Terminal"
} ,
{
"title" : "Reading List",
"category" : "",
"tags" : "",
"url" : "/books/2015/12/25/ReadingList/",
"date" : "2015-12-25 00:00:00 +0000",
"content" : "Find More Likehttps://en.wikipedia.org/wiki/Elizabeth_Loftus#The_memory_warsYCombinator LinksGPU Text RenderingDesign Massive Change Draplin Design CoPresentations http://www.pdl.cmu.edu/SDI/2015/slides/DatacenterComputers.pdf Crash course in x86 for Reverse Engineers AGI General Intelligence (Karpathy) Theses Algebraic Subtyping Group theoretical methods in machine learningReports McKinsey: State of AI in 2017 Type Systems - Luca CardelliPapers https://news.ycombinator.com/item?id=10783983 2010 CMU Big Data Reading Group Doom 3 Network Architecture ETH Zurich Systems Group Fast Userspace Packet Processing (click) The Structure and Performance of Efficient Interpreters TACOTRON: A FULLY END-TO-END TEXT-TO-SPEECH SYNTHESIS MODEL SILT: A Memory-Efficient, High-Performance Key-Value Store Image Super-Resolution Using Deep Convolutional Networks Approximation by Superpositions of a Sigmoidal Function Deep biomarkers of human aging: Application of deep neural networks to biomarker development Memories of unethical actions become obfuscated over time ARRAY LAYOUTS FOR COMPARISON-BASED SEARCHING Writing parsers like it is 2017 Infiniswap: Efficient Memory Disaggregation MAKING HUMANS A MULTI-PLANETARY SPECIES cGAN-based Manga Colorization Using a Single Training Image On-the-Fly Garbage Collection: An Exercise in Cooperation (Djikstra,Lamport) Natural Language Thm Prover [A comprehensive study of Convergent and Commutative Replicated Data Types] http://hal.upmc.fr/file/index/docid/555588/filename/techreport.pdf) BitFunnel: Revisiting Signatures for SearchAI/CNN/ML PAPERS Learning to Generate Reviews and Discovering Sentiment Developing Bug-Free Machine Learning Systems With Formal Mathematics Fast Regex Generation using NNs Google’s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation Learning Transferable Architectures for Scalable Image Recognition Towards Biologically Plausible Deep Learning Machine Learning: An Applied Econometric ApproachLiskov’s “Must Read” For Computer Scientists (from here)Dijkstra, E. W. (1968). Letters to the editor: go to statement considered harmful.Communications of the ACM, 11(3), 147-148. Wirth, N. (1971). Program development by stepwise refinement. Communications of the ACM, 14(4), 221-227. Parnas, D. L. (1971). Information distribution aspects of design methodology. Dahl, O. J., & Hoare, C. A. R. (1972). Chapter III: Hierarchical program structures (pp. 175-220). Academic Press Ltd.. Morris Jr, J. H. (1973). Protection in programming languages. Communications of the ACM, 16(1), 15-21. Liskov, B., & Zilles, S. (1974, March). Programming with abstract data types. In ACM Sigplan Notices (Vol. 9, No. 4, pp. 50-59). ACM. Liskov, B. H. (1972, December). A design methodology for reliable software systems. In Proceedings of the December 5-7, 1972, fall joint computer conference, part I (pp. 191-199). ACM. Blog Posts http://danluu.com/perf-tracing/ Twitter’s DB: Manhattan Linux Networking Stack Data Structures for External Memory & Cambridge CS Notes Variational Encoders How does GDB Work? Intro To Galois Theory Category Theory for Programmers An Adversarial Review of “Adversarial Generation of Natural Language” Danny Britz, Google Brain Resident Writing a Formally-Verified Porn Browser in Coq and Haskell Li Haoyi, Dropbox Lead/Fluent Tech Graphs not grids: How caches are corrupting young algorithms designers and how to fix it Mathy Vanhoef: Windows MAC Address Randomization Transit and Peering: How your requests reach GitHub What do economists do at Tech Firms? A few CTF/Bug Bounty ReportsBooksArt The Story of Art (E.H. Gombrich)Business Machine That Changed the World Yes, And: How Improvisation Reverses “No, But” Thinking and Improves Creativity and Collaboration–Lessons from The Second CityCooking The Sci of Good CookingCog Psy Cog Psy PsychoPharmMedical Huangdi Neijing - Ancient Chinese Medical TextTypography http://practicaltypography.com/Math Calculus Made Easy STREET-FIGHTING MATHEMATICS An Introduction to the Theory of Elliptic Curves Mathematics for Physics A Computable Universe: Understanding and Exploring Nature as Computation Georgia Tech Online Math Textbook Collection (Prof Cain) Uminnesota Textbook Collection American Institute of Math Textbook Collection Warren Siegal’s Upper Level Physics Books (Stonybrook QFT Group) American Math Society Lecture Notes Open Access Game Theory BookDescriptive Set TheoryLife of Godel (from U&I class) Music Music, Thought, and Feeling: Understanding the Psychology of Music 5 Books on WagnerAutonomous Cars Whats new in Auto Vehicle Verification (2017 Stuttgart Symposium)Being a Professor “What do academics do all day”?(The academic’s art of work)CSArchitecture Risc V workshop ProcSystems Software Optimization Linux Graphics Demystified What Every Programmer should know about Memory - Ulrich Drepper The Linux Programming Interface: A Linux and UNIX System Programming Handbook Unix Hater’s Guide Compiler Construction - ETH Zurich High Performance Browser Networking - W3C Cochair Linux Device Drivers - O’Reilly The Art of Multiprocessor Programming Reverse Engineering Malware Memory Efficient Java Study (PLDI09) System-level Recap of C + ASM Interface Ask HN: Primer on Cryptocurrencies Ask HN: modern computer graphics? Ask HN: Learn Computer vision? Automated TradingTheory CS Guide to Cell Biology - CMU’s Cohen Information Theory - Cambridge’s MacKay http://stackoverflow.com/questions/1711/what-is-the-single-most-influential-book-every-programmer-should-read Applied Crypto Guide - Waterloo Decision Procedures - Oxford Building Problem Solvers - Northwestern Okasaki’s Thesis/FP book - CMU thesis Making of PPT (Creator of Startup) Theory of Distributed Systems, Randomized Algos, Computational Complexity - Yale Thirty-three Miniatures: Mathematical and Algorithmic Applications of Linear Algebra Theoretical Computer Science: An Introduction (Univ Saarland) Bitcoin and Cryptocurrency TechnologiesGraphics Dithering Algorithmshttps://www.jyotirmoy.net/posts/2015-12-29-springer-openaccess.htmlCompetitive Prog https://cses.fi/book.pdfOther People’s Reading Lists https://gist.github.com/macintux/6227368 https://gist.github.com/stfairy/4076899 https://gist.github.com/nickloewen/10565777 https://github.com/junhyukoh/deep-reinforcement-learning-papers http://dancres.github.io/Pages/ Ask HN: Primer on Cryptocurrencies Fermat’s Library Ask HN: Good Papers for Beginners https://www.anmolsarma.in/post/books-2015/Tutorials How to make an OS Write your own blockchainother Lasers FAQ List of “Awesome Things” including papers Ask HN: What language-agnostic programming books should I read?Business Who Says Elephants Can’t Dance? (IBM Turnaround)Courses Stat Learning Theory - 281B (Jordan) Digital Photography - Stanford Ask HN: What are the best MOOCs you’ve taken?History https://www.nytimes.com/2016/10/02/opinion/sunday/if-i-sleep-for-an-hour-30-people-will-die.htmlJobPM https://hackernoon.com/acing-your-product-manager-interview-e4f163408cefCompensation http://fortune.com/2016/09/27/the-complete-guide-to-understanding-equity-compensation-at-tech-companies/TODOTO Read Eventuallyhttp://plindenbaum.blogspot.com/2012/11/visualizing-dependencies-of-makefile.htmlhttp://linux.die.net/lkmpg/x769.html [read write a proc file]https://events.linuxfoundation.org/sites/events/files/slides/petazzoni-device-tree-dummies.pdfhttps://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2012/september/details-on-the-crime-attack/http://googleprojectzero.blogspot.com/http://wifi-insider.com/wlan/wmm.htm (wmm/802.11 primer)https://fgiesen.wordpress.com/2014/07/07/cache-coherency/ (cpu cache coherency) and"
} ,
{
"title" : "Books To Acquire",
"category" : "",
"tags" : "",
"url" : "/books/2015/12/25/BooksToGet/",
"date" : "2015-12-25 00:00:00 +0000",
"content" : "Springer books(automatically generated)ISBN ISBN Author(s) Title 10.1007%2F978-1-4615-0215-9 by Joseph I. Goldstein, Dale E. Newbury, Patrick Echlin, David C. Joy, Charles E. Lyman, Eric Lifshin, Linda Sawyer, Joseph R. Michael. Scanning Electron Microscopy and X-ray Microanalysis 10.1007%2F978-3-642-55631-9 Lineare Algebra 10.1007%2F978-3-642-72555-5 by Helmut J. Fischbeck, Kurt H. Fischbeck. Formulas, Facts and Constants for Students and Professionals in Engineering, Chemistry, and Physics 10.1007%2F978-94-011-6022-3 Albert Einstein ; with a new foreword by W. H. McCrea. The meaning of relativity DX Dois DOI Title “10.1007%2Fb114222” Advanced Organic Chemistry-Part 1 “10.1007%2Fb114293” Advanced Organic Chemistry-Part 2 “10.1007%2Fb97397” Principles of Terrestrial Ecosystem Ecologye "
} ,
{
"title" : "Intro to Disk Drive Modeling",
"category" : "",
"tags" : "",
"url" : "/storage%20systems/2015/12/01/IntroToDiskDriveModeling/",
"date" : "2015-12-01 00:00:00 +0000",
"content" : "“An Introduction to Disk Drive Modeling” - Ruemmler and WilkesQuestion: How good are disk drive simulation models?Result: Demonstrates and describes a calibrated, highquality disk drive model in which the overall error factor is 14 times smaller than that of a simple first order modelTrends 40-60% microprocessor speedups / yearModern Drive Characteristics State of the art in nonremovable magnetic disk drives with SCSI (small computer systems interconnect) controllers Disk Drives have: Mechanism: Recording components (disks / heads) and positioning components (assembly that moves heads & track following system) Controller: Manages storage and retrieval of data from mechanism and performs logical address -> physical sector mappings In Depth time #####Recording: Disk Sizes: 1.3-8” diameter [2.5, 3.5, 5.25 common] Smaller disk = less {surface area, data}, less{ power, seek distance}, spin faster As storage density increases, people prefer smaller disks Increased storage density means: Better Linear Recording Density : 50k bits/pinch. Determined by max rate of flux changes Packing Data Tracks closer: 2.5k tracks/inch Single disk has 1-12 platters spinning in lockstep 3600-7200 rpm Single r/w data channel that switches between heads that encodes/decodes data stream to magnetic phase changes Multichannel disks are costly because of cross talk between concurrently active channels and keeping heads aligned simultaneously#####Positioning: Data stored as concentric circles (tracks) Stack of tracks $k away on all platters is a cylinder 3.5 inch disk ~ 2k cylinders Data accessed by disk head over track All disk arms are attached to same rotation pivot Positioning system ensures head gets to the desired track and stays there no matter what external factors: e.g. vibrations, shocks, disk flaws Seek time ~ power^2 & Arm’s Stiffness (30-40g accelerations to achieve good seek times, and flexible arms can twist) pg5 "
} ,
{
"title" : "Evolution of Google FS Talk",
"category" : "",
"tags" : "",
"url" : "/talks/storage%20systems/2015/11/23/GFS-Talk/",
"date" : "2015-11-23 00:00:00 +0000",
"content" : "Google - Larry Greenfield lfg@google?Evolution of Google FS Storage Run in datacenters petabyte of free space? gfs 2002 location indep namespace 100’s of tb - scaled to 10s of PB userspace, no POSIX semantics (not atomics) reading/writing file at same time not a great idea simple design, good for large batch work GFS Masters hold state of filesystem 3 way chunking replication Files <-> Chunk Mapping Clients talk to GFS master first, then data next Only one GFS master (primary) and backups GFS Write: Open includes location of first/last chunk FindLockHolder if additional chunks are needed Buffer sends data to chunk server Write commits buffers to disk, Chunk server sends things to chunks This daisy chaining is great for networks Accelerations shadow masters - read only lagging replicas multiple GFS cells per chunk server (scale metadata - manual sharding) automatic master election / consistent replication archival reed-solomon encoding must be first written replicated might have long pauses when reading From internal GFS 101 Slides: What is GFS Bad for Predictable performance (No guarantee of latency, no operation timeouts) Structured Data (GFS is filename -> blob data store) Random Writes (Optimized for parallel append) High Availability (fault tolerant not HA) architectural problems GFS Master: One machine not large enough for a large FS Single bottleneck for metadata ops GFS Semantics Unclear state of files when not consensus? (missed slide) Some GFS v2 Goals Bigger, faster, predictable performance, predictable tail latency GFS Master replaced by Colossus GFS chunkserver replaced by D Solve an easier problem : Optimize for bigtable File system for bigtable append ony single writer rename only to indicate finished file no snapshots directories unnecessary Where to put metadata? Storage options back then GFS- BIgtable (sorted kv store on GFS) Sharded MySQL with local disk & replication ads db Local kv store with Paxos Replication Authentication DB Chubby Metadata in Bigtable (!?) GFS master -> CFS CFS Curators are bigtable coprocessors bigtable row corresponds to a single file stripes are replication groups: open, closed, finalized (replication unit) And then I had to leave for an interview :("
} ,
{
"title" : "Types and Programming Language Book Notes",
"category" : "",
"tags" : "",
"url" : "/books/2015/11/22/TypesAndProgLanguages/",
"date" : "2015-11-22 00:00:00 +0000",
"content" : "Author & Citations to Benjamin Pierce @ Univ. of Pennsylvania#1##1.1 Types in CS Formal methods vs Lightweight Formal Methods E.g. Hoare Logic vs Model Checkers A type system is a tractable syntactic method for proving the absence ofcertain program behaviors by classifying phrases according to the kindsof values they compute…A type system can be regardedas calculating a kind of static approximation to the run-time behaviors of theterms in a program. (Moreover, the types assigned to terms are generally calculatedcompositionally, with the type of an expression depending only onthe types of its subexpressions.) Type systems are conservative and can prove some behaviors don’t exist, not that they do.##1.2 Why Type Systems? Detecting Errors Strength depends on expressiveness of typechecker e.g. You can do dimension analysis Abstraction Module Languages Documentation and clues about purpose of code Language Safety “Safe Language is one that protects its own abstractions” "
} ,
{
"title" : "Storage Systems Readings",
"category" : "",
"tags" : "",
"url" : "/storage%20systems/2015/09/07/StorageSystems/",
"date" : "2015-09-07 00:00:00 +0000",
"content" : "Week 1Disk Modeling"
} ,
{
"title" : "Init",
"category" : "",
"tags" : "",
"url" : "/2015/09/06/Init/",
"date" : "2015-09-06 00:00:00 +0000",
"content" : "blog init"
}
,
{
"title" : "404 - Page not found",
"category" : "",
"tags" : "",
"url" : "/404/",
"date" : "",
"content" : "Sorry, we can’t find that page that you’re looking for. You can try take for a look by going back to the homepage."
} ,
{
"title" : "About",
"category" : "",
"tags" : "",
"url" : "/about/",
"date" : "",
"content" : "Hi!Study: Past: Carnegie Mellon Present: UC Berkeley, Stanford, CCSFBuilds things at < tech company >Contact meName is intentionally confusingEmail: https://mailhide.io/e/9YzxH"
} ,
{
} ,
{
} ,
{
} ,
{
} ,
{
} ,
{
"title" : "Simple-Jekyll-Search",
"category" : "",
"tags" : "",
"url" : "/bower_components/simple-jekyll-search/",
"date" : "",
"content" : "Simple-Jekyll-Search====================[](https://travis-ci.org/christian-fei/Simple-Jekyll-Search)A JavaScript library to add search functionality to any Jekyll blog.---idea from this [blog post](https://alexpearce.me/2012/04/simple-jekyll-searching/#disqus_thread)---### Promotion: check out [Pomodoro.cc](https://pomodoro.cc/)# [Demo](http://christian-fei.github.io/Simple-Jekyll-Search/)# Getting started- Place the following code in a file called `search.json` in the **root** of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:```------[ {% for post in site.posts %} { "title" : "{{ post.title | escape }}", "category" : "{{ post.category }}", "tags" : "{{ post.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ post.url }}", "date" : "{{ post.date }}" } {% unless forloop.last %},{% endunless %} {% endfor %}]```- configure the library ( [options](#options) )### Enabling full-text searchNote that the index generated in `search.json` does not include the posts' content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts' content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add```"content" : "{{ post.content | strip_html | strip_newlines }}"```to `search.json` after the `"date"` line to which you must add a comma (`,`).# Install with bower```bower install simple-jekyll-search```# SetupYou need to place the following code within the layout where you want the search to appear.For example in **_layouts/default.html**:``````# OptionsCustomize SimpleJekyllSearch by passing in your configuration options:```SimpleJekyllSearch({ searchInput: document.getElementById('search-input'), resultsContainer: document.getElementById('results-container'), json: '/search.json',})```The above initialization needs to occur after the inclusion of `jekyll-search.js`.### searchInput (Element) [required]The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.### resultsContainer (Element) [required]The container element in which the search results should be rendered in. Typically an ``.### json (String|JSON) [required]You can either pass in an URL to the `search.json` file, or the results in form of JSON directly, to save one round trip to get the data.### searchResultTemplateThe template of a single rendered search result.The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.E.g.The template```{title}```will render to the following```Welcome to Jekyll!```If the `search.json` contains this data```[ { "title" : "Welcome to Jekyll!", "category" : "", "tags" : "", "url" : "/jekyll/update/2014/11/01/welcome-to-jekyll.html", "date" : "2014-11-01 21:07:22 +0100" }]```### noResultsTextThe HTML that will be shown if the query didn't match anything.### limitYou can limit the number of posts rendered on the page.### fuzzyEnable fuzzy search to allow less restrictive matching.### excludePass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).## Enable full content search of posts and pages- Replace 'search.json' with the following code:```---layout: null---[ {% for post in site.posts %} { "title" : "{{ post.title | escape }}", "category" : "{{ post.category }}", "tags" : "{{ post.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ post.url }}", "date" : "{{ post.date }}", "content" : "{{ post.content | strip_html | strip_newlines }}" } {% unless forloop.last %},{% endunless %} {% endfor %} , {% for page in site.pages %} { {% if page.title != nil %} "title" : "{{ page.title | escape }}", "category" : "{{ page.category }}", "tags" : "{{ page.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ page.url }}", "date" : "{{ page.date }}", "content" : "{{ page.content | strip_html | strip_newlines }}" {% endif %} } {% unless forloop.last %},{% endunless %} {% endfor %}]```### If search isn't working due to invalid JSON- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use `remove_chars` as a filter.For example: in search.json, replace```"content" : "{{ page.content | strip_html | strip_newlines }}"```with```"content" : "{{ page.content | strip_html | strip_newlines | remove_chars | escape }}"```##Browser supportBrowser support should be about IE6+ with this `addEventListener` [shim](https://gist.github.com/eirikbacker/2864711#file-addeventlistener-polyfill-js)# Dev setup- `npm install` the dependencies.- `gulp watch` during development- `npm test` or `npm run test-watch` to run the unit tests#License##MIT licensedPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the 'Software'), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
} ,
{
} ,
{
}
]
If search isn’t working due to invalid JSON
- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use
remove_chars
as a filter.
For example: in search.json, replace
"content" : "Simple-Jekyll-Search====================[](https://travis-ci.org/christian-fei/Simple-Jekyll-Search)A JavaScript library to add search functionality to any Jekyll blog.---idea from this [blog post](https://alexpearce.me/2012/04/simple-jekyll-searching/#disqus_thread)---### Promotion: check out [Pomodoro.cc](https://pomodoro.cc/)# [Demo](http://christian-fei.github.io/Simple-Jekyll-Search/)# Getting started- Place the following code in a file called `search.json` in the **root** of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:```------[ {% for post in site.posts %} { "title" : "{{ post.title | escape }}", "category" : "{{ post.category }}", "tags" : "{{ post.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ post.url }}", "date" : "{{ post.date }}" } {% unless forloop.last %},{% endunless %} {% endfor %}]```- configure the library ( [options](#options) )### Enabling full-text searchNote that the index generated in `search.json` does not include the posts' content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts' content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add```"content" : "{{ post.content | strip_html | strip_newlines }}"```to `search.json` after the `"date"` line to which you must add a comma (`,`).# Install with bower```bower install simple-jekyll-search```# SetupYou need to place the following code within the layout where you want the search to appear.For example in **_layouts/default.html**:``````# OptionsCustomize SimpleJekyllSearch by passing in your configuration options:```SimpleJekyllSearch({ searchInput: document.getElementById('search-input'), resultsContainer: document.getElementById('results-container'), json: '/search.json',})```The above initialization needs to occur after the inclusion of `jekyll-search.js`.### searchInput (Element) [required]The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.### resultsContainer (Element) [required]The container element in which the search results should be rendered in. Typically an ``.### json (String|JSON) [required]You can either pass in an URL to the `search.json` file, or the results in form of JSON directly, to save one round trip to get the data.### searchResultTemplateThe template of a single rendered search result.The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.E.g.The template```{title}```will render to the following```Welcome to Jekyll!```If the `search.json` contains this data```[ { "title" : "Welcome to Jekyll!", "category" : "", "tags" : "", "url" : "/jekyll/update/2014/11/01/welcome-to-jekyll.html", "date" : "2014-11-01 21:07:22 +0100" }]```### noResultsTextThe HTML that will be shown if the query didn't match anything.### limitYou can limit the number of posts rendered on the page.### fuzzyEnable fuzzy search to allow less restrictive matching.### excludePass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).## Enable full content search of posts and pages- Replace 'search.json' with the following code:```---layout: null---[ {% for post in site.posts %} { "title" : "{{ post.title | escape }}", "category" : "{{ post.category }}", "tags" : "{{ post.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ post.url }}", "date" : "{{ post.date }}", "content" : "{{ post.content | strip_html | strip_newlines }}" } {% unless forloop.last %},{% endunless %} {% endfor %} , {% for page in site.pages %} { {% if page.title != nil %} "title" : "{{ page.title | escape }}", "category" : "{{ page.category }}", "tags" : "{{ page.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ page.url }}", "date" : "{{ page.date }}", "content" : "{{ page.content | strip_html | strip_newlines }}" {% endif %} } {% unless forloop.last %},{% endunless %} {% endfor %}]```### If search isn't working due to invalid JSON- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use `remove_chars` as a filter.For example: in search.json, replace```"content" : "{{ page.content | strip_html | strip_newlines }}"```with```"content" : "{{ page.content | strip_html | strip_newlines | remove_chars | escape }}"```##Browser supportBrowser support should be about IE6+ with this `addEventListener` [shim](https://gist.github.com/eirikbacker/2864711#file-addeventlistener-polyfill-js)# Dev setup- `npm install` the dependencies.- `gulp watch` during development- `npm test` or `npm run test-watch` to run the unit tests#License##MIT licensedPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the 'Software'), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
with
"content" : "Simple-Jekyll-Search====================[](https://travis-ci.org/christian-fei/Simple-Jekyll-Search)A JavaScript library to add search functionality to any Jekyll blog.---idea from this [blog post](https://alexpearce.me/2012/04/simple-jekyll-searching/#disqus_thread)---### Promotion: check out [Pomodoro.cc](https://pomodoro.cc/)# [Demo](http://christian-fei.github.io/Simple-Jekyll-Search/)# Getting started- Place the following code in a file called `search.json` in the **root** of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:```------[ {% for post in site.posts %} { "title" : "{{ post.title | escape }}", "category" : "{{ post.category }}", "tags" : "{{ post.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ post.url }}", "date" : "{{ post.date }}" } {% unless forloop.last %},{% endunless %} {% endfor %}]```- configure the library ( [options](#options) )### Enabling full-text searchNote that the index generated in `search.json` does not include the posts' content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts' content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add```"content" : "{{ post.content | strip_html | strip_newlines }}"```to `search.json` after the `"date"` line to which you must add a comma (`,`).# Install with bower```bower install simple-jekyll-search```# SetupYou need to place the following code within the layout where you want the search to appear.For example in **_layouts/default.html**:``````# OptionsCustomize SimpleJekyllSearch by passing in your configuration options:```SimpleJekyllSearch({ searchInput: document.getElementById('search-input'), resultsContainer: document.getElementById('results-container'), json: '/search.json',})```The above initialization needs to occur after the inclusion of `jekyll-search.js`.### searchInput (Element) [required]The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.### resultsContainer (Element) [required]The container element in which the search results should be rendered in. Typically an ``.### json (String|JSON) [required]You can either pass in an URL to the `search.json` file, or the results in form of JSON directly, to save one round trip to get the data.### searchResultTemplateThe template of a single rendered search result.The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.E.g.The template```{title}```will render to the following```Welcome to Jekyll!```If the `search.json` contains this data```[ { "title" : "Welcome to Jekyll!", "category" : "", "tags" : "", "url" : "/jekyll/update/2014/11/01/welcome-to-jekyll.html", "date" : "2014-11-01 21:07:22 +0100" }]```### noResultsTextThe HTML that will be shown if the query didn't match anything.### limitYou can limit the number of posts rendered on the page.### fuzzyEnable fuzzy search to allow less restrictive matching.### excludePass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).## Enable full content search of posts and pages- Replace 'search.json' with the following code:```---layout: null---[ {% for post in site.posts %} { "title" : "{{ post.title | escape }}", "category" : "{{ post.category }}", "tags" : "{{ post.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ post.url }}", "date" : "{{ post.date }}", "content" : "{{ post.content | strip_html | strip_newlines }}" } {% unless forloop.last %},{% endunless %} {% endfor %} , {% for page in site.pages %} { {% if page.title != nil %} "title" : "{{ page.title | escape }}", "category" : "{{ page.category }}", "tags" : "{{ page.tags | join: ', ' }}", "url" : "{{ site.baseurl }}{{ page.url }}", "date" : "{{ page.date }}", "content" : "{{ page.content | strip_html | strip_newlines }}" {% endif %} } {% unless forloop.last %},{% endunless %} {% endfor %}]```### If search isn't working due to invalid JSON- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use `remove_chars` as a filter.For example: in search.json, replace```"content" : "{{ page.content | strip_html | strip_newlines }}"```with```"content" : "{{ page.content | strip_html | strip_newlines | remove_chars | escape }}"```##Browser supportBrowser support should be about IE6+ with this `addEventListener` [shim](https://gist.github.com/eirikbacker/2864711#file-addeventlistener-polyfill-js)# Dev setup- `npm install` the dependencies.- `gulp watch` during development- `npm test` or `npm run test-watch` to run the unit tests#License##MIT licensedPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the 'Software'), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
##Browser support
Browser support should be about IE6+ with this addEventListener
shim
Dev setup
-
npm install
the dependencies. -
gulp watch
during development -
npm test
ornpm run test-watch
to run the unit tests
#License ##MIT licensed Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the ‘Software’), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED ‘AS IS’, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.