I wonder how this could be inverted to display the "planes overhead" [0] (so little progress in 15 years) in AR similar to how SkyView [1] displays points of interest in space.
I just did this last week, mostly using Claude Code. I live close to a major airport and wanted to be alerted when interesting planes are flying overhead. The PWA Claude Code spit out is exactly what I was hoping for, and adding an AR overlay was really trivial.
It's amazing and in some ways frightening that I had an interesting problem, and within a couple hours I had a fully functional app that completely solved it.
> Where Deming reads like a science paper, Drucker reads like an installation guide.
If you are looking for "do this" then Deming is not your person. If you seek understanding that drives transformation (knowing what to do in your context based on a broadly applicable value system), then Deming's system can deliver.
Lessons from the Red Bead Experiment include the fallacy of rating people and ranking them in order of performance for next year (based on previous performance), as well as attributing the performance of the system to the performance of the “willing workers” in this simulation of an organization governed by what Dr. Deming referred to as the “prevailing system of management.”
Pray we never need statistical process controls for the mass manufacturing of military objectives.
Deming's exhortations exist because they are aspirational, essentially propaganda for his vision of organizational cybernetics. "Deming was part of the Teleological Society with Wiener, Turning, von Neumann, and others during and after the Second World War — one of the groups that was the precursor to the Macy Conferences and worldwide cybernetics movement that also led to the development of the Cybernetics Society." [0]
"[Deming's] view of cooperation stood in stark contrast to business as usual, which emphasized competition, even within one’s own company. Throughout his life, he demonstrated how even competitors working together benefited their respective companies and, more importantly, their customers." [1]
1. Willis, John. Deming's Journey to Profound Knowledge: How Deming Helped Win a War, Altered the Face of Industry, and Holds the Key to Our Future (p. 164). (Function). Kindle Edition.
Hazard a guess that serializing demented data structures into something text encoded like json or yaml or XML/SOAP is no less painful than a straight binary representation aside from unfamiliarity of tooling to reason about and arbitrarily query the structure, like jq, lq, etc.
When you build an app with Xcode, your .xcassets folders are compiled into binary .car files that ship with your application. . . . The “CAR” extension likely stands for “Compiled Asset Record” based on method names found in Xcode’s IBFoundation framework.
The article is well worth reading even without ingesting the specifics in order to follow the author's reverse engineering process.
None of this could happen with a protocol. You cannot require age
verification on IRC, XMPP, ActivityPub, Nostr, or Matrix, because there is no
single entity to compel. Each server operator makes their own decisions. A
government would need to individually pressure thousands of independent
operators across dozens of jurisdictions, which is a legislative and
enforcement impossibility. And even if one server complied, users would
simply move to another.
This is wishful thinking. A government would just move to the next layer of the stack and attack the supporting infrastructure, like DNS, payment services or datacenters. To the degree that a protocol is a manner of communication between things (fka services), those things can be made to comply with the prevailing legal authority.
The interesting thing about Nostr (vs each of the other options listed here) is that it works perfectly fine over sneakernet. And that has been impossible to block throughout the world, even in some of the most oppressive nations.
Since the spec includes identity, content (in multiple formats), and authenticity/integrity, this makes it superior to nearly all alternatives for offline use. Once you know someone’s key, you can verify that content comes from them, however you manage to obtain that content.
Are those terms substantially different from the article's claims?
THe wikipedia definition of meme is "memes: ideas, behaviors, beliefs, and expressions." The author discusses frames and mental models as a topic [0]. "[A] framing is a choice of boundaries" and "A model is an analogy. It is a simplified simulation of something else." These seem to map to meme-concepts ideas and beliefs respectively and loosely. ("Frame" is probably a meta-meme or ontology that expands or contracts what memes can exist at all or what can be discerned at all.)
reply