3 private links
For drawing system network diagrams in LibreOffice
Over 180 shapes in dark and light variants, all drawn in native vector
form in a way that allows them to be scaled to any size, and have the
line thickness altered without breaking their appearance.
GitHub - hypotext/notation: Collection of quotes on interesting notations & how they affect thought.
Abstract: Africa is the source of all modern humans, but characterization of genetic variation and of relationships among populations across the continent has been enigmatic. We studied 121 African populations, four African American populations, and 60 non-African populations for patterns of variation at 1327 nuclear microsatellite and insertion/deletion markers. We identified 14 ancestral population clusters in Africa that correlate with self-described ethnicity and shared cultural and/or linguistic properties. We observed high levels of mixed ancestry in most populations, reflecting historical migration events across the continent. Our data also provide evidence for shared ancestry among geographically diverse hunter-gatherer populations (Khoesan speakers and Pygmies). The ancestry of African Americans is predominantly from Niger-Kordofanian (~71%), European (~13%), and other African (~8%) populations, although admixture levels varied considerably among individuals. This study helps tease apart the complex evolutionary history of Africans and African Americans, aiding both anthropological and genetic epidemiologic studies.
Proper Security is more expensive than paying after security incident happen ?
extract : "[...] On the other hand, as we examine the actual costs of these events
in our dataset (clearly one of the most important outcome meas-
ures), we find that they cost most firms less than $200k, only a frac-
tion of the millions of dollars commonly cited. We also estimate that
they represent only 0.4% of firm revenues, far less than other losses
due to fraud, theft, corruption, or bad debt (Clearly, however, in
some cases, data breaches and other cyberattacks have caused mas-
sive losses to firms, as well as some cases of identity theft do cause
extreme harms to individuals. Note, however, that these discussions
relate to average or median outcomes.).
security sandbox
Editorial Note: I originally wrote this post for the Infragistics blog. Head over to their site and check out the original. While you’re there, have a look at the other blog authors and their product offering. If you’re not already familiar with the concept of technical debt, it’s worth becoming familiar with it. I say …
The most common question students have about mathematics is “when will I ever use this?” Many math teachers would probably struggle to give…
How to Read a Book, v5.0
Paul N. Edwards
School of Information
University of Michigan
http://pne.people.si.umich.edu/PDF/howtoread.pdf