I didn't bother to watch, but I did skip ahead several times and it sounded like a sales pitch. Only one video at Ed's youtube. "Build companies that matter to customers that solve real problems."
If you need more Ed, you can try
Ed Zitron's Where's Your Ed At
The Words of Ed Zitron, a PR person and writer.
Risk factor doesn't mean causative, only that there's enough signal to use it in considering what interventions to pursue. Made-up example, maybe slightly elevated blood lipids by itself wouldn't merit lipid lowering agents, but in combination with other risk factors like high blood pressure or poor sleep regularity, they are merited.
The field of medicine in general understands the concept of a condition being secondary to another, underlying cause and might treat it as a comfort thing but doesn't consider that with fixing the underlying.
As someone reading this while taking a shower, I'm questioning how this could be redesigned to work today. How are you supposed to use your phone if your head is sticking out?
In the "Covariates" section it mentions they're controlling for "self-reported sleep problems" such as insomnia. I imagine a relationship between stress and sleep regularity would most likely be mediated by insomnia?
Experimentation is _ALWAYS_ at the "oh look, something funny happens if i do this" stage, otherwise it isn't experimentation/research but rather research/development. If we know what to expect, why experiment? Why waste resources?
> One monday morning last fall, at Spring Valley High School in Columbia, South Carolina, a 16-year-old girl refused to hand over her cellphone to her algebra teacher.
I was never a fan of teachers confiscating things, but there is a long history of certain items being prohibited in class.
Perhaps there could be more collaborative development of rules and enforcement policies, with participation from teachers, students, and parents.
You're right.
A headline of "Dell's website is serving up unsigned updates" would be correct. But to garner more clicks and hype that's not how they've worded their tweet, instead it's worded to make it sound like Dell are doing this on purpose.
For x in tests, type annotations, and documentation*:
If you write your x first then you have to decide what your API is. This is great if you want to think about your API. Sometimes though you just want to get down to it and play around with a new idea. Either way is fine.
As soon as you start sharing code or patching production code or patching someone else’s production code, one must insist on seeing some kind of x. Having x around the outside of a system — rather than requiring x be added throughout the entire system — is often good enough.
Most of the ones I've seen do, but via an rca to 3.5mm dongle. The main issue is that the scaler built into most modern TVs does a worse job than even a cheap external one.
One approach I didn't see discussed here is storing the UUID across 2 columns as 2 64 bit integers and forming a composite primary key. There's still tradeoffs with this as with all the methods but depending on use case it's viable way to do it.
I used to design airplane parts and systems. A guarantee isn't worth squat. Being able to positively verify it is what works.
You're right that I don't use a laptop for videoconferencing. I wouldn't use the builtin mike and camera anyway, as a 5 cent microphone can make it hard for the other party to understand you. I use a semi pro mike. If you're in business, I recommend such a setup.
Yes! Bluesky themselves don't train on my data which is a major factor for choosing that platform because that is the way I want to share my content; and what do y'all do, immediately grab and train on it with no hesitation whatsoever.
This raises a different but related question. In what world should a victim of a crime be extorted for doing innocent things in their home. If a peeping tom took a photo though a window, could that be used to extort someone?
When people are extorted for these kinds of things it's usually catfishing that leads to sexual acts being recorded. That's not related to cybersecurity.
> I want to scrape reddit and twitter, and then sell access to the content by posting lead-gen on hacker news
## SUMMARY
This business idea presents significant flaws in terms of legality, market viability, and competitive landscape. Additionally, it lacks clear differentiation and poses high operational and financial risks.
[analysis.marketProfitability]
## MARKETSIZE
The market for data scraping and analysis is highly competitive, with an estimated size of $1 billion globally, but it is heavily regulated and saturated with similar services.
## REVENUESTREAMS
Potential revenue streams include subscription fees for access to data, one-time sales of datasets, and consulting services for data analysis.
## PROFITMARGINS
Profit margins can be thin due to high competition and potential legal fees; profitability is uncertain.
[analysis.uniquenessFactor]
## KEYDIFFERENTIATORS
The uniqueness of the product is questionable; many established tools already scrape social media data and provide insights.
## COMPETITIVEADVANTAGE
There is no strong competitive advantage evident, particularly since numerous companies offer similar scraping services with established user bases.
[analysis.realWorldSuccess]
## BARRIERSTOENTRY
Barriers to entry are low in terms of technology but high in legal compliance; obtaining permission to scrape data from platforms like Reddit and Twitter is a significant hurdle.
## SCALABILITY
While the technology may be scalable, the ethical and legal challenges associated with scaling operations could hinder growth.
## MARKETTRENDS
Market trends indicate a growing focus on data privacy; many platforms are tightening their policies on scraping, which could severely affect viability.
[analysis.existingCompetition]
## DIRECTCOMPETITORS
Direct competitors include data scraping companies such as ParseHub, Octoparse, and various data analytics firms.
## INDIRECTCOMPETITORS
Indirect competitors include social media analytics tools like Hootsuite and Sprout Social, which offer insights without scraping.
[analysis.riskFactors]
## MARKETRISKS
Changing regulations regarding data privacy and scraping could render the business model unviable overnight.
## OPERATIONALRISKS
Operational risks include potential bans from platforms, legal challenges, and the need for continuous technology updates to avoid detection.
## FINANCIALRISKS
Financial risks are substantial, considering the potential for fines and legal fees if the business is found to be in violation of terms of service.
[analysis.overallAssessment]
## STRENGTHS
The concept of leveraging social media data for lead generation is appealing, and there is a market for data insights in marketing.
## WEAKNESSES
The lack of uniqueness and high legal risks overshadow the potential strengths; ethical concerns surrounding scraping are significant.
## OPPORTUNITIES
There is an opportunity to pivot towards legitimate data analysis and consulting services that comply with legal standards.
## THREATS
Legal action from social media platforms, rapid changes in data privacy laws, and strong competition from established players present significant threats.