Oh are we talking about Sheryl Sandberg again? Well, your reminder that disabled feminists, LGBQT feminists, and feminists of color criticised her ‘lean in’ deal from day one. Don’t let anyone retcon that out of existence.
More from Tech
Sheryl got her MBA at Harvard. One of the most famous cases (Extra Strength Tylenol) in one of the most famous classes (Business History) she took: in 1982, someone put cyanide in Extra Strength Tylenol capsules and killed 7 people in Chicago.
What do you do when someone turns your product into a weapon? When they use the system you built to harm? James Burke, CEO of J&J, was shockingly open with the public, he pulled the product and made significant packaging changes to make product safer (but not tamper-proof).
He over-shared every step along the way re investigation, redesign, stood up as both CEO and human. The reintroduction of new Extra Strength Tylenol succeeded. Burke saved the brand.
But four years later it happened again. A killer put cyanide in the capsules, this time a woman in Yonkers died. Same CEO, Burke, pulled the product again, completely changed the form factor from capsule to caplet and relaunched *again*. It worked *again*. How'd they do that?
Burke (CEO) tapped J&Js goodwill bank account w/ the public. Two big withdrawals from that bank account in four years + 8 dead bodies! But his honesty, openness, humanity (choked up about the deaths more than once), humility kept the goodwill bank balance positive the whole time.
For technical founders it is irrationally, obscenely hard to reverse years of programming (ba dum bum) that sales is a value-destroying activity. Sales is CLEARLY a value-creating activity, contingent on you have a value-creating product.
The world will not drop what they are doing to adopt your work. This is particularly true in B2B, where simply building a better mousetrap won't overcome the activation energy required to get people with additional non-mice problems to prioritize changing mousetraps today.
This is very non-obvious for founders because founders are not often people who *want* to be sold to. We often come from a background where trying out tools is a bit of a fun hobby. We like looking at all the options, making charts, and ripping out partially complete tests.
"This week I unsuccessfully trialed four software options for automating that thing that has been killing us. Our actual production process remains the same as last week. Don't worry; this was a great use of time." is not a thing you want to write in a progress report to manager.
With SIM attacks at their highest, now is a great time to take a closer look at your online security.
Removing SMS from your two-factor auth is a start, but authenticator apps have downsides too...
Just look at these headlines from recent SIM swap and port attacks.
It's all too established for attackers to find ways to socially engineer control of your phone number and start gaining control of your accounts.
I first talk about some general security tips.
Unfortunately not all websites let you remove your phone number from accounts.
You may consider migrating your phone carrier to @googlefi , which requires email account access to do anything (and can be locked down with security keys and even Advanced Protection)
Beyond SMS, I talk about issues that TOTP authenticator apps (the code generators) have as a form of two-factor auth. They're so, so much better than relying on SMS for your second factor but they still have issues like utilizing shared secrets and lacking phishing prevention.
Enter security keys!
Utilizing public key cryptography they don't have any shared secret between the client and the server. They prevent phishing by taking the website domain into account.
Even if you get tricked by a clone phishing website, your key won't.
Was on a zoom call last evening with a testing company that had some fascinating evidence on protection etc.
I have more reading to do.
I do not want to be coerced into something I don't want, BUT i want normal back as soon as possible.
Basically i'm at the point in my isolation and thinking that I'll take whatever just so this bullshit can end.
That is a desperate mindset, but so is 12 months of being cut off from the world.
All i have is what goes round and round in my head.
There's no one else to help balance it.
So i'm in group 6, and my surgery are doing group 6 right now. And i am at the point i want to do it to get it DONE.
And also to study what happens. Because i have that kind of mind.
I remember Pandemrix.
But we live with risk every day.
I risk my life climbing walls with only a harness around my waist to catch me as i lean back and fall off
And rational risk assessment is at the heart of everything going wrong these last 12 months
Energy system models love NETs, particularly for very rapid mitigation scenarios like 1.5C (where the alternative is zero global emissions by 2040)! More problematically, they also like tons of NETs in 2C scenarios where NETs are less essential. https://t.co/M3ACyD4cv7 2/10
There is a lot of confusion about carbon budgets and how quickly emissions need to fall to zero to meet various warming targets. To cut through some of this morass, we can use some very simple emission pathways to explore what various targets would entail. 1/11 pic.twitter.com/Kriedtf0Ec— Zeke Hausfather (@hausfath) September 24, 2020
In model world the math is simple: very rapid mitigation is expensive today, particularly once you get outside the power sector, and technological advancement may make later NETs cheaper than near-term mitigation after a point. 3/10
This is, of course, problematic if the aim is to ensure that particular targets (such as well-below 2C) are met; betting that a "backstop" technology that does not exist today at any meaningful scale will save the day is a hell of a moral hazard. 4/10
Many models go completely overboard with CCS, seeing a future resurgence of coal and a large part of global primary energy occurring with carbon capture. For example, here is what the MESSAGE SSP2-1.9 scenario shows: 5/10
You May Also Like
Most people may be familiar with him as the tall guy in the Proud Boys bridge shot, from their August 17, 2019 attack on Portland, which featured an American Guard bus trying (and failing) to bludgeon antifascists with hammers.
He was also with his g/f at the time (Dominique Tota, left of Tarrio), and that's definitely a twitter account folks will want to block/report because he posts on it.
He's been plenty active at the pro-Covid/anti-mask/ReOpen protests in Lansing MI, seen here with Jerry Wayne and an effigy of Gretchen Whitmer, who his militia friends tried to kidnap and publicly execute.
Outside of the Proud Boys, his solo "career" with Oak Nation features the same misogyny, classism and gateway to far-right domestic terrorism the Proud Boys themselves feature. Here's him peddling oxychlorinque and bragging about harassing service workers.
ALL Exchanged Currencies as well as all Zim Redemption funds will be placed in the accounts they set up in the Quantum Financial System./1
Absolutely none of these funds will be placed in a Bank at the redemption appointment. Bank computers cannot be programmed to transfer Digital Gold Certificates./2
The QFS can and will transplant funds into a bank account as has been explained earlier,/3
so a person can transfer funds to their own bank account but the desirability will become less and less as the banks go into receivership and their customer’s deposits are confiscated to avoid the Bank’s demise./4
Which bank can compete with the QFS when the QFS is free, secure, private, and stable? One of the major problems in the transition will be the use of Debit Cards for merchant purchases. Will VISA or Mastercard be available?/5
A recent video of Shoaid Akhter surfaced in social media creating a lot of controversy where the #Pakistani Cricketer can be seen suggesting invasion of India by using the term Ghazwa-e-Hind.
Radicalization of sportsmen seen off late
Some radical Islamic preachers believes that Ghazwa-e-Hind means a “Holy War against India”. As per this irrational & profane concept, there will be a fierce battle to secure victory over #India.
#Pakistan-based terror groups, like JeM have been using Ghazwa-e-Hind as a Hadith to recruit, fund and justify its terror strikes as a religious holy war against #India.
Some machiavellian people claim it is a prophecy that Muslim warriors will wage war against the #India.
Jaish & others falsely propagate that Jihad against India is considered holy in Islam & that those participating in it will be granted an easy entry into paradise.
However prolific scholars says that this is a made-up interpretation of some verse in The Holy Quran to mislead the gullible youth of #Pakistan into picking up arms and fighting its Army's personal battle against #India.
Like company moats, your personal moat should be a competitive advantage that is not only durable—it should also compound over time.
Characteristics of a personal moat below:
I'm increasingly interested in the idea of "personal moats" in the context of careers.— Erik Torenberg (@eriktorenberg) November 22, 2018
Moats should be:
- Hard to learn and hard to do (but perhaps easier for you)
- Skills that are rare and valuable
- Compounding over time
- Unique to your own talents & interests https://t.co/bB3k1YcH5b
2/ Like a company moat, you want to build career capital while you sleep.
As Andrew Chen noted:
People talk about \u201cpassive income\u201d a lot but not about \u201cpassive social capital\u201d or \u201cpassive networking\u201d or \u201cpassive knowledge gaining\u201d but that\u2019s what you can architect if you have a thing and it grows over time without intensive constant effort to sustain it— Andrew Chen (@andrewchen) November 22, 2018
3/ You don’t want to build a competitive advantage that is fleeting or that will get commoditized
Things that might get commoditized over time (some longer than
Things that look like moats but likely aren\u2019t or may fade:— Erik Torenberg (@eriktorenberg) November 22, 2018
- Proprietary networks
- Being something other than one of the best at any tournament style-game
- Many "awards"
- Twitter followers or general reach without "respect"
- Anything that depends on information asymmetry https://t.co/abjxesVIh9
4/ Before the arrival of recorded music, what used to be scarce was the actual music itself — required an in-person artist.
After recorded music, the music itself became abundant and what became scarce was curation, distribution, and self space.
5/ Similarly, in careers, what used to be (more) scarce were things like ideas, money, and exclusive relationships.
In the internet economy, what has become scarce are things like specific knowledge, rare & valuable skills, and great reputations.
2/ Nov. 3rd, so for them to deny that now is absolutely absurd. Plus, we have an affidavit from an expert cyber-warfare [individual] who even shows the diagram of all the attacks coming in. We know that the VPN ... the Dominion people left those open and unencrypted on the night
3/ of the election, so that anybody could get in. We know that the packets of information went to Serbia [note: over 100 Dominion employees scrubbed there LinkedIn profiles of any affiliation with the company after the election, many of whom were in Serbia], Liechtenstein,
4/ Spain, Venezuela, Hunan, China & Hong Kong. There was traffic all over into our election system that is supposed to be self-contained, not accessible by the internet at all. We have witnesses who document that it was connected to the internet. We have a study out of
5/ [the Dominion voting system in Antrim] MI, they know that it was connected to the internet. They erased their audit files & their adjudication files, where they dumped over 68% of their ballots into a bin that they call "adjudication" [that would've been thousands + thousands