Simple-Jekyll-Search

Simple-Jekyll-Search

Build Status

A JavaScript library to add search functionality to any Jekyll blog.


idea from this blog post


Promotion: check out Pomodoro.cc

Demo

Getting started

  • Place the following code in a file called search.json in the root of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:
---
---
[
  
    {
      "title"    : "Psych 11 Theories Of Personality",
      "category" : "",
      "tags"     : "",
      "url"      : "/2020/02/06/psych-11-theories-of-personality/",
      "date"     : "2020-02-06 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Intro Social Psych",
      "category" : "",
      "tags"     : "",
      "url"      : "/2019/07/21/intro-social-psych/",
      "date"     : "2019-07-21 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Professor Reading",
      "category" : "",
      "tags"     : "",
      "url"      : "/2019/05/16/professor-reading/",
      "date"     : "2019-05-16 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Intro To Economic Research",
      "category" : "",
      "tags"     : "",
      "url"      : "/2019/03/11/intro-to-economic-research/",
      "date"     : "2019-03-11 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Intro Public Health",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2019/03/04/intro-public-health/",
      "date"     : "2019-03-04 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Intro Sociology",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2019/02/18/intro-sociology/",
      "date"     : "2019-02-18 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Random Berk Classes",
      "category" : "",
      "tags"     : "",
      "url"      : "/2018/02/16/random-berk-classes/",
      "date"     : "2018-02-16 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Hpts Keynote Pat Helland",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/talks/2017/10/02/hpts-keynote-pat-helland/",
      "date"     : "2017-10-02 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Grad Advanced Operating Systems & Distrib. Systems Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2016/09/09/Advanced-Operating-Systems-Notes/",
      "date"     : "2016-09-09 00:00:00 +0000"
    } ,
  
    {
      "title"    : "MapR Talk",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/talks/2016/03/22/mapr-talk-march-22-2016/",
      "date"     : "2016-03-22 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Build-A-Thing",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/27/build-a-thing/",
      "date"     : "2016-01-27 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Presentation Tricks",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/26/presentation_tricks/",
      "date"     : "2016-01-26 00:00:00 +0000"
    } ,
  
    {
      "title"    : "How I read",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/14/the-post-8931/",
      "date"     : "2016-01-14 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Mobile Health Readings",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/14/the-post-8999/",
      "date"     : "2016-01-14 00:00:00 +0000"
    } ,
  
    {
      "title"    : "How I read",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/14/the-post-8931/",
      "date"     : "2016-01-14 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Designing Human Centered Systems Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2016/01/14/the-post-2300/",
      "date"     : "2016-01-14 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Psych Foundations for Designing Impact in HCI Readings",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/13/the-post-8956/",
      "date"     : "2016-01-13 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Systems Design Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/08/the-post-5518/",
      "date"     : "2016-01-08 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Fun "Facts"",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/07/fun-facts/",
      "date"     : "2016-01-07 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Tools",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/07/Cool-Tools/",
      "date"     : "2016-01-07 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Interesting Links",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/01/InterestingLinks/",
      "date"     : "2016-01-01 00:00:00 +0000"
    } ,
  
    {
      "title"    : "15110 Notes/Explanations",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2015/12/26/15110Links/",
      "date"     : "2015-12-26 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Reading List",
      "category" : "",
      "tags"     : "",
      "url"      : "/books/2015/12/25/ReadingList/",
      "date"     : "2015-12-25 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Books To Acquire",
      "category" : "",
      "tags"     : "",
      "url"      : "/books/2015/12/25/BooksToGet/",
      "date"     : "2015-12-25 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Intro to Disk Drive Modeling",
      "category" : "",
      "tags"     : "",
      "url"      : "/storage%20systems/2015/12/01/IntroToDiskDriveModeling/",
      "date"     : "2015-12-01 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Evolution of Google FS Talk",
      "category" : "",
      "tags"     : "",
      "url"      : "/talks/storage%20systems/2015/11/23/GFS-Talk/",
      "date"     : "2015-11-23 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Types and Programming Language Book Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/books/2015/11/22/TypesAndProgLanguages/",
      "date"     : "2015-11-22 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Storage Systems Readings",
      "category" : "",
      "tags"     : "",
      "url"      : "/storage%20systems/2015/09/07/StorageSystems/",
      "date"     : "2015-09-07 00:00:00 +0000"
    } ,
  
    {
      "title"    : "Init",
      "category" : "",
      "tags"     : "",
      "url"      : "/2015/09/06/Init/",
      "date"     : "2015-09-06 00:00:00 +0000"
    } 
  
]
  • configure the library ( options )

Note that the index generated in search.json does not include the posts’ content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts’ content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add

"content"  : ""

to search.json after the "date" line to which you must add a comma (,).

Install with bower

bower install simple-jekyll-search

Setup

You need to place the following code within the layout where you want the search to appear.

For example in _layouts/default.html:

<!-- Html Elements for Search -->
<div id="search-container">
<input type="text" id="search-input" placeholder="search...">
<ul id="results-container"></ul>
</div>

<!-- Script pointing to jekyll-search.js -->
<script src="/bower_components/simple-jekyll-search/dest/jekyll-search.js" type="text/javascript"></script>

Options

Customize SimpleJekyllSearch by passing in your configuration options:

SimpleJekyllSearch({
  searchInput: document.getElementById('search-input'),
  resultsContainer: document.getElementById('results-container'),
  json: '/search.json',
})

The above initialization needs to occur after the inclusion of jekyll-search.js.

searchInput (Element) [required]

The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.

resultsContainer (Element) [required]

The container element in which the search results should be rendered in. Typically an <ul>.

json (String|JSON) [required]

You can either pass in an URL to the search.json file, or the results in form of JSON directly, to save one round trip to get the data.

searchResultTemplate

The template of a single rendered search result.

The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.

E.g.

The template

<li><a href="{url}">{title}</a></li>

will render to the following

<li><a href="/jekyll/update/2014/11/01/welcome-to-jekyll.html">Welcome to Jekyll!</a></li>

If the search.json contains this data

[

    {
      "title"    : "Welcome to Jekyll!",
      "category" : "",
      "tags"     : "",
      "url"      : "/jekyll/update/2014/11/01/welcome-to-jekyll.html",
      "date"     : "2014-11-01 21:07:22 +0100"
    }

]

noResultsText

The HTML that will be shown if the query didn’t match anything.

limit

You can limit the number of posts rendered on the page.

fuzzy

Enable fuzzy search to allow less restrictive matching.

exclude

Pass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).

Enable full content search of posts and pages

  • Replace ‘search.json’ with the following code:
---
layout: null
---
[
  
    {
      "title"    : "Psych 11 Theories Of Personality",
      "category" : "",
      "tags"     : "",
      "url"      : "/2020/02/06/psych-11-theories-of-personality/",
      "date"     : "2020-02-06 00:00:00 +0000",
      "content"  : "Chapter 3 : AdlerBook:  Overview of Individual Psychology          individual psychology presents an optimistic view of people while resting heavily on the notion of social interest, that is, a feeling of oneness with all humankind      Freud reduced all motivation to sex and aggression      Adler saw people as being motivated mostly by social influences and by their striving for superiority or success      Freud assumed that people have little or no choice in shaping their personality      Adler believed that people are largely respon- sible for who they are      Freud’s assumption that present behavior is caused by past experiences was directly opposed to Adler’s notion that present behavior is shaped by people’s view of the future      in contrast to Freud, who placed very heavy emphasis on unconscious components of behavior, Adler believed that psychologically healthy people are usually aware of what they are doing and why they are doing it        Biography of Alfred Adler          Competed with his brother even when famous      Became a physician because of his experiences with death      not great friends with Freud; also said that physical deficiencies—not sex— formed the foundation for human motivation (diff from Freud)        Introduction to Adlerian Theory          The one dynamic force behind people’s behavior is the striving for success or superiority.      People’s subjective perceptions shape their behavior and personality.      Personality is unified and self-consistent.      The value of all human activity must be seen from the viewpoint of social interest.      The self-consistent personality structure develops into a person’s style of life.      Style of life is molded by people’s creative power.        Striving for Success or Superiority          The Final Goal      The Striving Force as Compensation      Striving for Personal Superiority      Striving for Success        Subjective Perceptions          Fictionalism      Physical Inferiorities        Unity and Self-Consistency of Personality          Organ Dialect      Conscious and Unconscious        Social Interest          Origins of Social Interest      Importance of Social Interest        Style of Life  Creative Power  Abnormal Development          General Description      External Factors in Maladjustment  	- Exaggerated Physical Deficiencies                  Pampered Style of Life          Neglected Style of Life                    Safeguarding Tendencies  	- Excuses                  Aggression          Withdrawal                    Masculine Protest  	- Origins of the Masculine Protest                  Adler, Freud, and the Masculine Protest                    Applications of Individual Psychology  	- Family Constellation                  Early Recollections          Dreams          Psychotherapy                    Related Research      Mini Lecture:  Human beings propelled by the Striving Force for Superiority          1) Push to overcome inferiority      2) Pull toward becoming a whole and complete person      Pull towards whole makes you feel inferior but then push makes you work harder        Adler Personal Life          Physical weakness + poor health      Felt less capable than brother, but driven as a result      Trying to strive for improvement        Unhealthy Superiority: Personal Superiority          seeks validation by insisting others notice his accomplishments      doesn’t care who he hurts to get that validation      looks for compliments and admiration      tries to bring the attention back to himself        Healthy Superiority (Success)          measuring accomplishments according to their own feelings of satisfaction and growth      innate but must be developed; At birth a potential not an actuality      Children early as 4/5 start looking for final goal to lead them to superiority.  	- Final goal comes about as result of creative power                  Creativity works in conjunction with heredity (brains/skills/talents) + environment (opportunities/encouragement/feedback) to help create final goal                    Final goal shapes our behaviors (result of trying to reach this final goal) and hence creates personality        Final Goal          two possibilities for Final Goal: striving for Personal Superiority (which is unhealthy) or striving for Success (which is healthy)        4/5 yo’s with Preliminary Goals          “Fictions”: ideas that have no objective reality to them      Preliminary goals guide a person’s life regardless of their ability to provide what the person thinks these Goals will provide. They will build on these further (“style of life”).Law of the Low Doorway  Your Goals toward Superiority are ineffective, but you can’t see past your rigidity and you continue to use them  to achieve Superiority, you must be able to adjust your Goals in response to the feedback you’re getting - you need to learn from your experiencesHealthy Superiority  absolute support towards a child’s growth AND a model for a constructive response to disappointment and “failure”  Contrast that to an environment in which a child striving for Superiority encounters jeering and put-downs. Such a child may actually work extra hard to prove his abilities and reach success. Unfortunately, he is angry and resentful for the lack of encouragement in his life, and he will replicate that model of human interaction as he moves toward Personal Superiority.Chapter 4TBDChapter 2 : FreudMini Lecture  Freud’s theory focuses on intrapsychic development - looking at how we carry issues from the past and how these issues affect our behaviors today as adults.  Freud’s theory = Psychoanalytic theory != Psychodynamic = June  Freud: the human mind has 3 levels of awareness:          the Conscious  	- thoughts and feelings we can articulate      the Preconscious  	- holding area for Unconscious thoughts that seek expression at the Conscious      the Unconscious                  hidden sexual and aggressive impulses - particularly the kind of feelings and thoughts that we don’t want to acknowledge in our lives                      Freud aligned with Darwin: we are genetically designed to seek survival          2 Unconscious motivations pushes to growth or survival      Motivation 1: Eros  	- libido; procreate/survive      Motivation 2: Thanatos  	- life destroying                  seek sex (survival). “Kill off competitors”                      Freudian theory: in order to push an anxiety-producing thought back into the Unconscious, the average person will say and/or do things so frantically that his (or her) behavior can be inappropriate or self-destructive  cathected: spending a lot of your life-giving energy pushing these feelings back down into the Unconscious  The more your libido is cathected, the less life-giving energy you have available to move forward in your lifeBook Overview  Overview of Psychoanalytic Theory          Sex and Aggression are really popular      Freud’s proselytizers were very good at spreading it      Freud is a really good speaker        Biography of Sigmund Freud  Levels of Mental Life          Unconscious      Preconscious      Conscious        Provinces of the Mind          The Id      The Ego      The Superego        Dynamics of Personality          Drives                  Sex          Aggression                    Anxiety        Defense Mechanisms          First talked about it in 1926.      Normal but can lead to compulsive/neurotic behavior.      Principal Defense Mechanisms:                  Repression          Reaction Formation          Displacement          Fixation          Regression          Projection          Introjection          Sublimation                      Stages of Development          Infantile Period                  Oral Phase          Anal Phase          Phallic Phase                          Female Oedipus Complex              Male Oedipus Complex                                          Latency Period      Genital Period      Maturity        Applications of Psychoanalytic Theory          Freud’s Early Therapeutic Technique      Freud’s Later Therapeutic Technique      Dream Analysis      Freudian Slips        Related Research          Unconscious Mental Processing      Pleasure and the Id, Inhibition and the Ego      Repression, Inhibition, and Defense Mechanisms      Research on Dreams        Critique of Freud          Did Freud Understand Women, Gender, and Sexuality?      Was Freud a Scientist?        Concept of Humanity  Key Terms and ConceptsSigmund Freud  people searching for a magic drug to lessen pain, he found cocaine  tied to psychoanalysisChapter 1  word “personality” originated from the Latin persona  personality: a pattern of relatively permanent traits and unique characteristics that give both consistency and individuality to a person’s behavior  Traits: contribute to individual differences in behavior, consistency of behavior over time, and stability of behavior across situations  Characteristics: unique qualities of an individual that include such attributes as temperament, physique, and intelligence  taxonomy : a classification of things according to their natural relationshipsTheoretical Perspectives on Personality:  Psychodynamic Theories          importance of early childhood experience and on relationships with parents as guiding forces that shape personality development      traditionally used dream inter- pretation to uncover the unconscious thoughts, feelings, and impulses as a main form of treatment of neurosis and mental illness.      After Freud, these theorists moved away from the importance of sexuality and more toward social and cultural forces.        Humanistic-Existential Theories          people strive toward meaning, growth, well-being, happi- ness, and psychological health      Existential theorists assume that not only are we driven by a search for meaning, but also that negative experiences such as failure, awareness of death, death of a loved one, and anxiety, are part of the human condition and can foster psychological growth        Dispositional Theories          unique and long-term tendencies to behave in particular ways are the essence of our personality      five main trait dimensions in human personality        Biological-Evolutionary Theories          Behavior, thought, feelings, and personality are influenced by differences in basic genetic, epigenetic, and neurological systems between individuals.        Learning-(Social) Cognitive Theories          All behaviors are learned through association and/or its consequences (whether it is reinforced or punished). To shape desired behavior we have to understand and then establish the conditions that bring about those particular behaviors.      psychology of science :look at personal traits of scientists. The psychology of science studies both science and the behavior of scientists;Dimensions for a Concept of Humanity:Personality theories differ on basic issues concerning the nature of humanity  determinism versus free choice  pessimism versus optimism  causality versus teleology          causality holds that behavior is a function of past experiences, whereas teleology is an explanation of behavior in terms of future goals or purposes        conscious versus unconscious determinants of behavior  biological versus social influences on per- sonality  uniqueness versus similaritiesreliability: of a measuring instrument is the extent to which it yields consistent results.Validity : the degree to which an instrument measures what it is supposed to measure.  Personality psychologists are  concerned with two types of validity:          construct validity  	- Construct validity is the extent to which an instrument measures some hypothetical construct                  Constructs such as extraversion, aggressiveness, intelligence, and emotional stability have no physi- cal existence; they are hypothetical constructs that should relate to observable behavior.          Three important types of construct validity: 	- convergent validity  	- A measuring instrument has convergent construct validity to the extent that scores on that instrument correlate highly (converge) with scores on a variety of valid measures of that same construct                          divergent validity  	- An inventory has divergent construct validity if it has low or insignificant correlations with other inventories that do not measure that construct                                  For example, an inventory purporting to measure extraversion should not be highly correlated with social desirability, emotional stability, honesty, or self-esteem.                                            discriminant validity  	- an inventory has discriminant validity if it discriminates between two groups of people known to be different.                                  For example, a personality inventory measuring extraversion should yield higher scores for people known to be extraverted than for people known to be introverted                                                                        predictive validity  	- extent that a test predicts some future behavior      Quotes / test probably sourced from https://www.amazon.com/Duane-P-Schultz-Theories-Personality/dp/B00HTK3WWM"
    } ,
  
    {
      "title"    : "Intro Social Psych",
      "category" : "",
      "tags"     : "",
      "url"      : "/2019/07/21/intro-social-psych/",
      "date"     : "2019-07-21 00:00:00 +0000",
      "content"  : "Module 2 - Behavior, Attitudes, Culture, Attraction, and IntimacyChapter 5: Attitudes Behavior + Persuasion  How the Obama Campaign Effectively Used Persuasion to Defeat John McCain          Online Cognitive + Emotional Persuasive Appeals      attitude inoculation: technique in which he warned his supporters that an ad attacking him would be coming, at the same time reminding them of ways to counterargue the ad.        ABCs of social psychology—affect, behavior, and cognition  Theories: self-perception theory and cognitive dissonance theory5.1Objectives1. Define the concept of attitude and explain why it is of such interest to social psychologists.2. Review the variables that determine attitude strength.3. Outline the factors affect the strength of the attitude-behavior relationship.  attitude: relatively enduring evaluation of something  Some attitudes are more genetically predispositioned  attitudes via cognitive, affective, behavioral components. Shaped by inherited, experiences, media, friends and can be shared or individual.  attitude strength: importance of attitude (via how quickly comes to mind)  attitudes can be increased via reinforcement and are even better when the ABC (affect/behavior/cognition) line up  attitude consistency: attitudes tend to guide behavior  The theory of planned behavior (Ajzen, 1991; Fishbein &amp; Ajzen, 1975): important variables that affected the attitude-behavior relationship:          some factors summarized:  	- When attitudes are strong, rather than weak  	- When we have a strong intention to perform the behavior  	- When the attitude and the behavior both occur in similar social situations                  When the same components of the attitude (either affect or cognition) are accessible when the attitude is assessed and when the behavior is performed          When the attitudes are measured at a specific, rather than a general, level          For low self-monitors (rather than for high self-monitors)                          Usually strong attitudes =&gt; strong intentions    Attitude-Behavior Consistency:          Important the affective vs the cognitive factor more accessible: eg Cognitive vs Affective factors for liking a strawberry jam brand        Self-monitoring: individual differences in the tendency to attend to social cues and to adjust one’s behavior to one’s social environment5.2Summary Takeaways  Advertising is effective in changing attitudes, and principles of social psychology can help us understandwhen and how advertising works.  Social psychologists study which communicators can deliver the most effective messages to which types ofmessage recipients.  Communicators are more effective when they help their recipients feel good about themselves. Attractive,similar, trustworthy, and expert communicators are examples of effective communicators.  Attitude change that occurs over time, particularly when we no longer discount the impact of a lowcredibility communicator, is known as the sleeper effect.  The messages that we deliver may be processed either spontaneously or thoughtfully. When we areprocessing messages only spontaneously, our feelings are more likely to be important, but when we processthe message thoughtfully, cognition prevails.  Both thoughtful and spontaneous messages can be effective, in different situations and for different people.  One approach to improving an individual’s ability to resist persuasion is to help the person create a strongattitude. Procedures such as forewarning and inoculation can help increase attitude strength and thus reducesubsequent persuasion.  Taken together, the evidence for the effectiveness of subliminal advertising is weak, and its effects may belimited to only some people and only some conditions.Module 1 - Intro, Self + BeliefsTextbook: https://open.lib.umn.edu/socialpsychology/"
    } ,
  
    {
      "title"    : "Professor Reading",
      "category" : "",
      "tags"     : "",
      "url"      : "/2019/05/16/professor-reading/",
      "date"     : "2019-05-16 00:00:00 +0000",
      "content"  : "http://people.eecs.berkeley.edu/~bjoern/  https://arxiv.org/abs/1708.03786          Refazer Pt 2: Feedback design system guidelines        https://link.springer.com/chapter/10.1007/11678816_22          Design space of conversation agents        http://up.csail.mit.edu/other-pubs/soylent.pdf          In the loop word processing        https://www.researchgate.net/publication/332745318_Heimdall_A_Remotely_Controlled_Inspection_Workbench_For_Debugging_Microcontroller_Projects          Remote debug + smart board        http://vis.berkeley.edu/papers/eden/          Multitouch to make 3d video sets for pixar videos; Found fingers imprecise, gestures are nice, and it’s easier to sculpt        https://escholarship.org/uc/item/55m5773x          tl;dr async messaging api/proxy using a javascript library enabled by an embedded device and a mobile device serving as a message proxy to the internet        https://people.eecs.berkeley.edu/~bjoern/papers/heimerl-umati-chi2012.pdf          snacks for expert community work @ cs grading        http://vis.berkeley.edu/papers/protonPlusPlus/protonPlusPlus-UIST2012.pdf          touch events recognized via regex language        https://dl.acm.org/citation.cfm?id=2984552          in person comments tend to be easier      nice because you get sync’d comments to the video and mostly the relevant parts of the video; also accountability for changes/comments        https://bid.berkeley.edu/files/papers/dow-shepherd-cscw2012.pdf          Having crowd workers assess themselves and have a rubric to do so leads to better work        https://dl.acm.org/citation.cfm?id=3053187          How to design teacher hints for programming feedback      "
    } ,
  
    {
      "title"    : "Intro To Economic Research",
      "category" : "",
      "tags"     : "",
      "url"      : "/2019/03/11/intro-to-economic-research/",
      "date"     : "2019-03-11 00:00:00 +0000",
      "content"  : "When I forget to bring my notebook to class and have to take notes on laptop :(March 11 2019Replication Exercise (GSI Stephanie Bonds)Intro  We’re learning how to do regressions  Replicate: The Colonial Origins of Comparative Development  Fact: Differences in income/paita and other measures of economic performance across countries  Research Q: Effect of institions on economic performance? Hypothe: Better instititions achieve higher levels of income/capitaPremises  Diffrerent colonization policies had diff effects on the development of institioutions          Extractive states (eg Belgian Congo) transferred resources colony -&gt; host      Neo Europes: replicate European institions /w property rights        Feasibility of particular seattlementinfluenced colonization strategy (eg more disease prevalence more likely to become “extractive state”  Large body of literature that settler mortality rates were key determinant of European settlement. (eg Pilgrims -&gt; US instead Guyana b/c more mortality in latter)  Sources of mortality (eg yellow fever and malaria)  differentiatly affected European settlers          Natives had higher resistance        Theory (potential): setler mortality -&gt; settlements -&gt; early institutions -&gt; current institions -&gt; current performanceData  Current econ performanc/capita = 1995  Current/past instititional qualitylook at slides because i fell asleep because literally reading the paper on a projecter"
    } ,
  
    {
      "title"    : "Intro Public Health",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2019/03/04/intro-public-health/",
      "date"     : "2019-03-04 00:00:00 +0000",
      "content"  : "Week 14: Intentional and Unintentional InjuriesGoalsDefine  Unintentional injuries are those that occur without a person intending to cause harm  Intentional injuries are the result of a deliberate use of violenceWeek 13: Environmental Health including Climate Change  waste is badWeek 12: Healthcare Delivery, Insurance and Health PolicyBy the end of this module, you should be able to  Describe the eligibility requirements in general terms, and compare the coverage, of three long-standing public health insurance systems: Medicaid (Medi-Cal, in California); Medicare; and CHIP.  Discuss briefly the history of healthcare in the United States and how it is evolving.  Describe the basic characteristics of Healthy San Francisco program and how it differs from health insurance.  Contrast different solutions to provision of healthcare based on insurance system (e.g., mixed public-private system in the U.S., national system in U.K., single-payer system in Canada, and regulated private system in Germany)  Characterize the spectrum of healthcare delivery, including public health practice; medical practice; long-term care or practice; and end-of-life care or practice.  Give examples of healthcare providers and distinguish their roles, including whether they can practice independently (as medical doctors and oestopaths can, for example) or under the supervision of a provider with higher training; whether they practice in allopathic medicine or alternative/complementary medicine; and generally what they do, as a doctor, nurse, physician’s assistant, allied health or public health professional.  Describe different types of healthcare facilities and their functions (inpatient, outpatient, acute care, long-term care).  Identify some major concerns with the health care system in the United States.  Discuss the various ways of reimbursing health care providers, including the concept of insurance.  Explain what a health insurance policy is, including terms like deductible, co-insurance, copayment (copay), fixed indemnity, exclusion, and pre-existing condition.  Define managed care (e.g, HMO or PPO) and discuss some of the advantages and disadvantages of managed care.  Define the terms health maintenance organization (HMO), preferred provider organization (PPO), and point-of-service option.  Discuss what the Affordable Care Act, or ACA (“Obamacare”) does and how it works.  Describe Covered California, the healthcare marketplace or exchange set up under the ACA in California.  Describe the legal challenges to the law and the Supreme Court decision that upheld the ACA (in basic terms), as well as recent legal challenges that still may reshape the ACA.  Compare the ACA with the proposed Republican replacement legislation – while the Republican bills in 2017 failed in the Senate and therefore did not become law, there are new promises from the Republican administration to replace the ACA, so some of these same ideas may be revived.  Identify ways that the implementation of the ACA is changing under the Trump Administration, even while the ACA remains in effect.Part 1 : 12.3 Lesson: Healthcare Delivery  Safety Net Providers serve un/under insured / public health insurance  Healthy SF: SF’s Health Access Program for uninsured SF Residents.  socialized medicine: healthcare system that provides universal access (healthcare for everyone) and whose payment system is directly or indirectly controlled by the government.  US fairly unique in it’s healthcare “system”.  UK (national healthcare), Canada (single payer insurance), Germany/Switzerland/Netherlands ( privately run health insurance + providers )          ACA 2010: Extends coverage, curbs health insurance abuse, initiate QoC improvements        Lack of insurance (2012 - 47m+ uninsured)  Medicare: All citizens/legal residences &gt; 65yr, who worked enough hours to be eligible; includes care, hospitalizations, prescription drugs. Some disabled condition coverage. Federal Government  Medicaid (California: Medi-Cal): Low income, some disabled conditions; medical care/hospitalization/some dental/some inhome. Part fed gov, admin by states.  CHIP (California: Healthy Families): Health insurance for children in familiies with income too high to qualify for Medicaid/MediCal but still under a certain amount. State Admin.Week 11: Alcohol, Tobacco and Other DrugsGoalsBy the end of this module, students will be able to  Identify personal and community consequences of alcohol and other drug abuse.  Describe the trends of alcohol and other drug use by high school students, and by the US population as as whole.          Drug use is increasing      Highest among people in their late teens and twenties        Define drug use, misuse, abuse and dependence.  List and discuss risk factors for the abuse of alcohol and other drugs.  Explain why alcohol is considered the number one drug abuse problem in the United States (even though tobacco causes more deaths, in the long run).  Describe the health risks of tobacco.  Define the terms over-the-counter drugs, prescription drugs, controlled substances, and illicit (illegal) drugs, and provide examples.  List and explain four elements of drug abuse prevention and control: education, treatment, public policy and enforcement.  Give an example of primary, secondary, and tertiary prevention activities in drug abuse prevention and control programs.  Summarize the federal government’s drug abuse control efforts (at least, as they are summarized in ICPH).  List and describe an effective community-based drug abuse prevention program and an effective school-based drug abuse prevention program.  Discuss examples of substance abuse prevention and treatment programs, including workplace prevention programs, voluntary health agencies and self-help support groups.  Discuss abstinence and harm reduction as two different frameworks, and some of the different approaches to the treatment of addiction.  Discuss some negative health effects of the “war on drugs”  Discuss the drivers of the opioid epidemic and its effectsDrug Abuse SpecificsSix Major Groups of Abused Drugs  Anabolic Steroids  Club Drugs/Designer Drugs  Dissociative (Detachment) Drugs  Illicit Opiates/Narcotics  Illicit Stimulants  Psychedelic (Mind-Altering) DrugsAnabolic Steroids (roids, juice, gym candy, pumpers)Synthetic versions of the hormone testosterone.Effects : No intoxication, easier to grow muscleAdministration: Injected, swallowed, Applied to skinDangers: Aggression, Cancer, Heart disease, Stunted growth; Males:   prostate cancer, reduced sperm production, shrunken testicles, breast enlargement; Females: menstrual irregularities, development of beard and other masculine characteristicsClub Drugs/Designer DrugsDrugs in this category tend to be used by young adults at bars, concerts, nightclubs, and parties.This class is especially dangerous as some are used in kidnappings, sexually assault, and rape.EffectsIncreased awareness of senses, Mild hallucinations, Increased tactile sensitivity, Empathic feelingsAdministration MethodsSwallowed, Snorted, InjectedDangersAnxiety, Chills, Sweating, Muscle cramping, Sleep disturbances, Depression, Impaired memory, Fatal overdosesDissociative (Detachment) DrugsThese are drugs that give a person the feeling of being separate from their body and environment.EffectsAnalgesiaNumbnessHallucinationsAdministration MethodsSwallowedSmokedInjectedDangersAnxietyTremorsMemory lossNauseaPsychosisAggressionViolenceSlurred SpeechIllicit OpiatesOpiates are a group of HIGHLY addictive drugs from the poppy plant.They are used as pain relievers, anesthetics, and sedatives.Illegal use of prescription opiates are considered illicit opiates.HeroinEffectsEuphoriaDrowsinessAdministration MethodsInjectedSmokedSnortedSwallowedDangersImpaired coordinationSedationSlowed or arrested breathingBloodborne diseases such as hepatitis &amp; HIVAddictionFatal overdosesIllicit StimulantsThese are substances that excite the activity of the brain. eg. Cocaine, Amphetamines, MethamphetaminesEffectsHyperactivity/talkativenessIncreased energy &amp; alertnessReduced appetiteAdministration MethodsSnorted (cocaine only)SmokedInjectedSwallowedDangersAnxietyIrritabilitySuspiciousnessInsomniaIncreased heart beatHeart attackFatal overdosePsychedelicsThese drugs alter your way of thinking and how you see the world.  They can be broken up into:  Cannabinoids (marijuana, hashish)  Hallucinogens (LSD)MarijuanaEffectsEuphoriaRelaxationDistorted Sensory PerceptionAdministration MethodsSmokedSwallowedDangersImpaired Learning &amp; MemoryPanic AttacksLung InfectionsLower Testosterone Levels and Sperm NumbersIn pregnant women, it affects the fetus and results in developmental difficulties in the childHashishActive Ingredient: plant resins from Cannabis Plant(Boom, Gangster, Hash, Hash Oil, Hemp)EffectsEuphoriaRelaxationSlowed reaction timeDistorted sensory perceptionImpaired balance and coordinationAdministration MethodsSmokedSwallowedDangersIncreased heart rate and appetiteImpaired learning &amp; memoryAnxietyPanic attacksPsychosis/coughFrequent respiratory infectionsLSD - Lysergic Acid Diethylamide(Acid, Blotter, Cubes, Microdot, Yellow Sunshine, Blue Heaven)EffectsAltered states of perception and feelingHallucinationsAdministration MethodsSwallowedAbsorbed through mouth tissueDangersImpulsive behaviorFlashbacksHallucinationsChronic mental disordersEmerging TrendsBath SaltsThe term “bath salts” refers to an emerging family of drugs containing one or more synthetic chemicals similar to an amphetamine-like stimulant found naturally in the Khat plant.  Remember, these are NOT for human consumption.Krokodil (desomorphine)This flesh eating opioid is similar to heroin but has gained attention due to the major damage it causes to veins and soft tissues in the body.Week 10: Health of Racial/Ethnic Populations, Cultural Competency &amp; Cultural HumilityWeek 9: Older AdultsWeek 8: Midterm and Obesity debateDefine  healthy: [18.5, 24.9] BMI  overweight: [25,29.9] BMI  obese: [30,infinity) BMI  Body Mass Index: ratio of height to weightDiscuss  Obesity Debate  the scientific disagreement about the health impacts of increased size  Good nutrition                            = 5 servings fruit/veg /day. Lean proteins, more whole grains, water                      Physical activity benefits          any activity that Enhances your overall fitness and well-being. E.g. walking to the store for pt. of milk or gardening      Benefits:Reducing stress, improving digestion, Increasing blood flow, Lowering blood pressure, improve flexibility, heart health, more.      CDC Recommends &gt;= 1 hr/day, 30m/day adults        Public health strategies for increasing access to good nutrition and physical activity through community level changes          eg Ban fast food, penalize parents of obese kids, tax soda      Obesity Bad View: American Weight Trends  On average increasing  Majority of Americans are overweight/obese  Health Inequities:          More likely obese: Women -&gt; Men; African Am, Latino, Native Ams, Pac. Islanders -&gt; Whites/Asians; Lower Income -&gt; Higher Income (except African Am/Latino where higher income -&gt; more risk of obesity).        Overweight/Obese Increased risk: Coronary heart disease, Type 2 diabetes, Cancers (endometrial, breast, and colon), Hypertension (high blood pressure), Dyslipidemia (for example, high total cholesterol or high levels of triglycerides), stroke, … and moreObesity = Fatphobia and distracting from real issues View  Dangers of increased size exaggerated  Estimates of negative health impacts flawed. Also possible to be fat + fit/ thin + unfit  Suggest widespread cultural bias against fat people  Arguments they make:          Same period The average weight increased deaths from heart disease stroke decreased life expectancy grown      CDC Study: Overweight category longer life expectancy of the normal rate      overweight: Greater risk for diabetes + high blood pressure but lower risk osteoporosis/other conditions      By stigmatizing Thought we make fat peoples healthcare worse e.g. postponing visits to doctors      Health At Every Size alternative paradigm  “Except at statistical extremes, body mass index (BMI) - or amount of body fat - only weakly predicts longevity. Most epidemiological studies find that people who are overweight or moderately obese live at least &gt;= long as normal weight people  Analysis of the National Health and Nutrition Examination Surveys I, II, and III, … determinedthat greatest longevity was in the overweight category  Americans’ Changing Lives study: “when socioeconomic and other risk factors are controlled for, obesity is not a significant risk factor for mortality; and… for those 55 or older, both overweight and obesity confer a significant decreased risk of mortality.”  Obesity Paradox: Obesity associated with longer survival in many diseases  Assumption: Fat is significantly morbidity risk (causation less established)  Weight cycling (lose,gain pretty common): Results in increased inflammation + lots of other things  Type 2 Diabetes: Increasing evidence of poverty and marginalization more strongly associated type 2 diabeters, than conventional factors such as weight diet or activity  Assumption: Weight loss prolong life. Evidence: Most observational studies suggest weight loss (in obese indiv.) increases risk of premature death  Assumption: Anyone can lose weight and keep it off. Evidence: Long-term follow-up studies document majority of individuals regain most weight even if maintain diet/exercise program  Assumption: Weight loss is a good goal. But: weight cycling risk to health, loss of bone mass, increased psych stress/cortisol, stigma/discrimination  Assumption: Only way to improve health is to lose weight. But: so few people lose + keep off weight. Unknown if obese Individual weight loss reduces disease risk to same level As those who never obese. Most health indicators improved by changing health behaviors  Danger of Focus on overweight/obesity: Overtesting healthy overweight, Undertesting unhealthy thin. Negative body image is a health risk.  Health At Every Size: Encourages body Acceptance as opposed to weight-loss/Maintenance          Reliance on internal processes such as hunger vs diets      Supports active embodiments (joyful movement) vs structured exercise      Results: Improved eating habits, more frequent/sustainable physical activity, decreased depression, increased metabolic health      Obesity Contributors  Sleep debt, Changes in breast feeding, Average maternal age (older mom correlates more obese child), Epigenetics (environment in utero affects genes), Heating/cooling (body spends less energy), Certain Pharmaceuticals, Cyclical dieting, Discrimination.7 Health status by Age – of adolescents, young adults, and adultsDefine  risk factor: rait, behavior or condition associated with a higher probability of disease or injury  protective factor: trait, behavior or condition associated with a lower probability of disease or injury/ faster recovery rate  Adolescence: generally described as puberty to maturityGoals  Explain why it is important for community health workers to be aware of the different health concerns of the various age groups in the United States.Many health beliefs, attitudes, and behaviors are adopted and consolidated during adolescence.  Define by age the groups of adolescents, young adults, and adults.Adolescents and young adults - ages 10-24 yearsAdults - ages 25-64 yearsAges 15-64 considered most productive years      Briefly describe key demographic characteristics of adolescents and young adults          (2010) 10-24 yr ~ 25% US Pop      Increasingly diverse: (2012) 55% non-hispanic white -&gt; 44% (2050)      &lt; 18 single parent home ⬆️            Explain what the Youth Risk Behavior Surveillance System (YRBSS) and the Behavioral Risk Factor Surveillance System (BRFSS) are and what type of data they generate.        Provide a brief behavioral risk profile for adolescents, young adults (including those attending college), and adults.          High Schoolers:  	- unintentional injuries: seat belt/bicycle helmet/motorcycle helmet use, Drinking+Driving/riding with drunk driver                  violence: weapons, dating violence, physical fights, forced sexual activity, bullying, suicide ideation/attempts          tobacco: Widespread @ highschoolers: majority dependent before 18. smokeless tobacco          alcohol: experimentation @ [15-24]          drugs: 20% @ marijuana, 20% unprescribed drugs; others (cocaine…)          sex: Unintended Pregnancy + STD ~50% hs’ers; Improving rates @ contraceptives          Physical activity/sedentary: lack concerning. Males more likely &gt; females; Screen time risk factor; physical activity linked to positive outcomes          Overweight: ⬆️ concern for age group. Risk factor @ chronic disease. rise in rate (steady @ 2011-; 17% overweight/obese). Dieting through unhealthy means + eating disorders.                    College students:  	- unintentional injuries, violence, tobacco, alcohol/drugs, unint. pregnancies/STDs                  vs peers: ⬆️ alcohol abuse, ⬇️violence          protective factors e.g. school connectedness, community service          main issue: alcohol.                    Adults:  	-  25 to 64: leading cause cancer:  	- men: prostate, lung, and colorectal cancer      - women: breast, lung, and colorectal cancer      - 85% lung cancer ~ smoking                  Also Cardiovascular diseases leading cause of death                          Outline the health profiles for the various age groups, listing the major causes of mortality, morbidity, and risk factors for each group (for example, list the 3 leading causes of death, the most common causes of illness or injury, and at least 4 leading risk factors for each group).          Most health threats are behavior not disease      3/4 mortality: injuries (motor vehicle crashes, homicide, suicide); Health disparities by race/gender/social class      Adolescents/Young Adults highest risk @ STDs (~50%)            Give examples of community health strategies for improving the health status of adolescents, young adults, and adults, including the use of health screenings and health promotion.          College students @ Alcohol:                  Change the social norms about alcohol          Community-wide measures          Sustained over time          Foster institutional changes          Involve youth and young adults in finding and creating solutions to problematic alcohol use                            Secondary Prevention: Screening high risk populations. eg hypertension, diabetes, cholesterol            Primary, secondary, and tertiary prevention programs  a. Exercise and nutrition programs (primary prevention)  b. Self or clinical screenings (secondary prevention)  c. Medication compliance (tertiary prevention)      @seattle washington health care authority primary care:  	- zumba, food, doctor, help /w healthcare system, help /w languages            Discuss tobacco control and prevention, including examples of strategies used to reduce tobacco use, as a means of improving adult health. While the diseases associated with tobacco usually start in adulthood, tobacco use usually starts in adolescence, so many prevention strategies address adolescents and young adults, to preserve adult health.          Widespread @ highschoolers: majority dependent before 18. smokeless tobacco.      Campaigns /w an effect  	- Lawsuits (which have attained limits on tobacco marketing practices and funded prevention efforts with money taken from the tobacco industry)                  Taxes (by changing the cost)          Limits on sales to minors, and limits on where tobacco can be sold          Smoking bans in public spaces (eg ccsf is tobacco free)          Media campaigns:  	- The Truth Campaign: highlighted manipulation of youths by companies                    Tobacco use:  	- varies by age: younger is less now                  low income, less education more likely to use          highest in Native American                          Discuss e-cigarette usage and vaping of nicotine products as an emerging public health epidemic          Considered an epidemic. 20% of hs’ers. 75% high s growth, 50% middle s growth      produce ultra fine particles. not harmless.      Misc:  The racial/ethnic group of high school students most likely to report current cigarette usage is: white americans6 Maternal and Child HealthMaternal and Child Health is one of the oldest disciplines within public healthGoals  Define maternal, infant and child healthMaternal, Infant, and Child Health (MIC/MCH) focuses on the health of women of childbearing age - from pre-pregnancy through pregnancy, labor, delivery, and the postpartum period - and that of the child prior to birth through adolescence. A particular attention is placed on the perinatal period - the period just before pregnancy, during pregnancy and birth, and up through the first year of the infant’s life.  Explain the importance of maternal, infant and child health as indicators of society’s health  MIC/MCH indicates effectiveness of disease prevention and health promotion services  Healthy community = healthy moms + babies  good Early childhood health -&gt; good later health  MIC Mortality rates important national health measure  Define family planning and discuss its importance  Need to be cognisant of multiple definitions of family  Identify consequences of teenage pregnancies  blessing and a joy  high rates of teen births can also bring a significant social and financial burden on families and even on communities  Define legalized abortion and discuss Roe v. Wade and the pro-life and pro-choice movements      Define maternal mortality rate and identify some factors that influence it    Define prenatal care and discuss the influence this has on pregnancy outcome  List major factors that contribute to infant health and mortality  Racial Inequalities: { Black women 3x, Am Indian/Alaskan Native 2x } death rate of White,  Daily discrimination can increase risk of negative perinatal outcomes  Maternal mortality ratios vary significantly by socioeconomic status and geography  Identify the leading causes of childhood morbidity (illness/injury) and mortality (death)  Discuss the importance of immunizations and health insurance to child health  Identify important governmental programs developed to improve maternal and child health  Briefly explain what WIC programs are and whom they serve  Name several groups that are recognized as advocates for children  Define what “low birth weight” means and why it is a health risk  Compare the prevalence of low birth weight babies born to African American mothers, compared to white mothers in the United States  Discuss factors, including chronic stress, that contribute to high rates of low birth weight births in the African American community  Discuss interventions to help prevent low birth weight, including actions that can be taken at the individual level and those at the community or societal level.5 Community Organizing“Communities are not only “where health happens”. It is also often the place where residents take action to alter the conditions that affect their health”Define  community organizing: “process by which community members come together to address a shared problem or opportunity, … to attain a change in their shared environment. … often involves working on a policy change at the local level…”  community organizing: “defined as the process by which community groups are helped to identify common problems or goals, mobilize resources, and develop and implement strategies for reaching the goals they collectively have set”  community capacity:  community participation:  community building:  empowered community:Strategies for community organization  planning and policy practice:  community capacity development:  social advocacy:needs-based vs strengths-based community organizing models:Generalized model for community organizing/building stepsCommon tools or tactics for community organizingCase study of community organizing for healthRole of community health workers in community organizing for healthe.g. their role in informing, involving, collaborating and empowering community residentsempowerment: process by which individuals or communities take control over their lives and environment(re empowerment): Either greater community problem-solving ability / change in conditions/relations of power. Community not strictly defined. Community organizing processes:  Confrontational: Social Justice Advocacy/Alinksky Style (Saul Alinsky: Rules for Radicals)  Consensus: Build in communities capacity to resolve challenges  Using data + working /w Local Gov for new policies: (consensus also)  In common: Recognizing the value of prevention and equityEnvironmental Justice: seeks to ensure that the costs of our industrial society (noise, air pollution, water pollution, etc.) do not unfairly fall in a disproportionate way on communities of color and more generally, poor and working class communities  (Principles of env justice: http://www.ejnet.org/ej/principles.html)Environmental Health: sub-discipline within Public Health that examines the biological, physical and chemical factors in our environment that affect health.The community action model is an interactive five-step process designed to address the fundamentaldeterminants of population health through a community-based participatory process. The model was initiallydesigned to address the social determinants of tobacco-related health disparities through grassroots effortsfocused on policy and organizational practices and is applicable to other community issues.The steps of CAM are as follows:  Step 1: Dialogue of Concern and Issues/Skill-Based Training  Step 2: Community Diagnosis  Step 3: Analysis  Step 4: Plan and Implement Action/Activity  Step 5: Sustaining Action/Activity and Evaluate Action. The role of CHWs can be easily defined within the CAMThrough the use of CHWs for capacity building, the concepts of several theories such as the Health Belief Model (HBM), Self-Determination Theory (SDT), Transtheoretical Model (TTM), and self-efficacy are all taking place at different stages when community members interact with CHWs for extended periods of time.Murphy, F., &amp; MSPHyg, M. P. I. A. (Eds.). (2012). Community engagement, organization, and development for public health practice. Springer Publishing Company.CHW Roles: Informing (which can include consulting), Involving, Collaborating, Empowering"
    } ,
  
    {
      "title"    : "Intro Sociology",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2019/02/18/intro-sociology/",
      "date"     : "2019-02-18 00:00:00 +0000",
      "content"  : "Chapter 8: GenderFeminism:  consciousness raising movement to get people to understand that gender is an organizing principle of lifeSex: biological differences that distinguish males from femalesSexuality: desire, sexual preference, sexual identity, and behaviorGender: social position;social arrangements built around normative sex categoriesSex: Process in the Making:  Gayle Rubin “The Traffic in Women: Notes on Political Economy of Sex” called social construct of gender categories based on natural sex differences “sex/gender system”  Intersex is medical conditionEssentialism: line of thought that explains social phenomena in terms of natural onesBiological determinism: line of thought that explains social behavior in terms of who you are in the natural worldGender: What does it take:  Gender systems imply social constructions            2 Gender Systems: Navajo Tribes (nadle), India (hijras)      Hegemonic masculinity: condition in which men are dominant and privileged, and this dominance and privilege is invisibleGender roles: sets of behavioral norms assumed to accompany one’s status as a male or femaleThe Woman Question“What explains the nearly universal dominance of men over women”Patriarchy: a nearly universal system involving the subordination of femininity to masculinity  Rubin: Sex/Gender System (Biological Sex -&gt; Asymmetric Gender Status)  Rosaldo: Because women associated with less prestigious private sphere  Ortner: Because women furthermore identified with natureStructural functionalism: theoretical tradition claiming that every society has certain structures (the family, the division of labor, or gender) that exist in order to fulfill some set of necessary functions (reproduction of the species, production of goods, etc.).Early anthropology assumed every society had certain structures (eg family, division of labor).  Parson’s Sex Role Theory: Talcott Parsons’s theory that men and women perform their sex roles as breadwinners and wives/ mothers, respectively, because the nuclear family is the ideal arrangement in modern societies, fulfilling the function of reproducing workers.          Problem: Tautological (things work because they work)      Functionalists presume need for function, preexists phenomenom and that other structures couldnt fill in      Doesnt explain changing structures over history      Psychoanalytic Theories  Freudian theorists have provided perhaps an overly individualistic, psychoanalytic account of sex roles  Sigmund Freud: “Anatomy is destiny” (but also family socialization)  Kids develop personality structures through parent interactions  Nancy Chodorow (1978): “Why Women predominantly caregivers?” - Parents’ unequal involvement in child rearing was partial cause. Mothering by woman is reproduced in the cycle of role socialization. Argued that egalitarian relations possible if men shared the mothering.  Carol Gilligan (1982): Women and men have different ways of thinking. Women make major life decisions based on “ethics of care”. Women view world as relationships vs men as rules.  Freud assumes a biological reductionist Setting (eg nuclear /w WASP middle class family /w stay@home mother, working father)  Also many Freud psychoanalysts assume binary sex/gender systemConflict Theories  Socialist feminists claimed that the root of all social relations including relations of production stems from unequal gender relations  Variant of essentialism. Posits world divided into two groups: men women pitted against each other in struggle for resources which women always loseMicrointeractionist theories  Candace West/Don H Zimmerman “Doing Gender” (1987): Gender is not fixed going into interactions, But a product of those interactions - to be man/woman = perform masculinity/femininity constantly.  Social constructionists Review generals is having open-ended scriptsBlack Feminism  Black feminists make the case that early liberal feminism was largely by, about, and for white middle-class women  eg Betty Friedan in The Feminine Mystique ignored Experiences of thousands of working class and nonwhite women already working, sometimes holding down multiple jobs  Black women experience motherhood in ways that differ from the white masculinist ideal of the familyPostmodern Theories  Anthropologist Oyeronke Oy Argues the woman question is a product of uniquely Western thought in cannot be applied African societies; System of categories, distinct males and females, indicates western culture logic: biologicMiddle Range Theories  Merton called middle range theories: Connect Day-to-day experiences to larger social forces  Connell in Gender and Power (1987): Middle ground approach to gender. Used Anthony Giddens’s structuration theory to claim that the social and the personal always depend on each other. Extends structures as a kind of feedback loop, weaving individual practice back to social institutions which in turn influence and socialize individuals into gender beings  Question becomes less to explain universal male dominance and more a matter of attempting to account for help people navigate with instructors like genderSociology in the Bedroomhigh level summarized  Different norms for behavior re: power dynamics in different cultures  Marxist feminists argue sexuaility in American is an expression of unequal binary gender power balance… other thingsChapter 7: StratificationStratification: structured social inequality / systematic inequalities amonung groups of people that arise as intended or unintended consequencs of social processes and relationshipsViews of Inequality:  Rousseau:          Physical (innate)      Social/Political (goods/luxuries/ all the things)      If you have 1 pizza and someone has 10 slices and you have 0 but you need some to live you might fight them for it        Scottish Enlightenment + Malthus:          Inequality as a means for social progress - people do work      Malthusian Poverty Trap: Inequality necessary for prevention of overpopulation/starvation        Hegel          Master-slave dialectic      Slave/master dependent on each other      Society marching from few master-many slave -&gt; society of more free men/women (equality).      Standards of Equality:  Ontological Equality: Notion that everyone is created equal at birth  Equality of Opportunity: Idea that everyone has an equal change to achieve wealth, social prestige, power because same rules of the game (eg Jim Crow laws are not these; stifles meritocracy)  Bourgeous Society: Society of commerce (modern capitalist eg) in which max of profit is primary benefit incentive.  Equality of condition: Idea that everyone should have equal starting point (affirmative action)  Equality of outcome: position that argues each player must end up with the same amount regardless of the fairness of the game (eg Marxist). Eliminates incentives of the Scottish Enlightenment thinkers.  Free Rider Problem (ie Tragedy of the Commons): When more than one person is responsible for getting someone done, the incentive is for each to shirk responsibility and hope others pull weight.Forms of Stratification:Many forms, eg by age (some tribes determines social prestige + honor, vs in the youth obsessed culture of the US it’s the reverse), birth order (inheritance), gender, race, ethnicity.  Estate System: politically based, characterized by limited social mobility. Feudal Europe-18th century, American South before Civil War. Political basis. Laws written to enforce eg voting writes only for land owners. eg (clergy,nobility, commoners).  Caste System: Religion based, no social mobility. Previously in India (varna system).  Class System:          Economically based, characterized by cohesive oppositional groups and somewhat loose social mobility. Class depends on economic position.      Marx:  	- every means of production has its own social relations, employing class bourgeoisie, working class proletariat.  Class is relational.                  Contradictionary class locations: 2 classes doesnt adequately capture social world and many people fall in between these pure classes (eg self employed, managers).                    Weber: Class members distinguishe d by similar commercial marketplace value via property/labor  	- Distinguished by property/lack of property      Marx is antagonistic and exploitive vs Weber is gradated and not relational        Status Hierarchy System: based on social prestige.          Status determined by what society thonks of the lifestyle of the community to which you belong. Those without property can belong if they have same lifestyle. eg Professors discuss scholarly issues, teach classes and read. They have a certain status even though income varies. Status groups can be other than work eg leisure kind (skate puns) or membership in exclusive organization but tend to be work.        Elite-Mass Dichotomy System: System /w Governing Elite, few leaders who broadly hold power.          Vilfredo Pareto in Mind and Society thinks +1      C Wright Mills thinks -1      Pareto:                  Pareto Principle (small, cause large effect, 80/20)          Pareto believes in meritocracy                    Mills:  	- Argues negative, neither natural/beneficial                  3 major institutional forces: Economic, Political, Military.                    Pareto views elite status as reward for talent, Mills see unequalpower/rewards as determining position.      Pareto likes power centralization, Mills warns of dangers and consolidated decision making      Mills: coordination among elite entrenched is self increasing. Revolving door        Socioeconomic Status: individuals position in stratified social order  Upper Class, Middle Class, Poor  Middle Class: nonmanual jobs, pay significantly more than poverty line. Definition Debated and expansive          Traditionally white collar workers + working class of individuals who work manually      Post WW2 led to enrichment of many manual workers      Global Inequality:  globalization commonly cited  inequalities through colonialism and unequal development  some explanations geography / strength of social/political institutionsSocial Reproduction vs Social Mobility:  social mobility: movement between different positions iwithin a social stratification system          horizontal vs vertical        structural mobility: inevitable due to changes in the economy  exchange mobility: if we hold fixed the changing distribution of jobs, individuals trade jobs not 1-1 but in a way that balances out  status attainment model: approach that ranks individuals by socioeconomic status, incl income and educational attainment and seeks to specify attributes characteristic of people who end up in more desirable occupations.sßChapter 6: Deviance + CrimeSociologists: people either deviate or conform:“Why do they deviate” group: personality type, differential association, structural strain, anomie, labeling.“Why do they conform” group: subcultural, control.social control: attempts by society to regulate people’s thoughts and behaviors in ways that limit or punish deviance ; negative/positive sanctions.folkways: traditional behaviors (not formally sanctioned)formal sanctions: laws = negative sanctionsbiological view (biological essentialist): cesare lombroso (1876) - “criminals are subhuman”. suggested physical characteristics. william sheldon 1940/1950psych view: personality as a matter of socialization (deviance is failed socialization). 1967 - Dinitz + Reckless. Containment theory - deviance = impulse controlDeviance varies by cultural norms  strain theory  (x,y plane) normative theories of suicide                               altruistic                                     |            social integration   anomic 		fatalistic                                   |                                      egoistic                                                                              social regulation         symbolic theories of deviance          labeling theory  	- stigma      broken windows theory of deviance      Crime:  Street Crime  White-collar          Corporate        Reduction          Deterrence Theory of Crime Control      Goffman’s Total Institution      Foucalt on Punishment (reform the soul)   	- Panopticon      US Criminal Justice: balance b/w rehab + punishment  	- Rockefeller Drug Laws      L7Conley Chapter 14  capitalism is a thingL6Conley Chapter 13  education system reinforces social/economic distinctionsL5Conley Chapter 5  dyad,triad. Dyads are most intimate  Quantiative Aspects of Groups: Georg Simmel  Triad roles: mediator, tertius gaudens (3rd member who benefits from contact/conflict bw other 2), Divide et impera (intentionally drives wedge)  larger than a triad? Small groups, parties, large groups.  Small group: face to face interaction, unifocal perspective, lack of formal arrangements, certain level of equality  party: multifocal.  large group: formal structure that mediates structure and status differentiation (eg professor and students)  Charles Horton Cooley: primary/secondary groups.  Primary: limited membership. intimate f2f relationships that strongly influence attitudes/ideals (eg family/friends)  Secondary: impersonal, instrumental relationships. Means to an end. eg labor union  Group Conformity.  Solomon Asch experiments (1940s): which line longer  in group ( powerful usu. majority ) vs out group (stigmatized oft. minority). Significance by ability to define normal vs abnormal  reference group: “group that helps us understand .. relative position in society to other group”  social network: set of relations/dyads held tgt by individuals  tie: content of particular relationship  narrative: set of stories in a set of ties (eg university)  Embeddedness: “degree to which ties are reinforced through indirect paths within a social network”  Strength of weak ties: “notion that relatively weak ties often turn out to be quite valuable because they yield new information”  Structural hole: “gap between network clusters, or eventwo individuals, if those individuals (or clusters) have complementary resources”. (possibility of a tie)  6 deg of freedom (stanley milgram)  case study: 4% of amish startups fail. social capital. everyone shops there and taboo on bankruptcy  high school partner networks. spanning trees. “But the main rule that seemed to govern these relationships was “no cycles of four,” which means you do not date the ex of your ex’s current boyfriend or girlfriend. “.  Organization: “any social network that is defined by a common purpose and has a boundary between its membership and the rest of the social world”  Organizational culture: “shared beliefs and behaviors within a social group; often used interchangeably with corporate culture”  Organizational structure: “the ways in which power and authority are distributed within an organization”  interlocking directorates: “phenomenon whereby the members of corporate boards often sit on the boards of directors for multiple companies”. can create a power elite.  Dimaggio + Powell: institutional isomorphism: why businesses that evolve in diff ways have similar org structures  Isomorphism: “a constraining process that forces one unit in a population to resemble other units that face the same set of environmental conditions”  new institutionalism school: (of sociology): develop sociological view of institutions (vs economic)Ferguson: Colvin, Descent Into Madness  The New Mexico State Prison Riot  inmate on inmate killings  Changes 3/4 yr before riot  turnover of state leadership; unaccountable administrators  inconsistencies in security + discipline  growing inmate violence  new inmates: submit, snitch, or fight  anglo vs chicano fights + fragmented societyVideoshttps://www.youtube.com/watch?v=_wFZ5Dbj8DA  social group: collection of people who have something in common and who believe what they have in common is significant  aggregate: people @ same place @ same time (eg central park at 3pm  categories: particular kind of person across time and space. share characteristics ( eg race )  primary (strong ties; group exists to be group eg family) vs secondary group (shared goal, eg company)  group dynamics: how affect each other (indiv &lt;-&gt; groups)  leadership types: instrumental (achieve goals) vs expressive (minimize conflict)  leadership styles: authoritarian (orders), democratic (consensus), laisse faire (leave to function on own)  group conformity:  Milgram experiment: teacher and participant. keep administering shocks (even to deadly). Direct telling = non compliance but appeals to shared science group value = compliance.  Group compliance: narrowing of thought, one right answer  reference groups: groups you compare to  groups vs size: bigger = more stable, less intimate. Coalitions also.  homogenous group: better inward connections, heterogeneous group: better external connectionsL4 - ExamL3Ferguson: Granfield, MAKING IT BY FAKING IT: Working-Class Students in an Elite Academic Environment  they threw away previous things and adapted to environment in addition to forsaking previous beliefs about wanting to help their like kin. Also emphasizing their diverse background did not help in interviews - conformity was key here.Conley Chapter 4Socialization  socialization: process by which you learn how to become a functioning member of society  socialization: the process by which individuals internalize the values, beliefs, and norms of a given society and learn to function as members of that society.          limits of socializations when you’re in a new social situation (e.g. diff kind of party)      primary unit: family      Human Nature  You need to bathroom but not where you can bathroom  “Anna” Case Study: Socialization cannot happen after such long isolation; Theories of socialization inapplicableTheories of Socialization  Self: the individual identity of a person as perceived by that same person          Concept of self is a social process;        I: one’s sense of agency, action, or powe  Me: self as perceived as an object by the “I”; the self as one imagines others perceive one  Cooley: Self emerges from being able to see ourselves as others do  Mead: developed on Cooley; me is distinct  Theory of social behavior: how others are likely to react to different situations  Generalized other: internalized sense of the total expectations of others in a variety of settingsAgents of Socialization  Generally families; not always parents -&gt; children sometimes reverse          Family social class impacts how their children socialized      middle-class parents are more likely to engage in concerted cultivation with formal activities and reason with them over decisions to foster talents      Kids in less well-off families pend more time hanging out      Middle class kids are able to use logic and reason to support choices by mirroring parents explanations      Middle class kids discover confidence that comes achievements        School          Teachers properly socialize you      All schools are not created equal      Prep schools link students into elite social networks        Peers          Peer pressure      Adolescents are more open to friends advise them to parents        Media          ongoing debate; e.g. sesame street: Educational programming for children who don’t have day care or preschool        Adult Socialization          Ways in which or socialize as an adult. For example working at a restaurant you learn your responsibilities      Resocialization: The process by which one’s sense of social values and beliefs and norms are reengineered often deliberately through on intense social process that may take place in a total institution  	- e.g. living in a new country; or a coed college from a single sex high school; or if you lost completely your memory        Total Institution          An institution in her 20s totally immersed in that controls all the basics of day-to-day life; No barriers exist between usual spheres of daily life and all activity that occurs in same place and under same single authority; e.g. prisons, boarding schools, college, army      Works by placing an immense physical and mental pressure and isolating them      Social Interaction  Status: Recognizable social position that a individual occupies  Role: Duties and behaviors expected to someone who holds a particular status  Role Strain: Incompatibility among roles corresponding to a single status  Role conflict: tension caused by competing demands between two or more rules pertaining to different statuses  Status set: all the statuses one holds simultaneously  Ascribed status: status into which one is born; involuntary status  Achieved status: status into which one enters; voluntary status  Master status: Status within a set that stands out  Merton’s Role Theory: Acting within roles/people have roles.          Six types of role conflict (from Merton Sociological Ambivalence, pp. 8 - 12)                  Conflict within an individual’s status set          Conflict within the role set          Conflict of the multi-cultural          Cultural conflict, i.e., between cultural valuesa. This is conflict within the cultural system          Conflict between aspirations and opportunity (i.e., no chance to do what you have been taught you ought to)          Conflict inherent within the role itself                    Gender Roles  Gender Roles: Behavioral norms assumes to accompany status as male or female  West/Dimmerman  argue gender status has power/significance Not captured by real theory  Gender can constitute a master status  Studies show people interact with babies differently depending on gender  Larger world socializes boys and girls differently  Socialization continues in high schools such as insults; Gender boundary policing can cause catastrophic effectsSocial Construction of Reality  Something is real meaningful or valuable when society tells us it is  Childhood is the developmental stage was not always so and came after industrial times  Teenagers became a Discrete social category after the extension of education during the 1950s  Symbolic interactionism: Micro level theory and with shared meanings orientations and assumptions formed the basic motivations behind peoples actions  Symbolic interactionism: How Things are socially constructed ( suggests how We interact with others have symbolic meaning meanings)          Three Basic Tenets                        Human beings act towards ideas concepts and values on the basis of meaning that they have for them                                      Meetings are the products of social interactions in human society                                      Meanings are modified and filtered through an interpretive process that each individual uses in dealing with outward signs                    Useful for Understanding cultural differences and styles of social interaction      Dramaturgical Theory  Erving Goffman: Language of theater as a paradigm to formally describe the ways in which we interact to maintain social order  Dramaturgical Theory: View of social life as a theatrical performance in which we are all actors on metaphorical stages with roles scripts costumes and sets  Morals are depression management  Role as a student;  professor handed out syllabus (prop) and give an outline of the class ( script) and lecture (performance). Talking about Batman would deviate from the script  Important distinction between front stage and backstage  Face: The esteem in which an individual is held by others  Opening the start of an encounter; Closing: The end of any interaction; Civic inattention: Refraining from directly interacting with someone till an opening; Given gestures can signal a closing; Giving off gestures can unconsciously signal true feelings.  In Breaches people  work hard to repair the mistake so everyone can move forward  Goal of social interaction is to Make a good impressionAnd works to ensure that others believe they’re also making a good impressionEthnomethodology  Harold Garfinkel (1950/60)  Literally “the methods of the people”; approach to studying human interaction focusing on the ways we make sense of our World, Convey this understanding to others and produce a shared social order  Famous for breaching experiments: what happens when breaching social norms.New Technologies: What How’s the Internet Done to interaction?  new social situations without established social norms  eg online chat rooms: new lexicon but difficult to deploy closing brackets  Redefining the term stealingConclusion  nature versus nurture, generally sociologists: nurture  Socialization helps understand how babies become people who attend collegeL2Ferguson: Haunani-Kay Trask, Lovely Hula Hands“Lovely Hula Hands: Corporate Tourism and the Prostitution of Hawaiian Culture”  Haiwaiians have less rights than American Indians  American’s don’t know where Hawaii is but feel entitled to use it and the destruction of Hawaiian land is by MNCs  Prostitution is used as an analytic category/metaphor to convey the degradation of Hawaiian culture and people under tourismAuthor will examine: 1) homeland incl lands,fisheries,sea,skies 2) language and dance 3) familial relationships 4) women  In Hawaii there is a younger sibling/elder sibling + chief&lt;-&gt; villagers symbiosism.  Aloha is a cultural feeling and practice that works b/w the people and their land  Hawaiian language was banned by Americans and only now is making a resurgency (and dance).  Hawaiian values are different than those of the traditional west and that annoys many visitors (e.g. shared property and children and open relationships).  In contrast the American relationship of people to land is exploitative  Tourism is the only job propoganda is spread;  “Our language, dance, young poeple and customs of eating are used to ensnare tourists … for $39.95”.  Hawaiians are required to be complicit or face unemployment and are frequently forced to leave Hawaii as a result.  Chapter 3 Conley Reading3 Culture and Media  Does culture or media come first?  Culture = Human – Nature, Culture = (Superior) Man – (Inferior) Man, Culture = Man – Machine          Matthew Arnold (1822–1888) redefined culture as the pursuit of perfection and broad knowledge of the world in contrast to narrow self-centeredness and material gain.      &lt; partly done &gt;Videoshttps://www.youtube.com/watch?v=kGrVhM_Gi8k  culture: non-material objects (thoughts,action,language,values…) + objects to form way of life          material culture: syntactic things around you (e.g. street signs)      nonmaterial culture: semantic meaning assigned + intangibles. e.g. red = stop        Societal Sanctions: folkways, mores, tabooshttps://www.youtube.com/watch?v=RV50AV7-Iwc  Social Class: Low vs High Culture.          Low/Popular Culture: Behaviors/Ideas that are Popular      High Culture: Culture popular with society elite      Mainstream Culture: cultural patterns broadly aligned with society’s cultural ideas + values  	- Subculture: cultural patterns that set apart of population segment; e.g. hipsters      Counterculture: Pushback on mainstream to change how society functions      Cultural Lag: some things take time; e.g. summer vacation (from summer harvest origins)      Cultural Diffusion: culture spreads        Ethnocentrism: judging one culture by the standards of another (e.g. euro/afrocentrism vs multiculturialism)          Structural Functionalist: melting pot of culture forms structure -&gt; good      Conflict Theorist: prioritizing a culture = inequalities + disenfranchisement -&gt; bad      Symbolic Interactionists: society is about shared reality/culture created      L1https://www.youtube.com/watch?v=DbTt_ySTjaY  Theoretical Paradigms:          Structural Functionalism (Emilie Durkheim): Parts (social structures) work together      Conflict Theory: Struggle over scarcity  	- 1st one: Class conflict (Karl Marx): Means of Production vs Labor; Marx thought central conflict and source of inequality                  Race-Conflict (WEB DuBois): Conflict b/w difference racial + ethnic groups          Gender-Conflic Theory: Social inequalities b/w women + men                    Symbolic Interactionism (Max Weber): Verstehen (understanding); Focus on individual social situations + their meaning        Social Functions: manifest (obvious) + latent (unintended) functions  Social Dysfunction: disrupts society (e.g. technology)  Macro vs Micro  3 Major Paradigmshttps://www.youtube.com/watch?v=YnCJU6PaCio  See the strange in the familiar, study society, how sociology differentiates itself, what sociology can doQuotes/Paraphrases from Conley Book: https://www.amazon.com/You-May-Ask-Yourself-Introduction-dp-039391299X/dp/039391299X&amp; Ferguson Reader: https://www.amazon.com/Mapping-Social-Landscape-Readings-Sociology/dp/150636828X"
    } ,
  
    {
      "title"    : "Random Berk Classes",
      "category" : "",
      "tags"     : "",
      "url"      : "/2018/02/16/random-berk-classes/",
      "date"     : "2018-02-16 00:00:00 +0000",
      "content"  : "Advanced Topics in Computer Systems (262a-f18)Aug 30 2018FSCQ logical block mapping to choose where to put on platter, archival data inside the platter and fast access data on the outsidenever use RAID 5 again lmao4ms to track switch, but much less to read next thing on the block3 modes for a Journaling File System - Writeback, Ordered, Data journaling. (write metadata+journal independently and journal only metadata, ordering, or both first to journal)journals can be stored in different portions of a disk. Ext2/3Comp + Theoretical Immunology  (294-E?)“immune repertoire diversity: inference and modeling”paper1: http://www.pnas.org/content/107/12/5405paper2: http://www.pnas.org/content/113/2/274“Typical” zebrafish B cell CDR3 Repertoires28-112k sequences/fish /w primer dep amplification biasD region in zebra fish antibodies - 1-6 antiacidsrestricted to D region which act like clone barcodesCan we say anything about P(\sigma) from the data?Max Entropy ModelMaxEnt model = “least structured model consistent with observables”Restrict to individual and pairwise data so that num of vars ~ 10^3.Takeaways (2nd paper)  Clone speciifc vs cell specific fluctuating fitness give different qualitative results in this framework of lymphocyte diversity.  may be able to estimate key growth params from clean enough data (fitting power law exp and crossovers)Self notes:via Wikipedia:  T cell: “a lymphocyte of a type produced or processed by the thymus gland and actively participating in the immune response”  ligand: “an ion or molecule attached to a metal atom by coordinate bonding.”  kinetic proofreading: “ Kinetic proofreading allows enzymes to discriminate between two possible reaction pathways leading to correct or incorrect products with an accuracy higher than what one would predict based on the difference in the activation energy between these two pathways”Modeling T Cell Ligand Discrimination (Slides)Jonathan Liu  T Cell SignalingT cell activation is fast sensititive and digitalHow can we explain this theoretically?Certain activation &lt; 15sec. Digital - trigger or dont. Question: how do you explain these props theoretically? What kind of network?  Two models of activation  Conformational change          Based on structural interactions      Data doesn’t support this        Kinetic Proofreading          Based on lifetime of PMHC-TCR complex      Shown to correlate w T-Cell activation        Kinetic Proofreading  if you consider a system in thermo eq - fund limit on how  Experimental SetupInput specified # of pMHC ligands (concentration not types)Measure output using immunostaining / flow cytometryJargon:  Output: ppERK (phosphorylation of extxracellular regulated kinase)  Input = pMHC ligand per APC          SIINFEKL-K^b, EIINFEKL-K^b, SIIRFEKL-K^b      Paper: Altan Bonnet and Germain 2005 Modeling T Cell Antigen Discimination Based on Feedback Control of Digital ERK Resopnses  Indiv cell responseVaried input molecules (Graph A)Bimodal # of cells /w high and low ppERK output (Graph B)  Pop Response  Differing Ligand strength  Problems w Kinetic Proofreading  Tradeoff bw selectivity and speed  Data suggest additional network complexity  We need fast response time, Buffering against weak binders, Huge amplification of strong binders.Solution: Pos/Neg Feedback  Sample structural change chart generated from some caltech group software  Response time depends on concentration of agonist ligand (agonist: something that bind to something)  Hierarchical antagonism in signaling          mixing non+agonist ligands is slower      EIIINFEKL is more antagonist      varying concentration of specific binder vs nonspecific binders      Varying discrimination based on T cell differentiationAmount of SHP1 (negative feedback) vs (non-)agonist.    Conceptual          Change amount of neg feedback      Change amount of nonspecific binder      Change amount of agonist        Summary          T cell activation incorporates kinetic proofreading w simultaneous positive and negative feedback loops      Allows for high speed sensitivity and discrimination      Simulated results qualitatively agree w data        Discussion Points          Can we write a simpler phenomenological model that captures the qualitative behavior?      What elements are relevant? How can we generalize?      Do we need to consider stochasticity?      Can we approach this from a more biophysical perspective? e.g. stat mech of binding      Can we experimentally acess specific points in network?      Comp + Theoretical Immunologymathematical modeling of affinity maturationFeb 15 2015introduction to AF2 the Kepler Perelson Model (1993)Opera Perelson (1997)Meyan Moremann (2012)I Def  AF is the process by which B cells produce antibodies with increased affinity for antigen during immune response.It involves 2 processes (Jeff.)  Somatic hypermutation  Clonal Selection (select the right something)Cell BioB Cell -&gt; centroblot -&gt; centrocyte (DZ) -&gt; (some not selected, LZ) b cell with increased infinityGerminal Center - distinguish two zones: Dark/Light zone.This started during immune response - very dynamic. The GC has a dynamic morphology You start with a initial reaction triggered by immune response:D0 (reaction) -&gt;      D4 (DZ/LZ formed) -&gt; (development) D14 -&gt; dissolves (D21).There is a specific antigen associated with germinal centerDark/Light zone - in the old days, dark: lots of b cells doing something protein so it looked dark in imaging?Questions from this paper:  How to explain high efficiency of affinity maturation?  (How to achieve a population of BCells w high affinity?)  How to explain the special organization of the germinal center?Mathematical Reformulation of 1: How to maximize at the end of the GC reaction chain the global affinity of b cells?	-&gt; how to define affinity? coarse grain what is affinity -&gt; define different levels of affinity (K-2,k1,k0,…K2)	-&gt; A = \sum b_i K_i  (# of b cells in slab i)Idea: Model the pop dynamics of b cells by a system of ODEs dep on the mutation schedule \mu(t), and find \mu that maximze A(T), and T=14 days chosen.(i) -&gt; (i) + (i) (grow)	-&gt; (\emptyset) (die)	-&gt; (j) (mutate)												v (death event, proliferation event)       v (mutation event, has M_{ij} that accounts for  mutation rate) dB/dT = F(B, \mu(t)). dB_i/dT = b_i 1_B(t) &gt;=1 (t)   (...) + \sum_(j != i) n_j 1_{B_j(t)} (t) (...) approximating a discrete difference eq /w a differential eq.            M_{ij} = [L_\mu (1-p_s)(1-p_l)] ^      i-j      e^{-L\mu (1-\mu s)} /      i-j      ! (1+r^{j-i})      There are tools that allow to answer the questions with K-P model –Optimal control theory\dot{x} S(t,x,u) u = “command”. Imagine you have a physical system, e.g. thermostat that you can change.x(t_0) = x_0J(u) = K(t_p,x_p) + \integrate_{t_0,t_f} L(t, x(t), u(t)) dtPonteyugims maximum principle (1962) you can maximze ^ quantity - which is basically the global affinity. Under the assumptions \exists v* | \forall u \in V,  a) &lt;= J(u) or something. Can write a hamiltonian to optimize u?Consider book Review: Immunology for physicists.            Results: Stay between days in these different mutation/non mutation period - looks like shark fins      __      ___      __. the period of the fin is days they think.      Conclusion: Alteration between periods of rapid mutation and of mutation free growthInterpretation: in the optimal slution the pop first grows quickly as possible uin the something of mutation until the one N = 1/P_A cells prob  “Such an optimal schedule can arise naturally from the structure of the GC”. The temporal variation of the \mu*(t) would be implemented by spatial compartimentalizationC1					 | C2(delection/mutation) |  Proliferation 					 &lt;- can go back supposedly.II ) Paper 2“strategy is difficult to reconcile with temporarl and spatial plethora of cell movement and expansion with the germinal center”Found the actual sitting in the dark zone before light zone is hours not days like they thought.			DZ						  | LZ  Start B(t) bcell -&gt; Centroblast(B_i (t))  |  -&gt; Centrocyte (C_i(t) ) -&gt;  R_i(t) -&gt; F_i(t) folliculardendritic cells (antigens), these antigens can just bind. once get antigen you can live and go out as plasma or you can recycle.  competition is in the LZ, can bind with a lower affinityT Follicular helper cells (TFH) ^ discovered in 2005,Stromal cells in DZwant to measure:1) GC Size:Affinity?  The is an optimal Pr for total affinity but not the average affinity?  What about plasmaIII) chromotaxisCXCL 12        CXCL13^ centroblasts   ^ TFH ^ centroblast"
    } ,
  
    {
      "title"    : "Hpts Keynote Pat Helland",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/talks/2017/10/02/hpts-keynote-pat-helland/",
      "date"     : "2017-10-02 00:00:00 +0000",
      "content"  : "HTPS KeynoteBefore  Storage has evolved          (from Direct, SAN, Storage clusters + REST API)        Computing Evolved          Single proc -&gt; Multi -&gt; RPC -&gt; SOA -&gt; Microservices        Computing Storage Use          Direct File I/O      State  Durable state + consistency (transactions/updates/message semantics)  Session State - multi op transactions; sessions are hard @ microservices  inside/outside data          outside data is immutable      Careful Replacement  disks can trash block during write: (old -&gt; trash -&gt; new)  hardware fixes careful replacement issue  transactions bundle + solve careful replacement  workflows need careful transactional replacement nowRead your writes?  Strong consistently - (R after W):          Even as scales you can r after w      Sometime delay if sick/dead (releader election)        Weakly consistent (not R after W):          No guarantee write update old replica - read old value      R/W consistent SLA - skip sick/dead servers        Cached Data          KV pairs versioned, unsure if newest.      Different stores for diff uses!Immutability can fix these - only one version to get.Stateful Sessions And Transactions  Stateful sessions worked well for SOA: Distributed Transactions + Across MachinesTransactions, Sessions, Microservice  Requests flow to request routing.  Session state needed for cross-request TV  Microservice Transaction are typically 1 store request  No cross request transactionsTheres no substitute for interchangibility"
    } ,
  
    {
      "title"    : "Grad Advanced Operating Systems &amp; Distrib. Systems Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2016/09/09/Advanced-Operating-Systems-Notes/",
      "date"     : "2016-09-09 00:00:00 +0000",
      "content"  : "Professor Dave Andersen2016-Oct-14Dynamo Paper  Eventual Consistency -&gt; Vector Clocks (Bayou) / Red Blue  Consistency  Consistent Hashing / Chord  Gossip Protocols  SLOs &amp; 99.9% Percentile Latency  Merkle Trees2016-Sept-30The Design and Implementation of a Log-Structured File SystemHow many disks are at $x -&gt; estimate data per second ingestion / disk storage  Context Raid: (IBM / Disk Size)  Balance  Spindles vs $/tb vs trut?          RAID Levels        Reliability / MTTR / MTBF / MTTF etc.  Schroeder  RAID6 vs Cross-rack/de  Section Remapping is eww (inserts seeks into reads).Reliability  Raid vs Tape Storage vs zone replication (buddy data centers!)  http://firstround.com/review/the-three-infrastructure-mistakes-your-company-must-not-make/  Monitor everything  https://en.wikipedia.org/wiki/Jerry_Saltzer has an undergrad book &amp; class on relability engRAID  0- striping, 1- mirror, 2- ecc, 3- single group, 4/5 sector.  https://community.netapp.com/fukiw75442/attachments/fukiw75442/data-ontap-discussions/2334/1/WAFL.pdf  Hard drives are not as good as promised  Failures correlated  MTTRs are increasing (fast + bigger disks)  Failures increase (esp during heavy use!)“When you’re operating at googlebooksoft scale” every server cannot be a special snowflake2016-Sept-26Paper: AFS Howard 88AFS:  # of users &gt; 5-10k  Efficient servers by whole-file caching  Server crash -&gt; pause  No Net? Maybe local cache if lease  Typically 1 user prer file or read only  Evaluation?:          Benchmark (Modified Andrew Benchmark)      Ran commmands - You can see amdahls law’s and don’t have interactions b/w file ops      Experience:  	- Much slower than local                  Better than 1 server          Killed Server                    Dropbox:  500M ~ users.  work offline?          Conflict handling / merges      Human / Piss someone off      Lustre, etc: / Panasas  Storage: Sharded in Parallel - 10 Comps. Performance!!!  GFS Looks similar -&gt; pushed requirements to apps -&gt; append semanticsNFS  More cluster-y  Survive crashes  Transparent  Caching! -&gt; Validate on use. (Block Based)  Didn’t have consistent access.  3 second attr cacheHow does local ops do things?  Read(fd ..) -&gt; Get a file handle (vol, inode, gen #) -&gt; Make server stateless and idempotent.Q: How make generation #? Q: Why is TCP Better &gt; UDP For Services? Because Firewalls like TCP Better generally2016-Sept-23Paper: Using Model Checking to Find Serious File System Errors Yang 04  Fuzzing  is helpful          Link against ASAM (address sanitizer) / LibFuzz / AFL - American Fuzzy Lop      Industry “State of Art” / Adaptive Fuzzing        Filesystems are ugly to fuzz          People test general not edge cases      Crash/Reboot =&gt; long                  Sometimes true that disks do what you tell it - write [w1, fsync, w2] - you should have w1 if w2, … - disks sometimes consistent - if you do certain things          Untested Code in Drivers: Error States                      What do filesystems look like?          Well known superblock -&gt; links to ‘/’ directory or similar,  	- ‘/’ then has names -&gt; inodes with inodes pointing to blocks. Blocks can point to blocks.  	- Important Consistent Things 		- If delete dog (file), you can just delete entry in directory. Bad issue is if name deleted but lost state about ops in file system. You have pointer gone but inodes/blocks are allocated.  	- How do we know if this happens? FSCK                  What if we delete inodes, and then crash (dont delete name chunk)? We start overwriting other things  if we try to write to it.          When deleting you always delete &amp; unlink then do unfree.          When you make a new file - first allocate &amp; then link &amp; then names and things.          If you do these in order you should have consistent. But large performance penalty for fsync.                    ext2 so fast vs BSD Fast File System, but loses data - last 30 sec sometimes - wrong order of ops can throw your FS away.      JFS - Journaling FS. / ReiserFS also a thing      BTRFS is the new cool thing      Checksums -&gt; Stop instead of corruption failures        Imagine building a soda dispenserCoin -(Insert)-&gt; Select State Select -Water-&gt; DispenseSelect -Soda-&gt; SelectWhat is correctness look like?  State always valid, you have to pay, you always get what you ask forBack to Model Checking  State Compaction (heuristic) e.g. ignore filenames          Hashbased comparisons        Explore Efficiently  Find Impl Bugs (vs Model Checking usually being correctness)  It’s hard to specify correctness (cool paper: SQCK: a declarative file system checker)  Fsck was the basis for their correctness?  CMC + Stubs. They forwarded syscalls to their state machineSSDs - New FS’s try to do large sequential writes, Disk drivers make Log Structured File Systems, optimize small things - “Turf War”. (So they work with legacy FS).Disks not predictable - There’s a paper by Eric Brewer.Question: DSLs for specifying equality relations i.e. things that are the same in a filesystem?Question: Is disk control algorithms a research area still?Question: No code gen for formal models?2016-Sept-12Admin: {Wed: Time, Clocks;  Fri: No Class}Paper: Using Threads in Interactive Systems: A Case Study Hauser 93 SIGOPSPrecursor  multithread individual programs to get crisp response.  when you have 8+ cores, you need to think how to extract more parallelism.  in a modern multisocket there is two cpu’s with a dram and a PCIe each (he calls them sockets b/c cpu’s go in a  sockets), connected by a interconnect. Usually ~16 cores/cpu now. L1/L2 cache on core. L3 Cache per socket. (NUMA CPU Design).  bigger = slower means segregated memory hierachy (Physics) -&gt; Time to activate a line and length of buses.  DRAM/CPU are different fab processes - expand at different rates, you dont want the mini metal interconnects to break as they expand  HBM (high bandwidth memory) - stack of dram with a high bandwidth interconnect  Most cores can execute 2 threads at a time (hyperthreading)  PCIe - peripherical connect interface -&gt; attach flash / NIC / High speed peripheral interconnects to attach additional components.            1000’s of threads to keep cores 100% utilized        more energy efficient to buy 2x the cpu’s but things like huffman encoding because not parallelizableProcess vs Thread (in context of paper)  Process has Seperate Address space vs Shared (Thread)  Process have own resources &amp; permissions whereas Threads share those e.g. open file descriptors  Threads are cheaper (not cheap!). ~ 100kb in this, Processes are (~10s of MB).          Fibers/Coroutines: “Fiber is smaller than a thread”. Within a process cooperatively process &amp; multischedule. can have 10/100k of these.        Preemptive vs Cooperative Threads (os steps in vs thread runs till it gives up control)  A process switch requires interrupts, and then run a OS scheduler, and then returning control potentially to a different process: the most expensive thing is to invalidate the TLB :( .  Threads require interrupt but doesnt invalidate TLB  Application Schedulers on the other hand - Function call, table lookup, function call -&gt; much much cheaper.          e.g. Fiber schedulers are app level schedulers.        “Rob Pike from the Go team” has a great talk on using gothreads to write a compilerPaper  Mark Weiser (an author): one of fathers of ubiquitous computing  Kinds of Threads:          Transient:  	- Defer: Another thread to do long tasks                  Pump: Input transformer          Sleeper (time/periodic)          Slack  (e.g. batching=less work/more efficient). But slack process /w wrong thread priority / not many things to do is degrading of performance. Also possibility for priority inversion.   	- Ways to attempt to reduce deadlock: Deadlock Checker Thread / Have a thread give up all locks and try to get all of them from scratch. Also partial unrolling / failures within nested calls is painful          Task Rejuvenation: If something going wrong just kill it and have another process do the work -&gt; Masks failure. Controversial.   	- Martin Renard’s Group (MIT): Solution is that anytime you might read from bad data / e.g. segfault -&gt; just return random data and stuff works!-&gt; no one noticed the corruption (in the case of web apps).                          Micro-reboot Idea (Stanford - Candea / Armando Fox).                                          Q: Is DRAM always next to core on board?2016-Sept-9 - Lecture 2Paper: Implementing Remote Procedure Calls Birrell 1984  RPC          Have RPC look like local calls      synchronous calls      marshal args &amp; copy to foreign server      SunRPC popularized RPC.      Encoding as JSON/BSON/XML      What if we do a remote call with f(a,b) where b is 10gb? &gt; Design defined.      Decoupled Marshal from RPC (e.g. ZeroMQ with Protobuf serialization)        How do we bind in modern day?          Zookeeper        Failures          Exactly Once is impossible unless you have a reliable component e.g. hard drive - but not possible with just      We focus on async communication because real networks are not synch and “life is hard”        RPC System seems very interested in low level          Bypass Lower Layer OS network stack      RDMA      Cross-Layer Optimization        RPC / General Message Passing used commonly now  Distributed Transactional Memory possible over LAN not so much WAN."
    } ,
  
    {
      "title"    : "MapR Talk",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/talks/2016/03/22/mapr-talk-march-22-2016/",
      "date"     : "2016-03-22 00:00:00 +0000",
      "content"  : "#Mapr TalkMarch 22, 2016 - Tedd Dcooccurence vs matrix factorization  result dithering  anti-floodexplotation, diversity, speed - not the last fraction of a percent. exploratoion meaning the recommendation results today are the traning data for tomorrow. So if you make the results worse today but the training data better tomorrow - you get a better overall result.Dithering used to reorder recommendation results - reordering is done randomly.Dithering is guaranteed to make offline-performance worse.Dithering also has a near perfect record of making actual performance much better.Hours to implement - non intuitive/academic - very pragmatic.log of rank + gaussian noise and reorder. Pick noise scale to provide desired level of mixing.Exploring the second page - no click through rates after around ~20th (boundary of first page). rank because of order of presentation.floor(t/T) as a seed - stable for a time period.  - feeling of novelty.Lesson 1  Exploration is goodBayesian bandits - based on thompson sampling. Very general sequential test. near optimal regret trade-off exploration and exploitationPOssibly best known solution for exploration/exploitation - incredibly SimpleThompson Sampling: Select each shell according to probability that it is the best. Instead of estimating from probability distrbution - let’s just sample instead of estimate. Picks alternatives with the probabilities we want.COnverges faster than epsilon-greedy. (with Gamma-Normal prior). His graph showed outperformance by ~ 4x.  Refer to An Empirical Evaluation of Thompson Sampling (Chapelle and Li 2011). - asymptotically optimal - around 10 lines of code.Lesson 2: Exploration is pretty easy to do and pays big benefits.Thompson sampling is used by most ad targeting systems - need to explore to get better training data - kind of over academically because it has an optimality result.The Problem  K means clustering is useful for feature extraction or compression.  At scale and high dimenion thedesirable number of clusters increases.  Very large # of clusters may erquire more asses through the data.  Super-linear scaling generally impossibleThe Solution  Sketch based algos produce a sketch of the data  Streaming k-means uses adaptive dp-means to produce this sketch in the form of many weighted centroids which approx theorig distribution.  The size of the sketch grows slowly with increasing data size  Many operations such as clustering are welll behaved on sketches  Fast and Accurate k-means for large datasets (wong/meyerson/shindler)  Revisitng k-means via bayesian nonparametrics (jordan)  Lots of clusters are fine  Avoids the k-means failure of two seeds being fixed next to each other  Sketch with k log k centroids claimedLesson 3: Sketches make big data smallExample 4: Search Abuse.Recommendation: Sparse data around a person, but lots of data from lots of people - learn patterns from crowd extended to a person.E.g. Alice got an apple nd a puppy. Charles got a bicycle. Bob got an apple.  - We recommend Bob a puppy.What if everyone get’s a pony including amelia - now what do we recommend? Nothing we cant tell :(.Cooccurrence Analysis  is great for this.  Different from text search, recommendation search based on using as indicators using cooccurence gives us better results!Lesson 4: Recursive search abuse pays. Search can implement recs which can implement search.Example 5: Something useful? Like something to do with money.Common Point of Compromise:Scenario - Merchant 0 is compromised, leaks account data during compromise, fraud committed elsewhere during exploit, high background level of fraud, limited detection rate of exploits.Goal: Find merchant 0.Metagoal: Screen algos for this task without leaking sensitive data.Simulation Strategy: Pick consumer parameters such as transaction rate, prefs - no details of fraud/fraudsters/transactions/models! Then simulate using compromised period and then have higher probability of fraud during exploit probability. How can this be good? Solution: Simulate failure modes of the real system.Parametric Simulation: Parametric matching of failure signatures allows emulation of complex data properties. Matching on KPI’s and failure modes is pretty good.e.g. Hive was broken - given schema  + skew of data - generated something to break query.SummaryWe live in the golden age of newly achieved scale. Scale has lowered the tree - hard problems are much asier, lots of low-hanging fruit all around us.Cheap learning has a huge value.Code available at github.com/tdunning"
    } ,
  
    {
      "title"    : "Build-A-Thing",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/27/build-a-thing/",
      "date"     : "2016-01-27 00:00:00 +0000",
      "content"  : "Pseudo Interpreter &amp; Web ServerBuild a lang-NystromGame Building-NystromBuild your own LispBuild a startup: “Why Should You Start a Startup?”"
    } ,
  
    {
      "title"    : "Presentation Tricks",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/26/presentation_tricks/",
      "date"     : "2016-01-26 00:00:00 +0000",
      "content"  : "Presentation Tricks  Start out with a really interesting story, or statistic or misconception"
    } ,
  
    {
      "title"    : "How I read",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/14/the-post-8931/",
      "date"     : "2016-01-14 00:00:00 +0000",
      "content"  : "I personally like a combination of [1] and [2] when reading papers. These are summarized (mostly) in a nice infographic here when reading papers.General Format: (also easier so i can copy &amp; paste)* TOC{:toc}## TitleAuthors*Question Being Answered*:  *One sentence answer*:  *"Low Level" Notes*:  *Questions I have*:   *Particularly Interesting Phrases/Points*:   "
    } ,
  
    {
      "title"    : "Mobile Health Readings",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/14/the-post-8999/",
      "date"     : "2016-01-14 00:00:00 +0000",
      "content"  : "Focused on Mobile / IoT Tech in Healthcare  PWC’s The Wearable Future  Perspectives on pervasive health from some of the field’s leading researchers  Can Mobile Health Tech Transform Health Care?PWC’s The Wearable FuturePWC: located hereReport structured as sort of a survey over wearable tech hence everything here is “low level”.Section 1: Executive Summary Section:  Enterprise has a “huge opportunity”  Wearables can increase loyalty &amp; productivity and has many applications in enterprise  Wearables need to be “anchored in human centered design”  Need to be part of an ecosystem to provide value  Can change advertising and of course healthcare and generally media presentation  Can be used in workforce training &amp; productivity  Wearable tech needs to be prescriptive to be useful  Privacy/Security &amp; Price point are main concerns  There is vast opportunity : their examples are stress reduction, strengthened family connections, improving personal accountability, improved customer serviceSection 2: Wearable Worlds (Dystopia or Utopia):Provides two alternate storiesSection 3: Wearables at a crossroad:  Wearable tech products have currently underdelivered - they believe the Apple Watch should be better.  Better adoption than a tablet  Wearables attached to phone rather than independent.Section 4: Research Methodology:  Worked with BAV Consulting (leader in brands/customer research)  (Define) Wearable Tech = “Clothing and accessories incorporating computer and advanced electronic technologies”  They talked to Panelists, brainstormed and samples 1k consumers of Census National Representation*Section 5: Snapshot of the Wearable Future *:  Statistics and usecases, pretty pictures are nice*Section 6: Where wearable tech stands today *:Gives some gender-specific results/example wearablesSection 7: The Business of Wearables:  Can be used to differentiate brands.          Virgin Airlines using Google Glass for alerting staff of important customers      Provide context relevant content while considering a product.      People are more excited for wearables from tech brands.        Uses in retail and entertainment are popularSection 8: Consumers and Wearables:  Ambivalence rules wearables right now  Current Mood: We have data… but what do we do with it?  Wearables can either be primary or secondary devices - is it independent of a smartphone?  The real opportunity is “addressing unmet needs”          Secondary possiblity: Directing goal-directed behavior, and info overload filtering        Privacy iss till a concern  Hitachi has made a communication habit &amp; energy level detecting employee badge!Section 9: What’s next?Recaps the need to embrace tech as a business.Questions/Points:  The Wearable Utopia/Dystopia was a great juxtaposition.  “Super data” &gt; Big data. this terminology is funny  Pg 11 says B2B market will be revolutionized … but how  Why the Apple bias?  What do they mean by Census National representation (pg 14).: As in a statistically Representative group?  Ambivalence rules wearables right now  Current Mood: We have data… but what do we do with it?Perspectives on pervasive health from some of the field’s leading researchersDey et al (2011)Question Being Answered:  What is pervasive health and what’s happening in it?One sentence answer:  Collated opinions  - no summary“Low Level” Notes:What is Pervasive Health?  Application of pervasive computing tech for healthcare/health  Making healthcare available everywhere/everytime  Using ubicomp tech to increase medical knowledge / contribute to healthcare delivery  Convergence of personal devices, sensing, embedded computing to advance healthcare qualityExample Projects:  Mining reality to collect “honest” signals  Social signals can assess behavior diseases (e.g. obesity)  Continuous sedentary activity type detection  Mobile phone weight lost intervention tool using JIT feedback and persuasive theories  FitBaby, connecting parents with clinicians and documentation of daily premature-infant living  Detection of pressure ulcersThey conclude that the area is is a burgeoning research area and they “expect … [smartphones] .. will be a dominant research and consumer platform for pervasive health” and mention some challenges, e.g. low power, sophisticated sensing, balancing privacy concerns, and treating “in clinically valid ways”.Questions I have:Particularly Interesting Phrases/Points:Can Mobile Health Tech Transform Health Care?Steinhubl et al (2013) [PubMed]Question Being Answered:  Can Mobile Health Tech Transform Healthcare?One sentence answer: The potential exists but there are obstacles“Low Level” Notes:  3 powerful drivers:          Unsustainability of current healthcare spending      Rapid growth of wireless connectivity (&gt;3.2b mobile users)      Need for personalized medicine        Obstacles:          Current health care system complexities &amp; reimbursement incentives      Low quality apps (potentially harmful)        Possible Use cases now:          self - Diagnosing acute symptoms (34% of visits are b/c of acute symptoms. e.g. Viral respiratory tract infections)      Recording biometric info      Better control chronic issues ( &gt; 50% of US has &gt;= 1 chronic condition - 90% of spending)                  Hypertension (1/3 adults, 40m office visits, $93b costs): possible improvements: Home monitoring &amp; Blood Pressure Cuffs.                    All of these can reduce # of doctor visits. Move general doctor time to patients that need it rather than general algorithmic visits.Questions I have:  Self diagnosing is generally a contentious point!  Otitis Media? : Middle ear inflammatory disease familyParticularly Interesting Phrases/Points:"
    } ,
  
    {
      "title"    : "How I read",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/14/the-post-8931/",
      "date"     : "2016-01-14 00:00:00 +0000",
      "content"  : "I personally like a combination of [1] and [2] when reading papers. These are summarized (mostly) in a nice infographic here when reading papers.General Format: (also easier so i can copy &amp; paste)* TOC{:toc}## TitleAuthors*Question Being Answered*:  *One sentence answer*:  *"Low Level" Notes*:  *Questions I have*:   *Particularly Interesting Phrases/Points*:"
    } ,
  
    {
      "title"    : "Designing Human Centered Systems Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/class/2016/01/14/the-post-2300/",
      "date"     : "2016-01-14 00:00:00 +0000",
      "content"  : "  Lecture 2          Intro      Pre vs Post 1950s Computing      Vannevar Bush      Grace Hopper      Interfaces      JCR Licklider        Lecture 1          Intro      Design Myths!      Why is Good Design Important?      Lecture 2Class Questions  Why do punch cards have diagonal lines? To help them algn if you drop them  Absolute vs Relative Pointing?  Many early input devices were part of radar systems - why?Class Challenges  When were the following invented?          GUI      Mechanical Computer      Electrical Computer      TouchScreen      Mouse        Input device that fits criteria (XYZ positioning)/ XY and rotation in Z axis)Intro  Man Machine interfaces preceded HCI          Knobs/buttons/slides, good interfaces preceded computers      Jacquard Loom (1801)      Tabulating machines (1890)      knobs/levers/mechanical used till ~1950s (e.g. Charlie Chaplin’s view of the Modern times in 1936)        Electronic Interfaced          Plugboards (1906-1940).      Batch Interfaces (1945-1968; ENIAC 1943-6; Key Punch Machine)      Terminals/CLIs (1969-90)      Micros (1970s/80s)      Pre vs Post 1950s Computing  Users had to accomodate computers, and UI was overload  Military applications were valuable, pieces came togetherVannevar Bush  Influential policy maker, Director of Office of Scientific R&amp;D, foundes NSF.          Ideas: Memex (palm pilot/smartphone) / Hyperlinks      Augment the power of the human brain now, not just physical abilitiesGrace Hopper  Wrote A0 compiler (1950s)Interfaces  Joysticks (1908/20’s)  Trackball (1942)  Light Guns/Pens (1950)  Sage (1954)  Sketchpad (1963, CMU Alum Ivan Sutherland)  Glove Keyboard (1960)  Knee Operated Pointers (1960)  Touch Screen (1965)  Mouse (1964-7)  Input TaxonomiesJCR Licklider  Man-Computer Symbiosis, HCI ResearcherLecture 1Class Questions  What is HCI?  What is UX?  Why do we care?Class Challenges  Make  5 progress bars and try to see if your participants can guess what % full they areIntro  Everything has a design criteria and is done within a context  HCI:          Human: End user/Other people in org/Surrounding Culture Context      Computer: Hardware/Software      Interaction: User tells computer what it wants, Computer communicates results        3 Legged Stool Analogy (Components of HCI): Computer Science, Design, Behavioral SciencesDesign Myths!  Good Design is just cool graphics  Good Design is just common sense  We can fix the interface at the end (USPS card reader example, and adult swim video about guy trying to use auto mail thing).  Marketing takes care of understanding customer needs(There are 5 more we don’t talk about)Why is Good Design Important?  50% of work developing  Bad user interfaces cause loss of money, reputation, time, security, lives!  UX IS KING          hardware isn’t a differentiating factor anymore        How do we make good interfaces?          Iterative Design (waterfall is eww)      Great ideas are often simple: Mouse, Guis, Touchscreens, Emoticons, Hyperlinks,      Good ideas stick around: Wheel &amp; Axle, String/Rope/Shoes, Beds, Doors      Physical &amp; Human factors change slowly!      Culture and tech change alot!      (Look at examples of badly designed UIs)Homework: Decorate your tile! … and get markers"
    } ,
  
    {
      "title"    : "Psych Foundations for Designing Impact in HCI Readings",
      "category" : "",
      "tags"     : "",
      "url"      : "/reading%20papers/2016/01/13/the-post-8956/",
      "date"     : "2016-01-13 00:00:00 +0000",
      "content"  : "  “A psychologically “embedded” approach to designing games for prosocial causes”“A psychologically “embedded” approach to designing games for prosocial causes”Geoff Kaufman, Mary FlanaganQuestion: How can we engage people with real life scenarios and key societal issues without triggering psychological defenses?One sentence answer: Use methods to hide the message: (1) Intermix on and off topic content, (2) Use game genrres or framing devices to “direct players’ attention/expectations away from the games true aims”“Low Level” Notes:Intro  Games have a lasting impact on society  Focus on negative impact of games has leaded inconclusive results, hence recent efforts have also looked at the potential for prosocial attitudes to be instilled  Other (less successful) approaches          Making the user informed. (Turns out this doesnt necessarily cause positive impact). Directness can trigger defenses that blunt persuasiveness or inspire beliefs counter to intended outcome.      Embedded Design  The Awkwardness Game used obfuscating to reduce stereotypes and bias in STEM domains.Study 1A: Testing effectiveness of Intermixed Strategy  Test Method: 309 participants from Middle/High Schools in New England in mixed gender groups.  Results Measured using (1) Assigning scientist role to one of 3 female characters, and (2) Rating set of 5 responses to 5 situations with an overt target of biasStudy 1B: Intermixed vs Imbalanced versions  Test Method: 232 youths (middle/high school) to Intermixed, Inbalanced, control condition (5,9,0 overtly biased-related cards).  Results measured using (1) Degree which someone else can read a drawing of an E on their forehead (2) Perceived measure of sarcasm in a statement.The Buffalo Game: Given a noun and adjective identify a real/fictitious person with those in order to collect cards. (Some interesting pairings: tattooed visionary, saintly merchant)Study 2A: Effectiveness of Obfuscating  Test Method: 193 College students assigned to a game/no game of buffalo.  Results measured using (1) “list 4 social identity groups important to them (gender, race, ethnicity, religion, profession, hobby group, etc …) then rate how similar the avg member of each group is to the avg member of the other groups from 1 - 9 (extremely similar) these then avged. Lower similarity = higher social identity complexity. (2) Universal Orientation Scale: 20 statements they (1) strongly disagree to (9) strongly agreeStudy 2B: Additional Evidence for 2A’s goal  Test Method: same as 2A (201 students)  Results measured using (1) Internal Motiation to Repsond without Prejudice Scale.Other Strategies  Distancing, Embodied Cognition, Priming, Strategic inversion, Delayed revealGeneral Discussion/Conclusion  Embedded Design provides complementary methods, also the idea of precursor gamesQuestions:  So wouldn’t you get different biases from the college student population regardless of them playing Buffalo - the no game condition is surprising.  Why is the framing part sort of squished at the end of 2B?  More “incorrect” uses would be nice / bad scenarios.Interesting Phrases: “Safe space” of perceiving content in “Party” Games."
    } ,
  
    {
      "title"    : "Systems Design Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/08/the-post-5518/",
      "date"     : "2016-01-08 00:00:00 +0000",
      "content"  : "General  General Paradigms (Reflection)  Usernames when logging inScaling Up-Counting Objects-View Counting at Reddit-ELI5 Load Balancing OSComprehensive and biaised comparison of OpenBSD and FreeBSDCloud- Try considering GCE over AWS for in-between region streaming, also significant time-to-first-byte difference and different long-term-cold-storage use cases TimeList of Critical DatesDistributed  Use epoll/kqueue not select/poll as they are more scalable  CAP is kind of a lie [1] [2]  Distributed Systems for New Entrants  UUIDs dont have timestamps and mobile UUIDs are badApp Architecture / Ops  The 12 Factor AppPerformance Fiddling  C Performance Tips  Linux Perf + PMC PerformanceText  Edge Cases to Keep in Mind. Part 1 – TextRecommenders  Two Decades of Recommender Systems at Amazon.comDatabases  Large Table PaginationScaling Humans  My Heroku values- Adam Wiggins (Heroku Cofounder)Compilation  https://github.com/donnemartin/system-design-primerUX  https://thestyleofelements.org/the-art-of-the-error-message-9f878d0bff80"
    } ,
  
    {
      "title"    : "Fun &quot;Facts&quot;",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/07/fun-facts/",
      "date"     : "2016-01-07 00:00:00 +0000",
      "content"  : "News  (2013) China’s parliament: has 83/3000 Billionaries, who after campaigns against extravagance are even more convinced of the need to be within the political tent [1]“This is largely due to the firm’s unusual approach to two dimensions of corporate life. The first of these is time. In an era when executives routinely whinge about pressure to produce short-term results, Amazon is resolutely focused on the distant horizon. Mr Bezos emphasises continual investment to propel its two principal businesses, e-commerce and Amazon Web Services (AWS), its cloud-computing arm.” fromInteresting  The suffix -path means                  Used to form nouns indicating someone with a particular disorder        Used to form nouns indicating someone with a particular capability, as a type of remedial treatment                  There aren’t really “different learning styles”, most people learn similarly [1][2]    Hospital Unions exist, and doctors are being outsourced      CRISPR was really hard to get published        The Zeigarnik Effect “is the tendency to experience intrusive thoughts about an objective that was once pursued and left incomplete”    There’s fields called music cognition and affective computing"
    } ,
  
    {
      "title"    : "Tools",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/07/Cool-Tools/",
      "date"     : "2016-01-07 00:00:00 +0000",
      "content"  : "Something like an annotated link list for things that could be helpful when developing/designingDesignFuseTools: UI markup language with responsive realtime edits across devicesPrincipleSites for stuffCSPen Test Tools Cheat SheetNematus: a Toolkit for Neural Machine Translation"
    } ,
  
    {
      "title"    : "Interesting Links",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2016/01/01/InterestingLinks/",
      "date"     : "2016-01-01 00:00:00 +0000",
      "content"  : "Courses  http://schoolofherring.com/videos/  Startup School MOOC  Coursera/EDX/UdacityCool Tech  Interactive Gym Wall  Server room with seismic isolation floor  Sorting Legos with NNs  Building a Better Dev ChromebookLegal  Saved By Supreme Court Alice Ruling (Patent Troll Case Studies) EFF  Supreme Court is allergic to MathLife Skills  How a car works guide  Busy Person patternsReading  LeVar Burton Reads Short StoriesHobbies  World’s largest library of historical European martial arts booksBusiness  https://exponents.co/twilio-market-opportunities-risks/  https://www.wsj.com/articles/the-downside-of-full-pay-transparency-1502676360Humanities + Social SciencesEconomics  https://www.gamasutra.com/blogs/RaminShokrizade/20130405/189984/How_I_Used_EVE_Online_to_Predict_the_Great_Recession.phpMathPopularA Mathematician’s LamentSet Theory  Arithmetic Representability  Constant Time Math (Rotations)Encyclopedic/Lookup/Reference  The Matrix CookbookApplied  Vickrey Auctions @ Pricing KeyboardsCSDB  POSTGRES QUERY PLAN VISUALIZATIONDev Ops  ELI5 KerberosASM  Visual ARM EmulatorCompilers  Growing a Compiler (Self Hosting)FS-ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparisonComp Fi  INSIGHTS INTO HIGH FREQUENCY TRADING FROM THE VIRTU INITIAL PUBLIC OFFERINGWebdev  CSS AnimationsPL  Bootstrapping a Type system  Blog: GHC is getting Linear Types  A deep dive into Multicore OCaml garbage collectorC  Comparing LibC alternativesML/AI  Visualizing Caffe Neural Nets  Few points on props of Deep Learning that can be trained in   Automating Software Development using logic + AI  DeepMind teaches itself to walkAI Commercialization  Vertical AI Startups“Big Data”  Categorized Software PackagesSoftware Packages  Stanford Driving SoftwareStartups/YComb  Why YCombinator made a differenceLibraries  How Libraries Remove BooksNews  Trending Github Projs  How Ridehailing Impacts Public Transport  atlasobscura, quartz, theconversationGeneral Technology/Engineering  A Camshaft-Free Engine (Koenigsegg) (Video)Github Projs  Markdown-&gt;Presentations  Tiny Example Renderer  Neural DoodlerInfographics2011 Marketing Tech CompaniesDesignProportional vs Lining; Old Style vs Tabular; Right align your tabular data1 2Schoolism Art ClassesWebsites w/o CodingWebflowNews ArticlesA lawyer that spent his career suing DuPont over PFOA-water contaminationWhat (CS) Tech to useWhy not to use Scala - Learning OverheadHiring  Considerations when hiring millennialsFood  [What It Actually Costs to Open a Restaurant in San Francisco](https://sf.eater.com/2017/6/27/15733554/cost-open-restaurant-robin-adam-tortosa-san-francisco]Physics  How to become a GOOD Theoretical PhysicistPhilosophy-Time is a causal arrowInternet Classes/Courses/Univ Linkshttps://github.com/prakhar1989/awesome-courseshttp://courses.cms.caltech.edu/cs179/http://ai.berkeley.edu/home.htmlBlogs (without RSS feeds :( )http://codahale.com/http://www.evanmiller.org/index.htmlhttp://danwang.co/http://elijames.org/Videos/Documentarieshttp://www.hbo.com/documentaries/only-the-dead-see-the-end-of-war/synopsis/about.htmlGuidesMIT Lock Picking GuideLearn a Websec  http://chall.tasteless.eu/#History  Esperanto as an Asian LanguageEnvironmental Science  Toxicity Map of US: NIHBallroom  http://www.ballroomguide.com/workshop/latin/cha_cha/three_cha_chas_fwd_back.htmlTech Talks  Kafka Mgmt @ LI"
    } ,
  
    {
      "title"    : "15110 Notes/Explanations",
      "category" : "",
      "tags"     : "",
      "url"      : "/misc/2015/12/26/15110Links/",
      "date"     : "2015-12-26 00:00:00 +0000",
      "content"  : "A collection of notes/exercises I made while TAing 15110.Practice ProblemsLab Exam 1 PracticeNotesDictionaries ExplainedEntropyHow To Use Gedit/Terminal"
    } ,
  
    {
      "title"    : "Reading List",
      "category" : "",
      "tags"     : "",
      "url"      : "/books/2015/12/25/ReadingList/",
      "date"     : "2015-12-25 00:00:00 +0000",
      "content"  : "Find More Likehttps://en.wikipedia.org/wiki/Elizabeth_Loftus#The_memory_warsYCombinator LinksGPU Text RenderingDesign  Massive Change  Draplin Design CoPresentations  http://www.pdl.cmu.edu/SDI/2015/slides/DatacenterComputers.pdf  Crash course in x86 for Reverse Engineers  AGI General Intelligence (Karpathy) Theses  Algebraic Subtyping  Group theoretical methods in machine learningReports  McKinsey: State of AI in 2017  Type Systems - Luca CardelliPapers  https://news.ycombinator.com/item?id=10783983  2010 CMU Big Data Reading Group  Doom 3 Network Architecture  ETH Zurich Systems Group  Fast Userspace Packet Processing (click)  The Structure and Performance of Efficient Interpreters  TACOTRON: A FULLY END-TO-END TEXT-TO-SPEECH SYNTHESIS MODEL  SILT: A Memory-Efficient, High-Performance Key-Value Store  Image Super-Resolution Using Deep Convolutional Networks  Approximation by Superpositions of a Sigmoidal Function  Deep biomarkers of human aging: Application of deep neural networks to biomarker development  Memories of unethical actions become obfuscated over time  ARRAY LAYOUTS FOR COMPARISON-BASED SEARCHING  Writing parsers like it is 2017  Infiniswap: Efficient Memory Disaggregation  MAKING HUMANS A MULTI-PLANETARY SPECIES  cGAN-based Manga Colorization Using a Single Training Image  On-the-Fly Garbage Collection: An Exercise in Cooperation (Djikstra,Lamport)  Natural Language Thm Prover  [A comprehensive study of Convergent and Commutative Replicated Data Types] http://hal.upmc.fr/file/index/docid/555588/filename/techreport.pdf)  BitFunnel: Revisiting Signatures for SearchAI/CNN/ML PAPERS  Learning to Generate Reviews and Discovering Sentiment  Developing Bug-Free Machine Learning Systems With Formal Mathematics  Fast Regex Generation using NNs  Google’s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation  Learning Transferable Architectures for Scalable Image Recognition  Towards Biologically Plausible Deep Learning  Machine Learning: An Applied Econometric ApproachLiskov’s “Must Read” For Computer Scientists (from here)Dijkstra, E. W. (1968). Letters to the editor: go to statement considered harmful.Communications of the ACM, 11(3), 147-148.    Wirth, N. (1971). Program development by stepwise refinement. Communications of the ACM, 14(4), 221-227.    Parnas, D. L. (1971). Information distribution aspects of design methodology. Dahl, O. J., &amp; Hoare, C. A. R. (1972). Chapter III: Hierarchical program structures (pp. 175-220). Academic Press Ltd..    Morris Jr, J. H. (1973). Protection in programming languages. Communications of the ACM, 16(1), 15-21.   Liskov, B., &amp; Zilles, S. (1974, March). Programming with abstract data types. In ACM Sigplan Notices (Vol. 9, No. 4, pp. 50-59). ACM.    Liskov, B. H. (1972, December). A design methodology for reliable software systems. In Proceedings of the December 5-7, 1972, fall joint computer conference, part I (pp. 191-199). ACM.    Blog Posts  http://danluu.com/perf-tracing/  Twitter’s DB: Manhattan  Linux Networking Stack  Data Structures for External Memory &amp; Cambridge CS Notes  Variational Encoders  How does GDB Work?  Intro To Galois Theory  Category Theory for Programmers  An Adversarial Review of “Adversarial Generation of Natural Language”  Danny Britz, Google Brain Resident  Writing a Formally-Verified Porn Browser in Coq and Haskell  Li Haoyi, Dropbox Lead/Fluent Tech  Graphs not grids: How caches are corrupting young algorithms designers and how to fix it  Mathy Vanhoef: Windows MAC Address Randomization  Transit and Peering: How your requests reach GitHub  What do economists do at Tech Firms?  A few CTF/Bug Bounty ReportsBooksArt  The Story of Art (E.H. Gombrich)Business  Machine That Changed the World  Yes, And: How Improvisation Reverses “No, But” Thinking and Improves Creativity and Collaboration–Lessons from The Second CityCooking  The Sci of Good CookingCog Psy  Cog Psy  PsychoPharmMedical  Huangdi Neijing - Ancient Chinese Medical TextTypography  http://practicaltypography.com/Math  Calculus Made Easy  STREET-FIGHTING MATHEMATICS  An Introduction to the Theory of Elliptic Curves  Mathematics for Physics  A Computable Universe: Understanding and Exploring Nature as Computation  Georgia Tech Online Math Textbook Collection (Prof Cain)  Uminnesota Textbook Collection  American Institute of Math Textbook Collection  Warren Siegal’s Upper Level Physics Books (Stonybrook QFT Group)  American Math Society Lecture Notes  Open Access Game Theory BookDescriptive Set TheoryLife of Godel (from U&amp;I class) Music  Music, Thought, and Feeling: Understanding the Psychology of Music  5 Books on WagnerAutonomous Cars  Whats new in Auto Vehicle Verification (2017 Stuttgart Symposium)Being a Professor  “What do academics do all day”?(The academic’s art of work)CSArchitecture  Risc V workshop ProcSystems  Software Optimization      Linux Graphics Demystified    What Every Programmer should know about Memory - Ulrich Drepper   The Linux Programming Interface: A Linux and UNIX System Programming Handbook  Unix Hater’s Guide  Compiler Construction - ETH Zurich  High Performance Browser Networking - W3C Cochair  Linux Device Drivers - O’Reilly  The Art of Multiprocessor Programming      Reverse Engineering Malware    Memory Efficient Java Study (PLDI09)  System-level Recap of C + ASM Interface  Ask HN: Primer on Cryptocurrencies  Ask HN: modern computer graphics?  Ask HN: Learn Computer vision?  Automated TradingTheory  CS Guide to Cell Biology - CMU’s Cohen  Information Theory - Cambridge’s MacKay  http://stackoverflow.com/questions/1711/what-is-the-single-most-influential-book-every-programmer-should-read  Applied Crypto Guide - Waterloo  Decision Procedures - Oxford  Building Problem Solvers - Northwestern  Okasaki’s Thesis/FP book - CMU thesis  Making of PPT (Creator of Startup)  Theory of Distributed Systems, Randomized Algos, Computational Complexity - Yale  Thirty-three Miniatures: Mathematical and Algorithmic Applications of Linear Algebra  Theoretical Computer Science: An Introduction (Univ Saarland)  Bitcoin and Cryptocurrency TechnologiesGraphics  Dithering Algorithmshttps://www.jyotirmoy.net/posts/2015-12-29-springer-openaccess.htmlCompetitive Prog  https://cses.fi/book.pdfOther People’s Reading Lists  https://gist.github.com/macintux/6227368  https://gist.github.com/stfairy/4076899  https://gist.github.com/nickloewen/10565777  https://github.com/junhyukoh/deep-reinforcement-learning-papers  http://dancres.github.io/Pages/  Ask HN: Primer on Cryptocurrencies  Fermat’s Library  Ask HN: Good Papers for Beginners  https://www.anmolsarma.in/post/books-2015/Tutorials  How to make an OS  Write your own blockchainother  Lasers FAQ  List of “Awesome Things” including papers  	Ask HN: What language-agnostic programming books should I read?Business  Who Says Elephants Can’t Dance? (IBM Turnaround)Courses  Stat Learning Theory - 281B (Jordan)  Digital Photography - Stanford  Ask HN: What are the best MOOCs you’ve taken?History  https://www.nytimes.com/2016/10/02/opinion/sunday/if-i-sleep-for-an-hour-30-people-will-die.htmlJobPM  https://hackernoon.com/acing-your-product-manager-interview-e4f163408cefCompensation  http://fortune.com/2016/09/27/the-complete-guide-to-understanding-equity-compensation-at-tech-companies/TODOTO Read Eventuallyhttp://plindenbaum.blogspot.com/2012/11/visualizing-dependencies-of-makefile.htmlhttp://linux.die.net/lkmpg/x769.html [read write a proc file]https://events.linuxfoundation.org/sites/events/files/slides/petazzoni-device-tree-dummies.pdfhttps://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2012/september/details-on-the-crime-attack/http://googleprojectzero.blogspot.com/http://wifi-insider.com/wlan/wmm.htm (wmm/802.11 primer)https://fgiesen.wordpress.com/2014/07/07/cache-coherency/ (cpu cache coherency) and"
    } ,
  
    {
      "title"    : "Books To Acquire",
      "category" : "",
      "tags"     : "",
      "url"      : "/books/2015/12/25/BooksToGet/",
      "date"     : "2015-12-25 00:00:00 +0000",
      "content"  : "Springer books(automatically generated)ISBN            ISBN             Author(s)             Title                  10.1007%2F978-1-4615-0215-9             by Joseph I. Goldstein, Dale E. Newbury, Patrick Echlin, David C. Joy, Charles E. Lyman, Eric Lifshin, Linda Sawyer, Joseph R. Michael.             Scanning Electron Microscopy and X-ray Microanalysis              10.1007%2F978-3-642-55631-9                           Lineare Algebra              10.1007%2F978-3-642-72555-5             by Helmut J. Fischbeck, Kurt H. Fischbeck.             Formulas, Facts and Constants for Students and Professionals in Engineering, Chemistry, and Physics              10.1007%2F978-94-011-6022-3             Albert Einstein ; with a new foreword by W. H. McCrea.             The meaning of relativity      DX Dois            DOI      Title                  “10.1007%2Fb114222”      Advanced Organic Chemistry-Part 1              “10.1007%2Fb114293”      Advanced Organic Chemistry-Part 2              “10.1007%2Fb97397”      Principles of Terrestrial Ecosystem Ecologye      "
    } ,
  
    {
      "title"    : "Intro to Disk Drive Modeling",
      "category" : "",
      "tags"     : "",
      "url"      : "/storage%20systems/2015/12/01/IntroToDiskDriveModeling/",
      "date"     : "2015-12-01 00:00:00 +0000",
      "content"  : "“An Introduction to Disk Drive Modeling”  - Ruemmler and WilkesQuestion: How good are disk drive simulation models?Result:  Demonstrates and describes a calibrated, highquality disk drive model in which the overall error factor is 14 times smaller than that of a simple first order modelTrends  40-60% microprocessor speedups / yearModern Drive Characteristics  State of the art in nonremovable magnetic disk drives with SCSI (small computer systems interconnect) controllers          Disk Drives have:                  Mechanism: Recording components (disks / heads) and positioning components (assembly that moves heads &amp; track following system)          Controller: Manages storage and retrieval of data from mechanism and performs logical address -&gt; physical sector mappings            In Depth time            #####Recording:                              Disk Sizes: 1.3-8” diameter [2.5, 3.5, 5.25 common]      Smaller disk = less {surface area, data}, less{ power, seek distance}, spin faster                  As storage density increases, people prefer smaller disks                    Increased storage density means:                  Better Linear Recording Density : 50k bits/pinch. Determined by max rate of flux changes          Packing Data Tracks closer: 2.5k tracks/inch                    Single disk has 1-12 platters spinning in lockstep      3600-7200 rpm      Single r/w data channel that switches between heads that encodes/decodes data stream to magnetic phase changes      Multichannel disks are costly because of cross talk between concurrently active channels and keeping heads aligned simultaneously#####Positioning:      Data stored as concentric circles (tracks)      Stack of tracks $k away on all platters is a cylinder                  3.5 inch disk ~ 2k cylinders                    Data accessed by disk head over track      All disk arms are attached to same rotation pivot      Positioning system ensures head gets to the desired track and stays there no matter what external factors: e.g. vibrations, shocks, disk flaws      Seek time ~ power^2 &amp; Arm’s Stiffness (30-40g accelerations to achieve good seek times, and flexible arms can twist)        pg5  "
    } ,
  
    {
      "title"    : "Evolution of Google FS Talk",
      "category" : "",
      "tags"     : "",
      "url"      : "/talks/storage%20systems/2015/11/23/GFS-Talk/",
      "date"     : "2015-11-23 00:00:00 +0000",
      "content"  : "Google - Larry Greenfield lfg@google?Evolution of Google FS  Storage Run in datacenters  petabyte of free space?  gfs          2002      location indep namespace      100’s of tb - scaled to 10s of PB      userspace, no POSIX semantics (not atomics)                  reading/writing file at same time not a great idea                    simple design, good for large batch work      GFS Masters hold state of filesystem                  3 way chunking replication          Files &lt;-&gt; Chunk Mapping          Clients talk to GFS master first, then data next          Only one GFS master (primary) and backups                    GFS Write:                  Open includes location of first/last chunk          FindLockHolder if additional chunks are needed          Buffer sends data to chunk server          Write commits buffers to disk, Chunk server sends things to chunks                          This daisy chaining is great for networks                                Accelerations                          shadow masters - read only lagging replicas                                multiple GFS cells per chunk server (scale metadata - manual sharding)          automatic master election / consistent replication          archival reed-solomon encoding                          must be first written replicated              might have long pauses when reading                                          From internal GFS 101 Slides: What is GFS Bad for                  Predictable performance (No guarantee of latency, no operation timeouts)          Structured Data (GFS is filename -&gt; blob data store)          Random Writes (Optimized for parallel append)          High Availability (fault tolerant not HA)                    architectural problems                  GFS Master:                          One machine not large enough for a large FS              Single bottleneck for metadata ops                                GFS Semantics                          Unclear state of files when not consensus? (missed slide)                                          Some GFS v2 Goals                  Bigger, faster, predictable performance, predictable tail latency          GFS Master replaced by Colossus          GFS chunkserver replaced by D                    Solve an easier problem : Optimize for bigtable                  File system for bigtable          append ony          single writer          rename only to indicate finished file          no snapshots          directories unnecessary          Where to put metadata?                    Storage options back then                  GFS-          BIgtable (sorted kv store on GFS)          Sharded MySQL with local disk &amp; replication                          ads db                                Local kv store with Paxos Replication                          Authentication DB              Chubby                                Metadata in Bigtable (!?)                      GFS master -&gt; CFS          CFS Curators are bigtable coprocessors      bigtable row corresponds to a single file      stripes are replication groups: open, closed, finalized (replication unit)      And then I had to leave for an interview :("
    } ,
  
    {
      "title"    : "Types and Programming Language Book Notes",
      "category" : "",
      "tags"     : "",
      "url"      : "/books/2015/11/22/TypesAndProgLanguages/",
      "date"     : "2015-11-22 00:00:00 +0000",
      "content"  : "Author &amp; Citations to Benjamin Pierce @ Univ. of Pennsylvania#1##1.1 Types in CS  Formal methods vs Lightweight Formal Methods          E.g. Hoare Logic vs Model Checkers              A type system is a tractable syntactic method for proving the absence ofcertain program behaviors by classifying phrases according to the kindsof values they compute…A type system can be regardedas calculating a kind of static approximation to the run-time behaviors of theterms in a program. (Moreover, the types assigned to terms are generally calculatedcompositionally, with the type of an expression depending only onthe types of its subexpressions.)  Type systems are conservative and can prove some behaviors don’t exist, not that they do.##1.2 Why Type Systems?  Detecting Errors          Strength depends on expressiveness of typechecker      e.g. You can do dimension analysis        Abstraction          Module Languages      Documentation and clues about purpose of code        Language Safety          “Safe Language is one that protects its own abstractions”      "
    } ,
  
    {
      "title"    : "Storage Systems Readings",
      "category" : "",
      "tags"     : "",
      "url"      : "/storage%20systems/2015/09/07/StorageSystems/",
      "date"     : "2015-09-07 00:00:00 +0000",
      "content"  : "Week 1Disk Modeling"
    } ,
  
    {
      "title"    : "Init",
      "category" : "",
      "tags"     : "",
      "url"      : "/2015/09/06/Init/",
      "date"     : "2015-09-06 00:00:00 +0000",
      "content"  : "blog init"
    } 
  
  ,
  
   {
     
        "title"    : "404 - Page not found",
        "category" : "",
        "tags"     : "",
        "url"      : "/404/",
        "date"     : "",
        "content"  : "Sorry, we can’t find that page that you’re looking for. You can try take for a look by going back to the homepage."
     
   } ,
  
   {
     
        "title"    : "About",
        "category" : "",
        "tags"     : "",
        "url"      : "/about/",
        "date"     : "",
        "content"  : "Hi!Study:  Past: Carnegie Mellon  Present: UC Berkeley, Stanford, CCSFBuilds things at &lt; tech company &gt;Contact meName is intentionally confusingEmail:  https://mailhide.io/e/9YzxH"
     
   } ,
  
   {
     
   } ,
  
   {
     
   } ,
  
   {
     
   } ,
  
   {
     
   } ,
  
   {
     
   } ,
  
   {
     
        "title"    : "Simple-Jekyll-Search",
        "category" : "",
        "tags"     : "",
        "url"      : "/bower_components/simple-jekyll-search/",
        "date"     : "",
        "content"  : "Simple-Jekyll-Search====================[![Build Status](https://travis-ci.org/christian-fei/Simple-Jekyll-Search.svg?branch=master)](https://travis-ci.org/christian-fei/Simple-Jekyll-Search)A JavaScript library to add search functionality to any Jekyll blog.---idea from this [blog post](https://alexpearce.me/2012/04/simple-jekyll-searching/#disqus_thread)---### Promotion: check out [Pomodoro.cc](https://pomodoro.cc/)# [Demo](http://christian-fei.github.io/Simple-Jekyll-Search/)# Getting started- Place the following code in a file called `search.json` in the **root** of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:```------[  {% for post in site.posts %}    {      "title"    : "{{ post.title | escape }}",      "category" : "{{ post.category }}",      "tags"     : "{{ post.tags | join: ', ' }}",      "url"      : "{{ site.baseurl }}{{ post.url }}",      "date"     : "{{ post.date }}"    } {% unless forloop.last %},{% endunless %}  {% endfor %}]```- configure the library ( [options](#options) )### Enabling full-text searchNote that the index generated in `search.json` does not include the posts' content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts' content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add```"content"  : "{{ post.content | strip_html | strip_newlines }}"```to `search.json` after the `"date"` line to which you must add a comma (`,`).# Install with bower```bower install simple-jekyll-search```# SetupYou need to place the following code within the layout where you want the search to appear.For example in  **_layouts/default.html**:``````# OptionsCustomize SimpleJekyllSearch by passing in your configuration options:```SimpleJekyllSearch({  searchInput: document.getElementById('search-input'),  resultsContainer: document.getElementById('results-container'),  json: '/search.json',})```The above initialization needs to occur after the inclusion of `jekyll-search.js`.### searchInput (Element) [required]The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.### resultsContainer (Element) [required]The container element in which the search results should be rendered in. Typically an ``.### json (String|JSON) [required]You can either pass in an URL to the `search.json` file, or the results in form of JSON directly, to save one round trip to get the data.### searchResultTemplateThe template of a single rendered search result.The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.E.g.The template```{title}```will render to the following```Welcome to Jekyll!```If the `search.json` contains this data```[    {      "title"    : "Welcome to Jekyll!",      "category" : "",      "tags"     : "",      "url"      : "/jekyll/update/2014/11/01/welcome-to-jekyll.html",      "date"     : "2014-11-01 21:07:22 +0100"    }]```### noResultsTextThe HTML that will be shown if the query didn't match anything.### limitYou can limit the number of posts rendered on the page.### fuzzyEnable fuzzy search to allow less restrictive matching.### excludePass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).## Enable full content search of posts and pages- Replace 'search.json' with the following code:```---layout: null---[  {% for post in site.posts %}    {      "title"    : "{{ post.title | escape }}",      "category" : "{{ post.category }}",      "tags"     : "{{ post.tags | join: ', ' }}",      "url"      : "{{ site.baseurl }}{{ post.url }}",      "date"     : "{{ post.date }}",      "content"  : "{{ post.content | strip_html | strip_newlines }}"    } {% unless forloop.last %},{% endunless %}  {% endfor %}  ,  {% for page in site.pages %}   {     {% if page.title != nil %}        "title"    : "{{ page.title | escape }}",        "category" : "{{ page.category }}",        "tags"     : "{{ page.tags | join: ', ' }}",        "url"      : "{{ site.baseurl }}{{ page.url }}",        "date"     : "{{ page.date }}",        "content"  : "{{ page.content | strip_html | strip_newlines }}"     {% endif %}   } {% unless forloop.last %},{% endunless %}  {% endfor %}]```### If search isn't working due to invalid JSON- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use `remove_chars` as a filter.For example: in search.json, replace```"content"  : "{{ page.content | strip_html | strip_newlines }}"```with```"content"  : "{{ page.content | strip_html | strip_newlines | remove_chars | escape }}"```##Browser supportBrowser support should be about IE6+ with this `addEventListener` [shim](https://gist.github.com/eirikbacker/2864711#file-addeventlistener-polyfill-js)# Dev setup- `npm install` the dependencies.- `gulp watch` during development- `npm test` or `npm run test-watch` to run the unit tests#License##MIT licensedPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the 'Software'), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
     
   } ,
  
   {
     
   } ,
  
   {
     
   } 
  
]

If search isn’t working due to invalid JSON

  • There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use remove_chars as a filter.

For example: in search.json, replace

"content"  : "Simple-Jekyll-Search====================[![Build Status](https://travis-ci.org/christian-fei/Simple-Jekyll-Search.svg?branch=master)](https://travis-ci.org/christian-fei/Simple-Jekyll-Search)A JavaScript library to add search functionality to any Jekyll blog.---idea from this [blog post](https://alexpearce.me/2012/04/simple-jekyll-searching/#disqus_thread)---### Promotion: check out [Pomodoro.cc](https://pomodoro.cc/)# [Demo](http://christian-fei.github.io/Simple-Jekyll-Search/)# Getting started- Place the following code in a file called `search.json` in the **root** of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:```------[  {% for post in site.posts %}    {      "title"    : "{{ post.title | escape }}",      "category" : "{{ post.category }}",      "tags"     : "{{ post.tags | join: ', ' }}",      "url"      : "{{ site.baseurl }}{{ post.url }}",      "date"     : "{{ post.date }}"    } {% unless forloop.last %},{% endunless %}  {% endfor %}]```- configure the library ( [options](#options) )### Enabling full-text searchNote that the index generated in `search.json` does not include the posts' content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts' content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add```"content"  : "{{ post.content | strip_html | strip_newlines }}"```to `search.json` after the `"date"` line to which you must add a comma (`,`).# Install with bower```bower install simple-jekyll-search```# SetupYou need to place the following code within the layout where you want the search to appear.For example in  **_layouts/default.html**:``````# OptionsCustomize SimpleJekyllSearch by passing in your configuration options:```SimpleJekyllSearch({  searchInput: document.getElementById('search-input'),  resultsContainer: document.getElementById('results-container'),  json: '/search.json',})```The above initialization needs to occur after the inclusion of `jekyll-search.js`.### searchInput (Element) [required]The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.### resultsContainer (Element) [required]The container element in which the search results should be rendered in. Typically an ``.### json (String|JSON) [required]You can either pass in an URL to the `search.json` file, or the results in form of JSON directly, to save one round trip to get the data.### searchResultTemplateThe template of a single rendered search result.The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.E.g.The template```{title}```will render to the following```Welcome to Jekyll!```If the `search.json` contains this data```[    {      "title"    : "Welcome to Jekyll!",      "category" : "",      "tags"     : "",      "url"      : "/jekyll/update/2014/11/01/welcome-to-jekyll.html",      "date"     : "2014-11-01 21:07:22 +0100"    }]```### noResultsTextThe HTML that will be shown if the query didn't match anything.### limitYou can limit the number of posts rendered on the page.### fuzzyEnable fuzzy search to allow less restrictive matching.### excludePass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).## Enable full content search of posts and pages- Replace 'search.json' with the following code:```---layout: null---[  {% for post in site.posts %}    {      "title"    : "{{ post.title | escape }}",      "category" : "{{ post.category }}",      "tags"     : "{{ post.tags | join: ', ' }}",      "url"      : "{{ site.baseurl }}{{ post.url }}",      "date"     : "{{ post.date }}",      "content"  : "{{ post.content | strip_html | strip_newlines }}"    } {% unless forloop.last %},{% endunless %}  {% endfor %}  ,  {% for page in site.pages %}   {     {% if page.title != nil %}        "title"    : "{{ page.title | escape }}",        "category" : "{{ page.category }}",        "tags"     : "{{ page.tags | join: ', ' }}",        "url"      : "{{ site.baseurl }}{{ page.url }}",        "date"     : "{{ page.date }}",        "content"  : "{{ page.content | strip_html | strip_newlines }}"     {% endif %}   } {% unless forloop.last %},{% endunless %}  {% endfor %}]```### If search isn't working due to invalid JSON- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use `remove_chars` as a filter.For example: in search.json, replace```"content"  : "{{ page.content | strip_html | strip_newlines }}"```with```"content"  : "{{ page.content | strip_html | strip_newlines | remove_chars | escape }}"```##Browser supportBrowser support should be about IE6+ with this `addEventListener` [shim](https://gist.github.com/eirikbacker/2864711#file-addeventlistener-polyfill-js)# Dev setup- `npm install` the dependencies.- `gulp watch` during development- `npm test` or `npm run test-watch` to run the unit tests#License##MIT licensedPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the 'Software'), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."

with

"content"  : "Simple-Jekyll-Search====================[![Build Status](https://travis-ci.org/christian-fei/Simple-Jekyll-Search.svg?branch=master)](https://travis-ci.org/christian-fei/Simple-Jekyll-Search)A JavaScript library to add search functionality to any Jekyll blog.---idea from this [blog post](https://alexpearce.me/2012/04/simple-jekyll-searching/#disqus_thread)---### Promotion: check out [Pomodoro.cc](https://pomodoro.cc/)# [Demo](http://christian-fei.github.io/Simple-Jekyll-Search/)# Getting started- Place the following code in a file called `search.json` in the **root** of your Jekyll blog. This file will be used as a small data source to perform the searches on the client side:```------[  {% for post in site.posts %}    {      &quot;title&quot;    : &quot;{{ post.title | escape }}&quot;,      &quot;category&quot; : &quot;{{ post.category }}&quot;,      &quot;tags&quot;     : &quot;{{ post.tags | join: &#39;, &#39; }}&quot;,      &quot;url&quot;      : &quot;{{ site.baseurl }}{{ post.url }}&quot;,      &quot;date&quot;     : &quot;{{ post.date }}&quot;    } {% unless forloop.last %},{% endunless %}  {% endfor %}]```- configure the library ( [options](#options) )### Enabling full-text searchNote that the index generated in `search.json` does not include the posts&#39; content since you may not want to load the whole content of your blog in each single page. However, if some of you want to enable full-text search, you can still add the posts&#39; content to the index, either to the normal search, or on an additional search page with a dedicated second index file. To do this, simply add```&quot;content&quot;  : &quot;{{ post.content | strip_html | strip_newlines }}&quot;```to `search.json` after the `&quot;date&quot;` line to which you must add a comma (`,`).# Install with bower```bower install simple-jekyll-search```# SetupYou need to place the following code within the layout where you want the search to appear.For example in  **_layouts/default.html**:``````# OptionsCustomize SimpleJekyllSearch by passing in your configuration options:```SimpleJekyllSearch({  searchInput: document.getElementById(&#39;search-input&#39;),  resultsContainer: document.getElementById(&#39;results-container&#39;),  json: &#39;/search.json&#39;,})```The above initialization needs to occur after the inclusion of `jekyll-search.js`.### searchInput (Element) [required]The input element on which the plugin should listen for keyboard event and trigger the searching and rendering for articles.### resultsContainer (Element) [required]The container element in which the search results should be rendered in. Typically an ``.### json (String|JSON) [required]You can either pass in an URL to the `search.json` file, or the results in form of JSON directly, to save one round trip to get the data.### searchResultTemplateThe template of a single rendered search result.The templating syntax is very simple: You just enclose the properties you want to replace with curly braces.E.g.The template```{title}```will render to the following```Welcome to Jekyll!```If the `search.json` contains this data```[    {      &quot;title&quot;    : &quot;Welcome to Jekyll!&quot;,      &quot;category&quot; : &quot;&quot;,      &quot;tags&quot;     : &quot;&quot;,      &quot;url&quot;      : &quot;/jekyll/update/2014/11/01/welcome-to-jekyll.html&quot;,      &quot;date&quot;     : &quot;2014-11-01 21:07:22 +0100&quot;    }]```### noResultsTextThe HTML that will be shown if the query didn&#39;t match anything.### limitYou can limit the number of posts rendered on the page.### fuzzyEnable fuzzy search to allow less restrictive matching.### excludePass in a list of terms you want to exclude (terms will be matched against a regex, so urls, words are allowed).## Enable full content search of posts and pages- Replace &#39;search.json&#39; with the following code:```---layout: null---[  {% for post in site.posts %}    {      &quot;title&quot;    : &quot;{{ post.title | escape }}&quot;,      &quot;category&quot; : &quot;{{ post.category }}&quot;,      &quot;tags&quot;     : &quot;{{ post.tags | join: &#39;, &#39; }}&quot;,      &quot;url&quot;      : &quot;{{ site.baseurl }}{{ post.url }}&quot;,      &quot;date&quot;     : &quot;{{ post.date }}&quot;,      &quot;content&quot;  : &quot;{{ post.content | strip_html | strip_newlines }}&quot;    } {% unless forloop.last %},{% endunless %}  {% endfor %}  ,  {% for page in site.pages %}   {     {% if page.title != nil %}        &quot;title&quot;    : &quot;{{ page.title | escape }}&quot;,        &quot;category&quot; : &quot;{{ page.category }}&quot;,        &quot;tags&quot;     : &quot;{{ page.tags | join: &#39;, &#39; }}&quot;,        &quot;url&quot;      : &quot;{{ site.baseurl }}{{ page.url }}&quot;,        &quot;date&quot;     : &quot;{{ page.date }}&quot;,        &quot;content&quot;  : &quot;{{ page.content | strip_html | strip_newlines }}&quot;     {% endif %}   } {% unless forloop.last %},{% endunless %}  {% endfor %}]```### If search isn&#39;t working due to invalid JSON- There is a filter plugin in the _plugins folder which should remove most characters that cause invalid JSON. To use it, add the simple_search_filter.rb file to your _plugins folder, and use `remove_chars` as a filter.For example: in search.json, replace```&quot;content&quot;  : &quot;{{ page.content | strip_html | strip_newlines }}&quot;```with```&quot;content&quot;  : &quot;{{ page.content | strip_html | strip_newlines | remove_chars | escape }}&quot;```##Browser supportBrowser support should be about IE6+ with this `addEventListener` [shim](https://gist.github.com/eirikbacker/2864711#file-addeventlistener-polyfill-js)# Dev setup- `npm install` the dependencies.- `gulp watch` during development- `npm test` or `npm run test-watch` to run the unit tests#License##MIT licensedPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the &#39;Software&#39;), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED &#39;AS IS&#39;, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."

##Browser support

Browser support should be about IE6+ with this addEventListener shim

Dev setup

  • npm install the dependencies.

  • gulp watch during development

  • npm test or npm run test-watch to run the unit tests

#License ##MIT licensed Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the ‘Software’), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED ‘AS IS’, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.