$vagrant [cmnd[opts]]
box
cloud
connect
destroy
global-status
halt
init
login
package
plugin
port
powershell
provision
rdp
reload
resume
share
snapshot
ssh
ssh-config
status
suspend
up
upload
validate
version
(more)
config.vm
config.ssh
config.wimrm
config.winssh
config.vagrant
cloud_init
dependency_provisioners
disks
typed_triggers
PATH
modsSource abbreviations: AJE: Algorithms BA: Bandit Algorithms BJP: (me) CI: Collective Intelligence CO: Convex Estimation DIDL: Dive into Deep Learning DLG: Deep Learning (Goodfellow, et al) DMMD: Data Mining of Massive Datasets DSA: Data structures & Algorithms DSCL: Data Science at the Command Line EA: Elementary Algorithms ESL: Elements of Statistical Learning FDS: Foundations of Data Science GT: Geometric Topology ITA: Intro to Algorithms JE: Algorithms NP: Numeric Python SKL: Scikit-learn SM: ML cheatsheet RL: Reinforcement Learning
When your productivity takes a nosedive, it adds stress and anxiety, as you don't have enough time to accomplish your goals and do what really matters to you. Understanding why your productivity is flailing will help you get back on track.
IYour job title says "software engineer", but you seem to spend most of your time in meetings. You'd like to have time to code, but nobody else is onboarding the junior engineers, updating the roadmap, talking to the users, noticing the things that got dropped, asking questions on design documents, and making sure that everyone's going roughly in the same direction. If you stop doing those things, the team won't be as successful. But now someone's suggesting that you might be happier in a less technical role. If this describes you, congratulations: you're the glue. If it's not, have you thought about who is filling this role on your team?
GTD—or “Getting things done”—is a framework for organizing and tracking your tasks and projects. Its aim is a bit higher than just “getting things done”, though.
What follows is Danny Schreiber's summary of my Productivity Talk. If you'd like me to give a version of this talk at your company or event, contact me.
Henry Rollins is an American musician, writer, actor, radio host, activist, spoken word artist, and comedian. He was the singer of the hardcore punk band Black Flag and later the Rollins Band among other solo projects and collaborations. He won a Grammy in 1995 for the spoken adaptation of his 1994 tour memoir, Get in the Van. Since the early 1980s he’s released too many things to list here.
How to master the #1 job skill that will never be obsolete
It takes time to do anything worthwhile, but thankfully, we don’t need it all in one chunk. So this year, forget about the year as a whole. Forget about months and forget about weeks. Focus on days.
I remember the first time I had to write one of these puppies.
The first few times it happens, it feels like a positive signal.Somebody wants your advice and perspective. You must be good at what you do. And that’s gotta translate to your career…somehow, right?
Inefficient does not mean ineffective, and it is certainly not the same as lazy. You get things done – just not in the most effective way possible. You’re a bit sloppy, and use more energy. But don’t feel bad about it. There is real value in not being the best.
In a world where there are no secrets, where innovations are quickly imitated or become obsolete, the theory of competitive advantage may have had its day. Realistically, ask yourself, If all your competitors gave their strategic plans to each other, would it really make a difference?
Being a web developer means having a good grasp on a wide array of topics: navigating the terminal, html, css, javascript, cloud infrastructure, deployment strategies, databases, HTTP protocols and that’s just the beginning.
Steve Jobs insisted that every item on a meeting agenda have a designated person responsible for that task and any follow-up work that happened. He called that person the DRI—the Directly Responsible Individual. He knew the public accountability would ensure that a project or task would actually get done, and he wanted to set clear, organized instructions for his team to follow.
Let’s get one thing out of the way first: You do not need any of the apps on this list in order to be productive.
The author wasn’t all about literary masterpieces, dry martinis and rakish charm – he also invented a technique that can beat procrastination and boost productivity.
Do you ever get that feeling like no matter how hard you work, you just can’t keep up? This isn’t a problem uniquely faced by modern knowledge workers. It’s also a characteristic of certain software systems. This state — of being perpetually behind on intended work-in-progress — can fall naturally out of the data structures used to design a software system. Perhaps by learning something about these data structures, we can learn something about the nature of work itself.
Put simply, the overlap between professional, creative, and athletic success is huge. Here are a few timeless productivity lessons, or principles of performance, that apply no matter what you’re doing.
Stephen Wolfram has always liked using technology to get stuff done and monitor personal progress. Here are the secrets that help him power through his workdays.
I've noticed that Silicon Valley companies consistently "get" a few things that their traditional counterparts fail to either understand or implement in practice - especially in Europe.
The end of a year is the perfect time to review one’s life, goals, plans, and projects, as well as plan for the upcoming year. I’ve been fine-tuning my own review process for several years and thought others might be interested to know what I do and how.
This is the midweek edition of Culture Study — the newsletter from Anne Helen Petersen, which you can read about here. If you like it and want more like it in your inbox, consider subscribing.
Blocks specific sites from appearing in Google search results
If you are reading this, you probably know me from Quora where I spent over 10 years writing more than 11,000 answers. I'm writing this page because I will soon be gone from Quora.
In San Francisco and elsewhere in California, the red tape that prevented dining alfresco before the pandemic is starting to grow back.
Growing up in post-socialist-turned-cowboy-capitalist Bulgaria I grew up around a lot of cynical behavior and absorbed it deep into me. It was the water I was swimming in, and I knew no better. There was always this feeling that attempts at improvements are futile. If anyone tried to improve the system in any way, they will face a great opposition, and any value they bring forward will be immediately vultured away. This made it obvious for me to see how any changes will be abused and rendred futile. I also became good at rationalizing the existing status quo. There’s this example which stuck with me, that if someone created a coin operated parking meter, another one will quickly figure out how to steal the coins out of it. Thus, the attempt to bring order will fail, and the rationalization is that we are a motivated but backstabbing people which get in our own interest.
I’d like to tell you something not to do to make your website better. Don’t add any third-party scripts to your site.
I want to spend an essay talking about tacit knowledge, and why I think it is the most interesting topic in the domain of skill acquisition. If you are a longtime Commonplace reader, you’ll likely have come across this idea before, because I’ve written about it numerous times in the past. But I think it’s still good idea to dedicate a whole piece to the topic.
On Friday, needing just one point against Ian Nepomniachtchi to defend his world champion status, Magnus Carlsen closed the match out with three games to spare, 7.5-3.5. He's been the No 1 chess player in the world for a decade now and is in his eighth year as undisputed world champion.
Take a whirlwind tour of your next favorite language. Community-driven!
Interactive deep learning book with code, math, and discussions. Implemented with NumPy/MXNet, PyTorch, and TensorFlow. Adopted at 300 universities from 55 countries.
I got hit in the head by a falling pipe while shooting a video in July, and haven't been the same since...
The combination of deep learning and decision learning has led to several impressive stories in decision-making AI research, including AIs that can play a variety of games (Atari video games, board games, complex real-time strategy game Starcraft II), control robots (in simulation and in the real world), and even fly a weather balloon. These are examples of sequential decision tasks, in which the AI agent needs to make a sequence of decisions to achieve its goal.
Chapter 1: Finding words, phrases, names and concepts
This chapter will introduce you to the basics of text processing with spaCy. You'll learn about the data structures, how to work with trained pipelines, and how to use them to predict linguistic features in your text.
Functionals that penalize bending or stretching of a surface play a key role in geometric and scientific computing, but to date have ignored a very basic requirement: in many situations, surfaces must not pass through themselves or each other. This paper develops a numerical framework for optimization of surface geometry while avoiding (self-)collision. The starting point is the tangent-point energy, which effectively pushes apart pairs of points that are close in space but distant along the surface. We develop a discretization of this energy for triangle meshes, and introduce a novel acceleration scheme based on a fractional Sobolev inner product. In contrast to similar schemes developed for curves, we avoid the complexity of building a multiresolution mesh hierarchy by decomposing our preconditioner into two ordinary Poisson equations, plus forward application of a fractional differential operator. We further accelerate this scheme via hierarchical approximation, and describe how to incorporate a variety of constraints (on area, volume, etc.). Finally, we explore how this machinery might be applied to problems in mathematical visualization, geometric modeling, and geometry processing.
Kintsugi (golden joinery) is the Japanese art of repairing broken pottery with lacquer dusted or mixed with powdered gold, silver, or platinum, a method similar to the maki-e technique. As a philosophy, it treats breakage and repair as part of the history of an object, rather than something to disguise. Lacquerware is a longstanding tradition in Japan, at some point it may have been combined with maki-e as a replacement for other ceramic repair techniques.
There are few things comedians and personal finance writers agree on, but one comes up every holiday season: “Gift cards. For when you want to give someone money, except worse.” Like many topics in financial infrastructure, they’re a fascinating Gordian knot of user needs, business incentives, government regulation, and infrastructural weirdness. Let’s start unraveling it.
n August 2014, a significant advance in computing made the cover of the journal Science. It was IBM’s 5.4 billion-transistor chip that had a million hardware neurons and 256 million synapses. Algorithms running on this “neuromorphic” chip, when fed a video stream, could identify multiple objects, such as people, bicycles, trucks, and buses. Crucially, the hardware neural network consumed a mere 63 milliwatts, about 176,000 times less energy per synaptic event than the same network simulated on a general-purpose microprocessor.
Believing language would unify their struggling nation, Chinese officials began a project to create a national language and define what it meant to speak Chinese.
NGC 1052-DF2 resides about 65 million light-years away in the NGC 1052 Group, which is dominated by a massive elliptical galaxy called NGC 1052.
My shopping spree was born out of boredom. On a lazy July morning I was in bed browsing Amazon when I decided to follow up on a tip I had received. I plugged the word “brodifacoum” into Amazon’s search bar, and a second later my screen filled with what are known as second-generation anticoagulant rodenticides, a class of rat poison so dangerous to humans and wildlife that the Environmental Protection Agency strove to keep them from being sold in consumer stores. After clicking around for a few bewildered minutes, I ordered something called Motomco D 31402 Jaguar Rodenticide Pail Pest Control. It cost $69.99, its delivery was free, and it had a 4.8-star rating. The top customer review said, “Kills them all, but the dead mice smells is not what I need,” which sounded like a solid testimonial.
This is making the rounds because highly-profitable companies are using infrastructure they do not pay for. That is a worthy topic, but not the most interesting thing in this particular case because it would not clearly have contributed to preventing this bug. It is the second statement in this tweet that is worthy of attention: the maintainers of log4j would have loved to remove this bad feature long ago, but could not because of the backwards compatibility promises they are held to.
Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
This post shows how you can use the notes command in Rails to search through your codebase for comments starting with a specific keyword. By default, it searches the codebase for FIXME, OPTIMIZE, and TODO comments, but you can also configure it to use custom keywords.
There's a better, faster, easier way to develop, deploy and manage web applications. There is a secret that needs to be understood in order to write good software documentation: there isn’t one thing called documentation, there are four.
Nearly everyone agrees that good documentation is important to the success of software projects, and yet very few projects actually have good documentation. Even successful projects often have barely adequate documentation.
At Ably, we run a large scale production infrastructure that powers our customers’ real-time messaging applications around the world.
There are over one million Dockerfiles on GitHub today, but not all Dockerfiles are created equally.
Modern application infrastructure is being transformed by containers. The question is: How do you get started?
If you’re trying to learn Docker you will first have to master its various terminal commands. This guide aims to help you get started with basic docker commands. This tutorial assumes that you already have Docker installed on your system.
Understanding Docker can be difficult or time-consuming. In order to spread knowledge about Cloud technologies I started to create sketchnotes about Docker. I think it could be a good way, more visual, to explain Docker (and other technologies like Kubernetes and Istio).
What is docker? and how to use it with ruby on rails applications? and benefits of using docker. Docker is a platform for building, shipping, and running applications in containers.
This is the first post in the More than "Hello World" in Docker series. The series will help you ready your app: from setting it up locally to deploying it as a production-grade workload in AWS. There is no shortage of web tutorials on how to display "Hello World" in Docker.
In this post, basically, I don't put options. If you think this command is lacking something important, you will need to check Docker Doc(https://docs.docker.com/) pull command is almost same as git pull. Get an image to local from Docker hub.
Scaling becomes a necessary part for your system when your system grows in popularity. There are two types of scaling: Vertical Scaling - Adding more resources (CPU, RAM, storage) to your single server.
Podman is an excellent alternative to Docker containers when you need increased security, unique identifier (UID) separation using namespaces, and integration with systemd.
Get your Docker Cheat Sheet as PDF or as an image. To follow this article, make sure your development machine has Docker installed. In this blog post, we write our own Dockerfiles, learn how to create images, and finally run them as container. The complete source code is available on GitHub.
To use Docker in swarm mode, install Docker. See installation instructions for all operating systems and platforms. Current versions of Docker include swarm mode for natively managing a cluster of Docker Engines called a swarm.
If you don’t already know, Docker is an open-source platform for building distributed software using “containerization,” which packages applications together with their environments to make them more portable and easier to deploy.
When I started using containers back in 2015, my initial understanding was that they were just lightweight virtual machines with a subsecond startup time. With such a rough idea in my head, it was easy to follow tutorials from the Internet on how to put a Python or a Node.
UPDATE: minor edits to mention that we do have a dedicated build server after this got posted to reddit. This might end up getting a lot of hate.
I've seen many people get confused between a Dockerfile and a Compose file. This is primarily because both are used to modify a Docker image in a way, though it's not technically correct.
One of the first Docker commands you use is the docker ps command. It shows the running containers:
Docker can be confusing when you’re getting started. Even after you watch a few tutorials, its terminology can still be unclear. This article is intended for people who have installed Docker and played around a bit, but could use some clarification.
Docker can be confusing when you’re getting started. Even after you watch a few tutorials, its terminology can still be unclear. This article is intended for people who have installed Docker and played around a bit, but could use some clarification.
The Docker driver allows you to install Kubernetes into an existing Docker install. On Linux, this does not require virtualization to be enabled. On macOS, containers might get hung and require a restart of Docker for Desktop. See docker/for-mac#1835
Deployment is perhaps one of the most overlooked topics in the Machine Learning world. But it most certainly is important, if you want to get into the industry as a Machine Learning Engineer (MLE).
Setting up Rails for the first time with all the dependencies necessary can be daunting for beginners.
When we started our analytics company, we knew that closely monitoring and managing our infrastructure spending was going to be really important. The numbers started out small, but we’re now capturing, processing, and consuming a lot of data.
Don't panic, Docker containers and images are still alive. It's not that it will change everything. Yes, it is true. Docker is now deprecated in Kubernetes.
BTW, we're ⚡ hiring Infra, SRE, Web, Mobile, and Data engineers at Doximity (see roles) -- find out more about our technical stack. At Doximity, we are running more and more of our applications and services on Kubernetes.
There are several courses available on this topic. Some of them are very short and do not serve any other purpose than a ‘Getting started course’, while others are super long and require you to spend several days to study and understand everything.
Kubernetes is a container orchestration system. This means that applications can be split between different containers and thus run faster and more efficiently. It is an open-source project and was first released in 2014.
Have you ever been intimidated by Docker’s fancy name and wondered what it is? — Great, This post is for you. In this post, we will cover what exactly this devil is and what it does.
Containers, images, environments, building, running, virtual machines.. when you’re new to Docker all of these abstract terms can be a bit confusing. In this article we’ll go through all of them and get an understanding of each term.
When you install docker it creates three networks automatically - Bridge, Host, and None. Of which, Bridge is the default network a container gets attached to when it is run. To attach the container to any other network you can use the --network flag of the run command.
Containers are hugely helpful for improving security, reproducibility, and scalability in software development and data science. Their rise is one of the most important trends in technology today. Docker is a platform to develop, deploy, and run applications inside containers.
Search writing on Towards Data Science Your home for data science. A Medium publication sharing concepts, ideas and codes.
When getting started with containers, it’s pretty easy to be shocked by the size of the images that we build. We’re going to review a number of techniques to reduce image size, without sacrificing developers’ and ops’ convenience.
The most-loved Tool in Stack Overflow’s 2022 Developer Survey. Docker + Wasm = Awesome!
Today, we are thrilled to announce that Canonical will distribute its free and commercial software through Docker Hub as a Docker Verified Publisher.
With the beta release of Ruby on Rails 7.1, the Ruby-based web application framework now will produce all the Dockerfiles needed to deploy an application. Unveiled September 13, Rails 7.1 beta 1 offers default Docker support.
Emil Mikhailov is the founder of XIX.ai (YC W17). Roman Trusov is a researcher at XIX.ai.
** Nuit Blanche is now on Twitter: @NuitBlog ** Dhruv let me know of the following Hi Igor, I hope you're doing well. Thanks for posting latest articles and relevant information on your blog. I'm a regular reader of it and really enjoy it.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
When Ian Goodfellow dreamt up the idea of Generative Adversarial Networks (GANs) over a mug of beer back in 2014, he probably didn’t expect to see the field advance so fast: In case you don’t see where I’m going here, the images you just saw were utterly, undeniably, 100% … fake.
Here we are in 2019, where we keep seeing State-Of-The-Art (from now on SOTA) classifiers getting published every day; some are proposing entire new architectures, some are proposing tweaks that are needed to train a classifier more accurately.
What we’d like to find out about GANs that we don’t know yet. By some metrics, research on Generative Adversarial Networks (GANs) has progressed substantially in the past 2 years. Practical improvements to image synthesis models are being made almost too quickly to keep up with:
I bet most of us have seen a lot of AI-generated people faces in recent times, be it in papers or blogs. We have reached a stage where it is becoming increasingly difficult to distinguish between actual human faces and faces that are generated by Artificial Intelligence.
Stay informed on the latest trending ML papers with code, research developments, libraries, methods, and datasets.
Where does your enterprise stand on the AI adoption curve? Take our AI survey to find out.
The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!
This post is part of the "superblog" that is the collective work of the participants of the GAN workshop organized by Aggregate Intellect. This post serves as a proof of work, and covers some of the concepts covered in the workshop in addition to advanced concepts pursued by the participants.
Instead, befriend people who inspire awe in you. “How to Build a Life” is a weekly column by Arthur Brooks, tackling questions of meaning and happiness. Click here to listen to his podcast series on all things happiness, How to Build a Happy Life.
Patterning, Layout, Resistance Calculations, N-Well/Substrate Diode, RC Delay, Twin Wells
Bonding pads, Metal & Via characteristics, Crosstalk, Ground Bounce, Layout Examples
Layout, Wire Connections, ESD Protection
Resistors, Capacitors, MOSFETs, Layout Examples
Capacitance, Threshold Voltage, I/V characteristics, Spice Modeling, Short-Channel Factors
Unit Processes, Process Integration, Backend
Signals, Circuit Noise, Discussion
Long-Channel MOSFETs, Short-Channel MOSFETs, Noise Modeling
Model, Pass Gates, Measurements
DC Behavior, Switching Behavior, Layout, Large-Load Sizing, Other Configurations
DC Behavior, Layout, Switching Behavior, Complex Gates
Transmission Gates, Applications, Latches & FlipFlops, Examples
Fundamentals, Clocked Logic
Chip Layout, Steps
Arrays, Peripheries, Bitcells
Intro, Resistive Memory, CMOS Imagers
Schmitt Triggers, Multivibrators, Input Buffers, Charge Pumps
Phase Detector, Voltage-Controlled Oscillator (VCO), Loop Filter, System Factors, Delay-Locked Loops, Examples
Intro, Cascoding, Biasing
Gate-Drain-Connected Loads, Current Source Loads, Push-Pull Amps
Source-Coupled Pair, Source Cross-Coupled Pair, Cascode Loads, Wide-Swing Diff Amps
MOSFET-Resistor Refs, Parasitic Diode-Based Refs
2-Stage OAs, OA with Output Buffer, Operational Transconductance Amp (OTA), Gain Enhancement, Examples
MOSFET switches, Fully-Differential Ckts, Switched-Capacitor Ckts, Examples
Biasing for Power & Speed, Concepts, Basic Design, Design using Switched-Capacitor CMFB
Comparators, Adaptive Biasing, Analog Multipliers
Analog vs Discrete Time Signals, Analog-to-Digital Conversion, Sample & Hold (S/H), Digital-to-Analog (DAC) Specs, Analog-to-Digital (ADC) Specs, Mixed-Signal Layout Issues
DAC Architectures, ADC Architectures
R-2R DAC Topologies, OAs in Data Converters, Implementing ADCs
Feedback Equation, Negative Feedback Properties, Recognizing Feedback Topologies, Voltage Amp, Transimpedance Amp, Transconductance Amp, Current Amp, Stability, Examples
uniform, exponential, normal
sources, sinks, stocks, flows
environment, outcomes, actions, behavioral rules, outcome functions, social choice correspondence
ascending-bid, second-price, first-price
Always make those above you feel comfortably superior. Do not go too far in displaying your talents - you may inspire fear and insecurity. Make your masters appear more brilliant than they are.
Friends will betray you more quickly, for they are easily aroused to envy. They also become spoiled and tyrannical. Hire a former enemy and he will be more loyal - he has more to prove. You have more to fear from friends than from enemies. If you have no enemies, find a way to make them.
Keep people off-balance and in the dark by never revealing the purpose behind your actions. If they have no clue what you are up to, they cannot prepare a defense. Guide them far enough down the wrong path, envelope them in enough smoke, and by the time they realize your intentions, it will be too late.
When you are trying to impress people with words, the more you say, the more common you appear. Even if you are saying something banal, it will seem original if you make it vague, open-ended, and sphinxlike. Powerful people impress and intimidate by saying less. The more you say, the more likely you are to say something foolish.
Reputation is the cornerstone of power. Through reputation alone you can intimidate and win; once you slip, however, you are vulnerable, and will be attacked on all sides. Make your reputation unassailable. Always be alert to potential attacks and thwart them before they happen. Meanwhile, learn to destroy your enemies by opening holes in their own reputations. Then stand aside and let public opinion hang them.
Everything is judged by its appearance; what is unseen counts for nothing. Never let yourself get lost in the crowd, then, or buried in oblivion. Stand out. Be conspicuous, at all cost. Make yourself a magnet of attention by appearing larger, more colorful, more mysterious, than the bland and timid masses.
Use the wisdom, knowledge, and legwork of other people to further your own cause. Not only will such assistance save you valuable time and energy, it will give you a godlike aura of efficiency and speed. In the end your helpers will be forgotten and you will be remembered. Never do yourself what others can do for you.
When you force the other person to act, you are the one in control. It is always better to make your opponent come to you, abandoning his own plans in the process.
Any momentary triumph you think gained through argument is really a Pyrrhic victory. The resentment you create is stronger and lasts longer than any momentary change of opinion. It is better to get others to agree with you through your actions, without saying a word.
You can die from someone else’s misery – emotional states are as infectious as disease. You may feel you are helping the drowning man but you are only precipitating your own disaster. The unfortunate sometimes draw misfortune on themselves; they will also draw it on you. Associate with the happy and fortunate instead.
To maintain your independence you must always be needed and wanted. The more you are relied on, the more freedom you have. Make people depend on you for their happiness and prosperity and you have nothing to fear. Never teach them enough so that they can do without you.
One sincere and honest move will cover over dozens of dishonest ones. Open-hearted gestures of honesty and generosity bring down the guard of even the most suspicious people. Once your selective honesty opens a hole in their armor, you can deceive and manipulate them at will. A timely gift – a Trojan horse – will serve the same purpose.
If you need to turn to an ally for help, do not bother to remind him of your past assistance and good deeds. He will find a way to ignore you. Instead, uncover something in your request, or in your alliance with him, that will benefit him, and emphasize it out of all proportion. He will respond enthusiastically when he sees something to be gained for himself.
Knowing about your rival is critical. Use spies to gather valuable information that will keep you a step ahead. Better still - Play the spy yourself. In polite social encounters, learn to probe. Ask indirect questions to get people to reveal their weaknesses and intentions. There is no occasion that is not an opportunity for artful spying.
All great leaders since Moses have known that a feared enemy must be crushed completely. (Sometimes they have learned this the hard way.) If one ember is left alight, no matter how dimly it smolders, a fire will eventually break out. More is lost through stopping halfway than through total annihilation. The enemy will recover, and will seek revenge. Crush him, not only in body but in spirit.
Too much circulation makes the price go down. The more you are seen and heard from, the more common you appear. If you are already established in a group, temporary withdrawal from it will make you more talked about, even more admired. You must learn when to leave. Create value through scarcity.
Humans are creatures of habit with an insatiable need to see familiarity in other people’s actions. Your predictability gives them a sense of control. Turn the tables - Be deliberately unpredictable. Behavior that seems to have no consistency or purpose will keep them off-balance, and they will wear themselves out trying to explain your moves. Taken to an extreme, this strategy can intimidate and terrorize.
The world is dangerous and enemies are everywhere – everyone has to protect themselves. A fortress seems the safest. But isolation exposes you to more dangers than it protects you from. It cuts you off from valuable information, it makes you conspicuous and an easy target. Better to circulate among people find allies, mingle. You are shielded from your enemies by the crowd.
There are many different kinds of people in the world, and you can never assume that everyone will react to your strategies in the same way. Deceive or outmaneuver some people and they will spend the rest of their lives seeking revenge. They are wolves in lambs’ clothing. Choose your victims and opponents carefully, then – never offend or deceive the wrong person.
A fool always rushes to take sides. Do not commit to any side or cause but yourself. By maintaining your independence, you become the master of others – playing people against one another, making them pursue you.
No one likes feeling stupider than the next persons. The trick is to make your victims feel smart - not just smart, but smarter than you are. Once convinced of this, they will never suspect that you may have ulterior motives.
When you are weaker, never fight for honor’s sake; choose surrender instead. Surrender gives you time to recover, time to torment and irritate your conqueror, time to wait for his power to wane. Do not give him the satisfaction of fighting and defeating you. By turning the other check you infuriate and unsettle him. Make surrender a tool of power.
Conserve your forces and energies by keeping them concentrated at their strongest point. You gain more by finding a rich mine and mining it deeper, than by flitting from one shallow mine to another. When looking for sources of power to elevate you, find the one key patron, the fat cow who will give you milk for a long time.
The perfect courtier thrives in a world where everything revolves around power and political dexterity. He has mastered the art of indirection; he flatters, yields to superiors, and asserts power over others in the most oblique and graceful manner.
Do not accept the roles that society foists on you. Re-create yourself by forging a new identity, one that commands attention and never bores the audience. Incorporate dramatic devices into your public gestures and actions.
You must seem a paragon of civility and efficiency. Your hands are never soiled by mistakes and nasty deeds. Maintain a spotless appearance by using others as scapegoats to disguise your involvement.
People have an overwhelming desire to believe in something. Become the focal point of such desire by offering them a cause, a new faith to follow. Keep your words vague but full of promise; emphasize enthusiasm over rationality and clear thinking. Give your disciples rituals to perform, ask them to make sacrifices on your behalf.
If you are unsure of a course of action, do not attempt it. Your doubts and hesitations will infect your execution. Better to enter with boldness. Any mistakes you commit through audacity are easily corrected with more audacity. Everyone admires the bold; no one honors the timid.
The ending is everything. Account for all possible consequences, obstacles, and twists of fortune that might give the glory to others. By planning to the end you will not be overwhelmed by circumstances and you will know when to stop.
Your actions must seem natural and executed with ease. All the toil and practice that go into them, and also all the clever tricks, must be concealed. When you act, act effortlessly, as if you could do much more. Avoid the temptation of revealing how hard you work – it only raises questions. Teach no one your tricks.
The best deceptions are the ones that seem to give the other person a choice. Your victims feel they are in control, but are actually your puppets. Give people options that come out in your favor whichever one they choose. Force them to make choices between the lesser of two evils, both of which serve your purpose.
The truth is often avoided because it is ugly and unpleasant. Never appeal to truth and reality unless you are prepared for the anger that comes for disenchantment. People who can manufacture romance or fantasy are like oases in the desert. Everyone flocks to them. There is great power in tapping into the fantasies of the masses.
Everyone has a weakness. That weakness is usually an insecurity, an uncontrollable emotion or need; it can also be a small secret pleasure. Either way, once found, it is a thumbscrew you can turn to your advantage.
The way you carry yourself will determine how you are treated. In the long run, appearing vulgar or common will make people disrespect you. A king respects himself and inspires the same sentiment in others.
Hurrying indicates a lack of control over yourself, and over time. Always seem patient, as if you know that everything will come to you eventually. Become a detective of the right moment. Learn to stand back when the time is not yet ripe.
The more attention you pay an enemy, the stronger you make him; and a small mistake is often made worse and more visible when you try to fix it. It is sometimes best to leave things alone. If there is something you want but cannot have, show contempt for it. The less interest you reveal, the more superior you seem.
Striking imagery and grand symbolic gestures create the aura of power. Dazzled by appearances, no one will notice what you are really doing.
If you make a show of going against the times, people will think that you only want attention and that you look down upon them. They will find a way to punish you for making them feel inferior. It is far safer to blend in and nurture the common touch. Share your originality only with tolerant friends and those who are sure to appreciate your uniqueness.
Anger and emotion are strategically counterproductive. Stay calm and objective. But if you can make your enemies angry while staying calm yourself, you gain a decided advantage. Put your enemies off-balance - Find the chink in their vanity through which you can rattle them and you hold the strings.
What is offered for free is dangerous – it usually involves either a trick or a hidden obligation. What has worth is worth paying for. By paying your own way you stay clear of gratitude, guilt, and deceit. It is also often wise to pay the full price. Be lavish with your money and keep it circulating, for generosity is a sign and a magnet for power.
What happens first always appears better and more original than what comes after. If you succeed a great man or have a famous parent, you will have to accomplish double their achievements to outshine them. Do not get lost in their shadow, or stuck in a past not of your own making. Establish your own name and identity by changing course.
Trouble can often be traced to a single strong individual – the stirrer, the arrogant underling, the poisoned of goodwill. If you allow such people room to operate, others will succumb to their influence. Do not wait for the troubles they cause to multiply, do not try to negotiate with them. Neutralize their influence by isolating or banishing them. Strike at the source of the trouble and the sheep will scatter.
Coercion creates a reaction that will eventually work against you. You must seduce others into wanting to move in your direction. The way to seduce others is to operate on their individual psychologies and weaknesses. Soften up the resistant by playing on what they hold dear and what they fear. Ignore the hearts and minds of others and they will grow to hate you.
The mirror reflects reality, but it is also the perfect tool for deception. When you mirror your enemies, doing exactly as they do, they cannot figure out your strategy. The Mirror Effect mocks and humiliates them, making them overreact. By holding up a mirror to their psyches, you seduce them with the illusion that you share their values; by holding up a mirror to their actions, you teach them a lesson. Few can resist the power of Mirror Effect.
Everyone understands the need for change in the abstract, but people are creatures of habit. If you are new to a position of power, or an outsider trying to build a power base, make a show of respecting the old way of doing things. If change is necessary, make it feel like a gentle improvement on the past.
Appearing better than others is always dangerous, but most dangerous of all is to appear to have no faults or weaknesses. Envy creates silent enemies. It is smart to occasionally display defects, and admit to harmless vices, in order to deflect envy and appear more human and approachable.
In the heat of victory, arrogance and overconfidence can push you past the goal you had aimed for. By going too far, you make more enemies than you defeat. There is no substitute for strategy and careful planning. Set a goal, and when you reach it, stop.
By taking a shape, by having a visible plan, you open yourself to attack. Accept the fact that nothing is certain and no law is fixed. The best way to protect yourself is to be as fluid and formless as water; never bet on stability or lasting order.
- Nash's cooperative solution
- Variable-thread bargaining
- Alternating offers, Type I (total value decay)
- Experimental evidence
- Alternating offers, Type II (impatience)
- Manipulating information
- Multiple-issue bargaining
- Multiple-party bargaining
- Intro
- Simultaneous-move games
- Sequential-move, perfect-info-availability games
- Probability
- Sequential-move randomized games
- Extensive form
- Normal form
- Mixed strategies
- Behavioral strategies
- Bibliography & index
- 2-player games
- large-group games
- spillovers/externalities
- historicals
- "Help!" - a game of "chicken" with mixed strategies
- 2-stage games & subgames
- multistage game configurations
- Changing the order of moves in a game
- Analysis method changes
- 3-player games
- framework
- Prisoner's Dilemma
- "chicken"
- The assurance game
- Three phenotypes
- Hawk & Doves
- Interactions by population & across species
- Cooperation & Altruism
- decisions vs games
- sequential vs simultaneous moves
- zero-sum vs common interests
- single vs repeating plays
- constant vs changing opponents
- access to equal information
- fixed vs malleable rules
- enforceable agreements?
- terminology
- uses
- price discrimination
- principals & agents
- cost-plus & fixed-price contracts
- information revelation mechanisms
- incentives / managerial supervision
- incentives / insurance provisions
- incentives (nonlinear)
- incentives (teams)
- multiple tasks & outcomes
- incentives over time
- Game trees
- Solving games with trees
- Adding players
- 1st- and 2nd-mover advantages
- Adding moves
- Rollback
- "Survivor"
- Price competition
- Oligopoly principles
- Political campaign advertising
- Nash equilibria methods
- Nash equilibria concept
- Rationalization
- Empirical evidence
- Definitions
- Mixing moves
- Nash equilibrium as beliefs & responses
- Mixing in non-zero-sum games
- Discussion
- When 1 player has >= 3 strategies
- When both players have >= 3 strategies
- Mixed strategies in practice - Evidence
- Depictions
- Nash equilibria
- Dominant strategies
- Best-response analysis
- 3 players
- Multiple equilibria
- conditional vs unconditional moves
- credibility
- commitments
- threats & promises
- examples - restaurant pricing
- additional topics
- basics
- repetition
- penalties & rewards
- leadership
- experimenal evidence
- real-world examples
- risk management
- assymetric information
- cheap talk
- adverse selection
- signaling
- screening
- labor mkt signaling
- 2-player equilibria
- rules & procedures
- paradoxes
- voting systems
- vote manipulation
- median voter theorem
- implicit learning
- lessons via sports & games
- case study - sacrifice
- caveats
Notes and organization by topic to follow.
server
generate
console
dbconsole
runner
destroy
about
assets
db
notes
routes
test
tmp
miscellaneous
custom rake tasks
advanced topics
$LOAD_PATH
Reloading
Eager Loading
Single Table Inheritance (STI)
Inflections
Troubleshooting
Rails.autoloaders
Vs Classic Mode
How are so many politicians today able to get away with overtly racist utterances? By using rhetorical ‘figleaves’
The confounding consistency of color categories. When Paul Kay, then an anthropology graduate student at Harvard University, arrived in Tahiti in 1959 to study island life, he expected to have a hard time learning the local words for colors.
The removal of cultural emblems is not the erasure of history but part of it. In November 2016, a swastika was painted on an elementary school in my Denver, Colorado, neighborhood of Stapleton.
Many of us now use the word hobo to refer to any homeless individual, but back in the America of the late 19th and early 20th century, to be a hobo meant something more.
The world is full of icons that warn us to be afraid — to stay away from this or not do that. And many of these are easy to understand because they represent something recognizable, like a fire, or a person slipping on a wet floor.
An L-system or Lindenmayer system is a parallel rewriting system and a type of formal grammar.
Let’s come back, more directly, to a theme in my writing — what happens when something small becomes a tipping point for change. When the seemingly innocuous becomes unpredictable.
Symbols have always been used to signal one's status. Military insignia, family signet rings and heirloom watches; impressive properties filled with original art, expensive cars and designer handbags ensure a luxury lifestyle is obvious to all.
The use of a “Help Mark” symbol by people with hidden disabilities or illnesses who need assistance is spreading across Japan, after it was created by the Tokyo Metropolitan Government 10 years ago.
How, exactly, does one go about making a global dictionary of symbols? It is a Herculean task, one few scholars would take on today, not only because of its scope but because the philological approach that gathers and compares artifacts from every culture underwent a correction: No one person can ha
Suppliers decide which customers to transact with. Uber and Lyft are examples of supply-pick marketplaces: the driver is presented with a passenger and has the option to opt in or out of the ride.
Customers decide which product or service to buy. Examples are Airbnb for “Instant Book” listings, in which the booking doesn’t require host approval. Most ecommerce marketplaces are demand-pick.
Suppliers and customers need to opt-in for a match to occur. Craigslist, for instance, is a double opt-in marketplace because users need to message back and forth in order to complete a transaction. Airbnb for non-Instant Book listings is a double opt-in marketplace. Double-commit marketplaces tend to have the lowest liquidity, since effort is required from both sides to match.
The platform prescribes a match, potentially taking into account the preferences and attributes of each side. Lunchclub is an example of a platform that prescribes matches—users seeking to expand their professional network opt in to a weekly meeting and are automatically paired with another user in the network.
Marketplaces that take on additional activities in order to better establish trust, especially in high-value or high-stakes categories. These functions can include verifying product authenticity, providing pricing guidance, and interviewing and vetting providers to ensure quality—in some cases, even employing providers.
Managed marketplaces represent an important evolution in marketplace design and can unlock categories that are high-trust and/or -value, such as luxury goods or real estate. On the flip side, managed marketplaces represent greater operational overhead and can be challenging to build into a profitable business.
One that is targeted to the needs of a particular industry, product category, or other group of customers with specific needs. Vertical marketplaces are often contrasted with horizontal marketplaces: Craigslist is a horizontal marketplace, while Angie’s List (which is focused on home services) and Trusted (which targets babysitting) are examples of vertical marketplaces. There are various degrees of verticalization: for instance, Slice, an online food ordering platform for independent pizzerias, is a more verticalized form of Uber Eats.
Vertical marketplaces can offer an experience that is tailored to the unique needs of a particular group of users.
Food delivery marketplaces are a common example of three-sided marketplaces, in that they are comprised of restaurants, delivery drivers, and consumers. Multi-sided marketplaces are often harder to get off the ground because they need to acquire and retain additional sides of the marketplace. However, as a result they are also more defensible.
The geographic scope wherein the marketplace has network effects. Global marketplaces have global network effects: an additional supply around the world creates additional value for a user in a different country. Local marketplaces are ones in which an additional user is only relevant and valuable to other users in that particular geography—i.e., they have local network effects.
These terms describe the supply and demand users in the marketplace: businesses or consumers. A B2B marketplace matches businesses with businesses, such as Faire (a wholesale marketplace connecting retailers to brands), while B2C marketplaces connect businesses to consumers (like, say, DoorDash). P2P, or peer-to-peer, marketplaces have individual consumers on both sides, such as Airbnb.
This distinction can get more complicated as the line between business and consumer blurs. a professional Airbnb host, for instance, may be a “B” (business) or a “C” (consumer). At a high level, describing a marketplace as one of these categories helps to convey the dynamics of acquiring different sides of the marketplace. B2B marketplaces are typically constrained by sales, while P2P marketplaces are constrained by trust, general awareness, and category creation.
The degree to which the volume is composed of a smaller (concentrated) or larger (fragmented) number of players.
Typically, fragmentation is desirable. The risk of a highly-concentrated marketplace is that an individual buyer or seller can exert outsize influence in terms of pricing, gross merchandise value (GMV), etc.
The degree of supply variety in a marketplace. A company can design a marketplace to increase or decrease homogeneity as a product choice. For instance, Uber buckets the drivers available into a small number of tiers in order to reduce search costs. Other marketplaces surface heterogeneity among suppliers: for example, Outschool—a live online children’s education platform—highlights the unique attributes of each course and teacher.
The degree to which a marketplace diminishes the variation between suppliers. Commoditized goods and services are relatively indistinguishable from the rival offerings of another supplier. Amazon, Facebook (w.r.t. media companies on the Newsfeed), and other aggregators are often described as commoditizing their suppliers, meaning every product is displayed in the same way. This detracts from brand differentiation.
To avoid overwhelming consumers with a deluge of options, every marketplace needs to commoditize its suppliers to some extent.
When supply-side and demand-side users use a marketplace for discovery but complete the transaction elsewhere (e.g., finding and messaging a service provider on the marketplace, then transacting offline).
Disintermediation can be caused by price sensitivity (users trying to bypass marketplace fees), convenience (for monogamous transactions, it can be convenient to move the transaction offline), or necessity (Craigslist, for example, cannot provide a payments infrastructure).
Disintermediation is undesirable - it stymies growth and suppresses monetization. Managed marketplaces combat disintermediation because they offer greater value in facilitating the transaction.
When users (either demand or supply) use multiple platforms. For instance, an employer might post a job opening on multiple job search websites, or a host could list a property on multiple travel websites. Multi-tenanting reduces the strength of the marketplace’s network effects.
These terms describe the relationship between supply and demand. If transactions happen repeatedly between the same supply-side user and the same demand-side user, the transactions or relationship is monogamous. Certain categories are also monogamous (home cleaning, babysitting, etc) when buyers prefer to use the same provider repeatedly after establishing trust and familiarity.
Polygamous categories indicate users repeat, different matching needs across transactions, such as travel accommodations or food delivery.
Polygamous transactions are better suited to marketplaces because users are compelled to return to the marketplace for future transactions. Monogamous categories heighten the risk of disintermedation.f